This tool allows to collect various forensics artifacts in Windows memory dumps using Volatility and Foremost for common Windows applications.
Project description
Table of Contents
Introduction
This tool automates the research of some artifacts for forensics purpose in memory dumps based upon Volatility for a series of common Windows applications.
It can also open multiple archive formats. In case of an archive, the tool will extract all its files to a temporary directory and then try to open each file as a memory dump (except files named README or README.md).
System Requirements
This framework was tested on an Ubuntu 18.04 with Python 2.7.
Installation
- Install system requirements
$ sudo apt-get install foremost
$ git clone https://github.com/volatilityfoundation/volatility /tmp/vol-setup
$ cd /tmp/vol-setup && sudo python setup.py install
Behind a proxy ?
Do not forget to configure your Network system settings (or manually edit
/etc/apt/apt.conf
).
- Install AppMemDumper from Pip
$ pip install appmemdumper
Behind a proxy ?
Do not forget to add option
--proxy=http://[user]:[pwd]@[host]:[port]
to your pip command.
Quick Start
- Help
$ app-mem-dumper -h
usage: app-mem-dumper [-a APPS] [-d DUMP_DIR] [-f] [-p PLUGINS] [-s SYST]
[-t TEMP_DIR] [-u] [-h] [-v]
dump
AppMemDumper v2.3.0
Author : Alexandre D'Hondt
Copyright: © 2019 A. D'Hondt
License : GNU Affero General Public License v3.0
This tool automates the research of some artifacts for forensics purpose in
memory dumps based upon Volatility for a series of common Windows applications.
It can also open multiple archive formats (it uses pyunpack). In case of an
archive, the tool will extract all its files to a temporary directory and then
try to open each file as a memory dump.
positional arguments:
dump memory dump file path
optional arguments:
-a APPS comma-separated list of integers designating applications to be parsed
Currently supported:
[0] AdobeReader [8] Notepad
[1] Chrome [9] OpenOffice
[2] Firefox [10] PDFLite
[3] FoxitReader [11] SumatraPDF
[4] InternetExplorer [12] Thunderbird
[5] KeePass [13] TrueCrypt
[6] MSPaint [14] Wordpad
[7] MediaPlayerClassic
(default: all)
-d DUMP_DIR, --dump-dir DUMP_DIR
dump directory (default: files)
-f, --force force profile search, do not use cached profile (default: False)
-p PLUGINS, --plugins-dir PLUGINS
path to custom plugins directory (default: None)
-s SYST comma-separated list of integers designating system items to be parsed
Currently supported:
[0] Clipboard [8] Mimikatz
[1] CommandLines [9] NetworkConnections
[2] CriticalProcessesInfo [10] ProcessesInfo
[3] Devices [11] Registry
[4] DumpInfo [12] Timeline
[5] Kernel [13] UserActivities
[6] LsaSecrets [14] UserHashes
[7] Malfind
(default: none)
-t TEMP_DIR, --temp-dir TEMP_DIR
temporary directory for decompressed images (default: .temp)
-u, --update update previous dump directories (default: False)
extra arguments:
-h, --help show this help message and exit
-v, --verbose verbose mode (default: False)
Usage examples:
app-mem-dumper memory.dmp
app-mem-dumper my-dumps.tar.gz
app-mem-dumper dumps.zip -g all
app-mem-dumper dump.raw -a 1,2,4 -f
app-mem-dumper dump.mem -a 0,3,10,11 -g 0
- Example of output
$ app-mem-dumper memory.dump -v -p plugins
[appmemdumper] XX:XX:XX [DEBUG] Attempting to decompress 'memory.dump'...
[appmemdumper] XX:XX:XX [DEBUG] Not an archive, continuing...
[appmemdumper] XX:XX:XX [DEBUG] Setting output directory to 'files/memory.dump'...
[appmemdumper] XX:XX:XX [INFO] Opening dump file 'memory.dump'...
[appmemdumper] XX:XX:XX [INFO] Getting profile...
[appmemdumper] XX:XX:XX [INFO] Getting processes...
[appmemdumper] XX:XX:XX [DEBUG] > Executing command 'pslist'...
[appmemdumper] XX:XX:XX [DEBUG] Found : mspaint.exe
[appmemdumper] XX:XX:XX [DEBUG] Not handled : audiodg.exe, csrss.exe, dllhost.exe, [...]
[appmemdumper] XX:XX:XX [DEBUG] Profile: Win7SP0x86
[appmemdumper] XX:XX:XX [INFO] Processing dumper 'dumpinfo'...
[appmemdumper] XX:XX:XX [INFO] Processing dumper 'mspaint'...
[appmemdumper] XX:XX:XX [DEBUG] Dumping for PID XXXX
[appmemdumper] XX:XX:XX [DEBUG] > Calling command 'memdump'...
[appmemdumper] XX:XX:XX [DEBUG] >> volatility --plugins=/path/to/plugins --file=[...]
[appmemdumper] XX:XX:XX [INFO] > /path/to/files/memory.dump/mspaint-2640-memdump.data
[appmemdumper] XX:XX:XX [WARNING]
The following applies to collected objects of:
- mspaint
Raw data (.data files) requires manual handling ;
Follow this procedure:
1. Open the collected resources with Gimp
2. Set the width and height to the expected screen resolution
3. Set another color palette than 'RVB'
Restart this procedure by setting other parameters for width|height|palette.
Issues management
Please open an Issue if you want to contribute or submit suggestions.
The labels usage convention is as follows :
- General question: question
- Suggestion: help wanted
- Bug/exception/problem: bug
- Improvement/contribution: enhancement ; NB: please precise if you are motivated and able to contribute
If you want to build and submit new dumpers, please open a Pull Request.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.