-
When trying to access a network drive via cmd:
pushd \\vmware-host\Shared Folders -
When viewing files in excel, start by freezing top row AND autofilter.
-
With RECmd, in
Registry/\*.csvcheck the Deleted column. -
With Amcache, in
ProgramExecution\*AssociatedFileEntires, nice to see what else a program installed. -
With PECmd, check the
\*PECmd_Output{,_Timeline}.csv -
In
EventLogs\EvtxECmd_Output.csvyou can find the correlated Computer Username ('@Name":"Username","#text":""') and User's SID ('@Name":"UserSid","#text":"S-1-5-21....') -
Can run multiple targets/modules at once with comma seperated list.
-
Should include this RECmd_Batch_MC for the RECmd Module.
-
View *.csv's with Timeline Explorer
PS> reg add HKLM\Software\Classes\.tkape /v PerceivedType /d text # Open files in File Explorer's preview pane PS> reg add HKLM\Software\Classes\.mkape /v PerceivedType /d text C:>kape --mlist . # List KAPE's Modules C:>kape --tlist . # List KAPE's Targets C:>kape --sync # Update KAPE's Targets and Modules from Github # Ran KAPE on WinToolTester for collection step C:>kape --tsource c --target !BasicCollection --tdest Z:\WinToolTester\KAPE_output # Ran KAPE on Investigator machine after transfering collected files from VMware shared folder C:>kape --msource c:\Users\investigator\Desktop\KAPE_output\c --module !EZParser --mdest C:\Users\investigator\Desktop\KAPE_output\module.output # Src: <https://dfirtnt.wordpress.com/2020/06/09/find-evil-in-5-easy-steps-part2/amp/> RECmd.exe --d "C:\Temp\Cases\inc123\files\C" --regex --sa "(\\programdata\\.+\.|\\temp\\.+\.|\\users\\.+\.)(exe|bat|lnk|ps1|cmd|com|vbs|js|jse|wsh|mht|htm|hta|vba|vbe|scr|cpl|msc|jar|vb|reg)"
