Delete 'APT-Hunter.py'

main
pex7hfbnt 1 month ago
parent 55d4ec7f91
commit 3528a52e8b

@ -1,864 +0,0 @@
import traceback
import logging
from lib.Banner import *
import argparse
import pandas as pd
import lib.EvtxDetection as EvtxDetection
import lib.O365Hunter as O365Hunter
import lib.CSVDetection as CSVDetection
import lib.EvtxHunt as EvtxHunt
import lib.SigmaHunter as SigmaHunter
from evtx import PyEvtxParser
from sys import exit
from pytz import timezone
from dateutil import tz
import glob
import os
import re
from pathlib import Path as libPath
from datetime import datetime
import dateutil.parser
import multiprocessing
import time
import pickle
import platform
timestart=None
timeend=None
Output=""
Path=""
Security_path=""
system_path=""
scheduledtask_path=""
defender_path=""
powershell_path=""
powershellop_path=""
terminal_path=""
temp_dir="temp"
winrm_path=""
sysmon_path=""
objectaccess=False
processexec=False
logons=False
frequencyanalysis=False
allreport=False
Security_path_list=[]
system_path_list=[]
scheduledtask_path_list=[]
defender_path_list=[]
powershell_path_list=[]
powershellop_path_list=[]
terminal_path_list=[]
terminal_Client_path_list=[]
winrm_path_list=[]
sysmon_path_list=[]
group_policy_path_list=[]
SMB_SERVER_path_list=[]
SMB_CLIENT_path_list=[]
UserProfile_path_list=[]
RDPClient_Resolved_User=[]
WinRM_Resolved_User=[]
input_timezone=tz.tzlocal()
CPU_Core=0
Logon_Events=[{'Date and Time':[],'timestamp':[],'Event ID':[],'Account Name':[],'Account Domain':[],'Logon Type':[],'Logon Process':[],'Source IP':[],'Workstation Name':[],'Computer Name':[],'Channel':[],'Original Event Log':[]}]
Executed_Powershell_Summary=[{'Command': [], 'Number of Execution': []}]
Executed_Process_Summary=[{'Process Name':[],'Number of Execution':[]}]
TerminalServices_Summary=[{'User':[],'Number of Logins':[]}]
Security_Authentication_Summary=[{'User':[],'Number of Failed Logins':[],'Number of Successful Logins':[]}]
Sysmon_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'Original Event Log':[],'Computer Name':[],'Channel':[]}]
WinRM_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'UserID':[],'Event ID':[],'Original Event Log':[],'Computer Name':[],'Channel':[]}]
Security_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'Original Event Log':[],'Computer Name':[],'Channel':[]}]
System_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Service Name':[],'Image Path':[],'Event Description':[],'Event ID':[],'Original Event Log':[],'Computer Name':[],'Channel':[]}]
ScheduledTask_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Schedule Task Name':[],'Image Path':[],'Event Description':[],'Event ID':[],'Original Event Log':[],'Computer Name':[],'Channel':[]}]
Powershell_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'Original Event Log':[],'Computer Name':[],'Channel':[]}]
Powershell_Operational_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'Original Event Log':[],'Computer Name':[],'Channel':[]}]
TerminalServices_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'User':[],'Source IP':[],'Original Event Log':[],'Computer Name':[],'Channel':[]}]
TerminalServices_RDPClient_events=[{'Date and Time': [], 'timestamp': [], 'Detection Rule': [], 'Severity': [], 'Detection Domain': [],'Event Description': [], 'Event ID': [], 'UserID': [], 'Source IP': [], 'Computer Name': [], 'Channel': [],'Original Event Log': []}]
Windows_Defender_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Event ID':[],'Original Event Log':[],'Computer Name':[],'Channel':[]}]
Timesketch_events=[{'message':[],'timestamp':[],'datetime':[],'timestamp_desc':[],'Event Description':[],'Severity':[],'Detection Domain':[],'Event ID':[],'Original Event Log':[],'Computer Name':[],'Channel':[]}]
Object_Access_Events=[{'Date and Time':[],'timestamp':[],'Event ID':[],'Account Name':[],'Account Domain':[],'Object Name':[],'Object Type':[],'Process Name':[],'Computer Name':[],'Channel':[],'Original Event Log':[]}]
Group_Policy_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Group Policy Name':[],'Policy Extension Name':[],'Event ID':[],'Original Event Log':[],'Computer Name':[],'Channel':[]}]
Executed_Process_Events=[{'DateTime':[],'timestamp':[],'EventID':[],'ProcessName':[],'User':[],'ParentProcessName':[],'RawLog':[]}]
SMB_Server_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Client Address':[],'UserName':[],'Share Name':[],'File Name':[],'Event ID':[],'Computer Name':[],'Channel':[],'Original Event Log':[]}]
SMB_Client_events=[{'Date and Time':[],'timestamp':[],'Detection Rule':[],'Severity':[],'Detection Domain':[],'Event Description':[],'Share Name':[],'File Name':[],'Event ID':[],'Computer Name':[],'Channel':[],'Original Event Log':[]}]
User_SIDs = {'User': [], 'SID': []}
Frequency_Analysis_Security={}
Frequency_Analysis_Security={}
Frequency_Analysis_Windows_Defender={}
Frequency_Analysis_SMB_Client={}
Frequency_Analysis_Group_Policy={}
Frequency_Analysis_Powershell_Operational={}
Frequency_Analysis_Powershell={}
Frequency_Analysis_ScheduledTask={}
Frequency_Analysis_WinRM={}
Frequency_Analysis_System={}
Frequency_Analysis_Sysmon={}
Frequency_Analysis_SMB_Server={}
Frequency_Analysis_TerminalServices={}
def evtxdetect_auto():
global timestart,timeend,logons,Output,allreport,SMB_Server_events,User_SIDs,SMB_Client_events,TerminalServices_RDPClient_events,Frequency_Analysis_TerminalServices,Executed_Process_Events,Group_Policy_events,Object_Access_Events,input_timezone,Logon_Events,Executed_Process_Summary,TerminalServices_Summary,Security_Authentication_Summary,Sysmon_events,WinRM_events,Security_events,System_events,ScheduledTask_events,Powershell_events,Powershell_Operational_events,TerminalServices_events,Windows_Defender_events,Timesketch_events,TerminalServices_Summary,Security_Authentication_Summary,Executed_Powershell_Summary
process_list = []
try:
#print(Security_path)
userprofile=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (UserProfile_path_list,EvtxDetection.detect_events_UserProfileService_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core))
userprofile.start()
process_list.append(userprofile)
except IOError :
print("Error Analyzing User Profile logs: ", end='')
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing User Profile logs")
logging.error(traceback.format_exc())
try:
#print(Security_path)
sec=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (Security_path_list,EvtxDetection.detect_events_security_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
sec.start()
process_list.append(sec)
except IOError :
print("Error Analyzing Security logs: ", end='')
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing Security logs")
logging.error(traceback.format_exc())
try:
#EvtxDetection.multiprocess(system_path_list,EvtxDetection.detect_events_system_log,input_timezone,timestart,timeend)
sys=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (system_path_list,EvtxDetection.detect_events_system_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
sys.start()
process_list.append(sys)
except IOError :
print("Error Analyzing System logs : ", end='')
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing System logs ")
logging.error(traceback.format_exc())
try :
#EvtxDetection.multiprocess(powershellop_path_list,EvtxDetection.detect_events_powershell_operational_log,input_timezone,timestart,timeend)
pwshop=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (powershellop_path_list,EvtxDetection.detect_events_powershell_operational_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
pwshop.start()
process_list.append(pwshop)
except IOError :
print("Error Analyzing Powershell Operational logs : ", end='')
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing Powershell Operational logs ")
logging.error(traceback.format_exc())
try :
#EvtxDetection.multiprocess(powershell_path_list,EvtxDetection.detect_events_powershell_log,input_timezone,timestart,timeend)
pwsh=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (powershell_path_list,EvtxDetection.detect_events_powershell_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
pwsh.start()
process_list.append(pwsh)
except IOError :
print("Error Analyzing Powershell logs : ", end='')
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing Powershell logs ")
logging.error(traceback.format_exc())
try :
#EvtxDetection.multiprocess(terminal_path_list,EvtxDetection.detect_events_TerminalServices_LocalSessionManager_log,input_timezone,timestart,timeend)
terminal=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (terminal_path_list,EvtxDetection.detect_events_TerminalServices_LocalSessionManager_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
terminal.start()
process_list.append(terminal)
except IOError :
print("Error Analyzing TerminalServices LocalSessionManager logs: ", end='')
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing TerminalServices LocalSessionManager logs")
logging.error(traceback.format_exc())
try :
#EvtxDetection.multiprocess(terminal_path_list,EvtxDetection.detect_events_TerminalServices_LocalSessionManager_log,input_timezone,timestart,timeend)
terminal_client=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (terminal_Client_path_list,EvtxDetection.detect_events_TerminalServices_RDPClient_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
terminal_client.start()
process_list.append(terminal_client)
except IOError :
print("Error Analyzing TerminalServices RDP Client logs: ", end='')
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing TerminalServices RDP Client logs")
logging.error(traceback.format_exc())
try:
#EvtxDetection.multiprocess(scheduledtask_path_list,EvtxDetection.detect_events_scheduled_task_log,input_timezone,timestart,timeend)
scheduled=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (scheduledtask_path_list,EvtxDetection.detect_events_scheduled_task_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
scheduled.start()
process_list.append(scheduled)
except IOError :
print("Error Analyzing Scheduled Task logs : ", end='')
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing Scheduled Task logs ")
logging.error(traceback.format_exc())
try:
#EvtxDetection.multiprocess(defender_path_list,EvtxDetection.detect_events_windows_defender_log,input_timezone,timestart,timeend)
defen=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (defender_path_list,EvtxDetection.detect_events_windows_defender_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
defen.start()
process_list.append(defen)
except IOError :
print("Error Analyzing Windows Defender logs : ", end='')
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing Windows Defender logs ")
logging.error(traceback.format_exc())
try:
#EvtxDetection.multiprocess(winrm_path_list,EvtxDetection.detect_events_Microsoft_Windows_WinRM,input_timezone,timestart,timeend)
winrm=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (winrm_path_list,EvtxDetection.detect_events_Microsoft_Windows_WinRM,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
winrm.start()
process_list.append(winrm)
except IOError :
print("Error Analyzing WinRM logs : ", end='')
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing WinRM logs ")
logging.error(traceback.format_exc())
try:
#EvtxDetection.multiprocess(sysmon_path_list,EvtxDetection.detect_events_Sysmon_log,input_timezone,timestart,timeend)
sysmon=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (sysmon_path_list,EvtxDetection.detect_events_Sysmon_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
sysmon.start()
process_list.append(sysmon)
except IOError :
print("Error Analyzing Sysmon logs ")
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing Sysmon logs ")
logging.error(traceback.format_exc())
try:
#EvtxDetection.multiprocess(group_policy_path_list,EvtxDetection.detect_events_group_policy_log,input_timezone,timestart,timeend)
gp=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (group_policy_path_list,EvtxDetection.detect_events_group_policy_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
gp.start()
process_list.append(gp)
except IOError :
print("Error Analyzing Group Policy logs ")
print("File Path Does Not Exist")
#except Exception as e:
# print("Error Analyzing Group Policy logs ")
# logging.error(traceback.format_exc())
try:
#EvtxDetection.multiprocess(SMB_SERVER_path_list,EvtxDetection.detect_events_SMB_Server_log,input_timezone,timestart,timeend)
smbserv=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (SMB_SERVER_path_list,EvtxDetection.detect_events_SMB_Server_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
smbserv.start()
process_list.append(smbserv)
except IOError :
print("Error Analyzing SMB Server logs ")
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing Group Policy logs ")
logging.error(traceback.format_exc())
try:
#EvtxDetection.multiprocess(SMB_CLIENT_path_list,EvtxDetection.detect_events_SMB_Client_log,input_timezone,timestart,timeend)
smbcli=multiprocessing.Process(target= EvtxDetection.multiprocess, args = (SMB_CLIENT_path_list,EvtxDetection.detect_events_SMB_Client_log,input_timezone,timestart,timeend,objectaccess,processexec,logons,frequencyanalysis,allreport,Output,CPU_Core,temp_dir))
smbcli.start()
process_list.append(smbcli)
except IOError :
print("Error Analyzing SMB Client logs ")
print("File Path Does Not Exist")
except Exception as e:
print("Error Analyzing Group Policy logs ")
logging.error(traceback.format_exc())
for process in process_list:
process.join()
print("preparing results")
Sysmon_events = EvtxDetection.Sysmon_events
WinRM_events =EvtxDetection.WinRM_events
Security_events =EvtxDetection.Security_events
System_events =EvtxDetection.System_events
ScheduledTask_events =EvtxDetection.ScheduledTask_events
Powershell_events =EvtxDetection.Powershell_events
Powershell_Operational_events =EvtxDetection.Powershell_Operational_events
TerminalServices_events =EvtxDetection.TerminalServices_events
TerminalServices_RDPClient_events =EvtxDetection.TerminalServices_RDPClient_events
Windows_Defender_events =EvtxDetection.Windows_Defender_events
Timesketch_events =EvtxDetection.Timesketch_events
TerminalServices_Summary=EvtxDetection.TerminalServices_Summary
Executed_Process_Summary=EvtxDetection.Executed_Process_Summary
Executed_Powershell_Summary=EvtxDetection.Executed_Powershell_Summary
Security_Authentication_Summary =EvtxDetection.Security_Authentication_Summary
Logon_Events =EvtxDetection.Logon_Events
Object_Access_Events=EvtxDetection.Object_Access_Events
Group_Policy_events=EvtxDetection.Group_Policy_events
Executed_Process_Events=EvtxDetection.Executed_Process_Events
SMB_Server_events=EvtxDetection.SMB_Server_events
SMB_Client_events=EvtxDetection.SMB_Client_events
Frequency_Analysis_Security=EvtxDetection.Frequency_Analysis_Security
Frequency_Analysis_Windows_Defender=EvtxDetection.Frequency_Analysis_Windows_Defender
Frequency_Analysis_SMB_Client=EvtxDetection.Frequency_Analysis_SMB_Client
Frequency_Analysis_Group_Policy=EvtxDetection.Frequency_Analysis_Group_Policy
Frequency_Analysis_Powershell_Operational=EvtxDetection.Frequency_Analysis_Powershell_Operational
Frequency_Analysis_Powershell=EvtxDetection.Frequency_Analysis_Powershell
Frequency_Analysis_ScheduledTask=EvtxDetection.Frequency_Analysis_ScheduledTask
Frequency_Analysis_WinRM=EvtxDetection.Frequency_Analysis_WinRM
Frequency_Analysis_System=EvtxDetection.Frequency_Analysis_System
Frequency_Analysis_Sysmon=EvtxDetection.Frequency_Analysis_Sysmon
Frequency_Analysis_SMB_Server=EvtxDetection.Frequency_Analysis_SMB_Server
Frequency_Analysis_TerminalServices=EvtxDetection.Frequency_Analysis_TerminalServices
if os.path.exists(temp_dir + "_User_SIDs_report.csv"):
#User_SIDs = pd.DataFrame(pd.read_csv(temp_dir + "_User_SIDs_report.csv"))
User_SIDs = pd.DataFrame(pd.read_csv(temp_dir + "_User_SIDs_report.csv")).to_dict(orient='list')
else:
print(f"{temp_dir + '_User_SIDs_report.csv'} does not exist.")
#User_SIDs = pd.DataFrame(User_SIDs)
#User_SIDs=EvtxDetection.User_SIDs
resolveSID()
def auto_detect(path):
global input_timezone
EventID_rex = re.compile('<EventID.*>(.*)<\/EventID>', re.IGNORECASE)
Channel_rex = re.compile('<Channel.*>(.*)<\/Channel>', re.IGNORECASE)
Computer_rex = re.compile('<Computer.*>(.*)<\/Computer>', re.IGNORECASE)
if os.path.isdir(path):
files=list(libPath(path).rglob("*.[eE][vV][tT][xX]"))
#files=glob.glob(path+"/**/"+"*.evtx")
elif os.path.isfile(path):
files=glob.glob(path)
else:
print("Issue with the path" )
return
#print("hunting ( %s ) in files ( %s )"%(str_regex,files))
#user_string = input('please enter a string to convert to regex: ')
for file in files:
file=str(file)
print("Analyzing "+file)
try:
parser = PyEvtxParser(file)
except:
print("Issue analyzing "+file +"\nplease check if its not corrupted")
continue
try:
for record in parser.records():
Channel = Channel_rex.findall(record['data'])
if Channel[0].strip()=="Security":
Security_path_list.append(file)
break
if Channel[0].strip()=="System":
system_path_list.append(file)
break
if Channel[0].strip()=="Windows PowerShell":
powershell_path_list.append(file)
break
if Channel[0].strip()=="Microsoft-Windows-PowerShell/Operational":
powershellop_path_list.append(file)
break
if Channel[0].strip()=="Microsoft-Windows-TerminalServices-LocalSessionManager/Operational":
terminal_path_list.append(file)
break
if Channel[0].strip()=="Microsoft-Windows-TaskScheduler/Operational":
scheduledtask_path_list.append(file)
break
if Channel[0].strip()=="Microsoft-Windows-Windows Defender/Operational":
defender_path_list.append(file)
break
if Channel[0].strip()=="Microsoft-Windows-WinRM/Operational":
winrm_path_list.append(file)
break
if Channel[0].strip()=="Microsoft-Windows-Sysmon/Operational":
sysmon_path_list.append(file)
break
if Channel[0].strip()=="Microsoft-Windows-GroupPolicy/Operational":
group_policy_path_list.append(file)
break
if Channel[0].strip()=="Microsoft-Windows-SMBServer/Operational":
SMB_SERVER_path_list.append(file)
break
if Channel[0].strip()=="Microsoft-Windows-SmbClient/Security":
SMB_CLIENT_path_list.append(file)
break
if Channel[0].strip()=="Microsoft-Windows-User Profile Service/Operational":
UserProfile_path_list.append(file)
#print("file added")
break
if Channel[0].strip()=="Microsoft-Windows-TerminalServices-RDPClient/Operational":
terminal_Client_path_list.append(file)
#print("file added")
break
break
except:
print("issue assigning path")
evtxdetect_auto()
def threat_hunt(path,str_regex,eid,hunt_file):
global timestart,timeend,input_timezone, Output
import os
regex_file=[]
#try:
if 1==1:
if hunt_file is not None:
if os.path.isfile(hunt_file):
print(regex_file)
regex_file=open(hunt_file).read().split("\n")
regex_file.remove('')
print(regex_file)
else:
print("Issue with the hunt file path" )
return
if os.path.isdir(path):
files=list(libPath(path).rglob("*.[eE][vV][tT][xX]"))
elif os.path.isfile(path):
files=glob.glob(path)
else:
print("Issue with the path" )
return
#user_string = input('please enter a string to convert to regex: ')
if str_regex is not None:
regex=[str_regex]
elif str_regex is None and len(regex_file)>0:
regex=regex_file
print("hunting ( %s ) in files ( %s )"%(regex,files))
EvtxHunt.Evtx_hunt(files,regex,eid,input_timezone,Output,timestart,timeend)
#except Exception as e:
# print("Error in hunting module ")
def report():
global Output,User_SIDs
timesketch=Output+"_TimeSketch.csv"
Report=Output+"_Report.xlsx"
LogonEvents=Output+"_Logon_Events.csv"
ObjectAccess=Output+"_Object_Access_Events.csv"
ProcessEvents=Output+"_Process_Execution_Events.csv"
Collected_SIDs=Output+"_Collected_SIDs.csv"
print("preparing report")
if os.path.exists(temp_dir + "_User_SIDs_report.csv"):
User_SIDs = pd.DataFrame(pd.read_csv(temp_dir + "_User_SIDs_report.csv"))
else:
print(f"{temp_dir + '_User_SIDs_report.csv'} does not exist.")
User_SIDs = pd.DataFrame(User_SIDs)
if os.path.exists(temp_dir + "_Sysmon_report.csv"):
Sysmon = pd.DataFrame(pd.read_csv(temp_dir + "_Sysmon_report.csv"))
else:
print(f"{temp_dir + '_Sysmon_report.csv'} does not exist.")
Sysmon = pd.DataFrame(Sysmon_events[0])
if os.path.exists(temp_dir + "_System_report.csv"):
System = pd.DataFrame(pd.read_csv(temp_dir + "_System_report.csv"))
else:
print(f"{temp_dir + '_System_report.csv'} does not exist.")
System = pd.DataFrame(System_events[0])
if os.path.exists(temp_dir + "_Powershell_report.csv"):
Powershell = pd.DataFrame(pd.read_csv(temp_dir + "_Powershell_report.csv"))
else:
print(f"{temp_dir + '_Powershell_report.csv'} does not exist.")
Powershell = pd.DataFrame(Powershell_events[0])
if os.path.exists(temp_dir + "_Powershell_Operational_report.csv"):
Powershell_Operational = pd.DataFrame(pd.read_csv(temp_dir + "_Powershell_Operational_report.csv"))
else:
print(f"{temp_dir + '_Powershell_Operational_report.csv'} does not exist.")
Powershell_Operational = pd.DataFrame(Powershell_Operational_events[0])
if os.path.exists(temp_dir + "_Security_report.csv"):
Security = pd.DataFrame(pd.read_csv(temp_dir + "_Security_report.csv"))
else:
print(f"{temp_dir + '_Security_report.csv'} does not exist.")
Security = pd.DataFrame(Security_events[0])
if os.path.exists(temp_dir + "_TerminalServices_report.csv"):
TerminalServices = pd.DataFrame(pd.read_csv(temp_dir + "_TerminalServices_report.csv"))
else:
print(f"{temp_dir + '_TerminalServices_report.csv'} does not exist.")
TerminalServices = pd.DataFrame(TerminalServices_events[0])
if os.path.exists(temp_dir + "_WinRM_events_report.csv"):
WinRM = pd.DataFrame(pd.read_csv(temp_dir + "_WinRM_events_report.csv"))
#print(WinRM_Resolved_User)
if len(WinRM_Resolved_User)>0:
try:
WinRM['Resolved User Name']=WinRM_Resolved_User
WinRM=WinRM[['Date and Time','timestamp','Detection Rule','Severity','Detection Domain','Event Description','UserID','Resolved User Name','Event ID','Original Event Log','Computer Name','Channel']]
except:
print("Error resolving SIDs for WinRM")
else:
print(f"{temp_dir + '_WinRM_events_report.csv'} does not exist.")
WinRM = pd.DataFrame(WinRM_events[0])
if os.path.exists(temp_dir + "_TerminalServices_RDPClient_report.csv"):
TerminalClient = pd.DataFrame(pd.read_csv(temp_dir + "_TerminalServices_RDPClient_report.csv"))
#print(RDPClient_Resolved_User)
if len(RDPClient_Resolved_User) > 0:
try:
TerminalClient['Resolved User Name'] = RDPClient_Resolved_User
TerminalClient = TerminalClient[['Date and Time', 'timestamp', 'Detection Rule', 'Severity', 'Detection Domain', 'Event Description','Event ID', 'UserID', 'Resolved User Name', 'Source IP', 'Computer Name', 'Channel', 'Original Event Log']]
except:
print("Error resolving SIDs for Terminal Client")
else:
print(f"{temp_dir + '_TerminalServices_RDPClient_report.csv'} does not exist.")
TerminalClient = pd.DataFrame(TerminalServices_RDPClient_events[0])
if os.path.exists(temp_dir + "_Defender_report.csv"):
Windows_Defender = pd.DataFrame(pd.read_csv(temp_dir + "_Defender_report.csv"))
else:
print(f"{temp_dir + '_Defender_report.csv'} does not exist.")
Windows_Defender = pd.DataFrame(Windows_Defender_events[0])
if os.path.exists(temp_dir + "_ScheduledTask_report.csv"):
ScheduledTask = pd.DataFrame(pd.read_csv(temp_dir + "_ScheduledTask_report.csv"))
else:
print(f"{temp_dir + '_ScheduledTask_report.csv'} does not exist.")
ScheduledTask = pd.DataFrame(ScheduledTask_events[0])
if os.path.exists(temp_dir + "_Group_Policy_report.csv"):
GroupPolicy = pd.DataFrame(pd.read_csv(temp_dir + "_Group_Policy_report.csv"))
else:
print(f"{temp_dir + '_Group_Policy_report.csv'} does not exist.")
GroupPolicy = pd.DataFrame(Group_Policy_events[0])
if os.path.exists(temp_dir + "_SMB_Server_report.csv"):
SMBServer = pd.DataFrame(pd.read_csv(temp_dir + "_SMB_Server_report.csv"))
else:
print(f"{temp_dir + '_SMB_Server_report.csv'} does not exist.")
SMBServer = pd.DataFrame(SMB_Server_events[0])
if os.path.exists(temp_dir + "_SMB_Client_report.csv"):
SMBClient = pd.DataFrame(pd.read_csv(temp_dir + "_SMB_Client_report.csv"))
else:
print(f"{temp_dir + '_SMB_Client_report.csv'} does not exist.")
SMBClient= pd.DataFrame(SMB_Client_events[0])
# if os.path.exists(temp_dir + "_Executed_Powershell_report.csv"):
# ExecutedPowershell_Summary = pd.DataFrame(pd.read_csv(temp_dir + "_Executed_Powershell_report.csv"))
if os.path.exists(temp_dir + "Powershell_Execution_Events.pickle"):
with open(temp_dir + "Powershell_Execution_Events.pickle", 'rb') as handle:
#Authentication_Summary=pd.DataFrame(pickle.load(handle))
Powershell_Execution_dataframes=pickle.load(handle)
#print(Security_Authentication_dataframes[0])
result=pd.concat(Powershell_Execution_dataframes, axis=0)
#ExecutedProcess_Summary=result.groupby('User').agg({'Number of Failed Logins': 'sum', 'Number of Successful Logins': 'sum'})
ExecutedPowershell_Summary =result.groupby('Command',as_index=False)['Number of Execution'].sum()
else:
print(f"{temp_dir + '_Executed_Powershell_report.csv'} does not exist.")
ExecutedPowershell_Summary = pd.DataFrame(Executed_Powershell_Summary[0])
if os.path.exists(temp_dir + "Security_Authentication.pickle"):
with open(temp_dir + "Security_Authentication.pickle", 'rb') as handle:
#Authentication_Summary=pd.DataFrame(pickle.load(handle))
Security_Authentication_dataframes=pickle.load(handle)
#print(Security_Authentication_dataframes[0])
result=pd.concat(Security_Authentication_dataframes, axis=0)
Authentication_Summary=result.groupby('User',as_index=False).agg(
{'Number of Failed Logins': 'sum', 'Number of Successful Logins': 'sum'})
#print(Authentication_Summary)
#if os.path.exists(temp_dir + "_Security_Authentication_report.csv"):
#Authentication_Summary = pd.DataFrame(pd.read_csv(temp_dir + "_Security_Authentication_report.csv"))
else:
print(f"{temp_dir + '_Security_Authentication_report.csv'} does not exist.")
Authentication_Summary = pd.DataFrame(Security_Authentication_Summary[0])
# if os.path.exists(temp_dir + "_Executed_Process_report.csv"):
# ExecutedProcess_Summary = pd.DataFrame(pd.read_csv(temp_dir + "_Executed_Process_report.csv"))
if os.path.exists(temp_dir + "Executed_Process_Events.pickle"):
with open(temp_dir + "Executed_Process_Events.pickle", 'rb') as handle:
#Authentication_Summary=pd.DataFrame(pickle.load(handle))
Process_Execution_dataframes=pickle.load(handle)
#print(Security_Authentication_dataframes[0])
result=pd.concat(Process_Execution_dataframes, axis=0)
#ExecutedProcess_Summary=result.groupby('User').agg({'Number of Failed Logins': 'sum', 'Number of Successful Logins': 'sum'})
ExecutedProcess_Summary =result.groupby('Process Name',as_index=False)['Number of Execution'].sum()
#print(Authentication_Summary)
else:
print(f"{temp_dir + '_Executed_Process_report.csv'} does not exist.")
ExecutedProcess_Summary = pd.DataFrame(Executed_Process_Summary[0])
# TerminalClient = pd.DataFrame(pd.read_csv(temp_dir+"_TerminalServices_RDPClient_report.csv"))
# TerminalClient['Resolved User Name']=RDPClient_Resolved_User
# TerminalClient=TerminalClient[['Date and Time', 'timestamp', 'Detection Rule', 'Severity', 'Detection Domain','Event Description', 'Event ID', 'UserID','Resolved User Name', 'Source IP', 'Computer Name', 'Channel','Original Event Log']]
# Windows_Defender = pd.DataFrame(pd.read_csv(temp_dir+"_Defender_report.csv"))
# ScheduledTask = pd.DataFrame(pd.read_csv(temp_dir+"_ScheduledTask_report.csv"))
# GroupPolicy = pd.DataFrame(pd.read_csv(temp_dir+"_Group_Policy_report.csv"))
# SMBServer= pd.DataFrame(pd.read_csv(temp_dir+"_SMB_Server_report.csv"))
# SMBClient= pd.DataFrame(pd.read_csv(temp_dir+"_SMB_Clientr_report.csv"))
# WinRM['Resolved User Name']=WinRM_Resolved_User
# WinRM=WinRM[['Date and Time','timestamp','Detection Rule','Severity','Detection Domain','Event Description','UserID','Resolved User Name','Event ID','Original Event Log','Computer Name','Channel']]
Terminal_Services_Summary = TerminalServices['User'].value_counts().reset_index() # pd.DataFrame(TerminalServices_Summary[0])
Terminal_Services_Summary.columns = ['User', 'Authentication Counts']
#Logon_Events_pd=pd.DataFrame(Logon_Events[0])
#Object_Access_Events_pd=pd.DataFrame(Object_Access_Events[0])
#ExecutedProcess_Events_pd=pd.DataFrame(Executed_Process_Events[0])
# allresults=pd.DataFrame([TerminalServices,Powershell_Operational],columns=['Date and Time', 'Detection Rule','Detection Domain','Severity','Event Description','Event ID','Original Event Log'])
allresults = pd.concat(
[ScheduledTask, Powershell_Operational, Sysmon, System, Powershell, Security,TerminalClient, TerminalServices, WinRM,
Windows_Defender,GroupPolicy,SMBServer,SMBClient], join="inner", ignore_index=True)
allresults = allresults.rename(columns={'Date and Time': 'datetime', 'Detection Rule': 'message'})
allresults['timestamp_desc'] = ""
allresults = allresults[
['message','timestamp', 'datetime', 'timestamp_desc', 'Detection Domain', 'Severity', 'Event Description', 'Event ID',
'Original Event Log','Computer Name','Channel']]
Result_Summary_Severity=allresults["Severity"].value_counts().reset_index()
Result_Summary_Severity.columns = ['Severity', 'Counts']
Result_Summary_Detections=allresults["message"].value_counts().reset_index()
Result_Summary_Detections.columns = ['Detection', 'Counts']
allresults.to_csv(timesketch, index=False)
User_SIDs.to_csv(Collected_SIDs, index=False)
print("Time Sketch Report saved as "+timesketch)
#Logon_Events_pd.to_csv(LogonEvents, index=False)
if (logons==True or allreport==True):
print("Logon Events Report saved as "+LogonEvents)
#Object_Access_Events_pd.to_csv(ObjectAccess, index=False)
if (objectaccess==True or allreport==True):
print("Object Access Events Report saved as "+ObjectAccess)
#ExecutedProcess_Events_pd.to_csv(ProcessEvents, index=False)
if (processexec==True or allreport==True):
print("Process Execution Events Report saved as "+ProcessEvents)
# Sysmon=Sysmon.reset_index()
# Sysmon=Sysmon.drop(['index'],axis=1)
writer = pd.ExcelWriter(Report, engine='xlsxwriter', engine_kwargs={'options':{'encoding': 'utf-8'}})
Result_Summary_Severity.to_excel(writer, sheet_name='Result Summary', index=False)
Result_Summary_Detections.to_excel(writer, sheet_name='Result Summary' , startrow=len(Result_Summary_Severity)+3, index=False)
System.to_excel(writer, sheet_name='System Events', index=False)
Powershell.to_excel(writer, sheet_name='Powershell Events', index=False)
Powershell_Operational.to_excel(writer, sheet_name='Powershell_Operational Events', index=False)
Sysmon.to_excel(writer, sheet_name='Sysmon Events', index=False)
Security.to_excel(writer, sheet_name='Security Events', index=False)
TerminalServices.to_excel(writer, sheet_name='TerminalServices Events', index=False)
TerminalClient.to_excel(writer, sheet_name='RDP Client Events', index=False)
WinRM.to_excel(writer, sheet_name='WinRM Events', index=False)
Windows_Defender.to_excel(writer, sheet_name='Windows_Defender Events', index=False)
ScheduledTask.to_excel(writer, sheet_name='ScheduledTask Events', index=False)
GroupPolicy.to_excel(writer, sheet_name='Group Policy Events', index=False)
SMBClient.to_excel(writer, sheet_name='SMB Client Events', index=False)
SMBServer.to_excel(writer, sheet_name='SMB Server Events', index=False)
Terminal_Services_Summary.to_excel(writer, sheet_name='Terminal Services Logon Summary', index=False)
Authentication_Summary.to_excel(writer, sheet_name='Security Authentication Summary', index=False)
ExecutedProcess_Summary.to_excel(writer, sheet_name='Executed Process Summary', index=False)
ExecutedPowershell_Summary.to_excel(writer, sheet_name='Executed Powershell Summary', index=False)
User_SIDs.to_excel(writer, sheet_name='Collected User SIDs', index=False)
writer.book.use_zip64()
writer.close()
print("Report saved as "+Report)
################################################################################################################
# if (frequencyanalysis==True or allreport==True):
# Frequency_Security=pd.DataFrame(list(Frequency_Analysis_Security.items()),columns=["EventID","Count"]).sort_values(by=['Count'],ascending=False)
# Frequency_Defender=pd.DataFrame(list(Frequency_Analysis_Windows_Defender.items()),columns=["EventID","Count"]).sort_values(by=['Count'],ascending=False)
# Frequency_SMB_Client=pd.DataFrame(list(Frequency_Analysis_SMB_Client.items()),columns=["EventID","Count"]).sort_values(by=['Count'],ascending=False)
# Frequency_Group_Policy=pd.DataFrame(list(Frequency_Analysis_Group_Policy.items()),columns=["EventID","Count"]).sort_values(by=['Count'],ascending=False)
# Frequency_Powershell_Operational=pd.DataFrame(list(Frequency_Analysis_Powershell_Operational.items()),columns=["EventID","Count"]).sort_values(by=['Count'],ascending=False)
# Frequency_Powershell=pd.DataFrame(list(Frequency_Analysis_Powershell.items()),columns=["EventID","Count"]).sort_values(by=['Count'],ascending=False)
# Frequency_ScheduledTask=pd.DataFrame(list(Frequency_Analysis_ScheduledTask.items()),columns=["EventID","Count"]).sort_values(by=['Count'],ascending=False)
# Frequency_WinRM=pd.DataFrame(list(Frequency_Analysis_WinRM.items()),columns=["EventID","Count"]).sort_values(by=['Count'],ascending=False)
# Frequency_Sysmon=pd.DataFrame(list(Frequency_Analysis_Sysmon.items()),columns=["EventID","Count"]).sort_values(by=['Count'],ascending=False)
# Frequency_SMB_Server=pd.DataFrame(list(Frequency_Analysis_SMB_Server.items()),columns=["EventID","Count"]).sort_values(by=['Count'],ascending=False)
# Frequency_TerminalServices=pd.DataFrame(list(Frequency_Analysis_TerminalServices.items()),columns=["EventID","Count"]).sort_values(by=['Count'],ascending=False)
# Frequency_System=pd.DataFrame(list(Frequency_Analysis_System.items()),columns=["EventID","Count"]).sort_values(by=['Count'],ascending=False)
#
# writer = pd.ExcelWriter("EventID_Frequency_Analysis.xls", engine='xlsxwriter', options={'encoding': 'utf-8'})
# Frequency_System.to_excel(writer, sheet_name='System', index=False)
# Frequency_Powershell.to_excel(writer, sheet_name='Powershell', index=False)
# Frequency_Powershell_Operational.to_excel(writer, sheet_name='Powershell_Operational', index=False)
# Frequency_Sysmon.to_excel(writer, sheet_name='Sysmon', index=False)
# Frequency_Security.to_excel(writer, sheet_name='Security', index=False)
# Frequency_TerminalServices.to_excel(writer, sheet_name='TerminalServices', index=False)
# Frequency_WinRM.to_excel(writer, sheet_name='WinRM', index=False)
# Frequency_Defender.to_excel(writer, sheet_name='Windows_Defender', index=False)
# Frequency_ScheduledTask.to_excel(writer, sheet_name='ScheduledTask', index=False)
# Frequency_Group_Policy.to_excel(writer, sheet_name='Group Policy', index=False)
# Frequency_SMB_Client.to_excel(writer, sheet_name='SMB Client', index=False)
# Frequency_SMB_Server.to_excel(writer, sheet_name='SMB Server', index=False)
#
# writer.book.use_zip64()
# writer.save()
#
# print("Frequency Analysis Report saved as "+"EventID_Frequency_Analysis.xls")
##################################################################################################################
print("Detection Summary :\n############################################\nNumber of incidents by Severity:\n"+allresults["Severity"].value_counts().to_string()+"\n############################################\nNumber of incidents by Detection Rule:\n"+allresults["message"].value_counts().to_string()+"\n\n")
def convert_list():
global timestart,timeend,User_SIDs,SMB_Server_events,SMB_Client_events,TerminalServices_RDPClient_events,Executed_Process_Events,Group_Policy_events,Object_Access_Events,input_timezone,Logon_Events,Executed_Process_Summary,TerminalServices_Summary,Security_Authentication_Summary,Sysmon_events,WinRM_events,Security_events,System_events,ScheduledTask_events,Powershell_events,Powershell_Operational_events,TerminalServices_events,Windows_Defender_events,Timesketch_events,TerminalServices_Summary,Security_Authentication_Summary,Executed_Powershell_Summary
Results=[Executed_Powershell_Summary,SMB_Server_events,User_SIDs,SMB_Client_events,TerminalServices_RDPClient_events,Executed_Process_Events,Group_Policy_events,Object_Access_Events,Logon_Events,Executed_Process_Summary,TerminalServices_Summary,Security_Authentication_Summary,Sysmon_events,WinRM_events,Security_events,System_events,ScheduledTask_events,Powershell_events,Powershell_Operational_events,TerminalServices_events,Windows_Defender_events,TerminalServices_Summary,Security_Authentication_Summary
]
for result in Results:
for i in result[0]:
result[0][i]=list(result[0][i])
def resolveSID():
global TerminalServices_RDPClient_events,WinRM_events,User_SIDs,RDPClient_Resolved_User,WinRM_Resolved_User
if os.path.exists(temp_dir + "_WinRM_events_report.csv"):
WinRM_events[0] = pd.DataFrame(pd.read_csv(temp_dir + "_WinRM_events_report.csv")).to_dict(orient='list')
if os.path.exists(temp_dir + "_TerminalServices_RDPClient_report.csv"):
TerminalServices_RDPClient_events[0] = pd.DataFrame(pd.read_csv(temp_dir + "_TerminalServices_RDPClient_report.csv")).to_dict(orient='list')
RDPClient_Resolved_User=[]
WinRM_Resolved_User=[]
for SID in TerminalServices_RDPClient_events[0]["UserID"]:
if SID in User_SIDs["SID"]:
RDPClient_Resolved_User.append(User_SIDs["User"][User_SIDs["SID"].index(SID)])
else:
RDPClient_Resolved_User.append("Could not be resolved")
for SID in WinRM_events[0]["UserID"]:
if SID in User_SIDs["SID"]:
WinRM_Resolved_User.append(User_SIDs["User"][User_SIDs["SID"].index(SID)])
else:
WinRM_Resolved_User.append("Could not be resolved")
#print("user sid"+str(User_SIDs["SID"]))
#print("RDPCLient : "+str(RDPClient_Resolved_User))
#print("WinRM : " + str(WinRM_Resolved_User))
def create_temp_dir():
global temp_dir
temp_dir= "temp/"
if not os.path.exists(temp_dir):
os.makedirs(temp_dir)
print(f"{temp_dir} has been created")
else:
print(f"{temp_dir} already exists")
def create_out_dir(output):
global temp_dir
if not os.path.exists(output):
os.makedirs(output)
print(f"output folder {output} has been created")
else:
print(f"output folder {output} already exists")
return output+"/"+output
def clean_temp_dir():
global temp_dir
if os.path.exists(temp_dir):
for root, dirs, files in os.walk(temp_dir, topdown=False):
for name in files:
os.remove(os.path.join(root, name))
for name in dirs:
os.rmdir(os.path.join(root, name))
os.rmdir(temp_dir)
def main():
tic = time.time()
print(Banner)
global CPU_Core,timestart,timeend,Output,objectaccess,Path,processexec,logons,frequencyanalysis,Security_path,system_path,scheduledtask_path,defender_path,powershell_path,powershellop_path,terminal_path,winrm_path,sysmon_path,input_timezone,objectaccess,processexec,logons,frequencyanalysis,allreport
parser = argparse.ArgumentParser()
parser.add_argument("-p","--path", help="path to folder containing windows event logs , APT-Hunter will detect each log type automatically")
parser.add_argument("-o", "--out",help="output file name")
parser.add_argument("-tz","--timezone", help="default Timezone is Local timezone , you can enter ( 'local' : for local timzone , <Country time zone> : like (Asia/Dubai) )")
parser.add_argument("-o365hunt", "--o365hunt", help="office365 audit log hunting",action='store_true')
parser.add_argument("-o365rules", "--o365rules", help="detection rules for office365 hunt , if not provided default rules will be used")
parser.add_argument("-o365raw", "--o365raw", help="include office365 flattened raw data",action='store_true')
parser.add_argument("-hunt","--hunt", help="String or regex to be searched in evtx log path")
parser.add_argument("-huntfile","--huntfile", help="file contain Strings or regex to be searched in evtx log path ( strings should be new line separated )")
parser.add_argument("-eid","--eid", help="Event ID to search if you chosed the hunt module")
parser.add_argument("-start","--start", help="Start time for timeline ( use ISO format Ex:2022-04-03T20:56+04:00 )")
parser.add_argument("-end","--end", help="End time for timeline ( use ISO format Ex: 2022-04-03T20:56+04:00 or 2022-04-03T20:56 or 2022-04-03 20:56 or 2022-04-03 )")
parser.add_argument("-procexec","--procexec", help="Produce Process Execution report",action='store_true')
parser.add_argument("-logon","--logon", help="Produce Success and faild authentication report",action='store_true')
parser.add_argument("-objaccess","--objaccess", help="Produce Object Access report",action='store_true')
parser.add_argument("-allreport","--allreport", help="Produce all reports",action='store_true')
parser.add_argument("-sigma","--sigma", help="use sigma module to search logs using sigma rules",action='store_true')
parser.add_argument("-rules","--rules", help="path to sigma rules in json format")
#parser.add_argument("-evtfreq","--evtfreq", help="Produce event ID frequency analysis report",action='store_true')
parser.add_argument("-cores","--cores", help="cpu cores to be used in multiprocessing , default is half the number of availble CPU cores")
args = parser.parse_args()
if args.out is not None:
Output=create_out_dir(args.out)
if (args.path is None ):# and args.security is None and args.system is None and args.scheduledtask is None and args.defender is None and args.powershell is None and args.powershellop is None and args.terminal is None and args.winrm is None and args.sysmon is None):
print("You didn't specify a path for the logs \nuse --help to print help message")
exit()
#if args.type is None and args.hunt is None:
# print("log type must be defined using -t \ncsv( logs from get-eventlog or windows event log GUI or logs from Get-WinEvent ) , evtx ( EVTX extension windows event log )\nuse --help to print help message")
# exit()
else:
#if args.path is not None:
Path=args.path
objectaccess=args.objaccess
processexec=args.procexec
logons=args.logon
#frequencyanalysis=args.evtfreq
allreport=args.allreport
CPU_Core=0
#print(f"all reports value : {allreport}\nlogons value {logons}")
try:
if args.start is not None and args.end is not None:
timestart=datetime.timestamp(dateutil.parser.isoparse(args.start))
timeend=datetime.timestamp(dateutil.parser.isoparse(args.end))
except:
print("Error parsing time , please use ISO format with timestart and timeend Ex: (2022-04-03T20:56+04:00 or 2022-04-03T20:56 or 2022-04-03 20:56 or 2022-04-03)")
exit()
if args.timezone is not None:
if args.timezone.lower()=="local":
input_timezone=tz.tzlocal()
else:
input_timezone=timezone(args.timezone)
if args.cores is not None:
try:
CPU_Core=int(args.cores)
except:
print(f"Error using supplied CPU cores {args.cores}")
exit(0)
if args.sigma is not False:
if args.rules is not None:
SigmaHunter.Sigma_Analyze(Path,args.rules,Output)
else:
print("Please include rules path ex : --rules rules.json")
toc = time.time()
print('Done in {:.4f} seconds'.format(toc-tic))
return
if args.hunt is not None:
if args.eid is not None:
threat_hunt(Path,args.hunt,args.eid,None)
else:
threat_hunt(Path,args.hunt,None,None)
toc = time.time()
print('Done in {:.4f} seconds'.format(toc-tic))
return
if args.o365hunt is not False:
if args.o365rules is not None:
O365Hunter.analyzeoff365(Path, args.o365rules,Output,input_timezone,args.o365raw)
else:
O365Hunter.analyzeoff365(Path, None,Output,input_timezone,args.o365raw)
#toc = time.time()
#print('Done in {:.4f} seconds'.format(toc-tic))
return
if args.hunt is None and args.huntfile is not None:
if args.eid is not None:
threat_hunt(Path,None,args.eid,args.huntfile)
else:
threat_hunt(Path,None,None,args.huntfile)
toc = time.time()
print('Done in {:.4f} seconds'.format(toc-tic))
return
#if args.type is None or args.type=="evtx":
try:
create_temp_dir()
auto_detect(Path)
#convert_list()
report()
clean_temp_dir()
except Exception as e:
print("Error "+str(e))
clean_temp_dir()
toc = time.time()
print('Analysis finished in {:.4f} seconds'.format(toc-tic))
return
if __name__ == '__main__':
if platform.system().lower()=="windows":
multiprocessing.freeze_support()
main()
Loading…
Cancel
Save