And we can simply execute with : `.\SrumECmd.exe -f .\SRUDB.dat --csv .`
You should get a bunch of CSV files
I tend to prioritise the following ones:
- SrumECmd_NetworkUsages_Output.csv
- SrumECmd_AppResourceUseInfo_Output.csv
- SrumECmd_Unknown*_Output.csv (occasionally)
But maybe you'll find use from the others?
Let's take a look at the results. I'll be using Excel because (again) I am a bad person.
SRUM seems to write once an hour and at shutdown, so don’t trust the timestamps as complete gospel.
This one is a real mixed bag. Sometimes it’s gold, other times trash. It will show runtime with okayish accuracy
I tend to sort by shortest runtime when looking here.
U͟s͟i͟n͟g͟ I͟R͟L͟
I had a case where an alert claimed some kind of process injection.
But I couldn’t find any other evidence to triangulate that finding. Maybe SRUM can help?
From SRUM's CSV formatted data, let's zero in on that window of time from the alert (23:52)
ScreenConnect - a remote management tool - appeared during our window of time.
I graphed out all of the ScreenConnect data SRUM held, with a focused on bytes in and out.
And look at the that wild spike in network communication?!
Drilling into the specific ScreenConnect spike, we can see it’s recorded 𝘢𝘯 𝘩𝘰𝘶𝘳 𝘭𝘢𝘵𝘦𝘳 than our initial alert time
I considered this suspicious nonetheless for three reasons:
1. When baselined, that colossal byte in/out was anomalous compared to previous activity
2.
We already contextualised this window of time as suspicious, from the initial alert.
3. We know that SRUM timestamps are not always accurate. Neither are alerts sometimes! An hour's flexibility is more than satisfactory to connect the potential sus activity.
I then initiated a ScreenConnect investigation, to see if anything here would contextualise the initial process inject alert
But that's for another day!
I hope this thread has brought SRUM to your attention, and equipped you with a foundation to explore SRUM's data yourself 💪
The first technique in the article discusses how to retrieve the PowerShell history for every user account via the 'ConsoleHost_History file' (typically enabled on Windows 10 endpoints) 2/6
The second leverages @EricRZimmerman's PECmd tool to examine Prefetch, an application caching system that we can use to evidence execution 3/6