Zeroska
  • 🐱Zeroska - The Bold
  • Computer/Cyber Security
    • ⭐Fresh off the boat - for new Blue Teamer/ SOC Analyst
    • 💀Necromancer (DFIR)
      • 🕵️DFIR and DFIR case
        • 🗃️Case Files
          • Misconfiguration 0x01
      • 📔My own DFIR notes
        • The Mark of The Web (MOTW)
        • LNK Shortcut
        • Prefetch, AmCache, ShimCache in Windows
        • Malicious Document (VBA, Office, PDF, ...)
        • SRUM (System Resource Usage Monitor)
        • Volatility notes
        • Understand Logon Session in Windows
        • "Very" Hidden sheets in Excel
        • Hidden Processes
      • 📔Notes
        • Useful Resources
        • Useful Resources DFIR
        • Saved Content (Backup for the OG content get deleted)
          • How to be best SOC analyst ever
    • 🧙‍♂️Defense Witchcraft
      • Data Analysis as a Defender
      • Active Directory
      • Windows Event Logs
        • Authentication (Windows Account Life Cycle Events)
      • MS Exchange
      • Windows
    • 💙My Current Blue Team Operation
      • VLAN Monitoring Template
      • Daily Monitoring Report
      • General Playbook
      • JupyterHub Configuration Guide
      • How to train your Blue Team
    • 🏭ICS/OT
      • Setup ICS/OT Simulation Learning Lab
      • Smart Grids
      • Learning Modbus TCP
      • Learning DNP3
      • Resources/Blogs/Links
    • 🥷Threat Intelligence
      • Small Cyber Threat Intelligence Program
      • Intelligence Analysis [VN]
      • OSINT Information Monitoring
        • Telegram Info-Stealer Monitoring
      • C2 Tracker
      • Fake Website Tracker
      • Dark Web Investigation Attempt
      • Threat Intelligence Quick Win
      • Resources/Blogs/Links
  • 😒Computer and Technology
    • My Home Lab Setup
    • 🐴ELK Stack
      • Useful Resources
      • ELK Stack - Container - Docker Compose - AWS ECS
      • ECS - Elastic Common Schema
      • Elasticsearch
      • Logstash
      • Troubleshooting and Problems
    • 🐧Linux
      • Setting up good SSH Authentication
      • Configure Auditd and how to leverage it
      • ELF Format
      • Useful Links
    • 📦Containers
      • Docker container logs is quite big
      • Worth Reading
    • 🪠Splunk Learning Experience
      • Splunk Test Lab
      • Data Collection Tier (How to get the data)
      • SC4S Custom Filter For Windows Event Log in Syslog Format (NXLog)
      • Useful Resources
  • Threat Hunting
    • Hunting for Implant
    • Using STRIDE and DREAD
    • 🐳Predators and Preys (Computing)
      • Tracks or Hunting Artifacts
    • 📦Network Packet Analysis
      • The Basic
      • Tshark | Zeek Copy & Paste
      • Network Analysis Resources
    • Grep | Powershell Search | Regex
    • Hunting Resources
  • 🎵In my remains
    • Choices
    • The Art of Facing Unknown Problems
    • Build the best DFIR team
    • Reverse Engineering - Đồ án hướng ngành A "Hụt" của tôi
Powered by GitBook
On this page
  • SRUM usage
  • How to access the SRUM
  • Refs

Was this helpful?

  1. Computer/Cyber Security
  2. Necromancer (DFIR)
  3. My own DFIR notes

SRUM (System Resource Usage Monitor)

DFIR Artifact for checking user running process if EDR is not present

PreviousMalicious Document (VBA, Office, PDF, ...)NextVolatility notes

Last updated 2 years ago

Was this helpful?

SRUM usage

You can read about SRUM here , it will answer the question below

  • What application was executed?

  • How long the application ran for (execution time)?

  • WHO or what SID was it running under?

How to access the SRUM

I can't find the SRUDB.dat on Windows Server 2016

Location: C:\Windows\System32\sru\SRUDB.dat but you must have a tool or software that can parse the information that is stored in that, most people will use this tool (you have to download and move it to the machine that you want to investigate)

In the srum-dump repository on GitHub, you will also need to download the SRUM-DUMP template

And then follow the instruction that is written in the repository after that you will dump the SRUM and excel file will look like this

You will have information like which application was run by whom (User SID) and the Time Creation and EndTime. Study Case:

Refs

(the youtube talk about SRUM forensic

💀
📔
https://www.inversecos.com/2022/10/how-to-investigate-insider-threats.html
https://isc.sans.edu/forums/diary/System+Resource+Utilization+Monitor/21927/
https://www.youtube.com/watch?v=l6-83WU95Sw&ab_channel=SANSDigitalForensicsandIncidentResponse
https://isc.sans.edu/forums/diary/System+Resource+Utilization+Monitor/21927/
srum-dump
The template
The information that you dump from SRUDB.dat