• Building Effective Security Programs Requires Strategy, Patience, and Clear Vision darkreadingArielle Waldman
    • Windows Zero-Day Bug Exploited for Browser-Led RCE darkreadingTara Seals
    • Chinese Actor Hit Taiwanese Drone Makers, Supply Chains darkreadingJai Vijayan, Contributing Writer
    • What Does EU’s Bug Database Mean for Vulnerability Tracking? darkreadingAlexander Culafi, Senior News Writer, Dark Reading
    • CISA Warns of TeleMessage Vuln Despite Low CVSS Score darkreadingKristina Beek, Associate Editor, Dark Reading
    • The Beginner’s Guide to Using AI: 5 Easy Ways to Get Started (Without Accidentally Summoning Skynet)
      by Tech Jacks
      March 29, 2025
    • Tips and Tricks to Enhance Your Incident Response Procedures
      by Tech Jacks
      March 17, 2025
    • Building a Security Roadmap for Your Company: Strategic Precision for Modern Enterprises 
      by Tech Jacks
      March 10, 2025
    • The Power of Policy: How Creating Strong Standard Operating Procedures Expedites Security Initiatives
      by Tech Jacks
      March 6, 2025
    • Building a Future-Proof SOC: Strategies for CISOs and Infosec Leaders 
      by Tech Jacks
      March 3, 2025
    • Security Gate Keeping – Annoying – Unhelpful
      by Tech Jacks
      November 13, 2024

  • Home
  • Blog & Observations
  • Articles
    • Guest Author
      • Peter Ramadan
        • SOC IT to ME
        • The Power of Policy
        • CISO Elite
  • In The News
  • Podcast & Vlogs
    • Podcast Videos
    • Security Unfiltered Podcast Information
  • Training & Videos
    • AI
      • AI Governance
    • Cloud
      • AWS
      • Azure
      • Google Cloud
    • Networking
    • Scripting
    • Security
      • Application Security
      • Cloud Security
      • Incident Response
      • Pentesting Information
      • Risk Management
      • Security Policy
    • Servers
    • Microsoft SCCM
    • ISC2
  • Services

SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics, (Sun, Apr 27th) SANS Internet Storm Center, InfoCON: green

April 27, 2025

SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics  

SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics

For digital forensics and incident response professionals, extracting precise evidence from Windows systems is critical to understanding and mitigating threats. I’m excited to introduce SRUM-DUMP Version 3, a powerful forensic tool I’ve developed to analyze the Windows System Resource Usage Monitor (SRUM) database. Available on GitHub at SRUM-DUMP Repository, this version offers significant improvements, including a user-friendly GUI and customizable output. In this post, I’ll guide you through using SRUM-DUMP v3’s GUI to investigate a scenario where malware (malware.exe) exfiltrates intellectual property over a wireless network. We’ll explore the 3-step wizard, customize the analysis to highlight malware.exe, and examine where it appears in the output spreadsheet and what each tab reveals about the incident.

What is SRUM-DUMP Version 3?

SRUM-DUMP v3 is designed to extract and analyze data from the SRUM database (C:WindowsSystem32srusrudb.dat), which logs system resource usage for up to 30 days. This database is a treasure trove for incident response, capturing details about application executions and network activity. Key features of v3 include:

  • 3-step Wizard for Rapid Analysis: Select the output directory, srudb.dat and SOFTWARE registry key and you’re off!
  • Customizable Configuration: A short analysis generates a srum_dump_config.json file allowing you to highlight suspicious terms, map network interfaces, and format output.
  • Automated Artifact Detection: Editing the srum_dump_config.json lets you tag suspect processes, users, and networks before the analysis begins.
  • XLSX Analysis: All of the artifacts are tagged, colorized, calculated, filtered, and placed into an XLSX file for easy analysis.

Scenario: Malware Exfiltrating Intellectual Property

Imagine an attacker compromises a Windows workstation, deploying malware.exe to steal sensitive documents over a wireless network. The malware runs as an application, quietly exfiltrating data to a remote server. There is no EDR or application logging to be found but you must determine what was stolen and how. The incident response team acquires SRUDB.dat and the SOFTWARE registry hive (C:WindowsSystem32configSOFTWARE) and uses SRUM-DUMP v3 to analyze the evidence.

Using SRUM-DUMP v3’s GUI: Step-by-Step

SRUM-DUMP v3’s GUI streamlines the analysis process through a 3-step wizard, followed by configuration customization and result generation.

Step 1: Launch the 3-Step Wizard  

  1. Launch the Tool: Run the prebuilt executable, available from the Releases page.
  2. Select an Output Directory: Choose an empty directory where the tool will save the Excel spreadsheet and configuration file.
  3. Select the SRUDB.DAT File: Locate SRUDB.dat. Either from your forensics image or at C:WindowsSystem32srusrudb.dat on a live system.
  4. Select the SOFTWARE Registry Hive (Optional): Provide the SOFTWARE hive to enrich network data, such as mapping interface LUIDs to SSIDs (e.g., “CorporateWiFi”).

If you selected files that are locked by the OS on live systems, srum-dump will extract the locked files through the Volume Shadow Copies. The files are analyzed and a configuration file is built containing all of the users, network, and processes from the selected files.

Step 2: Customize the Configuration

  • After selecting files, SRUM-DUMP processes the SRUM database and generates an srum_dump_config.json file.
  • Click “EDIT” to open the configuration file.
  • Modify the “dirty_words” section to highlight suspect processes ( malware.exe in this example )

{
    "dirty_words": {
        "malware.exe": "highlight-red"
    }
}
    
  • This ensures any instance of malware.exe in the output is highlighted in red.
  • Optionally, add additional tags to suspicious users, processes, and applications. For example, if we need to (markb) was a compromised user and “CorporateWifi” was a suspicious wifi network you could add tags to the tables in srum_dump_config.json file.

{
    "SRUDbIdMapTable": {
        "3": "S-1-5-21-1234567890-0987654321-1234567890-1001 (markb) - CompromisedUser"
    },
    "network_interfaces": {
        "268435498": "CorporateWiFi - SuspectWifi"
    }
}
    
  • Save the configuration file and click “CONFIRM”.

Step 3: Generate and Review the Spreadsheet

  • Click “CONTINUE” to run the analysis with the customized configuration.
  • A progress dialog appears, and once complete, the tool saves an updated Excel spreadsheet in the output directory.
  • Open the spreadsheet to examine the results.

Where Does malware.exe Appear?

The Excel spreadsheet contains multiple tabs, each corresponding to a SRUM database table. For this scenario, we will examine just two of the locations where malware.exe will appear:

Tab Name Description Relevance to malware.exe
Application Timeline Logs application executions, including executable names, user SIDs, timestamps, and resource usage. Directly lists malware.exe in the AppId column, highlighted if configured.
Network Data Records network activity, including bytes sent/received, interface LUIDs, and timestamps. Indirectly relevant by showing network activity during malware.exe’s execution.

Application Timeline Tab

  • Content: Each row represents an application execution event over the past 30 days.
  • Where malware.exe Appears: In the AppId column, rows containing malware.exe will be highlighted in red (based on the “dirty_words” configuration).
  • Key Columns:
    • AppId: The application’s identifier (e.g., malware.exe).
    • UserSid: The security identifier of the user running the application, mappable to a username (e.g., “CompromisedUser”).
    • TimeStamp: The UTC date and time of execution (e.g., 2025-04-15 02:00:00).
    • CycleTime: CPU usage, indicating the malware’s processing intensity.
    • WorkingSetSize: Memory usage, which may reveal unusual patterns.
  • Insights for the Incident:
    • Confirms malware.exe was executed, providing a timeline of its activity.
    • Identifies the user account involved, aiding in attribution.
    • Reveals resource consumption, suggesting whether the malware was performing tasks like data encryption or exfiltration.

Network Data Tab

  • Content: Each row represents a network activity event, detailing data transfers across interfaces.
  • Relation to malware.exe: While malware.exe isn’t listed directly, you can correlate timestamps with the Application Timeline tab to identify network activity during its execution.
  • Key Columns:
    • InterfaceLuid: Identifies the network interface (e.g., wireless adapter). With the SOFTWARE hive, this may be mapped to an SSID like “CorporateWiFi.”
    • BytesSent and BytesRecvd: Quantities of data transferred (e.g., 500 MB sent).
    • TimeStamp: When the activity occurred (e.g., 2025-04-15 02:00:00).
  • Insights for the Incident:
    • High BytesSent values during malware.exe’s execution suggest data exfiltration.
    • The SSID mapping confirms the use of a specific wireless network, aligning with the scenario.
    • Timestamps link network activity to the malware’s runtime, strengthening evidence of its role.

Correlating Evidence

To reconstruct the incident:

  1. Identify malware.exe Activity: In the Application Timeline tab, note timestamps when malware.exe was active (e.g., 2025-04-15 02:00:00).
  2. Check Network Activity: In the Network Data tab, look for high BytesSent on the wireless interface at matching timestamps.
  3. Build the Timeline: Combine these findings to show that malware.exe executed and simultaneously sent large amounts of data, confirming intellectual property theft.

For example:

  • Application Timeline: malware.exe ran at 2025-04-15 02:00:00 with high CycleTime.
  • Network Data: 500 MB of BytesSent on “CorporateWiFi” at 2025-04-15 02:00:00.

This correlation provides compelling evidence of the malware’s actions.

Getting Started

Download the prebuilt executable from the Releases page and follow the GUI steps outlined above. For advanced configuration options, consult the Configuration File Documentation.

SRUM-DUMP v3 empowers you to tackle malware investigations, insider threats, and system anomalies with precision, making it an indispensable tool for modern incident response.

Learn More

  • Learn more about SRUM Windows Forensics Analysis FOR500
  • Let me teach you to automate Infosed with python! Automating Infosec With Python
  • Or develop more advanced infosec tools with Python Advanced Infosec Automation
  • How about an introduction to Linux! Linux Security for Infosec Professionals
  • Mark Baggett’s YouTube Channel
  • Connect with me on LinkedIn

I’m teaching at the following events. Come check it out!

  • SEC673 ADVANCED Python in Miami, FL June 2, 2025
  • SEC573 at SANSFire in Baltimore, MD July 14, 2025
  • SEC573 in Melbourne, VIC AU August 17, 2025
  • SEC573 in Las Vegas, NV September 22, 2025

 

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. 

​Read More

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to email a link to a friend (Opens in new window) Email

Like this:

Like Loading...
Share

In The News

Tech Jacks
Derrick Jackson is a IT Security Professional with over 10 years of experience in Cybersecurity, Risk, & Compliance and over 15 Years of Experience in Enterprise Information Technology

Leave A Reply


Leave a Reply Cancel reply

You must be logged in to post a comment.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Blog

    • Security Gate Keeping - Annoying - Unhelpful
      November 13, 2024
    • 15 Years on LinkedIn: An Authentic Reflection(or a Beauty...
      October 24, 2024
    • Podcast & Cloud Security Governance
      February 24, 2021
    • The Journey Continues - Moving through 2021
      January 5, 2021
    • CISSP Journey
      February 22, 2019




  • About TechJacks
  • Privacy Policy
  • Gaming Kaiju
© Copyright Tech Jacks Solutions 2025

%d