WinFire

WinFire

1 Stars

Windows Incident Response Engine

Masriyan
Jun 02, 2025
1 stars
Category
None
GitHub Stars
1
Project Added On
Jun 02, 2025
Contributors
0

WinFire 🔥

Windows Forensic Incident Response Engine

PowerShell

License: MIT

Platform

A comprehensive PowerShell tool for Windows digital forensics and incident response, designed to rapidly collect critical forensic artifacts for security investigations.

 █     █░ ██▓ ███▄    █   █████▒██▓ ██▀███  ▓█████ 
▓█░ █ ░█░▓██▒ ██ ▀█   █ ▓██   ▒▓██▒▓██ ▒ ██▒▓█   ▀ 
▒█░ █ ░█ ▒██▒▓██  ▀█ ██▒▒████ ░▒██▒▓██ ░▄█ ▒▒███   
░█░ █ ░█ ░██░▓██▒  ▐▌██▒░▓█▒  ░░██░▒██▀▀█▄  ▒▓█  ▄ 
░░██▒██▓ ░██░▒██░   ▓██░░▒█░   ░██░░██▓ ▒██▒░▒████▒
░ ▓░▒ ▒  ░▓  ░ ▒░   ▒ ▒  ▒ ░   ░▓  ░ ▒▓ ░▒▓░░░ ▒░ ░
  ▒ ░ ░   ▒ ░░ ░░   ░ ▒░ ░      ▒ ░  ░▒ ░ ▒░ ░ ░  ░
  ░   ░   ▒ ░   ░   ░ ░  ░ ░    ▒ ░  ░░   ░    ░   
    ░     ░           ░         ░     ░        ░  ░

📋 Table of Contents

🎯 Overview

WinFire is an all-in-one PowerShell script designed for incident responders, digital forensics investigators, and cybersecurity professionals. It rapidly collects critical forensic artifacts from Windows systems, providing structured output in multiple formats (CSV, JSON, HTML) for immediate analysis or integration with other forensic tools.

Key Capabilities

  • Rapid Artifact Collection: Efficiently gathers evidence from running systems

  • Chain of Custody: Maintains forensic integrity with proper documentation

  • Multi-Format Output: CSV, JSON, and HTML reports for various analysis workflows

  • Evidence Integrity: Cryptographic hashing ensures artifact authenticity

  • Flexible Execution: Quick scans for triage or comprehensive full analysis

✨ Features

🔍 System Analysis

  • Operating system and hardware information

  • Installed software inventory

  • Environment variables and system paths

  • Network configuration and interfaces

👥 User Activity Tracking

  • Local user accounts and group memberships

  • User profile artifacts and recent file access

  • Registry-based user activity (UserAssist, ShellBags)

  • Windows Timeline database collection

🔄 Process & Service Analysis

  • Running processes with command lines and hashes

  • Windows services and startup configurations

  • Scheduled tasks enumeration

  • WMI event subscriptions (persistence mechanism)

🌐 Network Forensics

  • Active network connections (TCP/UDP)

  • Listening ports and associated processes

  • Network shares and mapped drives

  • Windows Firewall rules

  • SMB sessions and open files

📁 File System Artifacts

  • Recently modified files in critical locations

  • Suspicious file detection based on extensions/attributes

  • Startup folder contents

  • Amcache.hve - Application execution artifacts

  • Prefetch files - Program execution evidence

  • SRUM database - System resource usage monitoring

  • BITS jobs - Background transfer service activity

🔧 Registry Analysis

  • Autorun/persistence registry keys

  • USB device history

  • Recent documents and MRU lists

  • COM hijacking indicators

  • Network drive history

📊 Event Log Collection

  • Security events (logons, privilege use, account changes)

  • System events (service changes, boot/shutdown)

  • Application crash events

  • PowerShell operational logs

  • Windows Defender detection events

🌐 Browser Forensics

  • Chrome, Edge, and Firefox profile collection

  • Robust handling of locked browser files using RoboCopy

  • Cache and history databases for offline analysis

🛡️ Security Tool Detection

  • Windows Defender status and configuration

  • Installed antivirus products detection

  • EDR/XDR agent identification

  • PowerShell logging configuration analysis

🧠 Memory Analysis Indicators

  • Loaded DLL enumeration

  • Process hollowing indicators

  • DLL injection detection

  • Suspicious process identification

📋 Prerequisites

System Requirements

  • Operating System: Windows 10, Windows 11, Windows Server 2016+

  • PowerShell: Version 5.1 or higher

  • Privileges: Administrator rights required

  • Disk Space: Minimum 1GB free space (varies by system activity)

Recommended Privileges

WinFire automatically checks for and benefits from these privileges:

  • SeDebugPrivilege - Access to all processes

  • SeBackupPrivilege - Read access to all files

  • SeRestorePrivilege - Restore file attributes

🚀 Installation

Method 1: Direct Download

  1. Download the WinFire.ps1 script from the releases page

  2. Place it in your forensic toolkit directory

  3. Verify the script hash against published checksums

Method 2: Git Clone

git clone https://github.com/Masriyan/WinFire
cd WinFire

Execution Policy

You may need to adjust PowerShell execution policy:

# Temporarily allow script execution (run as Administrator)
Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope Process

# Or sign the script with your code signing certificate
# Set-AuthenticodeSignature -FilePath "WinFire.ps1" -Certificate $cert

🎮 Usage

Basic Syntax

.\WinFire.ps1 [-Quick] [-Full] [-OutputPath <Path>] [-CaseNumber <String>] 
              [-Investigator <String>] [-Purpose <String>] [-HashAlgorithm <String>] 
              [-ExcludeNetwork] [-ExcludeBrowser] [-Quiet] [-Help]

Parameters

| Parameter | Description | Default |

|-----------|-------------|---------|
| -Quick | Performs rapid scan focusing on high-impact artifacts | False |
| -Full | Comprehensive scan collecting all available artifacts | True (if neither specified) |
| -OutputPath | Custom directory for output files | Current directory |
| -CaseNumber | Forensic case number for chain of custody | “N/A” |
| -Investigator | Name of the investigator | “WinFire User” |
| -Purpose | Investigation purpose description | “General Forensic Scan” |
| -HashAlgorithm | Hashing algorithm (MD5, SHA1, SHA256) | SHA256 |
| -ExcludeNetwork | Skip network analysis tasks | False |
| -ExcludeBrowser | Skip browser forensics collection | False |
| -Quiet | Suppress most console output | False |
| -Help | Display detailed help information | False |

📦 Collected Artifacts

Critical Windows Forensic Artifacts

| Artifact Category | Files/Registry Keys | Forensic Value |

|------------------|-------------------|----------------|
| Execution Evidence | Amcache.hve, Prefetch/.pf | Program execution history |
|
User Activity | ActivitiesCache.db, UserAssist, RecentDocs | User behavior patterns |
|
Persistence | Run keys, Services, Scheduled Tasks | Malware persistence mechanisms |
|
Network Activity | Active connections, Firewall rules | Network communication evidence |
|
System Activity | SRUM database, Event logs | System resource usage and events |
|
Browser Activity | Chrome/Edge/Firefox profiles | Web browsing history and downloads |
|
USB History | Registry USB keys | External device usage |
|
File Access* | ShellBags, Recent folder contents | File system navigation |

Registry Locations Analyzed

HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run*
HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
HKLM:\SYSTEM\CurrentControlSet\Services
HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\*
HKLM:\SYSTEM\*ControlSet*\Enum\USB*

Event Log Sources

  • Security.evtx - Authentication and authorization events

  • System.evtx - System-level events and service changes

  • Application.evtx - Application crashes and errors

  • PowerShell/Operational - Script execution evidence

  • Windows Defender/Operational - Malware detection events

📂 Output Structure

After execution, WinFire creates a timestamped directory with the following structure:

WinFire_Results_YYYYMMDD_HHMMSS/
├── Raw_Data/                          # Structured data files
│   ├── System_Information.csv/.json
│   ├── Running_Processes.csv/.json
│   ├── Registry_Autoruns_Persistence.csv/.json
│   ├── Event_Logs.csv/.json
│   └── [Additional CSV/JSON files...]
├── Collected_Artifacts/               # Binary artifacts
│   ├── Browser_Profiles/
│   │   ├── Google_Chrome/
│   │   ├── Microsoft_Edge/
│   │   └── Mozilla_Firefox/
│   ├── Amcache.hve
│   ├── SRUDB.dat
│   ├── Prefetch/
│   └── Timeline/
├── Reports/                           # Analysis reports
│   ├── WinFire_Executive_Summary.html
│   ├── Chain_Of_Custody.json
│   └── Hash_Manifest.txt
└── WinFire_ExecutionLog.txt          # Detailed execution log

Report Types

  1. Executive Summary (HTML) - Professional report with findings overview

  2. Chain of Custody (JSON) - Forensic documentation and metadata

  3. Hash Manifest (TXT) - Cryptographic hashes for evidence integrity

  4. Execution Log (TXT) - Detailed script execution timeline

💡 Examples

Quick Triage Scan

# Rapid scan for immediate threat assessment
.\WinFire.ps1 -Quick -OutputPath "C:\Forensics\Case001" -CaseNumber "INC-2024-001" -Investigator "John Doe"

Comprehensive Investigation

```powershell

Full forensic collection with case documentation

.\WinFire.ps1 -Full -OutputPath “D:\Investigat

... Content truncated. Click "See More" to view the full README.

Tool Information

Author

Masriyan

Project Added On

June 02, 2025

License

Open Source

Tags

github security defensive