Skip to content
AChReport is a Python Report Writer for AChoir
Python
Branch: master
Clone or download
OMENScan AChReport v0.86
Modifications to support new AChoir dynamic paths.
Latest commit 7fef84c Jan 21, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
AchReport.py AChReport v0.86 Jan 22, 2019
ActiveState-LICENSE v0.84 - Add Color to Messages, Warnings, and Errors Nov 24, 2018
LICENSE Initial commit Nov 18, 2018
README.md AChReport v0.82 Nov 18, 2018

README.md

AChReport

A Python based Report Writer for AChoir

I have had a difficult time finding a simple solution that can take the most common Windows artifacts and present them in a simple way, in order to get a quick, general idea of what has happened on a machine.

Since Live Response and Dead-Box analysis often look at the same artifacts, I wanted a simple report that could take the most common Windows artifacts (i.e. Registry, $MFT, Event Logs, etc...) and present their data in a way that a junior Incident Responder/Analyst could use and understand. AChReport is meant as a tool to help Responders (junior or senior) to quickly identify obvious signs of compromise or attack, and quickly determine if deeper analysis is necessary.

The goals were to: Shorten the time it takes to get an overview of the machine, Allow junior or senior Responders to quickly understand what has happened on a machine, and Produce a standardized digital report that can be shared among responders to review a machine. By standardizing the report I also hope it can be a tool for entry level Incident Responders to learn from.

I believe that this is likely to become increasingly important as laws begin to mandate things like 72 hour breach notification. Senior level Responders and Forensicators are becoming harder to find, and the only way to meet the increased demand is to make the artifacts easier to consume and understand.

Since AChoir can already extract these common Windows artifacts (Live Response OR Dead-Box), it was simply a matter of writing a program to extract and present the most useful INFORMATION from these artifacts. AChReport turns Artifacts into Information, by selecting only the most important information needed for a quick view, and presenting that Information in a simple to read, self contained HTML report.

AChReport IS NOT meant as a comprehensive reporting tool. It's power is in extracting the most important information and presenting it in an easy to understand format. AChReport IS NOT meant to replace your favorite forensics tool. It is meant to meet the need for a quick, simple view of a machine.

IMPORTANT NOTE: AChReport reads the Artifacts extracted by AChoir, and requires AChoir to be installed to function. AChReport DOES NOT extract the artifacts, it simply parses, filters and reports on those artifacts.

Some Things to Know

  1. AChReport requires Python to be installed
  2. AChReport requires AChoir to be installed
  3. AChReport requires that an AChoir extraction was performed (Live Response or Dead-Box)
  4. AChReport requires a few additional components including: MS LogParser in the same directory as AChReport.py, and some RegRipper plugins in a subdirectory called "plugins"
  5. AChReport is meant to run on Windows

RegRipper can be found at: https://github.com/keydet89/RegRipper2.8

Microsoft LogParser can be found at: https://www.microsoft.com/en-us/download/details.aspx?id=24659

To run AChReport use the -d switch to point to the AChoir extract directory. For Example:

 py Achreport.py -d c:\Achoir\ACQ-IR-PCName-20181116_1847
You can’t perform that action at this time.