技能 Windows Prefetch 分析实战

Windows Prefetch 分析实战

v20260317
analyzing-windows-prefetch-with-python
使用 windowsprefetch 解析 Windows Prefetch 文件,恢复程序执行时间线,比对资源以识别重命名或伪装二进制,并标记可疑工具与执行模式,辅助响应调查。
获取技能
54 次下载
概览

Analyzing Windows Prefetch with Python

Overview

Windows Prefetch files (.pf) record application execution data including executable names, run counts, timestamps, loaded DLLs, and accessed directories. This skill covers parsing Prefetch files using the windowsprefetch Python library to reconstruct execution timelines, detect renamed or masquerading binaries by comparing executable names with loaded resources, and identifying suspicious programs that may indicate malware execution or lateral movement.

Prerequisites

  • Python 3.9+ with windowsprefetch library (pip install windowsprefetch)
  • Windows Prefetch files from C:\Windows\Prefetch\ (versions 17-30 supported)
  • Understanding of Windows Prefetch file naming conventions (EXECUTABLE-HASH.pf)

Steps

Step 1: Collect Prefetch Files

Gather .pf files from target system's C:\Windows\Prefetch\ directory.

Step 2: Parse Execution History

Extract executable name, run count, last execution timestamps, and volume information.

Step 3: Detect Suspicious Execution

Flag known attack tools (mimikatz, psexec, etc.), renamed binaries, and unusual execution patterns.

Step 4: Build Execution Timeline

Reconstruct chronological execution timeline from all Prefetch files.

Expected Output

JSON report with execution history, suspicious executables, renamed binary indicators, and timeline reconstruction.

信息
Category 未分类
Name analyzing-windows-prefetch-with-python
版本 v20260317
大小 8.54KB
更新时间 2026-03-18
语言