A Python library and command line tools to provide log visualization.
- Gallery
- Log Type Support
- Requirements
- Installation
- Usage
- Sample Data
- Documentation
- Resources
- Similar Projects
- License
- Contributing
When you view these plots you will need JavaScript turned on. The plots are interactive and you can select borders around the pieces you would like to zoom into. You can double click to zoom out. You can also hover over nodes and more information will be displayed. The plot controls will be in the upper right hand corner of the plot.
The plot will look different depending on your browser (Chrome, Firefox, etc...) and the size of your browser. I typically use Chrome on a Mac with a very large size to see everything I want to see. The smaller your browser is, the more crunched it will be. If you change your browser size, be sure to click 'Reload'.
SHA256: 15c237f6b74af2588b07912bf18e2734594251787871c9638104e4bf5de46589
This sample was identified in the following blog post.
- Example 1
- Kovter showing processes only
plotcuckoojson -t "Kovter Example 1" -f kovter1_example1.html -fa -ra -na 1_report.json
- Example 2
- Kovter showing processes and network
plotcuckoojson -t "Kovter Example 2" -f kovter1_example2.html -fa -ra 1_report.json
- Example 3
- Kovter showing processes and files
plotcuckoojson -t "Kovter Example 3" -f kovter1_example3.html -na -ra 1_report.json
- Example 4
- Kovter showing processes and registry
plotcuckoojson -t "Kovter Example 4" -f kovter1_example4.html -fa -na 1_report.json
SHA256: bffe7ccbcf69e7c787ff10d1dc7dbf6044bffcb13b95d851f4a735917b3a6fdf
This sample was identified in the following blog post.
- Example 1
- Kovter showing processes only
plotcuckoojson -t "Kovter Example 1" -f kovter2_example1.html -fa -ra -na 2_report.json
- Example 2
- Kovter showing processes and network
plotcuckoojson -t "Kovter Example 2" -f kovter2_example2.html -fa -ra 2_report.json
- Example 3
- Kovter showing processes and files
plotcuckoojson -t "Kovter Example 3" -f kovter2_example3.html -na -ra 2_report.json
- Example 4
- Kovter showing processes and registry
plotcuckoojson -t "Kovter Example 4" -f kovter2_example4.html -fa -na 2_report.json
SHA256: 9b462800f1bef019d7ec00098682d3ea7fc60e6721555f616399228e4e3ad122
- Example 1
- Ransomware showing processes only
plotcuckoojson -t "Ransomware Example 1" -f ransomware_example1.html -fa -na -ra 3_report.json
- Example 2
- Ransomware showing processes and network
plotcuckoojson -t "Ransomware Example 2" -f ransomware_example2.html -fa -ra 3_report.json
- Example 3
- Ransomware showing processes and files
plotcuckoojson -t "Ransomware Example 3" -f ransomware_example3.html -na -ra 3_report.json
- Example 4
- Ransomware showing processes and registry
plotcuckoojson -t "Ransomware Example 4" -f ransomware_example4.html -na -fa 3_report.json
SHA256: e64910e3549a6c6e01be814b40e0f1fca02db45d5d19e2882a90914cef1c799e
This sample came from wwwlgoogle dot com.
- Example 1
- wwwlgoogle showing processes only
plotcuckoojson -t "wwwlgoogle.com Example 1" -f wwwlgoogle_example1.html -fa -na -ra 4_report.json
- Example 2
- wwwlgoogle showing processes and network
plotcuckoojson -t "wwwlgoogle.com Example 2" -f wwwlgoogle_example2.html -fa -ra 4_report.json
- Example 3
- wwwlgoogle showing processes and files
plotcuckoojson -t "wwwlgoogle.com Example 3" -f wwwlgoogle_example3.html -na -ra 4_report.json
- Example 4
- wwwlgoogle showing processes and registry
plotcuckoojson -t "wwwlgoogle.com Example 4" -f wwwlgoogle_example4.html -fa -na 4_report.json
The "focused" views were generated by selecting just the PIDs I wanted to show with ProcMon before saving the data to a CSV.
SHA256: 15c237f6b74af2588b07912bf18e2734594251787871c9638104e4bf5de46589
This sample was identified in the following blog post.
- Example 1
- Kovter showing processes only (Focused)
plotprocmoncsv -sp -t "Kovter Example 1" -f kovter1_example1.html kovter1_focused.csv
- Notice how this doesn't show much. This is one example where filtering with ProcMon hurt us. We know more happens with Kovter. Let's look at all the activity...
- Example 2
- Kovter showing processes only (All)
plotprocmoncsv -sp -t "Kovter Example 2" -f kovter1_example2.html kovter1.csv
- Notice how this doesn't show much. We know more happens with Kovter.
- Example 3
- Kovter showing processes and file writes/deletes/renames (All)
plotprocmoncsv -sp -pfw -pfd -pfn -t "Kovter Example 3" -f kovter1_example3.html kovter1.csv
- Example 4
- Kovter showing processes and Registry writes/deletes (All)
plotprocmoncsv -sp -prw -prd -t "Kovter Example 4" -f kovter1_example4.html kovter1.csv
- Example 5
- Kovter showing processes and network (All)
plotprocmoncsv -sp -pu -pt -t "Kovter Example 5" -f kovter1_example5.html kovter1.csv
SHA256: bffe7ccbcf69e7c787ff10d1dc7dbf6044bffcb13b95d851f4a735917b3a6fdf
This sample was identified in the following blog post.
- Example 1
- Kovter showing processes only (Focused)
plotprocmoncsv -sp -t "Kovter Example 1" -f kovter2_example1.html kovter2_focused.csv
- Notice how this doesn't show much. This is one example where filtering with ProcMon hurt us. We know more happens with Kovter. Let's look at all the activity...
- Example 2
- Kovter showing processes only (All)
plotprocmoncsv -sp -t "Kovter Example 2" -f kovter2_example2.html kovter2.csv
- Notice how this doesn't show much. We know more happens with Kovter.
- Example 3
- Kovter showing processes and file writes/deletes/renames (All)
plotprocmoncsv -sp -pfw -pfd -pfr -t "Kovter Example 3" -f kovter2_example3.html kovter2.csv
- Example 4
- Kovter showing processes and Registry writes/deletes (All)
plotprocmoncsv -sp -prw -prd -t "Kovter Example 4" -f kovter2_example4.html kovter2.csv
- Example 5
- Kovter showing processes and network (All)
plotprocmoncsv -sp -pu -pt -t "Kovter Example 5" -f kovter2_example5.html kovter2.csv
SHA256: 9b462800f1bef019d7ec00098682d3ea7fc60e6721555f616399228e4e3ad122
- Example 1
- Ransomware showing processes only (Focused)
plotprocmoncsv -sp -t "Ransomware Example 1" -f ransomware_example1.html Ransomware_focused.csv
- Example 2
- Ransomware showing processes only (All)
plotprocmoncsv -sp -t "Ransomware Example 2" -f ransomware_example2.html Ransomware_focused.csv
- Example 3
- Ransomware showing processes and network only (All)
plotprocmoncsv -sp -pt -pu -t "Ransomware Example 3" -f ransomware_example3.html Ransomware_focused.csv
- Example 4
- Ransomware showing file writes/renames/deletes (Focused)
plotprocmoncsv -t "Ransomware Example 4" -pfw -pfd -pfn -sp -f ransomware_example4.html Ransomware_focused.csv
- Notice it is very clear that this is ransomware based upon all the file writes!
- Example 5
- Ransomware showing file writes/renames/deletes (All)
plotprocmoncsv -t "Ransomware Example 5" -pfw -pfd -pfn -sp -f ransomware_example5.html Ransomware.csv
- Notice it is very clear that this is ransomware based upon all the file writes!
- Example 6
- Ransomware showing Registry writes and deletes (Focused)
plotprocmoncsv -t "Ransomware Example 6" -prw -prd -sp -f ../gallery/procmoncsv/ransomware_example6.html /Source/Procmon\ CSV/Ransomware_focused.csv
SHA256: e64910e3549a6c6e01be814b40e0f1fca02db45d5d19e2882a90914cef1c799e
This sample came from wwwlgoogle dot com.
- Example 1
- wwwlgoogle showing processes only (Focused)
plotprocmoncsv -sp -t "wwwlgoogle.com Example 1" -f wwwlgoogle_example1.html wwwlgoogle_focused.csv
- Example 2
- wwwlgoogle showing processes only (All)
plotprocmoncsv -sp -t "wwwlgoogle.com Example 2" -f wwwlgoogle_example2.html wwwlgoogle.csv
- Example 3
- wwwlgoogle showing processes and network only (Focused)
plotprocmoncsv -sp -pt -pu -sh -t "wwwlgoogle.com Example 3" -f wwwlgoogle_example3.html wwwlgoogle_focused.csv
- Example 4
- wwwlgoogle showing processes and network only (All)
plotprocmoncsv -sp -pt -pu -sh -t "wwwlgoogle.com Example 4" -f wwwlgoogle_example4.html wwwlgoogle.csv
- Example 5
- wwwlgoogle showing processes and file writes/renames/deletes (Focused)
plotprocmoncsv -sp -pfw -pfd -pfn -t "wwwlgoogle.com Example 5" -f wwwlgoogle_example4.html wwwlgoogle_focused.csv
- Example 6
- wwwlgoogle showing processes and file writes/renames/deletes (All)
plotprocmoncsv -sp -pfw -pfd -pfn -t "wwwlgoogle.com Example 6" -f wwwlgoogle_example4.html wwwlgoogle.csv
- Example 7
- wwwlgoogle showing processes and Registry writes/deletes (Focused)
plotprocmoncsv -sp -prw -prd -t "wwwlgoogle.com Example 7" -f wwwlgoogle_example4.html wwwlgoogle_focused.csv
This package currently supports the following types of logs:
- Cuckoo-Modified JSON Reports
- This may work with Cuckoo v2 JSON reports, but that has not been tested.
- ProcMon CSV
- Be sure to either turn on all columns or use [DetailedProcmonConfiguration.pmc](ProcMon/Configuration File/DetailedProcmonConfiguration.pmc)
More logs types are coming...
Install Python v3. I like to use virtualenv with my Python installs.
This program was written with Python 3 on a Mac and Windows 7. It should work with Python 2 and other OS's, but it has not been tested extensively. Please file an issue if you have problems running it somewhere. I use Windows less than I use a Mac, so your Windows mileage may vary.
Graphviz must be installed and available in your path (dot, neato, etc..)
To install Graphviz correctly on a Mac, you will probably want to run the following command:
brew install graphviz --with-gts
# pip install visualize_logs
... or you can clone and ...
# python setup.py install
This package can be used as a library. Use the information in the documentation section below to use it this way. This package also contains command line tools which are outlined below.
If you have a cuckoo-modified JSON report, you can use this tool to plot the results.
# plotcuckoojson -h
usage: plotcuckoojson [-h] [-f HTMLFile] [-t TITLE] [-na] [-fa] [-fc] [-fm]
[-fp] [-fd] [-fw] [-fr] [-ra] [-rc] [-rd] [-rw] [-rr]
[-ignpaths IgnPathsFile.txt]
[-inclpaths InclPathsFile.txt] [-gp GRAPHVIZPROG]
CuckooJSONReportFile
Application to graph cuckoo-modified JSON reports
positional arguments:
CuckooJSONReportFile cuckoo-modified JSON report file
optional arguments:
-h, --help show this help message and exit
-f HTMLFile, --file HTMLFile
Create the html report. Default name is
cuckoojson.html
-t TITLE, --title TITLE
The title for the plot
-na, --nonetwork Turn off all network activity
-fa, --nofiles Turn off all file activity
-fc, --nofilecreates Turn off file create activity
-fm, --nofilemoves Turn off file move activity
-fp, --nofilecopies Turn off file copy activity
-fd, --nofiledeletes Turn off file delete activity
-fw, --nofilewrites Turn off file write activity
-fr, --nofilereads Turn off file read activity
-ra, --noregistry Turn off all registry activity
-rc, --noregcreates Turn off registry create activity
-rd, --noregdeletes Turn off registry delete activity
-rw, --noregwrites Turn off registry write activity
-rr, --noregreads Turn off registry read activity
-ignpaths IgnPathsFile.txt, --ignorepathsfile IgnPathsFile.txt
File containing regular expressions to ignore for
files and registry. One RE per line.
-inclpaths InclPathsFile.txt, --includepathsfile InclPathsFile.txt
File containing regular expressions to include for
files and registry. Overrides ignores. One RE per
line.
-gp GRAPHVIZPROG, --graphvizprog GRAPHVIZPROG
The graphviz layout program to use. Valid options are
dot, neato, twopi, circo, fdp, sfdp, patchwork and
osage. Research the graphviz website for more
information on these types of layouts. IF YOU SUPPLY
AN INVALID VALUE THIS PROGRAM WILL NOT WORK! Default:
sfdp
You can run it like this:
# plotcuckoojson 1_report.json
Reading log: 1_report.json
Plotting log: 1_report.json
... and then your plot appears in your web browser! It is also saved to cuckoojson.html
.
The best use case is if you start your ProcMon capture before you run the file you are analyzing. If a process is not started the associated network connections may not be connected to the process in the plot. I also could not get ProcMon to capture TCP data when WinPCAP was installed. You may not want to install WinPCAP if you are interested in TCP data.
This this library feels like it is taking a long time, it is likely that you are trying to import a lot of ProcMon data. You can always filter your data and save it as a CSV showing just the events you want to graph.
# plotprocmoncsv -h
usage: plotprocmoncsv [-h] [-f HTMLFile] [-pa] [-pf] [-pu] [-pt] [-pr] [-pfw]
[-pfr] [-pfd] [-pfn] [-ptcp] [-pus] [-pur] [-prr] [-prw]
[-prd] [-sa] [-sp] [-st] [-su] [-sf] [-sh] [-sr]
[-ignpaths IgnPathsFile.txt]
[-inclpaths InclPathsFile.txt]
ProcMonCSVFile
Application to graph ProcMon CSV files
positional arguments:
ProcMonCSVFile ProcMon CSV file
optional arguments:
-h, --help show this help message and exit
-f HTMLFile, --file HTMLFile
Create the log file. Default name is procmoncsv.html
-pa, --plotall Plot all aspects
-pf, --plotfile Plot all file aspects
-pu, --plotudp Plot all UDP aspects
-pt, --plottcp Plot all TCP aspects
-pr, --plotreg Plot all Registry aspects
-pfw, --plotfilewrites
Plot file writes
-pfr, --plotfilereads
Plot file reads
-pfd, --plotfiledeletes
Plot file deletes
-pfn, --plotfilerenames
Plot file renames
-ptcp, --plottcpconnects
Plot TCP connects
-pus, --plotudpsends Plot UDP sends
-pur, --plotudprecvs Plot UDP receives
-prr, --plotregreads Plot Registry reads
-prw, --plotregwrites
Plot Registry writes
-prd, --plotregdeletes
Plot Registry deletes
-sa, --showalllabels Show all labels
-sp, --showproclabels
Show process labels
-st, --showtcplabels Show TCP labels
-su, --showudplabels Show UDP labels
-sf, --showfilelabels
Show file labels
-sh, --showhostlabels
Show host labels
-sr, --showreglabels Show Registry labels
-ignpaths IgnPathsFile.txt, --ignorepathsfile IgnPathsFile.txt
File containing regular expressions to ignore in the
Path column. One RE per line.
-inclpaths InclPathsFile.txt, --includepathsfile InclPathsFile.txt
File containing regular expressions to include in the
Path column. Overrides ignores. One RE per line.
You can run it like this:
# plotprocmoncsv -pa -sp -st -sh wwwlgoogle.CSV
Reading log: wwwlgoogle.CSV
Plotting log: wwwlgoogle.CSV
... and then your plot appears in your web browser! It is also saved to procmoncsv.html
.
You can find some sample JSON reports from cuckoo-modified in the cuckoo-modified-json directory.
There are four traces:
- 2 Kovter examples
- 1_report.json
- 2_report.json
- Ransomware
- 3_report.json
- wwwlgoogle.com adware
- 4_report.json
You can find some sample CSV from ProcMon in the [ProcMon/Sample Data] (ProcMon/Sample Data/) directory. There are eight traces:
- 2 Kovter examples:
- Focused just shows the process I ran, filtered by the ProcMon process tree tool.
- All data without the focus.
- wwwlgoogle.com adware:
- Focused just shows the process I ran, filtered by the ProcMon process tree tool.
- All data without the focus.
- Ransomware:
- Focused just shows the process I ran, filtered by the ProcMon process tree tool.
- All data without the focus.
The library documentation can be found at: https://keithjjones.github.io/visualize_logs.github.io/
- cuckoo-modified
- ProcMon
- Plot.ly
These projects are very similar to this one and are worth trying if you are unfamiliar with them. They were the inspiration behind this project. This project was meant to compliment these tools, not replace them. This project is just a different way to get to the same goal, with the goal being to support numerous log types in one Python package in the future.
- Noriben
- ProcDot
This application is covered by the Creative Commons BY-SA license.
- https://creativecommons.org/licenses/by-sa/4.0/
- https://creativecommons.org/licenses/by-sa/4.0/legalcode
If you would like to contribute you can fork this repository, make your changes, and then send me a pull request to my "dev" branch.