SrumECmd
Part of Eric Zimmerman’s Tools. SrumECmd.exe is the definitive command-line utility for parsing SRUDB.dat. It automatically resolves SIDs and outputs highly detailed, categorized CSV files.
The core philosophy of SRUM is continuous telemetry collection for resource optimization. The Windows Diagnostic Policy Service (DPS) continuously monitors running processes, capturing metrics regarding CPU cycles, disk I/O, battery consumption, and network usage.
To minimize disk writes and system overhead, this data is temporarily held in memory and only committed to the physical database under two conditions:
SRUM data is not stored in standard text logs or the Windows Registry; it relies on Microsoft’s internal database engine.
C:\Windows\System32\sru\SRUDB.datntds.dit) and Microsoft Exchange.Because it is an actively locked system file, acquiring SRUDB.dat during a live response requires raw disk access tools or volume shadow copy (VSS) extraction.
Parsing the ESE database reveals several tables ({Network Data}, {Application Resource Usage}, etc.). The correlation of these tables provides the ultimate forensic timeline.
Key metrics extracted from SRUM include:
SRUM is often the decisive artifact in investigations where standard network logging (e.g., proxy logs, PCAP) has rolled over or was intentionally blinded by threat actors.
When investigating insider threats or ransomware operations, proving data theft is critical. If Prefetch (.pf) Files show that an archiving tool (7z.exe) and an FTP client (ftp.exe) were executed sequentially, SRUM provides the missing link. It will reveal that 7z.exe had zero network activity, but ftp.exe sent exactly 750 MB of data outbound shortly after.
Advanced Persistent Threats (APTs) often utilize legitimate binaries (like powershell.exe or msbuild.exe) to establish Command and Control (C2) channels. Even if the traffic is TLS-encrypted, SRUM will persistently record the small, rhythmic outbound byte counts associated with beaconing behavior over a 60-day rolling window.
SRUM inherently links a process execution to a User SID. If an analyst observes network activity originating from svchost.exe (which normally operates under the SYSTEM, LOCAL SERVICE, or NETWORK SERVICE accounts), but SRUM attributes this specific execution to a standard user’s SID, it is a high-fidelity indicator of Process Hollowing or malicious thread injection.
To build an irrefutable timeline of malicious activity, DFIR analysts combine SRUM telemetry with other execution artifacts.
Due to the ESE database format, manual parsing is impossible. Specialized forensic parsers are required to reconstruct the tables into human-readable formats.
SrumECmd
Part of Eric Zimmerman’s Tools. SrumECmd.exe is the definitive command-line utility for parsing SRUDB.dat. It automatically resolves SIDs and outputs highly detailed, categorized CSV files.
KAPE (Kroll Artifact Parser and Extractor)
Utilize KAPE’s SRUM targets and modules to automatically acquire the locked file via VSS and parse it seamlessly during mass endpoint triage.