Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Example: vhdx-forensic

Inputs

  • examples/inputs/vhdx-forensic-samples/README.md
  • examples/inputs/vhdx-forensic-samples/sample.vhdx

Profile

# VHDX Forensic Image Example Profile
# Demonstrates analysis of VHDX (Virtual Hard Disk v2) forensic disk images

decode = ["base64"]

max-file-size = 104857600  # 100 MiB

tag = "vhdx-forensic"

# Patterns to match in VHDX images and extracted partitions
[[patterns]]
  name = "VHDX Signature"
  pattern = "76:68:64:78:66:69:6C:65"  # "vhdxfile" at header
  type = "bytes"

[[patterns]]
  name = "AWS Access Key"
  pattern = "AKIA[0-9A-Z]{16}"
  type = "regex"

[[patterns]]
  name = "AWS Secret Key"
  pattern = "(?i)aws.{0,20}secret.{0,20}['\"][0-9a-zA-Z/+=]{40}['\"]"
  type = "regex"

[[patterns]]
  name = "SSH Private Key"
  pattern = "-----BEGIN.*PRIVATE KEY-----"
  type = "regex"

[[patterns]]
  name = "Password in Config"
  pattern = "password\\s*=\\s*['\"]?[^'\"\\s]+"
  type = "regex"

[[patterns]]
  name = "Database Connection String"
  pattern = "jdbc:[a-zA-Z0-9]+://[^\\s]+password=[^\\s&;]+"
  type = "regex"

[[patterns]]
  name = "MBR Boot Signature"
  pattern = "55:AA"
  type = "bytes"

[[patterns]]
  name = "GPT Signature"
  pattern = "45:46:49:20:50:41:52:54"  # "EFI PART"
  type = "bytes"

[[patterns]]
  name = "NTFS Signature"
  pattern = "4E:54:46:53"  # "NTFS"
  type = "bytes"

[[patterns]]
  name = "Email Address"
  pattern = "[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\\.[a-zA-Z]{2,}"
  type = "regex"

Report outputs

Triage report (converted from triage_report.json)

total_files3
critical_count0
high_count0
medium_count0
low_count0
minimal_count3
must_investigate_count0
all_scoresNone
generated_at2026-01-31T14:40:53.032681135+00:00

top_scores

characteristics_scorefile_typefile_type_scoremust_investigatepathpattern_count_scorepattern_matchespattern_severity_scorereasonsrisk_levelscoresha256
0Other0False/sample.vhdx1068["6 suspicious patterns detected"]Minimal18a20805a2e25dfc53905a11213b4f184f430d98ec199c8d69267195a5408628ef
0Other0False/README.md523["2 suspicious patterns detected"]Minimal838a13bd791913971e0ef62805930c72598bd549f7ae1e38d77436111d9c0d0d0
0Other0False/sample.vhdx/sample.vhdx:vhdx:metadata000[]Minimal05e1d1fba1cbf19a94ab7bbe9f9ab5b351b58444acac9ceb18024bf1c7b1a3266

CSV outputs

errors.csv

Empty CSV

files.csv

pathfile_namesha256file_createdfile_modifiedfile_accessedmime_types_from_file_extensionis_symbolic_linkis_extracted_fileis_decoded_fileis_deobfuscated_filetag
/README.mdREADME.md38a13bd791913971e0ef62805930c72598bd549f7ae1e38d77436111d9c0d0d02026-01-31T14:35:39.975936764Z2026-01-31T14:35:39.976936747Z2026-01-31T14:36:13.424393908Z["application/x-genesis-rom"]0000
/sample.vhdx/sample.vhdx:vhdx:metadatasample.vhdx:vhdx:metadata5e1d1fba1cbf19a94ab7bbe9f9ab5b351b58444acac9ceb18024bf1c7b1a3266[]0100
/sample.vhdxsample.vhdxa20805a2e25dfc53905a11213b4f184f430d98ec199c8d69267195a5408628ef2026-01-31T14:35:14.517358468Z2026-01-31T14:35:14.517358468Z2026-01-31T14:36:13.425393891Z["application/x-vhdx"]0000

pattern_matches.csv

idsha256pattern_namematch_typematchlocationlength
138a13bd791913971e0ef62805930c72598bd549f7ae1e38d77436111d9c0d0d0VHDX Signaturebytesvhdxfile4618
238a13bd791913971e0ef62805930c72598bd549f7ae1e38d77436111d9c0d0d0VHDX Signaturebytesvhdxfile13198
3a20805a2e25dfc53905a11213b4f184f430d98ec199c8d69267195a5408628efVHDX Signaturebytesvhdxfile08
4a20805a2e25dfc53905a11213b4f184f430d98ec199c8d69267195a5408628efSSH Private Keyregex-----BEGIN PRIVATE KEY-----5:027
5a20805a2e25dfc53905a11213b4f184f430d98ec199c8d69267195a5408628efPassword in Configregexpassword = MySecretP@ssw0rd!3:628
6a20805a2e25dfc53905a11213b4f184f430d98ec199c8d69267195a5408628efPassword in Configregexpassword=secret1238:4918
7a20805a2e25dfc53905a11213b4f184f430d98ec199c8d69267195a5408628efDatabase Connection Stringregexjdbc:postgresql://localhost:5432/mydb?user=admin&password=secret1238:067
8a20805a2e25dfc53905a11213b4f184f430d98ec199c8d69267195a5408628efEmail Addressregexsupport@company.com4:019

signature_matches.csv

Empty CSV

unique_files.csv

sha256sha1md5file_sizemime_type_for_contentshannon_entropy
38a13bd791913971e0ef62805930c72598bd549f7ae1e38d77436111d9c0d0d0b95bf31e3c8f0179d3d0e7adc439d4614d3dbf5f8e3497f1e335c0a27b92e1efb5dfe42b2711text/plain5.01402600581424
5e1d1fba1cbf19a94ab7bbe9f9ab5b351b58444acac9ceb18024bf1c7b1a326632f49b043419c3c9255641b6a29b69b27f7279cf0bd314dd5a07382a13dd5e2d4e90f5a5884text/plain5.01756054475152
a20805a2e25dfc53905a11213b4f184f430d98ec199c8d69267195a5408628efee47c231473c6d9e380ad793ab47bf29738c6bcd82bc120398da1622b7b934ff727268841048576application/x-vhdx0.00541595196467941