KAPE Quarterly Update – Q3 2021

KAPE Quarterly Update – Q3 2021 Cyber

or to bookmark this page

Click here to bookmark this page

Click here to remove bookmark

KAPE has seen a number of key updates during the third quarter of this year. The guide below, assembled by our team of experts, highlights all the important changes that have occurred from July through September 2021.

Key Q3 2021 KAPE Updates
  • Project boards established on GitHub for all KAPE-related repositories
  • RegistryHivesOther Target created to cover uncommon Registry hives
  • Kape Research Modules were highlighted in previous 2021 quarterly updates, but they’ve continued to grow with the addition of the aforementioned RegistryHivesOther Target
  • Exportfile added to SrumECmd and SumECmd modules for better end user awareness

See end of the article for additional updates.

Project Boards Established on GitHub for all KAPE-Related Repositories

Kanban boards were created for multiple GitHub repositories. As a result, Kroll’s ongoing tasks regarding KAPE  have been transposed into the public realm into these Kanban boards, allowing anyone to see what’s ahead on the roadmap. These boards are also available to the public for contribution. For further information, reach out to [email protected].

Below are direct links to the respective GitHub project boards:

Phill Moore sparked this idea. Be sure to follow his passion project, This Week in 4n6.

RegistryHivesOther Target Created to Cover Uncommon Registry Hives

During a recent revision of the Kroll Batch File for RECmd, unfamiliar Registry hives were uncovered, so the Kroll team developed a RegistryHivesOther Compound Target to cover the following Registry hives:

  • BBI
  • BCD-Template
  • ELAM
  • userdiff

The forensic significance of these hives is currently unknown, so they are NOT included in the RegistryHives Compound Target. A note indicating as such has been included in the Compound Target for greater visibility.

KapeResearch Modules Were Highlighted in Previous 2021 Quarterly Updates, But They’ve Continued to Grow with The Addition of The Aforementioned Registryhivesother Target

KapeResearch Modules were created for the aforementioned Registry hives that are covered within the RegistryHivesOthers Compound Target. This will allow for those who want to do research into these hives to do so with a recursive dump from the ROOT (or topmost) key within the Registry hive.

Exportfile Added to SrumECmd and SumECmd Modules for Better End-User Awareness

Combining the KapeTriage Compound Target and !EZParser Compound Module are a common workflow with KAPE users. If an artifact listed within the KapeTriage Compound Target, every single EZ Tool listed within the !EZParser Compound Module will be put to work and provide output. Over time, Kroll has noticed that two tools in particular, SrumECmd and SumECmd, did not provide output using this workflow due to the nature of ESE databases needing to be repaired when acquired from a live system. This is a manual process that is highlighted here.

As a result, end-users may have mistaken an empty output folder for those respective Modules as absence of the artifact when that was not actually the case. Therefore,  Export File has been added to each of those Modules for the purpose of outputting the console output to a text file regardless of whether the tool(s) parses the artifact(s) successfully. The reason for this is to provide greater visibility to the end-user about whether a) the artifact exists, b) it was parsed successfully, and if not, c) what they can do to ensure it does get parsed successfully. Feedback on this addition to these Modules has been universally positive. The SRUM and SUM databases are invaluable artifacts for data exfiltration and lateral movement, respectively, in the incident response world.

The community has continued to contribute to the KapeFiles repository, which is greatly appreciated! The functionality of KAPE continues to grow with your support!

For anyone looking to learn more about digital forensics, to develop a better workflow or to become more comfortable with the command line and CSVs rather than GUIs, our experts strongly recommend running KAPE on their own system. Start with either !BasicCollection or KapeTriage for Targets and use !EZParser on for Modules. Examine the output in Timeline Explorer, another tool created by Eric, and learn what and how your systems record artifacts. If you have any questions about KAPE, please email [email protected].

Here is an overview of the changes to the KapeFiles GitHub repository from July 1, 2021, to September 30, 2021.

Targets Added/Updated


Modules Added/Updated

  • Additions
  • Updates
  • Added ROOT functionality from a recent RECmd update to recursively dump the entire contents of a given hive to JSON

KAPE-Related GitHub Repositories

Our experts recommend “watching” the following GitHub repositories for KAPE-related updates:

Key KAPE updates

If you need additional KAPE support, explore our virtual live training and certification opportunities or contact our experts at [email protected]. An enterprise license is required when KAPE is used on a third-party network and/or as part of a paid engagement.

This article was written by Andrew Rathbun, a Senior Associate in Kroll's Cyber Risk practice.

KAPE Quarterly Update – Q3 2021 2021-10-21T00:00:00.0000000 /en-ca/insights/publications/cyber/kape-quarterly-update-q3-2021 /-/media/kroll/images/publications/featured-images/kape-quarterly-update-q3-2021.jpg publication {E39587AD-8F0B-4FE2-865F-969BC5501096} {09213578-A7CA-4DD8-AE97-7476022C89D6} {3A077BFC-C74A-40AF-A14C-13BCF6E3873E} {CE2347F0-D222-4014-BA97-6A415CC633DF} {2F9D4938-E5F0-4F9C-9A20-C4A5DCF79130} {7A48DD95-1A63-4784-842F-A2BE81EAFE13} {29BBBAB0-0450-4652-AEAB-6D335E426996} {3A4E87DE-180A-4689-A293-20A6E94886A6}


Cyber Risk

Global, end-to-end cyber risk solutions.

Cyber Risk

24x7 Incident Response

Compliant notifications, reputation-saving remediation, and litigation support.

24x7 Incident Response
Cyber Risk: The New Due Diligence Frontier, Identity Monitoring

Data Recovery Forensic Analysis

Evidence handling with sound methodology, recovery tools and processes supported by case law.

Data Recovery Forensic Analysis

Cyber Risk Retainers

Secure a true cyber risk retainer with elite digital forensics and incident response capabilities.

Cyber Risk Retainers

Computer Forensics

Expert computer forensic assistance at any stage of a digital investigation or litigation.

Computer Forensics


Episode 17

Global Supply Chain Theft Threatens Supply Chain Security: How Corporations Can Prepare and Protect

Episode 17

Are Your Disclosures and Compliance Programs SEC Compliant?


Regulatory Internal Audit Case Studies