PoC aimed to dump the (unencrypted) database from the Microsoft Recall folder to extract sensitive information and screenshots.
Based on this repository from xaitax, I thought I'd make a compiled version so that it can be ran on a Windows host even when the Python interpreter is not installed.
You can find a pre-compiled binary for ARM64 in the release tab or here.
If you want to build this on your own open the .sln
file in Visual Studio, make sure to have the ARM and ARM64 compilers and libraries installed (you can follow this guide to set those up).
For now the tool doesn't support any arguments and can be ran normally
.\cppRecall.exe
This will execute the binary targeting the Recall folder for the current user and dumping ALL the data inside the database and ImageStore folder.
In the future I intend to add CLI arguments that will allow to manually specify the username and a range of timestamps to include.
After running this script you'll be able access the dumped text and images from the dump folder name with the <TIMESTAMP>_Recall_Extraction
format.
- Text file
- Image folder
Since the binary is not performing any inherently malicious tasks but it's just reading a single unencrypted file it probably won't need any obfuscation or packing when going up against more common AV solutions.