-
Notifications
You must be signed in to change notification settings - Fork 613
inlinehooks plugin & change to avpatch #1818
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: develop
Are you sure you want to change the base?
Conversation
9e4dc2d to
065ea84
Compare
|
|
I tried running it on fresh windows 10 machine now and the false positives is very high, however they can quickly be examined and succumb to less with few statistics with something like splunk/custom python. |
|
any update on this? I would like to keep working on that if it's relevant, I would like help regarding my questions:x |
|
@Abyss-W4tcher could you cast an eye over this and give me your linux views on it please? |
|
@ikelos hey, this is a windows plugin. also as I said in my first message by itself its not really complete due to high volume of false positives (still can be used as a helper though). |
|
Oh, sorry I saw it was waiting on @atcuno and figured it must be a linux program. Sorry, trying to clear down outstanding issues as quickly as I can. If this isn't ready for prime-time we can mark it as a draft? That way it'll be visible here, for people to try out, and if there's more work that can reduce the false positive rate, it can get turned back into a full PR... 5:) |
Hello, not sure if thats good enough as a standalone plugin, but I tried to re-implement apihooks. however, since there a lot of "hooks" in legitimate dlls I couldn't get it to output less false positives, ofc I am open to ideas.
also, some hooks are not relevant anymore e.g KiFastSystemCall.
even the current implementation of check_inline_hooks throw false positives, anyways that was a fun experience :D
I have left some of the pseudo-code commented for now, if you think it can be improved or removed totally.
Also I have 2 questions:
I have read a paper of @atcuno about hooktracer but couldn't find code online.
second question is something I also tried asking on your slack, maybe I misunderstand something but worth a try:
From my understanding, unhooked_system_calls plugin will enumerate all of the processes to find differences, if every process is hooked it will not be flagged as malware. a follow-up to this, a DLL is loaded to a shared memory and if it's patched the OS creates a private copy for the process, so cant we compare the hooks against the known shared read-only memory for the DLL? if not why?Anyways, about the plugin: