-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create injection_writememory.py #401
base: master
Are you sure you want to change the base?
Conversation
Sigs for detecting WriteProcessMemory to a remote process.
Thanks - I think there is some overlap here with one of the few api sigs in the main repo:
I haven't checked to look whether the above is detected by this signature and if not why not. |
It doesn't (21a0b617431850a9ea2698515c277cbd95de4e59c493d0d8f194f3808eb16354 Instructions.iso). While most injection techniques are covered I sometimes am finding they don't fire on these behaviours potentially because of how it is being done instead of the typical chain. That is why I have done this (and others in testing) breaking down anomalies like these. For example in this case writing to the memory of the other process and then others resuming the thread in the other process. |
so maybe we want to merge them as they are related but not the same? thoughts? |
Yes of course we should merge what we haven't got and clean up what we have to maximise coverage. Historically there was an additional use for the signatures in 'CAPE.py' as they were used as triggers for package selection... back a long time ago. Now we don't need a special set of signatures to trigger packages so I think the best way is probably to remove CAPE.py completely and ensure that Kevin's sigs here cover everything we need. If not we can add to them as needs be. Let me test these and the CAPE.py sigs against Kevin's samples as well as my own 'injection' test set and I will try to consolidate them all. I don't mind doing that after this is merged. |
Thanks
El jue, 7 mar 2024, 10:58, kevoreilly ***@***.***> escribió:
… Yes of course we should merge what we haven't got and clean up what we
have to maximise coverage.
Historically there was an additional use for the signatures in 'CAPE.py'
as they were used as triggers for package selection... back a long time
ago. Now we don't need a special set of signatures to trigger packages so I
think the best way is probably to remove CAPE.py completely and ensure that
Kevin's sigs here cover everything we need. If not we can add to them as
needs be.
Let me test these and the CAPE.py sigs against Kevin's samples as well as
my own 'injection' test set and I will try to consolidate them all. I don't
mind doing that after this is merged.
—
Reply to this email directly, view it on GitHub
<#401 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAOFH36TCPG6RSU6KL7IXYDYXA22RAVCNFSM6AAAAABD4N3FQGVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTSOBTGE2DMNBYGM>
.
You are receiving this because you commented.Message ID:
***@***.***>
|
@kevross33 any reason why these signatures do not include the api |
Will just be an omission on my part and can be added. In terms of the wider
conversation the CAPE sigs for injection still very useful for identifying
source/target injection when they fire and often with higher confidence.
The sigs I have created/creating (most still being worked on as not had
time but will submit soon) more about identifying components/anomalies
around injections that are useful for identifying injection/malicious
unpacking occurring by sub-components. I.e. messing with another process'
permissions, writing into it and starting a thread. Really they are just a
safety net.
…On Mon, 11 Mar 2024 at 17:18, kevoreilly ***@***.***> wrote:
@kevross33 <https://github.com/kevross33> any reason why these signatures
do not include the api NtWriteVirtualMemory? Incidentally this function
and the two you have included are the three for which injected data is
captured by the monitor.
—
Reply to this email directly, view it on GitHub
<#401 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AASNPNNOY4Z2U5K42YZR63DYXXRNBAVCNFSM6AAAAABD4N3FQGVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTSOBZGAYDKMRTHA>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
I will add this api and make sure the net is sound 👌 |
There is a slight complication here in that the API calls shown in your initial screenshot are Windows internal calls from within the
I have previously experimented with ignoring these redirections in hooks but this caused detonation issues. I am currently researching whether a certain subset of these might be ignored, such as those for APIs from Not that this means the signature is problematic - but it's certainly worth noting the signal used here as an example is a false positive and this is not malware injecting into anything but Windows internal mechanics. |
what is the state of this? |
Sigs for detecting WriteProcessMemory to a remote process.
Example from APT29 EnvyScout/ROOTSAW dropped GraphicalNeutrino (https://go.recordedfuture.com/hubfs/reports/cta-2023-0127.pdf)