Che237's picture
Upload cryptomining_detection dataset
8377638 verified
# Detecting xxmm config for Volatilitv
#
# LICENSE
# Please refer to the LICENSE.txt in the https://github.com/JPCERTCC/MalConfScan/
#
# How to use:
# 1. cd "Volatility Folder"
# 2. mv xxmmconfig.py volatility/plugins/malware
# 3. python vol.py xxmmconfig -f images.mem --profile=Win7SP1x64
import volatility.plugins.taskmods as taskmods
import volatility.win32.tasks as tasks
import volatility.utils as utils
import volatility.debug as debug
import volatility.plugins.malware.malfind as malfind
import re
from struct import unpack, unpack_from
try:
import yara
has_yara = True
except ImportError:
has_yara = False
xxmm_sig = {
'namespace1' : 'rule xxmm { \
strings: \
$v1 = "setupParameter:" \
$v2 = "loaderParameter:" \
$v3 = "parameter:" \
condition: all of them}'
}
DATA_TYPE = {0x10001: 'ASCII',
0x104DB: 'UTF-16LE',
0x104DC: 'UTF-16LE',
0x104DE: 'ASCII',
0x104DF: 'UTF-16LE',
0x104E0: 'UTF-16LE',
0x104E1: 'ASCII',
0x104E2: 'ASCII',
0x104E3: 'ASCII',
0x104E4: 'ASCII',
0x104E5: 'UTF-16LE',
0x104E6: 'UTF-16LE',
0x104E7: 'UTF-16LE',
0x104E8: 'UTF-16LE',
0x104E9: 'UTF-16LE',
0x104EA: 'UTF-16LE',
0x10502: 'ASCII',
0x10515: 'UTF-16LE',
0x10516: 'UTF-16LE',
0x10517: 'UTF-16LE',
0x10518: 'ASCII',
0x10519: 'UTF-16LE',
0x1051A: 'UTF-16LE',
0x1051B: 'UTF-16LE',
0x1051C: 'UTF-16LE',
0x1051D: 'UTF-16LE',
0x1051E: 'UTF-16LE',
0x1051F: 'UTF-16LE',
0x10522: 'UTF-16LE',
0x10525: 'UTF-16LE',
0x10534: 'UTF-16LE',
0x10535: 'UTF-16LE',
0x1053C: 'ASCII',
0x20520: 'DWORD',
0x20521: 'DWORD',
0x20523: 'DWORD',
0x20524: 'DWORD',
0x20526: 'DWORD',
0x20535: 'DWORD',
0x40500: 'BYTE',
0x40501: 'BYTE',
0x80503: 'BYTE',
0x80514: 'BYTE',
0x8052A: 'BYTE'}
class xxmmConfig(taskmods.DllList):
"Parse the xxmm configuration"
@staticmethod
def is_valid_profile(profile):
return (profile.metadata.get('os', 'unknown') == 'windows'), profile.metadata.get('memory_model', '32bit')
def get_vad_base(self, task, address):
for vad in task.VadRoot.traverse():
if address >= vad.Start and address < vad.End:
return vad.Start, vad.End
return None
def extract_param(self, conf_data, offset):
l = unpack_from('>I', conf_data, offset)[0]
if 8 <= l <= len(conf_data[offset:]):
idnum = unpack_from('>I', conf_data, offset + 0x4)[0]
s = conf_data[offset + 0x8:offset + l]
else:
return None, None, None
return l, idnum, s
def calculate(self):
if not has_yara:
debug.error('Yara must be installed for this plugin.')
addr_space = utils.load_as(self._config)
os, memory_model = self.is_valid_profile(addr_space.profile)
if not os:
debug.error('This command does not support the selected profile.')
rules = yara.compile(sources=xxmm_sig)
for task in self.filter_tasks(tasks.pslist(addr_space)):
scanner = malfind.VadYaraScanner(task=task, rules=rules)
for hit, address in scanner.scan():
vad_base_addr, end = self.get_vad_base(task, address)
proc_addr_space = task.get_process_address_space()
memdata = proc_addr_space.get_available_addresses()
config_data = []
for m in memdata:
if 0x2000 < m[1]:
continue
p_data = {}
data = proc_addr_space.zread(m[0], m[1])
offset = 0
p_data['param'] = []
while(True):
param = {}
l, param['id'], param['data'] = self.extract_param(data, offset)
if l == None:
if len(p_data['param']) == 1 and p_data['param'][0]['type'] == 'Unknown':
offset = 0
break
for c in data[offset:]:
if ord(c) != 0x00:
offset = 0
break
break
offset += l
if param['id'] in DATA_TYPE.keys():
param['type'] = DATA_TYPE[param['id']]
else:
param['type'] = 'Unknown'
p_data['param'].append(param)
if offset == 0:
continue
p_data['offset'] = m[0]
p_data['length'] = offset
config_data.append(p_data)
yield task, vad_base_addr, end, hit, memory_model, config_data
break
def render_text(self, outfd, data):
delim = '-' * 70
for task, start, end, malname, memory_model, config_data in data:
self.table_row(outfd, task.ImageFileName, task.UniqueProcessId, start)
outfd.write("{0}\n".format(delim))
outfd.write("Process: {0} ({1})\n\n".format(task.ImageFileName, task.UniqueProcessId))
for p_data in config_data:
outfd.write(' Offset: %8Xh\n' % p_data['offset'])
outfd.write(' Length: %8Xh\n' % p_data['length'])
for param in p_data['param']:
outfd.write(' ID:%6Xh Data(%s): ' % (param['id'], param['type']))
if param['type'] in {'ASCII', 'UTF-16LE'}:
outfd.write('%s\n' % param['data'])
elif param['type'] == 'DWORD':
outfd.write('%d\n' % unpack('>I', param['data'])[0])
elif param['type'] in {'BYTE', 'Unknown'}:
for c in param['data']:
outfd.write('%X ' % ord(c))
outfd.write('\n')
else:
debug.error('Invalid type found.')
outfd.write('%s\n' % ('-' * 10))