Summary
I wrote a small tool to detect a possible code injection even if it is done by only section APIs.----
A few weeks ago, I had an opportunity to analyze ransomware referred as Urausy. At a very initial stage of analysis, its behaviour seemed to be nothing surprising to me; it injected code into explorer.exe, and the injected code spawned svchost.exe hosting malicious code and initiated main ransom activities (More detaied analysis can be found on avast! blog).
Image 1: Process Tree |
Image 2: Memory Map of Explorer.exe (Before Infection) |
Image 3: Memory Map of Explorer.exe (After Infection) |
It is also true of the case of the traditional code injection with VirtualAllocEx() and CreateRemoteThread(), but we are less likely to overlook it as we always expect to see that these APIs are used for injection and have tools or systems that tell us occurrence of typical thread injection.
So I wrote a driver, RemoteWriteMonitor, monitors inter-process memory modification by hooking NtWriteVirtualMemory() and ZwMapViewOfSection() to assist analysts to find this section based injection. This tool should report all possible code injections because if you want to execute your own code on another process from the user-mode, you need to either (1) write something onto the other process using those APIs (as far as I can think of), or (2) use a DLL file in conjunction with SetWindowsHookEx() or other type of injection mechanisms which is very easy to find due to preceding a disk write operation.
Let us see what it does in case of another Urausy sample I found on Malwr. If you installed the driver and run the sample, you see that the sample is mapping sections onto explorer.exe using ZwMapViewOfSection().
Image 4: Output on DebugView |
This tool also saves the contents of memory being written as <SHA1>.bin so that you can examine what it is later. In this example, written data was code and a PE image respectively.
Image 5: File Contents (Code upside and PE downside) |
Hi, Could you please to share the sample which you have analyzed ? Thank you so much !
ReplyDeleteBest Regards,
Hi, does one I linked on the entry work for you? https://malwr.com/analysis/MzJjYzNjNDM1Y2QxNDNjNWE4MjQ5NWIwOTc5MWQ5MDc/
ReplyDelete