Allow certain malicious tools to be running
This commit is contained in:
parent
d69544ff5a
commit
9a30a63bd1
@ -30,6 +30,7 @@ namespace arxan
|
|||||||
}
|
}
|
||||||
|
|
||||||
utils::hook::detour nt_close_hook;
|
utils::hook::detour nt_close_hook;
|
||||||
|
utils::hook::detour nt_query_system_information_hook;
|
||||||
utils::hook::detour nt_query_information_process_hook;
|
utils::hook::detour nt_query_information_process_hook;
|
||||||
utils::hook::detour create_mutex_ex_a_hook;
|
utils::hook::detour create_mutex_ex_a_hook;
|
||||||
|
|
||||||
@ -44,25 +45,90 @@ namespace arxan
|
|||||||
return create_mutex_ex_a_hook.invoke<HANDLE>(attributes, name, flags, access);
|
return create_mutex_ex_a_hook.invoke<HANDLE>(attributes, name, flags, access);
|
||||||
}
|
}
|
||||||
|
|
||||||
NTSTATUS WINAPI nt_query_information_process_stub(const HANDLE handle, const PROCESSINFOCLASS info_class,
|
void remove_evil_keywords_from_path(const UNICODE_STRING& string)
|
||||||
|
{
|
||||||
|
static const std::wstring evil_keywords[] =
|
||||||
|
{
|
||||||
|
L"IDA",
|
||||||
|
L"ida",
|
||||||
|
L"HxD",
|
||||||
|
L"cheatengine",
|
||||||
|
L"Cheat Engine",
|
||||||
|
};
|
||||||
|
|
||||||
|
if (!string.Buffer || !string.Length)
|
||||||
|
{
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
std::wstring_view path(string.Buffer, string.Length / sizeof(string.Buffer[0]));
|
||||||
|
|
||||||
|
for (const auto& keyword : evil_keywords)
|
||||||
|
{
|
||||||
|
while (true)
|
||||||
|
{
|
||||||
|
const auto pos = path.find(keyword);
|
||||||
|
if (pos == std::wstring::npos)
|
||||||
|
{
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
OutputDebugStringW(path.data());
|
||||||
|
|
||||||
|
for (size_t i = 0; i < keyword.size(); ++i)
|
||||||
|
{
|
||||||
|
string.Buffer[pos + i] = L'a';
|
||||||
|
}
|
||||||
|
|
||||||
|
OutputDebugStringW(path.data());
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
NTSTATUS NTAPI nt_query_system_information_stub(const SYSTEM_INFORMATION_CLASS system_information_class,
|
||||||
|
const PVOID system_information,
|
||||||
|
const ULONG system_information_length,
|
||||||
|
const PULONG return_length)
|
||||||
|
{
|
||||||
|
const auto status = nt_query_system_information_hook.invoke<NTSTATUS>(
|
||||||
|
system_information_class, system_information, system_information_length, return_length);
|
||||||
|
|
||||||
|
if (NT_SUCCESS(status))
|
||||||
|
{
|
||||||
|
if (system_information_class == SystemProcessInformation)
|
||||||
|
{
|
||||||
|
auto addr = static_cast<uint8_t*>(system_information);
|
||||||
|
while (true)
|
||||||
|
{
|
||||||
|
const auto info = reinterpret_cast<SYSTEM_PROCESS_INFORMATION*>(addr);
|
||||||
|
remove_evil_keywords_from_path(info->ImageName);
|
||||||
|
|
||||||
|
if (!info->NextEntryOffset)
|
||||||
|
{
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
addr = addr + info->NextEntryOffset;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return status;
|
||||||
|
}
|
||||||
|
|
||||||
|
NTSTATUS WINAPI nt_query_information_process_stub(HANDLE handle, const PROCESSINFOCLASS info_class,
|
||||||
const PVOID info,
|
const PVOID info,
|
||||||
const ULONG info_length, const PULONG ret_length)
|
const ULONG info_length, const PULONG ret_length)
|
||||||
{
|
{
|
||||||
auto* orig = static_cast<decltype(NtQueryInformationProcess)*>(nt_query_information_process_hook.
|
auto* orig = static_cast<decltype(NtQueryInformationProcess)*>(nt_query_information_process_hook.
|
||||||
get_original());
|
get_original());
|
||||||
|
|
||||||
const auto status = orig(handle, info_class, info, info_length, ret_length);
|
const auto status = orig(handle, info_class, info, info_length, ret_length);
|
||||||
|
|
||||||
if (NT_SUCCESS(status))
|
if (NT_SUCCESS(status))
|
||||||
{
|
{
|
||||||
if (info_class == ProcessBasicInformation)
|
if (info_class == ProcessBasicInformation)
|
||||||
{
|
{
|
||||||
static DWORD explorer_pid = 0;
|
|
||||||
if (!explorer_pid)
|
|
||||||
{
|
|
||||||
auto* const shell_window = GetShellWindow();
|
|
||||||
GetWindowThreadProcessId(shell_window, &explorer_pid);
|
|
||||||
}
|
|
||||||
|
|
||||||
static_cast<PPROCESS_BASIC_INFORMATION>(info)->Reserved3 = PVOID(DWORD64(get_steam_pid()));
|
static_cast<PPROCESS_BASIC_INFORMATION>(info)->Reserved3 = PVOID(DWORD64(get_steam_pid()));
|
||||||
}
|
}
|
||||||
else if (info_class == 30) // ProcessDebugObjectHandle
|
else if (info_class == 30) // ProcessDebugObjectHandle
|
||||||
@ -71,6 +137,10 @@ namespace arxan
|
|||||||
|
|
||||||
return 0xC0000353;
|
return 0xC0000353;
|
||||||
}
|
}
|
||||||
|
else if (info_class == ProcessImageFileName || info_class == 43)
|
||||||
|
{
|
||||||
|
remove_evil_keywords_from_path(*static_cast<UNICODE_STRING*>(info));
|
||||||
|
}
|
||||||
else if (info_class == 7) // ProcessDebugPort
|
else if (info_class == 7) // ProcessDebugPort
|
||||||
{
|
{
|
||||||
*static_cast<HANDLE*>(info) = nullptr;
|
*static_cast<HANDLE*>(info) = nullptr;
|
||||||
@ -103,6 +173,11 @@ namespace arxan
|
|||||||
return EXCEPTION_CONTINUE_EXECUTION;
|
return EXCEPTION_CONTINUE_EXECUTION;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (info->ExceptionRecord->ExceptionCode == STATUS_ACCESS_VIOLATION)
|
||||||
|
{
|
||||||
|
//MessageBoxA(0, 0, "AV", 0);
|
||||||
|
}
|
||||||
|
|
||||||
return EXCEPTION_CONTINUE_SEARCH;
|
return EXCEPTION_CONTINUE_SEARCH;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -112,6 +187,47 @@ namespace arxan
|
|||||||
peb->BeingDebugged = false;
|
peb->BeingDebugged = false;
|
||||||
*reinterpret_cast<PDWORD>(LPSTR(peb) + 0xBC) &= ~0x70;
|
*reinterpret_cast<PDWORD>(LPSTR(peb) + 0xBC) &= ~0x70;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
void restore_debug_functions()
|
||||||
|
{
|
||||||
|
static const char* functions[] = {
|
||||||
|
"DbgBreakPoint",
|
||||||
|
"DbgUserBreakPoint",
|
||||||
|
"DbgUiConnectToDbg",
|
||||||
|
"DbgUiContinue",
|
||||||
|
"DbgUiConvertStateChangeStructure",
|
||||||
|
"DbgUiDebugActiveProcess",
|
||||||
|
"DbgUiGetThreadDebugObject",
|
||||||
|
"DbgUiIssueRemoteBreakin",
|
||||||
|
"DbgUiRemoteBreakin",
|
||||||
|
"DbgUiSetThreadDebugObject",
|
||||||
|
"DbgUiStopDebugging",
|
||||||
|
"DbgUiWaitStateChange",
|
||||||
|
"DbgPrintReturnControlC",
|
||||||
|
"DbgPrompt",
|
||||||
|
};
|
||||||
|
|
||||||
|
using buffer = uint8_t[15];
|
||||||
|
static buffer buffers[ARRAYSIZE(functions)] = {};
|
||||||
|
static bool loaded = false;
|
||||||
|
|
||||||
|
const utils::nt::library ntdll("ntdll.dll");
|
||||||
|
|
||||||
|
for (int i = 0; i < ARRAYSIZE(functions); ++i)
|
||||||
|
{
|
||||||
|
const auto func = ntdll.get_proc<void*>(functions[i]);
|
||||||
|
if (!loaded)
|
||||||
|
{
|
||||||
|
memcpy(buffers[i], func, sizeof(buffer));
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
utils::hook::copy(func, buffers[i], sizeof(buffer));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
loaded = true;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
class component final : public component_interface
|
class component final : public component_interface
|
||||||
@ -122,12 +238,21 @@ namespace arxan
|
|||||||
hide_being_debugged();
|
hide_being_debugged();
|
||||||
scheduler::loop(hide_being_debugged, scheduler::pipeline::async);
|
scheduler::loop(hide_being_debugged, scheduler::pipeline::async);
|
||||||
|
|
||||||
|
//restore_debug_functions();
|
||||||
|
|
||||||
create_mutex_ex_a_hook.create(CreateMutexExA, create_mutex_ex_a_stub);
|
create_mutex_ex_a_hook.create(CreateMutexExA, create_mutex_ex_a_stub);
|
||||||
|
|
||||||
const utils::nt::library ntdll("ntdll.dll");
|
const utils::nt::library ntdll("ntdll.dll");
|
||||||
nt_close_hook.create(ntdll.get_proc<void*>("NtClose"), nt_close_stub);
|
nt_close_hook.create(ntdll.get_proc<void*>("NtClose"), nt_close_stub);
|
||||||
nt_query_information_process_hook.create(ntdll.get_proc<void*>("NtQueryInformationProcess"),
|
|
||||||
|
const auto nt_query_information_process = ntdll.get_proc<void*>("NtQueryInformationProcess");
|
||||||
|
nt_query_information_process_hook.create(nt_query_information_process,
|
||||||
nt_query_information_process_stub);
|
nt_query_information_process_stub);
|
||||||
|
utils::hook::move_hook(nt_query_information_process);
|
||||||
|
|
||||||
|
const auto nt_query_system_information = ntdll.get_proc<void*>("NtQuerySystemInformation");
|
||||||
|
nt_query_system_information_hook.create(nt_query_system_information, nt_query_system_information_stub);
|
||||||
|
utils::hook::move_hook(nt_query_system_information); // Satisfy arxan
|
||||||
|
|
||||||
AddVectoredExceptionHandler(1, exception_filter);
|
AddVectoredExceptionHandler(1, exception_filter);
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user