Skip to content
Open
Original file line number Diff line number Diff line change
Expand Up @@ -15,5 +15,5 @@ rule:
- Practical Malware Analysis Lab 16-01.exe_:0x403530
features:
- and:
- match: PEB access
- match: PEB access via x86 assembly
- offset: 2 = PEB.BeingDebugged
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: check for PEB NtGlobalFlag flag
name: check for PEB NtGlobalFlag flag via x86 assembly
namespace: anti-analysis/anti-debugging/debugger-detection
authors:
- [email protected]
Expand All @@ -18,7 +18,7 @@ rule:
- and:
- basic block:
- and:
- match: PEB access
- match: PEB access via x86 assembly
- or:
- and:
- arch: i386
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: check for trap flag exception
name: check for trap flag exception via x86 assembly
namespace: anti-analysis/anti-debugging/debugger-detection
authors:
- [email protected]
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: execute anti-debugging instructions
name: execute anti-debugging instructions via x86 assembly
namespace: anti-analysis/anti-debugging/debugger-detection
authors:
- [email protected]
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: 64-bit execution via heavens gate
name: 64-bit execution via heavens gate via x86 assembly
namespace: anti-analysis/anti-disasm
authors:
- [email protected]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,4 +13,4 @@ rule:
- a5c70086b3bc4fe64f4e7a0aa452e620
features:
- or:
- count(match(contain pusha popa sequence)): 10 or more
- count(match(contain pusha popa sequence via x86 assembly)): 10 or more
Original file line number Diff line number Diff line change
Expand Up @@ -23,4 +23,4 @@ rule:
- mnemonic: popad # vivisect
- characteristic: cross section flow
- not:
- match: contain pusha popa sequence
- match: contain pusha popa sequence via x86 assembly
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: obtain TransmitPackets callback function via WSAIoctl
name: obtain TransmitPackets callback function via WSAIoctl via x86 assembly
namespace: communication/socket/tcp/send
authors:
- [email protected]
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: compute adler32 checksum
name: compute adler32 checksum via x86 assembly
namespace: data-manipulation/checksum/adler32
authors:
- [email protected]
Expand Down
Empty file.
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: encrypt data using RC4 KSA
name: encrypt data using RC4 KSA via x86 assembly
namespace: data-manipulation/encryption/rc4
authors:
- [email protected]
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: encrypt data using RC4 PRGA
name: encrypt data using RC4 PRGA via x86 assembly
namespace: data-manipulation/encryption/rc4
authors:
- [email protected]
Expand Down
Empty file.
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: encrypt data using RSA via embedded library
name: encrypt data using RSA via embedded library via x86 assembly
namespace: data-manipulation/encryption/rsa
authors:
- "Ana06"
Expand Down
Empty file modified data-manipulation/encryption/tea/decrypt-data-using-tea.yml
100755 → 100644
Empty file.
Empty file modified data-manipulation/encryption/tea/encrypt-data-using-tea.yml
100755 → 100644
Empty file.
Empty file modified data-manipulation/encryption/xtea/encrypt-data-using-xtea.yml
100755 → 100644
Empty file.
Empty file modified data-manipulation/encryption/xxtea/encrypt-data-using-xxtea.yml
100755 → 100644
Empty file.
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: get number of processors
name: get number of processors via x86 assembly
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There is branch that does not use x86 assembly, please revert.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There is branch that does not use x86 assembly, please revert.

My bad! I oversaw the last statement. Will revert it back

namespace: host-interaction/hardware/cpu
authors:
- [email protected]
Expand All @@ -17,7 +17,7 @@ rule:
features:
- or:
- and:
- match: PEB access
- match: PEB access via x86 assembly
- or:
- and:
- arch: i386
Expand Down
Empty file modified host-interaction/log/clfs/read-data-from-clfs-log-container.yml
100755 → 100644
Empty file.
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ rule:
- or:
- api: execve
- and:
- match: execute syscall
- match: execute syscall via x86 assembly
- arch: aarch64
- number: 0xdd = execve
- api: execl
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: get process filename
name: get process filename via x86 assembly
namespace: host-interaction/process
authors:
- [email protected]
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: get process heap flags
name: get process heap flags via x86 assembly
namespace: host-interaction/process
authors:
- [email protected]
Expand All @@ -15,7 +15,7 @@ rule:
- al-khaser_x86.exe_:0x425470
features:
- and:
- match: PEB access
- match: PEB access via x86 assembly
- or:
- and:
- arch: i386
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: get process heap force flags
name: get process heap force flags via x86 assembly
namespace: host-interaction/process
authors:
- [email protected]
Expand All @@ -15,7 +15,7 @@ rule:
- al-khaser_x86.exe_:0x425470
features:
- and:
- match: PEB access
- match: PEB access via x86 assembly
- or:
- and:
- arch: i386
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: contain pusha popa sequence
name: contain pusha popa sequence via x86 assembly
authors:
- [email protected]
lib: true
Expand Down
2 changes: 1 addition & 1 deletion lib/get-os-version.yml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ rule:
- api: RtlGetNtVersionNumbers
- api: GetProductInfo
- and:
- match: PEB access
- match: PEB access via x86 assembly
- or:
- and:
- arch: i386
Expand Down
2 changes: 1 addition & 1 deletion lib/peb-access.yml → lib/peb-access-via-x86-assembly.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: PEB access
name: PEB access via x86 assembly
authors:
- [email protected]
lib: true
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: access PEB ldr_data
name: access PEB ldr_data via x86 assembly
namespace: linking/runtime-linking
authors:
- [email protected]
Expand All @@ -20,7 +20,7 @@ rule:
- arch: i386
- description: x32

- match: PEB access
- match: PEB access via x86 assembly

# x86 Windows uses fs:0 to access the TIB which contains SEH information at offset 0
# checking for fs:0 and a (possibly unrelated) number or offset often results in false positives
Expand All @@ -37,7 +37,7 @@ rule:
- arch: amd64
- description: x64

- match: PEB access
- match: PEB access via x86 assembly

- offset: 0x18 = PEB.LDR_DATA

Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: get kernel32 base address
name: get kernel32 base address via x86 assembly
namespace: linking/runtime-linking
authors:
- [email protected]
Expand All @@ -17,7 +17,7 @@ rule:
features:
- and:
# PEB -> PEB.Ldr -> PEB_LDR_DATA.InLoadOrderModuleList.Flink
- match: access PEB ldr_data
- match: access PEB ldr_data via x86 assembly
# -> current module -> ntdll
- count(offset(0)): 2
# -> kernel32 -> LDR_DATA_TABLE_ENTRY.DllBase
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: get ntdll base address
name: get ntdll base address via x86 assembly
namespace: linking/runtime-linking
authors:
- [email protected]
Expand All @@ -17,7 +17,7 @@ rule:
features:
- and:
# PEB -> PEB.Ldr -> PEB_LDR_DATA.InLoadOrderModuleList.Flink
- match: access PEB ldr_data
- match: access PEB ldr_data via x86 assembly
# -> current module
- count(offset(0)): 1
# -> ntdll -> LDR_DATA_TABLE_ENTRY.DllBase
Expand Down
Empty file modified load-code/pe/resolve-function-by-parsing-pe-exports.yml
100755 → 100644
Empty file.
Empty file modified nursery/append-data-to-clfs-log-container.yml
100755 → 100644
Empty file.
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: execute syscall
name: execute syscall via x86 assembly
namespace: anti-analysis
authors:
- "@kulinacs"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,9 +1,10 @@
rule:
meta:
name: get ntoskrnl base address
name: get ntoskrnl base address via x86 assembly
namespace: linking/runtime-linking
authors:
- "@mr-tz"
- "@akh7177"
scopes:
static: function
dynamic: unsupported # requires offset features
Expand All @@ -19,9 +20,10 @@ rule:
- description: returns RTL_PROCESS_MODULES structure
- number: 0xB = SystemModuleInformation
- match: get system information on Windows
- and:
- arch: i386
- offset: 0xC = RTL_PROCESS_MODULES.Modules[0].ImageBase
- and:
- arch: amd64
- offset: 0x18 = RTL_PROCESS_MODULES.Modules[0].ImageBase
- or:
- and:
- arch: i386
- offset: 0xC = RTL_PROCESS_MODULES.Modules[0].ImageBase
- and:
- arch: amd64
- offset: 0x18 = RTL_PROCESS_MODULES.Modules[0].ImageBase
Empty file modified nursery/hash-data-using-ripemd128.yml
100755 → 100644
Empty file.
Empty file modified nursery/hash-data-using-ripemd256.yml
100755 → 100644
Empty file.
Empty file modified nursery/hash-data-using-ripemd320.yml
100755 → 100644
Empty file.
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: hook routines via dlsym RTLD_NEXT
name: hook routines via dlsym RTLD_NEXT via x86 assembly
namespace: linking/hooking
authors:
- [email protected]
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
rule:
meta:
name: reference processor manufacturer constants
name: reference processor manufacturer constants via x86 assembly
namespace: anti-analysis/anti-vm/vm-detection
authors:
- [email protected]
Expand Down
Loading