frida hook工具使用——用于os api注入分析还是不错的
准备:
pip install frida
pip install frida-tools
开始:
1、创建child-gating1.py
import os
import threading
from frida_tools.application import Reactor
import frida
import argparse
class Application:
def __init__(self, log_location):
self.fpath = ""
self.log = log_location
self._stop_requested = threading.Event()
self._reactor = Reactor(run_until_return=lambda reactor: self._stop_requested.wait())
self._device = frida.get_local_device()
self._sessions = set()
self._device.on("child-added", lambda child: self._reactor.schedule(lambda: self._on_child_added(child)))
self._device.on("child-removed", lambda child: self._reactor.schedule(lambda: self._on_child_removed(child)))
self._device.on("output", lambda pid, fd, data: self._reactor.schedule(lambda: self._on_output(pid, fd, data)))
def run(self, fp):
self.fpath = fp
self._reactor.schedule(lambda: self._start())
self._reactor.run()
def _start(self):
"""
argv = ["/bin/sh", "-c", "cat /etc/hosts"]
env = {
"BADGER": "badger-badger-badger",
"SNAKE": "mushroom-mushroom",
}
"""
#f = "C:\\Users\\Administrator\\Desktop\\测试用例\\TN0940\\notepad.exe"
#f = "C:\\Users\\Administrator\\Desktop\\fritest\\TN0940_1.exe"
print("✔ spawn(f={})".format(self.fpath))
pid = self._device.spawn(self.fpath)
self._instrument(pid)
def _stop_if_idle(self):
if len(self._sessions) == 0:
self._stop_requested.set()
def _instrument(self, pid):
print(f"✔ attach(pid={pid})")
session = self._device.attach(pid)
session.on("detached", lambda reason: self._reactor.schedule(lambda: self._on_detached(pid, session, reason)))
print("✔ enable_child_gating()")
session.enable_child_gating()
print("✔ create_script()")
script = session.create_script(
"""
Interceptor.attach(Module.findExportByName("kernel32.dll", "CreateFileW"), {
onEnter: function (args) {
//var fileNamePtr = args[0];
//var fileName = Memory.readUtf16String(fileNamePtr);
//send(fileName)
send({
type: 'CreateFileW',
path: Memory.readUtf16String(args[0])
});
}
});
"""
)
script.on("message", lambda message, data: self._reactor.schedule(lambda: self._on_message(pid, message)))
print("✔ load()")
script.load()
print(f"✔ resume(pid={pid})")
self._device.resume(pid)
self._sessions.add(session)
def _on_child_added(self, child):
print(f"⚡ child_added: {child}")
self._instrument(child.pid)
def _on_child_removed(self, child):
print(f"⚡ child_removed: {child}")
def _on_output(self, pid, fd, data):
print(f"⚡ output: pid={pid}, fd={fd}, data={repr(data)}")
def _on_detached(self, pid, session, reason):
print(f"⚡ detached: pid={pid}, reason='{reason}'")
self._sessions.remove(session)
self._reactor.schedule(self._stop_if_idle, delay=0.5)
def _on_message(self, pid, message):
print(f"⚡ message: pid={pid}, payload={message['payload']}")
with open(self.log, 'a') as f:
f.write(str(message.get('payload'))+'\n')
def log_loc(fpath, log_dir):
malware_name = os.path.basename(fpath)[:-4]
return os.path.join(log_dir, malware_name+".log")
parser = argparse.ArgumentParser(description='Frida demo.')
parser.add_argument("-f", "--file", help="target file to run", required=True)
parser.add_argument("-l", "--log", help="log location", required=True)
args, unknown = parser.parse_known_args()
app = Application(log_loc(fpath=args.file, log_dir=args.log))
app.run(args.file)
# sample run:
# python .\child-gating1.py -f "C:\\Users\\source\\repos\\test_file_write\\Debug\\test_file_write.exe" -l read_file.log
vs里创建一个测试exe,test_file_write:
#include <windows.h>
#include <stdio.h>
int main()
{
HANDLE h = CreateFile(
"bar.txt",
GENERIC_READ | GENERIC_WRITE,
0,
NULL,
CREATE_NEW,
FILE_ATTRIBUTE_TEMPORARY,
NULL);
if (h == INVALID_HANDLE_VALUE) {
DWORD err = GetLastError();
printf("err %d\n", err);
return 1;
}
printf("%p\n", h);
return 0;
}
然后运行:
python .\child-gating1.py -f "C:\\Users\\source\\repos\\test_file_write\\Debug\\test_file_write.exe" -l log
✔ spawn(f=C:\\Users\\l00379637\\source\\repos\\test_file_write\\Debug\\test_file_write.exe)
✔ attach(pid=31252)
✔ enable_child_gating()
✔ create_script()
✔ load()
✔ resume(pid=31252)
err 80
⚡ message: pid=31252, payload={'type': 'CreateFileW', 'path': 'bar.txt'}
⚡ detached: pid=31252, reason='process-terminated'
可以看到
CreateFileW
OS API被hook获取了调用参数。
如果要hook其他API,修改JS部分代码即可:
Interceptor.attach(Module.findExportByName("kernel32.dll", "CreateFileW"), {
onEnter: function (args) {
//var fileNamePtr = args[0];
//var fileName = Memory.readUtf16String(fileNamePtr);
//send(fileName)
send({
type: 'CreateFileW',
path: Memory.readUtf16String(args[0])
});
}
});
其他使用:frida-trace动态跟踪工具,类似于strace
frida-trace -i "CreateFileW" -f c:\windows\system32\notepad.exe
Instrumenting...
CreateFileW: Auto-generated handler at "D:\\source\\__handlers__\\KERNEL32.DLL\\CreateFileW.js"
CreateFileW: Auto-generated handler at "D:\\source\\__handlers__\\KERNELBASE.dll\\CreateFileW.js"
Started tracing 2 functions. Press Ctrl+C to stop.
/* TID 0x31a0 */
70 ms CreateFileW()
70 ms | CreateFileW()
77 ms CreateFileW()
77 ms | CreateFileW()
87 ms CreateFileW()
87 ms | CreateFileW()
98 ms CreateFileW()
98 ms | CreateFileW()
104 ms CreateFileW()
104 ms | CreateFileW()
137 ms CreateFileW()
137 ms | CreateFileW()
140 ms CreateFileW()
如果不修改js就如上面输出。实际上都要修改下使用,如下:
实例:跟踪twitter进程的recv read函数
frida-trace -i "recv*" -i "read*" *twitter*
recv: Auto-generated handler: …/recv.js
# (snip)
recvfrom: Auto-generated handler: …/recvfrom.js
Started tracing 21 functions. Press Ctrl+C to stop.
39 ms recv()
112 ms recvfrom()
128 ms recvfrom()
129 ms recvfrom()
得到的recv.js
{
onEnter: function onEnter(log, args, state) {
log("recvfrom()");
},
onLeave: function onLeave(log, retval, state) {
}
}
修改onEnter函数为
log("recvfrom(socket=" + args[0].toInt32()
+ ", buffer=" + args[1]
+ ", length=" + args[2].toInt32()
+ ", flags=" + args[3]
+ ", address=" + args[4]
+ ", address_len=" + Memory.readPointer(args[5]).toInt32()
+ ")");
得到如下日志
8098 ms recvfrom(socket=70,
buffer=0x32cc018, length=65536,
flags=0x0,
address=0xb0420bd8, address_len=16)
实例:拦截记事本进程打开文件并输出
C:\Users\Administrator>frida-trace -i "CreateFileW" -f c:\windows\system32\notepad.exe
Instrumenting functions...
CreateFileW: Loaded handler at "C:\Users\Administrator\__handlers__\KERNEL32.DLL\CreateFileW.js"
CreateFileW: Loaded handler at "C:\Users\Administrator\__handlers__\KERNELBASE.dll\CreateFileW.js"
Started tracing 2 functions. Press Ctrl+C to stop.
/* TID 0x3b4c */
133 ms CreateFileW()
133 ms CreateFileW()
134 ms CreateFileW()
。。。。。。。。。。。。。。。
修改CreateFileW.js,为
onEnter: function (log, args, state) {
log(Memory.readUtf16String(args[0]));
},
得到输出
1559303 ms C:\Users\Administrator\APPLIC~1\desktop.ini
/* TID 0x3b4c */
esources\Themes\Aero\Shell\NormalColor\ShellStyle.dll
esources\Themes\Aero\Shell\NormalColor\ShellStyle.dll
esources\Themes\Aero\Shell\NormalColor\ShellStyle.dll
esources\Themes\Aero\Shell\NormalColor\ShellStyle.dll
esources\Themes\Aero\Shell\NormalColor\ShellStyle.dll
/* TID 0x3824 */
1559314 ms C:\Users\Administrator\Contacts\desktop.ini
1559315 ms C:\Users\Administrator\Cookies\desktop.ini
/* TID 0x1a74 */
1559315 ms C:\Users\Administrator\Desktop\desktop.ini
1559316 ms C:\Users\Administrator\Desktop
1559316 ms C:\Users\Public\Desktop\desktop.ini
1559316 ms C:\Users\Public\Desktop
/* TID 0x3824 */

浙公网安备 33010602011771号