frida hook工具使用——用于os api注入分析还是不错的

准备:

pip install frida

pip install frida-tools

 

开始:

1、创建child-gating1.py

import os
import threading

from frida_tools.application import Reactor

import frida

import argparse


class Application:
    def __init__(self, log_location):
        self.fpath = ""
        self.log = log_location
        
        self._stop_requested = threading.Event()
        self._reactor = Reactor(run_until_return=lambda reactor: self._stop_requested.wait())

        self._device = frida.get_local_device()
        self._sessions = set()

        self._device.on("child-added", lambda child: self._reactor.schedule(lambda: self._on_child_added(child)))
        self._device.on("child-removed", lambda child: self._reactor.schedule(lambda: self._on_child_removed(child)))
        self._device.on("output", lambda pid, fd, data: self._reactor.schedule(lambda: self._on_output(pid, fd, data)))

    def run(self, fp):
        self.fpath = fp
        self._reactor.schedule(lambda: self._start())
        self._reactor.run()

    def _start(self):
        """
        argv = ["/bin/sh", "-c", "cat /etc/hosts"]
        env = {
            "BADGER": "badger-badger-badger",
            "SNAKE": "mushroom-mushroom",
        }
        """
        #f = "C:\\Users\\Administrator\\Desktop\\测试用例\\TN0940\\notepad.exe"
        #f = "C:\\Users\\Administrator\\Desktop\\fritest\\TN0940_1.exe"
        print("✔ spawn(f={})".format(self.fpath))
        pid = self._device.spawn(self.fpath)
        self._instrument(pid)

    def _stop_if_idle(self):
        if len(self._sessions) == 0:
            self._stop_requested.set()

    def _instrument(self, pid):
        print(f"✔ attach(pid={pid})")
        session = self._device.attach(pid)
        session.on("detached", lambda reason: self._reactor.schedule(lambda: self._on_detached(pid, session, reason)))
        print("✔ enable_child_gating()")
        session.enable_child_gating()
        print("✔ create_script()")
        script = session.create_script(
            """
Interceptor.attach(Module.findExportByName("kernel32.dll", "CreateFileW"), {
  onEnter: function (args) {
    //var fileNamePtr = args[0];
    //var fileName = Memory.readUtf16String(fileNamePtr);
    //send(fileName)
    send({
      type: 'CreateFileW',
      path: Memory.readUtf16String(args[0])
    });
  }
});
"""
        )
        script.on("message", lambda message, data: self._reactor.schedule(lambda: self._on_message(pid, message)))
        print("✔ load()")
        script.load()
        print(f"✔ resume(pid={pid})")
        self._device.resume(pid)
        self._sessions.add(session)

    def _on_child_added(self, child):
        print(f"⚡ child_added: {child}")
        self._instrument(child.pid)

    def _on_child_removed(self, child):
        print(f"⚡ child_removed: {child}")

    def _on_output(self, pid, fd, data):
        print(f"⚡ output: pid={pid}, fd={fd}, data={repr(data)}")

    def _on_detached(self, pid, session, reason):
        print(f"⚡ detached: pid={pid}, reason='{reason}'")
        self._sessions.remove(session)
        self._reactor.schedule(self._stop_if_idle, delay=0.5)

    def _on_message(self, pid, message):
        print(f"⚡ message: pid={pid}, payload={message['payload']}")
        
        with open(self.log, 'a') as f:
            f.write(str(message.get('payload'))+'\n')
        

def log_loc(fpath, log_dir):
    malware_name = os.path.basename(fpath)[:-4]
    return os.path.join(log_dir, malware_name+".log")
    
  
parser = argparse.ArgumentParser(description='Frida demo.')
parser.add_argument("-f", "--file", help="target file to run", required=True)
parser.add_argument("-l", "--log", help="log location", required=True)
args, unknown = parser.parse_known_args()

app = Application(log_loc(fpath=args.file, log_dir=args.log))
app.run(args.file)

# sample run:
# python .\child-gating1.py -f ‪"C:\\Users\\source\\repos\\test_file_write\\Debug\\test_file_write.exe" -l read_file.log  

  

vs里创建一个测试exe,test_file_write:

#include <windows.h>
#include <stdio.h>

int main()
{
	HANDLE h = CreateFile(
		"bar.txt",
		GENERIC_READ | GENERIC_WRITE,
		0,
		NULL,
		CREATE_NEW,
		FILE_ATTRIBUTE_TEMPORARY,
		NULL);

	if (h == INVALID_HANDLE_VALUE) {
		DWORD err = GetLastError();
		printf("err %d\n", err);
		return 1;
	}

	printf("%p\n", h);

	return 0;
}

  

然后运行:

python .\child-gating1.py -f "C:\\Users\\source\\repos\\test_file_write\\Debug\\test_file_write.exe" -l log
✔ spawn(f=C:\\Users\\l00379637\\source\\repos\\test_file_write\\Debug\\test_file_write.exe)
✔ attach(pid=31252)
✔ enable_child_gating()
✔ create_script()
✔ load()
✔ resume(pid=31252)
err 80
⚡ message: pid=31252, payload={'type': 'CreateFileW', 'path': 'bar.txt'}
⚡ detached: pid=31252, reason='process-terminated'

  

可以看到

CreateFileW
OS API被hook获取了调用参数。

如果要hook其他API,修改JS部分代码即可:

Interceptor.attach(Module.findExportByName("kernel32.dll", "CreateFileW"), {
  onEnter: function (args) {
    //var fileNamePtr = args[0];
    //var fileName = Memory.readUtf16String(fileNamePtr);
    //send(fileName)
    send({
      type: 'CreateFileW',
      path: Memory.readUtf16String(args[0])
    });
  }
});

  

 

其他使用:frida-trace动态跟踪工具,类似于strace

frida-trace -i "CreateFileW" -f c:\windows\system32\notepad.exe
Instrumenting...
CreateFileW: Auto-generated handler at "D:\\source\\__handlers__\\KERNEL32.DLL\\CreateFileW.js"
CreateFileW: Auto-generated handler at "D:\\source\\__handlers__\\KERNELBASE.dll\\CreateFileW.js"
Started tracing 2 functions. Press Ctrl+C to stop.
/* TID 0x31a0 */
70 ms CreateFileW()
70 ms | CreateFileW()
77 ms CreateFileW()
77 ms | CreateFileW()
87 ms CreateFileW()
87 ms | CreateFileW()
98 ms CreateFileW()
98 ms | CreateFileW()
104 ms CreateFileW()
104 ms | CreateFileW()
137 ms CreateFileW()
137 ms | CreateFileW()
140 ms CreateFileW()

如果不修改js就如上面输出。实际上都要修改下使用,如下:

 

实例:跟踪twitter进程的recv read函数
frida-trace -i "recv*" -i "read*" *twitter*
recv: Auto-generated handler: …/recv.js
# (snip)
recvfrom: Auto-generated handler: …/recvfrom.js
Started tracing 21 functions. Press Ctrl+C to stop.
    39 ms       recv()
   112 ms       recvfrom()
   128 ms       recvfrom()
   129 ms       recvfrom()
得到的recv.js
{
onEnter: function onEnter(log, args, state) {
        log("recvfrom()");
},
onLeave: function onLeave(log, retval, state) {
}
}
修改onEnter函数为
log("recvfrom(socket=" + args[0].toInt32()
    + ", buffer=" + args[1]
    + ", length=" + args[2].toInt32()
    + ", flags=" + args[3]
    + ", address=" + args[4]
    + ", address_len=" + Memory.readPointer(args[5]).toInt32()
+ ")");
得到如下日志
  8098 ms       recvfrom(socket=70,
                         buffer=0x32cc018, length=65536,
                         flags=0x0,
                         address=0xb0420bd8, address_len=16)

实例:拦截记事本进程打开文件并输出
C:\Users\Administrator>frida-trace -i "CreateFileW" -f c:\windows\system32\notepad.exe
Instrumenting functions...
CreateFileW: Loaded handler at "C:\Users\Administrator\__handlers__\KERNEL32.DLL\CreateFileW.js"
CreateFileW: Loaded handler at "C:\Users\Administrator\__handlers__\KERNELBASE.dll\CreateFileW.js"
Started tracing 2 functions. Press Ctrl+C to stop.
           /* TID 0x3b4c */
   133 ms  CreateFileW()
   133 ms  CreateFileW()
   134 ms  CreateFileW()
。。。。。。。。。。。。。。。
修改CreateFileW.js,为
    onEnter: function (log, args, state) {
        log(Memory.readUtf16String(args[0]));
},
得到输出
1559303 ms  C:\Users\Administrator\APPLIC~1\desktop.ini
           /* TID 0x3b4c */
esources\Themes\Aero\Shell\NormalColor\ShellStyle.dll
esources\Themes\Aero\Shell\NormalColor\ShellStyle.dll
esources\Themes\Aero\Shell\NormalColor\ShellStyle.dll
esources\Themes\Aero\Shell\NormalColor\ShellStyle.dll
esources\Themes\Aero\Shell\NormalColor\ShellStyle.dll
           /* TID 0x3824 */
1559314 ms  C:\Users\Administrator\Contacts\desktop.ini
1559315 ms  C:\Users\Administrator\Cookies\desktop.ini
           /* TID 0x1a74 */
1559315 ms  C:\Users\Administrator\Desktop\desktop.ini
1559316 ms  C:\Users\Administrator\Desktop
1559316 ms  C:\Users\Public\Desktop\desktop.ini
1559316 ms  C:\Users\Public\Desktop
           /* TID 0x3824 */

 

posted @ 2023-07-11 12:06  bonelee  阅读(221)  评论(0编辑  收藏  举报