PE-sieve
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
Loading...
Searching...
No Matches
workingset_scanner.h
Go to the documentation of this file.
1#pragma once
2
3#include <windows.h>
4#include <psapi.h>
5#include <map>
6
7#include <peconv.h>
9#include "mempage_data.h"
10#include "scan_report.h"
11
15#include "process_details.h"
16
17#define CALC_PAGE_STATS
18#ifdef CALC_PAGE_STATS
21#endif
22
23#include <sig_finder.h>
24
25namespace pesieve {
26
29 {
30 public:
33 {
34 is_executable = false;
35 is_listed_module = false;
36 protection = 0;
37 has_pe = false; //not a PE file
38 has_shellcode = true;
39 mapping_type = 0;
42 }
43
44 const virtual bool toJSON(std::stringstream &outs, size_t level, const pesieve::t_json_level &jdetails)
45 {
46 OUT_PADDED(outs, level, "\"workingset_scan\" : {\n");
48 outs << "\n";
49 OUT_PADDED(outs, level, "}");
50 return true;
51 }
52
53 const virtual void fieldsToJSON(std::stringstream &outs, size_t level, const pesieve::t_json_level &jdetails)
54 {
56 outs << ",\n";
57 OUT_PADDED(outs, level, "\"has_pe\" : ");
58 outs << std::dec << has_pe;
59 outs << ",\n";
60 OUT_PADDED(outs, level, "\"has_shellcode\" : ");
61 outs << std::dec << has_shellcode;
62 if (!is_executable) {
63 outs << ",\n";
64 OUT_PADDED(outs, level, "\"is_executable\" : ");
65 outs << std::dec << is_executable;
66 }
67 outs << ",\n";
68 OUT_PADDED(outs, level, "\"is_listed_module\" : ");
69 outs << std::dec << is_listed_module;
70 outs << ",\n";
71 OUT_PADDED(outs, level, "\"protection\" : ");
72 outs << "\"" << std::hex << protection << "\"";
73 outs << ",\n";
74 OUT_PADDED(outs, level, "\"mapping_type\" : ");
75 outs << "\"" << translate_mapping_type(mapping_type) << "\"";
77 outs << ",\n";
78 OUT_PADDED(outs, level, "\"mapped_name\" : ");
80 }
82#ifdef CALC_PAGE_STATS
83 if (stats.isFilled()) {
84 outs << ",\n";
86 if (area_info.hasAnyMatch()) {
87 outs << ",\n";
89 }
90 }
91#endif
92 }
93
94 size_t generateTags(const std::string &reportPath);
95
98 bool has_pe;
100
102 std::vector<sig_finder::Match> custom_matched;
105#ifdef CALC_PAGE_STATS
108#endif
111 std::string mapped_name; //if the region is mapped from a file
112
113 protected:
114 static std::string translate_mapping_type(DWORD type)
115 {
116 switch (type) {
117 case MEM_PRIVATE: return "MEM_PRIVATE";
118 case MEM_MAPPED: return "MEM_MAPPED";
119 case MEM_IMAGE: return "MEM_IMAGE";
120 }
121 return "unknown";
122 }
124
125 const void patternsToJSON(std::stringstream& outs, size_t level, const pesieve::t_json_level& jdetails)
126 {
127 if (!all_matched_count) {
128 return;
129 }
130 outs << ",\n";
131 OUT_PADDED(outs, level, "\"patterns\" : {\n");
132 const size_t level2 = level + 1;
133 OUT_PADDED(outs, level2, "\"total_matched\" : ");
134 outs << std::dec << all_matched_count;
135 if (custom_matched.size()) {
136 outs << ",\n";
137 OUT_PADDED(outs, level2, "\"custom_matched\" : ");
138 outs << std::dec << custom_matched.size();
139 }
140 outs << "\n";
141 OUT_PADDED(outs, level, "}");
142 }
143 };
144
145
176
177}; //namespace pesieve
virtual const bool toJSON(std::stringstream &outs, size_t level)
Definition stats.h:49
A base class of all the reports detailing on the output of the performed module's scan.
virtual const bool _toJSON(std::stringstream &outs, size_t level=JSON_LEVEL, const pesieve::t_json_level &jdetails=JSON_BASIC)
A base class for all the scanners checking appropriate process' features.
The report aggregating the results of the performed scan.
Definition scan_report.h:19
A report from the working set scan, generated by WorkingSetScanner.
std::vector< sig_finder::Match > custom_matched
const void patternsToJSON(std::stringstream &outs, size_t level, const pesieve::t_json_level &jdetails)
static std::string translate_mapping_type(DWORD type)
virtual const bool toJSON(std::stringstream &outs, size_t level, const pesieve::t_json_level &jdetails)
size_t generateTags(const std::string &reportPath)
virtual const void fieldsToJSON(std::stringstream &outs, size_t level, const pesieve::t_json_level &jdetails)
WorkingSetScanReport(HMODULE _module, size_t _moduleSize, t_scan_status status)
A scanner for detection of code implants in the process workingset.
WorkingSetScanReport * scanExecutableArea(MemPageData &memPageData)
bool isPotentiallyExecutable(MemPageData &memPageData, const t_data_scan_mode &mode)
ProcessScanReport & processReport
const process_details pDetails
bool checkAreaContent(IN MemPageData &_memPage, OUT WorkingSetScanReport *my_report)
bool isScannedAsModule(MemPageData &memPageData)
WorkingSetScanner(HANDLE _procHndl, process_details _proc_details, const util::mem_region_info _mem_region, pesieve::t_params _args, ProcessScanReport &_process_report)
const util::mem_region_info memRegion
bool scanImg(MemPageData &memPage)
bool isExecutable(MemPageData &memPageData)
virtual WorkingSetScanReport * scanRemote()
#define OUT_PADDED(stream, field_size, str)
Definition format_util.h:12
std::string escape_path_separators(std::string path)
Definition path_util.cpp:27
size_t fill_iat(BYTE *vBuf, size_t vBufSize, IN const peconv::ExportsMapper *exportsMap, IN OUT IATBlock &iat, IN ThunkFoundCallback *callback)
Definition iat_finder.h:31
enum pesieve::module_scan_status t_scan_status
virtual const bool toJSON(std::stringstream &outs, size_t level)