-
Notifications
You must be signed in to change notification settings - Fork 266
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Req: -closemon2: detection for new modules loaded after loading pd64.exe -closemon #17
Comments
Batch file:
|
Thanks Rugabunda. When process dump runs in the "-closemon" mode it only dumps processes as they close. This includes all processes it has privilege level to hook, which includes processes that were running before ProcessDump started running. Generally, the recommended sandbox usage of ProcessDump to make sure you dump everything is:
I think this last step is what you're missing! So your scheduled task should also run "pd64.exe -system" at the end of the detonation to dump all malware components from currently running processes.. |
Thank you glmcdona, the problem is that -system is a one time only run, and -closemon does not hook newly created processes nor dump based on cleanhash. What I am suggesting is consider creating another commandline that allows system like dumping that constantly dumps unhashed processes in realtime, until it is closed. This is more of a transparent honeytrap for unknown zero day malware, rather than personal testing. This could be incredibly useful for dumping non persistent and zero day malware that usually don't leave a trace. Can you do that? |
Thanks rugabunda. RE: -closemon does not hook newly created processes nor dump based on cleanhash. The '-closemon' flag searches frequently for any new processes and does hook their process terminate too :) RE: What I am suggesting is consider creating another commandline that allows system like dumping that constantly dumps unhashed processes in realtime, until it is closed. This is more of a transparent honeytrap for unknown zero day malware, rather than personal testing. This could be incredibly useful for dumping non persistent and zero day malware that usually don't leave a trace. Can you do that? That's a great idea and an interesting way of running the tool that I hadn't considered. I think adding another command-line flag to periodically run a full system dump of unknown modules, and adding any new modules automatically to the known hashes (so it doesn't repeatedly dump the same module over and over) would be a fairly easy change! I'll see what I can do, or if you like I can point to the parts of the code I'd recommend changing to implement this, and maybe you could create a pull request? |
I have never coded before, but I would be interested in looking at it and see what I can learn in the process. There is a first time for everything. Would not adding any new modules automatically constitute a security risk? Could you clarify for me. Would it not be better to create a second hash file for that purpose just for this particular command line? Along side a periodic dump, a realtime dump of unknown modules would be even more powerful. If you used similar method as closemon, though only dumping unknown modules, that would be most effective for locating zero day malware, don't you think? This is really an amazing little program you have here, it should be part of the sysinternals suite. Have you found anything else out there like it? |
An option to dump closed modules that were loaded AFTER -closemon was initiated would be great for detecting and dumping modules... it seems this program only hooks and dumps modules that were loaded at the time closemon was initiated.
what do you think, should this be most effective for detecting malware if it only dumped unhashed modules?
Great little program! This thing is very useful.
The text was updated successfully, but these errors were encountered: