mirror of
https://github.com/overcuriousity/autopsy-flatpak.git
synced 2025-07-08 22:29:33 +00:00
156 lines
4.4 KiB
Perl
156 lines
4.4 KiB
Perl
#-----------------------------------------------------------
|
|
# svcdll.pl
|
|
#
|
|
# Change history
|
|
# 20131010 - added checks for Derusbi, hcdloader malware
|
|
# - ServiceDll value ends in .dat
|
|
# - ServiceDll with no path
|
|
# 20130603 - added alert functionality
|
|
# 20091104 - created
|
|
#
|
|
# Ref:
|
|
# http://msdn.microsoft.com/en-us/library/aa394073(VS.85).aspx
|
|
#
|
|
# Analysis Tip: Several services keys have Parameters subkeys that point to
|
|
# the ServiceDll value; During intrusions, a service key may be added to
|
|
# the system's Registry; this module provides a quick look, displaying the
|
|
# Service names (in malware, sometimes random) and the ServiceDll value,
|
|
# sorted based on the LastWrite time of the <service name>\Parameters subkey.
|
|
#
|
|
# copyright 2009 H. Carvey
|
|
#-----------------------------------------------------------
|
|
package svcdll;
|
|
use strict;
|
|
|
|
my %config = (hive => "System",
|
|
hasShortDescr => 1,
|
|
category => "autostart",
|
|
hasDescr => 0,
|
|
hasRefs => 0,
|
|
osmask => 22,
|
|
version => 20130603);
|
|
|
|
sub getConfig{return %config}
|
|
sub getShortDescr {
|
|
return "Lists Services keys with ServiceDll values";
|
|
}
|
|
sub getDescr{}
|
|
sub getRefs {}
|
|
sub getHive {return $config{hive};}
|
|
sub getVersion {return $config{version};}
|
|
|
|
my $VERSION = getVersion();
|
|
my ($dll, $name);
|
|
#my %types = (0x001 => "Kernel driver",
|
|
# 0x002 => "File system driver",
|
|
# 0x004 => "Adapter",
|
|
# 0x010 => "Own_Process",
|
|
# 0x020 => "Share_Process",
|
|
# 0x100 => "Interactive");
|
|
|
|
#my %starts = (0x00 => "Boot Start",
|
|
# 0x01 => "System Start",
|
|
# 0x02 => "Auto Start",
|
|
# 0x03 => "Manual",
|
|
# 0x04 => "Disabled");
|
|
|
|
sub pluginmain {
|
|
my $class = shift;
|
|
my $hive = shift;
|
|
::logMsg("Launching svcdll v.".$VERSION);
|
|
::rptMsg("svcdll v.".$VERSION); # banner
|
|
::rptMsg("(".getHive().") ".getShortDescr()."\n"); # banner
|
|
my $reg = Parse::Win32Registry->new($hive);
|
|
my $root_key = $reg->get_root_key;
|
|
# First thing to do is get the ControlSet00x marked current...this is
|
|
# going to be used over and over again in plugins that access the system
|
|
# file
|
|
my $current;
|
|
my $key_path = 'Select';
|
|
my $key;
|
|
if ($key = $root_key->get_subkey($key_path)) {
|
|
$current = $key->get_value("Current")->get_data();
|
|
my $ccs = "ControlSet00".$current;
|
|
my $s_path = $ccs."\\Services";
|
|
my $svc;
|
|
my %svcs;
|
|
if ($svc = $root_key->get_subkey($s_path)) {
|
|
|
|
# Get all subkeys and sort based on LastWrite times
|
|
my @subkeys = $svc->get_list_of_subkeys();
|
|
if (scalar (@subkeys) > 0) {
|
|
foreach my $s (@subkeys) {
|
|
$name = $s->get_name();
|
|
|
|
eval {
|
|
$dll = $s->get_subkey("Parameters")->get_value("ServiceDll")->get_data();
|
|
my $str = $name." -> ".$dll;
|
|
push(@{$svcs{$s->get_timestamp()}},$str) unless ($str eq "");
|
|
};
|
|
}
|
|
|
|
foreach my $t (reverse sort {$a <=> $b} keys %svcs) {
|
|
::rptMsg(gmtime($t)."Z");
|
|
foreach my $item (@{$svcs{$t}}) {
|
|
::rptMsg(" ".$item);
|
|
|
|
alertCheckPath($item);
|
|
alertCheckADS($item);
|
|
}
|
|
::rptMsg("");
|
|
}
|
|
}
|
|
else {
|
|
::rptMsg($s_path." has no subkeys.");
|
|
}
|
|
}
|
|
else {
|
|
::rptMsg($s_path." not found.");
|
|
}
|
|
}
|
|
else {
|
|
::rptMsg($key_path." not found.");
|
|
}
|
|
}
|
|
#-----------------------------------------------------------
|
|
# alertCheckPath()
|
|
#-----------------------------------------------------------
|
|
sub alertCheckPath {
|
|
my $path = shift;
|
|
my $lcpath = $path;
|
|
$lcpath =~ tr/[A-Z]/[a-z]/;
|
|
|
|
my @alerts = ("recycle","globalroot","temp","system volume information","appdata",
|
|
"application data","wbem");
|
|
|
|
foreach my $a (@alerts) {
|
|
if (grep(/$a/,$path)) {
|
|
::alertMsg("ALERT: svcdll: ".$a." found in path: ".$path);
|
|
}
|
|
}
|
|
|
|
if ($lcpath =~ m/\.dat$/) {
|
|
::alertMsg("ALERT: svcdll: Possible Derusbi infection: ".$path);
|
|
}
|
|
|
|
if ($lcpath =~ m/\raswmi\.dll$/) {
|
|
::alertMsg("ALERT: svcdll: Possible hcdloader infection: ".$path);
|
|
}
|
|
|
|
my @list = split(/\\/,$path);
|
|
if (scalar(@list) < 3) {
|
|
::alertMsg("ALERT: svcdll: Relative path detected: ".$path);
|
|
}
|
|
}
|
|
|
|
#-----------------------------------------------------------
|
|
# alertCheckADS()
|
|
#-----------------------------------------------------------
|
|
sub alertCheckADS {
|
|
my $path = shift;
|
|
my @list = split(/\\/,$path);
|
|
my $last = $list[scalar(@list) - 1];
|
|
::alertMsg("ALERT: svcdll: Poss. ADS found in path: ".$path) if grep(/:/,$last);
|
|
}
|
|
|
|
1; |