text
stringlengths 4
429
|
---|
As per MSDN documentation7, METHOD_NEITHER is a special transfer type when Input/Output Request Packet (IRP) supplies the |
user-mode virtual addresses of the input and output buffers, without validating or mapping them. |
http://www.codeproject.com/Articles/28318/Bypassing-PatchGuard-3 |
http://uninformed.org/index.cgi?v=3&a=3&p=17 |
http://www.coresecurity.com/content/virtualbox-privilege-escalation-vulnerability |
http://msdn.microsoft.com/en-us/library/windows/hardware/ff543023(v=vs.85).aspx |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 22 |
It is the responsibility of the driver to validate the addresses sent from user mode in order to make sure those addresses are valid |
usermode addresses. |
The source code of the vulnerable driver (shown below) demonstrates how the integer value of the rc variable is first derived from |
the input parameters pDevObj (device object) and pIrp (request packet). Next, that integer value is written into the UserBuffer - an |
arbitrary address, pointed by the input parameter pIrp (request packet). As there are no validations made for the UserBuffer an |
attacker can craft such input parameters that will define address within kernel memory to patch and the data to patch it with: |
01 /** |
02 * Device I/O Control entry point. |
03 * |
04 * @param pDevObj Device object. |
05 * @param pIrp Request packet. |
06 */ |
07 NTSTATUS _stdcall VBoxDrvNtDeviceControl(PDEVICE_OBJECT pDevObj, PIRP pIrp) |
08 { |
09 PSUPDRVDEVEXT pDevExt = (PSUPDRVDEVEXT)pDevObj->DeviceExtension; |
10 PIO_STACK_LOCATION pStack = IoGetCurrentIrpStackLocation(pIrp); |
11 PSUPDRVSESSION pSession = (PSUPDRVSESSION)pStack->FileObject->FsContext; |
12 |
13 ULONG ulCmd = pStack->Parameters.DeviceIoControl.IoControlCode; |
14 |
15 if ( ulCmd == SUP_IOCTL_FAST_DO_RAW_RUN |
16 || ulCmd == SUP_IOCTL_FAST_DO_HWACC_RUN |
17 || ulCmd == SUP_IOCTL_FAST_DO_NOP) |
18 { |
19 int rc; |
20 |
... |
21 rc = supdrvIOCtlFast(ulCmd, pDevExt, pSession); |
22 |
23 |
// supdrvIOCtlFast() function itself will return: |
24 |
// pDevExt->pfnVMMR0EntryFast(pSession->pVM, SUP_VMMR0_DO_NOP); |
25 |
// the function depends pDevExt and pSession, which in turn |
26 |
// are derived from the input parameters pDevObj and pIrp |
27 // therefore, rc value can be manipulated |
28 __try |
29 { |
30 // save the manipulated rc value back into |
31 *(int *)pIrp->UserBuffer = rc; // the input parameter (the address to patch) |
32 } |
33 __except(EXCEPTION_EXECUTE_HANDLER) |
34 { |
35 ... |
36 } |
37 } |
38 } |
Now that the vulnerable driver can be used as a weapon to patch kernel memory, all the malware needs to do is to patch the content |
of the variable nt!g_CiEnabled, a boolean variable |
Code Integrity Enabled |
that marks whether the system was booted in |
WinPE mode. |
When running in WinPE mode there is no Code Integrity control, therefore by enabling this mode by patching only one bit, |
Code Integrity verification is disabled so that the unsigned 64-bit driver can be loaded. |
This variable is used within the function SepInitializeCodeIntegrity(), implemented within CI.dll |
s function |
CiInitialize() and imported by the NT core (ntoskrnl.exe). In order to find the variable in kernel memory, the Snake |
dropper loads a copy of the NT core image (ntoskrnl.exe), locates the import of CI.dll |
s function CiInitialize(), and then |
SepInitializeCodeIntegrity() within it. Then it parses the function |
s code to locate the offset of the variable. |
Once located, the content of the variable nt!g_CiEnabled is patched in kernel memory and the 64-bit unsigned driver is loaded. |
This explains why Snake dropper registers itself as a service to start each time Windows starts: in order to install the vulnerable |
VBox driver first, then pass it a malformed structure to disable Code Integrity control with a DeviceIoControl() API call, and |
finally, load the driver. |
In order to be able to perform the steps above, the dropper must first obtain Administrator privileges. It attempts to do this by |
running MS09-025 and MS10-015 exploits on the target system. These exploits are bundled within the dropper in its resource |
section as executable files. Other resources embedded within the dropper are the 32-bit and 64-bit builds of its driver, a tool for |
creating NTFS file systems, and the initial message queue file which is written into the virtual volume. The message queue file |
contains configuration data and the libraries that will be injected into usermode processes. |
BAE Systems Applied Intelligence: Snake Rootkit Report 2014 23 |
USERMODE DLLS |
The usermode DLLs injected by the kernel-mode driver into the userland system process (e.g. explorer.exe) are: |
32-bit Windows OS: |
rkctl_Win32.dll |
inj_snake_Win32.dll |
64-bit Windows OS: |
rkctl_x64.dll |
inj_snake_x64.dll |
The rkctl_Win32.dll/rkctl_x64.dll module uses the following hard-coded named pipe for communications: |
\\.\pipe\services_control |
The remote commands it receives appear to be designed to control other components of Snake: |
tc_cancel |
tc_free_data |
config_read_uint32 |
tc_get_reply |
tr_free |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.