{{ message }}

# anatolikalysch / VMAttack

VMAttack PlugIn for IDA Pro

Switch branches/tags
Nothing to show

## Latest commit

README Markdown format suggestion
67dcce6

## Files

Failed to load latest commit information.
Type
Name
Commit time
Aug 20, 2017

# VMAttack IDA PRO Plugin

IDA Pro Plugin for static and dynamic virtualization-based packed analysis and deobfuscation.

VMAttack was awarded the second place at the annual IDA Pro Plug-in Contest in 2016!

## Introduction

VMAttack is an IDA PRO Plug-in which enables the reverse engineer to use additional analysis features designed to counter virtualization-based obfuscation. For now the focus is on stack based virtual machines, but will be broadened to support more architectures in the future. The plugin supports static and dynamic analysis capabilities which use IDA API features in conjunction with the plugins own analysis capabilities to provide automatic, semi-automatic and manual analysis functionality. The main goal of this plugin is to assist the reverse engineer in undoing the virtualization-based obfuscation and to automate the reversing process where possible.

## Installation

### Prerequisites

• IDA Pro >= 6.6

• Python 2.7.10/.11

• Tested with Windows 7 and Windows 10.

### Guided Install

To install the plugin simply run the setup.py:

python setup.py install

You will be prompted for the full path to your IDA PRO installation, aside from that no user interaction should be required.

### Alternative manual Install:

Should the guided install fail for any reason a manual installation is also possible.

The only required python dependencies are distorm3 and idacute which can be installed via pip:

pip install distorm3 idacute

Next the Windows environment variable should be set:

setx VMAttack X:full\path\to\plugin


Last you should copy the VMAttack_plugin_stub.py into your IDA PRO Plugins directory. That's it, now you're good to go!

### Possible Issues

• Unable to find vcvarsall.bat => you need to install 'Microsoft Visual C++ Compiler for Python 2.7'

## Quick start guide

The Example folder contains the obfuscated binary and source binary of an add function. The obfuscated addvmp contains the VM function which we will analyze now.

After a quick glance over the binary we see the simple structure: two arguments, 0AFFE1 and 0BABE5 are deployed on the stack and then a stub is called.

The stub starts the virtual machine function with a reference to the start of the VM byte code pushed onto the stack.

Following the address we see the virtual machine function which is basically an interpreter for the received byte code.

A solution to this obfuscation would be the reversal of the interpreter and the interpretation of the byte code by the reverse engineer. Due to the time consuming nature of this task we will try to reverse the binary with our VMAttack plugin.

Lets assume we have a more complicated function and the grading analysis did not lead us to the relevant instructions. One of the semi-automated analysis capabilities could present a viable alternative or even show us which analysis function failed the grading system. The input/output analysis could provide leads as to how the input arguments of the VM function are used and whether there is a connection between function input and function output. By checking the two input values AFFE1 and BABE5 and additionally the output value 16ABC6 it becomes evident which register contains the important instructions for our obfuscated function and how the eax return value came to be 16ABC6 (=AFFE1+BABE5).

Another powerful functionality is the clustering analysis. It enables the reverse engineer to quickly discern between repeating instructions and unique ones. The clustering analysis view additionally enables quick removal of unnecessary clusters (or instructions) in a way speeding up the work of the reverse engineer. Should a mistake be made it can be undone or alternatively the original trace can be restored. To make sense of the clustering analysis usually requires an extensive analysis of the trace and can require repeating the clustering analysis with a different cluster heuristic value set via settings.

Out of the semi-automatic analysis the optimization analysis requires the most user interaction. In turn it enables:

• Optimizations which make the trace easier to read or even filter as unnecessary recognized instructions.
• Filtering capabilities to remove as unnecessary recognized instructions or even whole registers from the trace.
• Undoing actions if you made a mistake.
• Restoring the initial trace if you hit a wall.

The static analysis in this case would enable us to analyze the byte code and optionally view the analysis as an abstract VM graph of the byte code. The static deobfuscation of the byte code will produce comments behind relevant bytes to describe the operation this byte produces. The commented instructions are quite intuitive and should be easy to read. The abstract VM graph in turn will produce a control flow graph (in the case of addvmp just one basic block) filled with those abstract instructions from the byte code. This is also a good example of the accuracy of the static analysis, which without execution delivered an accurate representation of the initial deobfuscated function. After the static analysis we can clearly see that two arguments were passed to the function (AOS = acces out of known space; indicates for example arguments passed via stack) and that they were eventually added together and then returned.

## Analysis Capabilities

The following subsection describes the analysis functions and offers additional information about the plugins inner workings. A quick start guide can be found in the next subsection.

The analysis features are subdivided into automatic, semi-automatic and manual, depending on user interaction necessary for the completion of the analysis. While the automatic analysis requires nearly none, manual analysis capabilities require interaction and will query the user if needed.

### Instruction Trace

For the dynamic analysis capabilities of the plugin the use of an instruction trace is necessary. If you want to quickly check whether you already have a trace you can use the Show Trace feature. It will print your current trace in IDAs output window or nothing if you don't have a trace. But how can you actually get one? The two currently supported possibilities are to either generate an instruction trace or to load one from file:

• Trace generation requires a working IDA debugger(e.g. Win32 DBG or Bochs DBG) and uses the IDA debugger API to generate an instruction trace. Visited basic blocks and instructions are colored in a shade of blue (color can be removed afterwards via Remove Colors from Graph). During the execution function arguments are extracted, if not deactivated via settings.

• Alternatively an instruction trace can be loaded from file. Currently supported file types are .txt files exported from IDAs trace window and .json files saved via VMAttack. OllyDbg and ImmunityDbg generated .txt trace files are supported but are currently more limited in the available analysis capabilities.

A reverse engineer can decide to save an analyzed trace as a .json file which can be loaded later on to continue analysis. This provides a convenient way to experiment on traces and combine different analysis together for improved results.

### What is a trace?

In the plugin context a trace is a list object consisting of trace lines. Each trace line consists of four basic values:

• The address of the instruction
• The instruction
• The CPU Context after execution

additionally a VMAttack trace line can contain:

• A stack comment

These are explained later in their respective analysis sections. Each time a trace is presented in one of the plugins custom viewers, at least the four basic values will be available to ensure readability.

For more information see dynamic/TraceRepresentation.py

### Automated Analysis

• Double clicking a grade declares it as threshold and will remove all lines with a lower grade

• CCM Set grades threshold...: only grades >= threshold will be displayed
• CCM Show All: display all trace lines
• CCM Export this trace: save analysis result as .json file

### Semi-Automatic Analysis

#### Static Analysis

Create Abstract VM Graph

The abstract VM graph is an abstraction of how the control flow graph for the obfuscated function might look like. It is populated with instructions from the deobfuscated VM byte code and thus will require the previous execution of the static deobfuscate function. If static deobfuscate was not executed before it will be shortly before graph creation.

Static deobfuscate

The static deobfuscate function tries to statically determine the instructions that will be executed by the byte code in the provided virtual machine function. The semi-automatic version of this analysis tries to determine all necessary values(byte code start, byte code end, jmp table base address, vm function start) automatically. In the event of a mismatch the reverse engineer will be prompted for a decision. For example in this case the plugin determined the start of the bytecode to be at 0x40489c, while the parameter for the function was 0x40489a. This triggered a mismatch and the user is prompted with a decision which value should be used. In this case the function parameter 0x40489a was indeed the start and should have been used as byte code start value.

Another possibility where user interaction might become necessary, is when byte code is separated by useful executable instructions. In this example one could stop the deobfuscation at 0x4048f7 by choosing 'No' and input in the next prompt Where should deobfuscation continue? the address right after the instructions 0x404901, as it is safe.

#### Dynamic Analysis

Dynamic Trace Optimization

The trace optimizations viewer provides a way to dynamically interact with the trace. On one hand it allows the user to filter often occurring instructions or even remove whole register interactions from the trace, on the other it allows for powerful optimizations to be applied to the trace.

Constant Propagation: Constants are propagated where possible. This means registers are switched with their values and offsets which can be computed will be computed.

Operation Standardization (folding): A weaker version of the peephole optimization which standardizes certain operations.

Unused Operand Folding (folding): Operands that are not used in later execution steps are purged from the trace.

Peephole (folding): The trace is traversed for specific patterns which are then replaced or deleted if deemed unnecessary.

Propagations should be always save to use, as they do not leave out anything. Foldings should be used with care, as they leave out lines deemed unuseful and as such might leave out too much.

These optimizations are a very important foundation of this plugin, as most other analysis functions use or even require one or more of these optimizations to be executed on the trace prior to their analysis.

For easier interaction with the trace the optimization viewer provides trace line removal by double click and a custom context menu(CCM):

• CCM Undo: Undo change
• CCM Restore original trace: restore the original trace
• CCM Open in Clustering analysis: send the current file to clustering analysis
• CCM Export this trace: save analysis result as .json file

To filter whole registers (e.g. eax) from the trace lines toggle the according check box by the register name.

VM Input / Output Analysis

The Input / Output Analysis provides essentially a black box analysis. For each register, starting at the output value of the virtual machine function a backtrack of how this value came to be will extract the relevant trace lines. If you are interested in a specific output value and want to know how this value came to be this is the goto function. As an example lets assume we are interested in the value of the eax register. First the function will backtrack to which stack address the value in eax was mapped. Then the backtracking will continue, to determine, whether the value on the stack is a result of a calculation and if it is the backtracking will start recursively for the calculation values. Every trace line along the way which contains the result value or the components will be added to the registers input/output trace.

By checking the check boxes of the values the viewer adds colorization to them:

• Rust red: input values
• Violet: output values
• Olive: both

Colorization takes into account not only values used in the disasm section but also the CPU context!

If a register turns olive it is an indication, that its trace lines contain both a input and an output parameter. This means the register handles both the selected input and output values and either computations take place or the values are part of the trace lines CPU context.

Clustering Analysis

The main goal of the clustering analysis is to divide the instruction trace into clusters(=repeating instructions) and singles(=non-repeating instructions). The default declares a cluster if an address is encountered more than two times however this can be changed via settings by changing the value for cluster heuristic. After successful analysis the reverse engineer is presented with an instruction trace with single instructions and clusters. If basic block detection was not deactivated in the settings, the clusters themselves are additionally subdivided into basic blocks. Each basic block is shown as a one line summary. The basic block description consists of the basic block position inside the cluster, the start and end addresses and an instruction and stack change summary. While the stack change summary will contain all stack changes which took place during this basic block, instructions are only shown, if their value is used later or it is unclear whether their value is used. Instructions whose computations are simply overridden are not displayed in the basic block summary. Alternatively the basic block subdivision can be deactivated in the settings menu. After reloading the trace (or any removal action in the cluster viewer) the basic blocks will be gone and a cluster will only consist of its trace lines.

To increase interactivity the clustering viewer provides trace line and cluster removal by double click and a custom context menu(CCM):

• CCM Remove X: Remove a line / cluster / basic block.
• CCM Remove several clusters...: remove the X clusters with most occurrence. For example a threshold of 3 removes the 3 most common clusters.
• CCM Undo: Undo change
• CCM Restore original trace: restore the original trace
• CCM Export this trace: save analysis result as .json file

Aside from the clustering viewer the clustering analysis also opens a second viewer. The stack changes viewer presents the stack and shows the changes which took place during the execution. It will be opened as part of the clustering analysis along with the clustering viewer. Aside from the stack address view, the user can also see which stack addresses are mapped onto which cpu registers. Basically this provides a stack centered point of view on the execution which is especially useful for stack machine based virtual machines, which operate mainly over the stack.

### Manual Analysis

#### VM Context

The VM Context consists of four values:

• Code Start - the byte code start
• Code End - the byte code end
• VM Addr - the start address of the virtual machine function

The user has the choice whether he wants to determine it statically or dynamically. An alternative to this is to manually input the values during static analysis or in the settings menu.

#### Static Analysis

Deobfuscate from...

This provides a manual interface for the static deobfuscation function. Static deobfuscation requires four input values which are basically the VM context. This is useful if static and/or dynamic determination of the VM context fail but the reverse engineer managed to retrieve the right values. Upon selection the user will be prompted for all the values:

• Code Start - the byte code start
• Code End - the byte code end
• VM Addr - the start address of the virtual machine function

#### Dynamic Analysis

Follow Virtual Register: This provides a manual interface to the register tracking functionality.

Find Virtual Reg to Reg mapping: This function helps to map the stack addresses of the output from the virtual machine function to the registers in which those values are returned.

Find VM Function Output Parameter: Finds function output parameter.

Find VM Function Input Parameter: Finds function input parameter.

### Settings

The Settings provide the necessary interface to enable the user to change values on the fly or even input own values if the ones determined by the plugin are wrong. Further changes in the default behaviour of the program can also be selected or removed.

Code Start: the byte code start

Code End: the byte code end

Show Basic Blocks: show basic blocks during clustering analysis

Greedy Clustering: cluster until no more clusters are found

Cluster Heuristic: threshold after how many repetitions an address is considered a cluster

Input/Output Importance: Importance of input/output analysis for the grading system (set to 0 to disable)

Clustering Importance: Importance of clustering analysis for the grading system (set to 0 to disable)

Pattern Matching Importance: Importance of pattern matching analysis for the grading system (set to 0 to disable)

Memory usage Importance: Importance of memory instructions analysis for the grading system (set to 0 to disable)

Step Into System Libraries: Should system libraries be disregarded during trace generation

Extract function parameters: Should function parameters be extracted during trace generation

## Current Progress

Current Version: 0.2

This plugin already has a working state. Nevertheless there are several improvements (analysis capabilities of this plugin and software engineering optimizations) that will be implemented over time. The TODOs in the code give a rough estimate about those future improvements.

Current TODO: improve usage of the static analysis in grading system

Next TODO: enhance multithreading of analysis capabilities

VMAttack PlugIn for IDA Pro