Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Detect IAT patching #57

Closed
hasherezade opened this issue Mar 29, 2020 · 1 comment
Closed

Detect IAT patching #57

hasherezade opened this issue Mar 29, 2020 · 1 comment
Assignees

Comments

@hasherezade
Copy link
Owner

Implement scanning IAT on demand (enabled by a parameter) against classic IAT hooking.

Test case:

Classic IAT hooking (implemented using IAT Patcher): cm_hooked.zip
The replacement function was defined in the following way:

replacement

The scan output should look like:

1000100c;User32.MessageBoxW->NagMeNot.dll.MBox;10000000+100c;0
@hasherezade
Copy link
Owner Author

PE-sieve accepts a new parameter: /iat allowing to scan for IAT hooks. If found, hooks are listed in additional report.
Report for the above sample :

4068;user32.MessageBoxW #533->nagmenot.MBox #1;10000000+100c;0

Format:

<call via RVA>;<original function>-><hook function>;<hook module addr>+<offset>;<is module detected as suspicious>

This issue was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant