Tex tfile doesnt contain any data
oasec1 opened this issue · comments
The text file that is created once Noriben is terminated only contains what appears to be default information, see below. This happens every time. This is the latest beta version.
-=] Sandbox Analysis Report generated by Noriben v1.6
-=] Developed by Brian Baskin: brian@thebaskins.com @bbaskin
-=] The latest release can be found at https://github.com/Rurik/Noriben
-=] Execution time: 47.61 seconds
-=] Processing time: 4.41 seconds
-=] Analysis time: 1.43 seconds
Processes Created:
File Activity:
Registry Activity:
Network Traffic:
Unique Hosts:
I've definitely not seen this before. Do you have an example of the command line text output?
Here is the command line that I call Noriben with
start python c:\noriben\noriben.py --yara c:\yara
On Fri, Mar 20, 2015 at 3:33 PM, Brian Baskin notifications@github.com
wrote:
I've definitely not seen this before. Do you have an example of the
command line text output?—
Reply to this email directly or view it on GitHub
#4 (comment).
Do you have an example of the screen output, from if you run it from an already open command shell. It should appear similar to:
--===[ Noriben v1.6.1 ]===--
--===[ @bbaskin ]===--
[*] Using filter file: ProcmonConfiguration.PMC
[+] Features: (Debug: False YARA: False VirusTotal: True)
[*] Using procmon EXE: C:\Tools\procmon.exe
[*] Procmon session saved to: Noriben_03_Apr_15__08_21_36_818000.pml
[*] Launching Procmon ...
[*] Procmon is running. Run your executable now.
[*] When runtime is complete, press CTRL+C to stop logging.
Somewhere in there would be an error that may give me a clue to the issue.
Sure Ill send you one in the morning. Ive been crazy busy for the last few
days.
On Fri, Apr 3, 2015 at 8:22 AM, Brian Baskin notifications@github.com
wrote:
Do you have an example of the screen output, from if you run it from an
already open command shell. It should appear similar to:--===[ Noriben v1.6.1 ]===--
--===[ @bbaskin ]===--[
] Using filter file: ProcmonConfiguration.PMC [+] Features: (Debug: False
YARA: False VirusTotal: True) [] Using procmon EXE: C:\Tools\procmon.exe
[
] Procmon session saved to: Noriben_03_Apr_15__08_21_36_818000.pml []
Launching Procmon ...
[
] Procmon is running. Run your executable now. [] When runtime is
complete, press CTRL+C to stop logging.Somewhere in there would be an error that may give me a clue to the issue.
—
Reply to this email directly or view it on GitHub
#4 (comment).
I start the program with this command line.
c:
cd \python27
start python c:\noriben\noriben.py --yara c:\yara
The attachment is the output of the execution. Hiope this helps.
On Mon, Apr 6, 2015 at 11:19 PM, Rob Ayers oasec1@gmail.com wrote:
Sure Ill send you one in the morning. Ive been crazy busy for the last few
days.On Fri, Apr 3, 2015 at 8:22 AM, Brian Baskin notifications@github.com
wrote:Do you have an example of the screen output, from if you run it from an
already open command shell. It should appear similar to:--===[ Noriben v1.6.1 ]===--
--===[ @bbaskin ]===--[
] Using filter file: ProcmonConfiguration.PMC [+] Features: (Debug:
False YARA: False VirusTotal: True) [] Using procmon EXE:
C:\Tools\procmon.exe
[
] Procmon session saved to: Noriben_03_Apr_15__08_21_36_818000.pml []
Launching Procmon ...
[
] Procmon is running. Run your executable now. [] When runtime is
complete, press CTRL+C to stop logging.Somewhere in there would be an error that may give me a clue to the issue.
—
Reply to this email directly or view it on GitHub
#4 (comment).
Thanks.
I've just pushed version 1.6.2, now with better debugging support. I've been unable to replicate this issue or understand how it occurred. Hopefully this new version will help. When running, use the "-d" argument to enable debug output. Then paste your console output here, as well as the relevant entries from the .LOG file.
Console output would be similar to:
C:\Documents and Settings\Administrator\Desktop>Noriben.py -d -t 30 --cmd "malware\am.exe"
--yara c:\yara
--===[ Noriben v1.6.2 ]===--
--===[ @bbaskin ]===--
[*] Using filter file: ProcmonConfiguration.PMC
[+] Features: (Debug: True YARA: False VirusTotal: True)
[*] Using procmon EXE: c:\tools\sysinternalssuite\procmon.exe
[*] Procmon session saved to: Noriben_09_Apr_15__19_16_42_601000.pml
[*] Launching Procmon ...
[*] Launching command line: malware\am.exe
[*] Running for 30 seconds. Press Ctrl-C to stop logging early.
87% complete
[*] Termination of Procmon commencing... please wait
[*] Procmon terminated
[*] Converting session to CSV: Noriben_09_Apr_15__19_16_42_601000.csv
[*] Processing CSV: Noriben_09_Apr_15__19_16_42_601000.csv
[*] Enabling Windows string generalization.
[*] Querying VirusTotal for hash: 7e1f8d4ecf04c4019e85028db719a98a
[*] Querying VirusTotal for hash: 4766b32db089fe85db28681af5373085
[*] Querying VirusTotal for hash: 1fe4ec38b2b48ba2ab8c1c78ca5c9b9e
[*] Saving report to: Noriben_09_Apr_15__19_16_42_601000.txt
[*] Saving timeline to: Noriben_09_Apr_15__19_16_42_601000_timeline.csv
I'll test it in a few minutes and let you know the results. Thanks for all
of your efforts.
On Apr 9, 2015 7:22 PM, "Brian Baskin" notifications@github.com wrote:
Thanks.
I've just pushed version 1.6.2, now with better debugging support. I've
been unable to replicate this issue or understand how it occurred.
Hopefully this new version will help. When running, use the "-d" argument
to enable debug output. Then paste your console output here, as well as the
relevant entries from the .LOG file.Console output would be similar to:
C:\Documents and Settings\Administrator\Desktop>Noriben.py -d -t 30 --cmd
"malware\am.exe"
--===[ Noriben v1.6.2 ]===--
--===[ @bbaskin ]===--
[] Using filter file: ProcmonConfiguration.PMC
[+] Features: (Debug: True YARA: False VirusTotal: True)
[] Using procmon EXE: c:\tools\sysinternalssuite\procmon.exe
[] Procmon session saved to: Noriben_09_Apr_15__19_16_42_601000.pml
[] Launching Procmon ...
[] Launching command line: malware\am.exe
[] Running for 30 seconds. Press Ctrl-C to stop logging early.
87% complete
[] Termination of Procmon commencing... please wait
[] Procmon terminated
[] Converting session to CSV: Noriben_09_Apr_15__19_16_42_601000.csv
[] Processing CSV: Noriben_09_Apr_15__19_16_42_601000.csv
[] Enabling Windows string generalization.
[] Querying VirusTotal for hash: 7e1f8d4ecf04c4019e85028db719a98a
[] Querying VirusTotal for hash: 4766b32db089fe85db28681af5373085
[] Querying VirusTotal for hash: 1fe4ec38b2b48ba2ab8c1c78ca5c9b9e
[] Saving report to: Noriben_09_Apr_15__19_16_42_601000.txt
[] Saving timeline to: Noriben_09_Apr_15__19_16_42_601000_timeline.csv—
Reply to this email directly or view it on GitHub
#4 (comment).
Sorry I didnt get a chance to test last night but ill test it now. Ill get
back to you shortly.
On Thu, Apr 9, 2015 at 8:08 PM, Rob Ayers oasec1@gmail.com wrote:
I'll test it in a few minutes and let you know the results. Thanks for all
of your efforts.
On Apr 9, 2015 7:22 PM, "Brian Baskin" notifications@github.com wrote:Thanks.
I've just pushed version 1.6.2, now with better debugging support. I've
been unable to replicate this issue or understand how it occurred.
Hopefully this new version will help. When running, use the "-d" argument
to enable debug output. Then paste your console output here, as well as the
relevant entries from the .LOG file.Console output would be similar to:
C:\Documents and Settings\Administrator\Desktop>Noriben.py -d -t 30 --cmd
"malware\am.exe"
--===[ Noriben v1.6.2 ]===--
--===[ @bbaskin ]===--
[] Using filter file: ProcmonConfiguration.PMC
[+] Features: (Debug: True YARA: False VirusTotal: True)
[] Using procmon EXE: c:\tools\sysinternalssuite\procmon.exe
[] Procmon session saved to: Noriben_09_Apr_15__19_16_42_601000.pml
[] Launching Procmon ...
[] Launching command line: malware\am.exe
[] Running for 30 seconds. Press Ctrl-C to stop logging early.
87% complete
[] Termination of Procmon commencing... please wait
[] Procmon terminated
[] Converting session to CSV: Noriben_09_Apr_15__19_16_42_601000.csv
[] Processing CSV: Noriben_09_Apr_15__19_16_42_601000.csv
[] Enabling Windows string generalization.
[] Querying VirusTotal for hash: 7e1f8d4ecf04c4019e85028db719a98a
[] Querying VirusTotal for hash: 4766b32db089fe85db28681af5373085
[] Querying VirusTotal for hash: 1fe4ec38b2b48ba2ab8c1c78ca5c9b9e
[] Saving report to: Noriben_09_Apr_15__19_16_42_601000.txt
[] Saving timeline to: Noriben_09_Apr_15__19_16_42_601000_timeline.csv—
Reply to this email directly or view it on GitHub
#4 (comment).
ok it does the same thing
after executing here is the result that is displayed on the screen
--===[ Noriben v1.6.2 ]===--
--===[ @bbaskin ]===--
[] Using filter file: ProcmonConfiguration.PMC
[+] Features: (Debug: True YARA: True VirusTotal: True)
[] Using procmon EXE: c:\tools\procmon.exe
[] Procmon session saved to: Noriben_10_Apr_15__10_54_36_355000.pml
[] Launching Procmon ...
[] Procmon is running. Run your executable now.
[] When runtime is complete, press CTRL+C to stop logging.
This is the contents of the text file.
-=] Sandbox Analysis Report generated by Noriben v1.6.2
-=] Developed by Brian Baskin: brian @@ thebaskins.com @bbaskin
-=] The latest release can be found at https://github.com/Rurik/Noriben
-=] Execution time: 44.68 seconds
-=] Processing time: 4.99 seconds
-=] Analysis time: 1.50 seconds
Processes Created:
File Activity:
Registry Activity:
Network Traffic:
Unique Hosts:
On Fri, Apr 10, 2015 at 9:56 AM, Rob Ayers oasec1@gmail.com wrote:
Sorry I didnt get a chance to test last night but ill test it now. Ill get
back to you shortly.On Thu, Apr 9, 2015 at 8:08 PM, Rob Ayers oasec1@gmail.com wrote:
I'll test it in a few minutes and let you know the results. Thanks for
all of your efforts.
On Apr 9, 2015 7:22 PM, "Brian Baskin" notifications@github.com wrote:Thanks.
I've just pushed version 1.6.2, now with better debugging support. I've
been unable to replicate this issue or understand how it occurred.
Hopefully this new version will help. When running, use the "-d" argument
to enable debug output. Then paste your console output here, as well as the
relevant entries from the .LOG file.Console output would be similar to:
C:\Documents and Settings\Administrator\Desktop>Noriben.py -d -t 30
--cmd "malware\am.exe"
--===[ Noriben v1.6.2 ]===--
--===[ @bbaskin ]===--
[] Using filter file: ProcmonConfiguration.PMC
[+] Features: (Debug: True YARA: False VirusTotal: True)
[] Using procmon EXE: c:\tools\sysinternalssuite\procmon.exe
[] Procmon session saved to: Noriben_09_Apr_15__19_16_42_601000.pml
[] Launching Procmon ...
[] Launching command line: malware\am.exe
[] Running for 30 seconds. Press Ctrl-C to stop logging early.
87% complete
[] Termination of Procmon commencing... please wait
[] Procmon terminated
[] Converting session to CSV: Noriben_09_Apr_15__19_16_42_601000.csv
[] Processing CSV: Noriben_09_Apr_15__19_16_42_601000.csv
[] Enabling Windows string generalization.
[] Querying VirusTotal for hash: 7e1f8d4ecf04c4019e85028db719a98a
[] Querying VirusTotal for hash: 4766b32db089fe85db28681af5373085
[] Querying VirusTotal for hash: 1fe4ec38b2b48ba2ab8c1c78ca5c9b9e
[] Saving report to: Noriben_09_Apr_15__19_16_42_601000.txt
[] Saving timeline to: Noriben_09_Apr_15__19_16_42_601000_timeline.csv—
Reply to this email directly or view it on GitHub
#4 (comment).
Thank you. I apologize for this issue. I want to make sure it's fixed completely and I appreciate you being patient with me.
Is there a Noriben_..LOG file that you can paste from?
This sounds like a secondary issue, though. The incredibly short analysis time suggests that very little data is being fed into Noriben from Procmon. There may be an issue with how Procmon is collecting data. It's possible that it has a previous configuration in the Registry that is limiting what it collects.
Could you paste the sizes of all the output files (or just a 'dir' listing) here? Also, if possible, could you email me your PML file?
here is the contents of the log file. The pml was too big to send
[] Writing 0 Process Events results to report
[] Writing 0 Filesystem Events results to report
[] Writing 0 Registry Events results to report
[] Writing 0 Network Events results to report
[*] Writing 0 Remote Servers results to report
Here is the contents of the noriben.py file. You might be right on the
amount of data being fed to procmon. But I have been executing malicious
executables as well as browsing the internet. Here are the requested files
On Fri, Apr 10, 2015 at 11:05 AM, Brian Baskin notifications@github.com
wrote:
Thank you. I apologize for this issue. I want to make sure it's fixed
completely and I appreciate you being patient with me.Is there a Noriben_..LOG file that you can paste from?
This sounds like a secondary issue, though. The incredibly short analysis
time suggests that very little data is being fed into Noriben from Procmon.
There may be an issue with how Procmon is collecting data. It's possible
that it has a previous configuration in the Registry that is limiting what
it collects.Could you paste the sizes of all the output files (or just a 'dir'
listing) here? Also, if possible, could you email me your PML file?—
Reply to this email directly or view it on GitHub
#4 (comment).
Noriben Malware Analysis Sandbox
Directions:
Just copy Noriben.py to a Windows-based VM alongside the Sysinternals Procmon.exe
Run Noriben.py, then run your executable.
When the executable has completed its processing, stop Noriben and you'll have a clean text report and timeline
Version 1.0 - 10 Apr 13 - @bbaskin - brian@thebaskins.com
Gracious edits, revisions, and corrections by Daniel Raygoza
Version 1.1 - 21 Apr 13 -
Much improved filters and filter parsing
Version 1.1a - 1 May 13 -
Revamped regular expression support. Added Python 3.x forward
compatibility
Version 1.2 - 28 May 13 -
Now reads CSV files line-by-line to handle large files, keep
unsuccessful registry deletes, compartmentalize sections, creates CSV
timeline, can reparse PMLs, can specify alternative PMC filters,
changed command line arguments, added global whitelist
Version 1.3 - 13 Sep 13 -
Option to generalize file paths in output, option to use a timeout
instead of Ctrl-C to end monitoring, only writes RegSetValue entries
if Length > 0
Version 1.4 - 16 Sep 13 -
Fixed string generalization on file rename and now supports ()'s in
environment name (for 64-bit systems), added ability to Ctrl-C from
a timeout, added specifying malware file from command line, added an
output directory
Version 1.5 - 28 Sep 13 -
Standardized to single quotes, added YARA scanning of resident files,
reformatted function comments to match appropriate docstring format,
fixed bug with generalize paths - now generalizes after getting MD5
Version 1.5b - 1 Oct 13 -
Ninja edits to fix a few small bug fixes and change path generalization
to an ordered list instead of an unordered dictionary. This lets you
prioritize resolutions.
Version 1.6 - 14 Mar 15 -
Long delayed and now forked release. This will be the final release for
Python 2.X except for updated rules. Now requires 3rd party libraries.
VirusTotal API scanning implemented. Added better filters.
Added controls for some registry writes that had size but no data.
Added whitelist for MD5 hashes and --hash option for hash file.
Renamed 'blacklist' to 'whitelist' because it's supposed to be. LOL
Change file handling due to 'read entire file' bug in FileInput.
Version 1.6.1 - 16 Mar 15 -
Soft fails on Requests import. Lack of module now just disables VirusTotal.
Added better YARA handling. Instead of failing over a single error, it
will skip the offending file. You can now hard-set the YARA signature
folder in the script.
Version 1.6.2 - 9 Apr 15 -
Created debug output to file. This now includes full VirusTotal dumps.
Currently Noriben only displays number of hits, but additional meta is now
dumped for further analysis by users.
TODO:
* Upload files directly to VirusTotal (1.7 feature?)
* extract data directly from registry? (may require python-registry - http://www.williballenthin.com/registry/)
* scan for mutexes, preferably in a way that doesn't require wmi/pywin32
from future import print_function
import codecs
import fileinput
import hashlib
import io
import os
import re
import subprocess
import sys
import time
from argparse import ArgumentParser
from datetime import datetime
from string import whitespace
from time import sleep
from traceback import format_exc
try:
import yara
has_yara = True
except ImportError:
has_yara = False
try:
import requests
import json
has_internet = True
except ImportError:
has_internet = False
print('[!] Python module "requests" not found. Internet functionality is now disabled.')
The below are customizable variables. Change these as you see fit.
procmon = 'procmon.exe' # Change this if you have a renamed procmon.exe
generalize_paths = True # Generalize paths to their base environment variable
enable_timeline = True # Create a second, compact CSV with events in order
debug = True
timeout_seconds = 0 # Set to 0 to manually end monitoring with Ctrl-C
virustotal_api_key = 'XXXXXXXXXX' ## Set API here
if os.path.exists('virustotal.api'): ## Or put it in here
virustotal_api_key = open('virustotal.api', 'r').readline().strip()
yara_folder = ''
Rules for creating rules:
1. Every rule string must begin with the r
for regular expressions to work.
1.a. This signifies a 'raw' string.
2. No backslashes at the end of a filter. Either:
2.a. truncate the backslash, or
2.b. use '*' to signify 'zero or more slashes'.
3. To find a list of available '%%' variables, type set
from a command prompt
These entries are applied to all whitelists
global_whitelist = [r'VMwareUser.exe',
r'CaptureBAT.exe',
r'SearchIndexer.exe',
r'Fakenet.exe',
r'idaq.exe',
r'ngen.exe',
r'ngentask.exe',
r'vmtoolsd.exe',
r'python.exe',
r'pythonw.exe',
r'rdns.exe',
r'RDNS_.sys',
r'fireeyeagent.exe']
cmd_whitelist = [r'%SystemRoot%\system32\wbem\wmiprvse.exe',
r'%SystemRoot%\system32\wscntfy.exe',
r'procmon.exe',
r'wuauclt.exe',
r'jqs.exe',
r'TCPView.exe',
r'CaptureBAT.exe',
r'TCPView.exe',
r'vmtoolsd.exe',
r'python.exe',
r'pythonw.exe',
r'fireeyeagent.exe'] + global_whitelist
file_whitelist = [r'procmon.exe',
r'Desired Access: Execute/Traverse',
r'Desired Access: Synchronize',
r'Desired Access: Generic Read/Execute',
r'Desired Access: Read EA',
r'Desired Access: Read Data/List',
r'Desired Access: Generic Read, ',
r'Desired Access: Read Attributes',
r'Google\Chrome\User Data\.*.tmp',
r'wuauclt.exe',
r'wmiprvse.exe',
r'Microsoft\Windows\Explorer\thumbcache_.*.db',
r'Thumbs.db$',
r'fireeyeagent.exe',
r'%AllUsersProfile%\Application Data\Microsoft\OFFICE\DATA',
r'%AppData%\Microsoft\Proof\*',
r'%AppData%\Microsoft\Templates\*',
r'%LocalAppData%\Google\Drive\sync_config.db*',
r'%ProgramFiles%\Capture\*',
r'%SystemDrive%\Python',
r'%SystemRoot%\assembly',
r'%SystemRoot%\Microsoft.NET\Framework64',
r'%SystemRoot%\Prefetch\*',
r'%SystemRoot%\system32\wbem\Logs\*',
r'%SystemRoot%\System32\LogFiles\Scm',
# r'%SystemRoot%\System32\Tasks\Microsoft\Windows', # Some may want to remove this
r'%UserProfile%$',
r'%UserProfile%\AppData\LocalLow$',
r'%UserProfile%\Recent\*',
r'%UserProfile%\Local Settings\History\History.IE5\*'] + global_whitelist
reg_whitelist = [r'CaptureProcessMonitor',
r'consent.exe',
r'procmon.exe',
r'verclsid.exe',
r'wmiprvse.exe',
r'wscntfy.exe',
r'wuauclt.exe',
r'PROCMON',
r'HKCR$',
r'HKCR\AllFilesystemObjects\shell',
r'HKCU$',
r'HKCU\Printers\DevModePerUser',
r'HKCU\SessionInformation\ProgramCount',
r'HKCU\Software$',
r'HKCU\Software\Classes\Software\Microsoft\Windows\CurrentVersion\Deployment\SideBySide',
r'HKCU\Software\Classes\Local Settings\MuiCache\*',
r'HKCU\Software\Microsoft\Calc$',
r'HKCU\Software\Microsoft\.*\Window_Placement',
r'HKCU\Software\Microsoft\Internet Explorer\TypedURLs',
r'HKCU\Software\Microsoft\Notepad',
r'HKCU\Software\Microsoft\Office',
r'HKCU\Software\Microsoft\Shared Tools',
r'HKCU\Software\Microsoft\SystemCertificates\Root$',
r'HKCU\Software\Microsoft\Windows\CurrentVersion\Applets',
r'HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\CIDOpen',
r'HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Modules',
r'HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2',
r'HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU',
r'HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo',
r'HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage',
r'HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage2',
r'HKCU\Software\Microsoft\Windows\Currentversion\Explorer\StreamMRU',
r'HKCU\Software\Microsoft\Windows\Currentversion\Explorer\Streams',
r'HKCU\Software\Microsoft\Windows\CurrentVersion\Group Policy',
r'HKCU\Software\Microsoft\Windows\Shell',
r'HKCU\Software\Microsoft\Windows\Shell\BagMRU',
r'HKCU\Software\Microsoft\Windows\Shell\Bags',
r'HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache',
r'HKCU\Software\Microsoft\Windows\ShellNoRoam\BagMRU',
r'HKCU\Software\Microsoft\Windows\ShellNoRoam\Bags',
r'HKCU\Software\Policies$',
r'HKCU\Software\Policies\Microsoft$',
r'HKLM$',
r'HKLM\.*\Enum$',
r'HKLM\SOFTWARE$',
# r'HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed', # Some people prefer to leave this in.
r'HKLM\SOFTWARE\Microsoft$',
r'HKLM\SOFTWARE\Policies$',
r'HKLM\SOFTWARE\Policies\Microsoft$',
r'HKLM\SOFTWARE\MICROSOFT\Dfrg\Statistics',
r'HKLM\SOFTWARE\MICROSOFT\SystemCertificates$',
r'HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products',
r'HKLM\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Cache\Paths\*',
r'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\MMDevices\Audio\Render',
r'HKLM\Software\Microsoft\Windows\CurrentVersion\Shell Extensions',
r'HKLM\Software\Microsoft\WBEM',
r'HKLM\Software\Microsoft\Windows NT\CurrentVersion\Prefetcher\*',
r'HKLM\Software\Microsoft\Windows NT\CurrentVersion\Tracing\*',
r'HKLM\System\CurrentControlSet\Control\CLASS\{4D36E968-E325-11CE-BFC1-08002BE10318}',
r'HKLM\System\CurrentControlSet\Control\DeviceClasses',
r'HKLM\System\CurrentControlSet\Control\MediaProperties',
r'HKLM\System\CurrentControlSet\Enum\*',
r'HKLM\System\CurrentControlSet\Services\CaptureRegistryMonitor',
r'HKLM\System\CurrentControlSet\Services\Eventlog\*',
r'HKLM\System\CurrentControlSet\Services\Tcpip\Parameters',
r'HKLM\System\CurrentControlSet\Services\WinSock2\Parameters',
r'HKLM\System\CurrentControlSet\Services\VSS\Diag',
r'LEGACY_CAPTUREREGISTRYMONITOR',
r'Software\Microsoft\Multimedia\Audio$',
r'Software\Microsoft\Multimedia\Audio Compression Manager',
r'Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder',
r'Software\Microsoft\Windows\ShellNoRoam\Bags',
r'Software\Microsoft\Windows\ShellNoRoam\BagMRU',
r'Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc',
r'Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs',
r'Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders',
r'Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders',
r'UserAssist\{5E6AB780-7743-11CF-A12B-00AA004AE837}',
r'UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}',
r'UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}'] + global_whitelist
net_whitelist = [r'hasplms.exe'] + global_whitelist # Hasp dongle beacons
#r'192.168.2.', # Example for blocking net ranges
#r'Verizon_router.home'] # Example for blocking local domains
hash_whitelist = [r'f8f0d25ca553e39dde485d8fc7fcce89',
r'b60dddd2d63ce41cb8c487fcfbb6419e',
r'f8f0d25ca553e39dde485d8fc7fcce89',
r'6fe42512ab1b89f32a7407f261b1d2d0',
r'8b1f3320aebb536e021a5014409862de',
r'b26b135ff1b9f60c9388b4a7d16f600b',
r'355edbb4d412b01f1740c17e3f50fa00',
r'd4502f124289a31976130cccb014c9aa',
r'81faefc42d0b236c62c3401558867faa',
r'e40fcf943127ddc8fd60554b722d762b',
r'0da85218e92526972a821587e6a8bf8f']
Below are global internal variables. Do not edit these.
VERSION = '1.6.2' #
path_general_list = [] #
has_virustotal = True if virustotal_api_key else False #
virustotal_upload = True if virustotal_api_key else False #
use_virustotal = True if virustotal_api_key and has_internet else False #
use_pmc = False #
vt_results = {} #
vt_dump = list() #
debug_messages = list() #
exe_cmdline = '' #
output_dir = '' #
time_exec = 0 #
time_process = 0 #
time_analyze = 0 #
#########################################################################
def log_debug(msg):
"""
Logs a passed message. Results are printed and stored in
a list for later writing to the debug log.
Arguments:
msg: Text string of message.
Results:
none
"""
global debug_messages
if msg and debug:
debug_messages.append(msg + '\r\n')
def generalize_vars_init():
"""
Initialize a dictionary with the local system's environment variables.
Returns via a global variable, path_general_list
Arguments:
none
Results:
none
"""
envvar_list = [r'%AllUsersProfile%',
r'%LocalAppData%',
r'%AppData%',
r'%CommonProgramFiles%',
r'%ProgramData%',
r'%ProgramFiles%',
r'%ProgramFiles(x86)%',
r'%Public%',
r'%Temp%',
r'%UserProfile%',
r'%WinDir%']
global path_general_list
print('[*] Enabling Windows string generalization.')
for env in envvar_list:
try:
resolved = os.path.expandvars(env).encode('unicode_escape')
resolved = resolved.replace(b'(', b'\\(').replace(b')', b'\\)')
if not resolved == env and not resolved == env.replace(b'(', b'\\(').replace(b')', b'\\)'):
path_general_list.append([env, resolved])
except TypeError:
if resolved in locals():
log_debug('[!] generalize_vars_init(): Unable to parse var: %s' % resolved)
continue
def generalize_var(path_string):
"""
Generalize a given string to include its environment variable
Arguments:
path_string: string value to generalize
Results:
string value of a generalized string
"""
if not len(path_general_list):
generalize_vars_init() # For edge cases when this isn't previously called.
for item in path_general_list:
path_string = re.sub(item[1], item[0], path_string)
return path_string
def read_hash_file(hash_file):
"""
Read a given file of MD5 hashes and add them to the hash whitelist.
Arguments:
hash_file: path to a text file containing hashes (either flat or md5deep)
"""
global hash_whitelist
for line_num, hash_line in enumerate(io.open(hash_file, encoding='utf-8')):
hash = hash_line.split()[0]
try:
if (len(hash) == 32 and int(hash, 16)):
hash_whitelist.append(hash)
except (TypeError, ValueError):
pass
def virustotal_query_hash(hash):
"""
Submit a given hash to VirusTotal to retrieve number of alerts
Arguments:
hash: MD5 hash to a given file
"""
global vt_results
global vt_dump
try:
if not (len(hash) == 32 and int(hash, 16)):
return null
except (TypeError, ValueError):
pass
try:
previous_result = vt_results[hash]
log_debug('[*] VT scan already performed for %s. Returning previous: %s' % (hash, previous_result))
return previous_result
except KeyError:
pass
vt_query_url = 'https://www.virustotal.com/vtapi/v2/file/report'
post_params = {'apikey': virustotal_api_key,
'resource': hash}
print('[*] Querying VirusTotal for hash: %s' % hash)
data = ''
http_response = requests.post(vt_query_url, post_params)
if http_response.status_code == 204:
print('[!] VirusTotal Rate Limit Exceeded. Sleeping for 60 seconds.')
time.sleep(60)
return virustotal_query_hash(hash)
else:
try:
data = http_response.json()
except ValueError:
result = 'Error'
try:
if data['response_code'] == -2:
result = ' [VT: Queued]'
elif data['response_code'] == -1:
result = ' [VT: Error 001]'
elif data['response_code'] == 0:
result = ' [VT: Not Scanned]'
elif data['response_code'] == 1:
if data['total']:
vt_dump.append(data)
result = ' [VT: %s/%s]' % (data['positives'], data['total'])
else:
result = ' [VT: Error 002]'
except TypeError:
result = ' [VT: Error 003]'
vt_results[hash] = result
log_debug('[*] VirusTotal result for hash %s: %s' % (hash, result))
return result
def yara_rule_check(yara_files):
"""
Scan a dictionary of YARA rule files to determine
which are valid for compilation.
Arguments:
yara_path: path to folder containing rules
"""
result = dict()
for id in yara_files:
fname = yara_files[id]
try:
rules = yara.compile(filepath=fname)
result[id] = fname
except yara.SyntaxError:
log_debug('[!] Syntax Error found in YARA file: %s' % fname)
log_debug(format_exc())
return result
def yara_import_rules(yara_path):
"""
Import a folder of YARA rule files
Arguments:
yara_path: path to folder containing rules
Results:
rules: a yara.Rules structure of available YARA rules
"""
yara_files = {}
if not yara_path[-1] == '\\':
yara_path += '\\'
print('[*] Loading YARA rules from folder: %s' % yara_path)
files = os.listdir(yara_path)
for file_name in files:
if '.yara' in file_name:
yara_files[file_name.split('.yara')[0]] = yara_path + file_name
yara_files = yara_rule_check(yara_files)
rules = ''
if yara_files:
try:
rules = yara.compile(filepaths=yara_files)
print('[*] YARA rules loaded. Total files imported: %d' % len(yara_files))
except yara.SyntaxError:
print('[!] YARA: Unknown Syntax Errors found.')
print('[!] YARA rules disabled until all Syntax Errors are fixed.')
log_debug('[!] YARA rules disabled due to unknown Syntax Errors')
return rules
def yara_filescan(file_path, rules):
"""
Scan a given file to see if it matches a given set of YARA rules
Arguments:
file_path: full path to a file to scan
rules: a yara.Rules structure of available YARA rules
Results:
results: a string value that's either null (no hits)
or formatted with hit results
"""
if not rules:
return ''
try:
matches = rules.match(file_path)
except yara.Error: # If can't open file
log_debug('[!] YARA can\'t open file: %s' % file_path)
return ''
if matches:
results = '\t[YARA: %s]' % \
reduce(lambda x, y: str(x) + ', ' + str(y), matches)
else:
results = ''
return results
def open_file_with_assoc(fname):
"""
Opens the specified file with its associated application
Arguments:
fname: full path to a file to open
Results:
None
"""
if os.name == 'mac':
subprocess.call(('open', fname))
elif os.name == 'nt':
os.startfile(fname)
elif os.name == 'posix':
subprocess.call(('open', fname))
def file_exists(fname):
"""
Determine if a file exists
Arguments:
fname: path to a file
Results:
boolean value if file exists
"""
return os.path.exists(fname) and os.access(fname, os.X_OK)
def check_procmon():
"""
Finds the local path to Procmon
Arguments:
None
Results:
folder path to procmon executable
"""
global procmon
if file_exists(procmon):
return procmon
else:
for path in os.environ['PATH'].split(os.pathsep):
if file_exists(os.path.join(path.strip('"'), procmon)):
return os.path.join(path, procmon)
def md5_file(fname):
"""
Given a filename, returns the hex MD5 value
Arguments:
fname: path to a file
Results:
hex MD5 value of file's contents as a string
"""
return hashlib.md5(codecs.open(fname, 'rb').read()).hexdigest()
def get_session_name():
"""
Returns current date and time stamp for file name
Arguments:
None
Results:
string value of a current timestamp to apply to log file names
"""
return datetime.now().strftime('%d_%b_%y__%H_%M_%S_%f')
def protocol_replace(text):
"""
Replaces text name resolutions from domain names
Arguments:
text: string of domain with resolved port name
Results:
string value with resolved port name in decimal format
"""
replacements = [(':https', ':443'),
(':http', ':80'),
(':domain', ':53')]
for find, replace in replacements:
text = text.replace(find, replace)
return text
def whitelist_scan(whitelist, data):
"""
Given a whitelist and data string, see if data is in whitelist
Arguments:
whitelist: list of black-listed items
data: string value to compare against whitelist
Results:
boolean value of if item exists in whitelist
"""
for event in data:
for bad in whitelist:
bad = os.path.expandvars(bad).replace('\\', '\\\\')
try:
if re.search(bad, event, flags=re.IGNORECASE):
return True
except re.error:
log_debug('[!] Error found while processing filters.\r\nFilter:\t%s\r\nEvent:\t%s' % (bad, event))
log_debug(format_exc())
return False
return False
def process_PML_to_CSV(procmonexe, pml_file, pmc_file, csv_file):
"""
Uses Procmon to convert the PML to a CSV file
Arguments:
procmonexe: path to Procmon executable
pml_file: path to Procmon PML output file
pmc_file: path to PMC filter file
csv_file: path to output CSV file
Results:
None
"""
global time_process
time_convert_start = time.time()
print('[*] Converting session to CSV: %s' % csv_file)
cmdline = '%s /OpenLog %s /saveas %s' % (procmonexe, pml_file, csv_file)
if use_pmc:
cmdline += ' /LoadConfig %s' % pmc_file
stdnull = subprocess.Popen(cmdline)
stdnull.wait()
time_convert_end = time.time()
time_process = time_convert_end - time_convert_start
def launch_procmon_capture(procmonexe, pml_file, pmc_file):
"""
Launch Procmon to begin capturing data
Arguments:
procmonexe: path to Procmon executable
pml_file: path to Procmon PML output file
pmc_file: path to PMC filter file
Results:
None
"""
global time_exec
time_exec = time.time()
cmdline = '%s /BackingFile %s /Quiet /Minimized' % (procmonexe, pml_file)
if use_pmc:
cmdline += ' /LoadConfig %s' % pmc_file
subprocess.Popen(cmdline)
sleep(3)
def terminate_procmon(procmonexe):
"""
Terminate Procmon cleanly
Arguments:
procmonexe: path to Procmon executable
Results:
None
"""
global time_exec
time_exec = time.time() - time_exec
cmdline = '%s /Terminate' % procmonexe
stdnull = subprocess.Popen(cmdline)
stdnull.wait()
def parse_csv(csv_file, report, timeline):
"""
Given the location of CSV and TXT files, parse the CSV for notable items
Arguments:
csv_file: path to csv output to parse
Results:
report: string text containing the entirety of the text report
timeline: string text containing the entirety of the CSV report
"""
process_output = list()
file_output = list()
reg_output = list()
net_output = list()
error_output = list()
remote_servers = list()
if yara_folder and has_yara:
yara_rules = yara_import_rules(yara_folder)
else:
yara_rules = ''
print('[*] Processing CSV: %s' % csv_file)
time_parse_csv_start = time.time()
# Use fileinput.input() now to read data line-by-line
#for original_line in fileinput.input(csv_file, openhook=fileinput.hook_encoded('iso-8859-1')):
for line_num, original_line in enumerate(io.open(csv_file, encoding='utf-8')):
server = ''
if original_line[0] != '"': # Ignore lines that begin with Tab. Sysinternals breaks CSV with new processes
continue
line = original_line.strip(whitespace + '"')
field = line.strip().split('","')
try:
if field[3] in ['Process Create'] and field[5] == 'SUCCESS':
cmdline = field[6].split('Command line: ')[1]
if not whitelist_scan(cmd_whitelist, field):
if generalize_paths:
cmdline = generalize_var(cmdline)
child_pid = field[6].split('PID: ')[1].split(',')[0]
outputtext = '[CreateProcess] %s:%s > "%s"\t[Child PID: %s]' % (
field[1], field[2], cmdline.replace('"', ''), child_pid)
timelinetext = '%s,Process,CreateProcess,%s,%s,%s,%s' % (field[0].split()[0].split('.')[0],
field[1], field[2],
cmdline.replace('"', ''), child_pid)
process_output.append(outputtext)
timeline.append(timelinetext)
elif field[3] == 'CreateFile' and field[5] == 'SUCCESS':
if not whitelist_scan(file_whitelist, field):
path = field[4]
yara_hits = ''
if yara_folder and yara_rules:
yara_hits = yara_filescan(path, yara_rules)
if os.path.isdir(path):
if generalize_paths:
path = generalize_var(path)
outputtext = '[CreateFolder] %s:%s > %s' % (field[1], field[2], path)
timelinetext = '%s,File,CreateFolder,%s,%s,%s' % (field[0].split()[0].split('.')[0], field[1],
field[2], path)
file_output.append(outputtext)
timeline.append(timelinetext)
else:
try:
md5 = md5_file(path)
if md5 in hash_whitelist:
log_debug('[_] Skipping hash: %s' % md5)
continue
av_hits = ''
if has_virustotal and has_internet:
av_hits = virustotal_query_hash(md5)
if generalize_paths:
path = generalize_var(path)
outputtext = '[CreateFile] %s:%s > %s\t[MD5: %s]%s%s' % (field[1], field[2], path, md5,
yara_hits, av_hits)
timelinetext = '%s,File,CreateFile,%s,%s,%s,%s,%s,%s' % (field[0].split()[0].split('.')[0],
field[1], field[2], path, md5,
yara_hits, av_hits)
file_output.append(outputtext)
timeline.append(timelinetext)
except (IndexError, IOError):
if generalize_paths:
path = generalize_var(path)
outputtext = '[CreateFile] %s:%s > %s\t[File no longer exists]' % (field[1], field[2], path)
timelinetext = '%s,File,CreateFile,%s,%s,%s,N/A' % (field[0].split()[0].split('.')[0],
field[1], field[2], path)
file_output.append(outputtext)
timeline.append(timelinetext)
elif field[3] == 'SetDispositionInformationFile' and field[5] == 'SUCCESS':
if not whitelist_scan(file_whitelist, field):
path = field[4]
if generalize_paths:
path = generalize_var(path)
outputtext = '[DeleteFile] %s:%s > %s' % (field[1], field[2], path)
timelinetext = '%s,File,DeleteFile,%s,%s,%s' % (field[0].split()[0].split('.')[0], field[1],
field[2], path)
file_output.append(outputtext)
timeline.append(timelinetext)
elif field[3] == 'SetRenameInformationFile':
if not whitelist_scan(file_whitelist, field):
from_file = field[4]
to_file = field[6].split('FileName: ')[1].strip('"')
if generalize_paths:
from_file = generalize_var(from_file)
to_file = generalize_var(to_file)
outputtext = '[RenameFile] %s:%s > %s => %s' % (field[1], field[2], from_file, to_file)
timelinetext = '%s,File,RenameFile,%s,%s,%s,%s' % (field[0].split()[0].split('.')[0], field[1],
field[2], from_file, to_file)
file_output.append(outputtext)
timeline.append(timelinetext)
elif field[3] == 'RegCreateKey' and field[5] == 'SUCCESS':
if not whitelist_scan(reg_whitelist, field):
outputtext = '[RegCreateKey] %s:%s > %s' % (field[1], field[2], field[4])
if not outputtext in reg_output: # Ignore multiple CreateKeys. Only log the first.
timelinetext = '%s,Registry,RegCreateKey,%s,%s,%s' % (field[0].split()[0].split('.')[0],
field[1], field[2], field[4])
reg_output.append(outputtext)
timeline.append(timelinetext)
elif field[3] == 'RegSetValue' and field[5] == 'SUCCESS':
if not whitelist_scan(reg_whitelist, field):
reg_length = field[6].split('Length:')[1].split(',')[0].strip(whitespace + '"')
try:
if int(reg_length):
if 'Data:' in field[6]:
data_field = ' = %s' % field[6].split('Data:')[1].strip(whitespace + '"')
if len(data_field.split(' ')) == 16:
data_field += ' ...'
elif 'Length:' in field[6]:
data_field = ''
else:
continue
outputtext = '[RegSetValue] %s:%s > %s%s' % (field[1], field[2], field[4], data_field)
timelinetext = '%s,Registry,RegSetValue,%s,%s,%s,%s' % (field[0].split()[0].split('.')[0],
field[1], field[2], field[4],
data_field)
reg_output.append(outputtext)
timeline.append(timelinetext)
except (IndexError, ValueError):
error_output.append(original_line.strip())
elif field[3] == 'RegDeleteValue': # and field[5] == 'SUCCESS':
# SUCCESS is commented out to allows all attempted deletions, whether or not the value exists
if not whitelist_scan(reg_whitelist, field):
outputtext = '[RegDeleteValue] %s:%s > %s' % (field[1], field[2], field[4])
timelinetext = '%s,Registry,RegDeleteValue,%s,%s,%s' % (field[0].split()[0].split('.')[0], field[1],
field[2], field[4])
reg_output.append(outputtext)
timeline.append(timelinetext)
elif field[3] == 'RegDeleteKey': # and field[5] == 'SUCCESS':
# SUCCESS is commented out to allows all attempted deletions, whether or not the value exists
if not whitelist_scan(reg_whitelist, field):
outputtext = '[RegDeleteKey] %s:%s > %s' % (field[1], field[2], field[4])
timelinetext = '%s,Registry,RegDeleteKey,%s,%s,%s' % (field[0].split()[0].split('.')[0], field[1],
field[2], field[4])
reg_output.append(outputtext)
timeline.append(timelinetext)
elif field[3] == 'UDP Send' and field[5] == 'SUCCESS':
if not whitelist_scan(net_whitelist, field):
server = field[4].split('-> ')[1]
# TODO: work on this later, once I can verify it better.
#if field[6] == 'Length: 20':
# output_line = '[DNS Query] %s:%s > %s' % (field[1], field[2], protocol_replace(server))
#else:
outputtext = '[UDP] %s:%s > %s' % (field[1], field[2], protocol_replace(server))
if not outputtext in net_output:
timelinetext = '%s,Network,UDP Send,%s,%s,%s' % (field[0].split()[0].split('.')[0], field[1],
field[2], protocol_replace(server))
net_output.append(outputtext)
timeline.append(timelinetext)
elif field[3] == 'UDP Receive' and field[5] == 'SUCCESS':
if not whitelist_scan(net_whitelist, field):
server = field[4].split('-> ')[1]
outputtext = '[UDP] %s > %s:%s' % (protocol_replace(server), field[1], field[2])
if not outputtext in net_output:
timelinetext = '%s,Network,UDP Receive,%s,%s' % (field[0].split()[0].split('.')[0], field[1],
field[2])
net_output.append(outputtext)
timeline.append(timelinetext)
elif field[3] == 'TCP Send' and field[5] == 'SUCCESS':
if not whitelist_scan(net_whitelist, field):
server = field[4].split('-> ')[1]
outputtext = '[TCP] %s:%s > %s' % (field[1], field[2], protocol_replace(server))
if not outputtext in net_output:
timelinetext = '%s,Network,TCP Send,%s,%s,%s' % (field[0].split()[0].split('.')[0], field[1],
field[2], protocol_replace(server))
net_output.append(outputtext)
timeline.append(timelinetext)
elif field[3] == 'TCP Receive' and field[5] == 'SUCCESS':
if not whitelist_scan(net_whitelist, field):
server = field[4].split('-> ')[1]
outputtext = '[TCP] %s > %s:%s' % (protocol_replace(server), field[1], field[2])
if not outputtext in net_output:
timelinetext = '%s,Network,TCP Receive,%s,%s' % (field[0].split()[0].split('.')[0], field[1],
field[2])
net_output.append(outputtext)
timeline.append(timelinetext)
except IndexError:
log_debug(line)
log_debug(format_exc())
error_output.append(original_line.strip())
# Enumerate unique remote hosts into their own section
if server:
server = server.split(':')[0]
if not server in remote_servers and server != 'localhost':
remote_servers.append(server)
#} End of file input processing
time_parse_csv_end = time.time()
report.append('-=] Sandbox Analysis Report generated by Noriben v%s' % __VERSION__)
report.append('-=] Developed by Brian Baskin: brian @@ thebaskins.com @bbaskin')
report.append('-=] The latest release can be found at https://github.com/Rurik/Noriben')
report.append('')
if exe_cmdline:
report.append('-=] Analysis of command line: %s' % exe_cmdline)
if time_exec:
report.append('-=] Execution time: %0.2f seconds' % time_exec)
if time_process:
report.append('-=] Processing time: %0.2f seconds' % time_process)
time_analyze = time_parse_csv_end - time_parse_csv_start
report.append('-=] Analysis time: %0.2f seconds' % time_analyze)
report.append('')
report.append('Processes Created:')
report.append('==================')
log_debug('[*] Writing %d Process Events results to report' % len(process_output))
for event in process_output:
report.append(event)
report.append('')
report.append('File Activity:')
report.append('==================')
log_debug('[*] Writing %d Filesystem Events results to report' % len(file_output))
for event in file_output:
report.append(event)
report.append('')
report.append('Registry Activity:')
report.append('==================')
log_debug('[*] Writing %d Registry Events results to report' % len(reg_output))
for event in reg_output:
report.append(event)
report.append('')
report.append('Network Traffic:')
report.append('==================')
log_debug('[*] Writing %d Network Events results to report' % len(net_output))
for event in net_output:
report.append(event)
report.append('')
report.append('Unique Hosts:')
report.append('==================')
log_debug('[*] Writing %d Remote Servers results to report' % len(remote_servers))
for server in sorted(remote_servers):
report.append(protocol_replace(server).strip())
if error_output:
report.append('\r\n\r\n\r\n\r\n\r\n\r\nERRORS DETECTED')
report.append('The following items could not be parsed correctly:')
log_debug('[*] Writing %d Output Errors results to report' % len(error_output))
for error in error_output:
report.append(error)
if debug and vt_dump:
vt_file = output_dir + os.path.splitext(csv_file)[0] + '.vt.json'
log_debug('[*] Writing %d VirusTotal results to %s' % (len(vt_dump), vt_file))
vt_out = open(vt_file, 'w')
json.dump(vt_dump, vt_out)
vt_out.close()
if debug and debug_messages:
debug_file = output_dir + os.path.splitext(csv_file)[0] + '.log'
debug_out = open(debug_file, 'wb')
for message in debug_messages:
debug_out.write(message)
debug_out.close()
End of parse_csv()
def main():
"""
Main routine, parses arguments and calls other routines
Arguments:
None
Results:
None
"""
global generalize_paths
global timeout_seconds
global yara_folder
global use_pmc
global debug
global exe_cmdline
global output_dir
header1 = '--===[ Noriben v%s ]===--' % __VERSION__
header2 = '--===[%s@bbaskin%s]===--'
padding = (len(header1)) - (len(header2) - 4)
print(header1)
print(header2 % (' ' * (padding / 2), ' ' * (padding / 2)))
parser = ArgumentParser()
parser.add_argument('-c', '--csv', help='Re-analyze an existing Noriben CSV file', required=False)
parser.add_argument('-p', '--pml', help='Re-analyze an existing Noriben PML file', required=False)
parser.add_argument('-f', '--filter', help='Specify alternate Procmon Filter PMC', required=False)
parser.add_argument('--hash', help='Specify MD5 file whitelist', required=False)
parser.add_argument('-t', '--timeout', help='Number of seconds to collect activity', required=False, type=int)
parser.add_argument('--output', help='Folder to store output files', required=False)
parser.add_argument('--yara', help='Folder containing YARA rules', required=False)
parser.add_argument('--generalize', dest='generalize_paths', default=False, action='store_true',
help='Generalize file paths to their environment variables. Default: %s' % generalize_paths,
required=False)
parser.add_argument('--cmd', help='Command line to execute (in quotes)', required=False)
parser.add_argument('-d', dest='debug', action='store_true', help='Enable debug tracebacks', required=False)
args = parser.parse_args()
report = list()
timeline = list()
if args.debug:
debug = True
# Check to see if string generalization is wanted
if args.generalize_paths:
generalize_paths = True
generalize_vars_init()
# Load MD5 white list and append to global white list
if args.hash:
if file_exists(args.hash):
read_hash_file(args.hash)
# Check for a valid filter file
if args.filter:
if file_exists(args.filter):
pmc_file = args.filter
else:
pmc_file = 'ProcmonConfiguration.PMC'
else:
pmc_file = 'ProcmonConfiguration.PMC'
if not file_exists(pmc_file):
use_pmc = False
print('[!] Filter file %s not found. Continuing without filters.' % pmc_file)
else:
use_pmc = True
print('[*] Using filter file: %s' % pmc_file)
# Find a valid procmon executable.
procmonexe = check_procmon()
if not procmonexe:
print('[!] Unable to find Procmon (%s) in path.' % procmon)
sys.exit(1)
# Check to see if specified output folder exists. If not, make it.
# This only works one path deep. In future, may make it recursive.
if args.output:
output_dir = args.output
if not os.path.exists(output_dir):
try:
os.mkdir(output_dir)
except WindowsError:
print('[!] Fatal: Unable to create output directory: %s' % output_dir)
sys.exit(1)
else:
output_dir = ''
# Check to see if specified YARA folder exists
use_yara = False
if args.yara or yara_folder:
if not yara_folder:
yara_folder = args.yara
if not yara_folder[-1] == '\\':
yara_folder += '\\'
if not os.path.exists(yara_folder):
print('[!] YARA rule path not found: %s' % yara_folder)
yara_folder = ''
use_yara = False
else:
use_yara = True
# Print feature list
print('[+] Features: (Debug: %s\tYARA: %s\tVirusTotal: %s)' % (debug, use_yara, use_virustotal))
# Check if user-specified to rescan a PML
if args.pml:
if file_exists(args.pml):
# Reparse an existing PML
csv_file = output_dir + os.path.splitext(args.pml)[0] + '.csv'
txt_file = output_dir + os.path.splitext(args.pml)[0] + '.txt'
timeline_file = output_dir + os.path.splitext(args.pml)[0] + '_timeline.csv'
process_PML_to_CSV(procmonexe, args.pml, pmc_file, csv_file)
if not file_exists(csv_file):
print('[!] Error detected. Could not create CSV file: %s' % csv_file)
sys.exit(1)
parse_csv(csv_file, report, timeline)
print('[*] Saving report to: %s' % txt_file)
codecs.open(txt_file, 'w', 'utf-8').write('\r\n'.join(report))
print('[*] Saving timeline to: %s' % timeline_file)
codecs.open(timeline_file, 'w', 'utf-8').write('\r\n'.join(timeline))
open_file_with_assoc(txt_file)
sys.exit()
else:
print('[!] PML file does not exist: %s\n' % args.pml)
parser.print_usage()
sys.exit(1)
# Check if user-specified to rescan a CSV
if args.csv:
if file_exists(args.csv):
# Reparse an existing CSV
txt_file = os.path.splitext(args.csv)[0] + '.txt'
timeline_file = os.path.splitext(args.csv)[0] + '_timeline.csv'
parse_csv(args.csv, report, timeline)
print('[*] Saving report to: %s' % txt_file)
codecs.open(txt_file, 'w', 'utf-8').write('\r\n'.join(report))
print('[*] Saving timeline to: %s' % timeline_file)
codecs.open(timeline_file, 'w', 'utf-8').write('\r\n'.join(timeline))
open_file_with_assoc(txt_file)
sys.exit()
else:
parser.print_usage()
sys.exit(1)
if args.timeout:
timeout_seconds = args.timeout
if args.cmd:
exe_cmdline = args.cmd
else:
exe_cmdline = ''
# Start main data collection and processing
print('[*] Using procmon EXE: %s' % procmonexe)
session_id = get_session_name()
pml_file = output_dir + 'Noriben_%s.pml' % session_id
csv_file = output_dir + 'Noriben_%s.csv' % session_id
txt_file = output_dir + 'Noriben_%s.txt' % session_id
timeline_file = output_dir + 'Noriben_%s_timeline.csv' % session_id
print('[*] Procmon session saved to: %s' % pml_file)
print('[*] Launching Procmon ...')
launch_procmon_capture(procmonexe, pml_file, pmc_file)
if exe_cmdline:
print('[*] Launching command line: %s' % exe_cmdline)
subprocess.Popen(exe_cmdline)
else:
print('[*] Procmon is running. Run your executable now.')
if timeout_seconds:
print('[*] Running for %d seconds. Press Ctrl-C to stop logging early.' % timeout_seconds)
# Print a small progress indicator, for those REALLY long sleeps.
try:
for i in range(timeout_seconds):
progress = (100 / timeout_seconds) * i
sys.stdout.write('\r%d%% complete' % progress)
sys.stdout.flush()
sleep(1)
except KeyboardInterrupt:
pass
else:
print('[*] When runtime is complete, press CTRL+C to stop logging.')
try:
while True:
sleep(100)
except KeyboardInterrupt:
pass
print('\n[*] Termination of Procmon commencing... please wait')
terminate_procmon(procmonexe)
print('[*] Procmon terminated')
if not file_exists(pml_file):
print('[!] Error creating PML file!')
sys.exit(1)
# PML created, now convert it to a CSV for parsing
process_PML_to_CSV(procmonexe, pml_file, pmc_file, csv_file)
if not file_exists(csv_file):
print('[!] Error detected. Could not create CSV file: %s' % csv_file)
sys.exit(1)
# Process CSV file, results in 'report' and 'timeline' output lists
parse_csv(csv_file, report, timeline)
print('[*] Saving report to: %s' % txt_file)
codecs.open(txt_file, 'w', 'utf-8').write('\r\n'.join(report))
print('[*] Saving timeline to: %s' % timeline_file)
codecs.open(timeline_file, 'w', 'utf-8').write('\r\n'.join(timeline))
open_file_with_assoc(txt_file)
# End of main()
if name == 'main':
main()
I'm wondering if there is some filtering mishap somewhere that's throwing this off.
The PML file will be the biggest set of data. Procmon then converts that to a CSV file that should have the same number of records. Noriben takes that CSV and creates the report and timeline.CSV.
If that original CSV file is blank or has few contents, then somehow Procmon is overly filtering between the two parts. If you do have a substantial CSV (over 1MB) then could you please zip it up and email it to brian@thebaskins.com? I can then go through it manually to see exactly what's causing the problem.
Sample 'dir' output from one of my runs:
05/28/2013 05:22 PM 31,506,736 Noriben_28_May_13__16_12_21_330000.csv
05/28/2013 05:27 PM 29,062 Noriben_28_May_13__16_12_21_330000.txt
05/28/2013 05:27 PM 30,448 Noriben_28_May_13__16_12_21_330000_timeline.csv
05/28/2013 05:28 PM 29,360,128 Noriben_28_May_13__16_27_45_815000.pml
I'll try to get this for later tonight or tomorrow.
On Apr 10, 2015 5:23 PM, "Brian Baskin" notifications@github.com wrote:
I'm wondering if there is some filtering mishap somewhere that's throwing
this off.The PML file will be the biggest set of data. Procmon then converts that
to a CSV file that should have the same number of records. Noriben takes
that CSV and creates the report and timeline.CSV.If that original CSV file is blank or has few contents, then somehow
Procmon is overly filtering between the two parts. If you do have a
substantial CSV (over 1MB) then could you please zip it up and email it to
brian@thebaskins.com? I can then go through it manually to see exactly
what's causing the problem.Sample 'dir' output from one of my runs:
05/28/2013 05:22 PM 31,506,736 Noriben_28_May_13__16_12_21_330000.csv
05/28/2013 05:27 PM 29,062 Noriben_28_May_13__16_12_21_330000.txt
05/28/2013 05:27 PM 30,448 Noriben_28_May_13__16_12_21_330000_timeline.csv
05/28/2013 05:28 PM 29,360,128 Noriben_28_May_13__16_27_45_815000.pml—
Reply to this email directly or view it on GitHub
#4 (comment).
No rush on my end.
This error has been fixed with the latest release.
Glad to hear! Thank you for the update.
You're certainly welcome.
On Mon, May 4, 2015 at 3:37 PM, Brian Baskin notifications@github.com
wrote:
Glad to hear! Thank you for the update.
—
Reply to this email directly or view it on GitHub
#4 (comment).
Thank you for reaching out. I have edited the API out of the comment (60a...7eb).