You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
160 lines
5.6 KiB
160 lines
5.6 KiB
#include <vmhook-eac.hpp>
|
|
|
|
void *operator new( u64 size )
|
|
{
|
|
//
|
|
// Could have also used ExAllocatePoolZero...
|
|
//
|
|
|
|
return RtlZeroMemory( ExAllocatePool( NonPagedPool, size ), size );
|
|
}
|
|
|
|
void operator delete( void *ptr, u64 size )
|
|
{
|
|
UNREFERENCED_PARAMETER( size );
|
|
ExFreePool( ptr );
|
|
}
|
|
|
|
__declspec( noinline ) void hook_sha1( void *data, unsigned int len, void *result )
|
|
{
|
|
sha1_ctx ctx;
|
|
sha1_init( &ctx );
|
|
|
|
//
|
|
// if EAC is trying to sha1 hash any data in readonly sections...
|
|
// then we hash the clone of the driver before it was patched...
|
|
//
|
|
// note: relocations are the same in the clone so those wont need to be handled...
|
|
//
|
|
|
|
if ( scn::read_only( g_image_base, ( u64 )data ) )
|
|
{
|
|
DBG_PRINT( "sha1 hash data = 0x%p, len = 0x%x, result = 0x%p\n", data, len, result );
|
|
sha1_update( &ctx, ( unsigned char * )g_image_clone + ( ( ( u64 )data ) - g_image_base ), len );
|
|
sha1_final( ( unsigned char * )result, &ctx );
|
|
return;
|
|
}
|
|
|
|
//
|
|
// else simply sha1 hash the data and return back to EasyAntiCheat.sys....
|
|
//
|
|
|
|
sha1_update( &ctx, ( unsigned char * )data, len );
|
|
sha1_final( ( unsigned char * )result, &ctx );
|
|
}
|
|
|
|
void image_loaded( PUNICODE_STRING image_name, HANDLE pid, PIMAGE_INFO image_info )
|
|
{
|
|
if ( !pid && wcsstr( image_name->Buffer, L"EasyAntiCheat.sys" ) )
|
|
{
|
|
if ( g_vmhook && g_vm_table && g_image_clone )
|
|
delete g_vmhook, delete g_vm_table, ExFreePool( ( void * )g_image_clone );
|
|
|
|
// > 0x00007FF77A233736 mov rcx, [r12+rax*8]
|
|
// > 0x00007FF77A23373D ror rcx, 0x30 <--- decrypt vm handler entry...
|
|
// > 0x00007FF77A233747 add rcx, r13
|
|
// > 0x00007FF77A23374A jmp rcx
|
|
vm::decrypt_handler_t _decrypt_handler = []( u64 val ) -> u64 { return _rotr64( val, 0x30 ); };
|
|
|
|
// > 0x00007FF77A233736 mov rcx, [r12+rax*8]
|
|
// > 0x00007FF77A23373D ror rcx, 0x30 <--- inverse to encrypt vm handler entry...
|
|
// > 0x00007FF77A233747 add rcx, r13
|
|
// > 0x00007FF77A23374A jmp rcx
|
|
vm::encrypt_handler_t _encrypt_handler = []( u64 val ) -> u64 { return _rotl64( val, 0x30 ); };
|
|
|
|
vm::handler::edit_entry_t _edit_entry = []( u64 *entry_ptr, u64 val ) -> void {
|
|
//
|
|
// disable write protect bit in cr0...
|
|
//
|
|
|
|
{
|
|
auto cr0 = __readcr0();
|
|
cr0 &= 0xfffffffffffeffff;
|
|
__writecr0( cr0 );
|
|
_disable();
|
|
}
|
|
|
|
*entry_ptr = val;
|
|
|
|
//
|
|
// enable write protect bit in cr0...
|
|
//
|
|
|
|
{
|
|
auto cr0 = __readcr0();
|
|
cr0 |= 0x10000;
|
|
_enable();
|
|
__writecr0( cr0 );
|
|
}
|
|
};
|
|
|
|
auto image_base = reinterpret_cast< u64 >( image_info->ImageBase );
|
|
auto handler_table_ptr = reinterpret_cast< u64 * >( image_base + EAC_VM_HANDLE_OFFSET );
|
|
|
|
//
|
|
// Clone the entire driver into a kernel pool, keep in mind relocations will also be
|
|
// the same as the original driver! Dont call any code in this clone, only refer to it...
|
|
//
|
|
|
|
g_image_clone = ( u64 )RtlCopyMemory( ExAllocatePool( NonPagedPool, image_info->ImageSize ),
|
|
image_info->ImageBase, image_info->ImageSize );
|
|
|
|
//
|
|
// allocate memory for a g_vmhook, and g_vm_table...
|
|
//
|
|
|
|
g_vm_table = new vm::handler::table_t( handler_table_ptr, _edit_entry );
|
|
g_vmhook = new vm::hook_t( image_base, EAC_IMAGE_BASE, _decrypt_handler, _encrypt_handler, g_vm_table );
|
|
g_image_base = image_base, g_image_size = image_info->ImageSize;
|
|
|
|
const auto callback = []( vm::registers *regs, u8 handler_idx ) {
|
|
const auto read_addr = reinterpret_cast< u64 * >( regs->rbp )[ 0 ];
|
|
|
|
// shoot the tires right off the virtualized integrity checks in about 2 lines of code...
|
|
if ( scn::read_only( g_image_base, read_addr ) )
|
|
{
|
|
DBG_PRINT( " READ(Q/DW/B) EasyAntiCheat.sys+0x%x\n", ( read_addr - g_image_base ) );
|
|
reinterpret_cast< u64 * >( regs->rbp )[ 0 ] = g_image_clone + ( read_addr - g_image_base );
|
|
}
|
|
};
|
|
|
|
// install hooks on READQ virtual machine handlers...
|
|
for ( auto idx = 0u; idx < sizeof g_readq_idxs; ++idx )
|
|
g_vm_table->set_callback( g_readq_idxs[ idx ], callback );
|
|
|
|
// install hooks on READDW virtual machine handlers...
|
|
for ( auto idx = 0u; idx < sizeof g_readdw_idxs; ++idx )
|
|
g_vm_table->set_callback( g_readdw_idxs[ idx ], callback );
|
|
|
|
// install hooks on READB virtual machine handlers...
|
|
for ( auto idx = 0u; idx < sizeof g_readb_idxs; ++idx )
|
|
g_vm_table->set_callback( g_readb_idxs[ idx ], callback );
|
|
|
|
//
|
|
// hooks all vm handlers and starts callbacks...
|
|
//
|
|
g_vmhook->start();
|
|
|
|
// hook on sha1 since it executes outside of the virtual machine...
|
|
// and does an integrity check on .text and .eac0...
|
|
make_inline_hook( &g_sha1_hook, ( void * )( image_base + EAC_SHA1_OFFSET ), &hook_sha1, true );
|
|
}
|
|
}
|
|
|
|
//
|
|
// this entry point is called by ZwSwapCert...
|
|
//
|
|
|
|
extern "C" NTSTATUS drv_entry( PDRIVER_OBJECT drv_object, PUNICODE_STRING reg_path )
|
|
{
|
|
UNREFERENCED_PARAMETER( drv_object );
|
|
UNREFERENCED_PARAMETER( reg_path );
|
|
|
|
//
|
|
// This kernel driver cannot be unloaded so there is no unload routine...
|
|
// This is because ZwSwapCert will cause the system to crash...
|
|
//
|
|
|
|
DBG_PRINT( "> registering on image load callbacks...\n" );
|
|
return PsSetLoadImageNotifyRoutine( &image_loaded );
|
|
} |