You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
vmhook-eac/src/drv_entry.cpp

160 lines
5.6 KiB

#include <vmhook-eac.hpp>
void *operator new( u64 size )
{
//
// Could have also used ExAllocatePoolZero...
//
return RtlZeroMemory( ExAllocatePool( NonPagedPool, size ), size );
}
void operator delete( void *ptr, u64 size )
{
UNREFERENCED_PARAMETER( size );
ExFreePool( ptr );
}
__declspec( noinline ) void hook_sha1( void *data, unsigned int len, void *result )
{
sha1_ctx ctx;
sha1_init( &ctx );
//
// if EAC is trying to sha1 hash any data in readonly sections...
// then we hash the clone of the driver before it was patched...
//
// note: relocations are the same in the clone so those wont need to be handled...
//
if ( scn::read_only( g_image_base, ( u64 )data ) )
{
DBG_PRINT( "sha1 hash data = 0x%p, len = 0x%x, result = 0x%p\n", data, len, result );
sha1_update( &ctx, ( unsigned char * )g_image_clone + ( ( ( u64 )data ) - g_image_base ), len );
sha1_final( ( unsigned char * )result, &ctx );
return;
}
//
// else simply sha1 hash the data and return back to EasyAntiCheat.sys....
//
sha1_update( &ctx, ( unsigned char * )data, len );
sha1_final( ( unsigned char * )result, &ctx );
}
void image_loaded( PUNICODE_STRING image_name, HANDLE pid, PIMAGE_INFO image_info )
{
if ( !pid && wcsstr( image_name->Buffer, L"EasyAntiCheat.sys" ) )
{
if ( g_vmhook && g_vm_table && g_image_clone )
delete g_vmhook, delete g_vm_table, ExFreePool( ( void * )g_image_clone );
// > 0x00007FF77A233736 mov rcx, [r12+rax*8]
// > 0x00007FF77A23373D ror rcx, 0x30 <--- decrypt vm handler entry...
// > 0x00007FF77A233747 add rcx, r13
// > 0x00007FF77A23374A jmp rcx
vm::decrypt_handler_t _decrypt_handler = []( u64 val ) -> u64 { return _rotr64( val, 0x30 ); };
// > 0x00007FF77A233736 mov rcx, [r12+rax*8]
// > 0x00007FF77A23373D ror rcx, 0x30 <--- inverse to encrypt vm handler entry...
// > 0x00007FF77A233747 add rcx, r13
// > 0x00007FF77A23374A jmp rcx
vm::encrypt_handler_t _encrypt_handler = []( u64 val ) -> u64 { return _rotl64( val, 0x30 ); };
vm::handler::edit_entry_t _edit_entry = []( u64 *entry_ptr, u64 val ) -> void {
//
// disable write protect bit in cr0...
//
{
auto cr0 = __readcr0();
cr0 &= 0xfffffffffffeffff;
__writecr0( cr0 );
_disable();
}
*entry_ptr = val;
//
// enable write protect bit in cr0...
//
{
auto cr0 = __readcr0();
cr0 |= 0x10000;
_enable();
__writecr0( cr0 );
}
};
auto image_base = reinterpret_cast< u64 >( image_info->ImageBase );
auto handler_table_ptr = reinterpret_cast< u64 * >( image_base + EAC_VM_HANDLE_OFFSET );
//
// Clone the entire driver into a kernel pool, keep in mind relocations will also be
// the same as the original driver! Dont call any code in this clone, only refer to it...
//
g_image_clone = ( u64 )RtlCopyMemory( ExAllocatePool( NonPagedPool, image_info->ImageSize ),
image_info->ImageBase, image_info->ImageSize );
//
// allocate memory for a g_vmhook, and g_vm_table...
//
g_vm_table = new vm::handler::table_t( handler_table_ptr, _edit_entry );
g_vmhook = new vm::hook_t( image_base, EAC_IMAGE_BASE, _decrypt_handler, _encrypt_handler, g_vm_table );
g_image_base = image_base, g_image_size = image_info->ImageSize;
const auto callback = []( vm::registers *regs, u8 handler_idx ) {
const auto read_addr = reinterpret_cast< u64 * >( regs->rbp )[ 0 ];
// shoot the tires right off the virtualized integrity checks in about 2 lines of code...
if ( scn::read_only( g_image_base, read_addr ) )
{
DBG_PRINT( " READ(Q/DW/B) EasyAntiCheat.sys+0x%x\n", ( read_addr - g_image_base ) );
reinterpret_cast< u64 * >( regs->rbp )[ 0 ] = g_image_clone + ( read_addr - g_image_base );
}
};
// install hooks on READQ virtual machine handlers...
for ( auto idx = 0u; idx < sizeof g_readq_idxs; ++idx )
g_vm_table->set_callback( g_readq_idxs[ idx ], callback );
// install hooks on READDW virtual machine handlers...
for ( auto idx = 0u; idx < sizeof g_readdw_idxs; ++idx )
g_vm_table->set_callback( g_readdw_idxs[ idx ], callback );
// install hooks on READB virtual machine handlers...
for ( auto idx = 0u; idx < sizeof g_readb_idxs; ++idx )
g_vm_table->set_callback( g_readb_idxs[ idx ], callback );
//
// hooks all vm handlers and starts callbacks...
//
g_vmhook->start();
// hook on sha1 since it executes outside of the virtual machine...
// and does an integrity check on .text and .eac0...
make_inline_hook( &g_sha1_hook, ( void * )( image_base + EAC_SHA1_OFFSET ), &hook_sha1, true );
}
}
//
// this entry point is called by ZwSwapCert...
//
extern "C" NTSTATUS drv_entry( PDRIVER_OBJECT drv_object, PUNICODE_STRING reg_path )
{
UNREFERENCED_PARAMETER( drv_object );
UNREFERENCED_PARAMETER( reg_path );
//
// This kernel driver cannot be unloaded so there is no unload routine...
// This is because ZwSwapCert will cause the system to crash...
//
DBG_PRINT( "> registering on image load callbacks...\n" );
return PsSetLoadImageNotifyRoutine( &image_loaded );
}