GithubHelp home page GithubHelp logo

vvelitkn / evasion-escaper Goto Github PK

View Code? Open in Web Editor NEW
100.0 3.0 15.0 595 KB

Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environment or sandbox, and to pass all such checks successfully.

License: Apache License 2.0

Batchfile 0.09% C++ 88.94% C 10.98%

evasion-escaper's Introduction

Project: Evasion Escaper

The primary objective of this project is to evade the various checks that malicious software employs to identify if it's running in a virtual environment or sandbox, and to pass all such checks with success. To accomplish this, a novel approach has been adopted that leverages a DLL to effortlessly track the DLLs loaded on the system, access their addresses, and modify them as required. As a reference and test case, "Al-Khaser by LordNoteworthy" has been utilized. The ultimate goal of this project is to overcome the controls that malicious software implements in a sandbox or virtual machine environment to conceal its malicious activities.

Technical blog post: Escape From Evasion: Dominating Windows Functions with Detour

Content

Bypass Methods for Application Checks in Evasion Escaper

This project introduces several new bypass methods for application checks, such as:

  • WMI Query requests, including ExecQuery and Get methods
  • Known dynamic link libraries (DLLs)
  • Known usernames, computer names, netbios hostnames, and DNS hostnames
  • Known files' availability and filenamess
  • CloseHandle protected handle trick using SetHandleInformation
  • Device registry property access using SetupDiGetDeviceRegistryPropertyW
  • Enumeration of running services using EnumServicesStatusExW
  • Retrieval of disk space information using GetDiskFreeSpaceExW
  • Registry value retrieval using RegQueryValueExW
  • Registry key enumeration using RegEnumKeyExW
  • Delay execution using NtDelayExecution
  • Timers, including SetTimer, TimeSetEvent, WaitForSingleObject, SetWaitableTimer, and CreateTimerQueueTimer
  • Retrieval of system firmware table information using GetSystemFirmwareTable and EnumSystemFirmwareTables
  • ...

This project is open to ongoing development and contribution, with plans to add additional improvements to the current bypass methods in future commits. The code has been structured to enhance readability and maintainability. As the project progresses, documentation for the bypass methods will be continuously updated and refined. Contributions from the community are highly welcomed and appreciated.

Other Solutions & Additional Sources

  • __cpuid (link)
  • Function outputs documented in assets/targeted_functions_documentation.md

Installation

To install Evasion Escaper, follow these simple steps:

  • Clone or download the project from the GitHub repository: https://github.com/vvelitkn/Evasion-Escaper
  • Navigate to the Bin folder and run the install.reg, needs administrative privileges. This will make the necessary registry changes.
  • Open the agent.sln file in Visual Studio 2022 and build the solution. This will generate the agent.dll file in the Bin folder.
  • That's it! Evasion Escaper is now ready to use.

Usage

  • Make sure the agent.dll file located in the Bin folder to your project directory. If not repeat the Installation steps.
  • Rename the target executable file to target.exe (Al-Khaser sample compiled and zipped under Bin folder, password: infected)
  • Run the install.bat file with administrative privileges: right-click on the file and select "Run as administrator".
  • Execute target.exe.
  • When the target.exe is executed, the agent.dll file will automatically be loaded and any necessary setup will be performed.

Note: Make sure to run your project in a virtual environment. Do not test it on your actual device.

I do not assume any liability for any potential risks or legal issues associated with the use of this project, and users are solely responsible for any consequences resulting from its use. Additionally, the project is provided under the Apache License 2.0, and by using this project, users agree to comply with the terms and conditions outlined in the license agreement. Any violation of the license terms may result in legal action.

Risks and Limitations

While Evasion Escaper is designed to bypass detection methods used by malicious software in virtual environments or sandboxes, it is important to note that no security tool is 100% foolproof. As with any security tool, there may be unknown vulnerabilities or untested scenarios that could potentially bypass the tool's evasion techniques.

Additionally, the use of Evasion Escaper to bypass security measures in unauthorized or malicious activities is strictly prohibited and could result in legal consequences.

License

Evasion Escaper is licensed under the Apache License 2.0. This means that it is free to use, modify, and distribute, provided that proper attribution is given to the original authors and any changes made to the project are clearly documented. It is important to review the full text of the license agreement before using Evasion Escaper to ensure compliance with the terms and conditions outlined in the license.

References

evasion-escaper's People

Contributors

vvelitkn avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar

evasion-escaper's Issues

Implement Windows Function Monitoring with Logging and Operation Recording

This feature aims to implement function monitoring using detour functions in the project. By replacing the original function with our own implementation, we can log function calls and parameters, as well as record the operations performed by the function. This will provide valuable insights for the project development, and enable us to log activities for later analysis and advanced implementations.

The feature will allow the user to better understand the behavior of malware by observing its function calls and operations. It will also enable the user to manage and track malware activities effectively.

Feedback and suggestions are welcome to ensure the optimal direction of this process, and all ideas will be considered.

Request for Feedback and Suggestions on Documentation Improvement

This issue is created to enhance the documentation of the project and to improve its usability and ease of development by welcoming everyone's ideas and suggestions towards this end.

Please provide your feedback and suggestions in the comments section of this issue.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.