Skip to content

Commit 686057d

Browse files
authored
Merge pull request #1800 from SolitudePy/develop
add functions to etwpatch
2 parents 57b28e5 + f719efb commit 686057d

File tree

1 file changed

+7
-2
lines changed

1 file changed

+7
-2
lines changed

volatility3/framework/plugins/windows/etwpatch.py

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,8 @@
1212
vollog = logging.getLogger(__name__)
1313

1414

15+
# EtwpEventWriteFull -> https://github.com/SolitudePy/Stealthy-ETW-Patch
16+
# CAPA rule -> https://github.com/mandiant/capa-rules/blob/master/anti-analysis/anti-av/patch-event-tracing-for-windows-function.yml
1517
class EtwPatch(interfaces.plugins.PluginInterface):
1618
"""Identifies ETW (Event Tracing for Windows) patching techniques used by malware to evade detection.
1719
@@ -30,10 +32,14 @@ class EtwPatch(interfaces.plugins.PluginInterface):
3032
"EtwEventWrite",
3133
"EtwEventWriteFull",
3234
"NtTraceEvent",
35+
"ZwTraceEvent",
36+
"NtTraceControl",
37+
"ZwTraceControl",
38+
"EtwpEventWriteFull",
3339
],
3440
},
3541
"advapi32.dll": {
36-
pe_symbols.wanted_names_identifier: ["EventWrite"],
42+
pe_symbols.wanted_names_identifier: ["EventWrite", "TraceEvent"],
3743
},
3844
}
3945

@@ -75,7 +81,6 @@ def _generator(self):
7581
kernel_module_name=self.config["kernel"],
7682
filter_func=filter_func,
7783
):
78-
7984
try:
8085
proc_id = proc.UniqueProcessId
8186
proc_name = utility.array_to_string(proc.ImageFileName)

0 commit comments

Comments
 (0)