This file is indexed.

/usr/lib/python2.7/dist-packages/rekall/plugins/windows/crashinfo.py is in python-rekall-core 1.6.0+dfsg-2.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
# Rekall Memory Forensics
#
# Copyright 2013 Google Inc. All Rights Reserved.
#
# Authors:
# Michael Cohen <scudette@gmail.com>
# Based on code by Aaron Walters.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or (at
# your option) any later version.
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
#

# pylint: disable=protected-access

from rekall import plugin
from rekall import testlib
from rekall.plugins.windows import common
from rekall.plugins.addrspaces import crash
from rekall.plugins.addrspaces import standard
from rekall.plugins.overlays.windows import crashdump


class WritableCrashDump(crash.WindowsCrashDumpSpace64,
                        standard.WritableAddressSpace):
    """A writable crash dump address space.

    When creating a new crash dump, we need to moodify the image:
    1) To rebuild the KDBG block.
    2) To decrypt the KDBG block in images which obfuscate it.
    """


class Raw2Dump(common.WindowsCommandPlugin):
    """Convert the physical address space to a crash dump.

    The Windows debugger (Windbg) works only with memory dumps stored
    in the proprietary 'crashdump' file format. This file format
    contains the following features:

    1) Physical memory ranges are stored in a sparse way - there is a
       'Runs' table which specifies the mapping between the physical
       offset and the file offset of each page. This allows the format
       to omit unmapped regions (unlike raw format which must pad them
       with zero to maintain alignment).

    2) The crash dump header contains metadata about the
       image. Specifically, the header contain a copy of the Kernel
       Debugger Data Block (AKA the KDBG). This data is used to
       bootstrap the windows debugger by providing critical initial
       hints to the debugger.

    Since the KDBG block is created at system boot and never used
    (until the crash dump is written) it is trivial for malware to
    overwrite it - making it really hard for responders since windbg
    will not be able to read the file. In later versions of windows,
    the kdbg is also obfuscated (See the function "nt!KdCopyDataBlock"
    which decrypts it.).

    Rekall itself does not use the KDBG block any more, although older
    memory forensic tools still do use it. Rekall instead relies on
    accurate debugging symbols to locate critical kernel data
    structures, reducing the level of trust we place on the image
    itself (so Rekall is more resilient to manipulation).

    In order to ensure that the windows debugger is able to read the
    produced crash dump, we recreate the kernel debugger block from
    the symbol information we already have.

    NOTE: The crashdump file format can be deduced by:

    dis 'nt!IoFillDumpHeader'

    This is the reference for this plugin.
    """

    __name = "raw2dmp"

    __args = [
        dict(name="destination", positional=True, required=True,
             help="The destination path to write the crash dump."),

        dict(name="rebuild", type="Boolean",
             help="Rebuild the KDBG data block."),
    ]

    table_header = [
        dict(name="Message")
    ]

    table_options = dict(
        suppress_headers=True
    )

    def column_types(self):
        return dict(Message="")

    def __init__(self, *args, **kwargs):
        super(Raw2Dump, self).__init__(*args, **kwargs)
        if self.session.profile.metadata("arch") == "I386":
            self.profile = crashdump.CrashDump32Profile.Initialize(
                self.profile.copy())
        elif self.session.profile.metadata("arch") == "AMD64":
            self.profile = crashdump.CrashDump64Profile.Initialize(
                self.profile.copy())
        else:
            raise plugin.PluginError(
                "Unable to write crashdump for this architecture.")

        self.buffer_size = 10 * 1024 * 1024

    def _pointer_to_int(self, ptr):
        if self.profile.metadata("arch") == "I386":
            return ptr

        return ptr | 0xFFFFF00000000000

    def _SetKDBG(self, kdbg, member, symbol=None):
        if symbol is None:
            symbol = "nt!%s" % member

        symbol = self.session.address_resolver.get_address_by_name(symbol)

        # If the symbol does not exist in the profile, we ignore it here.
        if symbol == None:
            return

        kdbg.SetMember(member, self._pointer_to_int(symbol))

    def RebuildKDBG(self, out_fd):
        """Modify the destination image to rebuild the KDBG."""
        if self.profile.metadata("arch") == "I386":
            crash_as_cls = crash.WindowsCrashDumpSpace32
        else:
            crash_as_cls = crash.WindowsCrashDumpSpace64

        # Open the crash file for writing.
        crash_as = crash_as_cls(base=out_fd, session=self.session)

        kdbg_virtual_address = self.session.GetParameter("kdbg")
        kdbg_physical_address = self.kernel_address_space.vtop(
            kdbg_virtual_address)

        # Construct a _KDDEBUGGER_DATA64 over the old one.
        kdbg = self.profile._KDDEBUGGER_DATA64(
            offset=kdbg_physical_address,
            vm=crash_as)

        # Clear the old data just in case.
        crash_as.write(kdbg_physical_address, "\x00" * kdbg.obj_size)

        # The KDBG header.
        kdbg.Header.OwnerTag = "KDBG"
        kdbg.Header.Size = kdbg.obj_size
        kdbg.Header.List.Flink = kdbg.Header.List.Blink = (
            self._pointer_to_int(kdbg_virtual_address))

        kdbg.MmPageSize = 0x1000

        # _KTHREAD offsets.
        kthread = self.profile._KTHREAD()
        ethread = self.profile._ETHREAD()
        kdbg.SizeEThread = ethread.obj_size
        kdbg.OffsetKThreadNextProcessor = kthread.NextProcessor.obj_offset

        kdbg.OffsetKThreadTeb = kthread.Teb.obj_offset
        kdbg.OffsetKThreadKernelStack = kthread.KernelStack.obj_offset
        kdbg.OffsetKThreadInitialStack = kthread.InitialStack.obj_offset

        kdbg.OffsetKThreadState = kthread.State.obj_offset
        kdbg.OffsetKThreadApcProcess = kthread.ApcState.Process.obj_offset

        # _EPROCESS offsets.
        eprocess = self.profile._EPROCESS()
        kdbg.SizeEProcess = eprocess.obj_size
        kdbg.OffsetEprocessPeb = eprocess.m("Peb").obj_offset
        kdbg.OffsetEprocessParentCID = (
            eprocess.InheritedFromUniqueProcessId.obj_offset)
        kdbg.OffsetEprocessDirectoryTableBase = (
            eprocess.Pcb.DirectoryTableBase.obj_offset)

        # _KPRCB offsets.
        prcb = self.profile._KPRCB()
        kdbg.SizePrcb = prcb.obj_size
        kdbg.OffsetPrcbDpcRoutine = prcb.DpcRoutineActive.obj_offset
        kdbg.OffsetPrcbCurrentThread = prcb.CurrentThread.obj_offset
        kdbg.OffsetPrcbMhz = prcb.MHz.obj_offset
        kdbg.OffsetPrcbCpuType = prcb.CpuType.obj_offset
        kdbg.OffsetPrcbVendorString = prcb.VendorString.obj_offset
        kdbg.OffsetPrcbProcStateSpecialReg = (
            prcb.ProcessorState.SpecialRegisters.obj_offset)

        kdbg.OffsetPrcbProcStateContext = (
            prcb.ProcessorState.ContextFrame.obj_offset)

        kdbg.OffsetPrcbNumber = prcb.Number.obj_offset

        # _KPCR offsets.
        pcr = self.profile._KPCR()
        kdbg.SizePcr = pcr.obj_size

        if self.profile.metadata("arch") == "AMD64":
            kdbg.OffsetPrcbContext = prcb.Context.obj_offset
            kdbg.OffsetPcrSelfPcr = pcr.Self.obj_offset
            kdbg.OffsetPcrCurrentPrcb = pcr.CurrentPrcb.obj_offset
            kdbg.OffsetPcrContainedPrcb = pcr.Prcb.obj_offset

            # Clear the KdpDataBlockEncoded flag from the image.
            flag = self.profile.get_constant_object(
                "KdpDataBlockEncoded", "byte")

            crash_as.write(
                self.kernel_address_space.vtop(flag.obj_offset), "\x01")

        # Global constants.
        self._SetKDBG(kdbg, "CmNtCSDVersion")
        self._SetKDBG(kdbg, "ExpNumberOfPagedPools")
        self._SetKDBG(kdbg, "ExpPagedPoolDescriptor")
        self._SetKDBG(kdbg, "ExpPagedPoolDescriptor")
        self._SetKDBG(kdbg, "ExpSystemResourcesList")
        self._SetKDBG(kdbg, "KdPrintBufferSize")
        self._SetKDBG(kdbg, "KdPrintCircularBuffer")
        self._SetKDBG(kdbg, "KdPrintCircularBufferEnd", "nt!KdpBreakpointTable")
        self._SetKDBG(kdbg, "KdPrintRolloverCount")
        self._SetKDBG(kdbg, "KdPrintWritePointer")
        self._SetKDBG(kdbg, "KeLoaderBlock", "nt!KdpLoaderDebuggerBlock")
        self._SetKDBG(kdbg, "KeTimeIncrement")
        self._SetKDBG(kdbg, "KernBase", "nt")
        self._SetKDBG(kdbg, "KiBugCheckData")
        self._SetKDBG(kdbg, "KiCallUserMode")
        self._SetKDBG(kdbg, "KiProcessorBlock")
        self._SetKDBG(kdbg, "KiProcessorBlock")
        self._SetKDBG(kdbg, "MmAvailablePages")
        self._SetKDBG(kdbg, "MmFreePageListHead")
        self._SetKDBG(kdbg, "MmHighestPhysicalPage")
        self._SetKDBG(kdbg, "MmHighestUserAddress")
        self._SetKDBG(kdbg, "MmLastUnloadedDriver")
        self._SetKDBG(kdbg, "MmLoadedUserImageList")
        self._SetKDBG(kdbg, "MmLowestPhysicalPage")
        self._SetKDBG(kdbg, "MmMaximumNonPagedPoolInBytes")
        self._SetKDBG(kdbg, "MmModifiedNoWritePageListHead")
        self._SetKDBG(kdbg, "MmModifiedPageListHead")
        self._SetKDBG(kdbg, "MmNonPagedPoolStart")
        self._SetKDBG(kdbg, "MmNumberOfPagingFiles")
        self._SetKDBG(kdbg, "MmNumberOfPhysicalPages")
        self._SetKDBG(kdbg, "MmPagedPoolEnd")
        self._SetKDBG(kdbg, "MmPagedPoolInformation", "nt!MmPagedPoolInfo")
        self._SetKDBG(kdbg, "MmPfnDatabase")
        self._SetKDBG(kdbg, "MmPhysicalMemoryBlock")
        self._SetKDBG(kdbg, "MmResidentAvailablePages")
        self._SetKDBG(kdbg, "MmSizeOfPagedPoolInBytes")
        self._SetKDBG(kdbg, "MmStandbyPageListHead")
        self._SetKDBG(kdbg, "MmSubsectionBase")
        self._SetKDBG(kdbg, "MmSystemCacheWs")
        self._SetKDBG(kdbg, "MmSystemRangeStart")
        self._SetKDBG(kdbg, "MmUnloadedDrivers")
        self._SetKDBG(kdbg, "MmUserProbeAddress")
        self._SetKDBG(kdbg, "MmZeroedPageListHead")
        self._SetKDBG(kdbg, "NonPagedPoolDescriptor")
        self._SetKDBG(kdbg, "NtBuildLab")
        self._SetKDBG(kdbg, "ObpRootDirectoryObject")
        self._SetKDBG(kdbg, "ObpTypeObjectType")
        self._SetKDBG(kdbg, "PoolTrackTable")
        self._SetKDBG(kdbg, "PsActiveProcessHead")
        self._SetKDBG(kdbg, "PsLoadedModuleList")
        self._SetKDBG(kdbg, "PspCidTable")

    def collect(self):
        PAGE_SIZE = 0x1000

        # We write the image to the destination using the WritableAddressSpace.
        out_as = standard.WritableAddressSpace(
            filename=self.plugin_args.destination, session=self.session,
            mode="w+b")

        # Pad the header area with PAGE pattern:
        if self.profile.metadata("arch") == "AMD64":
            header = self.profile._DMP_HEADER64(vm=out_as)
            out_as.write(0, "PAGE" * (header.obj_size / 4))
            out_as.write(4, "DU64")
        else:
            # 32 bit systems use a smaller structure.
            header = self.profile._DMP_HEADER(vm=out_as)
            out_as.write(0, "PAGE" * (header.obj_size / 4))
            out_as.write(4, "DUMP")

            # PEA address spaces.
            if getattr(self.kernel_address_space, "pae", None):
                header.PaeEnabled = 1

        # Write the runs from our physical address space.
        number_of_pages = 0
        i = None

        for i, run in enumerate(self.physical_address_space.get_mappings()):
            # Convert to pages
            start = run.start / PAGE_SIZE
            length = run.length / PAGE_SIZE

            header.PhysicalMemoryBlockBuffer.Run[i].BasePage = start
            header.PhysicalMemoryBlockBuffer.Run[i].PageCount = length
            number_of_pages += length

        # There must be at least one run.
        if i is None:
            raise plugin.PluginError(
                "Physical address space has no available data.")

        header.PhysicalMemoryBlockBuffer.NumberOfRuns = i + 1
        header.PhysicalMemoryBlockBuffer.NumberOfPages = number_of_pages

        resolver = self.session.address_resolver

        # Set members of the crash header
        header.MajorVersion = 0xf
        header.MinorVersion = 0x1db1
        header.DirectoryTableBase = self.session.GetParameter("dtb")
        header.PfnDataBase = self._pointer_to_int(
            resolver.get_address_by_name("nt!MmPfnDatabase"))

        header.PsLoadedModuleList = self._pointer_to_int(
            resolver.get_address_by_name("nt!PsLoadedModuleList"))

        header.PsActiveProcessHead = self._pointer_to_int(
            resolver.get_address_by_name("nt!PsActiveProcessHead"))

        header.KdDebuggerDataBlock = self._pointer_to_int(
            resolver.get_address_by_name("nt!KdDebuggerDataBlock"))

        header.MachineImageType = 0x8664

        # Find the number of processors
        header.NumberProcessors = self.profile.get_constant_object(
            "KeNumberProcessors", "unsigned int")

        # Copy some stuff from _KUSER_SHARED_DATA.
        kuser_shared = self.profile.get_constant_object(
            "KI_USER_SHARED_DATA", "_KUSER_SHARED_DATA")
        header.SystemTime = kuser_shared.SystemTime.as_windows_timestamp()
        header.SystemUpTime = (
            kuser_shared.InterruptTime.LowPart +
            kuser_shared.InterruptTime.High1Time << 32) / 100000
        header.ProductType = kuser_shared.NtProductType
        header.SuiteMask = kuser_shared.SuiteMask

        # Zero out the BugCheck members
        header.BugCheckCode = 0x00000000
        header.BugCheckCodeParameter[0] = 0x00000000
        header.BugCheckCodeParameter[1] = 0x00000000
        header.BugCheckCodeParameter[2] = 0x00000000
        header.BugCheckCodeParameter[3] = 0x00000000

        # Set the sample run information
        header.RequiredDumpSpace = number_of_pages + header.obj_size / PAGE_SIZE
        header.DumpType = 1

        # Zero out the remaining non-essential fields from ContextRecordOffset
        # to ExceptionOffset.
        out_as.write(header.ContextRecord.obj_offset,
                     "\x00" * (header.m("Exception").obj_offset -
                               header.ContextRecord.obj_offset))

        # Set the "converted" comment
        out_as.write(header.Comment.obj_offset,
                     "Created with Rekall Memory Forensics\x00")

        # Now copy the physical address space to the output file.
        output_offset = header.obj_size
        for run in self.physical_address_space.get_mappings():
            # Convert to pages
            start = run.start / PAGE_SIZE
            length = run.length / PAGE_SIZE

            yield ("\nRun [0x%08X, 0x%08X] \n" % (start, length),)
            data_length = length * PAGE_SIZE
            start_offset = start * PAGE_SIZE
            offset = 0
            while data_length > 0:
                to_read = min(data_length, self.buffer_size)

                data = self.physical_address_space.read(
                    start_offset + offset, to_read)

                out_as.write(output_offset, data)
                output_offset += len(data)
                offset += len(data)
                data_length -= len(data)
                self.session.render_progress(
                    "Wrote %sMB.", (start_offset + offset) / 1024 / 1024)

        # Rebuild the KDBG data block if needed. According to the
        # disassembly of nt!KdCopyDataBlock the data block is
        # encrypted when nt!KdpDataBlockEncoded is non zero:

        # ------ nt!KdCopyDataBlock ------
        # SUB RSP, 0x28
        # CMP BYTE [RIP+0x10fac7], 0x0   0x0 nt!KdpDataBlockEncoded
        # MOV RDX, RCX
        # JZ 0xf8000291e6a7              nt!KdCopyDataBlock + 0x57

        if self.plugin_args.rebuild or self.profile.get_constant_object(
                "KdpDataBlockEncoded", "byte") > 0:
            yield ("Rebuilding KDBG data block.\n",)
            self.RebuildKDBG(out_as)


class TestRaw2Dump(testlib.HashChecker):
    PARAMETERS = dict(
        commandline="raw2dmp --rebuild %(tempdir)s/output.dmp "
    )