#include <ntddk.h>
//#include <ntifs.h>
#include <windef.h>
ULONG g_NtGetContextThread;
ULONG g_uCr0;
BYTE g_HookCode[5] = { 0xe9, 0, 0, 0, 0 };
BYTE g_OrigCode[5] = { 0 }; // 原函數(shù)的前字節(jié)內(nèi)容
BYTE jmp_orig_code[7] = { 0xEA, 0, 0, 0, 0, 0x08, 0x00 };
BOOL g_bHooked = FALSE;
typedef struct _SERVICE_DESCRIPTOR_TABLE
{
PVOID ServiceTableBase;
PULONG ServiceCounterTableBase;
ULONG NumberOfService;
ULONG ParamTableBase;
}SERVICE_DESCRIPTOR_TABLE,*PSERVICE_DESCRIPTOR_TABLE;
NTSTATUS PsLookupProcessByProcessId(IN ULONG ulProcId, OUT PEPROCESS * pEProcess);
VOID NtGetContextThread
(
IN HANDLE ThreadHandle,
OUT PCONTEXT pContext
);
VOID NewNtGetContextThread
(
IN HANDLE ThreadHandle,
OUT PCONTEXT pContext
);
extern PSERVICE_DESCRIPTOR_TABLE KeServiceDescriptorTable;
typedef struct _THREAD_BASIC_INFORMATION
{
NTSTATUS ExitStatus;
PVOID TebBaseAddress;
CLIENT_ID ClientId;
KAFFINITY AffinityMask;
KPRIORITY Priority;
KPRIORITY BasePriority;
} THREAD_BASIC_INFORMATION, *PTHREAD_BASIC_INFORMATION;
NTSYSAPI NTSTATUS NTAPI NtQueryInformationThread
(
IN HANDLE ThreadHandle,
IN THREADINFOCLASS ThreadInformationClass,
OUT PVOID ThreadInformation,
IN ULONG ThreadInformationLength,
OUT PULONG ReturnLength OPTIONAL
);
void WPOFF()
{
ULONG uAttr;
_asm
{
push eax;
mov eax, cr0;
mov uAttr, eax;
and eax, 0FFFEFFFFh; // CR0 16 BIT = 0
mov cr0, eax;
pop eax;
cli
};
g_uCr0 = uAttr; //保存原有的 CRO 屬性
}
VOID WPON()
{
_asm
{
sti
push eax;
mov eax, g_uCr0; //恢復原有 CR0 屬性
mov cr0, eax;
pop eax;
};
}
//
// 停止inline hook
//
VOID UnHookNtGetContextThread()
{
KIRQL oldIrql;
WPOFF();
oldIrql = KeRaiseIrqlToDpcLevel();
if(g_NtGetContextThread)
{
RtlCopyMemory ( (BYTE*)g_NtGetContextThread, g_OrigCode, 5 );
}
KeLowerIrql(oldIrql);
WPON();
g_bHooked = FALSE;
}
//
// 開始inline hook -- NtGetContextThread
//
VOID HookNtGetContextThread()
{
KIRQL oldIrql;
if (g_NtGetContextThread == 0) {
DbgPrint("NtGetContextThread == NULL\n");
return;
}
//DbgPrint("開始inline hook -- NtGetContextThread\n");
DbgPrint( "NtGetContextThread Addrress is:0x%08x\n", (ULONG)g_NtGetContextThread );
// 保存原函數(shù)的前字節(jié)內(nèi)容
RtlCopyMemory (g_OrigCode, (BYTE*)g_NtGetContextThread, 5);
*( (ULONG*)(g_HookCode + 1) ) = (ULONG)NtGetContextThread - (ULONG)g_NtGetContextThread - 5;
// 禁止系統(tǒng)寫保護,提升IRQL到DPC
WPOFF();
oldIrql = KeRaiseIrqlToDpcLevel();
RtlCopyMemory ( (BYTE*)g_NtGetContextThread, g_HookCode, 5 );
*( (ULONG*)(jmp_orig_code + 1) ) = (ULONG) ( (BYTE*)g_NtGetContextThread + 5 );
RtlCopyMemory ( (BYTE*)NewNtGetContextThread+0x4E, g_OrigCode, 5);
RtlCopyMemory ( (BYTE*)NewNtGetContextThread + 0x53, jmp_orig_code, 7);
// 恢復寫保護,降低IRQL
KeLowerIrql(oldIrql);
WPON();
g_bHooked = TRUE;
}
// 跳轉(zhuǎn)到我們的函數(shù)里面進行預處理
__declspec (naked)
VOID NtGetContextThread
(
IN HANDLE ThreadHandle,
OUT PCONTEXT pContext
)
{
//DbgPrint("inline hook -- KiInsertQueueApc 成功\n");
__asm
{
jmp NewNtGetContextThread
}
}
// 代理函數(shù),負責跳轉(zhuǎn)到原函數(shù)中繼續(xù)執(zhí)行
DWORD __stdcall GetProcessIdOfThread(HANDLE Thread)
{
THREAD_BASIC_INFORMATION ThreadBasic;
NTSTATUS Status;
Status = NtQueryInformationThread(Thread,
ThreadBasicInformation,
&ThreadBasic,
sizeof(THREAD_BASIC_INFORMATION),
NULL);
if(!NT_SUCCESS(Status))
{
return 0;
}
return (DWORD)ThreadBasic.ClientId.UniqueProcess;
}
__declspec (naked)
VOID NewNtGetContextThread
(
IN HANDLE ThreadHandle,
OUT PCONTEXT pContext
)
{
PEPROCESS uEprocess ;
DWORD pid;
NTSTATUS status;
LPTSTR ProcessName;
pid=GetProcessIdOfThread(ThreadHandle);
DbgPrint("pid=%0x,ChaoNiMa\n",pid);
status= PsLookupProcessByProcessId(pid,&uEprocess);
ProcessName = (LPTSTR)uEprocess+0x1FC;
DbgPrint("ThreadHandle=%s,pContext=%0x,ChaoNiMa\n",ProcessName,pContext);
__asm { // 共字節(jié)
_emit 0x90
_emit 0x90
_emit 0x90
_emit 0x90
_emit 0x90 // 前字節(jié)實現(xiàn)原函數(shù)的頭字節(jié)功能
_emit 0x90 // 這個填充jmp
_emit 0x90
_emit 0x90
_emit 0x90
_emit 0x90 // 這字節(jié)保存原函數(shù)+5處的地址
_emit 0x90
_emit 0x90 // 因為是長轉(zhuǎn)移,所以必須是0x0080
}
}
ULONG GetFunctionAddr(IN PCWSTR FunctionName)
{
UNICODE_STRING UniCodeFunctionName;
RtlInitUnicodeString(&UniCodeFunctionName, FunctionName);
return (ULONG)MmGetSystemRoutineAddress(&UniCodeFunctionName);
}
//根據(jù)特征值,從KeInsertQueueApc搜索中搜索KiInsertQueueApc
ULONG FindKiInsertQueueApcAddress()
{
char * Addr_KeInsertQueueApc = 0;
int i = 0;
char Findcode[] = { 0xE8, 0xcc, 0x29, 0x00, 0x00 };
ULONG Addr_KiInsertQueueApc = 0;
Addr_KeInsertQueueApc = (char *) GetFunctionAddr(L"KeInsertQueueApc");
for(i = 0; i < 100; i ++)
{
if( Addr_KeInsertQueueApc[i] == Findcode[0] &&
Addr_KeInsertQueueApc[i + 1] == Findcode[1] &&
Addr_KeInsertQueueApc[i + 2] == Findcode[2] &&
Addr_KeInsertQueueApc[i + 3] == Findcode[3] &&
Addr_KeInsertQueueApc[i + 4] == Findcode[4]
)
{
Addr_KiInsertQueueApc = (ULONG)&Addr_KeInsertQueueApc[i] + 0x29cc + 5;
break;
}
}
return Addr_KiInsertQueueApc;
}
VOID OnUnload( IN PDRIVER_OBJECT DriverObject )
{
DbgPrint("UnHookNtGetContextThread");
UnHookNtGetContextThread();
}
NTSTATUS DriverEntry( IN PDRIVER_OBJECT theDriverObject, IN PUNICODE_STRING theRegistryPath )
{
//UNICODE_STRING UniCodeFunctionName;
DbgPrint("HooK NtGetContextThread Sample!\n");
theDriverObject->DriverUnload = OnUnload;
//RtlInitUnicodeString(&UniCodeFunctionName, L"NtGetContextThread");
//g_NtGetContextThread=(ULONG)MmGetSystemRoutineAddress(&UniCodeFunctionName);
//p=(ULONG *)((ULONG)KeServiceDescriptorTable->ServiceTableBase + 0x55*4);
//NtQueryInformationThread =(NTSTATUS )*(ULONG *)((ULONG)KeServiceDescriptorTable->ServiceTableBase + 0x9B*4);;
g_NtGetContextThread=*(ULONG *)((ULONG)KeServiceDescriptorTable->ServiceTableBase + 0x55*4);;
HookNtGetContextThread();
return STATUS_SUCCESS;
}
|