Skip to content

Generate Nt* system call sequence #1

@shikharvaish28

Description

@shikharvaish28

I have managed to run the code after which we have some doubts. Please clear some of those. The primary motive is to get a list of sequence Nt* calls as you have used in your paper System Call-Based Detection of Malicious Processes.

  1. The database generated contains only the processes and their path such as chrome.exe etc. How should we extract the 'Nt*' process calls from the same?
    db

  2. debug_log.txt contains too many lines mentioning something like this but with different addresses 'UNKNOWN System Call Enter NT FFFFF802702D11D4 on core 3. ' What is this address pointing?

debug_log-2
debug_log-1

  1. 100s of *_trace files generated with the size of 0 kb. How did you use them?
    image

EDIT:

  1. In one of our Windows 7 systems, we have got *_trace file with some size. Since they are binary files written using BinaryWriter, how should I open it and read it's content? (Same is the case with host_trace_data

  2. When executing the tool in the util directory, it is generating an empty symbol file.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions