Last active
July 2, 2023 22:13
-
-
Save daddycocoaman/108d807e89a0f9731304bc848fa219f0 to your computer and use it in GitHub Desktop.
PyDefenderCheck
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
################################################## | |
## PyDefenderCheck - Python implementation of DefenderCheck | |
################################################## | |
## Author: daddycocoaman | |
## Based on: https://github.com/matterpreter/DefenderCheck | |
################################################## | |
import argparse | |
import enum | |
import json | |
import subprocess | |
import tempfile | |
from itertools import zip_longest | |
from dataclasses import asdict, dataclass | |
from pathlib import Path | |
# Taken from https://docs.python.org/3/library/itertools.html#itertools-recipes | |
def grouper(iterable, n, fillvalue=None): | |
args = [iter(iterable)] * n | |
return zip_longest(*args, fillvalue=fillvalue) | |
# Modified from https://www.geoffreybrown.com/blog/a-hexdump-program-in-python/ | |
def hexdump(hexBytes: bytes, startingByte: int = 0, bytesPerLine: int = 16) -> str: | |
result = [] | |
hexStringWidth = bytesPerLine * 3 | |
for idx, line in enumerate(grouper(hexBytes, bytesPerLine)): | |
s1 = " ".join([f"{i:02x}" for i in line]) # hex string | |
s1 = ( | |
s1[0:23] + " " + s1[23:] | |
) # insert extra space between groups of 8 hex values | |
s2 = "".join( | |
[chr(i) if 32 <= i <= 127 else "." for i in line] | |
) # ascii string; chained comparison | |
result.append( | |
f"{startingByte - 256 + (idx * 16):08x} {s1:<{hexStringWidth}} {s2}" | |
) | |
return "\n".join(result) | |
class ScanResult(enum.Enum): | |
NoThreatFound = 0 | |
ThreatFound = 2 | |
@dataclass | |
class DefenderScannerResult: | |
filename: str | |
signature: str | |
offendingOffset: int | |
hexdump: str | |
def __repr__(self) -> str: | |
if self.signature and self.offendingOffset and self.hexdump: | |
sig = f"\nSignature: {self.signature}\n" | |
offset = f"Offset: {self.offendingOffset}\n\n" | |
return sig + offset + self.hexdump | |
return "No threat found!" | |
def to_json(self): | |
return json.dumps(asdict(self)) | |
class DefenderScanner: | |
def __init__(self, filename: Path) -> None: | |
self.filename = filename | |
self.signature = None | |
self.lastgood = 0 | |
self.complete = False | |
self.offendingOffset = 0 | |
self.hexdump = None | |
self.scan() | |
@property | |
def result(self) -> DefenderScannerResult: | |
return DefenderScannerResult( | |
str(self.filename), self.signature, self.offendingOffset, self.hexdump | |
) | |
def _scan(self, filename: Path, getsig=False) -> ScanResult: | |
procArguments = f"C:\Program Files\Windows Defender\MpCmdRun.exe -Scan -ScanType 3 -File {filename.absolute()} -DisableRemediation -Trace -Level 0x10" | |
process = subprocess.run(procArguments.split(), timeout=30, capture_output=True) | |
if not self.signature: | |
for line in process.stdout.splitlines(): | |
if line.startswith(b"Threat"): | |
self.signature = line.split()[-1].decode() | |
return ScanResult(process.returncode) | |
def _halfSplit(self, originalBytes: bytes) -> bytes: | |
splitBytesLen = (len(originalBytes) - self.lastgood) // 2 + self.lastgood | |
if len(originalBytes) == splitBytesLen + 1: | |
self.offendingOffset = hex(len(originalBytes)) | |
if len(originalBytes) < 256: | |
self.hexdump = hexdump(originalBytes, int(self.offendingOffset, 16)) | |
else: | |
self.hexdump = hexdump( | |
originalBytes[-256:], int(self.offendingOffset, 16) | |
) | |
self.complete = True | |
return originalBytes[:splitBytesLen] | |
def _overshot(self, originalBytes: bytes, splitbytessize: int) -> bytes: | |
newsize = (len(originalBytes) - splitbytessize) // 2 + splitbytessize | |
if newsize == len(originalBytes) - 1: | |
return None | |
return originalBytes[:newsize] | |
def scan(self): | |
originalPath = Path(self.filename) | |
originalFileStatus = self._scan(originalPath, True) | |
# No threat found. Exit. | |
if originalFileStatus == ScanResult.NoThreatFound: | |
self.complete = True | |
# Start half-splitting | |
originalFileBytes = originalPath.read_bytes() | |
fileBytebytesPerLine = len(originalFileBytes) // 2 | |
splitArray1 = originalFileBytes[:fileBytebytesPerLine] | |
while not self.complete and splitArray1: | |
if splitArray1 is None: | |
print("Exhausted the search. The binary looks good to go!") | |
break | |
split1TempFile = tempfile.TemporaryFile() | |
split1TempFile.write(splitArray1) | |
result = self._scan(Path(split1TempFile.name)) | |
if result == ScanResult.ThreatFound: | |
splitArray1 = self._halfSplit(splitArray1) | |
# If threat not found, scan second half and continue recursion | |
elif result == ScanResult.NoThreatFound: | |
self.lastgood = len(splitArray1) | |
splitArray1 = self._overshot(originalFileBytes, len(splitArray1)) | |
if __name__ == "__main__": | |
parser = argparse.ArgumentParser(description="Python version of DefenderCheck") | |
parser.add_argument("filename", type=argparse.FileType("r")) | |
args = parser.parse_args() | |
scanner = DefenderScanner(Path(args.filename.name)) | |
print(scanner.result) |
@kpomeroy1979 This python script is based on https://github.com/matterpreter/DefenderCheck.
Defender on, submissions off.
Does the script work for scripting languages such as PowerShell or was it
designed only for executables?
…On Thursday, February 18, 2021, Leron Gray ***@***.***> wrote:
***@***.**** commented on this gist.
------------------------------
@kpomeroy1979 <https://github.com/kpomeroy1979> This python script is
based on https://github.com/matterpreter/DefenderCheck.
Defender on, submissions off.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<https://gist.github.com/108d807e89a0f9731304bc848fa219f0#gistcomment-3636774>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AH5LZHWMEJPNOBBQMAWED2LS7XA4XANCNFSM4X3QGFDQ>
.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Love the tool btw!
What is the ideal Anti-Virus configuration when using pyDefenderCheck.py to check files? AV on but automatic submissions / cloud submissions off? AV off? Run the tool and malware from an excluded directory?
Also, it seems like the application hangs after 30 seconds when scanning PowerShell scripts.