-
Notifications
You must be signed in to change notification settings - Fork 22
/
config.h
113 lines (78 loc) · 2.88 KB
/
config.h
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
#ifndef __CONFIG_H
#define __CONFIG_H
/*
Cuckoo Sandbox - Automated Malware Analysis
Copyright (C) 2010-2012 Cuckoo Sandbox Developers
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#define EXCLUSION_MAX 128
struct _g_config {
// name of the pipe to communicate with cuckoo
wchar_t pipe_name[MAX_PATH];
char logserver[MAX_PATH];
// results directory, has to be hidden
char results[MAX_PATH];
// results directory, has to be hidden
wchar_t w_results[MAX_PATH];
// analyzer directory, has to be hidden
char analyzer[MAX_PATH];
// analyzer directory, has to be hidden
wchar_t w_analyzer[MAX_PATH];
// cuckoomon DLL directory
wchar_t dllpath[MAX_PATH];
// file of interest
wchar_t *file_of_interest;
// URL of interest
wchar_t *url_of_interest;
// Referrer for initial URL request
wchar_t *w_referrer;
char *referrer;
// if this mutex exists then we're shutting down
char shutdown_mutex[MAX_PATH];
// event set by analyzer when our process is potentially going to be terminated
// cuckoomon itself will flush logs at this point, but the analyzer may take additional
// actions, like process dumping
char terminate_event_name[MAX_PATH];
// is this the first process or not?
int first_process;
// do we want to ignore "file of interest" and other forms of log reduction?
int full_logs;
// should we attempt anti-anti-sandbox/VM tricks ?
int no_stealth;
// how many milliseconds since startup
unsigned int startup_time;
// system volume serial number (for reproducing Milicenso)
unsigned int serial_number;
// system32 create time (for reproducing Milicenso)
FILETIME sys32_ctime;
// system volume information create time (for reproducing Milicenso)
FILETIME sysvol_ctime;
// do we force sleep-skipping despite threads?
int force_sleepskip;
// do we force flushing of each log?
int force_flush;
// Debugging level (1 = display exceptions, 2 = display all exceptions)
int debug;
// Default hook type (may be overridden for specific functions)
int hook_type;
// Disable hook content
int disable_hook_content;
// server ip and port
//unsigned int host_ip;
//unsigned short host_port;
BOOLEAN suspend_logging;
char *excluded_apinames[EXCLUSION_MAX];
wchar_t *excluded_dllnames[EXCLUSION_MAX];
};
extern struct _g_config g_config;
int read_config(void);
#endif