Unable to see API calls for a given sample #55
-
Hello, I am have tried using this tool but I have run in to an issue. I am trying to trace the API calls used by a packed sample during its unpacking process. The sample I am using at the moment is a basic Hancitor - 8ff43b6ddf6243bd5ee073f9987920fa223809f589d151d7e438fd8cc08ce292 (NOTE to readers - this is malware - available on malshare!) If I run the DLL through x32dbg (just DLL_MAIN, no args) I will hit breakpoints on API calls such as VirtualAlloc and VirtualProtect after 10-20 seconds. However, I am not seeing these same API calls in the tiny_tracer output. Is anyone able to test (in an isolated VM) and verify the same please? Should I be able to see these calls? Many thanks @hasherezade |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
hi @ogbillg ! Thank you for reporting, I will check it soon. |
Beta Was this translation helpful? Give feedback.
I checked your sample briefly, and from what I am seeing, the authors used a common, and yet very effective anti-emulation trick. Introduced a significant slowdown in execution, by various loops, redundant calculations, etc. When it runs freely on a machine, the slowdowns that you can observe are like 10-20 seconds. Unfortunately PIN, just like other dynamic binary instrumentation or emulation platforms, makes execution of each instruction much slower than normal. So the slowdown got multiplied, and grown from few seconds into much longer time. In theory, it usually is possible to just wait through it, and let it run for long enough time, but it may be very frustrating. What I usually do …