Documentation
¶
Overview ¶
Package analysis is responsable for the malware execution orchestration.
Index ¶
Constants ¶
View Source
const (
TimeFormat string = "02-01-2006 15:04:05 MST"
)
Variables ¶
View Source
var (
ErrFileEmpty = errors.New("log file is empty") // ErrFileEmpty occurs when the driver log file is empty.
)
Functions ¶
This section is empty.
Types ¶
type Analysis ¶
type Analysis struct {
Report *Report // Report represents the final artifact of the analysis process.
// contains filtered or unexported fields
}
type Environment ¶
type Environment struct {
// contains filtered or unexported fields
}
type FileMetadata ¶
type FileMetadata struct {
Filename string `json:"filename"`
Extension string `json:"extension"`
MimeType string `json:"mimetype"`
Size int64 `json:"size"`
LastModified string `json:"last_modified"`
MD5Sum string `json:"md5sum"`
SHA1Sum string `json:"sha1sum"`
SHA256Sum string `json:"sha256sum"`
}
Malware sample file information.
type ProcessMetadata ¶
type ProcessMetadata struct {
WindowsRegisters []WindowsRegisters `json:"windows_registers"`
WindowsFS []WindowsFileSystem `json:"windows_fs"`
WindowsBinariesLoaded []WindowsBinariesLoaded `json:"windows_binaries_loaded"`
WindowsProcess []WindowsProcess `json:"windows_process"`
}
Malware process information
type Report ¶
type Report struct {
Request RequestMetadata `json:"request_metadata"`
Process ProcessMetadata `json:"process_metadata"`
}
Report represents the final artifact of the analysis process.
type RequestMetadata ¶
type RequestMetadata struct {
Status string `json:"status"`
ID string `json:"id"`
DriverVersion string `json:"driver_version"`
TemplateID int `json:"template_id"`
StartTime string `json:"start_time"`
EndTime string `json:"end_time"`
Log []string `json:"log"`
Error string `json:"error"`
File FileMetadata `json:"file_metadata"`
}
type WindowsBinariesLoaded ¶
type WindowsFileSystem ¶
type WindowsFileSystem struct {
Date string `json:"date"`
Time string `json:"time"`
InfoType string `json:"info_type"`
MJFunc string `json:"mj_func"`
PID string `json:"pid"`
TID string `json:"tid"`
SID string `json:"sid"`
TokenType string `json:"token_type"`
Privileges []Privilege `json:"privileges"`
ElevationStatus string `json:"elevation_status"`
ImageName string `json:"image_name"`
Path string `json:"path"`
FileName string `json:"file_name"`
}
type WindowsProcess ¶
type WindowsProcess struct {
Date string `json:"date"`
Time string `json:"time"`
InfoType string `json:"info_type"`
PPID string `json:"ppid"`
PID string `json:"pid"`
Operation string `json:"operation"`
TokenType string `json:"token_type"`
Privileges []Privilege `json:"privileges"`
ElevationStatus string `json:"elevation_status"`
ParentName string `json:"parent_name"`
ChildName string `json:"child_name"`
}
Click to show internal directories.
Click to hide internal directories.