Some Time Travel musings

If WinDbg was already setting the standard of what modern debuggers should be like, no doubt WinDbg Preview brings it to a next level. The JavaScript API is not perfect yet but already very efficient, so we don't have to rely on PyKd for proper (and portable) WinDbg scripting (I won't even mention WDS). As a start, I could not recommend enough reading @0vercl0k if you haven't already read it, which not only covers TTD but a lot more.

Time-Travel Debugging

Introduction

Since the feature got publicly available last year, there hasn't been that much coverage on the topic and as I finally took some time to fiddle with it for various cases (from malware analysis to CTF) I figured I could contribute with a quick write-up.

As the name implies, Time-Travel Debugging is a tool that will allow to travel through the runtime of process that you create or attach to. It'll monitor everything then store it a separate indexed database file, that can be fed to WinDbg Preview. The debugger will then have a Read-Only access on the execution, allowing to jump back and forth to desired points of the runtime. That's already quite nice, but what makes it more powerful is the integration with the Data Model (via the dx command) and the JS API.

Time Travel + Data Model

TTD 101: Moving around

I was curious to see what could be done so I decided to record via WinDbg a simple Notepad session. TTD is as simple as it gets: start WinDbg (as Admin), and launch the target executable after checking the Record process with Time Travel Debugging

image_alt

Typed some stuff and closed notepad. WinDbg starts by reading the trace and indexing the database, and breaks at the loader entry point. The indexes (look like XX:YY where X and Y are hex-digits) are like coordinates that can be used to travel around so we can move to an absolute position like

0:000> !tt 7213:36
Setting position: 7213:36
(12c4.1dcc): Break instruction exception - code 80000003 (first/second chance not available)
Time Travel Position: 7213:36
KERNELBASE!VirtualAlloc:
00007ffe`15c433a0 4053            push    rbx

It is also possible to simply step-over backwards (p-), step-into backwards (t-), or go backwards (g-) - one can notice that commands for backwards are the same as for forward, with a - suffixed to the command. All the other commands, like for breakpoints, or accessing memory/registers work just the same.

That's already quite fun, but WinDbg can go a lot further.

Enter the Debugger Data Model...

WinDbg can use LINQ to query the TTD database, to synthetize a lot more of runtime information in a very painless way. To do so, a new attribute TTD was added to the runtime variables $curprocess

0:000> dx @$curprocess.TTD
@$curprocess.TTD
    Lifetime         : [2C:0, 2EB0F:0]
    Threads
    Events

and $cursession

0:000> dx @$cursession.TTD
@$cursession.TTD                 : [object Object]
    Calls            [Returns call information from the trace for the specified set of methods: TTD.Calls("module!method1", "module!method2", ...) For example: dx @$cursession.TTD.Calls("user32!SendMessageA")]
    Memory           [Returns memory access information for specified address range: TTD.Memory(startAddress, endAddress [, "rwec"])]
    DefaultParameterCount : 0x4
    AsyncQueryEnabled : false
    Resources
    Data             : Normalized data sources based on the contents of the time travel trace
    Utility          : Methods that can be useful when analyzing time travel traces
 Note:
You might want to enable DML too (by running the command .prefer_dml 1) if you want to click your way through those methods.

Among some of the most interesting parts, we can now query function calls, like

0:000> dx @$cursession.TTD.Calls("ntdll!mem*").Count()
@$cursession.TTD.Calls("ntdll!mem*").Count() : 0x2ef8

Will count the number of calls to function matching ntdll!mem* pattern, or even filter function calls per parameter

0:000> dx @$cursession.TTD.Calls("Kernel*!VirtualAlloc*").Where( c => c.Parameters[3] == 0x40 ).Count()
$cursession.TTD.Calls("Kernel*!VirtualAlloc*").Where( c => c.Parameters[3] == 0x40).Count() : 0x1

Which will filter the calls to function matching Kernel*!VirtualAlloc* pattern, where the 4th parameter is PAGE_EXECUTE_READWRITE (0x40).

Another useful feature is the memory access, exposed by

0:000> dx $cursession.TTD
  [...]
  Memory       [Returns memory access information for specified address range: TTD.Memory(startAddress, endAddress [, "rwec"])]

To take the real life example of a self-decrypting packer, that would allocate some memory (likely in RWX), then decrypt the code and finally jump to it. If we were to reverse such packer, we don't care much about how the payload is decrypted (could be a simple XOR, could be AES, could be custom crypto, etc.), what we only care about is what the code looks like once decrypted. And that becomes stupidly easy with TTD + DDM:

// Isolate the address(es) newly allocated as RWX
0:000> dx @$cursession.TTD.Calls("Kernel*!VirtualAlloc*").Where( f => f.Parameters[3] == 0x40 ).Select( f => new {Address : f.ReturnValue } )

// Time-Travel to when the 1st byte is executed
0:000> dx @$cursession.TTD.Memory(0xAddressFromAbove, 0xAddressFromAbove+1, "e")[0].TimeStart.SeekTo()​

Done! Then you can .writemem that code into a file that IDA can disassemble.

Update (11/11/2018) :

And since all this goodness can be used from JavaScript (via the host.namespace.Debugger namespace), it's really not far to write scripts for automatically dump such payloads, track heap allocations, enumerate all files created etc. And it came to me a surprise (not really actually, @0vercl0k just told me), that when using the ttd.exe binary as a standalone, one can pass the -children flag allowing TTD to also record children processes.

Nothing is forgotten

Back to the notepad session. Even though no file was saved to disk, I did type some stuff on the keyboard, so I figured that they must have been recorded somewhere by TTD. Let's hunt them down!

Notepad uses Windows' Messaging mechanism so that when a key is stroke, an event is passed down to notepad (or any other app fwiw) who decides whether to pick it up or not (the Windows Message internals is not the focus of this post but this is a pretty good introduction), to know whether the canvas must be redrawn, the window close, etc. This messaging system being articulated around fetching messages (via user32!GetMessage) and pushing them (via user32!SendMessage). The GetMessage() function prototype is :

BOOL GetMessage(
  LPMSG lpMsg,
  HWND  hWnd,
  UINT  wMsgFilterMin,
  UINT  wMsgFilterMax
);

It is easily possible to filter those calls as mentioned earlier:

0:000> dx @$cursession.TTD.Calls("user32!GetMessage*")
@$cursession.TTD.Calls("user32!GetMessage*").Count() : 0x1e8

One way I found to narrow so many calls down is to see is to focus rather on the message itself, which is Parameters[0] of the function call:

image_alt

It seems that the message is always stored at 0xa30fb6fc00, and has the following structure

typedef struct tagMSG {
  HWND   hwnd;
  UINT   message;
  WPARAM wParam;
  LPARAM lParam;
  DWORD  time;
  POINT  pt;
  DWORD  lPrivate;
} MSG, *PMSG, *NPMSG, *LPMSG;

We can now monitor all the memory accesses to the address 0xa30fb6fc00

0:000> dx -r1 -nv (*((wintypes!MSG *)0xa30fb6fc00))
(*((wintypes!MSG *)0xa30fb6fc00))                 : {msg=0x102 wp=0x74 lp=0x140001} [Type: MSG]
    [+0x000] hwnd             : 0x12044a [Type: HWND__ *]
    [+0x008] message          : 0x102 [Type: unsigned int]
    [+0x010] wParam           : 0x74 [Type: unsigned __int64]
    [+0x018] lParam           : 1310721 [Type: __int64]
    [+0x020] time             : 0x0 [Type: unsigned long]
    [+0x024] pt               [Type: tagPOINT]

MSG.wParam in particular will hold the value of the keycode when the key is stroke, so we can also narrow it to ASCII characters

0:000> dx -g @$cursession.TTD.Memory(0xa30fb6fc10, 0xa30fb6fc10+8, "w").Where(m => m.Value >= 0x20 && m.Value < 0x80)
===============================================================================================================================================================================
=           = (+) EventType   = (+) ThreadId = (+) UniqueThreadId = (+) TimeStart = (+) TimeEnd = (+) AccessType = (+) IP            = (+) Address     = (+) Size = (+) Value =
===============================================================================================================================================================================
= [0x5e]    - MemoryAccess    - 0x1dcc       - 0x2                - A04C:6A       - A04C:6A     - Write          - 0x7ffe169066ae    - 0xa30fb6fc10    - 0x8      - 0x54      =
= [0x5f]    - MemoryAccess    - 0x1dcc       - 0x2                - A050:7        - A050:7      - Write          - 0x7ffe16911b4f    - 0xa30fb6fc10    - 0x8      - 0x74      =
= [0x60]    - MemoryAccess    - 0x1dcc       - 0x2                - A695:6A       - A695:6A     - Write          - 0x7ffe169066ae    - 0xa30fb6fc10    - 0x8      - 0x74      =
= [0x61]    - MemoryAccess    - 0x1dcc       - 0x2                - A70E:6A       - A70E:6A     - Write          - 0x7ffe169066ae    - 0xa30fb6fc10    - 0x8      - 0x48      =
= [0x64]    - MemoryAccess    - 0x1dcc       - 0x2                - A72D:7        - A72D:7      - Write          - 0x7ffe16911b4f    - 0xa30fb6fc10    - 0x8      - 0x68      =
= [0x65]    - MemoryAccess    - 0x1dcc       - 0x2                - ABE3:6A       - ABE3:6A     - Write          - 0x7ffe169066ae    - 0xa30fb6fc10    - 0x8      - 0x68      =
[...]

That's a lot more interesting so we use LINQ even further to print the characters directly by casting the Value to char and we get

0:000> dx -g @$cursession.TTD.Memory(0xa30fb6fc10, 0xa30fb6fc10+8, "w").Where(m => m.Value >= 0x20 && m.Value < 0x80).Select( c => (char)c.Value )
====================
=                  =
====================
= [0x5e] : 84 'T'  =
= [0x5f] : 116 't' =
= [0x60] : 116 't' =
= [0x61] : 72 'H'  =
= [0x64] : 104 'h' =
= [0x65] : 104 'h' =
= [0x66] : 84 'T'  =
= [0x67] : 73 'I'  =
= [0x68] : 105 'i' =
= [0x69] : 105 'i' =
= [0x6a] : 72 'H'  =
= [0x6d] : 83 'S'  =
= [0x6e] : 115 's' =
= [0x6f] : 115 's' =
= [0x70] : 73 'I'  =
= [0x71] : 32 ' '  = // Reads 'This '
[...]

Here we see multiple times the same character: the reason being that for one key stroke, multiple events are raised (WM_KEYDOWN, WM_KEYUP). Since we haven't done any filtering at the DDM level, notepad captures all the events. It would be fairly easy from that point to create a JS script to only get one type of message, but this will be left at the curiosity of the reader (focus on capturing only the messages of type WM_KEYDOWN (0x100).

Last words

This concludes this light post about TTD and its DDM integration.

TTD brings a new approach to traditional debugging which is a huge plus. Not only that, but its integration in WinDbg with LINQ and DDM makes it even more powerful, and I hope this small post helped in making those tools more approachable.

In the mean time, I'll leave you with some links to dig deeper:

Cheers!