Skip to content

Create new unbacked execution sig file#552

Merged
kevoreilly merged 7 commits intoCAPESandbox:masterfrom
kevross33:patch-793056
Mar 25, 2026
Merged

Create new unbacked execution sig file#552
kevoreilly merged 7 commits intoCAPESandbox:masterfrom
kevross33:patch-793056

Conversation

@kevross33
Copy link
Copy Markdown
Contributor

Mostly moved and split out from unbacked_misc/activities (see this for more info). Just as was growing too big.

Mostly moved and split out from unbacked_misc/activities (see this for more info). Just as was growing too big.
@gemini-code-assist
Copy link
Copy Markdown
Contributor

Summary of Changes

Hello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed!

This pull request significantly enhances the detection capabilities for advanced evasion and fileless execution techniques by introducing a dedicated set of signatures. These new signatures focus on identifying various forms of malicious activity originating from dynamically allocated, unbacked memory regions, such as library loading, exception handler registration, process creation, APC queuing, and thread execution. This refactoring centralizes related detection logic, improving maintainability and clarity.

Highlights

  • New Unbacked Execution Signatures: Introduced a new signature file unbacked_execution.py containing five distinct signatures to detect various forms of execution originating from dynamically allocated (unbacked) memory.
  • Unbacked Library Load Detection: Added UnbackedLibraryLoad signature to identify suspicious DLL loads where the caller address is within unbacked memory regions.
  • Unbacked VEH Registration Detection: Implemented UnbackedVehRegistration signature to flag Vectored Exception Handlers (VEH) that point to unbacked memory, often indicative of stealthy techniques.
  • Unbacked Process Creation Detection: Included UnbackedProcessCreation signature to detect attempts to spawn child processes from code residing in unbacked memory.
  • Unbacked APC Execution Detection: Developed UnbackedMemoryApcExecution signature to identify Asynchronous Procedure Calls (APCs) queued to routines located in unbacked memory.
  • Unbacked Thread Creation Detection: Created ThreadUnbackedMemory signature to detect the creation of threads that execute from dynamically allocated, unbacked memory, specifically tracking RWX or RX regions.

🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console.

Using Gemini Code Assist

The full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips.

Invoking Gemini

You can request assistance from Gemini at any point by creating a comment using either /gemini <command> or @gemini-code-assist <command>. Below is a summary of the supported commands on the current page.

Feature Command Description
Code Review /gemini review Performs a code review for the current pull request in its current state.
Pull Request Summary /gemini summary Provides a summary of the current pull request in its current state.
Comment @gemini-code-assist Responds in comments when explicitly tagged, both in pull request comments and review comments.
Help /gemini help Displays a list of available commands.

Customization

To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a .gemini/ folder in the base of the repository. Detailed instructions can be found here.

Limitations & Feedback

Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here.

Footnotes

  1. Review the Privacy Notices, Generative AI Prohibited Use Policy, Terms of Service, and learn how to configure Gemini Code Assist in GitHub here. Gemini can make mistakes, so double check it and use code with caution.

Copy link
Copy Markdown
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

The pull request introduces a new file with five Cuckoo signatures to detect malicious activities related to unbacked memory. The general idea is sound, but the implementation suffers from significant code duplication across all five signature classes, which makes the code difficult to maintain. Additionally, there is a critical syntax error in one of the classes that will prevent it from running. I've provided suggestions to refactor the duplicated code and fix the syntax error.

@kevoreilly kevoreilly merged commit f1d401a into CAPESandbox:master Mar 25, 2026
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants