zoukankan      html  css  js  c++  java
  • 动态加载并执行Win32可执行程序

    本文所贴出的PoC代码将告诉你如何通过CreateProcess创建一个傀儡进程(称之为可执行程序A),并把dwCreationFlags设置为CREATE_SUSPENDED,然后把另一个可执行程序(称之为可执行程序B)的内容加载到所创建的进程空间中,最终借用傀儡进程(A)的外壳来执行可执行程序B的内容。同时这段代码也会告诉你如何手工对Win32可执行程序进行重定位处理,以及如何从进程空间中取消已经映射的EXE映像。

    在Windows操作系统下,通过给CreateProcess传递一个CREATE_SUSPENDED参数可以使得被创建的进程处于挂起状态,此时EXE的映像会被加载到进程空间中,但是并不会立即被执行,除非调用ResumeThread。在调用ResumeThread之前,可以通过调用ReadProcessMemory和WriteProcessMemory这样的API来读写进程空间的内容,这使得这样一种情形成为可能:通过读取另一个可执行文件的内容来覆盖刚创建的处于挂起状态的进程的空间,然后通过原始进程的空间来执行第二个可执行程序的内容。可以通过如下的步骤来完成这个过程:

    1. 通过给CreateProcess传递CREATE_SUSPENDED参数来创建一个处于挂起状态的进程(该进程为可执行程序A的一次执行)
    2. 通过调用GetThreadContext来获取被挂起进程的CONTEXT。其中ebx寄存器指向进程的PEB,eax寄存器的值为进程的入口点地址。
    3. 通过PEB来获取进程的基地址,如[EBX + 8]
    4. 把第二个可执行程序(B)加载到内存中并进行对齐处理,如果文件对齐尺寸和内存对齐尺寸不一致的话,这个操作是必须的。
    5. 如果可执行程序B和进程A有相同基地址并且B的内存镜像尺寸小于进程A的内存镜像尺寸,那么只需要简单的调用WriteProcessMemory来把可执行程序B的镜像写到进程A的内存空间之中,并从基地址开始执行即可。
    6. 否则的话,需要通过调用ZwUnmapViewOfSection(由ntdll.dll导出)来取消可执行程序A的映像映射,然后通过VirtualAllocEx在进程A中为可执行程序B分配足够的空间。调用VirtualAllocEx的时候,必须提供可执行程序B的基址以确保所分配的空间是从指定的位置开始的。然后把可执行程序B的镜像复制到进程A的内存空间并从分配的空间的起始地址开始执行。
    7. 如果ZwUnmapViewOfSection操作失败,而可执行程序B时可重定位的(存在重定位表),那么可以再进程A的内存空间的任意位置为B分配足够的空间,然后基于所分配的空间进行为B进行重定位处理,然后把可执行程序B的镜像复制到进程A的内存空间并从分配的空间的起始地址开始执行。
    8. 把进程A的PEB中的基地址改为可执行程序B的基地址。
    9. 把线程上下文中的EAX寄存器的值设置为可执行程序B的入口点。
    10. 通过调用SetThreadContext来设置线程的上下文。
    11. 通过调用ResumeThread来执行被挂起的进程。

    PoC展示的技术点:

    1. 手工对可执行程序进行重定位处理(如果存在有重定位表的话)。
    2. 使用ZwUnmapViewOfSection取消原始EXE的内存映像的映射。
    3. 使用ReadProcessMemory和WriteProcessMemory来读写别的进程的内存空间。
    4. 通过修改进程的PEB来修改其基地址的值。

    使用方法:傀儡进程默认为calc.exe(计算器),命令行下输入 loadEXE.exe

    联系作者:chewkeong[AT]security.org.sg
    原文链接:Dynamic Forking of Win32 EXE
    原始代码:

    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    64
    65
    66
    67
    68
    69
    70
    71
    72
    73
    74
    75
    76
    77
    78
    79
    80
    81
    82
    83
    84
    85
    86
    87
    88
    89
    90
    91
    92
    93
    94
    95
    96
    97
    98
    99
    100
    101
    102
    103
    104
    105
    106
    107
    108
    109
    110
    111
    112
    113
    114
    115
    116
    117
    118
    119
    120
    121
    122
    123
    124
    125
    126
    127
    128
    129
    130
    131
    132
    133
    134
    135
    136
    137
    138
    139
    140
    141
    142
    143
    144
    145
    146
    147
    148
    149
    150
    151
    152
    153
    154
    155
    156
    157
    158
    159
    160
    161
    162
    163
    164
    165
    166
    167
    168
    169
    170
    171
    172
    173
    174
    175
    176
    177
    178
    179
    180
    181
    182
    183
    184
    185
    186
    187
    188
    189
    190
    191
    192
    193
    194
    195
    196
    197
    198
    199
    200
    201
    202
    203
    204
    205
    206
    207
    208
    209
    210
    211
    212
    213
    214
    215
    216
    217
    218
    219
    220
    221
    222
    223
    224
    225
    226
    227
    228
    229
    230
    231
    232
    233
    234
    235
    236
    237
    238
    239
    240
    241
    242
    243
    244
    245
    246
    247
    248
    249
    250
    251
    252
    253
    254
    255
    256
    257
    258
    259
    260
    261
    262
    263
    264
    265
    266
    267
    268
    269
    270
    271
    272
    273
    274
    275
    276
    277
    278
    279
    280
    281
    282
    283
    284
    285
    286
    287
    288
    289
    290
    291
    292
    293
    294
    295
    296
    297
    298
    299
    300
    301
    302
    303
    304
    305
    306
    307
    308
    309
    310
    311
    312
    313
    314
    315
    316
    317
    318
    319
    320
    321
    322
    323
    324
    325
    326
    327
    328
    329
    330
    331
    332
    333
    334
    335
    336
    337
    338
    339
    340
    341
    342
    343
    344
    345
    346
    347
    348
    349
    350
    351
    352
    353
    354
    355
    356
    357
    358
    359
    360
    361
    362
    363
    364
    365
    366
    367
    368
    369
    370
    371
    372
    373
    374
    375
    376
    377
    378
    379
    380
    381
    382
    383
    384
    385
    386
    387
    388
    389
    390
    391
    392
    393
    394
    395
    396
    397
    398
    399
    400
    401
    402
    403
    404
    405
    406
    407
    408
    409
    410
    411
    412
    413
    414
    415
    416
    417
    418
    419
    420
    421
    422
    423
    424
    425
    426
    427
    428
    429
    430
    431
    432
    433
    434
    435
    436
    437
    438
    439
    440
    441
    442
    443
    444
    445
    446
    447
    448
    449
    450
    451
    452
    453
    454
    455
    456
    457
    458
    459
    460
    461
    462
    463
    464
    465
    466
    467
    468
    469
    470
    471
    472
    473
    474
    475
    476
    477
    478
    479
    480
    481
    482
    483
    484
    485
    486
    487
    488
    489
    490
    491
    492
    493
    494
    495
    496
    497
    498
    499
    500
    501
    502
    503
    504
    505
    506
    507
    508
    509
    510
    511
    512
    513
    514
    515
    516
    517
    518
    519
    520
    521
    522
    523
    524
    525
    526
    527
    528
    529
    530
    531
    532
    533
    534
    535
    536
    537
    538
    539
    540
    541
    542
    543
    544
    545
    546
    547
    548
    549
    550
    551
    552
    553
    554
    555
    556
    557
    558
    559
    560
    561
    562
    563
    564
    565
    566
    567
    568
    569
    570
    571
    572
    573
    574
    575
    576
    577
    578
    579
    580
    581
    582
    583
    584
    585
    586
    587
    588
    589
    590
    591
    592
    593
    594
    595
    596
    597
    598
    599
    600
    601
    602
    603
    604
    605
    606
    607
    608
    609
    610
    611
    612
    613
    614
    615
    616
    617
    618
    619
    620
    621
    622
    623
    624
    625
    626
    627
    628
    629
    630
    631
    632
    633
    634
    635
    636
    637
    638
    639
    640
    641
    642
    643
    644
    645
    646
    647
    648
    649
    650
    651
    652
    653
    654
    655
    656
    657
    658
    659
    660
    661
    662
    663
    664
    665
    666
    667
    668
    669
    670
    671
    672
    673
    674
    675
    676
    
    //******************************************************************************************
    // loadEXE.cpp : Defines the entry point for the console application.
    //
    // Proof-Of-Concept Code
    // Copyright (c) 2004
    // All rights reserved.
    //
    // Permission is hereby granted, free of charge, to any person obtaining a
    // copy of this software and associated documentation files (the
    // "Software"), to deal in the Software without restriction, including
    // without limitation the rights to use, copy, modify, merge, publish,
    // distribute, and/or sell copies of the Software, and to permit persons
    // to whom the Software is furnished to do so, provided that the above
    // copyright notice(s) and this permission notice appear in all copies of
    // the Software and that both the above copyright notice(s) and this
    // permission notice appear in supporting documentation.
    //
    // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
    // OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
    // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT
    // OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR
    // HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL
    // INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING
    // FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,
    // NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION
    // WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
    //
    // Usage:
    // loadEXE <EXE filename>
    //
    // This will execute calc.exe in suspended mode and replace its image with
    // the new EXE's image.  The thread is then resumed, thus causing the new EXE to
    // execute within the process space of svchost.exe.
    //
    //******************************************************************************************
     
    #include <stdio.h>
    #include <windows.h>
    #include <tlhelp32.h>
    #include <psapi.h>
     
    struct PE_Header 
    {
    	unsigned long signature;
    	unsigned short machine;
    	unsigned short numSections;
    	unsigned long timeDateStamp;
    	unsigned long pointerToSymbolTable;
    	unsigned long numOfSymbols;
    	unsigned short sizeOfOptionHeader;
    	unsigned short characteristics;
    };
     
    struct PE_ExtHeader
    {
    	unsigned short magic;
    	unsigned char majorLinkerVersion;
    	unsigned char minorLinkerVersion;
    	unsigned long sizeOfCode;
    	unsigned long sizeOfInitializedData;
    	unsigned long sizeOfUninitializedData;
    	unsigned long addressOfEntryPoint;
    	unsigned long baseOfCode;
    	unsigned long baseOfData;
    	unsigned long imageBase;
    	unsigned long sectionAlignment;
    	unsigned long fileAlignment;
    	unsigned short majorOSVersion;
    	unsigned short minorOSVersion;
    	unsigned short majorImageVersion;
    	unsigned short minorImageVersion;
    	unsigned short majorSubsystemVersion;
    	unsigned short minorSubsystemVersion;
    	unsigned long reserved1;
    	unsigned long sizeOfImage;
    	unsigned long sizeOfHeaders;
    	unsigned long checksum;
    	unsigned short subsystem;
    	unsigned short DLLCharacteristics;
    	unsigned long sizeOfStackReserve;
    	unsigned long sizeOfStackCommit;
    	unsigned long sizeOfHeapReserve;
    	unsigned long sizeOfHeapCommit;
    	unsigned long loaderFlags;
    	unsigned long numberOfRVAAndSizes;
    	unsigned long exportTableAddress;
    	unsigned long exportTableSize;
    	unsigned long importTableAddress;
    	unsigned long importTableSize;
    	unsigned long resourceTableAddress;
    	unsigned long resourceTableSize;
    	unsigned long exceptionTableAddress;
    	unsigned long exceptionTableSize;
    	unsigned long certFilePointer;
    	unsigned long certTableSize;
    	unsigned long relocationTableAddress;
    	unsigned long relocationTableSize;
    	unsigned long debugDataAddress;
    	unsigned long debugDataSize;
    	unsigned long archDataAddress;
    	unsigned long archDataSize;
    	unsigned long globalPtrAddress;
    	unsigned long globalPtrSize;
    	unsigned long TLSTableAddress;
    	unsigned long TLSTableSize;
    	unsigned long loadConfigTableAddress;
    	unsigned long loadConfigTableSize;
    	unsigned long boundImportTableAddress;
    	unsigned long boundImportTableSize;
    	unsigned long importAddressTableAddress;
    	unsigned long importAddressTableSize;
    	unsigned long delayImportDescAddress;
    	unsigned long delayImportDescSize;
    	unsigned long COMHeaderAddress;
    	unsigned long COMHeaderSize;
    	unsigned long reserved2;
    	unsigned long reserved3;
    };
     
     
    struct SectionHeader
    {
    	unsigned char sectionName[8];
    	unsigned long virtualSize;
    	unsigned long virtualAddress;
    	unsigned long sizeOfRawData;
    	unsigned long pointerToRawData;
    	unsigned long pointerToRelocations;
    	unsigned long pointerToLineNumbers;
    	unsigned short numberOfRelocations;
    	unsigned short numberOfLineNumbers;
    	unsigned long characteristics;
    };
     
    struct MZHeader
    {
    	unsigned short signature;
    	unsigned short partPag;
    	unsigned short pageCnt;
    	unsigned short reloCnt;
    	unsigned short hdrSize;
    	unsigned short minMem;
    	unsigned short maxMem;
    	unsigned short reloSS;
    	unsigned short exeSP;
    	unsigned short chksum;
    	unsigned short exeIP;
    	unsigned short reloCS;
    	unsigned short tablOff;
    	unsigned short overlay;
    	unsigned char reserved[32];
    	unsigned long offsetToPE;
    };
     
     
    struct ImportDirEntry
    {
    	DWORD importLookupTable;
    	DWORD timeDateStamp;
    	DWORD fowarderChain;
    	DWORD nameRVA;
    	DWORD importAddressTable;
    };
     
     
    //******************************************************************************************
    //
    // This function reads the MZ, PE, PE extended and Section Headers from an EXE file.
    //
    //******************************************************************************************
     
    bool readPEInfo(FILE *fp, MZHeader *outMZ, PE_Header *outPE, PE_ExtHeader *outpeXH,
    				SectionHeader **outSecHdr)
    {
    	fseek(fp, 0, SEEK_END);
    	long fileSize = ftell(fp);
    	fseek(fp, 0, SEEK_SET);
     
    	if(fileSize < sizeof(MZHeader))
    	{
    		printf("File size too small
    ");		
    		return false;
    	}
     
    	// read MZ Header
    	MZHeader mzH;
    	fread(&mzH, sizeof(MZHeader), 1, fp);
     
    	if(mzH.signature != 0x5a4d)		// MZ
    	{
    		printf("File does not have MZ header
    ");
    		return false;
    	}
     
    	//printf("Offset to PE Header = %X
    ", mzH.offsetToPE);
     
    	if((unsigned long)fileSize < mzH.offsetToPE + sizeof(PE_Header))
    	{
    		printf("File size too small
    ");		
    		return false;
    	}
     
    	// read PE Header
    	fseek(fp, mzH.offsetToPE, SEEK_SET);
    	PE_Header peH;
    	fread(&peH, sizeof(PE_Header), 1, fp);
     
    	//printf("Size of option header = %d
    ", peH.sizeOfOptionHeader);
    	//printf("Number of sections = %d
    ", peH.numSections);
     
    	if(peH.sizeOfOptionHeader != sizeof(PE_ExtHeader))
    	{
    		printf("Unexpected option header size.
    ");
     
    		return false;
    	}
     
    	// read PE Ext Header
    	PE_ExtHeader peXH;
     
    	fread(&peXH, sizeof(PE_ExtHeader), 1, fp);
     
    	//printf("Import table address = %X
    ", peXH.importTableAddress);
    	//printf("Import table size = %X
    ", peXH.importTableSize);
    	//printf("Import address table address = %X
    ", peXH.importAddressTableAddress);
    	//printf("Import address table size = %X
    ", peXH.importAddressTableSize);
     
     
    	// read the sections
    	SectionHeader *secHdr = new SectionHeader[peH.numSections];
     
    	fread(secHdr, sizeof(SectionHeader) * peH.numSections, 1, fp);
     
    	*outMZ = mzH;
    	*outPE = peH;
    	*outpeXH = peXH;
    	*outSecHdr = secHdr;
     
    	return true;
    }
     
     
    //******************************************************************************************
    //
    // This function calculates the size required to load an EXE into memory with proper alignment.
    //
    //******************************************************************************************
     
    int calcTotalImageSize(MZHeader *inMZ, PE_Header *inPE, PE_ExtHeader *inpeXH,
    				       SectionHeader *inSecHdr)
    {
    	int result = 0;
    	int alignment = inpeXH->sectionAlignment;
     
    	if(inpeXH->sizeOfHeaders % alignment == 0)
    		result += inpeXH->sizeOfHeaders;
    	else
    	{
    		int val = inpeXH->sizeOfHeaders / alignment;
    		val++;
    		result += (val * alignment);
    	}
     
     
    	for(int i = 0; i < inPE->numSections; i++)
    	{
    		if(inSecHdr[i].virtualSize)
    		{
    			if(inSecHdr[i].virtualSize % alignment == 0)
    				result += inSecHdr[i].virtualSize;
    			else
    			{
    				int val = inSecHdr[i].virtualSize / alignment;
    				val++;
    				result += (val * alignment);
    			}
    		}
    	}
     
    	return result;
    }
     
     
    //******************************************************************************************
    //
    // This function calculates the aligned size of a section
    //
    //******************************************************************************************
     
    unsigned long getAlignedSize(unsigned long curSize, unsigned long alignment)
    {	
    	if(curSize % alignment == 0)
    		return curSize;
    	else
    	{
    		int val = curSize / alignment;
    		val++;
    		return (val * alignment);
    	}
    }
     
     
    //******************************************************************************************
    //
    // This function loads a PE file into memory with proper alignment.
    // Enough memory must be allocated at ptrLoc.
    //
    //******************************************************************************************
     
    bool loadPE(FILE *fp, MZHeader *inMZ, PE_Header *inPE, PE_ExtHeader *inpeXH,
    			SectionHeader *inSecHdr, LPVOID ptrLoc)
    {
    	char *outPtr = (char *)ptrLoc;
     
    	fseek(fp, 0, SEEK_SET);
    	unsigned long headerSize = inpeXH->sizeOfHeaders;
     
        int i = 0;
     
    	// certain PE files have sectionHeaderSize value > size of PE file itself.  
    	// this loop handles this situation by find the section that is nearest to the
    	// PE header.
     
    	for(i = 0; i < inPE->numSections; i++)
    	{
    		if(inSecHdr[i].pointerToRawData < headerSize)
    			headerSize = inSecHdr[i].pointerToRawData;
    	}
     
    	// read the PE header
    	unsigned long readSize = fread(outPtr, 1, headerSize, fp);
    	//printf("HeaderSize = %d
    ", headerSize);
    	if(readSize != headerSize)
    	{
    		printf("Error reading headers (%d %d)
    ", readSize, headerSize);
    		return false;		
    	}
     
    	outPtr += getAlignedSize(inpeXH->sizeOfHeaders, inpeXH->sectionAlignment);
     
    	// read the sections
    	for(i = 0; i < inPE->numSections; i++)
    	{
    		if(inSecHdr[i].sizeOfRawData > 0)
    		{
    			unsigned long toRead = inSecHdr[i].sizeOfRawData;
    			if(toRead > inSecHdr[i].virtualSize)
    				toRead = inSecHdr[i].virtualSize;
     
    			fseek(fp, inSecHdr[i].pointerToRawData, SEEK_SET);
    			readSize = fread(outPtr, 1, toRead, fp);
     
    			if(readSize != toRead)
    			{
    				printf("Error reading section %d
    ", i);
    				return false;
    			}
    			outPtr += getAlignedSize(inSecHdr[i].virtualSize, inpeXH->sectionAlignment);
    		}
    		else
    		{
    			// this handles the case where the PE file has an empty section. E.g. UPX0 section
    			// in UPXed files.
     
    			if(inSecHdr[i].virtualSize)
    				outPtr += getAlignedSize(inSecHdr[i].virtualSize, inpeXH->sectionAlignment);
    		}
    	}
     
    	return true;
    }
     
     
    struct FixupBlock
    {
    	unsigned long pageRVA;
    	unsigned long blockSize;
    };
     
     
    //******************************************************************************************
    //
    // This function loads a PE file into memory with proper alignment.
    // Enough memory must be allocated at ptrLoc.
    //
    //******************************************************************************************
     
    void doRelocation(MZHeader *inMZ, PE_Header *inPE, PE_ExtHeader *inpeXH,
    			      SectionHeader *inSecHdr, LPVOID ptrLoc, DWORD newBase)
    {
    	if(inpeXH->relocationTableAddress && inpeXH->relocationTableSize)
    	{
    		FixupBlock *fixBlk = (FixupBlock *)((char *)ptrLoc + inpeXH->relocationTableAddress);
    		long delta = newBase - inpeXH->imageBase;
     
    		while(fixBlk->blockSize)
    		{
    			//printf("Addr = %X
    ", fixBlk->pageRVA);
    			//printf("Size = %X
    ", fixBlk->blockSize);
     
    			int numEntries = (fixBlk->blockSize - sizeof(FixupBlock)) >> 1;
    			//printf("Num Entries = %d
    ", numEntries);
     
    			unsigned short *offsetPtr = (unsigned short *)(fixBlk + 1);
     
    			for(int i = 0; i < numEntries; i++)
    			{
    				DWORD *codeLoc = (DWORD *)((char *)ptrLoc + fixBlk->pageRVA + (*offsetPtr & 0x0FFF));
     
    				int relocType = (*offsetPtr & 0xF000) >> 12;
     
    				//printf("Val = %X
    ", *offsetPtr);
    				//printf("Type = %X
    ", relocType);
     
    				if(relocType == 3)
    					*codeLoc = ((DWORD)*codeLoc) + delta;
    				else
    				{
    					printf("Unknown relocation type = %d
    ", relocType);
    				}
    				offsetPtr++;
    			}
     
    			fixBlk = (FixupBlock *)offsetPtr;
    		}
    	}	
    }
     
     
    #define TARGETPROC "calc.exe"
     
    typedef struct _PROCINFO
    {
    	DWORD baseAddr;
    	DWORD imageSize;
    } PROCINFO;
     
     
     
    //******************************************************************************************
    //
    // Creates the original EXE in suspended mode and returns its info in the PROCINFO structure.
    //
    //******************************************************************************************
     
     
    BOOL createChild(PPROCESS_INFORMATION pi, PCONTEXT ctx, PROCINFO *outChildProcInfo)
    {
    	STARTUPINFO si = {0};
     
    	if(CreateProcess(NULL, TARGETPROC,
    		             NULL, NULL, 0, CREATE_SUSPENDED, NULL, NULL, &si, pi))		
    	{
    		ctx->ContextFlags=CONTEXT_FULL;
    		GetThreadContext(pi->hThread, ctx);
     
    		DWORD *pebInfo = (DWORD *)ctx->Ebx;
    		DWORD read;
    		ReadProcessMemory(pi->hProcess, &pebInfo[2], (LPVOID)&(outChildProcInfo->baseAddr), sizeof(DWORD), &read);
     
    		DWORD curAddr = outChildProcInfo->baseAddr;
    		MEMORY_BASIC_INFORMATION memInfo;
    		while(VirtualQueryEx(pi->hProcess, (LPVOID)curAddr, &memInfo, sizeof(memInfo)))
    		{
    			if(memInfo.State == MEM_FREE)
    				break;
    			curAddr += memInfo.RegionSize;
    		}
    		outChildProcInfo->imageSize = (DWORD)curAddr - (DWORD)outChildProcInfo->baseAddr;
     
    		return TRUE;
    	}
    	return FALSE;
    }
     
     
    //******************************************************************************************
    //
    // Returns true if the PE file has a relocation table
    //
    //******************************************************************************************
     
    BOOL hasRelocationTable(PE_ExtHeader *inpeXH)
    {
    	if(inpeXH->relocationTableAddress && inpeXH->relocationTableSize)
    	{
    		return TRUE;
    	}
    	return FALSE;
    }
     
     
    typedef DWORD (WINAPI *PTRZwUnmapViewOfSection)(IN HANDLE ProcessHandle, IN PVOID BaseAddress);
     
     
    //******************************************************************************************
    //
    // To replace the original EXE with another one we do the following.
    // 1) Create the original EXE process in suspended mode.
    // 2) Unmap the image of the original EXE.
    // 3) Allocate memory at the baseaddress of the new EXE.
    // 4) Load the new EXE image into the allocated memory.  
    // 5) Windows will do the necessary imports and load the required DLLs for us when we resume the suspended 
    //    thread.
    //
    // When the original EXE process is created in suspend mode, GetThreadContext returns these useful
    // register values.
    // EAX - process entry point
    // EBX - points to PEB
    //
    // So before resuming the suspended thread, we need to set EAX of the context to the entry point of the
    // new EXE.
    //
    //******************************************************************************************
     
    void doFork(MZHeader *inMZ, PE_Header *inPE, PE_ExtHeader *inpeXH,
    			SectionHeader *inSecHdr, LPVOID ptrLoc, DWORD imageSize)
    {
    	STARTUPINFO si = {0};
    	PROCESS_INFORMATION pi;
    	CONTEXT ctx;
    	PROCINFO childInfo;
     
    	if(createChild(&pi, &ctx, &childInfo)) 
    	{		
    		printf("Original EXE loaded (PID = %d).
    ", pi.dwProcessId);
    		printf("Original Base Addr = %X, Size = %X
    ", childInfo.baseAddr, childInfo.imageSize);
     
    		LPVOID v = (LPVOID)NULL;
     
    		if(inpeXH->imageBase == childInfo.baseAddr && imageSize <= childInfo.imageSize)
    		{
    			// if new EXE has same baseaddr and is its size is <= to the original EXE, just
    			// overwrite it in memory
    			v = (LPVOID)childInfo.baseAddr;
    			DWORD oldProtect;
    			VirtualProtectEx(pi.hProcess, (LPVOID)childInfo.baseAddr, childInfo.imageSize, PAGE_EXECUTE_READWRITE, &oldProtect);			
     
    			printf("Using Existing Mem for New EXE at %X
    ", (unsigned long)v);
    		}
    		else
    		{
    			// get address of ZwUnmapViewOfSection
    			PTRZwUnmapViewOfSection pZwUnmapViewOfSection = (PTRZwUnmapViewOfSection)GetProcAddress(GetModuleHandle("ntdll.dll"), "ZwUnmapViewOfSection");
     
    			// try to unmap the original EXE image
    			if(pZwUnmapViewOfSection(pi.hProcess, (LPVOID)childInfo.baseAddr) == 0)
    			{
    				// allocate memory for the new EXE image at the prefered imagebase.
    				v = VirtualAllocEx(pi.hProcess, (LPVOID)inpeXH->imageBase, imageSize, MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);
    				if(v)
    					printf("Unmapped and Allocated Mem for New EXE at %X
    ", (unsigned long)v);
    			}
    		}
     
    		if(!v && hasRelocationTable(inpeXH))
    		{
    			// if unmap failed but EXE is relocatable, then we try to load the EXE at another
    			// location
    			v = VirtualAllocEx(pi.hProcess, (void *)NULL, imageSize, MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);
    			if(v)
    			{
    				printf("Allocated Mem for New EXE at %X. EXE will be relocated.
    ", (unsigned long)v);
     
    				// we've got to do the relocation ourself if we load the image at another
    				// memory location				
    				doRelocation(inMZ, inPE, inpeXH, inSecHdr, ptrLoc, (DWORD)v);
    			}
    		}
     
    		printf("EIP = %X
    ", ctx.Eip);
    		printf("EAX = %X
    ", ctx.Eax);
    		printf("EBX = %X
    ", ctx.Ebx);		// EBX points to PEB
    		printf("ECX = %X
    ", ctx.Ecx);
    		printf("EDX = %X
    ", ctx.Edx);
     
    		if(v)
    		{			
    			printf("New EXE Image Size = %X
    ", imageSize);
     
    			// patch the EXE base addr in PEB (PEB + 8 holds process base addr)
    			DWORD *pebInfo = (DWORD *)ctx.Ebx;
    			DWORD wrote;						
    			WriteProcessMemory(pi.hProcess, &pebInfo[2], &v, sizeof(DWORD), &wrote);
     
    			// patch the base addr in the PE header of the EXE that we load ourselves
    			PE_ExtHeader *peXH = (PE_ExtHeader *)((DWORD)inMZ->offsetToPE + sizeof(PE_Header) + (DWORD)ptrLoc);
    			peXH->imageBase = (DWORD)v;
     
    			if(WriteProcessMemory(pi.hProcess, v, ptrLoc, imageSize, NULL))
    			{	
    				printf("New EXE image injected into process.
    ");
     
    				ctx.ContextFlags=CONTEXT_FULL;				
    				//ctx.Eip = (DWORD)v + ((DWORD)dllLoaderWritePtr - (DWORD)ptrLoc);
     
    				if((DWORD)v == childInfo.baseAddr)
    				{
    					ctx.Eax = (DWORD)inpeXH->imageBase + inpeXH->addressOfEntryPoint;		// eax holds new entry point
    				}
    				else
    				{
    					// in this case, the DLL was not loaded at the baseaddr, i.e. manual relocation was
    					// performed.
    					ctx.Eax = (DWORD)v + inpeXH->addressOfEntryPoint;		// eax holds new entry point
    				}
     
    				printf("********> EIP = %X
    ", ctx.Eip);
    				printf("********> EAX = %X
    ", ctx.Eax);
     
    				SetThreadContext(pi.hThread,&ctx);
     
    				ResumeThread(pi.hThread);
    				printf("Process resumed (PID = %d).
    ", pi.dwProcessId);
    			}
    			else
    			{
    				printf("WriteProcessMemory failed
    ");
    				TerminateProcess(pi.hProcess, 0);
    			}
    		}
    		else
    		{
    			printf("Load failed.  Consider making this EXE relocatable.
    ");
    			TerminateProcess(pi.hProcess, 0);
    		}
    	}
    	else
    	{
    		printf("Cannot load %s
    ", TARGETPROC);
    	}
    }
     
     
     
     
    int main(int argc, char* argv[])
    {
    	if(argc != 2)
    	{
    		printf("
    Usage: %s <EXE filename>
    ", argv[0]);
    		return 1;
    	}
     
    	FILE *fp = fopen(argv[1], "rb");
    	if(fp)
    	{
    		MZHeader mzH;
    		PE_Header peH;
    		PE_ExtHeader peXH;
    		SectionHeader *secHdr;
     
    		if(readPEInfo(fp, &mzH, &peH, &peXH, &secHdr))
    		{
    			int imageSize = calcTotalImageSize(&mzH, &peH, &peXH, secHdr);
    			//printf("Image Size = %X
    ", imageSize);
     
    			LPVOID ptrLoc = VirtualAlloc(NULL, imageSize, MEM_COMMIT, PAGE_EXECUTE_READWRITE);
    			if(ptrLoc)
    			{
    				//printf("Memory allocated at %X
    ", ptrLoc);
    				loadPE(fp, &mzH, &peH, &peXH, secHdr, ptrLoc);												
     
    				doFork(&mzH, &peH, &peXH, secHdr, ptrLoc, imageSize);								
    			}
    			else
    				printf("Allocation failed
    ");
    		}
     
    		fclose(fp);
    	}
    	else
    		printf("
    Cannot open the EXE file!
    ");
     
    	return 0;
    }

    http://www.programlife.net/dynamic-forking-of-win32-exe.html

  • 相关阅读:
    Dubbo入门微服务框架学习
    CSS学习笔记:溢出文本省略(text-overflow)
    ThreadLocal
    redis事务及乐观锁
    redis的三个特殊数据结构(geospatial、bitmaps、hyperloglogs)
    js日期时间格式化
    SimpleDateFormat 中的yyyy-MM-dd HH:mm:ss.SSS说明
    js中window.location.search的用法和作用。
    MySQL查询表中某个字段的重复数据
    完全卸载Oracle方法(超详细)
  • 原文地址:https://www.cnblogs.com/findumars/p/7128352.html
Copyright © 2011-2022 走看看