0% found this document useful (0 votes)
639 views2 pages

Dynamic Forking of Win32 EXE

This document describes a technique for dynamically forking the execution of a Windows executable (EXE) file. It involves using the CreateProcess API to launch a process in suspended mode, then overwriting its memory space with the image of a different EXE file before resuming execution. This allows launching one EXE but having it execute the code of another EXE instead. The key steps are to obtain the suspended process's memory layout, unload its original EXE image, load the new EXE into its memory, perform any needed relocation of the new EXE's code, and modify registers to point to the entry point of the new EXE before resuming the thread.

Uploaded by

Binary_Death
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
639 views2 pages

Dynamic Forking of Win32 EXE

This document describes a technique for dynamically forking the execution of a Windows executable (EXE) file. It involves using the CreateProcess API to launch a process in suspended mode, then overwriting its memory space with the image of a different EXE file before resuming execution. This allows launching one EXE but having it execute the code of another EXE instead. The key steps are to obtain the suspended process's memory layout, unload its original EXE image, load the new EXE into its memory, perform any needed relocation of the new EXE's code, and modify registers to point to the entry point of the new EXE before resuming the thread.

Uploaded by

Binary_Death
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

20/09/13

SIG^2 G-TEC - Dynamic Forking of Win32 EXE

S IG ^2 S ecure C ode S tudy P roject P roof- O f- C oncept

Dynamic Forking of Win32 EXE


by Tan C hew Keong 7 April 2004 Download

Introduction
This Proof-Of-C oncept (POC ) code demonstrates the dynamic loading of a Win32 EXE into the memory space of a process that was created using the C reateProcess API with the C REATE_SUSPENDED parameter. This code also shows how to perform manual relocation of a Win32 EXE and how to unmap the original image of an EXE from its process space.

Description of Technique
Under Windows, a process can be created in suspend mode using the C reateProcess API with the C REATE_SUSPENDED parameter. The EXE image will be loaded into memory by Windows but execution will not begin until the ResumeThread API is used. Before calling ResumeThread, it is possible to read and write this process's memory space using APIs like ReadProcessMemory and WriteProcessMemory. This makes it possible to overwrite the image of the original EXE with the image of another EXE, thus enabling the execution of the second EXE within the memory space of the first EXE. This can be achieved with the following sequence of steps. 1. Use the C reateProcess API with the C REATE_SUSPENDED parameter to create a suspended process from any EXE file. (C all this the first EXE). 2. C all GetThreadC ontext API to obtain the register values (thread context) of the suspended process. The EBX register of the suspended process points to the process's PEB. The EAX register contains the entry point of the process (first EXE). 3. Obtain the base-address of the suspended process from its PEB, i.e. at [EBX+8] 4. Load the second EXE into memory (using ReadFile) and perform the neccessary alignment manually. This is required if the file alignment is different from the memory alignment 5. If the second EXE has the same base-address as the suspended process and its image-size is <= to the image-size of the suspended process, simply use the WriteProcessMemory function to write the image of the second EXE into the memory space of the suspended process, starting at the baseaddress. 6. Otherwise, unmap the image of the first EXE using ZwUnmapViewOfSection (exported by ntdll.dll) and use VirtualAllocEx to allocate enough memory for the second EXE within the memory space of the suspended process. The VirtualAllocEx API must be supplied with the base-address of the second EXE to ensure that Windows will give us memory in the required region. Next, copy the image of the second EXE into the memory space of the suspended process starting at the allocated address (using WriteProcessMemory). 7. If the unmap operation failed but the second EXE is relocatable (i.e. has a relocation table), then allocate enough memory for the second EXE within the suspended process at any location. Perform manual relocation of the second EXE based on the allocated memory address. Next, copy the relocated EXE into the memory space of the suspended process starting at the allocated address (using WriteProcessMemory). 8. Patch the base-address of the second EXE into the suspended process's PEB at [EBX+8]. 9. Set EAX of the thread context to the entry point of the second EXE. 10. Use the SetThreadC ontext API to modify the thread context of the suspended process. 11. Use the ResumeThread API to resume execute of the suspended process.

Techniques Demonstrated by P O C C ode


1. Manual relocation of an EXE using its Relocation Table. 2. Unmapping the image of the original EXE using ZwUnmapViewOfSection. 3. Reading and Writing to a process's memory space using ReadProcessMemory and
file:///C:/Users/sirius/Desktop/USB/References/Assembly/PE Format/RunPE/SIG%5E2 G-TEC - Dynamic Forking of Win32 EXE.htm 1/2

20/09/13

SIG^2 G-TEC - Dynamic Forking of Win32 EXE

WriteProcessMemory. 4. C hanging the base-address of a process by modifying its value in the process's PEB.

U sage
loadEXE.exe <EXE filename> This POC code will use the C reateProcess API to create a process in suspend mode from calc.exe. It would then load and align the EXE file given by the "EXE filename" commandline parameter. Following this, it would copy the aligned EXE image into calc.exe's memory space and resume execution.

C ontacts
For further enquries or to submit malicious code for our analysis, email them to the following. Overall-in-charge: Tan Chew Keong
U pdated: 1 1 /3 /2 0 0 4

[email protected]

file:///C:/Users/sirius/Desktop/USB/References/Assembly/PE Format/RunPE/SIG%5E2 G-TEC - Dynamic Forking of Win32 EXE.htm

2/2

You might also like