📚 OpenRCE is preserved as a read-only archive. Launched at RECon Montreal in 2005. Registration and posting are disabled.








Flag: Tornado! Hurricane!

Blogs >> JasonGeffner's Blog

Created: Saturday, October 15 2005 21:30.00 CDT Modified: Saturday, October 15 2005 21:30.00 CDT
This is an imported entry. View original. Printer Friendly ...
Code injection
Author: JasonGeffner # Views: 1042

Greg Hoglund recently wrote on his website about the game World of Warcraft searching for rogue DLLs in its own process space in order to catch code injected for cheating. This parallels an anti-debugging trick that can be found in malware. Malware authors dont want virus analysts poking around in their malwares process space, so malware will sometimes search for rogue DLLs that an analyst might be using for unpacking, information logging, etc.

You could try to hide your DLL by intercepting calls to Module32First(...)/Module32Next(...) API calls, though this is a more complex solution than is necessary. Quite simply, you could just not use a DLL at all. Heres how:

  1. VirtualAllocEx(...) into the taget processs address space.
  2. WriteProcessMemory(...) your relocatable code into the newly allocated memory.
  3. CreateRemoteThread(...) to run the code you injected.

You now have your code injected into the target process, but since you didnt use a DLL, the Module32First(...) and Module32Next(...) API functions cant be used to detect you. For further implementation details, check http://search.msn.com/results.aspx?q=VirtualAllocEx+WriteProcessMemory+CreateRemoteThread

Of course there are still loads of ways to detect the above trick (such as searching for rogue threads), but this raises the bar a bit.



If you wish to comment on this blog entry, please do so on the original site it was imported from.

There are 31,328 total registered users.


Recently Created Topics
[help] Unpacking VMP...
Mar/12
Reverse Engineering ...
Jul/06
let 'IDAPython' impo...
Sep/24
set 'IDAPython' as t...
Sep/24
GuessType return une...
Sep/20
About retrieving the...
Sep/07
How to find specific...
Aug/15
How to get data depe...
Jul/07
Identify RVA data in...
May/06
Question about memor...
Dec/12


Recent Forum Posts
Finding the procedur...
rolEYder
Question about debbu...
rolEYder
Identify RVA data in...
sohlow
let 'IDAPython' impo...
sohlow
How to find specific...
hackgreti
Problem with ollydbg
sh3dow
How can I write olly...
sh3dow
New LoadMAP plugin v...
mefisto...
Intel pin in loaded ...
djnemo
OOP_RE tool available?
Bl4ckm4n


Recent Blog Entries
halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

oleavr
Aug/27
CryptoShark: code tracer ba...

oleavr
Jun/25
Build a debugger in 5 minutes

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit