porting project to support linux... std::vector<std::uint8_t> module_data is not page aligned and so qemu shits itself. going to need to re-write some stuff...

dev
IDontCode 2 years ago
parent 1385a7cfe2
commit 0549d95b5d

@ -1 +1 @@
Subproject commit 1b6875d18825529907289bc87990fed5d99e7f96 Subproject commit dd7d3777ad10373d0eeb23c118e4bdcfc7464494

@ -1,14 +1,14 @@
#pragma once #pragma once
#include <functional> #include <Zydis/Zydis.h>
#include <unicorn/unicorn.h> #include <unicorn/unicorn.h>
#include <Zydis/Zydis.h>
#include <atomic> #include <atomic>
#include <fstream> #include <fstream>
#include <functional>
#include <map> #include <map>
#include <nt/image.hpp> #include <nt/image.hpp>
#include <vector> #include <vector>
#include <xtils.hpp> #include <vmprofiler.hpp>
#define PAGE_4KB 0x1000 #define PAGE_4KB 0x1000
#define STACK_SIZE PAGE_4KB * 512 #define STACK_SIZE PAGE_4KB * 512
@ -27,46 +27,50 @@
#define MOV_RAX_0_SIG "\x48\xB8\x00\x00\x00\x00\x00\x00\x00\x00" #define MOV_RAX_0_SIG "\x48\xB8\x00\x00\x00\x00\x00\x00\x00\x00"
#define MOV_RAX_0_MASK "xxxxxxxxxx" #define MOV_RAX_0_MASK "xxxxxxxxxx"
static_assert( sizeof MOV_RAX_0_SIG == sizeof MOV_RAX_0_MASK, "signature and mask sizes are wrong..." ); static_assert(sizeof MOV_RAX_0_SIG == sizeof MOV_RAX_0_MASK,
"signature and mask sizes are wrong...");
namespace engine
{ namespace engine {
class unpack_t class unpack_t {
{ public:
public: explicit unpack_t(const std::vector<std::uint8_t> &bin);
explicit unpack_t( const std::vector< std::uint8_t > &bin ); ~unpack_t(void);
~unpack_t( void );
bool init(void);
bool init( void ); bool unpack(std::vector<std::uint8_t> &output);
bool unpack( std::vector< std::uint8_t > &output );
private:
private: using iat_hook_t = std::function<void(uc_engine *, unpack_t *)>;
using iat_hook_t = std::function< void( uc_engine *, unpack_t * ) >;
uc_engine *uc_ctx;
uc_engine *uc_ctx; std::vector<uint8_t> bin, map_bin;
std::vector< uint8_t > bin, map_bin; std::vector<uc_hook *> uc_hooks;
std::vector< uc_hook * > uc_hooks;
std::uintptr_t img_base, img_size, heap_offset, pack_section_offset;
std::uintptr_t img_base, img_size, heap_offset, pack_section_offset; win::image_t<> *win_img;
win::image_t<> *win_img;
static void local_alloc_hook(uc_engine *, unpack_t *);
static void local_alloc_hook( uc_engine *, unpack_t * ); static void local_free_hook(uc_engine *, unpack_t *);
static void local_free_hook( uc_engine *, unpack_t * ); static void load_library_hook(uc_engine *, unpack_t *);
static void load_library_hook( uc_engine *, unpack_t * ); static void uc_strcpy(uc_engine *, char *buff, std::uintptr_t addr);
static void uc_strcpy( uc_engine *, char *buff, std::uintptr_t addr );
static bool iat_dispatcher(uc_engine *uc, uint64_t address, uint32_t size,
static bool iat_dispatcher( uc_engine *uc, uint64_t address, uint32_t size, unpack_t *unpack ); unpack_t *unpack);
static bool unpack_section_callback( uc_engine *uc, uc_mem_type type, uint64_t address, int size, int64_t value,
unpack_t *unpack ); static bool unpack_section_callback(uc_engine *uc, uc_mem_type type,
uint64_t address, int size, int64_t value,
static bool code_exec_callback( uc_engine *uc, uint64_t address, uint32_t size, unpack_t *unpack ); unpack_t *unpack);
static void invalid_mem( uc_engine *uc, uc_mem_type type, uint64_t address, int size, int64_t value,
unpack_t *unpack ); static bool code_exec_callback(uc_engine *uc, uint64_t address, uint32_t size,
unpack_t *unpack);
std::vector< std::uintptr_t > loaded_modules;
std::map< std::string, std::pair< std::uint32_t, iat_hook_t > > iat_hooks = { static void invalid_mem(uc_engine *uc, uc_mem_type type, uint64_t address,
{ "LocalAlloc", { LOCAL_ALLOC_VECTOR, &local_alloc_hook } }, int size, int64_t value, unpack_t *unpack);
{ "LocalFree", { LOCAL_FREE_VECTOR, &local_free_hook } },
{ "LoadLibraryA", { LOAD_LIBRARY_VECTOR, &load_library_hook } } }; std::map<std::string, std::uintptr_t> loaded_modules;
}; std::map<std::string, std::pair<std::uint32_t, iat_hook_t> > iat_hooks = {
} // namespace engine {"LocalAlloc", {LOCAL_ALLOC_VECTOR, &local_alloc_hook}},
{"LocalFree", {LOCAL_FREE_VECTOR, &local_free_hook}},
{"LoadLibraryA", {LOAD_LIBRARY_VECTOR, &load_library_hook}}};
};
} // namespace engine

@ -1,6 +1,7 @@
#pragma once #pragma once
#include <unicorn/unicorn.h> #include <unicorn/unicorn.h>
#include <atomic>
#include <nt/image.hpp> #include <nt/image.hpp>
#include <vmprofiler.hpp> #include <vmprofiler.hpp>
@ -10,49 +11,46 @@
#define STACK_BASE 0xFFFF000000000000 #define STACK_BASE 0xFFFF000000000000
#define IAT_VECTOR_TABLE 0xFFFFF00000000000 #define IAT_VECTOR_TABLE 0xFFFFF00000000000
namespace vm namespace vm {
{ inline bool g_force_emu = false;
inline bool g_force_emu = false;
class emu_t {
class emu_t struct cpu_ctx_t {
{ std::uintptr_t rip;
struct cpu_ctx_t uc_context *context;
{ std::uint8_t stack[STACK_SIZE];
std::uintptr_t rip; };
uc_context *context;
std::uint8_t stack[ STACK_SIZE ]; struct code_block_data_t {
}; vm::instrs::code_block_t code_block;
std::shared_ptr<cpu_ctx_t> cpu_ctx;
struct code_block_data_t std::shared_ptr<vm::ctx_t> g_vm_ctx;
{ };
vm::instrs::code_block_t code_block;
std::shared_ptr< cpu_ctx_t > cpu_ctx; public:
std::shared_ptr< vm::ctx_t > g_vm_ctx; explicit emu_t(vm::ctx_t *vm_ctx);
}; ~emu_t();
public: bool init();
explicit emu_t( vm::ctx_t *vm_ctx ); bool get_trace(std::vector<vm::instrs::code_block_t> &code_blocks);
~emu_t();
private:
bool init(); std::uintptr_t img_base, img_size;
bool get_trace( std::vector< vm::instrs::code_block_t > &code_blocks ); uc_hook code_exec_hook, invalid_mem_hook, int_hook;
private: uc_engine *uc_ctx;
std::uintptr_t img_base, img_size; vm::ctx_t *g_vm_ctx;
uc_hook code_exec_hook, invalid_mem_hook, int_hook; code_block_data_t *cc_block;
uc_engine *uc_ctx; std::vector<std::uintptr_t> vip_begins;
vm::ctx_t *g_vm_ctx; std::vector<code_block_data_t> code_blocks;
code_block_data_t *cc_block; std::map<std::uintptr_t, std::shared_ptr<vm::ctx_t> > vm_ctxs;
std::vector< std::uintptr_t > vip_begins; uc_err create_entry(vmp2::v2::entry_t *entry);
std::vector< code_block_data_t > code_blocks; static void int_callback(uc_engine *uc, std::uint32_t intno, emu_t *obj);
std::map< std::uintptr_t, std::shared_ptr< vm::ctx_t > > vm_ctxs; static bool code_exec_callback(uc_engine *uc, uint64_t address, uint32_t size,
emu_t *obj);
uc_err create_entry( vmp2::v2::entry_t *entry ); static void invalid_mem(uc_engine *uc, uc_mem_type type, uint64_t address,
static void int_callback( uc_engine *uc, std::uint32_t intno, emu_t *obj ); int size, int64_t value, emu_t *obj);
static bool code_exec_callback( uc_engine *uc, uint64_t address, uint32_t size, emu_t *obj ); };
static void invalid_mem( uc_engine *uc, uc_mem_type type, uint64_t address, int size, int64_t value, } // namespace vm
emu_t *obj );
};
} // namespace vm

@ -1,402 +1,365 @@
#include "unpacker.hpp"
#include "vmemu_t.hpp"
#include <cli-parser.hpp> #include <cli-parser.hpp>
#include <fstream> #include <fstream>
#include <iostream> #include <iostream>
#include <xtils.hpp>
int __cdecl main( int argc, const char *argv[] )
{
argparse::argument_parser_t parser( "VMEmu", "VMProtect 2 VM Handler Emulator" );
parser.add_argument().name( "--vmentry" ).description( "relative virtual address to a vm entry..." );
parser.add_argument().name( "--bin" ).description( "path to unpacked virtualized binary..." );
parser.add_argument().name( "--out" ).description( "output file name..." );
parser.add_argument().name( "--unpack" ).description( "unpack a vmp2 binary..." );
parser.add_argument().names( { "-f", "--force" } ).description( "force emulation of unknown vm handlers...\n" );
parser.add_argument()
.name( "--emuall" )
.description( "scan for all vm enters and trace all of them... this may take a few minutes..." );
parser.add_argument()
.name( "--locateconst" )
.description( "scan all vm enters for a specific constant value...\n" );
parser.enable_help();
auto result = parser.parse( argc, argv );
if ( result )
{
std::printf( "[!] error parsing commandline arguments... reason = %s\n", result.what().c_str() );
return -1;
}
if ( parser.exists( "help" ) )
{
parser.print_help();
return 0;
}
auto umtils = xtils::um_t::get_instance();
vm::g_force_emu = parser.exists( "force" );
if ( !parser.exists( "unpack" ) && parser.exists( "vmentry" ) && parser.exists( "bin" ) && parser.exists( "out" ) )
{
const auto module_base = reinterpret_cast< std::uintptr_t >(
LoadLibraryExA( parser.get< std::string >( "bin" ).c_str(), NULL, DONT_RESOLVE_DLL_REFERENCES ) );
if ( !module_base ) #include "unpacker.hpp"
{ #include "vmemu_t.hpp"
std::printf( "[!] failed to open binary file...\n" );
return -1;
}
const auto vm_entry_rva = std::strtoull( parser.get< std::string >( "vmentry" ).c_str(), nullptr, 16 ); int __cdecl main(int argc, const char *argv[]) {
const auto image_base = umtils->image_base( parser.get< std::string >( "bin" ).c_str() ); argparse::argument_parser_t parser("VMEmu",
const auto image_size = NT_HEADER( module_base )->OptionalHeader.SizeOfImage; "VMProtect 2 VM Handler Emulator");
parser.add_argument()
.name("--vmentry")
.description("relative virtual address to a vm entry...");
parser.add_argument()
.name("--bin")
.description("path to unpacked virtualized binary...")
.required(true);
parser.add_argument()
.name("--out")
.description("output file name...")
.required(true);
parser.add_argument().name("--unpack").description("unpack a vmp2 binary...");
parser.add_argument()
.names({"-f", "--force"})
.description("force emulation of unknown vm handlers...");
parser.add_argument()
.name("--emuall")
.description(
"scan for all vm enters and trace all of them... this may take a few "
"minutes...");
parser.enable_help();
auto result = parser.parse(argc, argv);
if (result) {
std::printf("[!] error parsing commandline arguments... reason = %s\n",
result.what().c_str());
return -1;
}
if (parser.exists("help")) {
parser.print_help();
return 0;
}
vm::util::init();
vm::g_force_emu = parser.exists("force");
std::vector<std::uint8_t> module_data, tmp, unpacked_bin;
if (!vm::util::open_binary_file(parser.get<std::string>("bin"),
module_data)) {
std::printf("[!] failed to open binary file...\n");
return -1;
}
auto img = reinterpret_cast<win::image_t<> *>(module_data.data());
auto image_size = img->get_nt_headers()->optional_header.size_image;
tmp.resize(image_size);
std::memcpy(tmp.data(), module_data.data(), 0x1000);
std::for_each(img->get_nt_headers()->get_sections(),
img->get_nt_headers()->get_sections() +
img->get_nt_headers()->file_header.num_sections,
[&](const auto &section_header) {
std::memcpy(tmp.data() + section_header.virtual_address,
module_data.data() + section_header.ptr_raw_data,
section_header.size_raw_data);
});
const auto module_base = reinterpret_cast<std::uintptr_t>(tmp.data());
const auto image_base = img->get_nt_headers()->optional_header.image_base;
std::printf("> image base = %p, image size = %p, module base = %p\n",
image_base, image_size, module_base);
if (!image_base || !image_size || !module_base) {
std::printf("[!] failed to open binary on disk...\n");
return -1;
}
if (parser.exists("vmentry")) {
const auto vm_entry_rva =
std::strtoull(parser.get<std::string>("vmentry").c_str(), nullptr, 16);
std::vector<vm::instrs::code_block_t> code_blocks;
vm::ctx_t vmctx(module_base, image_base, image_size, vm_entry_rva);
if (!vmctx.init()) {
std::printf(
"[!] failed to init vmctx... this can be for many reasons..."
" try validating your vm entry rva... make sure the binary is "
"unpacked and is"
"protected with VMProtect 2...\n");
return -1;
}
std::printf( "> image base = %p, image size = %p, module base = %p\n", image_base, image_size, module_base ); vm::emu_t emu(&vmctx);
if ( !image_base || !image_size || !module_base ) if (!emu.init()) {
{ std::printf("[!] failed to init emulator...\n");
std::printf( "[!] failed to open binary on disk...\n" ); return -1;
return -1; }
}
std::vector< vm::instrs::code_block_t > code_blocks; if (!emu.get_trace(code_blocks)) {
vm::ctx_t vmctx( module_base, image_base, image_size, vm_entry_rva ); std::printf(
"[!] something failed during tracing, review the console for more "
"information...\n");
return -1;
}
if ( !vmctx.init() ) std::printf("> number of blocks = %d\n", code_blocks.size());
{
std::printf( "[!] failed to init vmctx... this can be for many reasons..." for (auto &code_block : code_blocks) {
" try validating your vm entry rva... make sure the binary is unpacked and is" std::printf("> code block starts at = %p\n", code_block.vip_begin);
"protected with VMProtect 2...\n" ); std::printf("> number of virtual instructions = %d\n",
return -1; code_block.vinstrs.size());
std::printf("> does this code block have a jcc? %s\n",
code_block.jcc.has_jcc ? "yes" : "no");
if (code_block.jcc.has_jcc) {
switch (code_block.jcc.type) {
case vm::instrs::jcc_type::branching: {
std::printf("> branch 1 = %p, branch 2 = %p\n",
code_block.jcc.block_addr[0],
code_block.jcc.block_addr[1]);
break;
}
case vm::instrs::jcc_type::absolute: {
std::printf("> branch 1 = %p\n", code_block.jcc.block_addr[0]);
break;
}
case vm::instrs::jcc_type::switch_case: {
std::printf("> switch case blocks:\n");
for (auto idx = 0u; idx < code_block.jcc.block_addr.size(); ++idx)
std::printf(" case block at = 0x%p\n",
code_block.jcc.block_addr[idx]);
break;
}
} }
}
}
vm::emu_t emu( &vmctx ); std::printf("> serializing results....\n");
vmp2::v4::file_header file_header;
file_header.magic = VMP_MAGIC;
file_header.epoch_time = std::time(nullptr);
file_header.version = vmp2::version_t::v4;
file_header.module_base = module_base;
file_header.image_base = image_base;
file_header.vm_entry_rva = vm_entry_rva;
file_header.module_offset = sizeof file_header;
file_header.module_size = image_size;
file_header.rtn_count = 1;
file_header.rtn_offset = image_size + sizeof file_header;
vmp2::v4::rtn_t rtn;
std::ofstream output(parser.get<std::string>("out"), std::ios::binary);
output.write(reinterpret_cast<const char *>(&file_header),
sizeof file_header);
output.write(reinterpret_cast<const char *>(module_base), image_size);
std::vector<vmp2::v4::code_block_t *> vmp2_blocks;
for (const auto &code_block : code_blocks) {
const auto _code_block_size =
sizeof(vmp2::v4::code_block_t) +
(code_block.jcc.block_addr.size() * 8) +
code_block.vinstrs.size() * sizeof(vm::instrs::virt_instr_t);
vmp2::v4::code_block_t *_code_block =
reinterpret_cast<vmp2::v4::code_block_t *>(malloc(_code_block_size));
// serialize block meta data...
_code_block->vip_begin = code_block.vip_begin;
_code_block->next_block_offset = _code_block_size;
_code_block->vinstr_count = code_block.vinstrs.size();
_code_block->has_jcc = code_block.jcc.has_jcc;
_code_block->jcc_type = code_block.jcc.type;
_code_block->num_block_addrs = code_block.jcc.block_addr.size();
// serialize jcc branches...
for (auto idx = 0u; idx < code_block.jcc.block_addr.size(); ++idx)
_code_block->branch_addr[idx] = code_block.jcc.block_addr[idx];
auto block_vinstrs = reinterpret_cast<vm::instrs::virt_instr_t *>(
reinterpret_cast<std::uintptr_t>(_code_block) +
sizeof(vmp2::v4::code_block_t) +
(code_block.jcc.block_addr.size() * 8));
for (auto idx = 0u; idx < code_block.vinstrs.size(); ++idx)
block_vinstrs[idx] = code_block.vinstrs[idx];
vmp2_blocks.push_back(_code_block);
}
if ( !emu.init() ) std::size_t code_blocks_size = sizeof(vmp2::v4::rtn_t::size) +
{ sizeof(vmp2::v4::rtn_t::code_block_count) +
std::printf( "[!] failed to init emulator...\n" ); sizeof(vmp2::v4::rtn_t::vm_enter_offset);
return -1;
} std::for_each(vmp2_blocks.begin(), vmp2_blocks.end(),
[&](vmp2::v4::code_block_t *vmp2_block) -> void {
code_blocks_size += vmp2_block->next_block_offset;
});
rtn.size = code_blocks_size;
rtn.code_block_count = vmp2_blocks.size();
rtn.vm_enter_offset = vm_entry_rva;
output.write(reinterpret_cast<const char *>(&rtn),
sizeof(vmp2::v4::rtn_t::size) +
sizeof(vmp2::v4::rtn_t::code_block_count) +
sizeof(vmp2::v4::rtn_t::vm_enter_offset));
std::for_each(vmp2_blocks.begin(), vmp2_blocks.end(),
[&](vmp2::v4::code_block_t *vmp2_block) -> void {
output.write(reinterpret_cast<const char *>(vmp2_block),
vmp2_block->next_block_offset);
free(vmp2_block);
});
output.close();
} else if (parser.exists("unpack")) {
engine::unpack_t unpacker(module_data);
if (!unpacker.init()) {
std::printf("> failed to init unpacker...\n");
return -1;
}
if ( !emu.get_trace( code_blocks ) ) if (!unpacker.unpack(unpacked_bin)) {
{ std::printf("> failed to unpack binary... refer to log above...\n");
std::printf( "[!] something failed during tracing, review the console for more information...\n" ); return -1;
return -1; }
}
std::printf( "> number of blocks = %d\n", code_blocks.size() ); std::printf("> writing result to = %s\n",
parser.get<std::string>("out").c_str());
for ( auto &code_block : code_blocks )
{
std::printf( "> code block starts at = %p\n", code_block.vip_begin );
std::printf( "> number of virtual instructions = %d\n", code_block.vinstrs.size() );
std::printf( "> does this code block have a jcc? %s\n", code_block.jcc.has_jcc ? "yes" : "no" );
if ( code_block.jcc.has_jcc )
{
switch ( code_block.jcc.type )
{
case vm::instrs::jcc_type::branching:
{
std::printf( "> branch 1 = %p, branch 2 = %p\n", code_block.jcc.block_addr[ 0 ],
code_block.jcc.block_addr[ 1 ] );
break;
}
case vm::instrs::jcc_type::absolute:
{
std::printf( "> branch 1 = %p\n", code_block.jcc.block_addr[ 0 ] );
break;
}
case vm::instrs::jcc_type::switch_case:
{
std::printf( "> switch case blocks:\n" );
for ( auto idx = 0u; idx < code_block.jcc.block_addr.size(); ++idx )
std::printf( " case block at = 0x%p\n", code_block.jcc.block_addr[ idx ] );
break;
}
}
}
}
std::printf( "> serializing results....\n" ); std::ofstream output(parser.get<std::string>("out"), std::ios::binary);
vmp2::v4::file_header file_header; output.write(reinterpret_cast<char *>(unpacked_bin.data()),
file_header.magic = VMP_MAGIC; unpacked_bin.size());
file_header.epoch_time = std::time( nullptr );
file_header.version = vmp2::version_t::v4;
file_header.module_base = module_base;
file_header.image_base = image_base;
file_header.vm_entry_rva = vm_entry_rva;
file_header.module_offset = sizeof file_header;
file_header.module_size = image_size;
file_header.rtn_count = 1;
file_header.rtn_offset = image_size + sizeof file_header;
vmp2::v4::rtn_t rtn;
std::ofstream output( parser.get< std::string >( "out" ), std::ios::binary );
output.write( reinterpret_cast< const char * >( &file_header ), sizeof file_header );
output.write( reinterpret_cast< const char * >( module_base ), image_size );
std::vector< vmp2::v4::code_block_t * > vmp2_blocks;
for ( const auto &code_block : code_blocks )
{
const auto _code_block_size = sizeof vmp2::v4::code_block_t + ( code_block.jcc.block_addr.size() * 8 ) +
code_block.vinstrs.size() * sizeof vm::instrs::virt_instr_t;
vmp2::v4::code_block_t *_code_block =
reinterpret_cast< vmp2::v4::code_block_t * >( malloc( _code_block_size ) );
// serialize block meta data...
_code_block->vip_begin = code_block.vip_begin;
_code_block->next_block_offset = _code_block_size;
_code_block->vinstr_count = code_block.vinstrs.size();
_code_block->has_jcc = code_block.jcc.has_jcc;
_code_block->jcc_type = code_block.jcc.type;
_code_block->num_block_addrs = code_block.jcc.block_addr.size();
// serialize jcc branches...
for ( auto idx = 0u; idx < code_block.jcc.block_addr.size(); ++idx )
_code_block->branch_addr[ idx ] = code_block.jcc.block_addr[ idx ];
auto block_vinstrs = reinterpret_cast< vm::instrs::virt_instr_t * >(
reinterpret_cast< std::uintptr_t >( _code_block ) + sizeof vmp2::v4::code_block_t +
( code_block.jcc.block_addr.size() * 8 ) );
for ( auto idx = 0u; idx < code_block.vinstrs.size(); ++idx )
block_vinstrs[ idx ] = code_block.vinstrs[ idx ];
vmp2_blocks.push_back( _code_block );
}
std::size_t code_blocks_size = sizeof( vmp2::v4::rtn_t::size ) + sizeof( vmp2::v4::rtn_t::code_block_count ) + output.close();
sizeof( vmp2::v4::rtn_t::vm_enter_offset ); } else if (parser.exists("emuall")) {
auto entries = vm::locate::get_vm_entries(module_base, image_size);
std::for_each( vmp2_blocks.begin(), vmp2_blocks.end(), [ & ]( vmp2::v4::code_block_t *vmp2_block ) -> void { std::vector<
code_blocks_size += vmp2_block->next_block_offset; std::pair<std::uintptr_t, std::vector<vm::instrs::code_block_t> > >
} ); virt_rtns;
rtn.size = code_blocks_size; for (const auto &[vm_enter_offset, encrypted_rva, hndlr_tble] : entries) {
rtn.code_block_count = vmp2_blocks.size(); std::printf("> emulating vm enter at rva = 0x%x\n", vm_enter_offset);
rtn.vm_enter_offset = vm_entry_rva; vm::ctx_t vm_ctx(module_base, image_base, image_size, vm_enter_offset);
output.write( reinterpret_cast< const char * >( &rtn ), sizeof( vmp2::v4::rtn_t::size ) + if (!vm_ctx.init()) {
sizeof( vmp2::v4::rtn_t::code_block_count ) + std::printf(
sizeof( vmp2::v4::rtn_t::vm_enter_offset ) ); "[!] failed to init vmctx... this can be for many reasons..."
" try validating your vm entry rva... make sure the binary is "
"unpacked and is"
"protected with VMProtect 2...\n");
return -1;
}
std::for_each( vmp2_blocks.begin(), vmp2_blocks.end(), [ & ]( vmp2::v4::code_block_t *vmp2_block ) -> void { vm::emu_t emu(&vm_ctx);
output.write( reinterpret_cast< const char * >( vmp2_block ), vmp2_block->next_block_offset );
free( vmp2_block );
} );
output.close();
}
else if ( parser.exists( "unpack" ) && parser.exists( "out" ) )
{
std::vector< std::uint8_t > packed_bin, unpacked_bin;
if ( !umtils->open_binary_file( parser.get< std::string >( "unpack" ), packed_bin ) )
{
std::printf( "> failed to read bin off disk...\n" );
return -1;
}
engine::unpack_t unpacker( packed_bin ); if (!emu.init()) {
std::printf("[!] failed to init emulator...\n");
return -1;
}
if ( !unpacker.init() ) std::vector<vm::instrs::code_block_t> code_blocks;
{
std::printf( "> failed to init unpacker...\n" );
return -1;
}
if ( !unpacker.unpack( unpacked_bin ) ) if (!emu.get_trace(code_blocks)) {
{ std::printf(
std::printf( "> failed to unpack binary... refer to log above...\n" ); "[!] something failed during tracing, review the console for more "
return -1; "information...\n");
} continue;
}
std::printf( "> writing result to = %s\n", parser.get< std::string >( "out" ).c_str() ); std::printf("> number of blocks = %d\n", code_blocks.size());
std::ofstream output( parser.get< std::string >( "out" ), std::ios::binary ); virt_rtns.push_back({vm_enter_offset, code_blocks});
output.write( reinterpret_cast< char * >( unpacked_bin.data() ), unpacked_bin.size() );
output.close();
} }
else if ( parser.exists( "bin" ) && parser.exists( "emuall" ) && parser.exists( "out" ) )
{
const auto module_base = reinterpret_cast< std::uintptr_t >(
LoadLibraryExA( parser.get< std::string >( "bin" ).c_str(), NULL, DONT_RESOLVE_DLL_REFERENCES ) );
const auto image_base = umtils->image_base( parser.get< std::string >( "bin" ).c_str() );
const auto image_size = NT_HEADER( module_base )->OptionalHeader.SizeOfImage;
auto vm_handler_tables = vm::locate::all_handler_tables( module_base );
auto vm_enters = vm::locate::all_vm_enters( module_base, vm_handler_tables );
std::vector< std::pair< std::uintptr_t, std::vector< vm::instrs::code_block_t > > > virt_rtns;
for ( const auto &[ vm_enter_offset, encrypted_rva ] : vm_enters )
{
std::printf( "> emulating vm enter at rva = 0x%x\n", vm_enter_offset );
vm::ctx_t vm_ctx( module_base, image_base, image_size, vm_enter_offset );
if ( !vm_ctx.init() )
{
std::printf( "[!] failed to init vmctx... this can be for many reasons..."
" try validating your vm entry rva... make sure the binary is unpacked and is"
"protected with VMProtect 2...\n" );
return -1;
}
vm::emu_t emu( &vm_ctx );
if ( !emu.init() )
{
std::printf( "[!] failed to init emulator...\n" );
return -1;
}
std::vector< vm::instrs::code_block_t > code_blocks;
if ( !emu.get_trace( code_blocks ) )
{
std::printf( "[!] something failed during tracing, review the console for more information...\n" );
continue;
}
std::printf( "> number of blocks = %d\n", code_blocks.size() );
virt_rtns.push_back( { vm_enter_offset, code_blocks } );
}
std::printf( "> traced %d virtual routines...\n", virt_rtns.size() ); std::printf("> traced %d virtual routines...\n", virt_rtns.size());
std::printf( "> serializing results....\n" ); std::printf("> serializing results....\n");
vmp2::v4::file_header file_header; vmp2::v4::file_header file_header;
file_header.magic = VMP_MAGIC; file_header.magic = VMP_MAGIC;
file_header.epoch_time = std::time( nullptr ); file_header.epoch_time = std::time(nullptr);
file_header.version = vmp2::version_t::v4; file_header.version = vmp2::version_t::v4;
file_header.module_base = module_base; file_header.module_base = module_base;
file_header.image_base = image_base; file_header.image_base = image_base;
file_header.vm_entry_rva = 0ull; file_header.vm_entry_rva = 0ull;
file_header.module_offset = sizeof file_header; file_header.module_offset = sizeof file_header;
file_header.module_size = image_size; file_header.module_size = image_size;
file_header.rtn_count = virt_rtns.size(); file_header.rtn_count = virt_rtns.size();
file_header.rtn_offset = image_size + sizeof file_header; file_header.rtn_offset = image_size + sizeof file_header;
std::ofstream output( parser.get< std::string >( "out" ), std::ios::binary ); std::ofstream output(parser.get<std::string>("out"), std::ios::binary);
output.write( reinterpret_cast< const char * >( &file_header ), sizeof file_header ); output.write(reinterpret_cast<const char *>(&file_header),
output.write( reinterpret_cast< const char * >( module_base ), image_size ); sizeof file_header);
output.write(reinterpret_cast<const char *>(module_base), image_size);
for ( auto &[ vm_enter_offset, virt_rtn ] : virt_rtns )
{ for (auto &[vm_enter_offset, virt_rtn] : virt_rtns) {
vmp2::v4::rtn_t rtn{ virt_rtn.size() }; vmp2::v4::rtn_t rtn{(u32)virt_rtn.size()};
std::vector< vmp2::v4::code_block_t * > vmp2_blocks; std::vector<vmp2::v4::code_block_t *> vmp2_blocks;
for ( const auto &code_block : virt_rtn ) for (const auto &code_block : virt_rtn) {
{ const auto _code_block_size =
const auto _code_block_size = sizeof vmp2::v4::code_block_t + ( code_block.jcc.block_addr.size() * 8 ) + sizeof(vmp2::v4::code_block_t) +
code_block.vinstrs.size() * sizeof vm::instrs::virt_instr_t; (code_block.jcc.block_addr.size() * 8) +
code_block.vinstrs.size() * sizeof(vm::instrs::virt_instr_t);
vmp2::v4::code_block_t *_code_block =
reinterpret_cast< vmp2::v4::code_block_t * >( malloc( _code_block_size ) ); vmp2::v4::code_block_t *_code_block =
reinterpret_cast<vmp2::v4::code_block_t *>(
// serialize block meta data... malloc(_code_block_size));
_code_block->vip_begin = code_block.vip_begin;
_code_block->next_block_offset = _code_block_size; // serialize block meta data...
_code_block->vinstr_count = code_block.vinstrs.size(); _code_block->vip_begin = code_block.vip_begin;
_code_block->has_jcc = code_block.jcc.has_jcc; _code_block->next_block_offset = _code_block_size;
_code_block->jcc_type = code_block.jcc.type; _code_block->vinstr_count = code_block.vinstrs.size();
_code_block->num_block_addrs = code_block.jcc.block_addr.size(); _code_block->has_jcc = code_block.jcc.has_jcc;
_code_block->jcc_type = code_block.jcc.type;
// serialize jcc branches... _code_block->num_block_addrs = code_block.jcc.block_addr.size();
for ( auto idx = 0u; idx < code_block.jcc.block_addr.size(); ++idx )
_code_block->branch_addr[ idx ] = code_block.jcc.block_addr[ idx ]; // serialize jcc branches...
for (auto idx = 0u; idx < code_block.jcc.block_addr.size(); ++idx)
auto block_vinstrs = reinterpret_cast< vm::instrs::virt_instr_t * >( _code_block->branch_addr[idx] = code_block.jcc.block_addr[idx];
reinterpret_cast< std::uintptr_t >( _code_block ) + sizeof vmp2::v4::code_block_t +
( code_block.jcc.block_addr.size() * 8 ) ); auto block_vinstrs = reinterpret_cast<vm::instrs::virt_instr_t *>(
reinterpret_cast<std::uintptr_t>(_code_block) +
for ( auto idx = 0u; idx < code_block.vinstrs.size(); ++idx ) sizeof(vmp2::v4::code_block_t) +
block_vinstrs[ idx ] = code_block.vinstrs[ idx ]; (code_block.jcc.block_addr.size() * 8));
vmp2_blocks.push_back( _code_block ); for (auto idx = 0u; idx < code_block.vinstrs.size(); ++idx)
} block_vinstrs[idx] = code_block.vinstrs[idx];
std::size_t code_blocks_size = sizeof( vmp2::v4::rtn_t::size ) + vmp2_blocks.push_back(_code_block);
sizeof( vmp2::v4::rtn_t::vm_enter_offset ) + }
sizeof( vmp2::v4::rtn_t::code_block_count );
std::size_t code_blocks_size = sizeof(vmp2::v4::rtn_t::size) +
std::for_each( vmp2_blocks.begin(), vmp2_blocks.end(), [ & ]( vmp2::v4::code_block_t *vmp2_block ) -> void { sizeof(vmp2::v4::rtn_t::vm_enter_offset) +
code_blocks_size += vmp2_block->next_block_offset; sizeof(vmp2::v4::rtn_t::code_block_count);
} );
std::for_each(vmp2_blocks.begin(), vmp2_blocks.end(),
rtn.size = code_blocks_size; [&](vmp2::v4::code_block_t *vmp2_block) -> void {
rtn.code_block_count = vmp2_blocks.size(); code_blocks_size += vmp2_block->next_block_offset;
rtn.vm_enter_offset = vm_enter_offset; });
output.write( reinterpret_cast< const char * >( &rtn ), sizeof( vmp2::v4::rtn_t::size ) + rtn.size = code_blocks_size;
sizeof( vmp2::v4::rtn_t::code_block_count ) + rtn.code_block_count = vmp2_blocks.size();
sizeof( vmp2::v4::rtn_t::vm_enter_offset ) ); rtn.vm_enter_offset = vm_enter_offset;
std::for_each( vmp2_blocks.begin(), vmp2_blocks.end(), [ & ]( vmp2::v4::code_block_t *vmp2_block ) -> void { output.write(reinterpret_cast<const char *>(&rtn),
output.write( reinterpret_cast< const char * >( vmp2_block ), vmp2_block->next_block_offset ); sizeof(vmp2::v4::rtn_t::size) +
free( vmp2_block ); sizeof(vmp2::v4::rtn_t::code_block_count) +
} ); sizeof(vmp2::v4::rtn_t::vm_enter_offset));
}
output.close(); std::for_each(vmp2_blocks.begin(), vmp2_blocks.end(),
} [&](vmp2::v4::code_block_t *vmp2_block) -> void {
else if ( parser.exists( "bin" ) && parser.exists( "locateconst" ) ) output.write(reinterpret_cast<const char *>(vmp2_block),
{ vmp2_block->next_block_offset);
const auto module_base = reinterpret_cast< std::uintptr_t >( free(vmp2_block);
LoadLibraryExA( parser.get< std::string >( "bin" ).c_str(), NULL, DONT_RESOLVE_DLL_REFERENCES ) ); });
const auto const_val = std::strtoull( parser.get< std::string >( "locateconst" ).c_str(), nullptr, 16 );
const auto image_base = umtils->image_base( parser.get< std::string >( "bin" ).c_str() );
const auto image_size = NT_HEADER( module_base )->OptionalHeader.SizeOfImage;
auto vm_handler_tables = vm::locate::all_handler_tables( module_base );
auto vm_enters = vm::locate::all_vm_enters( module_base, vm_handler_tables );
std::printf( "> number of vm enters = %d\n", vm_enters.size() );
for ( const auto &[ vm_enter_offset, encrypted_rva ] : vm_enters )
{
std::printf( "> emulating vm enter at rva = 0x%x\n", vm_enter_offset );
vm::ctx_t vm_ctx( module_base, image_base, image_size, vm_enter_offset );
if ( !vm_ctx.init() )
{
std::printf( "[!] failed to init vmctx... this can be for many reasons..."
" try validating your vm entry rva... make sure the binary is unpacked and is"
"protected with VMProtect 2...\n" );
return -1;
}
vm::emu_t emu( &vm_ctx );
if ( !emu.init() )
{
std::printf( "[!] failed to init emulator...\n" );
return -1;
}
std::vector< vm::instrs::code_block_t > code_blocks;
if ( !emu.get_trace( code_blocks ) )
{
std::printf( "[!] something failed during tracing, review the console for more information...\n" );
return -1;
}
std::printf( "> number of blocks = %d\n", code_blocks.size() );
for ( auto &code_block : code_blocks )
{
for ( const auto &vinstr : code_block.vinstrs )
{
if ( vinstr.operand.has_imm && vinstr.operand.imm.u == const_val )
{
std::printf( "> found constant in vm enter at = 0x%x\n", vm_enter_offset );
std::getchar();
}
}
}
}
} }
output.close();
}
} }

@ -1,507 +1,497 @@
#include <unpacker.hpp> #include <unpacker.hpp>
namespace engine namespace engine {
{ unpack_t::unpack_t(const std::vector<std::uint8_t> &packed_bin)
unpack_t::unpack_t( const std::vector< std::uint8_t > &packed_bin ) : bin(packed_bin),
: bin( packed_bin ), uc_ctx( nullptr ), heap_offset( 0ull ), pack_section_offset( 0ull ) uc_ctx(nullptr),
{ heap_offset(0ull),
win_img = reinterpret_cast< win::image_t<> * >( bin.data() ); pack_section_offset(0ull) {
img_base = win_img->get_nt_headers()->optional_header.image_base; win_img = reinterpret_cast<win::image_t<> *>(bin.data());
img_size = win_img->get_nt_headers()->optional_header.size_image; img_base = win_img->get_nt_headers()->optional_header.image_base;
std::printf( "> image base = 0x%p, image size = 0x%x\n", img_base, img_size ); img_size = win_img->get_nt_headers()->optional_header.size_image;
std::printf("> image base = 0x%p, image size = 0x%x\n", img_base, img_size);
}
unpack_t::~unpack_t(void) {
if (uc_ctx) uc_close(uc_ctx);
for (auto &ptr : uc_hooks)
if (ptr) delete ptr;
}
bool unpack_t::init(void) {
uc_err err;
if ((err = uc_open(UC_ARCH_X86, UC_MODE_64, &uc_ctx))) {
std::printf("> uc_open err = %d\n", err);
return false;
}
if ((err = uc_mem_map(uc_ctx, IAT_VECTOR_TABLE, PAGE_4KB, UC_PROT_ALL))) {
std::printf("> uc_mem_map iat vector table err = %d\n", err);
return false;
}
if ((err = uc_mem_map(uc_ctx, STACK_BASE, STACK_SIZE, UC_PROT_ALL))) {
std::printf("> uc_mem_map stack err, reason = %d\n", err);
return false;
}
if ((err = uc_mem_map(uc_ctx, img_base, img_size, UC_PROT_ALL))) {
std::printf("> map memory failed, reason = %d\n", err);
return false;
}
// init iat vector table full of 'ret' instructions...
auto c3_page = malloc(PAGE_4KB);
{
memset(c3_page, 0xC3, PAGE_4KB);
if ((err = uc_mem_write(uc_ctx, IAT_VECTOR_TABLE, c3_page, PAGE_4KB))) {
std::printf("> failed to init iat vector table...\n");
free(c3_page);
return false;
} }
}
unpack_t::~unpack_t( void ) free(c3_page);
{
if ( uc_ctx ) map_bin.resize(img_size);
uc_close( uc_ctx ); memcpy(map_bin.data(),
bin.data(), // copies pe headers (includes section headers)
for ( auto &ptr : uc_hooks ) win_img->get_nt_headers()->optional_header.size_headers);
if ( ptr )
delete ptr; win::section_header_t *sec_begin = win_img->get_nt_headers()->get_sections(),
} *sec_end =
sec_begin +
bool unpack_t::init( void ) win_img->get_nt_headers()->file_header.num_sections;
{
uc_err err; std::for_each(
if ( ( err = uc_open( UC_ARCH_X86, UC_MODE_64, &uc_ctx ) ) ) sec_begin, sec_end, [&](const win::section_header_t &sec_header) {
{ memcpy(map_bin.data() + sec_header.virtual_address,
std::printf( "> uc_open err = %d\n", err ); bin.data() + sec_header.ptr_raw_data, sec_header.size_raw_data);
return false; });
}
auto basereloc_dir =
if ( ( err = uc_mem_map( uc_ctx, IAT_VECTOR_TABLE, PAGE_4KB, UC_PROT_ALL ) ) ) win_img->get_directory(win::directory_id::directory_entry_basereloc);
{ auto reloc_dir = reinterpret_cast<win::reloc_directory_t *>(
std::printf( "> uc_mem_map iat vector table err = %d\n", err ); basereloc_dir->rva + map_bin.data());
return false; win::reloc_block_t *reloc_block = &reloc_dir->first_block;
}
// apply relocations to all sections...
if ( ( err = uc_mem_map( uc_ctx, STACK_BASE, STACK_SIZE, UC_PROT_ALL ) ) ) while (reloc_block->base_rva && reloc_block->size_block) {
{ std::for_each(
std::printf( "> uc_mem_map stack err, reason = %d\n", err ); reloc_block->begin(), reloc_block->end(),
return false; [&](win::reloc_entry_t &entry) {
} switch (entry.type) {
case win::reloc_type_id::rel_based_dir64: {
if ( ( err = uc_mem_map( uc_ctx, img_base, img_size, UC_PROT_ALL ) ) ) auto reloc_at = reinterpret_cast<std::uintptr_t *>(
{ entry.offset + reloc_block->base_rva + map_bin.data());
std::printf( "> map memory failed, reason = %d\n", err );
return false; *reloc_at = img_base + ((*reloc_at) - img_base);
} break;
// init iat vector table full of 'ret' instructions...
auto c3_page = malloc( PAGE_4KB );
{
memset( c3_page, 0xC3, PAGE_4KB );
if ( ( err = uc_mem_write( uc_ctx, IAT_VECTOR_TABLE, c3_page, PAGE_4KB ) ) )
{
std::printf( "> failed to init iat vector table...\n" );
free( c3_page );
return false;
}
}
free( c3_page );
map_bin.resize( img_size );
memcpy( map_bin.data(), bin.data(), // copies pe headers (includes section headers)
win_img->get_nt_headers()->optional_header.size_headers );
win::section_header_t *sec_begin = win_img->get_nt_headers()->get_sections(),
*sec_end = sec_begin + win_img->get_nt_headers()->file_header.num_sections;
std::for_each( sec_begin, sec_end, [ & ]( const win::section_header_t &sec_header ) {
memcpy( map_bin.data() + sec_header.virtual_address, bin.data() + sec_header.ptr_raw_data,
sec_header.size_raw_data );
} );
auto basereloc_dir = win_img->get_directory( win::directory_id::directory_entry_basereloc );
auto reloc_dir = reinterpret_cast< win::reloc_directory_t * >( basereloc_dir->rva + map_bin.data() );
win::reloc_block_t *reloc_block = &reloc_dir->first_block;
// apply relocations to all sections...
while ( reloc_block->base_rva && reloc_block->size_block )
{
std::for_each( reloc_block->begin(), reloc_block->end(), [ & ]( win::reloc_entry_t &entry ) {
switch ( entry.type )
{
case win::reloc_type_id::rel_based_dir64:
{
auto reloc_at =
reinterpret_cast< std::uintptr_t * >( entry.offset + reloc_block->base_rva + map_bin.data() );
*reloc_at = img_base + ( ( *reloc_at ) - img_base );
break;
}
default:
break;
}
} );
reloc_block = reloc_block->next();
}
// iat hook specific function...
for ( auto import_dir = reinterpret_cast< win::import_directory_t * >(
win_img->get_directory( win::directory_id::directory_entry_import )->rva + map_bin.data() );
import_dir->rva_name; ++import_dir )
{
for ( auto iat_thunk =
reinterpret_cast< win::image_thunk_data_t<> * >( import_dir->rva_first_thunk + map_bin.data() );
iat_thunk->address; ++iat_thunk )
{
if ( iat_thunk->is_ordinal )
continue;
auto iat_name = reinterpret_cast< win::image_named_import_t * >( iat_thunk->address + map_bin.data() );
if ( iat_hooks.find( iat_name->name ) != iat_hooks.end() )
iat_thunk->function = iat_hooks[ iat_name->name ].first + IAT_VECTOR_TABLE;
}
}
// map the entire map buffer into unicorn-engine since we have set everything else up...
if ( ( err = uc_mem_write( uc_ctx, img_base, map_bin.data(), map_bin.size() ) ) )
{
std::printf( "> failed to write memory... reason = %d\n", err );
return false;
}
// setup unicorn-engine hooks on IAT vector table, sections with 0 raw size/ptr, and an invalid memory
// handler...
uc_hooks.push_back( new uc_hook );
if ( ( err = uc_hook_add( uc_ctx, uc_hooks.back(), UC_HOOK_CODE, &engine::unpack_t::iat_dispatcher, this,
IAT_VECTOR_TABLE, IAT_VECTOR_TABLE + PAGE_4KB ) ) )
{
std::printf( "> uc_hook_add error, reason = %d\n", err );
return false;
}
uc_hooks.push_back( new uc_hook );
if ( ( err = uc_hook_add( uc_ctx, uc_hooks.back(),
UC_HOOK_MEM_READ_UNMAPPED | UC_HOOK_MEM_WRITE_UNMAPPED | UC_HOOK_MEM_FETCH_UNMAPPED |
UC_HOOK_INSN_INVALID,
&engine::unpack_t::invalid_mem, this, true, false ) ) )
{
std::printf( "> uc_hook_add error, reason = %d\n", err );
return false;
}
// execution break points on all sections that are executable but have no physical size on disk...
std::for_each( sec_begin, sec_end, [ & ]( win::section_header_t &header ) {
if ( !header.ptr_raw_data && !header.size_raw_data && header.characteristics.mem_execute &&
header.characteristics.mem_write && !header.is_discardable() )
{
uc_hooks.push_back( new uc_hook );
if ( ( err = uc_hook_add( uc_ctx, uc_hooks.back(), UC_HOOK_CODE | UC_HOOK_MEM_WRITE,
&engine::unpack_t::unpack_section_callback, this,
header.virtual_address + img_base,
header.virtual_address + header.virtual_size + img_base ) ) )
{
std::printf( "> failed to add hook... reason = %d\n", err );
return false;
}
pack_section_offset = header.virtual_address + header.virtual_size;
}
else if ( header.characteristics.mem_execute )
{
uc_hooks.push_back( new uc_hook );
if ( ( err = uc_hook_add( uc_ctx, uc_hooks.back(), UC_HOOK_CODE, &engine::unpack_t::code_exec_callback,
this, header.virtual_address + img_base,
header.virtual_address + header.virtual_size + img_base ) ) )
{
std::printf( "> failed to add hook... reason = %d\n", err );
return false;
}
} }
} ); default:
break;
return true; }
});
reloc_block = reloc_block->next();
}
// iat hook specific function...
for (auto import_dir = reinterpret_cast<win::import_directory_t *>(
win_img->get_directory(win::directory_id::directory_entry_import)
->rva +
map_bin.data());
import_dir->rva_name; ++import_dir) {
for (auto iat_thunk = reinterpret_cast<win::image_thunk_data_t<> *>(
import_dir->rva_first_thunk + map_bin.data());
iat_thunk->address; ++iat_thunk) {
if (iat_thunk->is_ordinal) continue;
auto iat_name = reinterpret_cast<win::image_named_import_t *>(
iat_thunk->address + map_bin.data());
if (iat_hooks.find(iat_name->name) != iat_hooks.end())
iat_thunk->function =
iat_hooks[iat_name->name].first + IAT_VECTOR_TABLE;
} }
}
bool unpack_t::unpack( std::vector< std::uint8_t > &output )
{ // map the entire map buffer into unicorn-engine since we have set everything
uc_err err; // else up...
auto nt_headers = win_img->get_nt_headers(); if ((err = uc_mem_write(uc_ctx, img_base, map_bin.data(), map_bin.size()))) {
std::uintptr_t rip = nt_headers->optional_header.entry_point + img_base, rsp = STACK_BASE + STACK_SIZE; std::printf("> failed to write memory... reason = %d\n", err);
return false;
if ( ( err = uc_reg_write( uc_ctx, UC_X86_REG_RSP, &rsp ) ) ) }
{
std::printf( "> uc_reg_write error, reason = %d\n", err ); // setup unicorn-engine hooks on IAT vector table, sections with 0 raw
return false; // size/ptr, and an invalid memory handler...
}
uc_hooks.push_back(new uc_hook);
if ( ( err = uc_reg_write( uc_ctx, UC_X86_REG_RIP, &rip ) ) ) if ((err = uc_hook_add(uc_ctx, uc_hooks.back(), UC_HOOK_CODE,
{ (void *)&engine::unpack_t::iat_dispatcher, this,
std::printf( "> uc_reg_write error, reason = %d\n", err ); IAT_VECTOR_TABLE, IAT_VECTOR_TABLE + PAGE_4KB))) {
return false; std::printf("> uc_hook_add error, reason = %d\n", err);
} return false;
}
std::printf( "> beginning execution at = 0x%p\n", rip );
uc_hooks.push_back(new uc_hook);
if ( ( err = uc_emu_start( uc_ctx, rip, 0ull, 0ull, 0ull ) ) ) if ((err = uc_hook_add(
{ uc_ctx, uc_hooks.back(),
std::printf( "> error starting emu... reason = %d\n", err ); UC_HOOK_MEM_READ_UNMAPPED | UC_HOOK_MEM_WRITE_UNMAPPED |
return false; UC_HOOK_MEM_FETCH_UNMAPPED | UC_HOOK_INSN_INVALID,
} (void *)&engine::unpack_t::invalid_mem, this, true, false))) {
std::printf("> uc_hook_add error, reason = %d\n", err);
output.resize( img_size ); return false;
if ( ( err = uc_mem_read( uc_ctx, img_base, output.data(), output.size() ) ) ) }
{
std::printf( "> uc_mem_read failed... err = %d\n", err ); // execution break points on all sections that are executable but have no
return false; // physical size on disk...
} std::for_each(sec_begin, sec_end, [&](win::section_header_t &header) {
if (!header.ptr_raw_data && !header.size_raw_data &&
auto output_img = reinterpret_cast< win::image_t<> * >( output.data() ); header.characteristics.mem_execute &&
auto sections = output_img->get_nt_headers()->get_sections(); header.characteristics.mem_write && !header.is_discardable()) {
auto section_cnt = output_img->get_file_header()->num_sections; uc_hooks.push_back(new uc_hook);
if ((err = uc_hook_add(
// { section virtual address -> vector of section offset to reloc } uc_ctx, uc_hooks.back(), UC_HOOK_CODE | UC_HOOK_MEM_WRITE,
std::map< std::uint32_t, std::vector< std::uint16_t > > new_relocs; (void *)&engine::unpack_t::unpack_section_callback, this,
header.virtual_address + img_base,
// search executable sections for MOV RAX, 00 00 00 00 00 00 00 00... header.virtual_address + header.virtual_size + img_base))) {
std::for_each( sections, sections + section_cnt, [ & ]( win::section_header_t &header ) { std::printf("> failed to add hook... reason = %d\n", err);
if ( header.characteristics.mem_execute ) return false;
{ }
auto result = output.data() + header.virtual_address;
pack_section_offset = header.virtual_address + header.virtual_size;
do } else if (header.characteristics.mem_execute) {
{ uc_hooks.push_back(new uc_hook);
result = reinterpret_cast< std::uint8_t * >( xtils::um_t::get_instance()->sigscan( if ((err = uc_hook_add(
result, uc_ctx, uc_hooks.back(), UC_HOOK_CODE,
header.virtual_size - (void *)&engine::unpack_t::code_exec_callback, this,
( reinterpret_cast< std::uintptr_t >( result ) - header.virtual_address + img_base,
( header.virtual_address + reinterpret_cast< std::uintptr_t >( output.data() ) ) ), header.virtual_address + header.virtual_size + img_base))) {
MOV_RAX_0_SIG, MOV_RAX_0_MASK ) ); std::printf("> failed to add hook... reason = %d\n", err);
return false;
if ( result ) }
{ }
result += 2; // advance ahead of the 0x48 0xB8... });
// offset from section begin... return true;
auto reloc_offset = }
( reinterpret_cast< std::uintptr_t >( result ) ) -
reinterpret_cast< std::uintptr_t >( output.data() + header.virtual_address ); bool unpack_t::unpack(std::vector<std::uint8_t> &output) {
uc_err err;
new_relocs[ ( header.virtual_address + reloc_offset ) & ~0xFFFull ].push_back( reloc_offset ); auto nt_headers = win_img->get_nt_headers();
} std::uintptr_t rip = nt_headers->optional_header.entry_point + img_base,
rsp = STACK_BASE + STACK_SIZE;
} while ( result );
} if ((err = uc_reg_write(uc_ctx, UC_X86_REG_RSP, &rsp))) {
std::printf("> uc_reg_write error, reason = %d\n", err);
header.ptr_raw_data = header.virtual_address; return false;
header.size_raw_data = header.virtual_size; }
} );
if ((err = uc_reg_write(uc_ctx, UC_X86_REG_RIP, &rip))) {
// determines if a relocation block exists for a given page... std::printf("> uc_reg_write error, reason = %d\n", err);
static const auto has_reloc_page = [ & ]( std::uint32_t page ) -> bool { return false;
auto img = reinterpret_cast< win::image_t<> * >( output.data() ); }
auto sections = img->get_nt_headers()->get_sections();
auto section_cnt = img->get_file_header()->num_sections; std::printf("> beginning execution at = 0x%p\n", rip);
auto basereloc_dir = img->get_directory( win::directory_id::directory_entry_basereloc ); if ((err = uc_emu_start(uc_ctx, rip, 0ull, 0ull, 0ull))) {
auto reloc_dir = reinterpret_cast< win::reloc_directory_t * >( basereloc_dir->rva + output.data() ); std::printf("> error starting emu... reason = %d\n", err);
win::reloc_block_t *reloc_block = &reloc_dir->first_block; return false;
}
while ( reloc_block->base_rva && reloc_block->size_block )
{ output.resize(img_size);
if ( reloc_block->base_rva == page ) if ((err = uc_mem_read(uc_ctx, img_base, output.data(), output.size()))) {
return true; std::printf("> uc_mem_read failed... err = %d\n", err);
return false;
reloc_block = reloc_block->next(); }
auto output_img = reinterpret_cast<win::image_t<> *>(output.data());
auto sections = output_img->get_nt_headers()->get_sections();
auto section_cnt = output_img->get_file_header()->num_sections;
// { section virtual address -> vector of section offset to reloc }
std::map<std::uint32_t, std::vector<std::uint16_t> > new_relocs;
// search executable sections for MOV RAX, 00 00 00 00 00 00 00 00...
std::for_each(
sections, sections + section_cnt, [&](win::section_header_t &header) {
if (header.characteristics.mem_execute) {
auto result = output.data() + header.virtual_address;
do {
result = reinterpret_cast<std::uint8_t *>(vm::locate::sigscan(
result,
header.virtual_size -
(reinterpret_cast<std::uintptr_t>(result) -
(header.virtual_address +
reinterpret_cast<std::uintptr_t>(output.data()))),
MOV_RAX_0_SIG, MOV_RAX_0_MASK));
if (result) {
result += 2; // advance ahead of the 0x48 0xB8...
// offset from section begin...
auto reloc_offset = (reinterpret_cast<std::uintptr_t>(result)) -
reinterpret_cast<std::uintptr_t>(
output.data() + header.virtual_address);
new_relocs[(header.virtual_address + reloc_offset) & ~0xFFFull]
.push_back(reloc_offset);
} }
return false; } while (result);
};
// calc size to add new reloc info...
std::size_t resize_cnt = 0ull;
for ( const auto &[ reloc_rva, relocs ] : new_relocs )
if ( !has_reloc_page( reloc_rva ) )
resize_cnt += sizeof( win::reloc_block_t ) + ( relocs.size() * sizeof( win::reloc_entry_t ) );
// last block needs to contain 0 for block_rva and size_block...
if ( resize_cnt )
resize_cnt += sizeof win::reloc_block_t;
output.resize( output.size() + resize_cnt );
output_img = reinterpret_cast< win::image_t<> * >( output.data() );
auto basereloc_dir = output_img->get_directory( win::directory_id::directory_entry_basereloc );
auto reloc_dir = reinterpret_cast< win::reloc_directory_t * >( basereloc_dir->rva + output.data() );
basereloc_dir->size += resize_cnt;
for ( const auto &[ reloc_rva, relocs ] : new_relocs )
{
if ( has_reloc_page( reloc_rva ) )
continue;
win::reloc_block_t *reloc_block = &reloc_dir->first_block;
while ( reloc_block->base_rva && reloc_block->size_block )
reloc_block = reloc_block->next();
reloc_block->base_rva = reloc_rva;
reloc_block->size_block = relocs.size() * sizeof( win::reloc_entry_t ) + sizeof uint64_t;
reloc_block->next()->base_rva = 0ull;
reloc_block->next()->size_block = 0ull;
for ( auto idx = 0u; idx < relocs.size(); ++idx )
{
reloc_block->entries[ idx ].type = win::reloc_type_id::rel_based_dir64;
reloc_block->entries[ idx ].offset = relocs[ idx ];
}
} }
return true;
}
void unpack_t::local_alloc_hook( uc_engine *uc_ctx, unpack_t *obj ) header.ptr_raw_data = header.virtual_address;
{ header.size_raw_data = header.virtual_size;
uc_err err; });
std::uintptr_t rax, rdx;
if ( ( err = uc_reg_read( uc_ctx, UC_X86_REG_RDX, &rdx ) ) ) // determines if a relocation block exists for a given page...
{ static const auto has_reloc_page = [&](std::uint32_t page) -> bool {
std::printf( "> failed to read RDX... reason = %d\n", rdx ); auto img = reinterpret_cast<win::image_t<> *>(output.data());
return; auto sections = img->get_nt_headers()->get_sections();
} auto section_cnt = img->get_file_header()->num_sections;
auto size = ( ( rdx + PAGE_4KB ) & ~0xFFFull ); auto basereloc_dir =
if ( ( err = uc_mem_map( uc_ctx, HEAP_BASE + obj->heap_offset, size, UC_PROT_ALL ) ) ) img->get_directory(win::directory_id::directory_entry_basereloc);
{ auto reloc_dir = reinterpret_cast<win::reloc_directory_t *>(
std::printf( "> failed to allocate memory... reason = %d\n", err ); basereloc_dir->rva + output.data());
return; win::reloc_block_t *reloc_block = &reloc_dir->first_block;
}
rax = HEAP_BASE + obj->heap_offset; while (reloc_block->base_rva && reloc_block->size_block) {
obj->heap_offset += size; if (reloc_block->base_rva == page) return true;
if ( ( err = uc_reg_write( uc_ctx, UC_X86_REG_RAX, &rax ) ) ) reloc_block = reloc_block->next();
{
std::printf( "> failed to write rax... reason = %d\n", err );
return;
}
} }
void unpack_t::local_free_hook( uc_engine *uc_ctx, unpack_t *obj ) return false;
{ };
uc_err err;
std::uintptr_t rax = 0ull;
if ( ( err = uc_reg_write( uc_ctx, UC_X86_REG_RAX, &rax ) ) ) // calc size to add new reloc info...
{ std::size_t resize_cnt = 0ull;
std::printf( "> failed to write rax... reason = %d\n", err ); for (const auto &[reloc_rva, relocs] : new_relocs)
return; if (!has_reloc_page(reloc_rva))
} resize_cnt += sizeof(win::reloc_block_t) +
} (relocs.size() * sizeof(win::reloc_entry_t));
void unpack_t::load_library_hook( uc_engine *uc_ctx, unpack_t *obj )
{
uc_err err;
std::uintptr_t rcx = 0ull;
if ( ( err = uc_reg_read( uc_ctx, UC_X86_REG_RCX, &rcx ) ) ) // last block needs to contain 0 for block_rva and size_block...
{ if (resize_cnt) resize_cnt += sizeof(win::reloc_block_t);
std::printf( "> uc_reg_read error, reason = %d\n", err );
return;
}
char buff[ 256 ]; output.resize(output.size() + resize_cnt);
uc_strcpy( uc_ctx, buff, rcx ); output_img = reinterpret_cast<win::image_t<> *>(output.data());
std::printf( "> LoadLibraryA(\"%s\")\n", buff );
auto module_base = reinterpret_cast< std::uintptr_t >( LoadLibraryA( buff ) ); auto basereloc_dir =
output_img->get_directory(win::directory_id::directory_entry_basereloc);
auto reloc_dir = reinterpret_cast<win::reloc_directory_t *>(
basereloc_dir->rva + output.data());
auto module_size = basereloc_dir->size += resize_cnt;
reinterpret_cast< win::image_t<> * >( module_base )->get_nt_headers()->optional_header.size_image; for (const auto &[reloc_rva, relocs] : new_relocs) {
if (has_reloc_page(reloc_rva)) continue;
if ( std::find( obj->loaded_modules.begin(), obj->loaded_modules.end(), module_base ) != win::reloc_block_t *reloc_block = &reloc_dir->first_block;
obj->loaded_modules.end() ) while (reloc_block->base_rva && reloc_block->size_block)
{ reloc_block = reloc_block->next();
if ( ( err = uc_reg_write( uc_ctx, UC_X86_REG_RAX, &module_base ) ) )
{
std::printf( "> failed to set rax... reason = %d\n", err );
return;
}
}
else
{
if ( ( err = uc_mem_map( uc_ctx, module_base, module_size, UC_PROT_ALL ) ) )
{
std::printf( "> failed to load library... reason = %d\n", err );
return;
}
if ( ( err = uc_mem_write( uc_ctx, module_base, reinterpret_cast< void * >( module_base ), module_size ) ) ) reloc_block->base_rva = reloc_rva;
{ reloc_block->size_block =
std::printf( "> failed to copy module into emulator... reason = %d\n", err ); relocs.size() * sizeof(win::reloc_entry_t) + sizeof(uint64_t);
return;
}
if ( ( err = uc_reg_write( uc_ctx, UC_X86_REG_RAX, &module_base ) ) ) reloc_block->next()->base_rva = 0ull;
{ reloc_block->next()->size_block = 0ull;
std::printf( "> failed to set rax... reason = %d\n", err );
return;
}
obj->loaded_modules.push_back( module_base ); for (auto idx = 0u; idx < relocs.size(); ++idx) {
} reloc_block->entries[idx].type = win::reloc_type_id::rel_based_dir64;
reloc_block->entries[idx].offset = relocs[idx];
} }
}
void unpack_t::uc_strcpy( uc_engine *uc_ctx, char *buff, std::uintptr_t addr ) return true;
{ }
uc_err err;
char i = 0u; void unpack_t::local_alloc_hook(uc_engine *uc_ctx, unpack_t *obj) {
auto idx = 0ul; uc_err err;
std::uintptr_t rax, rdx;
do
{ if ((err = uc_reg_read(uc_ctx, UC_X86_REG_RDX, &rdx))) {
if ( ( err = uc_mem_read( uc_ctx, addr + idx, &i, sizeof i ) ) ) std::printf("> failed to read RDX... reason = %d\n", rdx);
break; return;
}
} while ( ( buff[ idx++ ] = i ) );
auto size = ((rdx + PAGE_4KB) & ~0xFFFull);
if ((err = uc_mem_map(uc_ctx, HEAP_BASE + obj->heap_offset, size,
UC_PROT_ALL))) {
std::printf("> failed to allocate memory... reason = %d\n", err);
return;
}
rax = HEAP_BASE + obj->heap_offset;
obj->heap_offset += size;
if ((err = uc_reg_write(uc_ctx, UC_X86_REG_RAX, &rax))) {
std::printf("> failed to write rax... reason = %d\n", err);
return;
}
}
void unpack_t::local_free_hook(uc_engine *uc_ctx, unpack_t *obj) {
uc_err err;
std::uintptr_t rax = 0ull;
if ((err = uc_reg_write(uc_ctx, UC_X86_REG_RAX, &rax))) {
std::printf("> failed to write rax... reason = %d\n", err);
return;
}
}
void unpack_t::load_library_hook(uc_engine *uc_ctx, unpack_t *obj) {
uc_err err;
std::uintptr_t rcx = 0ull;
if ((err = uc_reg_read(uc_ctx, UC_X86_REG_RCX, &rcx))) {
std::printf("> uc_reg_read error, reason = %d\n", err);
return;
}
char buff[256];
uc_strcpy(uc_ctx, buff, rcx);
std::printf("> LoadLibraryA(\"%s\")\n", buff);
if (!obj->loaded_modules[buff]) {
std::vector<std::uint8_t> module_data, tmp;
if (!vm::util::open_binary_file(buff, module_data)) {
std::printf(
"[!] failed to open a dependency... please put %s in the same folder "
"as vmprofiler-cli...\n",
buff);
exit(-1);
} }
bool unpack_t::iat_dispatcher( uc_engine *uc, uint64_t address, uint32_t size, unpack_t *unpack ) auto img = reinterpret_cast<win::image_t<> *>(module_data.data());
{ auto image_size = img->get_nt_headers()->optional_header.size_image;
auto vec = address - IAT_VECTOR_TABLE;
for ( auto &[ iat_name, iat_hook_data ] : unpack->iat_hooks ) tmp.resize(image_size);
{ std::memcpy(tmp.data(), module_data.data(), 0x1000);
if ( iat_hook_data.first == vec ) std::for_each(img->get_nt_headers()->get_sections(),
{ img->get_nt_headers()->get_sections() +
std::printf( "> hooking import = %s\n", iat_name.c_str() ); img->get_nt_headers()->file_header.num_sections,
iat_hook_data.second( uc, unpack ); [&](const auto &section_header) {
return true; std::memcpy(
} tmp.data() + section_header.virtual_address,
} module_data.data() + section_header.ptr_raw_data,
return false; section_header.size_raw_data);
});
const auto module_base = reinterpret_cast<std::uintptr_t>(tmp.data());
const auto image_base = img->get_nt_headers()->optional_header.image_base;
const auto alloc_addr = module_base & ~0x1000ull;
obj->loaded_modules[buff] = alloc_addr;
if ((err = uc_reg_write(uc_ctx, UC_X86_REG_RAX, &alloc_addr))) {
std::printf("> failed to set rax... reason = %d\n", err);
return;
} }
} else {
bool unpack_t::code_exec_callback( uc_engine *uc, uint64_t address, uint32_t size, unpack_t *unpack ) const auto alloc_addr = obj->loaded_modules[buff];
{ if ((err = uc_reg_write(uc_ctx, UC_X86_REG_RAX, &alloc_addr))) {
static ZydisDecoder decoder; std::printf("> failed to set rax... reason = %d\n", err);
static ZydisFormatter formatter; return;
static ZydisDecodedInstruction instr;
if ( static std::atomic< bool > once{ false }; !once.exchange( true ) )
{
ZydisDecoderInit( &decoder, ZYDIS_MACHINE_MODE_LONG_64, ZYDIS_ADDRESS_WIDTH_64 );
ZydisFormatterInit( &formatter, ZYDIS_FORMATTER_STYLE_INTEL );
}
auto instr_ptr = reinterpret_cast< void * >( unpack->map_bin.data() + ( address - unpack->img_base ) );
if ( ZYAN_SUCCESS( ZydisDecoderDecodeBuffer( &decoder, instr_ptr, PAGE_4KB, &instr ) ) )
{
if ( instr.mnemonic == ZYDIS_MNEMONIC_CALL && instr.operands[ 0 ].type == ZYDIS_OPERAND_TYPE_REGISTER &&
instr.operands[ 0 ].reg.value == ZYDIS_REGISTER_RAX )
{
std::uintptr_t rax = 0u, rip = 0u;
uc_reg_read( uc, UC_X86_REG_RAX, &rax );
uc_reg_read( uc, UC_X86_REG_RIP, &rip );
if ( rax > unpack->img_base + unpack->img_size ) // skip calls to kernel32.dll...
{
rip += instr.length;
uc_reg_write( uc, UC_X86_REG_RIP, &rip );
}
}
}
return true;
} }
}
bool unpack_t::unpack_section_callback( uc_engine *uc, uc_mem_type type, uint64_t address, int size, int64_t value, } // namespace engine
unpack_t *unpack )
{ void unpack_t::uc_strcpy(uc_engine *uc_ctx, char *buff, std::uintptr_t addr) {
if ( address == unpack->pack_section_offset + unpack->img_base ) uc_err err;
{ char i = 0u;
std::printf( "> dumping...\n" ); auto idx = 0ul;
uc_emu_stop( uc );
return false; do {
} if ((err = uc_mem_read(uc_ctx, addr + idx, &i, sizeof i))) break;
return true;
} while ((buff[idx++] = i));
}
bool unpack_t::iat_dispatcher(uc_engine *uc, uint64_t address, uint32_t size,
unpack_t *unpack) {
auto vec = address - IAT_VECTOR_TABLE;
for (auto &[iat_name, iat_hook_data] : unpack->iat_hooks) {
if (iat_hook_data.first == vec) {
std::printf("> hooking import = %s\n", iat_name.c_str());
iat_hook_data.second(uc, unpack);
return true;
} }
}
void unpack_t::invalid_mem( uc_engine *uc, uc_mem_type type, uint64_t address, int size, int64_t value, return false;
unpack_t *unpack ) }
{
switch ( type ) bool unpack_t::code_exec_callback(uc_engine *uc, uint64_t address,
{ uint32_t size, unpack_t *unpack) {
case UC_MEM_READ_UNMAPPED: static ZydisDecoder decoder;
std::printf( ">>> reading invalid memory at address = 0x%p, size = 0x%x\n", address, size ); static ZydisFormatter formatter;
break; static ZydisDecodedInstruction instr;
case UC_MEM_WRITE_UNMAPPED:
std::printf( ">>> writing invalid memory at address = 0x%p, size = 0x%x, val = 0x%x\n", address, size, if (static std::atomic<bool> once{false}; !once.exchange(true)) {
value ); ZydisDecoderInit(&decoder, ZYDIS_MACHINE_MODE_LONG_64,
break; ZYDIS_ADDRESS_WIDTH_64);
case UC_MEM_FETCH_UNMAPPED: ZydisFormatterInit(&formatter, ZYDIS_FORMATTER_STYLE_INTEL);
{ }
std::printf( ">>> fetching invalid instructions at address = 0x%p\n", address );
break; auto instr_ptr = reinterpret_cast<void *>(unpack->map_bin.data() +
} (address - unpack->img_base));
default:
break; if (ZYAN_SUCCESS(
} ZydisDecoderDecodeBuffer(&decoder, instr_ptr, PAGE_4KB, &instr))) {
if (instr.mnemonic == ZYDIS_MNEMONIC_CALL &&
instr.operands[0].type == ZYDIS_OPERAND_TYPE_REGISTER &&
instr.operands[0].reg.value == ZYDIS_REGISTER_RAX) {
std::uintptr_t rax = 0u, rip = 0u;
uc_reg_read(uc, UC_X86_REG_RAX, &rax);
uc_reg_read(uc, UC_X86_REG_RIP, &rip);
if (rax > unpack->img_base + unpack->img_size ||
rax < unpack->img_base) // skip calls to kernel32.dll...
{
rip += instr.length;
uc_reg_write(uc, UC_X86_REG_RIP, &rip);
}
}
}
return true;
}
bool unpack_t::unpack_section_callback(uc_engine *uc, uc_mem_type type,
uint64_t address, int size,
int64_t value, unpack_t *unpack) {
if (address == unpack->pack_section_offset + unpack->img_base) {
std::printf("> dumping...\n");
uc_emu_stop(uc);
return false;
}
return true;
}
void unpack_t::invalid_mem(uc_engine *uc, uc_mem_type type, uint64_t address,
int size, int64_t value, unpack_t *unpack) {
switch (type) {
case UC_MEM_READ_UNMAPPED:
std::printf(">>> reading invalid memory at address = 0x%p, size = 0x%x\n",
address, size);
break;
case UC_MEM_WRITE_UNMAPPED:
std::printf(
">>> writing invalid memory at address = 0x%p, size = 0x%x, val = "
"0x%x\n",
address, size, value);
break;
case UC_MEM_FETCH_UNMAPPED: {
std::printf(">>> fetching invalid instructions at address = 0x%p\n",
address);
break;
} }
} // namespace engine default:
break;
}
}
} // namespace engine

File diff suppressed because it is too large Load Diff
Loading…
Cancel
Save