Hello, I have been learning malware analysis as a hobby, however, my main issue is that I can not find any technical documentation on how, specifically, file infectors work. I found a short tutorial on vxheavens.com, however, it was written poorly and was not created to fully explain the entirety of the process. My most prevalent questions are:
How does an appending file infector get loaded (I'm not talking EIP-wise)? It seems to me once you've written the virus, if the target file doesn't have a few of the main imports required for the file-infector, it would simply crash. (Would most file-infectors simply keep their own version of an import table, containing the addresses for their required functions?)
Do file infectors append their entirety, sections and all? If so, how on earth does the OS not get confused once it attempts to load the virus, and then the virus jumps to the actual code? (Is the OS smart enough to load the virus and then load the actual code once it is jumped to?)
I have many more questions, but those two are the biggest on my mind right now. If any of you could point me to some great technical documentation on file-infectors, that would be fantastic. (I have googled many times, however, it usually points to articles dedicated to your average layman.)
How does an appending file infector get loaded (I'm not talking EIP-wise)? It seems to me once you've written the virus, if the target file doesn't have a few of the main imports required for the file-infector, it would simply crash. (Would most file-infectors simply keep their own version of an import table, containing the addresses for their required functions?)
Do file infectors append their entirety, sections and all? If so, how on earth does the OS not get confused once it attempts to load the virus, and then the virus jumps to the actual code? (Is the OS smart enough to load the virus and then load the actual code once it is jumped to?)
I have many more questions, but those two are the biggest on my mind right now. If any of you could point me to some great technical documentation on file-infectors, that would be fantastic. (I have googled many times, however, it usually points to articles dedicated to your average layman.)