Currently I reverse a malware which makes use of a stack value.
It takes this stack values (pointer) and compares the bytes to the "MZ" signature (MZ header). If successful it continues to check if it is a PE file (PE header).
The value of this stack address is the second after break on the Entrypoint. Note: The value of the address is the same for all executables on the running OS (OK we have ASLR on Windows 7), but I want to say that the malware is just as any other executable regarding this value.
I have checked this stack values (pointer) on Windows XP (SP3), Windows 7 (32-Bit) and Windows 7 (64-Bit), the results are as follows:
Windows XP (SP3)
The value of the second stack address points into ntdll.dll. Small note: What is this? Why does it points to this address?
Stack:
CPU:
Windows 7 (32/64-Bit)
The value of the second stack address points to the Process Environment Block (PEB).
Stack:
Memory:
Now my question: Does somebody know a configuration where this stack value points into a PE file (header), maybe on another OS (Windows 2000/Vista/...)?
It takes this stack values (pointer) and compares the bytes to the "MZ" signature (MZ header). If successful it continues to check if it is a PE file (PE header).
The value of this stack address is the second after break on the Entrypoint. Note: The value of the address is the same for all executables on the running OS (OK we have ASLR on Windows 7), but I want to say that the malware is just as any other executable regarding this value.
I have checked this stack values (pointer) on Windows XP (SP3), Windows 7 (32-Bit) and Windows 7 (64-Bit), the results are as follows:
Windows XP (SP3)
The value of the second stack address points into ntdll.dll. Small note: What is this? Why does it points to this address?
Stack:
CPU:
Windows 7 (32/64-Bit)
The value of the second stack address points to the Process Environment Block (PEB).
Stack:
Memory:
Now my question: Does somebody know a configuration where this stack value points into a PE file (header), maybe on another OS (Windows 2000/Vista/...)?
Malware Reversing
http://www.malware-reversing.com
http://www.malware-reversing.com