2012-02-05 23:17:47 +08:00
|
|
|
|
/*
|
|
|
|
|
Copyright (C) 2011-2012 de4dot@gmail.com
|
|
|
|
|
|
|
|
|
|
This file is part of de4dot.
|
|
|
|
|
|
|
|
|
|
de4dot is free software: you can redistribute it and/or modify
|
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
|
|
de4dot is distributed in the hope that it will be useful,
|
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
|
along with de4dot. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
using System;
|
|
|
|
|
using System.Collections.Generic;
|
|
|
|
|
using System.IO;
|
|
|
|
|
using Mono.Cecil;
|
|
|
|
|
using Mono.Cecil.Cil;
|
|
|
|
|
using Mono.Cecil.Metadata;
|
|
|
|
|
using Mono.MyStuff;
|
|
|
|
|
using de4dot.blocks;
|
2012-04-10 22:32:15 +08:00
|
|
|
|
using de4dot.PE;
|
2012-02-05 23:17:47 +08:00
|
|
|
|
|
2012-02-07 11:45:59 +08:00
|
|
|
|
namespace de4dot.code.deobfuscators.CodeVeil {
|
2012-02-05 23:17:47 +08:00
|
|
|
|
class MethodsDecrypter {
|
2012-02-08 22:40:11 +08:00
|
|
|
|
MainType mainType;
|
2012-02-07 21:55:20 +08:00
|
|
|
|
IDecrypter decrypter;
|
2012-02-07 12:08:02 +08:00
|
|
|
|
|
2012-02-07 21:55:20 +08:00
|
|
|
|
interface IDecrypter {
|
|
|
|
|
void initialize(byte[] methodsData);
|
|
|
|
|
bool decrypt(BinaryReader fileDataReader, DumpedMethod dm);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
class Decrypter : IDecrypter {
|
|
|
|
|
BinaryReader methodsDataReader;
|
|
|
|
|
|
|
|
|
|
public virtual void initialize(byte[] methodsData) {
|
|
|
|
|
methodsDataReader = new BinaryReader(new MemoryStream(methodsData));
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public virtual bool decrypt(BinaryReader fileDataReader, DumpedMethod dm) {
|
|
|
|
|
if (fileDataReader.ReadByte() != 0x2A)
|
|
|
|
|
return false; // Not a RET
|
|
|
|
|
int methodsDataOffset = DeobUtils.readVariableLengthInt32(fileDataReader);
|
|
|
|
|
methodsDataReader.BaseStream.Position = methodsDataOffset;
|
|
|
|
|
|
|
|
|
|
dm.mhCodeSize = (uint)DeobUtils.readVariableLengthInt32(methodsDataReader);
|
|
|
|
|
dm.code = methodsDataReader.ReadBytes((int)dm.mhCodeSize);
|
|
|
|
|
if ((dm.mhFlags & 8) != 0)
|
2012-04-22 19:43:43 +08:00
|
|
|
|
dm.extraSections = MethodBodyParser.readExtraSections(methodsDataReader);
|
2012-02-07 21:55:20 +08:00
|
|
|
|
|
|
|
|
|
if (!decryptCode(dm))
|
|
|
|
|
return false;
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
protected virtual bool decryptCode(DumpedMethod dm) {
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
class DecrypterV5 : Decrypter {
|
|
|
|
|
byte[] decryptKey;
|
|
|
|
|
|
|
|
|
|
public override void initialize(byte[] methodsData) {
|
|
|
|
|
var data = DeobUtils.inflate(methodsData, true);
|
|
|
|
|
decryptKey = BitConverter.GetBytes(BitConverter.ToUInt32(data, 0));
|
|
|
|
|
|
|
|
|
|
var newMethodsData = new byte[data.Length - 4];
|
|
|
|
|
Array.Copy(data, 4, newMethodsData, 0, newMethodsData.Length);
|
|
|
|
|
base.initialize(newMethodsData);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
protected override bool decryptCode(DumpedMethod dm) {
|
|
|
|
|
var code = dm.code;
|
|
|
|
|
for (int i = 0; i < code.Length; i++) {
|
|
|
|
|
for (int j = 0; j < 4 && i + j < code.Length; j++)
|
|
|
|
|
code[i + j] ^= decryptKey[j];
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-02-05 23:17:47 +08:00
|
|
|
|
public bool Detected {
|
2012-02-08 22:40:11 +08:00
|
|
|
|
get { return decrypter != null; }
|
2012-02-05 23:17:47 +08:00
|
|
|
|
}
|
|
|
|
|
|
2012-02-08 22:40:11 +08:00
|
|
|
|
public MethodsDecrypter(MainType mainType) {
|
|
|
|
|
this.mainType = mainType;
|
2012-02-05 23:17:47 +08:00
|
|
|
|
}
|
|
|
|
|
|
2012-02-08 22:40:11 +08:00
|
|
|
|
public MethodsDecrypter(MainType mainType, MethodsDecrypter oldOne) {
|
|
|
|
|
this.mainType = mainType;
|
2012-02-05 23:17:47 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
public void find() {
|
2012-02-08 22:40:11 +08:00
|
|
|
|
if (!mainType.Detected)
|
2012-02-05 23:17:47 +08:00
|
|
|
|
return;
|
|
|
|
|
|
2012-02-08 22:40:11 +08:00
|
|
|
|
switch (mainType.Version) {
|
|
|
|
|
case ObfuscatorVersion.Unknown:
|
2012-02-05 23:17:47 +08:00
|
|
|
|
break;
|
|
|
|
|
|
2012-02-08 22:40:11 +08:00
|
|
|
|
case ObfuscatorVersion.V3:
|
|
|
|
|
case ObfuscatorVersion.V4_0:
|
|
|
|
|
case ObfuscatorVersion.V4_1:
|
|
|
|
|
decrypter = new Decrypter();
|
|
|
|
|
break;
|
2012-02-07 12:08:02 +08:00
|
|
|
|
|
2012-02-08 22:40:11 +08:00
|
|
|
|
case ObfuscatorVersion.V5_0:
|
2012-02-07 21:55:20 +08:00
|
|
|
|
decrypter = new DecrypterV5();
|
2012-02-08 22:40:11 +08:00
|
|
|
|
break;
|
2012-02-06 04:27:36 +08:00
|
|
|
|
|
2012-02-08 22:40:11 +08:00
|
|
|
|
default:
|
|
|
|
|
throw new ApplicationException("Unknown version");
|
2012-02-05 23:17:47 +08:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2012-02-25 13:14:19 +08:00
|
|
|
|
public bool decrypt(byte[] fileData, ref DumpedMethods dumpedMethods) {
|
2012-02-08 22:40:11 +08:00
|
|
|
|
if (decrypter == null)
|
2012-02-05 23:17:47 +08:00
|
|
|
|
return false;
|
|
|
|
|
|
|
|
|
|
var peImage = new PeImage(fileData);
|
|
|
|
|
if (peImage.Sections.Length <= 0)
|
|
|
|
|
return false;
|
|
|
|
|
|
|
|
|
|
var methodsData = findMethodsData(peImage, fileData);
|
|
|
|
|
if (methodsData == null)
|
|
|
|
|
return false;
|
|
|
|
|
|
2012-02-07 21:55:20 +08:00
|
|
|
|
decrypter.initialize(methodsData);
|
2012-02-07 12:08:02 +08:00
|
|
|
|
|
2012-02-05 23:17:47 +08:00
|
|
|
|
dumpedMethods = createDumpedMethods(peImage, fileData, methodsData);
|
|
|
|
|
if (dumpedMethods == null)
|
|
|
|
|
return false;
|
|
|
|
|
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
|
2012-02-25 13:14:19 +08:00
|
|
|
|
DumpedMethods createDumpedMethods(PeImage peImage, byte[] fileData, byte[] methodsData) {
|
|
|
|
|
var dumpedMethods = new DumpedMethods();
|
2012-02-05 23:17:47 +08:00
|
|
|
|
|
|
|
|
|
var methodsDataReader = new BinaryReader(new MemoryStream(methodsData));
|
|
|
|
|
var fileDataReader = new BinaryReader(new MemoryStream(fileData));
|
|
|
|
|
|
|
|
|
|
var metadataTables = peImage.Cor20Header.createMetadataTables();
|
|
|
|
|
var methodDef = metadataTables.getMetadataType(MetadataIndex.iMethodDef);
|
|
|
|
|
uint methodDefOffset = methodDef.fileOffset;
|
|
|
|
|
for (int i = 0; i < methodDef.rows; i++, methodDefOffset += methodDef.totalSize) {
|
|
|
|
|
uint bodyRva = peImage.offsetReadUInt32(methodDefOffset);
|
|
|
|
|
if (bodyRva == 0)
|
|
|
|
|
continue;
|
|
|
|
|
uint bodyOffset = peImage.rvaToOffset(bodyRva);
|
|
|
|
|
|
|
|
|
|
var dm = new DumpedMethod();
|
2012-02-06 06:04:24 +08:00
|
|
|
|
dm.token = (uint)(0x06000001 + i);
|
2012-02-05 23:17:47 +08:00
|
|
|
|
dm.mdImplFlags = peImage.offsetReadUInt16(methodDefOffset + (uint)methodDef.fields[1].offset);
|
|
|
|
|
dm.mdFlags = peImage.offsetReadUInt16(methodDefOffset + (uint)methodDef.fields[2].offset);
|
|
|
|
|
dm.mdName = peImage.offsetRead(methodDefOffset + (uint)methodDef.fields[3].offset, methodDef.fields[3].size);
|
|
|
|
|
dm.mdSignature = peImage.offsetRead(methodDefOffset + (uint)methodDef.fields[4].offset, methodDef.fields[4].size);
|
|
|
|
|
dm.mdParamList = peImage.offsetRead(methodDefOffset + (uint)methodDef.fields[5].offset, methodDef.fields[5].size);
|
|
|
|
|
|
|
|
|
|
byte b = peImage.offsetReadByte(bodyOffset);
|
|
|
|
|
uint codeOffset;
|
|
|
|
|
if ((b & 3) == 2) {
|
|
|
|
|
if (b != 2)
|
|
|
|
|
continue; // not zero byte code size
|
|
|
|
|
|
|
|
|
|
dm.mhFlags = 2;
|
|
|
|
|
dm.mhMaxStack = 8;
|
|
|
|
|
dm.mhLocalVarSigTok = 0;
|
|
|
|
|
codeOffset = bodyOffset + 1;
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
if (peImage.offsetReadUInt32(bodyOffset + 4) != 0)
|
|
|
|
|
continue; // not zero byte code size
|
|
|
|
|
|
|
|
|
|
dm.mhFlags = peImage.offsetReadUInt16(bodyOffset);
|
|
|
|
|
dm.mhMaxStack = peImage.offsetReadUInt16(bodyOffset + 2);
|
|
|
|
|
dm.mhLocalVarSigTok = peImage.offsetReadUInt32(bodyOffset + 8);
|
|
|
|
|
codeOffset = bodyOffset + (uint)(dm.mhFlags >> 12) * 4;
|
|
|
|
|
}
|
|
|
|
|
fileDataReader.BaseStream.Position = codeOffset;
|
|
|
|
|
|
2012-02-07 21:55:20 +08:00
|
|
|
|
if (!decrypter.decrypt(fileDataReader, dm))
|
|
|
|
|
continue;
|
2012-02-05 23:17:47 +08:00
|
|
|
|
|
2012-02-25 13:14:19 +08:00
|
|
|
|
dumpedMethods.add(dm);
|
2012-02-05 23:17:47 +08:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return dumpedMethods;
|
|
|
|
|
}
|
|
|
|
|
|
2012-02-07 12:08:02 +08:00
|
|
|
|
// xor eax, eax / inc eax / pop esi edi edx ecx ebx / leave / ret 0Ch or 10h
|
2012-02-05 23:17:47 +08:00
|
|
|
|
static byte[] initializeMethodEnd = new byte[] {
|
2012-02-07 12:08:02 +08:00
|
|
|
|
0x33, 0xC0, 0x40, 0x5E, 0x5F, 0x5A, 0x59, 0x5B, 0xC9, 0xC2,
|
2012-02-05 23:17:47 +08:00
|
|
|
|
};
|
|
|
|
|
byte[] findMethodsData(PeImage peImage, byte[] fileData) {
|
|
|
|
|
var section = peImage.Sections[0];
|
|
|
|
|
|
|
|
|
|
var reader = new BinaryReader(new MemoryStream(fileData));
|
|
|
|
|
|
|
|
|
|
const int RVA_EXECUTIVE_OFFSET = 1 * 4;
|
|
|
|
|
const int ENC_CODE_OFFSET = 6 * 4;
|
2012-02-08 16:29:49 +08:00
|
|
|
|
int lastOffset = (int)(section.pointerToRawData + section.sizeOfRawData);
|
|
|
|
|
for (int offset = getStartOffset(peImage); offset < lastOffset; ) {
|
|
|
|
|
offset = findSig(fileData, offset, lastOffset, initializeMethodEnd);
|
2012-02-05 23:17:47 +08:00
|
|
|
|
if (offset < 0)
|
|
|
|
|
return null;
|
|
|
|
|
offset += initializeMethodEnd.Length;
|
|
|
|
|
|
2012-02-07 12:08:02 +08:00
|
|
|
|
short retImm16 = BitConverter.ToInt16(fileData, offset);
|
|
|
|
|
if (retImm16 != 0x0C && retImm16 != 0x10)
|
|
|
|
|
continue;
|
|
|
|
|
offset += 2;
|
2012-02-12 19:03:55 +08:00
|
|
|
|
if (offset + ENC_CODE_OFFSET + 4 > lastOffset)
|
2012-02-08 16:29:49 +08:00
|
|
|
|
return null;
|
2012-02-07 12:08:02 +08:00
|
|
|
|
|
2012-02-08 22:45:18 +08:00
|
|
|
|
// rva is 0 when the assembly has been embedded
|
2012-02-05 23:17:47 +08:00
|
|
|
|
int rva = BitConverter.ToInt32(fileData, offset + RVA_EXECUTIVE_OFFSET);
|
2012-02-08 22:45:18 +08:00
|
|
|
|
if (rva != 0 && mainType.Rvas.IndexOf(rva) < 0)
|
|
|
|
|
continue;
|
2012-02-05 23:17:47 +08:00
|
|
|
|
|
|
|
|
|
int relOffs = BitConverter.ToInt32(fileData, offset + ENC_CODE_OFFSET);
|
2012-02-08 22:45:18 +08:00
|
|
|
|
if (relOffs <= 0 || relOffs >= section.sizeOfRawData)
|
2012-02-05 23:17:47 +08:00
|
|
|
|
continue;
|
|
|
|
|
reader.BaseStream.Position = section.pointerToRawData + relOffs;
|
|
|
|
|
|
2012-02-07 07:42:32 +08:00
|
|
|
|
int size = DeobUtils.readVariableLengthInt32(reader);
|
2012-02-05 23:17:47 +08:00
|
|
|
|
int endOffset = relOffs + size;
|
|
|
|
|
if (endOffset < relOffs || endOffset > section.sizeOfRawData)
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
|
|
return reader.ReadBytes(size);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return null;
|
|
|
|
|
}
|
|
|
|
|
|
2012-02-08 16:29:49 +08:00
|
|
|
|
int getStartOffset(PeImage peImage) {
|
|
|
|
|
int minOffset = int.MaxValue;
|
2012-02-08 22:40:11 +08:00
|
|
|
|
foreach (var rva in mainType.Rvas) {
|
2012-02-08 16:29:49 +08:00
|
|
|
|
int rvaOffs = (int)peImage.rvaToOffset((uint)rva);
|
|
|
|
|
if (rvaOffs < minOffset)
|
|
|
|
|
minOffset = rvaOffs;
|
|
|
|
|
}
|
|
|
|
|
return minOffset == int.MaxValue ? 0 : minOffset;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static int findSig(byte[] fileData, int offset, int lastOffset, byte[] sig) {
|
|
|
|
|
for (int i = offset; i < lastOffset - sig.Length + 1; i++) {
|
2012-02-05 23:17:47 +08:00
|
|
|
|
if (fileData[i] != sig[0])
|
|
|
|
|
continue;
|
|
|
|
|
if (compare(fileData, i + 1, sig, 1, sig.Length - 1))
|
|
|
|
|
return i;
|
|
|
|
|
}
|
|
|
|
|
return -1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
static bool compare(byte[] a1, int i1, byte[] a2, int i2, int len) {
|
|
|
|
|
for (int i = 0; i < len; i++) {
|
|
|
|
|
if (a1[i1++] != a2[i2++])
|
|
|
|
|
return false;
|
|
|
|
|
}
|
|
|
|
|
return true;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|