Zero2Auto Bi-weekly challenge 5
Last updated
Last updated
The below are my notes for looking at Private Loader's string decryption. I'll update this post with the network analysis whenever I have time.
We get the sample from malware bazar and start using Floss:
First we make sure we have the same IDA Python and cmd versions:
OA Labs showed a trick on their channel to compare ida python and cmd.exe python using:
In cmd.exe
We then install floss
Then run:
We apply the strings to IDA by pressing Shift+F2 ; selecting Python and pasting the script in there and get the below:
This is quick and dirty, the annoying bit is that we don't get the string close to the XOR instruction offsets. It can make it confusing to understand which xor string is which.
WinMain has a couple of XORs to resolve libs
We can decrypt these with cyber-chef or just run the code and set a breakpoint right before the call to LoadLibrary and expect the value in the register or on the stack.
We get: kernel32.dll; WinHTTP.dll; wininet.dll
Further down we see what looks like dynamic imports; We can use this great blog-post from ired.team to understand what is what in this structure:
As well as https://www.geoffchappell.com/studies/windows/km/ntoskrnl/inc/api/ntpsapi_x/peb_ldr_data.htm
As a rule of thumb; when you see the offsets 0x7c and 0x78 after fs:30; It's probably dynamic importing (especially if inside a for loop); Below is the graph with commented structures
I then used a script to fix dynamic imports that I shamelessly stole/borrowed from hexorcist ; awesome and underrated youtube channel, can't recommend it enough.
After running the script, the above gets annotated and arguments resolved.
Below is Hexorcist's script with our dll's (found through XORs)
Again, we can also manually debug this and find the resolved import at ebp-0xd4 (here it's kernel32_SetPriorityClass)
And we then see a thread called which start at the offset labeled StartAdress below. More on that in the network section.
I wrote a script to decrypt some of the xors automatically and insert comments on the pxor addresses as Floss would add the string at the subroutine start as shown above. It sort of works but the first letter gets removed sometimes (not sure why). And sometimes it outputs junk as the encrypted string and key don't match. We can fix the missing strings manually by using the Floss strings output or manual debugging (although most of the missing strings are not needed to understand how privateloader works).
That's it! I'll cover the protocol in a future update!
Now that we have our imports resolved and strings decrypted, we pretty quickly identify what looks like our Networking function.
The below graph shows a switch-case structure where we compare the value of ecx and move a specific byte at whatever eax points to.