gbrooks3
June 29th, 2005, 15:35
Think i have followed JMI's rules  
 
Have given it a good try but just a bit stuck, searched the forum. What i have done:
First set up olly, in options i set system breakpoint at make first pause.
Patched olly with the AntiDetectOlly.exe to stop execryptor detecting it.
Using LordPE i discover that the direction of callback is the 6A30FC, in principle the program began to execute itself in this direction.
Then i opened up Memory window and put breakpoint on Access on the section that it includes to this direction, in this case the section is j8d54r9. and give RUN (F9)
i break here:
7C9284FF 8B70 0C MOV ESI,DWORD PTR DS:[EAX+C] ; target.006A30FC
7C928502 8975 E0 MOV DWORD PTR SS:[EBP-20],ESI
7C928505 3BF3 CMP ESI,EBX
7C928507 74 16 JE SHORT ntdll.7C92851F
7C928509 381D 21C1977C CMP BYTE PTR DS:[7C97C121],BL
7C92850F 0F85 2F2F0100 JNZ ntdll.7C93B444
7C928515 8B06 MOV EAX,DWORD PTR DS:[ESI]
7C928517 3BC3 CMP EAX,EBX
7C928519 0F85 3A2F0100 JNZ ntdll.7C93B459
7C92851F 834D FC FF OR DWORD PTR SS:[EBP-4],FFFFFFFF
7C928523 E8 DA68FEFF CALL ntdll.7C90EE02
7C928528 C2 0800 RETN 8
7C92852B 90 NOP
7C92852C 90 NOP
7C92852D 90 NOP
7C92852E 90 NOP
7C92852F 90 NOP
7C928530 FFFF ??? ; Unknown command
7C928532 FFFF ??? ; Unknown command
7C928534 90 NOP
7C928535 B4 93 MOV AH,93
7C928537 ^7C AB JL SHORT ntdll.7C9284E4
7C928539 B4 93 MOV AH,93
Now, i believe that i need to keep running until i enter some code part, CODE32
So i contine but never land anywhere useful like a call, i F9 and land here:
008DDFFC ^E9 1AFCFFFF JMP target.008DDC1B
008DE001 0087 04245887 ADD BYTE PTR DS:[EDI+87582404],AL
008DE007 34 24 XOR AL,24
008DE009 6F OUTS DX,DWORD PTR ES:[EDI] ; I/O command
008DE00A EC IN AL,DX ; I/O command
008DE00B 53 PUSH EBX
008DE00C 68 707F2A29 PUSH 292A7F70
008DE011 E9 B60B0000 JMP target.008DEBCC
008DE016 0000 ADD BYTE PTR DS:[EAX],AL
008DE018 68 A3C78D00 PUSH target.008DC7A3
008DE01D ^E9 CFDCFFFF JMP target.008DBCF1
008DE022 C3 RETN
008DE023 E9 55060000 JMP target.008DE67D
008DE028 0000 ADD BYTE PTR DS:[EAX],AL
008DE02A 8BCC MOV ECX,ESP
008DE02C 81C1 10000000 ADD ECX,10
008DE032 8B09 MOV ECX,DWORD PTR DS:[ECX]
008DE034 C701 13000100 MOV DWORD PTR DS:[ECX],10013
008DE03A ^E9 DEC3FFFF JMP target.008DA41D
008DE03F 0000 ADD BYTE PTR DS:[EAX],AL
008DE041 8BCC MOV ECX,ESP
008DE043 52 PUSH EDX
008DE044 68 D303C0E5 PUSH E5C003D3
008DE049 5A POP EDX
008DE04A ^E9 ADE9FFFF JMP target.008DC9FC
but i can never get to the OEP, i am just going round in circles, hope someone can give me a helping hand.
Thanks
p.s.
You might want to move it to newbie section, i bet everyone here can unpack execryptor in the blink of an eye
 
 Have given it a good try but just a bit stuck, searched the forum. What i have done:
First set up olly, in options i set system breakpoint at make first pause.
Patched olly with the AntiDetectOlly.exe to stop execryptor detecting it.
Using LordPE i discover that the direction of callback is the 6A30FC, in principle the program began to execute itself in this direction.
Then i opened up Memory window and put breakpoint on Access on the section that it includes to this direction, in this case the section is j8d54r9. and give RUN (F9)
i break here:
7C9284FF 8B70 0C MOV ESI,DWORD PTR DS:[EAX+C] ; target.006A30FC
7C928502 8975 E0 MOV DWORD PTR SS:[EBP-20],ESI
7C928505 3BF3 CMP ESI,EBX
7C928507 74 16 JE SHORT ntdll.7C92851F
7C928509 381D 21C1977C CMP BYTE PTR DS:[7C97C121],BL
7C92850F 0F85 2F2F0100 JNZ ntdll.7C93B444
7C928515 8B06 MOV EAX,DWORD PTR DS:[ESI]
7C928517 3BC3 CMP EAX,EBX
7C928519 0F85 3A2F0100 JNZ ntdll.7C93B459
7C92851F 834D FC FF OR DWORD PTR SS:[EBP-4],FFFFFFFF
7C928523 E8 DA68FEFF CALL ntdll.7C90EE02
7C928528 C2 0800 RETN 8
7C92852B 90 NOP
7C92852C 90 NOP
7C92852D 90 NOP
7C92852E 90 NOP
7C92852F 90 NOP
7C928530 FFFF ??? ; Unknown command
7C928532 FFFF ??? ; Unknown command
7C928534 90 NOP
7C928535 B4 93 MOV AH,93
7C928537 ^7C AB JL SHORT ntdll.7C9284E4
7C928539 B4 93 MOV AH,93
Now, i believe that i need to keep running until i enter some code part, CODE32
So i contine but never land anywhere useful like a call, i F9 and land here:
008DDFFC ^E9 1AFCFFFF JMP target.008DDC1B
008DE001 0087 04245887 ADD BYTE PTR DS:[EDI+87582404],AL
008DE007 34 24 XOR AL,24
008DE009 6F OUTS DX,DWORD PTR ES:[EDI] ; I/O command
008DE00A EC IN AL,DX ; I/O command
008DE00B 53 PUSH EBX
008DE00C 68 707F2A29 PUSH 292A7F70
008DE011 E9 B60B0000 JMP target.008DEBCC
008DE016 0000 ADD BYTE PTR DS:[EAX],AL
008DE018 68 A3C78D00 PUSH target.008DC7A3
008DE01D ^E9 CFDCFFFF JMP target.008DBCF1
008DE022 C3 RETN
008DE023 E9 55060000 JMP target.008DE67D
008DE028 0000 ADD BYTE PTR DS:[EAX],AL
008DE02A 8BCC MOV ECX,ESP
008DE02C 81C1 10000000 ADD ECX,10
008DE032 8B09 MOV ECX,DWORD PTR DS:[ECX]
008DE034 C701 13000100 MOV DWORD PTR DS:[ECX],10013
008DE03A ^E9 DEC3FFFF JMP target.008DA41D
008DE03F 0000 ADD BYTE PTR DS:[EAX],AL
008DE041 8BCC MOV ECX,ESP
008DE043 52 PUSH EDX
008DE044 68 D303C0E5 PUSH E5C003D3
008DE049 5A POP EDX
008DE04A ^E9 ADE9FFFF JMP target.008DC9FC
but i can never get to the OEP, i am just going round in circles, hope someone can give me a helping hand.
Thanks
p.s.
You might want to move it to newbie section, i bet everyone here can unpack execryptor in the blink of an eye


 The Rules are the Forums and not "mine."  And if you were the one who change the name of your target to "target" in you code section, then you did very well for a first post.  If you were not the one who wrote "target" in red, than another admin corrected that point, which is explained in the "Rules."
  The Rules are the Forums and not "mine."  And if you were the one who change the name of your target to "target" in you code section, then you did very well for a first post.  If you were not the one who wrote "target" in red, than another admin corrected that point, which is explained in the "Rules."  