LoadLibrary
, LdrGetProcAddress
, LdrLoadDll
and GetProcAddress
Ex
is a suffix used when the function is updated by MicrosoftA
and W
appearing at the end is extra information about suffix which doesn’t appear in actual documentation and is just there to tell us that function accepts ASCII string and word respectively.text
section contains instructions code that CPU will execute.rdata
section contains information about imports and exports, storing read only data.data
contains global data accessible from anywhere in the program.idata
stores data about import functions, usually not present.edata
stores data about export functions, usually not present.pdata
present only in 64bit applications storing exception-handling information.rsrc
contains other data such as icons, images, menus and strings.reloc
contains information about relocation of library filesrundll32.exe
which comes with all modern version of windows which has following syntax rundll32.exe DLLname, Export Arguments
. Where Export
value must be a function name or ordinal selected from exported function table in DLL which can be viewed using tools such as PEBear etc. Example syntax for both would be rundll32.exe mal.dll, install
or rundll32.exe mal.dll, #5
where install
is the export function name and #5
is the ordinal number prepended with #
DLLMain
(called from the DLL entry point) and as DLLMain
is executed when DLL is loaded, we can force DLL to load via rundll32.exe
to get information out of itIMAGE_FILE_DLL (0x2000)
flag from the characteristics field in the IMAGE_FILE_HEADER
, thought it might cause malware to crash or terminate but as long as the changes cause malware to execute it’s payload, we are good to go.rundll32.exe mal.dll, InstallService *ServiceName
* and then to start the service net start *ServiceName
*Install
or InstallService
in the DLL, we may need to manually install the DLL as service via either Windows sc
command or modifying the register for unused service and then using net start
on that service. The service entries are located in HKLM\SYSTEM\CurrentControlSet\Services
mm32.exe
creates a file called mw2mmgr.txt
at sequence number 212
using CreateFile
. The word success in result column tells that operation was successful.RegSetValue
, CreateFile
, WriteFile
, or other suspicious or destructive calls.depends.exe
(Dependency Walker) by right clicking a process