evn
January 7th, 2004, 09:17
PEiD tells me that the target is (definately) "tElock 0.98b1 -> tE!", and as such i have, for a while now, been trying to unpack it.
From what i've seen, it doesn't look like it is telock at all, and is a pain-in-the-ass to dump, and just as difficult to debug.
Before the unpacking code goes into play, the assembly looks like this:
With scattered code throughout.
And once the unpacking is complete, it is completly replaced with working code and all strings and references are complete.
The entrypoint is: 11BD6
It has anti-debug, anti breakpoint and crc checking, which makes a lot of it a pain. When loading it in ollydbg, 2 'unpassable' commands are executed, which can be stepped into with the 'step into' command. The application then loads fine.
Dumping the file with ollydump (latest version has IAT rebuilding, not sure if it works with telock) leaves me with a corrupt PE file, which cannot be repaired with anything. Im assuming that i have the OEP completely wrong, as without breakpoints i can't easily find it.
The checks for the CRC and Softice are executed after (non-original application) code has been unpacked, so patching is a huge problem here. Any patch that is applied is overwritten by the code itself, and any changes to the unpacking code cause problems with the entire application.
At the end of the (unpacked) application are hundreds of DB 00 lines, which i've searched for in an attempt to discover if the file is legitimately telock, which hit no results.
The question(s) i have are short, and the above information may help in answering them.
1) Does the file <look> like it is telock? I haven't had any experience with anything from 0.98+ and can't find any documentation which conclusively proves if it is or is not.
2) Is there a way to mask the exe protector used? ie. Make scanners detect asprotect as upx, or otherwise?
3) Are there any tools that detect anti-softice tricks that work with windows 2000? I checked and the only results were old tools for 9x systems.
4) Any suggestions as to how i would unpack telock 0.98b1 and rebuild the IAT? I read here that telock scrambles parts and they need to be repaired, but as of yet no tool has worked and that may be the reason my dumps are incomplete.
5) Are there any tools that can find the OEP of a packed executable (telock) without using softice? I can't skip the softice protection at this time so i can't use tools that require it.
Thanks in advance.
From what i've seen, it doesn't look like it is telock at all, and is a pain-in-the-ass to dump, and just as difficult to debug.
Before the unpacking code goes into play, the assembly looks like this:
Code:
00401000 06 DB 06
00401001 15 DB 15
00401002 43 DB 43 ; CHAR 'C'
00401003 33 DB 33 ; CHAR '3'
00401004 56 DB 56 ; CHAR 'V'
00401005 B9 DB B9
00401006 05 DB 05
00401007 05 DB 05
00401008 BC DB BC
00401009 F3 DB F3
0040100A 53 DB 53 ; CHAR 'S'
With scattered code throughout.
And once the unpacking is complete, it is completly replaced with working code and all strings and references are complete.
The entrypoint is: 11BD6
It has anti-debug, anti breakpoint and crc checking, which makes a lot of it a pain. When loading it in ollydbg, 2 'unpassable' commands are executed, which can be stepped into with the 'step into' command. The application then loads fine.
Dumping the file with ollydump (latest version has IAT rebuilding, not sure if it works with telock) leaves me with a corrupt PE file, which cannot be repaired with anything. Im assuming that i have the OEP completely wrong, as without breakpoints i can't easily find it.
The checks for the CRC and Softice are executed after (non-original application) code has been unpacked, so patching is a huge problem here. Any patch that is applied is overwritten by the code itself, and any changes to the unpacking code cause problems with the entire application.
At the end of the (unpacked) application are hundreds of DB 00 lines, which i've searched for in an attempt to discover if the file is legitimately telock, which hit no results.
The question(s) i have are short, and the above information may help in answering them.
1) Does the file <look> like it is telock? I haven't had any experience with anything from 0.98+ and can't find any documentation which conclusively proves if it is or is not.
2) Is there a way to mask the exe protector used? ie. Make scanners detect asprotect as upx, or otherwise?
3) Are there any tools that detect anti-softice tricks that work with windows 2000? I checked and the only results were old tools for 9x systems.
4) Any suggestions as to how i would unpack telock 0.98b1 and rebuild the IAT? I read here that telock scrambles parts and they need to be repaired, but as of yet no tool has worked and that may be the reason my dumps are incomplete.
5) Are there any tools that can find the OEP of a packed executable (telock) without using softice? I can't skip the softice protection at this time so i can't use tools that require it.
Thanks in advance.