gbrooks3
June 29th, 2005, 15:35
Think i have followed JMI's rules
Have given it a good try but just a bit stuck, searched the forum. What i have done:
First set up olly, in options i set system breakpoint at make first pause.
Patched olly with the AntiDetectOlly.exe to stop execryptor detecting it.
Using LordPE i discover that the direction of callback is the 6A30FC, in principle the program began to execute itself in this direction.
Then i opened up Memory window and put breakpoint on Access on the section that it includes to this direction, in this case the section is j8d54r9. and give RUN (F9)
i break here:
7C9284FF 8B70 0C MOV ESI,DWORD PTR DS:[EAX+C] ; target.006A30FC
7C928502 8975 E0 MOV DWORD PTR SS:[EBP-20],ESI
7C928505 3BF3 CMP ESI,EBX
7C928507 74 16 JE SHORT ntdll.7C92851F
7C928509 381D 21C1977C CMP BYTE PTR DS:[7C97C121],BL
7C92850F 0F85 2F2F0100 JNZ ntdll.7C93B444
7C928515 8B06 MOV EAX,DWORD PTR DS:[ESI]
7C928517 3BC3 CMP EAX,EBX
7C928519 0F85 3A2F0100 JNZ ntdll.7C93B459
7C92851F 834D FC FF OR DWORD PTR SS:[EBP-4],FFFFFFFF
7C928523 E8 DA68FEFF CALL ntdll.7C90EE02
7C928528 C2 0800 RETN 8
7C92852B 90 NOP
7C92852C 90 NOP
7C92852D 90 NOP
7C92852E 90 NOP
7C92852F 90 NOP
7C928530 FFFF ??? ; Unknown command
7C928532 FFFF ??? ; Unknown command
7C928534 90 NOP
7C928535 B4 93 MOV AH,93
7C928537 ^7C AB JL SHORT ntdll.7C9284E4
7C928539 B4 93 MOV AH,93
Now, i believe that i need to keep running until i enter some code part, CODE32
So i contine but never land anywhere useful like a call, i F9 and land here:
008DDFFC ^E9 1AFCFFFF JMP target.008DDC1B
008DE001 0087 04245887 ADD BYTE PTR DS:[EDI+87582404],AL
008DE007 34 24 XOR AL,24
008DE009 6F OUTS DX,DWORD PTR ES:[EDI] ; I/O command
008DE00A EC IN AL,DX ; I/O command
008DE00B 53 PUSH EBX
008DE00C 68 707F2A29 PUSH 292A7F70
008DE011 E9 B60B0000 JMP target.008DEBCC
008DE016 0000 ADD BYTE PTR DS:[EAX],AL
008DE018 68 A3C78D00 PUSH target.008DC7A3
008DE01D ^E9 CFDCFFFF JMP target.008DBCF1
008DE022 C3 RETN
008DE023 E9 55060000 JMP target.008DE67D
008DE028 0000 ADD BYTE PTR DS:[EAX],AL
008DE02A 8BCC MOV ECX,ESP
008DE02C 81C1 10000000 ADD ECX,10
008DE032 8B09 MOV ECX,DWORD PTR DS:[ECX]
008DE034 C701 13000100 MOV DWORD PTR DS:[ECX],10013
008DE03A ^E9 DEC3FFFF JMP target.008DA41D
008DE03F 0000 ADD BYTE PTR DS:[EAX],AL
008DE041 8BCC MOV ECX,ESP
008DE043 52 PUSH EDX
008DE044 68 D303C0E5 PUSH E5C003D3
008DE049 5A POP EDX
008DE04A ^E9 ADE9FFFF JMP target.008DC9FC
but i can never get to the OEP, i am just going round in circles, hope someone can give me a helping hand.
Thanks
p.s.
You might want to move it to newbie section, i bet everyone here can unpack execryptor in the blink of an eye

Have given it a good try but just a bit stuck, searched the forum. What i have done:
First set up olly, in options i set system breakpoint at make first pause.
Patched olly with the AntiDetectOlly.exe to stop execryptor detecting it.
Using LordPE i discover that the direction of callback is the 6A30FC, in principle the program began to execute itself in this direction.
Then i opened up Memory window and put breakpoint on Access on the section that it includes to this direction, in this case the section is j8d54r9. and give RUN (F9)
i break here:
7C9284FF 8B70 0C MOV ESI,DWORD PTR DS:[EAX+C] ; target.006A30FC
7C928502 8975 E0 MOV DWORD PTR SS:[EBP-20],ESI
7C928505 3BF3 CMP ESI,EBX
7C928507 74 16 JE SHORT ntdll.7C92851F
7C928509 381D 21C1977C CMP BYTE PTR DS:[7C97C121],BL
7C92850F 0F85 2F2F0100 JNZ ntdll.7C93B444
7C928515 8B06 MOV EAX,DWORD PTR DS:[ESI]
7C928517 3BC3 CMP EAX,EBX
7C928519 0F85 3A2F0100 JNZ ntdll.7C93B459
7C92851F 834D FC FF OR DWORD PTR SS:[EBP-4],FFFFFFFF
7C928523 E8 DA68FEFF CALL ntdll.7C90EE02
7C928528 C2 0800 RETN 8
7C92852B 90 NOP
7C92852C 90 NOP
7C92852D 90 NOP
7C92852E 90 NOP
7C92852F 90 NOP
7C928530 FFFF ??? ; Unknown command
7C928532 FFFF ??? ; Unknown command
7C928534 90 NOP
7C928535 B4 93 MOV AH,93
7C928537 ^7C AB JL SHORT ntdll.7C9284E4
7C928539 B4 93 MOV AH,93
Now, i believe that i need to keep running until i enter some code part, CODE32
So i contine but never land anywhere useful like a call, i F9 and land here:
008DDFFC ^E9 1AFCFFFF JMP target.008DDC1B
008DE001 0087 04245887 ADD BYTE PTR DS:[EDI+87582404],AL
008DE007 34 24 XOR AL,24
008DE009 6F OUTS DX,DWORD PTR ES:[EDI] ; I/O command
008DE00A EC IN AL,DX ; I/O command
008DE00B 53 PUSH EBX
008DE00C 68 707F2A29 PUSH 292A7F70
008DE011 E9 B60B0000 JMP target.008DEBCC
008DE016 0000 ADD BYTE PTR DS:[EAX],AL
008DE018 68 A3C78D00 PUSH target.008DC7A3
008DE01D ^E9 CFDCFFFF JMP target.008DBCF1
008DE022 C3 RETN
008DE023 E9 55060000 JMP target.008DE67D
008DE028 0000 ADD BYTE PTR DS:[EAX],AL
008DE02A 8BCC MOV ECX,ESP
008DE02C 81C1 10000000 ADD ECX,10
008DE032 8B09 MOV ECX,DWORD PTR DS:[ECX]
008DE034 C701 13000100 MOV DWORD PTR DS:[ECX],10013
008DE03A ^E9 DEC3FFFF JMP target.008DA41D
008DE03F 0000 ADD BYTE PTR DS:[EAX],AL
008DE041 8BCC MOV ECX,ESP
008DE043 52 PUSH EDX
008DE044 68 D303C0E5 PUSH E5C003D3
008DE049 5A POP EDX
008DE04A ^E9 ADE9FFFF JMP target.008DC9FC
but i can never get to the OEP, i am just going round in circles, hope someone can give me a helping hand.
Thanks
p.s.
You might want to move it to newbie section, i bet everyone here can unpack execryptor in the blink of an eye
