mysters
December 26th, 2005, 04:16
Hello there,
I was trying to unpack a program but i had no idea with what i am dealing...
peid did not detect anything.
can you tell what packer was used?
1. the PE file has overlay data
2. imported function names are hidden and only to be fetched through a sort of name_to_id(), example: MessageBox has an ID of 0x12211221 then to getproc_x MessageBox, a call is made as: getproc_x(0x12211221)
3. no real getproc or loadlibrary are used, instead the PE image is scanned and functions are fetched from there
4. the use of lots of SEH to: a. modify EIP b. clear debug registers
5. sha1 or a modified version of it used
6. probably Rijndael algo is used with 128 bit keys?
7. the decryption of the overlay data is done in parts, ...the decrypted data may be executable code as well
8. ntice , sice , ntfire are being checked
9. ollydbg is detected via findwindow
10. it as a copy_procedure() internally, some APIs are not called directly, instead they are partially copied to a buffer, then partly executed in that buffer and partly in their original location
11. if you attach a userland debugger, the process will terminate directly afterwards
12. no parent / child process are visibile
13. the program runs on win me not just nt systems
14. there is a message: "debugger detected - please disable it and restart the application."
15. the imports are redirected to a code of the form: "mov ax, id1 ; mov dh, id2; jmp loc1"
16. gettickcount and getcursorpos are used to create a sort of a seed / delay in execution detection
17. this shell seem to allow password checking , license key file checking , expiration checks
18. does not run in the presence of a modified/hidden softice
any knows this packer?
I was trying to unpack a program but i had no idea with what i am dealing...
peid did not detect anything.
can you tell what packer was used?
1. the PE file has overlay data
2. imported function names are hidden and only to be fetched through a sort of name_to_id(), example: MessageBox has an ID of 0x12211221 then to getproc_x MessageBox, a call is made as: getproc_x(0x12211221)
3. no real getproc or loadlibrary are used, instead the PE image is scanned and functions are fetched from there
4. the use of lots of SEH to: a. modify EIP b. clear debug registers
5. sha1 or a modified version of it used
6. probably Rijndael algo is used with 128 bit keys?
7. the decryption of the overlay data is done in parts, ...the decrypted data may be executable code as well
8. ntice , sice , ntfire are being checked
9. ollydbg is detected via findwindow
10. it as a copy_procedure() internally, some APIs are not called directly, instead they are partially copied to a buffer, then partly executed in that buffer and partly in their original location
11. if you attach a userland debugger, the process will terminate directly afterwards
12. no parent / child process are visibile
13. the program runs on win me not just nt systems
14. there is a message: "debugger detected - please disable it and restart the application."
15. the imports are redirected to a code of the form: "mov ax, id1 ; mov dh, id2; jmp loc1"
16. gettickcount and getcursorpos are used to create a sort of a seed / delay in execution detection
17. this shell seem to allow password checking , license key file checking , expiration checks
18. does not run in the presence of a modified/hidden softice
any knows this packer?