[Shellcode x64] Find and execute WinAPI functions with Assembly
by Loki - Saturday July 27, 2024 at 05:47 PM
#1
What you will learn
  • WinAPI function manual location with Assembly
  • PEB Structure and PEB_LDR_DATA
  • PE File Structure
  • Relative Virtual Address calculation
  • Export Address Table (EAT)
  • Windows x64 calling-convention in practice
  • Writing in Assembly like a real Giga-Chad...
Hidden Content
You must register or login to view this content.

Omnicer
Reply
#2
Chad contribution for chad leecher.
Reply
#3
(Jul 27, 2024, 05:47 PM)Lokie Wrote:
What you will learn
  • WinAPI function manual location with Assembly
  • PEB Structure and PEB_LDR_DATA
  • PE File Structure
  • Relative Virtual Address calculation
  • Export Address Table (EAT)
  • Windows x64 calling-convention in practice
  • Writing in Assembly like a real Giga-Chad...

Omnicer


There is a new process injection method that leverages recent Windows APIs like:

GetThreadDescription/SetThreadDescription
and
ZwQueueApcThreadEx2

These API functions which were introduced in Windows 10. This approach benefits from the following:
  1. Less Detection: By using APIs that are less commonly associated with process injection, such as
    SetThreadDescription
    , the method evades detection by many antivirus (AV) and endpoint detection and response (EDR) systems.
  2. Bypassing Access Controls: It performs remote memory allocation and writing using a handle that lacks
    PROCESS_VM_WRITE
    access, which makes it harder for traditional security measures to detect unauthorized memory manipulation.

Overall, this technique is more stealthy and less likely to be flagged by security solutions compared to older, more established injection methods.

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Ransomware sales/discussion/recruiting | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#4
(Jul 27, 2024, 06:31 PM)xzin0vich Wrote: Chad contribution for chad leecher.

What?

(Jul 27, 2024, 06:57 PM)thoth Wrote:
(Jul 27, 2024, 05:47 PM)Lokie Wrote:
What you will learn
  • WinAPI function manual location with Assembly
  • PEB Structure and PEB_LDR_DATA
  • PE File Structure
  • Relative Virtual Address calculation
  • Export Address Table (EAT)
  • Windows x64 calling-convention in practice
  • Writing in Assembly like a real Giga-Chad...

Omnicer


There is a new process injection method that leverages recent Windows APIs like:

GetThreadDescription/SetThreadDescription
and
ZwQueueApcThreadEx2

These API functions which were introduced in Windows 10. This approach benefits from the following:
  1. Less Detection: By using APIs that are less commonly associated with process injection, such as
    SetThreadDescription
    , the method evades detection by many antivirus (AV) and endpoint detection and response (EDR) systems.
  2. Bypassing Access Controls: It performs remote memory allocation and writing using a handle that lacks
    PROCESS_VM_WRITE
    access, which makes it harder for traditional security measures to detect unauthorized memory manipulation.

Overall, this technique is more stealthy and less likely to be flagged by security solutions compared to older, more established injection methods.

While "ZwQueueApcThreadEx2" can be used for executing code via APCs, "GetThreadDescription" and "SetThreadDescription" are not related to code execution or function resolution.

EDIT: I stand corrected by @Cas and you, https://github.com/hasherezade/thread_namecalling
Reply
#5
Lokie causally cooking
Reply
#6
nice, good read

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#7
(Jul 27, 2024, 05:47 PM)Loki Wrote:
What you will learn
  • WinAPI function manual location with Assembly
  • PEB Structure and PEB_LDR_DATA
  • PE File Structure
  • Relative Virtual Address calculation
  • Export Address Table (EAT)
  • Windows x64 calling-convention in practice
  • Writing in Assembly like a real Giga-Chad...

Omnicer

ok bro,let s check it

This forum account is currently banned. Ban Length: Permanent (N/A Remaining)
Ban Reason: Leeching | http://c66go4clkqodr7tdjfu76jztjs7w7d3fajdeypxn73v4ju3dt7g5yyyd.onion/Forum-Ban-Appeals if you feel this is incorrect.
Reply
#8
thanks for you share, and i reading it
Reply
#9
thx for sharing ur info Cool Cool Cool
Reply
#10
Thank you so much bro!
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [ LIST ] 5 FREE STEALERS WITH PROS/CONS elix 381 14,512 3 hours ago
Last Post: GWNiemand1212
  Sektor7 - Malware Development Advanced - Vol.1 Sh4d0w1X 422 41,905 6 hours ago
Last Post: 7one
  [Go] Using the recycle bin for stealthy persistence (Beginner tutorial) CreateThread 16 869 7 hours ago
Last Post: sureno
  Xordium stealer for Pulsar v2.4.5 nullvex 24 904 Today, 01:12 AM
Last Post: CuantoxReal
  [Sektor7] Full Recent Course Spearr 29 570 Today, 01:08 AM
Last Post: CuantoxReal

Forum Jump:


 Users browsing this forum: 1 Guest(s)