80 likes | 194 Vues
This overview explores the DLL injection techniques utilized in malicious Internet Explorer processes, focusing on the use of kernel32.dll's LoadLibrary function. It discusses the steps involved in injecting a DLL into a process, including acquiring process handles with OpenProcess, allocating memory within the target process using VirtualAllocEx, and writing data to the process's memory with WriteProcessMem. The process culminates in the execution of the injected code via CreateRemoteThread. This information aims to raise awareness of security vulnerabilities in applications.
E N D
kernel32.dll LoadLibrary(filename) LoadLibrary(filename) myInjectDll() { } malicious process Internet Explorer process
kernel32.dll LoadLibrary(filename) LoadLibrary(filename) myInjectDll() { h=OpenProcess(,,proc_id) } malicious process Internet Explorer process
kernel32.dll LoadLibrary(filename) LoadLibrary(filename) myInjectDll() { h=OpenProcess(,,proc_id) addr = VirtualAllocEx(h,, size,,,) } malicious process Internet Explorer process
kernel32.dll LoadLibrary(filename) LoadLibrary(filename) 0x4000 myInjectDll() { h=OpenProcess(,,proc_id) addr = VirtualAllocEx(h,, size,,,) } malicious process Internet Explorer process
kernel32.dll LoadLibrary(filename) LoadLibrary(filename) 0x4000 myInjectDll() { h=OpenProcess(,,proc_id) addr = VirtualAllocEx(h,, size,,,) WriteProcessMem(h,addr,buf,size,…) } malicious process Internet Explorer process
kernel32.dll LoadLibrary(filename) LoadLibrary(filename) 0x4000 myInjectDll() { h=OpenProcess(,,proc_id) addr = VirtualAllocEx(h,, size,,,) WriteProcessMem(h,addr,buf,size,…) } “evil.dll” malicious process Internet Explorer process
kernel32.dll LoadLibrary(filename) LoadLibrary(filename) 0x4000 myInjectDll() { h=OpenProcess(,,proc_id) addr = VirtualAllocEx(h,, size,,,) WriteProcessMem(h,addr,buf,size,…) CreateRemoteThread(h,,,start,param,…) } “evil.dll” malicious process Internet Explorer process
kernel32.dll LoadLibrary(filename) LoadLibrary(filename) 0x4000 myInjectDll() { h=OpenProcess(,,proc_id) addr = VirtualAllocEx(h,, size,,,) WriteProcessMem(h,addr,buf,size,…) CreateRemoteThread(h,,,start,param,…) } “evil.dll” LoadLibrary(“evil.dll”) malicious process Internet Explorer process