简体   繁体   English

从内存C / C ++运行进程

[英]Running a process from memory C/C++

My function: 我的功能:

       /*
--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_
runPE(
dosheader ptr,
ntheader ptr,
sectionheader ptr,
ptr to exebuffer,
DWORD SizeOfImage(Alignment fixed))
_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--_--
*/

int runPE2(IMAGE_DOS_HEADER* pDOS,IMAGE_NT_HEADERS * pNT,IMAGE_SECTION_HEADER * pSection,char* pData,DWORD szImage)
{
    STARTUPINFO si = {0};
    PROCESS_INFORMATION pi;
    CONTEXT ctx;

    if(CreateProcess(NULL,szFileName,NULL, NULL, 0, CREATE_SUSPENDED, NULL, NULL, &si,&pi))
    {
        ctx.ContextFlags = CONTEXT_FULL;
        if(!GetThreadContext(pi.hThread,&ctx))
        {
            MessageBoxA(0,"GetThreadContext Error!","Error",0);
        }
        DWORD dwImagebase = NULL;
        DWORD dwBytesRead = NULL;
        DWORD dwByteswritten = NULL;
        DWORD dwOldProtection = NULL;

        if(!ReadProcessMemory(pi.hProcess,(LPVOID)(ctx.Ebx + 8),&dwImagebase,sizeof(DWORD),&dwBytesRead))
        {
            MessageBoxA(0,"RPM Error!","Error",0);
        }
        VirtualProtect(&pNT->OptionalHeader.ImageBase,sizeof(DWORD),PAGE_READWRITE,&dwOldProtection);
        pNT->OptionalHeader.ImageBase = dwImagebase;
        VirtualProtect(&pNT->OptionalHeader.ImageBase,sizeof(DWORD),dwOldProtection,&dwOldProtection);


        UnmapViewOfSection_ pZwUnmapViewOfSection = (UnmapViewOfSection_)GetProcAddress(GetModuleHandle("ntdll.dll"), "ZwUnmapViewOfSection");

        if(pZwUnmapViewOfSection(pi.hProcess, (LPVOID)dwImagebase) != 0)
        {
            MessageBoxA(0,"Unmaping Error!","Error",0);
        }

        void* newBase = VirtualAllocEx(pi.hProcess, (LPVOID)pNT->OptionalHeader.ImageBase,szImage, MEM_RESERVE | MEM_COMMIT, PAGE_EXECUTE_READWRITE);
        if(!newBase)
        {
            MessageBoxA(0,"Allocting Error!","Error",0);
        }

        if(!WriteProcessMemory(pi.hProcess,(LPVOID)(ctx.Ebx + 8),newBase, sizeof(DWORD), &dwByteswritten))
        {
            MessageBoxA(0,"WPM Imagebase Error!","Error",0);
        }

        if(!WriteProcessMemory(pi.hProcess,newBase,pData,pNT->OptionalHeader.SizeOfHeaders, &dwByteswritten))
        {
            MessageBoxA(0,"WPM SizeOfHeaders Error!","Error",0);
        }

        for(int i = 0; i < pNT->FileHeader.NumberOfSections; i++)
        {
            pSection = (PIMAGE_SECTION_HEADER)((char*)(pData + pDOS->e_lfanew +  sizeof(IMAGE_NT_HEADERS) + sizeof(IMAGE_SECTION_HEADER) * i));
            if(!WriteProcessMemory(pi.hProcess,(char*)(pNT->OptionalHeader.ImageBase + pSection->VirtualAddress),(char*)(pData + pSection->PointerToRawData),pSection->SizeOfRawData, &dwByteswritten))
            {
                MessageBoxA(0,"WPM in LOOP Error!","Error",0);
            }
        }

        ctx.Eax = (DWORD)newBase + pNT->OptionalHeader.AddressOfEntryPoint;        // eax holds new entry point

        if(!SetThreadContext(pi.hThread,&ctx))
        {
            MessageBoxA(0,"SetThreadContext Error!","Error",0);
        }

        if(!ResumeThread(pi.hThread))
        {
            MessageBoxA(0,"ResumeThread Error!","Error",0);
        }

        CloseHandle(pi.hThread);
        CloseHandle(pi.hProcess);

        TerminateProcess(pi.hProcess,0);

        return 1;
    }
    return -1;
}  

The error i get after ResumeThread is "The application was unable to start correctly (0xc0000005) 我在ResumeThread之后得到的错误是“应用程序无法正确启动(0xc0000005)

Thanks for reading Hope someone will help 感谢您阅读,希望有人能帮忙

Information: OS: Win7 compiler VC++ 2010 target application; 信息:操作系统:Win7编译器VC ++ 2010目标应用程序; Simple "Hello World" App; 简单的“ Hello World”应用程序; win32 console Win32控制台

Check the VirtualProtect function. 检查VirtualProtect功能。 Seems that it has been failed. 似乎已失败。 An call the GetLastError(). 调用GetLastError()。 I think that should be value 0x1e7. 我认为应该是值0x1e7。 Check your base address and addresses in the ".text" section. 检查您的基本地址和“ .text”部分中的地址。 I have done this by manual processing of import table. 我是通过手动处理导入表来完成的。 Just a simple PE parser and GetProcAddress function. 只是一个简单的PE解析器和GetProcAddress函数。 After that you need to calculate your process base address and apply relocation stored in ".reloc" section. 之后,您需要计算您的进程基地址并应用存储在“ .reloc”部分中的重定位。

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM