#1
|
|||
|
|||
Hooking WMI (.NET Application)
Hello!
I have a .NET application which uses WMI to query the "Win32_Processor" class: http://msdn.microsoft.com/en-us/library/windows/desktop/aa394373(v=vs.85).aspx I want to hook the function call and modify the string returned in "ProcessorId". How would you do that, when working with a .NET application? I would prefer a "high level" general solution (e.g. a Loader) which also works for future versions of the software, instead of modifying the application directly. |
#2
|
|||
|
|||
This is easy. You can do it very easily by using Microsoft Detours and injecting a DLL into the target process.
Code:
#define WIN32_LEAN_AND_MEAN #define _WIN32_DCOM #include <Windows.h> #include <comdef.h> #include <WbemIdl.h> #include "detours.h" typedef HRESULT (__stdcall *PGET) (DWORD junk, LPCWSTR, LONG, VARIANT*, CIMTYPE*, LONG*); PGET OrigGet; BOOL bHooked = FALSE; HRESULT __stdcall NewGet(DWORD junk, LPCWSTR wszName, LONG lFlags, VARIANT *pVal, CIMTYPE *pvtType, LONG *plFlavor) if(!wcscmp(wszName, L"ProcessorId")) //CPUID { pVal->vt = VT_BSTR; V_BSTR(pVal) = L"PUT SPOOFED PROCESSOR ID HERE"; } else return OrigGet(junk, wszName, lFlags, pVal, pvtType, plFlavor); return 1; } BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD dwReason, LPVOID lpReserved) { if (dwReason == DLL_PROCESS_ATTACH && !bHooked) { bHooked = TRUE; OrigGet = (PGET)DetourFunction((LPBYTE)DetourFindFunction("fastprox.dll", "?Get@CWbemObject@@UAGJPBGJPAUtagVARIANT@@PAJ2@Z"), (LPBYTE)NewGet); } return TRUE; } |
#3
|
|||
|
|||
Thanks for your answer!
But: I'm new to Detours, and I'm having trouble to get your DLL to work... The current version of Detours deos not support "DetourFunction", I had to change the DLLMain function: Code:
BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD dwReason, LPVOID lpReserved) { if (dwReason == DLL_PROCESS_ATTACH && !bHooked) { bHooked = TRUE; OrigGet = (PGET)DetourFindFunction("fastprox.dll", "?Get@CWbemObject@@UAGJPBGJPAUtagVARIANT@@PAJ2@Z"); DetourAttach(&(PVOID&)OrigGet, (LPBYTE)NewGet); } return TRUE; } Also I wonder how to inject this DLL into the .NET process... Could this be done using "DetourCreateProcessWithDllEx"? |
#4
|
|||
|
|||
Please see attached for my copy of detours.h and detours.lib
You can write a simple loader that could start up the app with CreateProcess(), using information from the lpProcessInformation param to get the process' handle. Note: you may need to enable SeDebugPrivilege first before doing any of this. Code borrowed from online. Code:
BOOL EnableDebugPrivilege() { HANDLE hToken; LUID sedebugnameValue; TOKEN_PRIVILEGES tp; if ( !OpenProcessToken( GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES | // to adjust privileges TOKEN_QUERY, // to get old privileges setting &hToken ) ) // // OpenProcessToken() failed // return FALSE; // // Given a privilege's name SeDebugPrivilege, we should locate its local LUID mapping. // if ( !LookupPrivilegeValue( NULL, SE_DEBUG_NAME, &sedebugnameValue ) ) { // // LookupPrivilegeValue() failed // CloseHandle( hToken ); return FALSE; } tp.PrivilegeCount = 1; tp.Privileges[0].Luid = sedebugnameValue; tp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED; if ( !AdjustTokenPrivileges( hToken, FALSE, &tp, sizeof(tp), NULL, NULL ) ) { // // AdjustTokenPrivileges() failed // CloseHandle( hToken ); return FALSE; } CloseHandle( hToken ); return TRUE; } Code:
BOOL bInjectLibrary(HANDLE hProcess, char* szDllToInjectPath) { LPVOID lpRemoteAddress = VirtualAllocEx(hProcess, NULL, strlen(szDllToInjectPath), MEM_COMMIT, PAGE_READWRITE); if(!lpRemoteAddress) return FALSE; if(!WriteProcessMemory(hProcess, lpRemoteAddress, (LPVOID)szDllToInjectPath, strlen(szDllToInjectPath), NULL)) return FALSE; HANDLE hThread = NULL; if(!(hThread = CreateRemoteThread(hProcess, NULL, NULL, (LPTHREAD_START_ROUTINE)GetProcAddress(GetModuleHandle("KERNEL32.DLL"), "LoadLibraryA"), lpRemoteAddress, NULL, NULL))) return FALSE; WaitForSingleObject(hThread, INFINITE); if(!VirtualFreeEx(hProcess, lpRemoteAddress, 0, MEM_RELEASE)) return FALSE; CloseHandle(hThread); return TRUE; } |
The Following User Gave Reputation+1 to Ember For This Useful Post: | ||
aldente (08-04-2012) |
#5
|
|||
|
|||
Ok, thanks for your version of the Detours library, with that one I could build the DLL.
However, injection/hooking does not work properly, yet. This is basically what my loader looks like: Code:
// Get debug privilege EnableDebugPrivilege(); // Create process result = CreateProcess(NULL, &ExePathAndCmdLineVec[0], NULL, NULL, FALSE, CREATE_SUSPENDED, NULL, &WorkingDirVec[0], &si, &pi); if(!result) { return -1; } // Inject DLL bInjectLibrary(pi.hThread, DllPath.c_str()); // Resume process execution ResumeThread(pi.hThread); Are you sure this kind of injection works for .NET applications? I attached a sample executable... It is not the target, but it works just like the target. I couldn't manage to manipulate the "ProcessorId"-Entry using your DLL... |
#6
|
|||
|
|||
Code:
bInjectLibrary(pi.hThread, DllPath.c_str()); // Resume process execution ResumeThread(pi.hThread); Code:
bInjectLibrary(pi.hProcess, DllPath.c_str()); // Resume process execution ResumeThread(pi.hProcess); //Close thread handle CloseHandle(pi.hThread); //Close process handle CloseHandle(pi.hProcess); |
#7
|
|||
|
|||
ResumeThread() has to be called with pi.hThread, that was right. The process will stay suspended, if you call it with pi.hProcess.
But apart from that, I tried your suggestions. I also tried to start the process non-suspended, which doesn't work either... This injection stuff is a debugging nightmare, you can't debug it in the development environment, and debugging in IDA doesn't work neither because of all this .NET stuff... :-( Don't you have somer loader, which is known working for .NET applications? |
#8
|
|||
|
|||
Sorry yes that was a typo. Are you on a x64 system? If the .NET metadata in your target executable is not marked as 32bit required then it will spawn as a 64bit process. This will result in failure. You will need to compile the DLL as a 64bit DLL to inject.
I have successfully got the DLL working in your test app, spoofing processor ID with my hook + this loader: http://code.google.com/p/injector/ Command line: newloaderv4.1.exe --lib "E:\Downloads\WmiSpoof.dll" --launch Test.exe http://i.imgur.com/2rqsj.png |
#9
|
|||
|
|||
Yes, I am on a x64 system...
I just tried the loader you mentioned in a virtual machine (x86), but without any success either... Code:
newloaderv4.1.exe --lib WmiSpoof_x86_StaticRuntime.dll --launch Test.exe When I close Test.exe, the loader outputs: Code:
Error: [@InjectLibraryW] Unknown Error (LoadLibraryW). Error: [@SuspendResumeProcess] NtResumeProcess. [NtStatus: 0xC000010A] [LastErro r: 6] Error: [@InjectLibraryW] Could not resume process. Error: [@commandline_parser] Injection failed. I built it Non-Unicode with static runtime ('release' mode) with MSVC 2010. I tried other options as well, neither worked (dynamic runtime, Unicode). Does my attached DLL work for you? (Thanks for your patience, by the way!) |
#10
|
|||
|
|||
Yes, it works when I run the injector from administrative cmd line and modify the exe to have 32bit required in the .NET metadata header.
|
#11
|
|||
|
|||
So why doesn't it work for me?
I tried to run it on Windows XP x86, as the Administrator user... No luck! What's your version of the .NET Framework? Maybe that's the difference... |
#12
|
|||
|
|||
You are hooking a non-framework native module. I do not know what to tell you if it does not work on XP (unless you are lacking runtimes for VS2010 or something, even though it does not import it). I am on Windows 7 Ultimate x64 SP1 with all updates and it works fine, and it worked when I was on XP SP3 as well.
When I compile modules like that I link against the latest WDK libs and headers to cut down on size and importing anything from the new runtimes. It will link against msvcrt.dll instead. Perhaps you can PM me and tell me what you want to spoof your processor ID to and I can compile one in my environment and you can try it. |
#13
|
|||
|
|||
I tested the exact same binaries on a third machine, and these are the results:
Win7 SP1 x64: Does not work WinXP SP3 x86: Does not work Win7 SP1 x86: Works Strange, but now I have at least one working system. I'll do some testing to find out why it doesn't work on the other ones. Thanks for all your help! |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
API Hooking | thomasantony | General Discussion | 5 | 04-22-2005 11:44 |
API-hooking | MaRKuS-DJM | General Discussion | 11 | 03-25-2005 13:27 |
C++ Help (Hooking a function) | Peter[Pan] | General Discussion | 8 | 08-31-2004 20:37 |