|
|
Thread Tools | Display Modes |
#1
|
|||
|
|||
Armadillo 1.xx - 2.xx -> Silicon Realms Toolworks [Overlay] < Unpackable??????
Armadillo 1.xx - 2.xx -> Silicon Realms Toolworks [Overlay]
I have an app i really really like and its protected with the above..ive never manually unpacked an armadilloed app b4 although i have followed a few apps using Ricardo's excellent tutorials on father ,son method but had to stop as last hurdle is to seperate father from son and can only be did with XP..not 2000....so..is the above unpackable..r these OVERLAYS hard? Thanks paul333 |
#2
|
|||
|
|||
Can ANYONE tell me if i learn to unpack that an unpacked file is possible with above arma version or is it just not worth trying as not poss?
Im not naming target as i dont want help at the moment just wanting to know if im flogging a dead horse or not Thanks paul333 Last edited by bunion; 08-25-2004 at 21:55. |
#3
|
|||
|
|||
if its 1.x-2.x then it shouldnt been so hard... but peid is often wrong with the arma version :/.
|
#4
|
|||
|
|||
....if for example you use peid on g3tright 5 (the one of
the ricardo's tutorial) you will get a wrong version. Only a question, i've tried the tutorial too, on win2k and it was impossible for me to break with olly on the kernel32 api with detachs the father form the son? why is it not possible on win2k? cheers z. |
#5
|
|||
|
|||
Quote:
|
#6
|
||||
|
||||
i think this armadillo should be no problem. if there's really no copymem, a BP CreateThread leads you near OEP. step two calls out and look down. there should be a call EDI which leads you into OEP
|
#7
|
|||
|
|||
Getting to the oep is easy but cant find the end and start of IAT!!!!!!1
Any suggestions on how to find it!!!!!!! |
#8
|
|||
|
|||
go to 401000 and then search for FF25 and you have an entry of the iat... and then you can find the begining and the end. Then set a hardware bp on write on the first iat value and let it run until it has the values which it had when you set the bp. You shoudl be in a loop then where you find a jump which makes the iat working for you .
|
#9
|
||||
|
||||
there are different IAT-protection. mostly i saw one type which was easy to fix:
there was a msvcrt._stricmp, and after this a JE. if you change it to JMP, IAT will be auto-fixed. to find this, set a hardware-BP on any IAT-entry and when you are at the command it is written, search up for this stricmp. good luck |
#10
|
|||
|
|||
Thanks everybody this info is much more than i could have hoped for so ill give it a go in ollydebug
Quote:
This new app isnt copymenso mayb have better luck with this one paul333 |
#11
|
|||
|
|||
Quote:
|
#12
|
|||
|
|||
Quote:
|
#13
|
|||
|
|||
Quote:
..can u clarify what u mean "step 2 calls out" ? Ive loaded my app into ollydegub..set it to break "entry point of main module" in options ..did "BP CreateThread" in commandline plugin then F9'd it landed me in kernel.32.dll..ok..does "step 2 calls out" mean 2 returns from there/here ?... sorry for mix up paul333 |
#14
|
|||
|
|||
First a note PEiD Picks up All Delphi I tried Packing (Delphi 7-8) as Arma 1.xx - 2.xx Overlay so look at section names, if it looks like a Delphi you can bet its alot newer Arma version than PEiD thinks, if you need the exact version there's a tutorial on how to get it posted
As for your question paul when you break on Create Thread you may see somethin like this (This is Arma 3.75-Test1 posted by Scratch on a Delphi Using Minumum Protection) 7C81082F > 8BFF MOV EDI,EDI --> Land Here 7C810831 55 PUSH EBP 7C810832 8BEC MOV EBP,ESP 7C810834 FF75 1C PUSH DWORD PTR SS:[EBP+1C] 7C810837 FF75 18 PUSH DWORD PTR SS:[EBP+18] 7C81083A FF75 14 PUSH DWORD PTR SS:[EBP+14] 7C81083D FF75 10 PUSH DWORD PTR SS:[EBP+10] 7C810840 FF75 0C PUSH DWORD PTR SS:[EBP+C] 7C810843 FF75 08 PUSH DWORD PTR SS:[EBP+8] 7C810846 6A FF PUSH -1 7C810848 E8 D9FDFFFF CALL kernel32.CreateRemoteThread 7C81084D 5D POP EBP 7C81084E C2 1800 RETN 18 --> F8 To Here 00AFF79B 5E POP ESI --> Return to here 00AFF79C C9 LEAVE 00AFF79D C3 RETN --> F8 Over the Ret once you return look down for a Call EDI such as: 00B184B1 FFD7 CALL EDI click on it and hit F8 to make a breakpoint, F9 to goto it than F7 to Step in and your at the OEP. There's detailed tutorials on Non-Copymem2 Armadildo's so I wont post any more details, better just to consult those documents. |
#15
|
|||
|
|||
Thanks MrAnonymous
I tried to follow basically same as you said above but my codes diff and it takes me many returns to get to a CALL EDI..My apps visual basic i think as it calls the visuall basic .dll Heres the code from my start positions like you said>>> 7C57A1E6 0000 ADD BYTE PTR DS:[EAX],AL 7C57A1E8 8270 59 7C XOR BYTE PTR DS:[EAX+59],7C 7C57A1EC > 55 PUSH EBP..<< I LAND HERE AFTER BRAKING CREATE THREAD 7C57A1ED 8BEC MOV EBP,ESP 7C57A1EF FF75 1C PUSH DWORD PTR SS:[EBP+1C] 7C57A1F2 FF75 18 PUSH DWORD PTR SS:[EBP+18] 7C57A1F5 FF75 14 PUSH DWORD PTR SS:[EBP+14] 7C57A1F8 FF75 10 PUSH DWORD PTR SS:[EBP+10] 7C57A1FB FF75 0C PUSH DWORD PTR SS:[EBP+C] 7C57A1FE FF75 08 PUSH DWORD PTR SS:[EBP+8] 7C57A201 6A FF PUSH -1 7C57A203 E8 ACFEFFFF CALL KERNEL32.CreateRemoteThread 7C57A208 5D POP EBP 7C57A209 C2 1800 RETN 18..<<< F8'D TO HERE AND RETURNED 7C57A20C 8D88 FEEFFFFF LEA ECX,DWORD PTR DS:[EAX-1002] 7C57A212 83F9 12 CMP ECX,12 7C57A215 0F87 241F0400 JA KERNEL32.7C5BC13F When i returned 778321E6 3BC7 CMP EAX,EDI < i landed here 778321E8 0F84 43190000 JE RTUTILS.77833B31 778321EE 50 PUSH EAX 778321EF FF15 B8108377 CALL DWORD PTR DS:[<&KERNEL32.CloseHandl>; KERNEL32.CloseHandle 778321F5 33C0 XOR EAX,EAX 778321F7 5F POP EDI 778321F8 5E POP ESI 778321F9 5B POP EBX 778321FA C9 LEAVE 778321FB C2 0400 RETN 4..<< I F8'D to here and F8'D over return 778321FE 55 PUSH EBP 778321FF 8BEC MOV EBP,ESP 77832201 81EC 08020000 SUB ESP,208 77832207 E8 3D010000 CALL RTUTILS.77832349 When i returned 77831E4E 56 PUSH ESI 77831E4F E8 DF020000 CALL RTUTILS.77832133 77831E54 85C0 TEST EAX,EAX..<< I LAnded here??? 77831E56 0F85 89280000 JNZ RTUTILS.778346E5 77831E5C FF75 08 PUSH DWORD PTR SS:[EBP+8] 77831E5F 56 PUSH ESI 77831E60 E8 CA000000 CALL RTUTILS.77831F2F 77831E65 8BF8 MOV EDI,EAX 77831E67 85FF TEST EDI,EDI 77831E69 0F85 43280000 JNZ RTUTILS.778346B2 77831E6F 8D9E 40010000 LEA EBX,DWORD PTR DS:[ESI+140] 77831E75 8BFB MOV EDI,EBX 77831E77 8D83 F0000000 LEA EAX,DWORD PTR DS:[EBX+F0] 77831E7D 897D F8 MOV DWORD PTR SS:[EBP-8],EDI 77831E80 3BD8 CMP EBX,EAX 77831E82 73 22 JNB SHORT RTUTILS.77831EA6 77831E84 833F 00 CMP DWORD PTR DS:[EDI],0 77831E87 74 1D JE SHORT RTUTILS.77831EA6 77831E89 83C7 04 ADD EDI,4 77831E8C 3BF8 CMP EDI,EAX 77831E8E 897D F8 MOV DWORD PTR SS:[EBP-8],EDI 77831E91 ^72 F1 JB SHORT RTUTILS.77831E84 77831E93 EB 11 JMP SHORT RTUTILS.77831EA6 77831E95 68 00B08377 PUSH RTUTILS.7783B000 77831E9A E8 E5010000 CALL RTUTILS.77832084 77831E9F 8945 FC MOV DWORD PTR SS:[EBP-4],EAX 77831EA2 8BF0 MOV ESI,EAX 77831EA4 ^EB 91 JMP SHORT RTUTILS.77831E37 77831EA6 3BF8 CMP EDI,EAX 77831EA8 0F83 37280000 JNB RTUTILS.778346E5 77831EAE 57 PUSH EDI 77831EAF E8 C2000000 CALL RTUTILS.77831F76 77831EB4 85C0 TEST EAX,EAX 77831EB6 0F85 29280000 JNZ RTUTILS.778346E5 77831EBC 8B37 MOV ESI,DWORD PTR DS:[EDI] 77831EBE 6A 3F PUSH 3F 77831EC0 FF75 08 PUSH DWORD PTR SS:[EBP+8] 77831EC3 2BFB SUB EDI,EBX 77831EC5 8D5E 40 LEA EBX,DWORD PTR DS:[ESI+40] 77831EC8 C1FF 02 SAR EDI,2 77831ECB 53 PUSH EBX 77831ECC 897E 3C MOV DWORD PTR DS:[ESI+3C],EDI 77831ECF FF15 48118377 CALL DWORD PTR DS:[<&KERNEL32.lstrcpynA>>; KERNEL32.lstrcpynA 77831ED5 6A 3F PUSH 3F 77831ED7 8D86 80000000 LEA EAX,DWORD PTR DS:[ESI+80] 77831EDD 53 PUSH EBX 77831EDE 50 PUSH EAX 77831EDF FF15 04108377 CALL DWORD PTR DS:[<&MSVCRT.mbstowcs>] ; MSVCRT.mbstowcs 77831EE5 8B45 0C MOV EAX,DWORD PTR SS:[EBP+C] 77831EE8 83C4 0C ADD ESP,0C 77831EEB 83E0 01 AND EAX,1 77831EEE 0F85 CD270000 JNZ RTUTILS.778346C1 77831EF4 F645 0C 02 TEST BYTE PTR SS:[EBP+C],2 77831EF8 0F85 C3270000 JNZ RTUTILS.778346C1 77831EFE 834E 38 08 OR DWORD PTR DS:[ESI+38],8 77831F02 6A 01 PUSH 1 77831F04 56 PUSH ESI 77831F05 8B75 FC MOV ESI,DWORD PTR SS:[EBP-4] 77831F08 56 PUSH ESI 77831F09 E8 D3FAFFFF CALL RTUTILS.778319E1 77831F0E 85C0 TEST EAX,EAX 77831F10 0F85 C6270000 JNZ RTUTILS.778346DC 77831F16 56 PUSH ESI 77831F17 FF15 48108377 CALL DWORD PTR DS:[<&NTDLL.RtlReleaseRes>; ntdll.RtlReleaseResource 77831F1D FF76 4C PUSH DWORD PTR DS:[ESI+4C] 77831F20 FF15 A4108377 CALL DWORD PTR DS:[<&KERNEL32.SetEvent>] ; KERNEL32.SetEvent 77831F26 8BC7 MOV EAX,EDI 77831F28 5F POP EDI 77831F29 5E POP ESI 77831F2A 5B POP EBX 77831F2B C9 LEAVE 77831F2C C2 0800 RETN 8 Sorry am i doing it wrong i dont see a CALL EDI ? After many returns i find a CALL EDI and F7 into it and land here 00453F6E -FF25 5CC3AC00 JMP DWORD PTR DS:[ACC35C] ; MSVCRT.remove 00453F74 55 PUSH EBP <<LAND HERE ..OEP ??? 00453F75 8BEC MOV EBP,ESP 00453F77 6A FF PUSH -1 00453F79 68 20334600 PUSH VideoReD.00463320 00453F7E 68 26414500 PUSH VideoReD.00454126 ; JMP to MSVCRT._except_handler3 00453F83 64:A1 00000000 MOV EAX,DWORD PTR FS:[0] 00453F89 50 PUSH EAX 00453F8A 64:8925 00000000 MOV DWORD PTR FS:[0],ESP 00453F91 83EC 68 SUB ESP,68 00453F94 53 PUSH EBX 00453F95 56 PUSH ESI 00453F96 57 PUSH EDI 00453F97 8965 E8 MOV DWORD PTR SS:[EBP-18],ESP 00453F9A 33DB XOR EBX,EBX 00453F9C 895D FC MOV DWORD PTR SS:[EBP-4],EBX Im new to this but the EBP at line 00453F74 55 PUSH EBP ..points to 0012FD08 0012FD08 |0012FD1C 0012FD0C |00491063 RETURN to VideoReD.00491063 from VideoReD.00490753 0012FD10 |0012FF2C 0012FD14 |00000000 0012FD18 |7FFDF000 0012FD1C |0012FF34 0012FD20 |00491859 RETURN to VideoReD.00491859 from VideoReD.0049101F 0012FD24 \00000000 0012FD28 77FCC9E3 RETURN to ntdll.77FCC9E3 from ntdll.77F8C2A6 0012FD2C 00000000 0012FF30 00000065 0012FF34 /0012FFC0 0012FF38 |004A4457 RETURN to VideoReD.<ModuleEntryPoint>+0CE from VideoReD.00491560 0012FF3C |00400000 VideoReD.00400000 0012FF40 |00000000 0012FF44 |00132382 0012FF48 |0000000A 0012FF4C |00000000 0012FF50 |00000000 0012FF54 |7FFDF000 0012FF58 |77F80000 ntdll.77F80000 0012FF5C |00132382 0012FF60 |0007D000 0012FF64 |00000044 0012FF68 |001322F8 0012FF6C |00133118 ASCII "WinSta0\Default" 0012FF70 |00133140 ASCII "C:\Program Files\VideoReDo\VideoReDo.exe" 0012FF74 |00400000 VideoReD.00400000 0012FF78 |00400000 VideoReD.00400000 0012FF7C |00400200 VideoReD.00400200 0012FF80 |0012E1A4 0012FF84 |0012E258 0012FF88 |0012E258 0012FF8C |00400000 VideoReD.00400000 0012FF90 |00000081 0012FF94 |0000000A 0012FF98 |00000000 0012FF9C |FFFFFFFF 0012FFA0 |FFFFFFFF 0012FFA4 |FFFFFFFF 0012FFA8 |0012FF4C 0012FFAC |8049BE82 0012FFB0 |0012FFE0 Pointer to next SEH record 0012FFB4 |004A3D70 SE handler 0012FFB8 |004C0A38 VideoReD.004C0A38 0012FFBC |00000000 0012FFC0 \0012FFF0 0012FFC4 7C581AF6 RETURN to KERNEL32.7C581AF6 0012FFC8 00000000 0012FFCC 00000000 0012FFD0 7FFDF000 0012FFD4 00000000 0012FFD8 0012FFC8 0012FFDC 00000000 0012FFE0 FFFFFFFF End of SEH chain 0012FFE4 7C57E597 SE handler 0012FFE8 7C581B00 KERNEL32.7C581B00 0012FFEC 00000000 0012FFF0 00000000 0012FFF4 00000000 0012FFF8 004A4389 VideoReD.<ModuleEntryPoint> 0012FFFC 00000000 Think my OEP can be found from above?? Thanks again for the help its appreciated!!! Ill also look at the tuts paul333 |
Thread Tools | |
Display Modes | |
|
|
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Unpackable packer ? | jackdanielz | General Discussion | 9 | 02-12-2003 05:55 |