
Ported to C from @x64dbg's patternfind.cpp. https://github.com/x64dbg/x64dbg/blob/development/src/dbg/patternfind.cpp This one is much better than my previous implementation because now I can use wildcards on single nibbles!
166 lines
5.2 KiB
C
166 lines
5.2 KiB
C
#include <Windows.h>
|
|
#include <Psapi.h>
|
|
#include <TlHelp32.h>
|
|
#include <tchar.h>
|
|
#include <sddl.h>
|
|
#include "service.h"
|
|
#include "util.h"
|
|
#include "patternfind.h"
|
|
#include "core.h"
|
|
|
|
DWORD WINAPI NewThreadProc(LPVOID lpParam) {
|
|
SC_HANDLE hSCManager = OpenSCManager(NULL, SERVICES_ACTIVE_DATABASE, SC_MANAGER_CONNECT);
|
|
|
|
TCHAR lpBinaryPathName[0x8000];
|
|
get_svcpath(hSCManager, _T("wuauserv"), lpBinaryPathName, _countof(lpBinaryPathName));
|
|
|
|
BOOL result = _tcsicmp(GetCommandLine(), lpBinaryPathName);
|
|
CloseServiceHandle(hSCManager);
|
|
|
|
if (result) {
|
|
return 0;
|
|
}
|
|
|
|
SECURITY_ATTRIBUTES sa;
|
|
sa.nLength = sizeof(sa);
|
|
ConvertStringSecurityDescriptorToSecurityDescriptor(_T("D:PAI(A;;FA;;;BA)"), SDDL_REVISION_1, &(sa.lpSecurityDescriptor), NULL);
|
|
sa.bInheritHandle = FALSE;
|
|
|
|
HANDLE hEvent = CreateEvent(&sa, TRUE, FALSE, _T("Global\\wufuc_UnloadEvent"));
|
|
|
|
if (!hEvent) {
|
|
return 0;
|
|
}
|
|
|
|
DWORD dwProcessId = GetCurrentProcessId();
|
|
DWORD dwThreadId = GetCurrentThreadId();
|
|
HANDLE lphThreads[0x1000];
|
|
SIZE_T cb;
|
|
|
|
SuspendProcessThreads(dwProcessId, dwThreadId, lphThreads, _countof(lphThreads), &cb);
|
|
|
|
HMODULE hm = GetModuleHandle(NULL);
|
|
DETOUR_IAT(hm, LoadLibraryExA);
|
|
DETOUR_IAT(hm, LoadLibraryExW);
|
|
|
|
TCHAR lpServiceDll[MAX_PATH + 1];
|
|
get_svcdll(_T("wuauserv"), lpServiceDll, _countof(lpServiceDll));
|
|
|
|
HMODULE hwu = GetModuleHandle(lpServiceDll);
|
|
if (hwu && PatchWUAgentHMODULE(hwu)) {
|
|
_tdbgprintf(_T("Patched previously loaded Windows Update module!"));
|
|
}
|
|
ResumeAndCloseThreads(lphThreads, cb);
|
|
|
|
WaitForSingleObject(hEvent, INFINITE);
|
|
|
|
_tdbgprintf(_T("Unload event was set."));
|
|
|
|
SuspendProcessThreads(dwProcessId, dwThreadId, lphThreads, _countof(lphThreads), &cb);
|
|
RESTORE_IAT(hm, LoadLibraryExA);
|
|
RESTORE_IAT(hm, LoadLibraryExW);
|
|
ResumeAndCloseThreads(lphThreads, cb);
|
|
|
|
CloseHandle(hEvent);
|
|
_tdbgprintf(_T("See ya!"));
|
|
FreeLibraryAndExitThread(HINST_THISCOMPONENT, 0);
|
|
return 0;
|
|
}
|
|
|
|
BOOL PatchWUAgentHMODULE(HMODULE hModule) {
|
|
LPSTR lpszPattern;
|
|
SIZE_T n1, n2;
|
|
#ifdef _WIN64
|
|
lpszPattern = "FFF3 4883EC?? 33DB 391D???????? 7508 8B05????????";
|
|
n1 = 10;
|
|
n2 = 18;
|
|
#elif defined(_WIN32)
|
|
if (WindowsVersionCompare(VER_EQUAL, 6, 1, 0, 0, VER_MAJORVERSION | VER_MINORVERSION)) {
|
|
lpszPattern = "833D????????00 743E E8???????? A3????????";
|
|
n1 = 2;
|
|
n2 = 15;
|
|
} else if (WindowsVersionCompare(VER_EQUAL, 6, 3, 0, 0, VER_MAJORVERSION | VER_MINORVERSION)) {
|
|
lpszPattern = "8BFF 51 833D????????00 7507 A1????????";
|
|
n1 = 5;
|
|
n2 = 13;
|
|
}
|
|
#else
|
|
return FALSE;
|
|
#endif
|
|
|
|
MODULEINFO modinfo;
|
|
GetModuleInformation(GetCurrentProcess(), hModule, &modinfo, sizeof(MODULEINFO));
|
|
|
|
SIZE_T rva = patternfind(modinfo.lpBaseOfDll, modinfo.SizeOfImage, 0, lpszPattern);
|
|
if (rva == -1) {
|
|
_tdbgprintf(_T("No pattern match!"));
|
|
return FALSE;
|
|
}
|
|
|
|
SIZE_T fpIsDeviceServiceable = (SIZE_T)modinfo.lpBaseOfDll + rva;
|
|
_tdbgprintf(_T("Pattern match at offset %p."), fpIsDeviceServiceable);
|
|
|
|
BOOL result = FALSE;
|
|
|
|
DWORD flOldProtect;
|
|
DWORD flNewProtect = PAGE_READWRITE;
|
|
BOOL *lpbNotRunOnce = (BOOL *)(fpIsDeviceServiceable + n1 + sizeof(DWORD) + *(DWORD *)(fpIsDeviceServiceable + n1));
|
|
if (*lpbNotRunOnce) {
|
|
VirtualProtect(lpbNotRunOnce, sizeof(BOOL), flNewProtect, &flOldProtect);
|
|
*lpbNotRunOnce = FALSE;
|
|
VirtualProtect(lpbNotRunOnce, sizeof(BOOL), flOldProtect, &flNewProtect);
|
|
_tdbgprintf(_T("Wrote value %d to address %p."), *lpbNotRunOnce, lpbNotRunOnce);
|
|
result = TRUE;
|
|
}
|
|
|
|
BOOL *lpbCachedResult = (BOOL *)(fpIsDeviceServiceable + n2 + sizeof(DWORD) + *(DWORD *)(fpIsDeviceServiceable + n2));
|
|
if (!*lpbCachedResult) {
|
|
VirtualProtect(lpbCachedResult, sizeof(BOOL), flNewProtect, &flOldProtect);
|
|
*lpbCachedResult = TRUE;
|
|
VirtualProtect(lpbCachedResult, sizeof(BOOL), flOldProtect, &flNewProtect);
|
|
_tdbgprintf(_T("Wrote value %d to address %p."), *lpbCachedResult, lpbCachedResult);
|
|
result = TRUE;
|
|
}
|
|
return result;
|
|
}
|
|
|
|
HMODULE WINAPI _LoadLibraryExA(
|
|
_In_ LPCSTR lpFileName,
|
|
_Reserved_ HANDLE hFile,
|
|
_In_ DWORD dwFlags
|
|
) {
|
|
HMODULE result = LoadLibraryExA(lpFileName, hFile, dwFlags);
|
|
if (result) {
|
|
_dbgprintf("Loaded %s.", lpFileName);
|
|
CHAR path[MAX_PATH + 1];
|
|
if (!get_svcdllA("wuauserv", path, _countof(path))) {
|
|
return result;
|
|
}
|
|
|
|
if (!_stricmp(lpFileName, path) && PatchWUAgentHMODULE(result)) {
|
|
_dbgprintf("Patched Windows Update module!");
|
|
}
|
|
}
|
|
return result;
|
|
}
|
|
|
|
HMODULE WINAPI _LoadLibraryExW(
|
|
_In_ LPCWSTR lpFileName,
|
|
_Reserved_ HANDLE hFile,
|
|
_In_ DWORD dwFlags
|
|
) {
|
|
HMODULE result = LoadLibraryExW(lpFileName, hFile, dwFlags);
|
|
if (result) {
|
|
_wdbgprintf(L"Loaded library: %s.", lpFileName);
|
|
WCHAR path[MAX_PATH + 1];
|
|
if (!get_svcdllW(L"wuauserv", path, _countof(path))) {
|
|
return result;
|
|
}
|
|
|
|
if (!_wcsicmp(lpFileName, path) && PatchWUAgentHMODULE(result)) {
|
|
_wdbgprintf(L"Patched Windows Update module!");
|
|
}
|
|
}
|
|
return result;
|
|
};
|