MemoryModule
MemoryModule copied to clipboard
A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.
MemoryModule
☘️ A tool to parse and load module in memory, as well as attach a DLL in EXE. Most of the functions are inline, so that it can also be used in shellcode.
compatible list:
- [x] windows xp
- [x] windows 7
- [x] windows 8
- [x] windows 10
- [x] linux wine
Now you don't need to use python to compile all of them, just use pre generated shellcode.
Also it support cross-compile on linux such as codespaces.
Compile
compile on windows
You can use clang, gcc or tcc and msvc (visual studio 2019)to compile,
here's a example for using clang to compile.
git clone https://github.com/YuriSizuku/MemoryModule.git --recursive
cd ./MemoryModule/src/memdll
make winpe_shellcode # only if you want to generate ths shellcode
make ARCH=i686 # x86 release
make ARCH=x86_64 # x64 release
make ARCH=i686 DEBUG=1 # x86 debug
make ARCH=x86_64 DEBUG=1 # x64 debug
compile on linux
You can also use mingw to compile on linux without generating shellcode by python.
sudo apt-get install mingw-w64
git clone https://github.com/YuriSizuku/MemoryModule.git --recursive
cd ./MemoryModule/src/memdll
make ARCH=i686 CC=i686-w64-mingw32-gcc # mingw x86 release
make ARCH=x86_64 CC=x86_64-w64-mingw32-gcc # mingw x64 release
If you want to develop on codespaces, here's the c_cpp_properties.json on vscode.
{
"configurations": [
{
"name": "Linux",
"includePath": [
"${workspaceFolder}/**",
"${workspaceFolder}/util/include/**"
],
"defines": ["WINPE_IMPLEMENTATION", "WINPE_NOASM"],
"compilerPath": "/usr/bin/i686-w64-mingw32-gcc",
"cStandard": "c99",
"cppStandard": "c++11",
"intelliSenseMode": "windows-gcc-x86"
}
],
"version": 4
}
Usage
load DLL in memory
const char *dllpath = "test.dll";
size_t mempesize = 0;
void *memdll = NULL;
// load the pe file in memory and align it to memory align
void *mempe = winpe_memload_file(dllpath, &mempesize, TRUE);
// memory loadlibrary
memdll = winpe_memLoadLibrary(mempe);
winpe_memFreeLibrary(memdll);
// memory loadlibrary at specific address
size_t targetaddr = sizeof(size_t) > 4 ? 0x140030000: 0x90000;
memdll = winpe_memLoadLibraryEx(mempe, targetaddr,
WINPE_LDFLAG_MEMALLOC, (PFN_LoadLibraryA)winpe_findloadlibrarya(),
(PFN_GetProcAddress)winpe_memGetProcAddress);
winpe_memFreeLibrary(memdll);
free(mempe);
attach DLL in exe
win_injectmemdll.exe exepath dllpath [outpath]
MemoryModule API
These functions are essential to load memory module in windows.
/*
similar to LoadlibrayA, will call dllentry
will load the mempe in a valid imagebase
return hmodule base
*/
inline void* STDCALL winpe_memLoadLibrary(void *mempe);
/*
if imagebase==0, will load on mempe, or in imagebase
will load the mempe in a valid imagebase, flag as below:
WINPE_LDFLAG_MEMALLOC 0x1, will alloc memory to imagebase
WINPE_LDFLAG_MEMFIND 0x2, will find a valid space,
must combined with WINPE_LDFLAG_MEMALLOC
return hmodule base
*/
inline void* STDCALL winpe_memLoadLibraryEx(void *mempe,
size_t imagebase, DWORD flag,
PFN_LoadLibraryA pfnLoadLibraryA,
PFN_GetProcAddress pfnGetProcAddress);
/*
similar to FreeLibrary, will call dllentry
return true or false
*/
inline BOOL STDCALL winpe_memFreeLibrary(void *mempe);
/*
FreeLibraryEx with VirtualFree custom function
return true or false
*/
inline BOOL STDCALL winpe_memFreeLibraryEx(void *mempe,
PFN_LoadLibraryA pfnLoadLibraryA,
PFN_GetProcAddress pfnGetProcAddress);
/*
similar to GetProcAddress
return function va
*/
inline PROC STDCALL winpe_memGetProcAddress(
void *mempe, const char *funcname);
// mempe internal functions
/*
load the origin rawpe in memory buffer by mem align
return memsize
*/
inline size_t winpe_memload(const void *rawpe, size_t rawsize,
void *mempe, size_t memsize, bool_t same_align);
/*
realoc the addrs for the mempe addr as image base
return realoc count
*/
inline size_t winpe_memreloc(void *mempe, size_t newimagebase);
/*
load the iat for the mempe
return iat count
*/
inline size_t winpe_membindiat(void *mempe,
PFN_LoadLibraryA pfnLoadLibraryA,
PFN_GetProcAddress pfnGetProcAddress);
/*
exec the tls callbacks for the mempe, before dll oep load
reason is for function PIMAGE_TLS_CALLBACK
return tls count
*/
inline size_t winpe_membindtls(void *mempe, DWORD reason);
See winpe.h for parsing and loading PE structure in detail.
Known issues
- [x] attach x64 DLL to exe crash on calling some windows API
problem occured by
movaps xmm0, xmmword ptr ss:[rsp]fixed by stack memory align with 0x10
Todo
- [x] TLS initialize support, finished, but not tested, because I didn't find DLL with TLS example.
- [x] support ASLR finished