Posted

The Reversing on Windows blog started back in 2009. Until 2016, the writings have been hosted on Blogger. Now, the content has been exported to a PDF document and it’s available for download. The document consists of 72 pages and over 80 posts.

Here is a non-exclusive list of topics the document covers.

  • About hard-coded pointers
  • Approaches to track data-flow
  • Research involving various x86 instructions
  • Analysis of binary data formats
  • Examples to write a Pintool to detect software defects
  • Security research on Flash Player, Firefox and Internet Explorer

Since 2017, the blog has been continued on suszter.com/ReversingOnWindows.

Author

Posted

A couple of weeks ago, I made a demonstration analysis for a variant of Cerber ransomware and documented it.

The following is the table of contents for the document.

Symptoms of compromise
    Ransom notes
    Encrypted files
    Temporary files
Runtime behavior
    Creates mutex
    Weakens system security
    Self elevates to perform administrative tasks
    Searches for files to encrypt
    Encrypts the files
    Displays the ransom note
    Deletes itself
    Window flashes up
Configuration
Final Notes

Author

Posted

The ILDasm tool (also known as IL Disassembler tool), is a popular tool both for developers and researchers working with .NET programs. We rely heavily on ILDasm when performing static analysis on IL binary code level. Therefore, it’s important to use ILDasm in an efficient way. Besides having it pinned to the taskbar or desktop we need to get it integrated with the research environment.

Visual Studio Command Prompt

When Visual Studio is installed various Command Prompt shortcuts are added under Visual Studio Tools folder.

ILDasm in SendTo Context menu

When Visual Studio Command prompt is started ILDasm is added to the PATH environment variable. This allows to launch ILDasm by typing ildasm in the command prompt.

External Tools in Visual Studio

Since we want to disassemble .NET binaries compiled in Visual Studio it’s worth to get ILDasm integrated with it.

To add ILDasm as an external tool to Visual Studio select TOOLS, then select External Tools... and provide the followings.

Title: I&L Disassembler
Command: C:\Program Files (x86)\Microsoft SDKs\Windows\v8.1A\bin\NETFX 4.5.1 Tools\ildasm.exe
Arguments: /SOURCE $(TargetDir)$(TargetName)$(TargetExt)
Initial directory: $(TargetDir)

Which looks like this in the GUI.

Visual Studio Tools Command Prompts

To run ILDasm on the compiled binary just select TOOLS, then select IL Disassembler. The keyboard shortcut is Alt+T, L.

Note, you might have noticed the /SOURCE argument is provided for ILDasm. It’s there to show the source lines in the disassembly.

SendTo Context Menu

Having ILDasm in the SendTo Context menu can be useful if we want to run it on a selected file in the file explorer.

To add ILDasm to SendTo Context menu, press Windows Logo+R and type shell:sendto in the run dialog box. The location of SendTo Context menu will pop up in the file explorer where the shortcut to ILDasm needs to be created.

The location can be like this.

C:\Users\Attila\AppData\Roaming\Microsoft\Windows\SendTo

In certain situations we might prefer to output the disassembly text into file. It’s supported by ILDasm when /OUT argument is used. Therefore we can generate output disassembly of a .NET program from SendTo Context menu.

This is what it looks like having ILDasm in SendTo Context menu.

External Tools in Visual Studio 2013

Batch Disassembly

When we need to disassemble a number of files into text files we use the following command called from batchdasm.bat.

for /r %%i in (*.*) do ildasm "%%i" /text /out=c:\BatchDasm\%%~ni.%%~zi.il

The command runs ILDasm on all the files in the current folder and all subfolders. The resulting disassembly will be saved into c:\BatchDasm. The resulting disassembly file is named like below.

<original filename>.<original filesize>.il

It was observed that ILDasm can crash even on legitimate Windows files. This can be just inconvenience but it can also raise security concerns.

Configuration of the Research Environment

The research environment has the following configuration.

Windows 8.1
Visual Studio 2013
ILDasm 4.0

Author