Writing Custom Shellcode Encoders and Decoders
Last updated
Last updated
The purpose of this lab is to get a bit more comfortable with writing primitive custom shellcode encoders and decoders.
Shellcode encoding simply means transforming original shellcode bytes into a set of arbitrary bytes by following some rules (encoding scheme), that can be later be reverted back to their original values by following the same rules (decoding scheme) in reverse.
Shellcode encoding may be useful in evading static antivirus signatures and eliminating null bytes.
To make it simple, for this lab, let's imagine that our raw shellcode (before encoding) is made of the following bytes:
...which is actually just a simple string original shellcode
as you can see here:
Now that we have the raw shellcode bytes, we need to decide on the algorithm that defines how each byte of the raw shellcode should be encoded/transformed. There's many ways to do it, but for this lab, let's define our encoding steps like this:
xor with 0x55
increment by 1
xor with 0x11
Let's write a simple powershell script that will help us cycle through the raw shellcode bytes and encode them by performing operations defined in our encoding scheme:
If we run the encoder on our shellcode bytes 0x6F,0x72,0x69,0x67,0x69,0x6E,0x61,0x6C,0x20,0x73,0x68,0x65,0x6C,0x6C,0x63,0x6F,0x64,0x65
, it will spit out the encoded shellcode bytes (lime) and show if null bytes were found (lime):
Note that it also shows the shellcode size (orange) - we will need it later when writing a decoder, so that we can tell the decoder how many shellcode bytes it should process.
The decoding scheme is the same as the encoding scheme, only in reverse:
...which means that we will have to iterate through all the encoded bytes of the shellcode and transform them into original bytes like this:
xor with 0x11
decrement by 0x1 (because we incremented when encoding, we need to decrement now)
xor with 0x55
A fully commented NASM decoder.asm
is here:
Note that line 12 contains the shellcode size - 0x12
- the value that was printed out by our encoder.ps1
Let's assemble our decoder.asm
with nasm:
The decoder file assembled in the previous step, contains our decoder's bytes / op-codes (and our encoded shellcode) that can be executed by the CPU once in process's executable memory. We need to extract them if we want to inject and execute those bytes as shellcode.
For the sake of simplicity, let's do this manually by loading the assembled decoder
file into the CFF Explorer's Quick Disassembler
and compare it with our assembly instructions in decoder.asm
.
We can clearly see that the op-codes of our decoder start at 0x3C
into the file assembled file:
Let's switch to the Hex Editor and we can copy (right click on the selected bytes) the decoder bytes (for this lab, we will go with a Hex format), starting at 0x3c
(blue) and ending with the last byte of our encoded shellcode 0x20
(red):
Now that we've extracted our decoder's (that includes our encoded shellcode) op-codes, let's check if we can make them execute and see our encoded shellcode get decoded and launched.
Reminder
Our decoded shellcode will not execute as it's simply an ascii string original shellcode
, but it would if it was actual executable code.
To keep things simple, let's fire up x64dbg and attach it to a new instance of notepad.exe - this is the process that we will be executing our decoder in - and hit F9 so that we break at the entry point:
Once at the entry point, let's change the memory permissions for the .text
section, so we can demo this decoder:
Right click the instruction address and Follow in Memory Map
Right click the .text
section and Set Page Memory Rights
Ensure Select Full Access
is selected and hit Set Rights
Once the permissions are set, jump to the .text
section with right click + Follow in Disassembler
:
Select enough instructions that could be replaced with our shellcode bytes, hit Ctrl + E (Binary Edit) and paste the extracted decoder op-codes there:
Set the instruction pointer RIP to the location we've just pasted our shellcode to:
Let's now follow the same address we've pasted the bytes to in the Memoy Dump too, so we can see how our shellcode is getting decoded as we step through the decoding stub:
We can finally execute our decoder by repeatedly hitting F7 and observe how our shellcode gets decoded and the initial string original shellcode
is being revealed in the memory dump view:
Note that after the decoding has completed, the code is transferred to our decoded shellcode: