AutoIt process injection with shellcode and PE files

preview_player
Показать описание
This video reverse engineers a trick often used by malware to execute shellcode and complete PE files inside other processes, using AutoIt.

Using CallWindowProcA allows a message to a window to be processed by a different window procedure !

The trick can be used not only to load shellcode but also to bootstrap loading of full PE files !!

References
~~~~~~~~
CallWindowProcA function

AutoIt - Function DllCall

The ‘AVE_MARIA’ Malware

Analysing Recent Evolutions in Malware Loaders
HackInTheBox 202 - Hiding In Plain Sight - Analysing Recent Evolutions in Malware Loaders

---------------------------------------------------------------------------------------------------

If you liked this video and you want to learn hands-on how to analyse malware, with real samples and practical exercises, find us on Udemy :

---------------------------------------------------------------------------------------------------

Want to support us continue to make great content? Buy us a coffee :

Thank you 🙏
Рекомендации по теме
Комментарии
Автор

Did not know about that use of the function at all, good to know this one.

malwaretestingfan
Автор

Hey, I couldn’t find ur email and i will be happy to get the code of the autoit shellcode loader, i will be happy to test it thanks 🙏🏼

YoshimuraCDL
Автор

hello, could you share me the link of the source used and programs, as I would like to study this, thank you in advance for the video

josepaulo
Автор

can u share powershell book for hacking

shahmeerkhan
Автор

Which I used from a Malware example wtf

Rene-kgpf