29 Jun

Linking OMF files with Delphi

Continuing the discussion about Delphi compiler and the object files.

Here is the OMF file template I made for 010 Editor: https://www.mediafire.com/?bkpbkjvgen7ubz1

Please note, it is not a full-featured implementation of OMF specification. I only implemented all OMF file records that are processed by Delphi 2007 compiler. So, next time you have a cryptic compiler error while trying to link OMF file in Delphi, you can take a look into your OBJ file and make an educated guess what’s causing the problem.

TL;DR version

In 95+% of cases you will encounter OBJ file that has unsupported segment name in SEGDEF record. And it’s a simple fix, too – you just need to use objconv.exe by Agner Fog and use -nr option to rename the offending segment. Something like this:

Next possible issue is exceeding the number of EXTDEF or LNAMES records – this can happen if you’re trying to convert a really large DLL file into OBJ file.

Finally, your OBJ file might contain some record type which is not supported by Delphi compiler at all. I’m not aware of a simple way to fix it, I would try using 010Editor and OMF template to remove the entire record.

If your problem is not caused from any of the above issues, please feel free to drop me a note – I’ll be happy to look into it.

Known limitations of Delphi compiler

This is a list of limitations I was able to compile and/or confirm. Some of them come from Embarcadero official notes and the rest I obtained by analyzing dcc32.exe.

SEGDEF (98H, 99H)

  • Not more than 10 segments – if number of segments exceeds 10, buffer overrun will probably happen.
  • Segments must be 32bits. Will cause “E2215 16-Bit segment encountered in object file ‘%s'”
  • Segment name must be one of (case insensitive):
    • Code segments: “CODE”, “CSEG”, “_TEXT”
    • Constant data segments: “CONST”, “_DATA”
    • Read-write data segments: “DATA”, “DSEG”, “_BSS”

    Segment with any other name will be ignored.


Not more than 50 local names in LNAMES records – will cause “E2045 Bad object file format: ‘%s'” error.


Not more than 255 external symbols – will cause “E2045 Bad object file format: ‘%s'”
Certain EXTDEF records can also cause “E2068 Illegal reference to symbol ‘%s’ in object file ‘%s'” and “E2045 Bad object file format: ‘%s'”

PUBDEF (90H, 91H)

Can cause “E2045 Bad object file format: ‘%s'” and “F2084 Internal Error: %s%d”


Embarcadero says that “LEDATA and LIDATA records must be in offset order” – I am not really sure what that means. Can cause “E2045 Bad object file format: ‘%s'”


Embarcadero says that “LEDATA and LIDATA records must be in offset order” – I am not really sure what that means. Can cause “E2045 Bad object file format: ‘%s'”


This type of record is unsupported, will cause immediate error “E2103 16-Bit fixup encountered in object file ‘%s'”


Embarcadero documentation says:

  • No THREAD subrecords are supported in FIXU32 records
  • Only segment and self relative fixups
  • Target of a fixup must be a segment, a group or an EXTDEF

Again I’m not sure what they mean. But there are lots of checks that can cause “E2045 Bad object file format: ‘%s'”


Accepted by compiler, but no real checks are performed.

LINNUM (94H, 95H)

Accepted by compiler, but no real checks are performed.


Accepted by compiler, but no real checks are performed.


Ignored by compiler.

That’s the end of the list. Any other entry type will cause immediate error “E2045 Bad object file format: ‘%s'” :)

Useful links

My OMF file template for 010Editor: https://www.mediafire.com/?bkpbkjvgen7ubz1
OMF file format specification.
The Borland Developer’s Technical Guide
Objconv.exe by Agner Fog
Manual for objconv.exe

19 Jun

Weirdness of C# compiler

I’ve been quite busy lately. I made OMF file template I promised few weeks ago, found a remote code execution vulnerability in One Big Company’s product and spent some time breaking keygenme by li0nsar3c00l. I’ll make a blog post about most of these findings sooner or later.

But today I want to show you something that made me go WTF..

I needed to see how the loop “while true do nothing” looks like in IL. Since C# compiler and .NET JIT compiler are quite smart and optimize code that’s certainly an eternal loop, I needed to get creative:

Nothing fancy, but C# & JIT compiler don’t track param values, so they both generate proper code..

Well, I thought it’s a proper code, until I looked at generated MSIL:

WTF WTF WTF? Can anyone explain to me why there are 2 ceq instructions?

I could understand extra nop and stloc/ldloc instructions, but that ceq completely blows my mind.. And it’s the same for .NET 2.0 and 4.5 compilers.

12 Jun

I won’t show you

if you come to me with a question, i won’t give you an answer.

if you ask for my advice, i won’t give you a recommendation.

at best i’ll give you a pointer, a suggestion. perhaps a direction, a map. you’ll then start walking, creating your own route, getting lost and finding your way again. you’ll see other people’s footsteps often, some old and some fresh, and sometimes you’ll walk open territories no one has visited before. you’ll meet Eureka and dance together and laugh in joy, you’ll cry with Despair, which is not a bad thing.

if you want a lesson, i won’t give you instruction.

if you want guidance, but i won’t show you.

i want you to have fun too. i won’t spoil your journey.

or maybe i just have no idea and this is my fancy excuse to slip away from the situation?

Thank you, el trastero, couldn’t have said it any better.

09 Jun

Excuse the mess #2

I’m in the middle of updating the blog to the latest version of WordPress. It’s not a really straightforward process as the new emoji support in WordPress 4.2 causes RSS feeds to stop validating. And there are lots of other tiny but ugly issues with it.

So, please excuse the mess, I’m doing my best to iron-out all the remaining wrinkles. ;) And please let me know if you notice anything wrong with the site, comments or RSS.

Update: looks like all issues are resolved. Enjoy!

08 Jun

Analyzing malicious LNK file

Last week I noticed a month-old post from F-Secure titled “Janicab Hides Behind Undocumented LNK Functionality” in my RSS Reader. I had starred it but never had time to read and analyze it thoroughly. Post title and their statement caught my attention:

But the most interesting part is the use of an undocumented method for hiding the command line argument string from Windows Explorer.

What is this undocumented functionality you’re talking about? Tell me more! Unfortunately, they didn’t provide any technical details just some screenshots.

I’m gonna fix that (and have some fun in process) :)

Initial findings and available tools (are crap)

Armed with information from FSecure’s post, I started Googling. In a few minutes I found VirusTotal scan and a couple of searches later the LNK file itself. Now what?

I’m not a LNK file expert and I don’t have magic tools for analyzing them. So, I did what everyone else would – Googled again. There are 3 tools that can be found easily:

All of these tools showed the same information as VirusTotal scan – absolutely nothing useful. See for yourself in screenshots:

Marked in blue is the final structure of LNK file, as per 010Editor Template. COMMAND_LINE_ARGUMENTS are empty. And it looks like malware authors somehow managed to put the real command-line “/c copy *.jpg.lnk…” outside the defined structures, right? How’s that possible?

So, I got an official Shell Link (.LNK) Binary File Format specification by Microsoft and started reading.

Fixing 010Editor template

LNK file consists of sequence of structures of variable size. There’s always size of the structure, followed by data. Right after it there’s a next size and next data. Size, data, size, data.. It’s very easy to process, just look at the size, read the appropriate number of bytes, process them. Repeat until done. How hard is that?

Yet, Mr. Stevens (proudly calling himself Microsoft MVP Consumer Security, CISSP, GSSP-C, MCSD .NET, MCSE/Security, MCITP Windows Server 2008, RHCT, CCNP Security, OSWP) managed to mess up his template.


His implementation of LinkInfo structure looks like this:

He just reads all the fields one after another and expects that the length of all the fields will be equal to the size of structure (LinkInfoSize). Sure, it might work on “normal” LNK files but we’re dealing with malware and intentionally modified files here. ;)

After fixing that and few more bugs in the template, I was able to see the proper structure of this LNK file:
Command-line passed to cmd.exe is exactly where it should be, so why is Windows Explorer having problems with it?

Modifications in LNK file

Well, let’s look at the file in more details.

Looks like someone took a hex editor and just filled with zeroes every possible field in most of ItemID structures.

Same in LinkInfo, lots of zeroes.

And in EnvironmentDataBlock too..

Hmm, this is interesting, 0xA0000000 is not a defined ExtraData structure ID according to MS spec.

Well, there are lots of changes but which one(-s) are causing the Explorer cockup F-Secure is mentioning? There are two ways to find it – debugging Windows Explorer shell, or making a test LNK file and filling it with zeroes until Explorer breaks. First one would be fun, but second one will be definitely faster. ;)

After few attempts, I found the culprit: it’s the modified EnvironmentDataBlock.

So, now you know. Adding empty EnvironmentDataBlock to any shortcut and setting ShellLinkHeader.LinkFlags.HasExpString = 1 will cause Windows Explorer to hide your command-line (but not exe name) from the user. :twisted:

Command line magic and steganography

I wanted to finish my analysis but some things were still bugging me.
What are these data after the end-of-file marker? And why is this LNK file 500+KB in size?

The answer is simple – it’s using steganography to hide malicious VBScript inside.

Let’s look at the commands passed to cmd.exe, I’ll just prettify them a bit. To do it properly, you need to know about command prompt escape characters, like “^” (at first I didn’t and FSecure got it wrong in their blogpost, too! ;) ). These are the actual commands:

First few lines are copying our LNK file to TEMP folder. Remember, FSecure analysis says that LNK file was originally called fotomama.jpg.lnk. ;)
dir command is printing full filename of our evil file into another file named “o”.
echo lines are generating file .bat.
And finally .bat is executed.

So, what is being written into .bat?

First 2 lines just copy our evil file to z9. I really don’t know why file copy is done via environment variables, maybe it’s some sort of anti-antivirus trick to hide the malware origin.
findstr treats z9 as text file and copies all “lines” of text that contain “#@~” into a file 1.vbe. If you Google a bit, you’ll learn that encrypted VBScript files have extension .vbe, consist of one long string and start with magic bytes “#@~^””.
Then a script gets executed, LNK file deleted and stupid user ends up being pwned. :)

Now, the bytes after end-of-file marker in LNK file start to make sense. 0x0A is new-line that’s necessary for findstr, and then comes encrypted VBScript. Nice example of steganography, lots of black command-prompt scripting magic, I really like it! ;)

Decoding VBE file and analyzing it – that’s a matter of another blog post. Yes, it’s really on my todo list.

Fixed LNK Template

I spent few more evenings working on the LNK template. It was just bugging me, to have something so useful, yet so terribly broken. So, I’m happy to present a fully reworked version that should be much more stable and able to deal with malicious LNK files in much better fashion.

Download link: https://www.mediafire.com/?zvrlmjy9v9m3ed3

Final thoughts

This was a fun evening project. I learned a lot about 010Editor Binary Templates, learned something new about LNK files and got a refresher course in CMD scripting and steganography. Writing this post took much much more time than the actual research, though.

If you want to have some fun too, you can use my 010Editor Template to edit your LNK files. Or make a simple tool in C#. Or create a LNK obfuscation service webpage in PHP. Possibilities are endless! :)

Obviously I won’t give out link to an actual malware (if Google is your friend, you can find it anyway) but here’s a demo LNK file I put together just for fun: http://www.mediafire.com/?gmphyn0mkmmyuag

It’s harmless, trust me! :D

Useful links

FSecure post that started my adventure
Original LNK Template
Official LNK specification by Microsoft
Overview of LNK file data that are useful for computer forensics

02 Jun

Since you asked.. How to inject byte array using dnlib

Quite often I receive random questions about dnlib from my friends. To be honest, I have no idea why they think I know the answers to life the universe and everything else. :) So, in this series of posts I’ll attempt to solve their problems – and hope that the solution helps someone else too.

So, today’s question is:

We’re trying to add a byte array to an assembly using dnlib. We wrote some code* but dnlib throws exception when saving modified assembly:
An unhandled exception of type 'dnlib.DotNet.Writer.ModuleWriterException' occurred in dnlib.dll
Additional information: Field System.Byte[] ::2026170854 (04000000) initial value size != size of field type

I gave the friend the standard answer – make a sample app, see how it looks and then implement it with dnlib. Seriously, how hard can it be? :)

Well, array initialization in .NET is anything but simple.

How arrays are initialized in C#

Note – the following explanation is shamelessly copied from “Maximizing .NET Performance” by Nick Wienholt. It’s a very nice book but getting little outdated. You can Google for “Apress.Maximizing.Dot.NET.Performance.eBook-LiB”, if interested.

Value type array initialization in C# can be achieved in two distinct ways—inline with the array variable declaration, and through set operations on each individual array element, as shown in the following snippet:

For a value type array that is initialized inline and has more than three elements, the C# compiler in both .NET 1.0 and .NET 1.1 generates a type named <PrivateImplementationDetails> that is added to the assembly at the root namespace level. This type contains nested value types that reference the binary data needed to initialize the array, which is stored in a .data section of the PE file. At runtime, the System.Runtime.CompilerServices.RuntimeHelpers::InitializeArray method is called to perform a memory copy of the data referenced by the <PrivateImplementationDetails> nested structure into the array’s memory location. The direct memory copy is roughly twice as fast for the initialization of a 20-by-20 element array of 64-bit integers, and array initialization syntax is generally cleaner for the inline initialization case.

Say what? You can read the text 3 times and still be no wiser. So, let’s make a small sample application and disassemble it.

How array initialization looks in MSIL

Let’s start with sample app that does nothing.

Compile without optimizations, and disassemble using ildasm. And even after removing all extra stuff, there’s still a lot of code & metadata for such a simple thing. :)

For one byte array that we declared, compiler created .data directive, 2 static fields, one class and one nested class. And it added a global static constructor. Yikes!

Implementing it in dnlib

Now that we know all the stuff that’s required for an array, we can make a tool that will add byte array to an assembly of our choice. To make things simpler, I decided not to create a holder class (named <PrivateImplementationDetails>{E21EC13E-4669-42C8-B7A5-2EE7FBD85904} in the example) and put everything in global module instead.

Note – Since I’m not a .NET/dnlib wizard, I always do it one step at a time, make sure it works and then continue. So, my workflow looks like this: write a code that does X → compile and run it → disassemble the result → verify that result X matches the expected → fix the bugs and repeat. Only after I’ve tested one thing, I move to the next one.

It also helps to make small test program first. Once you know that your code works as intended, you can use it in a larger project. Debugging the entire ConfuserEx project just to find a small bug in modifications made by someone – it’s not fun! So, step-by-step…

First, we need to add the class with layout. It’s called ‘__StaticArrayInitTypeSize=5′ in the example above. That’s quite simple to do in dnlib:

Now we need to add the static field with data, called ‘$$method0x6000003-1′.

Once that is done, we can add our byte array field, called bla in the example.

That’s it, we have all the fields. Now we need to add code to global .cctor to initialize the array properly.

And that’s it! Simples!

Further reading

Commented demo code at Pastebin
Longer explanation how array initialization works in C#


Just to clarify – this is a sample code. It works for me but if it blows up in your project, it’s your problem. And there always are some things that can be improved.

• Sometimes I’m overcomplicating things.. You don’t need to explicitly import System.Byte, you can use mod.CorLibTypes.Byte for that.

SZArraySig is a cleaner but less obvious way to refer to any array. If you need to reference complex arrays, this is better:

27 May

Static Enigma Virtual Box unpacker, part 2

Here comes a new version. :) This time I added support for unpacking external packages. “External packages” are data files that can be loaded by Enigma Virtual Box and can contain both embedded files and registry entries.

I also made my unpacker 100% Unicode-aware – there should not be any more problems with non-english filenames. But I had to switch to Delphi 2009 compiler to do this, so there might be some unexpected bugs lurking around.

And, of course, lots of internal bugs had to be fixed. My code is not perfect, you know! ;)

EnigmaVB Unpacker v0.30

Download link: https://www.mediafire.com/?tm5j3q93zbe5u71

P.S. Thanks to Manofwar for giving me few example files for development & testing!

25 May

Blogging is hard

When I started this blog, I wanted to try and see what will happen. I thought that I have so many things to say and to write about. I still do. :)

But as I found out soon enough, making a decent-quality blog post takes hours. And I don’t have that much free time. So, I had to choose between making half-assed posts with pretty kittens and lists of “Top-X things you don’t really care about“, or taking my time to write a proper post about something (technical) that I learned recently – at the expense of less frequent updates.

I chose to write less often. Currently I’m managing to make one proper post per week – and I really hope to keep it up that way. Of course, the more feedback I get, the more motivated I’d be to write. So, it’s all in your hands.. ;)

On a related subject, I added a simple captcha to the comment form. Looks like it’s working really well to keep most of the spambots away. But if you encounter any problems with it, please let me know.

19 May

Static linking of Bassmod in Delphi

BASS and BASSMOD are very well known freeware libraries for playing XM, IT, WAV and many more sound file formats. They are widely used in keygens and other apps. However, authors only distribute them in a DLL form, there is no LIB file or any other option for linking them statically.

Last week someone resurrected an old thread at Tuts4You and asked how to convert DLL to LIB and link it statically with Delphi. I gave poster the standard answer but he was still running in all sorts of issues. So, can it be done?

Then answer is – yes. But it’s not easy.

Note – This article is written for good old Delphi 6/7/2007. Since Delphi XE2 the process should be easier as the linker was improved to use COFF OBJ files directly. However, I don’t have those new Delphi versions, so I can’t test the claims.

Steps to be taken

I’ll make a list of all necessary steps first and then I’ll discuss them in details.

  1. Unpack the DLL properly
  2. Convert DLL to LIB
  3. Extract OBJ files from LIB
  4. Convert COFF OBJ files to OMF OBJ files
  5. Make those OMF files usable by Delphi
  6. Write a wrapper unit that works around Delphi limitations

Unpack the DLL properly

First step sounds easy, right? It isn’t.

The LIB provided in Tuts4you thread is badly unpacked. Sure, it can work when compiled with MASM. It can be made work with Delphi, but you’ll need to hex-edit compiled EXE file first. The reason for this is extremely primitive Delphi compiler/linker. You have no control over PE section names or attributes. It relies on specific section names and always makes code section read-only. But the LIB from tuts4you uses one segment for both code and data and it must have read-write-execute characteristics. Ooops.

So, we need to unpack DLL ourselves using all the standard steps. PE packer is a very simple one, so you can easily find OEP, dump the file, load DLL at different imagebase, find the OEP and make a 2nd dump, use 2 dumps to fix the relocations using Relox and finally restore Import Table using Scylla or ImpRec. Nothing new here.

Once you’ve unpacked the DLL, you will have to detect section boundaries and create new PE section table. When you’re at OEP of bass.dll, check the memory map in some process exploring tool. You’ll see the sections and their characteristics nicely:
BASS memory map in PETools

Now use any PE editor to create appropriate PE section headers:
Section headers in CFF
To make Delphi happy, code section should be named _TEXT and data section should be named _DATA. All the sections you don’t need in final OBJ file, should be named “.reloc”, “.edata” or similar – Dll2lib will remove them automatically.

Convert DLL to LIB

Well, this step is easy. Use DLL2LIB (google “DLL.To.Lib.v1.42.Full.Retail-DLL2Lib” or get trial version from official site), leave all the default settings and press “Start convert”.


Extract OBJ files from LIB

For next few steps you’ll need objconv.exe by Agner Fog. It’s better to download the latest version, as earlier versions didn’t support extracting LIB files.

It’s a simple command objconv.exe -lx bass.lib

Convert COFF OBJ files to OMF OBJ files

That’s also simple. Just run objconv.exe -fomf bass.obj bass-omf.obj

Make those OMF files usable by Delphi

Delphi imposes quite a few limitations to OBJ file format. Some of them are documented, some of them aren’t. So, it’s better to rely on special tools made for this purpose, like omf2d.exe by EliCZ.

I’m sure that objconv.exe can do the same, but I’m too lazy to try to figure the right command line parameters. So, just run omd2f.exe bassmod-omf.obj bassmod-omf-d.obj

Note – omd2d.exe will mess up some decorated names from msvcrt.dll, like “??2@YAPAXI@Z”. That’s not a problem, we’ll fix that in the wrapper unit.

Write a wrapper unit that works around Delphi limitations

This is also tough. And again the problems are caused by the primitive Delphi compiler/linker.

Delphi doesn’t support direct API calls, all API calls will go through the thunk table. When you try to reference any external API from Delphi code, in reality you’ll get address of the thunk code.

For the same reason in Delphi you can’t access exported global variables from another DLL.

Unfortunately BASS/BASSMOD uses both direct API calls and global variables from msvcrt.dll. Little bit of clever hacking is required to work around that – you’ll have to load msvcrt and other DLLs from unit initialization code and use GetProcAddress to get the required addresses.

So, the implementation part of the unit will look like this:

In addition to that we need to call the original DllMain function to make sure that BASS is initialized properly:

As a final touch, in the finalization part of unit we’ll have to call DllMain again to make sure all resources are freed properly.

Putting it all together

I already outlined all the steps needed. Anyone with proper skills should be able to replicate them and make his/her own BASS unit.

For those who are lazy – here is the package with Delphi units+obj files + all the intermediate files + compiled projects from BASS/BASSMOD examples to show that it really works.

Have fun!

Useful links

Unpacking DLLs #1: Tutorial by Mr. eXodia
Unpacking DLLs #2: How to use Relox in few simple steps
Omf2d: https://www.mediafire.com/?hsksyjwnwlaw3zb

13 May

Fixing choppy sound in Chrome within RDP connection

Some things and services are banned from work computers. Like your collection of MP3s. Or p2p-based television. Or access to Pandora. :) But everyone knows that music is a really great motivator! So, I decided to try a small trick – use RDP connection to my home PC and play my MP3s from home PC.

It turns out that playing MP3s in Winamp works great. However, playing Pandora radio or anything else in Chrome produced a very choppy sound and video framerate was around 3fps.. That’s not great at all.

Quick Google search locates this 1.5-years old Chrome bug: Issue 310983: choppy sound playing videos within RDP session (not only Flash, also HTML5). As it happens quite often – it’s reproduced by several people but nobody gives a flying fcuk about actually fixing it. So much for the open-source and quick fixes..

Lucky for me, there was a workaround suggested in the comments – install RDP 8.0 server and client.

Hmm, I haven’t heard anything about RDP versoin 8.0. How is that possible?

Turns out, it comes by default on Windows 8.x but must be manually installed and explicitly enabled on Windows 7. It’s one of those hidden treasures very few people know about!

So, on my home Win7 box I installed updates KB2574819, KB2592687 and restarted. Automatically received Security Update KB2965788 and got another restart. Made the necessary changes in group policy settings, and – you guessed right – yet another restart. Got locked out of my box because suddenly my username was not in “Remote Users” group, and I had to re-add it manually. Logged in and everything works as it should. Pandora sounds great, video is suddenly smooth and watchable and my work productivity goes… UP! :)

Happy happy joy joy!

Further reading

List of new features in RDP v8.0
Technical blog explaining technologies behind RDP v8.0 magic