The MASM Forum Archive 2004 to 2012

General Forums => The Workshop => Topic started by: others111 on January 11, 2012, 11:10:24 PM

Title: Portable Executable import table
Post by: others111 on January 11, 2012, 11:10:24 PM
How can I display the functions my exe file is importing from the dlls?
help me please
Title: Re: Portable Executable import table
Post by: qWord on January 11, 2012, 11:12:06 PM
CFF Explorer (http://www.ntcore.com/exsuite.php)
Title: Re: Portable Executable import table
Post by: others111 on January 12, 2012, 11:15:46 AM
thank you,but I need some assembly code in masm .As far as I am now ,I mapped the file in memory and I do not know where to go next
Title: Re: Portable Executable import table
Post by: donkey on January 12, 2012, 11:41:34 AM
The easiest way is to walk the import table, there is an example of how to do that in Iczelion's tutorials as far as I remember. I have an example of how to list dependancies on my website though it is in GoAsm syntax:

http://www.quickersoft.com/donkey/files/PEDirectories.zip
Title: Re: Portable Executable import table
Post by: others111 on January 12, 2012, 11:59:49 AM
Thank you for the responce.

Below is my code as far as I am now,but I do not know where to go next.I suppose I have to use the RVA function to grab the import table from Ram memory.If this is right how to I do it?


.386
.model flat, stdcall

includelib msvcrt.lib
includelib kernel32.lib

extern printf             :proc
extern scanf            :proc
extern CreateFileA@28                  :proc
extern CreateFileMappingA@24                 :proc
extern MapViewOfFile@20      :proc
extern CloseHandle@4                   :proc
extern SetFilePointer@16                           :proc
extern ReadFile@20         :proc
extern exit                     :proc

public start

.data
FileName db "c:\vlc.exe"                                         ;address for the file to be mapped               
hFile dword ?                              ;handle  CreateFile
hFileMapping dword ?                                            ;handle  CreateFileMapping
namee  db  "vlc"                                                   ;name for the mapped file
position dword 0   
 
format db "%x", 0
 
.code
start:

        push 0                                                                  ;Handle to template file with Generic_Read access right 
        push 0                                                                  ;Attributes 80h --> FILE_ATTRIBUTE_NORMAL
        push 3                                     ; 3->create new if it does not exist
        push 0                                   ;Security:NULL
        push 1h                                          ;dwShareMode
        push 80000000h OR 40000000h                     ;ACCESS   --> GENERIC_READ OR GENERIC_WRITE 
        push offset FileName                         ;address for the file to be created
        call CreateFileA@28   
        mov  hFile,eax   
                       
      push offset namee
      push 0
      push 0                            
      push 2             ;4 --> ReadWrite | 2 --> ReadOnly
      push 0
      push hFile
      call CreateFileMappingA@24
      mov  hFileMapping,eax
      
      push 0
      push 0                            
      push 0
      push 4
      push hFileMapping
      call MapViewOfFile@20   

      xor  ebx,ebx                     
      
      mov  bx,word ptr [eax+220h]
      mov  position,ebx
      
      push position
      push offset format
      call printf
      
      ;push 0
      ;push 0
      ;push position
      ;push hFile
      ;call SetFilePointer@16
      ;mov memptr,eax
      
      
   ;call exit function
   push 0
   call exit
end start
Title: Re: Portable Executable import table
Post by: donkey on January 12, 2012, 01:40:41 PM
Not sure why you would use push/push/call instead of invoke, makes it tougher when you want to port to 64 bit and doesn't make the code any faster but that's your choice I guess. From what I can see all you have done is to map the file so far but it looks OK, it would be easier to tell if you had used invoke since that would make it more readable. To read the import table you can scan the mapped file directly (uses functions from the Dbghelp API):

BuildListOfImports FRAME pMapFile, cbFile
uses esi,ebx,edi
LOCAL szOrdinal[16] :%CHAR
LOCAL hParent :%HANDLE
LOCAL tvins :TVINSERTSTRUCT
LOCAL pIMAGE_NT_HEADERS :%PTR
LOCAL bounds :D
LOCAL ImportName[256] :B

mov eax,[cbFile]
add eax,[pMapFile]
mov [bounds],eax

invoke ImageNtHeader,[pMapFile]
mov edi,eax
mov [pIMAGE_NT_HEADERS],eax

invoke Find_rdata,[pMapFile]
add eax,[edi+IMAGE_NT_HEADERS.OptionalHeader.ImageBase]
mov ebx,eax

mov edi,[edi+IMAGE_NT_HEADERS.OptionalHeader.DataDirectory+8] ; import directory RVA
invoke ImageRvaToVa,[pIMAGE_NT_HEADERS],[pMapFile],edi,NULL
mov edi,eax

jmp >>L2
L1:
invoke ImageRvaToVa,[pIMAGE_NT_HEADERS],[pMapFile],[edi+IMAGE_IMPORT_DESCRIPTOR.Name],NULL

mov [tvins.itemex.pszText],eax
mov D[tvins.hParent],TVI_ROOT
mov D[tvins.itemex.lParam],FALSE
mov D[tvins.hInsertAfter],0
mov D[tvins.itemex.mask],TVIF_TEXT + TVIF_PARAM + TVIF_IMAGE + TVIF_SELECTEDIMAGE + TVIF_CHILDREN
mov D[tvins.itemex.cChildren],TRUE
mov D[tvins.itemex.iImage],0
mov D[tvins.itemex.iSelectedImage],0
invoke SendMessage,[hImportTreeview],TVM_INSERTITEM,0,OFFSET tvins

mov [hParent],eax

cmp D[edi+IMAGE_IMPORT_DESCRIPTOR.OriginalFirstThunk],0
jne >
mov esi,[edi+IMAGE_IMPORT_DESCRIPTOR.FirstThunk]
jmp >T1
:
mov esi,[edi+IMAGE_IMPORT_DESCRIPTOR.OriginalFirstThunk]
T1:

invoke ImageRvaToVa,[pIMAGE_NT_HEADERS],[pMapFile],esi,NULL
mov esi,eax

jmp >>I2
I1:
test D[esi],IMAGE_ORDINAL_FLAG32
jnz >.ImportByOrdinal

.ImportByName
invoke ImageRvaToVa,[pIMAGE_NT_HEADERS],[pMapFile],[esi],NULL
add eax,IMAGE_IMPORT_BY_NAME.Name
invoke wsprintf,offset ImportName,"%s (%0.8Xh)",eax,ebx

lea eax,ImportName
mov [tvins.itemex.pszText],eax
mov eax,[hParent]
mov [tvins.hParent],eax
mov D[tvins.itemex.lParam],FALSE
mov D[tvins.hInsertAfter],0
mov D[tvins.itemex.mask],TVIF_TEXT + TVIF_PARAM + TVIF_IMAGE + TVIF_SELECTEDIMAGE + TVIF_CHILDREN
mov D[tvins.itemex.cChildren],FALSE
mov D[tvins.itemex.iImage],1
mov D[tvins.itemex.iSelectedImage],1
invoke SendMessage,[hImportTreeview],TVM_INSERTITEM,0,OFFSET tvins

jmp >

.ImportByOrdinal
mov edx,[esi]
and edx,0FFFFh
invoke wsprintf,offset szOrdinal,"Ordinal %u",edx
add esp,16

lea eax,szOrdinal
mov [tvins.itemex.pszText],eax
mov eax,[hParent]
mov [tvins.hParent],eax
mov D[tvins.itemex.lParam],FALSE
mov D[tvins.hInsertAfter],0
mov D[tvins.itemex.mask],TVIF_TEXT + TVIF_PARAM + TVIF_IMAGE + TVIF_SELECTEDIMAGE + TVIF_CHILDREN
mov D[tvins.itemex.cChildren],FALSE
mov D[tvins.itemex.iImage],1
mov D[tvins.itemex.iSelectedImage],1
invoke SendMessage,[hImportTreeview],TVM_INSERTITEM,0,OFFSET tvins

:
add esi,4
add ebx,6

I2:
// Be sure we don't go outside the bounds of the file
cmp esi,[bounds]; ebx
jg >>.BREAK
cmp D[esi],0
jne <<I1
add edi,sizeof IMAGE_IMPORT_DESCRIPTOR

L2:
cmp D[edi+IMAGE_IMPORT_DESCRIPTOR.OriginalFirstThunk],0
jne <<L1
cmp D[edi+IMAGE_IMPORT_DESCRIPTOR.TimeDateStamp],0
jne <<L1
cmp D[edi+IMAGE_IMPORT_DESCRIPTOR.ForwarderChain],0
jne <<L1
cmp D[edi+IMAGE_IMPORT_DESCRIPTOR.Name],0
jne <<L1
cmp D[edi+IMAGE_IMPORT_DESCRIPTOR.FirstThunk],0
jne <<L1
.BREAK

ret
ENDF

Find_rdata FRAME pMapFile
uses edi,esi,ebx

// Get a pointer to IMAGE_NT_HEADERS
mov edi,[pMapFile]
add edi,[edi+IMAGE_DOS_HEADER.e_lfanew]

movzx esi,W[edi+IMAGE_NT_HEADERS.FileHeader.NumberOfSections]

// Get the size of the otpional header and add it to EDI
movzx eax,W[edi+IMAGE_NT_HEADERS.FileHeader.SizeOfOptionalHeader]
add edi,eax
add edi,4 // Here's that stupid +4 again
add edi, SIZEOF IMAGE_FILE_HEADER

// EDI holds a memory pointer to the section table
// ESI holds the number of IMAGE_SECTION_HEADER entries in the table

:
invoke lstrcmpi,edi,".rdata"
jne >.NOTIT
mov eax,[edi+IMAGE_SECTION_HEADER.VirtualAddress]
ret
.NOTIT
add edi,SIZEOF IMAGE_SECTION_HEADER
dec esi
jnz <
:

xor eax,eax
RET
ENDF
Title: Re: Portable Executable import table
Post by: others111 on January 12, 2012, 02:48:01 PM
The reason why I use push push call is that I have to make the program using an older version of masm which I have attached using the link below.I compile the code using command lines : build_masm example.asm    and then run it typing  example   in command prompt

http://dl.transfer.ro/asm_tools-transfer_RO-12jan-fb0fe9.zip

I use PE Coeff_v8 to learn about what is inside a PE from MSDN and CFF Explorer or Far Manager to view hex.

Still I do not know where to go next to display those funtions my dlls are importing

I do not understand Iczelion's examples very good cause I am a beginner in assembly
Title: Re: Portable Executable import table
Post by: dedndave on January 12, 2012, 03:29:02 PM
that is MASM version 10
(which, by the way, i couldn't make work under XP - that one does   :P )

i think the INVOKE macro was introduced in version 6

you don't happen to have any of these files to go with that version of MASM, do you ?
lib.exe
dumpbin.exe
cvtres.exe
rc.exe
rc.dll
Title: Re: Portable Executable import table
Post by: others111 on January 12, 2012, 03:49:08 PM
No I do not have those files.

To compile a file in this version of masm one has to write the code in notepad then save it and change the extension to .asm.Next step would be to move the file in the masm_minimal folder and launch command prompt.In command prompt one has to change the path to the masm_minimal folder where the .asm file is and write build_masm example.asm to build it.
Title: Re: Portable Executable import table
Post by: dedndave on January 12, 2012, 04:03:41 PM
most of us know how to build a project using MASM   :P

what i have to ask is...
what are you trying to do ? - what is the goal of this project ?
why are you limited to that version of MASM, rather than using the Masm32 package

if you can successfully map the file
and you have looked at the PE/COFF spec
and use the code that Edgar posted
you should be able to list the names of the imported functions

these names appear in the EXE file, as it exists on the disk
they do not appear in memory of the loaded EXE, however
Title: Re: Portable Executable import table
Post by: qWord on January 12, 2012, 04:09:10 PM
Quote from: dedndave on January 12, 2012, 04:03:41 PMthey do not appear in memory of the loaded EXE, however
the names also exist at runtime in the import table - or what did you mean?
Title: Re: Portable Executable import table
Post by: jj2007 on January 12, 2012, 04:15:43 PM
Getting the address is not that difficult, see below. You know the forum rules, do you?  :bg

include \masm32\include\masm32rt.inc

.code
start: mov eax, @F+1 ; get the offset
mov ecx, [eax] ; get distance to jump table
mov eax, [eax+ecx+6] ; get address in location in .data
; mov eax, [eax] ; dereference it (or use call dword ptr [eax] below)
push MB_OK
push chr$("Title")
push chr$("Text")
push 0
call dword ptr [eax] ; use it ;-)
exit

@@: call MessageBoxA ; just an empty call
end start
Title: Re: Portable Executable import table
Post by: qWord on January 12, 2012, 04:19:16 PM
the following code enumerate all imports of specified module at runtime
include \masm32\include\masm32rt.inc
.code
main proc
LOCAL sz[256]:CHAR

mov ebx,rv(GetModuleHandle,0)
add eax,[ebx].IMAGE_DOS_HEADER.e_lfanew
lea esi,[eax].IMAGE_NT_HEADERS.OptionalHeader.DataDirectory[1*8]
mov eax,[esi].IMAGE_DATA_DIRECTORY.VirtualAddress
lea esi,[ebx+eax]
.while [esi].IMAGE_IMPORT_DESCRIPTOR.OriginalFirstThunk
mov edi,ebx
add edi,[esi].IMAGE_IMPORT_DESCRIPTOR.OriginalFirstThunk
.while DWORD ptr [edi]
.if !(DWORD ptr [edi] & 80000000h)
mov ecx,DWORD ptr [edi]
and ecx,7fffffffh
lea ecx,[ecx+ebx].IMAGE_IMPORT_BY_NAME.Name1

mov edx,[esi].IMAGE_IMPORT_DESCRIPTOR.Name1
lea edx,[edx+ebx]

fn wsprintf,ADDR sz,"%-30.30s @ %s",ecx,edx
print ADDR sz,13,10
.endif
lea edi,[edi+4]
.endw
lea esi,[esi+SIZEOF IMAGE_IMPORT_DESCRIPTOR]
.endw

inkey
exit
main endp
end main
Title: Re: Portable Executable import table
Post by: jj2007 on January 12, 2012, 04:27:38 PM
Quote from: qWord on January 12, 2012, 04:19:16 PM
the following code enumerate all imports of specified module at runtime

Very cute :U
Title: Re: Portable Executable import table
Post by: others111 on January 12, 2012, 04:54:43 PM
how could I translate these codes in masm 1?
Title: Re: Portable Executable import table
Post by: qWord on January 12, 2012, 05:15:36 PM
you are using ml version 10! (->visual studio 2010)
All you need are the structure definitions which can be obtained through the masm32-package or japhet's WinInc-project (http://www.japheth.de/WinInc.html).
Title: Re: Portable Executable import table
Post by: dedndave on January 12, 2012, 06:31:01 PM
others111,

what are you trying to do ? - what is the goal of this project ?
why are you limited to that version of MASM, rather than using the Masm32 package ?
why are you limited to using only kernel32.lib and msvcrt.lib ?

wsprintf is in user32.lib   :P
although, it can probably be avoided

we can help you if we have the required information
Title: Re: Portable Executable import table
Post by: others111 on January 12, 2012, 07:22:43 PM
The goal of this project: for every DLL which my file ex:vlc.exe imports functions, display the name of the DLL and the name of the function imported

requirements:win32 functions (CreateFile, ReadFile, CloseHandle..the ones I used above)

I have to use this old version of masm because my teacher from assembly language laboratory requested this old program for work.
Title: Re: Portable Executable import table
Post by: dedndave on January 12, 2012, 07:46:51 PM
ok - very good
however, that version of MASM is quite new
i understand what you are trying to do

qWord's program is very cool   :U
i have modified his code to use no INC files or Masm32 library - and it is working
all that's left is to eliminate the wsprintf call and format the output
give me a little time...
Title: Re: Portable Executable import table
Post by: others111 on January 12, 2012, 08:03:51 PM
:)
Title: Re: Portable Executable import table
Post by: dedndave on January 12, 2012, 08:53:24 PM
give this a try...

notice that msvcrt.lib is not needed   :P

you can delete this line:
        INCLUDELIB msvcrt.lib
Title: Re: Portable Executable import table
Post by: qWord on January 12, 2012, 09:17:57 PM
just to make it clear: my example pars the PE after the loader has modified it. Donkey's or Iczelion's examples show how to pars a unmodified image.
Title: Re: Portable Executable import table
Post by: dedndave on January 12, 2012, 09:26:04 PM
very nice, qWord   :U

that would make a great error reporting routine   :bg
Title: Re: Portable Executable import table
Post by: others111 on January 12, 2012, 09:40:26 PM
When I launch the program I receive what I attached to this post.The code appears to be complicated to me,but I was told to use the RVA function to move around,which it is written in the COEFF file.I used libview program to view the functions from  kernel32.lib which have @name at the end

.386
.model flat, stdcall

includelib msvcrt.lib
includelib kernel32.lib

extern printf             :proc
extern scanf            :proc
extern CreateFileA@28                  :proc
extern CreateFileMappingA@24                 :proc
extern MapViewOfFile@20      :proc
extern CloseHandle@4                   :proc
extern SetFilePointer@16                           :proc
extern ReadFile@20         :proc
extern exit                     :proc

public start

.data
FileName db "c:\vlc.exe"                                         ;address for the file to be mapped               
hFile dword ?                              ;handle  CreateFile
hFileMapping dword ?                                            ;handle  CreateFileMapping
namee  db  "vlc"                                                   ;name for the mapped file
position dword 0   
 
format db "%x", 0
 
.code
start:

        push 0                                                                  ;Handle to template file with Generic_Read access right 
        push 0                                                                  ;Attributes 80h --> FILE_ATTRIBUTE_NORMAL
        push 3                                     ; 3->create new if it does not exist
        push 0                                   ;Security:NULL
        push 1h                                          ;dwShareMode
        push 80000000h OR 40000000h                     ;ACCESS   --> GENERIC_READ OR GENERIC_WRITE 
        push offset FileName                         ;address for the file to be created
        call CreateFileA@28   
        mov  hFile,eax   
                       
      push offset namee
      push 0
      push 0                           
      push 2             ;4 --> ReadWrite | 2 --> ReadOnly
      push 0
      push hFile
      call CreateFileMappingA@24
      mov  hFileMapping,eax
     
      push 0
      push 0                             
      push 0
      push 4
      push hFileMapping
      call MapViewOfFile@20   

      xor  ebx,ebx                     
     
      mov  bx,word ptr [eax+220h]
      mov  position,ebx
     
      push position
      push offset format
      call printf
     
      ;push 0
      ;push 0
      ;push position
      ;push hFile
      ;call SetFilePointer@16
      ;mov memptr,eax
     
       
   ;call exit function
   push 0
   call exit
end start

When I added 220h to eax I am at the .idata position. Now somehow I have to see what  is in that .idata I think using the RVA function, this is at what I am stuck and I can`t get further.

I can tell that I am at that position cause I use a hex editor.
Title: Re: Portable Executable import table
Post by: baltoro on January 12, 2012, 10:15:32 PM
About a year ago, I wrote a program to display a huge amount of information about a selected Portable Executable, and, I based it on the description found in this article: 
Peering Inside the PE: A Tour of the Win32 Portable Executable File Format, Matt Pietrek, MSDN, 1994 (http://msdn.microsoft.com/en-us/library/ms809762.aspx)
Title: Re: Portable Executable import table
Post by: others111 on January 14, 2012, 06:36:50 PM
I started to look deeply into the PE doc from MSDN to build the program myself.However I have a question how do I find the raw offset of something in the PE ? I need to calculate the file offset which has this equation : file offset= RVA-virtual offset + raw data
Title: Re: Portable Executable import table
Post by: clive on January 14, 2012, 09:09:36 PM
Quote from: others111 on January 14, 2012, 06:36:50 PM
I started to look deeply into the PE doc from MSDN to build the program myself.However I have a question how do I find the raw offset of something in the PE ? I need to calculate the file offset which has this equation : file offset= RVA-virtual offset + raw data

You have to traverse the sections, the Section Table provides the data to translate a virtual address into a file offset. Some addresses will fall outside that physically backed by data on the media. Some sections may be devoid of any data.
Title: Re: Portable Executable import table
Post by: others111 on January 15, 2012, 11:48:45 AM
thank you

How can I traverse the PE file? can I use SetFilePointer function to do this?
Title: Re: Portable Executable import table
Post by: others111 on January 15, 2012, 12:34:54 PM
                        push 0
      push 0
      push 5045h
      push hFile
      call SetFilePointer@16   

if I write this,is the pointer going to be set at the PE location in hex ? 
Title: Re: Portable Executable import table
Post by: clive on January 16, 2012, 03:56:20 AM
Huh? What would be at 5045h ('PE')?

You have a mapped view of the file in memory, would you not just index through the data structures in memory directly? Sure, if you are working with a file you can move the file pointer around and use ReadFile() to pull in various chunks of data. To do so however you need to understand where they are situated, and how large they are.

The more basic problem here is that you don't seem to understand the file/data structures. If the complexity here comes from the use of assembly, then try to implement this in a language you are familiar with first.

To find the PE header you need to examine the DOS 'MZ' EXE header, pulling an offset from 0x3C. Once you have the offset to the PE header you can extract information about it's size, and details about the sections and directories it contains.