Jump to content
Tuts 4 You

Easy Unpackme Enigma 5.6


Go to solution Solved by FeliXW,

Recommended Posts

Posted (edited)

Difficulty : 0
Language : free pascal /Lazarus IDE x86
Platform : Windows X86
OS Version : XP and above
Packer / Protector : Enigma Protector 5.6

Description :

Small unpackme for do a simple tutorial
 

maybe is easy, but i hope there you too can do tutorial :)

BR, APuromafo

Silver= unpacked.exe
Bronce=unpacked +tutorial 
Gold=unpacked+tutorial+script 


PID scan:
Scanning -> C:\project1_protected.exe
File Type : 32-Bit Exe (Subsystem : Win GUI / 2), Size : 6942172 (069EDDCh) Byte(s) | Machine: 0x14C (I386)
Compilation TimeStamp : 0x00000000 -> Thu 01st Jan 1970 00:00:00 (GMT)
-> File has 933852 (0E3FDCh) bytes of appended data starting at offset 05BAE00h
[File Heuristics] -> Flag #1 : 00000000000001011100000100100111 (0x0005C127)
[Entrypoint Section Entropy] : 7.97 (section #10) ".data   " | Size : 0x1D9000 (1937408) byte(s)
[DllCharacteristics] -> Flag : (0x0000) -> NONE
[SectionCount] 11 (0xB) | ImageSize 0x1652000 (23404544) byte(s)
[Export] 0% of function(s) (0 of 1) are in file | 0 are forwarded | 0 code | 0 data | 0 uninit data | 0 unknown | 
[ModuleReport] [IAT] Modules -> kernel32.dll | user32.dll | advapi32.dll | oleaut32.dll | gdi32.dll | shell32.dll | version.dll | comctl32.dll | ole32.dll
[Taggant Info] Record @ file offset 0x003E1E00
Length : 0x3000 (12288) byte(s)  | CMSLength : 0x1ABA (6842) | Version : 1
PackerId found : 0x00000001 (1) | Enigma Protector V 5.60 Build 0 (reserved 0)
[!] Enigma Protector V 5.60 Build 0 (reserved 0) detected !
- Scan Took : 0.93 Second(s) [00000005Dh (93) tick(s)] [12 of 580 scan(s) done]


Screen Shoot
initial:
2017-02-26_225320.jpg.8ccd8434594536813df6d8e6270e98ce.jpg

when check the checkbox
2017-02-26_225434.jpg.a3b89e5bb6303d2fd3d149c33e3c4780.jpg

if check Again :

 

2017-02-26_225443.jpg.c484ca4b57853e76921ec2277ad983ea.jpg

Link of file Simple Packed:project1_protected.rar

Edited by Apuromafo
update :)
  • Like 1
Posted (edited)

@BambooQJ I can not understand where I can see a real api

00401000  - FF25 F86B5B00   JMP DWORD PTR DS:[5B6BF8]
00401010  - FF25 FC6B5B00   JMP DWORD PTR DS:[5B6BFC]
00401020  - FF25 006C5B00   JMP DWORD PTR DS:[5B6C00]
etc.

The rest is understandable from old versions enigma.

Edited by converse
Posted

Take a look at the tutorial. You'll find something new

Posted

@BambooQJ

I watched this tutorial, there are only finding a api under the vm

Posted
9 hours ago, converse said:

@BambooQJ

I watched this tutorial, there are only finding a api under the vm

Be patient, my friend...CTRL+L  You'll find something new

Posted

Hi,

So it's very new Enigma version.

I still can't find how to reach the OEP properly.

I found a trick for reaching OEP but it's just for protected file which using VM RISC protection core, no matter if it's virtualized OEP or not.

And this unpackme uses it.

The script I use for reaching OEP by ramjane is here.

Put script bp at line 48;

45     ramjane:
46      cmp eax,0
47      jne ramjane1
48      esto

when stopped at that line, we need to step script line carefully (press TAB).
stepping "esto" command again and again.
if olly seems taking long time to execute esto command, then Set break-on-access F2 on code section.
press F9/run. we will land at OEP.

this trick can find OEP for this Unpackme and GIV's unpackme (original version 5.4 here).

it fails finding OEP if target use non-VM RISC protection core (like in DEMO 5.5).

fixing IAT still same. using SHADOWS_UA's tutorial in here.

I'm sorry if my explanation is quite messy. I hope you'll understand.

 

 

Salam.

project1_protected_unpacked.rar

  • Like 2
Posted (edited)

nice, many unpacked for easy version, next will send a medim version :)

BR , Apuromafo

note:BambooQJ,icarusdc unpacked run fine :D

BambooQJ was done a tut recent: 

 

Edited by Apuromafo
updated with solutions...
  • 2 weeks later...
Posted

@BambooQJ @icarusdc

I have a question, looking forward to your help

I use a short script of the author LCF-AT : "Simple script which dumps the VM.txt" and changed the OEP and the VA in the script available. And very easily after that I get file "VM DUMP" to add section in the target unpacked, target test works perfectly on WIN XP SP2 X86, WIN 7 X76. But after reboot Windows 7 x86, target run "CRASH" Try dump file VM, I see addresses have been changed. WIN XP SP2 not change address DUMP VM.

That's is what I encountered, please help. Sorry for my language english is very bad.

 

GautamGreat
Posted
1 hour ago, dangducluan said:

@BambooQJ @icarusdc

I have a question, looking forward to your help

I use a short script of the author LCF-AT : "Simple script which dumps the VM.txt" and changed the OEP and the VA in the script available. And very easily after that I get file "VM DUMP" to add section in the target unpacked, target test works perfectly on WIN XP SP2 X86, WIN 7 X76. But after reboot Windows 7 x86, target run "CRASH" Try dump file VM, I see addresses have been changed. WIN XP SP2 not change address DUMP VM.

That's is what I encountered, please help. Sorry for my language english is very bad.

 

Hi,

you didn't patched some api in your unpacked file. You have to patch it. Already mentioned by LCF-AT in this thread

https://forum.tuts4you.com/topic/38285-enigma-protector-52/


 

  • Like 1
Posted (edited)
2 hours ago, ramjane said:

Hi,

you didn't patched some api in your unpacked file. You have to patch it. Already mentioned by LCF-AT in this thread

https://forum.tuts4you.com/topic/38285-enigma-protector-52/

Hi, Thank you for replying to me :)

Sorry, I have followed topic you sent me and still do not understand what you mean?

I do manual editing and using scripting Shadow fix API. After dump, I think if I do not edit the fully api the target will not RUN, software is "Crash" when I reboot windows.

Can make a short video tutorial patched api file unpacked?

Edited by dangducluan
Posted

Hi @dangducluan

have you saved the IAT tree before using VM-dumping-script?

if so, then you'll just need to fix Windows API inside Enigma Section as what ramjane mentioned.

 

 

Salam.

Posted

Hi,

if your unpacked file can't run fine first time run after unpacking, then there will be other checks that you need to fix manually.

it maybe from Enigma or the app itself. it's your job to find what it is. I guess it will be cracking instead of unpacking.

but if your unpacked file can run fine for first time run and crash after rebooting, then you'll need to fix API inside Enigma section.

 

Salam.

  • Like 1
Posted
5 minutes ago, icarusdc said:

Hi,

if your unpacked file can't run fine first time run after unpacking, then there will be other checks that you need to fix manually.

it maybe from Enigma or the app itself. it's your job to find what it is. I guess it will be cracking instead of unpacking.

but if your unpacked file can run fine for first time run and crash after rebooting, then you'll need to fix API inside Enigma section.

 

Salam.

File unpacked can run  after unpacking, you can see my video. How to fix API inside Enigma section? My friend :)

Posted

Hi,

seriuously your unpacked file run after unpacking?

I thought I saw it terminated and then you reload it.

 

Salam.

  • 2 weeks later...
  • Solution
Posted

This file is so easy, i finded oep, fixed enigma iat virtualization, dumped, and fixed. Works fine, exe optimized to 3 mb

If you have some questions about unpacking enigma, cisc vm dumping and risc vm dumping, contact my by using:
Jabber: julia.pcret@exploit.im
Telegram: @julia_pcret (https://t.me/julia_pcret)

P.S. All functions in file works fine, tested on Windows XP

project1_protected_dumped.exe

  • Like 2

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...