Posted January 3, 20214 yr DNGuard HVM v3.97 This file is protected using DNGuard HVM 3.97. Protections used : HVM Jit Challenge is to unpack and post details of methods used. File Information Submitter 0x59 Submitted 01/02/2021 Category UnPackMe (.NET) View File
January 3, 20214 yr Author I found a way to turn on HVM on trial edition So , it will show "this can't be run on this pc"
January 3, 20214 yr Console.WriteLine("Hello"); Console.WriteLine("This is unpackme"); Console.ReadKey();
January 3, 20214 yr Author On 1/3/2021 at 7:03 AM, AzoresRCE said: Console.WriteLine("Hello"); Console.WriteLine("This is unpackme"); Console.ReadKey(); He solve the challenge but moderators deleted his post Edited January 6, 20214 yr by 0x59
January 3, 20214 yr 1 hour ago, 0x59 said: omfg u made me laugh everyone know the code is like that but u have to unpack it or if u realy unpacked it send unpacked file HVM.exe
January 4, 20214 yr Author 18 hours ago, AzoresRCE said: HVM.exe 4.5 kB · 3 downloads great job. try v2
August 28, 20213 yr Solution Both of Your Challenges are Unpacked Successfully. How to Unpack ? Spoiler Now DNGuard use VMP as wrapper if you protect the EXE. So Run the File and Dump the Module from Memory along with the Runtime DLL. Analyze the DLL for further Actions. DNG do not use VMP VM. In case of C#, They simply protect the assembly wit their functions and then put fake layer of C++ Native and wrapped it in VMP. You need to Hook the JIT Code at Runtime by executing the file. Now Detect the Method Bodies in JIT and Read it with .Net Libraries, Your main work is to restore the value of Instructions but Here is a catch that Method Tokens are encrypted/locked in HVM Version. You need to Analyze and understand the Runtime.dll to Restore the value. You can Restore the Original and Remove proxy by analyzing the methods after devirting. Strings are also encrypted but just Invoke static string methods in "ZYXDNGuarder" and restore those with Original Value. Decrypt HVM Token and the Offset Value of HVM Table --> Parse their Structure Schema and Read HVM Table At Last Read Methods after detecting those and append in your Main Assembly. Proof - Spoiler HVM-hvm.exe HVM-cleaned_debug.exe
August 30, 20213 yr On 8/29/2021 at 5:23 AM, BlackHat said: Both of Your Challenges are Unpacked Successfully. How to Unpack ? Hide contents Now DNGuard use VMP as wrapper if you protect the EXE. So Run the File and Dump the Module from Memory along with the Runtime DLL. Analyze the DLL for further Actions. DNG do not use VMP VM. In case of C#, They simply protect the assembly wit their functions and then put fake layer of C++ Native and wrapped it in VMP. You need to Hook the JIT Code at Runtime by executing the file. Now Detect the Method Bodies in JIT and Read it with .Net Libraries, Your main work is to restore the value of Instructions but Here is a catch that Method Tokens are encrypted/locked in HVM Version. You need to Analyze and understand the Runtime.dll to Restore the value. You can Restore the Original and Remove proxy by analyzing the methods after devirting. Strings are also encrypted but just Invoke static string methods in "ZYXDNGuarder" and restore those with Original Value. Decrypt HVM Token and the Offset Value of HVM Table --> Parse their Structure Schema and Read HVM Table At Last Read Methods after detecting those and append in your Main Assembly. Proof - Hide contents HVM-hvm.exe 3 kB · 3 downloads HVM-cleaned_debug.exe 4.5 kB · 2 downloads Can you tell me more about how to analyze the Runtime.dll? Thank you. I dumped the exe file and the managed runtime DNRuntime.dll. The DNRuntime.dll imports a function named VMRuntime from kernel32.dll. I guess it renamed the native runtime module to kernel32.dll, but I didn't find the extra kernel32.dll module in the module list of the process. What am I doing wrong? Edited September 1, 20213 yr by DemonW Describe my problem in detail
May 21May 21 On 8/30/2021 at 11:05 AM, DemonW said: Can you tell me more about how to analyze the Runtime.dll? Thank you. I dumped the exe file and the managed runtime DNRuntime.dll. The DNRuntime.dll imports a function named VMRuntime from kernel32.dll. I guess it renamed the native runtime module to kernel32.dll, but I didn't find the extra kernel32.dll module in the module list of the process. What am I doing wrong? On 8/30/2021 at 11:05 AM, DemonW said: Can you tell me more about how to analyze the Runtime.dll? Thank you. I dumped the exe file and the managed runtime DNRuntime.dll. The DNRuntime.dll imports a function named VMRuntime from kernel32.dll. I guess it renamed the native runtime module to kernel32.dll, but I didn't find the extra kernel32.dll module in the module list of the process. What am I doing wrong? i have the same problem as you
Create an account or sign in to comment