@H_301_2@在系统里User32.dll,kernel32.dll,shell32.dll,gdi32.dll,rpcrt4.dll,comctl32.dll,advapi32.dll,version.dll等dll代表了Win32 API的基本提供者。Win32 API中的所有调用最终都转向了ntdll.dll,再由它转发至ntoskrnl.exe。ntdll.dll是本机 API用户模式的终端。真正的接口在ntoskrnl.exe里完成。事实上,内核模式的驱动大部分时间调用这个模块,如果它们请求系统服务。Ntdll.dll的主要作用就是让内核函数的特定子集可以被用户模式下运行的程序调用。Ntdll.dll通过软件中断int 2Eh进入ntoskrnl.exe,就是通过中断门切换cpu特权级。比如kernel32.dll导出的函数DeviceIoControl()实际上调用ntdll.dll中导出的NtDeviceIoControlFile(),反汇编一下这个函数可以看到,EAX载入magic数0x38,实际上是系统调用号,然后EDX指向堆栈。目标地址是当前堆栈指针ESP+4,所以EDX指向返回地址后面一个,也就是指向在进入NtDeviceIoControlFile()之前存入堆栈的东西。事实上就是函数的参数。下一个指令是int 2Eh,转到中断描述符表IDT位置0x2E处的中断处理程序。 @H_301_2@下面就来分析怎么样加载NTDLL.DLL,具体实现代码始下: @H_301_2@#001 NTSTATUS @H_301_2@#002 NTAPI @H_301_2@#003 PsLocateSystemDll(VOID) @H_301_2@#004 { @H_301_2@#005 OBJECT_ATTRIBUTES ObjectAttributes; @H_301_2@#006 IO_STATUS_BLOCK IoStatusBlock; @H_301_2@#007 HANDLE FileHandle,SectionHandle; @H_301_2@#008 NTSTATUS Status; @H_301_2@#009 ULONG_PTR HardErrorParameters; @H_301_2@#010 ULONG HardErrorResponse; @H_301_2@#011 @H_301_2@ @H_301_2@初始化NTDLL.DLL的对象,其中PsNtDllPathName是它的名称//SystemRoot//system32//ntdll.dll。在前面已经把系统路径设置好了。 @H_301_2@#012 /* Locate and open NTDLL to determine ImageBase and LdrStartup */ @H_301_2@#013 InitializeObjectAttributes(&ObjectAttributes, @H_301_2@#014 &PsNtDllPathName, @H_301_2@#015 0, @H_301_2@#016 NULL, @H_301_2@#017 NULL); @H_301_2@ @H_301_2@打开文件NTDLL.DLL。 @H_301_2@#018 Status = ZwOpenFile(&FileHandle, @H_301_2@#019 FILE_READ_ACCESS, @H_301_2@#020 &ObjectAttributes, @H_301_2@#021 &IoStatusBlock, @H_301_2@#022 FILE_SHARE_READ, @H_301_2@#023 0); @H_301_2@#024 if (!NT_SUCCESS(Status)) @H_301_2@#025 { @H_301_2@#026 /* Failed,bugcheck */ @H_301_2@#027 KeBugCheckEx(PROCESS1_INITIALIZATION_Failed,Status,2,0); @H_301_2@#028 } @H_301_2@#029 @H_301_2@ @H_301_2@检查NTDLL.DLL文件是否合法。 @H_301_2@#030 /* Check if the image is valid */ @H_301_2@#031 Status = MmCheckSystemImage(FileHandle,TRUE); @H_301_2@#032 if (Status == STATUS_IMAGE_CHECKSUM_MISMATCH) @H_301_2@#033 { @H_301_2@#034 /* Raise a hard error */ @H_301_2@#035 HardErrorParameters = (ULONG_PTR)&PsNtDllPathName; @H_301_2@#036 NtRaiseHardError(Status, @H_301_2@#037 1, @H_301_2@#038 1, @H_301_2@#039 &HardErrorParameters, @H_301_2@#040 OptionOk, @H_301_2@#041 &HardErrorResponse); @H_301_2@#042 return Status; @H_301_2@#043 } @H_301_2@#044 @H_301_2@ @H_301_2@为NTDLL.DLL文件创建代码和数据段。 @H_301_2@#045 /* Create a section for NTDLL */ @H_301_2@#046 Status = ZwCreateSection(&SectionHandle, @H_301_2@#047 SECTION_ALL_ACCESS, @H_301_2@#048 NULL, @H_301_2@#049 NULL, @H_301_2@#050 PAGE_EXECUTE, @H_301_2@#051 SEC_IMAGE, @H_301_2@#052 FileHandle); @H_301_2@#053 ZwClose(FileHandle); @H_301_2@#054 if (!NT_SUCCESS(Status)) @H_301_2@#055 { @H_301_2@#056 /* Failed,bugcheck */ @H_301_2@#057 KeBugCheckEx(PROCESS1_INITIALIZATION_Failed,3,0); @H_301_2@#058 } @H_301_2@#059 @H_301_2@ @H_301_2@添加引用段对象。 @H_301_2@#060 /* Reference the Section */ @H_301_2@#061 Status = ObReferenceObjectByHandle(SectionHandle, @H_301_2@#062 SECTION_ALL_ACCESS, @H_301_2@#063 MmSectionObjectType, @H_301_2@#064 KernelMode, @H_301_2@#065 (PVOID*)&PspSystemDllSection, @H_301_2@#066 NULL); @H_301_2@#067 ZwClose(SectionHandle); @H_301_2@#068 if (!NT_SUCCESS(Status)) @H_301_2@#069 { @H_301_2@#070 /* Failed,bugcheck */ @H_301_2@#071 KeBugCheckEx(PROCESS1_INITIALIZATION_Failed,4,0); @H_301_2@#072 } @H_301_2@#073 @H_301_2@ @H_301_2@ 把NTDLL.DLL映射到内核空间。PspSystemDllBase是动态连接库的基地址。 @H_301_2@#074 /* Map it */ @H_301_2@#075 Status = PspMapSystemDll(PsGetCurrentProcess(),&PspSystemDllBase,FALSE); @H_301_2@#076 if (!NT_SUCCESS(Status)) @H_301_2@#077 { @H_301_2@#078 /* Failed,bugcheck */ @H_301_2@#079 KeBugCheckEx(PROCESS1_INITIALIZATION_Failed,5,0); @H_301_2@#080 } @H_301_2@#081 @H_301_2@#082 /* Return status */ @H_301_2@#083 return Status; @H_301_2@#084}