Windows APIs are so powerful that windows programmers will merely use third-party libraries.
Types and Hungarian Notation
Handles are items that have been opened or created in the OS. like window, process, module, menu, file. Like pointers in that they refer an object location in the memory.
Unlike pointers tho, handles cannot be used in arithmetic operations, and they do not always represent the object's address.
The only thing you can do with a handle is store it and use it in a later function call to refer to the same object.
CreateFile(dwCreationDisposition)- the parameter controls whether the CreateFile function create a new file or open a existing one.
ReadFile and WriteFile.
CreateFileMapping and MapViewOfFile
The program using these functions can easily load a file into memory and read and write anywhere in the file. it is handy when parsing a file format, because you can easily jump to different memory addresses.
File mappings are commonly used to replicate the functionality of the Windows loader. After obtaining a map of the file, the malware can parse the PE header and make all necessary changes to the file in memory, thereby causing the PE file to be executed as if it had been loaded by the OS loader.
Shared Files.
File Accessible via Namespaces.
Alternate Data Streams
The Windows registry is used to store OS and program configuration information, such as settings and options. Like the file system, it is a good source of host-based indicators and can reveal useful information about the malware’s functionality.
Key terms:
Malware usually will utilize these functions to edit the reg keys.
almost identical on Windows and UNIX system.
Berkeley compatible sockets’ network functionality in Windows is implemented in the Winsock libraries, primarily in ws2_32.dll. Of these, the socket, connect, bind, listen, accept, send, and recv functions are the most common, and these are described in Table 7-2.
there is a higher-level API called the WinINet API. The WinINet API functions are stored in Wininet.dll. If a program imports functions from this DLL, it’s using higher-level networking APIs.
The WinINet API implements protocols, such as HTTP and FTP, at the application layer. You can gain an understanding of what malware is doing based on the connections that it opens.
Processes can share memory addresses, and they often do. For example, if one process stores something at memory address 0x00400000, another can store something at that address, and the processes will not conflict. The addresses are the same, but the physical memory that stores the data is not the same.
Malware will often create a new process by storing one program inside another in the resource section. In Chapter 1, we discuss how the resource section of the PE file can store any file. Malware will sometimes store another executable in the resource section.
when one thread is running. it has complte control of the CPU or CPU core.the others cannot affect the state of the CPU(registers).
Before it switches to another thread, it will save all registers values in a structure called Thread Context. The OS then loads the thread context of a new thread into the CPU and executes the new thread.
CreateThread function (processthreadsapi.h) - Win32 apps
Note: ThreadFunction1:
Note: ThreadFunction2