Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

reopening | jmp in memory allocation : "Could not get module base" #64 #94

Open
Kojuda opened this issue Jul 4, 2022 · 0 comments
Open

Comments

@Kojuda
Copy link

Kojuda commented Jul 4, 2022

Hi !

I just wanted to find a solution to a previous issue #64, so there is the thing (I have tried the proposed solution). I have a malware with a injected PE into another process (explorer.exe). There is a hook at the entry point of explorer.exe to jump inside a memory region allocated to this injected PE. I want to debug this PE inside explorer.exe because there are some messages handling with the malicious injector process.

I have tried several ways to be able to debug the extracted injected PE file :

- Loading the injected PE as segment at the same loading offset inside an IDB of the victim process (explorer.exe).
- Create a IDB with the extracted injected PE with the same base address and the same name of the debugged process in x64dbg
- Load the injected PE as an external binary inside the extracted process in IDA.

I have extracted all of them with PE-Sieve that gives the better results. The mentioned commands above don't prevent the error message "Could not get module base..."

I don't know how to handle this since a need to debug the running victim process.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant