hiiii, this is a question in the field of malware development, i want to ask about a possibility of a technique i thought of, i want to know if it is possible or not, so if we got a loader.exe and a payload.dll, in which the payload.dll contains the shellcode we want to execute, and the loader.exe loads this .dll file into the memory…
is there a way to place the loader’s code inside another legit .dll file inside windows,
for example to inject the following line “PayloadDLL = LoadLibrary(L"Payload.dll”);"
that is takin from the loader.exe and place it inside a function like CreateProcess();
so that when CreateProcess() is called, the following line will be called too “PayloadDLL = LoadLibrary(L"Payload.dll”);"…
the idea here is to load my payload.dll from another .dll file, it can be something different from User32.dll or Kernel32.dll or whatever.
i read an article about a malware that infected a software engineering company, the malware waited for a specific function to be launched and then started executing its code, everyday it did the same…
i dont know that much about api hooking but i can say that i know the basics, the idea may be the same,idk, but we are not unhooking our code at the end.
does this idea about api functions injection work? and thank you !!!