A forum for reverse engineering, OS internals and malware analysis 

All off-topic discussion goes here.
 #19022  by Vrtule
 Sun Apr 21, 2013 10:13 am
Hello,

I know that the Rundll32 program allows anybody to execute a function exported by a dynamic link library (DLL). The syntax of the command is the following:
Code: Select all
RunDll32 <DllName>,<FunctionName> <StringsPassedToTheDll>
I thought the DllName argument must point to a valid dynamic link library file. However, I recently found RunDll32 command where the argument pointed to a binary file. The binary file contained only a number written as unicode (wide character) string.

Does anybody have any information about using the RunDll32 with this "type" of the RunDll argument?

Thanks in advance
 #19024  by EP_X0FF
 Sun Apr 21, 2013 1:15 pm
Example of command and file content.
 #19026  by Vrtule
 Sun Apr 21, 2013 2:39 pm
Hello,

the command is:
Code: Select all
rundll32 C:\Users\Martin\AppData\Roaming\PkgMgrr.dll,Okheh
and conent of the PkgMgrr.dll file is (in hex):
Code: Select all
00: 31 00 33 00 31 00 33 00 39 00 31 00 34 00 30 00 
10: 33 00 39 00