Yesterday , a friend asked me to provide him an example of how an executable can modify its own code. So I decided to share this piece of code for people who might be interested to have a basic idea on how it works.
Self modification code technique is mostly combined with polymorphic code . So the executable will modify the instruction but the algorithm will stay the same.
In this example , there's no polymorphic code because it needs a well built decryption algorithm so the code will do the same mission as before.
The following code will simply display the word "HELLO" in the console after decrypting the instructions.
Syntax : MASM.
See you very soon , with a 64-bit executable crash analysis blog post.