Viruses in Windows
(Data Fellows)


It has taken surprisingly long for the first Windows specific viruses to appear. The main reason for this is the difficulty of Windows programming, which is much more demanding than DOS programming. In addition, the Windows file structure is more complex than that of normal DOS files. It will be, however, only a matter of time before virus programmers gain sufficient knowledge on Windows programming. The first Windows viruses have, in fact, already been found.

Windows is more vulnerable to viruses than OS/2 because the functional parts of a DOS virus do not have to be modified for the virus to work under Windows. Under OS/2, the code would have to be written practically from scratch. The only parts of a DOS virus that have to be changed to work under Windows are the infection mechanism and activation routine.

The Structure of Windows Applications

Windows and DOS programs have a different internal structure. Both begin with MS-DOSïs MZ header that enables DOS to read and execute the program. In Windows applications, the MZ header consists of a short reference to a routine that is run when the program is executed from MS-DOS. ("This program requires Microsoft Windows") The header also includes the disk address for the Windows header (NE header).

The Windows NE header (New Executable) is actually same as the one used for OS/2 applications. The NE header does not have a set location in a program file. Instead, its location is given in the MZ header.

Windows also supports other kinds of headers:

A Windows application gives a virus better hiding places than DOS applications. One example is ordinary dynamic libraries that can be given any kind of file name extension. The files that can contain executable code (and viruses on the side, of course) can no longer be recognized by their extensions. In addition to the ordinary EXE files, a virus can infect also font files or display drivers.

The Execution of an Application and Interrupts

Under Windows, the execution of an application is done by calling the WinExec()-function. The function generates the following interrupt call:

The same interrupt is used in MS-DOS. An MS-DOS application that is watching the interrupts does not see the interrupt, however. Instead the following interrupt is seen:

What is the reason for this?

Windows is a DOS extender that functions in protected mode. It uses Int 21h calls in protected mode. Due to the fact that DOS can not execute protected mode applications Windowsï DOS extender (WIN386.EXE or DOSX.EXE) provides its own implementation of the EXEC. The EXEC of the extender uses DOS file services to read an application to memory.

Kernel

The Windows environment is at its most vulnerable during the bootstrap process. The Windows kernel does not have its own file management functions and uses DOS services (Int 21h).

The kernel manages the Windows bootstrap even if it has an NE header. The process is as follows:

The Functional Mechanisms of Viruses in Windows

It has taken a long time for the first Windows specific viruses to be written. There have, however, been several DOS viruses that infect Windows applications. The most probable result of such an infection is that the Windows application can not be executed any more.

The reason for this is that the virus writer has not taken into account the possibility of an abnormal header. Some of the more advanced viruses have been able to infect the MS-DOS stub. The execution of a Windows application infected with such a virus results in the activation of the virus. This works only when an attempt has been made to execute the Windows application from MS-DOS.

Even a virus of this kind would not spread under Windows. It would function only in MS-DOS.

The writing of a direct action virus for Windows is technically more challenging than writing a similar MS-DOS virus. Unfortunately, a Windows virus can be built by modifying the infection mechanism of an existing DOS virus. The structure of the NE header will have to be taken into account, of course, which makes the programming of a Windows virus a little more difficult. The first virus like this was found in September 1992 (WinVir).

The programming of a Windows virus functioning as background process (the equivalent of a DOS TSR) is much more difficult. The Windows memory protection scheme makes it harder for programs to modify memory areas reserved for other applications. Protections like this do not exist in MS-DOS at the moment.

Memory protection gives no shelter against viruses because very few virus writers have used techniques like this even in DOS.

A special development toolkit exists for the designing of device drivers. DDK (Device Driver Kit) gives the programmer free reign in the computer with no limitations. The most dangerous Windows viruses will probably be written with the DDK.

The use of OLE (Object Linking and Embedding) generates interesting possibilities on virus infection. With OLE it is possible to include executable code in documents. This means that we will some day have to check documents for viruses as well as programs.