SkillAgentSearch skills...

Jmp2it

Transfer EIP control to shellcode during malware analysis investigation

Install / Use

/learn @adamkramer/Jmp2it
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

** JMP2IT v1.4 - Created by Adam Kramer [2014] - Inspired by Malhost-Setup **

This will allow you to transfer EIP control to a specified offset within a file containing shellcode and then pause to support a malware analysis investigation

The file will be mapped to memory and maintain a handle, allowing shellcode to egghunt for second stage payload as would have happened in original loader

Patches / self modifications are dynamically written to jmp2it-flypaper.out

Usage: jmp2it.exe [file containing shellcode] [file offset to transfer EIP to]

Example: jmp2it.exe malware.doc 0x15C

Explaination: The file will be mapped and code at 0x15C will immediately run

Example: jmp2it.exe malware.doc 0x15C pause

Explaination: As above, with JMP SHORT 0xFE inserted pre-offset causing loop

Example: jmp2it.exe malware.doc 0x15C addhandle another.doc pause

Explaination: As above, but will create additional handle to specified file

Optional extras (to be added after first two parameters):

addhandle [path to file] - Create an arbatory handle to a specified file

Only one of the following two may be used:

pause - Inserts JMP SHORT 0xFE just before offset causing infinite loop

pause_int3 - Inserts INT3 just before offset [launch via debugger!]

Note: In these cases, you will be presented with step by step instructions on what you need to do inside a debugger to resume the analysis

Related Skills

View on GitHub
GitHub Stars77
CategoryDevelopment
Updated3mo ago
Forks16

Languages

C++

Security Score

77/100

Audited on Jan 4, 2026

No findings