Skip to content

Latest commit

 

History

History
31 lines (23 loc) · 1.85 KB

README.md

File metadata and controls

31 lines (23 loc) · 1.85 KB

Process Refund

An attempt to implement Process Doppelgänging

Getting Started

Just clone the repo and open the .sln with Visual Studio 2015.

Prerequisites

Currently this works only in x64. To use you need a dummy exe like svchost.exe and your malicous exe. read below - you need to be able to write over the file.

WARNING DONT USE ON WIN10 YOU WILL GET A BSOD.

exmaple:

processrefund.exe svchost.exe MalExe.exe

alt text alt text alt text

Problems with Process Doppelgänging

  • You can not replace any file. If you try to replace C:\windows\system32\svchost.exe you will get "Access Denied". Yet in the black hat slide show they show replacing "svchost.exe", but after viewing the DEMO image in the slide show it is clear they didn't replace svchost.exe in the demo but Vmmap.exe from sysinternals. alt text alt text
  • This techinque will not bypass all AntiViruses because of the use of NtCreateThreadEx, which is equal to CreateRemoteThread. An AntiVirus may monitor the creation of remote thread (via PsSetCreateThreadNotifyRoutine) thus detecting our Doppelgänging. Also an AntiVirus may compare the memory with the image of the created process and will be aware of our malicous process. This techinque may be good to avoid file signatures and loading executables without wiritng them to disk("filesless") but it will not avoid everything.

Acknowledgments