[Stockpile Ability] DLL sideloading ability#589
[Stockpile Ability] DLL sideloading ability#589Ke3n007 wants to merge 7 commits intomitre:masterfrom
Conversation
Dependent on UxTheme.dll payload
|
can you also include our DLL source code with compilation instructions in comments at the top? You can put the file in the same payloads directory |
I don't have access to the source code, but I placed it in the Box file share. |
There was a problem hiding this comment.
Pull Request Overview
This PR adds a new Stockpile ability that implements DLL sideloading for persistence using Notepad++ v8.5.4. The ability exploits Windows' DLL search order by placing a malicious UxTheme.dll in the Notepad++ directory to execute arbitrary code and deploy an agent.
Key changes:
- Downloads and extracts portable Notepad++ v8.5.4 to establish the target application
- Creates a malicious DLL hijacking scenario using UxTheme.dll
- Implements payload execution through a text file containing PowerShell commands
Tip: Customize your code reviews with copilot-instructions.md. Create the file or learn how to get started.
data/abilities/persistence/91919a18-c6e4-4f13-a180-67e1239a9f3b.yml
Outdated
Show resolved
Hide resolved
|
|
||
|
|
||
| Cleanup Commands: | ||
|
|
||
|
|
||
| The txt file and notepad++ zip file are then deleted | ||
|
|
There was a problem hiding this comment.
The description contains excessive blank lines and formatting inconsistencies. The cleanup section should be properly formatted without unnecessary whitespace.
data/abilities/persistence/91919a18-c6e4-4f13-a180-67e1239a9f3b.yml
Outdated
Show resolved
Hide resolved
data/abilities/persistence/91919a18-c6e4-4f13-a180-67e1239a9f3b.yml
Outdated
Show resolved
Hide resolved
data/abilities/persistence/91919a18-c6e4-4f13-a180-67e1239a9f3b.yml
Outdated
Show resolved
Hide resolved
…b.yml Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
…b.yml Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
…b.yml Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
…b.yml Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
|
This pull request is stale because it has had no activity for 60 days. Remove the stale label or comment or this will be closed in 60 days |
Description
This ability leverages DLL hijacking to establish persistence by executing arbitrary code to deploy an agent. The ability involves the following steps:
The payload uses Windows API calls to open, read, and load the commands from the txt file into a buffer. Another Windows API call then executes the commands stored in the buffer to deploy an agent.
Cleanup Commands remove both the zip file and the txt file.
Type of change
Please delete options that are not relevant.
How Has This Been Tested?
Please describe the tests that you ran to verify your changes.
This ability has been tested by running a successful operation.


Checklist: