MalwareSourceCode/Win32/Proof of Concepts/ProcessDoppelgänging
vxunderground 900263ea6f updates and moves
n/a
2022-04-11 20:00:13 -05:00
..
MalExe updates and moves 2022-04-11 20:00:13 -05:00
processrefund updates and moves 2022-04-11 20:00:13 -05:00
.gitignore updates and moves 2022-04-11 20:00:13 -05:00
example.png updates and moves 2022-04-11 20:00:13 -05:00
LICENSE.md updates and moves 2022-04-11 20:00:13 -05:00
memory.png updates and moves 2022-04-11 20:00:13 -05:00
modules.png updates and moves 2022-04-11 20:00:13 -05:00
processrefund.sln updates and moves 2022-04-11 20:00:13 -05:00
README.md updates and moves 2022-04-11 20:00:13 -05:00

Process Refund

An attempt to implement Process Doppelgänging

Getting Started

Just clone the repo and open the .sln with Visual Studio 2015.

Prerequisites

Currently this works only in x64. To use you need a dummy exe like svchost.exe and your malicous exe. read below - you need to be able to write over the file.

WARNING DONT USE ON WIN10 YOU WILL GET A BSOD.

exmaple:

processrefund.exe svchost.exe MalExe.exe

alt text alt text alt text

Problems with Process Doppelgänging

  • You can not replace any file. If you try to replace C:\windows\system32\svchost.exe you will get "Access Denied".
  • This techinque will not bypass all AntiViruses because of the use of NtCreateThreadEx, which is equal to CreateRemoteThread. An AntiVirus may monitor the creation of remote thread (via PsSetCreateThreadNotifyRoutine) thus detecting our Doppelgänging. Also an AntiVirus may compare the memory with the image of the created process and will be aware of our malicous process. This techinque may be good to avoid file signatures and loading executables without wiritng them to disk("filesless") but it will not avoid everything.

Acknowledgments