Skip to content

Commit

Permalink
malware persistence 26: add conclusion
Browse files Browse the repository at this point in the history
  • Loading branch information
cocomelonc committed Aug 22, 2024
1 parent 73b902a commit d55cc2c
Showing 1 changed file with 6 additions and 0 deletions.
6 changes: 6 additions & 0 deletions _posts/2024-08-14-malware-pers-26.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -208,6 +208,12 @@ For the correctness of the experiment, we will launch our Process Hacker 2 and c

As you can see, `hack.dll` started correctly, the same effect will be for other Windows programs, even `Procmon64.exe`. I assume the behavior will be the same if you open anything that uses Windows sockets. To be honest, I don't know what this particular registry parameter is used for, but it seems to have something to do with sockets.

So, everything worked as expected. Perfect! =^..^=

This PoC is how an attacker might use different Windows features like socket connections for running a "malicious" DLL.

I hope this post spreads awareness to the blue teamers of this interesting persistence technique, and adds a weapon to the red teamers arsenal.

> This is a practical case for educational purposes only.
[Windows Sockets](https://learn.microsoft.com/en-us/windows/win32/winsock/windows-sockets-start-page-2)
Expand Down

0 comments on commit d55cc2c

Please sign in to comment.