privacysavvy

privacysavvy

Monday, July 1, 2024

Injecting Payload with Doppelganging

I researched an article and including training materials available on the internet to explore some creative techniques developed by researchers for injecting a malicious payload into a process with minimal traces. I came across a process injection te…
Read on blog or Reader
Site logo image Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis Read on blog or Reader

Injecting Payload with Doppelganging

By rioasmara on July 2, 2024

I researched an article and including training materials available on the internet to explore some creative techniques developed by researchers for injecting a malicious payload into a process with minimal traces.

I came across a process injection technique known as Doppelganging, which gained attention during the Black Hat conference in Europe. The technique, although not the latest in the industry, but it struck me as particularly ingenious and unconventional. More information about this technique can be found in the following link: https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf.

The technique under discussion bears a close resemblance to process hollowing, which involves the use of a legitimate binary to overwrite its code with malicious content. This method leverages NTFS Transactions to load legitimate files, subsequently overwriting the allocated memory with a malicious payload during the process.

Briefly put, it is possible to create a file within a transaction in such a way that it is only visible to the creating process until the transaction is committed. This method can be exploited to drop and execute malicious payloads. By rolling back the transaction at an opportune moment, the operating system can be made to behave as if the file was never created.

Process dopplenganging start with creating the NTFS transaction mechanism

Once you created the NTFS transaction then you need to write your payload

The next steps is to create section. The section will become the base of the our process. Remember that our malicious payload is now settled in a memory range

Roll back the NTFS transaction. Executing the rollback process sends a signal to the operating system, indicating the cancellation of the writing process, ensuring that our payload never interacts with the disk. Nonetheless, it is important to note that our payload has indeed been written to a specific section of memory.

Our payload is primed in the memory (hSection); however, in order to execute it, we must establish a suitable process. This process will serve as the environment for executing the code, which comprises our payload.

Once the process is prepared, it is important to customize the procedure to specify the precise location for code execution. The key considerations revolve around determining the base address and entry point.

One of the most crucial steps is to set up the process parameter in a manner that appears legitimate and is not easily detectable by antivirus software. In this scenario, the parameter for our malicious process should be set as C:\temp\mynotes.txt.

We updated the the process information block which contain the process parameter with below codes

The last part is to create a thread. You know that a process must have at least one thread to run. So we create a thread to execute our code

After all, The process will run smoothly

Comment
Like
You can also reply to this email to leave a comment.

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis © 2024.
Manage your email settings or unsubscribe.

WordPress.com and Jetpack Logos

Get the Jetpack app

Subscribe, bookmark, and get real‑time notifications - all from one app!

Download Jetpack on Google Play Download Jetpack from the App Store
WordPress.com Logo and Wordmark title=

Automattic, Inc.
60 29th St. #343, San Francisco, CA 94110

at July 01, 2024
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Artemis Monte Carlo Rendezvous Roundtable 2025

You can now download our report from an executive roundtable we held at the 2025 Monte Carlo reinsurance event ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌...

  • [New post] Norwegian Black Metal Bands – Satanic or Psychotic?
    Dawn ...
  • [New post] After Announcing a New CEO, is Lordstown Motors Worth Buying?
    Editorial Team posted: "To improve its market reputation and streamline its operations, on Aug. 26 electric vehicle (EV) ma...
  • [New post] Estrazioni Lotto di oggi martedì 30 novembre 2021
    Redazione News posted: "Seguite su Cyberludus.com la diretta delle estrazioni di Lotto, 10eLotto e Superenalotto di martedì...

Search This Blog

  • Home

About Me

privacysavvy
View my complete profile

Report Abuse

Blog Archive

  • October 2025 (54)
  • September 2025 (79)
  • August 2025 (71)
  • July 2025 (89)
  • June 2025 (78)
  • May 2025 (95)
  • April 2025 (85)
  • March 2025 (78)
  • February 2025 (31)
  • January 2025 (50)
  • December 2024 (39)
  • November 2024 (42)
  • October 2024 (54)
  • September 2024 (83)
  • August 2024 (2665)
  • July 2024 (3210)
  • June 2024 (2908)
  • May 2024 (3025)
  • April 2024 (3132)
  • March 2024 (3115)
  • February 2024 (2893)
  • January 2024 (3169)
  • December 2023 (3031)
  • November 2023 (3021)
  • October 2023 (2352)
  • September 2023 (1900)
  • August 2023 (2009)
  • July 2023 (1878)
  • June 2023 (1594)
  • May 2023 (1716)
  • April 2023 (1657)
  • March 2023 (1737)
  • February 2023 (1597)
  • January 2023 (1574)
  • December 2022 (1543)
  • November 2022 (1684)
  • October 2022 (1617)
  • September 2022 (1310)
  • August 2022 (1676)
  • July 2022 (1375)
  • June 2022 (1458)
  • May 2022 (1297)
  • April 2022 (1464)
  • March 2022 (1491)
  • February 2022 (1249)
  • January 2022 (1282)
  • December 2021 (1663)
  • November 2021 (3139)
  • October 2021 (3253)
  • September 2021 (3136)
  • August 2021 (732)
Powered by Blogger.