description |
---|
Commandline obfuscation |
This lab is based on the research done by Daniel Bohannon from FireEye.
C:\Users\mantvydas>set a=/c & set b=calc
C:\Users\mantvydas>cmd %a% %b%
Note though that the commandline logging (dynamic detection) still works as the commandline needs to be expanded before it can get executed, but static detection could be bypassed:
C:\Users\mantvydas>c""m"d"
Note how double quotes can actually make both static and dynamic detection a bit more difficult:
C:\Users\mantvydas>n^e^t u^s^er
Commandline logging, same as with using environment variables, is not affected, however static detection could be affected:
A very interesting technique. Let's look at this first without garbage delimiters:
PS C:\Users\mantvydas> cmd /c "set x=calc & echo %x% | cmd"
The above sets en environment variable x to calc
and then prints it and pipes it to the standard input of the cmd:
Introducing garbage delimiters @
into the equation:
PS C:\Users\mantvydas> cmd /c "set x=c@alc & echo %x:@=% | cmd"
The above does the same as the earlier example, except that it introduces more filth into the command (c@lc
). You can see from the below screenshot that Windows does not recognize such a command c@lc
, but the second attempt when the %x:@=%
removes the extraneous @
symbol from the string, gets executed successfully:
If it is confusing, the below should help clear it up:
PS C:\Users\mantvydas> cmd /c "set x=c@alc & echo %x:@=mantvydas% | cmd"
In the above, the value mantvydas
got inserted in the c@lc
in place of @, suggesting that %x:@=%
(:@=
to be precise) is just a string replacement capability in the cmd.exe utility.
With this knowledge, the original obfuscated command
PS C:\Users\mantvydas> cmd /c "set x=c@alc & echo %x:@=% | cmd"
reads: replace the @ symbol with text that goes after the =
sign, which is empty in this case, which effectively means - remove @ from the value stored in the variable x.
Cmd.exe also has a substring capability. See below:
# this will take the C character from %programdata% and will launch the cmd prompt
%programdata:~0,1%md
Note that this is only good for bypassing static detection:
We can use a builtin batch looping to extract the Powershell string from environment variables in order to launch it and bypass static detection that looks for a string "powershell" in program invocations:
{% code title="@cmd" %}
set pSM
PSModulePath=C:\Users\mantvydas\Documents\WindowsPowerShell\Modules;....
{% endcode %}
Note how the WindowsPowerShell
string is present in the PSModule
environment variable - this mean we can extract it like so:
FOR /F "tokens=7 delims=s\" %g IN ('set^|findstr PSM') do %g
What the above command does:
- Executes
set^|findstr PSM
to get the PSModulePath variable value - Splits the string using delimiters
s
&\
- Prints out the 7th token, which happens to be the
PowerShell
- Which effectively launches PowerShell
This may be used for both static and dynamic detection bypasses:
C:\Users\mantvydas>cmd,/c;hostname
PC-MANTVYDAS
What happens below is essentially there is a loop that goes through the list of indexes (0 1 2 3 2 6 2 4 5 6 0 7) which are used to point to characters in the variable unique
which acts like an alphabet. This allows for the FOR loop to cycle through the index, pick out characters from the alphabet pointed to by the index and concatenate them into a final string that eventually gets called with CALL %final%
when the loop reaches the index 1337.
PS C:\Users\mantvydas> cmd /V /C "set unique=nets /ao&&FOR %A IN (0 1 2 3 2 6 2 4 5 6 0 7 1337) DO set final=!final!!uni
que:~%A,1!&& IF %A==1337 CALL %final:~-12%"
In verbose python this could look something like this:
{% code title="forcoding.py" %}
import os
dictionary = "nets -ao"
indexes = [0, 1, 2, 3, 2, 6, 2, 4, 5, 6, 0, 7, 1337]
final = ""
for index in indexes:
if index == 1337:
break
final += dictionary[index]
os.system(final)
{% endcode %}
{% embed url="https://www.youtube.com/watch?v=mej5L9PE1fs" %}
{% embed url="https://www.fireeye.com/blog/threat-research/2018/03/dosfuscation-exploring-obfuscation-and-detection-techniques.html" %}