Skip to content
This repository has been archived by the owner on Aug 4, 2020. It is now read-only.

Hide process(es) from task manager #61

Open
mvrozanti opened this issue Jan 16, 2019 · 10 comments
Open

Hide process(es) from task manager #61

mvrozanti opened this issue Jan 16, 2019 · 10 comments
Assignees

Comments

@mvrozanti
Copy link
Owner

This hides a process in some Windows versions. May be worth implementing even if it's not generic.

@dudeisbrendan03
Copy link
Collaborator

This requires the RAT to launch with administrative privileges. Sorry I haven't done anything, lots of work lately and after it's done I'll get back to this.

@dudeisbrendan03
Copy link
Collaborator

Need to exploit something to obtain administrative privileges if the user doesn't have them (as we're installing driver's). Also the driver won't be signed so it will not install on most machines, you'll need to disable driver signing (and that will only apply after a reboot).

@mvrozanti
Copy link
Owner Author

mvrozanti commented Jan 23, 2019

I hadn't seen that, thanks for pointing that out @dudeisbrendan03
Maybe that funcionality could be enabled/disabled on compile time (i.e.: if the user knows he's got admin priv.)

In case the user has admin priviledges, couldn't we install the drivers, persist the RAT and then wait for the reboot (using only one reboot) before activation?

It may be a cost some users are willing to take on

@dudeisbrendan03
Copy link
Collaborator

We would have to disable signed driver enforcement (which requires elevated permissions)

@mvrozanti
Copy link
Owner Author

For Windows 7 I think it's something like that:

bcdedit.exe -set loadoptions DDISABLE_INTEGRITY_CHECKS
bcdedit.exe -set TESTSIGNING [ON|OFF?]

For Windows 10:

bcdedit.exe /set nointegritychecks on

@mvrozanti mvrozanti self-assigned this Jan 27, 2019
@dudeisbrendan03
Copy link
Collaborator

bcdedit.exe -set TESTSIGNING ON

@dudeisbrendan03
Copy link
Collaborator

Also requires admin ^

Another idea, try and embed into another process.
I've seen RATs that can embed themselves into another process without privilege escalation.

Maybe worth looking into it?

@mvrozanti
Copy link
Owner Author

Definitely, but is it possible to maintain? That is, hasn't micro$oft patched this yet??

@dudeisbrendan03
Copy link
Collaborator

It's not something that Microsoft would look into solving. It's up to the process rather than the OS.

Electron apps are usually easy to inject into and are pretty common (e.g. Discord).

@dudeisbrendan03 dudeisbrendan03 added this to the FUD/Hiding process milestone Jun 25, 2019
@mvrozanti
Copy link
Owner Author

I didn't know. I thought it was the other way around. Great idea though, definitely worth looking into

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants