InstallUtil
InstallUtil code execution - bypass application whitelisting.
Last updated
InstallUtil code execution - bypass application whitelisting.
Last updated
First of, let's generate a C# payload (with InstallUtil script) that contains shellcode from msfvenom and upload the temp.cs file to victim's machine:
Compile the .cs to an .exe:
Execute the payload:
Enjoy the sweet reverse shell:
Look for InstallUtil
processes that have established connections, especially those with cmd or powershell processes running as children - you should treat them as suspicious and investigate the endpoint closer:
A very primitive query in kibana allowing to find events where InstallUtil spawns cmd:
What is interesting is that I could not see an established network connection logged in sysmon logs, although I could see other network connections from the victim machine being logged.
Will be coming back to this one for further inspection - possibly related to sysmon configuration.