Masquerading Processes in Userland via _PEB
Understanding how malicious binaries can maquerade as any other legitimate Windows binary from the userland.
Last updated
Understanding how malicious binaries can maquerade as any other legitimate Windows binary from the userland.
Last updated
In this short lab I am going to use a WinDBG to make my malicious program pretend to look like a notepad.exe (hence masquerading) when inspecting system's running processes with tools like Sysinternals ProcExplorer and similar. Note that this is not a code injection exercise.
This is possible, because information about the process, i.e commandline arguments, image location, loaded modules, etc is stored in a memory structure called Process Environment Block (_PEB
) that is accessible and writeable from the userland.
Thanks to @FuzzySec who pointed out the following: you don't need SeDebugPrivilege when overwriting the PEB for your own process or generally for overwriting a process spawned in your user context
This lab builds on the previous lab:
Exploring Process Environment BlockFor this demo, my malicious binary is going to be an nc.exe
- a rudimentary netcat reverse shell spawned by cmd.exe and the PID of 4620
:
Using WinDBG, we will make the nc.exe look like notepad.exe. This will be reflected in the Path
field and the binary icon in the process properties view using ProcExplorer as seen in the below graphic. Note that it is the same nc.exe process (PID 4620) as shown above, only this time masquerading as a notepad.exe:
So how is this possible? Read on.
Let's first have a look at the _PEB structure for the nc.exe
process using WinDBG:
Note that at the offset 0x020
of the PEB, there is another structure which is of interest to us - _RTL_USER_PROCESS_PARAMETERS
, which contains nc.exe process information. Let's inspect it further:
The offset 0x060
of _RTL_USER_PROCESS_PARAMETERS
is also of interest to us - it contains a member ImagePathName
which points to a structure _UNICODE_STRING
that, as we will see later, contains a field Buffer
which effectively signifies the name/full path to our malicious binary nc.exe. Note how at the offset 0x70
we can see the commandline arguments of the malicious process, which we explored previously.
Let's inspect the aforementioned _UNICODE_STRING
structure:
_UNICODE_STRING
structure describes the lenght of the string and also points to the actual memory location 0x00000000`005e280e
by the Buffer
field that contains the string which is a full path to our malicious binary.
Let's confirm the string location by dumping the bytes at 0x00000000`005e280e
by issuing the following command in WinDBG:
Now that I have confirmed that 0x00000000`005e280e
indeed contains the path to the binary, let's try to write a new string to that memory address. Say, let's try swapping the nc.exe with a path to the notepad.exe binary found in Windows\System32\notepad.exe:
If you are following along, do not forget to add NULL byte at the end of your new string to terminate it:
Let's check the _UNICODE_STRING
structure again to see if the changes took effect:
We can see that our string is getting truncated. This is because the Lenght
value in the _UNICODE_STRING
structure is set to 0x1e (30 decimal) which equals to only 15 unicode characters:
Let's increase that value to 0x3e to accomodate our longer string pointing to notepad.exe binary and check the structure again:
Good, the string pointed to by the field Buffer
is no longer getting truncated:
For the sake of this demo, I cleared out the commandline arguments the nc.exe was launched with by amending the _UNICODE_STRING
structure member Lenght
by setting it to 0:
Inspecting our malicious nc.exe process again using Process Explorer reveals that it now looks like notepad without commandline arguments:
Note that to further obfuscate the malicious binary, one could also rename the binary itself from nc.exe to notepad.exe.
As part of this simple lab, I wanted to write a simple C++ proof of concept that would make the running program masquerade itself as a notepad. Here is the code:
..and here is the compiled running program being inspected with ProcExplorer - we can see that the masquerading is achieved successfully:
Switching back to the nc.exe masquerading as notepad.exe, if we check the !peb
data, we can see a notepad.exe is now displayed in the Ldr.InMemoryOrderModuleList
memory structure!
Note that even though it shows in the loaded modules that notepad.exe was loaded, it still does not mean that there was an actual notepad.exe process created and sysmon logs prove this, meaning commandline logging can still be helpful in detecting this behaviour.
@b33f for his Masquerade-PEB.ps1 which is what originally inspired me (quite some time ago now) to explore this concept, but I never got to lay my hands on it until now. @Mumbai for talking to me about C++ and NtQueryInformationProcess