• Contact
Sunday, May 25, 2025
Pledge Times
  • World
    • World Europe
  • Business
  • Tech
  • Entertainment
  • Lifestyle
  • Sports
  • Gaming
  • Health
  • World
    • World Europe
  • Business
  • Tech
  • Entertainment
  • Lifestyle
  • Sports
  • Gaming
  • Health
No Result
View All Result
Pledge Times
No Result
View All Result
Home Tech

DLL Search Order Hijacking new variant for Windows 10

by admin_l6ma5gus
January 1, 2024
in Tech
0
0
SHARES
1
VIEWS
Share on FacebookShare on Twitter

Security researchers wrote a detailed report on a new variant of a technique DLL Search Order Hijacking,which could be used by cyber criminals to bypass security mechanisms and achieve malicious code execution on systems running Microsoft Windows 10 and Windows 11.

How this variant of DLL Search Order Hijacking works

The approach “exploits executables commonly found in the trusted WinSxS folder and exploits them through the classic DLL Search Order Hijacking technique“, has declared security firm Security Joes in a new report exclusively shared with The Hacker News.

Doing so allows opponents to eliminate the need for elevated privileges (i.e. the famous administrator privileges) when trying to execute malicious code on a compromised machine and introduce potentially vulnerable binaries into the attack chain, as already observed in the past.

The Search Order Hijacking DLL, as the name suggests, involves manipulating the search order used to load the DLLs in order to execute Malicious payloads for defense evasion purposespersistence and privilege escalation.

In detail, The attacks that exploit the technique detect applications that do not specify the full path to the libraries they need and instead, they rely on a predefined search order to locate the necessary DLLs on the disk.

Cybercriminals, therefore, they take advantage of this behavior by moving legitimate system binaries into non-standard directories that include malicious DLLs named like the legitimate ones, so that the library containing the attack code is selected instead of the latter.

Here is an example of this technique that worked, as you can see it uses a malicious script that runs on PowerShell (the former command prompt)

This works because the process calling the DLL will look in the directory it is running from before recursively iterating through other locations in a specific order to locate and load the resource in question; to put it simply, the search order is as follows:

  1. The directory from which the application is launched
  2. Folder “C:WindowsSystem32“
  3. Folder “C:WindowsSystem“
  4. Folder “C:Windows“
  5. The current working directory
  6. The directories listed in the System PATH environment variable
  7. The directories listed in the The user's PATH environment variable

Security Joes' new twist targets files located in the trusted “C:WindowsWinSxS” folder. Short for Windows side-by-side, WinSxS is a critical component of Windows used for customizing and updating the operating system to ensure compatibility and integrity.

“This approach represents a new application in cybersecurity: traditionally, attackers have largely relied on well-known techniques such as DLL Search Order Hijacking, a method that manipulates how Windows applications load external libraries and executables” said Ido Naor, co-founder and CEO of Security Joes, in a statement.

Security CEO Jones then added: “Our discovery deviates from this path, revealing a more subtle and hidden method of exploitation.”

The idea, in a nutshell, is to locate vulnerable binaries in the WinSxS folder (for example, ngentask.exe and aspnet_wp.exe) and combine them with regular DLL Search Order Hijacking methods by strategically placing a custom DLL with the same name as the legitimate DLL in an actor-controlled directory to achieve code execution.

Consequentially, simply run a vulnerable file in the WinSxS folder by setting the custom folder containing the fraudulent DLL as the current directory is sufficient to enable execution of the DLL contents without having to copy the executable from the WinSxS folder.

Security Joes has warned that there may be other binaries in the WinSxS folder that are susceptible to this type of DLL Search Order Hijacking, requiring organizations to take appropriate precautions to mitigate the method of exploitation within their environments.

“Examine relationships between parent-child processes, with a specific focus on trusted binaries“the company said. “Closely monitor all activity performed by binaries residing in the WinSxS folder, focusing on both network communications and file operations.“

#DLL #Search #Order #Hijacking #variant #Windows

admin_l6ma5gus

admin_l6ma5gus

Next Post

Hill Jump | A startling situation in the Central European hill week classic race - "It felt like the jumping tower was collapsing"

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Controlled the fire that has calcined a building in Castellón, with three attended by smoke inhalation

Controlled the fire that has calcined a building in Castellón, with three attended by smoke inhalation

1 month ago

Maximum temperature will reach 35 degrees Celsius

11 months ago

Popular News

  • The exciting hall to fire Luka Modric, in tears, and the unforgettable hug with Toni Kroos

    The exciting hall to fire Luka Modric, in tears, and the unforgettable hug with Toni Kroos

    0 shares
    Share 0 Tweet 0
  • Florentino Pérez breaks to cry during the speech of an excited ancelotti in his goodbye: “I can’t forget every day here”

    0 shares
    Share 0 Tweet 0
  • Javier Aramayona: Beyond the Academy: Mathematics that lead states

    0 shares
    Share 0 Tweet 0
  • Jaime Bayly: Will Ferrell declares my enemy

    0 shares
    Share 0 Tweet 0
  • Fernando Alonso shines in the classification of the GP of Monaco and Lando Norris gets the pole

    0 shares
    Share 0 Tweet 0

For Ads: [email protected]

  • Contact

No Result
View All Result
  • World
  • Business
  • Science
  • Entertainment
  • Gaming
  • Sports
  • Fashion
  • Lifestyle
  • Tech
  • Health