[讨论]今天终于拿到了Gdi漏洞利用的样本,发上来大家研究
ds:[00406E14]=004020A8 (update[1.004020A8), ASCII "Software\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad"
open == 0
00401308 8B35 04204000 mov esi, dword ptr [402004] ; ADVAPI32.RegDeleteValueA
0040130E 68 CC214000 push 004021CC ; JavaView
00401313 FF75 FC push dword ptr [ebp-4]
00401316 FFD6 call esi ; ADVAPI32.RegDeleteValueA
0012FCA0 80000000 |hKey = HKEY_CLASSES_ROOT
0012FCA4 0012FCCC |Subkey = "CLSID\{DA191DE0-AA86-4ED0-4B87-293D48B2AE99}\InprocServer32"
0012FCA8 00000000 |Reserved = 0
0012FCAC 00000000 |Class = NULL
0012FCB0 00000000 |Options = REG_OPTION_NON_VOLATILE
0012FCB4 000F003F |Access = KEY_ALL_ACCESS
0012FCB8 00000000 |pSecurity = NULL
0012FCBC 0012FE08 |pHandle = 0012FE08
0012FCC0 0012FDF8 \pDisposition = 0012FDF8
004021A8=004021A8 (ASCII "rundll32 ""%s"",UIMessage")
0012F988 00000000 |ModuleFileName = NULL
0012F98C 0012F9B4 |CommandLine = "rundll32 ""C:\Program Files\Messenger\msgmr.dll"",UIMessage"
0012F990 00000000 |pProcessSecurity = NULL
0012F994 00000000 |pThreadSecurity = NULL
0012F998 00000000 |InheritHandles = FALSE
0012F99C 00000000 |CreationFlags = 0
0012F9A0 00000000 |pEnvironment = NULL
0012F9A4 00000000 |CurrentDir = NULL
0012F9A8 0012FDC4 |pStartupInfo = 0012FDC4
0012F9AC 0012FDB4 \pProcessInfo = 0012FDB4
查找注册表-然后在C:\Program Files\Messenger里释放一个DLL文件. 添加注册表为启动还有一写关连.
在C:\WINDOWS\system32 在这里创建一个自删除的批处理.
unxxx.bat
自删除的批处理.执行完后退出本程序
主要的也就这么多操作.