Skip to content

Conversation

@TAbdiukov
Copy link
Contributor

@TAbdiukov TAbdiukov commented Aug 9, 2024

I'm not sure if this counts as LOLBAS

  • [-] the main file is copy.exe, not extrac32.exe
  • [+] This usage of EXE is undocumented
  • [-] In reality, EXEs are probably more likely to trip detection than .CAB
  • [+] For an attacker, it can be useful for covert extractions of payloads without command-line arguments (while maintaining the use of Microsoft EXEs for its headers)

@TAbdiukov
Copy link
Contributor Author

Example file,
file3.zip

@TAbdiukov
Copy link
Contributor Author

TAbdiukov commented Aug 16, 2024

Another example file, obtained on Windows XP with the following one-liner,

copy /b "C:\WINDOWS\system32\extrac32.exe"+"C:\WINDOWS\pchealth\helpctr\binaries\pchdt_w3.cab" number2.exe

number2.zip

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant