Skip to content

Conversation

TAbdiukov
Copy link
Contributor

@TAbdiukov TAbdiukov commented Aug 9, 2024

I'm not sure if this counts as LOLBAS

  • [-] the main file is copy.exe, not extrac32.exe
  • [+] This usage of EXE is undocumented
  • [-] In reality, EXEs are probably more likely to trip detection than .CAB
  • [+] For an attacker, it can be useful for covert extractions of payloads without command-line arguments (while maintaining the use of Microsoft EXEs for its headers)

@TAbdiukov
Copy link
Contributor Author

Example file,
file3.zip

@TAbdiukov
Copy link
Contributor Author

TAbdiukov commented Aug 16, 2024

Another example file, obtained on Windows XP with the following one-liner,

copy /b "C:\WINDOWS\system32\extrac32.exe"+"C:\WINDOWS\pchealth\helpctr\binaries\pchdt_w3.cab" number2.exe

number2.zip

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant