Beyond good ol’ Run key, Part 80

I talked about remapping keys a number of times (e.g. remapping Win+E, adding sneaky hotkeys, adding more sneaky hotkeys).

Today I am describing one more Registry entry that is a subject to remapping, and as such, may be used as yet another persistence mechanism…

Modern keyboards come with a variety of ‘media’ buttons. Their assignment seems to be hardcoded, but in reality, one can change it by modifying the following entries in the Registry:

HKCU or HKLM\software\microsoft\windows\
currentversion\explorer\appkey\<number>\
ShellExecute=<program>

The <number> is the crucial bit – e.g. the calculator button is number 18 so if you change it, anytime someone presses the Calc media button that chosen program will be launched instead.

All the mappings are listed in MSDN.

You may notice that 18 that belongs to Calculator is named as APPCOMMAND_LAUNCH_APP2, but such is life. Don’t trust the documentation 🙂

Note:

I didn’t discover it, but I don’t recall seeing it mentioned in a context of persistence, so documenting it for the sake of it… Having said that, I must mention that googling around led me to this blog post where the very same trick is described as being used to deliver a clever evasion – courtesy of PlugX.

Note2:

Turns out there is a good post from Jan 2018 describing 2 additional registry entries that you may find under the same location:

  • Association – the application associated with a particular file type will be opened
  • RegisteredApp – the application registered for that function will be called.

WYSIWYDS – What You See Is What You Don’t See

There is a lot of vulnerability research focused on bugs in APIs that work with fonts.

Today I came up with a slightly different type of a possible font vulnerability which I could not test in practice (although I tried). The idea is visual in nature and if it works, could be the case of a first font-based ‘rootkit’ 😉

I am kidding of course, but let me explain the idea.

We are so used to trust what we see on the screen that it’s very easy to fall a victim to various Unicode tricks (same looking letters in different languages have different Unicode codes, right-to-left override, etc.). I was wondering what would happen if instead of using all the old tricks, we actually changed the font itself and replaced some of its character definitions with our own (or added new ones). The new/modified characters could be then used to name malicious files and users would be none the wiser as the names of the files would mimic ASCII names that users are familiar with.

A kinda impersonation on a different level.

To test the idea I changed my console window font to Lucida, and then used FontForge to distort the letter ‘A’ just for a test. I then exported the result to a TTF file and replaced the c:\WINDOWS\Fonts\lucon.ttf with my new TTF.

I then restarted the system and started the cmd.exe.

To my horror, the screen looked like this:

Looks like FontForge corrupted the TTF file, so I should probably look for a better TTF editor…

I ran the test on Win7, so it’s a very limited scope, but one thing is for sure – I managed to replace the font, and have it assigned to the cmd terminal (even if it didn’t work); I guess that if it worked I would see that ugly, disfigured ‘A’ I modded.

The idea is lame, the test was unsuccessful, nothing else to report…

You may be wondering why even writing about it?

For starters, a possible ability to fool the user is one thing.

The other thing are security tools. While they scan the system and present the information, how can we be so sure that the information they present is exactly what it intended. Think of e.g. Task Manager or Autoruns. They use ‘MS Sans Serif’ and ‘MS Shell Dlg 2’ to show stuff. Say you name your program ‘\x6000\x6001\x6002\x6003\x6004\x6005\x6006\x6007\x6008\x6009\x6008’ and change the TTF characters to present the string as ‘svchost.exe’.

Who (except technical people) seeing such a well-known process name will suspect anything dodgy?

The strings printed on our screens are just a visual representations – what lies underneath can be a completely different story.

Bonus:

Looks like my toying around does trigger real-world vulnerabilities too; when I tried to toy around with the properties of the cmd window where my corrupted font was loaded I managed to cause the conhost.exe associated with my terminal process to crash. It was on an old, unpatched version of Windows 7 so it’s probably an old vuln, but my guess is… this could be yet another case that may be a result of trusting API functions w/o checking the results.

In terms of software that processes such modified data outside the system where the TTF is modified – this is obviously easy for them to spot – any EDR, or forensic suite will show weird characters in place where one would expect something readable…

And of of course, replacing system fonts requires admin privileges. The goal of the post is not to say it’s easy, more that it’s possible.

If you have better font editing skills/software and manage to successfully test the idea please let me know. Thanks.