DLL Hijacking
Last updated
Last updated
There is a variety of approaches to choose from, with success depending on how the application is configured to load its required DLLs. Possible approaches include:
DLL replacement: replace a legitimate DLL with an evil DLL. This can be combined with DLL Proxying, which ensures all functionality of the original DLL remains intact.
DLL search order hijacking: DLLs specified by an application without a path are searched for in fixed locations in a specific order. Hijacking the search order takes place by putting the evil DLL in a location that is searched in before the actual DLL. This sometimes includes the working directory of the target application.
Phantom DLL hijacking: drop an evil DLL in place of a missing/non-existing DLL that a legitimate application tries to load .
DLL redirection: change the location in which the DLL is searched for, e.g. by editing the %PATH% environment variable, or .exe.manifest / .exe.local files to include the folder containing the evil DLL.
WinSxS DLL replacement (Side-loading) : replace the legitimate DLL with the evil DLL in the relevant WinSxS folder of the targeted DLL. Often referred to as DLL side-loading.
Relative path DLL Hijacking: copy (and optionally rename) the legitimate application to a user-writeable folder, alongside the evil DLL. In the way this is used, it has similarities with (Signed) Binary Proxy Execution. A variation of this is (somewhat oxymoronically called) βbring your own LOLbinβ in which the legitimate application is brought with the evil DLL (rather than copied from the legitimate location on the victimβs machine).
When a loader comes across import DLL section of an executable, the first thing the loader will do is to check out for KnownDLL directory which contains known systems DLLs. If the DLL mentioned in the import name matches with KnownDLL, then this DLL will be mapped to process address space.
KnownDLL are specified in the registry key
And their location is mentioned by the key DllDirectory (64 bit DLLs)
and DllDirectory32 (32 bit DLLs
)
Attackers can also modify the registry key at HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession
Manager ExcludeFromKnownDlls
to exclude the DLLS from KnownDLL for processing.
Monitor file system for moving, renaming, replacing and modifying known system and services DLLs.
Enable SafeDLLSearchMode
option via group policy to change windows DLL search order.