Researcher Details New Windows Code Injection Technique Named PROPagate

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
A security researcher has discovered a new code injection technique that works on all recent Windows versions and allows miscreants to inject malicious code into other applications undetected.

Discovered by a Hexacorn security researcher that only goes online by the name of Adam, this code injection technique — nicknamed PROPagate — takes advantage of generic properties of legitimate Windows GUI management APIs and functions.

Initial research focused on the SetWindowSubclass API
Adam's research initially focused on the SetWindowSubclass API, a function of the Windows operating system that manages GUI application windows inside their parent process.

Adam has discovered that he can abuse legitimate GUI window properties (UxSubclassInfo and CC32SubclassInfo) utilized internally by SetWindowSubclass function to load and execute malicious code inside other (legitimate) applications.

"Not all processes can be injected," Adam told Bleeping Computer in a private conversation today. "Only [applications] that use Windows GUI controls and popular GUI frameworks."

"That is not really a limitation though," Adam added, "the bug covers [the] majority of popular applications including Windows Explorer - a popular target for code injection."

PoC works on numerous apps on all recent Windows versions

In a blog post published two weeks back that first detailed the PROPagate technique, Adam said a proof-of-concept PROPagate attack injected code into "Windows Explorer, Total Commander, Process Hacker, Ollydbg, and a few more applications."


The PoC, which Adam said he won't be releasing online for obvious reasons, worked on both Windows XP and Windows 10.

PROPagate-WindowsXP.png


PROPagate-Windows10.png


In subsequent research Adam published last Friday, the expert also discovered that PROPagate code injection attacks work on both 32-bit and 64-bit processes, with little modifications.

PROPagate is an evasion technique to hide malicious code
Adam made it clear that this is not a serious cause for concern when compared to other types of security bugs, such as remote code execution or escalation of privileges.

"This is an evasion technique," Adam told Bleeping Computer. "I didn't contact Microsoft because it's not an RCE or EoP and didn't consider it is worth reporting."

"To use the attack, one has to be already running some code on your system, i.e., it's already game over, as such, it has a limited scope," the expert added.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top