Implementing DLL search order hijacking for persistence
DLL search order hijacking is a clever technique employed by malware for achieving persistence within a compromised system.
In a preceding chapter, an exposition was provided on the practical illustration of DLL hijacking. During this period, Internet Explorer is the target of the attack. It is highly probable that a significant portion of individuals do not utilize it and are unlikely to intentionally remove it from the Windows operating system.
Let us begin to execute the Procmon tool from Sysinternals and configure the subsequent filters as follows:
Figure 3.12 – Procmon filters: finding iexplorer.exe
Then, run Internet Explorer:
Figure 3.13 – Running Internet Explorer
It is evident that the process iexplore.exe
is lacking many DLLs, which may potentially be a target for DLL hijacking. An illustrative instance would be the file named suspend.dll...