ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!
C/C++

Simplified x64 Win 10/11 Virus / PE infection + UAC bypass method tutorial

Submitted by Remio at 19-04-2025, 01:01 PM


Simplified x64 Win 10/11 Virus / PE infection + UAC bypass method tutorial
128 Views
Remio's Avatar'
Remio
Offline
#1
Here we look at x64 self replication technique on win 10/11 environment. 

This program is x64 PE infector proof-of-concept. We demonstrate technique such as encrypted payload injection, OEP redirection, stealthy UAC bypass, and recursive infection/self replication with persistence. Built in C++ for modern Windows systems, it balances stealth and functionality while preserving the integrity of infected executables.

designed for research and educational use. 

-Bypasses UAC prompt using CMSTPLUA COM elevation moniker technique to prevent prompt on modifying exes.
- Features:
- 8KB total (includes ~600-byte encrypted payload with MessageBoxA, file creation, and process execution)
- Injects RWX .rdata section (auto-aligned, ASLR/PIE-compliant);
- XOR-encrypted payload with dynamic key;
- Hashed API names to evade static analysis
- Random registry key names for persistence
- Recursive infection with anti-reinfection checks
- Preserves imports, relocations, TLS, and CFG
- UAC bypass via CMSTPLUA COM interface for 0 prompt
- Written in C++ (MSVC), no external dependencies
- Optimized for Windows 10/11
- Asm  shellcode included as hex byte array


PM for details - I still cant attach code blocks
- Remy
Sinister.ly: https://sinister.ly/User-RemyQ
Telegram: t.me/Evida_enc
Telegram: t.me/remyq_demo
Onion V3: evidaa3mhfdlyx4wbqvyri3xzslpgbl7qpuj5ijz2dbusfivn7nskpad.onion
0
Reply



Users browsing this thread: