ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!
C/C++

Simplified x64 Win 10/11 Virus / PE infection + UAC bypass method tutorial

Submitted by Remio at 19-04-2025, 01:01 PM


Simplified x64 Win 10/11 Virus / PE infection + UAC bypass method tutorial
595 Views
Remio's Avatar'
Remio
Offline
#1
Here we look at x64 self replication technique on win 10/11 environment. 

This program is x64 PE infector proof-of-concept. We demonstrate technique such as encrypted payload injection, OEP redirection, stealthy UAC bypass, and recursive infection/self replication with persistence. Built in C++ for modern Windows systems, it balances stealth and functionality while preserving the integrity of infected executables.

designed for research and educational use. 

-Bypasses UAC prompt using CMSTPLUA COM elevation moniker technique to prevent prompt on modifying exes.
- Features:
- 8KB total (includes ~600-byte encrypted payload with MessageBoxA, file creation, and process execution)
- Injects RWX .rdata section (auto-aligned, ASLR/PIE-compliant);
- XOR-encrypted payload with dynamic key;
- Hashed API names to evade static analysis
- Random registry key names for persistence
- Recursive infection with anti-reinfection checks
- Preserves imports, relocations, TLS, and CFG
- UAC bypass via CMSTPLUA COM interface for 0 prompt
- Written in C++ (MSVC), no external dependencies
- Optimized for Windows 10/11
- Asm  shellcode included as hex byte array


PM for details - I still cant attach code blocks
- Remy
0
Reply
NovaProB's Avatar'
NovaProB
Offline
#2
imagine, using XOR-encryption xD why not aes or chacha20?
0
Reply
Remio's Avatar'
Remio
Offline
#3
05-05-2025, 07:16 PM NovaProB Wrote:
imagine, using XOR-encryption xD why not aes or chacha20?
View my other posts dumb fuck
0
Reply
Remio's Avatar'
Remio
Offline
#4
05-05-2025, 07:16 PM NovaProB Wrote:
imagine, using XOR-encryption xD why not aes or chacha20?
(PART 1: Introduction) Hybrid File Encryption Engine - RSA & ChaCha20
0
Reply



Users browsing this thread: