I've just (August 2014) seen a report of a program that uses the command line
rundll32.exe javascript:"\..\mshtml,RunHTMLApplication"
How does that work? I thought the first parameter was supposed to be the name of a DLL (mshtml), but how does rundll32 parse that command line?
rundll reference: http://support.microsoft.com/kb/164787
Today, we are going to dwell on a Microsoft tool, the infamous rundll32.exe, which allows you to load and execute code. It is often used by adversaries during their offensive operations to execute malicious code through a process which we will explain in detail.
Rundll32.exe is a crucial part of Microsoft Windows that's made to launch functionality based in Windows DLL (dynamic linked library) files. For example if you're using a Windows app that needs a DLL rundll32.exe will make it possible for that app to use the DLL it needs to operate.
Run a 32 bit DLL function. Rundll32 is available on all version of Windows from Windows 95 onwards, but only runs in 32 bit mode. Syntax RUNDLL32. EXE dll_name,EntryPoint [optional_arguments] Key dll_name A full path to the DLL to ensure that the correct one is found.
The official Windows Rundll32.exe is safe and cannot harm your computer; there is no need to remove it or stop the process from running. Rundll32.exe is a critical Windows process that launches other 32-bit DLLs that reside on your computer.
There's a great explanation of this here: http://thisissecurity.net/2014/08/20/poweliks-command-line-confusion/
To summarize using the same example of:
rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";alert('foo');
javascript:"\..\mshtml
javascript:"\..\mshtml.manifest
for the module.javascript:"\..\mshtml.dll
javascript:"\
directory.mshtml.dll
which it finds in the System directory.";alert('foo');
javascript:"\..\mshtml,RunHTMLApplication ";alert('foo');
"..\mshtml,RunHTMLApplication ";alert('foo');
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With