Shell32.dll, #44 lolbin
壳32.dll库导出Control_RunDLLNoFallback函数(序号44),可用于运行CPL文件。通过 rundll32.exe 调用该函数启动CPL文件。此技术被RaspberryRobin等恶意软件采用。 2025-5-18 00:51:30 Author: www.hexacorn.com(查看原文) 阅读量:192 收藏

There is a well known shell32.dll lolbas that relies on a function called Control_RunDLL. BUT, there is one more. The shell32.dll library exports a function called Control_RunDLLNoFallback under ordinal #44.

We can use it to launch CPL files using the syntax below:

"C:\windows\SysWOW64\rundll32.exe" "C:\windows\SysWOW64\shell32.dll",#44 "<localpath>.cpl"

I didn’t discover this technique – it was observed being used by various malware families including RaspberryRobin.


文章来源: https://www.hexacorn.com/blog/2025/05/18/shell32-dll-44-lolbin/
如有侵权请联系:admin#unsafe.sh