1 little known secret of sti_ci.dll
好的,我现在要帮用户总结一篇文章的内容,控制在100个字以内。首先,我需要仔细阅读用户提供的文章内容。 文章主要讲的是sti_ci.dll这个DLL文件通过导出函数InstallWiaService来执行安装命令。作者提到可以通过rundll32.exe来调用这个API,进而运行多个注册表和DLL注册命令。这可能带来一些lolbin的机会,但因为rundll32.exe是从system32目录执行的,所以程序会优先查找该目录下的可执行文件和DLL。为了解决这个问题,可以将rundll32.exe复制到其他目录再运行。 此外,sti_ci.dll还会在wiatrace.log文件中记录执行的命令,位置可能在%systemroot%\Debug\WIA或用户AppData目录下。 现在,我需要将这些信息浓缩到100字以内。重点包括:sti_ci.dll导出InstallWiaService函数,通过rundll32调用执行多个注册命令,可能用于lolbin攻击;解决rundll32路径问题的方法;以及日志记录功能。 确保语言简洁明了,不使用任何复杂的术语,并且直接描述内容。 </think> 文章描述了通过`sti_ci.dll`的`InstallWiaService`函数使用`rundll32.exe`执行安装命令的方法,并列举了其运行的多个程序。该方法可能带来lolbin攻击机会,但需解决路径问题。此外,`sti_ci.dll`会在系统中生成日志文件记录执行命令。 2026-2-21 20:23:40 Author: www.hexacorn.com(查看原文) 阅读量:14 收藏

In 2017 I posted about sideloading of sti_ci.dll. And it’s that DLL itself that executes the InstallWiaDevice installation command mentioned in that post…

How?

Via its export function called… InstallWiaDevice.

It turns out that we can launch this API directly via rundll32.exe:

rundll32.exe sti_ci.dll, InstallWiaService

When executed, the API runs a number of programs:

regsvr32.exe /s wiaservc.dll
regsvr32.exe /s sti.dll
regsvr32 /s C:\WINDOWS\syswow64\sti.dll
regsvr32.exe /s wiadefui.dll
wiaacmgr.exe /RegServer
regsvr32.exe /s wiashext.dll
regsvr32.exe /s camocx.dll
regsvr32.exe /s photowiz.dll
regsvr32.exe /s wiavusd.dll
regsvr32.exe /s wiasf.ax

Obviously, this creates a number of new possible lolbin opportunities. The only challenge is that since the rundll32.exe is executed from the system32 directory, the program will look for regsvr32.exe, wiaacmgr.exe there first, same as for the listed DLLs.

To bypass it, one could copy rundll32.exe to a different directory, and launch it from there — not the most elegant solution, but it works.

Bonus:

The sti_ci.dll library logs executed commands in a wiatrace.log file. It may be located in various places on the system:

  • %systemroot%\Debug\WIA\wiatrace.log
  • c:\Users\<user>\AppData\Local\VirtualStore\Windows\debug\WIA\wiatrace.log

Example entries look like this:


文章来源: https://www.hexacorn.com/blog/2026/02/21/1-little-known-secret-of-sti_ci-dll/
如有侵权请联系:admin#unsafe.sh