December 22, 2020 in Anti-Forensics, Code Injection, Forensic Analysis, Malware Analysis
I thought Propagate technique is a dead horse. Described, implemented, used in malware.
But.
There is perhaps one more possibility, or four.
When you open Windows Explorer and Ribbons are enabled:
the UIRibbon.dll DLL gets loaded into this process address space:
One of the things the DLL does is setting properties of its internal windows using the following methods:
Example:
So, what do we do with this?
These are all possible targets for a Propagate code injection as all these properties appear to be holding virtual table pointers…