Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. From the same author as BlueHammer we now have RedSun.

From the same author as BlueHammer we now have RedSun.

Scheduled Pinned Locked Moved Uncategorized
16 Posts 6 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • wdormann@infosec.exchangeW This user is from outside of this forum
    wdormann@infosec.exchangeW This user is from outside of this forum
    wdormann@infosec.exchange
    wrote last edited by
    #1

    From the same author as BlueHammer we now have RedSun.

    This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled.

    Link Preview ImageLink Preview ImageLink Preview Image
    astraleureka@social.treehouse.systemsA wdormann@infosec.exchangeW xc3ll@mastodon.socialX christopherkunz@chaos.socialC Q 5 Replies Last reply
    1
    0
    • wdormann@infosec.exchangeW wdormann@infosec.exchange

      From the same author as BlueHammer we now have RedSun.

      This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled.

      Link Preview ImageLink Preview ImageLink Preview Image
      astraleureka@social.treehouse.systemsA This user is from outside of this forum
      astraleureka@social.treehouse.systemsA This user is from outside of this forum
      astraleureka@social.treehouse.systems
      wrote last edited by
      #2

      @wdormann Does it still depend on VSS and the cloud storage filter subsystem?

      wdormann@infosec.exchangeW 1 Reply Last reply
      0
      • wdormann@infosec.exchangeW wdormann@infosec.exchange

        From the same author as BlueHammer we now have RedSun.

        This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled.

        Link Preview ImageLink Preview ImageLink Preview Image
        wdormann@infosec.exchangeW This user is from outside of this forum
        wdormann@infosec.exchangeW This user is from outside of this forum
        wdormann@infosec.exchange
        wrote last edited by
        #3

        From the GitHub repo:

        When Windows Defender realizes that a malicious file has a cloud tag, for whatever stupid and hilarious reason, the antivirus that's supposed to protect decides that it is a good idea to just rewrite the file it found again to it's original location.

        This Exploit uses the "Cloud Files API", writes EICAR to a file using it, uses an oplock to win a volume shadow copy race, and uses a directory junction/reparse point to redirect the file rewrite (with new contents) to C:\Windows\system32\TieringEngineService.exe. At this point, the Cloud Files Infrastructure runs TieringEngineService.exe as SYSTEM. Game over.

        kkarhan@jorts.horseK wdormann@infosec.exchangeW 2 Replies Last reply
        0
        • astraleureka@social.treehouse.systemsA astraleureka@social.treehouse.systems

          @wdormann Does it still depend on VSS and the cloud storage filter subsystem?

          wdormann@infosec.exchangeW This user is from outside of this forum
          wdormann@infosec.exchangeW This user is from outside of this forum
          wdormann@infosec.exchange
          wrote last edited by
          #4

          @astraleureka
          Yes it uses both.

          astraleureka@social.treehouse.systemsA 1 Reply Last reply
          0
          • wdormann@infosec.exchangeW wdormann@infosec.exchange

            From the GitHub repo:

            When Windows Defender realizes that a malicious file has a cloud tag, for whatever stupid and hilarious reason, the antivirus that's supposed to protect decides that it is a good idea to just rewrite the file it found again to it's original location.

            This Exploit uses the "Cloud Files API", writes EICAR to a file using it, uses an oplock to win a volume shadow copy race, and uses a directory junction/reparse point to redirect the file rewrite (with new contents) to C:\Windows\system32\TieringEngineService.exe. At this point, the Cloud Files Infrastructure runs TieringEngineService.exe as SYSTEM. Game over.

            kkarhan@jorts.horseK This user is from outside of this forum
            kkarhan@jorts.horseK This user is from outside of this forum
            kkarhan@jorts.horse
            wrote last edited by
            #5

            @wdormann so basically a "#cloud-based #utilman-style "privilegue escalation"?
            https://www.youtube.com/watch?v=X_9OuDjl97M

            kkarhan@jorts.horseK 1 Reply Last reply
            0
            • kkarhan@jorts.horseK kkarhan@jorts.horse

              @wdormann so basically a "#cloud-based #utilman-style "privilegue escalation"?
              https://www.youtube.com/watch?v=X_9OuDjl97M

              kkarhan@jorts.horseK This user is from outside of this forum
              kkarhan@jorts.horseK This user is from outside of this forum
              kkarhan@jorts.horse
              wrote last edited by
              #6

              @wdormann I can't wait for this to get #BadUSB'd like #PoisonTap!

              - YouTube

              Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.

              favicon

              (www.youtube.com)

              kkarhan@jorts.horseK 1 Reply Last reply
              0
              • kkarhan@jorts.horseK kkarhan@jorts.horse

                @wdormann I can't wait for this to get #BadUSB'd like #PoisonTap!

                - YouTube

                Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.

                favicon

                (www.youtube.com)

                kkarhan@jorts.horseK This user is from outside of this forum
                kkarhan@jorts.horseK This user is from outside of this forum
                kkarhan@jorts.horse
                wrote last edited by
                #7

                @wdormann ...or like #PwnPiALOA.
                https://www.youtube.com/watch?v=s0K-YIL_G5c

                #P4wnP1 #PwnPi #P4wnP1ALOA #ALOA

                1 Reply Last reply
                0
                • mttaggart@infosec.exchangeM mttaggart@infosec.exchange shared this topic
                • wdormann@infosec.exchangeW wdormann@infosec.exchange

                  @astraleureka
                  Yes it uses both.

                  astraleureka@social.treehouse.systemsA This user is from outside of this forum
                  astraleureka@social.treehouse.systemsA This user is from outside of this forum
                  astraleureka@social.treehouse.systems
                  wrote last edited by
                  #8

                  @wdormann Just finished reading through the source, thank you. Much simpler than the first version, and makes the root issue a lot more clear. This is pretty nasty, MS has some serious egg on their faces over this one

                  1 Reply Last reply
                  0
                  • wdormann@infosec.exchangeW wdormann@infosec.exchange

                    From the same author as BlueHammer we now have RedSun.

                    This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled.

                    Link Preview ImageLink Preview ImageLink Preview Image
                    xc3ll@mastodon.socialX This user is from outside of this forum
                    xc3ll@mastodon.socialX This user is from outside of this forum
                    xc3ll@mastodon.social
                    wrote last edited by
                    #9

                    @wdormann

                    Link Preview Image
                    1 Reply Last reply
                    0
                    • wdormann@infosec.exchangeW wdormann@infosec.exchange

                      From the same author as BlueHammer we now have RedSun.

                      This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled.

                      Link Preview ImageLink Preview ImageLink Preview Image
                      christopherkunz@chaos.socialC This user is from outside of this forum
                      christopherkunz@chaos.socialC This user is from outside of this forum
                      christopherkunz@chaos.social
                      wrote last edited by
                      #10

                      @wdormann Hey, just so I can learn this: How do I compile RedSun.cpp under Win32 with VS or gcc? I can't seem to include cfapi.h correctly (I have the full win32 sdk under the default location).

                      wdormann@infosec.exchangeW 1 Reply Last reply
                      0
                      • christopherkunz@chaos.socialC christopherkunz@chaos.social

                        @wdormann Hey, just so I can learn this: How do I compile RedSun.cpp under Win32 with VS or gcc? I can't seem to include cfapi.h correctly (I have the full win32 sdk under the default location).

                        wdormann@infosec.exchangeW This user is from outside of this forum
                        wdormann@infosec.exchangeW This user is from outside of this forum
                        wdormann@infosec.exchange
                        wrote last edited by
                        #11

                        @christopherkunz
                        TBH, for code that doesn't include a .SLN file, I usually have minimal luck compiling it straight-up with cl.exe

                        In this case, I simply made a new Visual Studio 2022 project for a console app, and then replaced the .CPP file contents with what's in the GitHub repo. There are a slew of warnings, but it compiles.

                        <snip>
                        1>C:\Users\test\source\repos\test\test\test.cpp(431,11): warning C4267: 'initializing': conversion from 'size_t' to 'int', possible loss of data
                        1>C:\Users\test\source\repos\test\test\test.cpp(694,49): warning C4267: '=': conversion from 'size_t' to 'ULONG', possible loss of data
                        1>C:\Users\test\source\repos\test\test\test.cpp(696,92): warning C4267: 'argument': conversion from 'size_t' to 'ULONG', possible loss of data
                        1>C:\Users\test\source\repos\test\test\test.cpp(714,20): warning C4267: 'initializing': conversion from 'size_t' to 'DWORD', possible loss of data
                        1>C:\Users\test\source\repos\test\test\test.cpp(736,57): warning C4838: conversion from 'LONG' to 'DWORD' requires a narrowing conversion
                        1>Generating code
                        1>Previous IPDB not found, fall back to full compilation.
                        1>All 27 functions were compiled because no usable IPDB/IOBJ from previous compilation was found.
                        1>Finished generating code
                        1>test.vcxproj -> C:\Users\test\source\repos\test\x64\Release\test.exe
                        1>Done building project "test.vcxproj".
                        ========== Build: 1 succeeded, 0 failed, 0 up-to-date, 0 skipped ==========
                        ========== Build completed at 8:43 AM and took 01.818 seconds ==========
                        christopherkunz@chaos.socialC 1 Reply Last reply
                        0
                        • wdormann@infosec.exchangeW wdormann@infosec.exchange

                          @christopherkunz
                          TBH, for code that doesn't include a .SLN file, I usually have minimal luck compiling it straight-up with cl.exe

                          In this case, I simply made a new Visual Studio 2022 project for a console app, and then replaced the .CPP file contents with what's in the GitHub repo. There are a slew of warnings, but it compiles.

                          <snip>
                          1>C:\Users\test\source\repos\test\test\test.cpp(431,11): warning C4267: 'initializing': conversion from 'size_t' to 'int', possible loss of data
                          1>C:\Users\test\source\repos\test\test\test.cpp(694,49): warning C4267: '=': conversion from 'size_t' to 'ULONG', possible loss of data
                          1>C:\Users\test\source\repos\test\test\test.cpp(696,92): warning C4267: 'argument': conversion from 'size_t' to 'ULONG', possible loss of data
                          1>C:\Users\test\source\repos\test\test\test.cpp(714,20): warning C4267: 'initializing': conversion from 'size_t' to 'DWORD', possible loss of data
                          1>C:\Users\test\source\repos\test\test\test.cpp(736,57): warning C4838: conversion from 'LONG' to 'DWORD' requires a narrowing conversion
                          1>Generating code
                          1>Previous IPDB not found, fall back to full compilation.
                          1>All 27 functions were compiled because no usable IPDB/IOBJ from previous compilation was found.
                          1>Finished generating code
                          1>test.vcxproj -> C:\Users\test\source\repos\test\x64\Release\test.exe
                          1>Done building project "test.vcxproj".
                          ========== Build: 1 succeeded, 0 failed, 0 up-to-date, 0 skipped ==========
                          ========== Build completed at 8:43 AM and took 01.818 seconds ==========
                          christopherkunz@chaos.socialC This user is from outside of this forum
                          christopherkunz@chaos.socialC This user is from outside of this forum
                          christopherkunz@chaos.social
                          wrote last edited by
                          #12

                          @wdormann Yeah, this worked fine. As did the exploit. Thanks for your help! (And for anyone else reading this, the keyboard shortcut to "just compile, don't run" is ctrl-shift-b)

                          1 Reply Last reply
                          0
                          • wdormann@infosec.exchangeW wdormann@infosec.exchange

                            From the same author as BlueHammer we now have RedSun.

                            This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled.

                            Link Preview ImageLink Preview ImageLink Preview Image
                            Q This user is from outside of this forum
                            Q This user is from outside of this forum
                            qdkp@cyberplace.social
                            wrote last edited by
                            #13

                            @wdormann Thank you. Blocking cldapi.dll using AppLocker works though that will break OneDrive and stuff like that.

                            wdormann@infosec.exchangeW 1 Reply Last reply
                            0
                            • Q qdkp@cyberplace.social

                              @wdormann Thank you. Blocking cldapi.dll using AppLocker works though that will break OneDrive and stuff like that.

                              wdormann@infosec.exchangeW This user is from outside of this forum
                              wdormann@infosec.exchangeW This user is from outside of this forum
                              wdormann@infosec.exchange
                              wrote last edited by
                              #14

                              @qdkp
                              People don't use OneDrive intentionally, do they? 😂

                              Q 1 Reply Last reply
                              0
                              • wdormann@infosec.exchangeW wdormann@infosec.exchange

                                @qdkp
                                People don't use OneDrive intentionally, do they? 😂

                                Q This user is from outside of this forum
                                Q This user is from outside of this forum
                                qdkp@cyberplace.social
                                wrote last edited by
                                #15

                                @wdormann 😭

                                1 Reply Last reply
                                0
                                • wdormann@infosec.exchangeW wdormann@infosec.exchange

                                  From the GitHub repo:

                                  When Windows Defender realizes that a malicious file has a cloud tag, for whatever stupid and hilarious reason, the antivirus that's supposed to protect decides that it is a good idea to just rewrite the file it found again to it's original location.

                                  This Exploit uses the "Cloud Files API", writes EICAR to a file using it, uses an oplock to win a volume shadow copy race, and uses a directory junction/reparse point to redirect the file rewrite (with new contents) to C:\Windows\system32\TieringEngineService.exe. At this point, the Cloud Files Infrastructure runs TieringEngineService.exe as SYSTEM. Game over.

                                  wdormann@infosec.exchangeW This user is from outside of this forum
                                  wdormann@infosec.exchangeW This user is from outside of this forum
                                  wdormann@infosec.exchange
                                  wrote last edited by
                                  #16

                                  Interestingly, a good chunk of the [(12/73) AV detections on VT](https://www.virustotal.com/gui/file/d84250e2ad053ab4097d0591933935573e4cab3e975360004a126abc102dc6f6 for this RedSun.exe exploit are due to the EICAR part being detected, despite the string being reversed in the code. (note: this reversal apparently does nothing to prevent EICAR detection in the AV engines on VT)

                                  If we make the EICAR string less obvious (encrypted), the detections drop to 5.

                                  Defender currently doesn't detect the exploit in either case.

                                  Link Preview ImageLink Preview Image
                                  1 Reply Last reply
                                  1
                                  0
                                  • R relay@relay.infosec.exchange shared this topic
                                  Reply
                                  • Reply as topic
                                  Log in to reply
                                  • Oldest to Newest
                                  • Newest to Oldest
                                  • Most Votes


                                  • Login

                                  • Login or register to search.
                                  • First post
                                    Last post
                                  0
                                  • Categories
                                  • Recent
                                  • Tags
                                  • Popular
                                  • World
                                  • Users
                                  • Groups