Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. From the same author as BlueHammer we now have RedSun.

From the same author as BlueHammer we now have RedSun.

Scheduled Pinned Locked Moved Uncategorized
16 Posts 6 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • wdormann@infosec.exchangeW wdormann@infosec.exchange

    From the same author as BlueHammer we now have RedSun.

    This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled.

    Link Preview ImageLink Preview ImageLink Preview Image
    astraleureka@social.treehouse.systemsA This user is from outside of this forum
    astraleureka@social.treehouse.systemsA This user is from outside of this forum
    astraleureka@social.treehouse.systems
    wrote last edited by
    #2

    @wdormann Does it still depend on VSS and the cloud storage filter subsystem?

    wdormann@infosec.exchangeW 1 Reply Last reply
    0
    • wdormann@infosec.exchangeW wdormann@infosec.exchange

      From the same author as BlueHammer we now have RedSun.

      This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled.

      Link Preview ImageLink Preview ImageLink Preview Image
      wdormann@infosec.exchangeW This user is from outside of this forum
      wdormann@infosec.exchangeW This user is from outside of this forum
      wdormann@infosec.exchange
      wrote last edited by
      #3

      From the GitHub repo:

      When Windows Defender realizes that a malicious file has a cloud tag, for whatever stupid and hilarious reason, the antivirus that's supposed to protect decides that it is a good idea to just rewrite the file it found again to it's original location.

      This Exploit uses the "Cloud Files API", writes EICAR to a file using it, uses an oplock to win a volume shadow copy race, and uses a directory junction/reparse point to redirect the file rewrite (with new contents) to C:\Windows\system32\TieringEngineService.exe. At this point, the Cloud Files Infrastructure runs TieringEngineService.exe as SYSTEM. Game over.

      kkarhan@jorts.horseK wdormann@infosec.exchangeW 2 Replies Last reply
      0
      • astraleureka@social.treehouse.systemsA astraleureka@social.treehouse.systems

        @wdormann Does it still depend on VSS and the cloud storage filter subsystem?

        wdormann@infosec.exchangeW This user is from outside of this forum
        wdormann@infosec.exchangeW This user is from outside of this forum
        wdormann@infosec.exchange
        wrote last edited by
        #4

        @astraleureka
        Yes it uses both.

        astraleureka@social.treehouse.systemsA 1 Reply Last reply
        0
        • wdormann@infosec.exchangeW wdormann@infosec.exchange

          From the GitHub repo:

          When Windows Defender realizes that a malicious file has a cloud tag, for whatever stupid and hilarious reason, the antivirus that's supposed to protect decides that it is a good idea to just rewrite the file it found again to it's original location.

          This Exploit uses the "Cloud Files API", writes EICAR to a file using it, uses an oplock to win a volume shadow copy race, and uses a directory junction/reparse point to redirect the file rewrite (with new contents) to C:\Windows\system32\TieringEngineService.exe. At this point, the Cloud Files Infrastructure runs TieringEngineService.exe as SYSTEM. Game over.

          kkarhan@jorts.horseK This user is from outside of this forum
          kkarhan@jorts.horseK This user is from outside of this forum
          kkarhan@jorts.horse
          wrote last edited by
          #5

          @wdormann so basically a "#cloud-based #utilman-style "privilegue escalation"?
          https://www.youtube.com/watch?v=X_9OuDjl97M

          kkarhan@jorts.horseK 1 Reply Last reply
          0
          • kkarhan@jorts.horseK kkarhan@jorts.horse

            @wdormann so basically a "#cloud-based #utilman-style "privilegue escalation"?
            https://www.youtube.com/watch?v=X_9OuDjl97M

            kkarhan@jorts.horseK This user is from outside of this forum
            kkarhan@jorts.horseK This user is from outside of this forum
            kkarhan@jorts.horse
            wrote last edited by
            #6

            @wdormann I can't wait for this to get #BadUSB'd like #PoisonTap!

            - YouTube

            Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.

            favicon

            (www.youtube.com)

            kkarhan@jorts.horseK 1 Reply Last reply
            0
            • kkarhan@jorts.horseK kkarhan@jorts.horse

              @wdormann I can't wait for this to get #BadUSB'd like #PoisonTap!

              - YouTube

              Auf YouTube findest du die angesagtesten Videos und Tracks. Außerdem kannst du eigene Inhalte hochladen und mit Freunden oder gleich der ganzen Welt teilen.

              favicon

              (www.youtube.com)

              kkarhan@jorts.horseK This user is from outside of this forum
              kkarhan@jorts.horseK This user is from outside of this forum
              kkarhan@jorts.horse
              wrote last edited by
              #7

              @wdormann ...or like #PwnPiALOA.
              https://www.youtube.com/watch?v=s0K-YIL_G5c

              #P4wnP1 #PwnPi #P4wnP1ALOA #ALOA

              1 Reply Last reply
              0
              • mttaggart@infosec.exchangeM mttaggart@infosec.exchange shared this topic
              • wdormann@infosec.exchangeW wdormann@infosec.exchange

                @astraleureka
                Yes it uses both.

                astraleureka@social.treehouse.systemsA This user is from outside of this forum
                astraleureka@social.treehouse.systemsA This user is from outside of this forum
                astraleureka@social.treehouse.systems
                wrote last edited by
                #8

                @wdormann Just finished reading through the source, thank you. Much simpler than the first version, and makes the root issue a lot more clear. This is pretty nasty, MS has some serious egg on their faces over this one

                1 Reply Last reply
                0
                • wdormann@infosec.exchangeW wdormann@infosec.exchange

                  From the same author as BlueHammer we now have RedSun.

                  This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled.

                  Link Preview ImageLink Preview ImageLink Preview Image
                  xc3ll@mastodon.socialX This user is from outside of this forum
                  xc3ll@mastodon.socialX This user is from outside of this forum
                  xc3ll@mastodon.social
                  wrote last edited by
                  #9

                  @wdormann

                  Link Preview Image
                  1 Reply Last reply
                  0
                  • wdormann@infosec.exchangeW wdormann@infosec.exchange

                    From the same author as BlueHammer we now have RedSun.

                    This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled.

                    Link Preview ImageLink Preview ImageLink Preview Image
                    christopherkunz@chaos.socialC This user is from outside of this forum
                    christopherkunz@chaos.socialC This user is from outside of this forum
                    christopherkunz@chaos.social
                    wrote last edited by
                    #10

                    @wdormann Hey, just so I can learn this: How do I compile RedSun.cpp under Win32 with VS or gcc? I can't seem to include cfapi.h correctly (I have the full win32 sdk under the default location).

                    wdormann@infosec.exchangeW 1 Reply Last reply
                    0
                    • christopherkunz@chaos.socialC christopherkunz@chaos.social

                      @wdormann Hey, just so I can learn this: How do I compile RedSun.cpp under Win32 with VS or gcc? I can't seem to include cfapi.h correctly (I have the full win32 sdk under the default location).

                      wdormann@infosec.exchangeW This user is from outside of this forum
                      wdormann@infosec.exchangeW This user is from outside of this forum
                      wdormann@infosec.exchange
                      wrote last edited by
                      #11

                      @christopherkunz
                      TBH, for code that doesn't include a .SLN file, I usually have minimal luck compiling it straight-up with cl.exe

                      In this case, I simply made a new Visual Studio 2022 project for a console app, and then replaced the .CPP file contents with what's in the GitHub repo. There are a slew of warnings, but it compiles.

                      <snip>
                      1>C:\Users\test\source\repos\test\test\test.cpp(431,11): warning C4267: 'initializing': conversion from 'size_t' to 'int', possible loss of data
                      1>C:\Users\test\source\repos\test\test\test.cpp(694,49): warning C4267: '=': conversion from 'size_t' to 'ULONG', possible loss of data
                      1>C:\Users\test\source\repos\test\test\test.cpp(696,92): warning C4267: 'argument': conversion from 'size_t' to 'ULONG', possible loss of data
                      1>C:\Users\test\source\repos\test\test\test.cpp(714,20): warning C4267: 'initializing': conversion from 'size_t' to 'DWORD', possible loss of data
                      1>C:\Users\test\source\repos\test\test\test.cpp(736,57): warning C4838: conversion from 'LONG' to 'DWORD' requires a narrowing conversion
                      1>Generating code
                      1>Previous IPDB not found, fall back to full compilation.
                      1>All 27 functions were compiled because no usable IPDB/IOBJ from previous compilation was found.
                      1>Finished generating code
                      1>test.vcxproj -> C:\Users\test\source\repos\test\x64\Release\test.exe
                      1>Done building project "test.vcxproj".
                      ========== Build: 1 succeeded, 0 failed, 0 up-to-date, 0 skipped ==========
                      ========== Build completed at 8:43 AM and took 01.818 seconds ==========
                      christopherkunz@chaos.socialC 1 Reply Last reply
                      0
                      • wdormann@infosec.exchangeW wdormann@infosec.exchange

                        @christopherkunz
                        TBH, for code that doesn't include a .SLN file, I usually have minimal luck compiling it straight-up with cl.exe

                        In this case, I simply made a new Visual Studio 2022 project for a console app, and then replaced the .CPP file contents with what's in the GitHub repo. There are a slew of warnings, but it compiles.

                        <snip>
                        1>C:\Users\test\source\repos\test\test\test.cpp(431,11): warning C4267: 'initializing': conversion from 'size_t' to 'int', possible loss of data
                        1>C:\Users\test\source\repos\test\test\test.cpp(694,49): warning C4267: '=': conversion from 'size_t' to 'ULONG', possible loss of data
                        1>C:\Users\test\source\repos\test\test\test.cpp(696,92): warning C4267: 'argument': conversion from 'size_t' to 'ULONG', possible loss of data
                        1>C:\Users\test\source\repos\test\test\test.cpp(714,20): warning C4267: 'initializing': conversion from 'size_t' to 'DWORD', possible loss of data
                        1>C:\Users\test\source\repos\test\test\test.cpp(736,57): warning C4838: conversion from 'LONG' to 'DWORD' requires a narrowing conversion
                        1>Generating code
                        1>Previous IPDB not found, fall back to full compilation.
                        1>All 27 functions were compiled because no usable IPDB/IOBJ from previous compilation was found.
                        1>Finished generating code
                        1>test.vcxproj -> C:\Users\test\source\repos\test\x64\Release\test.exe
                        1>Done building project "test.vcxproj".
                        ========== Build: 1 succeeded, 0 failed, 0 up-to-date, 0 skipped ==========
                        ========== Build completed at 8:43 AM and took 01.818 seconds ==========
                        christopherkunz@chaos.socialC This user is from outside of this forum
                        christopherkunz@chaos.socialC This user is from outside of this forum
                        christopherkunz@chaos.social
                        wrote last edited by
                        #12

                        @wdormann Yeah, this worked fine. As did the exploit. Thanks for your help! (And for anyone else reading this, the keyboard shortcut to "just compile, don't run" is ctrl-shift-b)

                        1 Reply Last reply
                        0
                        • wdormann@infosec.exchangeW wdormann@infosec.exchange

                          From the same author as BlueHammer we now have RedSun.

                          This works 100% reliably to go from unprivileged user to SYSTEM against Windows 11 and Windows Server with April 2026 updates, as well as Windows 10, as long as you have Windows Defender enabled.

                          Link Preview ImageLink Preview ImageLink Preview Image
                          Q This user is from outside of this forum
                          Q This user is from outside of this forum
                          qdkp@cyberplace.social
                          wrote last edited by
                          #13

                          @wdormann Thank you. Blocking cldapi.dll using AppLocker works though that will break OneDrive and stuff like that.

                          wdormann@infosec.exchangeW 1 Reply Last reply
                          0
                          • Q qdkp@cyberplace.social

                            @wdormann Thank you. Blocking cldapi.dll using AppLocker works though that will break OneDrive and stuff like that.

                            wdormann@infosec.exchangeW This user is from outside of this forum
                            wdormann@infosec.exchangeW This user is from outside of this forum
                            wdormann@infosec.exchange
                            wrote last edited by
                            #14

                            @qdkp
                            People don't use OneDrive intentionally, do they? 😂

                            Q 1 Reply Last reply
                            0
                            • wdormann@infosec.exchangeW wdormann@infosec.exchange

                              @qdkp
                              People don't use OneDrive intentionally, do they? 😂

                              Q This user is from outside of this forum
                              Q This user is from outside of this forum
                              qdkp@cyberplace.social
                              wrote last edited by
                              #15

                              @wdormann 😭

                              1 Reply Last reply
                              0
                              • wdormann@infosec.exchangeW wdormann@infosec.exchange

                                From the GitHub repo:

                                When Windows Defender realizes that a malicious file has a cloud tag, for whatever stupid and hilarious reason, the antivirus that's supposed to protect decides that it is a good idea to just rewrite the file it found again to it's original location.

                                This Exploit uses the "Cloud Files API", writes EICAR to a file using it, uses an oplock to win a volume shadow copy race, and uses a directory junction/reparse point to redirect the file rewrite (with new contents) to C:\Windows\system32\TieringEngineService.exe. At this point, the Cloud Files Infrastructure runs TieringEngineService.exe as SYSTEM. Game over.

                                wdormann@infosec.exchangeW This user is from outside of this forum
                                wdormann@infosec.exchangeW This user is from outside of this forum
                                wdormann@infosec.exchange
                                wrote last edited by
                                #16

                                Interestingly, a good chunk of the [(12/73) AV detections on VT](https://www.virustotal.com/gui/file/d84250e2ad053ab4097d0591933935573e4cab3e975360004a126abc102dc6f6 for this RedSun.exe exploit are due to the EICAR part being detected, despite the string being reversed in the code. (note: this reversal apparently does nothing to prevent EICAR detection in the AV engines on VT)

                                If we make the EICAR string less obvious (encrypted), the detections drop to 5.

                                Defender currently doesn't detect the exploit in either case.

                                Link Preview ImageLink Preview Image
                                1 Reply Last reply
                                1
                                0
                                • R relay@relay.infosec.exchange shared this topic
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups