Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-21894 PoC — Microsoft Windows Secure Boot 安全特征问题漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Secure Boot 安全特征问题漏洞 (CVE-2022-21894)
Description:Microsoft Windows Secure Boot是美国微软(Microsoft)公司的安全启动。 Microsoft Windows Secure Boot存在安全特征问题漏洞。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Serv
Description
Public repo for anything CVE-2022-21894
Readme
# CVE-2022-21894
Public repo for anything CVE-2022-21894

# Main page
https://www.microsoft.com/en-us/security/blog/2023/04/11/guidance-for-investigating-attacks-using-cve-2022-21894-the-blacklotus-campaign/
### Windows Defender now capable of removing this threat "Possible vulnerable EFI bootloader "

## Basic Detection
### Mounts the EFI system partition on the specified drive.
  $ mountvol /s

### Search for .efi files that have odd timestamps

  $ dir E:\EFI\Microsoft\Boot\*efi

### Get the FileHash of all the bootloader files to see if any generate ERROR_SHARING_VIOLATION
  $ Get-FileHash -Algorithm MD5 -Path (Get-ChildItem "E:\EFI\Microsoft\Boot\*.*" -Recurse)

### Staging directory presence
  Check historical presence of deleted files in a custom directory such as ESP:\system32\
  The directory is not deleted after BalckLotus installation.

### Check for HVCI integrity (if it exists)
  $ reg query HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard\Scenarios\HypervisorEnforcedCodeIntegrity

### Check for specific Windows Defender Events (tampering with Defender)
  $ Get-EventLog -LogName System -InstanceId 3006
  
  $ Get-EventLog -LogName System -InstanceId 7023

### Check for connection to C2 serve via winlogon.exe port 80
  $ netstat -ano | findstr ":80"
  
  $ tasklist /V | findstr "winlogon.exe"
#### Use sysmon and add new configuration to the sysmonconfig.xml
  <Image condition="image">winlogon.exe</Image>



## Sysmon
https://github.com/olafhartong/sysmon-modular

## Vulnerability

### Method
https://github.com/Wack0/CVE-2022-21894


File Snapshot

[4.0K] /data/pocs/93a03331c15b18ae8407ab75afc479dff7f29cf9 ├── [ 510] basic_commands └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.