/venom-rootkit

A simple Windows kernel rootkit.

Primary LanguageC++

Venom RootKit

I have written a simple windows rootkit to explore a bit about the world of rootkits and windows kernel in general. The Venom rootkit uses a few well-known methods commonly being used by other famous rootkits. Below are some of the main features listed in the "Features" section.

Flow

The flow of the rootkit is as follows: We start by dropping the rootkit .sys file and the UM .dll file to disk. Then, we load the rootkit driver, we can do so using some exploit or projects like DSEFix and KDMapper. Once the rootkit is loaded, it creates a device and a symlink, so that the UM client will be able to talk with it. Then it performs the IRP hook over the nsiproxy driver. And then it performs an APC injection of the UM dll to an arbitrary thread within "explorer.exe" (It can easily be changed). The APC injection is first queening a kernel APC and then a user APC, so we can avoid Microsoft ETW event on user-mode APC created from the kernel, as described here.

Demo

Here is a little demo of the port hiding feature - Port Hiding

  • My C&C is only for the POC, my main goal was the rootkit so I invested the minimum I needed for the demo.

Features

  • Dynamic APC injection to load the UM dll.
  • Process Hiding.
  • Token elevation to "NT AUTHORITY\SYSTEM".
  • Command execution.
  • TCP port hiding by IRP hooking nsiproxy driver.
  • C&C server communication.
  • Logging.
  • File hiding.
  • Anti VM/Debug (Maybe implement through TLS callbacks).
  • Dynamic config for UM client.

Some other projects I have taken inspiration from

Thanks

I want to thank @omerk2511 for helping and guiding me.

Disclaimer

This project is for educational purposes only, I am not responsible for any kind of abuse.