1 little known secret of cliconfg.exe
文章描述了通过复制并运行`cliconfg.exe`来加载多个旧版DLL文件的方法。其中`NTWDBLIB.DLL`会执行代码,因此将恶意负载放入该文件中会在运行时触发执行。 2025-11-4 01:33:32 Author: www.hexacorn.com(查看原文) 阅读量:9 收藏

This is a blast from the past.

Copy c:\WINDOWS\system32\cliconfg.exe to a folder of your choosing and execute it.

It will attempt to load a bunch of some very old-school DLLs:

  • C:\Windows\System32\DBMSRPCN.DLL
  • C:\Windows\System32\DBMSSPXN.DLL
  • C:\Windows\System32\DBMSADSN.DLL
  • C:\Windows\System32\DBMSVINN.DLL
  • C:\Windows\System32\DBMSGNET.DLL
  • C:\Windows\System32\DBMSSNET.DLL
  • C:\Windows\System32\DBMSQLGC.DLL
  • C:\Windows\System32\NTWDBLIB.DLL

The last one on the list is the one that executes code, so placing your payload inside C:\Windows\System32\NTWDBLIB.DLL is a guarantee that it will be executed when you run a copy of c:\WINDOWS\system32\cliconfg.exe from a different location.

I am lazy and am not researching the other ones, but I am sure it is most likely due to a lack of some specific export functions that my test DLLs miss to export that stop the code execution when these earlier DLLs are mapped to memory but not loaded.


文章来源: https://www.hexacorn.com/blog/2025/11/04/1-little-known-secret-of-cliconfg-exe/
如有侵权请联系:admin#unsafe.sh