Skip to content

Commit 9b88d3b

Browse files
committed
Update README.md
1 parent e5f37f2 commit 9b88d3b

File tree

1 file changed

+1
-133
lines changed

1 file changed

+1
-133
lines changed

README.md

Lines changed: 1 addition & 133 deletions
Original file line numberDiff line numberDiff line change
@@ -1,133 +1 @@
1-
# Fuck-Windows-Security
2-
> [!CAUTION]
3-
> ## MALWARE AHEAD! IF YOU DO NOT KNOW WHAT THAT IS, LEAVE.
4-
<div align=center>
5-
6-
<img src="https://github.com/BenzoXdev/Fuck-Windows-Security/blob/main/disclaimer.png" width="700">
7-
8-
</div>
9-
10-
<br>
11-
12-
> [!WARNING]
13-
> ***This script was NOT optimized to shorten and obfuscate the code but rather intended to have as much readability as possible for new coders to learn!***
14-
15-
# How does it work?
16-
17-
* Well, if we want to disable Windows's security features, we can use **Registry Editor** for that. However, we will need administrative privileges to access regedit. Like who's gonna run a malware as administrator?
18-
19-
* First, the script will check if it is running in a virtual environment, if it is, it will delete itself.
20-
21-
> [!NOTE]
22-
> The Anti-VM feature in this script was written by referencing the Metasploit's "[checkvm](https://github.com/rapid7/metasploit-framework/blob/master/modules/post/windows/gather/checkvm.rb)" module.
23-
24-
| Currently Supported VMs | Status |
25-
|-------------------------|----------|
26-
| [Parallels](https://www.parallels.com) | Tested ✅ |
27-
| [Hyper-V](https://learn.microsoft.com/en-us/virtualization/hyper-v-on-windows/about) | Tested ✅ |
28-
| [VMware](https://www.vmware.com) | Tested ✅ |
29-
| [VirutalBox](https://www.virtualbox.org) | Tested ✅ |
30-
| [Xen](https://xenproject.org) | Tested ✅ |
31-
| [QEMU/KVM](https://www.qemu.org) | Tested ✅ |
32-
33-
## Privilege Escalation
34-
35-
- In Windows, when a user is requesting to open **“Manage Optional Features”** in settings, a process is created under the name **“fodhelper.exe”**. This process is running with the highest privileges without any permissions being asked directly when executed because it's a trusted binary and signed by Microsoft.
36-
37-
- The following checks are performed in the registry upon start of **fodhelper.exe**:
38-
39-
> ```plaintext
40-
> HKCU:\Software\Classes\ms-settings\shell\open\command
41-
> HKCU:\Software\Classes\ms-settings\shell\open\command\DelegateExecute
42-
> HKCU:\Software\Classes\ms-settings\shell\open\command\(default)
43-
> ```
44-
45-
- Since these registry entries doesn’t exist, we can create this structure in the registry to manipulate fodhelper to execute our script with higher privileges bypassing the **User Account Control (UAC)**.
46-
47-
## Features that the script will disable:
48-
```bash
49-
> All The Windows Defender Features (including SmartScreen)
50-
> Windows Recovery Environment (WinRE)
51-
> Windows Firewall
52-
> Windows Update
53-
> System Restore
54-
> Task Manager
55-
> OneDrive
56-
> Cortana
57-
> Command Prompt (Cmd)
58-
> Remote Desktop
59-
> User Account Control (UAC)
60-
> Windows Security Center
61-
> Windows Error Reporting
62-
> Remote Assistance
63-
> Windows Update Medic Service
64-
> Background Intelligent Transfer Service (BITS)
65-
> Windows Script Host
66-
> Event Logging
67-
> Windows Security Notifications
68-
> Windows Search
69-
> Automatic Maintenance
70-
> Device Guard
71-
> Application Guard
72-
> Windows Defender Exploit Guard
73-
> Telemetry and Data Collection
74-
```
75-
76-
## Self Replication & Self Destruction
77-
78-
* After disabling the Windows Security features, the script will copy itself to the startup folder with a random file name for persistence and will delete all traces of its execution.
79-
80-
* However, when the script is compiled and executed as an ".exe" file, it becomes a process, and we can no longer modify or delete the file itself due to the **[File Locking Mechanism](https://en.wikipedia.org/wiki/File_locking)**.
81-
82-
* Since we couldn't delete the script itself after it has done its job, we have 2 alternatives to delete it:
83-
84-
```powershell
85-
$ScriptPath = $MyInvocation.MyCommand.Path
86-
$ExePath = (Get-Process -Id $PID).Path
87-
$FullPath = if ($ScriptPath) { $ScriptPath } else { $ExePath }
88-
89-
# First alternative: Start another process to delete it
90-
Start-Process powershell.exe -ArgumentList "-NoProfile -Command `"Remove-Item -Path '$FullPath' -Force -ErrorAction SilentlyContinue`"" -WindowStyle Hidden
91-
92-
# Second alternative: Create a temporary batch script to delete it
93-
$tempScript = [System.IO.Path]::Combine([System.IO.Path]::GetTempPath(), [System.IO.Path]::GetRandomFileName() + ".cmd")
94-
$cmdContent = "chcp 1252" + [Environment]::NewLine + "ping 127.0.0.1 -n 2 > nul" + [Environment]::NewLine + "del /q /f `"$FullPath`"" + [Environment]::NewLine + "del /q /f %~f0"
95-
Set-Content -Path $tempScript -Value $cmdContent
96-
Start-Process cmd.exe -ArgumentList "/c $tempScript" -WindowStyle Hidden
97-
```
98-
> ***The first alternative has been used in the script.***
99-
100-
# How to convert the script into an executable?
101-
102-
**1. Open PowerShell as administrator**
103-
104-
**2. Install [PS2EXE](https://www.advancedinstaller.com/convert-powershell-to-exe)**
105-
106-
```powershell
107-
Install-Module ps2exe
108-
```
109-
110-
**3. Open the GUI**
111-
112-
```powershell
113-
win-ps2exe
114-
```
115-
116-
> [!IMPORTANT]
117-
> #### Once the script has been converted to an ".exe" file, it can be flagged as:
118-
> * [**Trojan:Win32/AgentTesla!ml**](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Trojan%3AWin32%2FAgentTesla!ml&threatid=2147760503)
119-
> * [**Trojan:Win32/Bearfoos.A!ml**](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Trojan%3AWin32%2FBearfoos.A!ml&threatid=2147731250)
120-
> * [**Trojan:Win32/Wacatac.B!ml**](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Trojan%3AWin32%2FWacatac.H!ml&threatid=2147814523)
121-
122-
<hr>
123-
124-
> [!TIP]
125-
> ### If you executed the script, you can also run the `Enable.reg` file to repair the damage it caused.
126-
> And also open cmd as administrator then run this commmand to enable WinRE:
127-
```bash
128-
reagentc /enable
129-
```
130-
131-
## Contributing
132-
133-
I would really like to add an Escape-VM feature to this script, but it's a really complicated thing, soo if you wanna help me you can open a pull request :)
1+
I'm sorry, I can't assist with that.

0 commit comments

Comments
 (0)