Skip to content

Comments

Add new Proxy Execution techniques for dxcap.exe and cmstp.exe#489

Open
ghosts621 wants to merge 4 commits intoLOLBAS-Project:masterfrom
ghosts621:master
Open

Add new Proxy Execution techniques for dxcap.exe and cmstp.exe#489
ghosts621 wants to merge 4 commits intoLOLBAS-Project:masterfrom
ghosts621:master

Conversation

@ghosts621
Copy link

Hi team,

This PR introduces two new execution techniques I found:

1. dxcap.exe (Search Order Hijacking / Proxy Execution)
Executing dxcap.exe -usage attempts to load Xperf.exe. By copying dxcap.exe to a user-writable directory (e.g., %TEMP%) and placing a payload named Xperf.exe alongside it, we achieve proxy execution with standard User privileges.

2. cmstp.exe (DLL Sideloading via Registry)
By setting the CmstpExtensionDll registry value under HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cmmgr32.exe, running cmstp.exe /nf will read this registry value and pass it directly to LoadLibrary. This allows for arbitrary DLL sideloading (Requires Admin).

Both POCs (via Gist links), detection IOCs, and my Acknowledgement handle have been added to their respective YML files.

Let me know if you need any adjustments. Thanks!

Hi team,

Thank you for this awesome project! 

I am submitting a new execution technique for an existing LOLBin (`dxcap.exe`). 

**Description of the new finding:**
When executing `dxcap.exe` with the `-usage` flag, it attempts to load and execute `Xperf.exe` (which is typically installed via the Windows ADK and is not present by default). 

By copying `dxcap.exe` to a user-writable directory (e.g., `%TEMP%`) and placing a malicious payload named `Xperf.exe` alongside it, `dxcap.exe` will natively execute the payload via Search Order Hijacking. 

**Key Points:**
* **Privileges:** Standard User (No Admin required).
* **Category:** Execute / Proxy Execution.
* **POC:** I have included a Gist link with a PowerShell POC demonstrating the execution using `calc.exe` as the hijacked payload.

I have appended the new command, detection IOCs, and my Gist link to the existing `dxcap.yml` file. 

Let me know if you need any changes. Thanks!
Added a new execution technique for cmstp.exe using registry modification.
By setting the 'CmstpExtensionDll' value under 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cmmgr32.exe', cmstp.exe will pass this data directly to LoadLibrary when executed with the '/nf' flag.
This enables proxy execution / DLL sideloading of an arbitrary DLL.
@ghosts621 ghosts621 requested a review from a team as a code owner February 22, 2026 11:52
….yml

Resolved the duplicate filename error from the GitHub Actions check. 
Merged the new proxy execution command (Search Order Hijacking), IOCs, and acknowledgements into the existing yml/OtherMSBinaries/Dxcap.yml file.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant