Cobalt Strike 4.12 Released With New Process Injection, UAC Bypasses and Malleable C2 Options

Cobalt Strike 4.12 Released With New Process Injection, UAC Bypasses and Malleable C2 Options

Cobalt Strike 4.12

New release brings significant improvements to the penetration testing framework, introducing enhanced GUI features, REST API support, and powerful new evasion techniques that security researchers can leverage for offensive operations.

The latest release features a completely redesigned graphical interface with multiple theme options, including Dracula, Solarized, and Monokai.

All visualizations have been updated, including an improved Pivot Graph that now displays listener names and transition types for better infrastructure management.

Category Feature
GUI & Interface Modern redesigned client with Dracula, Solarized, Monokai themes
Updated Pivot Graph with listener names and pivot types
Java 17 minimum requirement
REST API Script with any programming language (Beta)
Advanced automation and custom client development
ML/LLM integration support
Custom C2 User Defined Command and Control (UDC2)
Custom C2 channels via BOFs
ICMP and unconventional channel routing
Process Injection RtlCloneUserProcess (DirtyVanity-based)
TpDirect (thread pool manipulation)
TpStartRoutineStub (thread pool triggering)
EarlyCascade (fork/run injection)
UAC Bypasses uac-rpc-dom (AppInfo ALPC bypass)
uac-cmlua (ICMLuaUtil COM interface)
Windows 10–11 24H2 compatible
Memory Operations BeaconDownload API (up to 2GB in-memory)
Drip loading for EDR evasion
No disk writes for sensitive data
Beacon Improvements Sleepmask for pivot beacons
IPv6 SOCKS5 proxy support
Fixed SSH Beacon (Mac/Linux)
Task ID logging for operations

A significant change requires users to upgrade to Java 17 or newer. Earlier Java versions will no longer run the application, ensuring access to modern security features and improved performance.

Revolutionary REST API and Custom C2 Channels

For the first time, Cobalt Strike users can script the framework using any programming language through a new REST API (currently in beta).

This enables advanced automation, server-side operation storage, and the development of custom Cobalt Strike clients.

google

The REST API opens the door to integrating machine learning models into offensive workflows, in line with emerging research by security teams exploring AI-powered exploitation techniques.

The high-level architecture of UDC2
The high-level architecture of UDC2

Additionally, User Defined Command and Control (UDC2) allows operators to develop custom C2 channels as Beacon Object Files (BOFs).

This eliminates previous limitations by enabling traffic to be routed through unconventional channels, such as ICMP, while maintaining compatibility with custom transformations and obfuscation methods.

Enhanced Process Injection and UAC Bypasses

Cobalt Strike 4.12 introduces four new process injection techniques designed to evade endpoint detection and response (EDR) systems.

These include RtlCloneUserProcess (based on DirtyVanity research), TpDirect, TpStartRoutineStub, and EarlyCascade, all implemented as BOFs for flexibility.

Two new UAC bypass methods, uac-rpc-dom and uac-cmlua, work across Windows 10 through Windows 11 24H2, providing reliable privilege escalation paths for tested environments.

A screenshot of the new Process Injection GUI with a custom technique
A screenshot of the new Process Injection GUI with a custom technique

The BeaconDownload API now supports downloading in-memory buffers up to 2GB without writing files to disk, reducing analytical indicators.

Drip-loading functionality has been added to break event correlation by spreading payload writes with delays, thereby defeating detection logic based on injection-primitive sequences.

A screenshot showing the new UDRL-VS GUI
A screenshot showing the new UDRL-VS GUI

Pivot Beacons now support the Sleepmask evasion technology, and IPv6 support has been added for SOCKS5 proxying, expanding operational flexibility.

These updates position Cobalt Strike 4.12 as a comprehensive framework for modern red team operations and security research.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link