~/Privilege Escalation/Windows/Binaries# cat Syssetup.dll.md

Windows NT System Setup

Paths:

c:\windows\system32\syssetup.dll
c:\windows\syswow64\syssetup.dll

Detection:

AWL bypass

Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (section name specified).

rundll32.exe syssetup.dll,SetupInfObjectInstallAction DefaultInstall 128 c:\test\shady.inf

Execute

Launch an executable file via the SetupInfObjectInstallAction function and .inf file section directive.

rundll32 syssetup.dll,SetupInfObjectInstallAction DefaultInstall 128 c:\temp\something.inf