LOLBAS/yml/OSLibraries/Zipfldr.yml

40 lines
1.3 KiB
YAML
Raw Normal View History

2018-09-24 04:23:04 +02:00
---
Name: Zipfldr.dll
Description: Compressed Folder library
Author: ''
Created: '2018-05-25'
Commands:
- Command: rundll32.exe zipfldr.dll,RouteTheCall calc.exe
Description: Launch an executable payload by calling RouteTheCall.
2018-09-24 20:36:13 +02:00
UseCase: Launch an executable.
2018-09-24 04:23:04 +02:00
Category: Execution
Privileges: User
MitreID: T1085
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
OperatingSystem: Windows
- Command: rundll32.exe zipfldr.dll,RouteTheCall file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e
Description: Launch an executable payload by calling RouteTheCall (obfuscated).
2018-09-24 20:36:13 +02:00
UseCase: Launch an executable.
2018-09-24 04:23:04 +02:00
Category: Execution
Privileges: User
MitreID: T1085
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
OperatingSystem: Windows
Full Path:
2018-09-24 20:36:13 +02:00
- Path: c:\windows\system32\zipfldr.dll
- Path: c:\windows\syswow64\zipfldr.dll
2018-09-24 04:23:04 +02:00
Code Sample:
2018-09-24 20:36:13 +02:00
- Code: ''
Detection:
- IOC: ''
2018-09-24 04:23:04 +02:00
Resources:
2018-09-24 20:36:13 +02:00
- Link: https://twitter.com/moriarty_meng/status/977848311603380224
- Link: https://twitter.com/bohops/status/997896811904929792
- Link: https://windows10dll.nirsoft.net/zipfldr_dll.html
2018-09-24 04:23:04 +02:00
Acknowledgment:
- Person: Moriarty (Execution)
Handle: '@moriarty_meng'
- Person: r0lan (Obfuscation)
2018-09-24 20:36:13 +02:00
Handle: '@r0lan'
---