mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-30 16:54:00 +01:00
25 lines
992 B
YAML
25 lines
992 B
YAML
|
---
|
||
|
Name: iediagcmd.exe
|
||
|
Description: Diagnostics Utility for Internet Explorer
|
||
|
Author: manasmbellani
|
||
|
Created: 2022-03-29
|
||
|
Commands:
|
||
|
- Command: 'set windir=c:\test& cd "C:\Program Files\Internet Explorer\" & iediagcmd.exe /out:c:\test\foo.cab'
|
||
|
Description: Executes binary that is pre-planted at C:\test\system32\netsh.exe.
|
||
|
Usecase: Spawn a pre-planted executable from iediagcmd.exe.
|
||
|
Category: Execute
|
||
|
Privileges: User
|
||
|
MitreID: T1218
|
||
|
OperatingSystem: Windows 10 1803, Windows 10 1703, Windows 10 22H1, Windows 10 22H2, Windows 11
|
||
|
Full_Path:
|
||
|
- Path: C:\Program Files\Internet Explorer\iediagcmd.exe
|
||
|
Detection:
|
||
|
- Sigma: https://github.com/manasmbellani/mycode_public/blob/master/sigma/rules/win_proc_creation_lolbin_iediagcmd.yml
|
||
|
- IOC: Sysmon Event ID 1
|
||
|
- IOC: Execution of process iediagcmd.exe with /out could be suspicious
|
||
|
Resources:
|
||
|
- Link: https://twitter.com/Hexacorn/status/1507516393859731456
|
||
|
Acknowledgement:
|
||
|
- Person: Adam
|
||
|
Handle: '@hexacorn'
|