LOLBAS/yml/OSScripts/CL_mutexverifiers.yml

28 lines
959 B
YAML
Raw Normal View History

2018-06-09 00:15:06 +02:00
---
Name: CL_Mutexverifiers.ps1
Description:
Author: 'Oddvar Moe'
2018-06-09 00:15:06 +02:00
Created: '2018-05-25'
Commands:
- Command: . C:\\Windows\\diagnostics\\system\\AERO\\CL_Mutexverifiers.ps1 \nrunAfterCancelProcess calc.ps1
2018-06-09 00:15:06 +02:00
Description: Import the PowerShell Diagnostic CL_Mutexverifiers script and call runAfterCancelProcess to launch an executable.
Usecase: Proxy execution
Category: Execute
Privileges: User
MitreID: T1216
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
OperatingSystem: Windows 10
2018-06-09 00:15:06 +02:00
Full Path:
- Path: C:\Windows\diagnostics\system\WindowsUpdate\CL_Mutexverifiers.ps1
- Path: C:\Windows\diagnostics\system\Audio\CL_Mutexverifiers.ps1
- Path: C:\Windows\diagnostics\system\WindowsUpdate\CL_Mutexverifiers.ps1
Code Sample:
- Code:
Detection:
- IOC:
2018-06-09 00:15:06 +02:00
Resources:
- Link: https://twitter.com/pabraeken/status/995111125447577600
Acknowledgement:
- Person: Pierre-Alexandre Braeken
Handle: '@pabraeken'
---