diff --git a/yml/OSBinaries/wlrmdr.yml b/yml/OSBinaries/wlrmdr.yml new file mode 100644 index 0000000..5a7a993 --- /dev/null +++ b/yml/OSBinaries/wlrmdr.yml @@ -0,0 +1,31 @@ +--- +Name: Wlrmdr.exe +Description: Windows Logon Reminder executable +Author: 'Moshe Kaplan' +Created: 2021-11-08 +Commands: + - Command: wlrmdr.exe -s 3600 -f 0 -t _ -m _ -a 11 -u calc.exe + Description: Execute calc.exe with the parent process spawning from wlrmdr.exe + Usecase: Use wlrmdr as a proxy binary to evade defensive countermeasures + Category: Execute + Privileges: User + MitreID: T1202 + OperatingSystem: Windows 10 +Full_Path: + - Path: c:\windows\system32\wlrmdr.exe +Code_Sample: + - Code: +Detection: + - IOC: wlrmdr.exe spawning any new processes +Resources: + - Link: https://twitter.com/0gtweet/status/1493963591745220608 + - Link: https://twitter.com/Oddvarmoe/status/927437787242090496 + - Link: https://twitter.com/falsneg/status/1461625526640992260 + - Link: https://docs.microsoft.com/en-us/windows/win32/api/shellapi/ns-shellapi-notifyicondataw +Acknowledgement: + - Person: Grzegorz Tworek + Handle: '@0gtweet' + - Person: Oddvar Moe + Handle: '@Oddvarmoe' + - Person: Freddy + Handle: '@falsneg'