mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-25 22:39:27 +01:00
Merge pull request #107 from nasbench/adding-dllhost-lolbin
Create Dllhost.yml
This commit is contained in:
commit
1bf91d246a
30
yml/OSBinaries/Dllhost.yml
Normal file
30
yml/OSBinaries/Dllhost.yml
Normal file
@ -0,0 +1,30 @@
|
||||
---
|
||||
Name: Dllhost.exe
|
||||
Description: Used by Windows to DLL Surrogate COM Objects
|
||||
Author: 'Nasreddine Bencherchali'
|
||||
Created: '2020-11-07'
|
||||
Commands:
|
||||
- Command: dllhost.exe /Processid:{CLSID}
|
||||
Description: Use dllhost.exe to load a registered or hijacked COM Server payload.
|
||||
Usecase: Execute a DLL Surrogate COM Object.
|
||||
Category: Execute
|
||||
Privileges: User
|
||||
MitreID: T1546.015
|
||||
MitreLink: https://attack.mitre.org/techniques/T1546/015/
|
||||
OperatingSystem: Windows 10 (and likely previous versions)
|
||||
Full_Path:
|
||||
- Path: C:\Windows\System32\dllhost.exe
|
||||
- Path: C:\Windows\SysWOW64\dllhost.exe
|
||||
Code_Sample:
|
||||
- Code:
|
||||
Detection:
|
||||
- IOC:
|
||||
Resources:
|
||||
- Link: https://twitter.com/CyberRaiju/status/1167415118847598594
|
||||
- Link: https://nasbench.medium.com/what-is-the-dllhost-exe-process-actually-running-ef9fe4c19c08
|
||||
Acknowledgement:
|
||||
- Person: Jai Minton
|
||||
Handle: '@CyberRaiju'
|
||||
- Person: Nasreddine Bencherchali
|
||||
Handle: '@nas_bench'
|
||||
---
|
Loading…
Reference in New Issue
Block a user