mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-25 22:39:27 +01:00
Update Shell32.yml
This commit is contained in:
parent
e618d6eeb0
commit
2c9043a8fe
@ -6,7 +6,7 @@ Created: '2018-05-25'
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: rundll32.exe shell32.dll,Control_RunDLL payload.dll
|
- Command: rundll32.exe shell32.dll,Control_RunDLL payload.dll
|
||||||
Description: Launch a DLL payload by calling the Control_RunDLL function.
|
Description: Launch a DLL payload by calling the Control_RunDLL function.
|
||||||
Usecase: Load a DLL payload.
|
UseCase: Load a DLL payload.
|
||||||
Category: Execution
|
Category: Execution
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
@ -14,29 +14,31 @@ Commands:
|
|||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
- Command: rundll32.exe shell32.dll,ShellExec_RunDLL beacon.exe
|
- Command: rundll32.exe shell32.dll,ShellExec_RunDLL beacon.exe
|
||||||
Description: Launch an executable by calling the ShellExec_RunDLL function.
|
Description: Launch an executable by calling the ShellExec_RunDLL function.
|
||||||
Usecase: Run an executable payload.
|
UseCase: Run an executable payload.
|
||||||
Category: Execution
|
Category: Execution
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
- Command: rundll32 SHELL32.DLL,ShellExec_RunDLL "cmd.exe" "/c echo hi"
|
- Command: rundll32 SHELL32.DLL,ShellExec_RunDLL "cmd.exe" "/c echo hi"
|
||||||
Description: Launch command line by calling the ShellExec_RunDLL function.
|
Description: Launch command line by calling the ShellExec_RunDLL function.
|
||||||
Usecase: Run an executable payload.
|
UseCase: Run an executable payload.
|
||||||
Category: Execution
|
Category: Execution
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
Full Path:
|
Full Path:
|
||||||
- path: c:\windows\system32\shell32.dll
|
- Path: c:\windows\system32\shell32.dll
|
||||||
- path: c:\windows\syswow64\shell32.dll
|
- Path: c:\windows\syswow64\shell32.dll
|
||||||
Code Sample: []
|
Code Sample:
|
||||||
Detection: []
|
- Code: ''
|
||||||
|
Detection:
|
||||||
|
- IOC: ''
|
||||||
Resources:
|
Resources:
|
||||||
- resource: https://twitter.com/Hexacorn/status/885258886428725250
|
- Link: https://twitter.com/Hexacorn/status/885258886428725250
|
||||||
- resource: https://twitter.com/pabraeken/status/991768766898941953
|
- Link: https://twitter.com/pabraeken/status/991768766898941953
|
||||||
- resource: https://twitter.com/mattifestation/status/776574940128485376
|
- Link: https://twitter.com/mattifestation/status/776574940128485376
|
||||||
- resource: https://twitter.com/KyleHanslovan/status/905189665120149506
|
- Link: https://twitter.com/KyleHanslovan/status/905189665120149506
|
||||||
- resource: https://windows10dll.nirsoft.net/shell32_dll.html
|
- Link: https://windows10dll.nirsoft.net/shell32_dll.html
|
||||||
Acknowledgment:
|
Acknowledgment:
|
||||||
- Person: Adam (Control_RunDLL)
|
- Person: Adam (Control_RunDLL)
|
||||||
Handle: '@hexacorn'
|
Handle: '@hexacorn'
|
||||||
@ -45,4 +47,4 @@ Acknowledgment:
|
|||||||
- Person: Matt Graeber (ShellExec_RunDLL)
|
- Person: Matt Graeber (ShellExec_RunDLL)
|
||||||
Handle: '@mattifestation'
|
Handle: '@mattifestation'
|
||||||
- Person: Kyle Hanslovan (ShellExec_RunDLL)
|
- Person: Kyle Hanslovan (ShellExec_RunDLL)
|
||||||
Handle: '@KyleHanslovan'
|
Handle: '@KyleHanslovan'
|
||||||
|
Loading…
Reference in New Issue
Block a user