Merge remote-tracking branch 'upstream/master' into windows_11_sprint

This commit is contained in:
Wietze
2022-10-03 16:16:30 +01:00
176 changed files with 502 additions and 341 deletions

View File

@@ -34,4 +34,3 @@ Resources:
Acknowledgement:
- Person: Jimmy
Handle: '@bohops'
---

View File

@@ -23,4 +23,3 @@ Resources:
Acknowledgement:
- Person: mr.d0x
Handle: '@mrd0x'
---

View File

@@ -28,4 +28,3 @@ Resources:
Acknowledgement:
- Person: Eleftherios Panos
Handle: '@lefterispan'
---

View File

@@ -44,4 +44,3 @@ Acknowledgement:
Handle: '@moo_hax'
- Person: Matt Wilson
Handle: '@enigma0x3'
---

View File

@@ -60,4 +60,3 @@ Resources:
Acknowledgement:
- Person: Oddvar Moe
Handle: '@oddvarmoe'
---

View File

@@ -42,4 +42,3 @@ Acknowledgement:
Handle: '@mrd0x'
- Person: Spooky Sec
Handle: '@sec_spooky'
---

View File

@@ -46,4 +46,3 @@ Acknowledgement:
Handle:
- Person: Casey Erikson
Handle:
---

View File

@@ -28,4 +28,3 @@ Resources:
Acknowledgement:
- Person: Casey Smith
Handle: '@subtee'
---

View File

@@ -22,4 +22,3 @@ Resources:
Acknowledgement:
- Person: checkymander
Handle: '@checkymander'
---

View File

@@ -30,4 +30,3 @@ Resources:
Acknowledgement:
- Person: felamos
Handle: '@_felamos'
---

View File

@@ -25,4 +25,3 @@ Resources:
Acknowledgement:
- Person: Matt Nelson
Handle: '@enigma0x3'
---

View File

@@ -6,6 +6,7 @@ Created: 2019-11-12
Commands:
- Command: dotnet.exe [PATH_TO_DLL]
Description: dotnet.exe will execute any dll even if applocker is enabled.
Usecase: Execute code bypassing AWL
Category: AWL Bypass
Privileges: User
MitreID: T1218
@@ -19,6 +20,7 @@ Commands:
OperatingSystem: Windows 7 and up with .NET installed
- Command: dotnet.exe msbuild [Path_TO_XML_CSPROJ]
Description: dotnet.exe with msbuild (SDK Version) will execute unsigned code
Usecase: Execute code bypassing AWL
Category: AWL Bypass
Privileges: User
MitreID: T1218
@@ -38,4 +40,3 @@ Acknowledgement:
Handle: '@_felamos'
- Person: Jimmy
Handle: '@bohops'
---

View File

@@ -21,4 +21,3 @@ Resources:
Acknowledgement:
- Person: mr.d0x
Handle: '@mrd0x'
---

View File

@@ -23,4 +23,3 @@ Resources:
Acknowledgement:
- Person: Matt harr0ey
Handle: '@harr0ey'
---

View File

@@ -38,4 +38,3 @@ Resources:
Acknowledgement:
- Person: 'Reegun J (OCBC Bank)'
Handle: '@reegun21'
---

View File

@@ -36,4 +36,3 @@ Acknowledgement:
Handle: '@NickTyrer'
- Person: Jimmy
Handle: '@bohops'
---

View File

@@ -32,4 +32,3 @@ Acknowledgement:
Handle: '@NickTyrer'
- Person: Jimmy
Handle: '@bohops'
---

View File

@@ -31,4 +31,3 @@ Resources:
Acknowledgement:
- Person: fabrizio
Handle: '@0rbz_'
---

View File

@@ -14,7 +14,7 @@ Commands:
- Command: msdeploy.exe -verb:sync -source:RunCommand -dest:runCommand="c:\temp\calc.bat"
Description: Launch calc.bat via msdeploy.exe.
Usecase: Local execution of batch file using msdeploy.exe.
Category: AWL bypass
Category: AWL Bypass
Privileges: User
MitreID: T1218
OperatingSystem: Windows server
@@ -30,4 +30,3 @@ Resources:
Acknowledgement:
- Person: Pierre-Alexandre Braeken
Handle: '@pabraeken'
---

View File

@@ -33,7 +33,7 @@ Commands:
MitreID: T1218
OperatingSystem: Windows
Full_Path:
- Path:
- Path: no default
Code_Sample:
- Code:
Detection:
@@ -47,4 +47,3 @@ Resources:
Acknowledgement:
- Person: Casey Smith
Handle: '@subtee'
---

View File

@@ -25,4 +25,3 @@ Resources:
Acknowledgement:
- Person: Sean Metcalf
Handle: '@PyroTek3'
---

View File

@@ -35,4 +35,3 @@ Resources:
Acknowledgement:
- Person: Reegun J (OCBC Bank)
Handle: '@reegun21'
---

View File

@@ -1,6 +1,8 @@
---
Name: Procdump(64).exe
Name: Procdump.exe
Description: SysInternals Memory Dump Tool
Aliases:
- Alias: Procdump64.exe
Author: 'Alfie Champion (@ajpc500)'
Created: 2020-10-14
Commands:
@@ -18,6 +20,8 @@ Commands:
Privileges: User
MitreID: T1202
OperatingSystem: Windows 8.1 and higher, Windows Server 2012 and higher.
Full_Path:
- Path: no default
Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/f36b1cbd2a3f1a7423f43a67a182549778700615/rules/windows/process_creation/win_susp_procdump.yml
- Sigma: https://github.com/SigmaHQ/sigma/blob/f36b1cbd2a3f1a7423f43a67a182549778700615/rules/windows/process_creation/win_procdump.yml
@@ -29,6 +33,5 @@ Detection:
Resources:
- Link: https://twitter.com/ajpc500/status/1448588362382778372?s=20
Acknowledgement:
- Name: Alfie Champion
- Person: Alfie Champion
Handle: '@ajpc500'
---

View File

@@ -19,7 +19,7 @@ Commands:
MitreID: T1127
OperatingSystem: Windows
Full_Path:
- Path:
- Path: no default
Code_Sample:
- Code:
Detection:
@@ -32,4 +32,3 @@ Resources:
Acknowledgement:
- Person: Matt Nelson
Handle: '@enigma0x3'
---

View File

@@ -10,21 +10,21 @@ Commands:
Category: AWL Bypass
Privileges: User
MitreID: T1127
OperatingSystem:
OperatingSystem: Windows
- Command: Remote.exe /s "powershell.exe" anythinghere
Description: Spawns powershell as a child process of remote.exe
Usecase: Executes a process under a trusted Microsoft signed binary
Category: Execute
Privileges: User
MitreID: T1127
OperatingSystem:
OperatingSystem: Windows
- Command: Remote.exe /s "\\10.10.10.30\binaries\file.exe" anythinghere
Description: Run a remote file
Usecase: Executing a remote binary without saving file to disk
Category: Execute
Privileges: User
MitreID: T1127
OperatingSystem:
OperatingSystem: Windows
Full_Path:
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\remote.exe
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\remote.exe
@@ -37,4 +37,3 @@ Resources:
Acknowledgement:
- Person: mr.d0x
Handle: '@mrd0x'
---

View File

@@ -34,4 +34,3 @@ Resources:
Acknowledgement:
- Person: Luis Rocha
Handle: '@countuponsec'
---

View File

@@ -33,4 +33,3 @@ Acknowledgement:
Handle: '@bryon_'
- Person: Manny
Handle: '@ManuelBerrueta'
---

View File

@@ -24,4 +24,3 @@ Resources:
Acknowledgement:
- Person: Pierre-Alexandre Braeken
Handle: '@pabraeken'
---

View File

@@ -55,4 +55,3 @@ Acknowledgement:
Handle: '@reegun21'
- Person: Adam
Handle: '@Hexacorn'
---

View File

@@ -12,7 +12,7 @@ Commands:
MitreID: T1127
OperatingSystem: Windows
Full_Path:
- Path:
- Path: no default
Code_Sample:
- Code:
Detection:
@@ -22,4 +22,3 @@ Resources:
Acknowledgement:
- Person: Giuseppe N3mes1s
Handle: '@gN3mes1s'
---

View File

@@ -19,7 +19,7 @@ Commands:
MitreID: T1127
OperatingSystem: Windows
Full_Path:
- Path:
- Path: no default
Code_Sample:
- Code:
Detection:
@@ -30,4 +30,3 @@ Resources:
Acknowledgement:
- Person: Casey Smith
Handle: '@subTee'
---

View File

@@ -119,4 +119,3 @@ Acknowledgement:
- Person: Adam
Handle: '@Hexacorn'
- Person: Jesus Galvez
---

View File

@@ -22,4 +22,3 @@ Resources:
Acknowledgement:
- Person: timwhite
Handle:
---

View File

@@ -28,4 +28,3 @@ Acknowledgement:
Handle: '@tifkin'
- Person: Jimmy
Handle: '@bohops'
---

View File

@@ -22,4 +22,3 @@ Resources:
Acknowledgement:
- Person: Pierre-Alexandre Braeken
Handle: '@pabraeken'
---

View File

@@ -25,4 +25,3 @@ Acknowledgement:
Handle: '@mattifestation'
- Person: Jimmy
Handle: '@bohops'
---

View File

@@ -38,4 +38,3 @@ Resources:
Acknowledgement:
- Person: 'Reegun J (OCBC Bank)'
Handle: '@reegun21'
---

View File

@@ -49,4 +49,3 @@ Acknowledgement:
Handle: '@NotoriousRebel1'
- Person: Asif Matadar
Handle: '@d1r4c'
---