mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2025-09-14 20:20:44 +02:00
Add RDS Binaries (#453)
Co-authored-by: Wietze <wietze@users.noreply.github.com>
This commit is contained in:
24
yml/OSBinaries/Change.yml
Normal file
24
yml/OSBinaries/Change.yml
Normal file
@@ -0,0 +1,24 @@
|
||||
---
|
||||
Name: Change.exe
|
||||
Description: Remote Desktop Services MultiUser Change Utility
|
||||
Author: 'Idan Lerman'
|
||||
Created: 2025-07-31
|
||||
Commands:
|
||||
- Command: change.exe user
|
||||
Description: Once executed, `change.exe` will execute `chgusr.exe` in the same folder. Thus, if `change.exe` is copied to a folder and an arbitrary executable is renamed to `chgusr.exe`, `change.exe` will spawn it. Instead of `user`, it is also possible to use `port` or `logon` as command-line option.
|
||||
Usecase: Execute an arbitrary executable via trusted system executable.
|
||||
Category: Execute
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Requires: Rename
|
||||
Full_Path:
|
||||
- Path: c:\windows\system32\change.exe
|
||||
- Path: c:\windows\syswow64\change.exe
|
||||
Detection:
|
||||
- IOC: change.exe being executed and executes a child process outside of its normal path of c:\windows\system32\ or c:\windows\syswow64\
|
||||
Acknowledgement:
|
||||
- Person: Idan Lerman
|
||||
Handle: '@IdanLerman'
|
24
yml/OSBinaries/Query.yml
Normal file
24
yml/OSBinaries/Query.yml
Normal file
@@ -0,0 +1,24 @@
|
||||
---
|
||||
Name: Query.exe
|
||||
Description: Remote Desktop Services MultiUser Query Utility
|
||||
Author: Idan Lerman
|
||||
Created: 2025-07-31
|
||||
Commands:
|
||||
- Command: query.exe user
|
||||
Description: Once executed, `query.exe` will execute `quser.exe` in the same folder. Thus, if `query.exe` is copied to a folder and an arbitrary executable is renamed to `quser.exe`, `query.exe` will spawn it. Instead of `user`, it is also possible to use `session`, `termsession` or `process` as command-line option.
|
||||
Usecase: Execute an arbitrary executable via trusted system executable.
|
||||
Category: Execute
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Requires: Rename
|
||||
Full_Path:
|
||||
- Path: c:\windows\system32\query.exe
|
||||
- Path: c:\windows\syswow64\query.exe
|
||||
Detection:
|
||||
- IOC: query.exe being executed and executes a child process outside of its normal path of c:\windows\system32\ or c:\windows\syswow64\
|
||||
Acknowledgement:
|
||||
- Person: Idan Lerman
|
||||
Handle: '@IdanLerman'
|
Reference in New Issue
Block a user