From 75cd5751021ad372a38f4f1808d0daa76119b10a Mon Sep 17 00:00:00 2001 From: hegusung <7390383+hegusung@users.noreply.github.com> Date: Sun, 13 Oct 2024 14:50:16 +0200 Subject: [PATCH] Category Bugfix --- yml/OSBinaries/Control.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/yml/OSBinaries/Control.yml b/yml/OSBinaries/Control.yml index 4ebd881..a9b8c99 100644 --- a/yml/OSBinaries/Control.yml +++ b/yml/OSBinaries/Control.yml @@ -17,7 +17,7 @@ Commands: - Command: control.exe c:\windows\tasks\evil.cpl Description: Execute evil.cpl payload. A CPL is a DLL file with CPlApplet export function) Usecase: Use to execute code and bypass application whitelisting - Category: Execution + Category: Execute Privileges: User MitreID: T1218.002 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11