diff --git a/yml/OSBinaries/WorkFolders.yml b/yml/OSBinaries/WorkFolders.yml new file mode 100644 index 0000000..0bdbb9f --- /dev/null +++ b/yml/OSBinaries/WorkFolders.yml @@ -0,0 +1,27 @@ +--- +Name: WorkFolders.exe +Description: Work Folders +Author: 'Elliot Killick' +Created: '2021-08-16' +Commands: + - Command: WorkFolders + Description: Execute control.exe in the current working directory + Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism + Category: Execute + Privileges: User + MitreID: T1218 + MitreLink: https://attack.mitre.org/wiki/Technique/T1218/ + OperatingSystem: Windows 8, Windows 8.1, Windows 10 +Full_Path: + - Path: C:\Windows\System32\WorkFolders.exe +Detection: + - IOC: WorkFolders.exe should not be run on a normal workstation +Resources: + - Link: https://www.ctus.io/2021/04/12/exploading/ + - Link: https://twitter.com/ElliotKillick/status/1449812843772227588 +Acknowledgement: + - Person: John Carroll + Handle: '@YoSignals' + - Person: Elliot Killick + Handle: '@elliotkillick' +---