diff --git a/yml/OSBinaries/Eudcedit.yml b/yml/OSBinaries/Eudcedit.yml new file mode 100644 index 0000000..d0ca677 --- /dev/null +++ b/yml/OSBinaries/Eudcedit.yml @@ -0,0 +1,26 @@ +--- +Name: Eudcedit.exe +Description: Private Character Editor Windows Utility +Author: Matan Bahar +Created: 2025-08-07 +Commands: + - Command: eudcedit + Description: Once executed, the Private Charecter Editor will be opened - click OK, then click File -> Font Links. In the next window choose the option "Link with Selected Fonts" and click on Save As, then in the opened enter the command you want to execute. + Usecase: Execute a binary or script as a high-integrity process without a UAC prompt. + Category: UAC Bypass + Privileges: Administrator + MitreID: T1548.002 + OperatingSystem: Windows 10, Windows 11 + Tags: + - Execute: CMD + - Application: GUI +Full_Path: + - Path: c:\windows\system32\eudcedit.exe + - Path: c:\windows\syswow64\eudcedit.exe +Detection: + - IOC: Processes spawned by eudcedit.exe. +Resources: + - Link: https://medium.com/@matanb707/windows-fonts-exploitation-in-2025-bypassing-uac-with-eudcedit-915599705639 +Acknowledgement: + - Person: Matan Bahar + Handle: '@Bl4ckShad3' diff --git a/yml/OSBinaries/Reset.yml b/yml/OSBinaries/Reset.yml new file mode 100644 index 0000000..f892bcc --- /dev/null +++ b/yml/OSBinaries/Reset.yml @@ -0,0 +1,24 @@ +--- +Name: Reset.exe +Description: Remote Desktop Services Reset Utility +Author: Matan Bahar +Created: 2025-07-31 +Commands: + - Command: reset.exe session + Description: Once executed, `reset.exe` will execute `rwinsta.exe` in the same folder. Thus, if `reset.exe` is copied to a folder and an arbitrary executable is renamed to `rwinsta.exe`, `reset.exe` will spawn it. + Usecase: Execute an arbitrary executable via trusted system executable. + Category: Execute + Privileges: User + MitreID: T1218 + OperatingSystem: Windows 10, Windows 11 + Tags: + - Execute: EXE + - Requires: Rename +Full_Path: + - Path: c:\windows\system32\reset.exe + - Path: c:\windows\syswow64\reset.exe +Detection: + - IOC: reset.exe being executed and executes rwinsta.exe outside of its normal path of c:\windows\system32\ or c:\windows\syswow64\ +Acknowledgement: + - Person: Matan Bahar + Handle: '@Bl4ckShad3'