mirror of
				https://github.com/LOLBAS-Project/LOLBAS
				synced 2025-11-04 10:39:56 +01:00 
			
		
		
		
	ADD reset.exe (#454)
Co-authored-by: Wietze <wietze@users.noreply.github.com>
This commit is contained in:
		
							
								
								
									
										26
									
								
								yml/OSBinaries/Eudcedit.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										26
									
								
								yml/OSBinaries/Eudcedit.yml
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,26 @@
 | 
				
			|||||||
 | 
					---
 | 
				
			||||||
 | 
					Name: Eudcedit.exe
 | 
				
			||||||
 | 
					Description: Private Character Editor Windows Utility
 | 
				
			||||||
 | 
					Author: Matan Bahar
 | 
				
			||||||
 | 
					Created: 2025-08-07
 | 
				
			||||||
 | 
					Commands:
 | 
				
			||||||
 | 
					  - Command: eudcedit
 | 
				
			||||||
 | 
					    Description: Once executed, the Private Charecter Editor will be opened -  click OK, then click File -> Font Links. In the next window choose the option "Link with Selected Fonts" and click on Save As, then in the opened enter the command you want to execute.
 | 
				
			||||||
 | 
					    Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
 | 
				
			||||||
 | 
					    Category: UAC Bypass
 | 
				
			||||||
 | 
					    Privileges: Administrator
 | 
				
			||||||
 | 
					    MitreID: T1548.002
 | 
				
			||||||
 | 
					    OperatingSystem: Windows 10, Windows 11
 | 
				
			||||||
 | 
					    Tags:
 | 
				
			||||||
 | 
					      - Execute: CMD
 | 
				
			||||||
 | 
					      - Application: GUI
 | 
				
			||||||
 | 
					Full_Path:
 | 
				
			||||||
 | 
					  - Path: c:\windows\system32\eudcedit.exe
 | 
				
			||||||
 | 
					  - Path: c:\windows\syswow64\eudcedit.exe
 | 
				
			||||||
 | 
					Detection:
 | 
				
			||||||
 | 
					  - IOC: Processes spawned by eudcedit.exe.
 | 
				
			||||||
 | 
					Resources:
 | 
				
			||||||
 | 
					  - Link: https://medium.com/@matanb707/windows-fonts-exploitation-in-2025-bypassing-uac-with-eudcedit-915599705639
 | 
				
			||||||
 | 
					Acknowledgement:
 | 
				
			||||||
 | 
					  - Person: Matan Bahar
 | 
				
			||||||
 | 
					    Handle: '@Bl4ckShad3'
 | 
				
			||||||
							
								
								
									
										24
									
								
								yml/OSBinaries/Reset.yml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								yml/OSBinaries/Reset.yml
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,24 @@
 | 
				
			|||||||
 | 
					---
 | 
				
			||||||
 | 
					Name: Reset.exe
 | 
				
			||||||
 | 
					Description: Remote Desktop Services Reset Utility
 | 
				
			||||||
 | 
					Author: Matan Bahar
 | 
				
			||||||
 | 
					Created: 2025-07-31
 | 
				
			||||||
 | 
					Commands:
 | 
				
			||||||
 | 
					  - Command: reset.exe session
 | 
				
			||||||
 | 
					    Description: Once executed, `reset.exe` will execute `rwinsta.exe` in the same folder. Thus, if `reset.exe` is copied to a folder and an arbitrary executable is renamed to `rwinsta.exe`, `reset.exe` will spawn it.
 | 
				
			||||||
 | 
					    Usecase: Execute an arbitrary executable via trusted system executable.
 | 
				
			||||||
 | 
					    Category: Execute
 | 
				
			||||||
 | 
					    Privileges: User
 | 
				
			||||||
 | 
					    MitreID: T1218
 | 
				
			||||||
 | 
					    OperatingSystem: Windows 10, Windows 11
 | 
				
			||||||
 | 
					    Tags:
 | 
				
			||||||
 | 
					      - Execute: EXE
 | 
				
			||||||
 | 
					      - Requires: Rename
 | 
				
			||||||
 | 
					Full_Path:
 | 
				
			||||||
 | 
					  - Path: c:\windows\system32\reset.exe
 | 
				
			||||||
 | 
					  - Path: c:\windows\syswow64\reset.exe
 | 
				
			||||||
 | 
					Detection:
 | 
				
			||||||
 | 
					  - IOC: reset.exe being executed and executes rwinsta.exe outside of its normal path of c:\windows\system32\ or c:\windows\syswow64\
 | 
				
			||||||
 | 
					Acknowledgement:
 | 
				
			||||||
 | 
					  - Person: Matan Bahar
 | 
				
			||||||
 | 
					    Handle: '@Bl4ckShad3'
 | 
				
			||||||
		Reference in New Issue
	
	Block a user