mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2025-06-20 18:45:12 +02:00
Update Mmc.yml (#437)
Co-authored-by: Wietze <wietze@users.noreply.github.com>
This commit is contained in:
parent
e31a869ae4
commit
d6e3d7016d
@ -22,6 +22,15 @@ Commands:
|
|||||||
OperatingSystem: Windows 10 (and possibly earlier versions), Windows 11
|
OperatingSystem: Windows 10 (and possibly earlier versions), Windows 11
|
||||||
Tags:
|
Tags:
|
||||||
- Execute: DLL
|
- Execute: DLL
|
||||||
|
- Command: mmc.exe -Embedding {PATH_ABSOLUTE:.msc}
|
||||||
|
Description: Download and save an executable to disk
|
||||||
|
Usecase: Download file from Internet
|
||||||
|
Category: Download
|
||||||
|
Privileges: User
|
||||||
|
MitreID: T1218.014
|
||||||
|
OperatingSystem: Windows 10 (and possibly earlier versions), Windows 11
|
||||||
|
Tags:
|
||||||
|
- Application: GUI
|
||||||
Full_Path:
|
Full_Path:
|
||||||
- Path: C:\Windows\System32\mmc.exe
|
- Path: C:\Windows\System32\mmc.exe
|
||||||
- Path: C:\Windows\SysWOW64\mmc.exe
|
- Path: C:\Windows\SysWOW64\mmc.exe
|
||||||
@ -31,8 +40,10 @@ Detection:
|
|||||||
Resources:
|
Resources:
|
||||||
- Link: https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/
|
- Link: https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/
|
||||||
- Link: https://offsec.almond.consulting/UAC-bypass-dotnet.html
|
- Link: https://offsec.almond.consulting/UAC-bypass-dotnet.html
|
||||||
|
- Link: https://www.youtube.com/watch?v=LFgZOTmhzeA
|
||||||
Acknowledgement:
|
Acknowledgement:
|
||||||
- Person: Jimmy
|
- Person: Jimmy
|
||||||
Handle: '@bohops'
|
Handle: '@bohops'
|
||||||
- Person: clem
|
- Person: clem
|
||||||
Handle: '@clavoillotte'
|
Handle: '@clavoillotte'
|
||||||
|
- Person: Fredrik H. Brathen
|
||||||
|
Loading…
x
Reference in New Issue
Block a user