--- Name: iediagcmd.exe Description: Diagnostics Utility for Internet Explorer Author: manasmbellani Created: 2022-03-29 Commands: - Command: 'set windir=c:\test& cd "C:\Program Files\Internet Explorer\" & iediagcmd.exe /out:c:\test\foo.cab' Description: Executes binary that is pre-planted at C:\test\system32\netsh.exe. Usecase: Spawn a pre-planted executable from iediagcmd.exe. Category: Execute Privileges: User MitreID: T1218 OperatingSystem: Windows 10 1803, Windows 10 1703, Windows 10 22H1, Windows 10 22H2, Windows 11 Full_Path: - Path: C:\Program Files\Internet Explorer\iediagcmd.exe Detection: - Sigma: https://github.com/manasmbellani/mycode_public/blob/master/sigma/rules/win_proc_creation_lolbin_iediagcmd.yml - IOC: Sysmon Event ID 1 - IOC: Execution of process iediagcmd.exe with /out could be suspicious Resources: - Link: https://twitter.com/Hexacorn/status/1507516393859731456 Acknowledgement: - Person: Adam Handle: '@hexacorn'