--- Name: Dfsvc.exe Description: ClickOnce engine in Windows used by .NET Author: 'Oddvar Moe' Created: '2018-05-25' Commands: - Command: Missing Example Description: Missing example Usecase: Use binary to bypass Application whitelisting Category: AWL bypass Privileges: User MitreID: T1127 MitreLink: https://attack.mitre.org/wiki/Technique/T1127 OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 Full Path: - Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Dfsvc.exe - Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Dfsvc.exe - Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Dfsvc.exe - Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Dfsvc.exe Code Sample: - Code: Detection: - IOC: Resources: - Link: https://github.com/api0cradle/ShmooCon-2015/blob/master/ShmooCon-2015-Simple-WLEvasion.pdf Acknowledgement: - Person: Casey Smith Handle: '@subtee' ---