mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-12-25 22:39:27 +01:00
36 lines
1.4 KiB
YAML
36 lines
1.4 KiB
YAML
---
|
|
Name: FsiAnyCpu.exe
|
|
Description: 32/64-bit FSharp (F#) Interpreter included with Visual Studio.
|
|
Author: Jimmy (@bohops)
|
|
Created: 2021-09-26
|
|
Commands:
|
|
- Command: fsianycpu.exe c:\path\to\test.fsscript
|
|
Description: Execute F# code via script file
|
|
Usecase: Execute payload with Microsoft signed binary to bypass WDAC policies
|
|
Category: AWL Bypass
|
|
Privileges: User
|
|
MitreID: T1059
|
|
MitreLink: https://attack.mitre.org/techniques/T1059/
|
|
OperatingSystem: Windows 10 2004 (likely previous and newer versions as well)
|
|
- Command: fsianycpu.exe
|
|
Description: Execute F# code via interactive command line
|
|
Usecase: Execute payload with Microsoft signed binary to bypass WDAC policies
|
|
Category: AWL Bypass
|
|
Privileges: User
|
|
MitreID: T1059
|
|
MitreLink: https://attack.mitre.org/techniques/T1059/
|
|
OperatingSystem: Windows 10 2004 (likely previous and newer versions as well)
|
|
Full_Path:
|
|
- Path: c:\Program Files (x86)\Microsoft Visual Studio\2019\Professional\Common7\IDE\CommonExtensions\Microsoft\FSharp\fsianycpu.exe
|
|
Code_Sample:
|
|
- Code: https://gist.github.com/NickTyrer/51eb8c774a909634fa69b4d06fc79ae1
|
|
Detection:
|
|
- IOC: Sysmon Event ID 1 - Process Creation
|
|
Resources:
|
|
- Link: https://bohops.com/2020/11/02/exploring-the-wdac-microsoft-recommended-block-rules-part-ii-wfc-fsi/
|
|
Acknowledgement:
|
|
- Person: Nick Tyrer
|
|
Handle: '@NickTyrer'
|
|
- Person: Jimmy
|
|
Handle: '@bohops'
|
|
--- |