LOLBAS/OSBinaries/Ie4unit.yml
2018-06-09 00:15:06 +02:00

21 lines
593 B
YAML

---
Name: Ie4unit.exe
Description: Execute
Author: ''
Created: '2018-05-25'
Categories: []
Commands:
- Command: ie4unit.exe -BaseSettings
Description: 'Executes commands from a specially prepared ie4uinit.inf file.'
Full Path:
- 'c:\windows\system32\ie4unit.exe '
- 'c:\windows\sysWOW64\ie4unit.exe '
- 'c:\windows\system32\ieuinit.inf '
- 'c:\windows\sysWOW64\ieuinit.inf '
Code Sample: []
Detection: []
Resources:
- https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/
Notes: Thanks to Jimmy - @bohops