LOLBAS/yml/OtherMSBinaries/Teams.yml
hegusung ce9d4e59f5
Update Teams.yml Tags
Added Tags:
- Execute: Javascript
Execute CMD
2024-10-13 22:32:01 +02:00

48 lines
2.0 KiB
YAML

---
Name: Teams.exe
Description: Electron runtime binary which runs the Teams application
Author: Andrew Kisliakov
Created: 2022-01-17
Commands:
- Command: teams.exe
Description: Generate JavaScript payload and package.json, and save to "%LOCALAPPDATA%\\Microsoft\\Teams\\current\\app\\" before executing.
Usecase: Execute JavaScript code
Category: Execute
Privileges: User
MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: Javascript
- Command: teams.exe
Description: Generate JavaScript payload and package.json, archive in ASAR file and save to "%LOCALAPPDATA%\\Microsoft\\Teams\\current\\app.asar" before executing.
Usecase: Execute JavaScript code
Category: Execute
Privileges: User
MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: Javascript
- Command: teams.exe --disable-gpu-sandbox --gpu-launcher="C:\Windows\system32\cmd.exe /c ping google.com &&"
Description: Teams spawns cmd.exe as a child process of teams.exe and executes the ping command
Usecase: Executes a process under a trusted Microsoft signed binary
Category: Execute
Privileges: User
MitreID: T1218.015
OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path:
- Path: 'C:\Users\<username>\AppData\Local\Microsoft\Teams\current\Teams.exe'
Code_Sample:
- Code: https://github.com/lltltk/LOLBAS-research/tree/master/Teams
Detection:
- IOC: "%LOCALAPPDATA%\\Microsoft\\Teams\\current\\app directory created"
- IOC: "%LOCALAPPDATA%\\Microsoft\\Teams\\current\\app.asar file created/modified by non-Teams installer/updater"
- Sigma: https://github.com/SigmaHQ/sigma/blob/43277f26fc1c81fc98fc79147b711189e901b757/rules/windows/process_creation/proc_creation_win_susp_electron_exeuction_proxy.yml
Resources:
- Link: https://l--k.uk/2022/01/16/microsoft-teams-and-other-electron-apps-as-lolbins/
Acknowledgement:
- Person: Andrew Kisliakov
- Person: mr.d0x
Handle: '@mrd0x'