add link to blog post for more info (#2129)
* add link to blog post for more info * Update T1218.011.yaml Co-authored-by: Michael Haag <5632822+MHaggis@users.noreply.github.com>
This commit is contained in:
@@ -4,7 +4,10 @@ atomic_tests:
|
||||
- name: Rundll32 execute JavaScript Remote Payload With GetObject
|
||||
auto_generated_guid: 57ba4ce9-ee7a-4f27-9928-3c70c489b59d
|
||||
description: |
|
||||
Test execution of a remote script using rundll32.exe. Upon execution notepad.exe will be opened.
|
||||
Test execution of a remote script using rundll32.exe. Upon execution notepad.exe will be opened.
|
||||
This has been used by Win32/Poweliks malware and works as described [here](https://www.stormshield.com/news/poweliks-command-line-confusion/)
|
||||
|
||||
Note: The GetObject function is no longer supported in Internet Explorer v9 (2011) and later so this technique would only work where very old versions of IE are installed.
|
||||
supported_platforms:
|
||||
- windows
|
||||
input_arguments:
|
||||
@@ -275,4 +278,4 @@ atomic_tests:
|
||||
copy #{exe_to_launch} not_an_scr.scr
|
||||
rundll32.exe desk.cpl,InstallScreenSaver not_an_scr.scr
|
||||
cleanup_command:
|
||||
del not_an_scr.scr
|
||||
del not_an_scr.scr
|
||||
|
||||
Reference in New Issue
Block a user