Generated docs from job=generate-docs branch=master [ci skip]
This commit is contained in:
@@ -241,10 +241,12 @@ defense-evasion:
|
||||
atomic_tests:
|
||||
- name: Rundll32 execute JavaScript Remote Payload With GetObject
|
||||
auto_generated_guid: 57ba4ce9-ee7a-4f27-9928-3c70c489b59d
|
||||
description: 'Test execution of a remote script using rundll32.exe. Upon execution
|
||||
notepad.exe will be opened.
|
||||
|
||||
'
|
||||
description: "Test execution of a remote script using rundll32.exe. Upon execution
|
||||
notepad.exe will be opened. \nThis has been used by Win32/Poweliks malware
|
||||
and works as described [here](https://www.stormshield.com/news/poweliks-command-line-confusion/)\n\nNote:
|
||||
The GetObject function is no longer supported in Internet Explorer v9 (2011)
|
||||
and later so this technique would only work where very old versions of IE
|
||||
are installed. \n"
|
||||
supported_platforms:
|
||||
- windows
|
||||
input_arguments:
|
||||
|
||||
@@ -40,7 +40,10 @@ Additionally, adversaries may use [Masquerading](https://attack.mitre.org/techni
|
||||
<br/>
|
||||
|
||||
## Atomic Test #1 - Rundll32 execute JavaScript Remote Payload With GetObject
|
||||
Test execution of a remote script using rundll32.exe. Upon execution notepad.exe will be opened.
|
||||
Test execution of a remote script using rundll32.exe. Upon execution notepad.exe will be opened.
|
||||
This has been used by Win32/Poweliks malware and works as described [here](https://www.stormshield.com/news/poweliks-command-line-confusion/)
|
||||
|
||||
Note: The GetObject function is no longer supported in Internet Explorer v9 (2011) and later so this technique would only work where very old versions of IE are installed.
|
||||
|
||||
**Supported Platforms:** Windows
|
||||
|
||||
|
||||
Reference in New Issue
Block a user