* Added T1203 ProtocolHandler.exe

* Fixed numbering error

* remove white space

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
This commit is contained in:
Dragonlord0
2020-08-15 18:14:34 -05:00
committed by GitHub
parent eb13ba719f
commit 751a827e86
2 changed files with 28 additions and 1 deletions
+28 -1
View File
@@ -94,4 +94,31 @@ atomic_tests:
executor:
command: |
InfDefaultInstall.exe #{inf_to_execute}
name: command_prompt
name: command_prompt
- name: ProtocolHandler.exe Downloaded a Suspicious File
description: |
Emulates attack via documents through protocol handler in Microsoft Office. On successful execution you should see Microsoft Word launch a blank file.
supported_platforms:
- windows
input_arguments:
microsoft_wordpath:
description: path to office folder
type: path
default: C:\Program Files\Microsoft Office\Office16
remote_url:
description: url to document
type: url
default: https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1218/src/T1218Test.docx
dependency_executor_name: powershell
dependencies:
- description: |
Microsoft Word must be installed with the correct path and protocolhandler.exe must be provided
prereq_command: |
if (Test-Path "#{microsoft_wordpath}\protocolhandler.exe") {exit 0} else {exit 1}
get_prereq_command: |
write-host "Install Microsoft Word or provide correct path."
executor:
name: command_prompt
elevation_required: false
command: |
#{microsoft_wordpath}\protocolhandler.exe "ms-word:nft|u|#{remote_url}"
Binary file not shown.