Compare commits
1 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 9bcd1240c2 |
@@ -214,4 +214,24 @@ atomic_tests:
|
|||||||
Install-Module -Name AtomicTestHarnesses -Scope CurrentUser -Force
|
Install-Module -Name AtomicTestHarnesses -Scope CurrentUser -Force
|
||||||
executor:
|
executor:
|
||||||
command: 'Invoke-ATHHTMLApplication -TemplatePE -AsLocalUNCPath -MSHTAFilePath #{mshta_file_path}'
|
command: 'Invoke-ATHHTMLApplication -TemplatePE -AsLocalUNCPath -MSHTAFilePath #{mshta_file_path}'
|
||||||
name: powershell
|
name: powershell
|
||||||
|
|
||||||
|
- name: Mshta used to Execute PowerShell
|
||||||
|
auto_generated_guid: 8707a805-2b76-4f32-b1c0-14e558205772
|
||||||
|
description: |
|
||||||
|
Use Mshta to execute arbitrary PowerShell. Example is from the 2021 Threat Detection Report by Red Canary.
|
||||||
|
supported_platforms:
|
||||||
|
- windows
|
||||||
|
input_arguments:
|
||||||
|
message:
|
||||||
|
description: Encoded message to include
|
||||||
|
type: string
|
||||||
|
default: Hello,%20MSHTA!
|
||||||
|
seconds_to_sleep:
|
||||||
|
description: How many seconds to sleep/wait
|
||||||
|
type: string
|
||||||
|
default: 5
|
||||||
|
executor:
|
||||||
|
command: |
|
||||||
|
mshta.exe "about:<hta:application><script language="VBScript">Close(Execute("CreateObject(""Wscript.Shell"").Run%20""powershell.exe%20-nop%20-Command%20Write-Host%20Hello,%20MSHTA!;Start-Sleep%20-Seconds%205"""))</script>'"
|
||||||
|
name: command_prompt
|
||||||
|
|||||||
Reference in New Issue
Block a user