2022-07-01 16:56:45 +01:00
|
|
|
title: Use of Scriptrunner.exe
|
|
|
|
|
id: 64760eef-87f7-4ed3-93fd-655668ea9420
|
2023-10-17 14:35:26 +02:00
|
|
|
status: test
|
2022-11-10 13:26:03 -05:00
|
|
|
description: The "ScriptRunner.exe" binary can be abused to proxy execution through it and bypass possible whitelisting
|
2022-07-01 16:56:45 +01:00
|
|
|
references:
|
|
|
|
|
- https://lolbas-project.github.io/lolbas/Binaries/Scriptrunner/
|
2023-02-01 11:14:59 +01:00
|
|
|
author: Nasreddine Bencherchali (Nextron Systems)
|
2024-08-12 12:02:50 +02:00
|
|
|
date: 2022-07-01
|
2022-10-28 15:06:36 +02:00
|
|
|
tags:
|
2024-08-12 12:02:50 +02:00
|
|
|
- attack.defense-evasion
|
2022-10-28 15:06:36 +02:00
|
|
|
- attack.execution
|
|
|
|
|
- attack.t1218
|
2022-07-01 16:56:45 +01:00
|
|
|
logsource:
|
|
|
|
|
category: process_creation
|
|
|
|
|
product: windows
|
|
|
|
|
detection:
|
|
|
|
|
selection_img:
|
|
|
|
|
- Image|endswith: '\ScriptRunner.exe'
|
|
|
|
|
- OriginalFileName: 'ScriptRunner.exe'
|
|
|
|
|
selection_cli:
|
|
|
|
|
CommandLine|contains: ' -appvscript '
|
|
|
|
|
condition: all of selection*
|
|
|
|
|
falsepositives:
|
2022-10-28 15:06:36 +02:00
|
|
|
- Legitimate use when App-v is deployed
|
2022-07-01 16:56:45 +01:00
|
|
|
level: medium
|