fix: apply suggestions from code review
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
This commit is contained in:
committed by
GitHub
parent
be9abb9364
commit
360475d6ff
@@ -9,7 +9,7 @@ related:
|
||||
type: similar
|
||||
status: experimental
|
||||
description: |
|
||||
Detects the creation of new DLL assembly files by "aspnet_compiler.exe". Which could be a sign of "aspnet_compiler" abuse to proxy execution through a build provider.
|
||||
Detects the creation of new DLL assembly files by "aspnet_compiler.exe", which could be a sign of "aspnet_compiler" abuse to proxy execution through a build provider.
|
||||
references:
|
||||
- Internal Research
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
|
||||
@@ -4,7 +4,7 @@ related:
|
||||
- id: d2605a99-2218-4894-8fd3-2afb7946514d
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects DLL sideloading of unsigned "mfdetours.dll". While using "mftrace.exe" it can be abused to attach to an arbitrary process and force load any DLL named "mfdetours.dll" from the current directory of execution.
|
||||
description: Detects DLL sideloading of unsigned "mfdetours.dll". Executing "mftrace.exe" can be abused to attach to an arbitrary process and force load any DLL named "mfdetours.dll" from the current directory of execution.
|
||||
references:
|
||||
- Internal Research
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
|
||||
+1
-1
@@ -8,7 +8,7 @@ related:
|
||||
- id: a01b8329-5953-4f73-ae2d-aa01e1f35f00 # Exec
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects potential suspicious child process of "aspnet_compiler.exe".
|
||||
description: Detects potentially suspicious child processes of "aspnet_compiler.exe".
|
||||
references:
|
||||
- https://lolbas-project.github.io/lolbas/Binaries/Aspnet_Compiler/
|
||||
- https://ijustwannared.team/2020/08/01/the-curious-case-of-aspnet_compiler-exe/
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
title: Potential Suspicious ASP.NET Compilation Via AspNetCompiler
|
||||
title: Potentially Suspicious ASP.NET Compilation Via AspNetCompiler
|
||||
id: 9f50fe98-fe5c-4a2d-86c7-fad7f63ed622 # Susp Paths
|
||||
related:
|
||||
- id: 9ccba514-7cb6-4c5c-b377-700758f2f120 # SuspChild
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
title: Indirect Inline Command Execution Via Bash.EXE
|
||||
id: 5edc2273-c26f-406c-83f3-f4d948e740dd
|
||||
status: experimental
|
||||
description: Detects execution of Microsoft bash launcher with the "-c" flag. This can be used to potentially bypass defenses and execute linux or windows based binaries directly via bash
|
||||
description: Detects execution of Microsoft bash launcher with the "-c" flag. This can be used to potentially bypass defenses and execute Linux or Windows-based binaries directly via bash
|
||||
references:
|
||||
- https://lolbas-project.github.io/lolbas/Binaries/Bash/
|
||||
author: frack113
|
||||
|
||||
@@ -4,7 +4,7 @@ related:
|
||||
- id: 5edc2273-c26f-406c-83f3-f4d948e740dd
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects execution of Microsoft bash launcher without any flags to execute the content of a bash script directly. This can be used to potentially bypass defenses and execute linux or windows based binaries directly via bash
|
||||
description: Detects execution of Microsoft bash launcher without any flags to execute the content of a bash script directly. This can be used to potentially bypass defenses and execute Linux or Windows-based binaries directly via bash
|
||||
references:
|
||||
- https://lolbas-project.github.io/lolbas/Binaries/Bash/
|
||||
- https://linux.die.net/man/1/bash
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
title: Assembly Loading Via CL_LoadAssembly.ps1
|
||||
id: c57872c7-614f-4d7f-a40d-b78c8df2d30d
|
||||
status: experimental
|
||||
description: Detects calls to "LoadAssemblyFromPath" or "LoadAssemblyFromNS" that are part of the "CL_LoadAssembly.ps1" script. Which can be abused to load different assemblies and bypass App locker controls.
|
||||
description: Detects calls to "LoadAssemblyFromPath" or "LoadAssemblyFromNS" that are part of the "CL_LoadAssembly.ps1" script. This can be abused to load different assemblies and bypass App locker controls.
|
||||
references:
|
||||
- https://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/
|
||||
- https://lolbas-project.github.io/lolbas/Scripts/CL_LoadAssembly/
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
title: Potential Script Proxy Execution Via CL_Mutexverifiers.ps1
|
||||
id: 1e0e1a81-e79b-44bc-935b-ddb9c8006b3d
|
||||
status: experimental
|
||||
description: Detects the use of the Microsoft signed script "CL_mutexverifiers" to proxy the execution of additional powershell script commands
|
||||
description: Detects the use of the Microsoft signed script "CL_mutexverifiers" to proxy the execution of additional PowerShell script commands
|
||||
references:
|
||||
- https://lolbas-project.github.io/lolbas/Scripts/CL_mutexverifiers/
|
||||
author: Nasreddine Bencherchali (Nextron Systems), oscd.community, Natalia Shornikova, frack113
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
title: New BgInfo.EXE Custom DB Path Registry Configuration
|
||||
id: 53330955-dc52-487f-a3a2-da24dcff99b5
|
||||
status: experimental
|
||||
description: Detects setting of a new registry database value related to BgInfo configuration. Attackers can set this value to save the results of the commands executed by BgInfo in order to exfiltrate information for example.
|
||||
description: Detects setting of a new registry database value related to BgInfo configuration. Attackers can for example set this value to save the results of the commands executed by BgInfo in order to exfiltrate information.
|
||||
references:
|
||||
- Internal Research
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
|
||||
@@ -4,7 +4,7 @@ related:
|
||||
- id: cd277474-5c52-4423-a52b-ac2d7969902f
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects setting of a new registry value related to BgInfo configuration. Which can be abused to execute custom VBScript via "BgInfo.exe"
|
||||
description: Detects setting of a new registry value related to BgInfo configuration, which can be abused to execute custom VBScript via "BgInfo.exe"
|
||||
references:
|
||||
- Internal Research
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
|
||||
@@ -4,7 +4,7 @@ related:
|
||||
- id: 992dd79f-dde8-4bb0-9085-6350ba97cfb3
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects setting of a new registry value related to BgInfo configuration. Which can be abused to execute custom WMI query via "BgInfo.exe"
|
||||
description: Detects setting of a new registry value related to BgInfo configuration, which can be abused to execute custom WMI query via "BgInfo.exe"
|
||||
references:
|
||||
- Internal Research
|
||||
author: Nasreddine Bencherchali (Nextron Systems)
|
||||
|
||||
Reference in New Issue
Block a user