Files
sigma-rules/rta/msoffice_file_exec_script_interpreter.py
T
2022-09-08 12:50:39 -04:00

49 lines
1.2 KiB
Python

# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
# or more contributor license agreements. Licensed under the Elastic License
# 2.0; you may not use this file except in compliance with the Elastic License
# 2.0.
from . import common
from . import RtaMetadata
metadata = RtaMetadata(
uuid="3206f2b2-c731-479f-a258-d486dac8a055",
platforms=["windows"],
endpoint=[
{
"rule_name": "Microsoft Office File Execution via Script Interpreter",
"rule_id": "54aabea0-3687-4ef1-b70c-015ca588e563",
}
],
siem=[],
techniques=["T1566"],
)
EXE_FILE = common.get_path("bin", "renamed.exe")
@common.requires_os(metadata.platforms)
def main():
binary = "winword.exe"
common.copy_file(EXE_FILE, binary)
# Execute command
common.log("Dropping executable using fake winword")
common.execute([binary, "/c", "copy C:\\Windows\\System32\\cmd.exe cmd.exe"])
common.log("Executing it using scripting program")
common.execute(
[
"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"-C",
".\\cmd.exe /c exit",
]
)
common.remove_files(binary, "cmd.exe")
if __name__ == "__main__":
exit(main())