diff --git a/yml/OSBinaries/Cmstp.yml b/yml/OSBinaries/Cmstp.yml index f2876a29..eda30374 100644 --- a/yml/OSBinaries/Cmstp.yml +++ b/yml/OSBinaries/Cmstp.yml @@ -23,6 +23,16 @@ Commands: Tags: - Execute: INF - Execute: Remote + - Command: cmstp.exe /nf + Description: cmstp.exe reads the `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cmmgr32.exe\CmstpExtensionDll` registry value and passes its data directly to `LoadLibrary`. By modifying this registry key and setting it to an attack-controlled DLL, this will sideload the DLL via `cmstp.exe`. + Usecase: Proxy execution of a malicious DLL via registry modification. + Category: Execute + Privileges: Administrator + MitreID: T1218.003 + OperatingSystem: Windows 10, Windows 11 + Tags: + - Execute: DLL + - Requires: Registry Change Full_Path: - Path: C:\Windows\System32\cmstp.exe - Path: C:\Windows\SysWOW64\cmstp.exe @@ -35,6 +45,7 @@ Detection: - IOC: Execution of cmstp.exe without a VPN use case is suspicious - IOC: DotNet CLR libraries loaded into cmstp.exe - IOC: DotNet CLR Usage Log - cmstp.exe.log + - IOC: Registry modification to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cmmgr32.exe\CmstpExtensionDll Resources: - Link: https://twitter.com/NickTyrer/status/958450014111633408 - Link: https://gist.github.com/NickTyrer/bbd10d20a5bb78f64a9d13f399ea0f80 @@ -42,8 +53,11 @@ Resources: - Link: https://oddvar.moe/2017/08/15/research-on-cmstp-exe/ - Link: https://gist.githubusercontent.com/tylerapplebaum/ae8cb38ed8314518d95b2e32a6f0d3f1/raw/3127ba7453a6f6d294cd422386cae1a5a2791d71/UACBypassCMSTP.ps1 - Link: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cmstp + - Link: https://gist.github.com/ghosts621/ea8ad5b8a0904dd40b33f01f0e8285dc Acknowledgement: - Person: Oddvar Moe Handle: '@oddvarmoe' - Person: Nick Tyrer Handle: '@NickTyrer' + - Person: Naor Evgi + Handle: '@ghosts621' diff --git a/yml/OtherMSBinaries/Dxcap.yml b/yml/OtherMSBinaries/Dxcap.yml index a9b6b2d1..a7829e5b 100644 --- a/yml/OtherMSBinaries/Dxcap.yml +++ b/yml/OtherMSBinaries/Dxcap.yml @@ -13,11 +13,26 @@ Commands: OperatingSystem: Windows Tags: - Execute: EXE + - Command: dxcap.exe -usage + Description: Once executed, `dxcap.exe` will execute `xperf.exe` in the same folder. Thus, if `dxcap.exe` is copied to a folder and an arbitrary executable is renamed to `xperf.exe`, `dxcap.exe` will spawn it. + Usecase: Execute an arbitrary executable via trusted system executable. + Category: Execute + Privileges: User + MitreID: T1127 + OperatingSystem: Windows 10, Windows 11 + Tags: + - Execute: EXE + - Requires: Rename Full_Path: - Path: C:\Windows\System32\dxcap.exe - Path: C:\Windows\SysWOW64\dxcap.exe +Code_Sample: + - Code: https://gist.github.com/ghosts621/1d0e0f43f7288c826035d5d011b6ca51 Detection: - Sigma: https://github.com/SigmaHQ/sigma/blob/683b63f8184b93c9564c4310d10c571cbe367e1e/rules/windows/process_creation/proc_creation_win_lolbin_susp_dxcap.yml + - IOC: dxcap.exe executing from outside of System32/SysWOW64 + - IOC: dxcap.exe spawning Xperf.exe + - IOC: Xperf.exe executing from unusual directories (if not running from ADK path) Resources: - Link: https://twitter.com/harr0ey/status/992008180904419328 Acknowledgement: @@ -25,3 +40,5 @@ Acknowledgement: Handle: '@harr0ey' - Person: Vikas Singh Handle: '@vikas891' + - Person: Naor Evgi + Handle: '@ghosts621'