Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 14 additions & 0 deletions yml/OSBinaries/Cmstp.yml
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,16 @@ Commands:
Tags:
- Execute: INF
- Execute: Remote
- Command: cmstp.exe /nf
Description: cmstp.exe reads the `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cmmgr32.exe\CmstpExtensionDll` registry value and passes its data directly to `LoadLibrary`. By modifying this registry key and setting it to an attack-controlled DLL, this will sideload the DLL via `cmstp.exe`.
Usecase: Proxy execution of a malicious DLL via registry modification.
Category: Execute
Privileges: Administrator
MitreID: T1218.003
OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: DLL
- Requires: Registry Change
Full_Path:
- Path: C:\Windows\System32\cmstp.exe
- Path: C:\Windows\SysWOW64\cmstp.exe
Expand All @@ -35,15 +45,19 @@ Detection:
- IOC: Execution of cmstp.exe without a VPN use case is suspicious
- IOC: DotNet CLR libraries loaded into cmstp.exe
- IOC: DotNet CLR Usage Log - cmstp.exe.log
- IOC: Registry modification to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cmmgr32.exe\CmstpExtensionDll
Resources:
- Link: https://twitter.com/NickTyrer/status/958450014111633408
- Link: https://gist.github.com/NickTyrer/bbd10d20a5bb78f64a9d13f399ea0f80
- Link: https://gist.github.com/api0cradle/cf36fd40fa991c3a6f7755d1810cc61e
- Link: https://oddvar.moe/2017/08/15/research-on-cmstp-exe/
- Link: https://gist.githubusercontent.com/tylerapplebaum/ae8cb38ed8314518d95b2e32a6f0d3f1/raw/3127ba7453a6f6d294cd422386cae1a5a2791d71/UACBypassCMSTP.ps1
- Link: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cmstp
- Link: https://gist.github.com/ghosts621/ea8ad5b8a0904dd40b33f01f0e8285dc
Acknowledgement:
- Person: Oddvar Moe
Handle: '@oddvarmoe'
- Person: Nick Tyrer
Handle: '@NickTyrer'
- Person: Naor Evgi
Handle: '@ghosts621'
17 changes: 17 additions & 0 deletions yml/OtherMSBinaries/Dxcap.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,15 +13,32 @@ Commands:
OperatingSystem: Windows
Tags:
- Execute: EXE
- Command: dxcap.exe -usage
Description: Once executed, `dxcap.exe` will execute `xperf.exe` in the same folder. Thus, if `dxcap.exe` is copied to a folder and an arbitrary executable is renamed to `xperf.exe`, `dxcap.exe` will spawn it.
Usecase: Execute an arbitrary executable via trusted system executable.
Category: Execute
Privileges: User
MitreID: T1127
OperatingSystem: Windows 10, Windows 11
Tags:
- Execute: EXE
- Requires: Rename
Full_Path:
- Path: C:\Windows\System32\dxcap.exe
- Path: C:\Windows\SysWOW64\dxcap.exe
Code_Sample:
- Code: https://gist.github.com/ghosts621/1d0e0f43f7288c826035d5d011b6ca51
Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/683b63f8184b93c9564c4310d10c571cbe367e1e/rules/windows/process_creation/proc_creation_win_lolbin_susp_dxcap.yml
- IOC: dxcap.exe executing from outside of System32/SysWOW64
- IOC: dxcap.exe spawning Xperf.exe
- IOC: Xperf.exe executing from unusual directories (if not running from ADK path)
Resources:
- Link: https://twitter.com/harr0ey/status/992008180904419328
Acknowledgement:
- Person: Matt harr0ey
Handle: '@harr0ey'
- Person: Vikas Singh
Handle: '@vikas891'
- Person: Naor Evgi
Handle: '@ghosts621'
Loading