mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2025-08-22 13:44:27 +02:00
Update Cipher.yml
This commit is contained in:
parent
f92708015b
commit
45bd693eee
@ -1,23 +1,23 @@
|
||||
---
|
||||
Name: Cipher.exe
|
||||
Description: Windows binary can be used to overwrite deleted data in Windows directory and volume
|
||||
Description: File Encryption Utility
|
||||
Author: Adetutu Ogunsowo
|
||||
Created: 2024-11-22 # YYYY-MM-DD (date the person created this file)
|
||||
Created: 2024-11-22
|
||||
Commands:
|
||||
- Command: cipher /w:<directory>
|
||||
Description: Causes all deallocated space on <idrectory> to be overwritten
|
||||
Usecase: Attacker wants to permanently delete their artefacts, evidence, logs etc. and cannot be retrived by forensics means
|
||||
Category: Encode
|
||||
- Command: cipher /w:{PATH_ABSOLUTE:folder}
|
||||
Description: Zero out a file
|
||||
Usecase: Can be used to forensically erase a file
|
||||
Category: Tamper
|
||||
Privileges: User
|
||||
MitreID: T1485.001
|
||||
MitreID: T1485
|
||||
OperatingSystem: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
|
||||
Full_Path:
|
||||
- Path: c:\windows\system32\cipher.exe
|
||||
- Path: c:\windows\syswow64\cipher.exe
|
||||
Detection:
|
||||
- IOC: cipher.exe spawned
|
||||
- IOC: cipher.exe process with /w on the command line
|
||||
Resources:
|
||||
- Link: https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/
|
||||
Acknowledgement:
|
||||
- Person: Ade Ogunsowo
|
||||
Handle: '@i_am_tutu'
|
||||
Handle: '@i_am_tutu'
|
||||
|
Loading…
Reference in New Issue
Block a user