diff --git a/yml/OSLibraries/Zipfldr.yml b/yml/OSLibraries/Zipfldr.yml index 8a00799..fe866fd 100644 --- a/yml/OSLibraries/Zipfldr.yml +++ b/yml/OSLibraries/Zipfldr.yml @@ -6,7 +6,7 @@ Created: '2018-05-25' Commands: - Command: rundll32.exe zipfldr.dll,RouteTheCall calc.exe Description: Launch an executable payload by calling RouteTheCall. - Usecase: Launch an executable. + UseCase: Launch an executable. Category: Execution Privileges: User MitreID: T1085 @@ -14,24 +14,26 @@ Commands: OperatingSystem: Windows - Command: rundll32.exe zipfldr.dll,RouteTheCall file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e Description: Launch an executable payload by calling RouteTheCall (obfuscated). - Usecase: Launch an executable. + UseCase: Launch an executable. Category: Execution Privileges: User MitreID: T1085 MItreLink: https://attack.mitre.org/wiki/Technique/T1085 OperatingSystem: Windows Full Path: - - path: c:\windows\system32\zipfldr.dll - - path: c:\windows\syswow64\zipfldr.dll + - Path: c:\windows\system32\zipfldr.dll + - Path: c:\windows\syswow64\zipfldr.dll Code Sample: - - '' -Detection: [] + - Code: '' +Detection: + - IOC: '' Resources: - - resource: https://twitter.com/moriarty_meng/status/977848311603380224 - - resource: https://twitter.com/bohops/status/997896811904929792 - - resource: https://windows10dll.nirsoft.net/zipfldr_dll.html + - Link: https://twitter.com/moriarty_meng/status/977848311603380224 + - Link: https://twitter.com/bohops/status/997896811904929792 + - Link: https://windows10dll.nirsoft.net/zipfldr_dll.html Acknowledgment: - Person: Moriarty (Execution) Handle: '@moriarty_meng' - Person: r0lan (Obfuscation) - Handle: '@r0lan' \ No newline at end of file + Handle: '@r0lan' +---