diff --git a/yml/OSBinaries/Iediagcmd.yml b/yml/OSBinaries/Iediagcmd.yml new file mode 100644 index 0000000..b1d47d4 --- /dev/null +++ b/yml/OSBinaries/Iediagcmd.yml @@ -0,0 +1,24 @@ +--- +Name: iediagcmd.exe +Description: Diagnostics Utility for Internet Explorer +Author: manasmbellani +Created: 2022-03-29 +Commands: + - Command: 'set windir=c:\test& cd "C:\Program Files\Internet Explorer\" & iediagcmd.exe /out:c:\test\foo.cab' + Description: Executes binary that is pre-planted at C:\test\system32\netsh.exe. + Usecase: Spawn a pre-planted executable from iediagcmd.exe. + Category: Execute + Privileges: User + MitreID: T1218 + OperatingSystem: Windows 10 1803, Windows 10 1703, Windows 10 22H1, Windows 10 22H2, Windows 11 +Full_Path: + - Path: C:\Program Files\Internet Explorer\iediagcmd.exe +Detection: + - Sigma: https://github.com/manasmbellani/mycode_public/blob/master/sigma/rules/win_proc_creation_lolbin_iediagcmd.yml + - IOC: Sysmon Event ID 1 + - IOC: Execution of process iediagcmd.exe with /out could be suspicious +Resources: + - Link: https://twitter.com/Hexacorn/status/1507516393859731456 +Acknowledgement: + - Person: Adam + Handle: '@hexacorn'