mirror of
https://github.com/LOLBAS-Project/LOLBAS
synced 2024-11-10 10:34:52 +01:00
23dd0236ae
* Add detection links for scripts * Add detection links for OtherMSBins. Fixed and updated as needed. * Add detection links for MSBins. Fixed and updated as needed. * Add detection links for oslibraries * Updating template for Detections * Removing empty Detection:Sigma entries * Remove redundant blank line * Replacing commit URL with file URL Co-authored-by: root <root@DESKTOP-5CR935D.localdomain> Co-authored-by: Wietze <wietze@users.noreply.github.com>
25 lines
910 B
YAML
25 lines
910 B
YAML
---
|
|
Name: CL_LoadAssembly.ps1
|
|
Description: PowerShell Diagnostic Script
|
|
Author: Jimmy (@bohops)
|
|
Created: 2021-09-26
|
|
Commands:
|
|
- Command: 'ā€¯powershell.exe -command "set-location -path C:\Windows\diagnostics\system\Audio; import-module .\CL_LoadAssembly.ps1; LoadAssemblyFromPath ..\..\..\..\testing\fun.dll;[Program]::Fun()'
|
|
Description: Proxy execute Managed DLL with PowerShell
|
|
Usecase: Execute proxied payload with Microsoft signed binary
|
|
Category: Execute
|
|
Privileges: User
|
|
MitreID: T1216
|
|
OperatingSystem: Windows 10 21H1 (likely other versions as well)
|
|
Full_Path:
|
|
- Path: C:\Windows\diagnostics\system\Audio\CL_LoadAssembly.ps1
|
|
Code_Sample:
|
|
- Code:
|
|
Detection:
|
|
Resources:
|
|
- Link: https://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/
|
|
Acknowledgement:
|
|
- Person: Jimmy
|
|
Handle: '@bohops'
|
|
---
|