Skip to content

Commit 5089354

Browse files
1 parent 3a84eb1 commit 5089354

File tree

6 files changed

+9
-1
lines changed

6 files changed

+9
-1
lines changed

_lolbas/Binaries/Microsoft.Workflow.Compiler.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Commands:
1313
OperatingSystem: Windows 10S, Windows 11
1414
Tags:
1515
- Execute: VB.Net
16-
- Execute: CSharp
16+
- Execute: Csharp
1717
- Command: Microsoft.Workflow.Compiler.exe tests.txt results.txt
1818
Description: Compile and execute C# or VB.net code in a XOML file referenced in the test.txt file.
1919
Usecase: Compile and run code

_lolbas/Binaries/MpCmdRun.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,9 @@ Full_Path:
2929
- Path: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.4-0\MpCmdRun.exe
3030
- Path: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.7-0\MpCmdRun.exe
3131
- Path: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\MpCmdRun.exe
32+
- Path: C:\Program Files\Windows Defender\MpCmdRun.exe
33+
- Path: C:\Program Files (x86)\Windows Defender\MpCmdRun.exe
34+
- Path: C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23110.3-0\X86\MpCmdRun.exe
3235
Code_Sample:
3336
- Code:
3437
Detection:

_lolbas/Binaries/OneDriveStandaloneUpdater.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ Commands:
1313
OperatingSystem: Windows 10
1414
Full_Path:
1515
- Path: 'C:\Users\<username>\AppData\Local\Microsoft\OneDrive\OneDriveStandaloneUpdater.exe'
16+
- Path: C:\Program Files\Microsoft OneDrive\OneDriveStandaloneUpdater.exe
17+
- Path: C:\Program Files (x86)\Microsoft OneDrive\OneDriveStandaloneUpdater.exe
1618
Detection:
1719
- IOC: HKCU\Software\Microsoft\OneDrive\UpdateOfficeConfig\UpdateRingSettingURLFromOC being set to a suspicious non-Microsoft controlled URL
1820
- IOC: Reports of downloading from suspicious URLs in %localappdata%\OneDrive\setup\logs\StandaloneUpdate_*.log files

_lolbas/Binaries/Wuauclt.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ Commands:
1515
- Execute: DLL
1616
Full_Path:
1717
- Path: C:\Windows\System32\wuauclt.exe
18+
- Path: C:\Windows\UUS\amd64\wuauclt.exe
1819
Detection:
1920
- Sigma: https://github.com/SigmaHQ/sigma/blob/683b63f8184b93c9564c4310d10c571cbe367e1e/rules/windows/network_connection/net_connection_win_wuauclt_network_connection.yml
2021
- Sigma: https://github.com/SigmaHQ/sigma/blob/683b63f8184b93c9564c4310d10c571cbe367e1e/rules/windows/process_creation/proc_creation_win_lolbin_wuauclt.yml

_lolbas/Binaries/msedgewebview2.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ Commands:
4242
- Execute: CMD
4343
Full_Path:
4444
- Path: C:\Program Files (x86)\Microsoft\Edge\Application\114.0.1823.43\msedgewebview2.exe
45+
- Path: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\131.0.2903.70\msedgewebview2.exe
4546
Detection:
4647
- Sigma: https://github.com/SigmaHQ/sigma/blob/e1a713d264ac072bb76b5c4e5f41315a015d3f41/rules/windows/process_creation/proc_creation_win_susp_electron_execution_proxy.yml
4748
- IOC: 'msedgewebview2.exe spawned with any of the following: --gpu-launcher, --utility-cmd-prefix, --renderer-cmd-prefix, --browser-subprocess-path'

_lolbas/OtherMSBinaries/OpenConsole.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ Full_Path:
1717
- Path: C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\Common7\IDE\CommonExtensions\Microsoft\Terminal\ServiceHub\os64\OpenConsole.exe
1818
- Path: C:\Program Files (x86)\Microsoft Visual Studio\2019\Community\Common7\IDE\CommonExtensions\Microsoft\Terminal\ServiceHub\os86\OpenConsole.exe
1919
- Path: C:\Program Files\Microsoft Visual Studio\2022\Community\Common7\IDE\CommonExtensions\Microsoft\Terminal\ServiceHub\os64\OpenConsole.exe
20+
- Path: C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.18.10301.0_x64__8wekyb3d8bbwe\OpenConsole.exe
2021
Detection:
2122
- IOC: OpenConsole.exe spawning unexpected processes
2223
- Sigma: https://github.com/SigmaHQ/sigma/blob/9e0ef7251b075f15e7abafbbec16d3230c5fa477/rules/windows/process_creation/proc_creation_win_lolbin_openconsole.yml

0 commit comments

Comments
 (0)