Skip to content

Commit ce8f2a3

Browse files
1 parent 9218c41 commit ce8f2a3

File tree

2 files changed

+50
-0
lines changed

2 files changed

+50
-0
lines changed

_lolbas/Binaries/Change.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
Name: Change.exe
3+
Description: Remote Desktop Services MultiUser Change Utility
4+
Author: 'Idan Lerman'
5+
Created: 2025-07-31
6+
Commands:
7+
- Command: change.exe user
8+
Description: Once executed, `change.exe` will execute `chgusr.exe` in the same folder. Thus, if `change.exe` is copied to a folder and an arbitrary executable is renamed to `chgusr.exe`, `change.exe` will spawn it. Instead of `user`, it is also possible to use `port` or `logon` as command-line option.
9+
Usecase: Execute an arbitrary executable via trusted system executable.
10+
Category: Execute
11+
Privileges: User
12+
MitreID: T1218
13+
OperatingSystem: Windows 10, Windows 11
14+
Tags:
15+
- Execute: EXE
16+
- Requires: Rename
17+
Full_Path:
18+
- Path: c:\windows\system32\change.exe
19+
- Path: c:\windows\syswow64\change.exe
20+
Detection:
21+
- IOC: change.exe being executed and executes a child process outside of its normal path of c:\windows\system32\ or c:\windows\syswow64\
22+
Acknowledgement:
23+
- Person: Idan Lerman
24+
Handle: '@IdanLerman'
25+
---

_lolbas/Binaries/Query.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
Name: Query.exe
3+
Description: Remote Desktop Services MultiUser Query Utility
4+
Author: Idan Lerman
5+
Created: 2025-07-31
6+
Commands:
7+
- Command: query.exe user
8+
Description: Once executed, `query.exe` will execute `quser.exe` in the same folder. Thus, if `query.exe` is copied to a folder and an arbitrary executable is renamed to `quser.exe`, `query.exe` will spawn it. Instead of `user`, it is also possible to use `session`, `termsession` or `process` as command-line option.
9+
Usecase: Execute an arbitrary executable via trusted system executable.
10+
Category: Execute
11+
Privileges: User
12+
MitreID: T1218
13+
OperatingSystem: Windows 10, Windows 11
14+
Tags:
15+
- Execute: EXE
16+
- Requires: Rename
17+
Full_Path:
18+
- Path: c:\windows\system32\query.exe
19+
- Path: c:\windows\syswow64\query.exe
20+
Detection:
21+
- IOC: query.exe being executed and executes a child process outside of its normal path of c:\windows\system32\ or c:\windows\syswow64\
22+
Acknowledgement:
23+
- Person: Idan Lerman
24+
Handle: '@IdanLerman'
25+
---

0 commit comments

Comments
 (0)