File tree Expand file tree Collapse file tree 1 file changed +3
-2
lines changed Expand file tree Collapse file tree 1 file changed +3
-2
lines changed Original file line number Diff line number Diff line change 172
172
<Image condition =" image" >at.exe</Image > <!-- Microsoft:Windows: Remote task scheduling | Credit @ion-storm -->
173
173
<Image condition =" image" >certutil.exe</Image > <!-- Microsoft:Windows: Certificate tool can contact outbound | Credit @ion-storm and @FVT [ https://twitter.com/FVT/status/834433734602530817 ] -->
174
174
<Image condition =" image" >cmd.exe</Image > <!-- Microsoft:Windows: Command prompt-->
175
- <Image condition =" image" >cscript.exe</Image > <!-- Microsoft:WindowsScriptingHost: | Credit @Neo23x0 [ https://gist.github.com/Neo23x0/a4b4af9481e01e749409 ] -->
175
+ <Image condition =" image" >cscript.exe</Image > <!-- Microsoft:WindowsScriptingHost: | Credit @Cyb3rOps [ https://gist.github.com/Neo23x0/a4b4af9481e01e749409 ] -->
176
176
<Image condition =" image" >java.exe</Image > <!-- Java: Monitor usage of vulnerable application | Credit @ion-storm -->
177
177
<Image condition =" image" >mshta.exe</Image > <!-- Microsoft:Windows: HTML application executes scripts without IE protections | Credit @ion-storm [ https://en.wikipedia.org/wiki/HTML_Application ] -->
178
178
<Image condition =" image" >msiexec.exe</Image > <!-- Microsoft:Windows: Can install from http:// paths | Credit @vector-sec -->
184
184
<Image condition =" image" >regsvr32.exe</Image > <!-- Microsoft:Windows: [ https://subt0x10.blogspot.com/2016/04/bypass-application-whitelisting-script.html ] -->
185
185
<Image condition =" image" >rundll32.exe</Image > <!-- Microsoft:Windows: [ https://blog.cobaltstrike.com/2016/07/22/why-is-rundll32-exe-connecting-to-the-internet/ ] -->
186
186
<Image condition =" image" >sc.exe</Image > <!-- Microsoft:Windows: Remotely change Windows service settings from command line | Credit @ion-storm -->
187
- <Image condition =" image" >wmic.exe</Image > <!-- Microsoft:WindowsManagementInstrumentation: Credit @Neo23x0 [ https://gist.github.com/Neo23x0/a4b4af9481e01e749409 ] -->
187
+ <Image condition =" image" >wmic.exe</Image > <!-- Microsoft:WindowsManagementInstrumentation: Credit @Cyb3rOps [ https://gist.github.com/Neo23x0/a4b4af9481e01e749409 ] -->
188
188
<Image condition =" image" >wscript.exe</Image > <!-- Microsoft:WindowsScriptingHost: | Credit @arekfurt -->
189
+ <Image condition =" image" >powershell.exe</Image > <!-- Microsoft:WindowsPowerShell: | Credit @Cyb3rOps -->
189
190
<!-- Ports: Suspicious-->
190
191
<DestinationPort condition =" is" >22</DestinationPort > <!-- SSH protocol-->
191
192
<DestinationPort condition =" is" >23</DestinationPort > <!-- Telnet protocol-->
You can’t perform that action at this time.
0 commit comments