Detecting Follina Exploits Using a Remote Answer File  - Binary Defense
Common Information
Type Value
UUID 0a8dda9e-b245-427d-a5f9-f2f45b0d17b5
Fingerprint c221a9d83847d681
Analysis status DONE
Considered CTI value 0
Text language
Published June 15, 2022, 8:16 p.m.
Added to db March 14, 2023, 4:29 p.m.
Last updated Nov. 17, 2024, 11:40 p.m.
Headline Detecting Follina Exploits Using a Remote Answer File
Title Detecting Follina Exploits Using a Remote Answer File  - Binary Defense
Detected Hints/Tags/Attributes 29/1/17
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 275 Binary Defense https://www.binarydefense.com/feed/ 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 172
cve-2022-30190
Details Domain 281
docs.microsoft.com
Details Domain 1
sneaky-domain-name.com
Details Domain 1373
twitter.com
Details Domain 87
app.any.run
Details Domain 4128
github.com
Details File 33
msdt.exe
Details File 2
answers.xml
Details File 4
file.tmp
Details File 3
'msdt.exe
Details Github username 27
sigmahq
Details Url 2
https://docs.microsoft.com/en-us/windows-hardware/customize/desktop/wsim/answer-files-overview
Details Url 2
https://docs.microsoft.com/en-us/powershell/module/troubleshootingpack/get-troubleshootingpack?view=windowsserver2019
Details Url 3
https://twitter.com/nao_sec/status/1530196847679401984
Details Url 4
https://app.any.run/tasks/713f05d2-fe78-4b9d-a744-f7c133e3fafb
Details Url 2
https://twitter.com/impetuousdanny/status/1531650953082023936
Details Url 2
https://github.com/sigmahq/sigma/wiki/specification#escaping