msbuild | LOLBAS
Common Information
Type Value
UUID 96ce3612-5442-4deb-b902-70003f0064b6
Fingerprint 948ee95eff2e7cda
Analysis status DONE
Considered CTI value 2
Text language
Published Dec. 13, 2017, midnight
Added to db Sept. 26, 2022, 9:31 a.m.
Last updated Nov. 18, 2024, 2:36 a.m.
Headline .. / Msbuild.exe Star
Title msbuild | LOLBAS
Detected Hints/Tags/Attributes 17/1/45
Attributes
Details Type #Events CTI Value
Details Domain 285
microsoft.net
Details Domain 4128
github.com
Details Domain 1
t1127.md
Details Domain 10
pentestlab.blog
Details Domain 12
oddvar.moe
Details Domain 221
gist.github.com
Details Domain 1
www.daveaglick.com
Details File 149
msbuild.exe
Details File 3
pshell.xml
Details File 1
project.cs
Details File 1
c:\loggers\targetlogger.dll
Details Github username 17
redcanaryco
Details Github username 4
cn33liz
Details Github username 1
bohops
Details Github username 3
lolbas-project
Details Github username 27
sigmahq
Details Github username 5
splunk
Details Github username 17
elastic
Details md5 1
4ffc43a281e87d108875f07614324191
Details sha1 2
a04fbe2a99f1dcbbfeb0ee4957ae4b06b0866254
Details sha1 1
5a3af872d86903c13e508348f54e3b519eb01dce
Details sha1 2
18f63553a9dc1a34122fa123deae2b2f9b9ea391
Details sha1 1
a1afa0fa605639cbef7d528dec46ce7c8112194a
Details sha1 1
61afb1c1c0c3f50637b1bb194f3e6fb09f476e50
Details sha1 1
ef7548f04c4341e0d1a172810330d59453f46a21
Details MITRE ATT&CK Techniques 23
T1127
Details MITRE ATT&CK Techniques 10
T1127.001
Details Url 1
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/t1127/t1127.md
Details Url 2
https://github.com/cn33liz/msbuildshell
Details Url 1
https://pentestlab.blog/2017/05/29/applocker-bypass-msbuild
Details Url 4
https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1
Details Url 1
https://gist.github.com/bohops/4ffc43a281e87d108875f07614324191
Details Url 1
https://github.com/lolbas-project/lolbas/issues/165
Details Url 1
https://www.daveaglick.com/posts/msbuild-loggers-and-logging-events
Details Url 2
https://github.com/sigmahq/sigma/blob/a04fbe2a99f1dcbbfeb0ee4957ae4b06b0866254/rules/windows/process_creation/win_possible_applocker_bypass.yml
Details Url 1
https://github.com/sigmahq/sigma/blob/5a3af872d86903c13e508348f54e3b519eb01dce/rules/windows/network_connection/silenttrinity_stager_msbuild_activity.yml
Details Url 1
https://github.com/splunk/security_content/blob/18f63553a9dc1a34122fa123deae2b2f9b9ea391/detections/endpoint/suspicious_msbuild_spawn.yml
Details Url 1
https://github.com/splunk/security_content/blob/18f63553a9dc1a34122fa123deae2b2f9b9ea391/detections/endpoint/suspicious_msbuild_rename.yml
Details Url 1
https://github.com/splunk/security_content/blob/a1afa0fa605639cbef7d528dec46ce7c8112194a/detections/endpoint/msbuild_suspicious_spawned_by_script_process.yml
Details Url 1
https://github.com/elastic/detection-rules/blob/61afb1c1c0c3f50637b1bb194f3e6fb09f476e50/rules/windows/defense_evasion_msbuild_beacon_sequence.toml
Details Url 1
https://github.com/elastic/detection-rules/blob/61afb1c1c0c3f50637b1bb194f3e6fb09f476e50/rules/windows/defense_evasion_msbuild_making_network_connections.toml
Details Url 1
https://github.com/elastic/detection-rules/blob/ef7548f04c4341e0d1a172810330d59453f46a21/rules/windows/defense_evasion_execution_msbuild_started_by_script.toml
Details Url 1
https://github.com/elastic/detection-rules/blob/61afb1c1c0c3f50637b1bb194f3e6fb09f476e50/rules/windows/defense_evasion_execution_msbuild_started_by_office_app.toml
Details Url 1
https://github.com/elastic/detection-rules/blob/61afb1c1c0c3f50637b1bb194f3e6fb09f476e50/rules/windows/defense_evasion_execution_msbuild_started_renamed.toml
Details Url 3
https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules