AppLocker Bypass – Regsvr32
Tags
attack-pattern: | Javascript - T1059.007 Powershell - T1059.001 Regsvr32 - T1218.010 Server - T1583.004 Server - T1584.004 Connection Proxy - T1090 Powershell - T1086 Regsvr32 - T1117 |
Common Information
Type | Value |
---|---|
UUID | d4b63756-7f44-40fa-a163-0ee9e9d60d29 |
Fingerprint | f6aa9fc3e1179779 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | May 11, 2017, 8:36 a.m. |
Added to db | Jan. 18, 2023, 10:08 p.m. |
Last updated | Nov. 18, 2024, 1:38 a.m. |
Headline | AppLocker Bypass – Regsvr32 |
Title | AppLocker Bypass – Regsvr32 |
Detected Hints/Tags/Attributes | 22/1/12 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://pentestlab.blog/2017/05/11/applocker-bypass-regsvr32/ |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 372 | wscript.shell |
|
Details | Domain | 63 | www.rapid7.com |
|
Details | Domain | 2 | subt0x10.blogspot.co.uk |
|
Details | File | 312 | calc.exe |
|
Details | File | 2127 | cmd.exe |
|
Details | File | 4 | pentestlab.exe |
|
Details | File | 62 | scrobj.dll |
|
Details | File | 2 | pentestlab3.exe |
|
Details | File | 3 | bypass-application-whitelisting-script.html |
|
Details | Url | 1 | http://ip:port/payload.sct |
|
Details | Url | 1 | https://www.rapid7.com/db/modules/exploit/windows/misc/regsvr32_applocker_bypass_server |
|
Details | Url | 1 | http://subt0x10.blogspot.co.uk/2017/04/bypass-application-whitelisting-script.html |