Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence
Common Information
Type Value
UUID f250f8c8-46c1-45b1-8b44-d0b893059c43
Fingerprint 34409b28e8b78391
Analysis status DONE
Considered CTI value 0
Text language
Published Feb. 26, 2018, 5:12 p.m.
Added to db Jan. 18, 2023, 9:12 p.m.
Last updated Nov. 17, 2024, 6:55 p.m.
Headline bohops
Title Leveraging INF-SCT Fetch & Execute Techniques For Bypass, Evasion, & Persistence
Detected Hints/Tags/Attributes 40/1/22
Attributes
Details Type #Events CTI Value
Details File 14
setupapi.dll
Details File 14
advpack.dll
Details File 1018
rundll32.exe
Details File 2
file.inf
Details File 62
scrobj.dll
Details File 47
cmstp.exe
Details File 1
test.inf
Details File 4
pubprn.vbs
Details File 7
microsoft.js
Details File 1
'microsoft.js
Details File 23
msxsl.exe
Details File 3
file.xml
Details File 1
file.xsl
Details File 19
system.xml
Details File 1
xsl.xsl
Details IPv4 1441
127.0.0.1
Details Url 1
http://url/file.sct
Details Url 1
http://url/file.sct").exec()',[microsoft.jscript.vsa.vsaengine
Details Url 1
http://url/file.sct').exec
Details Url 1
http://url/file.xml
Details Url 1
http://url/file.xsl
Details Url 1
http://url/file.xsl',$s,$r);$x.transform('http://url/file.xml