You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _lolbas/Binaries/WorkFolders.md
+15-1Lines changed: 15 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,19 +5,31 @@ Author: Elliot Killick
5
5
Created: 2021-08-16
6
6
Commands:
7
7
- Command: WorkFolders
8
-
Description: Execute control.exe in the current working directory
8
+
Description: Execute `control.exe` in the current working directory
9
9
Usecase: Can be used to evade defensive countermeasures or to hide as a persistence mechanism
10
10
Category: Execute
11
11
Privileges: User
12
12
MitreID: T1218
13
13
OperatingSystem: Windows 8, Windows 8.1, Windows 10, Windows 11
14
14
Tags:
15
15
- Execute: EXE
16
+
- Requires: Rename
17
+
- Command: WorkFolders
18
+
Description: '`WorkFolders` attempts to execute `control.exe`. By modifying the default value of the App Paths registry key for `control.exe` in `HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\control.exe`, an attacker can achieve proxy execution.'
19
+
Usecase: Proxy execution of a malicious payload via App Paths registry hijacking.
0 commit comments