Skip to content

Commit d2cd1d2

Browse files
1 parent cef98fc commit d2cd1d2

File tree

2 files changed

+31
-0
lines changed

2 files changed

+31
-0
lines changed

_lolbas/Binaries/Cmstp.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,16 @@ Commands:
2323
Tags:
2424
- Execute: INF
2525
- Execute: Remote
26+
- Command: cmstp.exe /nf
27+
Description: cmstp.exe reads the `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cmmgr32.exe\CmstpExtensionDll` registry value and passes its data directly to `LoadLibrary`. By modifying this registry key and setting it to an attack-controlled DLL, this will sideload the DLL via `cmstp.exe`.
28+
Usecase: Proxy execution of a malicious DLL via registry modification.
29+
Category: Execute
30+
Privileges: Administrator
31+
MitreID: T1218.003
32+
OperatingSystem: Windows 10, Windows 11
33+
Tags:
34+
- Execute: DLL
35+
- Requires: Registry Change
2636
Full_Path:
2737
- Path: C:\Windows\System32\cmstp.exe
2838
- Path: C:\Windows\SysWOW64\cmstp.exe
@@ -35,16 +45,20 @@ Detection:
3545
- IOC: Execution of cmstp.exe without a VPN use case is suspicious
3646
- IOC: DotNet CLR libraries loaded into cmstp.exe
3747
- IOC: DotNet CLR Usage Log - cmstp.exe.log
48+
- IOC: Registry modification to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cmmgr32.exe\CmstpExtensionDll
3849
Resources:
3950
- Link: https://twitter.com/NickTyrer/status/958450014111633408
4051
- Link: https://gist.github.com/NickTyrer/bbd10d20a5bb78f64a9d13f399ea0f80
4152
- Link: https://gist.github.com/api0cradle/cf36fd40fa991c3a6f7755d1810cc61e
4253
- Link: https://oddvar.moe/2017/08/15/research-on-cmstp-exe/
4354
- Link: https://gist.githubusercontent.com/tylerapplebaum/ae8cb38ed8314518d95b2e32a6f0d3f1/raw/3127ba7453a6f6d294cd422386cae1a5a2791d71/UACBypassCMSTP.ps1
4455
- Link: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cmstp
56+
- Link: https://gist.github.com/ghosts621/ea8ad5b8a0904dd40b33f01f0e8285dc
4557
Acknowledgement:
4658
- Person: Oddvar Moe
4759
Handle: '@oddvarmoe'
4860
- Person: Nick Tyrer
4961
Handle: '@NickTyrer'
62+
- Person: Naor Evgi
63+
Handle: '@ghosts621'
5064
---

_lolbas/OtherMSBinaries/Dxcap.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,16 +13,33 @@ Commands:
1313
OperatingSystem: Windows
1414
Tags:
1515
- Execute: EXE
16+
- Command: dxcap.exe -usage
17+
Description: Once executed, `dxcap.exe` will execute `xperf.exe` in the same folder. Thus, if `dxcap.exe` is copied to a folder and an arbitrary executable is renamed to `xperf.exe`, `dxcap.exe` will spawn it.
18+
Usecase: Execute an arbitrary executable via trusted system executable.
19+
Category: Execute
20+
Privileges: User
21+
MitreID: T1127
22+
OperatingSystem: Windows 10, Windows 11
23+
Tags:
24+
- Execute: EXE
25+
- Requires: Rename
1626
Full_Path:
1727
- Path: C:\Windows\System32\dxcap.exe
1828
- Path: C:\Windows\SysWOW64\dxcap.exe
29+
Code_Sample:
30+
- Code: https://gist.github.com/ghosts621/1d0e0f43f7288c826035d5d011b6ca51
1931
Detection:
2032
- Sigma: https://github.com/SigmaHQ/sigma/blob/683b63f8184b93c9564c4310d10c571cbe367e1e/rules/windows/process_creation/proc_creation_win_lolbin_susp_dxcap.yml
33+
- IOC: dxcap.exe executing from outside of System32/SysWOW64
34+
- IOC: dxcap.exe spawning Xperf.exe
35+
- IOC: Xperf.exe executing from unusual directories (if not running from ADK path)
2136
Resources:
2237
- Link: https://twitter.com/harr0ey/status/992008180904419328
2338
Acknowledgement:
2439
- Person: Matt harr0ey
2540
Handle: '@harr0ey'
2641
- Person: Vikas Singh
2742
Handle: '@vikas891'
43+
- Person: Naor Evgi
44+
Handle: '@ghosts621'
2845
---

0 commit comments

Comments
 (0)