Skip to content

Latest commit

 

History

History
34 lines (20 loc) · 1.96 KB

T1196.md

File metadata and controls

34 lines (20 loc) · 1.96 KB

T1196 - Control Panel Items

Windows Control Panel items are utilities that allow users to view and adjust computer settings. Control Panel items are registered executable (.exe) or Control Panel (.cpl) files, the latter are actually renamed dynamic-link library (.dll) files that export a CPlApplet function. (Citation: Microsoft Implementing CPL) (Citation: TrendMicro CPL Malware Jan 2014) Control Panel items can be executed directly from the command line, programmatically via an application programming interface (API) call, or by simply double-clicking the file. (Citation: Microsoft Implementing CPL) (Citation: TrendMicro CPL Malware Jan 2014) (Citation: TrendMicro CPL Malware Dec 2013)

For ease of use, Control Panel items typically include graphical menus available to users after being registered and loaded into the Control Panel. (Citation: Microsoft Implementing CPL)

Adversaries can use Control Panel items as execution payloads to execute arbitrary commands. Malicious Control Panel items can be delivered via Spearphishing Attachment campaigns (Citation: TrendMicro CPL Malware Jan 2014) (Citation: TrendMicro CPL Malware Dec 2013) or executed as part of multi-stage malware. (Citation: Palo Alto Reaver Nov 2017) Control Panel items, specifically CPL files, may also bypass application and/or file extension whitelisting.

Atomic Tests


Atomic Test #1 - Control Panel Items

This test simulates an adversary leveraging control.exe to execute a payload and pops calc

Supported Platforms: Windows

Inputs

Name Description Type Default Value
cpl_file_path path to cpl file path calc.cpl

Run it with command_prompt!

control.exe  #{cpl_file_path}