Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rundll32 FileProtocolHandler Command Execution Evasion add new sub-technique to T1218.011 #2719

Merged
merged 2 commits into from
Mar 17, 2024

Conversation

HyperionRising12
Copy link
Contributor

@HyperionRising12 HyperionRising12 commented Mar 7, 2024

technique utilizing rundll32.exe and the FileProtocolHandler method to execute a command without requiring administrative privileges. By leveraging rundll32.exe in this manner, the test aims to assess the effectiveness of antivirus solutions, including Bitdefender, Windows Defender, and others, in detecting and preventing command execution evasion. The provided command bypasses certain antivirus detections by using the FileProtocolHandler to execute the specified command, in this case, launching 'calc.exe'. This evasion technique is known for its ability to exploit legitimate processes to execute malicious commands while avoiding detection. The test serves as an evaluation of antivirus solutions' capabilities to detect and mitigate such evasion tactics, contributing to the overall assessment of endpoint security posture.

Details:
Rundll32 FileProtocolHandler Command Execution Evasion". The test demonstrates a technique using rundll32.exe and the FileProtocolHandler method to execute commands without requiring administrative privileges.This addition aims to assess the effectiveness of endpoint security solutions in detecting and mitigating command execution evasion techniques.

Testing:
rundll32.exe url.dll,FileProtocolHandler calc.exe

Associated Issues:
https://attack.mitre.org/techniques/T1218/011/

technique utilizing rundll32.exe and the FileProtocolHandler method to execute a command without requiring administrative privileges. By leveraging rundll32.exe in this manner, the test aims to assess the effectiveness of antivirus solutions, including Bitdefender, Windows Defender, and others, in detecting and preventing command execution evasion. The provided command bypasses certain antivirus detections by using the FileProtocolHandler to execute the specified command, in this case, launching 'calc.exe'. This evasion technique is known for its ability to exploit legitimate processes to execute malicious commands while avoiding detection. The test serves as an evaluation of antivirus solutions' capabilities to detect and mitigate such evasion tactics, contributing to the overall assessment of endpoint security posture.
@HyperionRising12 HyperionRising12 changed the title Rundll32 FileProtocolHandler Command Execution Evasion Rundll32 FileProtocolHandler Command Execution Evasion add new sub-technique to T1218.011 Mar 7, 2024
Copy link
Collaborator

@clr2of8 clr2of8 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for your first-time contribution. Keep it up! Don't forget to claim your free Atomic Red Team t-shirt

@clr2of8 clr2of8 merged commit a5e3460 into redcanaryco:master Mar 17, 2024
3 checks passed
@HyperionRising12
Copy link
Contributor Author

Thank you ☀️☀️ wish all the best

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants