UPDATE BOOKMARKS - PROJECT MOVED TO A DEDICATED PROJECT SITE. THIS SITE WILL NOT BE UPDATED ANYMORE, BUT WILL BE KEPT FOR HISTORICAL REASONS.
New site: https://github.com/LOLBAS-Project/LOLBAS Web portal: https://lolbas-project.github.io/
- Functions: Execute
rundll32.exe ieadvpack.dll,LaunchINFSection test.inf,,1,
rundll32.exe IEAdvpack.dll,RegisterOCX calc.exe
Acknowledgements:
- Pierre-Alexandre Braeken - @pabraeken (RegisterOCX)
- Jimmy - @bohops
Code sample:
Resources:
- https://twitter.com/pabraeken/status/991695411902599168
- https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/
Full path:
c:\windows\system32\ieadvpack.dll
c:\windows\sysWOW64\ieadvpack.dll
Notes:
Detection: