forfiles.exe

  • File Path: C:\windows\SysWOW64\forfiles.exe
  • Description: ForFiles - Executes a command on selected files

Hashes

Type Hash
MD5 663A605F4B0532F1565ECA49238463F1
SHA1 223D7DBC724304DC40230DC70A79014BB912083B
SHA256 B23D7C93C9B1D568E608EBAE4ED38634F73280AA61104687D60AA3DB33F93307
SHA384 10387A59F043C58863BDE41897F94B557F9E1185F098C32C6395D32DDDCB3A4FF966280033F7F79D29CD658165D32D39
SHA512 3546F4FF2DE0899547D09E8104B952F50923EDE9611166F5110124EC415C6BA278EB7E2078E6741893B29B064D65C239F8EAA2B8A63E15E90A8F948F55262AEF
SSDEEP 768:I96fS4A9RwCnBIxMLKKtMZ3Pop82t1i+JDAjqq40HQDxFlf9WpI3M:I966RnnB12ndut1i+xA+n0GxFlVWp3

Signature

  • Status: The file C:\windows\SysWOW64\forfiles.exe is not digitally signed. You cannot run this script on the current system. For more information about running scripts and setting execution policy, see about_Execution_Policies at http://go.microsoft.com/fwlink/?LinkID=135170
  • Serial: ``
  • Thumbprint: ``
  • Issuer:
  • Subject:

File Metadata

  • Original Filename: forfiles.exe.mui
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 6.3.9600.16384 (winblue_rtm.130821-1623)
  • Product Version: 6.3.9600.16384
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.

Possible Misuse

The following table contains possible examples of forfiles.exe being misused. While forfiles.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
sigma godmode_sigma_rule.yml - '\forfiles.exe' DRL 1.0
sigma sysmon_suspicious_remote_thread.yml - '\forfiles.exe' DRL 1.0
sigma file_event_win_win_shell_write_susp_directory.yml - '\forfiles.exe' DRL 1.0
sigma proc_creation_win_indirect_cmd.yml description: Detect indirect command execution via Program Compatibility Assistant (pcalua.exe or forfiles.exe). DRL 1.0
sigma proc_creation_win_indirect_cmd.yml - '\forfiles.exe' DRL 1.0
sigma proc_creation_win_office_shell.yml - '\forfiles.exe' DRL 1.0
sigma proc_creation_win_outlook_shell.yml - '\forfiles.exe' DRL 1.0
sigma proc_creation_win_susp_servu_process_pattern.yml - '\forfiles.exe' DRL 1.0
sigma proc_creation_win_susp_shell_spawn_by_java.yml - '\forfiles.exe' DRL 1.0
sigma proc_creation_win_susp_shell_spawn_by_java_keytool.yml - '\forfiles.exe' DRL 1.0
sigma proc_creation_win_susp_system_user_anomaly.yml - '\forfiles.exe' DRL 1.0
LOLBAS Forfiles.yml Name: Forfiles.exe  
LOLBAS Forfiles.yml - Command: forfiles /p c:\windows\system32 /m notepad.exe /c calc.exe  
LOLBAS Forfiles.yml Usecase: Use forfiles to start a new process to evade defensive counter measures  
LOLBAS Forfiles.yml - Command: forfiles /p c:\windows\system32 /m notepad.exe /c "c:\folder\normal.dll:evil.exe"  
LOLBAS Forfiles.yml Usecase: Use forfiles to start a new process from a binary hidden in an alternate data stream  
LOLBAS Forfiles.yml - Path: C:\Windows\System32\forfiles.exe  
LOLBAS Forfiles.yml - Path: C:\Windows\SysWOW64\forfiles.exe  
malware-ioc misp_invisimole.json "description": "Various Windows utilities may be used to execute commands, possibly without invoking [cmd](https://attack.mitre.org/software/S0106). For example, [Forfiles](https://attack.mitre.org/software/S0193), the Program Compatibility Assistant (pcalua.exe), components of the Windows Subsystem for Linux (WSL), as well as other utilities may invoke the execution of programs and commands from a [Command-Line Interface](https://attack.mitre.org/techniques/T1059), Run window, or via scripts. (Citation: VectorSec ForFiles Aug 2017) (Citation: Evi1cg Forfiles Nov 2017)\n\nAdversaries may abuse these features for [Defense Evasion](https://attack.mitre.org/tactics/TA0005), specifically to perform arbitrary execution while subverting detections and/or mitigation controls (such as Group Policy) that limit/prevent the usage of [cmd](https://attack.mitre.org/software/S0106) or file extensions more commonly associated with malicious payloads.", © ESET 2014-2018
atomic-red-team index.md - Atomic Test #2: Indirect Command Execution - forfiles.exe [windows] MIT License. © 2018 Red Canary
atomic-red-team windows-index.md - Atomic Test #2: Indirect Command Execution - forfiles.exe [windows] MIT License. © 2018 Red Canary
atomic-red-team T1202.md <blockquote>Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be used to execute commands, possibly without invoking cmd. For example, Forfiles, the Program Compatibility Assistant (pcalua.exe), components of the Windows Subsystem for Linux (WSL), as well as other utilities may invoke the execution of programs and commands from a Command and Scripting Interpreter, Run window, or via scripts. (Citation: VectorSec ForFiles Aug 2017) (Citation: Evi1cg Forfiles Nov 2017) MIT License. © 2018 Red Canary
atomic-red-team T1202.md - Atomic Test #2 - Indirect Command Execution - forfiles.exe MIT License. © 2018 Red Canary
atomic-red-team T1202.md ## Atomic Test #2 - Indirect Command Execution - forfiles.exe MIT License. © 2018 Red Canary
atomic-red-team T1202.md forfiles.exe may invoke the execution of programs and commands from a Command-Line Interface. MIT License. © 2018 Red Canary
atomic-red-team T1202.md Reference MIT License. © 2018 Red Canary
atomic-red-team T1202.md forfiles /p c:\windows\system32 /m notepad.exe /c #{process} MIT License. © 2018 Red Canary
signature-base apt_sofacy_xtunnel_bundestag.yar $s3 = “forfiles” CC BY-NC 4.0

Additional Info*

*The information below is copied from MicrosoftDocs, which is maintained by Microsoft. Available under CC BY 4.0 license.


forfiles

Selects and runs a command on a file or set of files. This command is most commonly used in batch files.

Syntax

forfiles [/P pathname] [/M searchmask] [/S] [/C command] [/D [+ | -] [{<date> | <days>}]]

Parameters

Parameter Description
/P <pathname> Specifies the path from which to start the search. By default, searching starts in the current working directory.
/M <searchmask> Searches files according to the specified search mask. The default searchmask is *.
/S Instructs the forfiles command to search in subdirectories recursively.
/C <command> Runs the specified command on each file. Command strings should be wrapped in double quotes. The default command is "cmd /c echo @file".
/D [{+\|-}][{<date> | <days>}] Selects files with a last modified date within the specified time frame:<ul><li>Selects files with a last modified date later than or equal to (+) or earlier than or equal to (-) the specified date, where date is in the format MM/DD/YYYY.</li><li>Selects files with a last modified date later than or equal to (+) the current date plus the number of days specified, or earlier than or equal to (-) the current date minus the number of days specified.</li><li>Valid values for days include any number in the range 0–32,768. If no sign is specified, + is used by default.</li></ul>
/? Displays the help text in the cmd window.
Remarks
  • The forfiles /S command is similar to dir /S.

  • You can use the following variables in the command string as specified by the /C command-line option:

    Variable Description
    @FILE File name.
    @FNAME File name without extension.
    @EXT File name extension.
    @PATH Full path of the file.
    @RELPATH Relative path of the file.
    @ISDIR Evaluates to TRUE if a file type is a directory. Otherwise, this variable evaluates to FALSE.
    @FSIZE File size, in bytes.
    @FDATE Last modified date stamp on the file.
    @FTIME Last modified time stamp on the file.
  • The forfiles command lets you run a command on or pass arguments to multiple files. For example, you could run the type command on all files in a tree with the .txt file name extension. Or you could execute every batch file (*.bat) on drive C, with the file name Myinput.txt as the first argument.

  • This command can:

    • Select files by an absolute date or a relative date by using the /d parameter.

    • Build an archive tree of files by using variables such as @FSIZE and @FDATE.

    • Differentiate files from directories by using the @ISDIR variable.

    • Include special characters in the command line by using the hexadecimal code for the character, in 0xHH format (for example, 0x09 for a tab).

  • This command works by implementing the recurse subdirectories flag on tools that are designed to process only a single file.

Examples

To list all of the batch files on drive C, type:

forfiles /P c:\ /S /M *.bat /C "cmd /c echo @file is a batch file"

To list all of the directories on drive C, type:

forfiles /P c:\ /S /M * /C "cmd /c if @isdir==TRUE echo @file is a directory"

To list all of the files in the current directory that are at least one year old, type:

forfiles /S /M *.* /D -365 /C "cmd /c echo @file is at least one year old."

To display the text file is outdated for each of the files in the current directory that are older than January 1, 2007, type:

forfiles /S /M *.* /D -01/01/2007 /C "cmd /c echo @file is outdated."

To list the file name extensions of all the files in the current directory in column format, and add a tab before the extension, type:

forfiles /S /M *.* /C "cmd /c echo The extension of @file is 0x09@ext"

Additional References


MIT License. Copyright (c) 2020-2021 Strontic.