gpscript.exe

  • File Path: C:\windows\SysWOW64\gpscript.exe
  • Description: Group Policy Script Application

Hashes

Type Hash
MD5 948BE69F835E0D6C5978978935DDD5A3
SHA1 1A7A7D91F12B9283348659CB0CE7A225C9549C51
SHA256 D676D4F5F949FED314D4A06B1DF0D47D492C052D83ECBF3E07D8FA9FF34C1DC3
SHA384 BA2AE63710FA6C293ABC5E0EEA5A5EFD6F83C78FBC343CC33630254C5597210BF315025A3B1290B2DA2D0F14EEACD9C2
SHA512 C1831D3D3A6AE1E8D879F155EFE91E40D3DFBC3A14FF5367256E786D69008116A15932090DDAA868AE06772B58F67B9661E386677767AEB8901D30A9B0960609
SSDEEP 384:8sBk38mXNVJl3Uqk4FK9jG8Xh2TJpEpp84PoxSQ9UXm8Ih8rSnwkUWa94oljbsWN:8sBk3O9jG8Ie8Eoef94MbLuEk

Signature

  • Status: The file C:\windows\SysWOW64\gpscript.exe is not digitally signed. You cannot run this script on the current system. For more information about running scripts and setting execution policy, see about_Execution_Policies at http://go.microsoft.com/fwlink/?LinkID=135170
  • Serial: ``
  • Thumbprint: ``
  • Issuer:
  • Subject:

File Metadata

  • Original Filename: GPSCRIPT.EXE
  • Product Name: Microsoft Windows Operating System
  • Company Name: Microsoft Corporation
  • File Version: 6.3.9600.17415 (winblue_r4.141028-1500)
  • Product Version: 6.3.9600.17415
  • Language: English (United States)
  • Legal Copyright: Microsoft Corporation. All rights reserved.

Possible Misuse

The following table contains possible examples of gpscript.exe being misused. While gpscript.exe is not inherently malicious, its legitimate functionality can be abused for malicious purposes.

Source Source File Example License
LOLBAS Gpscript.yml Name: Gpscript.exe  
LOLBAS Gpscript.yml - Command: Gpscript /logon  
LOLBAS Gpscript.yml - Command: Gpscript /startup  
LOLBAS Gpscript.yml - Path: C:\Windows\System32\gpscript.exe  
LOLBAS Gpscript.yml - Path: C:\Windows\SysWOW64\gpscript.exe  
LOLBAS Gpscript.yml - IOC: Execution of Gpscript.exe after logon  
LOLBAS Gpscript.yml - Link: https://oddvar.moe/2018/04/27/gpscript-exe-another-lolbin-to-the-list/  

MIT License. Copyright (c) 2020-2021 Strontic.