sigma |
proc_creation_win_susp_odbcconf.yml |
title: Application Whitelisting Bypass via DLL Loaded by odbcconf.exe |
DRL 1.0 |
sigma |
proc_creation_win_susp_odbcconf.yml |
description: Detects defence evasion attempt via odbcconf.exe execution to load DLL |
DRL 1.0 |
sigma |
proc_creation_win_susp_odbcconf.yml |
- https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSBinaries/Odbcconf.yml |
DRL 1.0 |
sigma |
proc_creation_win_susp_odbcconf.yml |
Image\|endswith: '\odbcconf.exe' |
DRL 1.0 |
sigma |
proc_creation_win_susp_odbcconf.yml |
ParentImage\|endswith: '\odbcconf.exe' |
DRL 1.0 |
sigma |
proc_creation_win_susp_odbcconf.yml |
- Legitimate use of odbcconf.exe by legitimate user |
DRL 1.0 |
LOLBAS |
Odbcconf.yml |
Name: Odbcconf.exe |
|
LOLBAS |
Odbcconf.yml |
- Command: odbcconf -f file.rsp |
|
LOLBAS |
Odbcconf.yml |
- Command: odbcconf /a {REGSVR c:\test\test.dll} |
|
LOLBAS |
Odbcconf.yml |
- Path: C:\Windows\System32\odbcconf.exe |
|
LOLBAS |
Odbcconf.yml |
- Path: C:\Windows\SysWOW64\odbcconf.exe |
|
atomic-red-team |
index.md |
- T1218.008 Odbcconf |
MIT License. © 2018 Red Canary |
atomic-red-team |
index.md |
- Atomic Test #1: Odbcconf.exe - Execute Arbitrary DLL [windows] |
MIT License. © 2018 Red Canary |
atomic-red-team |
windows-index.md |
- T1218.008 Odbcconf |
MIT License. © 2018 Red Canary |
atomic-red-team |
windows-index.md |
- Atomic Test #1: Odbcconf.exe - Execute Arbitrary DLL [windows] |
MIT License. © 2018 Red Canary |
atomic-red-team |
matrix.md |
| | | Shortcut Modification | Valid Accounts CONTRIBUTE A TEST | Odbcconf | | | | | | | | |
MIT License. © 2018 Red Canary |
atomic-red-team |
windows-matrix.md |
| | | Shortcut Modification | Winlogon Helper DLL | Odbcconf | | | | | | | | |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1218.008.md |
# T1218.008 - Odbcconf |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1218.008.md |
<blockquote>Adversaries may abuse odbcconf.exe to proxy execution of malicious payloads. Odbcconf.exe is a Windows utility that allows you to configure Open Database Connectivity (ODBC) drivers and data source names.(Citation: Microsoft odbcconf.exe) Odbcconf.exe is digitally signed by Microsoft. |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1218.008.md |
Adversaries may abuse odbcconf.exe to bypass application control solutions that do not account for its potential abuse. Similar to Regsvr32, odbcconf.exe has a REGSVR flag that can be misused to execute DLLs (ex: odbcconf.exe /S /A {REGSVR "C:\Users\Public\file.dll"} ). (Citation: LOLBAS Odbcconf)(Citation: TrendMicro Squiblydoo Aug 2017)(Citation: TrendMicro Cobalt Group Nov 2017) |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1218.008.md |
- Atomic Test #1 - Odbcconf.exe - Execute Arbitrary DLL |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1218.008.md |
## Atomic Test #1 - Odbcconf.exe - Execute Arbitrary DLL |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1218.008.md |
odbcconf.exe /S /A {REGSVR “#{dll_payload}”} |
MIT License. © 2018 Red Canary |
stockpile |
a74bc239-a196-4f7e-8d5c-fe8c0266071c.yml |
name: Signed Binary Execution - odbcconf |
Apache-2.0 |
stockpile |
a74bc239-a196-4f7e-8d5c-fe8c0266071c.yml |
description: Leverage odbcconf for DLL injection |
Apache-2.0 |
stockpile |
a74bc239-a196-4f7e-8d5c-fe8c0266071c.yml |
odbcconf.exe /S /A {REGSVR "C:\Users\Public\sandcat.dll"} |
Apache-2.0 |