Adversaries may use trusted scripts, often signed with certificates, to proxy the execution of malicious files. Several Microsoft signed scripts that have been downloaded from Microsoft or are default on Windows installations can be used to proxy execution of other files.(Citation: LOLBAS Project) This behavior may be abused by adversaries to execute malicious files that could bypass application control and signature validation on systems.(Citation: GitHub Ultimate AppLocker Bypass List)
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
CM-06 | Configuration Settings | mitigates | T1216 | System Script Proxy Execution | |
SI-10 | Information Input Validation | mitigates | T1216 | System Script Proxy Execution | |
SI-07 | Software, Firmware, and Information Integrity | mitigates | T1216 | System Script Proxy Execution | |
CM-02 | Baseline Configuration | mitigates | T1216 | System Script Proxy Execution | |
CM-07 | Least Functionality | mitigates | T1216 | System Script Proxy Execution | |
SI-04 | System Monitoring | mitigates | T1216 | System Script Proxy Execution |
Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
---|---|---|---|---|---|
action.hacking.variety.Abuse of functionality | Abuse of functionality. | related-to | T1216 | System Script Proxy Execution | |
action.malware.variety.C2 | Malware creates Command and Control capability for malware. Child of 'Backdoor or C2'. | related-to | T1216 | System Script Proxy Execution |
Technique ID | Technique Name | Number of Mappings |
---|---|---|
T1216.001 | PubPrn | 7 |
T1216.002 | SyncAppvPublishingServer | 6 |