T1218 System Binary Proxy Execution Mappings

Adversaries may bypass process and/or signature-based defenses by proxying execution of malicious content with signed, or otherwise trusted, binaries. Binaries used in this technique are often Microsoft-signed files, indicating that they have been either downloaded from Microsoft or are already native in the operating system.(Citation: LOLBAS Project) Binaries signed with trusted digital certificates can typically execute on Windows systems protected by digital signature validation. Several Microsoft signed binaries that are default on Windows installations can be used to proxy execution of other files or commands.

Similarly, on Linux systems adversaries may abuse trusted binaries such as <code>split</code> to proxy execution of malicious commands.(Citation: split man page)(Citation: GTFO split)

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
action.hacking.variety.Abuse of functionality Abuse of functionality. related-to T1218 System Binary Proxy Execution

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1218.011 Rundll32 1
T1218.013 Mavinject 1
T1218.004 InstallUtil 1
T1218.007 Msiexec 1
T1218.003 CMSTP 1
T1218.002 Control Panel 1
T1218.015 Electron Applications 1
T1218.008 Odbcconf 1
T1218.012 Verclsid 1
T1218.005 Mshta 1
T1218.001 Compiled HTML File 1
T1218.010 Regsvr32 1
T1218.009 Regsvcs/Regasm 1
T1218.014 MMC 1