T1216: System Script Proxy Execution
View on MITRE ATT&CK | T1216 |
---|---|
Tactic(s) | Defense Evasion |
Data from MITRE ATT&CK®:
Adversaries may use trusted scripts, often signed with certificates, to proxy the execution of malicious files. Several Microsoft signed scripts that have been downloaded from Microsoft or are default on Windows installations can be used to proxy execution of other files.(Citation: LOLBAS Project) This behavior may be abused by adversaries to execute malicious files that could bypass application control and signature validation on systems.(Citation: GitHub Ultimate AppLocker Bypass List)
© 2024 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.
Cyber Threat Graph Context
Explore how this ATT&CK Technique relates to the wider threat graph
Mitigations for this technique
MITRE ATT&CK Mitigations
How to detect this technique
MITRE ATT&CK Data Components
Command Execution (Command)
The execution of a line of text, potentially with arguments, created from program code (e.g. a cmdlet executed via powershell.exe, interactive commands like >dir, shell executions, etc. )Script Execution (Script)
The execution of a text file that contains code via the interpreter (e.g. Powershell, WMI, Windows EID 4104, etc.)Process Creation (Process)
The initial construction of an executable managed by the OS, that may involve one or more tasks or threads. (e.g. Win EID 4688, Sysmon EID 1, cmd.exe > net use, etc.)Control Validation Tests for this Technique
Use Atomic Red Team tests to test your defenses against this technique.
Sigma Detections for this Technique
Execute Code with Pester.bat
Suspicious Sigverif Execution
AWL Bypass with Winrm.vbs and Malicious WsmPty.xsl/WsmTxt.xsl
UtilityFunctions.ps1 Proxy Dll
AWL Bypass with Winrm.vbs and Malicious WsmPty.xsl/WsmTxt.xsl - File
Potential Process Execution Proxy Via CL_Invocation.ps1
Potential Script Proxy Execution Via CL_Mutexverifiers.ps1
Potential Manage-bde.wsf Abuse To Proxy Execution
Execute Code with Pester.bat as Parent
Remote Code Execute via Winrm.vbs
Suspicious CustomShellHost Execution
SyncAppvPublishingServer VBS Execute Arbitrary PowerShell Code
Assembly Loading Via CL_LoadAssembly.ps1
SP800-53 Controls
See which controls can help protect against this MITRE ATT&CK technique. This is based on mappings to associated SP800-53 controls produced by the MITRE Engenuity Center for Threat-Informed Defense.