InfDefaultInstall.exe .inf Execution
Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file.
Sigma rule (View on GitHub)
1title: InfDefaultInstall.exe .inf Execution
2id: ce7cf472-6fcc-490a-9481-3786840b5d9b
3status: test
4description: Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file.
5references:
6 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1218/T1218.md#atomic-test-4---infdefaultinstallexe-inf-execution
7 - https://lolbas-project.github.io/lolbas/Binaries/Infdefaultinstall/
8author: frack113
9date: 2021-07-13
10modified: 2022-10-09
11tags:
12 - attack.defense-evasion
13 - attack.t1218
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection:
19 CommandLine|contains|all:
20 - 'InfDefaultInstall.exe '
21 - '.inf'
22 condition: selection
23fields:
24 - ComputerName
25 - User
26 - CommandLine
27 - ParentCommandLine
28falsepositives:
29 - Unknown
30level: medium
References
Related rules
- Abusing Print Executable
- AddinUtil.EXE Execution From Uncommon Directory
- AgentExecutor PowerShell Execution
- Arbitrary DLL or Csproj Code Execution Via Dotnet.EXE
- Arbitrary File Download Via MSOHTMED.EXE