@@ -81,6 +81,7 @@ The following table shows the different test cases and the expected detection re
81
81
| DNS Cache 1 (Cache Injection) | (X) | X | | X | X |
82
82
| Malicious User Agents (Malware, RATs) | | X | X | X | |
83
83
| Ncat Back Connect (Drop & Exec) | X | | X | X | X |
84
+ | WMI Backdoor C2 | | | X | X | X |
84
85
| LSASS Dump (with Procdump) | | | X | X | X |
85
86
| Mimikatz 1 (Drop & Exec) | X | | X | X | X |
86
87
| WCE 1 (Eventlog entries) | | | X | X | X |
@@ -98,6 +99,7 @@ The following table shows the different test cases and the expected detection re
98
99
| Scheduled Task Creation | | | X | X | X |
99
100
| StickyKey Backdoor | | | X | | X |
100
101
| Web Shells | X | | (X) | | X |
102
+ | WMI Backdoor | | | X | | X |
101
103
102
104
# Test Sets
103
105
@@ -126,6 +128,10 @@ The following table shows the different test cases and the expected detection re
126
128
127
129
- Drops a PowerShell Ncat alternative to the working directory and runs it to back connect to a well-known attacker domain
128
130
131
+ ### WMI Backdoor
132
+
133
+ - Using Matt Graeber's [ WMIBackdoor] ( https://github.com/mattifestation/WMI_Backdoor/ ) to kill local procexp64.exe when it starts
134
+
129
135
## Credential Access
130
136
131
137
### LSASS DUMP
@@ -220,6 +226,10 @@ No test cases yet
220
226
- Drops standard web shells to that diretory
221
227
- Drops GIF obfuscated web shell to that diretory
222
228
229
+ ### WMI Backdoor
230
+
231
+ - Using Matt Graeber's [ WMIBackdoor] ( https://github.com/mattifestation/WMI_Backdoor/ ) to kill local procexp64.exe when it starts
232
+
223
233
# Warning
224
234
225
235
This repo contains tools and executables that can harm your system's integrity and stability. Do only use them on non-productive test or demo systems.
0 commit comments