Skip to content

Commit

Permalink
Add Diantz directives/DDF entry to diantz.exe (#390)
Browse files Browse the repository at this point in the history
Co-authored-by: Wietze <wietze@users.noreply.github.com>
  • Loading branch information
TAbdiukov and wietze authored Aug 17, 2024
1 parent e1d0707 commit e09cf10
Showing 1 changed file with 11 additions and 1 deletion.
12 changes: 11 additions & 1 deletion yml/OSBinaries/Diantz.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
Name: Diantz.exe
Description: Binary that package existing files into a cabinet (.cab) file
Author: 'Tamir Yehuda'
Author: Tamir Yehuda
Created: 2020-08-08
Commands:
- Command: diantz.exe c:\pathToFile\file.exe c:\destinationFolder\targetFile.txt:targetFile.cab
Expand All @@ -22,6 +22,15 @@ Commands:
OperatingSystem: Windows Server 2012, Windows Server 2012R2, Windows Server 2016, Windows Server 2019
Tags:
- Type: Compression
- Command: diantz /f directives.ddf
Description: Execute diantz directives as defined in the specified Diamond Definition File (.ddf); see resources for the format specification.
Usecase: Bypass command-line based detections
Category: Execute
Privileges: User
MitreID: T1036
OperatingSystem: Windows Server 2012, Windows Server 2012R2, Windows Server 2016, Windows Server 2019
Tags:
- Type: Compression
Full_Path:
- Path: c:\windows\system32\diantz.exe
- Path: c:\windows\syswow64\diantz.exe
Expand All @@ -34,6 +43,7 @@ Detection:
- IOC: diantz getting a file from a remote machine or the internet.
Resources:
- Link: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/diantz
- Link: https://ss64.com/nt/makecab-directives.html
Acknowledgement:
- Person: Tamir Yehuda
Handle: '@tim8288'
Expand Down

0 comments on commit e09cf10

Please sign in to comment.