Skip to content

Hide Navigation Hide TOC

OMIGOD SCX RunAsProvider ExecuteShellCommand - Auditd (045b5f9c-49f7-4419-a236-9854fb3c827a)

Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager. Microsoft Azure, and Microsoft Operations Management Suite.

Cluster A Galaxy A Cluster B Galaxy B Level
Exploitation for Client Execution - T1203 (be2dcee9-a7a7-4e38-afd6-21b31ecc3d63) Attack Pattern OMIGOD SCX RunAsProvider ExecuteShellCommand - Auditd (045b5f9c-49f7-4419-a236-9854fb3c827a) Sigma-Rules 1
Exploitation for Privilege Escalation - T1068 (b21c3b2d-02e6-45b1-980b-e69051040839) Attack Pattern OMIGOD SCX RunAsProvider ExecuteShellCommand - Auditd (045b5f9c-49f7-4419-a236-9854fb3c827a) Sigma-Rules 1
Exploit Public-Facing Application - T1190 (3f886f2a-874f-4333-b794-aa6075009b1c) Attack Pattern OMIGOD SCX RunAsProvider ExecuteShellCommand - Auditd (045b5f9c-49f7-4419-a236-9854fb3c827a) Sigma-Rules 1