Skip to content

Hide Navigation Hide TOC

OMIGOD SCX RunAsProvider ExecuteShellCommand (21541900-27a9-4454-9c4c-3f0a4240344a)

Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.

Cluster A Galaxy A Cluster B Galaxy B Level
Exploitation for Client Execution - T1203 (be2dcee9-a7a7-4e38-afd6-21b31ecc3d63) Attack Pattern OMIGOD SCX RunAsProvider ExecuteShellCommand (21541900-27a9-4454-9c4c-3f0a4240344a) Sigma-Rules 1
Exploitation for Privilege Escalation - T1068 (b21c3b2d-02e6-45b1-980b-e69051040839) Attack Pattern OMIGOD SCX RunAsProvider ExecuteShellCommand (21541900-27a9-4454-9c4c-3f0a4240344a) Sigma-Rules 1
Exploit Public-Facing Application - T1190 (3f886f2a-874f-4333-b794-aa6075009b1c) Attack Pattern OMIGOD SCX RunAsProvider ExecuteShellCommand (21541900-27a9-4454-9c4c-3f0a4240344a) Sigma-Rules 1