<<< Hide Navigation Hide TOC >>>
OMIGOD SCX RunAsProvider ExecuteScript (6eea1bf6-f8d2-488a-a742-e6ef6c1b67db)
Rule to detect the use of the SCX RunAsProvider ExecuteScript to execute any UNIX/Linux script using the /bin/sh shell. Script being executed gets created as a temp file in /tmp folder with a scx prefix. Then it is invoked from the following directory /etc/opt/microsoft/scx/conf/tmpdir/. The file in that directory has the same prefix scx. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
Exploit Public-Facing Application - T1190 (3f886f2a-874f-4333-b794-aa6075009b1c) | Attack Pattern | OMIGOD SCX RunAsProvider ExecuteScript (6eea1bf6-f8d2-488a-a742-e6ef6c1b67db) | Sigma-Rules | 1 |
Exploitation for Privilege Escalation - T1068 (b21c3b2d-02e6-45b1-980b-e69051040839) | Attack Pattern | OMIGOD SCX RunAsProvider ExecuteScript (6eea1bf6-f8d2-488a-a742-e6ef6c1b67db) | Sigma-Rules | 1 |
Exploitation for Client Execution - T1203 (be2dcee9-a7a7-4e38-afd6-21b31ecc3d63) | Attack Pattern | OMIGOD SCX RunAsProvider ExecuteScript (6eea1bf6-f8d2-488a-a742-e6ef6c1b67db) | Sigma-Rules | 1 |