Skip to content

Hide Navigation Hide TOC

OMIGOD SCX RunAsProvider ExecuteScript (6eea1bf6-f8d2-488a-a742-e6ef6c1b67db)

Rule to detect the use of the SCX RunAsProvider ExecuteScript to execute any UNIX/Linux script using the /bin/sh shell. Script being executed gets created as a temp file in /tmp folder with a scx prefix. Then it is invoked from the following directory /etc/opt/microsoft/scx/conf/tmpdir/. The file in that directory has the same prefix scx. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.

Cluster A Galaxy A Cluster B Galaxy B Level
Exploitation for Client Execution - T1203 (be2dcee9-a7a7-4e38-afd6-21b31ecc3d63) Attack Pattern OMIGOD SCX RunAsProvider ExecuteScript (6eea1bf6-f8d2-488a-a742-e6ef6c1b67db) Sigma-Rules 1
Exploitation for Privilege Escalation - T1068 (b21c3b2d-02e6-45b1-980b-e69051040839) Attack Pattern OMIGOD SCX RunAsProvider ExecuteScript (6eea1bf6-f8d2-488a-a742-e6ef6c1b67db) Sigma-Rules 1
Exploit Public-Facing Application - T1190 (3f886f2a-874f-4333-b794-aa6075009b1c) Attack Pattern OMIGOD SCX RunAsProvider ExecuteScript (6eea1bf6-f8d2-488a-a742-e6ef6c1b67db) Sigma-Rules 1