diff --git a/yml/microsoft/built-in/d3d11.yml b/yml/microsoft/built-in/d3d11.yml index b4a4ed6..01d83e0 100644 --- a/yml/microsoft/built-in/d3d11.yml +++ b/yml/microsoft/built-in/d3d11.yml @@ -71,9 +71,11 @@ VulnerableExecutables: Type: Sideloading AutoElevate: true ExpectedSignatureInformation: - - Subject: CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US - Issuer: CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US + - Subject: CN="Skutta, Kristjan", O="Skutta, Kristjan", L=Berlin, C=DE + Issuer: CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US Type: Catalog + - Path: '%ProgramFiles(x86)%\Steam\steamapps\common\wallpaper_engine\wallpaper32.exe' + Type: Sideloading Resources: - https://wietze.github.io/blog/hijacking-dlls-in-windows - https://securityintelligence.com/posts/windows-features-dll-sideloading/ @@ -83,3 +85,6 @@ Acknowledgements: Twitter: '@wietze' - Name: Chris Spehn Twitter: '@ConsciousHacker' +- Name: Josh Allman + Company: Huntress + Twitter: '@xorjosh'