Conversation
|
Thanks for reviewing. |
|
Hey @4renSick , thank you for your suggestion. Having reviewed your submission, I believe that unfortunately it does not meet the criteria this project has set out. That doesn't mean the functionality you documented is not useful for e.g. red teamers, but if my assessment is right, this entry would unfortunately not be the right fit for this project. For that reason I'm closing this pull request now, if you think I'm wrong though please comment in here and I'll reopen the pull request. |
|
Thank you @wietze for taking the time to review the submission and for the detailed feedback. |
This PR documents choice.exe as a helper binary that can be abused for execution
flow and timing control in malicious batch scripts.
While choice.exe does not execute payloads directly, it has been observed in
real-world ransomware activity (e.g., WastedLocker) as part of command chains
used to introduce silent delays before file manipulation or cleanup actions.
The included examples demonstrate how attackers can combine choice.exe with
other trusted Windows utilities (such as bitsadmin or attrib) to evade sandbox
analysis and reduce behavioral noise.
Reference:
SentinelOne – WastedLocker ransomware abusing NTFS file attributes