Endpoint Security

LOLBin

Living Off the Land Binary — a legitimate, signed system tool repurposed beyond its original intent, typically by attackers seeking to evade detection.

A LOLBin (“Living Off the Land Binary”) is a binary already present on a target system — typically signed and trusted by the operating system vendor — that an attacker can use to perform actions beyond its stated purpose: download code, execute scripts, evade detection, persist, or bypass policy.

The term comes from the broader “Living Off the Land” philosophy in offensive security: instead of bringing your own tools to a compromised system, you use what’s already there.

What qualifies a binary as a LOLBin

Three properties together:

  1. Pre-installed and trusted. Already present on a default OS install; signed by the vendor. AV and EDR generally allow it to run.
  2. Capability beyond stated purpose. The binary’s advertised function is narrow, but its actual capabilities (often via undocumented flags, scripting interfaces, or side effects) include things like arbitrary code execution, network I/O, or proxy execution.
  3. Documented misuse. Real-world threat actors have used it. The community curates this in the LOLBAS project — the canonical catalog of Windows LOLBins.

Why this matters for defense

Detection that focuses on “what was run” misses LOLBin abuse entirely — csc.exe, certutil.exe, and mshta.exe run constantly on legitimate Windows systems. The signal is context:

  • Where was the binary invoked from?
  • What were its arguments?
  • What did it do next?
  • Who launched it?

A csc.exe invocation from a developer’s IDE is normal. The same csc.exe invocation from a temp directory triggered by an Office macro is suspicious — same binary, completely different intent.

Common Windows LOLBins

  • csc.exe — the C# compiler. Compiles source code on the fly using a Microsoft-signed binary present on every default install with .NET Framework. Walked through end-to-end in Accidental LOLBin: Controlling Media Keys with csc.exe.
  • certutil.exe — supposed to handle certificates; can also download arbitrary files (certutil -urlcache) and decode base64.
  • mshta.exe — Microsoft HTML Application host; can execute JavaScript/VBScript inline or from a URL.
  • regsvr32.exe — registers DLLs; via /i:url flag, can fetch and execute remote .sct scripts (the “squiblydoo” trick).
  • rundll32.exe — runs functions from DLLs; widely abused for proxy execution.

Each of these is the entry point to its own family of techniques in MITRE ATT&CK.

Retrieval prompts

Test recall before peeking. Spaced repetition beats re-reading.

Why do attackers prefer LOLBins over custom malware?

Four reasons: (1) Microsoft-signed binaries don't trigger AV alerts; (2) no download leaves no suspicious-file-on-disk artifact; (3) they can bypass application whitelisting policies that allow signed system files; (4) they leave fewer obvious forensic traces than custom tools.

Name three Windows LOLBins beyond csc.exe.

certutil.exe, mshta.exe, regsvr32.exe — all bundled with Windows, all signed, all capable of executing or downloading code beyond their stated purpose.