10 Commits

Author SHA1 Message Date
ohadm-cynet be0b138294 Update T1491.001.yaml - move dependency_executor_name to test root level (#3189)
Co-authored-by: Hare Sudhan <code@0x6c.dev>
2025-10-04 14:01:27 -04:00
Atomic Red Team doc generator 35b3e57830 Generated docs from job=generate-docs branch=master [ci skip] 2025-09-19 22:18:40 +00:00
Bakeneko b6508a417b Update T1491.001.yaml (#3184) 2025-09-19 15:17:17 -07:00
Nathan 4ea1e37fc1 Expand ESXi-focused Tests (#3004)
Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2024-12-10 16:59:07 -07:00
Josh Rickard a5dd0813cd fix: Updating atomics YAML file structure to align with the new JSON schema definition (#2323)
* fix: Updating atomics YAML file structure to align with the new JSON schema definition.

This also fixes some white space issues and general line formatting across all impacted atomics.

* fix: One additional change needed

---------

Co-authored-by: MSAdministrator <MSAdministrator@users.noreply.github.com>
Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2023-02-13 16:10:37 -07:00
harshalcoep a865221e1a Minor edits to test number 2 (#2190)
Separated reference URLs in description section with commas ','

Co-authored-by: Carrie Roberts <clr2of8@gmail.com>
2022-10-18 19:26:16 -06:00
harshalcoep 17b0ff7915 Added a new atomic test
We have added a new atomic test with guid ffcbfaab-c9ff-470b-928c-f086b326089b that sets two registry keys HKLM\SOFTWARE\Micosoft\Windows\CurrentVersion\Policies\System\LegalNoticeCaption and HKLM\SOFTWARE\Micosoft\Windows\CurrentVersion\Policies\System\LegalNoticeText to display a ransom message. While executing this atomic test, the value for these registries can be configured using the switch -PromptForInputArgs. This technique has been used by many ransomwares in the past including SynAck, Grief, Maze, Pysa, Spook, DopplePaymer, Reedemer and Kangaroo.  After encrypting files, ransomwares modify the Windows LegalNoticeCaption and LegalNoticeText registry keys to display a ransom message to victim at logon.
2022-10-17 20:28:17 +05:30
Josh Rickard 1513717eb2 Updating atomics to conform to standard (#1619)
* Updated format of input_argument types for Url

* Updated type for input_arguments to Url (missed)

* Updating Path type for input_arguments

* Updated String type for input_arguments

* Missed a few Strings and Url types

* Updated default values for input_arguments to align with their types

* Updated Integer type for input_arguments

* Updated formatting and spacing of atomics
2021-09-03 18:20:46 -06:00
CircleCI Atomic Red Team GUID generator 83510cb71c Generate GUIDs from job=generate_and_commit_guids_and_docs branch=master [skip ci] 2021-04-19 17:34:57 +00:00
jtothef 2c21e810c1 Add T1491.001 (#1429)
* Add T1491.001

Adding new atomic for T1491.001 - Defacement: Internal Defacement
Uses PowerShell to download image and sets it as the desktop wallpaper.
Additionally, script will create a file holding the location to the original wallpaper image and restore it during cleanup.

Confirmed operational on Windows 10.

* Update T1491.001.yaml

Adding formatting changes

* Update T1491.001.yaml

Adding a few additional formatting changes.
2021-04-19 11:34:37 -06:00