Files
cti/enterprise-attack/attack-pattern/attack-pattern--f2d44246-91f1-478a-b6c8-1227e0ca109d.json
T
2019-02-23 08:25:17 -05:00

100 lines
7.2 KiB
JSON

{
"type": "bundle",
"id": "bundle--c012897b-b4ac-4e14-84cc-06ec64ced1bd",
"spec_version": "2.0",
"objects": [
{
"id": "attack-pattern--f2d44246-91f1-478a-b6c8-1227e0ca109d",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"name": "NTFS File Attributes",
"description": "Every New Technology File System (NTFS) formatted partition contains a Master File Table (MFT) that maintains a record for every file/directory on the partition. (Citation: SpectorOps Host-Based Jul 2017) Within MFT entries are file attributes, (Citation: Microsoft NTFS File Attributes Aug 2010) such as Extended Attributes (EA) and Data [known as Alternate Data Streams (ADSs) when more than one Data attribute is present], that can be used to store arbitrary data (and even complete files). (Citation: SpectorOps Host-Based Jul 2017) (Citation: Microsoft File Streams) (Citation: MalwareBytes ADS July 2015) (Citation: Microsoft ADS Mar 2014)\n\nAdversaries may store malicious data or binaries in file attribute metadata instead of directly in files. This may be done to evade some defenses, such as static indicator scanning tools and anti-virus. (Citation: Journey into IR ZeroAccess NTFS EA) (Citation: MalwareBytes ADS July 2015)",
"external_references": [
{
"external_id": "T1096",
"url": "https://attack.mitre.org/techniques/T1096",
"source_name": "mitre-attack"
},
{
"url": "http://msdn.microsoft.com/en-us/library/aa364404",
"description": "Microsoft. (n.d.). File Streams. Retrieved December 2, 2014.",
"source_name": "Microsoft File Streams"
},
{
"url": "http://journeyintoir.blogspot.com/2012/12/extracting-zeroaccess-from-ntfs.html",
"description": "Harrell, C. (2012, December 11). Extracting ZeroAccess from NTFS Extended Attributes. Retrieved June 3, 2016.",
"source_name": "Journey into IR ZeroAccess NTFS EA"
},
{
"url": "https://blog.malwarebytes.com/101/2015/07/introduction-to-alternate-data-streams/",
"description": "Arntz, P. (2015, July 22). Introduction to Alternate Data Streams. Retrieved March 21, 2018.",
"source_name": "MalwareBytes ADS July 2015"
},
{
"url": "https://posts.specterops.io/host-based-threat-modeling-indicator-design-a9dbbb53d5ea",
"description": "Atkinson, J. (2017, July 18). Host-based Threat Modeling & Indicator Design. Retrieved March 21, 2018.",
"source_name": "SpectorOps Host-Based Jul 2017"
},
{
"url": "https://blogs.technet.microsoft.com/askcore/2013/03/24/alternate-data-streams-in-ntfs/",
"description": "Marlin, J. (2013, March 24). Alternate Data Streams in NTFS. Retrieved March 21, 2018.",
"source_name": "Microsoft ADS Mar 2014"
},
{
"url": "https://www.symantec.com/connect/articles/what-you-need-know-about-alternate-data-streams-windows-your-data-secure-can-you-restore",
"description": "Pravs. (2009, May 25). What you need to know about alternate data streams in windows? Is your Data secure? Can you restore that?. Retrieved March 21, 2018.",
"source_name": "Symantec ADS May 2009"
},
{
"url": "https://blogs.technet.microsoft.com/askcore/2010/08/25/ntfs-file-attributes/",
"description": "Hughes, J. (2010, August 25). NTFS File Attributes. Retrieved March 21, 2018.",
"source_name": "Microsoft NTFS File Attributes Aug 2010"
},
{
"url": "https://oddvar.moe/2018/01/14/putting-data-in-alternate-data-streams-and-how-to-execute-it/",
"description": "Moe, O. (2018, January 14). Putting Data in Alternate Data Streams and How to Execute It. Retrieved June 30, 2018.",
"source_name": "Oddvar Moe ADS1 Jan 2018"
},
{
"url": "https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/",
"description": "Moe, O. (2018, April 11). Putting Data in Alternate Data Streams and How to Execute It - Part 2. Retrieved June 30, 2018.",
"source_name": "Oddvar Moe ADS2 Apr 2018"
}
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"x_mitre_version": "1.0",
"x_mitre_contributors": [
"Red Canary",
"Oddvar Moe, @oddvarmoe"
],
"x_mitre_data_sources": [
"File monitoring",
"Kernel drivers",
"API monitoring",
"Process command-line parameters"
],
"x_mitre_defense_bypassed": [
"Signature-based detection",
"Host forensic analysis",
"Anti-virus"
],
"x_mitre_detection": "Forensic techniques exist to identify information stored in NTFS EA. (Citation: Journey into IR ZeroAccess NTFS EA) Monitor calls to the ZwSetEaFile and ZwQueryEaFile Windows API functions as well as binaries used to interact with EA, (Citation: Oddvar Moe ADS1 Jan 2018) (Citation: Oddvar Moe ADS2 Apr 2018) and consider regularly scanning for the presence of modified information. (Citation: SpectorOps Host-Based Jul 2017)\n\nThere are many ways to create and interact with ADSs using Windows utilities. Monitor for operations (execution, copies, etc.) with file names that contain colons. This syntax (ex: <code>file.ext:ads[.ext]</code>) is commonly associated with ADSs. (Citation: Microsoft ADS Mar 2014) (Citation: Oddvar Moe ADS1 Jan 2018) (Citation: Oddvar Moe ADS2 Apr 2018) For a more exhaustive list of utilities that can be used to execute and create ADSs, see https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f.\n\nThe Streams tool of Sysinternals can be used to uncover files with ADSs. The <code>dir /r</code> command can also be used to display ADSs. (Citation: Symantec ADS May 2009) Many PowerShell commands (such as Get-Item, Set-Item, Remove-Item, and Get-ChildItem) can also accept a <code>-stream</code> parameter to interact with ADSs. (Citation: MalwareBytes ADS July 2015) (Citation: Microsoft ADS Mar 2014)",
"x_mitre_platforms": [
"Windows"
],
"x_mitre_system_requirements": [
"NTFS partitioned hard drive"
],
"type": "attack-pattern",
"kill_chain_phases": [
{
"phase_name": "defense-evasion",
"kill_chain_name": "mitre-attack"
}
],
"modified": "2019-02-20T14:17:30.847Z",
"created": "2017-05-31T21:31:11.147Z"
}
]
}