diff --git a/atomics/Indexes/Indexes-CSV/index.csv b/atomics/Indexes/Indexes-CSV/index.csv index 80047754..3cacfc48 100644 --- a/atomics/Indexes/Indexes-CSV/index.csv +++ b/atomics/Indexes/Indexes-CSV/index.csv @@ -642,6 +642,7 @@ execution,T1059.005,Visual Basic,3,Extract Memory via VBA,8faff437-a114-4547-9a6 execution,T1569.002,Service Execution,1,Execute a Command as a Service,2382dee2-a75f-49aa-9378-f52df6ed3fb1,command_prompt execution,T1569.002,Service Execution,2,Use PsExec to execute a command on a remote host,873106b7-cfed-454b-8680-fa9f6400431c,command_prompt execution,T1569.002,Service Execution,3,psexec.py (Impacket),edbcd8c9-3639-4844-afad-455c91e95a35,bash +execution,T1569.002,Service Execution,4,BlackCat pre-encryption cmds with Lateral Movement,31eb7828-97d7-4067-9c1e-c6feb85edc4b,powershell execution,T1053.002,At,1,At.exe Scheduled task,4a6c0dc4-0f2a-4203-9298-a5a9bdc21ed8,command_prompt execution,T1053.002,At,2,At - Schedule a job,7266d898-ac82-4ec0-97c7-436075d0d08e,sh persistence,T1053.005,Scheduled Task,1,Scheduled Task Startup Script,fec27f65-db86-4c2d-b66c-61945aee87c2,command_prompt diff --git a/atomics/Indexes/Indexes-CSV/windows-index.csv b/atomics/Indexes/Indexes-CSV/windows-index.csv index 8290c874..6d36a56c 100644 --- a/atomics/Indexes/Indexes-CSV/windows-index.csv +++ b/atomics/Indexes/Indexes-CSV/windows-index.csv @@ -474,6 +474,7 @@ execution,T1059.005,Visual Basic,2,Encoded VBS code execution,e8209d5f-e42d-45e6 execution,T1059.005,Visual Basic,3,Extract Memory via VBA,8faff437-a114-4547-9a60-749652a03df6,powershell execution,T1569.002,Service Execution,1,Execute a Command as a Service,2382dee2-a75f-49aa-9378-f52df6ed3fb1,command_prompt execution,T1569.002,Service Execution,2,Use PsExec to execute a command on a remote host,873106b7-cfed-454b-8680-fa9f6400431c,command_prompt +execution,T1569.002,Service Execution,4,BlackCat pre-encryption cmds with Lateral Movement,31eb7828-97d7-4067-9c1e-c6feb85edc4b,powershell execution,T1053.002,At,1,At.exe Scheduled task,4a6c0dc4-0f2a-4203-9298-a5a9bdc21ed8,command_prompt persistence,T1053.005,Scheduled Task,1,Scheduled Task Startup Script,fec27f65-db86-4c2d-b66c-61945aee87c2,command_prompt persistence,T1053.005,Scheduled Task,2,Scheduled task Local,42f53695-ad4a-4546-abb6-7d837f644a71,command_prompt diff --git a/atomics/Indexes/Indexes-Markdown/index.md b/atomics/Indexes/Indexes-Markdown/index.md index 98416706..7b8de657 100644 --- a/atomics/Indexes/Indexes-Markdown/index.md +++ b/atomics/Indexes/Indexes-Markdown/index.md @@ -1041,6 +1041,7 @@ - Atomic Test #1: Execute a Command as a Service [windows] - Atomic Test #2: Use PsExec to execute a command on a remote host [windows] - Atomic Test #3: psexec.py (Impacket) [linux] + - Atomic Test #4: BlackCat pre-encryption cmds with Lateral Movement [windows] - [T1053.002 At](../../T1053.002/T1053.002.md) - Atomic Test #1: At.exe Scheduled task [windows] - Atomic Test #2: At - Schedule a job [linux] diff --git a/atomics/Indexes/Indexes-Markdown/windows-index.md b/atomics/Indexes/Indexes-Markdown/windows-index.md index aa1cd5a0..94c277f7 100644 --- a/atomics/Indexes/Indexes-Markdown/windows-index.md +++ b/atomics/Indexes/Indexes-Markdown/windows-index.md @@ -766,6 +766,7 @@ - [T1569.002 Service Execution](../../T1569.002/T1569.002.md) - Atomic Test #1: Execute a Command as a Service [windows] - Atomic Test #2: Use PsExec to execute a command on a remote host [windows] + - Atomic Test #4: BlackCat pre-encryption cmds with Lateral Movement [windows] - [T1053.002 At](../../T1053.002/T1053.002.md) - Atomic Test #1: At.exe Scheduled task [windows] - T1035 Service Execution [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) diff --git a/atomics/Indexes/index.yaml b/atomics/Indexes/index.yaml index cae2ce81..7fdf537a 100644 --- a/atomics/Indexes/index.yaml +++ b/atomics/Indexes/index.yaml @@ -46030,10 +46030,12 @@ execution: atomic_tests: - name: Execute a Command as a Service auto_generated_guid: 2382dee2-a75f-49aa-9378-f52df6ed3fb1 - description: | - Creates a service specifying an arbitrary command and executes it. When executing commands such as PowerShell, the service will report that it did not start correctly even when code executes properly. - - Upon successful execution, cmd.exe creates a new service using sc.exe that will start powershell.exe to create a new file `art-marker.txt` + description: "Creates a service specifying an arbitrary command and executes + it. When executing commands such as PowerShell, the service will report that + it did not start correctly even when code executes properly.\n\nUpon successful + execution, cmd.exe creates a new service using sc.exe that will start powershell.exe + to create a new file `art-marker.txt`\n\n[BlackCat Ransomware (ALPHV)](https://www.varonis.com/blog/blackcat-ransomware) + \ \n[Cybereason vs. BlackCat Ransomware](https://www.cybereason.com/blog/cybereason-vs.-blackcat-ransomware)\n" supported_platforms: - windows input_arguments: @@ -46148,6 +46150,31 @@ execution: ' name: bash + - name: BlackCat pre-encryption cmds with Lateral Movement + auto_generated_guid: 31eb7828-97d7-4067-9c1e-c6feb85edc4b + description: This atomic attempts to emulate the unique behavior of BlackCat + ransomware prior to encryption and during Lateral Movement attempts via PsExec + on Windows. Uses bundled PsExec like BlackCat + supported_platforms: + - windows + input_arguments: + targethost: + description: Target hostname to attempt psexec connection to for emulation + of lateral movement. + type: string + default: "$ENV:COMPUTERNAME" + executor: + command: "cmd.exe /c \"wmic \tcsproduct \tget UUID\" \ncmd.exe /c \"fsutil + behavior \tset SymlinkEvaluation R2L:1\" \ncmd.exe /c \"fsutil behavior + set \tSymlinkEvaluation R2R:1\"\nreg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\LanmanServer\\Parameters + \ /v MaxMpxCt /d 65535 /t REG_DWORD /f \ncopy $pathtoatomicsfolder\\T1569.002\\bin\\PsExec.exe + $env:temp\ncmd.exe /c \"$env:temp\\psexec.exe -accepteula \\\\#{targethost} + cmd.exe /c echo \"--access-token\"\"\n" + cleanup_command: "reg delete HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\LanmanServer\\Parameters + /v MaxMpxCt /f\ncmd.exe /c \"fsutil behavior set SymlinkEvaluation R2L:0\" + \ncmd.exe /c \"fsutil behavior set SymlinkEvaluation R2R:0\"\nrm $env:temp\\psexec.exe\n" + name: powershell + elevation_required: true T1053.002: technique: x_mitre_platforms: diff --git a/atomics/T1569.002/T1569.002.md b/atomics/T1569.002/T1569.002.md index e4e97bb8..a76cb3ce 100644 --- a/atomics/T1569.002/T1569.002.md +++ b/atomics/T1569.002/T1569.002.md @@ -14,6 +14,8 @@ Adversaries may leverage these mechanisms to execute malicious content. This can - [Atomic Test #3 - psexec.py (Impacket)](#atomic-test-3---psexecpy-impacket) +- [Atomic Test #4 - BlackCat pre-encryption cmds with Lateral Movement](#atomic-test-4---blackcat-pre-encryption-cmds-with-lateral-movement) +
@@ -22,6 +24,9 @@ Creates a service specifying an arbitrary command and executes it. When executin Upon successful execution, cmd.exe creates a new service using sc.exe that will start powershell.exe to create a new file `art-marker.txt` +[BlackCat Ransomware (ALPHV)](https://www.varonis.com/blog/blackcat-ransomware) +[Cybereason vs. BlackCat Ransomware](https://www.cybereason.com/blog/cybereason-vs.-blackcat-ransomware) + **Supported Platforms:** Windows @@ -159,4 +164,49 @@ sudo pip3 install impacket +
+
+ +## Atomic Test #4 - BlackCat pre-encryption cmds with Lateral Movement +This atomic attempts to emulate the unique behavior of BlackCat ransomware prior to encryption and during Lateral Movement attempts via PsExec on Windows. Uses bundled PsExec like BlackCat + +**Supported Platforms:** Windows + + +**auto_generated_guid:** 31eb7828-97d7-4067-9c1e-c6feb85edc4b + + + + + +#### Inputs: +| Name | Description | Type | Default Value | +|------|-------------|------|---------------| +| targethost | Target hostname to attempt psexec connection to for emulation of lateral movement. | string | $ENV:COMPUTERNAME| + + +#### Attack Commands: Run with `powershell`! Elevation Required (e.g. root or admin) + + +```powershell +cmd.exe /c "wmic csproduct get UUID" +cmd.exe /c "fsutil behavior set SymlinkEvaluation R2L:1" +cmd.exe /c "fsutil behavior set SymlinkEvaluation R2R:1" +reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters /v MaxMpxCt /d 65535 /t REG_DWORD /f +copy $pathtoatomicsfolder\T1569.002\bin\PsExec.exe $env:temp +cmd.exe /c "$env:temp\psexec.exe -accepteula \\#{targethost} cmd.exe /c echo "--access-token"" +``` + +#### Cleanup Commands: +```powershell +reg delete HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters /v MaxMpxCt /f +cmd.exe /c "fsutil behavior set SymlinkEvaluation R2L:0" +cmd.exe /c "fsutil behavior set SymlinkEvaluation R2R:0" +rm $env:temp\psexec.exe +``` + + + + +