diff --git a/atomics/Indexes/Indexes-CSV/index.csv b/atomics/Indexes/Indexes-CSV/index.csv index e1365cdc..bac3c9f2 100644 --- a/atomics/Indexes/Indexes-CSV/index.csv +++ b/atomics/Indexes/Indexes-CSV/index.csv @@ -358,6 +358,7 @@ defense-evasion,T1112,Modify Registry,2,Modify Registry of Local Machine - cmd,2 defense-evasion,T1112,Modify Registry,3,Modify registry to store logon credentials,c0413fb5-33e2-40b7-9b6f-60b29f4a7a18,command_prompt defense-evasion,T1112,Modify Registry,4,Add domain to Trusted sites Zone,cf447677-5a4e-4937-a82c-e47d254afd57,powershell defense-evasion,T1112,Modify Registry,5,Javascript in registry,15f44ea9-4571-4837-be9e-802431a7bfae,powershell +defense-evasion,T1112,Modify Registry,6,Change Powershell Execution Policy to Bypass,f3a6cceb-06c9-48e5-8df8-8867a6814245,powershell defense-evasion,T1218.005,Mshta,1,Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject,1483fab9-4f52-4217-a9ce-daa9d7747cae,command_prompt defense-evasion,T1218.005,Mshta,2,Mshta executes VBScript to execute malicious command,906865c3-e05f-4acc-85c4-fbc185455095,command_prompt defense-evasion,T1218.005,Mshta,3,Mshta Executes Remote HTML Application (HTA),c4b97eeb-5249-4455-a607-59f95485cb45,powershell diff --git a/atomics/Indexes/Indexes-CSV/windows-index.csv b/atomics/Indexes/Indexes-CSV/windows-index.csv index fd8864e1..5b1499d2 100644 --- a/atomics/Indexes/Indexes-CSV/windows-index.csv +++ b/atomics/Indexes/Indexes-CSV/windows-index.csv @@ -144,6 +144,7 @@ defense-evasion,T1112,Modify Registry,2,Modify Registry of Local Machine - cmd,2 defense-evasion,T1112,Modify Registry,3,Modify registry to store logon credentials,c0413fb5-33e2-40b7-9b6f-60b29f4a7a18,command_prompt defense-evasion,T1112,Modify Registry,4,Add domain to Trusted sites Zone,cf447677-5a4e-4937-a82c-e47d254afd57,powershell defense-evasion,T1112,Modify Registry,5,Javascript in registry,15f44ea9-4571-4837-be9e-802431a7bfae,powershell +defense-evasion,T1112,Modify Registry,6,Change Powershell Execution Policy to Bypass,f3a6cceb-06c9-48e5-8df8-8867a6814245,powershell defense-evasion,T1218.005,Mshta,1,Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject,1483fab9-4f52-4217-a9ce-daa9d7747cae,command_prompt defense-evasion,T1218.005,Mshta,2,Mshta executes VBScript to execute malicious command,906865c3-e05f-4acc-85c4-fbc185455095,command_prompt defense-evasion,T1218.005,Mshta,3,Mshta Executes Remote HTML Application (HTA),c4b97eeb-5249-4455-a607-59f95485cb45,powershell diff --git a/atomics/Indexes/Indexes-Markdown/index.md b/atomics/Indexes/Indexes-Markdown/index.md index d575cdea..460f8ba8 100644 --- a/atomics/Indexes/Indexes-Markdown/index.md +++ b/atomics/Indexes/Indexes-Markdown/index.md @@ -668,6 +668,7 @@ - Atomic Test #3: Modify registry to store logon credentials [windows] - Atomic Test #4: Add domain to Trusted sites Zone [windows] - Atomic Test #5: Javascript in registry [windows] + - Atomic Test #6: Change Powershell Execution Policy to Bypass [windows] - [T1218.005 Mshta](../../T1218.005/T1218.005.md) - Atomic Test #1: Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject [windows] - Atomic Test #2: Mshta executes VBScript to execute malicious command [windows] diff --git a/atomics/Indexes/Indexes-Markdown/windows-index.md b/atomics/Indexes/Indexes-Markdown/windows-index.md index 9f6dd5b5..2ce1aa96 100644 --- a/atomics/Indexes/Indexes-Markdown/windows-index.md +++ b/atomics/Indexes/Indexes-Markdown/windows-index.md @@ -266,6 +266,7 @@ - Atomic Test #3: Modify registry to store logon credentials [windows] - Atomic Test #4: Add domain to Trusted sites Zone [windows] - Atomic Test #5: Javascript in registry [windows] + - Atomic Test #6: Change Powershell Execution Policy to Bypass [windows] - [T1218.005 Mshta](../../T1218.005/T1218.005.md) - Atomic Test #1: Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject [windows] - Atomic Test #2: Mshta executes VBScript to execute malicious command [windows] diff --git a/atomics/Indexes/index.yaml b/atomics/Indexes/index.yaml index b4bd3ad9..9a8c0529 100644 --- a/atomics/Indexes/index.yaml +++ b/atomics/Indexes/index.yaml @@ -29312,6 +29312,27 @@ defense-evasion: cleanup_command: 'Remove-ItemProperty "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings" -Name T1112 -ErrorAction Ignore +' + name: powershell + - name: Change Powershell Execution Policy to Bypass + auto_generated_guid: f3a6cceb-06c9-48e5-8df8-8867a6814245 + description: | + Attackers needs to change the powershell execution policy in order to run their malicious powershell scripts. + They can either specify it during the execution of the powershell script or change the registry value for it. + supported_platforms: + - windows + input_arguments: + default_execution_policy: + description: Specify the default poweshell execution policy + type: String + default: Default + executor: + command: 'Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope LocalMachine + +' + cleanup_command: 'Set-ExecutionPolicy -ExecutionPolicy #{default_execution_policy} + -Scope LocalMachine + ' name: powershell T1218.005: diff --git a/atomics/T1112/T1112.md b/atomics/T1112/T1112.md index 8c866913..edd18a78 100644 --- a/atomics/T1112/T1112.md +++ b/atomics/T1112/T1112.md @@ -20,6 +20,8 @@ The Registry of a remote system may be modified to aid in execution of files as - [Atomic Test #5 - Javascript in registry](#atomic-test-5---javascript-in-registry) +- [Atomic Test #6 - Change Powershell Execution Policy to Bypass](#atomic-test-6---change-powershell-execution-policy-to-bypass) +
@@ -186,4 +188,38 @@ Remove-ItemProperty "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Se +
+
+ +## Atomic Test #6 - Change Powershell Execution Policy to Bypass +Attackers needs to change the powershell execution policy in order to run their malicious powershell scripts. +They can either specify it during the execution of the powershell script or change the registry value for it. + +**Supported Platforms:** Windows + + + + +#### Inputs: +| Name | Description | Type | Default Value | +|------|-------------|------|---------------| +| default_execution_policy | Specify the default poweshell execution policy | String | Default| + + +#### Attack Commands: Run with `powershell`! + + +```powershell +Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope LocalMachine +``` + +#### Cleanup Commands: +```powershell +Set-ExecutionPolicy -ExecutionPolicy #{default_execution_policy} -Scope LocalMachine +``` + + + + +
diff --git a/atomics/T1112/T1112.yaml b/atomics/T1112/T1112.yaml index 6a0a4024..00911dd5 100644 --- a/atomics/T1112/T1112.yaml +++ b/atomics/T1112/T1112.yaml @@ -91,3 +91,21 @@ atomic_tests: Remove-ItemProperty "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings" -Name T1112 -ErrorAction Ignore name: powershell +- name: Change Powershell Execution Policy to Bypass + auto_generated_guid: f3a6cceb-06c9-48e5-8df8-8867a6814245 + description: | + Attackers need to change the powershell execution policy in order to run their malicious powershell scripts. + They can either specify it during the execution of the powershell script or change the registry value for it. + supported_platforms: + - windows + input_arguments: + default_execution_policy: + description: Specify the default poweshell execution policy + type: String + default: Default + executor: + command: | + Set-ExecutionPolicy -ExecutionPolicy Bypass -Scope LocalMachine + cleanup_command: | + Set-ExecutionPolicy -ExecutionPolicy #{default_execution_policy} -Scope LocalMachine + name: powershell