diff --git a/atomics/Indexes/Indexes-CSV/index.csv b/atomics/Indexes/Indexes-CSV/index.csv index c63dde96..8d82be56 100644 --- a/atomics/Indexes/Indexes-CSV/index.csv +++ b/atomics/Indexes/Indexes-CSV/index.csv @@ -447,6 +447,8 @@ defense-evasion,T1562.003,Impair Command History Logging,2,Mac HISTCONTROL,46856 defense-evasion,T1562.006,Indicator Blocking,1,Auditing Configuration Changes on Linux Host,212cfbcf-4770-4980-bc21-303e37abd0e3,bash defense-evasion,T1562.006,Indicator Blocking,2,Logging Configuration Changes on Linux Host,7d40bc58-94c7-4fbb-88d9-ebce9fcdb60c,bash defense-evasion,T1562.006,Indicator Blocking,3,Disable Powershell ETW Provider - Windows,6f118276-121d-4c09-bb58-a8fb4a72ee84,powershell +defense-evasion,T1562.006,Indicator Blocking,4,Disable .NET Event Tracing for Windows Via Registry (cmd),8a4c33be-a0d3-434a-bee6-315405edbd5b,command_prompt +defense-evasion,T1562.006,Indicator Blocking,5,Disable .NET Event Tracing for Windows Via Registry (powershell),19c07a45-452d-4620-90ed-4c34fffbe758,powershell defense-evasion,T1070,Indicator Removal on Host,1,Indicator Removal using FSUtil,b4115c7a-0e92-47f0-a61e-17e7218b2435,command_prompt defense-evasion,T1202,Indirect Command Execution,1,Indirect Command Execution - pcalua.exe,cecfea7a-5f03-4cdd-8bc8-6f7c22862440,command_prompt defense-evasion,T1202,Indirect Command Execution,2,Indirect Command Execution - forfiles.exe,8b34a448-40d9-4fc3-a8c8-4bb286faf7dc,command_prompt diff --git a/atomics/Indexes/Indexes-CSV/windows-index.csv b/atomics/Indexes/Indexes-CSV/windows-index.csv index c693e18c..665b06a1 100644 --- a/atomics/Indexes/Indexes-CSV/windows-index.csv +++ b/atomics/Indexes/Indexes-CSV/windows-index.csv @@ -288,6 +288,8 @@ defense-evasion,T1564,Hide Artifacts,1,Extract binary files via VBA,6afe288a-8a8 defense-evasion,T1564,Hide Artifacts,2,"Create a Hidden User Called ""$""",2ec63cc2-4975-41a6-bf09-dffdfb610778,command_prompt defense-evasion,T1564,Hide Artifacts,3,"Create an ""Administrator "" user (with a space on the end)",5bb20389-39a5-4e99-9264-aeb92a55a85c,powershell defense-evasion,T1562.006,Indicator Blocking,3,Disable Powershell ETW Provider - Windows,6f118276-121d-4c09-bb58-a8fb4a72ee84,powershell +defense-evasion,T1562.006,Indicator Blocking,4,Disable .NET Event Tracing for Windows Via Registry (cmd),8a4c33be-a0d3-434a-bee6-315405edbd5b,command_prompt +defense-evasion,T1562.006,Indicator Blocking,5,Disable .NET Event Tracing for Windows Via Registry (powershell),19c07a45-452d-4620-90ed-4c34fffbe758,powershell defense-evasion,T1070,Indicator Removal on Host,1,Indicator Removal using FSUtil,b4115c7a-0e92-47f0-a61e-17e7218b2435,command_prompt defense-evasion,T1202,Indirect Command Execution,1,Indirect Command Execution - pcalua.exe,cecfea7a-5f03-4cdd-8bc8-6f7c22862440,command_prompt defense-evasion,T1202,Indirect Command Execution,2,Indirect Command Execution - forfiles.exe,8b34a448-40d9-4fc3-a8c8-4bb286faf7dc,command_prompt diff --git a/atomics/Indexes/Indexes-Markdown/index.md b/atomics/Indexes/Indexes-Markdown/index.md index 24eabac4..9aba5508 100644 --- a/atomics/Indexes/Indexes-Markdown/index.md +++ b/atomics/Indexes/Indexes-Markdown/index.md @@ -710,6 +710,8 @@ - Atomic Test #1: Auditing Configuration Changes on Linux Host [linux] - Atomic Test #2: Logging Configuration Changes on Linux Host [linux] - Atomic Test #3: Disable Powershell ETW Provider - Windows [windows] + - Atomic Test #4: Disable .NET Event Tracing for Windows Via Registry (cmd) [windows] + - Atomic Test #5: Disable .NET Event Tracing for Windows Via Registry (powershell) [windows] - T1027.005 Indicator Removal from Tools [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) - [T1070 Indicator Removal on Host](../../T1070/T1070.md) - Atomic Test #1: Indicator Removal using FSUtil [windows] diff --git a/atomics/Indexes/Indexes-Markdown/windows-index.md b/atomics/Indexes/Indexes-Markdown/windows-index.md index 15379587..4db31dab 100644 --- a/atomics/Indexes/Indexes-Markdown/windows-index.md +++ b/atomics/Indexes/Indexes-Markdown/windows-index.md @@ -490,6 +490,8 @@ - T1562 Impair Defenses [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) - [T1562.006 Indicator Blocking](../../T1562.006/T1562.006.md) - Atomic Test #3: Disable Powershell ETW Provider - Windows [windows] + - Atomic Test #4: Disable .NET Event Tracing for Windows Via Registry (cmd) [windows] + - Atomic Test #5: Disable .NET Event Tracing for Windows Via Registry (powershell) [windows] - T1027.005 Indicator Removal from Tools [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing) - [T1070 Indicator Removal on Host](../../T1070/T1070.md) - Atomic Test #1: Indicator Removal using FSUtil [windows] diff --git a/atomics/Indexes/index.yaml b/atomics/Indexes/index.yaml index 619e5e74..944d1009 100644 --- a/atomics/Indexes/index.yaml +++ b/atomics/Indexes/index.yaml @@ -30390,6 +30390,32 @@ defense-evasion: trace "#{session}" -p "#{provider}" -ets name: powershell elevation_required: true + - name: Disable .NET Event Tracing for Windows Via Registry (cmd) + auto_generated_guid: 8a4c33be-a0d3-434a-bee6-315405edbd5b + description: Disables ETW for the .NET Framework using the reg.exe utility to + update the Windows registry + supported_platforms: + - windows + executor: + command: REG ADD HKLM\Software\Microsoft\.NETFramework /v ETWEnabled /t REG_DWORD + /d 0 + cleanup_command: REG DELETE HKLM\Software\Microsoft\.NETFramework /v ETWEnabled + /f > nul 2>&1 + name: command_prompt + elevation_required: true + - name: Disable .NET Event Tracing for Windows Via Registry (powershell) + auto_generated_guid: 19c07a45-452d-4620-90ed-4c34fffbe758 + description: Disables ETW for the .NET Framework using PowerShell to update + the Windows registry + supported_platforms: + - windows + executor: + command: New-ItemProperty -Path HKLM:\Software\Microsoft\.NETFramework -Name + ETWEnabled -Value 0 -PropertyType "DWord" -Force + cleanup_command: REG DELETE HKLM\Software\Microsoft\.NETFramework /v ETWEnabled + /f > $null 2>&1 + name: powershell + elevation_required: true T1027.005: technique: object_marking_refs: diff --git a/atomics/T1562.006/T1562.006.md b/atomics/T1562.006/T1562.006.md index da7d8e1a..a0786e81 100644 --- a/atomics/T1562.006/T1562.006.md +++ b/atomics/T1562.006/T1562.006.md @@ -14,6 +14,10 @@ In the case of network-based reporting of indicators, an adversary may block tra - [Atomic Test #3 - Disable Powershell ETW Provider - Windows](#atomic-test-3---disable-powershell-etw-provider---windows) +- [Atomic Test #4 - Disable .NET Event Tracing for Windows Via Registry (cmd)](#atomic-test-4---disable-net-event-tracing-for-windows-via-registry-cmd) + +- [Atomic Test #5 - Disable .NET Event Tracing for Windows Via Registry (powershell)](#atomic-test-5---disable-net-event-tracing-for-windows-via-registry-powershell) +
@@ -170,4 +174,68 @@ expand-archive -literalpath "$env:temp\PStools.zip" -destinationpath "$env:temp\ +
+
+ +## Atomic Test #4 - Disable .NET Event Tracing for Windows Via Registry (cmd) +Disables ETW for the .NET Framework using the reg.exe utility to update the Windows registry + +**Supported Platforms:** Windows + + +**auto_generated_guid:** 8a4c33be-a0d3-434a-bee6-315405edbd5b + + + + + + +#### Attack Commands: Run with `command_prompt`! Elevation Required (e.g. root or admin) + + +```cmd +REG ADD HKLM\Software\Microsoft\.NETFramework /v ETWEnabled /t REG_DWORD /d 0 +``` + +#### Cleanup Commands: +```cmd +REG DELETE HKLM\Software\Microsoft\.NETFramework /v ETWEnabled /f > nul 2>&1 +``` + + + + + +
+
+ +## Atomic Test #5 - Disable .NET Event Tracing for Windows Via Registry (powershell) +Disables ETW for the .NET Framework using PowerShell to update the Windows registry + +**Supported Platforms:** Windows + + +**auto_generated_guid:** 19c07a45-452d-4620-90ed-4c34fffbe758 + + + + + + +#### Attack Commands: Run with `powershell`! Elevation Required (e.g. root or admin) + + +```powershell +New-ItemProperty -Path HKLM:\Software\Microsoft\.NETFramework -Name ETWEnabled -Value 0 -PropertyType "DWord" -Force +``` + +#### Cleanup Commands: +```powershell +REG DELETE HKLM\Software\Microsoft\.NETFramework /v ETWEnabled /f > $null 2>&1 +``` + + + + +