Generate GUIDs from job=generate_and_commit_guids_and_docs branch=master [skip ci]

This commit is contained in:
CircleCI Atomic Red Team GUID generator
2022-04-11 20:05:54 +00:00
parent 40ce7a7cea
commit 98659aee67
2 changed files with 22 additions and 0 deletions
+11
View File
@@ -2,6 +2,7 @@ attack_technique: T1218.007
display_name: 'Signed Binary Proxy Execution: Msiexec'
atomic_tests:
- name: Msiexec.exe - Execute Local MSI file with embedded JScript
auto_generated_guid: a059b6c4-e7d6-4b2e-bcd7-9b2b33191a04
description: |
Executes an MSI containing embedded JScript code using msiexec.exe
supported_platforms:
@@ -29,6 +30,7 @@ atomic_tests:
msiexec.exe /q /#{action} "#{msi_payload}"
name: command_prompt
- name: Msiexec.exe - Execute Local MSI file with embedded VBScript
auto_generated_guid: 8d73c7b0-c2b1-4ac1-881a-4aa644f76064
description: |
Executes an MSI containing embedded VBScript code using msiexec.exe
supported_platforms:
@@ -56,6 +58,7 @@ atomic_tests:
msiexec.exe /q /#{action} "#{msi_payload}"
name: command_prompt
- name: Msiexec.exe - Execute Local MSI file with an embedded DLL
auto_generated_guid: 628fa796-76c5-44c3-93aa-b9d8214fd568
description: |
Executes an MSI containing an embedded DLL using msiexec.exe
supported_platforms:
@@ -83,6 +86,7 @@ atomic_tests:
msiexec.exe /q /#{action} "#{msi_payload}"
name: command_prompt
- name: Msiexec.exe - Execute Local MSI file with an embedded EXE
auto_generated_guid: ed3fa08a-ca18-4009-973e-03d13014d0e8
description: |
Executes an MSI containing an embedded EXE using msiexec.exe
supported_platforms:
@@ -110,6 +114,7 @@ atomic_tests:
msiexec.exe /q /#{action} "#{msi_payload}"
name: command_prompt
- name: WMI Win32_Product Class - Execute Local MSI file with embedded JScript
auto_generated_guid: 882082f0-27c6-4eec-a43c-9aa80bccdb30
description: |
Executes an MSI containing embedded JScript code using the WMI Win32_Product class
supported_platforms:
@@ -137,6 +142,7 @@ atomic_tests:
Invoke-CimMethod -ClassName Win32_Product -MethodName #{action} -Arguments @{ PackageLocation = '#{msi_payload}' }
name: powershell
- name: WMI Win32_Product Class - Execute Local MSI file with embedded VBScript
auto_generated_guid: cf470d9a-58e7-43e5-b0d2-805dffc05576
description: |
Executes an MSI containing embedded VBScript code using the WMI Win32_Product class
supported_platforms:
@@ -164,6 +170,7 @@ atomic_tests:
Invoke-CimMethod -ClassName Win32_Product -MethodName #{action} -Arguments @{ PackageLocation = '#{msi_payload}' }
name: powershell
- name: WMI Win32_Product Class - Execute Local MSI file with an embedded DLL
auto_generated_guid: 32eb3861-30da-4993-897a-42737152f5f8
description: |
Executes an MSI containing an embedded DLL using the WMI Win32_Product class
supported_platforms:
@@ -191,6 +198,7 @@ atomic_tests:
Invoke-CimMethod -ClassName Win32_Product -MethodName #{action} -Arguments @{ PackageLocation = '#{msi_payload}' }
name: powershell
- name: WMI Win32_Product Class - Execute Local MSI file with an embedded EXE
auto_generated_guid: 55080eb0-49ae-4f55-a440-4167b7974f79
description: |
Executes an MSI containing an embedded EXE using the WMI Win32_Product class
supported_platforms:
@@ -218,6 +226,7 @@ atomic_tests:
Invoke-CimMethod -ClassName Win32_Product -MethodName #{action} -Arguments @{ PackageLocation = '#{msi_payload}' }
name: powershell
- name: Msiexec.exe - Execute the DllRegisterServer function of a DLL
auto_generated_guid: 0106ffa5-fab6-4c7d-82e3-e6b8867d5e5d
description: |
Loads a DLL into msiexec.exe and calls its DllRegisterServer function. Note: the DLL included in the "src" folder is only built for 64-bit, so this won't work on a 32-bit OS.
supported_platforms:
@@ -240,6 +249,7 @@ atomic_tests:
msiexec.exe /y "#{dll_payload}"
name: command_prompt
- name: Msiexec.exe - Execute the DllUnregisterServer function of a DLL
auto_generated_guid: ab09ec85-4955-4f9c-b8e0-6851baf4d47f
description: |
Loads a DLL into msiexec.exe and calls its DllUnregisterServer function. Note: the DLL included in the "src" folder is only built for 64-bit, so this won't work on a 32-bit OS.
supported_platforms:
@@ -262,6 +272,7 @@ atomic_tests:
msiexec.exe /z "#{dll_payload}"
name: command_prompt
- name: Msiexec.exe - Execute Remote MSI file
auto_generated_guid: 44a4bedf-ffe3-452e-bee4-6925ab125662
description: |
Execute arbitrary MSI file retrieved remotely. Less commonly seen in application installation, commonly seen in malware execution. The MSI executes a built-in JScript payload that launches powershell.exe.
supported_platforms:
+11
View File
@@ -952,3 +952,14 @@ ca20a3f1-42b5-4e21-ad3f-1049199ec2e0
81ce22fd-9612-4154-918e-8a1f285d214d
327cc050-9e99-4c8e-99b5-1d15f2fb6b96
f1275566-1c26-4b66-83e3-7f9f7f964daa
a059b6c4-e7d6-4b2e-bcd7-9b2b33191a04
8d73c7b0-c2b1-4ac1-881a-4aa644f76064
628fa796-76c5-44c3-93aa-b9d8214fd568
ed3fa08a-ca18-4009-973e-03d13014d0e8
882082f0-27c6-4eec-a43c-9aa80bccdb30
cf470d9a-58e7-43e5-b0d2-805dffc05576
32eb3861-30da-4993-897a-42737152f5f8
55080eb0-49ae-4f55-a440-4167b7974f79
0106ffa5-fab6-4c7d-82e3-e6b8867d5e5d
ab09ec85-4955-4f9c-b8e0-6851baf4d47f
44a4bedf-ffe3-452e-bee4-6925ab125662