diff --git a/atomics/Indexes/Indexes-CSV/index.csv b/atomics/Indexes/Indexes-CSV/index.csv index 4982cace..a88e8aaf 100644 --- a/atomics/Indexes/Indexes-CSV/index.csv +++ b/atomics/Indexes/Indexes-CSV/index.csv @@ -581,6 +581,7 @@ lateral-movement,T1021.006,Windows Remote Management,2,PowerShell Lateral Moveme lateral-movement,T1021.006,Windows Remote Management,3,WMIC Process Call Create,5cd59c3b-1375-4edf-9bac-5851c9915fca,command_prompt lateral-movement,T1021.006,Windows Remote Management,4,Psexec,9bab84a1-08fd-4245-b681-e62c78283002,command_prompt lateral-movement,T1021.006,Windows Remote Management,5,Invoke-Command,5295bd61-bd7e-4744-9d52-85962a4cf2d6,powershell +lateral-movement,T1021.006,Windows Remote Management,6,WinRM Access with Evil-WinRM,efe86d95-44c4-4509-ae42-7bfd9d1f5b3d,powershell command-and-control,T1071.004,DNS,1,DNS Large Query Volume,1700f5d6-5a44-487b-84de-bc66f507b0a6,powershell command-and-control,T1071.004,DNS,2,DNS Regular Beaconing,3efc144e-1af8-46bb-8ca2-1376bb6db8b6,powershell command-and-control,T1071.004,DNS,3,DNS Long Domain Query,fef31710-223a-40ee-8462-a396d6b66978,powershell diff --git a/atomics/Indexes/Indexes-CSV/windows-index.csv b/atomics/Indexes/Indexes-CSV/windows-index.csv index 7adc4795..fcbcb654 100644 --- a/atomics/Indexes/Indexes-CSV/windows-index.csv +++ b/atomics/Indexes/Indexes-CSV/windows-index.csv @@ -447,5 +447,6 @@ lateral-movement,T1021.006,Windows Remote Management,2,PowerShell Lateral Moveme lateral-movement,T1021.006,Windows Remote Management,3,WMIC Process Call Create,5cd59c3b-1375-4edf-9bac-5851c9915fca,command_prompt lateral-movement,T1021.006,Windows Remote Management,4,Psexec,9bab84a1-08fd-4245-b681-e62c78283002,command_prompt lateral-movement,T1021.006,Windows Remote Management,5,Invoke-Command,5295bd61-bd7e-4744-9d52-85962a4cf2d6,powershell +lateral-movement,T1021.006,Windows Remote Management,6,WinRM Access with Evil-WinRM,efe86d95-44c4-4509-ae42-7bfd9d1f5b3d,powershell initial-access,T1566.001,Spearphishing Attachment,1,Download Phishing Attachment - VBScript,114ccff9-ae6d-4547-9ead-4cd69f687306,powershell initial-access,T1566.001,Spearphishing Attachment,2,Word spawned a command shell and used an IP address in the command line,cbb6799a-425c-4f83-9194-5447a909d67f,powershell diff --git a/atomics/Indexes/Indexes-Markdown/index.md b/atomics/Indexes/Indexes-Markdown/index.md index 14dab100..c06d75ed 100644 --- a/atomics/Indexes/Indexes-Markdown/index.md +++ b/atomics/Indexes/Indexes-Markdown/index.md @@ -1061,6 +1061,7 @@ - Atomic Test #3: WMIC Process Call Create [windows] - Atomic Test #4: Psexec [windows] - Atomic Test #5: Invoke-Command [windows] + - Atomic Test #6: WinRM Access with Evil-WinRM [windows] # command-and-control - T1071 Application Layer Protocol [CONTRIBUTE A TEST](https://atomicredteam.io/contributing) diff --git a/atomics/Indexes/Indexes-Markdown/windows-index.md b/atomics/Indexes/Indexes-Markdown/windows-index.md index 929109c1..b6c5aacd 100644 --- a/atomics/Indexes/Indexes-Markdown/windows-index.md +++ b/atomics/Indexes/Indexes-Markdown/windows-index.md @@ -919,6 +919,7 @@ - Atomic Test #3: WMIC Process Call Create [windows] - Atomic Test #4: Psexec [windows] - Atomic Test #5: Invoke-Command [windows] + - Atomic Test #6: WinRM Access with Evil-WinRM [windows] # initial-access - T1195.003 Compromise Hardware Supply Chain [CONTRIBUTE A TEST](https://atomicredteam.io/contributing) diff --git a/atomics/Indexes/index.yaml b/atomics/Indexes/index.yaml index d4d42e61..08bcb96f 100644 --- a/atomics/Indexes/index.yaml +++ b/atomics/Indexes/index.yaml @@ -42984,6 +42984,40 @@ lateral-movement: ' name: powershell + - name: WinRM Access with Evil-WinRM + auto_generated_guid: efe86d95-44c4-4509-ae42-7bfd9d1f5b3d + description: An adversary may attempt to use Evil-WinRM with a valid account + to interact with remote systems that have WinRM enabled + supported_platforms: + - windows + input_arguments: + user_name: + description: Username + type: string + default: Domain\Administrator + destination_address: + description: Remote Host IP or Hostname + type: string + default: Target + password: + description: Password + type: string + default: P@ssw0rd1 + dependency_executor_name: powershell + dependencies: + - description: Computer must have Ruby Installed + prereq_command: if (ruby -v) {exit 0} else {exit 1} + get_prereq_command: |- + Invoke-WebRequest -OutFile $env:Temp\rubyinstaller-2.7.1-1-x64.exe https://github.com/oneclick/rubyinstaller2/releases/download/RubyInstaller-2.7.1-1/rubyinstaller-2.7.1-1-x64.exe + $file1= $env:Temp + "\rubyinstaller-2.7.1-1-x64.exe" + Start-Process $file1 /S; + - description: Computer must have Evil-WinRM installed + prereq_command: if (evil-winrm -h) {exit 0} else {exit 1} + get_prereq_command: gem install evil-winrm + executor: + command: 'evil-winrm -i #{destination_address} -u #{user_name} -p #{password}' + name: powershell + elevation_required: true command-and-control: T1071: technique: diff --git a/atomics/T1021.006/T1021.006.md b/atomics/T1021.006/T1021.006.md index d32889c0..9228f365 100644 --- a/atomics/T1021.006/T1021.006.md +++ b/atomics/T1021.006/T1021.006.md @@ -16,6 +16,8 @@ WinRM is the name of both a Windows service and a protocol that allows a user to - [Atomic Test #5 - Invoke-Command](#atomic-test-5---invoke-command) +- [Atomic Test #6 - WinRM Access with Evil-WinRM](#atomic-test-6---winrm-access-with-evil-winrm) +
@@ -191,4 +193,55 @@ invoke-command -ComputerName #{host_name} -scriptblock {#{remote_command}} +
+
+ +## Atomic Test #6 - WinRM Access with Evil-WinRM +An adversary may attempt to use Evil-WinRM with a valid account to interact with remote systems that have WinRM enabled +**Supported Platforms:** Windows + + + + +#### Inputs: +| Name | Description | Type | Default Value | +|------|-------------|------|---------------| +| user_name | Username | string | Domain\Administrator| +| destination_address | Remote Host IP or Hostname | string | Target| +| password | Password | string | P@ssw0rd1| + + +#### Attack Commands: Run with `powershell`! Elevation Required (e.g. root or admin) + + +```powershell +evil-winrm -i #{destination_address} -u #{user_name} -p #{password} +``` + + + + +#### Dependencies: Run with `powershell`! +##### Description: +##### Check Prereq Commands: +```powershell + +``` +##### Get Prereq Commands: +```powershell + +``` +##### Description: +##### Check Prereq Commands: +```powershell + +``` +##### Get Prereq Commands: +```powershell + +``` + + + +
diff --git a/atomics/T1021.006/T1021.006.yaml b/atomics/T1021.006/T1021.006.yaml index 34c351ef..de485aaf 100644 --- a/atomics/T1021.006/T1021.006.yaml +++ b/atomics/T1021.006/T1021.006.yaml @@ -121,6 +121,7 @@ atomic_tests: invoke-command -ComputerName #{host_name} -scriptblock {#{remote_command}} name: powershell - name: WinRM Access with Evil-WinRM + auto_generated_guid: efe86d95-44c4-4509-ae42-7bfd9d1f5b3d description: An adversary may attempt to use Evil-WinRM with a valid account to interact with remote systems that have WinRM enabled supported_platforms: - windows diff --git a/atomics/used_guids.txt b/atomics/used_guids.txt index 718fd71b..c15d605d 100644 --- a/atomics/used_guids.txt +++ b/atomics/used_guids.txt @@ -551,3 +551,4 @@ a123ce6a-3916-45d6-ba9c-7d4081315c27 a90c2f4d-6726-444e-99d2-a00cd7c20480 43f71395-6c37-498e-ab17-897d814a0947 d696a3cb-d7a8-4976-8eb5-5af4abf2e3df +efe86d95-44c4-4509-ae42-7bfd9d1f5b3d