Files
2024-08-03 01:27:36 +00:00

59 lines
2.5 KiB
YAML

attack_technique: T1547
display_name: 'Boot or Logon Autostart Execution'
atomic_tests:
- name: Add a driver
auto_generated_guid: cb01b3da-b0e7-4e24-bf6d-de5223526785
description: |
Install a driver via pnputil.exe lolbin
supported_platforms:
- windows
input_arguments:
driver_inf:
description: A built-in, already installed windows driver inf
type: path
default: 'C:\Windows\INF\usbstor.inf'
executor:
command: |
pnputil.exe /add-driver "#{driver_inf}"
name: command_prompt
- name: Driver Installation Using pnputil.exe
auto_generated_guid: 5cb0b071-8a5a-412f-839d-116beb2ed9f7
description: |
pnputil.exe is a native command-line utility in Windows to install drivers, this can be abused by to install malicious drivers. Ref: https://lolbas-project.github.io/lolbas/Binaries/Pnputil/
supported_platforms:
- windows
input_arguments:
driver_path:
description: Enter the driver file path to install (Default is used built-in windows driver - acpipmi.inf)
type: path
default: C:\Windows\INF\acpipmi.inf
executor:
command: |
pnputil.exe -i -a #{driver_path}
name: powershell
- name: Leverage Virtual Channels to execute custom DLL during successful RDP session
auto_generated_guid: fdd45306-74f6-4ade-9a97-0a4895961228
description: |
Virtual Channels can be leveraged to alter RDP behavior using dedicated Addins.The mechanism is implemented using DLLs which can be executed during RDP session automatically.
The DLLs are loaded in the host system only after successful connection is established with the remote system.
Once the test is run, amsi.dll will be loaded on the host system during successful RDP session.
Blog :https://learn.microsoft.com/en-us/windows/win32/termserv/terminal-services-virtual-channels?redirectedfrom=MSDN
supported_platforms:
- windows
input_arguments:
Subkey_Added:
description: New Sub key added in the registry path
type: String
default: 'Malware'
dll_inf:
description: custom DLL to be executed
type: Path
default: 'C:\Windows\System32\amsi.dll'
executor:
command: |
reg add "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default\Addins\#{Subkey_Added}" /v Name /t REG_SZ /d "#{dll_inf}" /f
cleanup_command: |-
reg delete "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default\Addins\#{Subkey_Added}" /f
name: command_prompt
elevation_required: true