58 lines
2.2 KiB
YAML
58 lines
2.2 KiB
YAML
attack_technique: T1564.003
|
|
display_name: 'Hide Artifacts: Hidden Window'
|
|
atomic_tests:
|
|
- name: Hidden Window
|
|
auto_generated_guid: f151ee37-9e2b-47e6-80e4-550b9f999b7a
|
|
description: |
|
|
Launch PowerShell with the "-WindowStyle Hidden" argument to conceal PowerShell windows by setting the WindowStyle parameter to hidden.
|
|
Upon execution a hidden PowerShell window will launch calc.exe
|
|
supported_platforms:
|
|
- windows
|
|
input_arguments:
|
|
powershell_command:
|
|
description: Command to launch calc.exe from a hidden PowerShell Window
|
|
type: string
|
|
default: powershell.exe -WindowStyle hidden calc.exe
|
|
executor:
|
|
command: |
|
|
Start-Process #{powershell_command}
|
|
name: powershell
|
|
- name: Headless Browser Accessing Mockbin
|
|
auto_generated_guid: 0ad9ab92-c48c-4f08-9b20-9633277c4646
|
|
description: |
|
|
The following Atomic Red Team test leverages the Chrome headless browser to access a mockbin site. Create your own Mockbin.org site and replace the BIN in the inputs.
|
|
The default Mockbin ID forwards to google.com and you may view the details here https://mockbin.org/bin/f6b9a876-a826-4ac0-83b8-639d6ad516ec/view.
|
|
Reference: https://cert.gov.ua/article/5702579
|
|
supported_platforms:
|
|
- windows
|
|
input_arguments:
|
|
bin_id:
|
|
description: Mockbin.org BIN ID
|
|
type: string
|
|
default: f6b9a876-a826-4ac0-83b8-639d6ad516ec
|
|
browser:
|
|
description: Browser to use (msedge, chrome, firefox)
|
|
type: string
|
|
default: chrome
|
|
executor:
|
|
command: |
|
|
start "" #{browser} --headless --disable-gpu https://mockbin.org/bin/#{bin_id}
|
|
cleanup_command: |
|
|
taskkill /im #{browser} /f
|
|
name: command_prompt
|
|
- name: Hidden Window-Conhost Execution
|
|
auto_generated_guid: 5510d22f-2595-4911-8456-4d630c978616
|
|
description: |
|
|
Launch conhost.exe in "headless" mode, it means that no visible window will pop up on the victim's machine.
|
|
This could be a sign of "conhost" usage as a LOLBIN or potential process injection activity.
|
|
conhost.exe can be used as proxy the execution of arbitrary commands
|
|
supported_platforms:
|
|
- windows
|
|
executor:
|
|
command: |
|
|
conhost.exe --headless calc.exe
|
|
cleanup_command: |
|
|
Stop-Process -Name calc*
|
|
name: powershell
|
|
elevation_required: true
|