Files
sigma-rules/rta/sticky_keys_write_execute.py
T

81 lines
2.4 KiB
Python
Raw Normal View History

2020-06-29 23:07:16 -06:00
# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
2021-03-03 22:12:11 -09:00
# or more contributor license agreements. Licensed under the Elastic License
# 2.0; you may not use this file except in compliance with the Elastic License
# 2.0.
2020-06-29 23:07:16 -06:00
# Name: Overwrite Accessibiity Binaries
# RTA: sticky_keys_write_execute.py
# signal.rule.name: Potential Modification of Accessibility Binaries
# signal.rule.name: Local Service Commands
# signal.rule.name: Persistence via TelemetryController Scheduled Task Hijack
2020-06-29 23:07:16 -06:00
# ATT&CK: T1015
# Description: Writes different binaries into various accessibility locations.
import time
from pathlib import Path
2020-06-29 23:07:16 -06:00
from . import RtaMetadata, common
2020-06-29 23:07:16 -06:00
2022-09-08 12:50:39 -04:00
metadata = RtaMetadata(
uuid="398933ec-f8d4-4d81-93ed-e7d7adcb9d97",
platforms=["windows"],
endpoint=[],
siem=[
{
"rule_id": "7405ddf1-6c8e-41ce-818f-48bea6bcaed8",
"rule_name": "Potential Modification of Accessibility Binaries",
},
{
"rule_id": "68921d85-d0dc-48b3-865f-43291ca2c4f2",
"rule_name": "Persistence via TelemetryController Scheduled Task Hijack",
},
],
techniques=["T1546", "T1053"],
)
2023-10-03 10:47:58 -04:00
@common.requires_os(*metadata.platforms)
2020-06-29 23:07:16 -06:00
def main():
# Prep
2022-09-08 12:50:39 -04:00
bins = [
"sethc.exe",
"utilman.exe",
"narrator.exe",
"magnify.exe",
"osk.exe",
"displayswitch.exe",
"atbroker.exe",
]
calc = Path("\\windows\\system32\\calc.exe").resolve()
temp = Path("temp.exe").resolve()
2020-06-29 23:07:16 -06:00
# loop over bins
for bin_name in bins:
bin_path = Path("\\Windows\\system32\\" + bin_name).resolve()
2020-06-29 23:07:16 -06:00
# Back up bin
common.copy_file(bin_path, temp)
# Change Permissions to allow modification
common.execute(["takeown", "/F", bin_path, "/A"])
common.execute(["icacls", bin_path, "/grant", "Administrators:F"])
# Copy Calc to overwrite binary, then run it
common.copy_file(calc, bin_path)
common.execute(bin_path, kill=True, timeout=1)
# Restore Original File and Permissions on file
common.copy_file(temp, bin_path)
common.execute(["icacls", bin_path, "/setowner", "NT SERVICE\\TrustedInstaller"])
common.execute(["icacls", bin_path, "/grant:r", "Administrators:RX"])
common.remove_file(temp)
# Cleanup
time.sleep(2)
common.execute(["taskkill", "/F", "/im", "calculator.exe"])
if __name__ == "__main__":
exit(main())