From 9f47e26f16c1644f21c0af2f73047d4cbef35db6 Mon Sep 17 00:00:00 2001 From: freddie Date: Sat, 21 Sep 2019 03:19:25 +0100 Subject: [PATCH 1/2] Adding At.exe, for submission to LOLbas list, with proof of malware using it in wild :O --- yml/OSBinaries/At.yml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 yml/OSBinaries/At.yml diff --git a/yml/OSBinaries/At.yml b/yml/OSBinaries/At.yml new file mode 100644 index 0000000..aa6e44b --- /dev/null +++ b/yml/OSBinaries/At.yml @@ -0,0 +1,31 @@ +--- +Name: At.exe +Description: Schedule periodic tasks +Author: 'Freddie Barr-Smith' +Created: '2019-09-20' +Commands: + - Command: C:\Windows\System32\at.exe at 09:00 /interactive /every:m,t,w,th,f,s,su C:\Windows\System32\revshell.exe + Description: Create a recurring task to execute every day at a specific time. Only available up to Windows 7. + Usecase: Create a recurring task, to eg. to keep reverse shell session(s) alive + Category: Execute + Privileges: Local Admin + MitreID: T1053 + MitreLink: https://attack.mitre.org/wiki/Technique/T1053 + OperatingSystem: Windows +Full_Path: + - Path: C:\WINDOWS\System32\At.exe + - Path: C:\WINDOWS\SysWOW64\At.exe +Detection: + - IOC: Scheduled task is created + - IOC: Windows event log - type 3 login + - IOC: C:\Windows\System32\Tasks\At1 (substitute 1 with subsequent number of at job) + - IOC: C:\Windows\Tasks\At1.job + - IOC: Registry Key Created: Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\At1. +Resources: + - Link: https://freddiebarrsmith.com/at.txt + - Link: https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html - Escalate to System from Administrator + - Link: https://www.secureworks.com/blog/where-you-at-indicators-of-lateral-movement-using-at-exe-on-windows-7-systems +Acknowledgement: + - Person: Freddie Barr-Smith, Riccardo Spolaor, Mariano Graziano, Xabier Ugarte-Pedrero +--- + From 8eb582de428b86b02419df5e49a3da8dd4a9e336 Mon Sep 17 00:00:00 2001 From: Oddvar Moe Date: Mon, 7 Oct 2019 23:51:26 +0200 Subject: [PATCH 2/2] Update At.yml --- yml/OSBinaries/At.yml | 16 +++++++++++----- 1 file changed, 11 insertions(+), 5 deletions(-) diff --git a/yml/OSBinaries/At.yml b/yml/OSBinaries/At.yml index aa6e44b..fa3d443 100644 --- a/yml/OSBinaries/At.yml +++ b/yml/OSBinaries/At.yml @@ -5,13 +5,13 @@ Author: 'Freddie Barr-Smith' Created: '2019-09-20' Commands: - Command: C:\Windows\System32\at.exe at 09:00 /interactive /every:m,t,w,th,f,s,su C:\Windows\System32\revshell.exe - Description: Create a recurring task to execute every day at a specific time. Only available up to Windows 7. + Description: Create a recurring task to execute every day at a specific time. Usecase: Create a recurring task, to eg. to keep reverse shell session(s) alive Category: Execute Privileges: Local Admin MitreID: T1053 MitreLink: https://attack.mitre.org/wiki/Technique/T1053 - OperatingSystem: Windows + OperatingSystem: Windows 7 or older Full_Path: - Path: C:\WINDOWS\System32\At.exe - Path: C:\WINDOWS\SysWOW64\At.exe @@ -20,12 +20,18 @@ Detection: - IOC: Windows event log - type 3 login - IOC: C:\Windows\System32\Tasks\At1 (substitute 1 with subsequent number of at job) - IOC: C:\Windows\Tasks\At1.job - - IOC: Registry Key Created: Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\At1. + - IOC: Registry Key - Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\At1. Resources: - Link: https://freddiebarrsmith.com/at.txt - Link: https://sushant747.gitbooks.io/total-oscp-guide/privilege_escalation_windows.html - Escalate to System from Administrator - Link: https://www.secureworks.com/blog/where-you-at-indicators-of-lateral-movement-using-at-exe-on-windows-7-systems Acknowledgement: - - Person: Freddie Barr-Smith, Riccardo Spolaor, Mariano Graziano, Xabier Ugarte-Pedrero + - Person: 'Freddie Barr-Smith' + Handle: + - Person: 'Riccardo Spolaor' + Handle: + - Person: 'Mariano Graziano' + Handle: + - Person: 'Xabier Ugarte-Pedrero' + Handle: --- -