Skip to content

Commit

Permalink
Update T1569.002.yaml (#2869)
Browse files Browse the repository at this point in the history
Co-authored-by: Carrie Roberts <[email protected]>
  • Loading branch information
Pavanrpatil1306 and clr2of8 authored Jul 24, 2024
1 parent f1fd271 commit 7c1d934
Showing 1 changed file with 20 additions and 0 deletions.
20 changes: 20 additions & 0 deletions atomics/T1569.002/T1569.002.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -207,3 +207,23 @@ atomic_tests:
sc.exe sdset scmanager D:(A;;KA;;;WD)
name: command_prompt
elevation_required: true
- name: Pipe Creation - PsExec Tool Execution From Suspicious Locations
description: Requires PsExec tool installed. BlackCat Ransomeware tried to propagate by creating pipe using PsExec process executing from suspicious locations (In the particular case the legitimate PsExec executable is embedded within the Windows variant and is dropped in the victim’s %TEMP% directory). pon successful execution, PsExec will be executed from suspicious location and create a new pipe to execute CMD.
supported_platforms:
- windows
dependency_executor_name: powershell
dependencies:
- description: |
PsExec tool from Sysinternals must exist in the '\Users\Public\Temp\' directory
prereq_command: |
if (Get-ChildItem -Path C:\ -Include *psexec* -File -Recurse -ErrorAction SilentlyContinue) {exit 0} else {exit 1}
get_prereq_command: |
New-Item -Type Directory "C:\Users\Public\Temp\" -ErrorAction Ignore -Force | Out-Null
Invoke-WebRequest "https://download.sysinternals.com/files/PSTools.zip" -OutFile "C:\Users\Public\Temp\PSTools.zip"
Expand-Archive "C:\Users\Public\Temp\PsTools.zip" "C:\Users\Public\Temp\" -Force
executor:
command: |-
cd C:\Users\Public\Temp\
.\PsExec.exe -i -s cmd -accepteula
name: powershell
elevation_required: true

0 comments on commit 7c1d934

Please sign in to comment.