We're releasing the third instalment of our Conti ransomware theme with new TTPs focused on Windows service exploitation. To date, our Conti theme now contains the following kill-chains:
Conti is considered Ransomware-as-a-Service (RaaS) and has an elaborate chain of events from initial access to execution of the ransomware. For this week, we are focusing on privilege escalation and persistence techniques leaked in the Conti affiliate manual. This chain starts with information gathered from last week’s chain, specifically the AD domain name and Domain Controller hostnames, and proceeds to attain local and domain admin credentials via two exploits and a dcsync attack. The first exploit in the chain is PrintNightmare for escalation to a local Administrator. This technique, when successful, will create a new local admin account for use in subsequent chains. Next is ZeroLogon, which allows an unauthenticated user to set the machine account password on a Windows Domain Controller. From there, we leverage the new DC credentials to execute a dcsync attack via mimkatz and obtain the DC’s krbtgt NTLM hash. With this hash we’re now positioned to create golden tickets granting ourselves unrestricted access to the domain.
Watch a demonstration: Conti Privilege Escalation & Persistence
Thanks for reading our latest TTP Tuesday release! Please subscribe and reach out with any feedback. We love to hear from our community!
There are several ways to follow us and learn more about Prelude and our team members:
Download Prelude Operator: https://www.prelude.org/download/current
See the latest kill chain and TTP Releases: https://chains.prelude.org/
See our open-source repositories: https://github.com/preludeorg
Discord: https://discord.gg/gzUv4XNquu
Reddit: https://www.reddit.com/r/preludeorg/
Twitter: https://twitter.com/preludeorg
Listen to our Podcast: https://anchor.fm/preludeorg
Read our blog: https://feed.prelude.org
Watch our live streams: https://www.twitch.tv/preludeorg
Watch our pre-recorded content: https://www.youtube.com/c/preludeorg
David: privateducky
Alex: khyberspache
Kris: Xanthonus
Octavia: VVX7
Sam: wasupwithuman