This Windows binary can download and save a file to an Alternate Data Stream (ADS). This downloads a powersploit tool
that will get computer details. One variant uses ADS.
PneumaEX is an extended version of the open-source agent which accompanies the Prelude platform. This procedure downloads the agent to disk
and starts it in the background.
Expand is a binary that expands one or more compressed files. It can be used to copy files from a webdav share to a local
system into plain files or ADSs.
Extract32 allows users to uncompress one or more compressed .CAB cabinet files. This ability uses the binary to copy local
and remote files or cabinets to the local system.
Makecab allows us to package existing files into a cabinet (.cab) file. This ability uses the binary to copy local and
remote files or cabinets to the local system.
Ngrok is a reverse proxy tool that provides secure tunnels over the Internet. Adversaries may use ngrok to tunnel traffic to their command and control servers. It's important to monitor for the presence of ngrok, as it may be used to bypass network security controls. This chain requires an ngrok account. The ngrok.token fact must be set to your ngrok token available in the ngrok dashboard. Warning: This TTP will expose the host to the Internet.
Mimikatz is usually regarded as a credential dumper but there are other use-cases. Here, the tool is used to
Pass-the-Hash, leveraging the SC service to copy the agent to another computer in the domain. Passing the hash allows
the agent to conduct the copy command without knowing the password but instead uses a password hash to "pass" the
authentication along.
WMIC is the abbreviation of Windows Management Interface Command, is a simple command prompt tool that returns
information about the system you are running it on. Here we start a WMIC process to copy the agent to another
domain computer, dropping it into the temp directory.
Remote Desktop Protocol is a proprietary protocol developed by Microsoft which provides a user with a graphical
interface to connect to another computer over a network connection. This procedure leverages RDP to execute a command
on a remote computer.
Most Windows computers have a temp directory available as a network share. If accessible internally, this drive can be
used to copy malicious files across the network. The start command can be used to initiate a new terminal command
prompt to execute this action concurrently.
Pass-the-ticket attack is a well-known method of impersonating users on an AD domain. AD typically uses Kerberos to provides single sign-on and SSO.
If we have access to Kerberos tickets in the form of a .kirbi file, we will be able to import it using Rubeus. This TTP will import tickets exported by Mimikatz.