SlideShare a Scribd company logo
1 of 61
Download to read offline
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Getting Bear-y Cozy with
PowerShell
Defensive Lessons Learned from Emulating the Dukes
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
®
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Introductions
▪ Jamie Williams ( @jamieantisocial)
▪ Cyber adversarial engineer
▪ Adversary emulation + behavior detection research
▪ Mike Hartley ( )
▪ Cybersecurity engineer
▪ Adversary emulation + adversary technique research
▪ ATT&CK & ATT&CK Evaluations ( @MITREattack)
| 2 |
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Agenda
▪ATT&CK & ATT&CK Accessories
▪¿Por qué PowerShell? &
▪Emulating & ++
▪Parting-gifts
| 3 |
https://emojipedia.org
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
| 4 |
https://www.1001fonts.com/beyond-wonderland-font.html
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Knowledge base of adversary behaviors
Threat-informed defense
Based on real-world observations
References to publicly reported intelligence
Free, open, and globally accessible
attack.mitre.org
Community contribution driven
attack@mitre.org
| 5 |
https://www.1001fonts.com/beyond-wonderland-font.html
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
Drive-by Compromise Scheduled Task Binary Padding Network Sniffing AppleScript Audio Capture Commonly Used Port Automated Exfiltration Data Destruction
Exploit Public-Facing
Application
Launchctl Access Token Manipulation Account Manipulation Account Discovery Application Deployment
Software
Automated Collection Communication Through
RemovableMedia
Data Compressed Data Encrypted for Impact
Local Job Scheduling Bypass User Account Control Bash History Application Window
Discovery
Clipboard Data Data Encrypted Defacement
External Remote Services LSASS Driver Extra Window Memory Injection BruteForce Distributed Component
Object Model
Data from Information
Repositories
Connection Proxy Data Transfer Size Limits Disk Content Wipe
HardwareAdditions Trap Process Injection Credential Dumping Browser Bookmark
Discovery
Custom Command and
Control Protocol
Exfiltration Over Other
Network Medium
Disk StructureWipe
Replication Through
RemovableMedia
AppleScript DLL Search Order Hijacking Credentials in Files Exploitation of
RemoteServices
Data from Local System Endpoint Denial of Service
CMSTP ImageFileExecution Options Injection Credentials in Registry Domain Trust Discovery Data from Network
Shared Drive
Custom Cryptographic
Protocol
Exfiltration Over Command
and Control Channel
FirmwareCorruption
Spearphishing Attachment Command-LineInterface Plist Modification Exploitation for
Credential Access
Fileand Directory Discovery Logon Scripts Inhibit System Recovery
Spearphishing Link Compiled HTML File Valid Accounts Network ServiceScanning Pass theHash Data from RemovableMedia Data Encoding Exfiltration Over Alternative
Protocol
Network Denial of Service
Spearphishing via Service Control Panel Items Accessibility Features BITS Jobs Forced Authentication Network ShareDiscovery Pass theTicket Data Staged Data Obfuscation ResourceHijacking
Supply Chain Compromise Dynamic Data Exchange AppCert DLLs Clear Command History Hooking Password Policy Discovery RemoteDesktop Protocol Email Collection Domain Fronting Exfiltration Over
Physical Medium
RuntimeData Manipulation
Trusted Relationship Execution through API AppInit DLLs CMSTP Input Capture Peripheral DeviceDiscovery RemoteFileCopy Input Capture Domain Generation
Algorithms
ServiceStop
Valid Accounts Execution through
ModuleLoad
Application Shimming CodeSigning Input Prompt Permission Groups Discovery RemoteServices Man in theBrowser Scheduled Transfer Stored Data Manipulation
Dylib Hijacking Compiled HTML File Kerberoasting Process Discovery Replication Through
RemovableMedia
Screen Capture Fallback Channels Transmitted Data
ManipulationExploitation for
Client Execution
FileSystem Permissions Weakness Component Firmware Keychain Query Registry Video Capture Multiband Communication
Hooking Component Object Model
Hijacking
LLMNR/NBT-NS Poisoning
and Relay
RemoteSystem Discovery Shared Webroot Multi-hop Proxy
Graphical User Interface Launch Daemon Security SoftwareDiscovery SSH Hijacking Multilayer Encryption
InstallUtil New Service Control Panel Items Password Filter DLL System Information
Discovery
Taint Shared Content Multi-StageChannels
Mshta Path Interception DCShadow PrivateKeys Third-party Software Port Knocking
PowerShell Port Monitors Deobfuscate/Decode Files
or Information
Securityd Memory System Network
Configuration Discovery
Windows Admin Shares RemoteAccess Tools
Regsvcs/Regasm ServiceRegistry PermissionsWeakness Two-Factor Authentication
Interception
Windows Remote
Management
RemoteFileCopy
Regsvr32 Setuid and Setgid Disabling Security Tools System Network
Connections Discovery
Standard Application Layer
ProtocolRundll32 Startup Items DLL Side-Loading
Scripting Web Shell Execution Guardrails System Owner/User
Discovery
Standard Cryptographic
ProtocolServiceExecution .bash_profile and .bashrc Exploitation for
PrivilegeEscalation
Exploitation for
Defense EvasionSigned Binary
Proxy Execution
Account Manipulation System ServiceDiscovery Standard Non-Application
Layer ProtocolAuthentication Package SID-History Injection FileDeletion System TimeDiscovery
Signed Script
Proxy Execution
BITS Jobs Sudo FilePermissions
Modification
Virtualization/Sandbox
Evasion
Uncommonly Used Port
Bootkit Sudo Caching Web Service
Source Browser Extensions FileSystem Logical Offsets
Spaceafter Filename ChangeDefault
FileAssociation
Gatekeeper Bypass
Third-party Software Group Policy Modification
Trusted Developer Utilities Component Firmware Hidden Files and Directories
User Execution Component Object
Model Hijacking
Hidden Users
Windows Management
Instrumentation
Hidden Window
CreateAccount HISTCONTROL
Windows Remote
Management
External RemoteServices Indicator Blocking
Hidden Files and Directories Indicator Removal
from ToolsXSL Script Processing Hypervisor
Kernel Modules
and Extensions
Indicator Removal on Host
Indirect Command Execution
Launch Agent Install Root Certificate
LC_LOAD_DYLIB Addition InstallUtil
Login Item Launchctl
Logon Scripts LC_MAIN Hijacking
Modify Existing Service Masquerading
Netsh Helper DLL Modify Registry
Office Application Startup Mshta
Port Knocking Network ShareConnection
RemovalRc.common
Redundant Access NTFS FileAttributes
Registry Run
Keys / Startup Folder
Obfuscated Files
or Information
Re-opened Applications Port Knocking
Screensaver Process Doppelgänging
Security Support Provider Process Hollowing
Shortcut Modification Redundant Access
SIP and Trust Provider
Hijacking
Regsvcs/Regasm
Regsvr32
System Firmware Rootkit
Systemd Service Rundll32
TimeProviders Scripting
Windows Management
Instrumentation Event
Subscription
Signed Binary
Proxy Execution
Signed Script
Proxy ExecutionWinlogon Helper DLL
SIP and Trust Provider
Hijacking
SoftwarePacking
Spaceafter Filename
TemplateInjection
Timestomp
Trusted Developer Utilities
Virtualization/Sandbox
Evasion
Web Service
XSL Script Processing
| 6 |
ATT&CK Structure
Tactics: the adversary’s technical goals
…
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
Drive-by Compromise Scheduled Task Binary Padding Network Sniffing AppleScript Audio Capture Commonly Used Port Automated Exfiltration Data Destruction
Exploit Public-Facing
Application
Launchctl Access Token Manipulation Account Manipulation Account Discovery Application Deployment
Software
Automated Collection Communication Through
RemovableMedia
Data Compressed Data Encrypted for Impact
Local Job Scheduling Bypass User Account Control Bash History Application Window
Discovery
Clipboard Data Data Encrypted Defacement
External Remote Services LSASS Driver Extra Window Memory Injection BruteForce Distributed Component
Object Model
Data from Information
Repositories
Connection Proxy Data Transfer Size Limits Disk Content Wipe
HardwareAdditions Trap Process Injection Credential Dumping Browser Bookmark
Discovery
Custom Command and
Control Protocol
Exfiltration Over Other
Network Medium
Disk StructureWipe
Replication Through
RemovableMedia
AppleScript DLL Search Order Hijacking Credentials in Files Exploitation of
RemoteServices
Data from Local System Endpoint Denial of Service
CMSTP ImageFileExecution Options Injection Credentials in Registry Domain Trust Discovery Data from Network
Shared Drive
Custom Cryptographic
Protocol
Exfiltration Over Command
and Control Channel
FirmwareCorruption
Spearphishing Attachment Command-LineInterface Plist Modification Exploitation for
Credential Access
Fileand Directory Discovery Logon Scripts Inhibit System Recovery
Spearphishing Link Compiled HTML File Valid Accounts Network ServiceScanning Pass theHash Data from RemovableMedia Data Encoding Exfiltration Over Alternative
Protocol
Network Denial of Service
Spearphishing via Service Control Panel Items Accessibility Features BITS Jobs Forced Authentication Network ShareDiscovery Pass theTicket Data Staged Data Obfuscation ResourceHijacking
Supply Chain Compromise Dynamic Data Exchange AppCert DLLs Clear Command History Hooking Password Policy Discovery RemoteDesktop Protocol Email Collection Domain Fronting Exfiltration Over
Physical Medium
RuntimeData Manipulation
Trusted Relationship Execution through API AppInit DLLs CMSTP Input Capture Peripheral DeviceDiscovery RemoteFileCopy Input Capture Domain Generation
Algorithms
ServiceStop
Valid Accounts Execution through
ModuleLoad
Application Shimming CodeSigning Input Prompt Permission Groups Discovery RemoteServices Man in theBrowser Scheduled Transfer Stored Data Manipulation
Dylib Hijacking Compiled HTML File Kerberoasting Process Discovery Replication Through
RemovableMedia
Screen Capture Fallback Channels Transmitted Data
ManipulationExploitation for
Client Execution
FileSystem Permissions Weakness Component Firmware Keychain Query Registry Video Capture Multiband Communication
Hooking Component Object Model
Hijacking
LLMNR/NBT-NS Poisoning
and Relay
RemoteSystem Discovery Shared Webroot Multi-hop Proxy
Graphical User Interface Launch Daemon Security SoftwareDiscovery SSH Hijacking Multilayer Encryption
InstallUtil New Service Control Panel Items Password Filter DLL System Information
Discovery
Taint Shared Content Multi-StageChannels
Mshta Path Interception DCShadow PrivateKeys Third-party Software Port Knocking
PowerShell Port Monitors Deobfuscate/Decode Files
or Information
Securityd Memory System Network
Configuration Discovery
Windows Admin Shares RemoteAccess Tools
Regsvcs/Regasm ServiceRegistry PermissionsWeakness Two-Factor Authentication
Interception
Windows Remote
Management
RemoteFileCopy
Regsvr32 Setuid and Setgid Disabling Security Tools System Network
Connections Discovery
Standard Application Layer
ProtocolRundll32 Startup Items DLL Side-Loading
Scripting Web Shell Execution Guardrails System Owner/User
Discovery
Standard Cryptographic
ProtocolServiceExecution .bash_profile and .bashrc Exploitation for
PrivilegeEscalation
Exploitation for
Defense EvasionSigned Binary
Proxy Execution
Account Manipulation System ServiceDiscovery Standard Non-Application
Layer ProtocolAuthentication Package SID-History Injection FileDeletion System TimeDiscovery
Signed Script
Proxy Execution
BITS Jobs Sudo FilePermissions
Modification
Virtualization/Sandbox
Evasion
Uncommonly Used Port
Bootkit Sudo Caching Web Service
Source Browser Extensions FileSystem Logical Offsets
Spaceafter Filename ChangeDefault
FileAssociation
Gatekeeper Bypass
Third-party Software Group Policy Modification
Trusted Developer Utilities Component Firmware Hidden Files and Directories
User Execution Component Object
Model Hijacking
Hidden Users
Windows Management
Instrumentation
Hidden Window
CreateAccount HISTCONTROL
Windows Remote
Management
External RemoteServices Indicator Blocking
Hidden Files and Directories Indicator Removal
from ToolsXSL Script Processing Hypervisor
Kernel Modules
and Extensions
Indicator Removal on Host
Indirect Command Execution
Launch Agent Install Root Certificate
LC_LOAD_DYLIB Addition InstallUtil
Login Item Launchctl
Logon Scripts LC_MAIN Hijacking
Modify Existing Service Masquerading
Netsh Helper DLL Modify Registry
Office Application Startup Mshta
Port Knocking Network ShareConnection
RemovalRc.common
Redundant Access NTFS FileAttributes
Registry Run
Keys / Startup Folder
Obfuscated Files
or Information
Re-opened Applications Port Knocking
Screensaver Process Doppelgänging
Security Support Provider Process Hollowing
Shortcut Modification Redundant Access
SIP and Trust Provider
Hijacking
Regsvcs/Regasm
Regsvr32
System Firmware Rootkit
Systemd Service Rundll32
TimeProviders Scripting
Windows Management
Instrumentation Event
Subscription
Signed Binary
Proxy Execution
Signed Script
Proxy ExecutionWinlogon Helper DLL
SIP and Trust Provider
Hijacking
SoftwarePacking
Spaceafter Filename
TemplateInjection
Timestomp
Trusted Developer Utilities
Virtualization/Sandbox
Evasion
Web Service
XSL Script Processing
| 7 |
ATT&CK Structure
Tactics: the adversary’s technical goals
…
Techniques: how the goals are achieved
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
Drive-by Compromise Scheduled Task Binary Padding Network Sniffing AppleScript Audio Capture Commonly Used Port Automated Exfiltration Data Destruction
Exploit Public-Facing
Application
Launchctl Access Token Manipulation Account Manipulation Account Discovery Application Deployment
Software
Automated Collection Communication Through
RemovableMedia
Data Compressed Data Encrypted for Impact
Local Job Scheduling Bypass User Account Control Bash History Application Window
Discovery
Clipboard Data Data Encrypted Defacement
External Remote Services LSASS Driver Extra Window Memory Injection BruteForce Distributed Component
Object Model
Data from Information
Repositories
Connection Proxy Data Transfer Size Limits Disk Content Wipe
HardwareAdditions Trap Process Injection Credential Dumping Browser Bookmark
Discovery
Custom Command and
Control Protocol
Exfiltration Over Other
Network Medium
Disk StructureWipe
Replication Through
RemovableMedia
AppleScript DLL Search Order Hijacking Credentials in Files Exploitation of
RemoteServices
Data from Local System Endpoint Denial of Service
CMSTP ImageFileExecution Options Injection Credentials in Registry Domain Trust Discovery Data from Network
Shared Drive
Custom Cryptographic
Protocol
Exfiltration Over Command
and Control Channel
FirmwareCorruption
Spearphishing Attachment Command-LineInterface Plist Modification Exploitation for
Credential Access
Fileand Directory Discovery Logon Scripts Inhibit System Recovery
Spearphishing Link Compiled HTML File Valid Accounts Network ServiceScanning Pass theHash Data from RemovableMedia Data Encoding Exfiltration Over Alternative
Protocol
Network Denial of Service
Spearphishing via Service Control Panel Items Accessibility Features BITS Jobs Forced Authentication Network ShareDiscovery Pass theTicket Data Staged Data Obfuscation ResourceHijacking
Supply Chain Compromise Dynamic Data Exchange AppCert DLLs Clear Command History Hooking Password Policy Discovery RemoteDesktop Protocol Email Collection Domain Fronting Exfiltration Over
Physical Medium
RuntimeData Manipulation
Trusted Relationship Execution through API AppInit DLLs CMSTP Input Capture Peripheral DeviceDiscovery RemoteFileCopy Input Capture Domain Generation
Algorithms
ServiceStop
Valid Accounts Execution through
ModuleLoad
Application Shimming CodeSigning Input Prompt Permission Groups Discovery RemoteServices Man in theBrowser Scheduled Transfer Stored Data Manipulation
Dylib Hijacking Compiled HTML File Kerberoasting Process Discovery Replication Through
RemovableMedia
Screen Capture Fallback Channels Transmitted Data
ManipulationExploitation for
Client Execution
FileSystem Permissions Weakness Component Firmware Keychain Query Registry Video Capture Multiband Communication
Hooking Component Object Model
Hijacking
LLMNR/NBT-NS Poisoning
and Relay
RemoteSystem Discovery Shared Webroot Multi-hop Proxy
Graphical User Interface Launch Daemon Security SoftwareDiscovery SSH Hijacking Multilayer Encryption
InstallUtil New Service Control Panel Items Password Filter DLL System Information
Discovery
Taint Shared Content Multi-StageChannels
Mshta Path Interception DCShadow PrivateKeys Third-party Software Port Knocking
PowerShell Port Monitors Deobfuscate/Decode Files
or Information
Securityd Memory System Network
Configuration Discovery
Windows Admin Shares RemoteAccess Tools
Regsvcs/Regasm ServiceRegistry PermissionsWeakness Two-Factor Authentication
Interception
Windows Remote
Management
RemoteFileCopy
Regsvr32 Setuid and Setgid Disabling Security Tools System Network
Connections Discovery
Standard Application Layer
ProtocolRundll32 Startup Items DLL Side-Loading
Scripting Web Shell Execution Guardrails System Owner/User
Discovery
Standard Cryptographic
ProtocolServiceExecution .bash_profile and .bashrc Exploitation for
PrivilegeEscalation
Exploitation for
Defense EvasionSigned Binary
Proxy Execution
Account Manipulation System ServiceDiscovery Standard Non-Application
Layer ProtocolAuthentication Package SID-History Injection FileDeletion System TimeDiscovery
Signed Script
Proxy Execution
BITS Jobs Sudo FilePermissions
Modification
Virtualization/Sandbox
Evasion
Uncommonly Used Port
Bootkit Sudo Caching Web Service
Source Browser Extensions FileSystem Logical Offsets
Spaceafter Filename ChangeDefault
FileAssociation
Gatekeeper Bypass
Third-party Software Group Policy Modification
Trusted Developer Utilities Component Firmware Hidden Files and Directories
User Execution Component Object
Model Hijacking
Hidden Users
Windows Management
Instrumentation
Hidden Window
CreateAccount HISTCONTROL
Windows Remote
Management
External RemoteServices Indicator Blocking
Hidden Files and Directories Indicator Removal
from ToolsXSL Script Processing Hypervisor
Kernel Modules
and Extensions
Indicator Removal on Host
Indirect Command Execution
Launch Agent Install Root Certificate
LC_LOAD_DYLIB Addition InstallUtil
Login Item Launchctl
Logon Scripts LC_MAIN Hijacking
Modify Existing Service Masquerading
Netsh Helper DLL Modify Registry
Office Application Startup Mshta
Port Knocking Network ShareConnection
RemovalRc.common
Redundant Access NTFS FileAttributes
Registry Run
Keys / Startup Folder
Obfuscated Files
or Information
Re-opened Applications Port Knocking
Screensaver Process Doppelgänging
Security Support Provider Process Hollowing
Shortcut Modification Redundant Access
SIP and Trust Provider
Hijacking
Regsvcs/Regasm
Regsvr32
System Firmware Rootkit
Systemd Service Rundll32
TimeProviders Scripting
Windows Management
Instrumentation Event
Subscription
Signed Binary
Proxy Execution
Signed Script
Proxy ExecutionWinlogon Helper DLL
SIP and Trust Provider
Hijacking
SoftwarePacking
Spaceafter Filename
TemplateInjection
Timestomp
Trusted Developer Utilities
Virtualization/Sandbox
Evasion
Web Service
XSL Script Processing
| 8 |
ATT&CK Structure
Tactics: the adversary’s technical goals
Procedure Examples:
how adversaries have performed techniques
…
Techniques: how the goals are achieved
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
| 9 |
Sub-Techniques (BETA)
Initial
Access
Execution Persistence
Privilege
Escalation
Defense Evasion
Credential
Access
Discovery
Lateral
Movement
Collection Exfiltration Impact
Command
and Control
Same Tactics
Same Procedures
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
| 10 |
Sub-Techniques (BETA)
Initial
Access
Execution Persistence
Privilege
Escalation
Defense Evasion
Credential
Access
Discovery
Lateral
Movement
Collection Exfiltration Impact
Command
and Control
More Techniques!
Same Tactics
Same Procedures
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
ATT&CK Evaluations Background
▪ Collaboration with product
vendors to evaluate
detection capabilities
▪ Goals are to improve products
while sharing how they detect
adversary behaviors
▪ No scores or rankings
| 11 |
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Again, I Said No Scores…
| 12 |
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Again, I Said No Scores…
| 13 |
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Why Adversary Emulation?
▪ Impractical to test all techniques (and all variations)
▪ Using intelligence provides scoping and structure
▪ More practical results and lessons learned
| 14 |
https://i.redd.it/2xoht8joghiz.png
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
- Research, Research Research!
How We Leverage ATT&CK (1,2,3)
| 15 |
Step 1
Cited Public Threat Intelligence
attack.mitre.org http://clipart-library.com/magnifying-glass-cliparts.html
fireeye.com/blog/threat-research/2018/11/not-so-cozy-
an-uncomfortable-examination-of-a-suspected-apt29-
phishing-campaign.html
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
- Research, Research Research!
How We Leverage ATT&CK (1,2,3)
| 16 |
Step 1
Cited Public Threat Intelligence
attack.mitre.org http://clipart-library.com/magnifying-glass-cliparts.html
fireeye.com/blog/threat-research/2018/11/not-so-cozy-
an-uncomfortable-examination-of-a-suspected-apt29-
phishing-campaign.html
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
- Create a Plan and Execute It
How We Leverage ATT&CK (1,2,3)
| 17 |
Step 2
http://clipart-library.com/magnifying-glass-cliparts.html
fireeye.com/blog/threat-research/2018/11/not-so-cozy-
an-uncomfortable-examination-of-a-suspected-apt29-
phishing-campaign.html
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
How We Leverage ATT&CK (1,2,3)
| 18 |
Step 3
attackevals.mitre.org
- Publish Results
http://clipart-library.com/magnifying-glass-cliparts.html
fireeye.com/blog/threat-research/2018/11/not-so-cozy-
an-uncomfortable-examination-of-a-suspected-apt29-
phishing-campaign.html
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
https://www.clipartmax.com/png/middle/450-4504742_horn-clipart-free-daily-
devil-horns-transparent-background.png &
https://www.clipartmax.com/so/devil-tail-clipart/
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Why Detecting PowerShell is Crucial
▪ PowerShell is native to supported Windows system
▪ Frequent legitimate usage by sysadmins
▪ In-memory execution (avoid binaries on disk)
▪ Provides access to .NET and Win32 APIs
Adversaries abuse PowerShell
| 20 |
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Top ATT&CK Technique Reports
| 21 |
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Top ATT&CK Technique Reports
| 22 |
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Example Adversary Usage
| 23 |
1. Obfuscation
2. Download &
Execute
3. Remote
Execution
4. Win32 API
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Example Adversary Usage
| 24 |
1. Obfuscation
2. Download &
Execute
3. Remote
Execution
4. Win32 API
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Example Adversary Usage
| 25 |
1. Obfuscation
2. Download &
Execute
3. Remote
Execution
4. Win32 API
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Example Adversary Usage
| 26 |
1. Obfuscation
2. Download &
Execute
3. Remote
Execution
4. Win32 API
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Example Adversary Usage
| 27 |
1. Obfuscation
2. Download &
Execute
3. Remote
Execution
4. Win32 API
Open Source Frameworks:
Empire, PoshC2,
PowerSploit
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Why APT29?
| 28 |
▪ APT29 (Cozy Bear, The Dukes, YYTRIUM)
▪ Attributed to the Russian government
▪ Active since at least 2008
▪ Compromise of DNC
▪ Commitment to stealth
▪ Sophisticated implementations of techniques via
arsenal of custom malware
▪ Has made liberal use of PowerShell
in their custom malware
https://ageofrevolution.org/wellingtons-places-stratfield-saye/8-1st-duke-portrait-by-phillips-1/&
http://www.shirleyreade.com/Gallery/wildlife/efrum.htm
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
https://giphy.com/gifs/nfl-football-miami-dolphins-l0HlNOtch2D0XOXxS
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
PowerShell Visibility
In response to adversary abuse, Microsoft helped make
PowerShell one of the most security-transparent
shells available
▪ Process monitoring
▪ PowerShell logging
▪ Event Tracing for Windows (ETW)
But will it scale…?
| 30 |
https://www.stockio.com/free-clipart/powershell-icon &
https://giphy.com/gifs/tex-avery-3HEzHIxZjKduE
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Process Monitoring
▪ Process monitoring may catch PowerShell execution
▪ Command line arguments
▪ Parent process
| 31 |
▪ Event 4688 and Sysmon ID 1
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
PowerShell Logs: Module Logs
▪ Contains pipeline execution details
▪ Variable initialization
▪ Command invocation
▪ Script portions
▪ Some de-obfuscated code
| 32 |
https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/powershell-logging-appendix-a.pdf
▪ Written to Event 4103
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
PowerShell Logs: Script Block Logs
▪ Captures blocks of code as executed by the PowerShell engine
▪ Captures full script and/or command content
▪ Records deobfuscated code
▪ Does not record output
| 33 |
https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/powershell-logging-appendix-b.pdf
▪ Written to Event 4104
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
PowerShell Logs: Transcription Logs
▪ Create a record of every PowerShell session
▪ Records input and output
▪ Written to text files in Documents (configurable)
| 34 |
https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/powershell-logging-appendix-c.pdf
▪ Best practice
▪ Write to a remote write-only
network share
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Event Tracing for Windows (ETW)
▪ Tracing facility for logging kernel or application-defined events
▪ Can consume in real time or from a log file
▪ Originally intended for application debugging
| 35 |
▪ ETW Provider
▪ Microsoft-Windows-PowerShell
▪ Contains some added context
▪ Additional providers can help gain
further context and insight
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Can It Scale?
▪ This is a lot of data to process, not feasible for human review
▪ How do you find APT29 in this sea of data?
| 36 |
https://giphy.com/gifs/mtv-ridiculousness-rob-dyrdek-kgoIBso63Pu6Y
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
https://www.nps.gov/subjects/bears/types-of-bears.htm &
https://depositphotos.com/200869380/stock-illustration-paw-footprints-mosaic-of-binary.html &
https://encrypted-tbn0.gstatic.com/images?q=tbn%3AANd9GcRUAXZBbHk1IPc-
Xryutu0BQ9xPldk0XS3GkNniU0SAv0vVbqw0&usqp=CAU
Cozy
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Emulate to Defend
| 38 |
https://giphy.com/gifs/1fih1TYYBONo0Dkdmx
▪ Stealthy tradecraft,
perhaps ahead of their
time
▪ Implied understanding of
how detection
technologies work (and
how to bypass them)
▪ A lot of learning and
custom development to
deliver “real feel”
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Detection Challenge #1 –
Living Off the Land
| 39 |
Trusted
ProcessTrusted
Process
Unknown
Trusted
Process
Unknown Trusted
Process
Untrusted
Process
Trusted
Process
Trusted
Process
Trusted
Process Unknown
Trusted
Process
Untrusted
Process
Trusted
Process
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Detection Challenge #1 –
Living Off the Land
| 40 |
Trusted
ProcessTrusted
Process
Unknown
Trusted
Process
Unknown Trusted
Process
Untrusted
Process
Trusted
Process
Trusted
Process
Trusted
Process Unknown
Trusted
Process
Untrusted
Process
Trusted
Process
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Get-Process
Detection Challenge #2 –
Large Custom Scripts
| 41 |
Trusted
Process
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
$TOKEN_OWNER = struct $ModuleBuilder TOKEN_OWNER
@{Owner = field 0 IntPtr}
$TokenPtrSize = 0
$TokenInformationClass = 'TokenOwner'
$hProcess = OpenProcess -ProcessId $PID -DesiredAccess
PROCESS_QUERY_LIMITED_INFORMATION
$hToken = OpenProcessToken -ProcessHandle $hProcess -DesiredAccess
TOKEN_QUERY
$Success = $Advapi32::GetTokenInformation($hToken,
$TOKEN_INFORMATION_CLASS::$TokenInformationClass, 0, $TokenPtrSize,
[ref]$TokenPtrSize)
[IntPtr]$TokenPtr =
[System.Runtime.InteropServices.Marshal]::AllocHGlobal($TokenPtrSize)
$Success = $Advapi32::GetTokenInformation($hToken,
$TOKEN_INFORMATION_CLASS::$TokenInformationClass, $TokenPtr,
$TokenPtrSize, [ref]$TokenPtrSize); $LastError =
[Runtime.InteropServices.Marshal]::GetLastWin32Error()
if($Success) {
$TokenOwner = $TokenPtr -as $TOKEN_OWNER
if($TokenOwner.Owner -ne $null) {
$OwnerSid = ConvertSidToStringSid -SidPointer $TokenOwner.Owner
$Sid = New-Object System.Security.Principal.SecurityIdentifier($OwnerSid)
$OwnerName = $Sid.Translate([System.Security.Principal.NTAccount])
$obj = New-Object -TypeName psobject
$obj | Add-Member -MemberType NoteProperty -Name Sid -Value $OwnerSid
$obj | Add-Member -MemberType NoteProperty -Name -Value $OwnerName
Write-Output $obj
}
else {
Write-Output "Fail"
}
[System.Runtime.InteropServices.Marshal]::FreeHGlobal($TokenPtr)
}
else {
Write-Debug "[GetTokenInformation] Error: $(([ComponentModel.Win32Exception]
$LastError).Message)“
…
Detection Challenge #2 –
Large Custom Scripts
| 42 |
Trusted
Process
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.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…
$TOKEN_OWNER = struct $ModuleBuilder TOKEN_OWNER
@{Owner = field 0 IntPtr}
$TokenPtrSize = 0
$TokenInformationClass = 'TokenOwner'
$hProcess = OpenProcess -ProcessId $PID -DesiredAccess
PROCESS_QUERY_LIMITED_INFORMATION
$hToken = OpenProcessToken -ProcessHandle $hProcess -DesiredAccess
TOKEN_QUERY
$Success = $Advapi32::GetTokenInformation($hToken,
$TOKEN_INFORMATION_CLASS::$TokenInformationClass, 0, $TokenPtrSize,
[ref]$TokenPtrSize)
[IntPtr]$TokenPtr =
[System.Runtime.InteropServices.Marshal]::AllocHGlobal($TokenPtrSize)
$Success = $Advapi32::GetTokenInformation($hToken,
$TOKEN_INFORMATION_CLASS::$TokenInformationClass, $TokenPtr,
$TokenPtrSize, [ref]$TokenPtrSize); $LastError =
[Runtime.InteropServices.Marshal]::GetLastWin32Error()
if($Success) {
$TokenOwner = $TokenPtr -as $TOKEN_OWNER
if($TokenOwner.Owner -ne $null) {
$OwnerSid = ConvertSidToStringSid -SidPointer $TokenOwner.Owner
$Sid = New-Object System.Security.Principal.SecurityIdentifier($OwnerSid)
$OwnerName = $Sid.Translate([System.Security.Principal.NTAccount])
$obj = New-Object -TypeName psobject
$obj | Add-Member -MemberType NoteProperty -Name Sid -Value $OwnerSid
$obj | Add-Member -MemberType NoteProperty -Name -Value $OwnerName
Write-Output $obj
}
else {
Write-Output "Fail"
}
[System.Runtime.InteropServices.Marshal]::FreeHGlobal($TokenPtr)
}
else {
Write-Debug "[GetTokenInformation] Error: $(([ComponentModel.Win32Exception]
$LastError).Message)“
…
Detection Challenge #3 – Obfuscation
| 43 |
Trusted
Process
https://www.kaspersky.com/blog/no-monkeys-for-cozyduke/8543/
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.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…
Detection Challenge #3 – Obfuscation
| 44 |
Trusted
Process
https://www.kaspersky.com/blog/no-monkeys-for-cozyduke/8543/
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Detection Challenge #4 –
Breaking Process Trees
| 45 |
Trusted
Process
http://clipart-library.com/spotlight-cliparts.html &
https://clipartpng.com/?227,kiwi-png-clipart
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Detection Challenge #4 –
Breaking Process Trees
| 46 |
Trusted
Process
Trusted
Process
http://clipart-library.com/spotlight-cliparts.html &
https://clipartpng.com/?227,kiwi-png-clipart
[wmiclass]".rootcimv2:
Win32_Process"
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
https://www.kaspersky.com/blog/no-monkeys-for-cozyduke/8543/
Detection Challenge #5 –
Adversary OPSEC
| 47 |
Trusted
Process
http://clipart-library.com/spotlight-cliparts.html &
https://clipartpng.com/?227,kiwi-png-clipart
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Detection Challenge #5 –
Adversary OPSEC
| 48 |
http://clipart-library.com/spotlight-cliparts.html &
https://clipartpng.com/?227,kiwi-png-clipart
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
https://giphy.com/gifs/han-solo-1HH6lJOzOXAY
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Defensive Lesson #1 –
Know Your Systems
▪ Need to do more than identify known-bad
▪ Most adversary behaviors are abuse of
legitimate functionalities
▪ Must reconsider “trust” and least privilege
| 50 |
Trusted
Process
http://clipart-library.com/spotlight-cliparts.html &
https://emojipedia.org
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Trusted
Process
Defensive Lesson #2 –
Know Your Data
▪ Detecting everything may be unrealistic
▪ Build with what you have
▪ Correlate multiple sources to see more of the story
| 51 |
2
1
3
4
5
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Defensive Lesson #3 –
Know Your Threats
▪Use knowledge of adversaries and
their behaviors to fill-in gaps
| 52 |
Trusted
Process
1
2
3
4
5
T1059
T1086
T1083
T1019
T1102
4.5
2.5
0 T1036?
T1032?
T1005?
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. https://giphy.com/gifs/hyperrpg-reaction-mrw-roguelike-9rwFfmB2qJ0mEsmkfj
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Shared Methodology
| 54 |
ATT&CK Arsenal: github.com/mitre-attack/attack-arsenal
https://emojipedia.org
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Shared Methodology
| 55 |
ATT&CK Arsenal: github.com/mitre-attack/attack-arsenal
https://emojipedia.org
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Shared Methodology
| 56 |
ATT&CK Arsenal: github.com/mitre-attack/attack-arsenal
What if you don’t have a red
team to help execute this?
https://emojipedia.org
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Automagical Execution w/ CALDERA
| 57 |
https://clip.cookdiary.net/relax-clipart/relax-clipart-recreation
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Automagical Execution w/ CALDERA
| 58 |
https://clip.cookdiary.net/relax-clipart/relax-clipart-recreation
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Automagical Execution w/ CALDERA
| 59 |
https://clip.cookdiary.net/relax-clipart/relax-clipart-recreation
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Conclusion: Threat-Informed Defense
▪Vital to understand
your capabilities,
strengths and limitations,
but most importantly
how they align with
real adversary behaviors
| 60 |
https://fallout.fandom.com/wiki/Vault_Boy
https://www.jing.fm/clipimg/detail/56-562333_anonymous-mask-png-transparent-free-images-png-only.png
©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4.
Relevant Links
ATT&CK & ATT&CK Accessories
▪ attack.mitre.org
▪ attackevals.mitre.org
▪ medium.com/mitre-attack
▪ medium.com/mitre-engenuity
▪ github.com/mitre-attack/attack-arsenal
▪ github.com/mitre/caldera
No Easy Breach
▪ slideshare.net/MatthewDunwoody1/
no-easy-breach-derby-con-2016
▪ fireeye.com/blog/products-and-
services/2019/02/state-of-the-hack-no-
easy-breach-revisited.html
PowerShell Logging and Adversary Abuse
▪ fireeye.com/blog/threat-
research/2016/02/greater_visibilityt.html
▪ redcanary.com/threat-detection-report/
▪ carbonblack.com/global-incident-response-threat-
report/april-2019/
▪ content.fireeye.com/m-trends/rpt-m-trends-2020
▪ crowdstrike.com/resources/reports/2019-
crowdstrike-global-threat-report/
▪ fireeye.com/blog/threat-research/2019/04/pick-six-
intercepting-a-fin6-intrusion.html
▪ proofpoint.com/us/threat-insight/post/ta505-
abusing-settingcontent-ms-within-pdf-files-
distribute-flawedammyy-rat
▪ secureworks.com/research/bronze-union
▪ github.com/PowerShellMafia/PowerSploit/blob/
master/Exfiltration/Invoke-Mimikatz.ps1
| 61 |

More Related Content

What's hot

Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Jeremiah Grossman
 
Troopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can YouTroopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can YouDouglas Bienstock
 
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
 Ghost in the Browser: Broad-Scale Espionage with Bitsquatting Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
Ghost in the Browser: Broad-Scale Espionage with BitsquattingBishop Fox
 
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017CASCouncil
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
Can blockchain replace your password and make it more secure
Can blockchain replace your password and make it more secureCan blockchain replace your password and make it more secure
Can blockchain replace your password and make it more secureBlockchain Council
 
Web security presentation
Web security presentationWeb security presentation
Web security presentationJohn Staveley
 
Web Application Security 101 - 07 Session Management
Web Application Security 101 - 07 Session ManagementWeb Application Security 101 - 07 Session Management
Web Application Security 101 - 07 Session ManagementWebsecurify
 
FI-WARE Account and OAuth solution
FI-WARE Account and OAuth solutionFI-WARE Account and OAuth solution
FI-WARE Account and OAuth solutionJavier Cerviño
 
Attacking Session Management
Attacking Session ManagementAttacking Session Management
Attacking Session ManagementSehan Lee
 

What's hot (11)

Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"
 
Troopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can YouTroopers 19 - I am AD FS and So Can You
Troopers 19 - I am AD FS and So Can You
 
SCWCD : Secure web
SCWCD : Secure webSCWCD : Secure web
SCWCD : Secure web
 
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
 Ghost in the Browser: Broad-Scale Espionage with Bitsquatting Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
 
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
100 Percent Encrypted Web New Challenges For TLS RSA Conference 2017
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Can blockchain replace your password and make it more secure
Can blockchain replace your password and make it more secureCan blockchain replace your password and make it more secure
Can blockchain replace your password and make it more secure
 
Web security presentation
Web security presentationWeb security presentation
Web security presentation
 
Web Application Security 101 - 07 Session Management
Web Application Security 101 - 07 Session ManagementWeb Application Security 101 - 07 Session Management
Web Application Security 101 - 07 Session Management
 
FI-WARE Account and OAuth solution
FI-WARE Account and OAuth solutionFI-WARE Account and OAuth solution
FI-WARE Account and OAuth solution
 
Attacking Session Management
Attacking Session ManagementAttacking Session Management
Attacking Session Management
 

Similar to Getting Bear-y Cozy with PowerShell

Update from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamUpdate from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamAdam Pennington
 
State of the ATT&CK - ATT&CKcon Power Hour
State of the ATT&CK - ATT&CKcon Power HourState of the ATT&CK - ATT&CKcon Power Hour
State of the ATT&CK - ATT&CKcon Power HourAdam Pennington
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Adam Pennington
 
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...Robert Brandel
 
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CKPennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CKAdam Pennington
 
Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) MITRE ATT&CK
 
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE - ATT&CKcon
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...Adam Pennington
 
Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks Tripwire
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...Adam Pennington
 
State of the ATT&CK
State of the ATT&CKState of the ATT&CK
State of the ATT&CKMITRE ATT&CK
 
MITRE_ATTACK_Enterprise_11x17.pdf
MITRE_ATTACK_Enterprise_11x17.pdfMITRE_ATTACK_Enterprise_11x17.pdf
MITRE_ATTACK_Enterprise_11x17.pdfAisyiFree
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CKArpan Raval
 
Keynote: Which way is the SolarWind Blowing? Techniques are changing…are you ...
Keynote: Which way is the SolarWind Blowing? Techniques are changing…are you ...Keynote: Which way is the SolarWind Blowing? Techniques are changing…are you ...
Keynote: Which way is the SolarWind Blowing? Techniques are changing…are you ...JamieWilliams130
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKKatie Nickels
 

Similar to Getting Bear-y Cozy with PowerShell (20)

Update from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamUpdate from the MITRE ATT&CK Team
Update from the MITRE ATT&CK Team
 
State of the ATTACK
State of the ATTACKState of the ATTACK
State of the ATTACK
 
State of the ATT&CK - ATT&CKcon Power Hour
State of the ATT&CK - ATT&CKcon Power HourState of the ATT&CK - ATT&CKcon Power Hour
State of the ATT&CK - ATT&CKcon Power Hour
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
 
Putting the PRE into ATTACK
Putting the PRE into ATTACKPutting the PRE into ATTACK
Putting the PRE into ATTACK
 
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
 
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CKPennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
 
Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?)
 
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, TripwireMITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
MITRE ATT&CKcon 2018: ATT&CK as a Teacher, Travis Smith, Tripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
 
Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
 
State of the ATT&CK
State of the ATT&CKState of the ATT&CK
State of the ATT&CK
 
MITRE_ATTACK_Enterprise_11x17.pdf
MITRE_ATTACK_Enterprise_11x17.pdfMITRE_ATTACK_Enterprise_11x17.pdf
MITRE_ATTACK_Enterprise_11x17.pdf
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
 
Keynote: Which way is the SolarWind Blowing? Techniques are changing…are you ...
Keynote: Which way is the SolarWind Blowing? Techniques are changing…are you ...Keynote: Which way is the SolarWind Blowing? Techniques are changing…are you ...
Keynote: Which way is the SolarWind Blowing? Techniques are changing…are you ...
 
Threat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CKThreat-Based Adversary Emulation with MITRE ATT&CK
Threat-Based Adversary Emulation with MITRE ATT&CK
 
ATT&CK BINGO
ATT&CK BINGOATT&CK BINGO
ATT&CK BINGO
 

Recently uploaded

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Getting Bear-y Cozy with PowerShell

  • 1. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Getting Bear-y Cozy with PowerShell Defensive Lessons Learned from Emulating the Dukes ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. ®
  • 2. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Introductions ▪ Jamie Williams ( @jamieantisocial) ▪ Cyber adversarial engineer ▪ Adversary emulation + behavior detection research ▪ Mike Hartley ( ) ▪ Cybersecurity engineer ▪ Adversary emulation + adversary technique research ▪ ATT&CK & ATT&CK Evaluations ( @MITREattack) | 2 |
  • 3. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Agenda ▪ATT&CK & ATT&CK Accessories ▪¿Por qué PowerShell? & ▪Emulating & ++ ▪Parting-gifts | 3 | https://emojipedia.org
  • 4. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. | 4 | https://www.1001fonts.com/beyond-wonderland-font.html
  • 5. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Knowledge base of adversary behaviors Threat-informed defense Based on real-world observations References to publicly reported intelligence Free, open, and globally accessible attack.mitre.org Community contribution driven attack@mitre.org | 5 | https://www.1001fonts.com/beyond-wonderland-font.html
  • 6. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact Drive-by Compromise Scheduled Task Binary Padding Network Sniffing AppleScript Audio Capture Commonly Used Port Automated Exfiltration Data Destruction Exploit Public-Facing Application Launchctl Access Token Manipulation Account Manipulation Account Discovery Application Deployment Software Automated Collection Communication Through RemovableMedia Data Compressed Data Encrypted for Impact Local Job Scheduling Bypass User Account Control Bash History Application Window Discovery Clipboard Data Data Encrypted Defacement External Remote Services LSASS Driver Extra Window Memory Injection BruteForce Distributed Component Object Model Data from Information Repositories Connection Proxy Data Transfer Size Limits Disk Content Wipe HardwareAdditions Trap Process Injection Credential Dumping Browser Bookmark Discovery Custom Command and Control Protocol Exfiltration Over Other Network Medium Disk StructureWipe Replication Through RemovableMedia AppleScript DLL Search Order Hijacking Credentials in Files Exploitation of RemoteServices Data from Local System Endpoint Denial of Service CMSTP ImageFileExecution Options Injection Credentials in Registry Domain Trust Discovery Data from Network Shared Drive Custom Cryptographic Protocol Exfiltration Over Command and Control Channel FirmwareCorruption Spearphishing Attachment Command-LineInterface Plist Modification Exploitation for Credential Access Fileand Directory Discovery Logon Scripts Inhibit System Recovery Spearphishing Link Compiled HTML File Valid Accounts Network ServiceScanning Pass theHash Data from RemovableMedia Data Encoding Exfiltration Over Alternative Protocol Network Denial of Service Spearphishing via Service Control Panel Items Accessibility Features BITS Jobs Forced Authentication Network ShareDiscovery Pass theTicket Data Staged Data Obfuscation ResourceHijacking Supply Chain Compromise Dynamic Data Exchange AppCert DLLs Clear Command History Hooking Password Policy Discovery RemoteDesktop Protocol Email Collection Domain Fronting Exfiltration Over Physical Medium RuntimeData Manipulation Trusted Relationship Execution through API AppInit DLLs CMSTP Input Capture Peripheral DeviceDiscovery RemoteFileCopy Input Capture Domain Generation Algorithms ServiceStop Valid Accounts Execution through ModuleLoad Application Shimming CodeSigning Input Prompt Permission Groups Discovery RemoteServices Man in theBrowser Scheduled Transfer Stored Data Manipulation Dylib Hijacking Compiled HTML File Kerberoasting Process Discovery Replication Through RemovableMedia Screen Capture Fallback Channels Transmitted Data ManipulationExploitation for Client Execution FileSystem Permissions Weakness Component Firmware Keychain Query Registry Video Capture Multiband Communication Hooking Component Object Model Hijacking LLMNR/NBT-NS Poisoning and Relay RemoteSystem Discovery Shared Webroot Multi-hop Proxy Graphical User Interface Launch Daemon Security SoftwareDiscovery SSH Hijacking Multilayer Encryption InstallUtil New Service Control Panel Items Password Filter DLL System Information Discovery Taint Shared Content Multi-StageChannels Mshta Path Interception DCShadow PrivateKeys Third-party Software Port Knocking PowerShell Port Monitors Deobfuscate/Decode Files or Information Securityd Memory System Network Configuration Discovery Windows Admin Shares RemoteAccess Tools Regsvcs/Regasm ServiceRegistry PermissionsWeakness Two-Factor Authentication Interception Windows Remote Management RemoteFileCopy Regsvr32 Setuid and Setgid Disabling Security Tools System Network Connections Discovery Standard Application Layer ProtocolRundll32 Startup Items DLL Side-Loading Scripting Web Shell Execution Guardrails System Owner/User Discovery Standard Cryptographic ProtocolServiceExecution .bash_profile and .bashrc Exploitation for PrivilegeEscalation Exploitation for Defense EvasionSigned Binary Proxy Execution Account Manipulation System ServiceDiscovery Standard Non-Application Layer ProtocolAuthentication Package SID-History Injection FileDeletion System TimeDiscovery Signed Script Proxy Execution BITS Jobs Sudo FilePermissions Modification Virtualization/Sandbox Evasion Uncommonly Used Port Bootkit Sudo Caching Web Service Source Browser Extensions FileSystem Logical Offsets Spaceafter Filename ChangeDefault FileAssociation Gatekeeper Bypass Third-party Software Group Policy Modification Trusted Developer Utilities Component Firmware Hidden Files and Directories User Execution Component Object Model Hijacking Hidden Users Windows Management Instrumentation Hidden Window CreateAccount HISTCONTROL Windows Remote Management External RemoteServices Indicator Blocking Hidden Files and Directories Indicator Removal from ToolsXSL Script Processing Hypervisor Kernel Modules and Extensions Indicator Removal on Host Indirect Command Execution Launch Agent Install Root Certificate LC_LOAD_DYLIB Addition InstallUtil Login Item Launchctl Logon Scripts LC_MAIN Hijacking Modify Existing Service Masquerading Netsh Helper DLL Modify Registry Office Application Startup Mshta Port Knocking Network ShareConnection RemovalRc.common Redundant Access NTFS FileAttributes Registry Run Keys / Startup Folder Obfuscated Files or Information Re-opened Applications Port Knocking Screensaver Process Doppelgänging Security Support Provider Process Hollowing Shortcut Modification Redundant Access SIP and Trust Provider Hijacking Regsvcs/Regasm Regsvr32 System Firmware Rootkit Systemd Service Rundll32 TimeProviders Scripting Windows Management Instrumentation Event Subscription Signed Binary Proxy Execution Signed Script Proxy ExecutionWinlogon Helper DLL SIP and Trust Provider Hijacking SoftwarePacking Spaceafter Filename TemplateInjection Timestomp Trusted Developer Utilities Virtualization/Sandbox Evasion Web Service XSL Script Processing | 6 | ATT&CK Structure Tactics: the adversary’s technical goals …
  • 7. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact Drive-by Compromise Scheduled Task Binary Padding Network Sniffing AppleScript Audio Capture Commonly Used Port Automated Exfiltration Data Destruction Exploit Public-Facing Application Launchctl Access Token Manipulation Account Manipulation Account Discovery Application Deployment Software Automated Collection Communication Through RemovableMedia Data Compressed Data Encrypted for Impact Local Job Scheduling Bypass User Account Control Bash History Application Window Discovery Clipboard Data Data Encrypted Defacement External Remote Services LSASS Driver Extra Window Memory Injection BruteForce Distributed Component Object Model Data from Information Repositories Connection Proxy Data Transfer Size Limits Disk Content Wipe HardwareAdditions Trap Process Injection Credential Dumping Browser Bookmark Discovery Custom Command and Control Protocol Exfiltration Over Other Network Medium Disk StructureWipe Replication Through RemovableMedia AppleScript DLL Search Order Hijacking Credentials in Files Exploitation of RemoteServices Data from Local System Endpoint Denial of Service CMSTP ImageFileExecution Options Injection Credentials in Registry Domain Trust Discovery Data from Network Shared Drive Custom Cryptographic Protocol Exfiltration Over Command and Control Channel FirmwareCorruption Spearphishing Attachment Command-LineInterface Plist Modification Exploitation for Credential Access Fileand Directory Discovery Logon Scripts Inhibit System Recovery Spearphishing Link Compiled HTML File Valid Accounts Network ServiceScanning Pass theHash Data from RemovableMedia Data Encoding Exfiltration Over Alternative Protocol Network Denial of Service Spearphishing via Service Control Panel Items Accessibility Features BITS Jobs Forced Authentication Network ShareDiscovery Pass theTicket Data Staged Data Obfuscation ResourceHijacking Supply Chain Compromise Dynamic Data Exchange AppCert DLLs Clear Command History Hooking Password Policy Discovery RemoteDesktop Protocol Email Collection Domain Fronting Exfiltration Over Physical Medium RuntimeData Manipulation Trusted Relationship Execution through API AppInit DLLs CMSTP Input Capture Peripheral DeviceDiscovery RemoteFileCopy Input Capture Domain Generation Algorithms ServiceStop Valid Accounts Execution through ModuleLoad Application Shimming CodeSigning Input Prompt Permission Groups Discovery RemoteServices Man in theBrowser Scheduled Transfer Stored Data Manipulation Dylib Hijacking Compiled HTML File Kerberoasting Process Discovery Replication Through RemovableMedia Screen Capture Fallback Channels Transmitted Data ManipulationExploitation for Client Execution FileSystem Permissions Weakness Component Firmware Keychain Query Registry Video Capture Multiband Communication Hooking Component Object Model Hijacking LLMNR/NBT-NS Poisoning and Relay RemoteSystem Discovery Shared Webroot Multi-hop Proxy Graphical User Interface Launch Daemon Security SoftwareDiscovery SSH Hijacking Multilayer Encryption InstallUtil New Service Control Panel Items Password Filter DLL System Information Discovery Taint Shared Content Multi-StageChannels Mshta Path Interception DCShadow PrivateKeys Third-party Software Port Knocking PowerShell Port Monitors Deobfuscate/Decode Files or Information Securityd Memory System Network Configuration Discovery Windows Admin Shares RemoteAccess Tools Regsvcs/Regasm ServiceRegistry PermissionsWeakness Two-Factor Authentication Interception Windows Remote Management RemoteFileCopy Regsvr32 Setuid and Setgid Disabling Security Tools System Network Connections Discovery Standard Application Layer ProtocolRundll32 Startup Items DLL Side-Loading Scripting Web Shell Execution Guardrails System Owner/User Discovery Standard Cryptographic ProtocolServiceExecution .bash_profile and .bashrc Exploitation for PrivilegeEscalation Exploitation for Defense EvasionSigned Binary Proxy Execution Account Manipulation System ServiceDiscovery Standard Non-Application Layer ProtocolAuthentication Package SID-History Injection FileDeletion System TimeDiscovery Signed Script Proxy Execution BITS Jobs Sudo FilePermissions Modification Virtualization/Sandbox Evasion Uncommonly Used Port Bootkit Sudo Caching Web Service Source Browser Extensions FileSystem Logical Offsets Spaceafter Filename ChangeDefault FileAssociation Gatekeeper Bypass Third-party Software Group Policy Modification Trusted Developer Utilities Component Firmware Hidden Files and Directories User Execution Component Object Model Hijacking Hidden Users Windows Management Instrumentation Hidden Window CreateAccount HISTCONTROL Windows Remote Management External RemoteServices Indicator Blocking Hidden Files and Directories Indicator Removal from ToolsXSL Script Processing Hypervisor Kernel Modules and Extensions Indicator Removal on Host Indirect Command Execution Launch Agent Install Root Certificate LC_LOAD_DYLIB Addition InstallUtil Login Item Launchctl Logon Scripts LC_MAIN Hijacking Modify Existing Service Masquerading Netsh Helper DLL Modify Registry Office Application Startup Mshta Port Knocking Network ShareConnection RemovalRc.common Redundant Access NTFS FileAttributes Registry Run Keys / Startup Folder Obfuscated Files or Information Re-opened Applications Port Knocking Screensaver Process Doppelgänging Security Support Provider Process Hollowing Shortcut Modification Redundant Access SIP and Trust Provider Hijacking Regsvcs/Regasm Regsvr32 System Firmware Rootkit Systemd Service Rundll32 TimeProviders Scripting Windows Management Instrumentation Event Subscription Signed Binary Proxy Execution Signed Script Proxy ExecutionWinlogon Helper DLL SIP and Trust Provider Hijacking SoftwarePacking Spaceafter Filename TemplateInjection Timestomp Trusted Developer Utilities Virtualization/Sandbox Evasion Web Service XSL Script Processing | 7 | ATT&CK Structure Tactics: the adversary’s technical goals … Techniques: how the goals are achieved
  • 8. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact Drive-by Compromise Scheduled Task Binary Padding Network Sniffing AppleScript Audio Capture Commonly Used Port Automated Exfiltration Data Destruction Exploit Public-Facing Application Launchctl Access Token Manipulation Account Manipulation Account Discovery Application Deployment Software Automated Collection Communication Through RemovableMedia Data Compressed Data Encrypted for Impact Local Job Scheduling Bypass User Account Control Bash History Application Window Discovery Clipboard Data Data Encrypted Defacement External Remote Services LSASS Driver Extra Window Memory Injection BruteForce Distributed Component Object Model Data from Information Repositories Connection Proxy Data Transfer Size Limits Disk Content Wipe HardwareAdditions Trap Process Injection Credential Dumping Browser Bookmark Discovery Custom Command and Control Protocol Exfiltration Over Other Network Medium Disk StructureWipe Replication Through RemovableMedia AppleScript DLL Search Order Hijacking Credentials in Files Exploitation of RemoteServices Data from Local System Endpoint Denial of Service CMSTP ImageFileExecution Options Injection Credentials in Registry Domain Trust Discovery Data from Network Shared Drive Custom Cryptographic Protocol Exfiltration Over Command and Control Channel FirmwareCorruption Spearphishing Attachment Command-LineInterface Plist Modification Exploitation for Credential Access Fileand Directory Discovery Logon Scripts Inhibit System Recovery Spearphishing Link Compiled HTML File Valid Accounts Network ServiceScanning Pass theHash Data from RemovableMedia Data Encoding Exfiltration Over Alternative Protocol Network Denial of Service Spearphishing via Service Control Panel Items Accessibility Features BITS Jobs Forced Authentication Network ShareDiscovery Pass theTicket Data Staged Data Obfuscation ResourceHijacking Supply Chain Compromise Dynamic Data Exchange AppCert DLLs Clear Command History Hooking Password Policy Discovery RemoteDesktop Protocol Email Collection Domain Fronting Exfiltration Over Physical Medium RuntimeData Manipulation Trusted Relationship Execution through API AppInit DLLs CMSTP Input Capture Peripheral DeviceDiscovery RemoteFileCopy Input Capture Domain Generation Algorithms ServiceStop Valid Accounts Execution through ModuleLoad Application Shimming CodeSigning Input Prompt Permission Groups Discovery RemoteServices Man in theBrowser Scheduled Transfer Stored Data Manipulation Dylib Hijacking Compiled HTML File Kerberoasting Process Discovery Replication Through RemovableMedia Screen Capture Fallback Channels Transmitted Data ManipulationExploitation for Client Execution FileSystem Permissions Weakness Component Firmware Keychain Query Registry Video Capture Multiband Communication Hooking Component Object Model Hijacking LLMNR/NBT-NS Poisoning and Relay RemoteSystem Discovery Shared Webroot Multi-hop Proxy Graphical User Interface Launch Daemon Security SoftwareDiscovery SSH Hijacking Multilayer Encryption InstallUtil New Service Control Panel Items Password Filter DLL System Information Discovery Taint Shared Content Multi-StageChannels Mshta Path Interception DCShadow PrivateKeys Third-party Software Port Knocking PowerShell Port Monitors Deobfuscate/Decode Files or Information Securityd Memory System Network Configuration Discovery Windows Admin Shares RemoteAccess Tools Regsvcs/Regasm ServiceRegistry PermissionsWeakness Two-Factor Authentication Interception Windows Remote Management RemoteFileCopy Regsvr32 Setuid and Setgid Disabling Security Tools System Network Connections Discovery Standard Application Layer ProtocolRundll32 Startup Items DLL Side-Loading Scripting Web Shell Execution Guardrails System Owner/User Discovery Standard Cryptographic ProtocolServiceExecution .bash_profile and .bashrc Exploitation for PrivilegeEscalation Exploitation for Defense EvasionSigned Binary Proxy Execution Account Manipulation System ServiceDiscovery Standard Non-Application Layer ProtocolAuthentication Package SID-History Injection FileDeletion System TimeDiscovery Signed Script Proxy Execution BITS Jobs Sudo FilePermissions Modification Virtualization/Sandbox Evasion Uncommonly Used Port Bootkit Sudo Caching Web Service Source Browser Extensions FileSystem Logical Offsets Spaceafter Filename ChangeDefault FileAssociation Gatekeeper Bypass Third-party Software Group Policy Modification Trusted Developer Utilities Component Firmware Hidden Files and Directories User Execution Component Object Model Hijacking Hidden Users Windows Management Instrumentation Hidden Window CreateAccount HISTCONTROL Windows Remote Management External RemoteServices Indicator Blocking Hidden Files and Directories Indicator Removal from ToolsXSL Script Processing Hypervisor Kernel Modules and Extensions Indicator Removal on Host Indirect Command Execution Launch Agent Install Root Certificate LC_LOAD_DYLIB Addition InstallUtil Login Item Launchctl Logon Scripts LC_MAIN Hijacking Modify Existing Service Masquerading Netsh Helper DLL Modify Registry Office Application Startup Mshta Port Knocking Network ShareConnection RemovalRc.common Redundant Access NTFS FileAttributes Registry Run Keys / Startup Folder Obfuscated Files or Information Re-opened Applications Port Knocking Screensaver Process Doppelgänging Security Support Provider Process Hollowing Shortcut Modification Redundant Access SIP and Trust Provider Hijacking Regsvcs/Regasm Regsvr32 System Firmware Rootkit Systemd Service Rundll32 TimeProviders Scripting Windows Management Instrumentation Event Subscription Signed Binary Proxy Execution Signed Script Proxy ExecutionWinlogon Helper DLL SIP and Trust Provider Hijacking SoftwarePacking Spaceafter Filename TemplateInjection Timestomp Trusted Developer Utilities Virtualization/Sandbox Evasion Web Service XSL Script Processing | 8 | ATT&CK Structure Tactics: the adversary’s technical goals Procedure Examples: how adversaries have performed techniques … Techniques: how the goals are achieved
  • 9. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. | 9 | Sub-Techniques (BETA) Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Exfiltration Impact Command and Control Same Tactics Same Procedures
  • 10. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. | 10 | Sub-Techniques (BETA) Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Exfiltration Impact Command and Control More Techniques! Same Tactics Same Procedures
  • 11. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. ATT&CK Evaluations Background ▪ Collaboration with product vendors to evaluate detection capabilities ▪ Goals are to improve products while sharing how they detect adversary behaviors ▪ No scores or rankings | 11 |
  • 12. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Again, I Said No Scores… | 12 |
  • 13. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Again, I Said No Scores… | 13 |
  • 14. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Why Adversary Emulation? ▪ Impractical to test all techniques (and all variations) ▪ Using intelligence provides scoping and structure ▪ More practical results and lessons learned | 14 | https://i.redd.it/2xoht8joghiz.png
  • 15. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. - Research, Research Research! How We Leverage ATT&CK (1,2,3) | 15 | Step 1 Cited Public Threat Intelligence attack.mitre.org http://clipart-library.com/magnifying-glass-cliparts.html fireeye.com/blog/threat-research/2018/11/not-so-cozy- an-uncomfortable-examination-of-a-suspected-apt29- phishing-campaign.html
  • 16. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. - Research, Research Research! How We Leverage ATT&CK (1,2,3) | 16 | Step 1 Cited Public Threat Intelligence attack.mitre.org http://clipart-library.com/magnifying-glass-cliparts.html fireeye.com/blog/threat-research/2018/11/not-so-cozy- an-uncomfortable-examination-of-a-suspected-apt29- phishing-campaign.html
  • 17. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. - Create a Plan and Execute It How We Leverage ATT&CK (1,2,3) | 17 | Step 2 http://clipart-library.com/magnifying-glass-cliparts.html fireeye.com/blog/threat-research/2018/11/not-so-cozy- an-uncomfortable-examination-of-a-suspected-apt29- phishing-campaign.html
  • 18. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. How We Leverage ATT&CK (1,2,3) | 18 | Step 3 attackevals.mitre.org - Publish Results http://clipart-library.com/magnifying-glass-cliparts.html fireeye.com/blog/threat-research/2018/11/not-so-cozy- an-uncomfortable-examination-of-a-suspected-apt29- phishing-campaign.html
  • 19. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. https://www.clipartmax.com/png/middle/450-4504742_horn-clipart-free-daily- devil-horns-transparent-background.png & https://www.clipartmax.com/so/devil-tail-clipart/
  • 20. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Why Detecting PowerShell is Crucial ▪ PowerShell is native to supported Windows system ▪ Frequent legitimate usage by sysadmins ▪ In-memory execution (avoid binaries on disk) ▪ Provides access to .NET and Win32 APIs Adversaries abuse PowerShell | 20 |
  • 21. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Top ATT&CK Technique Reports | 21 |
  • 22. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Top ATT&CK Technique Reports | 22 |
  • 23. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Example Adversary Usage | 23 | 1. Obfuscation 2. Download & Execute 3. Remote Execution 4. Win32 API
  • 24. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Example Adversary Usage | 24 | 1. Obfuscation 2. Download & Execute 3. Remote Execution 4. Win32 API
  • 25. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Example Adversary Usage | 25 | 1. Obfuscation 2. Download & Execute 3. Remote Execution 4. Win32 API
  • 26. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Example Adversary Usage | 26 | 1. Obfuscation 2. Download & Execute 3. Remote Execution 4. Win32 API
  • 27. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Example Adversary Usage | 27 | 1. Obfuscation 2. Download & Execute 3. Remote Execution 4. Win32 API Open Source Frameworks: Empire, PoshC2, PowerSploit
  • 28. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Why APT29? | 28 | ▪ APT29 (Cozy Bear, The Dukes, YYTRIUM) ▪ Attributed to the Russian government ▪ Active since at least 2008 ▪ Compromise of DNC ▪ Commitment to stealth ▪ Sophisticated implementations of techniques via arsenal of custom malware ▪ Has made liberal use of PowerShell in their custom malware https://ageofrevolution.org/wellingtons-places-stratfield-saye/8-1st-duke-portrait-by-phillips-1/& http://www.shirleyreade.com/Gallery/wildlife/efrum.htm
  • 29. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. https://giphy.com/gifs/nfl-football-miami-dolphins-l0HlNOtch2D0XOXxS
  • 30. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. PowerShell Visibility In response to adversary abuse, Microsoft helped make PowerShell one of the most security-transparent shells available ▪ Process monitoring ▪ PowerShell logging ▪ Event Tracing for Windows (ETW) But will it scale…? | 30 | https://www.stockio.com/free-clipart/powershell-icon & https://giphy.com/gifs/tex-avery-3HEzHIxZjKduE
  • 31. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Process Monitoring ▪ Process monitoring may catch PowerShell execution ▪ Command line arguments ▪ Parent process | 31 | ▪ Event 4688 and Sysmon ID 1
  • 32. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. PowerShell Logs: Module Logs ▪ Contains pipeline execution details ▪ Variable initialization ▪ Command invocation ▪ Script portions ▪ Some de-obfuscated code | 32 | https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/powershell-logging-appendix-a.pdf ▪ Written to Event 4103
  • 33. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. PowerShell Logs: Script Block Logs ▪ Captures blocks of code as executed by the PowerShell engine ▪ Captures full script and/or command content ▪ Records deobfuscated code ▪ Does not record output | 33 | https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/powershell-logging-appendix-b.pdf ▪ Written to Event 4104
  • 34. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. PowerShell Logs: Transcription Logs ▪ Create a record of every PowerShell session ▪ Records input and output ▪ Written to text files in Documents (configurable) | 34 | https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/powershell-logging-appendix-c.pdf ▪ Best practice ▪ Write to a remote write-only network share
  • 35. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Event Tracing for Windows (ETW) ▪ Tracing facility for logging kernel or application-defined events ▪ Can consume in real time or from a log file ▪ Originally intended for application debugging | 35 | ▪ ETW Provider ▪ Microsoft-Windows-PowerShell ▪ Contains some added context ▪ Additional providers can help gain further context and insight
  • 36. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Can It Scale? ▪ This is a lot of data to process, not feasible for human review ▪ How do you find APT29 in this sea of data? | 36 | https://giphy.com/gifs/mtv-ridiculousness-rob-dyrdek-kgoIBso63Pu6Y
  • 37. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. https://www.nps.gov/subjects/bears/types-of-bears.htm & https://depositphotos.com/200869380/stock-illustration-paw-footprints-mosaic-of-binary.html & https://encrypted-tbn0.gstatic.com/images?q=tbn%3AANd9GcRUAXZBbHk1IPc- Xryutu0BQ9xPldk0XS3GkNniU0SAv0vVbqw0&usqp=CAU Cozy
  • 38. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Emulate to Defend | 38 | https://giphy.com/gifs/1fih1TYYBONo0Dkdmx ▪ Stealthy tradecraft, perhaps ahead of their time ▪ Implied understanding of how detection technologies work (and how to bypass them) ▪ A lot of learning and custom development to deliver “real feel”
  • 39. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Detection Challenge #1 – Living Off the Land | 39 | Trusted ProcessTrusted Process Unknown Trusted Process Unknown Trusted Process Untrusted Process Trusted Process Trusted Process Trusted Process Unknown Trusted Process Untrusted Process Trusted Process
  • 40. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Detection Challenge #1 – Living Off the Land | 40 | Trusted ProcessTrusted Process Unknown Trusted Process Unknown Trusted Process Untrusted Process Trusted Process Trusted Process Trusted Process Unknown Trusted Process Untrusted Process Trusted Process
  • 41. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Get-Process Detection Challenge #2 – Large Custom Scripts | 41 | Trusted Process
  • 42. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. $TOKEN_OWNER = struct $ModuleBuilder TOKEN_OWNER @{Owner = field 0 IntPtr} $TokenPtrSize = 0 $TokenInformationClass = 'TokenOwner' $hProcess = OpenProcess -ProcessId $PID -DesiredAccess PROCESS_QUERY_LIMITED_INFORMATION $hToken = OpenProcessToken -ProcessHandle $hProcess -DesiredAccess TOKEN_QUERY $Success = $Advapi32::GetTokenInformation($hToken, $TOKEN_INFORMATION_CLASS::$TokenInformationClass, 0, $TokenPtrSize, [ref]$TokenPtrSize) [IntPtr]$TokenPtr = [System.Runtime.InteropServices.Marshal]::AllocHGlobal($TokenPtrSize) $Success = $Advapi32::GetTokenInformation($hToken, $TOKEN_INFORMATION_CLASS::$TokenInformationClass, $TokenPtr, $TokenPtrSize, [ref]$TokenPtrSize); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if($Success) { $TokenOwner = $TokenPtr -as $TOKEN_OWNER if($TokenOwner.Owner -ne $null) { $OwnerSid = ConvertSidToStringSid -SidPointer $TokenOwner.Owner $Sid = New-Object System.Security.Principal.SecurityIdentifier($OwnerSid) $OwnerName = $Sid.Translate([System.Security.Principal.NTAccount]) $obj = New-Object -TypeName psobject $obj | Add-Member -MemberType NoteProperty -Name Sid -Value $OwnerSid $obj | Add-Member -MemberType NoteProperty -Name -Value $OwnerName Write-Output $obj } else { Write-Output "Fail" } [System.Runtime.InteropServices.Marshal]::FreeHGlobal($TokenPtr) } else { Write-Debug "[GetTokenInformation] Error: $(([ComponentModel.Win32Exception] $LastError).Message)“ … Detection Challenge #2 – Large Custom Scripts | 42 | Trusted Process
  • 43. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. JFRPS0VOX09XTkVSID0gc3RydWN0ICRNb2R1bGVCdWlsZGVyIFRPS0VOX09XTkVSI ApAe093bmVyID0gZmllbGQgMCBJbnRQdHJ9CiRUb2tlblB0clNpemUgPSAwCiRUb2tl bkluZm9ybWF0aW9uQ2xhc3MgPSAnVG9rZW5Pd25lcicKJGhQcm9jZXNzID0gT3BlblB yb2Nlc3MgLVByb2Nlc3NJZCAkUElEIC1EZXNpcmVkQWNjZXNzIFBST0NFU1NfUVVFUl lfTElNSVRFRF9JTkZPUk1BVElPTgokaFRva2VuID0gT3BlblByb2Nlc3NUb2tlbiAtUHJvY 2Vzc0hhbmRsZSAkaFByb2Nlc3MgLURlc2lyZWRBY2Nlc3MgVE9LRU5fUVVFUlkKJFN1 Y2Nlc3MgPSAkQWR2YXBpMzI6OkdldFRva2VuSW5mb3JtYXRpb24oJGhUb2tlbiwgJF RPS0VOX0lORk9STUFUSU9OX0NMQVNTOjokVG9rZW5JbmZvcm1hdGlvbkNsYXNzL CAwLCAkVG9rZW5QdHJTaXplLCBbcmVmXSRUb2tlblB0clNpemUpCltJbnRQdHJdJF Rva2VuUHRyID0gW1N5c3RlbS5SdW50aW1lLkludGVyb3BTZXJ2aWNlcy5NYXJzaGFs XTo6QWxsb2NIR2xvYmFsKCRUb2tlblB0clNpemUpCiRTdWNjZXNzID0gJEFkdmFwaT MyOjpHZXRUb2tlbkluZm9ybWF0aW9uKCRoVG9rZW4sICRUT0tFTl9JTkZPUk1BVElPT l9DTEFTUzo6JFRva2VuSW5mb3JtYXRpb25DbGFzcywgJFRva2VuUHRyLCAkVG9rZW 5QdHJTaXplLCBbcmVmXSRUb2tlblB0clNpemUpOyAkTGFzdEVycm9yID0gW1J1bnRp bWUuSW50ZXJvcFNlcnZpY2VzLk1hcnNoYWxdOjpHZXRMYXN0V2luMzJFcnJvcigpC mlmKCRTdWNjZXNzKSB7CiRUb2tlbk93bmVyID0gJFRva2VuUHRyIC1hcyAkVE9LRU5f T1dORVIKaWYoJFRva2VuT3duZXIuT3duZXIgLW5lICRudWxsKSB7CiRPd25lclNpZCA9 IENvbnZlcnRTaWRUb1N0cmluZ1NpZCAtU2lkUG9pbnRlciAkVG9rZW5Pd25lci5Pd25lc gokU2lkID0gTmV3LU9iamVjdCBTeXN0ZW0uU2VjdXJpdHkuUHJpbmNpcGFsLlNlY3Vy aXR5SWRlbnRpZmllcigkT3duZXJTaWQpCiRPd25lck5hbWUgPSAkU2lkLlRyYW5zbGF 0ZShbU3lzdGVtLlNlY3VyaXR5LlByaW5jaXBhbC5OVEFjY291bnRdKQokb2JqID0gTmV 3LU9iamVjdCAtVHlwZU5hbWUgcHNvYmplY3QKJG9iaiB8IEFkZC1NZW1iZXIgLU1lbW JlclR5cGUgTm90ZVByb3BlcnR5IC1OYW1lIFNpZCAtVmFsdWUgJE93bmVyU2lkCiRvY mogfCBBZGQtTWVtYmVyIC1NZW1iZXJUeXBlIE5vdGVQcm9wZXJ0eSAtTmFtZSAtVm FsdWUgJE93bmVyTmFtZQpXcml0ZS1PdXRwdXQgJG9iagp9CmVsc2UgewpXcml0ZS 1PdXRwdXQgIkZhaWwiCn0KW1N5c3RlbS5SdW50aW1lLkludGVyb3BTZXJ2aWNlcy5N YXJzaGFsXTo6RnJlZUhHbG9iYWwoJFRva2VuUHRyKQp9CmVsc2UgewpXcml0ZS1EZ WJ1ZyAiW0dldFRva2VuSW5mb3JtYXRpb25dIEVycm9yOiAkKChbQ29tcG9uZW50TW9 kZWwuV2luMzJFeGNlcHRpb25dICRMYXN0RXJyb3IpLk1lc3NhZ2Up4oCcCg== … $TOKEN_OWNER = struct $ModuleBuilder TOKEN_OWNER @{Owner = field 0 IntPtr} $TokenPtrSize = 0 $TokenInformationClass = 'TokenOwner' $hProcess = OpenProcess -ProcessId $PID -DesiredAccess PROCESS_QUERY_LIMITED_INFORMATION $hToken = OpenProcessToken -ProcessHandle $hProcess -DesiredAccess TOKEN_QUERY $Success = $Advapi32::GetTokenInformation($hToken, $TOKEN_INFORMATION_CLASS::$TokenInformationClass, 0, $TokenPtrSize, [ref]$TokenPtrSize) [IntPtr]$TokenPtr = [System.Runtime.InteropServices.Marshal]::AllocHGlobal($TokenPtrSize) $Success = $Advapi32::GetTokenInformation($hToken, $TOKEN_INFORMATION_CLASS::$TokenInformationClass, $TokenPtr, $TokenPtrSize, [ref]$TokenPtrSize); $LastError = [Runtime.InteropServices.Marshal]::GetLastWin32Error() if($Success) { $TokenOwner = $TokenPtr -as $TOKEN_OWNER if($TokenOwner.Owner -ne $null) { $OwnerSid = ConvertSidToStringSid -SidPointer $TokenOwner.Owner $Sid = New-Object System.Security.Principal.SecurityIdentifier($OwnerSid) $OwnerName = $Sid.Translate([System.Security.Principal.NTAccount]) $obj = New-Object -TypeName psobject $obj | Add-Member -MemberType NoteProperty -Name Sid -Value $OwnerSid $obj | Add-Member -MemberType NoteProperty -Name -Value $OwnerName Write-Output $obj } else { Write-Output "Fail" } [System.Runtime.InteropServices.Marshal]::FreeHGlobal($TokenPtr) } else { Write-Debug "[GetTokenInformation] Error: $(([ComponentModel.Win32Exception] $LastError).Message)“ … Detection Challenge #3 – Obfuscation | 43 | Trusted Process https://www.kaspersky.com/blog/no-monkeys-for-cozyduke/8543/
  • 44. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. JFRPS0VOX09XTkVSID0gc3RydWN0ICRNb2R1bGVCdWlsZGVyIFRPS0VOX09XTkVSI ApAe093bmVyID0gZmllbGQgMCBJbnRQdHJ9CiRUb2tlblB0clNpemUgPSAwCiRUb2tl bkluZm9ybWF0aW9uQ2xhc3MgPSAnVG9rZW5Pd25lcicKJGhQcm9jZXNzID0gT3BlblB yb2Nlc3MgLVByb2Nlc3NJZCAkUElEIC1EZXNpcmVkQWNjZXNzIFBST0NFU1NfUVVFUl lfTElNSVRFRF9JTkZPUk1BVElPTgokaFRva2VuID0gT3BlblByb2Nlc3NUb2tlbiAtUHJvY 2Vzc0hhbmRsZSAkaFByb2Nlc3MgLURlc2lyZWRBY2Nlc3MgVE9LRU5fUVVFUlkKJFN1 Y2Nlc3MgPSAkQWR2YXBpMzI6OkdldFRva2VuSW5mb3JtYXRpb24oJGhUb2tlbiwgJF RPS0VOX0lORk9STUFUSU9OX0NMQVNTOjokVG9rZW5JbmZvcm1hdGlvbkNsYXNzL CAwLCAkVG9rZW5QdHJTaXplLCBbcmVmXSRUb2tlblB0clNpemUpCltJbnRQdHJdJF Rva2VuUHRyID0gW1N5c3RlbS5SdW50aW1lLkludGVyb3BTZXJ2aWNlcy5NYXJzaGFs XTo6QWxsb2NIR2xvYmFsKCRUb2tlblB0clNpemUpCiRTdWNjZXNzID0gJEFkdmFwaT MyOjpHZXRUb2tlbkluZm9ybWF0aW9uKCRoVG9rZW4sICRUT0tFTl9JTkZPUk1BVElPT l9DTEFTUzo6JFRva2VuSW5mb3JtYXRpb25DbGFzcywgJFRva2VuUHRyLCAkVG9rZW 5QdHJTaXplLCBbcmVmXSRUb2tlblB0clNpemUpOyAkTGFzdEVycm9yID0gW1J1bnRp bWUuSW50ZXJvcFNlcnZpY2VzLk1hcnNoYWxdOjpHZXRMYXN0V2luMzJFcnJvcigpC mlmKCRTdWNjZXNzKSB7CiRUb2tlbk93bmVyID0gJFRva2VuUHRyIC1hcyAkVE9LRU5f T1dORVIKaWYoJFRva2VuT3duZXIuT3duZXIgLW5lICRudWxsKSB7CiRPd25lclNpZCA9 IENvbnZlcnRTaWRUb1N0cmluZ1NpZCAtU2lkUG9pbnRlciAkVG9rZW5Pd25lci5Pd25lc gokU2lkID0gTmV3LU9iamVjdCBTeXN0ZW0uU2VjdXJpdHkuUHJpbmNpcGFsLlNlY3Vy aXR5SWRlbnRpZmllcigkT3duZXJTaWQpCiRPd25lck5hbWUgPSAkU2lkLlRyYW5zbGF 0ZShbU3lzdGVtLlNlY3VyaXR5LlByaW5jaXBhbC5OVEFjY291bnRdKQokb2JqID0gTmV 3LU9iamVjdCAtVHlwZU5hbWUgcHNvYmplY3QKJG9iaiB8IEFkZC1NZW1iZXIgLU1lbW JlclR5cGUgTm90ZVByb3BlcnR5IC1OYW1lIFNpZCAtVmFsdWUgJE93bmVyU2lkCiRvY mogfCBBZGQtTWVtYmVyIC1NZW1iZXJUeXBlIE5vdGVQcm9wZXJ0eSAtTmFtZSAtVm FsdWUgJE93bmVyTmFtZQpXcml0ZS1PdXRwdXQgJG9iagp9CmVsc2UgewpXcml0ZS 1PdXRwdXQgIkZhaWwiCn0KW1N5c3RlbS5SdW50aW1lLkludGVyb3BTZXJ2aWNlcy5N YXJzaGFsXTo6RnJlZUhHbG9iYWwoJFRva2VuUHRyKQp9CmVsc2UgewpXcml0ZS1EZ WJ1ZyAiW0dldFRva2VuSW5mb3JtYXRpb25dIEVycm9yOiAkKChbQ29tcG9uZW50TW9 kZWwuV2luMzJFeGNlcHRpb25dICRMYXN0RXJyb3IpLk1lc3NhZ2Up4oCcCg== … Detection Challenge #3 – Obfuscation | 44 | Trusted Process https://www.kaspersky.com/blog/no-monkeys-for-cozyduke/8543/
  • 45. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Detection Challenge #4 – Breaking Process Trees | 45 | Trusted Process http://clipart-library.com/spotlight-cliparts.html & https://clipartpng.com/?227,kiwi-png-clipart
  • 46. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Detection Challenge #4 – Breaking Process Trees | 46 | Trusted Process Trusted Process http://clipart-library.com/spotlight-cliparts.html & https://clipartpng.com/?227,kiwi-png-clipart [wmiclass]".rootcimv2: Win32_Process"
  • 47. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. https://www.kaspersky.com/blog/no-monkeys-for-cozyduke/8543/ Detection Challenge #5 – Adversary OPSEC | 47 | Trusted Process http://clipart-library.com/spotlight-cliparts.html & https://clipartpng.com/?227,kiwi-png-clipart
  • 48. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Detection Challenge #5 – Adversary OPSEC | 48 | http://clipart-library.com/spotlight-cliparts.html & https://clipartpng.com/?227,kiwi-png-clipart
  • 49. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. https://giphy.com/gifs/han-solo-1HH6lJOzOXAY
  • 50. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Defensive Lesson #1 – Know Your Systems ▪ Need to do more than identify known-bad ▪ Most adversary behaviors are abuse of legitimate functionalities ▪ Must reconsider “trust” and least privilege | 50 | Trusted Process http://clipart-library.com/spotlight-cliparts.html & https://emojipedia.org
  • 51. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Trusted Process Defensive Lesson #2 – Know Your Data ▪ Detecting everything may be unrealistic ▪ Build with what you have ▪ Correlate multiple sources to see more of the story | 51 | 2 1 3 4 5
  • 52. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Defensive Lesson #3 – Know Your Threats ▪Use knowledge of adversaries and their behaviors to fill-in gaps | 52 | Trusted Process 1 2 3 4 5 T1059 T1086 T1083 T1019 T1102 4.5 2.5 0 T1036? T1032? T1005?
  • 53. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. https://giphy.com/gifs/hyperrpg-reaction-mrw-roguelike-9rwFfmB2qJ0mEsmkfj
  • 54. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Shared Methodology | 54 | ATT&CK Arsenal: github.com/mitre-attack/attack-arsenal https://emojipedia.org
  • 55. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Shared Methodology | 55 | ATT&CK Arsenal: github.com/mitre-attack/attack-arsenal https://emojipedia.org
  • 56. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Shared Methodology | 56 | ATT&CK Arsenal: github.com/mitre-attack/attack-arsenal What if you don’t have a red team to help execute this? https://emojipedia.org
  • 57. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Automagical Execution w/ CALDERA | 57 | https://clip.cookdiary.net/relax-clipart/relax-clipart-recreation
  • 58. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Automagical Execution w/ CALDERA | 58 | https://clip.cookdiary.net/relax-clipart/relax-clipart-recreation
  • 59. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Automagical Execution w/ CALDERA | 59 | https://clip.cookdiary.net/relax-clipart/relax-clipart-recreation
  • 60. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Conclusion: Threat-Informed Defense ▪Vital to understand your capabilities, strengths and limitations, but most importantly how they align with real adversary behaviors | 60 | https://fallout.fandom.com/wiki/Vault_Boy https://www.jing.fm/clipimg/detail/56-562333_anonymous-mask-png-transparent-free-images-png-only.png
  • 61. ©2020 The MITRE Corporation. ALL RIGHTS RESERVED. Approved for public release. Distribution unlimited 20-00876-4. Relevant Links ATT&CK & ATT&CK Accessories ▪ attack.mitre.org ▪ attackevals.mitre.org ▪ medium.com/mitre-attack ▪ medium.com/mitre-engenuity ▪ github.com/mitre-attack/attack-arsenal ▪ github.com/mitre/caldera No Easy Breach ▪ slideshare.net/MatthewDunwoody1/ no-easy-breach-derby-con-2016 ▪ fireeye.com/blog/products-and- services/2019/02/state-of-the-hack-no- easy-breach-revisited.html PowerShell Logging and Adversary Abuse ▪ fireeye.com/blog/threat- research/2016/02/greater_visibilityt.html ▪ redcanary.com/threat-detection-report/ ▪ carbonblack.com/global-incident-response-threat- report/april-2019/ ▪ content.fireeye.com/m-trends/rpt-m-trends-2020 ▪ crowdstrike.com/resources/reports/2019- crowdstrike-global-threat-report/ ▪ fireeye.com/blog/threat-research/2019/04/pick-six- intercepting-a-fin6-intrusion.html ▪ proofpoint.com/us/threat-insight/post/ta505- abusing-settingcontent-ms-within-pdf-files- distribute-flawedammyy-rat ▪ secureworks.com/research/bronze-union ▪ github.com/PowerShellMafia/PowerSploit/blob/ master/Exfiltration/Invoke-Mimikatz.ps1 | 61 |