Try it using Invoke-Atomic

Server Software Component: Transport Agent

Description from ATT&CK

Adversaries may abuse Microsoft transport agents to establish persistent access to systems. Microsoft Exchange transport agents can operate on email messages passing through the transport pipeline to perform various tasks such as filtering spam, filtering malicious attachments, journaling, or adding a corporate signature to the end of all outgoing emails.(Citation: Microsoft TransportAgent Jun 2016)(Citation: ESET LightNeuron May 2019) Transport agents can be written by application developers and then compiled to .NET assemblies that are subsequently registered with the Exchange server. Transport agents will be invoked during a specified stage of email processing and carry out developer defined tasks.

Adversaries may register a malicious transport agent to provide a persistence mechanism in Exchange Server that can be triggered by adversary-specified email events.(Citation: ESET LightNeuron May 2019) Though a malicious transport agent may be invoked for all emails passing through the Exchange transport pipeline, the agent can be configured to only carry out specific tasks in response to adversary defined criteria. For example, the transport agent may only carry out an action like copying in-transit attachments and saving them for later exfiltration if the recipient email address matches an entry on a list provided by the adversary. https://www.aleksandrhovhannisyan.com/blog/how-to-add-a-copy-to-clipboard-button-to-your-jekyll-blog/

Atomic Tests

Atomic Test #1 - Install MS Exchange Transport Agent Persistence

Install a Microsoft Exchange Transport Agent for persistence. This requires execution from an Exchange Client Access Server and the creation of a DLL with specific exports. Seen in use by Turla. More details- https://docs.microsoft.com/en-us/exchange/transport-agents-exchange-2013-help

Supported Platforms: windows

auto_generated_guid: 43e92449-ff60-46e9-83a3-1a38089df94d

Inputs:

Name Description Type Default Value
class_factory Class factory of transport agent. string Microsoft.Exchange.Security.Interop.SecurityInteropAgentFactory
dll_path Path of DLL to use as transport agent. path c:\program files\microsoft\Exchange Server\v15\bin\Microsoft.Exchange.Security.Interop.dll
transport_agent_identity Friendly name of transport agent once installed. string Security Interop Agent

Attack Commands: Run with powershell! Elevation Required (e.g. root or admin)

1
2
3
4
Install-TransportAgent -Name #{transport_agent_identity} -TransportAgentFactory #{class_factory} -AssemblyPath #{dll_path}
Enable-TransportAgent #{transport_agent_identity}
Get-TransportAgent | Format-List Name,Enabled

Cleanup Commands:

1
2
3
4
5
6
if(Get-Command "Get-TransportAgent" -ErrorAction Ignore){
  Disable-TransportAgent #{transport_agent_identity}
  Uninstall-TransportAgent #{transport_agent_identity}
  Get-TransportAgent
}

Dependencies: Run with powershell!

Description: Microsoft Exchange SnapIn must be installed

Check Prereq Commands:

1
2
Get-TransportAgent -TransportService FrontEnd

Get Prereq Commands:

1
2
Add-PSSnapin Microsoft.Exchange.Management.PowerShell.SnapIn

source