Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
@sibertor
#SANSEnterpriseSummit
3 JUN 2019
“Living off the Land” attributed to Matt
Graeber @mattifestation
Example: Autostart entries (most often the HKCU Run key) launch
execution of PowerShell, regsvr32, rundll32 that downloads,
decodes and invokes script
GITHUB.COM/LOLBAS-PROJECT/LOLBAS
Criteria to become a LOLBAS:
§ Microsoft signed or downloaded
§ Must have “unexpected functionality”
and a means of being repurposed
§ Must have functionality that would be
useful to APT or Red Team
Oddvar Moe @api0cradle maintains
the LoLBAS project
For more info, see the LOLBAS Project:
https://lolbas-project.github.io/
1 2 3
1. Whitelisted 4
binary; Calls
execution of
exported
function of
arbitrary DLL
https://github.com/Cn33liz/VBSMet
er/blob/master/VBSMeter.vbs
CREDENTIAL ACCESS
Network Service
DISCOVERY
LATERAL MOVEMENT Remote Desktop, Remote File Copy
1 2
As a secondary action,
User clicks on .lnk file
PowerShell downloads
that launches browser
another script
and directs to Adobe
masquerading as a BMP file.
Flash Update page
25
PROCDOT: VISUAL MALWARE ANALYSIS TOOL
For more info:
http://www.procdot.com
POWERSHELL DEOBFUSCATION
§ Under the Wire PowerShell Wargames (underthewire.tech)
§ Finding and Decoding Malicious PowerShell Scripts - Mari DeGrazia
http://blogspot.com/2017/10/finding-and-decoding-malicious
§ Download Cradles: https://gist.github.com/HarmJ0y/bb48307ffa663256e239