220. Adversaries Use TokenUtils to Escalate Privileges
Hello everyone!
Today we'll talk about privilege escalation. And focus on Access Token Manipulation (T1134) technique. As always, we need a real life example, right?
Let's look into this report. The adversary leveraged TokenUtils to steal tokens from all users and use those to execute commands with elevated privileges:
TokenUtils.exe ListTokens
TokenUtils.exe Execute -u “NT AUTHORITY\SYSTEM” -e whoami -c
TokenUtils.exe Execute -u “NT AUTHORITY\SYSTEM” -e cmd.exe -c
To hunt for the tool usage we can use, for example, the module name:
event_type: "processcreatewin"
AND
cmdline: "ListTokens"
See you tomorrow!
Comments
Post a Comment