220. Adversaries Use TokenUtils to Escalate Privileges

Hello everyone!

Today we'll talk about privilege escalation. And focus on Access Token Manipulation (T1134) technique. As always, we need a real life example, right?

Let's look into this report. The adversary leveraged TokenUtils to steal tokens from all users and use those to execute commands with elevated privileges:

TokenUtils.exe ListTokens

TokenUtils.exe Execute -u “NT AUTHORITY\SYSTEM” -e whoami -c

TokenUtils.exe Execute -u “NT AUTHORITY\SYSTEM” -e cmd.exe -c

To hunt for the tool usage we can use, for example, the module name:

event_type: "processcreatewin"

AND

cmdline: "ListTokens"

See you tomorrow!


Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge