Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10

Video Transcription

00:00
hello and welcome to another application of the minor attack framework discussion today. We're going to be talking about create account, account creation, creation of accounts with respect to persistence. So with that in mind, let's go ahead and look at our objectives.
00:17
So today, again, we're going to be describing what create account is within the persistence area of
00:24
minor, how the vector has been used. What are some mitigation techniques and what are some detection techniques? So with that in mind, let's jump right in. So create account is the creation of a local system domain or clown account.
00:41
It is considered a form of persistence for the threat actor.
00:45
Also, this allows the Threat actor to avoid malicious software detection tools and other protectors because the account is considered normal. Okay, and so we can use command line commands on Windows such as net user to create accounts. So
01:02
this is great, right? If a threat actor is able to create an account through legitimate processes,
01:10
then there's no need to use malicious software. There's no need to raise the flag. And if we don't have proper logging and monitoring in place than the capability to alert on this is not going to be anything that will get is well. So this is overall a normal process for day to day operations
01:27
in the eyes of, you know, a V and are an amorous and things of that nature
01:33
within our network. So let's talk about the serve helper malware and how it functions and so serve help arm our eyes classified as a back door, and it has several functions as follows. And so really these air steps that it takes a step number one.
01:49
Extracting and dropping an open ssh binary onto the system
01:53
than to extracting and dropping and configuring the RTP rapper library. Creating a new user. Okay, support account kind of messed it up, but support account with the password G h a r four F five now somewhat complex but not super complex
02:13
and then four, adding the user to the remote desktop and administrators group.
02:16
So why would this be beneficial? As far as those two groups and this account, well,
02:23
you have to be in typically in the remote desktop group in order to take advantage of Rdp and accessing that system.
02:31
Now, the creation of an account such a support account seems somewhat generic, and maybe you would not fall for that. But I have seen a lot of environments where printer test
02:45
guest has been used to support account
02:47
technical lead support desk. Ah, support administrator, system administrator, software administrator.
02:54
That's the name of the account. And you know, we're implementing these accounts not for malicious purpose, but from a threat. Actors perspective. That ambiguity is great because if I've got ah, 100 accounts
03:08
that are active in the network, and let's just say they're stale, they're not used regularly, and we don't have a mechanism to report on whether or not they're legitimate. If I slipped one more accounting there, it kind of fits the mold, really not doing us any good. And then, by adding ourselves to the remote desktop and administrators group,
03:28
it really gives us the capability to get on that system
03:31
and to kind of have our way with it and do what we need to then to either get system level privilege or to move laterally into other systems as well. So definitely a nifty piece of malware here and would be one that you know, if you see this support account or some type of account creation.
03:52
It could be a variant of that as well.
03:54
Now let's talk about mitigation techniques. So the use of multi factor authentication for user and privileged accounts. Now some would argue that putting multi factor authentication on a standard user account is probably the equivalent of, uh,
04:13
career craziness there because
04:15
we're definitely going to up the amount of support that we would be providing for that organization or for those users, because it's going to have issues at some point or somebody's gonna have a problem. Or, you know, we've always run into the power user or the senior manager of the executive that doesn't like the extra step.
04:35
But again that comes back to education. Why are we doing this? What are we protecting? Where's the support coming from again? I think I've drawn this out before, But if your support is bottom up initiative, meaning that the front line folks,
04:51
the tier one folks, the technical individuals that really aren't decision makers, maybe there
04:59
if they're pushing this and helping to put it in place
05:01
and it's working its way up to that CEO level
05:06
nine times out of 10 we won't be successful. But if that approach is inverted Okay, Number two here and the CEO is in support of this. It doesn't matter if you're the senior director of whatever and you're throwing a fit about it. If the guy or gal in the top supports it,
05:26
then it's got a better chance of being implemented. And so you know, that's how we always want to approach these mitigation techniques. We won't top down support.
05:33
Multi factor is getting easier and easier to implement. Easier and easier to use were seen it with bank accounts, health records, any number of things. It just makes sense that we start talking about it and putting that in place utilized network segmentation to provide systems and users access to resources necessary to achieve their core functions, Meaning
05:53
If I don't need access to all the filing folder structures in the organization, my account should not be able to access them and get to them. Same thing goes for the system. If the system on Lee needs to access a domain controller and a file server,
06:06
then it doesn't need to access every other maybe SQL server database. Whenever in the organization so
06:14
limiting both user permissions and access and system access
06:18
is going to be key to what a threat actor could do if they were able to get something on a system. Implement. Best practice security configurations for servers such as domain controllers. Lot of documentation off their own configuration. Best practices and hardening guides
06:33
do not allow day to day operations with a domain administrator account.
06:39
Um, I know you know. You may be a business owner. You may be a C x o of some sort.
06:46
Just because you are doesn't mean you need administrative access at all times. You could have a separate account. I get it. You want to have that level of control, but if you don't need it legitimately, then why haven't? And if you do have it, don't use it for day to day activities like checking your even. You put the business at risk and you could cause undue harm there.
07:05
Now let's talk about detection, so utilize low collection tools to alert on account creation within the network, especially focused on event I D 47 20 which has generated when a user account is created.
07:17
The event should be validated as legitimate action. So if it is not legitimate action, if it's not tied back to a request or the proper sequence of events to create the account, it needs to be investigated and understood
07:30
and cleaning up your active directory infrastructure or whatever you use for account creation and ensuring that Onley active accounts are
07:40
enabled that everything else is put in a proper oh you and it is separated, and you audit that regularly that will help in detection of rogue accounts. Long collection from Cloud Administration accounts can be used again to identify unusual activity. We're seeing more and more office 365 attacks attempts on AWS Azure Whatever the case may be,
08:00
if there are logging functions, especially for the administrative accounts, take advantage of getting every activity that comes out of that, whether good or bad for evil, are legit purpose. Being able to track those accounts and what they're doing and how they're acting could potentially help us to solve a complex puzzle one day
08:18
and then alert on. Members on there are assigned to administrator roles,
08:22
much like we were talking about cloud out men's.
08:26
If my domain admin account is long thin on the system at 8 a.m. And it does activities X y z. I should hopefully be able to capture some of those activities and ensure that I am using that account for legit purposes and not just checking emails. Now check on learning
08:43
When a threat actor uses a script to create accounts, they're using techniques from the execution and persistence vectors of the framework that being the minor attack framework.
08:54
So if you mean more time, please pause the video. So when we use a script, a script was from the execution area. Phase of minor and account creation is from the persistence vector. So it is true. We are essentially kidding. Two different phases
09:11
at the same time by using a script to create an account.
09:15
Now in summary today we talked about account creation. Okay, we described that we looked at how the vector has been used.
09:24
We describe mitigation techniques, and we talked about detection techniques. So with that in mind, I want to thank you for your time today, and I look forward to seeing you again soon.

Up Next

Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor