text
stringlengths
0
3.15k
Name: Office Application Startup: Outlook Forms
Description: Adversaries may abuse Microsoft Outlook forms to obtain persistence on a compromised system. Outlook forms are used as templates for presentation and functionality in Outlook messages. Custom Outlook forms can be created that will execute code when a specifically crafted email is sent by an adversary utili...
Tactics: Persistence
Platforms Affected: Office 365, Windows
Detection Strategies: Microsoft has released a PowerShell script to safely gather mail forwarding rules and custom forms in your mail environment as well as steps to interpret the output. SensePost, whose tool Ruler can be used to carry out malicious rules, forms, and Home Page attacks, has released a tool to detect Ru...
More Information: https://attack.mitre.org/techniques/T1137/003
Technique ID: T1137.004
Name: Office Application Startup: Outlook Home Page
Description: Adversaries may abuse Microsoft Outlook's Home Page feature to obtain persistence on a compromised system. Outlook Home Page is a legacy feature used to customize the presentation of Outlook folders. This feature allows for an internal or external URL to be loaded and presented whenever a folder is opened....
Tactics: Persistence
Platforms Affected: Office 365, Windows
Detection Strategies: Microsoft has released a PowerShell script to safely gather mail forwarding rules and custom forms in your mail environment as well as steps to interpret the output. SensePost, whose tool Ruler can be used to carry out malicious rules, forms, and Home Page attacks, has released a tool to detect Ru...
More Information: https://attack.mitre.org/techniques/T1137/004
Technique ID: T1137.005
Name: Office Application Startup: Outlook Rules
Description: Adversaries may abuse Microsoft Outlook rules to obtain persistence on a compromised system. Outlook rules allow a user to define automated behavior to manage email messages. A benign rule might, for example, automatically move an email to a particular folder in Outlook if it contains specific words from a...
Tactics: Persistence
Platforms Affected: Office 365, Windows
Detection Strategies: Microsoft has released a PowerShell script to safely gather mail forwarding rules and custom forms in your mail environment as well as steps to interpret the output. This PowerShell script is ineffective in gathering rules with modified `PRPRMSGRULEPROVIDER` properties caused by adversaries using ...
More Information: https://attack.mitre.org/techniques/T1137/005
Technique ID: T1548
Name: Abuse Elevation Control Mechanism
Description: Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine. Authorization has to be granted to specific users in ord...
Tactics: Defense Evasion, Privilege Escalation
Platforms Affected: Azure AD, Google Workspace, IaaS, Linux, Office 365, Windows, macOS
Detection Strategies: Monitor the file system for files that have the setuid or setgid bits set. Also look for any process API calls for behavior that may be indicative of Process Injection and unusual loaded DLLs through DLL Search Order Hijacking, which indicate attempts to gain access to higher privileged processes....
More Information: https://attack.mitre.org/techniques/T1548
Technique ID: T1548.005
Name: Abuse Elevation Control Mechanism: Temporary Elevated Cloud Access
Description: Adversaries may abuse permission configurations that allow them to gain temporarily elevated access to cloud resources. Many cloud environments allow administrators to grant user or service accounts permission to request just-in-time access to roles, impersonate other accounts, pass roles onto resources an...
Tactics: Defense Evasion, Privilege Escalation
Platforms Affected: Azure AD, IaaS, Office 365
Detection Strategies: No detection description provided.
More Information: https://attack.mitre.org/techniques/T1548/005
Technique ID: T1484
Name: Domain Policy Modification
Description: Adversaries may modify the configuration settings of a domain to evade defenses and/or escalate privileges in domain environments. Domains provide a centralized means of managing how computer resources (ex: computers, user accounts) can act, and interact with each other, on a network. The policy of the dom...
Tactics: Defense Evasion, Privilege Escalation
Platforms Affected: Azure AD, Windows
Detection Strategies: It may be possible to detect domain policy modifications using Windows event logs. Group policy modifications, for example, may be logged under a variety of Windows event IDs for modifying, creating, undeleting, moving, and deleting directory service objects (Event ID 5136, 5137, 5138, 5139, 5141 ...
More Information: https://attack.mitre.org/techniques/T1484
Technique ID: T1484.002
Name: Domain Policy Modification: Domain Trust Modification
Description: Adversaries may add new domain trusts or modify the properties of existing domain trusts to evade defenses and/or elevate privileges. Domain trust details, such as whether or not a domain is federated, allow authentication and authorization properties to apply between domains for the purpose of accessing s...
Tactics: Defense Evasion, Privilege Escalation
Platforms Affected: Azure AD, Windows
Detection Strategies: Monitor for modifications to domain trust settings, such as when a user or application modifies the federation settings on the domain or updates domain authentication from Managed to Federated via ActionTypes Set federation settings on domain and Set domain authentication. This may also include mo...
More Information: https://attack.mitre.org/techniques/T1484/002
Technique ID: T1211
Name: Exploitation for Defense Evasion
Description: Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vu...
Tactics: Defense Evasion
Platforms Affected: IaaS, Linux, SaaS, Windows, macOS
Detection Strategies: Exploitation for defense evasion may happen shortly after the system has been compromised to prevent detection during later actions for for additional tools that may be brought in and used. Detecting software exploitation may be difficult depending on the tools available. Software exploits may not...
More Information: https://attack.mitre.org/techniques/T1211
Technique ID: T1564
Name: Hide Artifacts
Description: Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have features to hide various artifacts, such as important system files and administrative task execution, to avoid disrupting user work environments and prevent users from changing files or ...
Tactics: Defense Evasion
Platforms Affected: Linux, Office 365, Windows, macOS
Detection Strategies: Monitor files, processes, and command-line arguments for actions indicative of hidden artifacts. Monitor event and authentication logs for records of hidden artifacts being used. Monitor the file system and shell commands for hidden attribute usage.
More Information: https://attack.mitre.org/techniques/T1564
Technique ID: T1564.008
Name: Hide Artifacts: Email Hiding Rules
Description: Adversaries may use email rules to hide inbound emails in a compromised user's mailbox. Many email clients allow users to create inbox rules for various email functions, including moving emails to other folders, marking emails as read, or deleting emails. Rules may be created or modified within email clien...
Tactics: Defense Evasion
Platforms Affected: Google Workspace, Linux, Office 365, Windows, macOS
Detection Strategies: Monitor email clients and applications for suspicious activity, such as missing messages or abnormal configuration and/or log entries. On Windows systems, monitor for creation of suspicious inbox rules through the use of the New-InboxRule and Set-InboxRule PowerShell cmdlets. On MacOS systems, mon...
More Information: https://attack.mitre.org/techniques/T1564/008
Technique ID: T1562
Name: Impair Defenses
Description: Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious...
Tactics: Defense Evasion
Platforms Affected: Containers, IaaS, Linux, Network, Office 365, Windows, macOS
Detection Strategies: Monitor processes and command-line arguments to see if security tools or logging services are killed or stop running. Monitor Registry edits for modifications to services and startup programs that correspond to security tools. Lack of log events may be suspicious. Monitor environment variables and...
More Information: https://attack.mitre.org/techniques/T1562
Technique ID: T1562.007
Name: Impair Defenses: Disable or Modify Cloud Firewall