#
Scenario 2 Infrastructure
We hope to capture the general structure of what is reported to have been seen being used by FIN7. Scenarios 1 and 2 share the same infrastructure; however, Scenario 1 was built to exercise detective-only security controls, and thus protective security controls are to be disabled to complete the evaluation. Scenario 2 was built to exercise protective security controls, which may be enabled while completing the evaluation.
The requirements described herein should be considered a bare minimum to execute the scenario. If you have the time and resources to remain true-to-form, you may elect to stand up multiple of each of these servers, non-contiguous IP space, etc. If you are not concerned with emulating FIN7 to this degree, this level of effort is not necessary. You could for instance, phish, serve payload, and exfil from/to the same server.
#
Resources
Please note that binary executable files hosted in Resources have been added to password protected zip files. The password for these files is "malware."
We provide a script to automatically decrypt these files:
cd fin7
python3 Resources/utilities/crypt_executables.py -i ./ -p malware --decrypt
Note, there is no change of infrastructure between Scenario 1 and Scenario 2.
#
Emulation Team Infrastructure
Attacker Desktop: tested and executed on Ubuntu 20.04 LTS
- Remote Desktop Client
Linux Attack Platform: tested and executed on Kali Linux 2019.1
Windows Attack Platform: Windows 10 SQL Server 2019 Build 17763
Optional - Windows 10: Windows 10 Client build 18363
- Note, this Windows 10 machine was used ONLY in the event debugging needed to occur during an evaluation.
#
Emulation Team Infrastructure Configuration
This methodology assumes the following static IP address configurations:
#
A note about red team payloads
This evaluation utilizes a combination of modified open-source and custom utilities that are representative of FIN7 malware.
These utilities include credential dumpers, and variants of process injection techniques.
Some pre-compiled payloads are available in the resources directory; however, they are configured to connect back to static IP address 192.168.0.4.
Binaries that are not pre-compiled have compilation instructions included, e.g. for
AccountingIQ.exe
If you would like to build the payloads yourself, please make the necessary adjustments to the payload source to match your environment.
#
Linux Attack Platform Setup
- Download the FIN7 ATTACK Evaluations Library to the home directory
#
Windows Attack Platform Setup
Disable firewall in CMD
netsh advfirewall set allprofiles state off
Setup the MSSQL Database using
dbsetup.bat
#
Target Infrastructure
4 targets, all domain joined:
Domain Controller: tested and executed on Windows Server 2k19 - Build 17763.
Accounting Manager Workstation: tested and executed on Windows 10 - Build 18363.
Hotel Manager: tested and executed on Windows 10 - Build 18363.
IT Admin: tested and executed on Windows 10 - Build 18363.
#
Target Infrastructure Configuration
#
Domain Controller Setup
If only testing detection capabilities, disable Windows Defender
The
set-defender.ps1
PowerShell script in the setup folder can be used to perform this.
#
Hotel Manager Workstation Setup
If only testing detection capabilities, disable Windows Defender
The
set-defender.ps1
PowerShell script in the setup folder can be used to perform this.Disable OLE Security to enable execution of initial access payload
The
set-OLEsecurity.ps1
PowerShell script in the setup folder can be used to perform this.Add a static ARP entry for
itadmin
:In a CMP prompt, grab the name of the interface that connects
hotelmanager
to the domaincmd > netsh int ipv4 show interfaces
Use this interface name to set a static ARP entry
cmd > netsh interface ipv4 set neighbors Interface="[Interface Name]" address=<itadmin_ip> neighbor=12-34-56-78-9a-bc
#
IT Admin Workstation Setup
If only testing detection capabilities, disable Windows Defender
The
set-defender.ps1
PowerShell script in the setup folder can be used to perform this.Set ACLs to allow full control for everyone on the
C:\Windows\SysWOW64
directoryThe
set-acl-syswow64.ps1
PowerShell script in the setup folder can be used to perform this.
#
Accounting Workstation Setup
If only testing detection capabilities, disable Windows Defender
The
set-defender.ps1
PowerShell script in the setup folder can be used to perform this.Compile
AccountingIQ.exe
using the instructions found herePlace
AccountingIQ.exe
inC:\Users\Public
Add
AccountingIQ.exe
to the Registry Run keyREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Dummy Accounting Program" /t REG_SZ /F /D "C:\Users\Public\AccountingIQ.exe"