We hope to capture the general structure of what is reported to have been seen being used by FIN7. Scenarios 1 and 2 share the same infrastructure; however, Scenario 1 was built to exercise detective-only security controls, and thus protective security controls are to be disabled to complete the evaluation. Scenario 2 was built to exercise protective security controls, which may be enabled while completing the evaluation.
The requirements described herein should be considered a bare minimum to execute the scenario. If you have the time and resources to remain true-to-form, you may elect to stand up multiple of each of these servers, non-contiguous IP space, etc. If you are not concerned with emulating FIN7 to this degree, this level of effort is not necessary. You could for instance, phish, serve payload, and exfil from/to the same server.
Please note that binary executable files hosted in Resources have been added to password protected zip files. The password for these files is "malware."
We provide a script to automatically decrypt these files:
$ cd fin7
$ python3 Resources/utilities/crypt_executables.py -i ./ -p malware --decrypt
Note, there is no change of infrastructure between Scenario 1 and Scenario 2.
-
Attacker Desktop: tested and executed on Ubuntu 20.04 LTS
- Remote Desktop Client
-
Linux Attack Platform: tested and executed on Kali Linux 2019.1
-
Windows Attack Platform: Windows 10 SQL Server 2019 Build 17763
-
Optional - Windows 10: Windows 10 Client build 18363
- Note, this Windows 10 machine was used ONLY in the event debugging needed to occur during an evaluation.
This methodology assumes the following static IP address configurations:
Red Team System | IP Address |
---|---|
Linux Attack Platform | 192.168.0.4 |
Windows Attack Platform | 192.168.0.6 |
-
This evaluation utilizes a combination of modified open-source and custom utilities that are representative of FIN7 malware.
-
These utilities include credential dumpers, and variants of process injection techniques.
-
Some pre-compiled payloads are available in the resources directory; however, they are configured to connect back to static IP address 192.168.0.4.
-
Binaries that are not pre-compiled have compilation instructions included, e.g. for
AccountingIQ.exe
-
If you would like to build the payloads yourself, please make the necessary adjustments to the payload source to match your environment.
- Download the FIN7 Adversary Emulation Library to the home directory
-
Disable firewall in CMD
netsh advfirewall set allprofiles state off
-
Setup the MSSQL Database using
dbsetup.bat
4 targets, all domain joined:
-
Domain Controller: tested and executed on Windows Server 2k19 - Build 17763.
-
Accounting Manager Workstation: tested and executed on Windows 10 - Build 18363.
-
Hotel Manager: tested and executed on Windows 10 - Build 18363.
-
IT Admin: tested and executed on Windows 10 - Build 18363.
Target System | Hostname |
---|---|
Domain Controller | hoteldc |
Hotel Manager Workstation | hotelmanager |
IT Admin Workstation | itadmin |
Accounting Workstation | accounting |
-
If only testing detection capabilities, disable Windows Defender
The
set-defender.ps1
PowerShell script in the setup folder can be used to perform this.
-
If only testing detection capabilities, disable Windows Defender
The
set-defender.ps1
PowerShell script in the setup folder can be used to perform this. -
Disable OLE Security to enable execution of initial access payload
The
set-OLEsecurity.ps1
PowerShell script in the setup folder can be used to perform this. -
Add a static ARP entry for
itadmin
:-
In a CMP prompt, grab the name of the interface that connects
hotelmanager
to the domaincmd > netsh int ipv4 show interfaces
-
Use this interface name to set a static ARP entry
cmd > netsh interface ipv4 set neighbors Interface="[Interface Name]" address=<itadmin_ip> neighbor=12-34-56-78-9a-bc
-
-
If only testing detection capabilities, disable Windows Defender
The
set-defender.ps1
PowerShell script in the setup folder can be used to perform this. -
Set ACLs to allow full control for everyone on the
C:\Windows\SysWOW64
directoryThe
set-acl-syswow64.ps1
PowerShell script in the setup folder can be used to perform this.
-
If only testing detection capabilities, disable Windows Defender
The
set-defender.ps1
PowerShell script in the setup folder can be used to perform this. -
Compile
AccountingIQ.exe
using the instructions found here -
Place
AccountingIQ.exe
inC:\Users\Public
-
Add
AccountingIQ.exe
to the Registry Run keyREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Dummy Accounting Program" /t REG_SZ /F /D "C:\Users\Public\AccountingIQ.exe"