redcanaryco / atomic-red-team

Small and highly portable detection tests based on MITRE's ATT&CK.
MIT License
9.56k stars 2.77k forks source link

Pipe Creation - PsExec Tool Execution From Suspicious Locations #2869

Closed Pavanrpatil1306 closed 1 month ago

Pavanrpatil1306 commented 1 month ago

Requires PsExec tool installed. BlackCat Ransomware tried to propagate by creating pipe using PsExec process executing from suspicious locations (In the particular case the legitimate PsExec executable is embedded within the Windows variant and is dropped in the victim’s %TEMP% directory). Upon successful execution, PsExec will be executed from suspicious location and create a new pipe to execute CMD.