What is the primary goal of the ‘Initial Access’ tactic [TA0001]?
To gain an initial foothold within a target network.
Besides social engineering, what are two other techniques for gaining Initial Access?
Exploiting public-facing services and supply-chain compromise.
What is the most prevalent technique used for Initial Access?
Social engineering attacks such as phishing.
Mariusz Banach’s phishing taxonomy is represented as DELIVERY(CONTAINER(_____ + PAYLOAD + DECOY)).
TRIGGER
In the phishing taxonomy, what does the ‘Delivery’ component represent?
The technique used to deliver the package to the victim.
In the phishing taxonomy, what does the ‘Container’ component represent?
The container format used to package the files.
In the phishing taxonomy, what does the ‘Trigger’ component represent?
The means to trigger payload execution.
In the phishing taxonomy, what does the ‘Payload’ component represent?
The malicious code to be executed.
In the phishing taxonomy, what does the ‘Decoy’ component represent?
A file displayed to the victim to maintain the social engineering pretext.
In the Lumma Stealer campaign example, what file type was disguised as a PDF to trick victims?
A Windows shortcut (.lnk) file.
The LNK files in the Lumma Stealer campaign were weaponized to download malicious content using what Windows utility?
mshta
What should the file type of a decoy be if the trigger was disguised as a PDF?
The decoy should also be a PDF document to continue the pretext.
What is DLL hijacking?
A technique used to force a legitimate application into loading a malicious DLL by abusing the Windows DLL search order.
In the simplified Windows DLL search order, what is the first location an application checks for a DLL?
The directory the application is in.
What Process Monitor filter settings can be used to find DLL hijacking opportunities?
Set the path to end in ‘.dll’ and the result to be ‘NAME NOT FOUND’.
What is DLL side-loading in the context of the Windows Component Store?
It is a form of DLL hijacking that leverages old, vulnerable application versions stored in C:\Windows\WinSxS.
What is the original purpose of the Windows Component Store (WinSxS)?
To support side-by-side assemblies, allowing multiple versions of the same dependencies to exist on a system.
In the ngentask.exe side-loading example, which DLL was it attempting to load from the current working directory?
mscorsvc.dll
What is the purpose of using a custom AppDomainManager for .NET applications?
To force a .NET Framework application into loading a malicious DLL, regardless of the standard search order.
To create a custom AppDomainManager, your class must inherit from what base class?
AppDomainManager
What are the two environment variables used to load a custom AppDomainManager into a .NET application?
APPDOMAIN_MANAGER_ASM and APPDOMAIN_MANAGER_TYPE.
Besides environment variables, how else can a custom AppDomainManager be loaded into a .NET application?
By specifying the ‘appDomainManagerAssembly’ and ‘appDomainManagerType’ elements in a .config file.
What file extension is used for Windows Installer packages?
.msi
In a Visual Studio Setup Project for an MSI, how do you make the payload execute during installation?
By adding the payload file as a Custom Action in the ‘Install’ step.