T1070 - Indicator Removal#
Adversaries may delete or modify artifacts generated within systems to remove evidence of their presence or hinder defenses. Various artifacts may be created by an adversary or something that can be attributed to an adversary’s actions. Typically these artifacts are used as defensive indicators related to monitored events, such as strings from downloaded files, logs that are generated from user actions, and other data analyzed by defenders. Location, format, and type of artifact (such as command or login history) are often specific to each platform.
Removal of these indicators may interfere with event collection, reporting, or other processes used to detect intrusion activity. This may compromise the integrity of security solutions by causing notable events to go unreported. This activity may also impede forensic analysis and incident response, due to lack of sufficient data to determine what occurred.
Atomic Tests#
Atomic Test #1 - Indicator Removal using FSUtilManages the update sequence number (USN) change journal, which provides a persistent log of all changes made to files on the volume. Upon execution, no output#
will be displayed. More information about fsutil can be found at https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/fsutil-usn
Supported Platforms: windows
Elevation Required (e.g. root or admin)#### Attack Commands: Run with command_prompt
fsutil usn deletejournal /D C:
Invoke-AtomicTest T1070 -TestNumbers 1
Cleanup:#
fsutil usn createjournal m=1000 a=100 c:
Invoke-AtomicTest T1070 -TestNumbers 1 -Cleanup
Atomic Test #2 - Indicator Manipulation using FSUtilFinds a file by user name (if Disk Quotas are enabled), queries allocated ranges for a file, sets a file’s short name, sets a file’s valid data length, sets zero data for a file, or creates a new file. Upon execution, no output#
will be displayed. More information about fsutil can be found at https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/fsutil-file
https://tria.ge/230601-x8x6bsgb24/behavioral2 Supported Platforms: windows Elevation Required (e.g. root or admin)#### Attack Commands: Run with
powershell
if (-not (Test-Path "PathToAtomicsFolder\..\ExternalPayloads\T1070-2.txt")) { New-Item "PathToAtomicsFolder\..\ExternalPayloads\T1070-2.txt" -Force }
echo "1234567890" > "PathToAtomicsFolder\..\ExternalPayloads\T1070-2.txt"
fsutil file setZeroData offset=0 length=10 "PathToAtomicsFolder\..\ExternalPayloads\T1070-2.txt"
Invoke-AtomicTest T1070 -TestNumbers 2
Cleanup:#
rm "PathToAtomicsFolder\..\ExternalPayloads\T1070-2.txt"
Invoke-AtomicTest T1070 -TestNumbers 2 -Cleanup
Detection#
File system monitoring may be used to detect improper deletion or modification of indicator files. Events not stored on the file system may require different detection mechanisms.
Shield Active Defense#
Admin Access#
Modify a user’s administrative privileges.
Changing the target system to allow or disallow users to perform tasks requiring administrator level permissions gives the defender leverage in inhibiting or facilitating attacks. The procedures for changing these permissions vary across different operating and software systems.
Opportunity#
In an adversary engagement scenario, there is an opportunity to allow or restrict admin access to support your defensive objectives.
Use Case#
A defender can restrict admin access to force an adversary to escalate privileges in order to delete logs and captured artifacts from a system.
Procedures#
Remove an account’s administrative access from a system or service to require an adversary to reveal techniques for elevating privileges in order to accomplish certain tasks. Grant an account administrative access to a system or service to enable an adversary to take advantage of those privileges if they compromise the system or service.