Dark Mode

Settings

Capec-561 Detail

Windows Admin Shares with Stolen Credentials

Detailed Software

Parents: 653

Threats: T71 T75 T279 T283 T385 T388 T398 T402

Description

An adversary guesses or obtains (i.e. steals or purchases) legitimate Windows administrator credentials (e.g. userID/password) to access Windows Admin Shares on a local machine or within a Windows domain.

Extended Description

Windows systems within the Windows NT family contain hidden network shares that are only accessible to system administrators. These shares allow administrators to remotely access all disk volumes on a network-connected system and further allow for files to be copied, written, and executed, along with other administrative actions. Example network shares include: C$, ADMIN$ and IPC$. If an adversary is able to obtain legitimate Windows credentials, the hidden shares can be accessed remotely, via server message block (SMB) or the Net utility, to transfer files and execute code. It is also possible for adversaries to utilize NTLM hashes to access administrator shares on systems with certain configuration and patch levels.
External ID Source Link Description
CAPEC-561 capec https://capec.mitre.org/data/definitions/561.html
CWE-522 cwe http://cwe.mitre.org/data/definitions/522.html
CWE-308 cwe http://cwe.mitre.org/data/definitions/308.html
CWE-309 cwe http://cwe.mitre.org/data/definitions/309.html
CWE-294 cwe http://cwe.mitre.org/data/definitions/294.html
CWE-263 cwe http://cwe.mitre.org/data/definitions/263.html
CWE-262 cwe http://cwe.mitre.org/data/definitions/262.html
CWE-521 cwe http://cwe.mitre.org/data/definitions/521.html
T1021.002 ATTACK https://attack.mitre.org/wiki/Technique/T1021/002 Remote Services:SMB/Windows Admin Shares
REF-577 reference_from_CAPEC https://support.microsoft.com/en-us/help/842715/overview-of-problems-that-may-occur-when-administrative-shares-are-mis Overview of problems that may occur when administrative shares are missing, 2017--03---13, Microsoft Corporation
REF-578 reference_from_CAPEC https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/march/apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns/ Rob Smallridge, HAPT15 is alive and strong: An analysis of RoyalCli and RoyalDNS, 2018--03---10, NCC Group
REF-579 reference_from_CAPEC https://cdn2.hubspot.net/hubfs/3354902/Cybereason%20Labs%20Analysis%20Operation%20Cobalt%20Kitty.pdf Assaf Dahan, Operation Cobalt Kitty: Cybereason Labs Analysis, 2017, CyberReason
Explore
  1. Acquire known Windows administrator credentials: The adversary must obtain known Windows administrator credentials in order to access the administrative network shares.

  2. Techniques
    An adversary purchases breached Windows administrator credentials from the dark web.
    An adversary leverages a key logger or phishing attack to steal administrator credentials as they are provided.
    An adversary conducts a sniffing attack to steal Windows administrator credentials as they are transmitted.
    An adversary gains access to a Windows domain system/files and exfiltrates Windows administrator password hashes.
    An adversary examines outward-facing configuration and properties files to discover hardcoded Windows administrator credentials.
Experiment
  1. Attempt domain authentication: Try each Windows administrator credential against the hidden network shares until the target grants access.

  2. Techniques
    Manually or automatically enter each administrator credential through the target's interface.
Exploit
  1. Malware Execution: An adversary can remotely execute malware within the administrative network shares to infect other systems within the domain.

  2. Data Exfiltration: The adversary can remotely obtain sensitive data contained within the administrative network shares.

  1. The system/application is connected to the Windows domain.
  2. The target administrative share allows remote use of local admin credentials to log into domain systems.
  3. The adversary possesses a list of known Windows administrator credentials that exist on the target domain.
  1. A list of known Windows administrator credentials for the targeted domain.
Low
Once an adversary obtains a known Windows credential, leveraging it is trivial.
Integrity Authorization Access Control Authentication Confidentiality
Modify Data Read Data Gain Privileges Gain Privileges Gain Privileges
Read Data
  1. APT32 has leveraged Windows' built-in Net utility to use Windows Administrative Shares to copy and execute remote malware. [REF-579]
  2. In May 2017, APT15 laterally moved within a Windows domain via Windows Administrative Shares to copy files to and from compromised host systems. This further allowed for the remote execution of malware. [REF-578]