redcanary.com Open in urlscan Pro
104.198.136.223  Public Scan

Submitted URL: https://redcanary.com/threat-detection-report/techniques/ingress-tool-transfer/%22%7D
Effective URL: https://redcanary.com/threat-detection-report/techniques/ingress-tool-transfer/
Submission: On December 16 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://redcanary.com/

<form method="get" class="search-form" action="https://redcanary.com/" __bizdiag="115" __biza="WJ__"> <svg width="20" height="19" viewBox="0 0 20 19" fill="none" xmlns="http://www.w3.org/2000/svg">
    <line x1="12.8839" y1="12.1161" x2="18.8839" y2="18.1161" stroke="black" stroke-width="2.5"></line>
    <circle cx="7.5" cy="7.5" r="6.25" stroke="black" stroke-width="2.5"></circle>
  </svg> <input id="input-search" class="search-input" name="s" type="text" placeholder="Search" autocomplete="off" autocorrect="off" autocapitalize="off" spellcheck="false"> <input type="submit" class="search-btn" value="Search"></form>

Text Content

Skip Navigation
 

2022 MITRE Engenuity ATT&CK® MDR Evaluations are live See the results

Get a Demo
2022Threat Detection Report
Demo
 * Trends
 * Threats
 * Techniques
 * Beats
 * Archive
 * Download Report

 * 2022 Threat Detection Report PDF
 * 2022 Executive Summary PDF

 * Intro
 * Past Reports
 * Threats
 * Techniques

 * Introduction
 * Ransomware
 * Supply Chain Compromises
 * Vulnerabilities
 * Affiliates
 * Crypters-as-a-Service
 * Common Webshells

 * User-Initiated Initial Access
 * Malicious macOS Installers
 * Remote Monitoring and Management Abuse
 * Linux Coinminers
 * Abusing Remote Procedure Calls
 * Defense Validation and Testing

 * Top Threats
 * Rose Flamingo
 * Silver Sparrow
 * Bazar
 * Latent Threats
 * Cobalt Strike

 * Impacket
 * SocGholish
 * Yellow Cockatoo
 * Gootkit
 * BloodHound

 * Top Techniques
 * Command and Scripting Interpreter
 * Signed Binary Proxy Execution
 * Windows Management Instrumentation
 * OS Credential Dumping
 * Ingress Tool Transfer

 * Process Injection
 * Scheduled Task/Job
 * Obfuscated Files or Information
 * Masquerading
 * Hijack Execution Flow
 * Impair Defenses

 * Managed Detection and Response
 * Integrations
 * The Red Canary Difference
 * Get a Demo

Named a leader in MDR

 * Atomic Red Team™
 * MDR Everywhere
 * MDR for Microsoft
 * Active Remediation

 * Replace your MSSP
 * Post-Breach Response
 * EDR Deployment
 * EDR Migration
 * Linux Security

 * View All Resources
 * Blog
 * Guides & Overviews
 * Case Studies
 * Videos
 * Webinars
 * Events
 * Customer Help Center

Blog

Sharpen your skills with the latest information, security articles, and
insights.

 * Overview
 * Incident Response
 * Insurance & Risk
 * Managed Service Providers
 * Solution Providers
 * Technology Partners

Red Canary Partner Connect

Apply to become a partner.

 * About Us
 * News & Press
 * Careers - We're Hiring!
 * Contact Us
 * Trust Center and Security

Contact Us

How can we help you? Reach out to our team and we'll get in touch.

 * Liner Notes
 * Side 1: Trends
 * Side 2: Threats
 * Bonus Tracks: Techniques

 * Trends
      Trends
    * Introduction
    * Ransomware
    * Supply Chain Compromises
    * Vulnerabilities
    * Affiliates
    * Crypters-as-a-Service
    * Common Web Shells
    * User-Initiated Initial Access
    * Malicious macOS Installers
    * Remote Monitoring and Management Abuse
    * Linux coinminers
    * Abusing remote procedure calls
    * Defense validation and testing

 * Threats
      Threats
    * Top Threats
    * Rose Flamingo
    * Silver Sparrow
    * Bazar
    * Latent threats
    * Cobalt Strike
    * Impacket
    * SocGholish
    * Yellow Cockatoo
    * Gootkit
    * BloodHound

 * Techniques
      Techniques
    * Top Techniques
    * Command and Scripting Interpreter
    * Signed Binary Proxy Execution
    * Windows Management Instrumentation
    * OS Credential Dumping
    * Ingress Tool Transfer
    * Process Injection
    * Scheduled Task/Job
    * Obfuscated Files or Information
    * Masquerading
    * Hijack Execution Flow
    * Impair Defenses

 * Beats
 * Archive
 * Download Report
      Download Report
    * 2022 Threat Detection Report PDF
    * 2022 Executive Summary PDF

 
Share
 
 
 
 
 
 
 
 
 


TECHNIQUE T1105


INGRESS TOOL TRANSFER

The process for an adversary bringing their own tools into an environment is
known as ingress tool transfer, and it’s a perennial mainstay in our annual
ATT&CK technique rankings.

Pairs with this song


#5

TECHNIQUE RANK


20.4%

PERCENT OF CUSTOMERS AFFECTED


1,256

TOTAL THREAT VOLUME

 * Analysis
 * Visibility
 * Collection
 * Detection
 * Testing

 

THREAT SOUNDS

Like Dylan going electric, some adversaries pivot from “living-off-the-land”
techniques and drop their own tools on a victim system.




ANALYSIS


WHY DO ADVERSARIES USE INGRESS TOOL TRANSFER?

Note: Ingress Tool Transfer has no sub-techniques.

Administrative tooling and other native operating system binaries offer
adversaries a rich array of functionalities that are ripe for abuse. While an
adversary can accomplish many of their objectives by living off the land, they
often require non-native tooling to perform post-exploitation activity and
accomplish their goals. The process for bringing their own tools into an
environment is known as ingress tool transfer.


HOW DO ADVERSARIES USE INGRESS TOOL TRANSFER?

One way to organize the many variations on ingress tool transfer is to split the
activity into two distinct but broad categories:

 * transferral via native Windows binaries
 * transferral via third-party tooling

Many native system binaries enable adversaries to make external network
connections and download executables, scripts, and other binaries. In fact, we
observe adversaries leveraging native system binaries to perform ingress tool
transfer far more often than not. This is a major part of the reason that we
commonly observe the Ingress Tool Transfer technique in tandem with other ATT&CK
techniques. As such, we’ll spend the bulk of this section explaining how
adversaries abuse legitimate executables for ingress tool transfer.

However, we’ll start with a brief examination of non-native software that
adversaries use to transfer tools—hopefully setting the stage for why native
tooling is an appealing choice. Almost all command and control (C2) frameworks
provide support for uploading and downloading files. Despite this, adversaries
frequently choose to abuse native binaries to retrieve additional tools and
payloads. There are many nuanced reasons why an adversary might choose a system
binary over a C2 functionality, but it mostly boils down to blending in. For
example, while it might be highly suspicious for a C2-related process to reach
out to an external network address and pull down a binary, it could be
completely normal for a legitimate system process to do the same.

Beyond C2 tools, it’s not unusual to see adversaries using remote monitoring and
management (RMM) tools to perform ingress tool transfer. RMM software can be
problematic for an adversary though, as defenders can simply block the use of
tools that aren’t permitted in their environment, which is precisely why
adversaries often resort to renaming such tools.

PowerShell is, by a wide margin, the system binary that we detect adversaries
leveraging most frequently for ingress tool transfer. Some other common culprits
include BITSAdmin, CertUtil, cURL, Wget, WScript, and CScript.

Another native system binary commonly abused by adversaries is BITSAdmin.
BITSAdmin is a utility that manages BITS jobs (Windows Background Intelligent
Transfer Service), primarily for the purpose of downloading Windows Updates, but
adversaries use it to download arbitrary files.

The LOLBAS project is a great resource and searchable database that’s mapped to
ATT&CK and documents native binaries, scripts, and libraries that adversaries
abuse. You can examine a full list of binaries that are used for ingress tool
transfer here.




VISIBILITY

 

Note: The visibility sections in this report are mapped to MITRE ATT&CK data
sources and components.

Nearly any attack involves some level of ingress tool transfer, so it’s
critically important that you have the telemetry necessary to observe and detect
it. Luckily, there’s no shortage of data sources offering visibility into this
technique, and many of the data sources below can be drawn out of EDR and other
widely available security tools.

PROCESS MONITORING

Since ingress tool transfer typically involves the use of system processes,
process monitoring is among the most important data sources for detecting it.
However, unless you’re looking for known malicious or banned processes, you’ll
want to build your detection analytics such that process names are supplemented
by command-line arguments, file modifications, DLL module loads, and network
connections.

COMMAND-LINE MONITORING

As is almost always the case, command-line arguments are among the best
telemetry for observing and detecting adversaries loading malicious tools into
your environment, particularly when used in concert with process monitoring and
other data sources. Beyond detection, command lines may also serve as a pivotal
point for investigation, especially in cases where something like a PowerShell
or cURL command line includes URLs used to host remote content for download and
execution.

NETWORK CONNECTIONS

Network connection telemetry is a great source of enrichment data for detecting
ingress tool transfer. While network connections offer fleeting value on their
own, they’re extremely valuable in combination with process and command-line
monitoring. Almost by definition, if you’re dealing with an adversary who is
performing ingress tool transfer, an external network connection is happening
somewhere.




COLLECTION

 

Note: The collection sections of this report showcase specific log sources from
Windows events, Sysmon, and elsewhere that you can use to collect relevant
security information.

SYSMON EVENT ID 1: PROCESS CREATION

The process creation event offers a wealth of information that security teams
can use for detection, specifically via the following fields:

 * ProcessId
 * ProcessGuid
 * Image
 * Commandline
 * CurrentDirectory
 * ParentProcessGuid
 * ParentProcessId
 * ParentCommandLine

As is the case with a commercial EDR product, we can leverage the above to
identify what process executed, the process that spawned it, and the commands or
arguments that executed in conjunction with it.

SYSMON EVENT ID 3: NETWORK CONNECTION

Though they are disabled by default, network connection events offer a variety
of log data that you can use to investigate or detect suspicious ingress tool
transfers. While network connections aren’t particularly useful on their own,
they’re useful in conjunction with other data, and Event ID 3 collects all of
the following:

 * ProcessGuid
 * ProcessId
 * Image
 * Protocol
 * SourceIP
 * DestinationIP
 * DestinationHostname
 * DestinationPort

SYSMON EVENT ID 11: FILE CREATE

By definition, ingress tool transfers require the creation of files on an
endpoint, and file creation events are populated whenever a file is created or
overwritten. Since processes constantly create temp files during normal
activity, Event ID 11 can be incredibly noisy without thoughtful tuning.
However, you can use Event ID 11 to track the file creation history of processes
that adversaries frequently abuse (like those listed in the analysis section
above). Consider limiting collection to oft-abused processes, directories where
adversaries tend to drop malware (AppData\Temp or C:\Users\Public, for example),
or specific file extension types like image files, executables, DLLs, and
scripts. Event fields of interest are:

 * ProcessId
 * ProcessGuid
 * Image
 * TargetFileName

SYSMON EVENT ID 22: DNS EVENT

This is a newer event in Sysmon, but it can provide useful visibility into
systems that may be communicating with C2 servers. According to Microsoft, this
event will create a log whenever a process executes a DNS query, regardless of
whether it succeeds or fails, cached or not. Logs from Event ID 22 offer
additional network telemetry that can be incredibly useful in conjunction with
the Event ID 3 logs listed above:

 * ProcessGuid
 * ProcessId
 * QueryName
 * QueryStatus
 * QueryResult
 * Image

WINDOWS SECURITY EVENT ID 4688: PROCESS CREATION

Process Creation (4688) events with command-line argument logging enabled is a
great native source of telemetry for observing ingress tool transfer. A good
understanding of baseline process relationships in your environment will help
combat potential false positive alerts.




DETECTION

We have 65 distinct detection analytics mapped to Ingress Tool Transfer,
offering defense in depth against this technique. Some of these analytics look
for high-impact, low-prevalence threats and rarely generate events, but there
are a few relatively simple ones that can offer great value with little effort.

Note: These detection analytics may require tuning.

SUSPICIOUS POWERSHELL COMMANDS

As we explained in the analysis section, adversaries leverage PowerShell for
ingress tool transfer more than any other tool. As such, monitoring for
PowerShell process execution in conjunction with suspicious PowerShell commands
in the command line can be a fruitful way to detect malicious ingress tool
transfers. The following pseudo-analytic is derived from several Red Canary
detectors that collectively triggered on 1,000 confirmed malicious,
high-severity threats in 2021 alone:

process == powershell.exe
&& 
command_line_includes ('downloadstring' || 'downloadata' || 'downloadfile')

If you want to test your ability to operationalize the above detection analytic,
try running either of the following Atomic Red Team tests:

 * T1105 atomic test #10: PowerShell Download
 * T1105 atomic test #15: File Download via PowerShell

CERTUTIL DOWNLOADING MALICIOUS BINARIES

Adversaries often bypass security controls by using the Windows Certificate
Utility (certutil.exe) to download malicious code. In general, they leverage
certutil.exe along with the -split command-line option. We’ve observed this
behavior firsthand in detections associated with TA551, while other researchers
have tied it to trojans like Astaroth as well. The following detection logic
should catch this variety of ingress tool transfer:

process == certutil.exe 
&& 
command_line_includes ('urlcache' && 'split')

If you want to test your ability to operationalize the above detection analytic,
try running either of the following Atomic Red Team tests:

 * T1105: atomic test #7: CertUtil download (urlcache)
 * T1105 atomic test #8: CertUtil download (verifyctl)

BITSADMIN DOWNLOADING MALICIOUS BINARIES

As we explained in the analysis section, it’s not unusual for adversaries,
including ones who peddle ransomware, to use BITSAdmin to download arbitrary
files from the internet in an effort to evade application blocklisting. The
following analytic will look for the execution of bitsadmin.exe with command
options that suggest a file is being downloaded:

process== bitsadmin.exe 
&& 
command_line_includes (download' || 'transfer')

If you want to test your ability to operationalize the above detection analytic,
try running the following Atomic Red Team test:

 * T1105 atomic test #9: BITSAdmin BITS Download


WEEDING OUT FALSE POSITIVES

The majority of the telemetry patterns above can also manifest in development
pipelines and system management tools. Given this, baselining is highly
recommended due to the volume some sources will provide. Additionally, you may
want to do an environment audit and figure out if these potentially suspicious
behaviors are being employed by any legitimate tools or people in your
environment. Once you understand legitimate use cases, you can tune those out as
exceptions and focus your detection efforts on seeking out behaviors that are
more likely to represent malicious instances of ingress tool transfer.




TESTING

Start testing your defenses against Ingress Tool Transfer using Atomic Red
Team—an open source testing framework of small, highly portable detection tests
mapped to MITRE ATT&CK.

GETTING STARTED

View atomic tests for T1105: Ingress Tool Transfer. In most environments, these
should be sufficient to generate a useful signal for defenders.

RUN THIS TEST ON A WINDOWS SYSTEM USING POWERSHELL:

(New-Object Net.WebClient).DownloadString('https://raw.githubusercontent.com/redcanaryco/atomic-red-team/4042cb3433bce024e304500dcfe3c5590571573a/LICENSE.txt') | Out-File LICENSE.txt; Invoke-Item LICENSE.txt

What to expect

The above test will download a file to LICENSE.txt and display it with
notepad.exe. For safety purposes, the command only downloads and displays text
rather than downloading and executing executable content.

USEFUL TELEMETRY WILL INCLUDE:

VisibilityTelemetryCollectionVisibility :

Process monitoring

Telemetry:

A powershell.exe and notepad.exe process will start.

Collection :

EDR, Sysmon Events ID 1, and Windows Event ID 4688 should collect relevant
telemetry.

Visibility :

Command monitoring

Telemetry:

Command-line logging will capture the context of what is executed.

Collection :

EDR, Sysmon Event ID 1, and Windows Event ID 4688 should collect relevant
telemetry.

Visibility :

Network monitoring

Telemetry:

A connection to
https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/LICENSE.txt
is made.

Collection :

EDR and Sysmon Event IDs 3 and 22 should collect relevant telemetry.

Visibility :

File monitoring

Telemetry:

powershell.exe will write LICENSE.txt to the current directory.

Collection :

EDR and Sysmon Event ID 11 should collect relevant telemetry.

REVIEW AND REPEAT

Now that you have executed one or several common tests and checked for the
expected results, it’s useful to answer some immediate questions:

 * Were any of your actions detected?
 * Were any of your actions blocked or prevented?
 * Were your actions visible in logs or other defensive telemetry?

Repeat this process, performing additional tests related to this technique. You
can also create and contribute tests of your own.

LSASS Memory
Process Injection
 


SEE WHAT IT'S LIKE TO HAVE A SECURITY ALLY.

EXPERIENCE THE DIFFERENCE BETWEEN A SENSE OF SECURITY AND ACTUAL SECURITY.

Get a Demo
 * 
 * 
 * 


 * What We Do
   * Managed Detection and Response
   * Integrations
   * The Red Canary Difference
   * Get a Demo
 * Solutions
   * Atomic Red Team™
   * MDR Everywhere
   * MDR for Microsoft
   * Active Remediation
   * Replace your MSSP
   * Post-Breach Response
   * EDR Deployment
   * EDR Migration
   * Linux Security
   * Alert Triage
 * Resources
   * View all Resources
   * Blog
   * Guides & Overviews
   * Case Studies
   * Videos
   * Webinars
   * Events
   * Customer Help Center
   * Newsletter
 * Partners
   * Overview
   * Incident Response
   * Insurance & Risk
   * Managed Service Providers
   * Solution Providers
   * Technology Partners
   * Apply to Become a Partner
 * Company
   * About Us
   * News & Press
   * Careers – We’re Hiring!
   * Contact Us
   * Trust Center and Security

© 2014-2022 Red Canary. All rights reserved. info@redcanary.com +1 855-977-0686
Privacy Policy Trust Center and Security

 

 
 

 
Our website uses cookies to provide you with a better browsing experience. More
information can be found in our Privacy Policy.
X
Privacy & Cookies Policy
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these cookies, the cookies that are categorized as necessary
are stored on your browser as they are essential for the working of basic
functionalities...
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
This category only includes cookies that ensures basic functionalities and
security features of the website. These cookies do not store any personal
information.
Non-necessary
Non-necessary
Any cookies that may not be particularly necessary for the website to function
and is used specifically to collect user personal data via analytics, ads, other
embedded contents are termed as non-necessary cookies. It is mandatory to
procure user consent prior to running these cookies on your website.
SAVE & ACCEPT


Back to Top