S0677 AADInternals
AADInternals is a PowerShell-based framework for administering, enumerating, and exploiting Azure Active Directory. The tool is publicly available on GitHub.32
Item | Value |
---|---|
ID | S0677 |
Associated Names | |
Type | TOOL |
Version | 1.2 |
Created | 01 February 2022 |
Last Modified | 15 April 2023 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1087 | Account Discovery | - |
enterprise | T1087.004 | Cloud Account | AADInternals can enumerate Azure AD users.2 |
enterprise | T1098 | Account Manipulation | - |
enterprise | T1098.005 | Device Registration | AADInternals can register a device to Azure AD.2 |
enterprise | T1651 | Cloud Administration Command | AADInternals can execute commands on Azure virtual machines using the VM agent.6 |
enterprise | T1526 | Cloud Service Discovery | AADInternals can enumerate information about a variety of cloud services, such as Office 365 and Sharepoint instances or OpenID Configurations.2 |
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.001 | PowerShell | AADInternals is written and executed via PowerShell.2 |
enterprise | T1136 | Create Account | - |
enterprise | T1136.003 | Cloud Account | AADInternals can create new Azure AD users.2 |
enterprise | T1484 | Domain Policy Modification | - |
enterprise | T1484.002 | Domain Trust Modification | AADInternals can create a backdoor by converting a domain to a federated domain which will be able to authenticate any user across the tenant. AADInternals can also modify DesktopSSO information.25 |
enterprise | T1048 | Exfiltration Over Alternative Protocol | AADInternals can directly download cloud user data such as OneDrive files.2 |
enterprise | T1606 | Forge Web Credentials | - |
enterprise | T1606.002 | SAML Tokens | AADInternals can be used to create SAML tokens using the AD Federated Services token signing certificate.2 |
enterprise | T1589 | Gather Victim Identity Information | - |
enterprise | T1589.002 | Email Addresses | AADInternals can check for the existence of user email addresses using public Microsoft APIs.27 |
enterprise | T1590 | Gather Victim Network Information | - |
enterprise | T1590.001 | Domain Properties | AADInternals can gather information about a tenant’s domains using public Microsoft APIs.27 |
enterprise | T1556 | Modify Authentication Process | - |
enterprise | T1556.006 | Multi-Factor Authentication | The AADInternals Set-AADIntUserMFA command can be used to disable MFA for a specified user. |
enterprise | T1556.007 | Hybrid Identity | AADInternals can inject a malicious DLL (PTASpy ) into the AzureADConnectAuthenticationAgentService to backdoor Azure AD Pass-Through Authentication.4 |
enterprise | T1112 | Modify Registry | AADInternals can modify registry keys as part of setting a new pass-through authentication agent.2 |
enterprise | T1003 | OS Credential Dumping | - |
enterprise | T1003.004 | LSA Secrets | AADInternals can dump secrets from the Local Security Authority.2 |
enterprise | T1069 | Permission Groups Discovery | - |
enterprise | T1069.003 | Cloud Groups | AADInternals can enumerate Azure AD groups.2 |
enterprise | T1566 | Phishing | - |
enterprise | T1566.002 | Spearphishing Link | AADInternals can send “consent phishing” emails containing malicious links designed to steal users’ access tokens.2 |
enterprise | T1598 | Phishing for Information | - |
enterprise | T1598.003 | Spearphishing Link | AADInternals can send phishing emails containing malicious links designed to collect users’ credentials.2 |
enterprise | T1528 | Steal Application Access Token | AADInternals can steal users’ access tokens via phishing emails containing malicious links.2 |
enterprise | T1649 | Steal or Forge Authentication Certificates | AADInternals can create and export various authentication certificates, including those associated with Azure AD joined/registered devices.2 |
enterprise | T1558 | Steal or Forge Kerberos Tickets | - |
enterprise | T1558.002 | Silver Ticket | AADInternals can be used to forge Kerberos tickets using the password hash of the AZUREADSSOACC account.2 |
enterprise | T1552 | Unsecured Credentials | - |
enterprise | T1552.001 | Credentials In Files | AADInternals can gather unsecured credentials for Azure AD services, such as Azure AD Connect, from a local machine.2 |
enterprise | T1552.004 | Private Keys | AADInternals can gather encryption keys from Azure AD services such as ADSync and Active Directory Federated Services servers.2 |
Groups That Use This Software
ID | Name | References |
---|---|---|
G0016 | APT29 | 8 |
References
-
Dr. Nestori Syynimaa. (2018, October 25). AADInternals. Retrieved February 1, 2022. ↩
-
Dr. Nestori Syynimaa. (2018, October 25). AADInternals. Retrieved February 18, 2022. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Dr. Nestori Syynimaa. (2021, December 13). AADInternals. Retrieved February 1, 2022. ↩
-
Dr. Nestori Syynimaa. (2020, July 13). Unnoticed sidekick: Getting access to cloud as an on-prem admin. Retrieved September 28, 2022. ↩
-
Dr. Nestori Syynimaa.. (2017, November 16). Security vulnerability in Azure AD & Office 365 identity federation. Retrieved February 1, 2022. ↩
-
Dr. Nestori Syynimaa. (2020, June 4). Getting root access to Azure VMs as a Azure AD Global Administrator. Retrieved March 13, 2023. ↩
-
Dr. Nestori Syynimaa. (2020, June 13). Just looking: Azure Active Directory reconnaissance as an outsider. Retrieved February 1, 2022. ↩↩
-
Microsoft Threat Intelligence Center. (2021, October 25). NOBELIUM targeting delegated administrative privileges to facilitate broader attacks. Retrieved March 25, 2022. ↩