keepmeon


Upon making a Lateral Movement to the ATSSERVER host as the awallace user, I found out that the current user has access to the previously undiscovered directory; C:\Program Files\keepmeon

PS C:\Users\jmorgan\Documents> Invoke-Command -ComputerName ATSSERVER -Credential $Cred -ConfigurationName dc_manage -ScriptBlock {ls "C:\Program Files\keepmeon"}
 
 
    Directory: C:\Program Files\keepmeon
 
 
Mode                 LastWriteTime         Length Name                               PSComputerName                    
----                 -------------         ------ ----                               --------------                    
-a----        21/12/2021     14:57            128 keepmeon.bat                       ATSSERVER                         

The directory contains a single batch script; keepmeon.bat

PS C:\Users\jmorgan\Documents> Invoke-Command -ComputerName ATSSERVER -Credential $Cred -ConfigurationName dc_manage -ScriptBlock {cat "C:\Program Files\keepmeon\keepmeon.bat"}
 
REM This is run every 5 minutes. For Lois use ONLY
@echo off
 for /R x" == "%~0" call "%%x"
)

This batch script recursively searches for all files with the .bat extension in the current directory and its subdirectories. For each .bat file found, it checks if the file is not the same as the batch script itself (denoted by %~0). If the file is not the same as the running batch script, it calls and executes that file.

The batch script claims to be running periodically with an interval of 5 minutes and there is a mention of Lois

Lois was mentioned in the Word document file earlier; New_Starter_CheckList_v7.pdf In the current context, Lois is likely referred to the lhopkins user It also shows that only Lois can become site admin

Site_Admin


PS C:\Users\jmorgan\Documents> Invoke-Command -ComputerName ATSSERVER -Credential $Cred -ConfigurationName dc_manage -ScriptBlock {net group /DOMAIN}
 
Group Accounts for \\
 
-------------------------------------------------------------------------------
*Cloneable Domain Controllers
*DnsUpdateProxy
*Domain Admins
*Domain Computers
*Domain Controllers
*Domain Guests
*Domain Users
*Enterprise Admins
*Enterprise Key Admins
*Enterprise Read-only Domain Controllers
*Group Policy Creator Owners
*Key Admins
*Managers
*Protected Users
*Read-only Domain Controllers
*Schema Admins
*Site_Admin
The command completed with one or more errors.

It turns out that site admin is referred to the actual Site_Admin domain group

PS C:\Users\jmorgan\Documents> Invoke-Command -ComputerName ATSSERVER -Credential $Cred -ConfigurationName dc_manage -ScriptBlock {net group /DOMAIN Site_Admin}
 
Group name     Site_Admin
Comment        Only in the event of emergencies is this to be populated. This has access to Domain Admin group
 
Members
 
-------------------------------------------------------------------------------
The command completed successfully.

Looking further into the Site_Admin group, it’s described in the Comment section that the Site_Admin group has access to the Domain Admins group. While this is rather ambiguous as it does not specify what type of access that is, I’d assume that it would be some kind of write access

Overall, this appears to be the way to DA Moving on to Privilege Escalation phase