MITRE ATT&CK TTPs
- TA0007 - Discovery
Requirements
- Valid Active Directory domain credentials
Summary
Upon the enrollment of a client to SCCM, default directories are created where SCCM client specific debugging logs can be stored. The log files contain details about deployments, hostnames related to SCCM servers, and other relevant information. These log files can be enumerated simply by using the command and control file browser. Default defensive telemetry isn’t usually generated upon the access of these SCCM log directories unless custom auditing is enabled. Log files located on the SCCM-enrolled clients will typically originate from the following directories:C:\Windows\CCM\LogsC:\Windows\ccmcacheC:\Windows\ccmsetup
C:\Windows\CCM\Logs directory is one of the most useful from an enumeration perspective, as it contains the SCCM server names in multiple logs:
C:\Windows\CCM\Logs\StatusAgent.logC:\Windows\CCM\Logs\LocationServices.logC:\Windows\CCM\Logs\DataTransferService.logC:\Windows\CCM\Logs\ClientServicing.logC:\Windows\CCM\Logs\CcmNotificationAgent.logC:\Windows\CCM\Logs\CcmMessaging.logC:\Windows\CCM\Logs\CcmEval.log
HKLM:\SOFTWARE\Microsoft\SMS\DP\ManagementPoints will enumerate the Distribution Points and Management Points for that particular SCCM-enrolled client. Defenders will typically have some default auditing aimed at accessing the registry.
Impact
- Profiling site servers is a supplementary step in building potential attack paths
- A resolved DP role can be a target for PXE abuse to recover domain credentials detailed in CRED-1
- A resolved DP role can be a target for sensitive information hunting in the Content Library
- A resolved MP role can be a target for spoofing client enrollment CRED-2
- A resolved MP site system role can be used to elevate privileges via credential relay attacks ELEVATE-1
Defensive IDs
Examples
Use SharpSCCM to enumerate local SCCM log files containing UNC paths:SCCM-Enrolled Client
HKLM:\SOFTWARE\Microsoft\SMS\DP registry key:
References
- Chris Thompson, SharpSCCM