###### The initial PE extract the fake document and a second PE which create a Run key as persistence, extract the legit ESET 5 RAT and the hijacking dll and shellcode to execute (by folder permissions).
###### Here, we can see the persistence (Run key) for the dropper.
###### This use the RichEdit function for push the data on the documentused as leur for decoy the victims.
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/China/APT/Unknown/20-08-19/Images/Loader/RichEdit.png "Use RichEdit for drop the document")
###### Once this did, this executes it and waits for the command of the attacker.
### ESET Remote Administrator <aname="ESET-Remote-Administrator"></a>
###### The new PE file is ESET Remote Administrator, we can see the verification of the validation of the certificate.
###### This load after the xml configuration for the global parameters on the ESET software, this manage the service of the RAT and the status if need it.
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/China/APT/Unknown/20-08-19/Images/eset/config.png "Configuration RAT ESET")
###### All this things prove the utilisation of the legit RAT tool of ESET at the malicious usage by the attackers.
### Hijacking DLL <a name="Hijacking-DLL"></a>
###### The dll prepare the shellcode with a localAlloc (content in the dat file).
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/China/APT/Unknown/20-08-19/Images/hijack/alloc.png "Allocation in DLL")
### After push it in the memory, this protect it with a Virtualprotect.
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/China/APT/Unknown/20-08-19/Images/hijack/virtualprotect.png "Virtualprotect in DLL")
### We can see all the events on do by the hijacking DLL.
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/China/APT/Unknown/20-08-19/Images/hijack/command.PNG "Resume action in the DLL")
###### The malware is as well-know RAT, PlugX current used since 2012 on the Chinese APT group.The domain used as C2 is based in Canada by the cloud provider GoDaddy.
###### This operation is done by the Chinese APT group(s) after the visit of the U.S. National Security Advisor in Mongolia about the national security concept.
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/China/APT/Unknown/20-08-19/Images/USvisit.png "US visit in Mongolia")
###### The document are a compiled of muliple documents about the national security concept available on the web.
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/China/APT/Unknown/20-08-19/Images/Liks.PNG "Document on the web")
###### The others samples are leurs against Jaish group who have recently infiltrate Kashmir. Pakistan and China cooperate against the Jaish Association who have increased since the attack foiled in November 2018 against the Chinese consulate. This infiltration on the Jaish group on the Kashmir has give all the cyberattacks who have analysed and military deployments observed by [d-atis](https://twitter.com/detresfa_) between Pakistan, India and China since the last 2 months.
## Indicators Of Compromise (IOC) <a name="IOC"></a>
| Indicator | Description|
| ------------- |:-------------:|
|c3159d4f85ceb84c4a0f7ea9208928e729a30ddda4fead7ec6257c7dd1984763|NATIONAL SECURITY CONCEPT OF MONGOLIA.exe|
* [DSR & CSR of Special Branch Sind](https://app.any.run/tasks/755521b5-f008-4ab1-95c1-cfe93fb58f1e)
###### Documents: <a name="Documents"></a>
* [The U.S. National Security Advisor pays visit to Mongolia](https://montsame.mn/en/read/194438)
* [Meet the Karachi policewoman who foiled terrorist attack on Chinese consulate](https://www.indiatoday.in/world/story/karachi-policewoman-suhai-aziz-talpur-chinese-consulate-terror-attack-1394871-2018-11-23)
* [Policewoman who defended Chinese consulate in Karachi commended for her courage](https://www.scmp.com/news/asia/south-asia/article/2174762/policewoman-who-defended-chinese-consulate-karachi-commended)
* [5 Jaish terrorists infiltrate Kashmir, high alert sounded in valley](https://www.indiatoday.in/india/story/jaish-terrorists-infiltrate-kashmir-alert-valley-1576321-2019-08-02)