Update Malware analysis 06-08-19.md
This commit is contained in:
parent
9888c144b1
commit
26105a30cf
@ -12,20 +12,45 @@
|
|||||||
+ [Original Tweet](#Original-Tweet)
|
+ [Original Tweet](#Original-Tweet)
|
||||||
+ [Link Anyrun](#Links-Anyrun)
|
+ [Link Anyrun](#Links-Anyrun)
|
||||||
+ [Ref previous analysis](#Documents)
|
+ [Ref previous analysis](#Documents)
|
||||||
|
|
||||||
## Malware-analysis <a name="Malware-analysis"></a>
|
## Malware-analysis <a name="Malware-analysis"></a>
|
||||||
### Initial vector <a name="Malware-analysis"></a>
|
### Initial vector <a name="Initial-vector"></a>
|
||||||
###### The SFX archive executes a runas for get a bypass of UAC elevation, once this done, this show a fake window of Word with riche020.dll method. Define the language of thread in Russian.
|
###### The SFX archive executes for get system informations and the architecture in using the function GetNativeSystemInfo and Getsysteminfo who are using for know the good parameters for the SFX installer.
|
||||||
This drops the cmd file and the both PE as txt file, a trace of a capacity to extract a Ink file can observed, a similar sample which has used this.
|
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Russia/APT/Gamaredon/06-08-19/Images/RAR/Info.PNG "Get the native informations on the computer")
|
||||||
Its create the vbs and ps1 file by redirection of the console output, a schedule task as persistence and execute the files.
|
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Russia/APT/Gamaredon/06-08-19/Images/RAR/InfoSys.PNG "Get the system informations on the computer")
|
||||||
We can see on the obfuscated strings, that some patterns have been generated and randomized by a DOS obfuscate tool. The vbs file check the version of Word and disable some security features. The powershell file send the reconnaissance informations on the C2.
|
|
||||||
Like observed with muddywater, this repeats until the group edit a URL with the next payload if the target is interesting. This check the connectivity to internet by requesting the DNS of Google and use the shellscript.exe for try to download by the edited URL.
|
###### Once this done, this show a fake window of Word in using riche020.dll method. Define the language of thread in Russian.The execution of the code is do in another thread who run the malicious parts in the background.
|
||||||
This PE file uses the OpenSSL, SMTP, FTP and various algorithms libraries in C, this a compiled version of Wget. The C2 is host by a provider in Russia.This seems be a sample of the campaign of Gamaredon group in June 2018 by the very similar TTPs.
|
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Russia/APT/Gamaredon/06-08-19/Images/RAR/Window.png "Window details")
|
||||||
This version of Wget is used on many campaigns of this group since 2017.
|
|
||||||
|
###### We can observe a trace of a capacity to extract a lnk file which are used in a similar sample.
|
||||||
|
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Russia/APT/Gamaredon/06-08-19/Images/RAR/LNKFILE.png "lnk")
|
||||||
|
|
||||||
|
###### This drops the cmd file and PE file as txt file in the temp folder with a random name.
|
||||||
|
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Russia/APT/Gamaredon/06-08-19/Images/RAR/CMDextractfile.png "Extract cmd file")
|
||||||
|
|
||||||
|
##### Finally, this execute by call shell and runas the cmd file.
|
||||||
|
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Russia/APT/Gamaredon/06-08-19/Images/RAR/runas.png "Runas capacity")
|
||||||
|
|
||||||
|
### Bat and powershell script <a name="Bat"></a>
|
||||||
|
|
||||||
|
###### Its create the vbs and ps1 file by redirection of the console output, a schedule task as persistence and execute the files.
|
||||||
|
|
||||||
|
###### We can see on the obfuscated strings, that some patterns have been generated and randomized by a DOS obfuscate tool. The vbs file check the version of Word and disable some security features. The powershell file send the reconnaissance informations on the C2.
|
||||||
|
###### Like observed with muddywater, this repeats until the group edit a URL with the next payload if the target is interesting.
|
||||||
|
|
||||||
|
### Final PE <a name="PE"></a>
|
||||||
|
###### This check the connectivity to internet by requesting the DNS of Google and use the shellscript.exe for try to download by the edited URL.
|
||||||
|
###### This PE file uses the OpenSSL, SMTP, FTP and various algorithms libraries in C, this a compiled version of Wget.
|
||||||
|
###### This version of Wget is used on many campaigns of this group since 2017.
|
||||||
|
|
||||||
### Cyber kill chain <a name="Cyber-kill-chain"></a>
|
### Cyber kill chain <a name="Cyber-kill-chain"></a>
|
||||||
|
|
||||||
###### The process graph resume the cyber kill chain used by the attacker.
|
###### The process graph resume the cyber kill chain used by the attacker.
|
||||||
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Russia/APT/Gamaredon/06-08-19/Images/cyber.png "Cyber kill chain")
|
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Russia/APT/Gamaredon/06-08-19/Images/cyber.png "Cyber kill chain")
|
||||||
|
|
||||||
|
## Cyber Threat Intel<a name="Cyber-Threat-Intel"></a>
|
||||||
|
|
||||||
|
###### The C2 is host by a provider in Russia.This seems be a sample of the campaign of Gamaredon group in June 2018 by the very similar TTPs.
|
||||||
## References MITRE ATT&CK Matrix <a name="Ref-MITRE-ATTACK"></a>
|
## References MITRE ATT&CK Matrix <a name="Ref-MITRE-ATTACK"></a>
|
||||||
###### List of all the references with MITRE ATT&CK Matrix
|
###### List of all the references with MITRE ATT&CK Matrix
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user