From 8327cf6893573a941b18437c585ebf13f63c542a Mon Sep 17 00:00:00 2001
From: StrangerealIntel <54320855+StrangerealIntel@users.noreply.github.com>
Date: Mon, 11 Nov 2019 00:34:02 +0100
Subject: [PATCH] Update analysis.md
---
North Korea/APT/Lazarus/23-10-19/analysis.md | 49 +++++++++++++++++---
1 file changed, 43 insertions(+), 6 deletions(-)
diff --git a/North Korea/APT/Lazarus/23-10-19/analysis.md b/North Korea/APT/Lazarus/23-10-19/analysis.md
index d7c5e6c..2e496a4 100644
--- a/North Korea/APT/Lazarus/23-10-19/analysis.md
+++ b/North Korea/APT/Lazarus/23-10-19/analysis.md
@@ -888,24 +888,60 @@ function PulsetoC2($rid)
The process graphs resume cyber kill chains used by the attacker in the differents incidents
- Powershell agents
-
+
- HAL incident
-
+
- Nuclear's plant incident
-
-
-
References MITRE ATT&CK Matrix
List of all the references with MITRE ATT&CK Matrix
-
+CES 2020
|Enterprise tactics|Technics used|Ref URL|
| :---------------: |:-------------| :------------- |
+|Persistence|T1179 - Hooking|https://attack.mitre.org/wiki/Technique/T1179|
+|Privilege Escalation|T1179 - Hooking
T1055 - Process Injection|https://attack.mitre.org/wiki/Technique/T1179
https://attack.mitre.org/wiki/Technique/T1055|
+|Defense Evasion|T1112 - Modify Registry
T1055 - Process Injection|https://attack.mitre.org/wiki/Technique/T1112
https://attack.mitre.org/wiki/Technique/T1055|
+|Credential Access|T1179 - Hooking|https://attack.mitre.org/wiki/Technique/T1179|
+|Discovery|T1010 - Application Window Discovery
T1082 - System Information Discovery
T1124 - System Time Discovery|https://attack.mitre.org/wiki/Technique/T1010
https://attack.mitre.org/wiki/Technique/T1082
https://attack.mitre.org/wiki/Technique/T1124|
+|Collection|T1115 - Clipboard Data|https://attack.mitre.org/wiki/Technique/T1115|
+ HAL
+|Enterprise tactics|Technics used|Ref URL|
+| :---------------: |:-------------| :------------- |
+|Execution|Rundll32|https://attack.mitre.org/techniques/T1085/|
+|Persistence|Registry Run Keys / Startup Folder|https://attack.mitre.org/techniques/T1060/|
+|Defense Evasion|Rundll32|https://attack.mitre.org/techniques/T1085/|
+|Discovery|Query Registry|https://attack.mitre.org/techniques/T1012/|
+ Powershell backdoor
+|Enterprise tactics|Technics used|Ref URL|
+| :---------------: |:-------------| :------------- |
+|Execution|Scripting
PowerShell|https://attack.mitre.org/techniques/T1064/
https://attack.mitre.org/techniques/T1086/|
+|Defense Evasion|Scripting|https://attack.mitre.org/techniques/T1064/|
+|Discovery|Account Discovery
System Information Discovery
System Time Discovery
Query Registry|https://attack.mitre.org/techniques/T1087/
https://attack.mitre.org/techniques/T1082/
https://attack.mitre.org/techniques/T1124/
https://attack.mitre.org/techniques/T1012/|
+|Collection|Data from Local System https://attack.mitre.org/techniques/T1005/|
+|Command And Control|Data Encoding|https://attack.mitre.org/techniques/T1132/|
+|Exfiltration|Data Encrypted|https://attack.mitre.org/techniques/T1022/|
+
+ MacOS backdoor
+|Enterprise tactics|Technics used|Ref URL|
+| :---------------: |:-------------| :------------- |
+|Execution|Scripting|https://attack.mitre.org/techniques/T1064/|
+|Defense Evasion|Scripting|https://attack.mitre.org/techniques/T1064/|
+|Discovery|Account Discovery
System Information Discovery
System Time Discovery
Query Registry|https://attack.mitre.org/techniques/T1087/
https://attack.mitre.org/techniques/T1082/
https://attack.mitre.org/techniques/T1124/
https://attack.mitre.org/techniques/T1012/|
+|Collection|Data from Local System https://attack.mitre.org/techniques/T1005/|
+|Command And Control|Data Encoding|https://attack.mitre.org/techniques/T1132/|
+|Exfiltration|Data Encrypted|https://attack.mitre.org/techniques/T1022/|
+
+DTrack
+|Enterprise tactics|Technics used|Ref URL|
+| :---------------: |:-------------| :------------- |
+|Execution|Command-Line Interface|https://attack.mitre.org/techniques/T1059/|
+|Defense Evasion|Disabling Security Tools|https://attack.mitre.org/techniques/T1089/|
+|Discovery|System Network Configuration Discovery
System Network Connections Discovery
Process Discovery|https://attack.mitre.org/techniques/T1016/
https://attack.mitre.org/techniques/T1049/
https://attack.mitre.org/techniques/T1057/|
Indicators Of Compromise (IOC)
List of all the Indicators Of Compromise (IOC)
@@ -1006,6 +1042,7 @@ function PulsetoC2($rid)
* [CES2020 참관단.hwp](https://app.any.run/tasks/31be34b3-4d72-4831-8b76-6dfebe729b84)
* [B578CCF307D55D3267F98349E20ECFF1.dll](https://app.any.run/tasks/a766e70e-b07f-4a59-80fb-b18597d85b08)
* [a0664ac662802905329ec6ab3b3ae843f191e6555b707f305f8f5a0599ca3f68.exe](https://app.any.run/tasks/6396ddf7-4000-4ffb-92ea-bc33612ec8c0)
+* [dtrack.exe](https://app.any.run/tasks/239f222b-4916-4bda-b185-91885d5f9a54)
External analysis: