CyberThreatIntel/Israel/APT/Unknown/26-08-19/Malware analysis 26-08-19.md
2019-09-03 22:36:27 +02:00

3.7 KiB

Malware analysis about unknown Israel APT campaign

Table of Contents

Malware analysis

Initial vector

The initial vector use an SFX executable, who drop a lnk file for the persistence, a vbs file and the docx file for decoys the victim.

alt text

We can also note the multiples possiblities for push the persisitence and options.

alt text

This execute the vbs file for push the persistence in the startup menu, hide it in changing these atributes and launch the persistence (lnk file)

alt text

This download the VB script and execute it by mshta call.

alt text

On the VB code, we can observed that use BITS fonctionality for download by a job the JS script to execute on the victim. Secondly, this check the architecture of the system and execute the correct path of wscript and push the windows out the screen.

JS Backdoor

We can observer that use function for decode the commands with a array of bytes.

alt text

For decode the string , we use the next function used by the backdoor for decode the commands.

alt text

You can now change the encoded commands.

alt text

alt text

Cyber kill chain

The process graph resume the cyber kill chain used by the attacker.

alt text

Cyber Threat Intel

References MITRE ATT&CK Matrix

List of all the references with MITRE ATT&CK Matrix
Enterprise tactics Technics used Ref URL

Indicators Of Compromise (IOC)

List of all the Indicators Of Compromise (IOC)
Indicator Description
Domain requested
IP requested
HTTP/HTTPS requests
IP C2
Domain C2
Original tweet: https://twitter.com/Timele9527/status/1166188375109296128
Documents: