misp-circl-feed/feeds/circl/stix-2.1/58a1dcbc-4d5c-4267-995a-498b950d210f.json

247 lines
13 KiB
JSON
Raw Normal View History

2023-04-21 14:44:17 +00:00
{
"type": "bundle",
"id": "bundle--58a1dcbc-4d5c-4267-995a-498b950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:24:57.000Z",
"modified": "2017-02-13T16:24:57.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--58a1dcbc-4d5c-4267-995a-498b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:24:57.000Z",
"modified": "2017-02-13T16:24:57.000Z",
"name": "OSINT - Fileless attacks against enterprise networks",
"published": "2017-02-13T16:26:24Z",
"object_refs": [
"x-misp-attribute--58a1dccd-daf4-4847-aea2-4516950d210f",
"observed-data--58a1dcd8-3694-48b8-bf09-1736950d210f",
"url--58a1dcd8-3694-48b8-bf09-1736950d210f",
"indicator--58a1dcf6-b3b8-486a-92a0-4409950d210f",
"x-misp-attribute--58a1dd3e-6e5c-49cc-8633-4e9a950d210f",
"x-misp-attribute--58a1dd3f-2958-4b90-bbe9-466d950d210f",
"x-misp-attribute--58a1dd3f-27b8-4e77-a37c-4b53950d210f",
"x-misp-attribute--58a1dd40-2d50-4602-8cc5-41ad950d210f",
"x-misp-attribute--58a1dd8a-27c0-48aa-bc97-4f4a950d210f",
"x-misp-attribute--58a1dd8b-9f78-4e2c-bd9c-450b950d210f",
"x-misp-attribute--58a1dd8c-c65c-4794-a21a-4a38950d210f",
"x-misp-attribute--58a1ddd9-4a80-400e-94b3-4c00950d210f"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"circl:topic=\"finance\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58a1dccd-daf4-4847-aea2-4516950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:20:29.000Z",
"modified": "2017-02-13T16:20:29.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "text",
"x_misp_value": "During incident response, a team of security specialists needs to follow the artefacts that attackers have left in the network. Artefacts are stored in logs, memories and hard drives. Unfortunately, each of these storage media has a limited timeframe when the required data is available. One reboot of an attacked computer will make memory acquisition useless. Several months after an attack the analysis of logs becomes a gamble because they are rotated over time. Hard drives store a lot of needed data and, depending on its activity, forensic specialists may extract data up to a year after an incident. That\u00e2\u20ac\u2122s why attackers are using anti-forensic techniques (or simply SDELETE) and memory-based malware to hide their activity during data acquisition. A good example of the implementation of such techniques is Duqu2. After dropping on the hard drive and starting its malicious MSI package it removes the package from the hard drive with file renaming and leaves part of itself in the memory with a payload. That\u00e2\u20ac\u2122s why memory forensics is critical to the analysis of malware and its functions. Another important part of an attack are the tunnels that are going to be installed in the network by attackers. Cybercriminals (like Carbanak or GCMAN) may use PLINK for that. Duqu2 used a special driver for that. Now you may understand why we were very excited and impressed when, during an incident response, we found that memory-based malware and tunnelling were implemented by attackers using Windows standard utilities like \u00e2\u20ac\u0153SC\u00e2\u20ac\u009d and \u00e2\u20ac\u0153NETSH\u00e2\u20ac\u0153."
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--58a1dcd8-3694-48b8-bf09-1736950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:21:58.000Z",
"modified": "2017-02-13T16:21:58.000Z",
"first_observed": "2017-02-13T16:21:58Z",
"last_observed": "2017-02-13T16:21:58Z",
"number_observed": 1,
"object_refs": [
"url--58a1dcd8-3694-48b8-bf09-1736950d210f"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\"",
"osint:source-type=\"blog-post\"",
"admiralty-scale:source-reliability=\"c\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--58a1dcd8-3694-48b8-bf09-1736950d210f",
"value": "https://securelist.com/blog/research/77403/fileless-attacks-against-enterprise-networks/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--58a1dcf6-b3b8-486a-92a0-4409950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:21:10.000Z",
"modified": "2017-02-13T16:21:10.000Z",
"pattern": "[rule msf_or_tunnel_in_registry\r\n{\r\nstrings:\r\n $port_number_in_registry = \u00e2\u20ac\u0153/4444\u00e2\u20ac\u009d\r\n $hidden_powershell_in_registry = \u00e2\u20ac\u0153powershell.exe -nop -w hidden\u00e2\u20ac\u009d wide \r\ncondition:\r\n\tuint32(0)==0x66676572 and any of them\r\n}]",
"pattern_type": "yara",
"valid_from": "2017-02-13T16:21:10Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"yara\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58a1dd3e-6e5c-49cc-8633-4e9a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:22:22.000Z",
"modified": "2017-02-13T16:22:22.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"Antivirus detection\""
],
"x_misp_category": "Antivirus detection",
"x_misp_type": "text",
"x_misp_value": "MEM:Trojan.Win32.Cometer"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58a1dd3f-2958-4b90-bbe9-466d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:22:23.000Z",
"modified": "2017-02-13T16:22:23.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"Antivirus detection\""
],
"x_misp_category": "Antivirus detection",
"x_misp_type": "text",
"x_misp_value": "MEM:Trojan.Win32.Metasploit"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58a1dd3f-27b8-4e77-a37c-4b53950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:22:23.000Z",
"modified": "2017-02-13T16:22:23.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"Antivirus detection\""
],
"x_misp_category": "Antivirus detection",
"x_misp_type": "text",
"x_misp_value": "Trojan.Multi.GenAutorunReg.c"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58a1dd40-2d50-4602-8cc5-41ad950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:22:24.000Z",
"modified": "2017-02-13T16:22:24.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"Antivirus detection\""
],
"x_misp_category": "Antivirus detection",
"x_misp_type": "text",
"x_misp_value": "HEUR:Trojan.Multi.Powecod"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58a1dd8a-27c0-48aa-bc97-4f4a950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:23:38.000Z",
"modified": "2017-02-13T16:23:38.000Z",
"labels": [
"misp:type=\"pattern-in-file\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
],
"x_misp_category": "Artifacts dropped",
"x_misp_comment": "In unallocated space in the Windows registry, the following artefacts might be found:",
"x_misp_type": "pattern-in-file",
"x_misp_value": "powershell.exe -nop -w hidden -e"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58a1dd8b-9f78-4e2c-bd9c-450b950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:23:39.000Z",
"modified": "2017-02-13T16:23:39.000Z",
"labels": [
"misp:type=\"pattern-in-file\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
],
"x_misp_category": "Artifacts dropped",
"x_misp_comment": "In unallocated space in the Windows registry, the following artefacts might be found:",
"x_misp_type": "pattern-in-file",
"x_misp_value": "10.10.1.12/8080"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58a1dd8c-c65c-4794-a21a-4a38950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:23:40.000Z",
"modified": "2017-02-13T16:23:40.000Z",
"labels": [
"misp:type=\"pattern-in-file\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
],
"x_misp_category": "Artifacts dropped",
"x_misp_comment": "In unallocated space in the Windows registry, the following artefacts might be found:",
"x_misp_type": "pattern-in-file",
"x_misp_value": "10.10.1.11/4444"
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--58a1ddd9-4a80-400e-94b3-4c00950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2017-02-13T16:24:57.000Z",
"modified": "2017-02-13T16:24:57.000Z",
"labels": [
"misp:type=\"text\"",
"misp:category=\"Artifacts dropped\""
],
"x_misp_category": "Artifacts dropped",
"x_misp_type": "text",
"x_misp_value": "To find the host used by an attacker using the technique described for remote connections and password collection, the following paths in the Windows registry should be analyzed:\r\n\r\nHKLM\\SYSTEM\\ControlSet001\\services\\ \u00e2\u20ac\u201c path will be modified after using the SC utility\r\nHKLM\\SYSTEM\\ControlSet001\\services\\PortProxy\\v4tov4\\tcp \u00e2\u20ac\u201c path will be modified after using the NETSH utility"
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}