misp-circl-feed/feeds/circl/misp/124008c0-e519-4f1d-b1fd-bd42bfae2198.json

1652 lines
844 KiB
JSON
Raw Normal View History

2023-12-14 13:47:04 +00:00
{
2023-12-14 14:30:15 +00:00
"Event": {
"analysis": "2",
"date": "2023-12-06",
"extends_uuid": "",
"info": "MAR-10478915-1.v1 Citrix Bleed",
"publish_timestamp": "1701849510",
"published": true,
"threat_level_id": "3",
"timestamp": "1701849487",
"uuid": "124008c0-e519-4f1d-b1fd-bd42bfae2198",
"Orgc": {
"name": "CIRCL",
"uuid": "55f6ea5e-2c60-40e5-964f-47a8950d210f"
},
"Tag": [
{
"colour": "#004646",
"local": "0",
"name": "type:OSINT",
"relationship_type": ""
},
{
"colour": "#0071c3",
"local": "0",
"name": "osint:lifetime=\"perpetual\"",
"relationship_type": ""
},
{
"colour": "#ffffff",
"local": "0",
"name": "tlp:white",
"relationship_type": ""
},
{
"colour": "#ffffff",
"local": "0",
"name": "tlp:clear",
"relationship_type": ""
},
{
"colour": "#0088cc",
"local": "0",
"name": "misp-galaxy:mitre-attack-pattern=\"Exploit Public-Facing Application - T1190\"",
"relationship_type": ""
}
],
"Attribute": [
{
"category": "Payload installation",
"comment": "This file is a Windows batch file called a.bat that is used to execute the file called a.exe with the file called a.dll as an argument. The output is printed to a file named 'z.txt' located in the path C:\\Windows\\Tasks. Next, a.bat pings the loop back internet protocol (IP) address 127.0.0[.]1 three times. \r\n\r\nThe next command it runs is reg save to save the HKLM\\SYSTEM registry hive into the C:\\Windows\\tasks\\em directory. Again, a.bat pings the loop back address 127.0.0[.]1 one time before executing another reg save command and saves the HKLM\\SAM registry hive into the C:\\Windows\\Task\\am directory. Next, a.bat runs three makecab commands to create three Cabinet (.cab) files from the previously mentioned saved registry hives and one file named C:\\Users\\Public\\a.png. The names of the .cab files are as follows:\r\n\r\n--Start names and paths of .cab files created--\r\nc:\\windows\\tasks\\em.cab\r\nc:\\windows\\tasks\\am.cab\r\nc:\\windows\\tasks\\a.cab\r\n--End names and paths of .cab files created--",
"deleted": false,
"disable_correlation": false,
"first_seen": "2023-11-16T14:40:15.681862+00:00",
"timestamp": "1695739347",
"to_ids": true,
"type": "yara",
"uuid": "5c12b30f-2ece-411a-a2b6-905006a34587",
"value": "'namespace'='CISA_Consolidated.yara' rule_name=CISA_10478915_01 rule_content=rule CISA_10478915_01 : trojan installs_other_components\n{\n\tmeta:\n\t\tauthor = \"CISA Code & Media Analysis\"\n\t\tincident = \"10478915\"\n\t\tdate = \"2023-11-06\"\n\t\tlast_modified = \"20231108_1500\"\n\t\tactor = \"n/a\"\n\t\tfamily = \"n/a\"\n\t\tcapabilities = \"installs-other-components\"\n\t\tmalware_Type = \"trojan\"\n\t\ttool_type = \"information-gathering\"\n\t\tdescription = \"Detects trojan .bat samples\"\n\t\tsha256 = \"98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9\"\n\tstrings:\n\t\t$s1 = { 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 7a 2e 74 78 74 }\n\t\t$s2 = { 72 65 67 20 73 61 76 65 20 68 6b 6c 6d 5c 73 79 73 74 65 6d 20 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 65 6d }\n\t\t$s3 = { 6d 61 6b 65 63 61 62 20 63 3a 5c 75 73 65 72 73 5c 70 75 62 6c 69 63 5c 61 2e 70 6e 67 20 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 61 2e 63 61 62 }\n\tcondition:\n\t\tall of them\n}"
},
{
"category": "Payload installation",
"comment": "This file is a 64-bit Windows command-line executable called a.exe that is executed by a.bat. This file issues the Remote Procedure Call (RPC) ncalrpc:[lsasspirpc] to the RPC end point to provide a file path to the LSASS on the infected machine. Once the file path is returned, the malware loads the accompanying DLL file called a.dll into the running LSASS process. If the DLL is correctly loaded, then the malware outputs the message \"[*]success\" in the console.",
"deleted": false,
"disable_correlation": false,
"first_seen": "2023-11-16T14:40:15.718020+00:00",
"timestamp": "1695739347",
"to_ids": true,
"type": "yara",
"uuid": "84aeb797-4299-4ef7-b7ae-57f916ee5721",
"value": "'namespace'='CISA_Consolidated.yara' rule_name=CISA_10478915_02 rule_content=rule CISA_10478915_02 : trojan installs_other_components\n{\n\tmeta:\n\t\tauthor = \"CISA Code & Media Analysis\"\n\t\tincident = \"10478915\"\n\t\tdate = \"2023-11-06\"\n\t\tlast_modified = \"20231108_1500\"\n\t\tactor = \"n/a\"\n\t\tfamily = \"n/a\"\n\t\tcapabilities = \"installs-other-components\"\n\t\tmalware_type = \"trojan\"\n\t\ttool_type = \"unknown\"\n\t\tdescription = \"Detects trojan PE32 samples\"\n\t\tsha256 = \"e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068\"\n\tstrings:\n\t\t$s1 = { 57 72 69 74 65 46 69 6c 65 }\n\t\t$s2 = { 41 70 70 50 6f 6c 69 63 79 47 65 74 50 72 6f 63 65 73 73 54 65 72 6d 69 6e 61 74 69 6f 6e 4d 65 74 68 6f 64 }\n\t\t$s3 = { 6f 70 65 72 61 74 6f 72 20 63 6f 5f 61 77 61 69 74 }\n\t\t$s4 = { 43 6f 6d 70 6c 65 74 65 20 4f 62 6a 65 63 74 20 4c 6f 63 61 74 6f 72 }\n\t\t$s5 = { 64 65 6c 65 74 65 5b 5d }\n\t\t$s6 = { 4e 41 4e 28 49 4e 44 29 }\n\tcondition:\n\t\tuint16(0) == 0x5a4d and pe.imphash() == \"6e8ca501c45a9b85fff2378cffaa24b2\" and pe.size_of_code == 84480 and all of them\n}"
},
{
"category": "Payload installation",
"comment": "This file is a 64-bit Windows DLL called a.dll that is executed by a.bat as a parameter for the file a.exe. The file a.exe loads this file into the running LSASS process on the infected machine. The file a.dll calls the Windows API CreateFileW to create a file called a.png in the path C:\\Users\\Public.\r\n\r\nNext, a.dll loads DbgCore.dll then utilizes MiniDumpWriteDump function to dump LSASS process memory to disk. If successful, the dumped process memory is written to a.png. Once this is complete, the file a.bat specifies that the file a.png is used to create the cabinet file called a.cab in the path C:\\Windows\\Tasks.",
"deleted": false,
"disable_correlation": false,
"first_seen": "2023-11-16T14:40:15.777680+00:00",
"timestamp": "1695739347",
"to_ids": true,
"type": "yara",
"uuid": "f6384914-d773-4d7e-b9ed-e1838371c145",
"value": "'namespace'='CISA_Consolidated.yara' rule_name=CISA_10478915_03 rule_content=rule CISA_10478915_03 : trojan steals_authentication_credentials credential_exploitation\n{\n\tmeta:\n\t\tauthor = \"CISA Code & Media Analysis\"\n\t\tincident = \"10478915\"\n\t\tdate = \"2023-11-06\"\n\t\tlast_modified = \"20231108_1500\"\n\t\tactor = \"n/a\"\n\t\tfamily = \"n/a\"\n\t\tcapabilities = \"steals-authentication-credentials\"\n\t\tmalware_type = \"trojan\"\n\t\ttool_type = \"credential-exploitation\"\n\t\tdescription = \"Detects trojan DLL samples\"\n\t\tsha256 = \"17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994\"\n\tstrings:\n\t\t$s1 = { 64 65 6c 65 74 65 }\n\t\t$s2 = { 3c 2f 74 72 75 73 74 49 6e 66 6f 3e }\n\t\t$s3 = { 42 61 73 65 20 43 6c 61 73 73 20 44 65 73 63 72 69 70 74 6f 72 20 61 74 20 28 }\n\t\t$s4 = { 49 6e 69 74 69 61 6c 69 7a 65 43 72 69 74 69 63 61 6c 53 65 63 74 69 6f 6e 45 78 }\n\t\t$s5 = { 46 69 6e 64 46 69 72 73 74 46 69 6c 65 45 78 57 }\n\t\t$s6 = { 47 65 74 54 69 63 6b 43 6f 75 6e 74 }\n\tcondition:\n\t\tuint16(0) == 0x5a4d and pe.subsystem == pe.SUBSYSTEM_WINDOWS_CUI and pe.size_of_code == 56832 and all of them\n}"
},
{
"category": "Payload installation",
"comment": "This file is a Python script called a.py that attempts to leverage WinRM to establish a session. The script attempts to authenticate to the remote machine using NT LAN Manager (NTLM) if the keyword \"hashpasswd\" is present. If the keyword \"hashpasswd\" is not present, then the script attempts to authenticate using basic authentication. Once a WinRM session is established with the remote machine, the script has the ability to execute command line arguments on the remote machine. If there is no command specified, then a default command of \u201cwhoami\u201d is run.",
"deleted": false,
"disable_correlation": false,
"first_seen": "2023-11-16T14:40:15.805722+00:00",
"timestamp": "1695739347",
"to_ids": true,
"type": "yara",
"uuid": "e9f069da-febc-449d-b923-22793ec3f067",
"value": "'namespace'='CISA_Consolidated.yara' rule_name=CISA_10478915_04 rule_content=rule CISA_10478915_04 : backdoor communicates_with_c2 remote_access\n{\n\tmeta:\n\t\tauthor = \"CISA Code & Media Analysis\"\n\t\tincident = \"10478915\"\n\t\tdate = \"2023-11-06\"\n\t\tlast_modified = \"20231108_1500\"\n\t\tactor = \"n/a\"\n\t\tfamily = \"n/a\"\n\t\tcapabilities = \"communicates-with-c2\"\n\t\tmalware_type = \"backdoor\"\n\t\ttool_type = \"remote-access\"\n\t\tdescription = \"Detects trojan python samples\"\n\t\tsha256 = \"906602ea3c887af67bcb4531bbbb459d7c24a2efcb866bcb1e3b028a51f12ae6\"\n\tstrings:\n\t\t$s1 = { 70 6f 72 74 20 3d 20 34 34 33 20 69 66 20 22 68 74 74 70 73 22 } \n\t\t$s2 = { 6b 77 61 72 67 73 2e 67 65 74 28 22 68 61 73 68 70 61 73 73 77 64 22 29 3a }\n\t\t$s3 = { 77 69 6e 72 6d 2e 53 65 73 73 69 6f 6e 20 62 61 73 69 63 20 65 72 72 6f 72 }\n\t\t$s4 = { 57 69 6e 64 77 6f 73 63 6d 64 2e 72 75 6e 5f 63 6d 64 28 73 74 72 28 63 6d 64 29 29 }\n\tcondition:\n\t\tall of them\n}"
}
],
"Object": [
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "dd1e10de-b0f8-4bcf-861b-76fe980f055e",
"ObjectReference": [
{
"comment": "",
"object_uuid": "dd1e10de-b0f8-4bcf-861b-76fe980f055e",
"referenced_uuid": "49552673-c8ea-50b9-a196-4663a33bfae8",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "474accde-9613-4db5-9b81-bbd8ef977b21"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "e56e4026-c332-4ac6-a9f1-c184a5224c56",
"value": "antiy"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "1340405c-0885-4eda-8eab-39e03ad3790d",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "af1bcb04-85d6-4f4e-9422-0599d9c7a43f",
"value": "Trojan/Win64.Malgent"
}
]
},
{
"comment": "",
"deleted": false,
"description": "File object describing a file with meta-information",
"meta-category": "file",
"name": "file",
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
"template_version": "24",
"timestamp": "1695739347",
"uuid": "49552673-c8ea-50b9-a196-4663a33bfae8",
"ObjectReference": [
{
"comment": "",
"object_uuid": "49552673-c8ea-50b9-a196-4663a33bfae8",
"referenced_uuid": "eb408b5c-09b1-449c-9125-d451a8c4ae0d",
2023-12-14 13:47:04 +00:00
"relationship_type": "sample-of",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "08e986ee-eb3d-4c38-b357-a3275fc0d41f"
}
],
"Attribute": [
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "md5",
"timestamp": "1701849221",
"to_ids": true,
"type": "md5",
"uuid": "c60ceff4-f5b3-4dfb-88aa-48b6716cf573",
"value": "37f7241963cf8279f7c1d322086a5194"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha1",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha1",
"uuid": "0d04f15b-9934-4813-95d0-7f5b91e489de",
"value": "ec401ae8ddebef4038cedb65cc0d5ba6c1fdef28"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha256",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha256",
"uuid": "69744516-52c9-4807-8779-5276f4c07b72",
"value": "e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha512",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha512",
"uuid": "61eb4a91-cdaa-46a5-97db-ac9863d4f756",
"value": "02c2473b90ba787fea41a9840c7dc9a9869685ca8fdca3521278e0cc986e1797e36552f41f1ac206f5ec5bdc0ac40f13cd36217aea3aad13518e9764ea92c1f7"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "ssdeep",
"timestamp": "1701849221",
"to_ids": true,
"type": "ssdeep",
"uuid": "9fcb720b-cd58-410f-87c3-eeb4754e6fec",
"value": "3072:u8txkT6wDLf/p3ufznQbCQVlvxxV5hmWIh:NgpDbZufLQpjxJ9U"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "filename",
"timestamp": "1701849221",
"to_ids": true,
"type": "filename",
"uuid": "3c1ce1f8-272f-48d5-9752-956be5b5e8a2",
"value": "a.exe"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "size-in-bytes",
"timestamp": "1701849221",
"to_ids": false,
"type": "size-in-bytes",
"uuid": "969e43c3-50db-4039-b95a-3ee63c96c615",
"value": "145920"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "a78aa17d-3dd4-483f-ba12-ca977debbc3b",
"ObjectReference": [
{
"comment": "",
"object_uuid": "a78aa17d-3dd4-483f-ba12-ca977debbc3b",
"referenced_uuid": "49552673-c8ea-50b9-a196-4663a33bfae8",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "4d9801ac-9713-406e-ac91-5e3f3c280911"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "3719ef1f-9874-4eba-afff-cf4ec794bb84",
"value": "avira"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "27afc559-0f7f-45e2-b7ab-2287e46e7939",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "c32e41c8-f249-44b2-82dd-0f0c091cf8c3",
"value": "TR/Redcap.sbphc"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "9f5db9a7-9ef7-44f8-9189-553c2cc276f5",
"ObjectReference": [
{
"comment": "",
"object_uuid": "9f5db9a7-9ef7-44f8-9189-553c2cc276f5",
"referenced_uuid": "49552673-c8ea-50b9-a196-4663a33bfae8",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "5f7b216d-91e8-4bf7-be08-fd6911cb893f"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "2b5e1307-de50-49ce-92d3-fb1ef2eed196",
"value": "bitdefender"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "93d920e2-229a-49f9-b42c-e1aa84ac7d02",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "188ed091-b1be-4805-8bda-4b8fcdda14c3",
"value": "Trojan.GenericKD.70103917"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "c2abd168-d969-4160-b427-dacaf686f65e",
"ObjectReference": [
{
"comment": "",
"object_uuid": "c2abd168-d969-4160-b427-dacaf686f65e",
"referenced_uuid": "49552673-c8ea-50b9-a196-4663a33bfae8",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "870656a4-7651-4ab2-8378-156e365cc5ee"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "6d74d82f-4588-41b8-9e70-e50413c5e559",
"value": "emsisoft"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "73ea4713-bfb3-4502-8e2d-2647e5bed92f",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "136a18fc-ea48-465e-b960-9db4d00cb2e4",
"value": "Trojan.GenericKD.70103917 (B)"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "4b0f18bd-e09a-408d-9d36-415ca54ad600",
"ObjectReference": [
{
"comment": "",
"object_uuid": "4b0f18bd-e09a-408d-9d36-415ca54ad600",
"referenced_uuid": "49552673-c8ea-50b9-a196-4663a33bfae8",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "08c2826a-c3dd-4ccc-9cb5-e0b9000e230a"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "1386b0be-1993-4a66-86a5-09999b28b9ac",
"value": "ikarus"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "094a9625-2213-45d2-a517-13e4af80e0fd",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "1a697bc2-84bd-456d-91ae-5a0d7fc7e66a",
"value": "Trojan.Win64.Malgent"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "5e485e81-7e00-42d7-9fc3-5c08690e9206",
"ObjectReference": [
{
"comment": "",
"object_uuid": "5e485e81-7e00-42d7-9fc3-5c08690e9206",
"referenced_uuid": "49552673-c8ea-50b9-a196-4663a33bfae8",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "26804dfd-6a94-47ad-9831-d971939f9b8a"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "5c249117-0ae0-4e4b-9343-60046af8f7b3",
"value": "k7"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "ca34df49-20cb-4d20-aa7f-897240cff51d",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "e9cc610a-d65e-46b3-9abf-462597ba1b15",
"value": "Riskware ( 00584baa1 )"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware is a type of TTP that represents malicious code.",
"meta-category": "misc",
"name": "malware",
"template_uuid": "e5ad1d64-4b4e-44f5-9e00-88a705a67f9d",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "eb408b5c-09b1-449c-9125-d451a8c4ae0d",
"ObjectReference": [
{
"comment": "",
"object_uuid": "eb408b5c-09b1-449c-9125-d451a8c4ae0d",
"referenced_uuid": "272aca0e-f758-5014-b7e6-75a0305837d5",
2023-12-14 13:47:04 +00:00
"relationship_type": "related-to",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "57fa305c-8a11-4b48-84f9-8c3d151f7503"
},
{
"comment": "",
"object_uuid": "eb408b5c-09b1-449c-9125-d451a8c4ae0d",
"referenced_uuid": "a1e53fea-9148-4c25-b1c7-da233d87c930",
2023-12-14 13:47:04 +00:00
"relationship_type": "related-to",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "9891bf14-bde7-41b8-9224-54c77aee6e43"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "description",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "b8d927d5-bf1d-4875-935a-f27eceb11bc8",
"value": "This file is a 64-bit Windows command-line executable called a.exe that is executed by a.bat. This file issues the Remote Procedure Call (RPC) ncalrpc:[lsasspirpc] to the RPC end point to provide a file path to the LSASS on the infected machine. Once the file path is returned, the malware loads the accompanying DLL file called a.dll into the running LSASS process. If the DLL is correctly loaded, then the malware outputs the message \"[*]success\" in the console."
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "is_family",
"timestamp": "1701849221",
"to_ids": false,
"type": "boolean",
"uuid": "c41d1151-7227-43e8-8582-0ecd9b86ef85",
"value": "0"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "malware_type",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "8899c605-306d-417c-970d-dfc5a3ec733c",
"value": "trojan"
}
]
},
{
"comment": "",
"deleted": false,
"description": "File object describing a file with meta-information",
"first_seen": "2023-11-16T14:40:15.726853+00:00",
"meta-category": "file",
"name": "file",
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
"template_version": "24",
"timestamp": "1695739347",
"uuid": "d9f8b89d-305b-4e39-89cc-aad2f4a4a9a1",
"Attribute": [
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "md5",
"timestamp": "1701849221",
"to_ids": true,
"type": "md5",
"uuid": "c1438128-eb9e-4d9d-8dd2-4c251c24ff27",
"value": "37f7241963cf8279f7c1d322086a5194"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha1",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha1",
"uuid": "c597584a-c954-4ee4-be51-09537587bc07",
"value": "ec401ae8ddebef4038cedb65cc0d5ba6c1fdef28"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha256",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha256",
"uuid": "4eaa3bac-d5ec-4cab-9537-5588a58c5113",
"value": "e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha512",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha512",
"uuid": "ace164ad-0f52-42eb-a0a8-17a986a5b1d1",
"value": "02c2473b90ba787fea41a9840c7dc9a9869685ca8fdca3521278e0cc986e1797e36552f41f1ac206f5ec5bdc0ac40f13cd36217aea3aad13518e9764ea92c1f7"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "a13bb548-ac3e-49d3-a5e2-a171d5bc2b43",
"ObjectReference": [
{
"comment": "",
"object_uuid": "a13bb548-ac3e-49d3-a5e2-a171d5bc2b43",
"referenced_uuid": "e2e1a9d3-1363-51a8-a780-23f78f8c917a",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "13ca223d-bb27-4844-b713-a4d424f84bf4"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "de6ded26-c0d2-4867-87ef-3bf9858fb5a1",
"value": "antiy"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "a4b10d9b-0820-4db6-b8cb-6ff557deafaf",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "6a08a2a6-8d6f-42a9-b3a6-04127c8d17f5",
"value": "Trojan/Win64.Agent"
}
]
},
{
"comment": "",
"deleted": false,
"description": "File object describing a file with meta-information",
"meta-category": "file",
"name": "file",
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
"template_version": "24",
"timestamp": "1695739347",
"uuid": "e2e1a9d3-1363-51a8-a780-23f78f8c917a",
"ObjectReference": [
{
"comment": "",
"object_uuid": "e2e1a9d3-1363-51a8-a780-23f78f8c917a",
"referenced_uuid": "a1e53fea-9148-4c25-b1c7-da233d87c930",
2023-12-14 13:47:04 +00:00
"relationship_type": "sample-of",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "2e0d3efc-24d7-4c0c-a24c-77e2521bab0f"
}
],
"Attribute": [
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "md5",
"timestamp": "1701849221",
"to_ids": true,
"type": "md5",
"uuid": "baa9989f-5899-4f4e-bb9b-eebaca1247bc",
"value": "206b8b9624ee446cad18335702d6da19"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha1",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha1",
"uuid": "c6ee3b64-1caf-4f47-a9df-167b24bf55cd",
"value": "364ef2431a8614b4ef9240afa00cd12bfba3119b"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha256",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha256",
"uuid": "3f81c550-10bd-462f-a5b4-92d9818f1e19",
"value": "17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha512",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha512",
"uuid": "25f5f0ac-f62b-4635-8632-963162b2d4f1",
"value": "efa720237bd2773719d7f8e377f63f93d25a691a6f2b8f52ff9ecbd1495c215690d01400d8b7fd9bb79b47de09817d72c82676b67ed70ecf61b002c7d8e9e11d"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "ssdeep",
"timestamp": "1701849221",
"to_ids": true,
"type": "ssdeep",
"uuid": "13c42028-44eb-4000-991a-1823506117ec",
"value": "3072:oCNLoO2N+p5Fm6nfZvD8sLVdN9dtFiokDFMYLcu:j1o/+34YRvDtFiwu"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "filename",
"timestamp": "1701849221",
"to_ids": true,
"type": "filename",
"uuid": "2dfa6218-8672-41b7-89d2-0e5da8f8b131",
"value": "a.dll"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "size-in-bytes",
"timestamp": "1701849221",
"to_ids": false,
"type": "size-in-bytes",
"uuid": "ce7b8892-31d7-4cf5-af69-b798b4b20f9e",
"value": "106496"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "d5260841-3693-4b4e-b3f8-bffccc184799",
"ObjectReference": [
{
"comment": "",
"object_uuid": "d5260841-3693-4b4e-b3f8-bffccc184799",
"referenced_uuid": "e2e1a9d3-1363-51a8-a780-23f78f8c917a",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "de9aa7f0-4b32-4887-b1f4-8ee822c28d03"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "175ea164-a465-4ea5-9ebb-43d50975ab17",
"value": "bitdefender"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "56987a54-4a92-461b-a1fa-7ac580f82386",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "ef81de8d-8237-4166-aa79-2d008cd5c687",
"value": "Trojan.GenericKD.70057986"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "5f447be4-9408-4da0-be20-a0a8ef7a2d5b",
"ObjectReference": [
{
"comment": "",
"object_uuid": "5f447be4-9408-4da0-be20-a0a8ef7a2d5b",
"referenced_uuid": "e2e1a9d3-1363-51a8-a780-23f78f8c917a",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "5e8ec4e4-34d1-4159-9cab-84ec9c4b586e"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "f2795ce7-a785-4b2f-9118-f2d061dd366c",
"value": "eset"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "94857e60-ef39-4849-ba72-27c5896ce23d",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "b864d2b9-1b43-43af-9d8d-1b7ec4602c5d",
"value": "a variant of Win64/Agent.DAU trojan"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "d7c20040-9114-4709-b609-d1f230198e1f",
"ObjectReference": [
{
"comment": "",
"object_uuid": "d7c20040-9114-4709-b609-d1f230198e1f",
"referenced_uuid": "e2e1a9d3-1363-51a8-a780-23f78f8c917a",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "6b62123d-b948-4b95-b41f-e1e59bf2800c"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "5e7db3af-a26c-4fb6-823a-33bf14ebea55",
"value": "emsisoft"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "c0bedb4e-8f70-4ffa-a32e-ed12033e3586",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "4c29d389-c8f3-42b1-9bc3-63c9264dfef9",
"value": "Trojan.GenericKD.70057986 (B)"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "ac013608-5fc8-4eb4-93db-82e071ee002b",
"ObjectReference": [
{
"comment": "",
"object_uuid": "ac013608-5fc8-4eb4-93db-82e071ee002b",
"referenced_uuid": "e2e1a9d3-1363-51a8-a780-23f78f8c917a",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "478d7b28-96c9-4e55-ab3a-c0e0404e1bd9"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "b2c7f3a1-a4c1-4e92-ad00-48911fc951bd",
"value": "ikarus"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "6bd79472-5c1a-4d8f-b32e-ea3cea81ad4b",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "510a5a69-3a9d-492c-bf30-76076efb9223",
"value": "Trojan.Win64.Agent"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "440260c8-b268-471d-af38-b90279d8cd13",
"ObjectReference": [
{
"comment": "",
"object_uuid": "440260c8-b268-471d-af38-b90279d8cd13",
"referenced_uuid": "e2e1a9d3-1363-51a8-a780-23f78f8c917a",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "400a6221-af2a-432e-b8d0-41f9fd8d7c45"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "423d5543-727a-436a-9e19-93fb8c4e9d16",
"value": "k7"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "74d83513-4a59-4a64-9ba3-2b23e87e8372",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "f1a22b3d-065d-415c-9043-a471caeb9ac7",
"value": "Trojan ( 005ad67a1 )"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family.",
"meta-category": "misc",
"name": "malware-analysis",
"template_uuid": "8229ee82-7218-4ff5-9eac-57961a6f0288",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "47c9fa88-b331-4b2e-86e2-64282aab3fe6",
"ObjectReference": [
{
"comment": "",
"object_uuid": "47c9fa88-b331-4b2e-86e2-64282aab3fe6",
"referenced_uuid": "e2e1a9d3-1363-51a8-a780-23f78f8c917a",
2023-12-14 13:47:04 +00:00
"relationship_type": "analyses",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "c71048c0-4fa4-4861-b51e-3ab7c1eaaf1a"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "product",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "d6a5488c-de7b-401b-b173-5468b4cbc8c8",
"value": "zillya"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "result",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "faf62d2a-a099-46e6-a11e-e06dfe9bea98",
"value": "unknown"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "result_name",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "03b42e19-53cc-4129-8d59-b2030e4e7f3f",
"value": "Trojan.Agent.Win64.39686"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Malware is a type of TTP that represents malicious code.",
"meta-category": "misc",
"name": "malware",
"template_uuid": "e5ad1d64-4b4e-44f5-9e00-88a705a67f9d",
"template_version": "1",
"timestamp": "1695739347",
"uuid": "a1e53fea-9148-4c25-b1c7-da233d87c930",
"ObjectReference": [
{
"comment": "",
"object_uuid": "a1e53fea-9148-4c25-b1c7-da233d87c930",
"referenced_uuid": "eb408b5c-09b1-449c-9125-d451a8c4ae0d",
2023-12-14 13:47:04 +00:00
"relationship_type": "related-to",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "9a159d2e-932c-4596-b18b-0fde3357cecc"
},
{
"comment": "",
"object_uuid": "a1e53fea-9148-4c25-b1c7-da233d87c930",
"referenced_uuid": "272aca0e-f758-5014-b7e6-75a0305837d5",
2023-12-14 13:47:04 +00:00
"relationship_type": "related-to",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "86d2e878-7c6b-4bb8-9854-1c0e567a4578"
}
],
"Attribute": [
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "description",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "c1efdcae-341a-4853-bfe8-8afd18768fab",
"value": "This file is a 64-bit Windows DLL called a.dll that is executed by a.bat as a parameter for the file a.exe. The file a.exe loads this file into the running LSASS process on the infected machine. The file a.dll calls the Windows API CreateFileW to create a file called a.png in the path %PUBLIC%\\\r\n\r\nNext, a.dll loads DbgCore.dll then utilizes MiniDumpWriteDump function to dump LSASS process memory to disk. If successful, the dumped process memory is written to a.png. Once this is complete, the file a.bat specifies that the file a.png is used to create the cabinet file called a.cab in the path %WINDIR%\\Tasks."
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "is_family",
"timestamp": "1701849221",
"to_ids": false,
"type": "boolean",
"uuid": "cfd418f1-654f-4bcd-abde-468a9a45f286",
"value": "0"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "malware_type",
"timestamp": "1701849221",
"to_ids": false,
"type": "text",
"uuid": "aefb1011-3950-4b71-baff-f2f8fd37f8fb",
"value": "trojan"
}
]
},
{
"comment": "",
"deleted": false,
"description": "File object describing a file with meta-information",
"first_seen": "2023-11-16T14:40:15.784715+00:00",
"meta-category": "file",
"name": "file",
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
"template_version": "24",
"timestamp": "1695739347",
"uuid": "a2ed1e76-995c-4ac2-96f3-361a818d7bf8",
"Attribute": [
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "md5",
"timestamp": "1701849221",
"to_ids": true,
"type": "md5",
"uuid": "0112fb48-2a64-4c24-b334-558ff9ee132a",
"value": "206b8b9624ee446cad18335702d6da19"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha1",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha1",
"uuid": "48d0c17a-9738-4af1-bb5c-b002cd609e2c",
"value": "364ef2431a8614b4ef9240afa00cd12bfba3119b"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha256",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha256",
"uuid": "1565e260-66fa-49b7-afc5-fcea1f7149d0",
"value": "17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha512",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha512",
"uuid": "32d28d2e-663b-45c9-bcb6-36f7f98b8dd2",
"value": "efa720237bd2773719d7f8e377f63f93d25a691a6f2b8f52ff9ecbd1495c215690d01400d8b7fd9bb79b47de09817d72c82676b67ed70ecf61b002c7d8e9e11d"
}
]
},
{
"comment": "",
"deleted": false,
"description": "File object describing a file with meta-information",
"meta-category": "file",
"name": "file",
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
"template_version": "24",
"timestamp": "1701849221",
"uuid": "272aca0e-f758-5014-b7e6-75a0305837d5",
"ObjectReference": [
{
"comment": "",
"object_uuid": "272aca0e-f758-5014-b7e6-75a0305837d5",
"referenced_uuid": "eb408b5c-09b1-449c-9125-d451a8c4ae0d",
2023-12-14 13:47:04 +00:00
"relationship_type": "related-to",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849221",
"uuid": "7b0ae697-09f1-4a14-9000-2f377ad192ac"
},
{
"comment": "",
"object_uuid": "272aca0e-f758-5014-b7e6-75a0305837d5",
"referenced_uuid": "a1e53fea-9148-4c25-b1c7-da233d87c930",
2023-12-14 13:47:04 +00:00
"relationship_type": "related-to",
2023-12-14 14:30:15 +00:00
"timestamp": "1701849222",
"uuid": "bbefa059-52c0-41c5-adb5-bd69635b01ee"
}
],
"Attribute": [
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "md5",
"timestamp": "1701849221",
"to_ids": true,
"type": "md5",
"uuid": "09610b1a-e567-4260-b348-6aa175c82f82",
"value": "52d5e2a07cd93c14f1ba170e3a3d6747"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha1",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha1",
"uuid": "acf08273-60aa-4c6c-b2ba-b07fd61a5a69",
"value": "8acaf9908229871ab33033df7b6a328ec1db56d5"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha256",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha256",
"uuid": "b5530f26-fc8c-4f95-9a04-831e52bfd602",
"value": "98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha512",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha512",
"uuid": "676c44c9-1c89-4508-936b-7a32e1ec7e52",
"value": "317414f28d34f8295aa76cf9f39d4fd42c9bad292458dbd2a19f08a6a8b451e271179b7ef78afd8a2fe92a2e1103d9ef5e220557febf42d91900c268b8d61b69"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "ssdeep",
"timestamp": "1701849221",
"to_ids": true,
"type": "ssdeep",
"uuid": "2a93990a-ba38-44d9-af1b-b35f164be369",
"value": "6:halw5fwmUDXSLp8k7KdXSLp8kukK7va2RK4HvEEIVpmYY:sMULS98QAS98kuZ7XPcK3"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "filename",
"timestamp": "1701849221",
"to_ids": true,
"type": "filename",
"uuid": "b0543ac4-0c91-4f51-b24e-f2faa0bd0dea",
"value": "a.bat"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "size-in-bytes",
"timestamp": "1701849221",
"to_ids": false,
"type": "size-in-bytes",
"uuid": "ac07e68f-e4d3-4456-8426-c2c5d788e04e",
"value": "376"
}
]
},
{
"comment": "",
"deleted": false,
"description": "File object describing a file with meta-information",
"meta-category": "file",
"name": "file",
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
"template_version": "24",
"timestamp": "1701849221",
"uuid": "e5ef55cc-e9d8-585e-baf5-4bebebe966a3",
"Attribute": [
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "md5",
"timestamp": "1701849221",
"to_ids": true,
"type": "md5",
"uuid": "124b303f-af48-49a3-af02-6858a1a4c03d",
"value": "9cff554fa65c1b207da66683b295d4ad"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha1",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha1",
"uuid": "254372cd-92e6-4151-af8f-0e9d3353fc32",
"value": "b8e74921d7923c808a0423e6e46807c4f0699b6e"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha256",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha256",
"uuid": "8a9b36f3-6f8f-4032-a238-883d9d2980c6",
"value": "906602ea3c887af67bcb4531bbbb459d7c24a2efcb866bcb1e3b028a51f12ae6"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "sha512",
"timestamp": "1701849221",
"to_ids": true,
"type": "sha512",
"uuid": "99e7facb-7848-489d-a7a7-9c9f0662c18c",
"value": "131621770e1899d81e6ff312b3245fe4e4013c36f82818a82fdd319982e6b742a72d906b6fb86c422bb720cd648f927b905a8fc193299ad7d8b3947e766abbd3"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "ssdeep",
"timestamp": "1701849221",
"to_ids": true,
"type": "ssdeep",
"uuid": "12496ccf-dbf3-4301-baca-7e2def90b236",
"value": "48:BpsnUP6s3ceBg5YbFYNXEtUyzzYyUyh0+FVzYA6P+Fqbaug9trYhTHhIQG86w09:BuUP6sseBIOqXEvpcrb89Z2THCQ6P"
},
{
"category": "Payload delivery",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "filename",
"timestamp": "1701849221",
"to_ids": true,
"type": "filename",
"uuid": "a7279be8-becb-4468-a1eb-077c378d0373",
"value": "a.py"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "size-in-bytes",
"timestamp": "1701849221",
"to_ids": false,
"type": "size-in-bytes",
"uuid": "d6453cef-cda4-4add-9d28-6b9c3a8ab18b",
"value": "2645"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Object describing the original file used to import data in MISP.",
"meta-category": "file",
"name": "original-imported-file",
"template_uuid": "4cd560e9-2cfe-40a1-9964-7b2e797ecac5",
"template_version": "2",
"timestamp": "1701849261",
"uuid": "768b3de5-0693-4cf1-9ee9-14d49bb338dd",
"Attribute": [
{
"category": "External analysis",
"comment": "",
"data": "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
"deleted": false,
"disable_correlation": true,
"object_relation": "imported-sample",
"timestamp": "1701849261",
"to_ids": false,
"type": "attachment",
"uuid": "611ece1d-d27b-4277-b483-9bbf62e8bcd8",
"value": "MAR-10478915.r1.v1.CLEAR_stix2.json"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": true,
"object_relation": "format",
"timestamp": "1701849261",
"to_ids": false,
"type": "text",
"uuid": "43ab5514-2e2c-428f-8155-b301232a2e14",
"value": "STIX 2.1"
}
]
},
{
"comment": "",
"deleted": false,
"description": "Metadata used to generate an executive level report",
"meta-category": "misc",
"name": "report",
"template_uuid": "70a68471-df22-4e3f-aa1a-5a3be19f82df",
"template_version": "7",
"timestamp": "1701849458",
"uuid": "335344d0-7470-4ab8-a1ba-6d5e7474bacb",
"Attribute": [
{
"category": "External analysis",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "link",
"timestamp": "1701849458",
"to_ids": false,
"type": "link",
"uuid": "70f27681-b669-4b90-bed0-79d7100828a8",
"value": "https://www.cisa.gov/news-events/analysis-reports/ar23-325a"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "summary",
"timestamp": "1701849458",
"to_ids": false,
"type": "text",
"uuid": "d6e0cd97-4c9f-47d6-be1c-508fa062fca8",
"value": "Responding to the recently disclosed CVE-2023-4966, affecting Citrix NetScaler ADC and NetScaler Gateway appliances, CISA received four files for analysis that show files being used to save registry hives, dump the Local Security Authority Subsystem Service (LSASS) process memory to disk, and attempts to establish sessions via Windows Remote Management (WinRM). The files include:\r\n\r\n Windows Batch file (.bat)\r\n Windows Executable (.exe)\r\n Windows Dynamic Link Library (.dll)\r\n Python Script (.py)\r\n\r\nFor more information about this vulnerability, see Joint Cybersecurity Advisory #StopRansomware: LockBit 3.0 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability."
},
{
"category": "External analysis",
"comment": "",
"data": "JVBERi0xLjYNJeLjz9MNCjkwIDAgb2JqDTw8L0xpbmVhcml6ZWQgMS9MIDU2MDQ3MC9PIDkyL0UgMjk2MjUxL04gOC9UIDU2MDA5Mi9IIFsgNDg2IDI2MV0+Pg1lbmRvYmoNICAgICAgICAgICAgICAgIA0xMDggMCBvYmoNPDwvRGVjb2RlUGFybXM8PC9Db2x1bW5zIDUvUHJlZGljdG9yIDEyPj4vRmlsdGVyL0ZsYXRlRGVjb2RlL0lEWzxDNkE3NzE3RUE3NTBCREQ5MDk4Njg5MjlDNDY5RjIwMz48QzY4RDNGN0M2NDIzNENDREFEMTg4MzZFQjAyMkYyOTQ+XS9JbmRleFs5MCAyOF0vTGVuZ3RoIDk2L1ByZXYgNTYwMDkzL1Jvb3QgOTEgMCBSL1NpemUgMTE4L1R5cGUvWFJlZi9XWzEgMyAxXT4+c3RyZWFtDQpo3mJiZGAQYGBiYGC6DSIZ9UEkw3YQyeIOIpkrwaQOWMQfrPIlWIQLLLICzN4MJBlfHAfL8oPI/DAQqaQIIrkng8igPUDyP3cdAxPQRrAJQNuIIv8zMHb+BAgwAL0eDyENZW5kc3RyZWFtDWVuZG9iag1zdGFydHhyZWYNMA0lJUVPRg0gICAgICAgICANMTE3IDAgb2JqDTw8L0ZpbHRlci9GbGF0ZURlY29kZS9MZW5ndGggMTg1L1MgMTU3Pj5zdHJlYW0NCmjeYmBgYGZgYBJlYGFgEA9nEGZAAGGgGCsQc1wQEFDojXRgjpF7yWC48O42BgZB+wjWa5nTZs4EKmNSnCJ0dWdjj8q0tWe4IrabGPXAuTyJKlvzElIlVFcXM7B3dDAwVHQ0uLh3dMDYSuodHSwuQAZIFosNQNOlGDjafgNpAbCDQGA7gxCQ1GTg5mAqZVjGoKzA6cP0kaGer5CBNSFvPkdUw9yDHmJ9fQxOB9gdmAqASgECDAB1WDmgDWVuZHN0cmVhbQ1lbmRvYmoNOTEgMCBvYmoNPDwvUGFnZXMgODkgMCBSL1R5cGUvQ2F0YWxvZz4+DWVuZG9iag05MiAwIG9iag08PC9Db250ZW50c1s5NCAwIFIgOTUgMCBSIDk2IDAgUiA5NyAwIFIgOTggMCBSIDk5IDAgUiAxMDAgMCBSIDEwMiAwIFJdL0Nyb3BCb3hbMCAwIDYxMiA3OTJdL01lZGlhQm94WzAgMCA2MTIgNzkyXS9QYXJlbnQgODkgMCBSL1Jlc291cmNlcyAxMDkgMCBSL1JvdGF0ZSAwL1R5cGUvUGFnZT4+DWVuZG9iag05MyAwIG9iag08PC9GaWx0ZXIvRmxhdGVEZWNvZGUvRmlyc3QgNjUvTGVuZ3RoIDc0NS9OIDgvVHlwZS9PYmpTdG0+PnN0cmVhbQ0KaN68VW1r2zAQ/iv6XoLeLL9ACSTuQgPtVhqzFUI+uI5IPew42O7o/v3uJL8WL2RlW8RFyt3p0Sl6HomzgDDCOZgS0HPCPTAuiAywl8R3XOgdwpmLDgUJEj1ggVLk+pqGRVaUm1OcaPxRcQPHyON8TlfFsQZnFFlMcMJYGDw7lgbJJj+URbLR9ZY+3KxopN9qus7jg17aLrTdekefvjx/1wnirnPAZdxgrXPAZZ7Fms+3dB2Gy7jSe/Aq9O5gwqJK9LEmAVN08ePwLd3XL8TxAhrGp1udHl5q4nGX3mibNhNc0FUWHyoihdnLclm8bWeu8MlMei4RjDEsgO9MdJVmGoswGzKez3Gu6QI/y6tFmcbZbFlk+/uIrus4S5PF8ZBpwuidjvfp8UCkpPfxmy0Lsemm1vlXSIh+nrQBxNLK9FQXJX1qKlY8mM9hb7hZTJlc79MxKXAJwE8eizw+do5VWlZ1+BKX7R77JQwfcCt3cZPChaCb1+cay4nKV23q6oqjpvJqKzwftiLhn8VjxuYJPHz0oVkfjjCTEaXci6yfy4hrSkPcobmuZyIe4OJvi28i4PVhvq0E89qcbo6JBI7TxO0KfcMK0DfssSIco/V7wZHvB13EIknwDOfg2Ov3z9jOHOMkRR3+pxR1FVBUqJaizB1TVE5QNLSU+R/s7Jf6KDHlmJiC8wuJCQehVPOn24PmcNO11DSH5DukpTD2aJdStM1nBgVpA9eDsnxCzp3hKTDA+BGmZSrGf8dVHCNbW+yWg4MSzBa78hgbldmNcX0wjGOPa08pz8TbecyqymA2JqVD2u+/2aRi5F+15thHyvMU65WngqHyXFcMlAd5E8oToK2ZAy8E91B5whNj5TkTyru5itJcVzMjgHfq6yTHPcGN5G6BpY32OBNn1ecoZ0J94+U+qkD17mng/iUKVOcPw8aHtDpn49Zf7WxwebePhnkA/KB/QBqpXUqT9752/T5mr/BfAgwAyExN0g1lbmRzdHJlYW0NZW5kb2JqDTk0IDAgb2JqDTw8L0ZpbHRlci9GbGF0ZURlY29kZS9MZW5ndGggODIwPj5zdHJlYW0NCkiJrFVNb9NAEL37V4w4OQem+/3BDdpKIFWoBUscKIcoJCKoSdokReq/Z3aT3dpet2kJiRRP7Jn33rzdHd/BFdyBEqickg6UFyidsaCFR825BYFWw3oK32AJJ6cbDpMNMDTxY4eiajN5Cd6sSyy0Q+eV7iZWryGGNvHTeDtirUApD5o74AP9eaadEypEMnxipI0zwgUarVA4LnTAQMkU9cctWu4ITSFTwtsOlRT8aCrCQKm9OkDFPTuaijCQBc8OUNFKhosZYFJUbvRg1GGyGr0hAi1pGRlBDTMZHi9DPb2UyXD0tCsOMYW1PJJJWXTW+UNMUh7NJCU62hOHmLg/mol7tF4eImL6aCKmw4B4nsdF54T8dxonUWvXdk4I5J4r/kjEmQ1MnAL3qgkYmKgYtTL+kYmhpHkkuaBnBkP0SKVInqWpFShpsfpk8Rumm9HowgigXNTe2gjFJVHSQTVd+cpZsEqCUVAg8vglxNAlGi6diBz5DxXT3KapRQhomRPVZAEfGmqCMcahoQZ3BfG3WcBJ0wTIZgZ1c3H5Dk4vzt9/GUHzG84bktOZ9TJMnWCE1CjpoPAc5Hl/OV1Pprfb+/ENrOdUGxOo8cCW4ohnaBdEPOY9kMaTTwsOZyu4qpKvkr3Y1gBEA9IdslXqI12VBM+Y+S+u0h4OI9+BL96WqcGn9QQ5NiKgscJCS4+ontXzebWdz+aT8Xa+WnYVaZqg4Y3PTLaoGpBE72dF+8HHO/mPtiiEJXe18bQENFB2klpCqp0QsRPynawZwVuGHOpfMbBQz2MgoN7ACGKwjnck1NOUc7sLqnqV7uSc7b4oFZdwt0XNalTt7vzJ2T9TUubMdxLOm3A1UI/Tgz1D1eJMOalmtr+Wugu9y9Tj0zWLFGQJ2z5KLlqmHnPuTcopjLkvmPKjVVK1mfba7nD1KR5GNI1QQY295WmirPb6T/s+nyWQ/vK3etkLrbIB2ZppIaq/Q7LsWedBVX8sTCxRc4fjgqe1YaqY8jXgtosnpdF54ZLKhyTzuk49ZkOywIR8PepvpyxiVfi7SbqWRU7foqEjA90jUw0cmVReekP74QfAXwEGAIyPo/YNZW5kc3RyZWFtDWVuZG9iag05NSAwIG9iag08PC9GaWx0ZXIvRmxhdGVEZWNvZGUvTGVuZ3RoIDc0Mz4+c3RyZWFtDQpIiaRWQW/TUAy++1f4mEosa9KkSbjBmIQQBxiRdkAc2Fs7pi5tWRoQ/540jZ3OX5JuoErt67Of32f7s/3yD3yZ8+f685PjhON4zvE04WBKjwu+5jWfX5QBu5Knzad0tV7qp1GURlmzo3/ixA/DZB7VNlJ/HkYpu4Lf5hw0as035QWf53lY/8uX/JW93xM+m/ohe9+bRcLeY7OYHS1UtJbFbsL1IfLu5fRCJCU3IvY2srNsN0SA1v7whBrRSu2p7FYWclxR6ZV3smgtU6ejp9HwnTU8ggtPL62XemUBUYNgbeAmweBQtLPw7idkwCwGg/UDVGz4qMc532QsbwRBnzlReXcwQt57sfZlL5l1GoptA0aUM+tOh556LxoLiA/aVRdL9XE0xzb0msHCxG
"deleted": false,
"disable_correlation": false,
"object_relation": "report-file",
"timestamp": "1701849458",
"to_ids": false,
"type": "attachment",
"uuid": "fc29a335-d2a8-402e-8a39-77e9c1995024",
"value": "MAR-10478915.r1.v1.CLEAR_.pdf"
},
{
"category": "Other",
"comment": "",
"deleted": false,
"disable_correlation": false,
"object_relation": "case-number",
"timestamp": "1701849458",
"to_ids": false,
"type": "text",
"uuid": "9670f0e7-37af-4838-be8b-5f0eb23511ce",
"value": "AR23-325A"
}
]
}
2023-12-14 13:47:04 +00:00
]
2023-12-14 14:30:15 +00:00
}
2023-12-14 13:47:04 +00:00
}