misp-circl-feed/feeds/circl/stix-2.1/57d3fee7-b838-4ac0-a575-4f45950d210f.json

204 lines
No EOL
10 KiB
JSON

{
"type": "bundle",
"id": "bundle--57d3fee7-b838-4ac0-a575-4f45950d210f",
"objects": [
{
"type": "identity",
"spec_version": "2.1",
"id": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-09-10T12:42:06.000Z",
"modified": "2016-09-10T12:42:06.000Z",
"name": "CIRCL",
"identity_class": "organization"
},
{
"type": "report",
"spec_version": "2.1",
"id": "report--57d3fee7-b838-4ac0-a575-4f45950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-09-10T12:42:06.000Z",
"modified": "2016-09-10T12:42:06.000Z",
"name": "OSINT - The Dukes R&D Finds a New Anti-Analysis Technique",
"published": "2016-09-10T12:45:19Z",
"object_refs": [
"x-misp-attribute--57d3ff08-6c70-44e0-9143-446d950d210f",
"indicator--57d3ff24-c69c-44af-a200-4183950d210f",
"indicator--57d3ff2e-833c-4b4f-9499-437602de0b81",
"indicator--57d3ff2e-d2f0-4ab1-ba3f-4a3d02de0b81",
"observed-data--57d3ff2e-9d18-4e08-9eb6-487a02de0b81",
"url--57d3ff2e-9d18-4e08-9eb6-487a02de0b81",
"indicator--57d3ff4d-cf44-4a72-8891-4356950d210f",
"x-misp-attribute--57d3ff9e-db30-4dbf-bf05-42a9950d210f"
],
"labels": [
"Threat-Report",
"misp:tool=\"MISP-STIX-Converter\"",
"circl:incident-classification=\"malware\""
],
"object_marking_refs": [
"marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9"
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--57d3ff08-6c70-44e0-9143-446d950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-09-10T12:39:36.000Z",
"modified": "2016-09-10T12:39:36.000Z",
"labels": [
"misp:type=\"comment\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "comment",
"x_misp_value": "Threat actors constantly hunt for evasion and anti-analysis techniques in order to increase the success rate of their attacks and to lengthen the duration of their access on a compromised system. In some cases, threat groups use techniques they find discussed on the Internet during their operations, such as the Office Test Persistence method that the Sofacy group found within a blog published in 2014. While analyzing a recent attack that occurred on August 10, 2016, we observed an interesting anti-analysis technique used by the Dukes threat group (aka APT29, CozyBear, Office Monkeys) that we had not seen in the past. The use of the anti-analysis technique that we will discuss in this blog confirms that this threat group continually researches new anti-analysis techniques."
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57d3ff24-c69c-44af-a200-4183950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-09-10T12:40:04.000Z",
"modified": "2016-09-10T12:40:04.000Z",
"description": "In an attack that occurred on August 10, 2016, the Dukes group used a malicious OLE file (XLS)",
"pattern": "[file:hashes.SHA256 = '23a8a6962851b4adb44e3c243a5b55cff70e26cb65642cc30700a3e62ef180ef']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-09-10T12:40:04Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha256\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57d3ff2e-833c-4b4f-9499-437602de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-09-10T12:40:14.000Z",
"modified": "2016-09-10T12:40:14.000Z",
"description": "In an attack that occurred on August 10, 2016, the Dukes group used a malicious OLE file (XLS) - Xchecked via VT: 23a8a6962851b4adb44e3c243a5b55cff70e26cb65642cc30700a3e62ef180ef",
"pattern": "[file:hashes.SHA1 = '881f621a249b3c0d97d109fff49068c5fbcfebed']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-09-10T12:40:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"sha1\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57d3ff2e-d2f0-4ab1-ba3f-4a3d02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-09-10T12:40:14.000Z",
"modified": "2016-09-10T12:40:14.000Z",
"description": "In an attack that occurred on August 10, 2016, the Dukes group used a malicious OLE file (XLS) - Xchecked via VT: 23a8a6962851b4adb44e3c243a5b55cff70e26cb65642cc30700a3e62ef180ef",
"pattern": "[file:hashes.MD5 = 'e1c383cc6aa2449f149e142433eff5e5']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-09-10T12:40:14Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Payload delivery"
}
],
"labels": [
"misp:type=\"md5\"",
"misp:category=\"Payload delivery\"",
"misp:to_ids=\"True\""
]
},
{
"type": "observed-data",
"spec_version": "2.1",
"id": "observed-data--57d3ff2e-9d18-4e08-9eb6-487a02de0b81",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-09-10T12:40:14.000Z",
"modified": "2016-09-10T12:40:14.000Z",
"first_observed": "2016-09-10T12:40:14Z",
"last_observed": "2016-09-10T12:40:14Z",
"number_observed": 1,
"object_refs": [
"url--57d3ff2e-9d18-4e08-9eb6-487a02de0b81"
],
"labels": [
"misp:type=\"link\"",
"misp:category=\"External analysis\""
]
},
{
"type": "url",
"spec_version": "2.1",
"id": "url--57d3ff2e-9d18-4e08-9eb6-487a02de0b81",
"value": "https://www.virustotal.com/file/23a8a6962851b4adb44e3c243a5b55cff70e26cb65642cc30700a3e62ef180ef/analysis/1473439654/"
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--57d3ff4d-cf44-4a72-8891-4356950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-09-10T12:40:45.000Z",
"modified": "2016-09-10T12:40:45.000Z",
"description": "The malicious payload is a dynamic link library (DLL) that the macro saves to the following location",
"pattern": "[file:name = '\\\\%APPDATA\\\\%\\\\Adobe\\\\qpbqrx.dat']",
"pattern_type": "stix",
"pattern_version": "2.1",
"valid_from": "2016-09-10T12:40:45Z",
"kill_chain_phases": [
{
"kill_chain_name": "misp-category",
"phase_name": "Artifacts dropped"
}
],
"labels": [
"misp:type=\"filename\"",
"misp:category=\"Artifacts dropped\"",
"misp:to_ids=\"True\""
]
},
{
"type": "x-misp-attribute",
"spec_version": "2.1",
"id": "x-misp-attribute--57d3ff9e-db30-4dbf-bf05-42a9950d210f",
"created_by_ref": "identity--55f6ea5e-2c60-40e5-964f-47a8950d210f",
"created": "2016-09-10T12:42:06.000Z",
"modified": "2016-09-10T12:42:06.000Z",
"labels": [
"misp:type=\"comment\"",
"misp:category=\"External analysis\""
],
"x_misp_category": "External analysis",
"x_misp_type": "comment",
"x_misp_value": "Threat groups research new techniques to evade detection and increase the difficulty needed to analyze their payloads. Not all research is based on organic efforts within the threat group, as we can see from this incident that the group appears to obtain techniques from open sources on the Internet. In this case, the Dukes threat group knows that malware analysts tasked with reverse engineering their tools typically use the IDA disassembler. It appears this group looks for ways to evade analysis tools, specifically in this case by monitoring release notes from known malware analysis tools to deploy their own countermeasures. Let this be a reminder to those running older versions of IDA to update in order to keep up with the threat groups anti-analysis techniques.\r\nWe will continue to provide details as appropriate about this incident and the involvement of the Dukes threat group, including our observations of overlap in targeted organizations and individuals, technique overlap with known Dukes tool HAMMERTOSS \u00e2\u20ac\u201d specifically the use of images land steganography to download secondary payloads \u00e2\u20ac\u201d and the use of compromised servers to host C2."
},
{
"type": "marking-definition",
"spec_version": "2.1",
"id": "marking-definition--613f2e26-407d-48c7-9eca-b8e91df99dc9",
"created": "2017-01-20T00:00:00.000Z",
"definition_type": "tlp",
"name": "TLP:WHITE",
"definition": {
"tlp": "white"
}
}
]
}