{"id":223295,"date":"2022-10-18T12:59:46","date_gmt":"2022-10-18T10:59:46","guid":{"rendered":"https:\/\/www.intrinsec.com\/?p=223295"},"modified":"2022-10-18T12:59:46","modified_gmt":"2022-10-18T10:59:46","slug":"apt27-analysis","status":"publish","type":"post","link":"https:\/\/www.intrinsec.com\/en\/apt27-analysis\/","title":{"rendered":"APT27 \u2013 One Year To Exfiltrate Them All: Intrusion In-Depth Analysis"},"content":{"rendered":"<p>[et_pb_section fb_built= \u00bb1\u2033 _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb][et_pb_row _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb][et_pb_column type= \u00bb4_4\u2033 _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>Context<\/h2>\n<p>[\/et_pb_text]<\/p>\n<div>\n<div><span>During 2022, a company discovered that one of their equipment was communicating with a known command and control server. As a result, the company decided to contact CERT Intrinsec in order to get help to handle the security breach and manage the crisis. CERT Intrinsec gathered information about malicious activities that were discovered on victim&#039;s information system, and past incidents. Our in-depth analysis led us to conclude that an advanced persistent threat dubbed APT27 (aka LuckyMouse, EmissaryPanda) actually compromised the company&#039;s internal network by exploiting a public facing application. Our analysis showed that the threat actor managed to compromise several different domains and to gain persistence on many equipments while trying to hide in plain sight. As investigations went on, we observed tactics, techniques and procedures that had already been documented in papers, but we discovered new ones as well. CERT Intrinsec wanted to share with the community fresh and actionable threat-intelligence related to APT27. That is why this report presents a timeline of actions taken by the attackers and the tactics, techniques and procedures seen during our incident response. It provides as well a MITER ATT&amp;CK diagram and several recommendations to follow if you came across such incident, and to prevent them.<br \/><\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>CERT Intrinsic presentation<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>APT27 Presentation<\/h2>\n<p>[\/et_pb_text]<\/p>\n<div>\n<div><span>CERT Intrinsec is a private French incident response team dealing between 50 to 100 major incidents per year and works to help its customers to recover from cyber-attacks and strengthen their security. Since 2017, CERT Intrinsec has responded to hundreds of security breaches involving companies and public entities. The majority of those incidents are related to cybercrime and ransomware attacks with financial objectives, hence, Intrinsec follows those groups activities and generates comprehensive intelligence <\/span><span>`from the field`<\/span><span>. <a href=\"https:\/\/www.ssi.gouv.fr\/entreprise\/qualifications\/prestataires-de-services-de-confiance-qualifies\/prestataires-de-reponse-aux-incidents-de-securite-pris\/\">ANSSI (French National Security Agency) granted CERT Intrinsec PRIS<\/a> (State-Certified Security Incident Response Service Providers) certification. The latter testify that CERT Intrinsec meets specific incident response requirements, using dedicated procedures, qualified people and appropriate infrastructures. Should you need our expertise, Intrinsec provides Incident response &amp; Crisis services, Threat Intelligence services &amp; data, Detection services (SOC\/MDR\/XDR), supported by a large set of other services (pentests &amp; audits, consulting, etc.). .<br \/><\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>APT27 (aka LuckyMouse, EmissaryPanda, Iron Tiger or Mustang Panda) is a supposed nation state cyber threat actor linked to RPC government. Since at least 2010, the group has been reported targeting numerous public organizations as well as private companies. Known APT27 sectors of interest are: Defense contractors, Aerospace, Telecommunication, Energy, Manufacturing, Technology, Education and finally government&#039;s data (ambassies has been reported targeted). The group is also well known for exploiting internet facing applications to get access within the victim&#039;s networks. Known targeted application were MySQL, Microsoft SharePoint (CVE-2019-0604 RCE), Apache Zookeeper and more recently Microsoft Exchange servers. In addition, the group is also known to rely on the HyperBRO malware, a Remote Access Trojan (RAT). Capabilities description and decryption tool are available on behalf of the report.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<h1><span>Operation&#039;s timeline<\/span><\/h1>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>It is important to look at the timeline of malicious activities. The first activity discovered was the exploitation of a Microsoft Exchange server using ProxyLogon vulnerabilities chain and the domains discovery performed from this server. APT27&#039;s operators then compromised several domains in a few months, dumping credentials and gathering technical data about victim&#039;s information system. Finally, they started exfiltrating data in archives using different means. Gigabytes of data were exfiltrated in 17 days. Attackers tried to hide their activities using many defense evasion techniques that we present to you in this report.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>The following timeline shows the different steps of the operation, especially regarding domains compromised and data exfiltration.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_image src=&quot;https:\/\/www.intrinsec.com\/wp-content\/uploads\/2022\/11\/timeline_2.png&quot; alt=&quot;MITER Timeline&quot; title_text=&quot;MITER Timeline&quot; align=&quot;center&quot; _builder_version=&quot;4.18.0&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot;][\/et_pb_image][et_pb_text _builder_version=&quot;4.20.4&quot; _module_preset=&quot;default&quot; hover_enabled=&quot;0&quot; global_colors_info=&quot;{}&quot; text_font_size=&quot;13px&quot; sticky_enabled=&quot;0&quot;]<\/p>\n<div>\n<div><span>The following diagram summarizes APT27 modus operandi during the attack. It emphasizes intrusion vector, data exfiltration as well as command and control activities.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_image src=&quot;https:\/\/www.intrinsec.com\/wp-content\/uploads\/2022\/10\/attack_path_white_background.png&quot; alt=&quot;Attack Path&quot; title_text=&quot;attack path&quot; align=&quot;center&quot; _builder_version=&quot;4.18.0&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot;][\/et_pb_image][et_pb_text _builder_version=&quot;4.18.0&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot;]<\/p>\n<h2>APT27 Techniques, Tactics and procedures<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<table border=\"1\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 33.3333%\">\u00a0Tactic ID<\/td>\n<td style=\"width: 33.3333%\">Technical ID<\/td>\n<td style=\"width: 33.3333%\">Technique Name<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 33.3333%\">Initial Access<\/td>\n<td style=\"width: 33.3333%\">T1190<\/td>\n<td style=\"width: 33.3333%\">Public-Facing Application Exploit<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Initial compromise is the adversaries actions performed to gain access of their target&#039;s organizations. It can be performed by sending spear-phishing email or exploiting vulnerable internet facing applications to, then, move within the network. During CERT Intrinsec investigations, we found that on March, 4th of 2021, APT27 exploited ProxyLogon vulnerabilities chain affecting Microsoft Exchange server to gain initial access of the targeted organization&#039;s network. As a reminder, ProxyLogon related Microsoft advisory was initially published by Microsoft on March, 2th of 2021. First known information related to those CVE came back from December 2020, when DEVCORE Team discovered both <\/span><span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26855\" title=\"CVE-2021-26855\">CVE-2021-26855<\/a><\/span><span> and <\/span><span><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-27065\" title=\"CVE-2021-27065\">CVE-2021-27065<\/a><\/span><span>. The exploitation of these two vulnerabilities leads to remote code execution with SYSTEM permissions, allowing attackers to drop webshells, for instance.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Same initial intrusion date, also involving a successful ProxyShell exploitation as entry vector has been also reported by <a href=\"https:\/\/www.hvs-consulting.de\/public\/ThreatReport-EmissaryPanda.pdf\" title=\"HVS-Consulting Report\">HVS-Consulting<\/a> for one of their customer in their incident response report related to APT27<\/span><span>. Many other security vendors also reported active exploitation of Microsoft Exchange Server on that date. We can assume that the threat group was aware of the vulnerability before the Microsoft Advisory (or quickly developed an exploit) and managed to perform a massive exploitation campaign before companies had a chance to apply security fixes.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>Execution<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<table border=\"1\" style=\"border-collapse: collapse; width: 100%; height: 96px;\">\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Tactic ID<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Technical ID<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Technique Name<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Execution<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1059.001<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Command and Scripting Interpreter: PowerShell<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Execution<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1059.003<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Command and Scripting Interpreter: Windows Command Shell<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Execution<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1047<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Windows Management Instrumentation<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bb|||||||| \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Adversaries were wrapping their commands through calls to <\/span><span><span style=\"color: #ff6600;\">cmd.exe \/Q \/c<\/span><\/span><span> command line. In addition, all results were stored in the <\/span><span><span style=\"color: #ff6600;\">ADMIN$<\/span><\/span><span>\u00a0administrative share, in a file of type <\/span><span><span style=\"color: #ff6600;\">__[UNIX_EPOCH_DATETIME]<\/span><\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>This a likely the impacket&#039;s behavior and hence, Intrinsec CERT assumes that adversaries used that framework during their operation.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 background_layout= \u00bbdark \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<div><span>C:\\Windows\\System32\\<\/span><span style=\"color: #ffff00\">cmd.exe<\/span><span>(<\/span><span style=\"color: #ffff00\">cmd.exe<\/span><span> \/Q \/c powershell <\/span><span style=\"color: #ffff00\">Add-MpPreference<\/span><span> -ExclusionPath C:\\Windows\\temp 1&gt; \\\\<\/span><span>127.0<\/span><span>.<\/span><span>0.1<\/span><span>\\ADMIN$\\<\/span><span style=\"color: #00ccff\">__[UNIX_EPOCH_DATETIME<\/span><span><span style=\"color: #00ccff\">]<\/span> 2&gt;&amp;1)<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>In order to execute remote command, threat actors also relied on valid credentials collected in previous stages used <\/span><span><span style=\"color: #ff6600;\">wmic<\/span><\/span><span>\u00a0tool to execute commands on remote hosts.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>As example, a command where attackers executed a script located in the recycle bin of a remote computer:<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<div><span style=\"color: #ffff00\">cmd.exe<\/span><span> \/Q \/c <span style=\"color: #ffff00\">wmic<\/span> \/node:<span style=\"color: #00ccff\">[<\/span><\/span><span style=\"color: #00ccff\">IP<\/span><span><span style=\"color: #00ccff\">]<\/span> \/user:<span style=\"color: #00ccff\">[<\/span><\/span><span style=\"color: #00ccff\">DOMAIN<\/span><span><span style=\"color: #00ccff\">]<\/span>\\<span style=\"color: #00ccff\">[<\/span><\/span><span style=\"color: #00ccff\">ACCOUNT<\/span><span><span style=\"color: #00ccff\">]<\/span> \/password:<span style=\"color: #00ccff\">[<\/span><\/span><span style=\"color: #00ccff\">PASSWORD] <\/span><span>process<\/span><span> call create cmd \/cd:\\<\/span><span>$recycle.bin<\/span><span>\\<\/span><span>2.<\/span><span>bat<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>Persistence<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<table border=\"1\" style=\"border-collapse: collapse; width: 100%; height: 120px;\">\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Tactic<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Technical ID<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Technique Name<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Persistence<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1569.002<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Create or Modify System Process: Windows Service <\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Persistence<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1547.001<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Boot or Logon Autostart Execution: Registry Run Keys \/ Startup Folder<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Persistence<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1112<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Modify Registry<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Persistence<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1078.002<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Valid Accounts: Domain Accounts<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div><span>Typical next step after a successful initial intrusion is to ensure persistence within the target&#039;s network and be sure that attacker&#039;s will not be kicked-out easily.<\/span><\/div>\n<div><span>It is commonly achieved by deploying webshells, Remote Access Trojan or Remote Administration Tool, such as AnyDesk \/ Teamviewer.<\/span><\/div>\n<div><span><br \/>First payload found by CERT Intrinsec was the HyperBRO Remote Access Trojan. HyperBRO malware is a closed-sources application typical of APT27 threat group&#039;s activities.<\/span><\/div>\n<div><span><\/span><\/div>\n<div><span>HyperBRO is a fully featured Remote Access Trojan (RAT) and is used by APT27 operators to (not exhaustive):<\/span><\/div>\n<p>&nbsp;<\/p>\n<ul>\n<li><span>UAC Bypass<\/span><\/li>\n<li><span>Execute local &amp; remote commands<\/span><\/li>\n<li><span>Steal data<\/span><\/li>\n<li><span>Keylogging<\/span><\/li>\n<li><span>Keyboard capture<\/span><\/li>\n<li><span>Edit registry<\/span><\/li>\n<li><span>Manage files, processes, services<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h3>HyperBRO Malware description<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<div><span>HyperBro is a custom in-memory RAT backdoor used by APT27 and associated groups (Emissary Panda, Iron Tiger, LuckyMouse\u2026)<\/span><\/div>\n<div><span>Once the HyperBro virus has infected a host, it&#039;s used by APT27 to execute remote commands from it&#039;s C2 server. HyperBro also includes features for taking screenshots, stealing clipboard content, modifying Windows services, editing the registry, and manipulating files (downloading and uploading, deleting, renaming).<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h3>Deployment<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<div><span>First, a legitimate program <span style=\"color: #ff6600\"><span style=\"color: #000000\">(linked to CyberArk software)<\/span><\/span> (<span style=\"color: #ff6600\">vfhost.exe \/ msmpeng.exe<\/span>) with a DLL side-loading vulnerability is used to load <span style=\"color: #ff6600\">vftrace.dll<\/span> <em><strong>(<\/strong><\/em><\/span><em><strong>Initial loader \/ Stage 1<\/strong><\/em><span><em><strong>)<\/strong><\/em>.<\/span><\/div>\n<div><span>Then the loader will be able to decrypt <\/span><span style=\"color: #ff6600\">thumb.dat<\/span><em><strong> (Stage 2) <\/strong><\/em><span>file, \u00abencrypted\u00bb with a 1 byte key algorithm, decompress it and finally extract the actual <\/span><span><strong><em>HyperBro backdoor (Stage 3)<\/em><\/strong><\/span><span>\u00a0(compressed with lznt1 algorithm).<\/span><\/div>\n<div><span>The loader will then use the process hollowing technique to inject <\/span><span><strong><em>HyperBro backdoor (Stage 3)<\/em><\/strong><\/span><\/div>\n<div><span>The HyperBro backdoor configuration is embedded into its own PE. At its first execution, the configuration is copied into the <span style=\"color: #ff6600\">config.ini<\/span> file and into the<span style=\"color: #ff6600\"> config_<\/span> registry key.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_image src=&quot;https:\/\/www.intrinsec.com\/wp-content\/uploads\/2022\/10\/hyperbro_workflow.png&quot; alt=&quot;hyperbro workflow&quot; title_text=&quot;hyperbro workflow&quot; align=&quot;center&quot; _builder_version=&quot;4.18.0&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot;][\/et_pb_image][et_pb_text _builder_version=&quot;4.18.0&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot;]<\/p>\n<h3>Known Paths<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb background_color= \u00bb#D6D6D6\u2033 global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<div><span>%ProgramData%\\windefenders\\<\/span><\/div>\n<div><span>%ProgramData%\\windefenders\\config.ini<\/span><\/div>\n<div><span>%ProgramData%\\windefenders\\msmpeng.exe<\/span><\/div>\n<div><span>%ProgramData%\\windefenders\\thumb.dat<\/span><\/div>\n<div><span>%ProgramData%\\windefenders\\vftrace.dll<\/span><\/div>\n<div><span>%ProgramFiles%\\Common Files\\windefenders\\<\/span><\/div>\n<div><span>%ProgramFiles%\\Common Files\\windefenders\\config.ini<\/span><\/div>\n<div><span>%ProgramFiles%\\Common Files\\windefenders\\msmpeng.exe<\/span><\/div>\n<div><span>%ProgramFiles%\\Common Files\\windefenders\\thumb.dat<\/span><\/div>\n<div><span>%ProgramFiles%\\Common Files\\windefenders\\vftrace.dll<\/span><\/div>\n<div><span><\/span><\/div>\n<p><\/br><\/p>\n<div><span>SOFTWARE\\WOW6432Node\\Microsoft\\config_<\/span><\/div>\n<div><span>HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\windefenders<\/span><\/div>\n<div><span>SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\\windefenders<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>HyperBRO Extractor<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<div><span>CERT Intrinsec made a tool to extract HyperBro configuration from Stage 2 samples.<\/span><\/div>\n<p>&nbsp;<\/br><\/p>\n<div><span>This program is based on the work done on project HyperBroExtractor by <a href=\"https:\/\/github.com\/hvs-consulting\/HyperBroExtractor\" title=\"HVS-Consulting\">HVS-Consulting<\/a>\u00a0<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h3>Description<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>This tool is able to decrypt Stage 2 (thumb.dat), decompress and extract the actual hyperBro PE file(Stage 3), and parse the configuration it embeds.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>HyperExtractor will try to automatically bruteforce the 1 byte key and decrypt Stage 2, then it will decompress the LZNT1 compressed Stage 3 and extract the configuration.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>To work with as many samples as possible, this program uses patterns scanning to find configurations.<\/span><\/div>\n<div><span>In some cases the extraction of the configuration may fail but you can try to search for utf16 strings.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><strong>Note:<\/strong><span>\u00a0We have recently noticed that some new samples have some of their configuration fields encrypted or obfuscated and this tool will not be able to extract all of the configuration.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h3>Use<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.19.4\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<div><span style=\"color: #ffffff\">-i input file (Stage2 eg: thumb.dat)<\/span><\/div>\n<div><span style=\"color: #ffffff\">-o output file (extracted PE)<\/span><\/div>\n<div><span style=\"color: #ffffff\">.\\hyperbro_extractor.exe -i .\\samples\\thumb_dat.bin -o thumb_dat_extracted_pe.bin<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h3>Output Example<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<div><span>\u00a0\/!\\ \u2014 HyperBro config extractor \u2014 \/!\\<\/span><\/div>\n<div><span>\u00a0[+] ==&gt; The decryption Key is: <\/span><span>0xfc<\/span><\/div>\n<div><span>\u00a0\/!\\ \u2014 Successfully exported PE to: thumb_dat_extracted_pe.bin \u2014 \/!\\<\/span><\/div>\n<div><span>\u00a0[-] HyperBro Configuration registry key: config<\/span><\/div>\n<div><span>\u00a0[-] Legit loader: <\/span><span>vfhost.exe<\/span><\/div>\n<div><span>\u00a0[-] First stage: VFRACE.DLL<\/span><\/div>\n<div><span>\u00a0[-] Second stage: thumb.dat<\/span><\/div>\n<div><span>\u00a0[-] Windows service name: vfhost<\/span><\/div>\n<div><span>\u00a0[-] C2 address: <\/span><span>80.92<\/span><span>.<\/span><span>206<\/span><span>[.]<\/span><span>158<\/span><\/div>\n<div><span>\u00a0[-] C2 Path: \/api\/v2\/ajax<\/span><\/div>\n<div><span>\u00a0[-] Verb: POST<\/span><\/div>\n<div><span>\u00a0[-] Named Pipe: \\\\.\\pipe\\testpipe<\/span><\/div>\n<div><span>\u00a0[-] Mutex: 80A85553-1E05-<\/span><span>4323<\/span><span>-B4F9-43A4396A4507<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>You can download it on our github repository: <\/span><a href=\"https:\/\/github.com\/Intrinsec\/HyperBroExtractor\" title=\"https:\/\/github.com\/Intrinsec\/HyperBroExtractor\"><span>https:\/\/github.com\/Intrinsec\/HyperBroExtractor<\/span><\/a><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<h2><span>Discovery &amp; Lateral Movement<\/span><\/h2>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<table border=\"1\" style=\"border-collapse: collapse; width: 100%; height: 408px;\">\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Tactic ID<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Technical ID<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Technique Name<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 33.3333%; height: 48px;\">\n<div>\n<div><span>Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 48px;\">T1087.002<\/td>\n<td style=\"width: 33.3333%; height: 48px;\">\n<div>\n<div><span>Account Discovery: Domain Account<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 33.3333%; height: 48px;\">\n<div>\n<div><span>Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 48px;\">T1087.003<\/td>\n<td style=\"width: 33.3333%; height: 48px;\">\n<div>\n<div><span>Account Discovery: Email Account<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 33.3333%; height: 48px;\">\n<div>\n<div><span>Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 48px;\">T1087.001<\/td>\n<td style=\"width: 33.3333%; height: 48px;\">\n<div>\n<div><span>Account Discovery: Local Account<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1482<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Domain Trust Discovery <\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1083<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>File and Service Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1146<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Network Service Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1135<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Network Share Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1018<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Remote System Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1082<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>System Information Discovery <\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1057<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Process Discovery<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Lateral Movement<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1570<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Lateral Tool Transfer<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Lateral Movement<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1021.006<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Remote Services: SMB Windows Admin Shares<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Lateral Movement<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1021.001<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Remote Services: Remote Desktop Protocol <\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Once access gained on the Microsoft Exchange server, adversaries managed to perform an initial recognition of the network and domain characteristics, such as hosts, account, policy enumeration.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>This operation was performed by executing a script that lists all domains in the selected forest, related domain controllers, computer&#039;s names and versions and finally list of domain&#039;s users and save it into a file named <\/span><span style=\"color: #ff6600;\">owa_font_[2-letters].css<\/span><span> in the directory <span style=\"color: #ff6600;\">C:<\/span><\/span><span style=\"color: #ff6600;\">\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\Current\\themes\\resources\\<\/span><span>\u00a0:<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>Below an example of data saved into the <\/span><span><span style=\"color: #ff6600;\">owa_font_[2-letters].css<\/span><\/span><span>\u00a0file:<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text]<\/p>\n<div>\n<div><span>Microsoft(R) Windows Script Host Version 5.812<\/span><\/div>\n<div><span>Copyright (C) Microsoft Corporation. All rights reserved.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>All Domains in the forest:<\/span><\/div>\n<div><span>\u00a0 \u00a0Domain_NAME<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>********************************************************<\/span><\/div>\n<div><span>*Domain Controller*<\/span><\/div>\n<div><span>********************************************************<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>CN=[REDACTED]-DC1 DOMAIN<\/span><\/div>\n<div><span>CN=[REDACTED]-DC1 DOMAIN<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>********************************************************<\/span><\/div>\n<div><span>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Domain_NAME<\/span><\/div>\n<div><span>********************************************************<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>Hostname DNSHostName OperatingSystem Description<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>HOST_A DNS_NAME Windows Server [REDACTED]<\/span><\/div>\n<div><span>&#8230;.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>\u00a0 \u00a0Domain Policy: Password will Expired in 90 Days<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>********************************************************<\/span><\/div>\n<div><span>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0Domain Admins &amp; Enterprise Admins \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/div>\n<div><span>********************************************************<\/span><\/div>\n<div><span>********************************************************<\/span><\/div>\n<div><span>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0All Users \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/div>\n<div><span>********************************************************<\/span><\/div>\n<div><span>krbtgt<\/span><\/div>\n<div><span>\u00a0 \u00a0Display Name: <\/span><\/div>\n<div><span>\u00a0 \u00a0Password Last Set: [REDACTED]<\/span><\/div>\n<div><span>\u00a0 \u00a0Password Expired: [REDACTED]<\/span><\/div>\n<div><span>\u00a0 \u00a0Active: No<\/span><\/div>\n<div><span>\u00a0 \u00a0Last Logon: <\/span><\/div>\n<div><span>\u00a0 \u00a0Description: Key Distribution Center Service Account<\/span><\/div>\n<div><span>\u00a0 \u00a0Member Of: <\/span><\/div>\n<div><span>\u00a0 \u00a0CN=Replication group whose RODC password is rejected<\/span> [REDACTED]<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Adversaries also managed to extract all email addresses and associated users from the Exchange server.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<div><span><span style=\"color: #ffff00\">powershell<\/span> -exec <span style=\"color: #ffff00\">bypass<\/span> -command <\/span><span style=\"color: #ffff00\">Add-PSSnapin<\/span><span> Microsoft.Exchange.Management.PowerShell.SnapIn;<\/span><span style=\"color: #ffff00\">Get-Mailbox<\/span><span> | <\/span><span style=\"color: #ffff00\">table format<\/span><span> Name, Windows Email Address<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>In order to perform internal recognition, adversaries also relied on Windows built-in commands:<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<div><span>ipconfig \/all \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/span><\/div>\n<div><span>net session \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/div>\n<div><span>net share \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/span><\/div>\n<div><span>net use \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/span><\/div>\n<div><span>net use \\\\[<\/span><span>IP<\/span><span>]\\ipc$ \/d \/y <\/span><\/div>\n<div><span>net use \\\\[<\/span><span>IP<\/span><span>]\\ipc$ <\/span><\/div>\n<div><span>net use \\\\[<\/span><span>IP<\/span><span>] \/user:[<\/span><span>DOMAIN<\/span><span>]\\[<\/span><span>ACCOUNT<\/span><span>] [<\/span><span>PASSWORD<\/span><span>] <\/span><\/div>\n<div><span>net user \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/div>\n<div><span>net user [<\/span><span>ACCOUNT<\/span><span>] \/domain \u00a0<\/span><\/div>\n<div><span>net user [<\/span><span>ACCOUNT<\/span><span>] \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/div>\n<div><span>net view \/all \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/div>\n<div><span>net view \/domain <\/span><\/div>\n<div><span>net view \/domain:[<\/span><span>DOMAIN<\/span><span>] <\/span><\/div>\n<div><span>net view <\/span><\/div>\n<div><span>nltest \/domain_trusts \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/div>\n<div><span>nslookup -type=srv _ldap._tcp \u00a0<\/span><\/div>\n<div><span>nslookup [<\/span><span>IP<\/span><span>] <\/span><\/div>\n<div><span>ping -n <\/span><span>1<\/span><span> [<\/span><span>IP<\/span><span>] <\/span><\/div>\n<div><span>query query user <\/span><\/div>\n<div><span>whoami <\/span><\/div>\n<div><span>tasklist \/svc \u00a0<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>In addition, they used Sysinternals tools <\/span><span><span style=\"color: #ff6600;\">PsLoggedon.exe<\/span><\/span><span> to identify where specific users are logged in.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>They also used Remote Desktop protocol, to connect to computers within the targeted organization&#039;s network, and admin shares to move laterally.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>The targeted organization was managing numerous domains. APT27 operators managed to compromise them successively. a few months separated compromise of first domain and the second one. However, adversaries accelerated their operation and managed to get access to remaining domains in a few weeks interval.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>Credential Access<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<table border=\"1\" style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 33.3333%;\">Tactic ID<\/td>\n<td style=\"width: 33.3333%;\">Technical ID<\/td>\n<td style=\"width: 33.3333%;\">Technique Name<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 33.3333%;\">Credential Access<\/td>\n<td style=\"width: 33.3333%;\">T1003.001<\/td>\n<td style=\"width: 33.3333%;\">OS Credential Dumping: LSASS Memory<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 33.3333%;\">Credential Access<\/td>\n<td style=\"width: 33.3333%;\">T1003.003<\/td>\n<td style=\"width: 33.3333%;\">OS Credential Dumping: NTDS<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text]<\/p>\n<div>\n<div><span>Adversaries managed to elevate their privileges to the <\/span><span><span style=\"color: #ff6600;\">domain administrator<\/span><\/span><span>\u00a0level within the victim&#039;s network and systematically compromised domain controller with HyperBro malware.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>In order to stealth authentication materials on compromised hosts, adversaries relied on the mimikatz tool. However, they tried to stay stealthly and used the sysinternal&#039;s procdump tool, renamed in <\/span><span><span style=\"color: #ff6600;\">error.log<\/span><\/span><span>\u00a0to bypass Windows Defender detection and dump lsass process memory:<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 global_colors_info= \u00bb{} \u00bb]<\/p>\n<div>\n<div><span>C:\\Windows\\Temp\\<span style=\"color: #ffff00\">error.log<\/span> -accepted -my <\/span><span>lsass.exe<\/span><span> c:\\windows\\temp\\error.dmp<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Threat actors also used SysInternal&#039;s PsLoggedon tool to search for specific account usage. We especially saw that threat actors were interested in backups related accounts usage.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>cmd.exe<\/span><span> \/Q \/c <\/span><span style=\"color: #ffff00;\">PsLoggedon.exe<\/span><span> -accepteula <span style=\"color: #00ccff;\">[<\/span><\/span><span style=\"color: #00ccff;\">VEEAM_ACCOUNT<\/span><span><span style=\"color: #00ccff;\">] <\/span>1&gt; \\\\<\/span><span>127.0<\/span><span>.<\/span><span>0.1<\/span><span>\\ADMIN$\\<\/span><span>__<\/span><span>[<\/span><span>UNIX<\/span><span>_<\/span><span>EPOCH<\/span><span>_<\/span><span>DATETIME<\/span><span>] 2&gt;&amp;1<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Once access gained on domain controllers, adversaries managed to extract and exfiltrate NTDS.DIT database.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb14px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>ntdsutil ac i ntds ifm create full c:\\\\windows\\\\temp\\\\winstore\\\\ quit quit<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Operators then create archive, named <\/span><span><span style=\"color: #ff6600;\">error.rar<\/span><\/span><span>, containing NTDS database prior to exfiltrating it.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb14px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span style=\"color: #ffff00;\">cmd.exe<\/span><span> \/Q \/c <\/span><span style=\"color: #ffff00;\">rar.exe<\/span><span> a -r -y <span style=\"color: #00ccff;\">-[<\/span><\/span><span style=\"color: #00ccff;\">PASSWORD<\/span><span><span style=\"color: #00ccff;\">]<\/span> -df c:\\windows\\temp\\error.rar c:\\windows\\temp\\winstore\\ 1&gt; \\\\<\/span><span>127.0<\/span><span>.<\/span><span>0.1<\/span><span>\\ADMIN$\\<\/span><span>__<\/span><span>[<\/span><span>UNIX<\/span><span>_<\/span><span>EPOCH<\/span><span>_<\/span><span>DATETIME<\/span><span>] 2&gt;&amp;1<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>Defense and Evasion<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<table border=\"1\" style=\"border-collapse: collapse; width: 100%; height: 168px;\">\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Tactic ID<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Technical ID<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Technique Name<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Defense and Evasion<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1574.002<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Hijack Execution Flow: DLL Side Loading <\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Defense and Evasion<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1070.004<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Indicator Removal on Host: File Deletion<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Defense and Evasion<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1036.004<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Masquerading: Masquerade Task or Service<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Defense and Evasion<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1036.005<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Masquerading: Match Legitimate Name or Location<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Defense and Evasion<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1562.001<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Odd Defenses: Disable of Modify Tools<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Defense and Evasion<\/span><\/div>\n<\/div>\n<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1548.002<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Abuse Elevation Control Mechanism: Bypass User Account Control (UAC bypass using CMSTPLUA COM interface)<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>To prevent detection from Microsoft Windows Defender antivirus, APT27 operators modified system&#039;s settings to add exclusion path to the Defender&#039;s configuration and remove it once their operations done.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>They achieved that operation with the following command:<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>The commands below allow attackers to add and remove the <span style=\"color: #ff6600;\">C:<\/span><\/span><span><span style=\"color: #ff6600;\">\\windows\\temp<\/span><\/span><span>\u00a0directory to Windows Defender excluded folders in order to try hiding in plain sight<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb14px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div><\/div>\n<div><span>C:\\Windows\\System32\\<\/span><span style=\"color: #ffff00;\">cmd.exe<\/span><span>(<\/span><span style=\"color: #ffff00;\">cmd.exe<\/span><span> \/Q \/c powershell <\/span><span style=\"color: #ffff00;\">Get-MpPreference<\/span><span> -ExclusionPath C:\\Windows\\temp 1&gt; <\/span><\/div>\n<div><span>\\\\<\/span><span>127.0<\/span><span>.<\/span><span>0.1<\/span><span>\\ADMIN$\\<\/span><span>__<\/span><span>[<\/span><span>UNIX<\/span><span>_<\/span><span>EPOCH<\/span><span>_<\/span><span>DATETIME<\/span><span>] 2&gt;&amp;1)<\/span><\/div>\n<div><\/div>\n<div><span>C:\\Windows\\System32\\<\/span><span style=\"color: #ffff00;\">cmd.exe<\/span><span>(<\/span><span style=\"color: #ffff00;\">cmd.exe<\/span><span> \/Q \/c powershell <\/span><span style=\"color: #ffff00;\">Add-MpPreference<\/span><span> -ExclusionPath C:\\Windows\\temp 1&gt; <\/span><\/div>\n<div><span>\\\\<\/span><span>127.0<\/span><span>.<\/span><span>0.1<\/span><span>\\ADMIN$\\<\/span><span>__<\/span><span>[<\/span><span>UNIX<\/span><span>_<\/span><span>EPOCH<\/span><span>_<\/span><span>DATETIME<\/span><span>] 2&gt;&amp;1)<\/span><\/div>\n<div><\/div>\n<div><span>C:\\Windows\\System32\\<\/span><span style=\"color: #ffff00;\">cmd.exe<\/span><span>(<\/span><span style=\"color: #ffff00;\">cmd.exe<\/span><span> \/Q \/c powershell <\/span><span style=\"color: #ffff00;\">Remove-MpPreference<\/span><span> -ExclusionPath C:\\Windows\\temp 1&gt; <\/span><\/div>\n<div><span>\\\\<\/span><span>127.0<\/span><span>.<\/span><span>0.1<\/span><span>\\ADMIN$\\<\/span><span>__<\/span><span>[<\/span><span>UNIX<\/span><span>_<\/span><span>EPOCH<\/span><span>_<\/span><span>DATETIME<\/span><span>] 2&gt;&amp;1)<\/span><\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>In order to slow down investigations, attackers deleted their tools as well as the archives built during exfiltration phase. They use the following commands to do so.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb14px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span style=\"color: #ffff00;\">cmd.exe<\/span><span> \/Q \/c del <\/span><span style=\"color: #ffffff;\">rar.exe<\/span><span> error.log error1.rar error.dmp 1&gt; \\\\<\/span><span>127.0<\/span><span>.<\/span><span>0.1<\/span><span>\\ADMIN$\\<\/span><span>__<\/span><span>[<\/span><span>UNIX<\/span><span>_<\/span><span>EPOCH<\/span><span>_<\/span><span>DATETIME<\/span><span>] 2&gt;&amp;1<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>Command and Control<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<table border=\"1\" style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 33.3333%;\">Tactic ID<\/td>\n<td style=\"width: 33.3333%;\">Technical ID<\/td>\n<td style=\"width: 33.3333%;\">Technique Name<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 33.3333%;\">Command and Control<\/td>\n<td style=\"width: 33.3333%;\">T1090.001<\/td>\n<td style=\"width: 33.3333%;\">Proxy: Internal Proxy<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 33.3333%;\">Command and Control<\/td>\n<td style=\"width: 33.3333%;\">T1071.001<\/td>\n<td style=\"width: 33.3333%;\">Application Layer Protocol: Web Protocols<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>APT27 operators mainly used HyperBro C2 feature to send commands to infected hosts, using POST request <\/span><span><span style=\"color: #ff6600;\">\/api\/v2\/ajax<\/span><\/span><span> and user-agent <span style=\"color: #ff6600;\">Mozilla\/5.0 (Windows NT 6.3; WOW64) AppleWebKit\/537.36 (KHTML, like Gecko) <\/span><\/span><span><span style=\"color: #ff6600;\">Chrome\/34.0.1847.116 Safari\/537.36<\/span>.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>CERT Intrinsec also discovered a second application used to expose the targeted organization&#039;s internal network to adversaries.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>The application is a reverse SOCKS proxy written in GoLang called <a href=\"https:\/\/github.com\/jpillora\/chisel\" title=\"Chisel\">Chisel<\/a><\/span><span>. It transports TCP\/UDP traffic over SSH, which is encapsulated into HTTP.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>APT27 operators executed Chisel using <\/span><span><span style=\"color: #ff6600;\">wmic<\/span><\/span><span>\u00a0and rename it to <\/span><span><span style=\"color: #ff6600;\">veeamGues.exe<\/span><\/span><span>\u00a0to hide it in plain sight. The following command runs a server listening on port <span style=\"color: #ff6600;\">9080<\/span> allowing clients to access the SOCKS5 proxy.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb14px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span style=\"color: #ffff00;\">cmd.exe<\/span><span> \/Q \/c <span style=\"color: #ffff00;\">wmic<\/span> \/node:<\/span><span style=\"color: #00ccff;\">127.0.0.1<\/span><span> <\/span><span>process<\/span><span> call create cmd \/cc:\\Windows\\Temp\\<\/span><span>veeamGues.exe<\/span><span> server -p <\/span><span style=\"color: #00ccff;\">9080<\/span><span> \u2013socks5 1&gt; \\\\<\/span><span>127.0<\/span><span>.<\/span><span>0.1<\/span><span>\\ADMIN$\\<\/span><span>__<\/span><span>[<\/span><span>UNIX<\/span><span>_<\/span><span>EPOCH<\/span><span>_<\/span><span>DATETIME<\/span><span>] 2&gt;&amp;1)<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>Data Collection<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<table border=\"1\" style=\"border-collapse: collapse; width: 100%; height: 336px;\">\n<tbody>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Tactic ID<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Technical ID<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">Technique Name<\/td>\n<\/tr>\n<tr style=\"height: 72px;\">\n<td style=\"width: 33.3333%; height: 72px;\">Collection<\/td>\n<td style=\"width: 33.3333%; height: 72px;\">T1560.001<\/td>\n<td style=\"width: 33.3333%; height: 72px;\">\n<div>\n<div><span>Archive Collected Data: Archive via Utility<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 72px;\">\n<td style=\"width: 33.3333%; height: 72px;\">Collection<\/td>\n<td style=\"width: 33.3333%; height: 72px;\">T1114.001<\/td>\n<td style=\"width: 33.3333%; height: 72px;\">\n<div>\n<div><span>Email Collection: Local Email collection<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 48px;\">\n<td style=\"width: 33.3333%; height: 48px;\">Collection<\/td>\n<td style=\"width: 33.3333%; height: 48px;\">T1074.001<\/td>\n<td style=\"width: 33.3333%; height: 48px;\">\n<div>\n<div><span>Data Staged: Local Data Staging <\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 72px;\">\n<td style=\"width: 33.3333%; height: 72px;\">Collection<\/td>\n<td style=\"width: 33.3333%; height: 72px;\">T1074.002<\/td>\n<td style=\"width: 33.3333%; height: 72px;\">\n<div>\n<div><span>Data Staged: Remote Data Staging<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Collection<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1005<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Data from Local System<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 33.3333%; height: 24px;\">Collection<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">T1038<\/td>\n<td style=\"width: 33.3333%; height: 24px;\">\n<div>\n<div><span>Data from Network Shared Drive<\/span><\/div>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Once APT27 operators have stolen credentials, they start the collection process by checking size and usage of directories. To do so, they used <\/span><span><span style=\"color: #ff6600;\">diruse<\/span><\/span><span>\u00a0command, as illustrated below.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb14px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span style=\"color: #ffff00;\">cmd.exe<\/span><span> \/Q \/c <span style=\"color: #ffff00;\">wmic<\/span> \/node:<\/span><span style=\"color: #00ccff;\">127.0.0.1<\/span><span> <\/span><span>process<\/span><span> call create cmd \/c D:\\<\/span><span>$RECYCLE.BIN<\/span><span>\\<\/span><span style=\"color: #ffff00;\">diruse.exe<\/span><span> \/m \/* D:\\<\/span><span>data<\/span><span> &gt;&gt; D:\\<\/span><span>$RECYCLE.BIN<\/span><span>\\temD.txt 1&gt; \\\\<\/span><span>127.0<\/span><span>.<\/span><span>0.1<\/span><span>\\ADMIN$\\<\/span><span>__<\/span><span>[<\/span><span>UNIX<\/span><span>_<\/span><span>EPOCH<\/span><span>_<\/span><span>DATETIME<\/span><span>] 2&gt;&amp;1)<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Operators then browsed directories in order to find personal information and data related to research and development, leveraging <\/span><span><span style=\"color: #ff6600;\">director<\/span><\/span><span>\u00a0command and <\/span><span><span style=\"color: #ff6600;\">wmic<\/span><\/span><span>\u00a0to look for files on network shares.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb14px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span style=\"color: #ffff00;\">cmd.exe<\/span><span> \/Q \/c <span style=\"color: #ffff00;\">wmic<\/span> \/node:[<\/span><span>IP<\/span><span>_<\/span><span>ADDRESS<\/span><span>] \/user:[<\/span><span>DOMAIN<\/span><span>]\\[<\/span><span>USERNAME<\/span><span>] \/password:[<\/span><span>PASSWORD<\/span><span>] <\/span><span>process<\/span><span> call create <span style=\"color: #ffff00;\">cmd<\/span> \/c <span style=\"color: #ffff00;\">director<\/span> [<\/span><span>DIRECTORY<\/span><span>] &gt; d:\\<\/span><span>$recycle.bin<\/span><span>\\<\/span><span>1.<\/span><span>txt 1&gt; \\\\<\/span><span>127.0<\/span><span>.<\/span><span>0.1<\/span><span>\\ADMIN$\\<\/span><span>__<\/span><span>[<\/span><span>UNIX<\/span><span>_<\/span><span>EPOCH<\/span><span>_<\/span><span>DATETIME<\/span><span>] 2&gt;&amp;1<\/span><\/div>\n<div><span><\/span><\/div>\n<div><span style=\"color: #ffff00;\">cmd.exe<\/span><span> \/Q \/c <span style=\"color: #ffff00;\">director<\/span> \\\\[<\/span><span>IP<\/span><span>_<\/span><span>ADDRESS<\/span><span>]\\Z$\\[<\/span><span>DIRECTORY<\/span><span>] 1&gt; \\\\<\/span><span>127.0<\/span><span>.<\/span><span>0.1<\/span><span>\\ADMIN$\\<\/span><span>__<\/span><span>[<\/span><span>UNIX<\/span><span>_<\/span><span>EPOCH<\/span><span>_<\/span><span>DATETIME<\/span><span>] 2&gt;&amp;1<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Once they found relevant data, they created password-protected archives using <\/span><span><span style=\"color: #ff6600;\">-t<\/span><\/span><span> to test files after archiving, <\/span><span><span style=\"color: #ff6600;\">-inul<\/span><\/span><span> To disable all messages, <\/span><span><span style=\"color: #ff6600;\">-hp<\/span><\/span><span> to provide a password and <\/span><span><span style=\"color: #ff6600;\">-v<\/span><\/span><span>\u00a0to adjust size.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb14px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span><span style=\"color: #ffff00;\">wmic<\/span> \/node:[<\/span><span>IP<\/span><span>_<\/span><span>ADDRESS<\/span><span>] \/user:[<\/span><span>USER<\/span><span>_<\/span><span>ACCOUNT<\/span><span>] \/password:[<\/span><span>PASSWORD<\/span><span>] <\/span><span style=\"color: #ffff00;\">process call create <\/span><span>\u00ab cmd \/cc:\\temp\\rar.exe ac:\\temp\\temp.rar c:\\temp\\temp.dat -r -t -inul -hp[PASSWORD] -v[SIZE]<\/span><\/div>\n<div><span><\/span><\/div>\n<div><span><span style=\"color: #ffff00;\">cmd.exe<\/span> \/Q \/c <span style=\"color: #ffff00;\">del<\/span> rar.exe c:\\windows\\temp\\rar.exe a -r -y -inul -[PASSWORD] g:\\<\/span><span>$recycle<\/span><span>.bin\\error.rar [DRIVE]:\\[FOLDER]\\*.ppt* 1&gt; \\\\127.0.0.1\\ADMIN$\\__[UNIX_EPOCH_DATETIME] 2&gt;&amp;1<\/span><\/div>\n<div><span><\/span><\/div>\n<div><span><span style=\"color: #ffff00;\">rar.exe<\/span> a -r -y -hp[PASSWORD] -df error1.rar error.dmp error.log<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Besides, APT27 operators collected data about mailboxes on the Exchange server, using <\/span><span><span style=\"color: #ff6600;\">Get-Mailbox<\/span><\/span><span>\u00a0powershell command, as shown below:<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_font= \u00bbCourier Prime|||||||| \u00bb text_text_color= \u00bb#FFFFFF \u00bb background_color= \u00bb#000000\u2033 hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb14px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span style=\"color: #ffff00;\">cmd.exe<\/span><span> \/Q \/c <span style=\"color: #ffff00;\">powershell<\/span> -c <\/span><span style=\"color: #00ccff;\">Add-PSSnapin<\/span><span> Microsoft.Exchange.Management.PowerShell.SnapIn;<\/span><span>Get-Mailbox<\/span><span> 1&gt; \\\\<\/span><span>127.0<\/span><span>.<\/span><span>0.1<\/span><span>\\ADMIN$\\<\/span><span>__<\/span><span>[<\/span><span>UNIX<\/span><span>_<\/span><span>EPOCH<\/span><span>_<\/span><span>DATETIME<\/span><span>] 2&gt;&amp;1)<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>Exfiltration<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<table border=\"1\" style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<td style=\"width: 33.3333%;\">Tactic ID<\/td>\n<td style=\"width: 33.3333%;\">Technical ID<\/td>\n<td style=\"width: 33.3333%;\">Technique Name<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 33.3333%;\">Exfiltration<\/td>\n<td style=\"width: 33.3333%;\">T1071.001<\/td>\n<td style=\"width: 33.3333%;\">Application Layer Protocol: Web Protocols<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Attackers used different methods to exfiltrate data.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>First, archives containing stolen data were moved to the Exchange server, in the Exchange folder <\/span><span><span style=\"color: #ff6600;\">C:\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\Current\\themes\\resources\\<\/span><\/span><span>, an easy way to exfiltrate data as this server had direct access to the Internet. These RAR archives were renamed with a <\/span><span><span style=\"color: #ff6600;\">.png<\/span><\/span><span> file extension to hide in plain sight and try to avoid detection. Attackers then deleted them. By investigating files and Exchange server, CERT Intrinsec managed to carve some archives from disk images and retrieve passwords used to create the latter. It was then possible to know which data were exfiltrated by attackers.<\/span><\/div>\n<p>&nbsp;<\/p>\n<div><span>You can see below archives&#039; names created by the attackers prior to exfiltrating.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text]<\/p>\n<div>\n<div><span>.\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\Current\\themes\\resources\\error1.png<\/span><\/div>\n<div><span>.\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\Current\\themes\\resources\\error2.png<\/span><\/div>\n<div><span>.\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\Current\\themes\\resources\\error3.png<\/span><\/div>\n<div><span>[&#8230;]<\/span><\/div>\n<div><span>.\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\Current\\themes\\resources\\error.part025.rar<\/span><\/div>\n<div><span>.\\Program Files\\Microsoft\\Exchange Server\\V15\\FrontEnd\\HttpProxy\\owa\\auth\\Current\\themes\\resources\\error.part026.rar<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>Attackers used HyperBro command and control server as well as to exfiltrate WinRAR archives.<\/span><\/div>\n<div><span>Most of the exfiltration was carried out in 26 days and involved gigabytes of data, from 4 different domains.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>APT27 Intrusion Set<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<div><span>The following diagram sums up APT27 techniques, tactics and procedures.<\/span><\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_image src=&quot;https:\/\/www.intrinsec.com\/wp-content\/uploads\/2022\/10\/apt27_intrusion_set_en.drawio-601\u00d71024.png&quot; alt=&quot;APT27 Intrusion Set&quot; title_text=&quot;APT27 Intrusion Set&quot; align=&quot;center&quot; _builder_version=&quot;4.18.0&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot;][\/et_pb_image][et_pb_text _builder_version=&quot;4.18.0&quot; _module_preset=&quot;default&quot; global_colors_info=&quot;{}&quot;]<\/p>\n<h2>Lessons Learned<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb text_orientation= \u00bbjustified \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<p>To prevent those types of attacks, CERT Intrinsec recommends <strong>monitoring network and endpoint activities<\/strong>. Indeed, supervising network equipment allows to track down malicious activities performed by advanced persistent threat, including command and control communications and exfiltration. Depending on your situations: XDR \/ MDR approaches combined with SOC and proper threat intelligence.<\/p>\n<p>Ensuring\u00a0<strong>a proper log retention and storage<\/strong>\u00a0is a good way to improve detection of malicious behavior.<\/p>\n<p>Handling network,\u00a0<strong>Active Directory hardening<\/strong>\u00a0especially regarding trusts, and least privilege principle is very important to slow down attackers in the event of an intrusion.<\/p>\n<p>When compromising servers, particularly domain controllers, operators are used to execute commands to collect credentials or to dump NTDS database. Very useful information sources are available on systems and need to be monitored to spot attackers&#039; actions. These sources are Sysmon, that allows to log various events helping detection, and Microsoft Protection Logs where many evidences were found during the investigation. CERT Intrinsec published an article about this artifact and a parser to extract useful information from it.\u00a0<a href=\"https:\/\/www.intrinsec.com\/en\/hunt-mplogs\/\">You can read this article here<\/a>.<\/p>\n<p>As explained previously, adversaries can take advantage of a vulnerable exposed server to enter the corporate&#039;s network. That shows the importance of\u00a0<strong>keeping public-facing equipments up-to-date<\/strong>\u00a0and\u00a0<strong>managing vulnerabilities (support at least by an external asset security monitoring approach to ensure a second line of defense in complex \/ fast evolving environment)<\/strong>.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb]<\/p>\n<h2>External Resources<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version= \u00bb4.20.4\u2033 _module_preset= \u00bbdefault \u00bb hover_enabled= \u00bb0\u2033 global_colors_info= \u00bb{} \u00bb text_font_size= \u00bb13px \u00bb sticky_enabled= \u00bb0\u2033]<\/p>\n<div>\n<ul>\n<li><span><a href=\"https:\/\/www.hvs-consulting.de\/public\/ThreatReport-EmissaryPanda.pdf\" title=\"HFS-Consulting AG Incident Response Report\">HFS-Consulting AG Incident Response Report<\/a><\/span><\/li>\n<li><a href=\"https:\/\/www.verfassungsschutz.de\/SharedDocs\/publikationen\/DE\/cyberabwehr\/2022-01-bfv-cyber-brief.pdf;jsessionid=06ADD34EDA1607BC233EF43843C4B751.internet272?__blob=publicationFile&amp;v=10\" title=\"BfV Cyber-Brief Nr. 01\/2022\"><span>BfV Cyber-Brief Nr. 01\/2022<\/span><\/a><\/li>\n<li><a href=\"https:\/\/unit42.paloaltonetworks.com\/emissary-panda-attacks-middle-east-government-sharepoint-servers\/\" title=\"Palo Alto Networks\"><span>Palo Alto Networks<\/span><\/a><\/li>\n<li><span><a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/d\/iron-tiger-apt-updates-toolkit-with-evolved-sysupdate-malware-va.html\" title=\"Iron Tiger APT updates toolkit with evolved sysupdate malware va\">Trend Micro<\/a>\u00a0<\/span><\/li>\n<\/ul>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built= \u00bb1\u2033 _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb][et_pb_row _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb][et_pb_column type= \u00bb4_4\u2033 _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb][et_pb_text _builder_version= \u00bb4.18.0\u2033 _module_preset= \u00bbdefault \u00bb global_colors_info= \u00bb{} \u00bb] [\u2026]<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,9],"tags":[170,171,60,177,174,172,176,175,173,153],"class_list":["post-223295","post","type-post","status-publish","format-standard","hentry","category-cert","category-cyber-threat-intelligence","tag-apt","tag-apt27","tag-cert-en","tag-dfir","tag-emissarypanda","tag-hyperbro","tag-incident-response","tag-irontiger","tag-luckymouse","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>APT27 - One Year To Exfiltrate Them All: Intrusion In-Depth Analysis - INTRINSEC<\/title>\n<meta name=\"description\" content=\"Data leak : In-depth forensic &amp; threat intelligence analysis of the tactics, tools &amp; procedures of an advanced and persistant attack, by the Intrinsec CERT.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intrinsec.com\/en\/apt27-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT27 - One Year To Exfiltrate Them All: Intrusion In-Depth Analysis\" \/>\n<meta property=\"og:description\" content=\"Data leak : In-depth forensic &amp; threat intelligence analysis of the tactics, tools &amp; procedures of an advanced and persistant attack, by the Intrinsec CERT.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intrinsec.com\/en\/apt27-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"INTRINSEC\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-18T10:59:46+00:00\" \/>\n<meta name=\"author\" content=\"Intrinsec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Intrinsec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"21 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/apt27-analysis\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/apt27-analysis\\\/\"},\"author\":{\"name\":\"Intrinsec\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/ade590fbc7ad6f413727bae7cd3fb799\"},\"headline\":\"APT27 &#8211; One Year To Exfiltrate Them All: Intrusion In-Depth Analysis\",\"datePublished\":\"2022-10-18T10:59:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/apt27-analysis\\\/\"},\"wordCount\":5836,\"keywords\":[\"APT\",\"APT27\",\"CERT\",\"DFIR\",\"EmissaryPanda\",\"HyperBRO\",\"Incident Response\",\"IronTiger\",\"LuckyMouse\",\"malware\"],\"articleSection\":[\"CERT\",\"Cyber Threat Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/apt27-analysis\\\/\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/apt27-analysis\\\/\",\"name\":\"APT27 - One Year To Exfiltrate Them All: Intrusion In-Depth Analysis - INTRINSEC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\"},\"datePublished\":\"2022-10-18T10:59:46+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/ade590fbc7ad6f413727bae7cd3fb799\"},\"description\":\"Data leak : In-depth forensic & threat intelligence analysis of the tactics, tools & procedures of an advanced and persistant attack, by the Intrinsec CERT.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/apt27-analysis\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intrinsec.com\\\/apt27-analysis\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/apt27-analysis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.intrinsec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT27 &#8211; One Year To Exfiltrate Them All: Intrusion In-Depth Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#website\",\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/\",\"name\":\"INTRINSEC\",\"description\":\"Notre m\u00e9tier , Prot\u00e9ger le v\u00f4tre\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intrinsec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intrinsec.com\\\/#\\\/schema\\\/person\\\/ade590fbc7ad6f413727bae7cd3fb799\",\"name\":\"Intrinsec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g\",\"caption\":\"Intrinsec\"},\"sameAs\":[\"https:\\\/\\\/www.intrinsec.com\"],\"url\":\"https:\\\/\\\/www.intrinsec.com\\\/en\\\/author\\\/ufhtbqccsz\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"APT27 - One Year To Exfiltrate Them All: Intrusion In-Depth Analysis - INTRINSEC","description":"Data leak: In-depth forensic &amp; threat intelligence analysis of the tactics, tools &amp; procedures of an advanced and persistent attack, by the Intrinsec CERT.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intrinsec.com\/en\/apt27-analysis\/","og_locale":"en_US","og_type":"article","og_title":"APT27 - One Year To Exfiltrate Them All: Intrusion In-Depth Analysis","og_description":"Data leak : In-depth forensic & threat intelligence analysis of the tactics, tools & procedures of an advanced and persistant attack, by the Intrinsec CERT.","og_url":"https:\/\/www.intrinsec.com\/en\/apt27-analysis\/","og_site_name":"INTRINSEC","article_published_time":"2022-10-18T10:59:46+00:00","author":"Intrinsec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Intrinsec","Est. reading time":"21 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intrinsec.com\/apt27-analysis\/#article","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/apt27-analysis\/"},"author":{"name":"Intrinsec","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/ade590fbc7ad6f413727bae7cd3fb799"},"headline":"APT27 &#8211; One Year To Exfiltrate Them All: Intrusion In-Depth Analysis","datePublished":"2022-10-18T10:59:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intrinsec.com\/apt27-analysis\/"},"wordCount":5836,"keywords":["APT","APT27","CERT","DFIR","EmissaryPanda","HyperBRO","Incident Response","IronTiger","LuckyMouse","malware"],"articleSection":["CERT","Cyber Threat Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intrinsec.com\/apt27-analysis\/","url":"https:\/\/www.intrinsec.com\/apt27-analysis\/","name":"APT27 - One Year To Exfiltrate Them All: Intrusion In-Depth Analysis - INTRINSEC","isPartOf":{"@id":"https:\/\/www.intrinsec.com\/#website"},"datePublished":"2022-10-18T10:59:46+00:00","author":{"@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/ade590fbc7ad6f413727bae7cd3fb799"},"description":"Data leak: In-depth forensic &amp; threat intelligence analysis of the tactics, tools &amp; procedures of an advanced and persistent attack, by the Intrinsec CERT.","breadcrumb":{"@id":"https:\/\/www.intrinsec.com\/apt27-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intrinsec.com\/apt27-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intrinsec.com\/apt27-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.intrinsec.com\/"},{"@type":"ListItem","position":2,"name":"APT27 &#8211; One Year To Exfiltrate Them All: Intrusion In-Depth Analysis"}]},{"@type":"WebSite","@id":"https:\/\/www.intrinsec.com\/#website","url":"https:\/\/www.intrinsec.com\/","name":"INTRINSEC","description":"Our job is to protect yours.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intrinsec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intrinsec.com\/#\/schema\/person\/ade590fbc7ad6f413727bae7cd3fb799","name":"Intrinsic","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde6ed961c7078765b03a213927b5c4001b1cef4787255188f5b502a99e6ddd6?s=96&d=retro&r=g","caption":"Intrinsec"},"sameAs":["https:\/\/www.intrinsec.com"],"url":"https:\/\/www.intrinsec.com\/en\/author\/ufhtbqccsz\/"}]}},"_links":{"self":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/223295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/comments?post=223295"}],"version-history":[{"count":0,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/posts\/223295\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/media?parent=223295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/categories?post=223295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intrinsec.com\/en\/wp-json\/wp\/v2\/tags?post=223295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}