Part – 1 Understanding Ransomware Anatomy

There are many variants of Ransomware, however in this blog I researched some of the most active and destructive Ransomware variants. This blog provides analysis that looks into specific families (mentioned below) and associated activities. I have researched and documented all the information from different Security Researchers, Vendors, CISA, Microsoft, MITRE ATT&CK and Github websites.

The 8 most common Ransomware active groups are:

  1. Conti/Ryuk
  2. Pysa
  3. Clop
  4. Hive
  5. Lockbit2.0
  6. RagnarLocker
  7. BlackByte
  8. BlackCat

This blog exhibits the different MITRE ATT&CK Tactics, Techniques and Procedures (TTP) used by different Ransomware groups to have a better understanding of the tactical path taken by the attackers.

The below list shows the Count of Ransomware Victim Organizations and Top Industries being attacked till June 2022.

Ransomware familyTop locationCount of victim organizations per locationRansomware familyTOP IndustryCount of victim organizations
Conti/RyukUnited States
Great Britain
Germany
France
Canada
237
38
31
26
24
Conti/RyukManufacturer
Construction
Software development
Legal
Insurance
45
19
16
6
PysaUnited States
Great Britain
Austria
Germany
Canada
67
14
9
5
4
PysaEducation
Manufacturer
18
3
ClopUnited States
Canada
Italy
Austria
Germany
54
6
6
6
5
ClopSoftware development
Legal
Manufacturer
Education
Consulting
9
8
5
4
3
HiveUnited States
China
Germany
Australia
Belgium
Netherlands
28
3
3
2
2
2
HiveSmall business
Hospital
Legal
Real estate
Transport
14
7
5
4
4
EverestFrance
United States
Canada
Austria
Italy
14
13
9
7
4
RagnarlockerManufacturer
Software development
Legal
Pharmaceutical
Aircraft building
3
3
2
2
2
RagnarlockerUnited States
India
France
Slovakia
Spain
13
4
2
2
2
LockbitSmall business
Legal
12
2
LockbitUnited States
Italy
Great Britain
Mexico
Brazil
7
7
3
2
2
BlackCatSmall business
Manufacturer
Consulting
6
3
2
BlackCatUnited States
Italy
Austria
Hong Kong
Switzerland
5
3
3
1
1
BlackByteSmall business
Construction
Consulting
5
2
2
VicesocietyUnited States
Germany
New Zealand
Netherlands
Canada
11
2
1
1
1
   
BlackByteUnited States
Germany
Russia
Netherlands
Mexico
11
3
1
1
1
   

Security professionals may learn about different stages of the attack path, to get a visual description of how to defend against different classes of attack and to know the associated SIGMA detection rules from GitHub, which can be applied to infrastructure as part of your own SIEM solutions.

In Part-1 will learn the TTP’s and SIGMA Rules associated with it and in Part-2 will discuss How Microsoft can help different Organizations to counter Ransomware attacks.

**********************************************************************************************************************

Tactics – Initial Access

Initial Access used to gain a foothold includes targeted spear phishing and exploitation of vulnerabilities on public web servers. Footholds obtained through initial login may allow continuous access, such as valid accounts and the use of external remote services.

Techniques Used by different Variants

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Attackers can take advantage of externally facing remote services to initially gain access to and/or remain in a network. Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal corporate network resources from remote locations. There are often remote service gateways that manage connections and credentials for these services. Services such as RDP and VNC can also be used externally.

Some procedures include:

  1. Enabling RDP via Registry
  2. Enabling RDP in Windows Firewall

SIGMA Rule for T1133

Attackers may attempt to exploit a vulnerability in an Internet-accessible Web services or program by using software, data, or commands to cause unintended or unexpected behavior. The weak point in the system can be a bug or a design flaw. These applications are often websites, but can include databases (like SQL), standard services (like SMB or SSH), network device management and management protocols (like SNMP and Smart Install), and any other application with open sockets accessible from the Internet, such as web servers and related services.

Some procedures includes:

  1. Windows Shell Start by Web Applications

SIGMA Rule for T1190

 

Attackers can send phishing messages to gain access to victim systems. All forms of phishing are social engineering delivered electronically. Phishing can be targeted, known as spear phishing. With spear phishing, a specific person, company or industry is targeted by the attacker. In general, attackers can perform untargeted phishing, such as in bulk malware spam campaigns.

SIGMA Rule for T1566

SIGMA Rule for T1566.001

**********************************************************************************************************************

Tactics – Execution

Execution includes methods that cause an attacker to execute controlled code on a local or remote system. Malicious code execution techniques are often combined with other tactics to achieve broader goals, such as exploring a network or stealing data. For example, an attacker could use a remote access tool to run a PowerShell script that performs a remote discovery of the system.

Techniques Used by different Variants

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Attackers can rely on users to open malicious files for execution. Users may be socially engineered to open files that would lead to code execution. This user action is often seen as a continuation of a phishing attachment. Attackers can use several file types that require user execution, including .doc, .pdf, .xls, .rtf, .scr, .exe, .lnk, .pif, and .cpl.

Some procedures include:

  1. Started windows shell from Trusted process
  2. Drop Execution File from by Trusted Process

SIGMA Rule for T1204.002

 

Attackers can abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages ​​allow interaction between computer systems and are a common feature of many different platforms. Most systems have some built-in command-line interfaces and scripting capabilities, for example, macOS and Linux distributions include some Unix Shell, while Windows installations include Windows Command Shell and PowerShell.

Some procedures include:

  1. Execution of Downloaded Powershell Code
  2. Encoded/decoded PowerShell Сode Execution
  3. Executing PS1 from Public Directory
  4. Powershell Suspicious Arguments
  5. Executing JavaScript from Public Directories

SIGMA Rule for T1059

SIGMA Rule for T1059.001

SIGMA Rule for T1059.002

SIGMA Rule for T1059.003

SIGMA Rule for T1059.004

SIGMA Rule for T1059.005

SIGMA Rule for T1059.006

SIGMA Rule for T1059.007

SIGMA Rule for T1059.008

Attackers can abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is an administrative tool that provides a unified environment for accessing Windows system components. WMI services support local and remote access, but the latter is facilitated by remote services such as Distributed Component Object Model (DCOM) and Windows Remote Management (WinRM). DCOM remote WMI runs on port 135, while WinRM WMI runs on port 5985 over HTTP and 5986 over HTTPS.

Some procedures include:

  1. Suspicious Command wmic.exe
  2. Suspicious Child Process Wmiprvse.exe

SIGMA Rule for T1047

 

**********************************************************************************************************************

Tactics – Persistence

Persistence includes techniques that attackers use to maintain access to the system even after reboots, changing credentials and other disruptions that can break access. Techniques used to ensure persistence include any access, manipulation, or configuration changes that allow them to maintain stability in the system, such as legitimate code replacement or hijacking or adding boot code.

Techniques Used by different Variants

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Attackers can abuse the Windows Task Scheduler to schedule the initial or recurring execution of malicious code. There are several ways to access Task Scheduler in Windows. The schtasks utility can be run directly from the command line, or Task Scheduler can be opened from the GUI in the Administrative Tools section of Control Panel. In some cases, opponents have used a .NET wrapper for the Windows Task Scheduler, and opponents have also used Windows’ netapi32 library to create a scheduled task.

Some procedures include:

  1. Scheduled Task Start from Public Directory
  2. Windows Shell Started Schtasks

SIGMA Rule for T1053.005

Attackers can achieve persistence by adding a program to a startup folder or referencing it with a registry key. Adding an entry to “run keys” in the registry or startup folder causes the referenced program to run when a user logs in. These programs run in the context of the user and have the privilege level associated with the account.

Placing a program in a startup folder also causes that program to run when a user logs on. There is a startup folder for individual user accounts, as well as a system-wide startup folder that is checked regardless of which user account logs in.

Some procedures include:

  1. Modification of Main Registry Run Keys
  2. Adding Path of Open Folder in Run Keys via Registry
  3. Adding Suspicious File in Autorun Keys via Registry
  4. Suspicious File Creation in Startup Folder

SIGMA Rule for T1547.001

Attackers can manipulate accounts to maintain access to victim systems. Account manipulation can be any action that preserves attackers’ access to a compromised account, such as Changing credentials or authorization groups. These actions may also include account activity designed to circumvent security policies, such as performing iterative password updates to circumvent password expiration policies and preserve the life of information compromised identification.

Some procedures include:

  1. Account Creation via Powershell
  2. Account Creation via net.exe
  3. Adding Account in Domain or Local Admin Group via net.exe
  4. Adding Account in Domain or Local Admin Group via PowerShell

SIGMA Rule for T1098

SIGMA Rule for T1098.001

SIGMA Rule for T1098.002

SIGMA Rule for T1098.003

SIGMA Rule for T1098.004

Attackers can create or modify Windows services to repeatedly run malicious payloads as part of persistence. When Windows starts, it starts programs or applications called services that perform system functions in the background. Windows service configuration information, including the path to service executables or recovery programs/commands, is stored in the Windows registry. Attackers can install a new service or modify an existing service that runs at startup to persist on a system. Service configurations can be set or changed using system utilities (such as sc.exe), by directly editing the registry, or by interacting directly with the Windows API.

Some procedures include:

  1. Service Installation from Non-System Directory
  2. Service Image Path Modification via sc.exe

SIGMA Rule for T1543.003

Attackers can abuse BITS tasks to persistently execute or clean up malicious payloads. Windows Background Intelligent Transfer Service (BITS) is a low-bandwidth asynchronous file transfer mechanism provided through the component object model (COM). BITS is commonly used by updaters, messengers, and other applications that prefer to work in the background (using available idle bandwidth) without interrupting other network applications. File transfer jobs are implemented as BITS jobs that contain a queue of one or more file operations.

Some procedures include:

  1. File Download via Bitsadmin
  2. Suspicious Jobs via Bitsadmin

SIGMA Rule for T1197

**********************************************************************************************************************

Tactics – Privilege Escalation

Privilege escalation is a technique that attackers use to obtain higher permissions on a system or network. Opponents can often enter and explore a network with unprivileged access, but they require high permissions to achieve their goals. Common approaches are to exploit system weaknesses, misconfigurations, and vulnerabilities. Examples of elevated access include:

  • SYSTEM / root level
  • local administrator
  • user account with administrator access
  • user account with access to a specific system or perform a specific function

Techniques Used by different Variants

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Attackers can bypass UAC (User Access Control) mechanisms to increase process privileges on the system. Windows (UAC) allows a program to increase its privileges (tracked as integrity levels ranging from low to high) to perform a task with administrator-level permissions, possibly prompting the user for confirmation. The impact on the user ranges from denying the operation with an elevated application to allowing the user to perform the action if they are in the local administrators group and click the prompt or enter an administrator password to complete the action.

Some procedures include:

  1. UAC Bypass via COM Object
  2. Disabling UAC via Registry

SIGMA Rule for T1548.002

Attackers can exploit software vulnerabilities in an attempt to escalate privileges. Exploitation of a software vulnerability occurs when an attacker exploits a programming flaw in an operating system program, service, software, or kernel itself to execute adversary-controlled code. Security constructs such as permission levels often restrict access to information and the use of certain techniques, so attackers will likely need to escalate privileges to include using software exploitation to circumvent those restrictions.

Some procedures include:

  1. Created Windows Shell from Critical Windows Process

SIGMA Rule for T1068

Attackers can modify access tokens to operate under a different user or system security context to perform actions and circumvent access controls. Windows uses access tokens to determine ownership of a running process. A user can manipulate access tokens to make a running process appear to be the child of another process or to belong to someone other than the user who started the process. When this happens, the process also inherits the security context associated with the new token.

Some procedures include:

  1. Get-System Detection (Empire, CobaltStrike, Metasploit Meterpreter)

SIGMA Rule for T1134

SIGMA Rule for T1134.001

SIGMA Rule for T1134.002

SIGMA Rule for T1134.003

SIGMA Rule for T1134.004

SIGMA Rule for SID-History Manipulation

**********************************************************************************************************************

Tactics – Defense Evasion

Defense evasion consists of techniques used by attackers to avoid detection when compromised. Techniques used to evade defenses include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Attackers also use and abuse trusted processes to hide and mask their malware. Other tactical techniques are listed here if those techniques have the added benefit of undermining defenses.

Techniques Used by different Variants

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Attackers can evade process-based and/or signature-based defenses by proxy execution of malicious content with signed or otherwise trusted binaries. The binaries used in this technique are often files signed by Microsoft, indicating that they have been downloaded from Microsoft or are already included with the operating system. Binary files signed with trusted digital certificates typically run on Windows systems that are protected by digital signature validation. Several Microsoft-signed binaries that are standard in Windows installations can be used to proxy other files or commands.

Some procedures include:

  1. Shell Creation by Mshta.exe
  2. External HTA file Execution
  3. Executing HTA file from Public Directory
  4. Shell Creation by Regsvr32.exe
  5. External DLL Execution via Regsvr32.exe
  6. Shell Creation by Rundll32.exe
  7. External DLL Execution via Rundll32
  8. Suspicious Rundll32.exe Arguments

SIGMA Rule for T1218

SIGMA Rule for T1218.001

SIGMA Rule for T1218.002

SIGMA Rule for T1218.003

SIGMA Rule for T1218.004

SIGMA Rule for T1218.005

SIGMA Rule for T1218.007

SIGMA Rule for T1218.008

SIGMA Rule for T1218.009

SIGMA Rule for T1218.010

SIGMA Rule for T1218.011

SIGMA Rule for T1218.012

 

Attackers can inject code into processes to bypass process-based defenses and potentially elevate privileges. Process injection is a method of executing arbitrary code in the address space of a separate live process. Executing code in the context of another process can allow access to process memory, system/network resources, and possibly elevated privileges. Execution via process injection can also evade detection by security products by hiding the execution under a legitimate process.

Some procedures include:

  1. Remote Thread Creation in Critical Process
  2. DLL Injection via LoadLibrary API

SIGMA Rule for T1055

SIGMA Rule for T1055.001

SIGMA Rule for T1055.002

SIGMA Rule for T1055.003

SIGMA Rule for T1055.004

SIGMA Rule for T1055.005

SIGMA Rule for T1055.008

SIGMA Rule for T1055.009

SIGMA Rule for T1055.011

SIGMA Rule for T1055.012

SIGMA Rule for T1055.013

SIGMA Rule for T1055.014

Attackers can modify and/or disable security tools to avoid possible detection of their malware/tools and activities. This can take several forms, such as terminating security software processes or services, modifying/deleting registry keys or configuration files so that tools do not work properly, or other methods of interfering with the security software. analysis of security tools or the communication of information.

Some procedures include:

  1. Disabling Windows Defender via Registry
  2. Disabling or Modification Windows Defender via PowerShell
  3. Windows Defender Exclusions Modification via Registry

SIGMA Rule for T1562.001

Attackers can disable or modify system firewalls to bypass controls that limit network usage. Changes can include disabling the entire mechanism, adding, removing, or modifying specific rules. This can be done in a number of ways depending on your operating system, including using the command line, editing Windows registry keys, and the Windows Control Panel.

Some procedures include:

  1. Disabling Windows Firewall via Netsh.exe
  2. Firewall Configuration Modification via Netsh.exe

SIGMA Rule for T1562.004

Attackers can attempt to manipulate the characteristics of their artifacts to make them appear legitimate or harmless to users and/or security tools. Masquerade occurs when the name or location of a legitimate or malicious object is tampered with or misused to evade defense and surveillance. This can include manipulating file metadata, tricking users into misidentifying the file type, and assigning legitimate task or service names.

Some procedures include:

  1. Executing File Named as System Process in Unusual Directory
  2. Anomaly in the Windows Critical Process Tree
  3. Created Windows Shell from Critical Windows Process

SIGMA Rule for T1036

SIGMA Rule for T1036.001

SIGMA Rule for T1036.002

SIGMA Rule for T1036.003

SIGMA Rule for T1036.004

SIGMA Rule for T1036.005

SIGMA Rule for T1036.006

Attackers can clear Windows event logs to hide intrusion activity. Windows event logs are a record of a computer’s alerts and notifications. There are three system-defined event sources: system, application, and security, with five types of events: error, warning, information, success, and error checking.

Some procedures include:

  1. Clear Windows Event Logs via Command Line
  2. Clear Windows Event Logs

SIGMA Rule for T1070.001

Attackers can delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-proprietary files released or created on a system by an attacker (eg Ingress Tool Transfer) can leave traces to indicate what was done within a network and how. Deletion of these files can occur during an intrusion or as part of a post-intrusion process to minimize the attacker’s footprint.

Some procedures include:

  1. Ping and File Deletion in Command line

SIGMA Rule for T1070.004

Attackers can use obfuscated files or information to hide scan intrusion artifacts. They may need separate mechanisms to crack or decrypt this information depending on how they intend to use it. Methods to do this include built-in malware functionality or using utilities present on the system.

Some procedures include:

  1. Encoded/decoded PowerShell Сode Execution

SIGMA Rule for T1140

**********************************************************************************************************************

Tactics – Credential Access

Credential Access consists of techniques for stealing credentials such as account names and passwords. Techniques used to obtain credentials include keylogging or credential dumping. Using legitimate credentials can allow attackers to log into systems, make them harder to detect, and allow them to create multiple accounts to achieve their goals.

Techniques Used by different Variants

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Attackers can attempt to access reference material stored in the process memory of the Local Security Authority Subsystem Service (LSASS). After a user logs in, the system generates and stores a variety of reference materials in LSASS process memory. These credentials can be collected by an administrative user or by System and used to perform lateral movements using alternative credentials.

Some procedures include:

  1. Suspicious LSASS Memory Access
  2. Detected Access to SAM,SYSTEM and SECURITY registry hives

SIGMA Rule for T1003.001

Attackers can acquire credentials from web browsers by reading files specific to the target browser. Web browsers typically store login information, such as website usernames and passwords, so there is no need to enter them manually in the future. Web browsers typically store credentials in an encrypted format in a credential store; However, there are methods to extract plain text credentials from web browsers.

Some procedures include:

  1. Suspicious Access to Credentials from Web Browsers

SIGMA Rule for T1555.003

Attackers can use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained. Without knowing the password for an account or group of accounts, an attacker can systematically guess the password using a repetitive or iterative mechanism. Brute-force passwords can be created by interacting with a service that checks the validity of those credentials, or offline using previously captured credentials, such as a password Hashes.

SIGMA Rule for T1110

**********************************************************************************************************************

Tactics – Discovery

Discovery consists of techniques that an adversary can use to gain knowledge about the system and the internal network. These techniques help opponents observe and orient themselves before deciding how to act. They also allow attackers to explore what they can control and what is close to their entry point to find out how it can benefit their current target. Native operating system tools are often used for this purpose to gather information after compromise.

Techniques Used by different Variants

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Attackers can try to obtain a list of network connections to or from the compromised system they currently have access to or from external systems by querying the network for information.

An adversary who gains access to a system that is part of a cloud-based environment can map virtual private clouds or virtual networks to determine which systems and services are connected. The actions performed are likely to be the same types of detection techniques, depending on the operating system, but the resulting information may contain details about the networked cloud environment relevant to the attacker’s goals. Cloud service providers may have different ways in which their virtual networks work. Likewise, attackers accessing network devices can perform similar detection activities to gather information about connected systems and services.

Some procedures include:

  1. System Network Connections Discovery via Standard Windows Utilities
  2. System Network Connections Discovery via PowerShell

SIGMA Rule for T1049

Attackers can try to get a list of other systems by IP address, host name or other logical identifier on a network that can be used for lateral movement of the current system. There may be features in the remote access tools to make this possible, but you can also use utilities available on your operating system, such as Ping or netview.

Some procedures include:

  1. Remote System Discovery via Standard Windows Utilities
  2. Remote System Discovery via PowerShell

SIGMA Rule for T1018

Attackers can search shared folders and drives on remote systems to identify sources of harvestable information as precursors to harvesting and identify potential systems of interest for lateral movement. Networks often contain shared network drives and folders that allow users to access directories of files on different systems on a network.

Some procedures include:

  1. Network Share Discovery via Standard Windows Utilities
  2. Network Share Discovery via PowerShell

SIGMA Rule for T1135

Attackers may attempt to get a listing of accounts on a system or within an environment.

Some procedures include:

  1. Account Discovery via Standard Windows Utilities
  2. Account Discovery via PowerShell

SIGMA Rule for T1087

SIGMA Rule for T1087.001

SIGMA Rule for T1087.002

SIGMA Rule for T1087.003

SIGMA Rule for T1087.004

Attackers can enumerate files and folders or search specific locations on a host or network share for particular information within a file system. Attackers can use information from file and directory detection during automatic detection to model follow-up behavior, including whether or not the opponent fully infects the target and / or attempts specific actions.

Many command shell tools can be used to obtain this information. Examples are dir, tree, ls, find and seek. Custom tools can also be used to collect file and directory information and to interact with the native API. Attackers can also use a network device command line interface on network devices to gather file and directory information.

SIGMA Rule for T1083

Adversaries can try to get information about the processes running on a system. The information obtained can be used to obtain detailed information on common software / applications running on systems within the network. Attackers can use Process Discovery information during automatic detection to model follow-up behavior, including whether or not the opponent fully infects the target and / or attempts to take specific actions.

Some procedures include:

  1. Process Discovery via Standard Windows Utilities
  2. Process Discovery via PowerShell

SIGMA Rule for T1057

**********************************************************************************************************************

Tactics – Lateral Movement

Lateral movement consists of techniques used by attackers to penetrate and control remote systems on a network. In order to achieve their main objective, they often have to browse the network to find their target and then access it. In order to achieve their goal, they often have to go through multiple systems and accounts to win. Attackers can install their own remote access tools to perform lateral moves or use legitimate credentials with native network and operating system tools that can be stealthier.

Techniques Used by different Variants

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Attackers can use valid accounts to access a service specifically designed to accept remote connections, such as telnet, SSH, and VNC. The opponent can then perform actions as a logged in user.

In a corporate environment, servers and workstations can be organized into domains. Domains provide centralized identity management, allowing users to log in with a set of credentials across the entire network. If an attacker can obtain a set of valid domain credentials, they can log into many different machines using remote access protocols such as Secure Shell (SSH) or Remote Desktop Protocol (RDP).

Some procedures include:

  1. Enabling RDP via Registry
  2. Enabling RDP in Windows Firewall

SIGMA Rule for T1021.001

Attackers can use valid accounts to communicate with a remote network share using Server Message Block (SMB). The attacker can then perform actions as a logged in user.

SMB is a file, printer, and serial port sharing protocol for Windows machines on the same network or domain. Attackers can use SMB to communicate with file shares, allowing them to move sideways across a network. Linux and macOS implementations of SMB usually use Samba.

Some procedures include:

  1. PsExec Suspicious Commands
  2. PsExec Pipes Artefacts
  3. Mounting Shares via net
  4. Using Explicit Credentials while mounting Share

SIGMA Rule for T1021.002

Attackers can transfer tools or other files between systems in a compromised environment. Once introduced into the victim’s environment (i.e. Ingress Tool Transfer), files can then be copied from one system to another to deliver adversary tools or other files during an operation. Attackers can copy files between victims’ internal systems to support lateral movement using inherent file sharing protocols such as file sharing over SMB/Windows Admin Shares to connected network shares or with authenticated connections via Remote Desktop Protocol.

Some procedures include:

  1. File Download via Bitsadmin
  2. Psexec Suspicious Commands
  3. PsExec Pipes Artifacts
  4. Mounting Shares via net
  5. Using Explicit Credentials while mounting Share

SIGMA Rule for T1570

**********************************************************************************************************************

Tactics – Command and Control

Command and Control consists of techniques that adversaries can use to interact with systems under their control within a victim network. Attackers usually try to mimic expected normal traffic to avoid detection. There are many ways an opponent can gain command and control with varying levels of invisibility, depending on the structure of the network and the victim’s defenses.

Techniques Used by different Variants

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Attackers can communicate via application layer protocols to avoid network detection/filtering by interfering with existing traffic. Commands to the remote system, and often the results of those commands, are embedded in the protocol traffic between client and server.

Attackers can use many different protocols, including those used for web browsing, file transfer, email, or DNS. For connections that occur internally within an enclave (such as those between a proxy or hub node and other nodes), commonly used protocols are SMB, SSH, or RDP.

SIGMA Rule for T1071.001

**********************************************************************************************************************

Tactics – Exfiltration

Exfiltration consists of techniques that attackers can use to steal data from your network. Once they have collected data, attackers often package it to avoid detection when deleting it. This may include compression and encryption. Techniques for retrieving data from a target network typically involve transmission over its command and control channel or an alternate channel, and may also involve imposing size limits on the transmission.

Techniques Used by different Variants

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Attackers can steal data by exfiltrating it through an existing command and control channel. The stolen data is encoded in the normal communication channel, using the same protocol as command and control communications.

SIGMA Rule for T1041

Attackers can exfiltrate data into a cloud storage service rather than through their main command and control channel. Cloud storage services allow you to store, modify and retrieve data from a remote cloud storage server on the Internet.

Examples of cloud storage services include One Drive and Google Docs. Exfiltration to these cloud storage services can provide a significant amount of coverage to the adversary if hosts within the network are already communicating with the service.

SIGMA Rule for T1567.002

**********************************************************************************************************************

Tactics – Impact

The impact consists of techniques used by attackers to disrupt availability or compromise integrity by manipulating business and operational processes. Techniques used for impact may include destruction or manipulation of data. In some cases, business processes may appear to be good, but may have been altered to further adversary goals. These techniques can be used by adversaries to achieve their end goal or to cover up a breach of confidentiality.

Techniques Used by different Variants

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Attackers can delete or delete embedded operating system data and disable services designed to help recover a damaged system to prevent recovery. This can prevent access to available backups and restore options.

Operating systems may include features that can help repair corrupted systems, such as Backup catalog, volume shadow copies, and automatic repair functions. Attackers can disable or remove system restore features to increase the effects of data destruction and data encryption for impact.

Some procedures include:

  1. Shadow Copies Deletion
  2. Disable Automatic Windows Recovery

SIGMA Rule for T1490

Adversaries can stop or disable services on a system to make those services unavailable to legitimate users. Stopping critical services or processes can inhibit or interrupt the response to an incident or help the opponent’s overall goals of causing environmental damage.

Some procedures include:

  1. Service Stop via taskkill
  2. Service Stop via sc.exe
  3. Service Stop via Powershell.exe
  4. Service Stop via net.exe

SIGMA Rule for T1489

**********************************************************************************************************************

♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥Thank You for Reading, See you in the next Blog♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥♥

Post navigation

Leave a Reply

Your email address will not be published. Required fields are marked *