Alex Morgan — Threat Intelligence Analyst
Key Takeaways
- The XYZ malware utilizes social engineering tactics to achieve initial access via phishing emails.
- We observed that the malware employs a combination of PowerShell scripts and scheduled tasks for persistence.
- Command and Control (C2) communications were identified using DNS tunneling and HTTP GET requests, indicating sophisticated evasion techniques.
Executive Summary
In our investigation of the recent XYZ malware campaign, we uncovered a multi-faceted attack that spans from initial access through execution, persistence, and ultimately lateral movement within enterprise networks. This threat actor demonstrated a high level of sophistication, utilizing a mix of legitimate tools and custom-built malware to compromise systems and exfiltrate sensitive data. Our analysis revealed various tactics, techniques, and procedures (TTPs) that we have mapped to the MITRE ATT&CK framework, providing insights into the actor’s methodologies.
Initial Access
The initial stage of the attack was marked by social engineering, specifically through the use of phishing emails. We identified that the actor crafted emails designed to look like legitimate communications from notorious brands, which included a malicious attachment. Upon opening the attachment, which was a macro-enabled Word document, the target was prompted to enable macros. This tactic aligns with the T1574.002 – Compromise Software Dependencies and Development Tools, where users unknowingly execute malicious code.
Execution & Persistence
Upon enabling macros, our analysis revealed that the document executed a PowerShell command embedded within the macro code. This command downloaded the main payload, a variant of XYZ malware, from a remote server. For persistence, the actor created a scheduled task under the path C:\Windows\System32\Tasks\XYZTask, which ensured that the malware would execute on system startup. The scheduled task pointed to a PowerShell script located at C:\Users\, which was responsible for establishing the initial foothold.
Command and Control
Our investigation focused on the Command and Control (C2) infrastructure employed by the malware. We observed that the malware utilized DNS tunneling to communicate with its C2 server, blending in with legitimate traffic to evade detection. The C2 server was identified using various domain names, one of which resolved to maliciousdomain.com. Additionally, the malware made HTTP GET requests to the path /update?, suggesting that the actor was seeking to retrieve further instructions or additional payloads dynamically.
Lateral Movement & Discovery
During the lateral movement phase, we detected instances of the malware querying for active directory information using the T1087 – Account Discovery technique. The actor leveraged the built-in net command to identify other systems within the network, which facilitated the spread of the malware. Our logs showed that the actor was attempting to access administrative shares like \ to deploy the malware across multiple hosts, indicative of their aim to establish control over an extensive range of systems within the environment.
Impact & Objectives
The primary objective behind the XYZ malware campaign appeared to be data exfiltration and potential ransom demands. Once the malware established its presence within the network, it systematically began filtering through sensitive directories including C:\Users\Public\Documents and C:\CompanyData\Confidential to collect sensitive files for exfiltration. Tools such as base64 encoding and custom encryption mechanisms were utilized to obscure the data transmitted to the C2 server. This approach not only concealed the true nature of the captured data but also hindered detection efforts by security monitoring solutions.
MITRE ATT&CK Mapping
- T1566.001 – Phishing: Attachment: The actor used phishing emails with malicious attachments to gain initial access.
- T1059.001 – Command and Scripting Interpreter: PowerShell: Execution of malicious PowerShell commands for downloading and executing the payload.
- T1060 – Registry Run Keys / Startup Folder: Creation of a scheduled task for persistence.
- T1071.001 – Application Layer Protocol: Web Protocols: C2 communications were established using HTTP GET requests.
- T1087 – Account Discovery: The malware queried active directory information to facilitate lateral movement.
Detection Opportunities
- Implement monitoring for unusual outbound DNS queries, particularly those using uncommon ports.
- Utilize endpoint detection and response (EDR) tools to flag suspicious PowerShell execution and scheduled task creation.
- Establish alerts for unauthorized access attempts to administrative shares and unusual file access patterns.
Analyst Notes
This analysis highlights the importance of continuous monitoring for phishing attempts and the need for user education regarding suspicious email attachments. Furthermore, utilizing advanced EDR capabilities can significantly reduce the impact of such sophisticated attacks by enabling quicker responses to initial compromise. As the threat landscape continues to evolve, staying informed of the latest TTPs used by adversaries will empower organizations to bolster their defensive measures effectively.
Source: Original Report