Analytics Story: Graceful Wipe Out Attack
Description
This analytic story contains detections that allow security analysts to detect and investigate unusual activities that might relate to the destructive attack or campaign found by "THE DFIR Report" that uses Truebot, FlawedGrace and MBR killer malware. This analytic story looks for suspicious dropped files, cobalt strike execution, im-packet execution, registry modification, scripts, persistence, lateral movement, impact, exfiltration and recon.
Why it matters
Graceful Wipe Out Attack is a destructive malware campaign found by "The DFIR Report" targeting multiple organizations to collect, exfiltrate and wipe the data of targeted networks. This malicious payload corrupts or wipes Master Boot Records by using an NSIS script after the exfiltration of sensitive information from the targeted host or system.
Detections
| Name ▲▼ |
Technique ▲▼ |
Type ▲▼ |
| Cobalt Strike Named Pipes |
Process Injection |
TTP |
| Anomalous usage of 7zip |
Archive via Utility |
Anomaly |
| CMD Echo Pipe - Escalation |
Windows Command Shell, Windows Service |
TTP |
| Detect Regsvr32 Application Control Bypass |
Regsvr32 |
TTP |
| DLLHost with no Command Line Arguments with Network |
Process Injection |
TTP |
| Executable File Written in Administrative SMB Share |
SMB/Windows Admin Shares |
TTP |
| Executables Or Script Creation In Suspicious Path |
Masquerading |
Anomaly |
| Executables Or Script Creation In Temp Path |
Masquerading |
Anomaly |
| GPUpdate with no Command Line Arguments with Network |
Process Injection |
TTP |
| Impacket Lateral Movement Commandline Parameters |
SMB/Windows Admin Shares, Distributed Component Object Model, Windows Management Instrumentation, Windows Service |
TTP |
| Impacket Lateral Movement smbexec CommandLine Parameters |
SMB/Windows Admin Shares, Distributed Component Object Model, Windows Management Instrumentation, Windows Service |
TTP |
| Impacket Lateral Movement WMIExec Commandline Parameters |
SMB/Windows Admin Shares, Distributed Component Object Model, Windows Management Instrumentation, Windows Service |
TTP |
| Remote WMI Command Attempt |
Windows Management Instrumentation |
TTP |
| Rundll32 with no Command Line Arguments with Network |
Rundll32 |
TTP |
| SAM Database File Access Attempt |
Security Account Manager |
Hunting |
| SearchProtocolHost with no Command Line with Network |
Process Injection |
TTP |
| SecretDumps Offline NTDS Dumping Tool |
NTDS |
TTP |
| Services Escalate Exe |
Abuse Elevation Control Mechanism |
TTP |
| Suspicious DLLHost no Command Line Arguments |
Process Injection |
TTP |
| Suspicious GPUpdate no Command Line Arguments |
Process Injection |
TTP |
| Suspicious microsoft workflow compiler rename |
Rename Legitimate Utilities, Trusted Developer Utilities Proxy Execution |
Hunting |
| Suspicious msbuild path |
Rename Legitimate Utilities, MSBuild |
TTP |
| Suspicious MSBuild Rename |
Rename Legitimate Utilities, MSBuild |
Hunting |
| Suspicious Rundll32 no Command Line Arguments |
Rundll32 |
TTP |
| Suspicious Rundll32 StartW |
Rundll32 |
TTP |
| Suspicious SearchProtocolHost no Command Line Arguments |
Process Injection |
TTP |
| Windows AdFind Exe |
Remote System Discovery |
TTP |
| Windows Attempt To Stop Security Service |
Disable or Modify Tools |
TTP |
| Windows Excessive Usage Of Net App |
Account Access Removal |
Anomaly |
| Windows Group Discovery Via Net |
Local Groups, Domain Groups |
Hunting |
| Windows Office Product Spawned Rundll32 With No DLL |
Spearphishing Attachment |
TTP |
| Windows Process Injection Remote Thread |
Portable Executable Injection |
TTP |
| Windows Raw Access To Disk Volume Partition |
Disk Structure Wipe |
Anomaly |
| Windows Raw Access To Master Boot Record Drive |
Disk Structure Wipe |
TTP |
| Windows Service Stop Attempt |
Service Stop |
Hunting |
| Windows Service Stop By Deletion |
Service Stop |
TTP |
| Windows Suspicious C2 Named Pipe |
Inter-Process Communication, SMB/Windows Admin Shares, Process Injection |
TTP |
| Windows Suspicious Named Pipe |
Inter-Process Communication, SMB/Windows Admin Shares, Process Injection |
TTP |
| Windows Suspicious Process File Path |
Create or Modify System Process, Match Legitimate Resource Name or Location |
TTP |
| Windows User Deletion Via Net |
Account Access Removal |
Anomaly |
Data Sources
References
Source: GitHub | Version: 1