<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8549938467002440724</id><updated>2021-10-04T00:48:04.795-07:00</updated><category term="telecom"/><category term="phdays"/><category term="information security"/><category term="research"/><category term="vulnerability"/><category term="vulnerabilities"/><category term="security"/><category term="Best of Positive Research"/><category term="Linux"/><category term="Intel ME"/><category term="analytics"/><category term="positive technologies"/><category term="waf"/><category term="web security"/><category term="Intel"/><category term="positive hack days"/><category term="PCI DSS"/><category term="audit"/><category term="statistics"/><category term="Red Hat"/><category term="SCADA"/><category term="SQL-Injection"/><category term="attacks"/><category term="ctf"/><category term="hack"/><category term="server-side"/><category term="vulns"/><category term="Microsoft"/><category term="blackbox"/><category term="mobile"/><category term="windows"/><category term="Cisco"/><category term="Cyberattacks"/><category term="PT Application Firewall"/><category term="hacking"/><category term="linux kernel"/><category term="positive research"/><category term="reverse engineering"/><category term="JTAG"/><category term="PTResearch"/><category term="XSS"/><category term="apple"/><category term="development"/><category term="exploits"/><category term="pentest"/><category term="web applications"/><category term="0-day"/><category term="ATM"/><category term="Application Inspector"/><category term="Cross-Site Scripting"/><category term="DoS"/><category term="PHP"/><category term="Phishing"/><category term="PoC"/><category term="Proof-of-Concept"/><category term="SAP"/><category term="SS7"/><category term="Windows 8"/><category term="cybersecurity"/><category term="hackers"/><category term="hacking contest"/><category term="hackquest"/><category term="kernel"/><category term="mod_security"/><category term="random numbers"/><category term="redhat"/><category term="server-side attacks"/><category term="sms"/><category term="threats"/><category term="0day"/><category term="3g"/><category term="4g"/><category term="ANTLR"/><category term="ASLR"/><category term="AST"/><category term="Application Firewall"/><category term="C#"/><category term="CPU"/><category term="CVSS"/><category term="Cobalt"/><category term="Command Execution"/><category term="Competitive Intelligence"/><category term="DDoS"/><category term="Debugging interface"/><category term="Encryption"/><category term="GSM"/><category term="ICS"/><category term="IDA Pro"/><category term="Industrial control system"/><category term="Java"/><category term="ME"/><category term="Management Engine"/><category term="Mongo DB"/><category term="OVAL"/><category term="Osmocom"/><category term="Roslyn"/><category term="SMEP"/><category term="SMEP bypass"/><category term="SS7/SIGTRAN security"/><category term="Siemens"/><category term="Stuxnet"/><category term="USB"/><category term="WinCC"/><category term="advice"/><category term="android"/><category term="apt"/><category term="banking"/><category term="browser vulnerabilities"/><category term="centos"/><category term="code review"/><category term="conference"/><category term="contest"/><category term="cve"/><category term="cyber security"/><category term="cybercriminal"/><category term="firmware"/><category term="fix"/><category term="fuzzing"/><category term="google"/><category term="google chrome"/><category term="grammar"/><category term="investigation"/><category term="ios"/><category term="leakages"/><category term="malware"/><category term="metrics"/><category term="mobile data bypass"/><category term="mobile security"/><category term="modems vulnerabilities"/><category term="online banking"/><category term="passwords"/><category term="pattern matching"/><category term="penetration testing"/><category term="phd2011"/><category term="random numbers generator"/><category term="reports"/><category term="schneider electric"/><category term="selinux"/><category term="usb 3.0"/><category term="web attacks"/><category term="web vulnerabilities"/><category term="webinar"/><category term="windows 10"/><category term="write-up"/><category term="29C3"/><category term="35C3"/><category term="ABB Digital Substation"/><category term="Active Directory"/><category term="Address Space Layout Randomization"/><category term="Apache Struts"/><category term="Asterisk"/><category term="Barcelona"/><category term="Brno"/><category term="CVE-2013-1406"/><category term="CVE-2018-4251"/><category term="Chaos Communication Congress"/><category term="Chaos Constructions"/><category term="Cisco WLC"/><category term="Cobalt3"/><category term="Coccinelle"/><category term="Cyber attacks"/><category term="DCI"/><category term="DSL"/><category term="DVR"/><category term="Diameter"/><category term="Emerson DeltaV DCS"/><category term="Equifax"/><category term="FDCC"/><category term="Facebook"/><category term="FakeTRX"/><category term="FeeBSD"/><category term="File Including"/><category term="Firefox"/><category term="For Dummies"/><category term="Forensics"/><category term="GGSN"/><category term="GHOST"/><category term="GNU Radio"/><category term="GPRS"/><category term="GR-GSM"/><category term="GRX"/><category term="GTP"/><category term="Gartner"/><category term="Graph API Explorer"/><category term="Hack In The Box"/><category term="HackerSIM"/><category term="Huffman tables"/><category term="IDS"/><category term="Intel VT-x"/><category term="Intel management engine"/><category term="IronPython"/><category term="JunOS"/><category term="Juniper"/><category term="KRACK"/><category term="Kraken"/><category term="LSM"/><category term="Lenovo"/><category term="Listener"/><category term="MAD"/><category term="MBR Bootkit"/><category term="MITRE"/><category term="ML"/><category term="MS12-081"/><category term="MSC DoS"/><category term="MSC denial of service"/><category term="MWC"/><category term="MacBook"/><category term="Magic Quadrant"/><category term="Microsoft Active Directory"/><category term="Mining"/><category term="Mozilla"/><category term="NCR"/><category term="NetHack"/><category term="New office"/><category term="OVAL Adopter"/><category term="OsmocomBB"/><category term="PHDays CTF Quals"/><category term="PL/SQL"/><category term="PLSQL"/><category term="PT Application Inspector"/><category term="Path Traversal"/><category term="Pattern"/><category term="Pool Spraying"/><category term="Positive Technologies OVAL Repository"/><category term="Python"/><category term="Q2"/><category term="R&amp;D"/><category term="RCE"/><category term="ROM Bypass"/><category term="ROP"/><category term="RSA Library"/><category term="Remote Crash"/><category term="SAP DIAG"/><category term="SAP HR"/><category term="SAP’s wall of fame"/><category term="SAST"/><category term="SCAP"/><category term="SDR"/><category term="SGSN"/><category term="SHA2017"/><category term="SIEM"/><category term="SIM Cards"/><category term="SIMATIC PC7"/><category term="SIP Security"/><category term="SMS-attacks"/><category term="SS7 denial of service"/><category term="Scada security"/><category term="Semmle QL"/><category term="Seq2Seq"/><category term="SigPloit"/><category term="Skybox Security"/><category term="Spy.GmFUToMitm"/><category term="Squoison"/><category term="T-SQL"/><category term="TIA Portal"/><category term="TRX"/><category term="TSQL"/><category term="The Standoff"/><category term="USB Modem Hack"/><category term="USGCB"/><category term="VMWare"/><category term="Visitor"/><category term="VoIP security"/><category term="WPA2  flaw"/><category term="Walker"/><category term="Web search"/><category term="Windows GDI"/><category term="Windows Kernel"/><category term="Wireshark"/><category term="XCCDF"/><category term="advanced persistent threat"/><category term="analysis"/><category term="antivirus"/><category term="antlr4"/><category term="api"/><category term="appsec"/><category term="arp-poisoning"/><category term="autoencoder"/><category term="autoencoders"/><category term="backhaul network"/><category term="best reverser"/><category term="best reversersm write-up"/><category term="black hat"/><category term="blackmailing"/><category term="bootkit"/><category term="botnet"/><category term="browser security"/><category term="bruteforce"/><category term="bsod"/><category term="bypass"/><category term="cache poisoning"/><category term="cisco systems"/><category term="citrix"/><category term="client-side"/><category term="client-side attacks"/><category term="compliance management"/><category term="cookie encryption"/><category term="cookies"/><category term="crawler"/><category term="cross-site request forgery"/><category term="csrf"/><category term="cvss v2"/><category term="cvss v3"/><category term="cyber espionage"/><category term="db2 luw"/><category term="db2 udb"/><category term="defeating patchguard"/><category term="denial of service"/><category term="dhcp"/><category term="digital substation takeover"/><category term="disassembling"/><category term="django"/><category term="dns flood"/><category term="drone"/><category term="dsniff"/><category term="dvwa"/><category term="ebay"/><category term="economy"/><category term="electricity"/><category term="encryption flaw"/><category term="espionage"/><category term="ettercap"/><category term="events"/><category term="expression"/><category term="factorization"/><category term="fedora"/><category term="feedburner"/><category term="finance"/><category term="firmware hacking"/><category term="first"/><category term="ftcode"/><category term="github"/><category term="google api"/><category term="gprs attach"/><category term="gtp flood"/><category term="hacking exploit"/><category term="hacks"/><category term="hash cracking"/><category term="hash runner"/><category term="how to disable Intel ME"/><category term="httpd"/><category term="huawei"/><category term="iCloud"/><category term="iOS blocking"/><category term="ibm db2"/><category term="icmp timestamp"/><category term="ie"/><category term="intel me security"/><category term="iphone"/><category term="leaks"/><category term="lexer"/><category term="linux security"/><category term="literal"/><category term="mach"/><category term="mach interface generator"/><category term="machine learning"/><category term="mack kernel"/><category term="man in the middle"/><category term="management system"/><category term="maxpatrol"/><category term="microsoft file handling component"/><category term="mig"/><category term="mirai"/><category term="mitm"/><category term="mobile internet"/><category term="mod_rewrite"/><category term="mod_wsgi"/><category term="mysql"/><category term="net"/><category term="network equipment vulnerabilities"/><category term="network security ids evasion"/><category term="ng tcpip stack"/><category term="nginx"/><category term="online contests"/><category term="online transactions"/><category term="parser"/><category term="parsing"/><category term="password encryption"/><category term="patch protection"/><category term="patchguard bypass"/><category term="paypal"/><category term="pdp context delete"/><category term="pegasus"/><category term="phdays V"/><category term="phdays vi"/><category term="photos"/><category term="phpmyadmin"/><category term="phpstudy"/><category term="pirni"/><category term="processor module"/><category term="proxy"/><category term="proxy server"/><category term="quals"/><category term="quarantine"/><category term="ransomware"/><category term="raspberry pi"/><category term="registration"/><category term="remote code execution"/><category term="routers"/><category term="sap basis"/><category term="secure your money"/><category term="security bounty program"/><category term="security mistakes"/><category term="security recommendations"/><category term="security trends"/><category term="smartgrid"/><category term="social engineering"/><category term="social networks"/><category term="source code"/><category term="sql"/><category term="squid"/><category term="statement"/><category term="static code analysis"/><category term="stats"/><category term="subscriber location"/><category term="surfpatrol"/><category term="suricata"/><category term="surveillance"/><category term="sustes"/><category term="syntax"/><category term="system programming"/><category term="tasks"/><category term="technology trends"/><category term="tickets"/><category term="token"/><category term="trends"/><category term="trojan"/><category term="trxcon"/><category term="unified"/><category term="viber"/><category term="video"/><category term="videos"/><category term="viruses."/><category term="vulnerability reward program"/><category term="vulnerability scanner"/><category term="waf bypas"/><category term="wasc"/><category term="web"/><category term="web application"/><category term="web attack detection"/><category term="web-vulnerabilities"/><category term="wi-fi"/><category term="windows 8.1"/><category term="windows patchguard"/><category term="wireless controllers"/><category term="workshop"/><category term="xenserver"/><category term="xpc"/><category term="сс10"/><title type='text'>Positive Technologies - learn and secure </title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://blog.ptsecurity.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8549938467002440724/posts/default?max-results=3&amp;redirect=false'/><link rel='alternate' type='text/html' href='http://blog.ptsecurity.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/8549938467002440724/posts/default?start-index=4&amp;max-results=3&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>256</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>3</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8549938467002440724.post-3075781028747026848</id><published>2021-08-09T08:01:00.004-07:00</published><updated>2021-08-09T08:10:46.630-07:00</updated><title type='text'>PHDays 10 IDS Bypass contest: writeup and solutions</title><content type='html'>&lt;p style=&quot;text-align: justify;&quot;&gt;For the second time, the IDS Bypass contest was held at the Positive Hack Days conference. Just like last time (see&amp;nbsp;&lt;a href=&quot;http://blog.ptsecurity.com/2019/07/ids-bypass-contest-at-phdays-writeup.html&quot; target=&quot;_blank&quot;&gt;&lt;span color=&quot;windowtext&quot; style=&quot;text-decoration-line: none;&quot;&gt;blog.ptsecurity.com/2019/07/ids-bypass-contest-at-phdays-writeup.html&lt;/span&gt;&lt;/a&gt;), the players were supposed not only to find flaws in the six services and capture the flags, but also bypass the IDS, which would interfere with them. Alert messages about the facts of triggering IDS rules were supposed to help in bypassing them. And as you know from the last competition, there can be infinitely many solutions to tasks. Here we go.&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-dwfVsEgupwQ/YRE43Se0ALI/AAAAAAAAIX8/htWoggd3fnARh_-wAyQf5sNIySK2eAagQCLcBGAsYHQ/s2048/1.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;2048&quot; data-original-width=&quot;2047&quot; height=&quot;400&quot; src=&quot;https://1.bp.blogspot.com/-dwfVsEgupwQ/YRE43Se0ALI/AAAAAAAAIX8/htWoggd3fnARh_-wAyQf5sNIySK2eAagQCLcBGAsYHQ/w400-h400/1.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/span&gt;192.168.30.10—Apache Tomcat&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;On port 8080, we can see Apache Tomcat version 9.0.17. The first search for an exploit for this version should lead to CVE-2019-0232. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-aOl6ImpBKH4/YRE5NLX8azI/AAAAAAAAIYE/OM50qqwPryAbPPeuKuYp1iOZvXAp4Ab6gCLcBGAsYHQ/s684/2.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;146&quot; data-original-width=&quot;684&quot; height=&quot;136&quot; src=&quot;https://1.bp.blogspot.com/-aOl6ImpBKH4/YRE5NLX8azI/AAAAAAAAIYE/OM50qqwPryAbPPeuKuYp1iOZvXAp4Ab6gCLcBGAsYHQ/w640-h136/2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span lang=&quot;EN-US&quot;&gt;This task was intended as an introductory one and was supposed to be the simplest (although some of the other tasks turned out to be simpler). In the exploit, we see a test URL with the command /cgi/test.bat?&amp;amp;dir. But with such a request, it just freezes, and the player sees the IDS alert:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;background: rgb(40, 42, 46); color: #c5c8c6; font-family: Consolas; font-size: 10pt; line-height: 107%;&quot;&gt;ATTACK [PTsecurity] Apache Tomcat RCE on Windows (CVE-2019-0232)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;background: rgb(40, 42, 46); color: #c5c8c6; font-family: Consolas; font-size: 10pt; line-height: 107%;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;It was intended so that the players would modify the URL in the same way as they would do it to bypass the WAF. The regular expression in the rule looks like this: &lt;span style=&quot;background: lightgrey; mso-highlight: lightgrey;&quot;&gt;pcre: &quot;/\.(?:bat|cmd)\?\&amp;amp;/U&quot;;&lt;/span&gt; and soon the IDS would submit to the player. In addition, some exploits already have an example of a URL with a bypass, for example: &lt;span style=&quot;background: lightgrey; mso-highlight: lightgrey;&quot;&gt;http://localhost:8080/cgi/test.bat%20%20?&amp;amp;dir&lt;/span&gt;. As a result, many easily completed the task. We have taken a look at the contest, let&#39;s move on.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-MowOc3X-SMY/YRE6-wUeuuI/AAAAAAAAIYk/Py3Svoy0j_UnhjR2UZn3d075ZuEV4J2PwCLcBGAsYHQ/s773/3_1.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;225&quot; data-original-width=&quot;773&quot; src=&quot;https://1.bp.blogspot.com/-MowOc3X-SMY/YRE6-wUeuuI/AAAAAAAAIYk/Py3Svoy0j_UnhjR2UZn3d075ZuEV4J2PwCLcBGAsYHQ/s16000/3_1.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;192.168.30.&lt;/span&gt;&lt;span class=&quot;1&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;line-height: 107%;&quot;&gt;20—PHP Bypass&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;On the main page, we can see an offer to test the ls command. It warns us that it may not be working.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-wIAVq2fseUg/YRE7ykEZtpI/AAAAAAAAIYs/xxsTKdspDAAQCzmPDESYo8N5PfTVRxtegCLcBGAsYHQ/s745/4.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;325&quot; data-original-width=&quot;745&quot; height=&quot;280&quot; src=&quot;https://1.bp.blogspot.com/-wIAVq2fseUg/YRE7ykEZtpI/AAAAAAAAIYs/xxsTKdspDAAQCzmPDESYo8N5PfTVRxtegCLcBGAsYHQ/w640-h280/4.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;And, as expected—it is not working. There is a message in the log:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;background: rgb(40, 42, 46); color: #c5c8c6; font-family: Consolas; font-size: 10pt; line-height: 107%;&quot;&gt;ATTACK [PTsecurity] file_name parameter possible command injection&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;You might think that in the task you have to exploit RCE and get the flag, but the idea was different. In the summer of 2019, an author under the pseudonym &quot;@Menin_TheMiddle&quot; published an article (secjuice.com/abusing-php-query-string-parser-bypass-ids-ips-waf) about the IDS and WAF bypass. It said that a number of characters in the name of the GET parameter the PHP interpreter leads to an underscore (&quot;_&quot;). Our IDS, unlike PHP, does not do this. For example, the author used one of the public IDS rules of our AttackDetection team. And since the crucial part of the Suricata rule looked like this: &lt;span style=&quot;background: lightgrey;&quot;&gt;pcre: &quot;/file_name\s*=\s*[a-zA-Z\.]*[^a-zA-Z\.]/U&quot;;&lt;/span&gt;it was possible to bypass it simply by replacing the file_name parameter with, say, file[name. Due to an error in the Suricata rule, you could get the flag simply by sending file_name=.&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-E0b0Tjq7YBU/YRE8btaGUSI/AAAAAAAAIY0/2KJKoWPI46IVf_lxv_7QySnckQzDpEZ0QCLcBGAsYHQ/s531/5.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;163&quot; data-original-width=&quot;531&quot; height=&quot;196&quot; src=&quot;https://1.bp.blogspot.com/-E0b0Tjq7YBU/YRE8btaGUSI/AAAAAAAAIY0/2KJKoWPI46IVf_lxv_7QySnckQzDpEZ0QCLcBGAsYHQ/w640-h196/5.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;192.168.30.&lt;/span&gt;&lt;span class=&quot;1&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;line-height: 107%;&quot;&gt;30—He said yes&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;We see a form and instructions on how to get that flag. It is enough to give a simple answer &quot;yes&quot; to the HTTP request.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-MuhAS94m0mE/YRE9N9Y6psI/AAAAAAAAIY8/bLtUc5ytlQsYx38DFKMlWivmzjF-FJnqgCLcBGAsYHQ/s745/6.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;208&quot; data-original-width=&quot;745&quot; src=&quot;https://1.bp.blogspot.com/-MuhAS94m0mE/YRE9N9Y6psI/AAAAAAAAIY8/bLtUc5ytlQsYx38DFKMlWivmzjF-FJnqgCLcBGAsYHQ/s16000/6.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The players started a web server on their nodes, answered &quot;yes&quot; to incoming requests and saw the following line in the logs:&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;background: lightgrey; mso-highlight: lightgrey;&quot;&gt;JOKE [PTsecurity] Sometimes Positive Technologies hurts! No &#39;yes&#39; allowed&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;background: lightgrey; mso-highlight: lightgrey;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The rule checked all HTTP responses and did not allow those with the &quot;yes&quot; string inside. The game host also accepted the &quot;yes&quot; string in lowercase only, and this task received the largest number of different solutions!&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The idea was to redirect the incoming HTTP request to the HTTPS protocol and answer &quot;yes&quot; in the new request. For this vector, the allow_redirects=True and verify=False parameters were specially used in the requests library. The solution looked like this:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;echo -ne &quot;HTTP/1.1 302 Redirect\r\nLocation: https://10.8.0.2/hi_there\r\nContent-Length: 0\r\n\r\n&quot; | sudo nc -nkvlp 80&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;echo -ne &quot;HTTP/1.1 200 OK\r\nContent-Length: 3\r\nContent-Type: text/html\r\n\r\nyes&quot; | sudo ncat -nvklp 443 –ssl&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The player @vos used a hundredfold nested gzip compression for the HTTP response, and the player @webr0ck used zero filling of almost 2 megabytes in size before the &quot;yes&quot; string. In both cases, Suricata turned out to be powerless.&lt;/span&gt;&amp;nbsp;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;192.168.30.&lt;/span&gt;&lt;span class=&quot;1&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;line-height: 107%;&quot;&gt;40—DCERPC&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;It was the most expensive task in the competition. The players were given the administrator account credentials and asked to show their knowledge of Windows protocols. To get the flag, it was necessary to extract the list of all the users on the device.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-9XW6uRtln08/YRE-hJ-geoI/AAAAAAAAIZE/GtqenjYgd2EXfgHF0M7FQyvfmTXrdOdPgCLcBGAsYHQ/s491/7.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;234&quot; data-original-width=&quot;491&quot; height=&quot;306&quot; src=&quot;https://1.bp.blogspot.com/-9XW6uRtln08/YRE-hJ-geoI/AAAAAAAAIZE/GtqenjYgd2EXfgHF0M7FQyvfmTXrdOdPgCLcBGAsYHQ/w640-h306/7.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Those who are familiar with AD security can immediately think of the samrdump.py script from the impacket set, but the script addresses SMB port 445 that is closed on the host. The binding string in the script &lt;span style=&quot;background: lightgrey; mso-highlight: lightgrey;&quot;&gt;ncacn_np:*hostname*[\pipe\samr]&lt;/span&gt;is fixed and leads to the SMB pipe. In addition, of all open ports on the host, only port 135 is detected, the so-called Endpoint Mapper listens to it. EPM is responsible for resolving RPC interfaces.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Another script from the impacket set, rpcdump.py, uses EPM to obtain the list of currently active RPC interfaces.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&amp;gt; python rpcdump.py Administrator:TastesG00d@192.168.30.40&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Protocol: [MS-SAMR]: Security Account Manager (SAM) Remote Protocol&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Provider: samsrv.dll&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;UUID&amp;nbsp;&amp;nbsp;&amp;nbsp; : 12345778-1234-ABCD-EF00-0123456789AC v1.0&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Bindings:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ncacn_ip_tcp:192.168.30.40[49668]&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;           &lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ncacn_np:\\TASK4[\pipe\lsass]&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Among all the interfaces, we can see the one we need, SAMR, which is responsible, among other things, for user management. Using the SAM interface, the samrdump.py script extracts the list of users. That is, in addition to the SMB pipe, we can directly connect to port 49668 and request the list of users via the DCERPC protocol. To do this, we need to patch the samrdump.py script so that it directly addresses the SAMR interface instead of the pipe. The players @vos and @Abr1k0s opted for a different solution. They used a ready-made walksam tool from the rpctools set, the only difficulty of which is using the flag RPC_C_AUTHN_LEVEL_PKT_PRIVACY instead of RPC_C_AUTHN_LEVEL_CALL. Alternative methods were to use atsvc, svcctl, dcom, and other interfaces. All of them allow arbitrary code execution and are closed by IDS rules. The shutdown interface was also closed. The most unusual way to solve this task involved remote search for user creation events using wevtutil:&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-4Clebwq2DB0/YRE_mnB1kqI/AAAAAAAAIZM/QPiGDqnMU5Uf_aK9Uc1qtgjsJ3zbGf1DACLcBGAsYHQ/s960/8.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;72&quot; data-original-width=&quot;960&quot; src=&quot;https://1.bp.blogspot.com/-4Clebwq2DB0/YRE_mnB1kqI/AAAAAAAAIZM/QPiGDqnMU5Uf_aK9Uc1qtgjsJ3zbGf1DACLcBGAsYHQ/s16000/8.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;192.168.30.&lt;/span&gt;&lt;span class=&quot;1&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;line-height: 107%;&quot;&gt;50—RDP me&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The task is simple: to connect via RDP with a known account and read the flag from the desktop. The difficult part is that most of the known RDP clients are blocked by IDS rules. The players received one of the following messages every now and then:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;text-indent: -18pt;&quot;&gt;TOOLS [PTsecurity] xfreerdp/vinagre/remmina RDP client&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-US&quot;&gt;TOOLS [PTsecurity] xfreerdp/remmina RDP client&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-US&quot;&gt;TOOLS [PTsecurity] MSTSC Win10 RDP client&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-US&quot;&gt;TOOLS [PTsecurity] MSTSC Win7 RDP client&lt;/span&gt;&lt;/li&gt;&lt;li&gt;TOOLS [PTsecurity] Rdesktop RDP client&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;       &lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Sometimes different RDP clients behave the same way: for example, many Linux clients are built around the same library. The task has several solutions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The first one, which was originally envisaged, is a head-on solution. The player goes through different launch options or tries different clients and sees different IDS alerts. After traffic analysis, it becomes clear which packet is blocked by the IDS. Based on this, the player can draw a conclusion about how the rules work. The rules are triggered on certain channel sequences (channelDef) in the ClientNetworkData field and on the header order itself.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-_UNPFaynsYw/YRFAhTi-gHI/AAAAAAAAIZU/C0DTeO7zO5cXiVeWUbE8p1F7U1fYidNlACLcBGAsYHQ/s371/9.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;224&quot; data-original-width=&quot;371&quot; height=&quot;386&quot; src=&quot;https://1.bp.blogspot.com/-_UNPFaynsYw/YRFAhTi-gHI/AAAAAAAAIZU/C0DTeO7zO5cXiVeWUbE8p1F7U1fYidNlACLcBGAsYHQ/w640-h386/9.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Going through the launch options of the xfreerdp client of the latest versions, the player may come across the echo option:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;/p&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span lang=&quot;EN-US&quot;&gt;xfreerdp /v:192.168.30.50 /u:user /p:letmein +echo&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span lang=&quot;EN-US&quot;&gt;And xfreerdp with exactly these parameters will slip past the IDS rules.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Another way was demonstrated by @vos, @Abr1k0s, and @astalavista—they connected to the server using the Mocha RDP Lite mobile client. A fundamentally different solution using netsed was found by @webr0ck. Netsed, like a regular sed, is able to replace network data on the fly. The player simply zero-filled all the channel names in the ClientData RDP package.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-9q_RUtkYgsg/YRFBCLxWuOI/AAAAAAAAIZc/PmxPFgDvDLYt3lxVZR4IncYErYK6ZINKACLcBGAsYHQ/s587/10.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;102&quot; data-original-width=&quot;587&quot; height=&quot;112&quot; src=&quot;https://1.bp.blogspot.com/-9q_RUtkYgsg/YRFBCLxWuOI/AAAAAAAAIZc/PmxPFgDvDLYt3lxVZR4IncYErYK6ZINKACLcBGAsYHQ/w640-h112/10.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h4&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: large; text-align: left;&quot;&gt;192.168.30.6&lt;/span&gt;&lt;span class=&quot;1&quot; style=&quot;font-size: large; text-align: left;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;line-height: 19.26px;&quot;&gt;0—LDAP&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The description contains an IP address with open port 389. There are no credentials in the task, but the LDAP service supports anonymous connections (bind). However, with a simple connection using the Python library ldap3, we see the IDS alert in three lines.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;server = ldap3.Server(&#39;192.168.30.60&#39;, port=389)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;connection = ldap3.Connection(server)&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;connection.bind()&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;background: rgb(29, 31, 33); color: #c5c8c6; font-family: Consolas; font-size: 10pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;&quot;&gt;TEST [PTsecurity] LDAP ASN1 single byte length fields prohibited&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;background: rgb(29, 31, 33); color: #c5c8c6; font-family: Consolas; font-size: 10pt; line-height: 107%; mso-ansi-language: EN-US; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-bidi-language: AR-SA; mso-bidi-theme-font: minor-bidi; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;We captured the dump of our traffic and we see that the bind itself is successful, but the searchRequest that the library sent after that remains unanswered. The IDS rule is triggered on it.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-khhJBmDhVYM/YRFB-HEpACI/AAAAAAAAIZk/Ng_lXV1hFXk07bWwcai31VCDXZFmv8PgQCLcBGAsYHQ/s573/11.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;136&quot; data-original-width=&quot;573&quot; height=&quot;152&quot; src=&quot;https://1.bp.blogspot.com/-khhJBmDhVYM/YRFB-HEpACI/AAAAAAAAIZk/Ng_lXV1hFXk07bWwcai31VCDXZFmv8PgQCLcBGAsYHQ/w640-h152/11.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The Windows utilities ADSIEdit and ldp, as well as the Linux utility ldapsearch, give similar results, but with different alerts:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;background: rgb(29, 31, 33); color: #c5c8c6; font-family: Consolas; font-size: 10pt;&quot;&gt;TEST [PTsecurity] LDAP ASN1 1-byte length encoded found&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;background: rgb(29, 31, 33); color: #c5c8c6; font-family: Consolas; font-size: 10pt;&quot;&gt;TEST [PTsecurity] LDAP ASN1 2-byte length encoded found&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;   &lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;background: rgb(29, 31, 33); color: #c5c8c6; font-family: Consolas; font-size: 10pt;&quot;&gt;TEST [PTsecurity] LDAP ASN1 4-byte length encoded found&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;background: rgb(29, 31, 33); color: #c5c8c6; font-family: Consolas; font-size: 10pt;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The whole point turns out to be how the lengths of individual fields in LDAP messages are encoded. The byte x in the byte sequence 30 8x yy yy yy is responsible for the length of the length field in bytes. For example, the sequence 30 82 00 02 encodes two bytes of the length field 00 02. Thus, the players were required to try fields of a different length and find that the IDS is not triggered on the field of 3 bytes long. The flag is in the response among the namingContexts fields. The task implied the only solution, and only two of the players managed to do the task.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-3TD0VRv7V_s/YRFCaxiV1HI/AAAAAAAAIZs/gAr5jbSdYI8FkOv5jbzlggNxntgmHO1wgCLcBGAsYHQ/s484/12.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;102&quot; data-original-width=&quot;484&quot; height=&quot;134&quot; src=&quot;https://1.bp.blogspot.com/-3TD0VRv7V_s/YRFCaxiV1HI/AAAAAAAAIZs/gAr5jbSdYI8FkOv5jbzlggNxntgmHO1wgCLcBGAsYHQ/w640-h134/12.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;/div&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;h4&gt;&lt;span class=&quot;2&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;Results&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;:&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;1 place: @vos—Apple Watch Series 6 + backpack&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;2 place: @psih1337—cash reward + backpack&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;3 place: @Abr1k0s—backpack&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;i&gt;Author:&amp;nbsp;Kirill Shipulin, Positive Technologies&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.ptsecurity.com/feeds/3075781028747026848/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.ptsecurity.com/2021/08/phdays-10-ids-bypass-contest-writeup.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8549938467002440724/posts/default/3075781028747026848'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8549938467002440724/posts/default/3075781028747026848'/><link rel='alternate' type='text/html' href='http://blog.ptsecurity.com/2021/08/phdays-10-ids-bypass-contest-writeup.html' title='PHDays 10 IDS Bypass contest: writeup and solutions'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-dwfVsEgupwQ/YRE43Se0ALI/AAAAAAAAIX8/htWoggd3fnARh_-wAyQf5sNIySK2eAagQCLcBGAsYHQ/s72-w400-h400-c/1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8549938467002440724.post-3871357347453766801</id><published>2021-08-03T07:38:00.003-07:00</published><updated>2021-08-09T08:07:19.190-07:00</updated><title type='text'>APT31 new dropper. Target destinations: Mongolia, Russia, the U.S., and elsewhere</title><content type='html'>&lt;p&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;Our pros at the PT Expert Security Center regularly spot emerging threats to information security and track the activity of hacker groups.&lt;/span&gt;&lt;a name=&quot;_Hlk77876586&quot; style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;During such monitoring in April 2021, a mailing list with previously&amp;nbsp;&lt;/a&gt;&lt;a name=&quot;_Hlk77877040&quot; style=&quot;text-align: justify;&quot;&gt;unknown malicious content was sent to Mongolia.&lt;/a&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;Similar attacks were subsequently identified in Russia, Belarus, Canada, and the United States. According to PT ESC threat intelligence analysts, from January to July 2021, approximately 10 attacks were carried out using the discovered malware samples.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0cm; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Some of the files found during the study had rather interesting names (&quot;&lt;/span&gt;хавсралт&lt;span lang=&quot;EN-US&quot;&gt;.scr&quot; [&quot;havsralt.scr&quot;] (mong. attachment), &quot;&lt;/span&gt;Информация&lt;span lang=&quot;EN-US&quot;&gt;_&lt;/span&gt;Рб&lt;span lang=&quot;EN-US&quot;&gt;_&lt;/span&gt;июнь&lt;span lang=&quot;EN-US&quot;&gt;_2021_&lt;/span&gt;года&lt;span lang=&quot;EN-US&quot;&gt;_2021062826109.exe&quot;) and, as the study showed, they contained a remote access trojan (RAT). A detailed analysis of malware samples, data on the paths on which working directories and registry keys were located, techniques and mechanisms used by the attackers (from the injection of malicious code to the logical blocks and structures used) helped correlate this malware with the activity of the &lt;a name=&quot;_Hlk77876682&quot;&gt;APT31 group.&lt;/a&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0cm; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a name=&quot;_Hlk77876682&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;In this article, we will study the malware created by the group, focus in more detail on the types of droppers discovered and the tricks used by its developers.&amp;nbsp; You may find the whole text of the research and indicators of compromise that can be used by cybersecurity specialists to identify traces of the group&#39;s attacks and search for threats in their infrastructure &lt;/span&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/apt31-new-attacks/&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;EN-US&quot;&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h2&gt;&lt;span lang=&quot;EN-US&quot;&gt;Dropper&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The main objective of the dropper, the appearance of the main function of which is shown in Figure 1, is the creation of two files on the infected computer: a malicious library and an application vulnerable to DLL Sideloading (this application is then launched). Both files are always created over the same path: C:\ProgramData\Apacha. In the absence of this directory, it is created and the process is restarted.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-b3TaDEE0Ub4/YQlF-5Vs9WI/AAAAAAAAIVU/AJEPShtxEfkSUOrrpQfaGCwLXDsI_phewCLcBGAsYHQ/s739/1.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;739&quot; data-original-width=&quot;707&quot; height=&quot;640&quot; src=&quot;https://1.bp.blogspot.com/-b3TaDEE0Ub4/YQlF-5Vs9WI/AAAAAAAAIVU/AJEPShtxEfkSUOrrpQfaGCwLXDsI_phewCLcBGAsYHQ/w613-h640/1.png&quot; width=&quot;613&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 1. Overview of the dropper&#39;s basic function&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;At the second stage, the application launched by the dropper loads the malicious library and calls one of its functions. It is noteworthy that &lt;a name=&quot;_Hlk78283417&quot;&gt;MSVCR100.dll&lt;/a&gt; was chosen as the name of the malicious library in all cases. A library with an identical name is included in Visual C ++ for Microsoft Visual Studio. It is available on almost all PCs, but in a legitimate case it is located in the System32 folder (Figure 2). Moreover, the size of the malicious library is much smaller than the legitimate one.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-M0t2WZMhrNI/YQlHuuMrsaI/AAAAAAAAIVg/cspd9llAAGIPf2Ci53c-VnEXbv88gN8NwCLcBGAsYHQ/s824/2.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;43&quot; data-original-width=&quot;824&quot; height=&quot;33&quot; src=&quot;https://1.bp.blogspot.com/-M0t2WZMhrNI/YQlHuuMrsaI/AAAAAAAAIVg/cspd9llAAGIPf2Ci53c-VnEXbv88gN8NwCLcBGAsYHQ/w640-h33/2.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 2. Parameters of the legitimate MSVCR100.dll&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;It is also worth noting the trick of the malware developers: by way of exports, the library contains names that can be found in the legitimate MSVCR100.dll. Without a doubt, this was done to make the malicious library as identical to the original version as possible.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-BUwPpugSMXU/YQlII3sHtrI/AAAAAAAAIVo/ZrsG25GneRUYd8UzmkWtHJACHW_50X_dwCLcBGAsYHQ/s609/3.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;609&quot; data-original-width=&quot;452&quot; height=&quot;640&quot; src=&quot;https://1.bp.blogspot.com/-BUwPpugSMXU/YQlII3sHtrI/AAAAAAAAIVo/ZrsG25GneRUYd8UzmkWtHJACHW_50X_dwCLcBGAsYHQ/w477-h640/3.png&quot; width=&quot;477&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 3. Part of the exports of malicious &lt;a name=&quot;_Hlk78283701&quot;&gt;MSVCR100.dll&lt;/a&gt;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;However, the number of exports in the malicious sample is much smaller, and most of them are ExitProcess calls.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Below is an example of a call to a malicious function from the created library. After the call, control is transferred to the malicious code. Note that the names of malicious functions were most often those used during the regular loading of applications.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-MoO5BEYg3r4/YQlInA74NEI/AAAAAAAAIVw/rDVjyoAKWX0-esWyglWCexM23A1C1vSZACLcBGAsYHQ/s751/4.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;256&quot; data-original-width=&quot;751&quot; height=&quot;218&quot; src=&quot;https://1.bp.blogspot.com/-MoO5BEYg3r4/YQlInA74NEI/AAAAAAAAIVw/rDVjyoAKWX0-esWyglWCexM23A1C1vSZACLcBGAsYHQ/w640-h218/4.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 4. Calling a malicious function inside a legitimate application&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;During the analysis of malware samples, we detected different versions of droppers that contain the same set of functions. The main difference is the name of the directory in which the files contained in the dropper will be created. However, in all the instances studied, the directories found in C:\ProgramData\ were used.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The version of the dropper that downloads all files from the control server is worthy of particular note. Let&#39;s take a closer look. At the first stage, the presence of a working directory is also checked, after which connection is made to the control server and the necessary data is downloaded from it.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-lGFwMdhBRxk/YQlJLYurrnI/AAAAAAAAIV4/6gHQn-uROfcRWYFR9v_NMu5AfmqEnBwrQCLcBGAsYHQ/s538/5.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;155&quot; data-original-width=&quot;538&quot; height=&quot;184&quot; src=&quot;https://1.bp.blogspot.com/-lGFwMdhBRxk/YQlJLYurrnI/AAAAAAAAIV4/6gHQn-uROfcRWYFR9v_NMu5AfmqEnBwrQCLcBGAsYHQ/w640-h184/5.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 5. Checking for a directory&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Communication with the server is not encrypted in any way, nor is the control server&#39;s address inside the malware. &lt;/span&gt;Downloaded files are written to the created working directory.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-tMoJOORx-2Q/YQlJaq8jgZI/AAAAAAAAIV8/xwuBtaLlRg88AbebD-A-AnqHjQI0T6LaACLcBGAsYHQ/s723/6.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;167&quot; data-original-width=&quot;723&quot; height=&quot;148&quot; src=&quot;https://1.bp.blogspot.com/-tMoJOORx-2Q/YQlJaq8jgZI/AAAAAAAAIV8/xwuBtaLlRg88AbebD-A-AnqHjQI0T6LaACLcBGAsYHQ/w640-h148/6.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 6. Creating files in the working directory&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Figure 7 displays the code sections responsible for downloading all files from the server (the last reviewed case), while Figure 8 displays the code for loading the main library (first instance).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-lN0NEejzWV4/YQlJuHyaI5I/AAAAAAAAIWI/7Sx5HoT6PkkmCsjJZWt2_kPpNHvc-Zw5wCLcBGAsYHQ/s774/7.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;774&quot; data-original-width=&quot;680&quot; height=&quot;640&quot; src=&quot;https://1.bp.blogspot.com/-lN0NEejzWV4/YQlJuHyaI5I/AAAAAAAAIWI/7Sx5HoT6PkkmCsjJZWt2_kPpNHvc-Zw5wCLcBGAsYHQ/w562-h640/7.png&quot; width=&quot;562&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 7. Downloading files from C2&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-ilzzY1sT4fM/YQlKHbbSFuI/AAAAAAAAIWQ/p2W2s7ywmIsL9Wd7hQfV7otjV_EnPMPAQCLcBGAsYHQ/s847/8.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;847&quot; data-original-width=&quot;697&quot; height=&quot;640&quot; src=&quot;https://1.bp.blogspot.com/-ilzzY1sT4fM/YQlKHbbSFuI/AAAAAAAAIWQ/p2W2s7ywmIsL9Wd7hQfV7otjV_EnPMPAQCLcBGAsYHQ/w526-h640/8.png&quot; width=&quot;526&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 8. Downloading a malicious library from C2&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;text-align: left;&quot;&gt;Examining the open directories of control servers revealed unencrypted libraries (Figure 9).&lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-D9AvAGqCYuU/YQlKlsMy8HI/AAAAAAAAIWY/_DinL5W67vYEcc4-jCzz37UFSZi0Cfo_wCLcBGAsYHQ/s485/%25D0%25BF%25D0%25BE%25D1%2581.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;263&quot; data-original-width=&quot;485&quot; height=&quot;348&quot; src=&quot;https://1.bp.blogspot.com/-D9AvAGqCYuU/YQlKlsMy8HI/AAAAAAAAIWY/_DinL5W67vYEcc4-jCzz37UFSZi0Cfo_wCLcBGAsYHQ/w640-h348/%25D0%25BF%25D0%25BE%25D1%2581.jpg&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 9. Encrypted and unencrypted libraries on the server&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;It is also worth noting that in some cases, particularly during attacks on Mongolia, the dropper was signed with a valid digital signature (Figure 10). &lt;/span&gt;We believe that this signature was most likely stolen.&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-dsTPiBeO84g/YQlLBuLlKeI/AAAAAAAAIWg/btxJqIM-zwIip9q27WPFMthsXwepoGlSACLcBGAsYHQ/s482/9.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;482&quot; data-original-width=&quot;404&quot; height=&quot;640&quot; src=&quot;https://1.bp.blogspot.com/-dsTPiBeO84g/YQlLBuLlKeI/AAAAAAAAIWg/btxJqIM-zwIip9q27WPFMthsXwepoGlSACLcBGAsYHQ/w536-h640/9.png&quot; width=&quot;536&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 10. Valid digital signature of a dropper&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;h2&gt;&lt;span lang=&quot;EN-US&quot;&gt;Malicious library&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h2&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Execution commences with receipt of a list of launched processes. That said, this has no impact on anything and is not used anywhere. The library then checks for the presence of the file C:\\ProgramData\\Apacha\\ssvagent.dll. This is the encrypted main load downloaded from the server.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;In fact, this is a 5-byte XOR with a key built into the library. Inside the binary file, the key is stored in the form xmmword with the constant 9000000090000000900000009h (the fifth byte is added to the memory by the malware itself using the direct address). In fact, encryption is performed with byte 0x9. After decrypting the C2 address, it connects to the control server and downloads the encrypted payload from it. Then the received data is saved in the file C:\\ProgramData\\Apacha\\ssvagent.dll, and the legitimate application ssvagent.exe is restarted. The main part of the described functions is presented in Figure 11.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-akqBgn9Jsm4/YQlNVC4mieI/AAAAAAAAIWo/2ofsKVK3tp0BjhNgXWR3hP1c3kQDFiotACLcBGAsYHQ/s781/10.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;453&quot; data-original-width=&quot;781&quot; height=&quot;373&quot; src=&quot;https://1.bp.blogspot.com/-akqBgn9Jsm4/YQlNVC4mieI/AAAAAAAAIWo/2ofsKVK3tp0BjhNgXWR3hP1c3kQDFiotACLcBGAsYHQ/w640-h373/10.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 11. Decrypting the C2 address, loading and launching a new instance of ssvagent.exe&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;If the payload has been loaded earlier, it is checked for an application that is already running. To do this, a mutex named ssvagent is created; if it has been created, the application ends.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The library then writes the legitimate ssvagent.exe to startup via the registry, as shown in Figure 12.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-_wXi0uI7p3Y/YQlNtmiCdiI/AAAAAAAAIWw/wjgZcTQj9REy5abtKODcw3myY0PBaSwYQCLcBGAsYHQ/s698/11.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;259&quot; data-original-width=&quot;698&quot; height=&quot;238&quot; src=&quot;https://1.bp.blogspot.com/-_wXi0uI7p3Y/YQlNtmiCdiI/AAAAAAAAIWw/wjgZcTQj9REy5abtKODcw3myY0PBaSwYQCLcBGAsYHQ/w640-h238/11.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 12. Persistence via registry key&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;After this, the file downloaded from the server is decrypted using a XOR operation with a 5-byte key. Then the decrypted data is placed in the application memory, and control is transferred to it.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h2&gt;&lt;span lang=&quot;EN-US&quot;&gt;Payload&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h2&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The main library starts its execution by creating a package that will be sent to the server. &lt;/span&gt;Officially, the package is created from three parts:&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;mso-list: l0 level1 lfo1; text-indent: -18pt;&quot;&gt;&lt;/p&gt;&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;text-indent: -18pt;&quot;&gt;main heading&lt;/span&gt;&lt;/li&gt;&lt;li&gt;hash&lt;span lang=&quot;EN-US&quot; style=&quot;text-indent: -18pt;&quot;&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;encrypted data&lt;/li&gt;&lt;/ol&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The research describes their structures (&lt;/span&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/apt31-new-attacks/&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;learn more&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;EN-US&quot;&gt;).&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;text-align: justify;&quot;&gt;To generate a hash, which is preceded by the main heading, the malware obtains the MAC address and PC name (the result of executing GetComputerNameExW). These values are concatenated&lt;span face=&quot;Calibri, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 14.6667px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;text-align: justify;&quot;&gt;(without using any separators), after which an MD5 hash is taken from the resulting value, which is then converted into a string. &lt;/span&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;An example of hash generation is presented in Figure 1&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;text-align: justify;&quot;&gt;3&lt;/span&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-qJnWp6xAVkQ/YQlQUeFBX8I/AAAAAAAAIW4/yfCmK5SiSpgzesAhyCECKtr8w4UkLSWuACLcBGAsYHQ/s387/12.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;146&quot; data-original-width=&quot;387&quot; height=&quot;242&quot; src=&quot;https://1.bp.blogspot.com/-qJnWp6xAVkQ/YQlQUeFBX8I/AAAAAAAAIW4/yfCmK5SiSpgzesAhyCECKtr8w4UkLSWuACLcBGAsYHQ/w640-h242/12.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 13. Example of hash generation&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The third part of the package is then formed.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-zHolNFAklU0/YQlQpT4b1NI/AAAAAAAAIXA/nAqURLPUcrYxYmS8Hh7h_1baRilw0-qUwCLcBGAsYHQ/s672/13.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;94&quot; data-original-width=&quot;672&quot; height=&quot;90&quot; src=&quot;https://1.bp.blogspot.com/-zHolNFAklU0/YQlQpT4b1NI/AAAAAAAAIXA/nAqURLPUcrYxYmS8Hh7h_1baRilw0-qUwCLcBGAsYHQ/w640-h90/13.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 14. An example of a generated package&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The format of a complete generated package is presented below. The main heading is highlighted in green; the hash, in red; the encrypted data, in yellow.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-2MYxDrhhBHQ/YQlQ7uFfrLI/AAAAAAAAIXI/da8q2yy5ecEIpENBN5nYdp9Y-7X5SB6qgCLcBGAsYHQ/s689/14.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;131&quot; data-original-width=&quot;689&quot; height=&quot;122&quot; src=&quot;https://1.bp.blogspot.com/-2MYxDrhhBHQ/YQlQ7uFfrLI/AAAAAAAAIXI/da8q2yy5ecEIpENBN5nYdp9Y-7X5SB6qgCLcBGAsYHQ/w640-h122/14.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 15. Encrypted package with all headings&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-ygl5jIJsjOY/YQlRmogWrxI/AAAAAAAAIXQ/jRsVLq3UzN0U9I-Hdt2f405rNTFcpoiFgCLcBGAsYHQ/s544/15.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;544&quot; data-original-width=&quot;496&quot; height=&quot;640&quot; src=&quot;https://1.bp.blogspot.com/-ygl5jIJsjOY/YQlRmogWrxI/AAAAAAAAIXQ/jRsVLq3UzN0U9I-Hdt2f405rNTFcpoiFgCLcBGAsYHQ/w584-h640/15.png&quot; width=&quot;584&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 16. Decrypting data from a specific position within a binary file&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The generated package is encrypted with RC-4 with the key 0x16CCA81F, which is embedded in the encrypted data and sent to the server. After this, malware waits for commands from the server.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Let&#39;s take a look at the list of commands that the malware implements: &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-left: 31.2pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;0x3: get information on mapped drives.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-left: 31.2pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;0x4: perform file search.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-left: 31.2pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;0x5: create a process, communication through the pipe.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-left: 31.2pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;0xA: create a process via ShellExecute.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-left: 31.2pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;0xC: create a new stream with a file download from the server.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-left: 31.2pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;0x6, 0x7, 0x8, 0x9 (identical): search for a file or perform the necessary operation via SHFileOperationW (copy file, move file, rename file, delete file).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-left: 31.2pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;0xB: create a directory.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-left: 31.2pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;0xD: create a new stream, sending the file to the server.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;                 &lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-left: 31.2pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;0x11: self-delete.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-left: 31.2pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;The code for processing the last command is particularly intriguing: all the created files and registry keys are deleted using a bat-file.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-FmABE6wihjs/YQlSOjaXMtI/AAAAAAAAIXY/ujm4lQXuI3QOB6TEWBSwKpI1h9FgMGThgCLcBGAsYHQ/s597/16.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;426&quot; data-original-width=&quot;597&quot; height=&quot;456&quot; src=&quot;https://1.bp.blogspot.com/-FmABE6wihjs/YQlSOjaXMtI/AAAAAAAAIXY/ujm4lQXuI3QOB6TEWBSwKpI1h9FgMGThgCLcBGAsYHQ/w640-h456/16.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Figure 17. Code for removing all components&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;A more detailed description of the payload is available in the &lt;/span&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/apt31-new-attacks/&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;full report&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;EN-US&quot;&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h2&gt;&lt;span lang=&quot;EN-US&quot;&gt;Attribution&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;During our study, we found a &lt;/span&gt;&lt;a href=&quot;https://www.secureworks.com/research/dropboxaes-remote-access-trojan&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Secureworks report&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;EN-US&quot;&gt; describing the APT31 DropboxAES RAT trojan. Analysis of the detected malware instances allows us to assert that the group is also behind the attack we studied. The criteria on the basis of which the attacks were attributed are detailed in the report (&lt;/span&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/apt31-new-attacks/&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;read more&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;EN-US&quot;&gt;).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h2&gt;&lt;span lang=&quot;EN-US&quot;&gt;Conclusion&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h2&gt;&lt;div&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;We analyzed new versions of the malware used by APT31 in attacks from January to July this year. The revealed similarities with earlier versions of malicious samples described by researchers, such as in 2020, suggest that the group is expanding the geography of its interests to countries where its growing activity can be detected, Russia in particular. We believe that further instances will be revealed soon of this group being used in attacks, including against Russia, along with other tools that might be identified by code correspondence or network infrastructure.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/apt31-new-attacks/&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Follow the link&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;EN-US&quot;&gt; to read the full report and get indicators of compromise. You can see more PT ESC reports on current cyber threats, new malware samples, activity of APT groups, hacker techniques and tools in &lt;/span&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;the blog&lt;/span&gt;&lt;/a&gt;&lt;span lang=&quot;EN-US&quot;&gt; on our website.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;i&gt;&lt;span lang=&quot;EN-US&quot;&gt;Authors:&amp;nbsp;&lt;/span&gt;Denis Kuvshinov, Daniil Koloskov, PT ESC Threat Intelligence, Positive Technologies&amp;nbsp;&lt;/i&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;   &lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: normal; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&amp;nbsp;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.ptsecurity.com/feeds/3871357347453766801/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.ptsecurity.com/2021/08/apt31-new-dropper-target-destinations.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8549938467002440724/posts/default/3871357347453766801'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8549938467002440724/posts/default/3871357347453766801'/><link rel='alternate' type='text/html' href='http://blog.ptsecurity.com/2021/08/apt31-new-dropper-target-destinations.html' title='APT31 new dropper. Target destinations: Mongolia, Russia, the U.S., and elsewhere'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-b3TaDEE0Ub4/YQlF-5Vs9WI/AAAAAAAAIVU/AJEPShtxEfkSUOrrpQfaGCwLXDsI_phewCLcBGAsYHQ/s72-w613-h640-c/1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8549938467002440724.post-2865585747573787109</id><published>2021-07-19T03:54:00.007-07:00</published><updated>2021-07-19T06:00:09.733-07:00</updated><title type='text'>How to detect a cyberattack and prevent money theft</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;i style=&quot;font-family: arial;&quot;&gt;Money theft is one of the most important risks for any organization, regardless of its scope of activity. According to our data, 42% of cyberattacks on companies are committed to obtain direct financial benefits.  You can detect an attack at various stages — from network penetration to the moment when attackers start withdrawing money.  In this article, we will show how to detect an attack at each of its stages and minimize the risk, as well as analyze two common scenarios of such attacks: money theft manually using remote control programs and using special malware — a banking trojan.&lt;/i&gt;&lt;/div&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;p&gt;&lt;/p&gt;&lt;div&gt;&lt;div style=&quot;border: none; line-height: 20px; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;h3 style=&quot;color: black; margin-top: 0cm; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: helvetica;&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 23.4px; margin: 4pt -0.1pt 8pt 0cm; text-align: center;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-size: large; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 23.4px; margin: 4pt -0.1pt 8pt 0cm; text-align: center;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-size: large; text-align: left;&quot;&gt;Where to look for signs of the attack&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;/div&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h4 style=&quot;color: black; text-align: left;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: helvetica; font-size: medium;&quot;&gt;Penetration into the company&#39;s network&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: helvetica; font-size: medium;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;h4 style=&quot;color: black; text-align: center;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: helvetica;&quot;&gt;Phishing emails&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: helvetica;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Most often, attackers get into the local network by sending phishing emails with malicious attachments. &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/advanced-persistent-threat-apt-attack-cost-report/&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; style=&quot;mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;According to our data&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;, this is how 9 out of 10 APT groups start their attack.&amp;nbsp;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;In most cases, a document of .doc, .docx, .xls, or .xlsx extensions with one of the payload types is used in phishing emails:&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;left&quot; class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 19.85pt; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 0cm 19.85pt; mso-border-shadow: yes; mso-list: l0 level2 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-align: left; text-indent: -17pt;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;&lt;span style=&quot;font-family: Noto Sans Symbols;&quot;&gt;●&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;; font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: arial; font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;VBA or Excel 4.0 macro&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt; &lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;left&quot; class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 10.0pt; margin-left: 19.85pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 10pt 19.85pt; mso-border-shadow: yes; mso-list: l0 level2 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-align: left; text-indent: -17pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Exploit for a vulnerability in a Microsoft Office component, such as CVE-2017-0199, CVE-2017-11882, CVE-2018-0802.&amp;nbsp;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;left&quot; class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 10.0pt; margin-left: 19.85pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 10pt 19.85pt; mso-border-shadow: yes; mso-list: l0 level2 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-align: left; text-indent: -17pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Before running the document, you should first perform a static analysis, which can show whether the file is malicious. There are quite a lot of approaches to detection: using exact hash sums of the file (MD5, SHA1, SHA256) and using more flexible hash sums, such as SSDEEP. In the simplest case, you can find ASCII and Unicode strings in the file. But the most reliable will be the analysis of code fragments, during which you can identify the characteristic sequence of operations and encryption features.&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;However, static analysis does not always help detect suspicious files. A more reliable way is to run the file in a sandbox, where its behavior is analyzed.&amp;nbsp;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;As a result of launching a malicious file, a subprocess is usually created in the context of an office application. Calls to create a new process in user space, such as CreateProcessA or CreateProcessW, are intercepted at the kernel level by calling NtCreateUserProcess or NtCreateProcessEx. But launching a process with a malicious payload can take place in other ways:&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Creating a task in the task scheduler. As a rule, the fact of creating a task can be detected with the help of several characteristic actions. &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 24.1pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 24.1pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -21.25pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;First, it is the creation of additional keys in the registry branch &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;   &lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 21.25pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 21.25pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -21.25pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Schedule\TaskCache\Tree with the task properties. Second, it can be done with the help of the new task files in the directories C:\Windows\Tasks and C:\Windows\System32\Tasks. Third, it is the appearance of entries about the creation of a scheduled task in the event logs (events with the ID 4698). Moreover, you can not only create a task, but also change an existing one, in this case, the events in the log will have the ID 4702.&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 21.25pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 21.25pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -21.25pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 21.25pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 21.25pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -21.25pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 21.25pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 21.25pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -21.25pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;There is another technique: to track access to the COM interface&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333; font-family: arial; text-indent: -21.25pt;&quot;&gt;0F87369F-A4E5-4CFC-BD3E-73E6154572DD and interaction with it, because this is what schtasks.exe, the standard Windows utility for creating tasks in the console, does, for example. It is often used by attackers.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 21.25pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 21.25pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -21.25pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 21.25pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 21.25pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -21.25pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Creating a service. The fact of creating a new service can be detected by the appearance of additional keys in the registry branches HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services and HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\ROOT\LEGACY_*. In the Windows event logs, the creation of the service will correspond to entries with the ID 4697 or 7045. In addition, you can track the RPC call to the interface 367ABB81-9844-35F1-AD32-98F038001003 of the RPC server \PIPE\svcctl.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; text-indent: -18pt;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;text-indent: -18pt;&quot;&gt;Autorun via the startup directory or registry. In the first case, this is a file entry in the %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup or %ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup directories. The second one contains the registry keys HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run, HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon, and others (the identification of this technique is discussed in detail in the Persistence section).&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: arial; text-indent: -18pt;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;New files in the system and the memory of the created processes also need to be scanned for malicious code.&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;margin-top: 0cm; text-align: left;&quot;&gt;&lt;h4 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: small;&quot;&gt;Attack on the web application&lt;/span&gt;&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; font-weight: normal;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; text-align: left;&quot;&gt;Another common method of hacking is to exploit a vulnerability in a web application on the company&#39;s perimeter. The results of &lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/external-pentests-results-2020/&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; style=&quot;color: blue; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;pentesting&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; text-align: left;&quot;&gt;projects conducted by our experts show that in 86% of companies there is at least one way to get into the internal network through a vulnerable web application.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; text-align: left;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;It is necessary to track suspicious process launches using Windows security event log events with the ID 4688 or Sysmon log events with the ID 1. For example, running the cmd.exe command line, whose parent process is w3wp.exe (OWA service) will be suspicious. You should also monitor the creation of new processes on behalf of the user who started the process responsible for the operation of the attacked service.&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: arial; text-align: left;&quot;&gt;The successful exploitation of the vulnerability and uploading of the web shell can be indicated by the events of creating files with certain extensions, for example .asmx, .jsp, .php, and .aspx in the file directories of running services.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: arial; text-align: left;&quot;&gt;Network traffic analysis allows you to identify known techniques for exploiting vulnerabilities (for example, Path Traversal) or signs of using specific exploits. To detect the exploitation of unknown vulnerabilities, you need to monitor suspicious activity, for example, the presence of console utility launch strings or console utility data output patterns in the traffic. Such traffic may indicate the use of a web shell, which is often the next step after successfully exploiting a vulnerability. Another anomaly may be multiple requests containing incorrect data originating from a limited number of external addresses.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; font-weight: normal;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-wLJZm-mUge0/YPU73BbJAgI/AAAAAAAAITY/hKnFmfREylIDtcsfom4qFd03jyKF_lO9QCLcBGAsYHQ/s519/1.png&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;94&quot; data-original-width=&quot;519&quot; height=&quot;117&quot; src=&quot;https://1.bp.blogspot.com/-wLJZm-mUge0/YPU73BbJAgI/AAAAAAAAITY/hKnFmfREylIDtcsfom4qFd03jyKF_lO9QCLcBGAsYHQ/w640-h117/1.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Trebuchet MS&amp;quot;, sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;font-size: 9pt;&quot;&gt;Figure 1. String with the request to read the file /etc/passwd&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Trebuchet MS&amp;quot;, sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;font-size: 9pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: center;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: small;&quot;&gt;Password spraying for available services&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt -0.1pt 8pt 0cm; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: arial; text-align: left;&quot;&gt;The third method is bruteforcing credentials to the services available on the perimeter. If an attacker tries to bruteforce passwords to one account, such an attack will quickly be noticed, and the account will be blocked. Therefore, criminals are more likely to resort to Password Spraying—an attack in which accounts are matched against one common password.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;a name=&quot;_Hlk76124516&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;A password spraying attack &lt;/span&gt;&lt;/a&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;can be detected by monitoring the event logs. To do this, you need to track the following events in the security event log:&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;4625 &quot;An account failed to log on&quot; from hosts having services installed that are available on the network perimeter, such as OWA&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;4771 &quot;Kerberos pre-authentication failed&quot; with the error code 0x6 &quot;Client not found in Kerberos database&quot; and 0x18 &quot;Pre-authentication information was invalid&quot;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;   &lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 10.0pt; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 10pt 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;4776 &quot;The computer attempted to validate the credentials for an account&quot; in the case of NTLM authentication, with error codes &lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;background: white; color: #222222; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-highlight: white;&quot;&gt;C0000064 &quot;Username does not exist&quot;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt; and C000006A &quot;Username correct but password invalid&quot;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 10.0pt; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 10pt 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: -.1pt; margin-top: 4.0pt; margin: 4pt -0.1pt 8pt 0cm; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;For events 4625, it is possible to detect the address from which the password spraying attack is carried out, so the detection logic is based on searching for multiple triggers from the same IP address, but for different users. Events 4776 and 4771 appear on the domain controller and will have the addresses of the hosts where the services are located as the source address. In this case, you need to track multiple failed authentication attempts with different accounts over a certain period of time, such as 30 seconds.&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: -.1pt; margin-top: 4.0pt; margin: 4pt -0.1pt 8pt 0cm; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-sc7j9NlFIlw/YPVE6vIP89I/AAAAAAAAIT4/X7ET_cAuFR4f4wC_G3r0CTwUezsfyIR7QCLcBGAsYHQ/s783/2.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;783&quot; data-original-width=&quot;716&quot; height=&quot;400&quot; src=&quot;https://1.bp.blogspot.com/-sc7j9NlFIlw/YPVE6vIP89I/AAAAAAAAIT4/X7ET_cAuFR4f4wC_G3r0CTwUezsfyIR7QCLcBGAsYHQ/w366-h400/2.png&quot; width=&quot;366&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: arial; font-size: 9pt;&quot;&gt;Figure 2. Example of event 4771 with error code 0x18&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: -.1pt; margin-top: 4.0pt; margin: 4pt -0.1pt 8pt 0cm; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;For details on how to detect a password spraying attack in network traffic, see &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/knowledge-base/how-to-detect-a-cyberattack-and-prevent-money-theft/#attack-on-the-web-application&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; style=&quot;mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;the full version of the research&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;line-height: 125%; text-align: left;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: medium;&quot;&gt;Persistence&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;When attackers are able to execute commands on the system, they need to gain persistence in order to have permanent access to the infrastructure. One of the most common ways to gain persistence on a host is to add a malicious executable file to the startup. 82% of APT-groups use this technique. Let&#39;s look at how to detect it using event logs and, in some cases, in network traffic.&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 10pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;In the Sysmon logs, you need to track the addition or modification of registry keys and their values using events 12 &quot; RegistryEvent (Object create and delete)&quot; and 13 &quot; RegistryEvent (Value Set)&quot; for certain registry branches associated with the startup function.&amp;nbsp;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-bc562zMQ5Hc/YPVEGD-YUAI/AAAAAAAAITw/zkTf4OZ1UmwXsBS_o0jMYJdg8AEmyvc-gCLcBGAsYHQ/s911/3.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;198&quot; data-original-width=&quot;911&quot; height=&quot;139&quot; src=&quot;https://1.bp.blogspot.com/-bc562zMQ5Hc/YPVEGD-YUAI/AAAAAAAAITw/zkTf4OZ1UmwXsBS_o0jMYJdg8AEmyvc-gCLcBGAsYHQ/w640-h139/3.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-align: center;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: arial; font-size: 9pt;&quot;&gt;Figure 3. Example of the Add Values event&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Registry Branches&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserShell Folders&amp;nbsp;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellFolders&amp;nbsp;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellFolders&amp;nbsp;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserShell Folders&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 29.35pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 0cm 29.35pt; mso-border-shadow: yes; mso-list: l0 level1 lfo1; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; font-size: 9pt; line-height: 125%; text-indent: -18pt;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; font-size: 9pt; line-height: 125%; text-indent: -18pt;&quot;&gt;HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div style=&quot;margin-top: 0cm;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-top: 0cm; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: arial;&quot;&gt;Additionally, it is recommended to track Sysmon events with the ID 11 &quot;File Create&quot; in the directory C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp and check files with the extension .lnk, .vbs, .js,. cmd,. com,. bat, or. exe.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;margin-top: 0cm;&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The technique in question is not reflected in network traffic if the actions are performed locally on the host. However, it is possible to imagine a situation in which attackers perform manipulations remotely. For example, using WINREG (&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; style=&quot;color: blue; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Windows Remote Registry Protocol&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;) access to a remote registry, attackers add a value to the registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run. Also, if they have the appropriate access rights, they can copy the file over the SMB protocol. For example, when copying an executable file or a BAT file with command interpreter instructions to a folder C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp, the operating system will automatically launch such a file when any user logs in.&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;line-height: 20px;&quot;&gt;&lt;span face=&quot;Arial, sans-serif&quot; lang=&quot;EN-US&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: medium;&quot;&gt;Collecting infrastructure data&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The attackers need to understand where they are on the infrastructure, which hosts are of interest, and how to get to them. In our scenario, when the goal is money theft, the computers with access to financial systems will be points of interest for the attackers. Therefore, criminals conduct reconnaissance: they check which hosts are available, obtain the address of the domain controller and a list of administrators; find out what privileges they currently have, and in which groups the user on whose behalf they execute commands belongs to.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: small;&quot;&gt;Search for system information&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The application of the System Information Discovery technique can be detected using the security and PowerShell event logs in Windows, as well as using the Sysmon log. You need to detect the following events:&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 0.0001pt 29.35pt; text-align: left; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Starting processes: &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 0cm 0cm 0.0001pt 11.35pt; text-align: left; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;−&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;net.exe or net1.exe with the config command,&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 0cm 0cm 0.0001pt 11.35pt; text-align: left; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;−&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;wmic.exe with the commands os, qfe, &lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 0cm 0cm 0.0001pt 11.35pt; text-align: left; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;−&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;win32_quickfixengineering, win32_operatingsystem&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 0cm 0cm 0.0001pt 11.35pt; text-align: left; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;−&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;systeminfo.exe, &lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 0cm 0cm 0.0001pt 11.35pt; text-align: left; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;−&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;ipconfig.exe,&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 0cm 0cm 0.0001pt 11.35pt; text-align: left; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;−&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;netstat.exe,&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 0cm 0cm 0.0001pt 11.35pt; text-align: left; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;−&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;arp.exe,&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 0cm 0cm 0.0001pt 11.35pt; text-align: left; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;−&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;reg.exe &lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 0cm 0cm 0.0001pt 32.6pt; text-align: left; text-indent: -21.25pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Reading the \Software\Microsoft\ Windows\CurrentVersion registry key &lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;                   &lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 0cm 0cm 10pt 29.35pt; text-align: left; text-indent: -18pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-size: 7pt; font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Running PowerShell commands, including for WMI queries that allow obtaining information about the system&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;h4 style=&quot;margin-left: 0cm; text-align: center; text-indent: 0cm;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial;&quot;&gt;Analyzing access rights of user groups&lt;/span&gt;&lt;/h4&gt;&lt;/div&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 0.0001pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;A sign of using the Permission Groups Discovery technique on the local host is starting the process net.exe or net1.exe with the localgroup, group /domain, or group /dom commands. In the security event log, the process startup events have the ID 4688, and in Sysmon the ID 1.&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 0cm; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 0cm; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;It is possible to identify the technique in the network traffic by tracking the corresponding requests.&amp;nbsp; To obtain information about groups, you can use the network protocols LDAP, SAMR. In the case of LDAP, the searchRequest requests and their filter field are primarily interesting for detection. A request can be used to list all the groups:&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-e3GXjnjNwz0/YPVMVIdTI7I/AAAAAAAAIUA/Xek-mslQHrchdSZql1sgB68tBUpYKSn-wCLcBGAsYHQ/s982/4.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;620&quot; data-original-width=&quot;982&quot; height=&quot;253&quot; src=&quot;https://1.bp.blogspot.com/-e3GXjnjNwz0/YPVMVIdTI7I/AAAAAAAAIUA/Xek-mslQHrchdSZql1sgB68tBUpYKSn-wCLcBGAsYHQ/w400-h253/4.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;border: none; margin-bottom: 0cm; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Trebuchet MS&amp;quot;, sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;font-size: 9pt;&quot;&gt;Figure 4. Listing user groups&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Trebuchet MS&amp;quot;, sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;font-size: 9pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;The memberof keyword is often used to list the members of a particular group. For example, the following figure lists the members of the domain administrators group.&lt;/span&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: #333333; mso-fareast-font-family: Arial;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-SVdKN5Ry0Ds/YPVMn2RKtyI/AAAAAAAAIUI/O_oCNYg6CNkQpZaVpmJg5lnPKZskdbeQACLcBGAsYHQ/s1766/5.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;610&quot; data-original-width=&quot;1766&quot; height=&quot;222&quot; src=&quot;https://1.bp.blogspot.com/-SVdKN5Ry0Ds/YPVMn2RKtyI/AAAAAAAAIUI/O_oCNYg6CNkQpZaVpmJg5lnPKZskdbeQACLcBGAsYHQ/w640-h222/5.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;border: none; margin-bottom: 0cm; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Trebuchet MS&amp;quot;, sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;font-size: 9pt;&quot;&gt;Figure 5. Listing members of the domain administrators group&lt;/span&gt;&lt;/b&gt;&lt;span face=&quot;&amp;quot;Trebuchet MS&amp;quot;, sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;font-size: 9pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h3 style=&quot;margin-top: 0cm;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h4 style=&quot;margin-top: 0cm; text-align: left;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: medium;&quot;&gt;Attack development on the internal network&lt;/span&gt;&lt;/h4&gt;&lt;/div&gt;&lt;div&gt;&lt;span face=&quot;Arial, sans-serif&quot; lang=&quot;EN-US&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: #2f5496; line-height: 125%; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;To connect to different infrastructure hosts (servers and workstations), you need to know user passwords or password hashes, or have a corresponding Kerberos ticket.&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;color: #2f5496; line-height: 125%;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;color: black; text-align: center;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: small;&quot;&gt;Kerberoasting attack&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;With the help of the &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://attack.mitre.org/techniques/T1558/003/&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Kerberoasting&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;u&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: blue;&quot;&gt; &lt;/span&gt;&lt;/u&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;attack, an attacker can obtain the passwords of service accounts, which are often privileged. Any domain user can request a Kerberos ticket to access the service, and such a request will be considered legitimate. To encrypt the ticket, a hash of the service account password is used, and an attacker can try to decrypt it offline by bruteforcing the password. This technique is also widely applied in penetration testing: it is successfully &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/internal-pentests-2020/&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;used&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt; in 61% of projects.&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; line-height: 125%; margin: 4pt 0cm 8pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;In the event logs, you need to detect anomalies in TGS ticket requests (event 4769 &quot;A Kerberos service ticket was requested&quot;): analyze all accounts and IP addresses from which a request to the service was made and check whether an account usually requests a TGS ticket to the analyzed service from the same IP address.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; line-height: 125%; margin: 4pt 0cm 8pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;You also need to check the encryption algorithm in the requests: use of the RC4 algorithm is one of the signs of a Kerberoasting attack.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;In network traffic, you need to capture requests for listing services in Active Directory that can become targets for an attack. This stage is necessary for attackers to select a service to attack, and precedes the request for a TGS ticket and the bruteforcing of a password offline. You can list services, for example, using LDAP and the servicePrincipalName keyword in the filter field.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; line-height: 125%; margin: 4pt 0cm 8pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: #2f5496; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-qsNrMuarzCU/YPVNmeQbelI/AAAAAAAAIUQ/aISdxF4VaSw3b0EZRPrPz0TXhYC7KAzSgCLcBGAsYHQ/s1429/6.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;335&quot; data-original-width=&quot;1429&quot; height=&quot;150&quot; src=&quot;https://1.bp.blogspot.com/-qsNrMuarzCU/YPVNmeQbelI/AAAAAAAAIUQ/aISdxF4VaSw3b0EZRPrPz0TXhYC7KAzSgCLcBGAsYHQ/w640-h150/6.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;color: #2f5496;&quot;&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Trebuchet MS&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: black; font-size: 9pt;&quot;&gt;Figure 6. Listing services in Active Directory&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Trebuchet MS&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: black; font-size: 9pt; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;; mso-fareast-font-family: &amp;quot;Trebuchet MS&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; line-height: 125%; margin: 4pt 0cm 8pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;span style=&quot;color: #333333;&quot;&gt;In this case, the enabled user accounts are requested.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;color: black; text-align: center;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: small;&quot;&gt;SMB/Windows shared administrative resources&lt;/span&gt;&lt;/h4&gt;&lt;div style=&quot;color: #2f5496;&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;Shared administrative resources such as C$, ADMIN$, and IPC$ can be used by an attacker to remotely access the system. This technique is used both to transfer a file and to run a service on a remote computer. The method of detecting this technique using event logs and network traffic is contained in the full report (&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/knowledge-base/how-to-detect-a-cyberattack-and-prevent-money-theft/#smb-windows-shared-administrative-resources&quot;&gt;learn more&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;).&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;color: black; margin-top: 0cm; text-align: left;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: medium;&quot;&gt;Gaining control over the infrastructure&lt;/span&gt;&lt;/h4&gt;&lt;/div&gt;&lt;div style=&quot;color: #2f5496; text-align: justify;&quot;&gt;&lt;span style=&quot;color: #333333; font-family: arial;&quot;&gt;As a rule, a fraudulent operation does not require full control over the infrastructure. However, the maximum privileges allow attackers to move freely between computers, so it is likely that they will try to get the KRBTGT account. The privileges of this account allow them to create Kerberos tickets to access any resources with maximum privileges. Let&#39;s look at how to detect attempts to replicate credentials.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: #2f5496;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;color: #2f5496;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;Detection using event logs&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;color: #2f5496;&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;The DS-Replication-Get-Changes, DS-Replication-Get-Changes-All, and DS-Replication-Get-Changes-In-Filtered-Set privileges are required to replicate credentials from a domain controller.&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;In the security event log on domain controllers, in events with the ID 4662 &quot;An operation was performed on an object&quot;, you need to track these privileges, and to detect the source of the attack, you need to match these events with the event 4624 &quot;An account was successfully logged on,&quot; which will have the same login ID.&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;Detection using network traffic&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;/div&gt;&lt;div style=&quot;color: #2f5496;&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;When specifying the -just-dc-user key, the secretsdump utility uses the DCSync technique to obtain domain credentials. The attack consists in the fact that the host controlled by the attacker is represented by a domain controller and requests replication of the credentials of specific users.&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;   &lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;Domain controllers use the Directory Replication Service (DRS) Remote Protocol for replication, or rather calls to the RPC interface that implements this protocol—DRSUAPI RPC interface. This interface has the &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-drsr/b63730ac-614c-431c-9501-28d6aca91894&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;DRSGetNCChanges&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;method, which calls replication. If such calls come from a computer that is not a domain controller, then this is a clear sign of a DCSync attack.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-z0DkDZXZxXw/YPVPopE_VAI/AAAAAAAAIUY/bsX-4tHuESke68bNa_VFv1_a_uJbknk2QCLcBGAsYHQ/s1011/7.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;383&quot; data-original-width=&quot;1011&quot; height=&quot;242&quot; src=&quot;https://1.bp.blogspot.com/-z0DkDZXZxXw/YPVPopE_VAI/AAAAAAAAIUY/bsX-4tHuESke68bNa_VFv1_a_uJbknk2QCLcBGAsYHQ/w640-h242/7.jpg&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Trebuchet MS&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: black; font-size: 9pt;&quot;&gt;Figure 7. DCSync attack traffic (Wireshark)&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #333333;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;color: black; margin-top: 0cm; text-align: left;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: medium;&quot;&gt;Access to financial systems&amp;nbsp;&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;Having obtained the privileges of the KRBTGT account in the previous step, an attacker can generate a Kerberos ticket to access those computers that work with financial systems, for example, the computer of an accounting employee. Such an attack is called a &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://attack.mitre.org/techniques/T1558/001/&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Golden Ticket&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;The next step of the attack after obtaining the KRBTGT account is to create a Kerberos ticket to connect to any domain resources with maximum privileges, or a Kerberos Golden Ticket attack.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial; font-weight: 400;&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;You need to look for anomalies in the DOMAIN ACCOUNT field in events with the following IDs:&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 120.45pt 0.0001pt 1cm; text-indent: -18pt;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span lang=&quot;EN-US&quot;&gt;4624 &quot;An account was successfully logged on&quot; &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 0cm 120.45pt 0.0001pt 1cm; text-indent: -18pt;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span lang=&quot;EN-US&quot;&gt;4634 &quot;An account was logged off&quot;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 0cm 120.45pt 10pt 1cm; text-indent: -18pt;&quot;&gt;&lt;!--[if !supportLists]--&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #c00000; mso-bidi-font-family: &amp;quot;Noto Sans Symbols&amp;quot;; mso-fareast-font-family: &amp;quot;Noto Sans Symbols&amp;quot;;&quot;&gt;●&lt;span style=&quot;font-stretch: normal; font-variant-east-asian: normal; font-variant-numeric: normal; line-height: normal;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;span lang=&quot;EN-US&quot;&gt;4672 &quot;Special privileges assigned to new logon&quot; &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt; &lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;Some utilities for the Golden Ticket attack may incorrectly enter values in this field: it may be empty or different from the domain name. You need to look at the type of encryption of the ticket: if RC4 is used, then this may be a sign of an attack. In addition, the Golden Ticket attack does not have any TGT ticket request events (Event ID 4769) from the user computer.&amp;nbsp;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: medium;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;In a legitimate Kerberos protocol scenario, the user must receive a TGT ticket during initial authentication. To do this, it sends an AS-REQ request to the domain controller, which returns the TGT in the body of the AS-REP response. The user can then request access to domain services. To authenticate to the service, you need a TGS ticket. To obtain it, the user sends a TGS-REQ request to the domain controller in which they put their TGT ticket. The server sends a TGS-REP response containing the requested TGS ticket.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-w3xxrHrvqNw/YPVQqGbr8tI/AAAAAAAAIUg/GEXf1JIsI38HaIKufJwv36Py8Ccn4L79wCLcBGAsYHQ/s1176/8.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;195&quot; data-original-width=&quot;1176&quot; height=&quot;106&quot; src=&quot;https://1.bp.blogspot.com/-w3xxrHrvqNw/YPVQqGbr8tI/AAAAAAAAIUg/GEXf1JIsI38HaIKufJwv36Py8Ccn4L79wCLcBGAsYHQ/w640-h106/8.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/span&gt;&lt;p style=&quot;color: #2f5496;&quot;&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Trebuchet MS&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: black; font-size: 9pt;&quot;&gt;Figure 8. Legitimate request order in the traffic&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Trebuchet MS&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;color: black; font-size: 9pt; mso-bidi-font-family: &amp;quot;Trebuchet MS&amp;quot;; mso-fareast-font-family: &amp;quot;Trebuchet MS&amp;quot;;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;Since the Golden Ticket attack involves creating a TGT ticket outside the domain controller, the AS-REQ/AS-REP steps will be omitted from the traffic, meaning a ticket that was not issued will be used. Therefore, the purpose of traffic analysis is to detect the use of tickets that were not issued by the domain controller.&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; line-height: 125%; margin: 4pt 0cm 8pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h3 style=&quot;margin-top: 0cm;&quot;&gt;&lt;span style=&quot;font-family: arial; font-size: large;&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 23.4px;&quot;&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 23.4px; margin: 4pt -0.1pt 8pt 0cm; text-align: center;&quot;&gt;&lt;span style=&quot;color: #cc0000; text-align: left;&quot;&gt;The final stage&amp;nbsp;&lt;/span&gt;&lt;span face=&quot;Arial, sans-serif&quot; style=&quot;color: #cc0000;&quot;&gt;—&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #cc0000; text-align: left;&quot;&gt;money theft&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/h3&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; line-height: 125%; margin: 4pt 0cm 8pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;There are special banking Trojans that can automatically spoof payment details. In the last few years, the RTM Trojan has been widely used in attacks. In addition, an attacker can perform a fraudulent operation manually, keeping track of the workflow and actions of the company employees. For this purpose, they install malware for remote management on computers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;margin-top: 0cm; text-align: left;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: medium;&quot;&gt;Use of remote management software&amp;nbsp;&lt;/span&gt;&lt;/h4&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;Attackers can use various remote desktop access tools, including VNC technology: TightVNC, UltraVNC, RealVNC, and VNC Connect. The darknet sells modified versions of these programs that work unnoticed by the user. They allow attackers to spy on users, take screenshots, record videos, and intercept keyboard input. After collecting a sufficient amount of information, an attacker can connect to a computer and independently make a payment or spoof payment details.&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;The principle of operation of all products using VNC is very similar, so let&#39;s consider the behavior of TightVNC, since its source code is &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://www.tightvnc.com/download/2.8.27/tightvnc-2.8.27-src-gpl.zip&quot;&gt;&lt;span style=&quot;color: #0563c1;&quot;&gt;available&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;. Let&#39;s look at how you can detect malicious activity for various remote control functions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-jfJGhxj4z2E/YPVVygyhyRI/AAAAAAAAIUo/xXMvj30Nd_0JQOq-cM4pzt7cfQ8DtRocACLcBGAsYHQ/s935/9.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;600&quot; data-original-width=&quot;935&quot; height=&quot;411&quot; src=&quot;https://1.bp.blogspot.com/-jfJGhxj4z2E/YPVVygyhyRI/AAAAAAAAIUo/xXMvj30Nd_0JQOq-cM4pzt7cfQ8DtRocACLcBGAsYHQ/w640-h411/9.png&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;br /&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;h4 style=&quot;margin-top: 0cm; text-align: left;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: medium;&quot;&gt;Use of banking trojans&lt;/span&gt;&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;Often, the purpose of banking trojans is to gain remote access to the e-banking or payment system. Therefore, common methods of stealing access are usually used, such as intercepting keystrokes, taking screenshots, writing data from the clipboard, or embedding it in browsers. But there are also specific techniques for this type of trojan.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: small;&quot;&gt;Spoofing of bank details in the clipboard&lt;/span&gt;&lt;/h4&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;line-height: 125%;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;The method consists in monitoring the clipboard for the presence of payment details and their spoofing using the attacker&#39;s details. The Buhtrap ClipBanker trojan &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://www.welivesecurity.com/2019/04/30/buhtrap-backdoor-ransomware-advertising-platform/&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;checks the contents of the clipboard&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt; for the presence of electronic or cryptocurrency wallets, and if detected, spoofs them. The list of this malware includes more than 30 names of wallets. You can detect this behavior in the sandbox by copying the fake wallets of the most common payment systems to the clipboard, and then tracking the contents of the clipboard.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: small;&quot;&gt;Spoofing of payment orders&lt;/span&gt;&lt;/h4&gt;&lt;/div&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;In the CIS countries, the most widely used accounting system is 1C: Enterprise, which allows you to send payments to the bank using e-banking systems. The file 1c_to_kl.txt is used for transmitting payment data to the e-banking system. Attackers can make changes to this file to transfer money to their accounts, for example, this is how the RTM trojan works. The full research describes how to detect this malicious activity (&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/knowledge-base/how-to-detect-a-cyberattack-and-prevent-money-theft/#money-theft&quot;&gt;read more&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;).&lt;/span&gt;&lt;span style=&quot;color: #333333;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: small;&quot;&gt;Modification of e-banking system files&lt;/span&gt;&lt;/h4&gt;&lt;/div&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;This technique is used to bypass the self-protection of e-banking systems. An example is the &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://baesystemsai.blogspot.com/2016/04/two-bytes-to-951m.html&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;BlueNoroff&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;color: #333333;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;trojan, which modifies the modules of the SWIFT Alliance banking program in the memory to disable database verification and allow attackers to edit it. The trojan uses the VirtualProtectEx functions to allow writing to a code fragment, ReadProcessMemory to make sure that it changes the desired fragment, and WriteProcessMemory to overwrite the desired bytes.&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;You can detect the fact of modification of processes and files of e-banking systems. Calling VirtualProtectEx with the memory protection parameter PAGE_EXECUTE_READWRITE for e-banking processes is extremely suspicious, and, in combination with the call to WriteProcessMemory, it can serve as an indicator of changes in e-banking processes.&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;h4 style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;color: #cc0000; font-family: arial; font-size: small;&quot;&gt;Theft of keys from payment systems and wallets&lt;/span&gt;&lt;/h4&gt;&lt;/div&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;Some trojans steal private keys from payment systems and wallets: for example, Buhtrap ClipBanker &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://www.welivesecurity.com/2019/04/30/buhtrap-backdoor-ransomware-advertising-platform/&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;steals keys&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt; from Electrum and Bitcoin wallets. It searches for these keys using the paths %appdata%\eLectrUm*\wAllEts\ and %appdata%\BiTcOin\wAllEts\walLet.dAt.&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://1.bp.blogspot.com/-7up3P2CNyX8/YPVXpNzqp3I/AAAAAAAAIUw/BqxXt6aJvsQp63WJaXIhcNUMBFtBXkp8ACLcBGAsYHQ/s218/10.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;78&quot; data-original-width=&quot;218&quot; height=&quot;143&quot; src=&quot;https://1.bp.blogspot.com/-7up3P2CNyX8/YPVXpNzqp3I/AAAAAAAAIUw/BqxXt6aJvsQp63WJaXIhcNUMBFtBXkp8ACLcBGAsYHQ/w400-h143/10.png&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;border: none; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt; text-align: center;&quot;&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-family: arial; font-size: 9pt;&quot;&gt;Figure 9. Code fragment of the Buhtrap ClipBanker trojan&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;You can detect this behavior by accessing these paths. Usually, the file search is performed using the FindFirstFile and FindNextFile functions. In addition, you can track attempts to open files using CreateFileA by checking the paths to the files. In the sandbox, you can place dummy files in the appropriate paths, and then monitor access to them.&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;In the course of their campaign, the attackers will have to use many techniques. In order to identify the attack as a whole, it is not necessary to identify all the techniques without exception, it is enough to notice any of its steps in time. However, the earlier the attacker actions are detected, the easier it is to prevent negative consequences.&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333; font-family: arial;&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;You may find the whole text of the research &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/knowledge-base/how-to-detect-a-cyberattack-and-prevent-money-theft/#smb-windows-shared-administrative-resources&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;. Other Positive Technologies&#39; studies are available in the &lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;a href=&quot;https://www.ptsecurity.com/ww-en/analytics/knowledge-base/&quot; target=&quot;_blank&quot;&gt;Knowledge base&lt;/a&gt;&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt; on our website.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin-bottom: 8.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 4.0pt; margin: 4pt 0cm 8pt; mso-border-shadow: yes; mso-padding-alt: 31.0pt 31.0pt 31.0pt 31.0pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;Author: Ekaterina Kilyusheva&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; line-height: 125%; margin: 4pt 0cm 8pt; text-align: justify;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; line-height: 125%; margin: 4pt 0cm 8pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;border: none; color: #2f5496; line-height: 125%; margin: 4pt 0cm 8pt;&quot;&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: #333333;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,sans-serif&quot; lang=&quot;EN-US&quot; style=&quot;font-size: 14pt;&quot;&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://blog.ptsecurity.com/feeds/2865585747573787109/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://blog.ptsecurity.com/2021/07/how-to-detect-cyberattack-and-prevent.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8549938467002440724/posts/default/2865585747573787109'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8549938467002440724/posts/default/2865585747573787109'/><link rel='alternate' type='text/html' href='http://blog.ptsecurity.com/2021/07/how-to-detect-cyberattack-and-prevent.html' title='How to detect a cyberattack and prevent money theft'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-wLJZm-mUge0/YPU73BbJAgI/AAAAAAAAITY/hKnFmfREylIDtcsfom4qFd03jyKF_lO9QCLcBGAsYHQ/s72-w640-h117-c/1.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>