Case Study Patchwork PDF
Case Study Patchwork PDF
2
First Stage Payload: Compiled Script
3
Next Stages
4
Next Stages (cont)
5
Deception Campaign
• Goal: discover as much as possible about the threat actor, especially tools,
techniques and procedures
― Allowing subsequent detection elsewhere
― Prevent future attacks against Cymmetria’s customer
• Honeynet environment
― Breadcrumbs: snippets of data which lead the attacker to a new machine:
Credentials, browser cookies, network shares, VPN connections, etc.
― Decoys: full operating systems running in VM’s; represent high-value targets for
the attacker
• The lure: a fake profile for a person in whom the attacker was interested
6
The Deception Campaign
7
The Chain of Events
1. The Powerpoint PPS was opened on a target laptop and dropped the initial
payload components
2. The Meterpreter reverse shell was pulled from the C2 server
3. Files from the target laptop were exfiltrated to the C2 server along with
some encrypted traffic
4. The attacker decided to drop the second stage malware; this scanned the
hard drive
5. It copied itself as C:\Windows\SysWoW64\netvmon.exe and added this to
the startup programs
6. Three days later, alerts were received on the decoy running an SMB share
7. The malware accessed the shared drive and scanned it for files
8. Someone attempted to connect to a cloud decoy using RDP
9. They failed to log in (could have done it using Mimikatz)
10. The IP address suggests the same attacker
8
Honeynet Map
9
PPS Files on the C2 Server
10
Secondary Infection Stages
11
Attribution
12
Mapped to the Working Day
DARKER GREY INDICATES MORE EDITS
13
Lessons
14