SQL Brute Force Leads to BlueSky Ransomware

In December 2022, we observed an intrusion on a public-facing MSSQL Server, which resulted in BlueSky ransomware. First discovered in June 2022, BlueSky ransomware has code links to Conti and Babuk ransomware.
2022 年 12 月,我们观察到对面向公众的 MSSQL Server 的入侵,导致 BlueSky 勒索软件。BlueSky 勒索软件于 2022 年 6 月首次被发现,具有指向 Conti 和 Babuk 勒索软件的代码链接。

While other reports point to malware downloads as initial access, in this report the threat actors gained access via a MSSQL brute force attack. They then leveraged Cobalt Strike and Tor2Mine to perform post-exploitation activities. Within one hour of the threat actors accessing the network, they deployed BlueSky ransomware network wide.
虽然其他报告指出恶意软件下载是初始访问,但在本报告中,威胁参与者通过MSSQL暴力攻击获得了访问权限。然后,他们利用 Cobalt Strike 和 Tor2Mine 进行开采后活动。在威胁行为者访问网络的一小时内,他们在整个网络范围内部署了 BlueSky 勒索软件。

Case Summary 案例摘要

In the month of December 2022, we observed a cluster of activity targeting MSSQL servers. The activity started with brute force password attempts for the MS SQL “sa” (System Administrator) account on an internet facing server. Upon successfully discovering the password, the threat actors enabled “xp_cmdshell” on the SQL server. The “xp_cmdshell” allows users with sysadmin privilege to execute shell commands on the host.
在 2022 年 12 月,我们观察到一组针对 MSSQL 服务器的活动。该活动始于在面向 Internet 的服务器上对 MS SQL“sa”(系统管理员)帐户进行暴力破解密码尝试。成功发现密码后,威胁参与者在 SQL Server 上启用了“xp_cmdshell”。“xp_cmdshell”允许具有 sysadmin 权限的用户在主机上执行 shell 命令。

Using “xp_cmdshell” the threat actors first executed a PowerShell command on the SQL server. The command contained base64 encoded content, which, upon execution, established a connection to a Cobalt Strike command and control server. This activity was immediately followed by injection into the legitimate process winlogon. The injected process then spawned PowerShell and cmd to perform SMB scans and discovery using SMBexec.
使用“xp_cmdshell”,威胁参与者首先在 SQL Server 上执行 PowerShell 命令。该命令包含 base64 编码的内容,在执行时,该内容与 Cobalt Strike 命令和控制服务器建立了连接。此活动之后立即注入到合法进程 winlogon 中。然后,注入的进程会生成 PowerShell 和 cmd,以使用 SMBexec 执行 SMB 扫描和发现。

The PowerShell session was then seen making a connection to a Tor2Mine stager server. This was followed by execution of a PowerShell script which performed a variety of operations, such as checking privileges of the active user, disabling of AV solutions, and dropping of a miner payload named java.exe. Tor2Mine is a Monero-mining campaign that is based on XMRigCC. Depending upon the privileges of the user, the script also performs creation of scheduled tasks and Windows services to maintain persistence on the host.
然后看到 PowerShell 会话与 Tor2Mine 暂存器服务器建立连接。随后执行PowerShell脚本,该脚本执行各种操作,例如检查活动用户的权限,禁用AV解决方案以及删除名为java.exe的矿工有效负载。Tor2Mine 是一个基于 XMRigCC 的门罗币挖矿活动。根据用户的权限,该脚本还会执行计划任务和 Windows 服务的创建,以保持主机上的持久性。

Around 15 minutes after initial access, the threat actors then moved laterally toward domain controllers and file shares using remote service creation. These services were used to execute the same PowerShell commands, download and execute the Tor2Mine malware. Upon establishing access to one of the domain controllers the threat actors performed similar activity as observed on the beachhead.
在初始访问后大约 15 分钟,威胁参与者随后使用远程服务创建横向移动到域控制器和文件共享。这些服务用于执行相同的 PowerShell 命令、下载和执行 Tor2Mine 恶意软件。在建立对其中一个域控制器的访问后,威胁参与者执行了与在滩头上观察到的类似的活动。

After roughly 30 minutes after initial access, the BlueSky ransomware binary was dropped and executed on the beachhead. The execution worked as intended which resulted in the ransomware spreading to all devices in the network over SMB. The time to ransomware in this case was 32 minutes.
初次访问大约 30 分钟后,BlueSky 勒索软件二进制文件被丢弃并在滩头阵地上执行。执行按预期工作,导致勒索软件通过 SMB 传播到网络中的所有设备。在这种情况下,勒索软件的时间是 32 分钟。

Threat Actor Profile: 威胁参与者配置文件:

Cobalt Strike Cobalt 罢工

The Cobalt Strike server observed in this intrusion was first observed on December 16th 2022 and remained active through January 17th 2023. We saw the server then return for a second time frame from April 6th 2023 though April 15th 2023. This data was provided via the Threat Intel tracking services of The DFIR Report.
在这次入侵中观察到的 Cobalt Strike 服务器于 2022 年 12 月 16 日首次观察到,并在 2023 年 1 月 17 日之前一直处于活动状态。我们看到服务器随后从 2023 年 4 月 6 日到 2023 年 4 月 15 日返回了第二个时间范围。此数据通过 DFIR 报告的威胁情报跟踪服务提供。

SQL Brute Force Leads to BlueSky Ransomware

Tor2Mine Tor2矿山

The PowerShell scripts involved in this case as well as infrastructure for the Tor2Mine server were observed being reused in May 2023 with the PaperCut NG CVE-2023-27350 exploit as the initial access source. In that intrusion no ransomware was observed. The linked case data is available for All Intel subscribers in event 21132 (c39d59d8-8bae-49f5-8b29-de5c13b61899).
2023 年 5 月,观察到本案中涉及的 PowerShell 脚本以及 Tor2Mine 服务器的基础设施被重用,并将 PaperCut NG CVE-2023-27350 漏洞作为初始访问源。在那次入侵中,没有观察到勒索软件。在事件 21132 (c39d59d8-8bae-49f5-8b29-de5c13b61899) 中,所有英特尔用户都可以使用链接的案例数据。

Services 服务业

We offer multiple services including a Threat Feed service which tracks Command and Control frameworks such as Cobalt Strike, Sliver, BianLian, Metasploit, Empire, Havoc, etc. More information on this service can be found here.
我们提供多种服务,包括跟踪命令和控制框架(如 Cobalt Strike、Sliver、BianLian、Metasploit、Empire、Havoc 等)的威胁源服务。有关此服务的更多信息,请点击此处。

Our All Intel service includes private reports, exploit events, long term infrastructure tracking, clustering, C2 configs, and other curated intel.
我们的全英特尔服务包括私有报告、漏洞利用事件、长期基础设施跟踪、集群、C2 配置和其他精选情报。

We’ll be launching a private ruleset soon, if you’d like to get in at a discounted rate for the beta, please Contact Us.
我们将很快推出一个私人规则集,如果您想以折扣价进入测试版,请联系我们。

If you are interested in hearing more about our services, or would like to talk about a free trial, please reach out using the Contact Us page. We look forward to hearing from you.
如果您有兴趣了解更多关于我们服务的信息,或者想谈谈免费试用,请使用“联系我们”页面与我们联系。我们期待您的回音。

Analysts 分析师

Analysis and reporting completed by @yatinwad
@yatinwad完成的分析和报告

Initial Access 初始访问

The initial access occurred via a brute-force attack, where the threat actors mainly targeted the System Admin (“sa”) account.
最初的访问是通过暴力攻击发生的,其中威胁行为者主要针对系统管理员 (“sa”) 帐户。

During the intrusion, we observed over 10,000 failed attempts before successful login.
在入侵期间,我们观察到超过 10,000 次失败的尝试才成功登录。

SQL Server event ID 18456 Failure Audit Events in the Windows application logs:
SQL Server 事件 ID 18456 Windows 应用程序日志中的失败审核事件:

SQL Brute Force Leads to BlueSky Ransomware

Successful Login: 成功登录:

SQL Brute Force Leads to BlueSky Ransomware

Execution 执行

In the next attack stage, the threat actors established a command shell via Extended SQL Stored Procedure (xp_cmdshell). This process allows you to issue operating system commands directly to the Windows command shell. To do this they enabled the feature the MSSQL configuration:
在下一个攻击阶段,威胁参与者通过扩展 SQL 存储过程 (xp_cmdshell) 建立了命令 shell。此过程允许您直接向 Windows 命令行界面发出操作系统命令。为此,他们启用了MSSQL配置功能:

SQL Brute Force Leads to BlueSky Ransomware

The threat actor then executed a Cobalt Strike beacon and a PowerShell script that has previously been identified by Sophos as used in campaigns to deploy Tor2Mine malware.
然后,威胁行为者执行了 Cobalt Strike 信标和 PowerShell 脚本,该脚本之前已被 Sophos 识别为用于部署 Tor2Mine 恶意软件的活动。

The overall execution events are depicted in the below diagram:
整体执行事件如下图所示:

SQL Brute Force Leads to BlueSky Ransomware

SQL Brute Force Leads to BlueSky Ransomware

The first PowerShell script executed a command to download a Cobalt Strike beacon.

SQL Brute Force Leads to BlueSky Ransomware

This was followed by a second PowerShell execution for:
随后,对以下各项执行了第二次 PowerShell:

SQL Brute Force Leads to BlueSky Ransomware

A connection was then established with the following Tor2Mine server and URIs:
然后与以下 Tor2Mine 服务器和 URI 建立连接:

SQL Brute Force Leads to BlueSky Ransomware

Tor2Mine uses a PowerShell script checking.ps1 to perform variety of operations. The script first sets a variable named $priv and $osver to check whether the active user is an administrator and the operating system version respectively, in the first few lines.
Tor2Mine 使用 PowerShell 脚本 checking.ps1 执行各种操作。该脚本首先在前几行中设置一个名为 $priv 和 $osver 的变量,以分别检查活动用户是否为管理员和操作系统版本。

SQL Brute Force Leads to BlueSky Ransomware

It then attempts to pull down an additional script named kallen.ps1, a PowerShell version of mimikatz from the Tor2Mine server.
然后,它尝试从 Tor2Mine 服务器拉取一个名为 kallen.ps1 的附加脚本,这是 mimikatz 的 PowerShell 版本。

SQL Brute Force Leads to BlueSky Ransomware

It also consists of a function named “StopAV”, where it tries to disable antivirus solutions – in this case, MalwareBytes, Sophos and Windows Defender.
它还包含一个名为“StopAV”的功能,它试图禁用防病毒解决方案——在本例中为 MalwareBytes、Sophos 和 Windows Defender。

SQL Brute Force Leads to BlueSky Ransomware

Depending upon the result of the $priv variable, there are 2 routes for the script: Privileged ”PrivTrue()“ and Non-Privileged “PrivFalse()”.
根据 $priv 变量的结果,脚本有 2 个路由:特权“PrivTrue()”和非特权“PrivFalse()”。

If the user is a privileged user, it first checks for the OS architecture, then downloads appropriate version (in our case, x64) of the miner and installs it as java.exe, in the “C:\ProgramData\Oracle\Java” directory. It also installs a driver named WinRing0x64.sys.

SQL Brute Force Leads to BlueSky Ransomware

The function also creates multiple scheduled tasks and services which have references to Tor2Mine miner java.exe, encoded PowerShell commands and .hta files hosted on Tor2Mine servers.

SQL Brute Force Leads to BlueSky Ransomware

In the case of the non-privileged function “PrivFalse()”, it executes a batch script “PrivFalse.bat” as scheduled tasks and also sets up schtasks as seen in the “PrivTrue()” function.

SQL Brute Force Leads to BlueSky Ransomware

In the last section, a script named del.ps1 is downloaded and executed on the host as a scheduled task. The del.ps1 script has been explored further in the Defense Evasion section.

SQL Brute Force Leads to BlueSky Ransomware

Depending upon the output of the $priv variable, the execution flow is as follows:

SQL Brute Force Leads to BlueSky Ransomware

As the mimi function is commented, we didn’t observe any artifacts related to kallen.ps1 script.
由于对 mimi 函数进行了注释,因此我们没有观察到任何与 kallen.ps1 脚本相关的伪影。

Persistence 坚持

To establish persistence in the network, multiple scheduled tasks and Windows services were created on the beachhead and one of the domain controllers. They reference the files dropped on the compromised hosts and Tor2Mine servers.
为了在网络中建立持久性,在滩头阵地和其中一个域控制器上创建了多个计划任务和 Windows 服务。它们引用受感染主机和 Tor2Mine 服务器上丢弃的文件。

SQL Brute Force Leads to BlueSky Ransomware

SQL Brute Force Leads to BlueSky Ransomware

Privilege Escalation 权限提升

The threat actor was seen injecting code into legitimate process winlogon.exe via CreateRemoteThread which can be detected using Sysmon event ID 8.
看到威胁参与者通过 CreateRemoteThread 将代码注入合法进程 winlogon.exe,可以使用 Sysmon 事件 ID 8 检测到该进程。

SQL Brute Force Leads to BlueSky Ransomware

During the intrusion the threat actor deployed XMrig miner which loaded the driver WinRing0. This driver is deployed to assist the miner in operations and has been in use since at least version 5.3.0.
在入侵期间,威胁行为者部署了 XMrig 矿工,该矿工加载了驱动程序 WinRing0。该驱动程序用于协助矿工操作,并且至少从 5.3.0 版本开始使用。

SQL Brute Force Leads to BlueSky Ransomware

Defense Evasion

The Windows Defender AV Real-Time Monitoring was disabled on the beachhead and one of the domain controllers using Set-MpPreference cmdlet.

SQL Brute Force Leads to BlueSky Ransomware

The PowerShell script, checking.ps1, is explained in the Execution section which contained other ways to disable AV, including registry modifications and service disabling.

A PowerShell script named del.ps1 attempts to terminate system utilities such as Process Explorer, Task Manager, Process Monitor, and Daphne Task Manager.

SQL Brute Force Leads to BlueSky Ransomware

In the script checking.ps1 the threat actor created 16 different tasks on the hosts where Tor2Mine was deployed. These tasks were named in a manner to try and blend in with various Windows tasks that on the hosts:

\Microsoft\Windows\MUI\LPupdate
\Microsoft\Windows\RamDiagnostic\Error Diagnostic
\Microsoft\Windows\.NET Framework\.NET Framework Cache Optimization Files-S-3-5-21-2236678156-433529325-2142214268-1138
\Microsoft\Windows\.NET Framework\.NET Framework Cache Optimization Files-S-3-5-21-2236678155-433529325-2142214968-1138
\Microsoft\Windows\.NET Framework\.NET Framework Cache Optimization"
\Microsoft\Windows\Registry\RegBackup
\Microsoft\Windows\DiskCleanup\SlientDefragDisks
\Microsoft\Windows\.NET Framework\.NET Framework NGEN v4.0.50319 Critical
\Microsoft\Windows\EDP\EDP App Update Cache
\Microsoft\Windows\EDP\EDP App Lock Task
\Microsoft\Windows\UPnP\UPnPClient Task
\Microsoft\Windows\UPnP\UPnPHost
\Microsoft\Windows\Shell\WinShell
\Microsoft\Windows\Shell\WindowsShellUpdate
\Microsoft\Windows\Bluetooth\UpdateDeviceTask
\Microsoft\Windows\.NET Framework\.NET Framework Cache Optimization

Credential Access 凭据访问

Tor2Mine was used to access the LSASS memory space and the access granted was 0x1010.
Tor2Mine 用于访问 LSASS 内存空间,授予的访问权限0x1010。

SQL Brute Force Leads to BlueSky Ransomware

On the beachhead, we observed the execution of credential dumping utility Invoke-PowerDump.
在滩头阵地上,我们观察到凭据转储实用程序 Invoke-PowerDump 的执行。

SQL Brute Force Leads to BlueSky Ransomware

Discovery 发现

During the course of the intrusion, we observed port discovery (port 445) activity from the beachhead. We attribute this to the invocation of the PowerShell command Invoke-SMBExec. This was likely executed as part of the Invoke-TheHash framework based on other PowerShell modules observed.
在入侵过程中,我们从滩头阵地观察到港口发现(港口445)活动。我们将其归因于对 PowerShell 命令 Invoke-SMBExec 的调用。这可能是作为基于观察到的其他 PowerShell 模块的 Invoke-TheHash 框架的一部分执行的。

SQL Brute Force Leads to BlueSky Ransomware

SQL Brute Force Leads to BlueSky Ransomware

SQL Brute Force Leads to BlueSky Ransomware

Looking at the traffic from a network perspective we observed the activity making DCE\RPC calls to the svcctl endpoint and the named pipe \pipe\ntsvcs using the OpenSCManagerW operation.

SQL Brute Force Leads to BlueSky Ransomware

This appeared to be how they profiled the network layout and remote hosts.

The threat actor was observed running whoami from the Tor2Mine PowerShell process on the beachhead.

"C:\Windows\system32\whoami.exe" /user

Lateral Movement

The threat actors moved laterally toward the domain controllers and file shares using Remote Service creation. The pattern “%COMSPEC% /C “cmd /c powershell.exe” is associated with the Cobalt Strike “psexec_psh” jump module.

SQL Brute Force Leads to BlueSky Ransomware

SQL Brute Force Leads to BlueSky Ransomware

Decoding the command we can see the same PowerShell download and execute as observed on the beachhead. The hexadecimal value 0x53611451 corresponds to the IP address 83.97.20[.]81 which was the command and control server for the Tor2Mine malware.

SQL Brute Force Leads to BlueSky Ransomware

Command and Control

Tor2Mine Server:

{
   destination: { [-]
     address: 83.97.20.81
     as: { [-]
       number: 9009
       organization: { [-]
         name: M247 Europe SRL
       }
     }
     geo: { [-]
       city_name: Bucharest
       continent_name: Europe
       country_iso_code: RO
       country_name: Romania
       location: { [+]
       }
       region_iso_code: RO-B
       region_name: Bucuresti
     }
     ip: 83.97.20.81
     port: 443
   }
   network.direction: outbound
   tls: { [-]
     cipher: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
     client: { [-]
       ja3: c12f54a3f91dc7bafd92cb59fe009a35
     }
     curve: x25519
     established: true
     resumed: false
     server: { [-]
       ja3s: ec74a5c51106f0419184d0dd08fb05bc
     }
     version: 1.2
     version_protocol: tls
   }

Cobalt Strike C2:

IP Address: 5.188.86.237

Connection to the following URIs was observed:

SQL Brute Force Leads to BlueSky Ransomware

Cobalt Strike Server Config:

{
    "beacontype": [
        "HTTPS"
    ],
    "sleeptime": 120000,
    "jitter": 12,
    "maxgetsize": 1398924,
    "spawnto": "AAAAAAAAAAAAAAAAAAAAAA==",
    "license_id": 1580103824,
    "cfg_caution": false,
    "kill_date": null,
    "server": {
        "hostname": "5.188.86.237",
        "port": 443,
        "publickey": "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnCZHWnYFqYB/6gJdkc4MPDTtBJ20nkEAd3tsY4tPKs8MV4yIjJb5CtlrbKHjzP1oD/1AQsj6EKlEMFIKtakLx5+VybrMYE+dDdkDteHmVX0AeFyw001FyQVlt1B+OSNPRscKI5sh1L/ZdwnrMy6S6nNbQ5N5hls6k2kgNO5nQ7QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=="
    },
    "host_header": "",
    "useragent_header": null,
    "http-get": {
        "uri": "/functionalStatus/2JYbAmfY5gYNj7UrgAte5p1jXx2V",
        "verb": "GET",
        "client": {
            "headers": null,
            "metadata": null
        },
        "server": {
            "output": [
                "print",
                "append 8 characters",
                "append 8 characters",
                "append 10 characters",
                "append 6 characters",
                "append 11 characters",
                "append 33 characters",
                "append 69 characters",
                "append 55 characters",
                "append 67 characters",
                "append 27 characters",
                "append 15 characters",
                "append 25 characters",
                "append 32 characters",
                "append 72 characters",
                "prepend 16 characters",
                "prepend 17 characters",
                "prepend 11 characters",
                "prepend 31 characters",
                "prepend 80 characters",
                "prepend 60 characters",
                "prepend 54 characters",
                "prepend 69 characters",
                "prepend 38 characters",
                "prepend 8 characters",
                "base64url"
            ]
        }
    },
    "http-post": {
        "uri": "/rest/2/meetings2JYbAmfY5gYNj7UrgAte5p1jXx2V",
        "verb": "GET",
        "client": {
            "headers": null,
            "id": null,
            "output": null
        }
    },
    "tcp_frame_header": "AAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=",
    "crypto_scheme": 0,
    "proxy": {
        "type": null,
        "username": null,
        "password": null,
        "behavior": "Use IE settings"
    },
    "http_post_chunk": 96,
    "uses_cookies": false,
    "post-ex": {
        "spawnto_x86": "%windir%\\syswow64\\auditpol.exe",
        "spawnto_x64": "%windir%\\sysnative\\auditpol.exe"
    },
    "process-inject": {
        "allocator": "NtMapViewOfSection",
        "execute": [
            "CreateThread 'ntdll.dll!RtlUserThreadStart'",
            "NtQueueApcThread-s",
            "SetThreadContext",
            "CreateRemoteThread",
            "CreateThread 'kernel32.dll!LoadLibraryA'",
            "RtlCreateUserThread"
        ],
        "min_alloc": 40263,
        "startrwx": true,
        "stub": "IiuPJ9vfuo3dVZ7son6mSA==",
        "transform-x86": [
            "prepend '\\x90\\x90\\x90\\x90\\x90\\x90\\x90\\x90\\x90'"
        ],
        "transform-x64": [
            "prepend '\\x90\\x90\\x90\\x90\\x90\\x90\\x90\\x90\\x90'"
        ],
        "userwx": false
    },
    "dns-beacon": {
        "dns_idle": null,
        "dns_sleep": null,
        "maxdns": null,
        "beacon": null,
        "get_A": null,
        "get_AAAA": null,
        "get_TXT": null,
        "put_metadata": null,
        "put_output": null
    },
    "pipename": null,
    "smb_frame_header": "AAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=",
    "stage": {
        "cleanup": true
    },
    "ssh": {
        "hostname": null,
        "port": null,
        "username": null,
        "password": null,
        "privatekey": null
    }
}

Impact

The BlueSky ransomware binary named vmware.exe was dropped on the beachhead, which upon execution, resulted in network wide ransomware. This was accomplished using SMB with the ransomware connecting to host over port 445 to encrypt files.

SQL Brute Force Leads to BlueSky Ransomware

The files were renamed with the file extension .bluesky and a ransom note file named # DECRYPT FILES BLUESKY #.txt was dropped on the host and opened to reveal the ransom note.

SQL Brute Force Leads to BlueSky Ransomware

SQL Brute Force Leads to BlueSky Ransomware

On the beachhead server, the time of encryption was visible as the MSSQL service stopped functioning after execution of vmware.exe :
在滩头服务器上,加密时间是可见的,因为MSSQL服务在执行以下命令 vmware.exe 后停止运行:

SQL Brute Force Leads to BlueSky Ransomware

The whole intrusion after initial access lasted only around 30 minutes with limited discovery and no exfiltration observed.
初次访问后的整个入侵仅持续了大约 30 分钟,发现有限,没有观察到渗透。

Timeline 时间线

SQL Brute Force Leads to BlueSky Ransomware

Diamond Model 钻石模型

SQL Brute Force Leads to BlueSky Ransomware

Indicators 指标

Atomic 原子

hxxp://0x53611451/win/clocal
hxxp://qlqd5zqefmkcr34a[.]onion[.]sh/win/checking[.]hta
hxxps://asq[.]d6shiiwz[.]pw/win/hssl/d6[.]hta
hxxp://83[.]97[.]20[.]81/win/checking[.]hta
hxxp://83[.]97[.]20[.]81/win/update[.]hta
hxxps://asd[.]s7610rir[.]pw/win/checking[.]hta
hxxps://asq[.]r77vh0[.]pw/win/hssl/r7[.]hta
hxxp://asq[.]r77vh0[.]pw/win/checking[.]hta
hxxp://5[.]188[.]86[.]237/vmware[.]exe

Computed 计算

java.exe
md5: 9e88c287eb376f3c319a5cb13f980d36
sha1: 501af977080d56a55ff0aeba66b58e7f3d1404ea
sha256: 74b6d14e35ff51fe47e169e76b4732b9f157cd7e537a2ca587c58dbdb15c624f

vmware.exe
md5: 7b68bc3dd393c2e5273f180e361f178a
sha1: 07610f11d3b8ccb7b60cc8ad033dda6c7d3940c4
sha256: d4f4069b1c40a5b27ba0bc15c09dceb7035d054a022bb5d558850edfba0b9534

WinRing0x64.sys 
md5: 0c0195c48b6b8582fa6f6373032118da
sha1: d25340ae8e92a6d29f599fef426a2bc1b5217299
sha256: 11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5

del.ps1
md5: bfd36fd6a20ccd39f5c3bb64a5c5dd8b
sha1: e938646862477e598fcda20d0b7551863f8b651c
sha256: 35b95496b243541d5ad3667f4aabe2ed00066ba8b69b82f10dd1186872ce4be2

checking.ps1
md5: 08bdf000031bbad1a836381f73adace5
sha1: 3dff4ae3c421c9143978f8fc9499dca4aed0eac5
sha256: f955eeb3a464685eaac96744964134e49e849a03fc910454faaff2109c378b0b

Invoke-PowerDump.ps1
md5: 42a80cc2333b612b63a859f17474c9af
sha1: e7be97fb2200eb99805e39513304739a7a28b17e
sha256: 3b463c94b52414cfaad61ecdac64ca84eaea1ab4be69f75834aaa7701ab5e7d0 

Detections 检测

Network 网络

ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
ET INFO Executable Download from dotted-quad Host        
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
ET INFO PowerShell Hidden Window Command Common In Powershell Stagers M2
ET MALWARE Successful Cobalt Strike Shellcode Download (x64) M2
ET POLICY PE EXE or DLL Windows file download HTTP
ET HUNTING Generic Powershell DownloadFile Command
ET HUNTING Generic Powershell DownloadString Command        
ET HUNTING Generic Powershell Launching Hidden Window
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response        
ET INFO Executable Download from dotted-quad Host
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download        
ET INFO PS1 Powershell File Request
ET INFO PowerShell Base64 Encoded Content Command Common In Powershell Stagers M1        
ET INFO PowerShell Base64 Encoded Content Command Common In Powershell Stagers M2        
ET INFO PowerShell DownloadFile Command Common In Powershell Stagers        
ET INFO PowerShell DownloadString Command Common In Powershell Stagers        
ET INFO PowerShell Hidden Window Command Common In Powershell Stagers M2        
ET INFO PowerShell NoProfile Command Received In Powershell Stagers        
ET INFO PowerShell NonInteractive Command Common In Powershell Stagers        
ET INFO Powershell Base64 Decode Command Inbound        
ET MALWARE JS/Nemucod requesting EXE payload 2016-02-01
ET MALWARE JS/Nemucod.M.gen downloading EXE payload
ETPRO MALWARE Likely Evil Request for Invoke-Mimikatz        
ETPRO MALWARE PS/Deathhm Script Inbound via HTTP
ET DNS Query to a *.pw domain - Likely Hostile
ET SCAN Behavioral Unusual Port 445 traffic Potential Scan or Infection

Sigma 西格马

Search rules on detection.fyi or sigmasearchengine.com
detection.fyi 或 sigmasearchengine.com 上的搜索规则

Sigma Repo: Sigma 存储库:

Suspicious Scheduled Task Creation - 3a734d25-df5c-4b99-8034-af1ddb5883a4
PowerShell Scripts Installed as Services - a2e5019d-a658-4c6a-92bf-7197b54e2cae
Potentially Suspicious AccessMask Requested From LSASS - 4a1b6da0-d94f-4fc3-98fc-2d9cb9e5ee76
Powershell Defender Disable Scan Feature - 1ec65a5f-9473-4f12-97da-622044d6df21
Windows Defender Exclusions Added - 1321dc4e-a1fe-481d-a016-52c45f0c8b4f
CobaltStrike Service Installations System - 5a105d34-05fc-401e-8553-272b45c1522d
CobaltStrike Service Installations in Registry - 61a7697c-cb79-42a8-a2ff-5f0cdfae0130
Suspicious Child Process Of SQL Server - 869b9ca7-9ea2-4a5a-8325-e80e62f75445
Whoami.EXE Execution Anomaly - 8de1cbe8-d6f5-496d-8237-5f44a721c7a0
Malicious PowerShell Commandlets PoshModule - 7d0d0329-0ef1-4e84-a9f5-49500f9d7c6c
Malicious PowerShell Commandlets ScriptBlock - 89819aa4-bbd6-46bc-88ec-c7f7fe30efa6
PowerShell Base64 Encoded IEX Cmdlet - 88f680b8-070e-402c-ae11-d2914f2257f1
MSSQL Server Failed Logon - 218d2855-2bba-4f61-9c85-81d0ea63ac71
MSSQL XPCmdshell Suspicious Execution - 7f103213-a04e-4d59-8261-213dddf22314
MSSQL XPCmdshell Option Change - d08dd86f-681e-4a00-a92c-1db218754417
MSSQL Server Failed Logon From External Network - ebfe73c2-5bc9-4ed9-aaa8-8b54b2b4777d
Vulnerable WinRing0 Driver Load - 1a42dfa6-6cb2-4df9-9b48-295be477e835

Yara 扎卡

https://github.com/The-DFIR-Report/Yara-Rules/blob/main/19208/19208.yar

MITRE 主教

SQL Brute Force Leads to BlueSky Ransomware

Valid Accounts - T1078 
Brute Force - T1110 
Scheduled Task - T1053.005 
Windows Command Shell - T1059.003 
PowerShell - T1059.001 
Disable or Modify Tools - T1562.001 
Process Injection - T1055 
LSASS Memory - T1003.001 
System Owner/User Discovery - T1033
Network Share Discovery - T1135
Data Encrypted for Impact - T1486
SMB/Windows Admin Shares - T1021.002
Web Protocols - T1071.001
Service Execution - T1569.002
Modify Registry - T1112
Obfuscated Files or Information - T1027
Windows Service - T1543.003
Masquerade Task or Service - T1036.004

 

原文始发于Real Attackers:SQL Brute Force Leads to BlueSky Ransomware

版权声明:admin 发表于 2023年12月5日 下午5:57。
转载请注明:SQL Brute Force Leads to BlueSky Ransomware | CTF导航

相关文章

暂无评论

您必须登录才能参与评论!
立即登录
暂无评论...