TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Malware Deep Dive | Huntress

2021-09-07 · Read original ↗

ATT&CK techniques detected

4 predictions
T1055.001Dynamic-link Library Injection
83%
"and imports. although the file properties provided no additional insight, the strings / imports suggested this dll was some sort of loader : - allocates memory - loads a library - resolves a function ’ s address - declares victory? a call graph shows the dll doesn ’ t do very muc…"
T1574.001DLL
64%
"malware deep dive | huntress when we come across a persistent foothold, it ’ s often just the tip of the iceberg. the huntress soc team flagged a user run key value with the name “ xmnusbqh4865, ” which in and of itself was suspicious. the command executed was equally suspect : r…"
T1204.002Malicious File
39%
"communication code to hide ). we pulled windbg out of the toolbox to see if we could find what was at ebx when it ’ s called. we loaded the file, searched for the opcode ffd3 ( call ebx ), and set the breakpoint at that address. now it was time to execute! as soon as the breakpoi…"
T1574.001DLL
35%
"and imports. although the file properties provided no additional insight, the strings / imports suggested this dll was some sort of loader : - allocates memory - loads a library - resolves a function ’ s address - declares victory? a call graph shows the dll doesn ’ t do very muc…"

Summary

In this blog, read along as we investigate a malicious foothold and decode the payload step by step.