C0032

C0032 was an extended campaign suspected to involve the Triton adversaries with related capabilities and techniques focused on gaining a foothold within IT environments. This campaign occurred in 2019 and was distinctly different from the Triton Safety Instrumented System Attack.[1]

ID: C0032
First Seen:  October 2014 [1]
Last Seen:  January 2017 [1]
Version: 1.0
Created: 28 March 2024
Last Modified: 15 April 2024

Groups

ID Name Description
G0088 TEMP.Veles

[1]

Techniques Used

Domain ID Name Use
Enterprise T1546 .012 事件触发执行: Image File Execution Options Injection

During the C0032 campaign, TEMP.Veles modified and added entries within HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options to maintain persistence.[1]

Enterprise T1036 .005 伪装: Match Legitimate Name or Location

During the C0032 campaign, TEMP.Veles renamed files to look like legitimate files, such as Windows update files or Schneider Electric application files.[1]

Enterprise T1572 协议隧道

During the C0032 campaign, TEMP.Veles used encrypted SSH-based PLINK tunnels to transfer tools and enable RDP connections throughout the environment.[1]

Enterprise T1059 .001 命令与脚本解释器: PowerShell

During the C0032 campaign, TEMP.Veles used PowerShell to perform timestomping.[1]

Enterprise T1133 外部远程服务

During the C0032 campaign, TEMP.Veles used VPN access to persist in the victim environment.[1]

Enterprise T1003 .001 操作系统凭证转储: LSASS Memory

During the C0032 campaign, TEMP.Veles used Mimikatz and a custom tool, SecHack, to harvest credentials.[1]

Enterprise T1074 .001 数据分段: Local Data Staging

During the C0032 campaign, TEMP.Veles used staging folders that are infrequently used by legitimate users or processes to store data for exfiltration and tool deployment.[1]

Enterprise T1078 有效账户

During the C0032 campaign, TEMP.Veles used compromised VPN accounts.[1]

Enterprise T1505 .003 服务器软件组件: Web Shell

During the C0032 campaign, TEMP.Veles planted Web shells on Outlook Exchange servers.[1]

Enterprise T1070 .004 移除指标: File Deletion

During the C0032 campaign, TEMP.Veles routinely deleted tools, logs, and other files after they were finished with them.[1]

.006 移除指标: Timestomp

During the C0032 campaign, TEMP.Veles used timestomping to modify the $STANDARD_INFORMATION attribute on tools.[1]

Enterprise T1583 .003 获取基础设施: Virtual Private Server

During the C0032 campaign, TEMP.Veles used Virtual Private Server (VPS) infrastructure.[1]

Enterprise T1588 .002 获取能力: Tool

During the C0032 campaign, TEMP.Veles obtained and used tools such as Mimikatz and PsExec.[1]

Enterprise T1021 .001 远程服务: Remote Desktop Protocol

During the C0032 campaign, TEMP.Veles utilized RDP throughout an operation.[1]

.004 远程服务: SSH

During the C0032 campaign, TEMP.Veles relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution.[1]

Enterprise T1571 非标准端口

During the C0032 campaign, TEMP.Veles used port-protocol mismatches on ports such as 443, 4444, 8531, and 50501 during C2.[1]

Enterprise T1053 .005 预定任务/作业: Scheduled Task

During the C0032 campaign, TEMP.Veles used scheduled task XML triggers.[1]

Software

ID Name Description
S0002 Mimikatz

[1]

References