menuPass is a threat group that has been active since at least 2006. Individual members of menuPass are known to have acted in association with the Chinese Ministry of State Security's (MSS) Tianjin State Security Bureau and worked for the Huaying Haitai Science and Technology Development Company.[1][2]
menuPass has targeted healthcare, defense, aerospace, finance, maritime, biotechnology, energy, and government sectors globally, with an emphasis on Japanese organizations. In 2016 and 2017, the group is known to have targeted managed IT service providers (MSPs), manufacturing and mining companies, and a university.[3][4][5][6][7][1][2]
| Name | Description |
|---|---|
| Cicada | |
| POTASSIUM | |
| Stone Panda | |
| APT10 | |
| Red Apollo | |
| CVNX | |
| HOGFISH | |
| BRONZE RIVERSIDE |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
menuPass has used a modified version of pentesting script wmiexec.vbs, which logs into a remote machine using WMI.[12][13][8] |
|
| Enterprise | T1005 | 从本地系统获取数据 |
menuPass has collected various files from the compromised computers.[1][8] |
|
| Enterprise | T1039 | 从网络共享驱动器获取数据 |
menuPass has collected data from remote systems by mounting network shares with |
|
| Enterprise | T1090 | .002 | 代理: External Proxy |
menuPass has used a global service provider's IP as a proxy for C2 traffic from a victim.[7][10] |
| Enterprise | T1036 | 伪装 |
menuPass has used esentutl to change file extensions to their true type that were masquerading as .txt files.[10] |
|
| .003 | Rename System Utilities |
menuPass has renamed certutil and moved it to a different location on the system to avoid detection based on use of the tool.[10] |
||
| .005 | Match Legitimate Name or Location |
menuPass has been seen changing malicious files to appear legitimate.[2] |
||
| Enterprise | T1199 | 信任关系 |
menuPass has used legitimate access granted to Managed Service Providers in order to access victims of interest.[12][7][8][1][2] |
|
| Enterprise | T1190 | 利用公开应用程序漏洞 |
menuPass has leveraged vulnerabilities in Pulse Secure VPNs to hijack sessions.[14] |
|
| Enterprise | T1568 | .001 | 动态解析: Fast Flux DNS |
menuPass has used dynamic DNS service providers to host malicious domains.[2] |
| Enterprise | T1574 | .001 | 劫持执行流: DLL Search Order Hijacking | |
| .002 | 劫持执行流: DLL Side-Loading |
menuPass has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as UPPERCUT.[12][10][8] |
||
| Enterprise | T1140 | 反混淆/解码文件或信息 |
menuPass has used certutil in a macro to decode base64-encoded content contained in a dropper document attached to an email. The group has also used |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
menuPass uses PowerSploit to inject shellcode into PowerShell.[12][8] |
| .003 | 命令与脚本解释器: Windows Command Shell |
menuPass executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands.[6][12][13][10] menuPass has used malicious macros embedded inside Office documents to execute files.[9][10] |
||
| Enterprise | T1560 | 归档收集数据 |
menuPass has encrypted files and information before exfiltration.[1][2] |
|
| .001 | Archive via Utility |
menuPass has compressed files before exfiltration using TAR and RAR.[6][12][8] |
||
| Enterprise | T1003 | .002 | 操作系统凭证转储: Security Account Manager |
menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials.[12][13] |
| .003 | 操作系统凭证转储: NTDS | |||
| .004 | 操作系统凭证转储: LSA Secrets |
menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials.[12][13] |
||
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
menuPass stages data prior to exfiltration in multi-part archives, often saved in the Recycle Bin.[6] |
| .002 | 数据分段: Remote Data Staging |
menuPass has staged data on remote MSP systems or other victim networks prior to exfiltration.[6][8] |
||
| Enterprise | T1083 | 文件和目录发现 |
menuPass has searched compromised systems for folders of interest including those related to HR, audit and expense, and meeting memos.[8] |
|
| Enterprise | T1078 | 有效账户 |
menuPass has used valid accounts including shared between Managed Service Providers and clients to move between the two environments.[6][8][2][14] |
|
| Enterprise | T1106 | 本机API |
menuPass has used native APIs including |
|
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File |
menuPass has encoded strings in its malware with base64 as well as with a simple, single-byte XOR obfuscation using key 0x40.[9][10][8] |
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
menuPass has attempted to get victims to open malicious files such as Windows Shortcuts (.lnk) and/or Microsoft Office documents, sent via email as part of spearphishing campaigns.[12][7][9][10][2] |
| Enterprise | T1070 | .003 | 移除指标: Clear Command History |
menuPass has used Wevtutil to remove PowerShell execution logs.[14] |
| .004 | 移除指标: File Deletion |
A menuPass macro deletes files after it has decoded and decompressed them.[9][2] |
||
| Enterprise | T1218 | .004 | 系统二进制代理执行: InstallUtil |
menuPass has used |
| Enterprise | T1049 | 系统网络连接发现 |
menuPass has used |
|
| Enterprise | T1016 | 系统网络配置发现 |
menuPass has used several tools to scan for open NetBIOS nameservers and enumerate NetBIOS sessions.[12] |
|
| Enterprise | T1046 | 网络服务发现 |
menuPass has used tcping.exe, similar to Ping, to probe port status on systems of interest.[12] |
|
| Enterprise | T1119 | 自动化收集 |
menuPass has used the Csvde tool to collect Active Directory files and data.[8] |
|
| Enterprise | T1583 | .001 | 获取基础设施: Domains |
menuPass has registered malicious domains for use in intrusion campaigns.[1][2] |
| Enterprise | T1588 | .002 | 获取能力: Tool |
menuPass has used and modified open-source tools like Impacket, Mimikatz, and pwdump.[12] |
| Enterprise | T1087 | .002 | 账号发现: Domain Account |
menuPass has used the Microsoft administration tool csvde.exe to export Active Directory data.[12] |
| Enterprise | T1105 | 输入工具传输 |
menuPass has installed updates and new malware on victims.[6][2] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
menuPass has used key loggers to steal usernames and passwords.[2] |
| Enterprise | T1055 | .012 | 进程注入: Process Hollowing |
menuPass has used process hollowing in iexplore.exe to load the RedLeaves implant.[9] |
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
menuPass has used RDP connections to move across the victim network.[6][2] |
| .004 | 远程服务: SSH |
menuPass has used Putty Secure Copy Client (PSCP) to transfer data.[6] |
||
| Enterprise | T1210 | 远程服务漏洞利用 |
menuPass has used tools to exploit the ZeroLogon vulnerability (CVE-2020-1472).[8] |
|
| Enterprise | T1018 | 远程系统发现 |
menuPass uses scripts to enumerate IP ranges on the victim network. menuPass has also issued the command |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
menuPass has sent malicious Office documents via email as part of spearphishing campaigns as well as executables disguised as documents.[12][7][10][2] |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
menuPass has used a script (atexec.py) to execute a command on a target machine via Task Scheduler.[12] |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
menuPass has resized and added data to the certificate table to enable the signing of modified files with legitimate signatures.[14] |