Wizard Spider is a Russia-based financially motivated threat group originally known for the creation and deployment of TrickBot since at least 2016. Wizard Spider possesses a diverse arsenal of tools and has conducted ransomware campaigns against a variety of organizations, ranging from major corporations to hospitals.[1][2][3]
| Name | Description |
|---|---|
| UNC1878 | |
| TEMP.MixMaster | |
| Grim Spider | |
| FIN12 | |
| GOLD BLACKBURN | |
| ITG23 | |
| Periwinkle Tempest | |
| DEV-0193 |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1197 | BITS任务 |
Wizard Spider has used batch scripts that utilizes WMIC to execute a BITSAdmin transfer of a ransomware payload to each compromised machine.[7] |
|
| Enterprise | T1047 | Windows管理规范 |
Wizard Spider has used WMI and LDAP queries for network discovery and to move laterally. Wizard Spider has also used batch scripts to leverage WMIC to deploy ransomware.[6][2][4][11][7] |
|
| Enterprise | T1557 | .001 | 中间人攻击: LLMNR/NBT-NS Poisoning and SMB Relay |
Wizard Spider has used the Invoke-Inveigh PowerShell cmdlets, likely for name service poisoning.[4] |
| Enterprise | T1555 | .004 | 从密码存储中获取凭证: Windows Credential Manager |
Wizard Spider has used PowerShell cmdlet |
| Enterprise | T1005 | 从本地系统获取数据 |
Wizard Spider has collected data from a compromised host prior to exfiltration.[7] |
|
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
Wizard Spider has used scheduled tasks to install TrickBot, using task names to appear legitimate such as WinDotNet, GoogleTask, or Sysnetsf.[6] It has also used common document file names for other malware binaries.[4] |
| Enterprise | T1550 | .002 | 使用备用认证材料: Pass the Hash |
Wizard Spider has used the |
| Enterprise | T1112 | 修改注册表 |
Wizard Spider has modified the Registry key |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Wizard Spider has installed TrickBot as a service named ControlServiceA in order to establish persistence.[6][7] |
| Enterprise | T1136 | .001 | 创建账户: Local Account |
Wizard Spider has created local administrator accounts to maintain persistence in compromised networks.[7] |
| .002 | 创建账户: Domain Account |
Wizard Spider has created and used new accounts within a victim's Active Directory environment to maintain persistence.[7] |
||
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Wizard Spider has established persistence via the Registry key |
| .004 | 启动或登录自动启动执行: Winlogon Helper DLL |
Wizard Spider has established persistence using Userinit by adding the Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon.[4] |
||
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
Wizard Spider has used macros to execute PowerShell scripts to download malware on victim's machines.[6] It has also used PowerShell to execute commands and move laterally through a victim network.[2][4][11][7] |
| .003 | 命令与脚本解释器: Windows Command Shell |
Wizard Spider has used |
||
| Enterprise | T1133 | 外部远程服务 |
Wizard Spider has accessed victim networks by using stolen credentials to access the corporate VPN infrastructure.[4] |
|
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools |
Wizard Spider has shut down or uninstalled security applications on victim systems that might prevent ransomware from executing.[2][4][12][7] |
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Wizard Spider has used HTTP for network communications.[6] |
| Enterprise | T1585 | .002 | 建立账户: Email Accounts |
Wizard Spider has leveraged ProtonMail email addresses in ransom notes when delivering Ryuk ransomware.[7] |
| Enterprise | T1560 | .001 | 归档收集数据: Archive via Utility |
Wizard Spider has archived data into ZIP files on compromised machines.[7] |
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
Wizard Spider has dumped the lsass.exe memory to harvest credentials with the use of open-source tool LaZagne.[7] |
| .002 | 操作系统凭证转储: Security Account Manager |
Wizard Spider has acquired credentials from the SAM/SECURITY registry hives.[4] |
||
| .003 | 操作系统凭证转储: NTDS |
Wizard Spider has gained access to credentials via exported copies of the ntds.dit Active Directory database. Wizard Spider has also created a volume shadow copy and used a batch script file to collect NTDS.dit with the use of the Windows utility, ntdsutil.[4][7] |
||
| Enterprise | T1074 | 数据分段 |
Wizard Spider has collected and staged credentials and network enumeration information, using the networkdll and psfin TrickBot modules.[6] |
|
| .001 | Local Data Staging |
Wizard Spider has staged ZIP files in local directories such as, |
||
| Enterprise | T1222 | .001 | 文件和目录权限修改: Windows File and Directory Permissions Modification |
Wizard Spider has used the icacls command to modify access control to backup servers, providing them with full control of all the system folders.[13] |
| Enterprise | T1048 | .003 | 替代协议渗出: Exfiltration Over Unencrypted Non-C2 Protocol |
Wizard Spider has exfiltrated victim information using FTP.[12][14] |
| Enterprise | T1078 | 有效账户 |
Wizard Spider has used valid credentials for privileged accounts with the goal of accessing domain controllers.[6][7] |
|
| .002 | Domain Accounts |
Wizard Spider has used administrative accounts, including Domain Admin, to move laterally within a victim network.[4] |
||
| Enterprise | T1489 | 服务停止 |
Wizard Spider has used taskkill.exe and net.exe to stop backup, catalog, cloud, and other services prior to network encryption.[12] |
|
| Enterprise | T1552 | .006 | 未加密凭证: Group Policy Preferences |
Wizard Spider has used PowerShell cmdlets |
| Enterprise | T1570 | 横向工具传输 |
Wizard Spider has used stolen credentials to copy tools into the |
|
| Enterprise | T1027 | .010 | 混淆文件或信息: Command Obfuscation |
Wizard Spider used Base64 encoding to obfuscate an Empire service and PowerShell commands.[5][12] |
| Enterprise | T1204 | .001 | 用户执行: Malicious Link |
Wizard Spider has lured victims into clicking a malicious link delivered through spearphishing.[2] |
| .002 | 用户执行: Malicious File |
Wizard Spider has lured victims to execute malware with spearphishing attachments containing macros to download either Emotet, Bokbot, TrickBot, or Bazar.[6][3][7] |
||
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
Wizard Spider has used file deletion to remove some modules and configurations from an infected host after use.[6] |
| Enterprise | T1558 | .003 | 窃取或伪造Kerberos票据: Kerberoasting |
Wizard Spider has used Rubeus, MimiKatz Kerberos module, and the Invoke-Kerberoast cmdlet to steal AES hashes.[12][4][2][14][7] |
| Enterprise | T1218 | .011 | 系统二进制代理执行: Rundll32 |
Wizard Spider has utilized |
| Enterprise | T1082 | 系统信息发现 |
Wizard Spider has used Systeminfo and similar commands to acquire detailed configuration information of a victim's machine. Wizard Spider has also utilized the PowerShell cmdlet |
|
| Enterprise | T1490 | 系统恢复抑制 |
Wizard Spider has used WMIC and vssadmin to manually delete volume shadow copies. Wizard Spider has also used Conti ransomware to delete volume shadow copies automatically with the use of vssadmin.[7] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
Wizard Spider has used "whoami" to identify the local user and their privileges.[13] |
|
| Enterprise | T1569 | .002 | 系统服务: Service Execution |
Wizard Spider has used |
| Enterprise | T1016 | 系统网络配置发现 |
Wizard Spider has used ipconfig to identify the network configuration of a victim machine. Wizard Spider has also used the PowerShell cmdlet |
|
| Enterprise | T1135 | 网络共享发现 |
Wizard Spider has used the "net view" command to locate mapped network shares.[2] |
|
| Enterprise | T1588 | .002 | 获取能力: Tool |
Wizard Spider has utilized tools such as Empire, Cobalt Strike, Cobalt Strike, Rubeus, AdFind, BloodHound, Metasploit, Advanced IP Scanner, Nirsoft PingInfoView, and SoftPerfect Network Scanner for targeting efforts.[4][7] |
| .003 | 获取能力: Code Signing Certificates |
Wizard Spider has obtained code signing certificates signed by DigiCert, GlobalSign, and COMOOD for malware payloads.[14][7] |
||
| Enterprise | T1087 | .002 | 账号发现: Domain Account |
Wizard Spider has identified domain admins through the use of |
| Enterprise | T1518 | 软件发现 |
Wizard Spider has utilized the PowerShell script |
|
| .001 | Security Software Discovery |
Wizard Spider has used WMI to identify anti-virus products installed on a victim's machine.[12] |
||
| Enterprise | T1105 | 输入工具传输 |
Wizard Spider can transfer malicious payloads such as ransomware to compromised machines.[7] |
|
| Enterprise | T1055 | 进程注入 |
Wizard Spider has used process injection to execute payloads to escalate privileges.[7] |
|
| .001 | Dynamic-link Library Injection |
Wizard Spider has injected malicious DLLs into memory with read, write, and execute permissions.[2][14] |
||
| Enterprise | T1021 | 远程服务 |
Wizard Spider has used the WebDAV protocol to execute Ryuk payloads hosted on network file shares.[7] |
|
| .001 | Remote Desktop Protocol |
Wizard Spider has used RDP for lateral movement and to deploy ransomware interactively.[6][2][14][7] |
||
| .002 | SMB/Windows Admin Shares |
Wizard Spider has used SMB to drop Cobalt Strike Beacon on a domain controller for lateral movement.[14][12] |
||
| .006 | Windows Remote Management |
Wizard Spider has used Window Remote Management to move laterally through a victim network.[2] |
||
| Enterprise | T1210 | 远程服务漏洞利用 |
Wizard Spider has exploited or attempted to exploit Zerologon (CVE-2020-1472) and EternalBlue (MS17-010) vulnerabilities.[4][12][15] |
|
| Enterprise | T1018 | 远程系统发现 |
Wizard Spider has used networkdll for network discovery and psfin specifically for financial and point of sale indicators. Wizard Spider has also used AdFind, |
|
| Enterprise | T1041 | 通过C2信道渗出 |
Wizard Spider has exfiltrated domain credentials and network enumeration information over command and control (C2) channels.[6][7] |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
Wizard Spider has exfiltrated stolen victim data to various cloud storage providers.[7] |
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Wizard Spider has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet, Bokbot, TrickBot, or Bazar.[6][11][7] |
| .002 | 钓鱼: Spearphishing Link |
Wizard Spider has sent phishing emails containing a link to an actor-controlled Google Drive document or other free online file hosting services.[2][14] |
||
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Wizard Spider has used scheduled tasks to establish persistence for TrickBot and other malware.[6][2][4][14][7] |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
Wizard Spider has used Digicert code-signing certificates for some of its malware.[14] |