HEXANE is a cyber espionage threat group that has targeted oil & gas, telecommunications, aviation, and internet service provider organizations since at least 2017. Targeted companies have been located in the Middle East and Africa, including Israel, Saudi Arabia, Kuwait, Morocco, and Tunisia. HEXANE's TTPs appear similar to APT33 and OilRig but due to differences in victims and tools it is tracked as a separate entity.[1][2][3][4]
| ID | Name | First Seen | Last Seen | References | Techniques |
|---|---|---|---|---|---|
| C0038 | HomeLand Justice | May 2021 [6][7][8] | September 2022 [8] |
HEXANE probed victim infrastructure in support of HomeLand Justice.[7] |
Windows管理规范, 伪装: Match Legitimate Name or Location, 利用公开应用程序漏洞, 命令与脚本解释器: Windows Command Shell, 命令与脚本解释器: PowerShell, 妨碍防御: Disable or Modify Tools, 妨碍防御: Disable Windows Event Logging, 操作系统凭证转储: LSASS Memory, 数据加密以实现影响, 有效账户: Default Accounts, 有效账户, 服务器软件组件: Web Shell, 横向工具传输, 电子邮件收集: Remote Email Collection, 磁盘擦除: Disk Structure Wipe, 网络服务发现, 获取能力: Code Signing Certificates, 获取能力: Tool, 访问令牌操控: Token Impersonation/Theft, 账号发现: Email Account, 账号操控: Additional Email Delegate Permissions, 输入工具传输, 远程服务: Remote Desktop Protocol, 远程服务: SMB/Windows Admin Shares, 通过C2信道渗出 |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
During HomeLand Justice, threat actors used WMI to modify Windows Defender settings.[7] |
|
| Enterprise | T1546 | .003 | 事件触发执行: Windows Management Instrumentation Event Subscription | |
| Enterprise | T1555 | 从密码存储中获取凭证 |
HEXANE has run |
|
| .003 | Credentials from Web Browsers |
HEXANE has used a Mimikatz-based tool and a PowerShell script to steal passwords from Google Chrome.[2] |
||
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
During HomeLand Justice, threat actors renamed ROADSWEEP to GoXML.exe and ZeroCleare to cl.exe.[8][6] |
| Enterprise | T1534 | 内部鱼叉式钓鱼 |
HEXANE has conducted internal spearphishing attacks against executives, HR, and IT personnel to gain information and access.[5] |
|
| Enterprise | T1190 | 利用公开应用程序漏洞 |
For HomeLand Justice, threat actors exploited CVE-2019-0604 in Microsoft SharePoint for initial access.[8] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
HEXANE has used PowerShell-based tools and scripts for discovery and collection on compromised hosts.[5][9][2] During HomeLand Justice, threat actors used PowerShell cmdlets New-MailboxSearch and Get-Recipient for discovery.[8][7] |
| .003 | 命令与脚本解释器: Windows Command Shell |
During HomeLand Justice, threat actors used Windows batch files for persistence and execution.[8][7] |
||
| .005 | 命令与脚本解释器: Visual Basic |
HEXANE has used a VisualBasic script named |
||
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools |
During HomeLand Justice, threat actors modified and disabled components of endpoint detection and response (EDR) solutions including Microsoft Defender Antivirus.[7] |
| .002 | 妨碍防御: Disable Windows Event Logging |
During HomeLand Justice, threat actors deleted Windows events and application logs.[7] |
||
| Enterprise | T1010 | 应用窗口发现 |
HEXANE has used a PowerShell-based keylogging tool to capture the window title.[5] |
|
| Enterprise | T1585 | .001 | 建立账户: Social Media Accounts |
HEXANE has established fraudulent LinkedIn accounts impersonating HR department employees to target potential victims with fake job offers.[3] |
| .002 | 建立账户: Email Accounts |
HEXANE has established email accounts for use in domain registration including for ProtonMail addresses.[2] |
||
| Enterprise | T1003 | .001 | 操作系统凭证转储: LSASS Memory |
During HomeLand Justice, threat actors dumped LSASS memory on compromised hosts.[8] |
| Enterprise | T1591 | .004 | 收集受害者组织信息: Identify Roles |
HEXANE has identified executives, HR, and IT staff at victim organizations for further targeting.[5][3] |
| Enterprise | T1589 | 收集受害者身份信息 |
HEXANE has identified specific potential victims at targeted organizations.[3] |
|
| .002 | Email Addresses |
HEXANE has targeted executives, human resources staff, and IT personnel for spearphishing.[5][3] |
||
| Enterprise | T1486 | 数据加密以实现影响 |
During HomeLand Justice, threat actors used ROADSWEEP ransomware to encrypt files on targeted systems.[6][8][7] |
|
| Enterprise | T1608 | .001 | 暂存能力: Upload Malware |
HEXANE has staged malware on fraudulent websites set up to impersonate targeted organizations.[3] |
| Enterprise | T1110 | 暴力破解 |
HEXANE has used brute force attacks to compromise valid credentials.[5] |
|
| .003 | Password Spraying |
HEXANE has used password spraying attacks to obtain valid credentials.[5] |
||
| Enterprise | T1078 | .001 | 有效账户: Default Accounts |
During HomeLand Justice, threat actors used the built-in administrator account to move laterally using RDP and Impacket.[7] |
| Enterprise | T1505 | .003 | 服务器软件组件: Web Shell |
For HomeLand Justice, threat actors used .aspx webshells named pickers.aspx, error4.aspx, and ClientBin.aspx, to maintain persistence.[8][7] |
| Enterprise | T1069 | .001 | 权限组发现: Local Groups | |
| Enterprise | T1570 | 横向工具传输 |
During HomeLand Justice, threat actors initiated a process named Mellona.exe to spread the ROADSWEEP file encryptor and a persistence script to a list of internal machines.[8] |
|
| Enterprise | T1027 | .010 | 混淆文件或信息: Command Obfuscation | |
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
HEXANE has relied on victim's executing malicious file attachments delivered via email or embedded within actor-controlled websites to deliver malware.[5][1][3][10] |
| Enterprise | T1114 | .002 | 电子邮件收集: Remote Email Collection |
During HomeLand Justice, threat actors made multiple HTTP POST requests to the Exchange servers of the victim organization to transfer data.[8] |
| Enterprise | T1561 | .002 | 磁盘擦除: Disk Structure Wipe |
During HomeLand Justice, threat actors used a version of ZeroCleare to wipe disk drives on targeted hosts.[8][7] |
| Enterprise | T1082 | 系统信息发现 |
HEXANE has collected the hostname of a compromised machine.[2] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
HEXANE has run |
|
| Enterprise | T1049 | 系统网络连接发现 |
HEXANE has used netstat to monitor connections to specific ports.[2] |
|
| Enterprise | T1016 | 系统网络配置发现 | ||
| .001 | Internet Connection Discovery |
HEXANE has used tools including BITSAdmin to test internet connectivity from compromised hosts.[2] |
||
| Enterprise | T1102 | .002 | 网络服务: Bidirectional Communication |
HEXANE has used cloud services, including OneDrive, for C2.[11] |
| Enterprise | T1046 | 网络服务发现 |
During HomeLand Justice, threat actors executed the Advanced Port Scanner tool on compromised systems.[8][7] |
|
| Enterprise | T1583 | .001 | 获取基础设施: Domains |
HEXANE has registered and operated domains for campaigns, often using a security or web technology theme or impersonating the targeted organization.[5][1][3] |
| .002 | 获取基础设施: DNS Server |
HEXANE has set up custom DNS servers to send commands to compromised hosts via TXT records.[10] |
||
| Enterprise | T1588 | .002 | 获取能力: Tool |
HEXANE has acquired, and sometimes customized, open source tools such as Mimikatz, Empire, VNC remote access software, and DIG.net.[2][5][10] During HomeLand Justice, threat actors used tools including Advanced Port Scanner, Mimikatz, and Impacket.[8][7] |
| .003 | 获取能力: Code Signing Certificates |
During HomeLand Justice, threat actors used tools with legitimate code signing certificates. [8] |
||
| Enterprise | T1134 | .001 | 访问令牌操控: Token Impersonation/Theft |
During HomeLand Justice, threat actors used custom tooling to acquire tokens using |
| Enterprise | T1087 | .003 | 账号发现: Email Account |
During HomeLand Justice, threat actors used compromised Exchange accounts to search mailboxes for administrator accounts.[8] |
| Enterprise | T1586 | .002 | 账号妥协: Email Accounts |
HEXANE has used compromised accounts to send spearphishing emails.[5] |
| Enterprise | T1098 | .002 | 账号操控: Additional Email Delegate Permissions |
During HomeLand Justice, threat actors added the |
| Enterprise | T1518 | 软件发现 |
HEXANE has enumerated programs installed on an infected machine.[2] |
|
| Enterprise | T1105 | 输入工具传输 |
HEXANE has downloaded additional payloads and malicious scripts onto a compromised host.[2] During HomeLand Justice, threat actors used web shells to download files to compromised infrastructure.[7] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
HEXANE has used a PowerShell-based keylogger named |
| Enterprise | T1057 | 进程发现 | ||
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
HEXANE has used remote desktop sessions for lateral movement.[5] During HomeLand Justice, threat actors primarily used RDP for lateral movement in the victim environment.[8][7] |
| .002 | 远程服务: SMB/Windows Admin Shares |
During HomeLand Justice, threat actors used SMB for lateral movement.[8][7] |
||
| Enterprise | T1018 | 远程系统发现 | ||
| Enterprise | T1041 | 通过C2信道渗出 |
During HomeLand Justice, threat actors used HTTP to transfer data from compromised Exchange servers.[8] |
|
| Enterprise | T1567 | .002 | 通过网络服务渗出: Exfiltration to Cloud Storage |
HEXANE has used cloud services, including OneDrive, for data exfiltration.[11] |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
HEXANE has used a scheduled task to establish persistence for a keylogger.[2] |