Play

Play is a ransomware group that has been active since at least 2022 deploying Playcrypt ransomware against the business, government, critical infrastructure, healthcare, and media sectors in North America, South America, and Europe. Play actors employ a double-extortion model, encrypting systems after exfiltrating data, and are presumed by security researchers to operate as a closed group.[1][2]

ID: G1040
Contributors: Marco Pedrinazzi, @pedrinazziM
Version: 1.0
Created: 24 September 2024
Last Modified: 02 October 2024

Techniques Used

Domain ID Name Use
Enterprise T1190 利用公开应用程序漏洞

Play has exploited known vulnerabilities for initial access including CVE-2018-13379 and CVE-2020-12812 in FortiOS and CVE-2022-41082 and CVE-2022-41040 ("ProxyNotShell") in Microsoft Exchange.[1][2]

Enterprise T1059 .001 命令与脚本解释器: PowerShell

Play has used Base64-encoded PowerShell scripts to disable Microsoft Defender.[2]

.003 命令与脚本解释器: Windows Command Shell

Play has used a batch script to remove indicators of its presence on compromised hosts.[2]

Enterprise T1133 外部远程服务

Play has used Remote Desktop Protocol (RDP) and Virtual Private Networks (VPN) for initial access.[1][2]

Enterprise T1562 .001 妨碍防御: Disable or Modify Tools

Play has used tools including GMER, IOBit, and PowerTool to disable antivirus software.[1][2]

Enterprise T1587 .001 开发能力: Malware

Play developed and employ Playcrypt ransomware.[2][1]

Enterprise T1560 .001 归档收集数据: Archive via Utility

Play has used WinRAR to compress files prior to exfiltration.[1][2]

Enterprise T1003 .001 操作系统凭证转储: LSASS Memory

Play has used Mimikatz and the Windows Task Manager to dump LSASS process memory.[2]

Enterprise T1030 数据传输大小限制

Play has split victims' files into chunks for exfiltration.[1][2]

Enterprise T1083 文件和目录发现

Play has used the Grixba information stealer to list security files and processes.[2]

Enterprise T1048 替代协议渗出

Play has used WinSCP to exfiltrate data to actor-controlled accounts.[1][2]

Enterprise T1078 有效账户

Play has used valid VPN accounts to achieve initial access.[1]

.002 Domain Accounts

Play has used valid domain accounts for access.[2]

.003 Local Accounts

Play has used valid local accounts to gain initial access.[2]

Enterprise T1027 .010 混淆文件或信息: Command Obfuscation

Play has used Base64-encoded PowerShell scripts for post exploit activities on compromised hosts.[2]

Enterprise T1070 .001 移除指标: Clear Windows Event Logs

Play has used tools to remove log files on targeted systems.[1][2]

.004 移除指标: File Deletion

Play has used tools including Wevtutil to remove malicious files from compromised hosts.[2]

Enterprise T1082 系统信息发现

Play has leveraged tools to enumerate system information.[2]

Enterprise T1016 系统网络配置发现

Play has used the information-stealing tool Grixba to enumerate network information.[1]

Enterprise T1588 .002 获取能力: Tool

Play has used multiple tools for discovery and defense evasion purposes on compromised hosts.[1]

Enterprise T1657 财务窃取

Play demands ransom payments from victims to unencrypt filesystems and to not publish sensitive data exfiltrated from victim networks.[1]

Enterprise T1518 .001 软件发现: Security Software Discovery

Play has used the information-stealing tool Grixba to scan for anti-virus software.[1]

Enterprise T1105 输入工具传输

Play has used Cobalt Strike to download files to compromised machines.[2]

Enterprise T1057 进程发现

Play has used the information stealer Grixba to check for a list of security processes.[2]

Enterprise T1021 .002 远程服务: SMB/Windows Admin Shares

Play has used Cobalt Strike to move laterally via SMB.[2]

Enterprise T1018 远程系统发现

Play has used tools such as AdFind, Nltest, and BloodHound to enumerate shares and hostnames on compromised networks.[2]

Software

ID Name References Techniques
S0552 AdFind [1][2] 域信任发现, 权限组发现: Domain Groups, 系统网络配置发现, 账号发现: Domain Account, 远程系统发现
S0521 BloodHound [2] 命令与脚本解释器: PowerShell, 域信任发现, 密码策略发现, 归档收集数据, 本机API, 权限组发现: Domain Groups, 权限组发现: Local Groups, 系统所有者/用户发现, 组策略发现, 账号发现: Domain Account, 账号发现: Local Account, 远程系统发现
S0154 Cobalt Strike [2] BITS任务, Windows管理规范, 从本地系统获取数据, 代理: Domain Fronting, 代理: Internal Proxy, 使用备用认证材料: Pass the Hash, 修改注册表, 创建或修改系统进程: Windows Service, 办公应用启动: Office Template Macros, 加密通道: Asymmetric Cryptography, 加密通道: Symmetric Cryptography, 协议隧道, 反射性代码加载, 反混淆/解码文件或信息, 命令与脚本解释器: JavaScript, 命令与脚本解释器: Visual Basic, 命令与脚本解释器: PowerShell, 命令与脚本解释器: Python, 命令与脚本解释器: Windows Command Shell, 妨碍防御: Disable or Modify Tools, 客户端执行漏洞利用, 屏幕捕获, 应用层协议: DNS, 应用层协议: Web Protocols, 应用层协议: File Transfer Protocols, 操作系统凭证转储: LSASS Memory, 操作系统凭证转储: Security Account Manager, 数据传输大小限制, 数据混淆: Protocol or Service Impersonation, 数据编码: Standard Encoding, 文件和目录发现, 有效账户: Domain Accounts, 有效账户: Local Accounts, 本机API, 权限提升漏洞利用, 权限组发现: Domain Groups, 权限组发现: Local Groups, 查询注册表, 浏览器会话劫持, 混淆文件或信息: Indicator Removal from Tools, 混淆文件或信息, 滥用权限提升控制机制: Sudo and Sudo Caching, 滥用权限提升控制机制: Bypass User Account Control, 移除指标: Timestomp, 系统二进制代理执行: Rundll32, 系统服务: Service Execution, 系统服务发现, 系统网络连接发现, 系统网络配置发现, 网络共享发现, 网络服务发现, 访问令牌操控: Parent PID Spoofing, 访问令牌操控: Token Impersonation/Theft, 访问令牌操控: Make and Impersonate Token, 账号发现: Domain Account, 软件发现, 输入工具传输, 输入捕获: Keylogging, 进程发现, 进程注入: Dynamic-link Library Injection, 进程注入: Process Hollowing, 进程注入, 远程服务: Remote Desktop Protocol, 远程服务: SSH, 远程服务: Windows Remote Management, 远程服务: SMB/Windows Admin Shares, 远程服务: Distributed Component Object Model, 远程系统发现, 隐藏伪装: Process Argument Spoofing, 非应用层协议, 预定传输, 颠覆信任控制: Code Signing
S0363 Empire [2] Windows管理规范, 中间人攻击: LLMNR/NBT-NS Poisoning and SMB Relay, 事件触发执行: Accessibility Features, 从密码存储中获取凭证: Credentials from Web Browsers, 使用备用认证材料: Pass the Hash, 创建或修改系统进程: Windows Service, 创建账户: Local Account, 创建账户: Domain Account, 剪贴板数据, 加密通道: Asymmetric Cryptography, 劫持执行流: Path Interception by Unquoted Path, 劫持执行流: Path Interception by Search Order Hijacking, 劫持执行流: Path Interception by PATH Environment Variable, 劫持执行流: Dylib Hijacking, 劫持执行流: DLL Search Order Hijacking, 可信开发者工具代理执行: MSBuild, 启动或登录自动启动执行: Security Support Provider, 启动或登录自动启动执行: Registry Run Keys / Startup Folder, 启动或登录自动启动执行: Shortcut Modification, 命令与脚本解释器: PowerShell, 命令与脚本解释器: Windows Command Shell, 命令与脚本解释器, 域信任发现, 域或租户策略修改: Group Policy Modification, 屏幕捕获, 应用层协议: Web Protocols, 归档收集数据, 操作系统凭证转储: LSASS Memory, 文件和目录发现, 未加密凭证: Credentials In Files, 未加密凭证: Private Keys, 本机API, 权限提升漏洞利用, 浏览器信息发现, 混淆文件或信息: Command Obfuscation, 滥用权限提升控制机制: Bypass User Account Control, 电子邮件收集: Local Email Collection, 移除指标: Timestomp, 窃取或伪造Kerberos票据: Kerberoasting, 窃取或伪造Kerberos票据: Golden Ticket, 窃取或伪造Kerberos票据: Silver Ticket, 系统信息发现, 系统所有者/用户发现, 系统服务: Service Execution, 系统网络连接发现, 系统网络配置发现, 组策略发现, 网络共享发现, 网络嗅探, 网络服务: Bidirectional Communication, 网络服务发现, 自动化收集, 自动化渗出, 视频捕获, 访问令牌操控: SID-History Injection, 访问令牌操控, 访问令牌操控: Create Process with Token, 账号发现: Domain Account, 账号发现: Local Account, 软件发现: Security Software Discovery, 输入工具传输, 输入捕获: Keylogging, 输入捕获: Credential API Hooking, 进程发现, 进程注入, 远程服务: Distributed Component Object Model, 远程服务: SSH, 远程服务漏洞利用, 通过C2信道渗出, 通过网络服务渗出: Exfiltration to Code Repository, 通过网络服务渗出: Exfiltration to Cloud Storage, 预定任务/作业: Scheduled Task
S0002 Mimikatz [2] 从密码存储中获取凭证, 从密码存储中获取凭证: Credentials from Web Browsers, 从密码存储中获取凭证: Windows Credential Manager, 伪造域控制器, 使用备用认证材料: Pass the Hash, 使用备用认证材料: Pass the Ticket, 启动或登录自动启动执行: Security Support Provider, 操作系统凭证转储: DCSync, 操作系统凭证转储: Security Account Manager, 操作系统凭证转储: LSASS Memory, 操作系统凭证转储: LSA Secrets, 未加密凭证: Private Keys, 窃取或伪造Kerberos票据: Golden Ticket, 窃取或伪造Kerberos票据: Silver Ticket, 窃取或伪造身份认证证书, 访问令牌操控: SID-History Injection, 账号操控
S0359 Nltest [2] 域信任发现, 系统网络配置发现, 远程系统发现
S1162 Playcrypt [1][2] 数据加密以实现影响, 文件和目录发现, 系统恢复抑制
S0029 PsExec [1] 创建或修改系统进程: Windows Service, 创建账户: Domain Account, 横向工具传输, 系统服务: Service Execution, 远程服务: SMB/Windows Admin Shares
S0645 Wevtutil [2] 从本地系统获取数据, 妨碍防御: Disable Windows Event Logging, 移除指标: Clear Windows Event Logs

References