Page 65 - Veritas
P. 65

CASE STUDIES




           employee’s desire to help a colleague and, perhaps, act first and think lat-

           er.”



           Attack Methodology:
           Attack Methodology:
           The first line of attack was through social engineering. The threat actor

           pretended to be a company employee, specifically one of the system en-

           gineers. The e-mail exactly mimicked an invitation from cloud service and
           was pretending to appear as sort of a weekly report. Given the impersonat-
           ed sender’s actual role within the company, this wasn’t only expected, but

           the specified document.



           They used servers that allow them to send an e-mail anonymously, which
           is how they managed to defeat the Security Protection Factor (SPF) within

           the place to stop the victim’s domain from being spoofed.



           Several links inside the email body, including the one to just accept the  in-
           vitation, had been replaced with bit.ly shortened URLs. But all the servers

           were down at the time of the investigation.



           When the target clicked the primary link, the link triggered a download of
           a .zip file, and inside that zip file were two more files named “Password.

           txt.lnk”: the “weekly_report.doc” file was password protected which made

           the target more convinced that files are genuine.


           The string is executed as a script (see Appendix 2) which connects to a

           different server that requests to send the “main.cs” file, which got decod-

           ed from Base64 so it got passed as a script block. This script or the initial
           download file wasn’t retrieved on the filesystem; however, at the same
           time, the Event Log started showing messages containing parts of Pow-

           erShell code (channel Microsoft-Windows-PowerShell/Operational, event

           ID 4104). Pieced together, this code was found to perform several tasks:


           • Writes a long string, which decodes to a script, to the user’s APPDATA

           followed by “\Microsoft\Windows\Start Menu\Programs\Startup\appView.

           js”;








  50 VERITAS
   60   61   62   63   64   65   66   67   68   69   70