**// Day 5**
We observed further RDP connections, along with DLL sideloading, Cobalt Strike activity, local privilege escalation attempts, and SystemBC (multipurpose proxy malware that, among other things, leverages a SOCKS5 proxy and offers TORbackdooring functionality). The threat actor continued to initiate scans and attempted to place AnyDesk on various systems. Sensitive files were staged, and 7zip software was leveraged for exfiltration. At this point the presence of multiple C2 entities made the tracking especially exciting.
- The DLL `\Pictures\libvlc.dll` was loaded into the process MSDTC.exe (VLC.exe)
- Binary written to disk: `\Pictures\mstsc.exe`
Note: This was a VLC binary abused for sideloading. It appears to be named after a native Windows binary for evasion purposes.
- Cobalt Strike detected in `dllhost`
- C2 activity related to Cobalt Strike: `z3a1.ssndob.cn[.]com`
Various commands were again run via Cobalt Strike:
- `cmd.exe /C tasklist /svc`
- `cmd.exe /C whoami /groups`
- `cmd.exe /C systeminfo > systeminfo.txt`
- `cmd.exe /C dir`
- `cmd.exe /C type systeminfo.txt`
Other processes and detections:
- `\pictures\ps.exe`
- `cmd.exe /C ps.exe -h`
- `cmd.exe /C ps.exe -h 10.1.1.0/24 -nopn psinternal.txt`
- `\Pictures\ok.exe` (Windows local privilege escalation via WinPEAS)
- `cmd.exe /C ok.exe cmd fast`
- `\pictures\internal.txt`
- `'ATK/winPEAS-A' at '\Pictures\ok.exe'` (winPEAS attack tool used for local privilege escalation)
- `'ATK/winPEAS-B' at '\Pictures\ok.bat'` (winPEAS attack tool used for local privilege escalation)
- `'Exp/2140444-A' at '\Pictures\document.docx'` (winPEAS attack tool used for local privilege escalation)
- `\desktop\64-bit\netscan.exe`
- Threat Actor download via chrome: `45.227.252[.]247/download/svr.dll`
- `\documents\2.dll` (downloaded from `mail.proton[.]me`)
- `rundll32.exe 2.dll, alDeletePresetsSOFT`
- `C:\Users\Public\p.txt`
- `mail.proton.me` is used to download `1.dll` and `rin.dll` into the Documents folder
- `rundll32.exe rin.dll, DllRegisterServer`
- `rundll32.exe 1.dll, DllRegisterServer`
- `"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\redacted.user.example\Documents\scan.html`
- `45.227.252[.]247/download/win.exe`
- `45.227.252[.]247/download/22.dll`
- `rundll32.exe 22.dll, CheckUserConsent`
- C2 server related to `22.dll`:
- `45.63.86[.]203:443`
- hxxp://sendspace[.]com used to download `C:\Users\redacted.user.example\Desktop\local.ps1`
- `powershell -ex bypass -f local.ps1`
**// Time Unknown (pre-ransomware)**
- `C:\Users\redacted.user.example\Downloads\AnyDesk.exe`
We observed the IP address 5.255.103.142; this address is related to the SystemBC malware. We also observed the start of data collection of sensitive files via 7zip.
https://news.sophos.com/en-us/2020/12/16/systembc/