Happy Friday everyone!

Bitdefender researcher Martin Zugec recently published a report that involved UAC-0063 targeting high-value targets and organizations in Central Asia and Europe that included government entities and diplomatic missions.

According to the report, initial access was gained when the actor stole a legitimate document, weaponized it, and sent it to the target. The email contains a link, not the actual document, and when the target downloads it and enables macros, triggers a VBA script. A new temporary document is created in the %LocalAppData%\Tmep directory and stores the variables form the initial document. Once the variables are extracted the #HATVIBE malware (a backdoor designed to receive VBS modules for exection on compromised hosts) enters the picture and a scheduled task is created to execute it every 4 minutes for persistence. Then, HATVIBE contacts the C2 server for further instructions.

Now this is just a brief summary but the report contains PLENTY of more technical details, so I would encourage you to go and read it yourself and see what I missed! Enjoy and Happy Hunting!

UAC-0063: Cyber Espionage Operation Expanding from Central Asia

https://www.bitdefender.com/en-us/blog/businessinsights/uac-0063-cyber-espionage-operation-expanding-from-central-asia

Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday

UAC-0063: Cyber Espionage Operation Expanding from Central Asia

Bitdefender Labs warns of an active cyber-espionage campaign targeting organizations in Central Asia and European countries.

Bitdefender Blog

And as a gift for you on Friday, here are TWO community hunt packages you can use to hunt for similar suspicious activity! Happy Hunting!

Scheduled Task Executing from Abnormal Location

https://hunter.cyborgsecurity.io/research/hunt-package/09a380b3-45e5-408c-b14c-3787fa48d783

This hunt package is designed to capture activity associated with a scheduled task which includes abnormal locations in its details for execution. This is often a mark of persistence or malicious tasks created by malware or attackers. details.

Potential Maldoc Execution Chain Observed

https://hunter.cyborgsecurity.io/research/hunt-package/b194088b-c846-4c72-a4b7-933627878db4

Detect the aftermath of a successfully delivered and executed maldoc (Microsoft Office). A detection indicates an Office document was opened from an email or download/link, spawned a suspicious execution, and attempted to execute code via common Windows binaries (i.e. powershell, cmd, rundll32, etc).

#huntoftheday #gethunting

Intel 471 | HUNTER