049. Here's How Mustang Panda Evades AV and How to Detect It

Hello everyone! Let's talk about another sub-technique without any procedure examples - System Binary Proxy Execution: Mavinject (T1218.013).

In the report on recent Mustang Panda activity (they track this cluster under the name Earth Preta, we call it Horned Werewolf), Trend Micro shared how the adversary abused Mavinject.exe to inject malicious code to a running process and bypass ESET detection (but my testing shows that current version of ESET detects it).

To do so, the threat actors use Mavinject.exe with /INJECTRUNNING parameter, for example:

"C:\Windows\SysWOW64\Mavinject.exe" 5928 /INJECTRUNNING "C:\Users\Alice\Desktop\dc673d59a6a9df3d02e83fd03af80e117bea20954602ae416540870b1b3d13c4.dll"

To detect it, let's use the parameter and Mavinject's original file names (adversaries may rename it!):

event_type: processcreate 

AND 

proc_file_originalfilename:("mavinject32.exe" OR "mavinject64.exe") 

AND 

cmdline:"INJECTRUNNING"

Got caught!

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

001. The Zeltser Challenge

012. They Want to Know Everything About Your System!