151. Adversaries Abuse MST Transforms to Install Malware
Hello everyone!
Another day - another interesting technique. Today we'll look how adversaries, possible APT32, abuse MST transforms to drop malware to the compromised system.
The threat actors distribute ISO files with an LNK file with double extension (pdf.lnk), and two hidden files - an MSI installer and an MST file.
The LNK runs the following command:
"C:\Windows\System32\msiexec.exe" /qn /i WindowsPCHealthCheckSetup.msi TRANSFORMS=5ACXP.mst
As the result, a legitimate PcHealthCheck executable along with the malicious tbs.dll dropped by the MST transform under %LocalAppData%\PCHealthCheck\.
Can we hunt for suspicious MST transforms? Of course! For example:
event_type: "processcreatewin"
AND
proc_file_name: "msiexec.exe"
AND
cmdline: "TRANSFORMS"
See you tomorrow!
Comments
Post a Comment