393. Hunting for Recent Gamaredon Tactics, Techniques, and Procedures
Hello everyone!
Today we’ll take a look at several procedures observed in relatively recent Gamaredon (Disastrous Werewolf, Primitive Bear, Armageddon, Shuckworm, Aqua Blizzard) campaigns.
As before, the attackers used phishing emails for initial access. The emails contained archives exploiting the CVE-2025-8088 vulnerability in WinRAR. After successful exploitation, a malicious VBS file - for example, 1_13_4_1882_18.03.2026.vbs - was copied into %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\.
We can search for suspicious VBS file creation events in this folder:
event_type: "filecreatewin"
AND
file_path: ("programs\\startup" AND *.vbs)
Next, the VBS file downloads a malicious HTA file from Cloudflare Workers. For example, we can look for wscript.exe communications with the corresponding domains:
event_type: "dnsreqwin"
AND
dns_rname: "workers.dev"
AND
proc_file_path: "wscript.exe"
The HTA file is downloaded into the %TEMP% directory and executed via mshta.exe, giving us another opportunity for threat hunting:
event_type: "processcreatewin"
AND
proc_file_path: "mshta.exe"
AND
cmdline: "temp"
This file collects information about the compromised system, downloads the next stage, and executes it.
See you soon!

Comments
Post a Comment