393. Hunting for Recent Gamaredon Tactics, Techniques, and Procedures

Hello everyone!

Today we’ll take a look at several procedures observed in relatively recent Gamaredon (Disastrous Werewolf, Primitive Bear, Armageddon, Shuckworm, Aqua Blizzard) campaigns.

As before, the attackers used phishing emails for initial access. The emails contained archives exploiting the CVE-2025-8088 vulnerability in WinRAR. After successful exploitation, a malicious VBS file - for example, 1_13_4_1882_18.03.2026.vbs - was copied into %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\.

We can search for suspicious VBS file creation events in this folder:

event_type: "filecreatewin"

AND

file_path: ("programs\\startup" AND *.vbs)

Next, the VBS file downloads a malicious HTA file from Cloudflare Workers. For example, we can look for wscript.exe communications with the corresponding domains:

event_type: "dnsreqwin"

AND

dns_rname: "workers.dev"

AND

proc_file_path: "wscript.exe"

The HTA file is downloaded into the %TEMP% directory and executed via mshta.exe, giving us another opportunity for threat hunting:

event_type: "processcreatewin"

AND

proc_file_path: "mshta.exe"

AND

cmdline: "temp"

This file collects information about the compromised system, downloads the next stage, and executes it.

See you soon!

Comments

Popular posts from this blog

343. Ransomware Gangs Abuse SystemSettingsAdminFlows to Evade Defenses

082. Huniting for Malicious Browser Extensions

391. Hunting for TeamPCP's Stealer