Sandworm is a highly sophisticated Russian adversary, active since at least 2009, that has been attributed to Russia’s Main Intelligence Directorate (GRU) for Special Technologies (GTsST) military Unit 74455.
Sandworm is characterized by the use of malware families specifically designed to compromise Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) systems found in entities located in the Energy, Government, and Media sectors.
Its long-standing center focus has been Ukraine, where it has carried out a large number of disruptive and destructive operations, mainly against the Energy and Telecommunication sectors, through the use of multiple wipers during the last decade.
In addition, it sustains worldwide espionage and sabotage operations demonstrating the Russian military’s far-reaching ambitions and interests in other regions.
Sandworm is believed to be associated with the Russian adversary known as APT28, which is attributed to Russia’s General Staff Main Intelligence Directorate (GRU) military Unit 26165, which was previously emulated by AttackIQ in September 2022.
AttackIQ has released a new assessment template that brings together the post-compromise Tactics, Techniques, and Procedures (TTPs) exhibited by Sandworm during its latest activities to help customers validate their security controls and their ability to defend against this disruptive and destructive threat.
Validating your security program performance against these behaviors is vital in reducing risk. By using this new assessment template in the AttackIQ Security Optimization Platform, security teams will be able to:
- Evaluate security control performance against a highly disruptive and destructive threat.
- Assess your security posture against a threat interested in Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems.
- Continuously validate detection and prevention pipelines against a threat that sustains worldwide espionage and sabotage operations.
Sandworm – 2023-11 – Post-Compromise Tactics, Techniques and Procedures (TTPs)
Since its appearance in 2009, Sandworm has conducted a large number of espionage, sabotage, and destruction operations against multiple targets around the world.
Beginning in 2014, it has conducted multiple sabotage attacks against Ukraine’s energy sector through the use of specialized malware that primarily targeted Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems.
In 2017, Sandworm was responsible for the mass distribution of the NotPetya ransomware, which affected multiple entities and organizations around the world causing widespread disruption and financial losses.
Several of these activities were supported by the Russian adversary known as APT28, which has been attributed to Russia’s General Staff Main Intelligence Directorate (GRU) military Unit 26165.
This assessment template emulates all those Post-Compromise Tactics, Techniques, and Procedures (TTP) exhibited by Sandworm during its most recent activities.
1. Execution
Consists of techniques that result in adversary-controlled code running on a local or remote system. Techniques that run malicious code are often paired with techniques from all other tactics to achieve broader goals, such as exploring a network or stealing data.
System Binary Proxy Execution: Rundll32 (T1218.011): RunDll32
is a native system utility that can be used to execute DLL files and call a specific export inside the file. This scenario executes RunDll32
with an AttackIQ DLL and calls an export to mimic previously reported malicious activity.
Command and Scripting Interpreter: Visual Basic (T1059.005): This scenario will attempt to execute a Visual Basic Script (VBS) via cscript.exe
.
2. Persistence
Techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access.
Scheduled Task/Job: Scheduled Task (T1053.005): This scenario creates a new scheduled task using the schtasks
utility with the name qAWZe
that was observed being used by Sandworm.
3. Defense Evasion
Consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts.
Masquerading (T1036): This scenario will attempt to modify a file type extension to an alternate file extension once it has landed on the target asset using the move
utility.
4. Discovery
Techniques that adversaries use to discover information related to the compromised environment.
System Network Connections Discovery (T1049): The native Windows command line tool netstat
is used to collect active connections and any listening services running on the host.
System Network Configuration Discovery (T1016): The network configuration of the asset is collected using standard Windows utilities like ipconfig
, arp
, route
, and nltest
.
File and Directory Discovery (T1083): This scenario uses the native dir
command to find files of interest and output to a temporary file.
5. Credential Access
Techniques used by adversaries to harvest credentials available on the compromised system.
OS Credential Dumping: LSASS Memory (T1003.001): Uses rundll32.exe
with comsvcs.dll
to call the MiniDump
export that will dump the LSASS
process memory to disk. This process contains a variety of credential materials and can passed to additional dumping tools to extract credentials.
6. Command and Control
Techniques that adversaries may use to communicate with systems under their control within a victim network.
Ingress Tool Transfer (T1105): This scenario downloads to memory and saves to disk in two separate scenarios to test network and endpoint controls and their ability to prevent the delivery of known malicious samples.
7. Impact
Consists of techniques that adversaries use to disrupt availability or compromise integrity by manipulating business and operational processes.
Inhibit System Recovery (T1490): This scenario executes the vssadmin.exe
utility to delete a recent Volume Shadow Copy created by the assessment template.
Opportunities to Expand Emulation Capabilities
In addition to the released assessment template, AttackIQ recommends the following scenario to extend the emulation of the capabilities exhibited by Sandworm.
Dump Active Directory Database using ntdsutil.exe: This scenario will attempt to execute the ntdsutil.exe
utility to dump the NTDS.dit
file along with the SYSTEM and SECURITY registry hives.
Detection and Mitigation Opportunities
Given the vast number of techniques used by these adversaries, it can be difficult to know which to prioritize for prevention and detection assessment. AttackIQ recommends first focusing on the following techniques emulated in our scenarios before moving on to the remaining techniques.
1. System Binary Proxy Execution: Rundll32 (T1218.011):
Adversaries may use DLL files for many of their malware payloads and leverage a native Windows utility to execute them. The primary native method for executing these files is to call the RunDll32
tool and pass along the path and export function to be executed.
1a. Detection
While this tool is commonly used by legitimate applications, there are behaviors related to their execution that can stand out in your process logs. Searching for files that are being executed from temporary directories, that don’t have the standard .dll file extension, or call strange looking export names can stand out from regular user behavior.
Process Name == (rundll32.exe)
Command Line CONTAINS (‘TEMP’ OR ‘.png’ OR ‘Roaming’ OR ‘%APPDATA%’)
Current Directory CONTAINS (‘D:’ OR ‘E:’)
1b. Mitigation
MITRE ATT&CK recommends the following mitigation recommendation:
2. Scheduled Task/Job: Scheduled Task (T1053.005):
Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The schtasks utility can be run directly from the command line, or the Task Scheduler can be opened through the GUI within the Administrator Tools section of the Control Panel.
2a. Detection
With an EDR or SIEM Platform, you can detect the following commands being issued to schedule a malicious task.
Process Name = (“cmd.exe” OR “Powershell.exe”)
Command Line CONTAINS (“schtasks” AND “/CREATE” AND (“cmd” OR “powershell”)
2b. Mitigation
MITRE ATT&CK has the following mitigation recommendations for Scheduled Task
3. OS Credential Dumping: LSASS Memory (T1003.001):
Adversaries may attempt to extract user and credential information from the Local Security Authority Subsystem Service (LSASS) process.
3a. Detection
Search for executions of comsvcs that attempt to access the LSASS process.
Process Name == (comsvcs)
Command Line CONTAINS (‘lsass’)
3b. Mitigation
MITRE ATT&CK recommends the following mitigation recommendations:
Wrap-up
In summary, this assessment template will evaluate security and incident response processes and support the improvement of your security control posture against this disruptive and destructive threat. With data generated from continuous testing and use of this assessment template, you can focus your teams on achieving key security outcomes, adjust your security controls, and work to elevate your total security program effectiveness against a well-known and dangerous threat.
AttackIQ stands at the ready to help security teams implement this assessment template and other aspects of the AttackIQ Security Optimization Platform, including through our fully managed service, AttackIQ Ready!, and our co-managed security service, AttackIQ Enterprise.
Source: Original Post
“An interesting youtube video that may be related to the article above”