Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit 1841446

Browse files
committed
added detect-cyzfc-activity.md
1 parent 055c1f0 commit 1841446

File tree

1 file changed

+68
-0
lines changed

1 file changed

+68
-0
lines changed

Campaigns/detect-cyzfc-activity.md

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
# Detect activity associated with malicious DLL, cyzfc.dat
2+
3+
These queries was originally published in the threat analytics report, *Attacks on gov't, think tanks, NGOs*.
4+
5+
As described further in *[Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers](https://www.microsoft.com/security/blog/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/)*, there was a very large spear-phishing campaign launched in November 2019.
6+
7+
The attackers would gain access to a target by having the user click on a link to a compromised website and download a .zip archive.
8+
9+
Once established on a target's device, the attackers used a malicious DLL named *cyzfc.dat* to execute additional payloads. They would call a function in the malicious DLL via the legitimate Windows process, [rundll32.exe](https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/rundll32), to connect directly to their command-and-control (C2) servers.
10+
11+
The following queries detect activity associated with the malicious DLL, *cyzfc.dat.*, used in this campaign.
12+
13+
## Query
14+
15+
```Kusto
16+
​// Query 1: Events involving the DLL container
17+
let fileHash = "9858d5cb2a6614be3c48e33911bf9f7978b441bf";
18+
find in (FileCreationEvents, ProcessCreationEvents, MiscEvents,
19+
RegistryEvents, NetworkCommunicationEvents, ImageLoadEvents)
20+
where SHA1 == fileHash or InitiatingProcessSHA1 == fileHash
21+
| where EventTime > ago(10d)
22+
// Query 2: C2 connection
23+
NetworkCommunicationEvents
24+
| where EventTime > ago(10d)
25+
| where RemoteUrl == "pandorasong.com"
26+
// Query 3: Malicious PowerShell
27+
ProcessCreationEvents
28+
| where EventTime > ago(10d)
29+
| where ProcessCommandLine contains
30+
"-noni -ep bypass $zk='JHB0Z3Q9MHgwMDA1ZTJiZTskdmNxPTB4MDAwNjIzYjY7JHRiPSJ"
31+
// Query 4: Malicious domain in default browser commandline
32+
ProcessCreationEvents
33+
| where EventTime > ago(10d)
34+
| where ProcessCommandLine contains
35+
"https://www.jmj.com/personal/nauerthn_state_gov"
36+
// Query 5: Events involving the ZIP
37+
let fileHash = "cd92f19d3ad4ec50f6d19652af010fe07dca55e1";
38+
find in (FileCreationEvents, ProcessCreationEvents, MiscEvents,
39+
RegistryEvents, NetworkCommunicationEvents, ImageLoadEvents)
40+
where SHA1 == fileHash or InitiatingProcessSHA1 == fileHash
41+
| where EventTime > ago(10d
42+
```
43+
44+
## Category
45+
46+
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
47+
48+
| Technique, tactic, or state | Covered? (v=yes) | Notes |
49+
|-|-|-|
50+
| Initial access | | |
51+
| Execution | v | |
52+
| Persistence | | |
53+
| Privilege escalation | | |
54+
| Defense evasion | | |
55+
| Credential Access | | |
56+
| Discovery | | |
57+
| Lateral movement | | |
58+
| Collection | | |
59+
| Command and control | | |
60+
| Exfiltration | | |
61+
| Impact | | |
62+
| Vulnerability | | |
63+
| Misconfiguration | | |
64+
| Malware, component | | |
65+
66+
## Contributor info
67+
68+
**Contributor:** Microsoft Threat Protection team

0 commit comments

Comments
 (0)