Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit b097569

Browse files
committed
added trickbot related pages
1 parent 97f730e commit b097569

File tree

2 files changed

+94
-0
lines changed

2 files changed

+94
-0
lines changed
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
# Detect rundll.exe being used for reconnaissance and command-and-control
2+
3+
This query was originally published in the threat analytics report, *Trickbot: Pervasive & underestimated*.
4+
5+
[Trickbot](https://attack.mitre.org/software/S0266/) is a very prevalent piece of malware with an array of malicious capabilities. Originally designed to steal banking credentials, it has since evolved into a modular trojan that can deploy other malware, disable security software, and perform command and control.
6+
7+
Trickbot operators are known to use the legitimate Windows process *rundll.exe* to perform malicious activities, such as reconnaissance. Once a target is infected, the operator will drop a batch file that runs several commands and connects to a command-and-control (C2) server for further action.
8+
9+
The following query detects suspicious rundll.exe activity associated with Trickbot campaigns.
10+
11+
See [Office applications launching wscript.exe to run JScript](../Execution/office-apps-launching-wscipt.md) for another query related to Trickbot activity.
12+
13+
## Query
14+
15+
```Kusto
16+
DeviceNetworkEvents
17+
| where InitiatingProcessFileName =~ "rundll32.exe"
18+
// Empty command line
19+
| where InitiatingProcessCommandLine has "rundll32.exe" and InitiatingProcessCommandLine !contains " "
20+
and InitiatingProcessCommandLine != ""
21+
| summarize DestinationIPCount = dcount(RemoteIP), make_set(RemoteIP), make_set(RemoteUrl),
22+
make_set(RemotePort) by InitiatingProcessCommandLine, DeviceId, bin(Timestamp, 5m)
23+
```
24+
25+
## Category
26+
27+
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
28+
29+
| Technique, tactic, or state | Covered? (v=yes) | Notes |
30+
|-|-|-|
31+
| Initial access | | |
32+
| Execution | | |
33+
| Persistence | | |
34+
| Privilege escalation | | |
35+
| Defense evasion | | |
36+
| Credential Access | | |
37+
| Discovery | v | |
38+
| Lateral movement | | |
39+
| Collection | v | |
40+
| Command and control | v | |
41+
| Exfiltration | | |
42+
| Impact | | |
43+
| Vulnerability | | |
44+
| Misconfiguration | | |
45+
| Malware, component | | |
46+
47+
## Contributor info
48+
49+
**Contributor:** Microsoft Threat Protection team
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
# Office applications launching wscript.exe to run JScript
2+
3+
This query was originally published in the threat analytics report, *Trickbot: Pervasive & underestimated*.
4+
5+
[Trickbot](https://attack.mitre.org/software/S0266/) is a very prevalent piece of malware with an array of malicious capabilities. Originally designed to steal banking credentials, it has since evolved into a modular trojan that can deploy other malware, disable security software, and perform command and control.
6+
7+
Trickbot is frequently spread through email. An attacker will send a target a message with an attachment containing a malicious macro. If the target enables the macro, it will write a JScript Encoded (JSE) file to disk (JScript is a Microsoft dialect of ECMAScript). The JSE file will then be launched using *[wscript.exe](https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wscript)* to perform a variety of malicious tasks, particularly reconnaissance.
8+
9+
The following query detects when Office applications have launched wscript.exe to run a JSE file.
10+
11+
See [Detect rundll.exe being used for reconnaissance and command-and-control](../Command%20and%20Control/recon-with-rundll.md) for another query related to Trickbot activity.
12+
13+
## Query
14+
15+
```Kusto
16+
DeviceProcessEvents
17+
| where InitiatingProcessFileName in~('winword.exe', 'excel.exe', 'outlook.exe')
18+
| where FileName =~ "wscript.exe" and ProcessCommandLine has ".jse"
19+
```
20+
21+
## Category
22+
23+
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
24+
25+
| Technique, tactic, or state | Covered? (v=yes) | Notes |
26+
|-|-|-|
27+
| Initial access | | |
28+
| Execution | | |
29+
| Persistence | | |
30+
| Privilege escalation | | |
31+
| Defense evasion | | |
32+
| Credential Access | | |
33+
| Discovery | | |
34+
| Lateral movement | v | |
35+
| Collection | v | |
36+
| Command and control | v | |
37+
| Exfiltration | | |
38+
| Impact | | |
39+
| Vulnerability | | |
40+
| Misconfiguration | | |
41+
| Malware, component | | |
42+
43+
## Contributor info
44+
45+
**Contributor:** Microsoft Threat Protection team

0 commit comments

Comments
 (0)