Threat actors targeted Italian organizations in October 2022 using Excel maldocs to deploy IcedID, then pivoted to deploy Nokoyawa ransomware across the domain. The operation involved Cobalt Strike beacons, LSASS dumping, lateral movement via WMI/SMB/PSExec, and extensive network discovery, culminating in a ransom quote of about $200,000 USD with no payment made.
#IcedID #Nokoyawa #CobaltStrike #PsExec
#IcedID #Nokoyawa #CobaltStrike #PsExec
Keypoints
- Q4 2022 incident targeted Italian organizations with Excel maldocs delivering IcedID.
- Excel macro download of IcedID DLL and execution via a renamed rundll32 binary.
- Persistence via a scheduled task; IcedID then loaded Cobalt Strike beacons on the beachhead.
- Privilege escalation and LSASS memory dumping followed by lateral movement to a Domain Controller using WMI.
- Extensive discovery and lateral movement across the network using AdFind/AdGet, NSLOOKUP, RDP, SMB, WinRM, and WMI.
- Nokoyawa ransomware deployed with PsExec and batch scripts; domain-wide encryption; ransom ~$200k USD; no payment observed.
MITRE Techniques
- [T1105] Ingress Tool Transfer – The Excel macro downloaded and wrote the first stage IcedID payload to disk from a hard-coded domain. “The macro code was responsible for downloading and writing an IcedID DLL payload to disk.”
- [T1059.001] PowerShell – The first beacon was executed via PowerShell, which in turn was executed initially by a command shell…
- [T1059.003] Windows Command Shell – The PowerShell beacon was initiated via a command shell started by IcedID at the same time a DLL beacon was also executed.
- [T1218.011] Rundll32 – Post-execution, rundll32.exe (renamed) was used to invoke the IcedID payload. “The macro then used a renamed rundll32 binary to execute the malicious DLL.”
- [T1053.005] Scheduled Task – IcedID established persistence via a scheduled task: “A scheduled task was created that contained instructions on executing the IcedID DLL…”
- [T1047] WMI – WMI was used to execute remote DLL beacons and later remote commands: “WMI was also used when executing remote DLL beacons”
- [T1021.001] Remote Services: RDP – Lateral movement via RDP: “The threat actors connected to a compromised server via RDP.”
- [T1021.006] Remote Services: WinRM – Lateral movement using WinRM: “Some of the threat actors’ lateral activity was executed using WinRM…”
- [T1021.002] Remote Services: SMB/Windows Admin Shares – Lateral movement across the network using SMB: “The threat actors relied on SMB to move their tools throughout the network…”
- [T1055] Process Injection – Code injected into legitimate processes via CreateRemoteThread: “The adversary was seen injecting code into legitimate processes via CreateRemoteThread.”
- [T1036.003] Masquerading: Rename System Utilities – Renaming system utilities (e.g., calc.exe) to evade detection: “Renamed Windows Utility” and “calc.exe (renamed rundll32.exe)…”
- [T1003.001] OS Credential Dumping: LSASS Memory – Dumping LSASS memory during traversal: “LSASS memory dump using the beacons.”
- [T1071.001] Web Protocols – C2 over HTTP(S): “The beacons talk over HTTP” and related web traffic patterns.
- [T1560.001] Archive Collected Data – Archiving using 7-Zip during discovery/exfiltration: “7-Zip to archive data collected from Active Directory using AdFind.”
- [T1041] Exfiltration Over C2 Channel – No overt exfiltration observed; data exfiltration observed over existing C2 channels: “No overt exfiltration was observed so we assess that this occurred over existing command and control channels.”
Indicators of Compromise
- [Domain] Initial C2 and payload domains – kicknocisd[.]com, curabiebarristie[.]com, stayersa[.]art, guaracheza[.]pics, belliecow[.]wiki, aicsoftware[.]com, iconnectgs[.]com
- [IP] Command and control and staging IPs – 159.65.169.200, 198.244.180.66, 45.66.248.119, 137.74.104.108, 50.3.132.232
- [File name] Dropped/renamed binaries and artifacts – exdudipo.dll, license.dat, k.exe, mstdc.exe, p.bat, 1.bat, 7.exe, 1.dll
- [Domain/IP] Additional IcedID and C2 connections – kicknocisd[.]com to 159.65.169.200; curabiebarristie[.]com to 198.244.180.66
Read more: https://thedfirreport.com/2023/05/22/icedid-macro-ends-in-nokoyawa-ransomware/