Keypoints
- AttackIQ published attack graphs emulating OceanLotus operations to validate security controls and incident response.
- Operation OceanStorm emulation begins with LoadLibrary/CreateRemoteThread, network port scans (21,139,389,445,3389) and brute-force attempts against FTP/SMB.
- Post-compromise discovery uses PowerShell and native utilities (Get-ComputerInfo, Get-NetDomain, netstat, dir, Get-Service, Get-Disk, uname) to collect host and network data.
- Adversary tooling includes Cobalt Strike for C2, Mimikatz for credential dumping, various loaders (Shhloader, Mortar), webshells, RPIVOT tunneler, and the multi-architecture trojan âCaja.â
- Persistence and lateral movement are achieved via service creation (sc), scheduled tasks (schtasks), WMI, token impersonation, and loader execution (MSBuild proxy execution).
- Exfiltration is performed over C2 (HTTP POST) after compressing/gathering data; AttackIQ also recommends PCAP replay to test SMB brute-force detection.
MITRE Techniques
- [T1055] Process Injection â Injects a DLL into another process and validates canary file creation (âinjects a DLL file into another running process and validates if a canary file can be created.â)
- [T1046] Network Service Discovery â Scans for hosts on ports 21, 139, 389, 445, and 3389 using nmap (âscanning hosts that are open on ports 21, 139, 389, 445, and 3389â).
- [T1110.003] Brute Force: Password Spraying â Brute-forces FTP and SMB protocols to obtain valid credentials (âbrute-forcing FTP (21) and SMB (445) protocolsâ).
- [T1082] System Information Discovery â Executes Get-ComputerInfo (PowerShell) and uname to collect host information (âexecutes the Get-ComputerInfo cmdlet via PowerShellâ / âexecutes uname -rmsâ).
- [T1049] System Network Connections Discovery â Uses Get-NetDomain and netstat to enumerate domain and active network connections (âexecutes the Get-NetDomain PowerView cmdletâ / âuses netstat to collect active connectionsâ).
- [T1083] File and Directory Discovery â Uses dir to find files of interest and outputs to temporary files (âuses the native dir command to find files of interest and output to a temporary file.â)
- [T1518] Software Discovery â Lists installed applications and versions using PowerShell (âwill list all the applications installed, as well as their versions using a PowerShell Script.â)
- [T1518.001] Security Software Discovery â Queries AntiVirusProduct class via PowerShell to detect security software (âa PowerShell script is executed to determine which software has been installed as an AntiVirusProduct class.â)
- [T1033] System Owner/User Discovery â Calls GetUserNameW API to retrieve the current thread user (âwill call the GetUserNameW Windows API call to retrieve the name of the user associated with the current thread.â)
- [T1016] System Network Configuration Discovery â Collects network config via ipconfig/arp/route/nltest and Unix equivalents (âusing standard Windows utilities like ipconfig, arp, route, and nltestâ / ânetstat, route, ifconfig, and arp âaâ).
- [T1120] Peripheral Device Discovery â Executes Get-Disk (PowerShell) to gather disk/partition info (âexecutes the PowerShell cmdlet Get-Disk to gather valuable information about the physical drives and partitionsâ).
- [T1057] Process Discovery â Uses CreateToolhelp32Snapshot and Process32FirstW/Process32NextW to enumerate running processes (âWindows API is used to receive a list of running processes by calling CreateToolhelp32Snapshot and iterating through each process objectâ).
- [T1007] System Service Discovery â Runs Get-Service via PowerShell to enumerate services (âexecutes the PowerShell cmdlet Get-Service to gather valuable information about installed services and applicationsâ).
- [T1041] Exfiltration Over C2 Channel â Sends files to attacker server using HTTP POST requests (âFiles are sent to an AttackIQ controlled server using HTTP POST requests.â)
- [T1105] Ingress Tool Transfer â Downloads payloads to memory and saves to disk to exercise delivery controls (âdownloads to memory and saves to disk in two separate scenariosâ).
- [T1543.003] Windows Service â Creates a persistent service using sc to run payloads at reboot (âUse the native sc command line tool to create a new service that will be executed at reboot.â)
- [T1053.005] Scheduled Task/Job: Scheduled Task â Creates scheduled tasks with schtasks for persistence (âcreates a new scheduled task using the schtasks utility.â)
- [T1134.001] Access Token Manipulation: Token Impersonation/Theft â Uses named pipe impersonation leveraged by Cobalt Strike for privilege escalation (âuses the named pipe impersonation method leveraged by Cobalt Strike to escalate privileges.â)
- [T1003] OS Credential Dumping â Uses obfuscated Mimikatz to dump password hashes (âuses an obfuscated version of Mimikatz to dump passwords and hashes for Windows accounts.â)
- [T1047] Windows Management Instrumentation â Moves laterally using WMI calls (âattempt to move laterally to any available asset inside the network through the use of Windows Management Instrumentation (WMI).â)
- [T1127.001] Trusted Developer Utilities Proxy Execution: MSBuild â Executes Cobalt Strike via MSBuild to run arbitrary code (âCobalt Strike will be deployed and executed via MSBuild on the compromised system.â)
- [T1071.001] Application Layer Protocol: Web Protocols â Uses HTTP for C2 and exfiltration (âemulates the HTTP requests made by OceanLotus by making an HTTP request to an AttackIQ server.â)
- [T1217] Browser Information Discovery â Enumerates browser bookmarks via PowerShell to gather user/host info (âuses a PowerShell script to enumerate browser bookmarksâ).
- [T1136.001] Create Account: Local Account â Creates local accounts using net user for persistence (âemulates the creation of a new account using net user.â)
- [T1548.002] Bypass User Account Control â Disables UAC by setting registry keys (âattempts to disable UAC by setting a registry key.â)
Indicators of Compromise
- [Malware/Tools] observed in emulations â Caja (multi-arch trojan), Cobalt Strike, Mimikatz, Shhloader, Mortar Loader, RPIVOT and 1 more item
- [Ports] targeted/scanned during initial access/recon â 21 (FTP), 139 (NetBIOS), 389 (LDAP), 445 (SMB), 3389 (RDP)
- [Protocols] used for brute force/exfiltration â FTP, SMB (brute force), HTTP POST (exfiltration)
- [URLs/Reports] source references used for emulation data â https://mp.weixin.qq.com/s?__biz=MzI2MDc2MDA4OA==⌠(QiAnXin report), https://www.attackiq.com/2024/04/16/emulating-oceanlotus/ (AttackIQ original post)
AttackIQâs emulations reproduce OceanLotus operational steps: initial code execution via LoadLibrary/CreateRemoteThread followed by local network port scanning (nmap over ports 21, 139, 389, 445, 3389) and targeted brute-force attempts against FTP and SMB to obtain credentials. Successful access leads to downloading loaders (memory and disk delivery), deploying Cobalt Strike (via injected shellcode or service creation) and establishing persistent execution through services (sc) or scheduled tasks (schtasks), plus account creation and UAC disabling via Registry for persistence.
After foothold establishment, the emulations run comprehensive environment and network discovery using PowerShell and native utilities: Get-ComputerInfo, Get-NetDomain, dir, Get-Service, Get-Disk, netstat, ipconfig/arp/route/nltest (Windows) and uname/netstat/ifconfig/arp (Linux). Collected artifactsâbrowser bookmarks, file and directory listings, system/network configs, and credentials (via obfuscated Mimikatz)âare compressed and exfiltrated over HTTP POST to C2 servers. Lateral movement is demonstrated via WMI and token impersonation techniques (named pipe methods used by Cobalt Strike).
Operation Typhoon emulations include multi-architecture loader/trojan deployment (Caja for ARM/MIPS/x86), use of webshells, tunneling tools like RPIVOT, and execution via trusted utilities (MSBuild) to bypass defenses. AttackIQ also recommends extension scenarios such as PCAP replay of SMB brute-force (222 login attempts) to validate detection/prevention of brute-force activity; priority detections to test first include process injection, creation/modification of Windows services, and exfiltration over C2 (HTTP POST) with DLP/IDS/IPS monitoring.
Read more: https://www.attackiq.com/2024/04/16/emulating-oceanlotus/