Keypoints
- AttackIQ released an assessment template that emulates Phobos ransomware behaviors mapped to ATT&CK techniques to validate security controls.
- Phobos is a RaaS family related to Dharma/Crysis and commonly used with commodity tools such as SmokeLoader, Cobalt Strike, and BloodHound.
- Emulated techniques include DLL sideâloading, mshta usage, registry Run keys and Startup LNK persistence, disabling firewall/UAC, clearing event logs, and deleting VSS snapshots.
- Credential access and escalation are emulated using Mimikatz and access token manipulation, plus IFEO injection for privilege escalation.
- Data collection, archiving (7zip), exfiltration via FTP, and file encryption routines (including inâplace encryption and shadow copy deletion) are included to emulate full attack impact.
- AttackIQ provides detection cues (e.g., monitor DLL loads, suspicious comsvcs.exe access to lsass, vssadmin delete shadows command lines) and maps mitigations to MITRE recommendations.
MITRE Techniques
- [T1574.002] DLL SideâLoading â Bundles a DLL with a susceptible Windows executable to execute actor code (âBundles a DLL with a Windows executable that is susceptible to DLL SideâLoading to execute actor code.â)
- [T1218.010] Mshta (System Binary Proxy Execution) â Abuses mshta.exe to download and execute remote VBScript payloads (âMshta.exe is a native Windows utility that threat actors can abuse to download remote payloads that include VBScript code.â)
- [T1547.001] Registry Run Keys / Startup Folder â Persists by setting HKLM Run keys and creating LNK files in the Startup folder to execute at logon (âsets the HKLMSoftwareMicrosoftWindowsCurrentVersionRun registry keysâ / âcreates a LNK file in this directory that would execute at the next Logon for all users.â)
- [T1562.004] Disable or Modify System Firewall â Temporarily disables Windows Firewall via netsh advfirewall to allow network connections (âtemporarily disables the Windows Firewall using the netsh advfirewall utility.â)
- [T1548.002] Bypass User Account Control â Attempts to disable UAC by modifying a registry key (âThe malware attempts to disable UAC by setting a registry key.â)
- [T1070.001] Clear Windows Event Logs â Uses wevtutil.exe to clear event logs to remove indicators (âwill use the wevtutil.exe binary to clear event logs from the system.â)
- [T1134] Access Token Manipulation â Enumerates and impersonates active access tokens to escalate privileges (âlists active access tokens that could be impersonated by another process.â)
- [T1546.012] Image File Execution Options Injection â Sets IFEO registry entries to achieve persistence or escalation (âsets Image File Execution Options to the registry of a specific process.â)
- [T1003 / T1003.001] OS Credential Dumping (LSASS memory) â Uses Mimikatz to dump passwords and hashes from LSASS memory (âuses the Mimikatz credential access tool to dump passwords and hashes for Windows accounts.â)
- [T1105] Ingress Tool Transfer â Downloads payloads to memory and disk to test delivery controls (âdownloads to memory and saves to disk in independent scenarios to test network and endpoint controls.â)
- [T1082] System Information Discovery â Calls RtlGetVersion and NetWkstaGetInfo to enumerate system info (âcall RtlGetVersion(Ntdll), and NetWkstaGetInfo(Netapi32) Windows API calls to enumerate system information.â)
- [T1057] Process Discovery â Uses CreateToolhelp32Snapshot and Process32* APIs to list running processes (âreceive a list of running processes by calling CreateToolhelp32Snapshot and iterating through each process object with Process32FirstW and Process32NextW.â)
- [T1083] File and Directory Discovery â Uses dir command to find files of interest and output to a temp file (âuses the native dir command to find files of interest and output to a temporary file.â)
- [T1560.001] Archive via Utility â Compresses collected files into .7z archives with 7zip (âcompresses all the specified input files ⌠to a .7z archive by executing the 7zip binary file.â)
- [T1048] Exfiltration Over Alternative Protocols â Emulates exfiltration via FTP to an attacker server (âstart an FTP connection against an AttackIQ server to emulate the exfiltration of sensitive informationâ).
- [T1490] Inhibit System Recovery â Runs vssadmin.exe to delete Volume Shadow Copies to prevent restoration (âRuns vssadmin.exe to delete a recent Volume Shadow Copy created by the attack graph.â)
- [T1486] Data Encrypted for Impact â Performs inâplace file encryption matching Phobos encryption routines (âperforms the file encryption routines used by common ransomware families ⌠Files matching an extension list are identified and encrypted in placeâ).
Indicators of Compromise
- [Process/Binary] Common Windows utilities abused â mshta.exe (used to download VBScript payloads), vssadmin.exe (used to delete Volume Shadow Copies), and comsvcs.exe (observed accessing LSASS), wevtutil.exe (clearing event logs)
- [Tools/Frameworks] Postâexploitation and loaders â Mimikatz (LSASS dumps), Cobalt Strike (beaconing/command and control), SmokeLoader (initial loader), BloodHound (AD enumeration)
- [Files/Artifacts] Persistence and packaging artifacts â LNK file in Startup folder (startup persistence), HKLMSoftwareMicrosoftWindowsCurrentVersionRun registry keys (autostart), .7z archives produced by 7zip for collected data
- [Commands/Commandâline patterns] Detection strings to watch â âvssadminâ with âDelete Shadowsâ in cmd.exe/powershell.exe command lines; Process Name == comsvcs and Command Line CONTAINS âlsassâ for credential dumping attempts
- [URLs/Domains] Reference/analysis sources in the article â https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060a (CISA advisory), https://www.attackiq.com/2024/03/01/response-to-cisa-advisory-aa24-060a/ (AttackIQ assessment)
AttackIQâs technical assessment template focuses on reproducing Phobos operational steps so teams can validate controls across the full attack lifecycle. The emulation chain begins with execution techniques such as DLL sideâloading and mshtaâbased payload retrieval, then establishes persistence via Run registry keys and Startup LNK files. Defenseâevasion actions include disabling the Windows Firewall (netsh advfirewall), attempting to disable UAC via registry modifications, and clearing event logs with wevtutil to remove forensic traces.
Postâcompromise behaviors in the template mirror real Phobos activity: discovery using Windows APIs and dir commands, process enumeration via CreateToolhelp32Snapshot/Process32* APIs, credential access through LSASS memory dumps with Mimikatz and access token manipulation, and privilege escalation using IFEO injection. The assessment also covers ingress/tool transfer (downloading payloads to memory/disk), collection/archiving with 7zip, exfiltration over FTP, deletion of Volume Shadow Copies via vssadmin, and inâplace file encryption routines similar to Phobos.
Detection guidance emphasizes monitoring for anomalous use of common binaries and command lines (e.g., mshta.exe downloading scripts, comsvcs.exe accessing lsass, cmd/powershell invoking vssadmin Delete Shadows), tracking DLL/PE creation/loading into processes to detect sideâloading, and alerting on clearing of event logs. Mitigations mapped to ATT&CK include enforcing application updates and hardening (M1051/M1013), restricting access to LSASS and privileged processes, enabling backup and recovery protections (M1053), and following CISA patching/detection recommendations to reduce risk exposure.
Read more: https://www.attackiq.com/2024/03/01/response-to-cisa-advisory-aa24-060a/