The Gentlemen ransomware group ran a highly tailored campaign using legitimate driver abuse, custom anti-AV tools, Group Policy manipulation, privileged account compromise, and encrypted exfiltration to bypass enterprise defenses and deploy ransomware domain-wide. Victims spanned critical sectors in at least 17 countries, with specific tooling and IOCs including ThrottleBlood.sys, PowerRun.exe, AnyDesk, WinSCP, README-GENTLEMEN.txt, and .7mtzhh. #ThrottleBlood.sys #PowerRun.exe
Keypoints
- The Gentlemen used legitimate driver abuse (ThrottleBlood.sys) and custom tools (All.exe, Allpatch2.exe, KILLAV variants) to disable security products and achieve kernel-level process termination.
- Initial access likely involved exposed internet-facing services (compromised FortiGate admin) or valid credentials, followed by network reconnaissance with Advanced IP Scanner and Nmap.
- Attackers performed extensive Active Directory discovery and mass account enumeration via batch scripts and encoded PowerShell, preparing for domain-wide impact and lateral movement.
- Group Policy manipulation and registry modifications were used to enable RDP, weaken authentication, and deploy domain-wide payloads via NETLOGON share.
- Persistence and C2 relied on AnyDesk and modified registry settings, while exfiltration used encrypted channels via WinSCP and WebDAV connections for staged data.
- The ransomware appended the .7mtzhh extension, dropped README-GENTLEMEN.txt, required an 8-byte âpassword parameter, and executed broad service/process termination and cleanup to hinder recovery.
- Recommended defenses include Zero Trust controls, MFA for admin interfaces, driver signature enforcement, monitoring for mass AD queries and NETLOGON changes, and endpoint hardening (tamper protection, application control).
MITRE Techniques
- [T1190] Exploit Public-Facing Application â Compromised FortiGate server and admin account via Nmap and exposed FortiGate (âCompromised FortiGate server and admin account via Nmapâ).
- [T1078.002] Valid Accounts: Domain Accounts â Use of compromised domain accounts for domain-wide actions (âCompromised domain accountsâ).
- [T1046] Network Service Discovery â Nmap executed for service discovery (âNmap executed for service discoveryâ).
- [T1018] Remote System Discovery â Advanced IP Scanner used for network mapping (âAdvanced IP Scanner used for network mappingâ).
- [T1087.002] Account Discovery: Domain Account â Batch script 1.bat queried numerous domain user accounts (âBatch script querying multiple domain accountsâ).
- [T1069.002] Permission Groups Discovery: Domain Groups â Enumeration of domain groups and local admin/virtualization groups (âEnumeration of domain groupsâ).
- [T1482] Domain Trust Discovery â PowerShell used to identify the PDC emulator (â(Get-ADDomain).PDCEmulatorâ and âGet-ADDomain | Select-Object PDCEmulatorâ).
- [T1059.003] Command and Scripting Interpreter: Windows Command Shell â Use of cmd.exe to run commands and scripts (âUsed cmd.exe to execute different commandsâ).
- [T1059.001] Command and Scripting Interpreter: PowerShell â Encoded and direct PowerShell used to deploy anti-AV and ransomware (âPowerShell commands used to deploy anti-av and ransomwareâ).
- [T1562.001] Impair Defenses: Disable or Modify Tools â Stopped security services using anti-AV tools and custom utilities (âStopped security services using Anti-AV toolsâ).
- [T1014] Rootkit â Deployed a vulnerable signed driver for kernel-level process termination (âDeployed vulnerable driver for process terminationâ).
- [T1112] Modify Registry â Registry changes to weaken authentication, enable RDP, and persist (âRegistry changes to weaken authenticationâ).
- [T1562.004] Impair Defenses: Disable or Modify System Firewall â Modified firewall settings to enable RDP remote access (âModified firewall settings for RDP accessâ).
- [T1027] Obfuscated Files or Information â Execution of Base64-encoded PowerShell commands (âExecution of base64 encoded PowerShell commandsâ).
- [T1484.001] Domain or Tenant Policy Modification: Group Policy Modification â Use of GPMC/GPME and encoded PowerShell to deploy domain policies (âGPO manipulation for domain-wide impactâ).
- [T1219] Remote Access Software â Installed and used AnyDesk for persistent remote access and C2 (âInstalled AnyDesk for remote access.â).
- [T1021.002] Remote Services: SMB/Windows Admin Shares â Used PsExec and NETLOGON share for lateral movement and ransomware deployment (âUsed PSExec for lateral movementâ and âRansomware deployed via NETLOGON shareâ).
- [T1021.001] Remote Services: Remote Desktop Protocol â Enabled RDP via registry modification (âEnabled RDP via registry modificationâ).
- [T1021.004] Remote Services: SSH â Possible use of PuTTY for SSH-based lateral movement (âUsed PuTTY for SSH movementâ).
- [T1074.001] Data Staged: Local Data Staging â Data staged in C:ProgramDatadata during collection (âData staged in C:ProgramDatadataâ).
- [T1039] Data from Network Shared Drive â WebDAV connections observed to internal shares (âWebDAV connections to internal sharesâ).
- [T1071.001] Application Layer Protocol: Web Protocols â WebDAV used for C2 and data movement (âWebDAV used for C&C server and data movementâ).
- [T1048.001] Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol â Data exfiltrated using WinSCP (âData exfiltrated using WinSCPâ).
- [T1486] Data Encrypted for Impact â Ransomware encryption deployed across domain with .7mtzhh extension and README-GENTLEMEN.txt (âRansomware deployed via NETLOGON shareâ).
- [T1489] Service Stop â Termination of many backup, database, and security services to maximize impact (âTermination of security servicesâ).
Indicators of Compromise
- [File names] Tools and artifacts observed â All.exe, Allpatch2.exe, PowerRun.exe, WinSCP.exe, README-GENTLEMEN.txt.
- [File extensions] Ransomware extension â .7mtzhh appended to encrypted files.
- [Driver] Vulnerable signed driver used for kernel abuse â ThrottleBlood.sys.
- [SHA1 hashes] Ransomware and tools â c12c4d58541cc4f75ae19b65295a52c559570054 (Ransom.Win64.GENTLEMAN.THHAIBE), c0979ec20b87084317d1bfa50405f7149c3b5c5f (Trojan.Win64.KILLAV.THHBHBE), and df249727c12741ca176d5f1ccba3ce188a546d28 (Patched KILLAV); plus e00293ce0eb534874efd615ae590cf6aa3858ba4 (PowerRun detection).
- [Registry changes/commands] Persistence and weakening controls â examples include reg add HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlLsaMSV1_0 /v RestrictSendingNTLMTraffic /t REG_DWORD /d 0 /f, and Set-MpPreference -DisableRealtimeMonitoring $true -Force.
- [Tools/software] Legitimate utilities abused â AnyDesk (remote access), PsExec (lateral movement), Nmap and Advanced IP Scanner (reconnaissance), PuTTY (possible SSH movement).
Read more: https://www.trendmicro.com/en_us/research/25/i/unmasking-the-gentlemen-ransomware.html