π Microsoft.Workflow.Compiler sample with low VT detection!
1β£C:\ProgramData\ccm_deploy.xml π§
MD5 fb98cddfa2e13334989d27d1b5b7cdda
VT (0/56): virustotal.com/gui/file/8b6d8β¦
2β£Loads C:\ProgramData\package.xml
MD5 a916ca1d57d9c3b2627907ab68a264fe
VT (1/58): virustotal.com/gui/file/9a8b5β¦
[1/4]
I uploaded both to @virusbay_io: beta.virusbay.io/sample/browse/β¦
and the extracted payload to @anyrun_app: app.any.run/tasks/35c09520β¦
STDOUT:
Injection Target Process = %ProgramFiles%\Internet Explorer\iexplore.exe
PPID Spoof Parent = True
PPID Spoof Process = explorer
Returned true
[2/4]
@virusbay_io @anyrun_app More info on @mattifestation's method:
1β£ My favorite implementation uploaded publicly is this Excel file (probably authored by @egyed_laszlo):
2β£ The first workflow VT sample uploaded was ~1 year ago:
^plus background & links
[3/4]
VT detections aren't representative of security vendors' full detection posture.
But, because this had poor coverage (and only @cyb3rops had helpful context on the XOML's mem process write), I'm sharing my Aug 2018 #DailyWorkflow rules if they help: gist.github.com/itsreallynick/β¦
[4/4]
@cyb3rops π BONUS TWEET: #threatintel care of #AdvancedPractices π¦
teammate @a_tweeter_user
NOTE: @anyrun_app you might be interested in improving execution optics for #TIBERIUS, linked ππ½ in the 2nd tweet π
@cyb3rops @a_tweeter_user @anyrun_app ππ DOUBLE BONUS: here are resume-themed phishing documents dating back to February that load shellcode the same way - plus links to the original tweet shares:
Good example of the #threatintel you can extract from Twitter, if you know how to use it.
#blueteam take note:
β’ package.xml, pushed via ccm_deploy.xml π€ #ConfigMgr is a Workflow.Compiler payload containing a Base64-encoded executable
β’ the EXE is padded with a single null byte so regular b64(EXE file magic) doesn't work
β’ the solution? ...
...is for #detection engineers to account for all three possible Base64 encodings (with 0-2 pad bytes)
Python & PowerShell tools from @DavidPany @JohnLaTwC @Lee_Holmes @DissectMalware:
Try with default MS-DOS stub
"This program cannot be run in DOS mode"
@DavidPany @JohnLaTwC @Lee_Holmes @DissectMalware Here's a fresh one from the same intrusion operator:
πΎ"0X1F588277.doc"
#β£957e8d6aa08af8c5d82cc3f5f23d86a5
πvirustotal.com/gui/file/750d1β¦
πΏ#EGGHUNT & #BEACON backdoors
π35.236.203.52/match
π¨βπ»#UNC1739 (π₯ team)
^very worth your time to chase, they do cool stuff π€©
I made a logo ππ
@DavidPany @JohnLaTwC @Lee_Holmes @DissectMalware Much newer #UNC1739 tradecraft: praetorian.com/blog/extendingβ¦ π
Neat stuff - excited to see it in-the-wild!
I wonder how #FLOSS does against this new string obfuscation github.com/fireeye/flare-β¦
Putting this on my fridge https://t.co/UTRCfZzQia
Share this Scrolly Tale with your friends.
A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.
