“##16 valid accounts - t1078 visual basic - t1059. 005 windows command shell - t1059. 003 windows service - t1543. 003 internal case # tb33490 # pr36501”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
99%
“files. the transfer occurred over port 443, but the traffic was confirmed to be sftp. on the fifth day the threat actor returned via splashtop installed on one of the backup servers. from there they performed another network sweep using netscan. they then used rdp to connect to s…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003.001LSASS Memory
99%
“do not indicate a full sync of all ad accounts, but likely the threat actor was checking to see if their privileged account existed across all domains and share the same password. with a command similar to : lsadump : : dcsync / domain : child. domain. example / user : domainadmi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003.001LSASS Memory
99%
“##2fe167 - e48d - 4fd6 - 9974 - 11e5b9a5d6d1 : lsass access from non system account d9047477 - 0359 - 48c9 - b8c7 - 792cedcdc9c4 : pua - nircmd execution as local system 4e2ed651 - 1906 - 4a59 - a78a - 18220fca1b22 : pua - nircmd execution e37db05d - d1f9 - 49c8 - b464 - cee1a4b1…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
98%
“calculated to be : 2. 03 gb this volume aligns with the targeted exfiltration of data over a 40 - minute time frame. while no sysmon file create events were observed for the rclone configuration file, it was able be seen from the mft and ntfs artifacts that can be extracted from …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003.001LSASS Memory
98%
“4fd6 - 9974 - 11e5b9a5d6d1 : lsass access from non system account d0d2f720 - d14f - 448d - 8242 - 51ff396a334e : hacktool - generic process access 1c67a717 - 32ba - 409b - a45d - 0fb704a73a81 : system network connections discovery via net. exe private rules : suspicious ntfs syml…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
98%
“environment for initial or persistent access. direct rdp access from day one and initial access, the threat actor was observed continuously using rdp to maintain access to the compromised environment. they used it to establishing interactive sessions throughout which they could e…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003OS Credential Dumping
97%
“##tutil cl system cmd. exe / c wevtutil cl application credential access as we observe in most of our intrusions, once the threat actor gained access to the rdp - exposed beachhead host via password spraying, they leveraged well - known credential harvesting tools, specifically m…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1110.003Password Spraying
97%
“note linking the ransom to the ransomhub group was dropped. the time to ransomware ( ttr ) for this intrusion was around 118 hours over six calendar days. analysts analysis and reporting completed by @ tas _ kmanager, @ iiamaleks and uc2 initial access the threat actor ’ s first …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1110.003Password Spraying
97%
“hide your rdp : password spray leads to ransomhub deployment hide your rdp : password spray leads to ransomhub deployment key takeaways - initial access was via a password spray attack against an exposed rdp server, targeting numerous accounts over a four - hour period. - mimikat…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
97%
“any hyper - v virtual machines running on the system, delete shadow copies, and events from a few windows event channels. in addition, it leveraged built - in lateral movement capabilities to propagate to other hosts in the network through smb, the - only - local flag was used to…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1046Network Service Discovery
96%
“the - land discovery command sequence on other hosts and servers advanced ip scanner the threat actor downloaded the advanced ip scanner from the official website, this can be observed from the zeek / suricata logs, specifically with the rule “ et adware _ pup ip scanner tool upd…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1080Taint Shared Content
95%
“files. the transfer occurred over port 443, but the traffic was confirmed to be sftp. on the fifth day the threat actor returned via splashtop installed on one of the backup servers. from there they performed another network sweep using netscan. they then used rdp to connect to s…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
94%
“the intrusion the threat actor did not clear all files they dropped, but they did pay special attention to specifically return to the file servers some 20 hours after exfiltration activity to remove the rclone related files discussed in the exfiltration section. along with the ex…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
94%
“hours, the threat actor attempted logins against multiple accounts using known malicious ips ( based on osint ). several hours later they then logged in via rdp with one of the previously compromised users and ran a series of discovery commands, including various net commands to …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
93%
“and subnet associations in active directorydsa. msc – manage users, groups, computers, and organizational units ( ous ) within an active directory domain lateral movement rdp initial lateral movement within the victim network was achieved through the use of the remote desktop pro…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1485Data Destruction
91%
“the intrusion the threat actor did not clear all files they dropped, but they did pay special attention to specifically return to the file servers some 20 hours after exfiltration activity to remove the rclone related files discussed in the exfiltration section. along with the ex…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
89%
“script, rcl. bat. more details on this script will be explored on the exfiltration section. batch script rcl. bat was a batch script used to execute a rclone job. it receives further instructions on which files to exfiltrate from a file named include. txt. more details on this sc…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1219Remote Access Tools
89%
“##m installations - endpoint detection logs or memory forensics the forensic methods for extracting and interpreting this data are consistent with guidance outlined in synacktiv ’ s forensic analysis of legitimate rats, which describes how splog. txt supports attribution and beha…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078.003Local Accounts
88%
“time > 11600 [ handler ] tf1, 32 - 200, 0x00026dd0 ( 0x00002ecc ) < 1 > < redacted date > < redacted time > 11600 [ handler ] save logon user < redacted domain admin > at time < redacted date > < redacted time > < 1 > < redacted date > < redacted time > 11600 [ handler ] save log…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1080Taint Shared Content
88%
“calculated to be : 2. 03 gb this volume aligns with the targeted exfiltration of data over a 40 - minute time frame. while no sysmon file create events were observed for the rclone configuration file, it was able be seen from the mft and ntfs artifacts that can be extracted from …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1080Taint Shared Content
87%
“any hyper - v virtual machines running on the system, delete shadow copies, and events from a few windows event channels. in addition, it leveraged built - in lateral movement capabilities to propagate to other hosts in the network through smb, the - only - local flag was used to…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
86%
“##m installations - endpoint detection logs or memory forensics the forensic methods for extracting and interpreting this data are consistent with guidance outlined in synacktiv ’ s forensic analysis of legitimate rats, which describes how splog. txt supports attribution and beha…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1049System Network Connections Discovery
86%
“tools like advanced ip scanner and softperfect ’ s netscan, and microsoft management console applets. the classics, living - off - the - land commands living - off - the - land discovery command sequence in the beachhead rdp server the threat actor utilized these commands to perf…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
86%
“##74cfeb3df72daabdf10e09f161ed1ffd21271 detections network etpro info observed atera remote access application activity domain in tls sni et info splashtop domain ( splashtop. com ) in tls sni et info splashtop domain in dns lookup ( splashtop. com ) etpro info observed splashtop…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1070.004File Deletion
81%
“the intrusion the threat actor did not clear all files they dropped, but they did pay special attention to specifically return to the file servers some 20 hours after exfiltration activity to remove the rclone related files discussed in the exfiltration section. along with the ex…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
81%
“tools execution : 8bf0aaee - e44e - 4455 - 81d1 - d46fb42ae889 use of rclone to exfiltrate data over an ssh channel : 7019b8b4 - d23e - 4d35 - b5fa - 192ffb8cb3ee yara binaryalert _ hacktool _ windows _ mimikatz _ copywrite binaryalert _ hacktool _ windows _ mimikatz _ files dite…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1482Domain Trust Discovery
72%
“tools like advanced ip scanner and softperfect ’ s netscan, and microsoft management console applets. the classics, living - off - the - land commands living - off - the - land discovery command sequence in the beachhead rdp server the threat actor utilized these commands to perf…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1550.002Pass the Hash
72%
“hours, the threat actor attempted logins against multiple accounts using known malicious ips ( based on osint ). several hours later they then logged in via rdp with one of the previously compromised users and ran a series of discovery commands, including various net commands to …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1567.002Exfiltration to Cloud Storage
68%
“file servers to facilitate the exfiltration of data via sftp. rclone was dropped along with multiple helper files that aided its execution : the nocmd. vbs file contained a set of vbs commands intended to execute the rcl. bat script. set wshshell = createobject ( " wscript. shell…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1018Remote System Discovery
66%
“tools like advanced ip scanner and softperfect ’ s netscan, and microsoft management console applets. the classics, living - off - the - land commands living - off - the - land discovery command sequence in the beachhead rdp server the threat actor utilized these commands to perf…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
64%
“script, rcl. bat. more details on this script will be explored on the exfiltration section. batch script rcl. bat was a batch script used to execute a rclone job. it receives further instructions on which files to exfiltrate from a file named include. txt. more details on this sc…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
62%
“tools like advanced ip scanner and softperfect ’ s netscan, and microsoft management console applets. the classics, living - off - the - land commands living - off - the - land discovery command sequence in the beachhead rdp server the threat actor utilized these commands to perf…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1048.003Exfiltration Over Unencrypted Non-C2 Protocol
61%
“*. pst *. msg *. edb *. mbox the following diagram visually demonstrates the execution chain of rclone : during the execution of rclone, outbound connections were observed to 38. 180. 245. 207 : 443. despite the port number, this traffic was in fact sftp traffic being used to tra…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1048Exfiltration Over Alternative Protocol
61%
“tools execution : 8bf0aaee - e44e - 4455 - 81d1 - d46fb42ae889 use of rclone to exfiltrate data over an ssh channel : 7019b8b4 - d23e - 4d35 - b5fa - 192ffb8cb3ee yara binaryalert _ hacktool _ windows _ mimikatz _ copywrite binaryalert _ hacktool _ windows _ mimikatz _ files dite…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1047Windows Management Instrumentation
59%
“ports are 135 ( rpc ), 445 ( smb ), 3389 ( rdp ) and 137 ( netbios ) from the same workstation, captured by sysmon event id 22, the tool was observed also making dns requests for hosts around the network. during these executions, an artifact of netscan share enumeration was obser…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
59%
“##ware operation, numerous windows shell commands were executed. more details on this will be explored on the impact and defense evasion sections. the threat actor also executed common discovery commands such as nslookup, net and more. more details on this will be explored on the…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1046Network Service Discovery
58%
“ports are 135 ( rpc ), 445 ( smb ), 3389 ( rdp ) and 137 ( netbios ) from the same workstation, captured by sysmon event id 22, the tool was observed also making dns requests for hosts around the network. during these executions, an artifact of netscan share enumeration was obser…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003OS Credential Dumping
57%
“hours, the threat actor attempted logins against multiple accounts using known malicious ips ( based on osint ). several hours later they then logged in via rdp with one of the previously compromised users and ran a series of discovery commands, including various net commands to …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1080Taint Shared Content
53%
“##ware operation, numerous windows shell commands were executed. more details on this will be explored on the impact and defense evasion sections. the threat actor also executed common discovery commands such as nslookup, net and more. more details on this will be explored on the…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003.001LSASS Memory
51%
“##tutil cl system cmd. exe / c wevtutil cl application credential access as we observe in most of our intrusions, once the threat actor gained access to the rdp - exposed beachhead host via password spraying, they leveraged well - known credential harvesting tools, specifically m…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1567.002Exfiltration to Cloud Storage
48%
“to additional hosts targeting backup servers, file servers, hypervisors, and more domain controllers. they utilized mimikatz across several of these hosts outputting csv files named for the child domains the hosts belonged to. based on the logs we assess this activity was likely …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1087.002Domain Account
46%
“checking the documents on the file share servers and network shares. they were checking pdf and document files, utilizing viewers such as google chrome and microsoft edge for pdf files and windows wordpad for doc files. documents accessed by the threat actor the threat actor was …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1087.002Domain Account
44%
“tools like advanced ip scanner and softperfect ’ s netscan, and microsoft management console applets. the classics, living - off - the - land commands living - off - the - land discovery command sequence in the beachhead rdp server the threat actor utilized these commands to perf…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
43%
“##ware operation, numerous windows shell commands were executed. more details on this will be explored on the impact and defense evasion sections. the threat actor also executed common discovery commands such as nslookup, net and more. more details on this will be explored on the…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1563.002RDP Hijacking
43%
“##m installations - endpoint detection logs or memory forensics the forensic methods for extracting and interpreting this data are consistent with guidance outlined in synacktiv ’ s forensic analysis of legitimate rats, which describes how splog. txt supports attribution and beha…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078Valid Accounts
39%
“note linking the ransom to the ransomhub group was dropped. the time to ransomware ( ttr ) for this intrusion was around 118 hours over six calendar days. analysts analysis and reporting completed by @ tas _ kmanager, @ iiamaleks and uc2 initial access the threat actor ’ s first …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1564.006Run Virtual Instance
38%
“any hyper - v virtual machines running on the system, delete shadow copies, and events from a few windows event channels. in addition, it leveraged built - in lateral movement capabilities to propagate to other hosts in the network through smb, the - only - local flag was used to…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1048.002Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
37%
“environment for initial or persistent access. direct rdp access from day one and initial access, the threat actor was observed continuously using rdp to maintain access to the compromised environment. they used it to establishing interactive sessions throughout which they could e…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003OS Credential Dumping
35%
“note linking the ransom to the ransomhub group was dropped. the time to ransomware ( ttr ) for this intrusion was around 118 hours over six calendar days. analysts analysis and reporting completed by @ tas _ kmanager, @ iiamaleks and uc2 initial access the threat actor ’ s first …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1048.002Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
34%
“to additional hosts targeting backup servers, file servers, hypervisors, and more domain controllers. they utilized mimikatz across several of these hosts outputting csv files named for the child domains the hosts belonged to. based on the logs we assess this activity was likely …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078Valid Accounts
34%
“successful logons. the threat actor selected a user and performed a login, about four hours after the successful logon occurrences from the password spray activities. the user will be referred as initial access user from this point in this report. note that the threat actor is us…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1564.006Run Virtual Instance
33%
“calculated to be : 2. 03 gb this volume aligns with the targeted exfiltration of data over a 40 - minute time frame. while no sysmon file create events were observed for the rclone configuration file, it was able be seen from the mft and ntfs artifacts that can be extracted from …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071.001Web Protocols
32%
“##2e16bb7db3b1efac4b13aee178542c6994543e7535d8efaa589870c nocmd. vbs 8e0b1f8390acb832dbf3abadeb7e5fd3 02e6ff95949fdf341daee846820d40289ab65985 4775dfb24f85f5d776f538018a98cc6a9853a1840f5c00b7d0c54695f03a11d9 rcl. bat 1cc1534b70b8d2b99b69a721c83e586a 6ac2d77631f775797cd0029e199a5d…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1552Unsecured Credentials
32%
“##tutil cl system cmd. exe / c wevtutil cl application credential access as we observe in most of our intrusions, once the threat actor gained access to the rdp - exposed beachhead host via password spraying, they leveraged well - known credential harvesting tools, specifically m…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1654Log Enumeration
31%
“##cate _ may21 susp _ gobfuscate _ may21 mitre att & ck clear windows event logs - t1070. 001 data encrypted for impact - t1486 dcsync - t1003. 006 domain account - t1087. 002 domain groups - t1069. 002 domain trust discovery - t1482 exfiltration over alternative protocol - t1048…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Key Takeaways Case Summary This intrusion began in November 2024 with a password spray attack targeting an internet-facing RDP server. Over the course of several hours, the threat actor attempted logins against multiple accounts using known malicious IPs (based on OSINT). Several hours later they then logged in via RDP with one of the previously […]