Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Hermetic Wiper Infographic

Sponsored · Your Podcast. Everywhere. Effortlessly. Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.

Hermetic Wiper Infographic

Avatar for Thomas Roccia

Thomas Roccia

March 14, 2022
Tweet

More Decks by Thomas Roccia

Other Decks in Programming

Transcript

  1. @F rØgger_ Thomas Roccia Overview of HermeticWiper Initial entry point

    and deployment Exchange Server Compromised Tomcat Exploit PowerShell for post compromission Conhosts.exe (Wiper Loader) Name: Hermetica Digital Ltd :Status: Valid Issuer: DigiCert EV Code Signing CA (SHA2) Valid From: 12:00 AM 04/13/2021 Valid To: 11:59 PM 04/14/2022 Valid Usage: Code Signing Algorithm: sha256RSA Thumbprint: 1AE7556DFACD47D9EFBE79BE974661A5A6D6D923 Serial Number: 0C48732873AC8CCEBAF8F0E1E8329CEC Certificate MBR and Partition corruptions Bytes overwriting Anti-forensic Check OS Architecture and drop the resource accordingly RCDATA Resource MS compress: “empntdrv.sys“ • DRV_X64: Windows 7+ 6’ bits • DRV-X86: Windows 7+ 32 bits • DRV_XP_X64: Windows XP 64 bits • DRV_XP_X86: Windows XP 32 bits Disable VSS Service if enabled Webshell • Set Registry key SYSTEM\\CurrentControlSet\\Control\CrashControl\ CrashDumpEnabled = 0 to avoid that no file are written when the system terminates abnormally. • Delete the service registry key previously created to run the driver: SYSTEM\CurrentControlSet\\Services\ • Disables ShowCompColor and ShowInfoTip in all HKEY_USERS registry: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced ShowCompColor = 0 ShowInfoTip = 0 Drop the driver into C:\Windows\system32\Drivers\<random>dr.sys Load the driver using SeLoadDriverPrivilege Run the driver as a service using API OpenSCManagerW(), OpenServiceW(), CreateServiceW() and StartServiceW() • Creates named pipe \\\\.\\EPMNTDRV\\%u for driver com • Get handle from the function DeviceIoControl with IoControlCode 0x560000 (IOCTL_VOLUME_GET_VOLUME_DISK_EXTENTS) to get the device number. $LOGFILE log file containing all actions performed on the volume. $I30 Windows NTFS Index Attribute $ATTRIBUTE_LIST Lists the location of all attribute records that do not fit in the MFT record $EA Extended the attribute index $EA_INFORMATION Extended attribute information $SECURITY_DESCRIPTOR Security descriptor stores ACL and SIDs $DATA Contains the default file data $INDEX_ROOT Used to support folders and other indexes $INDEX_ALLOCATION The type name for a Directory Stream. A string for the attribute code for index allocation $BITMAP A bitmap index for a large directory. $REPARSE_POINT Used for volume mount points $LOGGED_UTILITY_STREAM Use by the encrypting file system IMPACT Enumerates Windows files, Event Logs and Windows Restaure Points • “My Documents”, “Desktop”, “AppData” • "\\\\?\\C:\\Windows\\System32\\winevt\\Logs") • "C:\System Volume Information" EaseUS driver Get privileges: • SeShutdownPrivilege • SeBackupPrivilege • SeLoadDriverPrivilege Get MFT and NTFS Attributes Sample Analyzed: SHA256: 0385eeab00e946a302b24a91dea4187c1210597b8e17cd9e2230450f5ece21da External Sources: https://gist.github.com/fr0gger/7882fde2b1b271f9e886a4a9b6fb6b7f Deployment via GPO Rev: Version 2