Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Shamoon

Shamoon

Shamoon is wiper malware that was first used by an Iranian group known as the "Cutting Sword of Justice" in 2012. Other versions known as Shamoon 2 and Shamoon 3 were observed in 2016 and 2018.Shamoon has also been seen leveragingRawDisk and Filerase to carry out data wiping tasks. Analysis has linkedShamoon withKwampirs based on multiple shared artifacts and coding patterns.[1] The term Shamoon is sometimes used to refer to the group using the malware as well as the malware itself.[2][3][4][5]

ID: S0140
Associated Software: Disttrack
Type: MALWARE
Platforms: Windows
Version: 2.2
Created: 31 May 2017
Last Modified: 17 November 2024

Associated Software Descriptions

NameDescription
Disttrack

[2]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1548.002Abuse Elevation Control Mechanism:Bypass User Account Control

Shamoon attempts to disable UAC remote restrictions by modifying the Registry.[2]

EnterpriseT1134.001Access Token Manipulation:Token Impersonation/Theft

Shamoon can impersonate tokens usingLogonUser,ImpersonateLoggedOnUser, andImpersonateNamedPipeClient.[6]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

Shamoon has used HTTP for C2.[2]

EnterpriseT1543.003Create or Modify System Process:Windows Service

Shamoon creates a new service named "ntssrv" to execute the payload. Newer versions create the "MaintenaceSrv" and "hdv_725x" services.[2][3]

EnterpriseT1485Data Destruction

Shamoon attempts to overwrite operating system files and disk structures with image files.[4][5][2] In a later variant, randomly generated data was used for data overwrites.[3][6]

EnterpriseT1486Data Encrypted for Impact

Shamoon has an operational mode for encrypting data instead of overwriting it.[2][3]

EnterpriseT1140Deobfuscate/Decode Files or Information

Shamoon decrypts ciphertext using an XOR cipher and a base64-encoded string.[3]

EnterpriseT1561.002Disk Wipe:Disk Structure Wipe

Shamoon has been seen overwriting features of disk structure such as the MBR.[4][5][2][3]

EnterpriseT1070.006Indicator Removal:Timestomp

Shamoon can change the modified time for files to evade forensic detection.[6]

EnterpriseT1105Ingress Tool Transfer

Shamoon can download an executable to run on the victim.[2]

EnterpriseT1570Lateral Tool Transfer

Shamoon attempts to copy itself to remote machines on the network.[2]

EnterpriseT1036.004Masquerading:Masquerade Task or Service

Shamoon creates a new service named "ntssrv" that attempts to appear legitimate; the service's display name is "Microsoft Network Realtime Inspection Service" and its description is "Helps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols." Newer versions create the "MaintenaceSrv" service, which misspells the word "maintenance."[2][6]

EnterpriseT1112Modify Registry

OnceShamoon has access to a network share, it enables the RemoteRegistry service on the target system. It will then connect to the system with RegConnectRegistryW and modify the Registry to disable UAC remote restrictions by settingSOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy to 1.[5][2][6]

EnterpriseT1027Obfuscated Files or Information

Shamoon contains base64-encoded strings.[2]

EnterpriseT1012Query Registry

Shamoon queries several Registry keys to identify hard disk partitions to overwrite.[2]

EnterpriseT1021.002Remote Services:SMB/Windows Admin Shares

Shamoon accesses network share(s), enables share access to the target device, copies an executable payload to the target system, and uses aScheduled Task/Job to execute the malware.[5]

EnterpriseT1018Remote System Discovery

Shamoon scans the C-class subnet of the IPs on the victim's interfaces.[5]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

Shamoon copies an executable payload to the target system by usingSMB/Windows Admin Shares and then scheduling an unnamed task to execute the malware.[5][2]

EnterpriseT1082System Information Discovery

Shamoon obtains the victim's operating system version and keyboard layout and sends the information to the C2 server.[2][3]

EnterpriseT1016System Network Configuration Discovery

Shamoon obtains the target's IP address and local network segment.[2][6]

EnterpriseT1569.002System Services:Service Execution

Shamoon creates a new service named "ntssrv" to execute the payload.Shamoon can also spread viaPsExec.[2][7]

EnterpriseT1529System Shutdown/Reboot

Shamoon will reboot the infected system once the wiping functionality has been completed.[3][6]

EnterpriseT1124System Time Discovery

Shamoon obtains the system time and will only activate if it is greater than a preset date.[2][3]

EnterpriseT1078.002Valid Accounts:Domain Accounts

IfShamoon cannot access shares using current privileges, it attempts access using hard coded, domain-specific credentials gathered earlier in the intrusion.[5][3]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp