Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. FoggyWeb

FoggyWeb

FoggyWeb is a passive and highly-targeted backdoor capable of remotely exfiltrating sensitive information from a compromised Active Directory Federated Services (AD FS) server. It has been used byAPT29 since at least early April 2021.[1]

ID: S0661
Type: MALWARE
Platforms: Windows
Contributors: Craig Smith, BT Security
Version: 1.1
Created: 16 November 2021
Last Modified: 11 April 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

FoggyWeb has the ability to communicate with C2 servers over HTTP GET/POST requests.[1]

EnterpriseT1560.002Archive Collected Data:Archive via Library

FoggyWeb can invoke theCommon.Compress method to compress data with the C# GZipStream compression class.[1]

.003Archive Collected Data:Archive via Custom Method

FoggyWeb can use a dynamic XOR key and a custom XOR methodology to encode data before exfiltration. Also,FoggyWeb can encode C2 command output within a legitimate WebP file.[1]

EnterpriseT1005Data from Local System

FoggyWeb can retrieve configuration data from a compromised AD FS server.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

FoggyWeb can be decrypted in memory using a Lightweight Encryption Algorithm (LEA)-128 key and decoded using a XOR key.[1]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

FoggyWeb has used a dynamic XOR key and custom XOR methodology for C2 communications.[1]

EnterpriseT1041Exfiltration Over C2 Channel

FoggyWeb can remotely exfiltrate sensitive information from a compromised AD FS server.[1]

EnterpriseT1083File and Directory Discovery

FoggyWeb's loader can check for theFoggyWeb backdoor .pri file on a compromised AD FS server.[1]

EnterpriseT1574.001Hijack Execution Flow:DLL

FoggyWeb's loader has used DLL Search Order Hijacking to load malicious code instead of the legitimateversion.dll during theMicrosoft.IdentityServer.ServiceHost.exe execution process.[1]

EnterpriseT1105Ingress Tool Transfer

FoggyWeb can receive additional malicious components from an actor controlled C2 server and execute them on a compromised AD FS server.[1]

EnterpriseT1036Masquerading

FoggyWeb can masquerade the output of C2 commands as a fake, but legitimately formatted WebP file.[1]

.005Match Legitimate Resource Name or Location

FoggyWeb can be disguised as a Visual Studio file such asWindows.Data.TimeZones.zh-PH.pri to evade detection. Also,FoggyWeb's loader can mimic a genuinedll file that carries out the same import functions as the legitimate Windowsversion.dll file.[1]

EnterpriseT1106Native API

FoggyWeb's loader can use API functions to load theFoggyWeb backdoor into the same Application Domain within which the legitimate AD FS managed code is executed.[1]

EnterpriseT1040Network Sniffing

FoggyWeb can configure custom listeners to passively monitor all incoming HTTP GET and POST requests sent to the AD FS server from the intranet/internet and intercept HTTP requests that match the custom URI patterns defined by the actor.[1]

EnterpriseT1027.004Obfuscated Files or Information:Compile After Delivery

FoggyWeb can compile and execute source code sent to the compromised AD FS server via a specific HTTP POST.[1]

.013Obfuscated Files or Information:Encrypted/Encoded File

FoggyWeb has been XOR-encoded.[1]

EnterpriseT1057Process Discovery

FoggyWeb's loader can enumerate all Common Language Runtimes (CLRs) and running Application Domains in the compromised AD FS server'sMicrosoft.IdentityServer.ServiceHost.exe process.[1]

EnterpriseT1620Reflective Code Loading

FoggyWeb's loader has reflectively loaded .NET-based assembly/payloads into memory.[1]

EnterpriseT1129Shared Modules

FoggyWeb's loader can call theload() function to load theFoggyWeb dll into an Application Domain on a compromised AD FS server.[1]

EnterpriseT1552.004Unsecured Credentials:Private Keys

FoggyWeb can retrieve token signing certificates and token decryption certificates from a compromised AD FS server.[1]

EnterpriseT1550Use Alternate Authentication Material

FoggyWeb can allow abuse of a compromised AD FS server's SAML token.[1]

Groups That Use This Software

IDNameReferences
G0016APT29

[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp