Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. FunnyDream

FunnyDream

FunnyDream is a backdoor with multiple components that was used during theFunnyDream campaign since at least 2019, primarily for execution and exfiltration.[1]

ID: S1044
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 23 September 2022
Last Modified: 11 April 2024
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1010Application Window Discovery

FunnyDream has the ability to discover application windows via execution ofEnumWindows.[1]

EnterpriseT1560.002Archive Collected Data:Archive via Library

FunnyDream has compressed collected files with zLib.[1]

.003Archive Collected Data:Archive via Custom Method

FunnyDream has compressed collected files with zLib and encrypted them using an XOR operation with the string key from the command line orqwerasdf if the command line argument doesn’t contain the key. File names are obfuscated using XOR with the same key as the compressed file content.[1]

EnterpriseT1119Automated Collection

FunnyDream can monitor files for changes and automatically collect them.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

FunnyDream can use a Registry Run Key and the Startup folder to establish persistence.[1]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

FunnyDream can usecmd.exe for execution on remote hosts.[1]

EnterpriseT1543.003Create or Modify System Process:Windows Service

FunnyDream has established persistence by runningsc.exe and by setting theWSearch service to run automatically.[1]

EnterpriseT1005Data from Local System

FunnyDream can upload files from victims' machines.[1][2]

EnterpriseT1025Data from Removable Media

TheFunnyDream FilePakMonitor component has the ability to collect files from removable devices.[1]

EnterpriseT1001Data Obfuscation

FunnyDream can send compressed and obfuscated packets to C2.[1]

EnterpriseT1074.001Data Staged:Local Data Staging

FunnyDream can stage collected information including screen captures and logged keystrokes locally.[1]

EnterpriseT1041Exfiltration Over C2 Channel

FunnyDream can execute commands, including gathering user information, and send the results to C2.[1]

EnterpriseT1083File and Directory Discovery

FunnyDream can identify files with .doc, .docx, .ppt, .pptx, .xls, .xlsx, and .pdf extensions and specific timestamps for collection.[1]

EnterpriseT1070Indicator Removal

FunnyDream has the ability to clean traces of malware deployment.[1]

.004File Deletion

FunnyDream can delete files including its dropper component.[1]

EnterpriseT1105Ingress Tool Transfer

FunnyDream can download additional files onto a compromised host.[1]

EnterpriseT1056.001Input Capture:Keylogging

TheFunnyDream Keyrecord component can capture keystrokes.[1]

EnterpriseT1559.001Inter-Process Communication:Component Object Model

FunnyDream can use com objects identified withCLSID_ShellLink(IShellLink andIPersistFile) andWScript.Shell(RegWrite method) to enable persistence mechanisms.[1]

EnterpriseT1680Local Storage Discovery

FunnyDream can enumerate all logical drives on a targeted machine.[1]

EnterpriseT1036.004Masquerading:Masquerade Task or Service

FunnyDream has used a service namedWSearch for execution.[1]

EnterpriseT1106Native API

FunnyDream can use Native API for defense evasion, discovery, and collection.[1]

EnterpriseT1095Non-Application Layer Protocol

FunnyDream can communicate with C2 over TCP and UDP.[1]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

FunnyDream can Base64 encode its C2 address stored in a template binary with thexyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw_- or
xyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvw_= character sets.[1]

EnterpriseT1120Peripheral Device Discovery

TheFunnyDream FilepakMonitor component can detect removable drive insertion.[1]

EnterpriseT1057Process Discovery

FunnyDream has the ability to discover processes, includingBka.exe andBkavUtil.exe.[1]

EnterpriseT1055.001Process Injection:Dynamic-link Library Injection

TheFunnyDream FilepakMonitor component can inject into the Bka.exe process using theVirtualAllocEx,WriteProcessMemory andCreateRemoteThread APIs to load the DLL component.[1]

EnterpriseT1572Protocol Tunneling

FunnyDream can connect to HTTP proxies via TCP to create a tunnel to C2.[1]

EnterpriseT1090Proxy

FunnyDream can identify and use configured proxies in a compromised network for C2 communication.[1]

EnterpriseT1012Query Registry

FunnyDream can checkSoftware\Microsoft\Windows\CurrentVersion\Internet Settings to extract theProxyServer string.[1]

EnterpriseT1018Remote System Discovery

FunnyDream can collect information about hosts on the victim network.[2]

EnterpriseT1113Screen Capture

TheFunnyDream ScreenCap component can take screenshots on a compromised host.[1]

EnterpriseT1518.001Software Discovery:Security Software Discovery

FunnyDream can identify the processes for Bkav antivirus.[1]

EnterpriseT1218.011System Binary Proxy Execution:Rundll32

FunnyDream can userundll32 for execution of its components.[1]

EnterpriseT1016System Network Configuration Discovery

FunnyDream can parse theProxyServer string in the Registry to discover http proxies.[1]

EnterpriseT1033System Owner/User Discovery

FunnyDream has the ability to gather user information from the targeted system usingwhoami/upn&whoami/fqdn&whoami/logonid&whoami/all.[1]

EnterpriseT1124System Time Discovery

FunnyDream can check system time to help determine when changes were made to specified files.[1]

EnterpriseT1047Windows Management Instrumentation

FunnyDream can use WMI to open a Windows command shell on a remote machine.[1]

Campaigns

IDNameDescription
C0007FunnyDream

During theFunnyDream campaign, theFunnyDream backdoor was used to execute multiple components and exfiltrate files.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp