Skip to content

Latest commit

 

History

History
61 lines (45 loc) · 3.05 KB

shamoon.md

File metadata and controls

61 lines (45 loc) · 3.05 KB
ID X0018
Aliases None
Platforms Windows
Year 2012
Associated ATT&CK Software Shamoon

Shamoon

Data wiping malware.

ATT&CK Techniques

See ATT&CK: Shamoon - Techniques Used.

Enhanced ATT&CK Techniques

Name Use
Impact::Data Destruction (E1485) A 2018 variant includes a component that erases files and then wipes the master boot record, preventing file recovery [1]
Persistence::Modify Existing Service (F0011) Shamoon enables the RemoteRegistry service to allow remote registry modification [2]
Defense Evasion::Modify Registry (E1112) Disables remote user account control by enabling the registry key LocalAccountTokenFilterPolicy [2]
Defense Evasion::Hidden Files and Directories::Timestamp (F0005.004) Modifies target files' time to August 2012 as an antiforensic trick [2]
Defense Evasion::Hijack Execution Flow::Abuse Windows Function Calls (F0015.006) Escalates privilege by impersonating the token. First uses LogonUser and ImpersonateLoggedOnUser, then ImpersonateNamedPipeClient. [2]
Impact::Disk Wipe (F0014) An overwrite component will overwrite the MBR so that the compromised computer can no longer start [4]
Execution::Command and Scripting Interpreter (E1059) The wiper component of Shamoon creates a service to run the driver with the command: sc create hdv_725x type= kernel start= demand binpath= WINDOWS\hdv_725x.sys 2>&1 >nul and sends an additional reboot command after completion [2]
Command and Control::Ingress Tool Transfer (E1105) Creates a folder on remote computers and then copies its executables (Shamoon and Filerase) into that directory [3]

Indicators of Compromise

SHA256 Hashes

  • c617120895646f73bc880c0aca18990deda3db9be03f6b3564013e26dedfa3f9

References

[1] https://www.darkreading.com/attacks-breaches/disk-wiping-shamoon-malware-resurfaces-with-file-erasing-malware-in-tow

[2] https://www.mcafee.com/blogs/other-blogs/mcafee-labs/shamoon-returns-to-wipe-systems-in-middle-east-europe/

[3] https://www.mcafee.com/blogs/other-blogs/mcafee-labs/shamoon-attackers-employ-new-tool-kit-to-wipe-infected-systems/

[4] https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=281521ea-2d18-4bf9-9e88-8b1dc41cfdb6&CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments