MuddyWater APT Analysis
MuddyWater APT group has been active since 2017, focusing primarily on victims in the Middle East countries using in-memory vectors leveraging PowerShell. This family leverage “living off the land” attack technique as it does not require creating new binaries on the victim’s computer, maintaining a low detection profile, and minimal forensic footprint. MuddyWater group has targeted countries throughout the Middle East countries, Europe, and United States. MuddyWater APT was a primary reason for an increase in spear-phishing attacks, targeting government agencies, military entities, telecom companies, and educational institutions in Jordan, Azerbaijan, Pakistan, Iraq, and Saudi Arabia. Other such attacks were also uncovered in countries like Mali, Austria, Russia, Iran, and Bahrain. Recently, Check Point researchers have noticed a new campaign targeting Belarus, Turkey, and Ukraine. MuddyWater is known for its cyberespionage and other criminal activities in collaboration with Iran’s Intelligence and Security Ministry. The Ministry of Intelligence and Security from Iran divided the MuddyWater group into two teams:
- The first team specialized in hacking the target systems.
- Another team will perform social engineering operations using spear-phishing methods
MuddyWater Global Attacks:
Document signed by the Major General Pilot, commander of the Saudi Royal Air Force
İnkişaf üçün görüş.doc (meeting for development)
NetSecurity has captured a decoy document that has a suspicious VBA macro.
Details of the suspicious doc file:
Upon analyzing the SHA256 in VirusTotal, we found that the suspicious file is indeed malicious.
Phishing and spear-phishing are the most common tactics used by the threat actors to spread the documents and trap the victims. Similar documents were identified that have some common characteristics like the attempt to impersonate National entities through our research:
- Iraqi National Intelligence Service
- National Security Agency
- Ministry of Interior of Saudi Arabia
- Federal Investigation Agency Ministry of Interior Pakistan
The document has the following common metadata fields that match with the metadata of other identified malicious documents:
- LastModifiedBy: GIGABYTE
- AppVersion: 15.0
- Software: Microsoft Office Word
Upon analyzing the malicious document using the ThreatResponder FORENSICS tool, we captured the randomly encrypted strings, indicating the obfuscation performed by the attackers to hide the actual code.
Upon deeper assessment, we can establish that it is a Base64 encoding. After decoding the Base64 encoded VBA macro, it is identified that the VBS content mentioned below is to run system.ps1 PowerShell script.
Set objShell = WScript.CreateObject(“WScript.Shell”)
command = “powershell.exe -WindowStyle hidden -ExecutionPolicy Bypass -nologo -noprofile -file C:\Users\Public\Documents\system.ps1”
Set objShell = Nothing
As rightly assessed from the deobfuscated string, the macro is designed to execute the following operations:
- Decode and drop a PowerShell script into C:\Users\Public\Documents\system.ps1
- Decode and drop a VBS script into C:\Users\Public\Documents\system.VBS
- Executes the VBS with Shell.Open Method
Using NetSecurity Forensics, we were able to find evidence that the initial backdoor is deployed using a decoy document containing a macro and establish that the document leverages the Macro VBS mechanism to execute code and deploy the next attack stages.
In addition, we were also able to identify the execution of commands like whoami.exe and access explorer.exe through the WScript commands.
The function persistence lowers the security settings of Microsoft Excel and Word, creates a survival on reboot mechanism, and hides the VBS and PS1 by setting the file attributes System and Hidden via the Windows utility attrib.exe.
- Persistence is obtained by adding an entry into (HKCU and HKLM) CurrentVersion\Run.
- The final artifact will have a value named Windows Optimizations which resolves to Wscript C:\Users\Public\Documents\System.Vbs.
- A second persistence is obtained by adding a Scheduled Task entry called Microsoft\WindowsOptimizationsService, which executes: Wscr ipt C:\Users\Public\Documents\System.Vbs.
Upon analyzing the malicious doc file using ThreatResponder FORENSICS, we were able to identify that the malicious file has strings with a URL pattern that seems to be a c2 connection to a potentially malicious domain.
MuddyWater APT IOCs
How to Detect MuddyWater APT?
Cyber security threats and ransomware attacks are increasing at a tremendous pace. It is extremely difficult for cyber security analysts and incident responders to investigate and detect cyber security threats using conventional tools and techniques. NetSecurity’s ThreatResponder, with its diverse capabilities, can help your team detect the most advanced cyber threats, including APTs, zero-day attacks, and ransomware attacks. It can also help automate incident response actions across millions of endpoints, making it easy, fast, and hassle-free.
Want to try our ThreatResponder, cutting-edge Endpoint Detection & Response (EDR), and ThreatResponder FORENSICS, the Swiss knife for forensic investigators in action? Click on the below button to request a free demo of our NetSecurity’s ThreatResponder platform.
The page’s content shall be deemed proprietary and privileged information of NETSECURITY CORPORATION. It shall be noted that NETSECURITY CORPORATION copyrights the contents of this page. Any violation/misuse/unauthorized use of this content “as is” or “modified” shall be considered illegal and subjected to articles and provisions that have been stipulated in the General Data Protection Regulation (GDPR) and Personal Data Protection Law (PDPL).