-
Notifications
You must be signed in to change notification settings - Fork 88
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
BlackBasta ransomware #127
Conversation
Open this PR's flows in Attack Flow Builder: |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #127 +/- ##
=======================================
Coverage 99.28% 99.28%
=======================================
Files 9 9
Lines 974 974
=======================================
Hits 967 967
Misses 7 7 ☔ View full report in Codecov by Sentry. |
A few requested changes: Please move the arrows so they don't overlap. There are a few places in the flow where I saw overlapping arrows. Correct me if I'm wrong, but I think This registry key is showing as blank. It should be set up like this:
I don't think this dependency is accurate, i.e. booting in safe mode does not depend on setting the wallpaper key in the registry, it just happens after. The reason why this is important is because we want to look at where we can disrupt attacks. In this case, if we detect or prevent writes to the wallpaper registry key, that doesn't really affect the rest of the attack. File isn't the right object to use here, because Same thing here. The File object is meant to be used as an indicator, i.e. "go search your network for this file name." But I don't think basta is making a file called T1657 should be moved earlier in the flow, e.g. an offshot of the exfiltration action, because it does not depend on the encryption for impact leg of the flow. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Requested a few changes. See comment above.
Open this PR's flows in Attack Flow Builder: |
Fixed flow based on recommended changes. |
Added BlackBasta ransomware flow. This will need to be updated if changes are made to the Windows Registry Key STIX observable node. I didn't add the json file because it appeared that only .afb files were in the corpus folder now. If json file is needed, I can provide it.