Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

BlackBasta ransomware #127

Merged
merged 3 commits into from
Aug 21, 2024
Merged

BlackBasta ransomware #127

merged 3 commits into from
Aug 21, 2024

Conversation

lparker31
Copy link
Contributor

Added BlackBasta ransomware flow. This will need to be updated if changes are made to the Windows Registry Key STIX observable node. I didn't add the json file because it appeared that only .afb files were in the corpus folder now. If json file is needed, I can provide it.

Copy link

Open this PR's flows in Attack Flow Builder:

Copy link

codecov bot commented Jul 12, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 99.28%. Comparing base (6ad0ace) to head (50406ac).
Report is 4 commits behind head on main.

Additional details and impacted files
@@           Coverage Diff           @@
##             main     #127   +/-   ##
=======================================
  Coverage   99.28%   99.28%           
=======================================
  Files           9        9           
  Lines         974      974           
=======================================
  Hits          967      967           
  Misses          7        7           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@mehaase
Copy link
Contributor

mehaase commented Jul 16, 2024

A few requested changes:

Screenshot 2024-07-16 at 2 16 28 PM

Please move the arrows so they don't overlap. There are a few places in the flow where I saw overlapping arrows.

Screenshot 2024-07-16 at 2 18 00 PM

Correct me if I'm wrong, but I think IsDebuggerPresent is a windows API, not a command line tool. (And if it is, we don't have STIX objects for API calls. It could be included in the flow as a note, possibly.)

Screenshot 2024-07-16 at 2 20 11 PM

This registry key is showing as blank. It should be set up like this:

  • Key: HKEY_CURRENT_USER\Control Panel
  • Value:
    • Name: Wallpaper
    • Data: C:\Temp\dlaksjdoiwq.jpg (I found this in a trend micro report -- are these randomized for each infection or are these stable within a single campaign?)
    • Data Type: REG_SZ
Screenshot 2024-07-16 at 2 29 50 PM

I don't think this dependency is accurate, i.e. booting in safe mode does not depend on setting the wallpaper key in the registry, it just happens after. The reason why this is important is because we want to look at where we can disrupt attacks. In this case, if we detect or prevent writes to the wallpaper registry key, that doesn't really affect the rest of the attack.

Screenshot 2024-07-16 at 2 31 26 PM

File isn't the right object to use here, because .basta isn't a single specific file. You could maybe use an Indicator object and set the pattern using the STIX Patterns language. But that seems overkill. I suggest removing the File object here.

Screenshot 2024-07-16 at 2 35 11 PM

Same thing here. The File object is meant to be used as an indicator, i.e. "go search your network for this file name." But I don't think basta is making a file called random-letters.ico, it's actually making files like fdsjskjsfak.ico. If this filename is stable across multiple incidents, then it's worth including as an indicator, otherwise let's just explain in the action description that it's creating random file names.

Screenshot 2024-07-16 at 2 38 25 PM

T1657 should be moved earlier in the flow, e.g. an offshot of the exfiltration action, because it does not depend on the encryption for impact leg of the flow.

Copy link
Contributor

@mehaase mehaase left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Requested a few changes. See comment above.

Copy link

Open this PR's flows in Attack Flow Builder:

@lparker31
Copy link
Contributor Author

Fixed flow based on recommended changes.

@mehaase mehaase merged commit 0a90aa0 into main Aug 21, 2024
7 checks passed
@mehaase mehaase deleted the lp-june-edit branch August 21, 2024 18:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants