Good day everyone!
A Chinese APT group, hashtag#EarthEstries, makes headlines today in an article from Trend Micro researchers. Earth Estries has been targeting critical sectors like telecommunications and government entities across the US, Asia-Pacific, Middle East, and South Africa 2023, so they have a significant global footprint. They like to target public-facing server vulnerabilities for initial access, abuse living-off-the-land binaries (LOLBINs) for lateral movement, deploy backdoors such as GHOSTSPIDER, SNAPPYBEE, and MASOL RAT, and use advanced techniques.
In this report, you can see the commands that were issued for lateral movement through WMIC.exe, discovery activity using ping.exe to output to a file (most likely for ready by the adversary later), more discovery activity using wevtutil.exe looking at event code 4624 (Process Create) and then the PSEXEC.exe activity that first accepted the end user license agreement ("accepteula"), and finally the execution of a bat file.
You are probably thinking, well, where do I start hunting for this activity? A quick win that I can share with you is looking for that first execution of a Sysinternals tool, which modifies a registry key when the "acceptula" parameter is issued.
Now enjoy the rest of the article that I omitted and go get hunting! Happy Hunting!
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions
https://www.trendmicro.com/en_us/research/24/k/earth-estries.html
Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday #huntoftheday #gethunting Cyborg Security