Mandiant Advantage Threat Intelligence
Mandiant Advantage Threat Intelligence Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.6.0 and later.
Enrich Indicators of Compromise, and fetch information about Actors, Malware Families, and Campaigns from Mandiant Advantage. This integration was integrated and tested with version 4 of the Mandiant Advantage Threat Intelligence API
#
Configure Mandiant Advantage Threat Intelligence on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for Mandiant Advantage Threat Intelligence.
Click Add instance to create and configure a new integration instance.
Parameter Description Required API Base URL Leave as 'api.intelligence.mandiant.com' if unsure False API Key Your API Key from Mandiant Advantage Threat Intelligence True Secret Key Your Secret Key from Mandiant Advantage Threat Intelligence True Fetch indicators False Indicator Reputation Indicators from this integration instance will be marked with this reputation. False Source Reliability Reliability of the source providing the intelligence data. True Traffic Light Protocol Color The Traffic Light Protocol (TLP) designation to apply to indicators fetched from the feed. False Feed Expiration Policy False Feed Expiration Interval False Feed Fetch Interval False Feed Minimum Confidence Score The minimum MScore value to import as part of the feed True Feed Exclude Open Source Intelligence Whether to exclude Open Source Intelligence as part of the feed True Mandiant indicator type The type of indicators to fetch. Indicator type might include the following: Domains, IPs, Files and URLs. False First fetch time The maximum value allowed is 90 days. False Maximum number of indicators per fetch Maximum value of 1000. Any values higher will be capped to 1000 False Tags Supports CSV values. False Timeout API calls timeout. False Bypass exclusion list When selected, the exclusion list is ignored for indicators from this feed. This means that if an indicator from this feed is on the exclusion list, the indicator might still be added to the system. False Retrieve indicator metadata Retrieve additional information for each indicator. Note that this requires additional API calls. False Create relationships Note that this requires additional API calls. False Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
mati-get-indicatorGet information about a single Indicator of Compromise from Mandiant
#
Base Commandmati-get-indicator
#
InputArgument Name | Description | Required |
---|---|---|
indicator_value | Value of the indicator to look up. Can be URL, domain name, IP address, or file hash. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MANDIANTTI.IP.score | Number | The Severity Score of the IP indicator |
MANDIANTTI.IP.fields.ip | String | The IP address of the IP indicator |
MANDIANTTI.FILE.score | Number | The Severity Score of the File indicator |
MANDIANTTI.FILE.fields.md5 | String | The MD5 Hash associated with the File indicator |
MANDIANTTI.FILE.fields.sha256 | String | The SHA256 Hash associated with the File indicator |
MANDIANTTI.FILE.fields.sha1 | String | The SHA1 Hash associated with the File indicator |
MANDIANTTI.DOMAIN.score | Number | The Severity Score of the Domain indicator |
MANDIANTTI.DOMAIN.fields.dns | String | The DNS record value for the Domain indicator |
MANDIANTTI.DOMAIN.fields.domain | String | The domain name for the Domain indicator |
MANDIANTTI.URL.score | Number | The Severity Score of the URL indicator |
MANDIANTTI.URL.fields.url | String | The URL value for the Domain indicator |
#
Command example!mati-get-indicator indicator_value=124.248.207.50
#
Context Example#
Human Readable Output#
Results
fields rawJSON relationships score type value firstseenbysource: 2016-06-09T16:28:01.000Z
lastseenbysource: 2018-04-19T17:23:59.000Z
stixid: ipv4--3a4d8f76-6fde-5b25-9672-a45a0ac16bc8
trafficlightprotocol: AMBER
DBotScore: {"Indicator": "124.248.207.50", "Type": "ip", "Vendor": "Mandiant", "Score": 2, "Reliability": "A - Completely reliable"}
ip: 124.248.207.50id: ipv4--3a4d8f76-6fde-5b25-9672-a45a0ac16bc8
mscore: 52
type: ipv4
value: 124.248.207.50
is_exclusive: false
is_publishable: true
sources: {'first_seen': '2018-01-08T21:29:53.000+0000', 'last_seen': '2018-04-19T17:23:59.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'},
{'first_seen': '2016-06-09T16:28:01.000+0000', 'last_seen': '2016-06-09T16:28:01.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'}
attributed_associations: {'id': 'threat-actor--3790b99d-7067-536c-821d-19953727bf7b', 'name': 'Turla Team', 'type': 'threat-actor'}
last_updated: 2022-05-14T10:15:13.771Z
first_seen: 2016-06-09T16:28:01.000Z
last_seen: 2018-04-19T17:23:59.000Z
campaigns:
publications:2 IP 124.248.207.50: 124.248.207.50
#
mati-get-actorGet information about a Threat Actor from Mandiant
#
Base Commandmati-get-actor
#
InputArgument Name | Description | Required |
---|---|---|
actor_name | Name of the actor to look up. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MANDIANTTI.ThreatActor.value | String | The name of the ThreatActor |
MANDIANTTI.ThreatActor.fields.primarymotivation | String | The primary motivation of the ThreatActor |
MANDIANTTI.ThreatActor.fields.tags | String | The tags and target industries of the ThreatActor |
MANDIANTTI.ThreatActor.fields.aliases | String | The known aliases of the ThreatActor |
MANDIANTTI.ThreatActor.fields.targets | String | The known targets of the ThreatActor |
MANDIANTTI.ThreatActor.fields.description | String | The description of the ThreatActor |
MANDIANTTI.ThreatActor.fields.publications.title | String | The title of a report associated with the ThreatActor |
MANDIANTTI.ThreatActor.fields.publications.link | String | The link to the report in Mandiant Advantage |
#
Command example!mati-get-actor actor_name=APT1
#
Context Example#
Human Readable Output#
Results
fields rawJSON relationships score type value primarymotivation: Espionage
tags: Aerospace & Defense,
Chemicals & Materials,
Civil Society & Non-Profits,
Construction & Engineering,
Education,
Energy & Utilities,
Financial Services,
Governments,
Healthcare,
Hospitality,
Legal & Professional Services,
Manufacturing,
Media & Entertainment,
Oil & Gas,
Retail,
Technology,
Telecommunications,
Transportation
aliases: Apt1 (Recorded Future),
Bronzesunset (Dell SecureWorks),
Comment Crew (Internet),
Comment Crew (ThreatConnect),
Comment Panda (CrowdStrike),
Commentcrew (Symantec),
Dev0046 (Microsoft),
Famoussparrow (ESET),
Fluorine (Microsoft),
Foxypanda (CrowdStrike),
Ghostemperor (Kaspersky),
Kumming Group (Dell SecureWorks),
Shanghaigroup (Dell SecureWorks),
Tg8223 (Dell SecureWorks)
firstseenbysource: 2003-06-20T12:00:00.000Z,
2019-05-22T00:00:00.000Z
lastseenbysource: 2015-10-20T00:00:00.000Z,
2022-12-22T00:00:00.000Z
targets: Belgium,
Canada,
Denmark,
France,
Hong Kong,
India,
Israel,
Japan,
Luxembourg,
Norway,
Singapore,
South Africa,
Switzerland,
Taiwan,
United Arab Emirates,
United Kingdom,
United States of America
stixid: threat-actor--0ac5c1db-8ad6-54b8-b4b9-c32fc738c54a
name: APT1
description: APT1 refers to a distinct grouping of global cyber espionage activity with a nexus to China. Based on available data, we assess that this is a nation-state-sponsored group located in China. Specifically, we believe that APT1 is the 2nd Bureau of the People's Liberation Army (PLA) General Staff Department's 3rd Department, or Unit 61398. The activity is distinguished by the use of common infrastructure and tools and a clear intent to collect intelligence on a number of issues that may be of interest to the People's Republic of China (PRC).
updateddate: 2023-02-23T14:17:35.000Z
trafficlightprotocol: AMBER
DBot Score: {"Indicator": null, "Type": "Actor", "Vendor": "Mandiant", "Score": 0, "Reliability": "A - Completely reliable"}
publications: {'source': 'Mandiant', 'title': 'MITRE ATT&CK for ICS Tactics: Impact', 'link': 'https://advantage.mandiant.com/reports/23-00002244', 'timestamp': 1675443298.0},
{'source': 'Mandiant', 'title': 'Weekly Malware Update for Oct. 10–17, 2022', 'link': 'https://advantage.mandiant.com/reports/22-00023922', 'timestamp': 1666102868.0}industries: {'id': 'identity--cc593632-0c42-500c-8d0b-d38e97b90f1d', 'name': 'Aerospace & Defense', 'attribution_scope': 'confirmed', 'first_seen': '2009-07-29T04:35:35.000Z', 'last_seen': '2014-10-24T03:07:40.000Z'},
{'id': 'identity--a93f63bc-bbfc-52ab-88c0-794c74f5bec0', 'name': 'Chemicals & Materials', 'attribution_scope': 'confirmed', 'first_seen': '2008-08-10T16:25:00.000Z', 'last_seen': '2014-09-05T00:00:00.000Z'}
locations: {"source": [{"region": {"id": "location--8fc231f3-4e62-57e7-b734-eaee0a734612", "name": "Asia", "attribution_scope": "confirmed"}, "country": {"id": "location--740e7e5f-f2a0-55e0-98a3-88872c55b581", "name": "China", "iso2": "CN", "attribution_scope": "confirmed"}, "sub_region": {"attribution_scope": "confirmed", "id": "location--7b33370b-da4b-5c48-9741-b69f69febb77", "name": "East Asia"}}], "target": [{"id": "location--a509dfc8-789b-595b-a201-29c7af1dc0bb", "name": "Belgium", "iso2": "BE", "region": "Europe", "sub-region": "West Europe", "attribution_scope": "confirmed"}, {"id": "location--fde14246-c07b-5f3f-9ac8-8d4d50910f15", "name": "Canada", "iso2": "CA", "region": "Americas", "sub-region": "North America", "attribution_scope": "confirmed"}]}
id: threat-actor--0ac5c1db-8ad6-54b8-b4b9-c32fc738c54a
name: APT1
description: APT1 refers to a distinct grouping of global cyber espionage activity with a nexus to China. Based on available data, we assess that this is a nation-state-sponsored group located in China. Specifically, we believe that APT1 is the 2nd Bureau of the People's Liberation Army (PLA) General Staff Department's 3rd Department, or Unit 61398. The activity is distinguished by the use of common infrastructure and tools and a clear intent to collect intelligence on a number of issues that may be of interest to the People's Republic of China (PRC).
type: threat-actor
last_activity_time: 2015-10-20T00:00:00.000Z
audience: {'name': 'intel_fusion', 'license': 'INTEL_RBI_FUS'},
{'name': 'intel_ce', 'license': 'INTEL_CYB_ESP'}
is_publishable: true
intel_free: true
counts: {"reports": 9, "malware": 104, "cve": 2, "associated_uncs": 1, "aliases": 14, "industries": 18, "attack_patterns": 133}
last_updated: 2023-02-23T14:17:35.000Z
aliases: {'name': 'Apt1 (Recorded Future)', 'attribution_scope': 'confirmed'},
{'name': 'Bronzesunset (Dell SecureWorks)', 'attribution_scope': 'confirmed'}
malware: {'id': 'malware--09673ebc-9fbf-5ab0-9130-7874c84cd3e4', 'name': 'AGEDMOAT', 'attribution_scope': 'confirmed'},
{'id': 'malware--7c00490d-dc79-5623-bf50-fb4b169d1b4f', 'name': 'AGEDSHOE', 'attribution_scope': 'confirmed'}
motivations: {'id': 'motivation--1b8ca82a-7cff-5622-bedd-965c11d38a9e', 'name': 'Espionage', 'attribution_scope': 'confirmed'}
associated_uncs: {'attribution_scope': 'possible', 'id': 'threat-actor--aa6c510a-ddb7-5ea7-9921-bee8408ed3be', 'name': 'UNC2286'}
cve: {'attribution_scope': 'possible', 'cve_id': 'CVE-2020-0688', 'id': 'vulnerability--5335a68a-b519-51c3-b05f-bc1749604b7c'},
{'attribution_scope': 'confirmed', 'cve_id': 'CVE-2009-3129', 'id': 'vulnerability--8cb90843-f69a-5aa6-95dc-3bdebcc8fa78'}
observed: {'earliest': '2003-06-20T12:00:00.000Z', 'recent': '2015-10-20T00:00:00.000Z', 'attribution_scope': 'confirmed'},
{'earliest': '2019-05-22T00:00:00.000Z', 'recent': '2022-12-22T00:00:00.000Z', 'attribution_scope': 'possible'}
tools: {'id': 'malware--e224f74a-ca0e-540b-884f-03753787316f', 'name': 'NLTEST', 'attribution_scope': 'possible'},
{'id': 'malware--76ccff98-5f46-5b7e-8eae-f7b439d0e64a', 'name': 'TCPTRAN', 'attribution_scope': 'possible'},
{'id': 'malware--126826c5-cfdc-5970-a734-a4ce7d6d92f4', 'name': 'RAR', 'attribution_scope': 'possible'},
{'id': 'malware--934dcadf-f9a8-52c1-9c90-353a1c3144d5', 'name': 'PSEXEC', 'attribution_scope': 'possible'},
{'id': 'malware--0f315a7c-9bf4-58dc-8ea9-033355617485', 'name': 'PSINFO', 'attribution_scope': 'confirmed'},
{'id': 'malware--d84951d6-8f8a-5f7f-92cb-4fee4ef18664', 'name': 'LDIFDE', 'attribution_scope': 'confirmed'},
{'id': 'malware--4fb0b16d-53d6-56e5-975f-10458225f317', 'name': 'COBALTSTRIKE', 'attribution_scope': 'possible'},
{'id': 'malware--22055c71-bf62-5456-a5af-b7f298f47627', 'name': 'CMDEXE', 'attribution_scope': 'confirmed'},
{'id': 'malware--70e3757d-09ea-5267-9aa3-01be476b3dd9', 'name': 'XCMD', 'attribution_scope': 'confirmed'},
{'id': 'malware--82f2aa10-d254-5e1e-a1db-a0c822d4cef6', 'name': 'POWERSHELL', 'attribution_scope': 'possible'},
{'id': 'malware--f872b3e0-c277-5716-baae-885a9c410398', 'name': 'WHOAMI', 'attribution_scope': 'possible'},
{'id': 'malware--0bfd6f0b-4cdc-525c-b3e9-cf56d747f189', 'name': 'FGDUMP', 'attribution_scope': 'confirmed'},
{'id': 'malware--a73560d8-e4d4-5a38-8efc-bfe7b8e5aef6', 'name': 'PSFTP', 'attribution_scope': 'possible'},
{'id': 'malware--33e3fd12-4c4a-5824-a4e5-5ac35b308345', 'name': 'PWDUMP', 'attribution_scope': 'confirmed'},
{'id': 'malware--0c7945de-0968-55e3-ad4e-1600ddfc6b36', 'name': 'PROCDUMP', 'attribution_scope': 'possible'},
{'id': 'malware--57e5ea29-1c08-5f80-b28e-dd7ca373e4b7', 'name': 'ANGRYIP', 'attribution_scope': 'confirmed'},
{'id': 'malware--125d583e-0617-5192-bc27-9f3377bb98c3', 'name': 'WINRAR', 'attribution_scope': 'possible'},
{'id': 'malware--bf2fc1e5-7850-5ecd-87a7-263e6da5708d', 'name': 'MIMIKATZ', 'attribution_scope': 'confirmed'},
{'id': 'malware--ed8a8e26-0773-5fcf-b3f3-e17aac203fa3', 'name': 'SFXZIP', 'attribution_scope': 'confirmed'},
{'id': 'malware--0953f997-41ce-5fe2-804a-08fd8d567c29', 'name': 'PUTTY', 'attribution_scope': 'possible'},
{'id': 'malware--2db234c8-596a-58f9-a50f-ce24b58965cd', 'name': 'IMPACKET.SMBEXEC', 'attribution_scope': 'possible'},
{'id': 'malware--b2bb2d97-675e-5023-9cdd-a4274893b4a7', 'name': 'SFXRAR', 'attribution_scope': 'confirmed'}{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'APT1', 'entityAFamily': 'Indicator', 'entityAType': 'Threat Actor', 'entityB': 'AGEDMOAT', 'entityBFamily': 'Indicator', 'entityBType': 'Malware', 'fields': {}},
{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'APT1', 'entityAFamily': 'Indicator', 'entityAType': 'Threat Actor', 'entityB': 'AGEDSHOE', 'entityBFamily': 'Indicator', 'entityBType': 'Malware', 'fields': {}}0 Threat Actor APT1
#
mati-get-malwareGet information about a Malware Family from Mandiant
#
Base Commandmati-get-malware
#
InputArgument Name | Description | Required |
---|---|---|
malware_name | Name of the malware family to look up. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MANDIANTTI.Malware.value | String | The name of the Malware |
MANDIANTTI.Malware.fields.operatingsystemrefs | String | The Operating Systems impacted by the malware |
MANDIANTTI.Malware.fields.roles | String | The known roles of the Malware |
MANDIANTTI.Malware.fields.description | String | The description of the Malware |
MANDIANTTI.Malware.fields.Is Malware Family | String | Whether the Indicator is a Malware Family or a Tool |
MANDIANTTI.Malware.fields.publications.title | String | The name of the Malware |
MANDIANTTI.Malware.fields.publications.title | String | The title of a report associated with the Malware |
MANDIANTTI.Malware.fields.publications.link | String | The link to the report in Mandiant Advantage |
#
Command example!mati-get-malware malware_name=PoisonIvy
#
Context Example#
Human Readable Output#
Results
fields rawJSON relationships score type value operatingsystemrefs: Windows
aliases: Pivnoxy (Fortinet),
PIVY (LAC),
Pivy (Palo Alto Networks),
Pivydwnldr,
Poison Ivy,
Poison Ivy (JPCERT),
Poison Ivy (Proofpoint),
Poison Ivy (Symantec),
PoisonIvy,
Poisonivy (Check Point),
Poisonivy (Recorded Future),
Royal Road (Anomali),
Royal Road (Internet),
Spivy (Palo Alto Networks)
capabilities: {'name': 'Access raw disk', 'description': 'Capable of performing raw access to physical disks.'},
{'name': 'Allocates memory', 'description': 'Capable of allocating memory. '},
{'name': 'Capture operating system information', 'description': 'Can capture information about the system OS configuration.'}
tags: Aerospace & Defense,
Agriculture,
Automotive,
Chemicals & Materials,
Civil Society & Non-Profits,
Construction & Engineering,
Energy & Utilities,
Financial Services,
Governments,
Healthcare,
Hospitality,
Legal & Professional Services,
Manufacturing,
Media & Entertainment,
Oil & Gas,
Pharmaceuticals,
Retail,
Technology,
Telecommunications,
Transportation
mandiantdetections: APT.Backdoor.Win.POISONIVY,
POISON IVY (VARIANT),
FE_PoisonIVY_Stealer_Toolkit,
FE_APT_Backdoor_Win32_POISONIVY_1,
ET INFO SUSPICIOUS Dotted Quad Host MZ Response (ET OPEN),
ET POLICY PE EXE or DLL Windows file download HTTP (ET OPEN),
Backdoor.Win32.Poison.FEC2 (Trellix),
Trojan.APT.PoisonIvy,
Win.Dropper.Zusy-9801038-0 (ClamAV),
Backdoor.APT.PoisonIvy,
Win.Malware.Loader-9834612-0 (ClamAV),
Backdoor.Poison,
Backdoor.Win.PI.FEC2 (Trellix),
Trojan.Poison,
Trojan.PoisonIvy.DNS,
Win.Trojan.PoisonIvy-9755171-0 (ClamAV)
yara: ('FE_PoisonIVY_Stealer_Toolkit', 'signature--84b13cca-37e8-5c95-9471-b63dcaeb6df0'),
('FE_APT_Backdoor_Win32_POISONIVY_1', 'signature--22f52a69-ccc0-5763-bae7-c488ea856dae')
roles: Backdoor
stixid: malware--c14087e2-91dc-5a4c-a820-5eaa86ba4c99
name: {"POISONIVY": "POISONIVY"}
description: POISONIVY is a backdoor that exists as shellcode and communicates via a custom binary protocol over TCP. Additional shellcode plugins are downloaded, mapped directly into memory, and executed. Observed plugin functionality includes reverse shell, keylogging, video capture, audio capture, and registry manipulation. POISONIVY is configured, built, and controlled using a publicly available management interface. The interface produces the shellcode that must be included in, or executed by, a separate application.
updateddate: 2023-03-06T02:29:14.000Z
lastseenbysource: 2023-03-06T02:29:14.000Z
trafficlightprotocol: AMBER
Is Malware Family: true
DBot Score: {"Indicator": null, "Type": "Malware", "Vendor": "Mandiant", "Score": 0, "Reliability": "A - Completely reliable"}
publications: {'source': 'Mandiant', 'title': 'Country Profile: India (2022)', 'link': 'https://advantage.mandiant.com/reports/22-00022357', 'timestamp': 1668046325.0},
{'source': 'Mandiant', 'title': 'Supply Chain Compromise Trends, 2019–2020', 'link': 'https://advantage.mandiant.com/reports/21-00010407', 'timestamp': 1648063696.0}actors: {'id': 'threat-actor--0ac5c1db-8ad6-54b8-b4b9-c32fc738c54a', 'name': 'APT1', 'country_name': 'China', 'iso2': 'CN', 'last_updated': '2023-02-23T14:17:35Z'},
{'id': 'threat-actor--bf9da649-f617-5464-9442-93e69cb80aa9', 'name': 'APT10', 'country_name': 'China', 'iso2': 'CN', 'last_updated': '2023-01-28T06:02:22Z'}
audience: {'name': 'intel_fusion', 'license': 'INTEL_RBI_FUS'},
{'name': 'intel_oper', 'license': 'INTEL_RBI_OPS'},
{'name': 'tlp_marking', 'license': 'amber'}
description: POISONIVY is a backdoor that exists as shellcode and communicates via a custom binary protocol over TCP. Additional shellcode plugins are downloaded, mapped directly into memory, and executed. Observed plugin functionality includes reverse shell, keylogging, video capture, audio capture, and registry manipulation. POISONIVY is configured, built, and controlled using a publicly available management interface. The interface produces the shellcode that must be included in, or executed by, a separate application.
detections: APT.Backdoor.Win.POISONIVY,
POISON IVY (VARIANT),
FE_PoisonIVY_Stealer_Toolkit,
FE_APT_Backdoor_Win32_POISONIVY_1,
ET INFO SUSPICIOUS Dotted Quad Host MZ Response (ET OPEN),
ET POLICY PE EXE or DLL Windows file download HTTP (ET OPEN),
Backdoor.Win32.Poison.FEC2 (Trellix),
Trojan.APT.PoisonIvy,
Win.Dropper.Zusy-9801038-0 (ClamAV),
Backdoor.APT.PoisonIvy,
Win.Malware.Loader-9834612-0 (ClamAV),
Backdoor.Poison,
Backdoor.Win.PI.FEC2 (Trellix),
Trojan.Poison,
Trojan.PoisonIvy.DNS,
Win.Trojan.PoisonIvy-9755171-0 (ClamAV)
id: malware--c14087e2-91dc-5a4c-a820-5eaa86ba4c99
industries: {'id': 'identity--cc593632-0c42-500c-8d0b-d38e97b90f1d', 'name': 'Aerospace & Defense'},
{'id': 'identity--cd044760-0aef-557e-94c4-bc672ea177c2', 'name': 'Agriculture'}
inherently_malicious: 1
last_activity_time: 2023-03-06T02:29:14.000Z
last_updated: 2023-03-06T02:29:14.000Z
malware: {'id': 'malware--709f2440-b4fa-5017-991e-b4a5b22b5fd9', 'name': 'CRABREST'},
{'id': 'malware--6e812e51-feb9-54fb-8372-8e38aaead41d', 'name': 'EASYCHAIR'}
name: POISONIVY
operating_systems: Windows
type: malware
yara: {'id': 'signature--84b13cca-37e8-5c95-9471-b63dcaeb6df0', 'name': 'FE_PoisonIVY_Stealer_Toolkit'},
{'id': 'signature--22f52a69-ccc0-5763-bae7-c488ea856dae', 'name': 'FE_APT_Backdoor_Win32_POISONIVY_1'}
is_publishable: true
counts: {"reports": 25, "capabilities": 42, "malware": 21, "actors": 27, "detections": 16, "cve": 11, "aliases": 14, "industries": 20, "attack_patterns": 68}
aliases: {'name': 'Pivnoxy (Fortinet)'},
{'name': 'PIVY (LAC)'}
capabilities: {'name': 'Access raw disk', 'description': 'Capable of performing raw access to physical disks.'},
{'name': 'Allocates memory', 'description': 'Capable of allocating memory. '}
cve: {'id': 'vulnerability--e0b130b7-1772-5c4d-891c-9c48eb1a5a23', 'cve_id': 'CVE-2012-0158'},
{'id': 'vulnerability--74c54fd3-dbc9-5273-88c6-b47975fca9b6', 'cve_id': 'CVE-2015-2545'},
{'id': 'vulnerability--005f9d5c-0298-52ea-b7d4-003fb7729586', 'cve_id': 'CVE-2018-0798'}
roles: Backdoor{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'POISONIVY', 'entityAFamily': 'Indicator', 'entityAType': 'Malware', 'entityB': 'APT1', 'entityBFamily': 'Indicator', 'entityBType': 'Threat Actor', 'fields': {}},
{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'POISONIVY', 'entityAFamily': 'Indicator', 'entityAType': 'Malware', 'entityB': 'APT10', 'entityBFamily': 'Indicator', 'entityBType': 'Threat Actor', 'fields': {}}0 Malware POISONIVY
#
fileRetrieve information about a File Hash from Mandiant
#
Base Commandfile
#
InputArgument Name | Description | Required |
---|---|---|
file | List of files. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MANDIANTTI.FILE.score | Number | The Severity Score of the File indicator |
MANDIANTTI.FILE.fields.md5 | String | The MD5 Hash associated with the File indicator |
MANDIANTTI.FILE.fields.sha256 | String | The SHA256 Hash associated with the File indicator |
MANDIANTTI.FILE.fields.sha1 | String | The SHA1 Hash associated with the File indicator |
File.MD5 | String | MD5 hash of the file submitted for analysis. |
File.SHA1 | String | SHA1 hash of the file submitted for analysis. |
File.SHA256 | String | SHA256 hash of the file submitted for analysis. |
DBotScore.Score | number | The actual score. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Indicator | String | The indicator that was tested. |
#
Command example!file file=9c944bd7a0af0ebd8a52f16d2e09f4ae
#
Context Example#
Human Readable Output#
Results
fields rawJSON relationships score type value firstseenbysource: 2016-06-09T16:27:25.000Z
lastseenbysource: 2016-06-09T16:27:25.000Z
stixid: md5--381c455d-58ba-51e0-89fa-74534671c9fc
trafficlightprotocol: AMBER
DBotScore: {"Indicator": "9c944bd7a0af0ebd8a52f16d2e09f4ae", "Type": "file", "Vendor": "Mandiant", "Score": 3, "Reliability": "A - Completely reliable"}
md5: 9c944bd7a0af0ebd8a52f16d2e09f4ae
sha256: 74bb66638683a1a3b6b64d4b90b7979f60e9269418fc07b17eacfd3324688a5e
sha1: 03b89c5e964113cb25bf6581d35ca3db97692ae2id: md5--381c455d-58ba-51e0-89fa-74534671c9fc
mscore: 100
type: md5
value: 9c944bd7a0af0ebd8a52f16d2e09f4ae
is_publishable: true
sources: {'first_seen': '2016-06-09T16:27:25.000+0000', 'last_seen': '2016-06-09T16:27:25.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'},
{'first_seen': '2016-06-09T16:27:25.000+0000', 'last_seen': '2016-06-09T16:27:25.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'}
associated_hashes: {'id': 'md5--381c455d-58ba-51e0-89fa-74534671c9fc', 'type': 'md5', 'value': '9c944bd7a0af0ebd8a52f16d2e09f4ae'},
{'id': 'sha1--2d3d8372-ecef-50bb-947b-8c004c6489dc', 'type': 'sha1', 'value': '03b89c5e964113cb25bf6581d35ca3db97692ae2'},
{'id': 'sha256--55212b49-045d-5f74-a9c7-37907e016e6a', 'type': 'sha256', 'value': '74bb66638683a1a3b6b64d4b90b7979f60e9269418fc07b17eacfd3324688a5e'}
misp: {"akamai": false, "alexa": false, "alexa_1M": false, "amazon-aws": false, "apple": false, "automated-malware-analysis": false, "bank-website": false, "cisco_1M": false, "cisco_top1000": false, "cisco_top10k": false, "cisco_top20k": false, "cisco_top5k": false, "cloudflare": false, "common-contact-emails": false, "common-ioc-false-positive": false, "covid": false, "covid-19-cyber-threat-coalition-whitelist": false, "covid-19-krassi-whitelist": false, "crl-hostname": false, "crl-ip": false, "dax30": false, "disposable-email": false, "dynamic-dns": false, "eicar.com": false, "empty-hashes": false, "fastly": false, "google": false, "google-gcp": false, "google-gmail-sending-ips": false, "googlebot": false, "ipv6-linklocal": false, "majestic_million": false, "majestic_million_1M": false, "microsoft": false, "microsoft-attack-simulator": false, "microsoft-azure": false, "microsoft-azure-china": false, "microsoft-azure-germany": false, "microsoft-azure-us-gov": false, "microsoft-office365": false, "microsoft-office365-cn": false, "microsoft-office365-ip": false, "microsoft-win10-connection-endpoints": false, "moz-top500": false, "mozilla-CA": false, "mozilla-IntermediateCA": false, "multicast": false, "nioc-filehash": false, "ovh-cluster": false, "phone_numbers": false, "public-dns-hostname": false, "public-dns-v4": false, "public-dns-v6": false, "rfc1918": false, "rfc3849": false, "rfc5735": false, "rfc6598": false, "rfc6761": false, "second-level-tlds": false, "security-provider-blogpost": false, "sinkholes": false, "smtp-receiving-ips": false, "smtp-sending-ips": false, "stackpath": false, "ti-falsepositives": false, "tlds": false, "tranco": false, "tranco10k": false, "university_domains": false, "url-shortener": false, "vpn-ipv4": false, "vpn-ipv6": false, "whats-my-ip": false, "wikimedia": false}
last_updated: 2022-02-21T02:46:13.698Z
first_seen: 2016-06-09T16:27:25.000Z
last_seen: 2016-06-09T16:27:25.000Z
campaigns:
publications:3 File 9c944bd7a0af0ebd8a52f16d2e09f4ae
#
ipRetrieve information about an IP Address from Mandiant
#
Base Commandip
#
InputArgument Name | Description | Required |
---|---|---|
ip | List of IPs. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MANDIANTTI.IP.score | Number | The Severity Score of the IP indicator |
MANDIANTTI.IP.fields.ip | String | The IP address of the IP indicator |
DBotScore.Score | number | The actual score. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Indicator | String | The indicator that was tested. |
IP.Address | string | IP address |
#
Command example!ip ip=124.248.207.50
#
Context Example#
Human Readable Output#
Results
fields rawJSON relationships score type value firstseenbysource: 2016-06-09T16:28:01.000Z
lastseenbysource: 2018-04-19T17:23:59.000Z
stixid: ipv4--3a4d8f76-6fde-5b25-9672-a45a0ac16bc8
trafficlightprotocol: AMBER
DBotScore: {"Indicator": "124.248.207.50", "Type": "ip", "Vendor": "Mandiant", "Score": 2, "Reliability": "A - Completely reliable"}
ip: 124.248.207.50id: ipv4--3a4d8f76-6fde-5b25-9672-a45a0ac16bc8
mscore: 52
type: ipv4
value: 124.248.207.50
is_exclusive: false
is_publishable: true
sources: {'first_seen': '2018-01-08T21:29:53.000+0000', 'last_seen': '2018-04-19T17:23:59.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'},
{'first_seen': '2016-06-09T16:28:01.000+0000', 'last_seen': '2016-06-09T16:28:01.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'}
attributed_associations: {'id': 'threat-actor--3790b99d-7067-536c-821d-19953727bf7b', 'name': 'Turla Team', 'type': 'threat-actor'}
misp: {"akamai": false, "alexa": false, "alexa_1M": false, "amazon-aws": false, "apple": false, "automated-malware-analysis": false, "bank-website": false, "cisco_1M": false, "cisco_top1000": false, "cisco_top10k": false, "cisco_top20k": false, "cisco_top5k": false, "cloudflare": false, "common-contact-emails": false, "common-ioc-false-positive": false, "covid": false, "covid-19-cyber-threat-coalition-whitelist": false, "covid-19-krassi-whitelist": false, "crl-hostname": false, "crl-ip": false, "dax30": false, "disposable-email": false, "dynamic-dns": false, "eicar.com": false, "empty-hashes": false, "fastly": false, "google": false, "google-gcp": false, "google-gmail-sending-ips": false, "googlebot": false, "ipv6-linklocal": false, "majestic_million": false, "majestic_million_1M": false, "microsoft": false, "microsoft-attack-simulator": false, "microsoft-azure": false, "microsoft-azure-china": false, "microsoft-azure-germany": false, "microsoft-azure-us-gov": false, "microsoft-office365": false, "microsoft-office365-cn": false, "microsoft-office365-ip": false, "microsoft-win10-connection-endpoints": false, "moz-top500": false, "mozilla-CA": false, "mozilla-IntermediateCA": false, "multicast": false, "nioc-filehash": false, "ovh-cluster": false, "phone_numbers": false, "public-dns-hostname": false, "public-dns-v4": false, "public-dns-v6": false, "rfc1918": false, "rfc3849": false, "rfc5735": false, "rfc6598": false, "rfc6761": false, "second-level-tlds": false, "security-provider-blogpost": false, "sinkholes": false, "smtp-receiving-ips": false, "smtp-sending-ips": false, "stackpath": false, "ti-falsepositives": false, "tlds": false, "tranco": false, "tranco10k": false, "university_domains": false, "url-shortener": false, "vpn-ipv4": false, "vpn-ipv6": false, "whats-my-ip": false, "wikimedia": false}
last_updated: 2022-05-14T10:15:13.771Z
first_seen: 2016-06-09T16:28:01.000Z
last_seen: 2018-04-19T17:23:59.000Z
campaigns:
publications:2 IP 124.248.207.50
#
urlRetrieve information about a URL from Mandiant
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
#
Base Commandurl
#
InputArgument Name | Description | Required |
---|---|---|
url | List of URLs. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MANDIANTTI.URL.score | Number | The Severity Score of the URL indicator |
MANDIANTTI.URL.fields.url | String | The URL value for the Domain indicator |
URL.Data | String | URL data. |
DBotScore.Score | number | The actual score. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Indicator | String | The indicator that was tested. |
#
Command example!url url=http://67.205.132.162/a.txt
#
Context Example#
Human Readable Output#
Results
fields rawJSON relationships score type value firstseenbysource: 2021-06-14T17:46:19.000Z
lastseenbysource: 2021-06-14T17:46:41.000Z
stixid: url--e5cc1f98-a9db-5e45-88c3-957fec8f274d
trafficlightprotocol: AMBER
DBotScore: {"Indicator": "http://67.205.132.162/a.txt", "Type": "url", "Vendor": "Mandiant", "Score": 3, "Reliability": "A - Completely reliable"}
url: http://67.205.132.162/a.txtid: url--e5cc1f98-a9db-5e45-88c3-957fec8f274d
mscore: 100
type: url
value: http://67.205.132.162/a.txt
is_exclusive: true
is_publishable: true
sources: {'first_seen': '2021-06-14T17:46:19.000+0000', 'last_seen': '2021-06-14T17:46:41.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'}
attributed_associations: {'id': 'threat-actor--9c88bd9c-f41b-59fa-bfb6-427b1755ea64', 'name': 'APT41', 'type': 'threat-actor'}
misp: {"akamai": false, "alexa": false, "alexa_1M": false, "amazon-aws": false, "apple": false, "automated-malware-analysis": false, "bank-website": false, "cisco_1M": false, "cisco_top1000": false, "cisco_top10k": false, "cisco_top20k": false, "cisco_top5k": false, "cloudflare": false, "common-contact-emails": false, "common-ioc-false-positive": false, "covid": false, "covid-19-cyber-threat-coalition-whitelist": false, "covid-19-krassi-whitelist": false, "crl-hostname": false, "crl-ip": false, "dax30": false, "disposable-email": false, "dynamic-dns": false, "eicar.com": false, "empty-hashes": false, "fastly": false, "google": false, "google-gcp": false, "google-gmail-sending-ips": false, "googlebot": false, "ipv6-linklocal": false, "majestic_million": false, "majestic_million_1M": false, "microsoft": false, "microsoft-attack-simulator": false, "microsoft-azure": false, "microsoft-azure-china": false, "microsoft-azure-germany": false, "microsoft-azure-us-gov": false, "microsoft-office365": false, "microsoft-office365-cn": false, "microsoft-office365-ip": false, "microsoft-win10-connection-endpoints": false, "moz-top500": false, "mozilla-CA": false, "mozilla-IntermediateCA": false, "multicast": false, "nioc-filehash": false, "ovh-cluster": false, "phone_numbers": false, "public-dns-hostname": false, "public-dns-v4": false, "public-dns-v6": false, "rfc1918": false, "rfc3849": false, "rfc5735": false, "rfc6598": false, "rfc6761": false, "second-level-tlds": false, "security-provider-blogpost": false, "sinkholes": false, "smtp-receiving-ips": false, "smtp-sending-ips": false, "stackpath": false, "tenable-cloud-ipv4": false, "tenable-cloud-ipv6": false, "ti-falsepositives": false, "tlds": false, "tranco": false, "tranco10k": false, "university_domains": false, "url-shortener": false, "vpn-ipv4": true, "vpn-ipv6": false, "whats-my-ip": false, "wikimedia": false}
last_updated: 2022-10-10T23:04:53.568Z
first_seen: 2021-06-14T17:46:19.000Z
last_seen: 2021-06-14T17:46:41.000Z
campaigns: {'id': 'campaign--c344bb9b-cb50-58be-9c33-350b622c1fce', 'name': 'CAMP.21.014', 'title': 'APT41 Exploition of .NET Web Applications at U.S. State Governments'}
publications:{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'http://67.205.132.162/a.txt', 'entityAFamily': 'Indicator', 'entityAType': 'URL', 'entityB': 'CAMP.21.014', 'entityBFamily': 'Indicator', 'entityBType': 'Campaign', 'fields': {}} 3 URL http://67.205.132.162/a.txt
#
domainRetrieve information about an FQDN from Mandiant
Notice: Submitting indicators using this command might make the indicator data publicly available. See the vendor’s documentation for more details.
#
Base Commanddomain
#
InputArgument Name | Description | Required |
---|---|---|
domain | List of domains. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MANDIANTTI.DOMAIN.score | Number | The Severity Score of the Domain indicator |
MANDIANTTI.DOMAIN.fields.dns | String | The DNS record value for the Domain indicator |
MANDIANTTI.DOMAIN.fields.domain | String | The domain name for the Domain indicator |
DBotScore.Score | number | The actual score. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Indicator | String | The indicator that was tested. |
Domain.Name | string | The Domain being checked |
#
Command example!domain domain=2011.my03.com
#
Context Example#
Human Readable Output#
Results
fields rawJSON relationships score type value firstseenbysource: 2016-06-09T16:28:00.000Z
lastseenbysource: 2023-01-23T16:52:33.000Z
stixid: fqdn--3c525155-bc95-511d-a717-83e50e20aa14
trafficlightprotocol: AMBER
DBotScore: {"Indicator": "2011.my03.com", "Type": "domain", "Vendor": "Mandiant", "Score": 0, "Reliability": "A - Completely reliable"}
dns: 2011.my03.com
domain: 2011.my03.comid: fqdn--3c525155-bc95-511d-a717-83e50e20aa14
mscore: 50
type: fqdn
value: 2011.my03.com
is_publishable: true
sources: {'first_seen': '2023-01-23T16:52:33.000+0000', 'last_seen': '2023-01-23T16:52:33.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'},
{'first_seen': '2016-06-09T16:28:00.000+0000', 'last_seen': '2016-06-09T16:28:00.000+0000', 'osint': False, 'category': [], 'source_name': 'Mandiant'}
misp: {"akamai": false, "alexa": false, "alexa_1M": false, "amazon-aws": false, "apple": false, "automated-malware-analysis": false, "bank-website": false, "captive-portals": false, "cisco_1M": true, "cisco_top1000": false, "cisco_top10k": false, "cisco_top20k": false, "cisco_top5k": false, "cloudflare": false, "common-contact-emails": false, "common-ioc-false-positive": false, "covid": false, "covid-19-cyber-threat-coalition-whitelist": false, "covid-19-krassi-whitelist": false, "crl-hostname": false, "crl-ip": false, "dax30": false, "disposable-email": false, "dynamic-dns": false, "eicar.com": false, "empty-hashes": false, "fastly": false, "google": false, "google-chrome-crux-1million": false, "google-gcp": false, "google-gmail-sending-ips": false, "googlebot": false, "ipv6-linklocal": false, "majestic_million": false, "majestic_million_1M": false, "microsoft": false, "microsoft-attack-simulator": false, "microsoft-azure": false, "microsoft-azure-appid": false, "microsoft-azure-china": false, "microsoft-azure-germany": false, "microsoft-azure-us-gov": false, "microsoft-office365": false, "microsoft-office365-cn": false, "microsoft-office365-ip": false, "microsoft-win10-connection-endpoints": false, "moz-top500": false, "mozilla-CA": false, "mozilla-IntermediateCA": false, "multicast": false, "nioc-filehash": false, "ovh-cluster": false, "parking-domain": false, "parking-domain-ns": false, "phone_numbers": false, "public-dns-hostname": false, "public-dns-v4": false, "public-dns-v6": false, "public-ipfs-gateways": false, "rfc1918": false, "rfc3849": false, "rfc5735": false, "rfc6598": false, "rfc6761": false, "second-level-tlds": true, "security-provider-blogpost": false, "sinkholes": false, "smtp-receiving-ips": false, "smtp-sending-ips": false, "stackpath": false, "tenable-cloud-ipv4": false, "tenable-cloud-ipv6": false, "ti-falsepositives": false, "tlds": true, "tranco": true, "tranco10k": false, "university_domains": false, "url-shortener": false, "vpn-ipv4": false, "vpn-ipv6": false, "whats-my-ip": false, "wikimedia": false}
last_updated: 2023-02-20T18:43:42.349Z
first_seen: 2016-06-09T16:28:00.000Z
last_seen: 2023-01-23T16:52:33.000Z
campaigns:
publications:0 Domain 2011.my03.com
#
cveRetrieve information about a Vulnerability (by CVE) from Mandiant
#
Base Commandcve
#
InputArgument Name | Description | Required |
---|---|---|
cve | List of CVEs. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
MANDIANTTI.CVE.score | Number | The Severity Score of the CVE |
MANDIANTTI.CVE.id | String | The CVE ID |
MANDIANTTI.CVE.fields.cvss | String | The CVSS version of the CVE |
MANDIANTTI.CVE.fields.cvssvector | String | The CVSS vector string for the CVE |
MANDIANTTI.CVE.fields.cvss2.metric | String | The name of the CVSS metric |
MANDIANTTI.CVE.fields.cvss2.values | String | The values of the CVSS metric |
DBotScore.Score | number | The actual score. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Indicator | String | The indicator that was tested. |
#
Command example!cve cve=CVE-2018-8120
#
Context Example#
Human Readable Output#
Results
fields rawJSON relationships score type value stixid: vulnerability--6dc0a4db-e822-5c76-bca2-b7eb750da2ad
trafficlightprotocol: AMBER
DBotScore: {"Indicator": null, "Type": "cve", "Vendor": "Mandiant", "Score": 0, "Reliability": "A - Completely reliable"}
id: null
cvss: v2.0
cvssvector: AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C
cvss2: {'metric': 'Access Complexity', 'values': 'MEDIUM'},
{'metric': 'Access Vector', 'values': 'LOCAL'},
{'metric': 'Authentication', 'values': 'NONE'},
{'metric': 'Availability Impact', 'values': 'COMPLETE'},
{'metric': 'Base Score', 'values': 6.9},
{'metric': 'Confidentiality Impact', 'values': 'COMPLETE'},
{'metric': 'Exploitability', 'values': 'FUNCTIONAL'},
{'metric': 'Integrity Impact', 'values': 'COMPLETE'},
{'metric': 'Remediation Level', 'values': 'OFFICIAL_FIX'},
{'metric': 'Report Confidence', 'values': 'CONFIRMED'},
{'metric': 'Temporal Score', 'values': 5.7},
{'metric': 'Vector String', 'values': 'AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C'}id: vulnerability--6dc0a4db-e822-5c76-bca2-b7eb750da2ad
type: vulnerability
is_publishable: true
risk_rating: MEDIUM
analysis:An attacker could exploit this vulnerability to execute arbitrary code. An attacker would need to gain low privilege access to the vulnerable system to exploit this issue. Further, upon obtaining the low privilege access, an attacker would need to craft a program which can change the privilege of the current process, using the call gate functions. A failed attempt at exploitation could potentially cause a crash of the application, resulting in a denial-of-service condition.
Â
A non-weaponized exploit is publicly available on VirusTotal, in the form of a PDF sample. This exploit code creates a new windowstation object and assigns it to the current process in user-mode, making the spklList Pointer field equal to zero. This code writes an arbitrary address in the kernel space by mapping the NULL page and setting a pointer to offset 0x2C. Upon writing an arbitrary address, the attacker changes the privilege level of a process by setting call gate to Ring 0. Further, the exploit uses the CALL FAR instruction to perform an inter-privilege level call, giving an attacker administrative access on the system. A similar exploit code is also publicly available via GitHub.
Â
An exploit code in the form of a Metasploit module has been publicly released. This exploit can trigger the null pointer dereference issue which is caused when the Win32k component does not properly handle objects in memory. Successful exploitation via this code will allow an attacker to perform privileged tasks on the compromised machine.
Â
Microsoft has reported this vulnerability has been exploited. Additionally, it is reported that threat actor ScarCruft is utilizing the publicly available exploit code to drop a backdoor, known as ROKRAT, used for data exfiltration. FireEye tracks most elements of the group publicly reported as Scarcruft as APT37 (Reaper).
Â
Trend Micro has reported observation of a malverstising campaign at the end of October 2019 using an exploit kit they refer to as Capesand to deliver DarkRAT and njRAT malware. This vulnerability was reportedly leveraged after successful exploitation via Capesand in order to gain escalated privileges and execute njcrypt.exe.
Â
No workaround is available, although the Microsoft reportedly addressed this vulnerability in a fix. FireEye iSIGHT Intelligence considers this a Medium-risk vulnerability because of possibility of arbitrary code execution offset by the local access required.
CISA added this vulnerability to its Known Exploited Vulnerabilities Catalog on March 15, 2022, with a required remediation date of April 5, 2022.
executive_summary:A null pointer dereference vulnerability exists in the NtUserSetImeInfoEx() function within the Win32k component in Microsoft Windows Server 2008 and earlier that, when exploited, allows an attacker to locally gain elevated privileges. Exploit code is publicly available and Microsoft reported that this vulnerability has been exploited in the wild. Mitigation options include a vendor fix. Exploitation Rating: Confirmed
description:Windows is the flagship operating system by Microsoft.
Â
A vulnerability exists in the NtUserSetImeInfoEx() function within the win32k kernel component in Microsoft Windows Server. The issue occurs because the SetImeInfoEx subroutine, within the NtUserSetImeInfoEx() function, does not validate a data pointer, this results in issue where an application dereferences a pointer which is Null.
exploitation_vectors: Local Access
title: Microsoft Windows Server 2008 NtUserSetImeInfoEx() Null Pointer Dereference Vulnerability
associated_actors: {'last_updated': '2023-03-04T07:03:58Z', 'aliases': [{'name': 'Odinaff (Symantec)', 'attribution_scope': 'confirmed'}, {'name': 'Sectoj04 (NSHC Group)', 'attribution_scope': 'confirmed'}, {'name': 'TA505 (Proofpoint)', 'attribution_scope': 'confirmed'}, {'name': 'TEMP.Warlock', 'attribution_scope': 'confirmed'}, {'name': 'Ta505 (Norfolkinfosec)', 'attribution_scope': 'confirmed'}, {'name': 'Ta505 (Trend Micro)', 'attribution_scope': 'confirmed'}], 'name': 'FIN11', 'description': "FIN11 is a financially motivated threat group that has conducted some of the largest and longest running malware distribution campaigns observed amongst our FIN groups to date. Mandiant has observed FIN11 attempt to monetize their operations at least once using named point-of-sale (POS) malware, and more recently using CLOP ransomware and/or data theft extortion. The volume of FIN11's high-volume spam campaigns slowed in 2021, before ceasing altogether in 2022, when the group shifted to server exploitation for initial access. The group has been active since at least 2016, but identified overlaps with activity tracked by security researchers as TA505 suggest they may have been conducting operations as early as 2014.", 'id': 'threat-actor--b8ee8129-5ecc-581a-a636-fb17051d2ffe', 'intel_free': False, 'country_code': 'unknown'}
associated_malware: {'last_updated': '2023-03-06T02:10:40.000Z', 'aliases': [], 'name': 'BADPOTATO', 'description': 'BADPOTATO is a publicly available privilege escalation tool that abuses Impersonation Privileges on Windows 10 and Windows Server 2019. ', 'id': 'malware--8e99e597-dda4-57dc-be6e-f1bc8b80a5f3', 'intel_free': False, 'has_yara': True, 'is_malicious': True},
{'last_updated': '2023-03-06T02:13:12.000Z', 'aliases': [], 'name': 'COMAHAWK', 'description': 'COMAHAWK is a privilege escalation tool that attempts to exploit CVE-2019-1405 and CVE-2019-1322.', 'id': 'malware--0073c12d-177a-5353-8170-e72ac8fc75bb', 'intel_free': False, 'has_yara': True, 'is_malicious': True}
associated_reports: {'report_id': '18-00007543', 'report_type': 'Patch Report', 'title': 'Microsoft May 2018 Security Advisory Release', 'published_date': '2018-05-08T23:36:07.596Z', 'audience': ['vulnerability']},
{'report_id': '19-00009557', 'report_type': 'Trends and Forecasting', 'title': 'May 2019 Month in Vulnerabilities', 'published_date': '2019-06-12T13:15:13.875Z', 'audience': ['vulnerability']},
{'report_id': '19-00021769', 'report_type': 'Trends and Forecasting', 'title': 'Analysis of Time to Exploit in Tracked Vulnerabilities Exploited in 2018–2019', 'published_date': '2019-12-18T13:16:56.301Z', 'audience': ['strategic', 'vulnerability']},
{'report_id': '18-00017419', 'report_type': 'Trends and Forecasting', 'title': 'Operational Net Assessment of Cyber Crime ThreatsâJuly to September 2018', 'published_date': '2018-10-19T20:32:50.054Z', 'audience': ['cyber crime', 'fusion']},
{'report_id': '18-00009795', 'report_type': 'Vulnerability Report', 'title': 'May 2018 Month in Vulnerabilities', 'published_date': '2018-06-18T23:04:39.328Z', 'audience': ['vulnerability']},
{'report_id': '18-00010584', 'report_type': 'Threat Activity Alert', 'title': 'Threat Activity Alert: Russian-Speaking Actor Advertises a Malicious PDF Builder with CVE-2018-4990 and CVE-2018-8120 Exploits', 'published_date': '2018-06-28T18:46:09.706Z', 'audience': ['cyber crime', 'fusion', 'vulnerability']},
{'report_id': '19-00002007', 'report_type': 'Actor Profile', 'title': 'Threat Actor Profile: GandCrab ', 'published_date': '2019-02-05T22:02:15.475Z', 'audience': ['cyber crime', 'fusion']},
{'report_id': '18-00017293', 'report_type': 'Trends and Forecasting', 'title': 'Monthly Report on Cyber Crime Threats to the Financial Sector – September 2018', 'published_date': '2018-10-16T18:37:46.427Z', 'audience': ['cyber crime', 'fusion']},
{'report_id': '18-00007690', 'report_type': 'Vulnerability Report', 'title': 'Microsoft Windows Server 2008 NtUserSetImeInfoEx() Null Pointer Dereference Vulnerability', 'published_date': '2022-04-05T14:17:42.242Z', 'audience': ['vulnerability']},
{'report_id': '18-00003542', 'report_type': 'Malware Profile', 'title': 'GandCrab Ransomware Malware Profile', 'published_date': '2019-12-16T19:20:00.473Z', 'audience': ['cyber crime', 'operational']}
exploitation_consequence: Code Execution
cwe: Null Pointer Dereference
cve_id: CVE-2018-8120
vulnerable_products:Microsoft reports that the following products and versions are vulnerable:
- Windows 7 for 32-bit Systems Service Pack 1
- Windows 7 for x64-based Systems Service Pack 1
- Windows Server 2008 for 32-bit Systems Service Pack2
- Windows Server 2008 for Itanium-based Systems Service Pack2
- Windows Server 2008 for x64-based Systems Service Pack2
- Windows Server 2008 for R2 for Itanium-based Systems Service Pack 1
- Windows Server 2008 for x64-based Systems Service Pack 1
exploitation_state: Confirmed
vendor_fix_references: {'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120', 'name': 'Microsoft Security Update Information', 'unique_id': ''}
date_of_disclosure: 2018-05-04T06:00:00.000Z
observed_in_the_wild: true
vulnerable_cpes: {'vendor_name': 'microsoft', 'technology_name': 'windows_server_2008 r2', 'cpe': 'cpe:2.3â•microsoft:windows_server_2008:r2:sp1:itanium:::::', 'cpe_title': 'microsoft windows_server_2008 r2'},
{'vendor_name': 'microsoft', 'technology_name': 'windows_server_2008 sp2', 'cpe': 'cpe:2.3â•microsoft:windows_server_2008:sp2::x64:::::', 'cpe_title': 'microsoft windows_server_2008 sp2'},
{'vendor_name': 'microsoft', 'technology_name': 'windows_server_2008 r2', 'cpe': 'cpe:2.3â•microsoft:windows_server_2008:r2:sp1:x64:::::', 'cpe_title': 'microsoft windows_server_2008 r2'},
{'vendor_name': 'microsoft', 'technology_name': 'windows_7 -', 'cpe': 'cpe:2.3â•microsoft:windows_7:-:sp1:x64:::::', 'cpe_title': 'microsoft windows_7 -'},
{'vendor_name': 'microsoft', 'technology_name': 'windows_server_2008 -', 'cpe': 'cpe:2.3â•microsoft:windows_server_2008:-:sp2:itanium:::::', 'cpe_title': 'microsoft windows_server_2008 -'},
{'vendor_name': 'microsoft', 'technology_name': 'windows_server_2008 -', 'cpe': 'cpe:2.3â•microsoft:windows_server_2008:-:sp2::::::', 'cpe_title': 'microsoft windows_server_2008 -'},
{'vendor_name': 'microsoft', 'technology_name': 'windows_7 -', 'cpe': 'cpe:2.3â•microsoft:windows_7:-:sp1:x86:::::*', 'cpe_title': 'microsoft windows_7 -'}
was_zero_day: true
workarounds:Aside from the available vendor fix, FireEye iSIGHT Intelligence is unaware of any alternate mitigation procedures for this vulnerability.
publish_date: 2022-04-05T14:17:00.000Z
updated_date: 2022-04-05T14:17:00.000Z
last_modified_date: 2022-12-09T02:36:33.290Z
available_mitigation: Patch
sources: {'source_name': 'Microsoft Corp.', 'source_description': 'CVE-2018-8120', 'date': '2018-05-08T17:00:00.000Z', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120', 'is_vendor_fix': False},
{'source_name': 'WeLiveSecurity', 'source_description': 'A tale of two zero-days', 'date': '2018-05-15T16:00:00.000Z', 'url': 'https://www.welivesecurity.com/2018/05/15/tale-two-zero-days/', 'is_vendor_fix': False},
{'source_name': 'Kaspersky Lab', 'date': '2019-05-13T16:00:00.000Z', 'url': 'https://securelist.com/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/', 'is_vendor_fix': False},
{'source_name': 'Trend Micro', 'source_description': 'New Exploit Kit Capesand Reuses Old and New Public Exploits and Tools, Blockchain Ruse', 'date': '2019-11-05T05:00:00.000Z', 'url': 'https://blog.trendmicro.com/trendlabs-security-intelligence/new-exploit-kit-capesand-reuses-old-and-new-public-exploits-and-tools-blockchain-ruse/', 'is_vendor_fix': False},
{'source_name': 'CISA', 'source_description': 'CISA Known Exploited Vulnerabilities Catalog', 'date': '2022-03-15T12:00:00.000Z', 'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog', 'is_vendor_fix': False},
{'source_name': 'Tenable Inc.', 'date': '2022-03-24T04:00:00.000Z', 'url': 'https://www.tenable.com/blog/contileaks-chats-reveal-over-30-vulnerabilities-used-by-conti-ransomware-affiliates', 'is_vendor_fix': False}
exploits: {'name': 'ms18_8120_win32k_privesc.rb', 'description': 'This exploit is a Metasploit module that can trigger the null pointer dereference issue on an affected server and yield an attacker elevated privileges on the affected system.', 'reliability': 'Untested', 'file_size': 4498, 'md5': '5dd08479823a39d8d808ead98110a070', 'release_date': '2018-10-20T06:00:00Z', 'exploit_url': 'https://www.exploit-db.com/exploits/45653/', 'replication_urls': [], 'grade': '', 'hashes': {}},
{'name': 'CVE-2018-8120_exploit', 'description': 'This exploit will trigger this vulnerability to gain elevated privileges.', 'reliability': 'Untested', 'file_size': 13367, 'md5': '1A0D48A31B50691F8613B31A53C4D16A', 'release_date': '2018-05-14T06:00:00Z', 'exploit_url': 'https://github.com/leeqwind/HolicPOC/blob/master/windows/win32k/CVE-2018-8120/x86.cpp', 'replication_urls': [], 'grade': '', 'hashes': {}}
common_vulnerability_scores: {"v2.0": {"access_complexity": "MEDIUM", "access_vector": "LOCAL", "authentication": "NONE", "availability_impact": "COMPLETE", "base_score": 6.9, "confidentiality_impact": "COMPLETE", "exploitability": "FUNCTIONAL", "integrity_impact": "COMPLETE", "remediation_level": "OFFICIAL_FIX", "report_confidence": "CONFIRMED", "temporal_score": 5.7, "vector_string": "AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C"}, "v3.0": {"attack_complexity": "HIGH", "attack_vector": "LOCAL", "availability_impact": "HIGH", "base_score": 7, "confidentiality_impact": "HIGH", "exploit_code_maturity": "FUNCTIONAL", "integrity_impact": "HIGH", "privileges_required": "LOW", "remediation_level": "OFFICIAL_FIX", "report_confidence": "CONFIRMED", "scope": "UNCHANGED", "temporal_score": 6.5, "user_interaction": "NONE", "vector_string": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}}
audience: intel_vuln
intel_free: false
affects_ot: false
aliases:
cisa_known_exploited: null
cpe_ranges:
cwe_details: null
days_to_patch: null
epss: null
version_history:
workarounds_list:0 CVE
#
mati-get-campaignRetrieve information about a Campaign from Mandiant
#
Base Commandmati-get-campaign
#
InputArgument Name | Description | Required |
---|---|---|
campaign_id | ID of the campaign to lookup. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
MANDIANTTI.Campaign.value | String | The name of the Campaign |
MANDIANTTI.Campaign.fields.actors | String | The Threat Actors associated with the Campaign |
MANDIANTTI.Campaign.fields.description | String | The description of the Campaign |
MANDIANTTI.Campaign.fields.tags | String | The industries associated with the Campaign |
MANDIANTTI.Campaign.fields.publications.title | String | The title of a report associated with the Campaign |
MANDIANTTI.Campaign.fields.publications.link | String | The link to the report in Mandiant Advantage |
#
Command example!mati-get-campaign campaign_id=CAMP.21.014
#
Context Example#
Human Readable Output#
Results
fields rawJSON relationships type value actors: APT41
description: In mid-October 2021, Mandiant observed a wave of APT41 activity targeting multiple U.S. state governments. We believe the actors exploited a vulnerability in a public-facing web application, used by numerous state governments and U.S. educational research institutes, to gain initial access. The actors then conducted reconnaissance and credential harvesting activity, dropping multiple files including the publicly available BADPOTATO privilege escalation tool. Mandiant also identified the DEADEYE dropper, which executed a KEYPLUG backdoor.
This activity is likely a continuation of a previously observed APT41 campaign targeting multiple U.S. state government entities in May 2021. The specific motivation behind the targeting of U.S. state government entities remains unclear, though we infer, based on the targeting profile, that the purpose may include capturing political intelligence or data related to sensitive technologies with national or state-level applications. It is also possible that the capture of credentials can facilitate future targeting or pivoting to targets of interest.
tags: Governments
DBot Score: {"Indicator": null, "Type": "Campaign", "Vendor": "Mandiant", "Score": 0, "Reliability": "A - Completely reliable"}
publications:type: campaign
id: campaign--c344bb9b-cb50-58be-9c33-350b622c1fce
name: APT41 Exploition of .NET Web Applications at U.S. State Governments
description: In mid-October 2021, Mandiant observed a wave of APT41 activity targeting multiple U.S. state governments. We believe the actors exploited a vulnerability in a public-facing web application, used by numerous state governments and U.S. educational research institutes, to gain initial access. The actors then conducted reconnaissance and credential harvesting activity, dropping multiple files including the publicly available BADPOTATO privilege escalation tool. Mandiant also identified the DEADEYE dropper, which executed a KEYPLUG backdoor.
This activity is likely a continuation of a previously observed APT41 campaign targeting multiple U.S. state government entities in May 2021. The specific motivation behind the targeting of U.S. state government entities remains unclear, though we infer, based on the targeting profile, that the purpose may include capturing political intelligence or data related to sensitive technologies with national or state-level applications. It is also possible that the capture of credentials can facilitate future targeting or pivoting to targets of interest.
releasable: true
counts: {"actors": 1, "reports": 4, "malware": 19, "campaigns": 0, "industries": 1, "timeline": 104, "vulnerabilities": 1, "actor_collaborations": 0, "tools": 9}
audience: {'name': 'intel_oper', 'license': 'INTEL_RBI_OPS'},
{'name': 'intel_fusion', 'license': 'INTEL_RBI_FUS'},
{'name': 'tlp_marking', 'license': 'amber'}
profile_updated: 2023-03-06T07:10:13.356Z
campaign_type: Individual
short_name: CAMP.21.014
last_activity_time: 2022-02-26T00:00:00.000Z
timeline: {'name': 'Campaign Created', 'description': 'Mandiant Declared Campaign', 'releasable': True, 'event_type': 'created', 'timestamp': '2021-10-18T00:00:00.000Z'},
{'name': 'First Observed', 'description': 'Mandiant Observed First Activity of Campaign', 'releasable': True, 'event_type': 'first_observed', 'timestamp': '2020-06-15T00:00:00.000Z'},
{'name': 'Technique Observed', 'description': 'Mandiant Observed Use of The Technique', 'releasable': True, 'event_type': 'technique_observed', 'mandiant_technique': {'type': 'attack-pattern', 'id': 'attack-pattern--ae0d50d8-79de-5193-9223-178fde2c0756', 'name': 'Privilege escalation via access token impersonation', 'attribution_scope': 'confirmed', 'releasable': True}, 'mitre_techniques': [{'type': 'attack-pattern', 'id': 'attack-pattern--86850eff-2729-40c3-b85e-c4af26da4a2d', 'name': 'Token Impersonation/Theft', 'attribution_scope': 'confirmed', 'releasable': True, 'mitre_id': 'T1134.001', 'tactics': ['Privilege Escalation', 'Defense Evasion']}, {'type': 'attack-pattern', 'id': 'attack-pattern--dcaa092b-7de9-4a21-977f-7fcb77e89c48', 'name': 'Access Token Manipulation', 'attribution_scope': 'confirmed', 'releasable': True, 'mitre_id': 'T1134', 'tactics': ['Privilege Escalation', 'Defense Evasion']}], 'used_by': [{'releasable': True, 'actor': {'type': 'threat-actor', 'id': 'threat-actor--9c88bd9c-f41b-59fa-bfb6-427b1755ea64', 'name': 'APT41', 'attribution_scope': 'confirmed', 'releasable': True}, 'first_observed': '2021-05-05T00:00:00.000Z', 'last_observed': '2021-10-17T00:00:00.000Z'}]},
aliases: {"releasable": true, "actor": [{"type": "alias", "id": "alias--c63f2b2b-3639-5bd0-be28-b1cb79b00b21", "name": "Barium (Microsoft)", "attribution_scope": "confirmed", "releasable": true, "source": "Microsoft", "nucleus_name": "Barium"}], "malware": [], "campaign": []}
actors: {'type': 'threat-actor', 'id': 'threat-actor--9c88bd9c-f41b-59fa-bfb6-427b1755ea64', 'name': 'APT41', 'attribution_scope': 'confirmed', 'releasable': True, 'motivations': [{'type': 'motivation', 'id': 'motivation--fa4d4992-1762-50ac-b0b1-2c75210645d0', 'name': 'Financial Gain', 'attribution_scope': 'confirmed', 'releasable': True}, {'type': 'motivation', 'id': 'motivation--1b8ca82a-7cff-5622-bedd-965c11d38a9e', 'name': 'Espionage', 'attribution_scope': 'confirmed', 'releasable': True}], 'source_locations': [{'releasable': True, 'country': {'type': 'location', 'id': 'location--740e7e5f-f2a0-55e0-98a3-88872c55b581', 'name': 'China', 'attribution_scope': 'confirmed', 'releasable': True, 'iso2': 'CN'}, 'region': {'type': 'location', 'id': 'location--8fc231f3-4e62-57e7-b734-eaee0a734612', 'name': 'Asia', 'attribution_scope': 'confirmed', 'releasable': True}, 'sub_region': {'type': 'location', 'id': 'location--7b33370b-da4b-5c48-9741-b69f69febb77', 'name': 'East Asia', 'attribution_scope': 'confirmed', 'releasable': True}}]}
malware: {'type': 'malware', 'id': 'malware--448e822d-8496-5021-88cb-599062f74176', 'name': 'BEACON', 'attribution_scope': 'confirmed', 'releasable': True},
{'type': 'malware', 'id': 'malware--ad51977a-c6fc-5cd3-822e-4e2aa6c832a2', 'name': 'FASTPACE', 'attribution_scope': 'confirmed', 'releasable': True}
vulnerabilities: {'type': 'vulnerability', 'id': 'vulnerability--362764b4-aa15-55fd-a68b-caf84f25a6b0', 'attribution_scope': 'confirmed', 'releasable': True, 'cve_id': 'CVE-2021-44207'}
industries: {'type': 'identity', 'id': 'identity--8d0881d8-d199-5e5a-bef9-be3ca6bb8f0d', 'name': 'Governments', 'attribution_scope': 'confirmed', 'releasable': True}
target_locations: {"releasable": true, "countries": [{"type": "location", "id": "location--5c5b39aa-9308-52a6-9daf-0547d5aaa160", "name": "United States of America", "attribution_scope": "confirmed", "iso2": "US", "region": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3", "sub_region": "location--0daadcfb-ad23-5f16-b53b-6c5b09bf20de", "releasable": true, "count": 8}], "regions": [{"type": "location", "id": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3", "name": "Americas", "attribution_scope": "confirmed", "releasable": true, "count": 8}], "sub_regions": [{"type": "location", "id": "location--0daadcfb-ad23-5f16-b53b-6c5b09bf20de", "name": "North America", "attribution_scope": "confirmed", "region": "location--6d65522f-0166-5e7e-973c-35cf7973e4e3", "releasable": true, "count": 8}]}
is_publishable: true{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'CAMP.21.014', 'entityAFamily': 'Indicator', 'entityAType': 'Campaign', 'entityB': 'APT41', 'entityBFamily': 'Indicator', 'entityBType': 'Threat Actor', 'fields': {}},
{'name': 'related-to', 'reverseName': 'related-to', 'type': 'IndicatorToIndicator', 'entityA': 'CAMP.21.014', 'entityAFamily': 'Indicator', 'entityAType': 'Campaign', 'entityB': 'BEACON', 'entityBFamily': 'Indicator', 'entityBType': 'Malware', 'fields': {}}Campaign CAMP.21.014