G0045 menuPass
menuPass is a threat group that has been active since at least 2006. Individual members of menuPass are known to have acted in association with the Chinese Ministry of State Security’s (MSS) Tianjin State Security Bureau and worked for the Huaying Haitai Science and Technology Development Company.910
menuPass has targeted healthcare, defense, aerospace, finance, maritime, biotechnology, energy, and government sectors globally, with an emphasis on Japanese organizations. In 2016 and 2017, the group is known to have targeted managed IT service providers (MSPs), manufacturing and mining companies, and a university.62473910
Item | Value |
---|---|
ID | G0045 |
Associated Names | Cicada, POTASSIUM, Stone Panda, APT10, Red Apollo, CVNX, HOGFISH |
Version | 2.1 |
Created | 31 May 2017 |
Last Modified | 23 March 2023 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Group Descriptions
Name | Description |
---|---|
Cicada | 8 |
POTASSIUM | 910 |
Stone Panda | 619108 |
APT10 | 61598 |
Red Apollo | 7910 |
CVNX | 7910 |
HOGFISH | 1 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1087 | Account Discovery | - |
enterprise | T1087.002 | Domain Account | menuPass has used the Microsoft administration tool csvde.exe to export Active Directory data.11 |
enterprise | T1583 | Acquire Infrastructure | - |
enterprise | T1583.001 | Domains | menuPass has registered malicious domains for use in intrusion campaigns.910 |
enterprise | T1560 | Archive Collected Data | menuPass has encrypted files and information before exfiltration.910 |
enterprise | T1560.001 | Archive via Utility | menuPass has compressed files before exfiltration using TAR and RAR.7118 |
enterprise | T1119 | Automated Collection | menuPass has used the Csvde tool to collect Active Directory files and data.8 |
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.001 | PowerShell | menuPass uses PowerSploit to inject shellcode into PowerShell.118 |
enterprise | T1059.003 | Windows Command Shell | menuPass executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands.711135 menuPass has used malicious macros embedded inside Office documents to execute files.15 |
enterprise | T1005 | Data from Local System | menuPass has collected various files from the compromised computers.98 |
enterprise | T1039 | Data from Network Shared Drive | menuPass has collected data from remote systems by mounting network shares with net use and using Robocopy to transfer data.7 |
enterprise | T1074 | Data Staged | - |
enterprise | T1074.001 | Local Data Staging | menuPass stages data prior to exfiltration in multi-part archives, often saved in the Recycle Bin.7 |
enterprise | T1074.002 | Remote Data Staging | menuPass has staged data on remote MSP systems or other victim networks prior to exfiltration.78 |
enterprise | T1140 | Deobfuscate/Decode Files or Information | menuPass has used certutil in a macro to decode base64-encoded content contained in a dropper document attached to an email. The group has also used certutil -decode to decode files on the victim’s machine when dropping UPPERCUT.15 |
enterprise | T1568 | Dynamic Resolution | - |
enterprise | T1568.001 | Fast Flux DNS | menuPass has used dynamic DNS service providers to host malicious domains.10 |
enterprise | T1190 | Exploit Public-Facing Application | menuPass has leveraged vulnerabilities in Pulse Secure VPNs to hijack sessions.12 |
enterprise | T1210 | Exploitation of Remote Services | menuPass has used tools to exploit the ZeroLogon vulnerability (CVE-2020-1472).8 |
enterprise | T1083 | File and Directory Discovery | menuPass has searched compromised systems for folders of interest including those related to HR, audit and expense, and meeting memos.8 |
enterprise | T1574 | Hijack Execution Flow | - |
enterprise | T1574.001 | DLL Search Order Hijacking | menuPass has used DLL search order hijacking.7 |
enterprise | T1574.002 | DLL Side-Loading | menuPass has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as UPPERCUT.1158 |
enterprise | T1070 | Indicator Removal | - |
enterprise | T1070.003 | Clear Command History | menuPass has used Wevtutil to remove PowerShell execution logs.12 |
enterprise | T1070.004 | File Deletion | A menuPass macro deletes files after it has decoded and decompressed them.110 |
enterprise | T1105 | Ingress Tool Transfer | menuPass has installed updates and new malware on victims.710 |
enterprise | T1056 | Input Capture | - |
enterprise | T1056.001 | Keylogging | menuPass has used key loggers to steal usernames and passwords.10 |
enterprise | T1036 | Masquerading | menuPass has used esentutl to change file extensions to their true type that were masquerading as .txt files.5 |
enterprise | T1036.003 | Rename System Utilities | menuPass has renamed certutil and moved it to a different location on the system to avoid detection based on use of the tool.5 |
enterprise | T1036.005 | Match Legitimate Name or Location | menuPass has been seen changing malicious files to appear legitimate.10 |
enterprise | T1106 | Native API | menuPass has used native APIs including GetModuleFileName , lstrcat , CreateFile , and ReadFile .8 |
enterprise | T1046 | Network Service Discovery | menuPass has used tcping.exe, similar to Ping, to probe port status on systems of interest.11 |
enterprise | T1027 | Obfuscated Files or Information | menuPass has encoded strings in its malware with base64 as well as with a simple, single-byte XOR obfuscation using key 0x40.158 |
enterprise | T1588 | Obtain Capabilities | - |
enterprise | T1588.002 | Tool | menuPass has used and modified open-source tools like Impacket, Mimikatz, and pwdump.11 |
enterprise | T1003 | OS Credential Dumping | - |
enterprise | T1003.002 | Security Account Manager | menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials.1113 |
enterprise | T1003.003 | NTDS | menuPass has used Ntdsutil to dump credentials.8 |
enterprise | T1003.004 | LSA Secrets | menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials.1113 |
enterprise | T1566 | Phishing | - |
enterprise | T1566.001 | Spearphishing Attachment | menuPass has sent malicious Office documents via email as part of spearphishing campaigns as well as executables disguised as documents.113510 |
enterprise | T1055 | Process Injection | - |
enterprise | T1055.012 | Process Hollowing | menuPass has used process hollowing in iexplore.exe to load the RedLeaves implant.1 |
enterprise | T1090 | Proxy | - |
enterprise | T1090.002 | External Proxy | menuPass has used a global service provider’s IP as a proxy for C2 traffic from a victim.35 |
enterprise | T1021 | Remote Services | - |
enterprise | T1021.001 | Remote Desktop Protocol | menuPass has used RDP connections to move across the victim network.710 |
enterprise | T1021.004 | SSH | menuPass has used Putty Secure Copy Client (PSCP) to transfer data.7 |
enterprise | T1018 | Remote System Discovery | menuPass uses scripts to enumerate IP ranges on the victim network. menuPass has also issued the command net view /domain to a PlugX implant to gather information about remote systems on the network.113 |
enterprise | T1053 | Scheduled Task/Job | - |
enterprise | T1053.005 | Scheduled Task | menuPass has used a script (atexec.py) to execute a command on a target machine via Task Scheduler.11 |
enterprise | T1553 | Subvert Trust Controls | - |
enterprise | T1553.002 | Code Signing | menuPass has resized and added data to the certificate table to enable the signing of modified files with legitimate signatures.12 |
enterprise | T1218 | System Binary Proxy Execution | - |
enterprise | T1218.004 | InstallUtil | menuPass has used InstallUtil.exe to execute malicious software.11 |
enterprise | T1016 | System Network Configuration Discovery | menuPass has used several tools to scan for open NetBIOS nameservers and enumerate NetBIOS sessions.11 |
enterprise | T1049 | System Network Connections Discovery | menuPass has used net use to conduct connectivity checks to machines.7 |
enterprise | T1199 | Trusted Relationship | menuPass has used legitimate access granted to Managed Service Providers in order to access victims of interest.1138910 |
enterprise | T1204 | User Execution | - |
enterprise | T1204.002 | Malicious File | menuPass has attempted to get victims to open malicious files such as Windows Shortcuts (.lnk) and/or Microsoft Office documents, sent via email as part of spearphishing campaigns.1131510 |
enterprise | T1078 | Valid Accounts | menuPass has used valid accounts including shared between Managed Service Providers and clients to move between the two environments.781012 |
enterprise | T1047 | Windows Management Instrumentation | menuPass has used a modified version of pentesting script wmiexec.vbs, which logs into a remote machine using WMI.11138 |
Software
References
-
Accenture Security. (2018, April 23). Hogfish Redleaves Campaign. Retrieved July 2, 2018. ↩↩↩↩↩↩↩↩↩↩
-
Crowdstrike. (2013, October 16). CrowdCasts Monthly: You Have an Adversary Problem. Retrieved March 1, 2017. ↩
-
FireEye iSIGHT Intelligence. (2017, April 6). APT10 (MenuPass Group): New Tools, Global Campaign Latest Manifestation of Longstanding Threat. Retrieved June 29, 2017. ↩↩↩↩↩↩↩↩↩↩
-
FireEye. (2014). POISON IVY: Assessing Damage and Extracting Intelligence. Retrieved November 12, 2014. ↩
-
Matsuda, A., Muhammad I. (2018, September 13). APT10 Targeting Japanese Corporations Using Updated TTPs. Retrieved September 17, 2018. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
PwC and BAE Systems. (2017, April). Operation Cloud Hopper. Retrieved April 5, 2017. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Symantec. (2020, November 17). Japan-Linked Organizations Targeted in Long-Running and Sophisticated Attack Campaign. Retrieved December 17, 2020. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
United States District Court Southern District of New York (USDC SDNY) . (2018, December 17). United States of America v. Zhu Hua and Zhang Shilong. Retrieved April 17, 2019. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
US District Court Southern District of New York. (2018, December 17). United States v. Zhu Hua Indictment. Retrieved December 17, 2020. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
PwC and BAE Systems. (2017, April). Operation Cloud Hopper: Technical Annex. Retrieved April 13, 2017. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
GREAT. (2021, March 30). APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign. Retrieved June 17, 2021. ↩↩↩↩↩↩↩↩↩↩
-
Twi1ight. (2015, July 11). AD-Pentest-Script - wmiexec.vbs. Retrieved June 29, 2017. ↩↩↩↩