Skip to content

G0088 TEMP.Veles

TEMP.Veles is a Russia-based threat group that has targeted critical infrastructure. The group has been observed utilizing TRITON, a malware framework designed to manipulate industrial safety systems.123

Item Value
ID G0088
Associated Names XENOTIME
Version 1.3
Created 16 April 2019
Last Modified 17 October 2021
Navigation Layer View In ATT&CK® Navigator

Associated Group Descriptions

Name Description
XENOTIME The activity group XENOTIME, as defined by Dragos, has overlaps with activity reported upon by FireEye about TEMP.Veles as well as the actors behind TRITON .4516

Techniques Used

Domain ID Name Use
enterprise T1583 Acquire Infrastructure -
enterprise T1583.003 Virtual Private Server TEMP.Veles has used Virtual Private Server (VPS) infrastructure.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.001 PowerShell TEMP.Veles has used a publicly-available PowerShell-based tool, WMImplant.2 The group has also used PowerShell to perform Timestomping.1
enterprise T1074 Data Staged -
enterprise T1074.001 Local Data Staging TEMP.Veles has created staging folders in directories that were infrequently used by legitimate users or processes.1
enterprise T1546 Event Triggered Execution -
enterprise T1546.012 Image File Execution Options Injection TEMP.Veles has modified and added entries within HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options to maintain persistence.1
enterprise T1133 External Remote Services TEMP.Veles has used a VPN to persist in the victim environment.1
enterprise T1070 Indicator Removal on Host -
enterprise T1070.004 File Deletion TEMP.Veles routinely deleted tools, logs, and other files after they were finished with them.1
enterprise T1070.006 Timestomp TEMP.Veles used timestomping to modify the $STANDARD_INFORMATION attribute on tools.1
enterprise T1036 Masquerading -
enterprise T1036.005 Match Legitimate Name or Location TEMP.Veles has renamed files to look like legitimate files, such as Windows update files or Schneider Electric application files.1
enterprise T1571 Non-Standard Port TEMP.Veles has used port-protocol mismatches on ports such as 443, 4444, 8531, and 50501 during C2.1
enterprise T1027 Obfuscated Files or Information -
enterprise T1027.005 Indicator Removal from Tools TEMP.Veles has modified files based on the open-source project cryptcat in an apparent attempt to decrease AV detection rates.2
enterprise T1588 Obtain Capabilities -
enterprise T1588.002 Tool TEMP.Veles has obtained and used tools such as Mimikatz and PsExec.1
enterprise T1003 OS Credential Dumping -
enterprise T1003.001 LSASS Memory TEMP.Veles has used Mimikatz and a custom tool, SecHack, to harvest credentials. 1
enterprise T1021 Remote Services -
enterprise T1021.001 Remote Desktop Protocol TEMP.Veles utilized RDP throughout an operation.1
enterprise T1021.004 SSH TEMP.Veles has relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution.1
enterprise T1053 Scheduled Task/Job -
enterprise T1053.005 Scheduled Task TEMP.Veles has used scheduled task XML triggers.1
enterprise T1505 Server Software Component -
enterprise T1505.003 Web Shell TEMP.Veles has planted Web shells on Outlook Exchange servers.1
enterprise T1078 Valid Accounts TEMP.Veles has used compromised VPN accounts.1

Software

ID Name References Techniques
S0002 Mimikatz 1 SID-History Injection:Access Token Manipulation Account Manipulation Security Support Provider:Boot or Logon Autostart Execution Credentials from Password Stores Credentials from Web Browsers:Credentials from Password Stores Windows Credential Manager:Credentials from Password Stores LSA Secrets:OS Credential Dumping DCSync:OS Credential Dumping Security Account Manager:OS Credential Dumping LSASS Memory:OS Credential Dumping Rogue Domain Controller Silver Ticket:Steal or Forge Kerberos Tickets Golden Ticket:Steal or Forge Kerberos Tickets Private Keys:Unsecured Credentials Pass the Hash:Use Alternate Authentication Material Pass the Ticket:Use Alternate Authentication Material
S0029 PsExec - Domain Account:Create Account Windows Service:Create or Modify System Process Lateral Tool Transfer SMB/Windows Admin Shares:Remote Services Service Execution:System Services
S0609 TRITON - Python:Command and Scripting Interpreter Match Legitimate Name or Location:Masquerading Masquerading Obfuscated Files or Information Remote System Discovery

References

Back to top