S0140 Shamoon
Shamoon is wiper malware that was first used by an Iranian group known as the “Cutting Sword of Justice” in 2012. Other versions known as Shamoon 2 and Shamoon 3 were observed in 2016 and 2018. Shamoon has also been seen leveraging RawDisk and Filerase to carry out data wiping tasks. The term Shamoon is sometimes used to refer to the group using the malware as well as the malware itself.1234
Item | Value |
---|---|
ID | S0140 |
Associated Names | Disttrack |
Type | MALWARE |
Version | 2.1 |
Created | 31 May 2017 |
Last Modified | 09 February 2021 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Software Descriptions
Name | Description |
---|---|
Disttrack | 1 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1548 | Abuse Elevation Control Mechanism | - |
enterprise | T1548.002 | Bypass User Account Control | Shamoon attempts to disable UAC remote restrictions by modifying the Registry.1 |
enterprise | T1134 | Access Token Manipulation | - |
enterprise | T1134.001 | Token Impersonation/Theft | Shamoon can impersonate tokens using LogonUser , ImpersonateLoggedOnUser , and ImpersonateNamedPipeClient .5 |
enterprise | T1071 | Application Layer Protocol | - |
enterprise | T1071.001 | Web Protocols | Shamoon has used HTTP for C2.1 |
enterprise | T1543 | Create or Modify System Process | - |
enterprise | T1543.003 | Windows Service | Shamoon creates a new service named “ntssrv” to execute the payload. Newer versions create the “MaintenaceSrv” and “hdv_725x” services.12 |
enterprise | T1485 | Data Destruction | Shamoon attempts to overwrite operating system files and disk structures with image files.341 In a later variant, randomly generated data was used for data overwrites.25 |
enterprise | T1486 | Data Encrypted for Impact | Shamoon has an operational mode for encrypting data instead of overwriting it.12 |
enterprise | T1140 | Deobfuscate/Decode Files or Information | Shamoon decrypts ciphertext using an XOR cipher and a base64-encoded string.2 |
enterprise | T1561 | Disk Wipe | - |
enterprise | T1561.002 | Disk Structure Wipe | Shamoon has been seen overwriting features of disk structure such as the MBR.3412 |
enterprise | T1070 | Indicator Removal | - |
enterprise | T1070.006 | Timestomp | Shamoon can change the modified time for files to evade forensic detection.5 |
enterprise | T1105 | Ingress Tool Transfer | Shamoon can download an executable to run on the victim.1 |
enterprise | T1570 | Lateral Tool Transfer | Shamoon attempts to copy itself to remote machines on the network.1 |
enterprise | T1036 | Masquerading | - |
enterprise | T1036.004 | Masquerade Task or Service | Shamoon creates a new service named “ntssrv” that attempts to appear legitimate; the service’s display name is “Microsoft Network Realtime Inspection Service” and its description is “Helps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols.” Newer versions create the “MaintenaceSrv” service, which misspells the word “maintenance.”15 |
enterprise | T1112 | Modify Registry | Once Shamoon has access to a network share, it enables the RemoteRegistry service on the target system. It will then connect to the system with RegConnectRegistryW and modify the Registry to disable UAC remote restrictions by setting SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy to 1.415 |
enterprise | T1027 | Obfuscated Files or Information | Shamoon contains base64-encoded strings.1 |
enterprise | T1012 | Query Registry | Shamoon queries several Registry keys to identify hard disk partitions to overwrite.1 |
enterprise | T1021 | Remote Services | - |
enterprise | T1021.002 | SMB/Windows Admin Shares | Shamoon accesses network share(s), enables share access to the target device, copies an executable payload to the target system, and uses a Scheduled Task/Job to execute the malware.4 |
enterprise | T1018 | Remote System Discovery | Shamoon scans the C-class subnet of the IPs on the victim’s interfaces.4 |
enterprise | T1053 | Scheduled Task/Job | - |
enterprise | T1053.005 | Scheduled Task | Shamoon copies an executable payload to the target system by using SMB/Windows Admin Shares and then scheduling an unnamed task to execute the malware.41 |
enterprise | T1082 | System Information Discovery | Shamoon obtains the victim’s operating system version and keyboard layout and sends the information to the C2 server.12 |
enterprise | T1016 | System Network Configuration Discovery | Shamoon obtains the target’s IP address and local network segment.15 |
enterprise | T1569 | System Services | - |
enterprise | T1569.002 | Service Execution | Shamoon creates a new service named “ntssrv” to execute the payload. Shamoon can also spread via PsExec.16 |
enterprise | T1529 | System Shutdown/Reboot | Shamoon will reboot the infected system once the wiping functionality has been completed.25 |
enterprise | T1124 | System Time Discovery | Shamoon obtains the system time and will only activate if it is greater than a preset date.12 |
enterprise | T1078 | Valid Accounts | - |
enterprise | T1078.002 | Domain Accounts | If Shamoon cannot access shares using current privileges, it attempts access using hard coded, domain-specific credentials gathered earlier in the intrusion.42 |
References
-
Falcone, R.. (2016, November 30). Shamoon 2: Return of the Disttrack Wiper. Retrieved January 11, 2017. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Falcone, R. (2018, December 13). Shamoon 3 Targets Oil and Gas Organization. Retrieved March 14, 2019. ↩↩↩↩↩↩↩↩↩↩
-
Symantec. (2012, August 16). The Shamoon Attacks. Retrieved March 14, 2019. ↩↩↩
-
FireEye. (2016, November 30). FireEye Responds to Wave of Destructive Cyber Attacks in Gulf Region. Retrieved January 11, 2017. ↩↩↩↩↩↩↩↩
-
Mundo, A., Roccia, T., Saavedra-Morales, J., Beek, C.. (2018, December 14). Shamoon Returns to Wipe Systems in Middle East, Europe . Retrieved May 29, 2020. ↩↩↩↩↩↩↩
-
Roccia, T., Saavedra-Morales, J., Beek, C.. (2018, December 19). Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems. Retrieved May 29, 2020. ↩