S0380 StoneDrill
StoneDrill is wiper malware discovered in destructive campaigns against both Middle Eastern and European targets in association with APT33.12
Item | Value |
---|---|
ID | S0380 |
Associated Names | DROPSHOT |
Type | MALWARE |
Version | 1.1 |
Created | 14 May 2019 |
Last Modified | 30 March 2020 |
Navigation Layer | View In ATT&CK® Navigator |
Associated Software Descriptions
Name | Description |
---|---|
DROPSHOT | 1 |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.005 | Visual Basic | StoneDrill has several VBS scripts used throughout the malware’s lifecycle.2 |
enterprise | T1485 | Data Destruction | StoneDrill has a disk wiper module that targets files other than those in the Windows directory.2 |
enterprise | T1561 | Disk Wipe | - |
enterprise | T1561.001 | Disk Content Wipe | StoneDrill can wipe the accessible physical or logical drives of the infected machine.3 |
enterprise | T1561.002 | Disk Structure Wipe | StoneDrill can wipe the master boot record of an infected computer.3 |
enterprise | T1070 | Indicator Removal | - |
enterprise | T1070.004 | File Deletion | StoneDrill has been observed deleting the temporary files once they fulfill their task.2 |
enterprise | T1105 | Ingress Tool Transfer | StoneDrill has downloaded and dropped temporary files containing scripts; it additionally has a function to upload files from the victims machine.2 |
enterprise | T1027 | Obfuscated Files or Information | StoneDrill has obfuscated its module with an alphabet-based table or XOR encryption.2 |
enterprise | T1055 | Process Injection | StoneDrill has relied on injecting its payload directly into the process memory of the victim’s preferred browser.2 |
enterprise | T1012 | Query Registry | StoneDrill has looked in the registry to find the default browser path.2 |
enterprise | T1113 | Screen Capture | StoneDrill can take screenshots.2 |
enterprise | T1518 | Software Discovery | - |
enterprise | T1518.001 | Security Software Discovery | StoneDrill can check for antivirus and antimalware programs.2 |
enterprise | T1082 | System Information Discovery | StoneDrill has the capability to discover the system OS, Windows version, architecture and environment.2 |
enterprise | T1124 | System Time Discovery | StoneDrill can obtain the current date and time of the victim machine.2 |
enterprise | T1497 | Virtualization/Sandbox Evasion | StoneDrill has used several anti-emulation techniques to prevent automated analysis by emulators or sandboxes.2 |
enterprise | T1047 | Windows Management Instrumentation | StoneDrill has used the WMI command-line (WMIC) utility to run tasks.2 |
Groups That Use This Software
ID | Name | References |
---|---|---|
G0064 | APT33 | 1 |
References
-
O’Leary, J., et al. (2017, September 20). Insights into Iranian Cyber Espionage: APT33 Targets Aerospace and Energy Sectors and has Ties to Destructive Malware. Retrieved February 15, 2018. ↩↩↩
-
Kaspersky Lab. (2017, March 7). From Shamoon to StoneDrill: Wipers attacking Saudi organizations and beyond. Retrieved March 14, 2019. ↩↩↩↩↩↩↩↩↩↩↩↩↩↩
-
Security Response attack Investigation Team. (2019, March 27). Elfin: Relentless Espionage Group Targets Multiple Organizations in Saudi Arabia and U.S.. Retrieved April 10, 2019. ↩↩