Hunting For Stuxbot (Round 2)
Recently uncovered details shed light on the operational strategy of Stuxbot's newest iteration.
- The newest iterations of Stuxbot are exploiting the
C:\Users\Publicdirectory as a conduit for deploying supplementary utilities. - The newest iterations of Stuxbot are utilizing
registry run keysas a mechanism to ensure their sustained presence within the infected system. - The newest iterations of Stuxbot are utilizing
PowerShell Remotingfor lateral movement within the network and to gain access to domain controllers.
The Available Dataโ
The cybersecurity strategy implemented is predicated on the utilization of the Elastic stack as a SIEM solution. Through the "Discover" functionality we can see logs from multiple sources. These sources include:
Windows audit logs(categorized under the index patternwindows*)System Monitor (Sysmon) logs(also falling under the index patternwindows*, more about Sysmon here)PowerShell logs(indexed underwindows*as well, more about PowerShell logs here)Zeek logs, a network security monitoring tool (classified under the index patternzeek*)
The Tasksโ
Hunt 1: Create a KQL query to hunt for "Lateral Tool Transfer MITRE ATT&CK - T1570" to C:\Users\Public. Enter the content of the user.name field in the document that is related to a transferred tool that starts with "r" as your answerโ
- Let's check for Sysmon Event ID 15 - FileCreateStreamHash (streams added to existing files)
- Files which come from the internet
event.code: 15
Add filter
file.directory is C:\Users\bob\Downloads
File stream created:
RuleName: -
UtcTime: 2023-03-26 20:05:47.793
ProcessGuid: {3f3a32cd-a59b-6420-c601-000000001a00}
ProcessId: 908
Image: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
TargetFilename: C:\Users\bob\Downloads\invoice.one
CreationUtcTime: 2023-03-26 20:05:43.609
Hash: MD5=127021207D6415A3B426732B782EFC24,SHA256=AAEE893B24C9474B23E94C725A67D83F2722E4FED8BA8C25CE60BD76B30C0954,IMPHASH=00000000000000000000000000000000
Contents: -
User: EAGLE\bob
event.createdMar 26, 2023 @ 20:05:48.914
- Let's check for Sysmon Event ID 11 - File creation
event.code: 11
File created:
RuleName: -
UtcTime: 2023-03-26 20:06:27.990
ProcessGuid: {3f3a32cd-a5a1-6420-cc01-000000001a00}
ProcessId: 6660
Image: C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE
TargetFilename: C:\Users\bob\AppData\Local\Temp\OneNote\16.0\Exported\{EC284AA9-1F31-4DC4-B3C5-3EEE8137EBC3}\NT\0\invoice.bat
CreationUtcTime: 2023-03-26 20:06:27.990
User: EAGLE\bob
event.createdMar 26, 2023 @ 20:06:29.604
event.code: 11 AND file.directory: "C:\\Users\\Public"
File created:
RuleName: -
UtcTime: 2023-03-26 21:23:57.243
ProcessGuid: {3f3a32cd-a5c5-6420-e301-000000001a00}
ProcessId: 9944
Image: C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe
TargetFilename: C:\Users\Public\DomainPasswordSpray.ps1
CreationUtcTime: 2023-03-26 21:23:57.243
User: EAGLE\bob
event.createdMar 26, 2023 @ 21:23:59.239
File created:
RuleName: EXE
UtcTime: 2023-03-26 22:17:01.805
ProcessGuid: {3f3a32cd-c2ca-6420-d400-000000001d00}
ProcessId: 8072
Image: C:\Users\bob\AppData\Local\Temp\default.exe
TargetFilename: C:\Users\Public\SharpHound.exe
CreationUtcTime: 2023-03-26 22:17:01.805
User: EAGLE\bob
event.createdMar 26, 2023 @ 22:17:03.724
Let's check for all files created inside C:\Users\Public\ and file.extension is exeโ
event.code: 11 and file.directory: "C:\\Users\\Public" and file.extension: "exe"
File created:
RuleName: EXE
UtcTime: 2023-03-26 22:17:01.805
ProcessGuid: {3f3a32cd-c2ca-6420-d400-000000001d00}
ProcessId: 8072
Image: C:\Users\bob\AppData\Local\Temp\default.exe
TargetFilename: C:\Users\Public\SharpHound.exe
CreationUtcTime: 2023-03-26 22:17:01.805
User: EAGLE\bob
default.exe-SharpHound.exe
event.createdMar 27, 2023 @ 00:17:03.724
File created:
RuleName: EXE
UtcTime: 2023-03-27 22:40:12.705
ProcessGuid: {0b5600e8-1acb-6422-ed02-000000001f00}
ProcessId: 1064
Image: C:\Windows\default.exe
TargetFilename: C:\Users\Public\payload.exe
CreationUtcTime: 2023-03-27 22:40:12.705
User: EAGLE\svc-sql1
default.exe-payload.exe
event.createdMar 28, 2023 @ 00:40:14.378
File created:
RuleName: EXE
UtcTime: 2023-03-27 22:54:17.094
ProcessGuid: {0b5600e8-1b90-6422-ef02-000000001f00}
ProcessId: 2896
Image: C:\windows\system32\svchost.exe
TargetFilename: C:\Users\Public\Rubeus.exe
CreationUtcTime: 2023-03-27 22:54:17.094
User: EAGLE\svc-sql1
C:\windows\system32\svchost.exe-Rubeus.exe
event.createdMar 28, 2023 @ 00:54:18.795
File created:
RuleName: EXE
UtcTime: 2023-03-27 23:00:36.343
ProcessGuid: {0b5600e8-1b90-6422-ef02-000000001f00}
ProcessId: 2896
Image: C:\windows\system32\svchost.exe
TargetFilename: C:\Users\Public\Rubeus.exe
CreationUtcTime: 2023-03-27 23:00:36.343
User: EAGLE\svc-sql1
C:\windows\system32\svchost.exe-Rubeus.exe
event.createdMar 28, 2023 @ 01:00:38.171
File created:
RuleName: EXE
UtcTime: 2023-03-27 23:13:32.704
ProcessGuid: {0b5600e8-1b90-6422-ef02-000000001f00}
ProcessId: 2896
Image: C:\windows\system32\svchost.exe
TargetFilename: C:\Users\Public\mimikatz.exe
CreationUtcTime: 2023-03-27 23:13:32.704
User: EAGLE\svc-sql1
C:\windows\system32\svchost.exe-mimikatz.exe
event.createdMar 28, 2023 @ 01:13:34.625
Hunt 2: Create a KQL query to hunt for "Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder MITRE ATT&CK - T1547.001". Enter the content of the registry.value field in the document that is related to the first registry-based persistence action as your answerโ
- Let's check for Sysmon Event ID 13 - Registry value set
- This Registry event type identifies Registry value modifications. The event records the value written for Registry values of type DWORD and QWORD.
event.code: 13 and message : "*Run*"
Registry value set:
RuleName: T1060,RunKey
EventType: SetValue
UtcTime: 2023-03-26 20:17:33.845
ProcessGuid: {3f3a32cd-a5c5-6420-e301-000000001a00}
ProcessId: 9944
Image: C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe
TargetObject: HKU\S-1-5-21-1518138621-4282902758-752445584-1107\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LgvHsviAUVTsIN
Details: C:\Users\bob\AppData\Local\Temp\default.exe
User: EAGLE\bob
C:\Users\bob\AppData\Local\Temp\default.exe-C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe
HKU\S-1-5-21-1518138621-4282902758-752445584-1107\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LgvHsviAUVTsIN
event.createdMar 26, 2023 @ 22:17:34.817
Registry value set:
RuleName: T1060,RunKey
EventType: SetValue
UtcTime: 2023-03-26 22:12:44.594
ProcessGuid: {3f3a32cd-c2ca-6420-d400-000000001d00}
ProcessId: 8072
Image: C:\Users\bob\AppData\Local\Temp\default.exe
TargetObject: HKU\S-1-5-21-1518138621-4282902758-752445584-1107\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KFbyzDpudqtCF
Details: C:\Users\bob\AppData\Local\Temp\svchost.exe
User: EAGLE\bob
C:\Users\bob\AppData\Local\Temp\svchost.exe-C:\Users\bob\AppData\Local\Temp\default.exe
HKU\S-1-5-21-1518138621-4282902758-752445584-1107\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KFbyzDpudqtCF
event.createdMar 27, 2023 @ 00:12:45.713
Registry value set:
RuleName: T1060,RunKey
EventType: SetValue
UtcTime: 2023-03-27 21:25:58.972
ProcessGuid: {3f3a32cd-0952-6422-4c04-000000001d00}
ProcessId: 5620
Image: C:\Users\bob\AppData\Local\Temp\default.exe
TargetObject: HKU\S-1-5-21-1518138621-4282902758-752445584-1107\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cgCfhHDMwmN
Details: C:\Users\bob\AppData\Local\Temp\svchost.exe
User: EAGLE\bob
C:\Users\bob\AppData\Local\Temp\svchost.exe-C:\Users\bob\AppData\Local\Temp\default.exe
HKU\S-1-5-21-1518138621-4282902758-752445584-1107\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cgCfhHDMwmN
event.createdMar 27, 2023 @ 23:26:00.099
Registry value set:
RuleName: T1060,RunKey
EventType: SetValue
UtcTime: 2023-03-27 22:23:52.572
ProcessGuid: {0b5600e8-1624-6422-d102-000000001f00}
ProcessId: 832
Image: C:\Windows\default.exe
TargetObject: HKU\S-1-5-21-1518138621-4282902758-752445584-1111\Software\Microsoft\Windows\CurrentVersion\Run\ybZishBHbRKgfe
Details: C:\Users\svc-sql1\AppData\Local\Temp\svchost.exe
User: EAGLE\svc-sql1
C:\Users\svc-sql1\AppData\Local\Temp\svchost.exe-C:\Windows\default.exe
HKU\S-1-5-21-1518138621-4282902758-752445584-1111\Software\Microsoft\Windows\CurrentVersion\Run\ybZishBHbRKgfe
event.createdMar 28, 2023 @ 00:23:53.027
default.exe is now located at C:\Windows\default.exe with user svc-sql1
Hunt 3: Create a KQL query to hunt for "PowerShell Remoting for Lateral Movement Red Team Notes - WinRM for Lateral Movement". Enter the content of the winlog.user.name field in the document that is related to PowerShell remoting-based lateral movement towards DC1โ
message:(*Enter-PSSession* OR *New-PSSession* OR *Invoke-Command* OR *Invoke-Expression* OR *Get-PSSession* OR *Remove-PSSession* OR *ComputerName* OR *WSMan* OR *ShellId* OR *Microsoft.PowerShell* OR *session.configuration* OR *Enable-PSRemoting* OR *winrm*) OR
powershell.file.script_block_text:(*PSSession* OR *Invoke-Command* OR *winrm* OR *WSMan* OR *session.configuration*)
Creating Scriptblock text (1 of 1):
Enter-pssession dc1
ScriptBlock ID: 3c083414-130c-4114-98c0-218281631a50
Path:

event.code: 4648 AND message : "*powershell.exe*"
A logon was attempted using explicit credentials.
Subject:
Security ID: S-1-5-21-1518138621-4282902758-752445584-1107
Account Name: bob
Account Domain: EAGLE
Logon ID: 0xA8478
Logon GUID: {00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name: administrator
Account Domain:
Logon GUID: {00000000-0000-0000-0000-000000000000}
Target Server:
Target Server Name: DC1.eagle.local
Additional Information: DC1.eagle.local
Process Information:
Process ID: 0x26d8
Process Name: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Network Information:
Network Address: -
Port: -
This event is generated when a process attempts to log on an account by explicitly specifying that accountโs credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
- Event 4648 โ "Logon with explicit credentials"
- Calling User
bob@EAGLE - Account Used
administrator(no domain specified) - Target Server
DC1.eagle.local - Process
powershell.exe - Process Path
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
event.createdMar 26, 2023 @ 23:34:58.733
Account Logon โ Successful Logon (Event ID 4624)โ
event.code: 4624 and winlog.event_data.TargetUserName: "administrator"
An account was successfully logged on.
Subject:
Security ID: S-1-5-18
Account Name: DC2$
Account Domain: EAGLE
Logon ID: 0x3E7
Logon Information:
Logon Type: 2
Restricted Admin Mode: -
Virtual Account: No
Elevated Token: Yes
Impersonation Level: Impersonation
New Logon:
Security ID: S-1-5-21-1518138621-4282902758-752445584-500
Account Name: administrator
Account Domain: EAGLE
Logon ID: 0x107287
Linked Logon ID: 0x0
Network Account Name: -
Network Account Domain: -
Logon GUID: {aca4c672-8a41-453d-b963-33b14b598ffc}
Process Information:
Process ID: 0x7c8
Process Name: C:\Windows\System32\svchost.exe
Network Information:
Workstation Name: DC2
Source Network Address: 127.0.0.1
Source Port: 0
Detailed Authentication Information:
Logon Process: User32
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
This event is generated when a logon session is created. It is generated on the computer that was accessed.
The subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The logon type field indicates the kind of logon that occurred. The most common types are 2 (interactive) and 3 (network).
The New Logon fields indicate the account for whom the new logon was created, i.e. the account that was logged on.
The network fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The impersonation level field indicates the extent to which a process in the logon session can impersonate.
The authentication information fields provide detailed information about this specific logon request.
- Logon GUID is a unique identifier that can be used to correlate this event with a KDC event.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
- Interactive logon (
Logon Type 2) administrator@EAGLE- Process:
svchost.exe - Source IP:
127.0.0.1 - Suspicious:
SYSTEMcontext,svchostspawninginteractive logon
event.createdMar 23, 2023 @ 18:11:14.106
An account was successfully logged on.
Subject:
Security ID: S-1-5-18
Account Name: DC2$
Account Domain: EAGLE
Logon ID: 0x3E7
Logon Information:
Logon Type: 7
Restricted Admin Mode: -
Virtual Account: No
Elevated Token: Yes
Impersonation Level: Impersonation
New Logon:
Security ID: S-1-5-21-1518138621-4282902758-752445584-500
Account Name: administrator
Account Domain: EAGLE
Logon ID: 0x1B871D0
Linked Logon ID: 0x0
Network Account Name: -
Network Account Domain: -
Logon GUID: {5b864ed0-562e-e231-a7b5-29758a00fd24}
Process Information:
Process ID: 0x2c0
Process Name: C:\Windows\System32\lsass.exe
Network Information:
Workstation Name: DC2
Source Network Address: -
Source Port: -
Detailed Authentication Information:
Logon Process: Negotiat
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
Logon Type 7= Unlock, but initiated bylsass.exe, not normalSYSTEMaccount (DC2$) spawning a session foradministrator- Source:
localhost(no remote IP), indicateslocal impersonationorS4Uabuse Logon GUIDmatches4648usage
event.createdMar 26, 2023 @ 21:48:13.025
An account was successfully logged on.
Subject:
Security ID: S-1-5-18
Account Name: DC2$
Account Domain: EAGLE
Logon ID: 0x3E7
Logon Information:
Logon Type: 7
Restricted Admin Mode: -
Virtual Account: No
Elevated Token: Yes
Impersonation Level: Impersonation
New Logon:
Security ID: S-1-5-21-1518138621-4282902758-752445584-500
Account Name: administrator
Account Domain: EAGLE
Logon ID: 0x4C5FD06
Linked Logon ID: 0x0
Network Account Name: -
Network Account Domain: -
Logon GUID: {c051a5ca-6afe-d3bc-76fe-98d1fc092ea3}
Process Information:
Process ID: 0x53c
Process Name: C:\Windows\System32\svchost.exe
Network Information:
Workstation Name: DC2
Source Network Address: 127.0.0.1
Source Port: 0
Detailed Authentication Information:
Logon Process: User32
Authentication Package: Negotiate
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
Logon Type 7= "Unlock", but was triggered bysvchost.exeinstead of a useradministrator@EAGLElogged on locally from127.0.0.1- Likely
S4U (Service-for-User)ortoken manipulation - Process:
svchost.exespawning session foradministrator
event.createdMar 29, 2023 @ 22:49:30.315
event.code: 4648 and winlog.event_data.TargetUserName: "administrator"
A logon was attempted using explicit credentials.
Subject:
Security ID: S-1-5-18
Account Name: DC2$
Account Domain: EAGLE
Logon ID: 0x3E7
Logon GUID: {00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name: administrator
Account Domain: EAGLE
Logon GUID: {8118849c-9a5d-fa21-0c89-1544ad839abb}
Target Server:
Target Server Name: localhost
Additional Information: localhost
Process Information:
Process ID: 0x884
Process Name: C:\Windows\System32\svchost.exe
Network Information:
Network Address: 127.0.0.1
Port: 0
This event is generated when a process attempts to log on an account by explicitly specifying that accountโs credentials. This most commonly occurs in batch-type configurations such as scheduled tasks, or when using the RUNAS command.
svchost.exeattempted to log on withadministratorcredentials locally- This is not expected unless part of
post-exploitationorscheduled task abuse - Strong sign of
S4U,token theft, ormalicious servicebehavior
event.createdMar 23, 2023 @ 23:20:41.366
A logon was attempted using explicit credentials.
Subject:
Security ID: S-1-5-18
Account Name: DC2$
Account Domain: EAGLE
Logon ID: 0x3E7
Logon GUID: {00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name: administrator
Account Domain: EAGLE
Logon GUID: {5b864ed0-562e-e231-a7b5-29758a00fd24}
Target Server:
Target Server Name: localhost
Additional Information: localhost
Process Information:
Process ID: 0x2c0
Process Name: C:\Windows\System32\lsass.exe
Network Information:
Network Address: -
Port: -
lsass.exeinitiated logon usingadministratorโ highly unusual- Suggests credential manipulation, possible
LSA abuse - No source IP โ
local, scripted activity
event.createdMar 26, 2023 @ 21:48:13.025
A logon was attempted using explicit credentials.
Subject:
Security ID: S-1-5-21-1518138621-4282902758-752445584-1107
Account Name: bob
Account Domain: EAGLE
Logon ID: 0x4656C
Logon GUID: {00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name: administrator
Account Domain:
Logon GUID: {00000000-0000-0000-0000-000000000000}
Target Server:
Target Server Name: DC1.eagle.local
Additional Information: DC1.eagle.local
Process Information:
Process ID: 0xc78
Process Name: C:\Users\bob\AppData\Local\Temp\default.exe
Network Information:
Network Address: -
Port: -
bobuseddefault.exeto initiate logon asadministrator- Strong sign of
lateral movement attemptorcustom payload - Target was
DC1
event.createdMar 26, 2023 @ 23:53:28.921
A logon was attempted using explicit credentials.
Subject:
Security ID: S-1-5-18
Account Name: DC2$
Account Domain: EAGLE
Logon ID: 0x3E7
Logon GUID: {00000000-0000-0000-0000-000000000000}
Account Whose Credentials Were Used:
Account Name: administrator
Account Domain: EAGLE
Logon GUID: {c051a5ca-6afe-d3bc-76fe-98d1fc092ea3}
Target Server:
Target Server Name: localhost
Additional Information: localhost
Process Information:
Process ID: 0x53c
Process Name: C:\Windows\System32\svchost.exe
Network Information:
Network Address: 127.0.0.1
Port: 0
svchost.exeagain attempting credentialed logon foradministrator- Localhost address (
127.0.0.1) andSYSTEMcontext implyprivilege abuse - Could be part of
automated lateral movement toolchainorpersistence
event.createdMar 29, 2023 @ 22:49:30.315
Zeek filter for PowerShell Remoting WinRMโ
destination.port: 5985 AND
NOT network.protocol: "dns" AND
NOT network.protocol: "krb_tcp" AND
NOT network.protocol: "smb" AND
NOT network.protocol: "gssapi" AND
NOT network.protocol: "dce_rpc" AND
NOT network.protocol: "http" AND
NOT network.transport: "icmp" AND
NOT destination.port: (53 OR 88 OR 123 OR 389)
This query helps identify:
- PowerShell Remoting (
WinRM) traffic - hat is not standard web (
HTTP),LDAP,DNS,Kerberos,SMB,ICMP,NTP, etc. Port 5985, which is the defaultHTTP-based WinRM
