#HappyMonday and it is that time again!
The The DFIR Report has released their latest report that mentions NetSupport Manager, a remote access tool that I have not heard of before. Initial access was a zip file contained a .js file which was designed to execute an encoded PowerShell command that deployed the NetSupport tool AND established persistence through the modification of the #Windows run registry key. I would go on but you are going to have to read this report for yourself! It is so full of details that I can't begin to cover them myself! Enjoy and Happy Hunting!
NetSupport Intrusion Results in Domain Compromise
https://thedfirreport.com/2023/10/30/netsupport-intrusion-results-in-domain-compromise/
Notable MITRE ATT&CK TTPs (from the DFIR Team):
TA0002 - Execution
T1059.001 - Command and Scripting Interpreter: PowerShell
T1047 - Windows Management Instrumentation
TA0006 - Credential Access
T1003.001 - OS Credential Dumping: LSASS Memory
TA0005 - Defense Evasion
T1562.001 - Impair Defenses: Disable or Modify Tools
TA0003 - Persistence
T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys/ Startup Folder
T1053.005 - Scheduled Task/Job: Scheduled Task
List of tools:
NetSupport
schtasks
Procdump
PingCastle
SoftPerfect Netscan
Impacket
Cyborg Security Community Hunt Package to get you started!
(Request your free account)
Powershell Encoded Command Execution
https://hunter.cyborgsecurity.io/research/hunt-package/d2d3bbc2-6e57-4043-ab24-988a6a6c88db