MISP/tests/event.csv

7.2 KiB
Raw Blame History

1uuidevent_idcategorytypevaluecommentto_idsdateobject_relationobject_uuidobject_nameobject_meta_category
25488466a-f0d0-4b58-89a5-15bc950d210b1635External analysislinkhttps://www.f-secure.com/documents/996508/1030745/w32_regin_stage_1.pdf20141210
3548847d8-01e0-4231-a739-15bb950d210b1635Payload installationmd5744c07e886497f7b68f6f7fe57b7ab54Regin samples collected.120141210
4548847d8-05f8-49e7-af79-15bb950d210b1635Payload installationmd547d0e8f9d7a6429920329207a32ecc2eRegin samples collected.120141210
5548847d8-3fbc-4a06-ba82-15bb950d210b1635Payload installationmd52c8b9d2885543d7ade3cae98225e263bRegin samples collected.120141210
6548847d8-9db0-4df6-8206-15bb950d210b1635Payload installationmd526297dc3cd0b688de3b846983c5385e5Regin samples collected.120141210
7548847d8-a33c-41f3-9f7a-15bb950d210b1635Payload installationmd501c2f321b6bfdb9473c079b0797567baRegin samples collected.120141210
8548847d8-c950-48eb-b960-15bb950d210b1635Payload installationmd54b6b86c7fec1c574706cecedf44abdedRegin samples collected.120141210
9548847d9-1404-4331-ae3c-15bb950d210b1635Payload installationmd590fecc6a89b2e22d82d58878d93477d4Regin samples collected.120141210
10548847d9-39dc-4247-b23d-15bb950d210b1635Payload installationmd506665b96e293b23acc80451abb413e50Regin samples collected.120141210
11548847d9-3b28-449e-b527-15bb950d210b1635Payload installationmd5e94393561901895cb0783edc34740fd4Regin samples collected.120141210
12548847d9-4020-41da-b5f3-15bb950d210b1635Payload installationmd5db405ad775ac887a337b02ea8b07fddcRegin samples collected.120141210
13548847d9-6340-44a0-8f33-15bb950d210b1635Payload installationmd5ffb0b9b5b610191051a7bdf0806e1e47Regin samples collected.120141210
14548847d9-8b18-4654-9766-15bb950d210b1635Payload installationmd5f3ffc2aaaa1e2ab55ec26ff098653347Regin samples collected.120141210
15548847d9-a564-4178-b8e6-15bb950d210b1635Payload installationmd56662c390b2bbbd291ec7987388fc75d7Regin samples collected.120141210
16548847d9-afe0-4531-a4b0-15bb950d210b1635Payload installationmd5187044596bc1328efa0ed636d8aa4a5cRegin samples collected.120141210
17548847d9-b63c-4c95-a2bd-15bb950d210b1635Payload installationmd51800def71006ca6790767e202fae9b9aRegin samples collected.120141210
18548847d9-e6fc-4b93-a773-15bb950d210b1635Payload installationmd5bfbe8c3ee78750c3a520480700e440f8Regin samples collected.120141210
19548847d9-fd54-4e49-909b-15bb950d210b1635Payload installationmd589003e9a1ae635c97ebad07aebc67f00Regin samples collected.120141210
20548847da-1660-4562-a1f8-15bb950d210b1635Payload installationmd5b505d65721bb2453d5039a389113b566Regin samples collected.120141210
21548847da-2134-43d7-ba22-15bb950d210b1635Payload installationmd58fcf4e53ece6111758a1dd3139dc7cadRegin samples collected.120141210
22548847da-3e40-4ab2-a5eb-15bb950d210b1635Payload installationmd51c024e599ac055312a4ab75b3950040aRegin samples collected.120141210
23548847da-49c0-404d-ae42-15bb950d210b1635Payload installationmd5d240f06e98c8d3e647cbf4d442d79475Regin samples collected.120141210
24548847da-71ec-4b2b-bae5-15bb950d210b1635Payload installationmd5148c1bb9d405d717252c77593aff4bd8Regin samples collected.120141210
25548847da-9798-4b6d-b422-15bb950d210b1635Payload installationmd5ba7bb65634ce1e30c1e5415be3d1db1dRegin samples collected.120141210
26548847da-ac78-474c-86fe-15bb950d210b1635Payload installationmd5b29ca4f22ae7b7b25f79c1d4a421139dRegin samples collected.120141210
27548847da-c2d0-4d24-821e-15bb950d210b1635Payload installationmd5b269894f434657db2b15949641a67532Regin samples collected.120141210
28548847da-ffe4-4a90-9f2a-15bb950d210b1635Payload installationmd522bfc970f707fd775d49e875b63c2f0cRegin samples collected.120141210
29548847db-060c-4275-a0c7-15bb950d210b1635Payload installationmd5049436bb90f71cf38549817d9b90e2daRegin samples collected.120141210
3054884832-2608-4fe6-959e-1ac6950d210b1635Artifacts droppedfilenameser8uart.sys20141210
3154884832-5134-460e-bea2-1ac6950d210b1635Artifacts droppedfilenameatdisk.sys20141210
3254884832-6fb4-4c63-937c-1ac6950d210b1635Artifacts droppedfilenamerdpmdd.sys20141210
3354884832-93a4-4fb0-aeba-1ac6950d210b1635Artifacts droppedfilenameusbclass.sys20141210
3454884832-983c-4e4c-a692-1ac6950d210b1635Artifacts droppedfilenamepcidump.sys20141210
3554884832-f2a8-46ff-be58-1ac6950d210b1635Artifacts droppedfilenameabiosdsk.sys20141210
365488486c-1418-4624-b87c-15ba950d210b1635Artifacts droppedregkeyClass\{4F20E605-9452-4787-B793-D0204917CA58}120141210
375488486c-47ec-4952-8e60-15ba950d210b1635Artifacts droppedregkeyClass\{9B9A8ADB-8864-4BC4-8AD5-B17DFDBB9F58}120141210
385488486c-a044-4c31-830c-15ba950d210b1635Artifacts droppedregkeyHKLM\System\CurrentControlSet\Control\120141210
395488488d-a4ec-4b40-bd7d-15c7950d210b1635External analysistextIn this document we analyze a set of 32-bit samples which represents stage #1 of the complex threat that is known as Regin. Based on our analysis of the malwares functionalities, this part of the Regin threat can be considered just a support module — its sole purpose is to facilitate and enable the operations of stage #2 by loading it and making it more difficult to detect by security products. Regins stage #1 targets the Windows platform and support various versions of the operating system, beginning with Windows NT 4.0. Based on our analysis, the samples may be classified into two categories: “pure” samples that do not feature any extra, non-malicious code; and “augmented” ones which feature malware code as part of another device driver. The existence of “augmented” samples indicates the intention of the attacker to remain undiscovered for as long as possible. When activated, samples of Regin stage #1 will retrieve encrypted content from specific locations of an already compromised system, map it into kernel memory and transfer control to it. In terms of technical sophistication, stage #1s import resolution process is of particular interest, as the malware uses the unusual “trampoline” technique to mask the payloads access to API functions. It is clear that this support component, that represents the initial stage of a very complex threat, has been instrumental in securing long-term persistence in the attacks that made use of this threat.20141210
4054884899-35b8-48a3-9da2-15c6950d210b1635OthertextRegin20141210