# Kaseya, Sera. What REvil Shall Encrypt, Shall Encrypt **[splunk.com/en_us/blog/security/kaseya-sera-what-revil-shall-encrypt-shall-encrypt.html](https://www.splunk.com/en_us/blog/security/kaseya-sera-what-revil-shall-encrypt-shall-encrypt.html)** July 5, 2021 By [Ryan Kovar July 05, 2021](https://www.splunk.com/en_us/blog/author/rkovar.html) **_Authors and Contributors: As always, security at Splunk is a family business._** **_Credit to author Ryan Kovar and collaborators:_** _[Mick Baccio,](https://www.splunk.com/en_us/blog/author/mbaccio.html)_ _[Drew Church,](https://www.splunk.com/en_us/blog/author/andrewc.html)_ _Shannon_ _Davis, Lily Lee,_ _[James Brodsky,](https://www.splunk.com/en_us/blog/author/jbrodsky.html)_ _[John Stoner, Matt Krumholz,](https://www.splunk.com/en_us/blog/author/jstoner.html)_ _[Eric Schou.](https://www.splunk.com/en_us/blog/author/eschou.html)_ **_While Splunk was not impacted by the ransomware attack, as a security leader we want_** _to help the industry by providing tools, guidance and support. If you want to see how to find_ _Kaseya REvil specifics skip down to the “Detecting REvil Ransomware Kaseya in_ **_Splunk” sections. Otherwise, read on for a quick breakdown of what happened, how to_** _detect it, and MITRE ATT&CK mappings._ ## Introduction When Splunk told me we would have a “breach holiday” theme for the summer, I didn’t think it would be quite so on the nose… For those of you who have been working on this Kaseya REvil Ransomware incident over the weekend, I salute you. We’ve been doing the same. As usual, my team here at Splunk likes to make sure that we have some actionable material before posting a blog, and this time is no different. In the sections below, you will see that we ----- break this out into a little bit of a different format than usual. We first discuss what happened and what you need to know if you are actively hunting/looking for REvil ransomware via the Kaseya VSA. We then discuss the work done by Splunk's Threat Research Team regarding [a deep dive on REvil, which you can read here. This deep dive will complement our](https://www.splunk.com/en_us/blog/security/revil-ransomware-threat-research-update-and-detections.html) significant, existing body of content focused on helping organizations detect any and all strains of ransomware. Heck, we even did a write-up talking about the Executive Order and memo on ransomware from the US Federal government. Finally, we will talk about the future; what we have in store to help you train and better prepare for events like this before they happen again. Not to mention how to think about your [software supply chain. Why? Because like your alarm clock blasting “I’ve got you babe”](https://www.youtube.com/watch?v=OyBSrBqogPY) [every morning at 6 AM, this will happen again. Our recent “State of Security” report showed](https://www.splunk.com/en_us/campaigns/state-of-security.html) that 78% of security and IT leaders fear that a SolarWinds-style attack will hit them. Guess what? This is one of them. As always, remember that this is a breaking news event, and while every effort has been made, some of our recommended searches may not be as accurate or performant as we desire. ## What You Need to Know On Friday afternoon, July 2nd, 2021, in what is becoming entirely too familiar a scenario, internet rumors of a "supply-chain ransomware" attack began circulating on Reddit. As reports of more systems becoming encrypted surfaced, the "rumors" were confirmed: Kaseya VSA, remote monitoring management (RMM) software heavily used by managed service providers (MSP), was compromised by REvil, and being used to distribute ransomware to its on-premises customers. Since VSA requires elevated permissions to execute, an adversary was able to use it to disable Microsoft Defender and efficiently distribute ransomware via endpoint agents. Its compromise led to a cascading effect of encrypted machines at the MSP customers. Eventually, organizations that don't even use Kaseya were being infected with ransomware. As this is an ongoing incident, we'll provide updates and content as we collect more data. ### Worried about Today, Tomorrow, and Beyond? Unpacking this latest incident shows three significant security areas to address. We’ll be releasing content to help in each of these areas, so stay tuned. **Ransomware is one of the biggest security threats to most organizations today -** The [frequency and severity of ransomware attacks are increasing, as are the blogs and](https://statescoop.com/ransomware-map/) guidance we release to help net defenders maintain their organization's security posture. **Operational supply chain compromises and their impacts - The diversity and** complexity of interconnected services we rely on daily - a fancy way of saying if a cog in that technical or service wheel gets stuck (or… encrypted) - uhoh, trouble. ----- **Your software supply chain - The Kaseya incident very much has shades of** PHP/SolarWinds activity, showing how destructive unauthorized modifications to software packages can be. If you are a software developer or a user of the software, it has become increasingly apparent that organizations need to have a better understanding of the processes involved in updating or developing software that they use or sell. If you are a Kaseya VSA on-prem customer, drop down to the “Detecting REvil **_Ransomware Kaseya in Splunk”_** section to immediately assess your environment using Splunk or take a peek at the wealth of content in the MITRE ATT&CK section where we pull every Splunk security search we have that maps to REvil TTPs via the MITRE ATT&CK method. ## Detecting REvil Ransomware Kaseya in Splunk As many of you know, the primary challenge in detecting ransomware is the speed with which ransomware can impact systems. With a rapid response, the spread of ransomware can be limited. Unfortunately, in most cases, by the time an attack is detected, files are already encrypted. That said, we want to provide some insight into detections that provide awareness of these activities happening (as well actions one can take to mitigate the risk of attacks like this). ----- With that in mind, we are providing a set of indicators and Splunk searches to help uncover Kaseya in your environment. If you use Enterprise Security and other Splunk products, take a look at the “Know thy self” section below for how to scan and determine your networks susceptibility to this specific attack. ### Indicators of Compromise (IOCs) [Sophos and](https://community.sophos.com/b/security-blog/posts/active-ransomware-attack-on-kaseya-customers) [Cado Security have both published IOCs for Kaseya. Throw them into a Lookup](https://www.cadosecurity.com/post/resources-for-dfir-professionals-responding-to-the-revil-ransomware-kaseya-supply-chain-attack) table or ES threat intel framework, and off you go! We have converted these indicators into a [simple CSV format to use them as lookup tables - they are posted](https://docs.splunk.com/Documentation/Splunk/8.1.2/Knowledge/Aboutlookupsandfieldactions) [here.](https://github.com/davisshannon/Splunk-REvil-Kaseya-IOCs) Additionally, Cado Security has published a sample packet capture (PCAP) file on their [Github repository covering SSL/TLS connections to some of the domains contained in the](https://github.com/cado-security/DFIR_Resources_REvil_Kaseya) IOC data above. ### Searches [Huntress has done great work detailing activities that the ransomware code performs, and](https://www.huntress.com/blog/rapid-response-kaseya-vsa-mass-msp-ransomware-incident) we will highlight some of this in our detection searches. From a Splunk detection perspective, here are some data sets that we always suggest collecting: [Process execution logs from our favorite Windows Security 4688 events, or Sysmon](https://www.splunk.com/en_us/blog/security/peeping-through-windows-logs.html) EventCode 1, or any commercial EDR, are crucial to detecting the processes involved in actions on intent and lateral movement, amongst other activities. [PowerShell Script Block Logging is also critical to detect certain modules being used](https://conf.splunk.com/files/2016/slides/powershell-power-hell-hunting-for-malicious-use-of-powershell-with-splunk.pdf) where you don’t expect and the use of encoded PowerShell. One of its initial endpoint actions is to disable a litany of Microsoft Defender for Endpoint technologies when the ransomware runs. A litany, you say? It will disable accurate time monitoring, IPS, cloud lookup, script scanning, controlled folder access, network protection, and stop cloud sample submissions. It accomplishes this by issuing a PowerShell command to turn these all off, so if you are monitoring PowerShell scripting, this could be a quick hit if you see all of these protections being disabled concurrently. The detection search below requires a configuration in your inputs.conf file to monitor WinEventLog://Microsoft-Windows-PowerShell/Operational on the client where your Splunk Universal Forwarder is installed. We are only including two of the Defender technologies being turned off in the same command line for this search. A single technology being turned off could create false positives by authorized users, but the chances that a second technology being turned off simultaneously is unlikely to be benign. Notice the wildcards in the Message field so that the search would still return results in case the order of the technologies is different. One other ----- comment here, keep in mind that certain values can be shortened in scripts as well. For example, -drtm can be used in place of -disablerealtimemonitoring, so flexibility in searches is key! ``` source="WinEventLog:Microsoft-Windows-PowerShell/Operational" | search Message="*Set-MpPreference -Disable* $true* -Disable* $true*" | table _time, host, Message ``` If we wanted to use the specific command found in the ransomware, we could use the following search instead. This would have the benefit of creating an exact match but potentially risk missing variants that reorder the technologies in the command itself. ``` source="WinEventLog:Microsoft-Windows-PowerShell/Operational" | search Message="*Set-MpPreference -DisableRealtimeMonitoring $true DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true DisableScriptScanning $true -EnableControlledFolderAccess Disabled EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled SubmitSamplesConsent NeverSend*" | table _time, host, Message ``` But wait! I don’t have PowerShell logging set up today. Are there other options to detect this behavior? Of course! Microsoft Sysmon, Event Code 1 for Process Creation, and Windows Security Event Code 4688, A new process has been created, are great to use as well. Here is what the Sysmon Event Code 1 search would look like. Depending on your configuration, the source and sourcetype might vary slightly. This same logic can be applied to your EDR platform of choice. ----- ``` source WinEventLog:Microsoft Windows Sysmon/Operational EventCode 1 cmdline="*powershell.exe Set-MpPreference -DisableRealtimeMonitoring $true DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true DisableScriptScanning $true -EnableControlledFolderAccess Disabled EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled SubmitSamplesConsent NeverSend*" | table _time, host ``` Similarly, if you look at process creation in Windows Event logs, your search would look like this. Depending on your configuration, the source and sourcetype might vary slightly. ``` source="WinEventLog:Security" EventCode=4688 Process_Command_Line="*powershell.exe Set-MpPreference -DisableRealtimeMonitoring $true -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableScriptScanning $true EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force MAPSReporting Disabled -SubmitSamplesConsent NeverSend*" | table _time, host ``` Windows Defender status is logged to the Application folder in Windows Event Viewer. A search of the Event Code 15 and the message in the search will indicate when Defender real-time monitoring has been turned off in the manner of this ransomware. Just because you see these events does NOT mean you have been infected, but it does indicate that Defender real-time was turned off, and if the other search options above are not available to you, this might be a place to start. ``` source="WinEventLog:Application" EventCode=15 Message="Updated Windows Defender status successfully to SECURITY_PRODUCT_STATE_SNOOZED." | table _time host Message ``` On the outside chance that you are sending Microsoft-Windows-Windows Defender/Operational events to Splunk, a search like this will return events from the Defender application, and the details in the events will show when configurations of these technologies are changed. ``` source="WinEventLog:Microsoft-Windows-Windows Defender/Operational" EventCode IN (5001, 5004, 5007) | table _time host Message ``` Along with disabling Defender, an older version (circa 2014) of msmpeng.exe (Defender) is being used to sideload REvil into the Kaseya agent software. The hash of this older executable is included in the Github IOC repository listed above. If you have Sysmon EventCode 7, Image Loaded events, the following search could be helpful to detect this side-loading of malicious DLLs as well. ----- ``` source WinEventLog:Microsoft Windows Sysmon/Operational EventCode 7 Image="*MsMpEng.exe" ImageLoaded="*mpsvc.dll" SHA256 IN (e2a24ab94f865caeacdf2c3ad015f31f23008ac6db8312c2cbfb32e4a5466ea2, 8dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd) ``` [Moving into other process execution activity within the ransomware, GossiTheDog shared a](https://github.com/GossiTheDog/ThreatHunting/blob/9e3a20d7c046bd7aac765a1a7df762ac7e3acffe/AdvancedHuntingQueries/KaseyaRansomwarePayload.ahq) specific process command line. Here is what that search looks like in both Sysmon and Window Events, with the same caveats mentioned above. ``` source="WinEventLog:Microsoft-Windows-Sysmon/Operational" EventCode=1 cmdline="c:\\kworking\\agent.exe*" | table _time, host, cmdline source="WinEventLog:Security" EventCode=4688 Process_Command_Line="c:\\kworking\\agent.exe*" | table _time, host, Process_Command_Line ## Splunk Enterprise Security, Splunk SOAR, and Enterprise Security Content Updates (ESCU) ### Know Thyself ``` While we have spent some time explaining this attack and effort needs to be put toward investigating this, it is also important to remember that the foundational elements of cybersecurity, such as asset management, are as crucial as ever. When performed well via your asset and identity framework, you can quickly identify where your vulnerable systems reside. Running regular vulnerability scans that integrate into Splunk will display which systems are vulnerable and can help you prioritize your patching schedule and better focus your detection efforts. In the case of ransomware, knowing which assets to protect or are impacted as quickly as possible can be key to your defense strategy. [While the details of the vulnerability in the Kaseya software have not been detailed, it](https://therecord.media/kaseya-zero-day-involved-in-ransomware-attack-patches-coming/) appears that the [CVE-2021-30116 will be utilized, and as vulnerability assessment solutions](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30116) update their platforms, searching for this vulnerability will be essential to understand future exposure to this attack vector. ----- ### Threat Intelligence Framework [If you are using Splunk Enterprise Security, the lookups of IOCs listed above can be](https://www.splunk.com/en_us/software/enterprise-security.html) ingested easily into the threat intelligence framework. Perhaps you aren’t sure how to do that. No worries, we published some guidance and a how-to on integrating lists of IOCs into the Enterprise Security threat intelligence framework. ### Enterprise Security Content Updates (ESCU) If you have ESCU running today, you already have some great coverage! For folks using [ESCU, our Security Research team has already released a new Splunk Analytic Story REvil](https://splunkbase.splunk.com/app/3449/) Ransomware, containing detections for this threat. Saying that, check out the MITRE ATT&CK table below for all the searches we can find!. ### Splunk SOAR [For folks using Splunk SOAR, we don’t have any customized playbooks out yet, but we have](https://www.splunk.com/en_us/software/splunk-security-orchestration-and-automation.html) lots of examples that are a great place to start: [Automate Your Response to WannaCry Ransomware](https://www.splunk.com/en_us/blog/security/automate-your-response-to-wannacry-ransomware.html) [Playbook: Detect, Block, Contain, and Remediate Ransomware](https://www.splunk.com/en_us/blog/security/playbook-ransomware-detect-block-contain-and-remediate.html) [Playbook: Ransomware Investigate and Contain](https://my.phantom.us/4.10/playbook/ransomware-investigate-and-contain-8/) ----- ## Splunk Services and workshops ### Workshops Maybe at this point of the day, you are thinking, “Hey, I need to get savvier about detecting _and responding to ransomware.” Don’t worry; Splunk has you covered. Head over to_ [https://bots.splunk.com/ and create a Splunk.com account. If you already have one, cool, use](https://bots.splunk.com/) that and log in. You will immediately have access to a virtual “Getting Started with Splunk for [Security” workshop, AND you can enter to participate in BOTS DAY North America on](https://www.splunk.com/en_us/blog/security/what-you-need-to-know-about-boss-of-the-soc.html) August 5th, 2021. Stay tuned for more content that will be coming soon! ### Engagements Our team of Security Professionals that are part of our Splunk Professional Services team can help you implement everything we’ve mentioned here. We also have more targeted [offerings that can help you increase your security posture as well.](https://www.splunk.com/en_us/support-and-services/splunk-services/offerings/security-and-compliance-services.html) ### Splunk Services for Breach Response and Readiness This is all about Splunk experts working in collaboration with you and your team to help prepare for and respond to a breach using our suite of products. Rapid data source identification and onboarding How to incorporate and use threat intelligence Prebuilt content with searches and dashboards to facilitate faster investigation and remediation Tactical response planning Tabletop exercise to validate how you respond using the Splunk products you have ----- ## MITRE ATT&CK After reviewing dozens of blogs and reviewing the MITRE ATT&CK team’s review of REvil we pulled all of our content that maps to the MITRE ATT&CK TTPs and listed them in a nice table below. Be aware; these searches are provided as a way to accelerate your hunting. We [recommend you configure them via the Splunk Security Essentials App. You may need to](https://splunkbase.splunk.com/app/3435/) modify them to work in your environment! Many of these searches are optimized for use with the tstats command. Some of these are so new they are coming straight out of the Splunk Threat Research Team’s repo! Please note that not all of these will be 100% relevant to Kaseya or REvil, but more information is better than none. For detailed information on detecting REvil, make sure to read the upcoming Splunk Threat Research Team’s blog on REvil ransomware. Finally, as more information becomes available, we will update these searches if more ATT&CK TTPs become known. Pay special attention to the Splunk searches that are BOLDED and have (NEW) with them… the STRT freshly creates these to help you with REvil. For our complete reading list, check our bibliography at the end of the blog) **ATT&CK** **Technique** **Technique/Sub-** **Technique Title** T1562.001 Disable or Modify Tools **Splunk Searches** [Hide User Account From Sign-In Screen](https://github.com/splunk/security_content/blob/develop/detections/endpoint/hide_user_account_from_sign_in_screen.yml) [Excessive Usage Of Taskkill](https://github.com/splunk/security_content/blob/develop/detections/endpoint/excessive_usage_of_taskkill.yml) [Disable Registry Tool](https://github.com/splunk/security_content/blob/develop/detections/endpoint/disable_registry_tool.yml) [Disable Windows SmartScreen Protection](https://github.com/splunk/security_content/blob/develop/detections/endpoint/disable_windows_smartscreen_protection.yml) [Disable Windows Behavior Monitoring](https://github.com/splunk/security_content/blob/develop/detections/endpoint/disable_windows_behavior_monitoring.yml) [Disabling SystemRestore In Registry](https://github.com/splunk/security_content/blob/develop/detections/endpoint/disabling_systemrestore_in_registry.yml) [Disabling CMD Application](https://github.com/splunk/security_content/blob/develop/detections/endpoint/disabling_cmd_application.yml) [Unload Sysmon Filter Driver](https://github.com/splunk/security_content/blob/develop/detections/endpoint/unload_sysmon_filter_driver.yml) [Windows DisableAntiSpyware Registry](https://github.com/splunk/security_content/blob/develop/detections/endpoint/windows_disableantispyware_reg.yml) [Disabling ControlPanel](https://github.com/splunk/security_content/blob/develop/detections/endpoint/disabling_controlpanel.yml) [Disabling Firewall with Netsh](https://github.com/splunk/security_content/blob/develop/detections/endpoint/disabling_firewall_with_netsh.yml) [Attempt To Stop Security Service](https://github.com/splunk/security_content/blob/develop/detections/endpoint/attempt_to_stop_security_service.yml) Excessive number of service control start as disabled [Disable Windows App Hotkeys](https://github.com/splunk/security_content/blob/develop/detections/endpoint/disable_windows_app_hotkeys.yml) [Disable Show Hidden Files](https://github.com/splunk/security_content/blob/develop/detections/endpoint/disable_show_hidden_files.yml) [Disabling NoRun Windows App](https://github.com/splunk/security_content/blob/develop/detections/endpoint/disabling_norun_windows_app.yml) [Disabling Task Manager](https://github.com/splunk/security_content/blob/develop/detections/endpoint/disabling_task_manager.yml) [Process Kill Base On File Path](https://github.com/splunk/security_content/blob/develop/detections/endpoint/process_kill_base_on_file_path.yml) [Disabling FolderOptions Windows Feature](https://github.com/splunk/security_content/blob/develop/detections/endpoint/disabling_folderoptions_windows_feature.yml) ----- T1204 User Execution [Clop Common Exec Parameter](https://github.com/splunk/security_content/blob/develop/detections/endpoint/clop_common_exec_parameter.yml) [Revil Common Exec Parameter](https://github.com/splunk/security_content/blob/develop/detections/endpoint/revil_common_exec_parameter.yml) [Conti Common Exec parameter](https://github.com/splunk/security_content/blob/develop/detections/endpoint/conti_common_exec_parameter.yml) [Revil Common Exec Parameter (NEW)](https://github.com/splunk/security_content/blob/develop/detections/endpoint/revil_common_exec_parameter.yml) T1007 System Service Discovery Reconnaissance and Access to Processes and Services via Mimikatz modules Reconnaissance and Access to Operating System Elements via PowerSploit modules T1012 Query Registry Reconnaissance and Access to Operating System Elements via PowerSploit modules [Revil Registry Entry (NEW)](https://github.com/splunk/security_content/blob/develop/detections/endpoint/revil_registry_entry.yml) T1485 Data Destruction [Common Ransomware Extensions](https://github.com/splunk/security_content/blob/develop/detections/endpoint/common_ransomware_extensions.yml) [Common Ransomware Notes](https://github.com/splunk/security_content/blob/develop/detections/endpoint/common_ransomware_notes.yml) [High File Deletion Frequency](https://github.com/splunk/security_content/blob/develop/detections/endpoint/high_file_deletion_frequency.yml) T1069.002 Domain Groups Detect AzureHound Command-Line Arguments Detect SharpHound Command-Line Arguments [Detect SharpHound File Modifications](https://github.com/splunk/security_content/blob/develop/detections/endpoint/detect_sharphound_file_modifications.yml) [Detect AzureHound File Modifications](https://github.com/splunk/security_content/blob/develop/detections/endpoint/detect_azurehound_file_modifications.yml) [Detect SharpHound Usage](https://github.com/splunk/security_content/blob/develop/detections/endpoint/detect_sharphound_usage.yml) T1489 Service Stop [Excessive Attempt To Disable Services](https://github.com/splunk/security_content/blob/develop/detections/endpoint/excessive_attempt_to_disable_services.yml) [Windows Security Account Manager Stopped](https://github.com/splunk/security_content/blob/develop/detections/endpoint/windows_security_account_manager_stopped.yml) [Excessive Service Stop Attempt](https://github.com/splunk/security_content/blob/develop/detections/endpoint/excessive_service_stop_attempt.yml) T1189 Drive-by Compromise Detect hosts connecting to dynamic domain providers T1059.003 Windows Command Shell [Ryuk Wake on LAN Command](https://github.com/splunk/security_content/blob/develop/detections/endpoint/ryuk_wake_on_lan_command.yml) Detect Prohibited Applications Spawning cmd exe [CMD Echo Pipe - Escalation](https://github.com/splunk/security_content/blob/develop/detections/endpoint/cmd_echo_pipe___escalation.yml) Detect Use of cmd exe to Launch Script Interpreters ----- T1027 Obfuscated Files or Information T1083 File and Directory Discovery T1486 Data Encrypted for Impact T1082 System Information Discovery T1059.001 PowerShell T1204.002 Malicious File [Wermgr Process Create Executable File](https://github.com/splunk/security_content/blob/develop/detections/endpoint/wermgr_process_create_executable_file.yml) Malicious PowerShell Process - Encoded Command Powershell Fileless Script Contains Base64 Encoded Content Reconnaissance and Access to Operating System Elements via PowerSploit modules AWS Detect Users with KMS keys performing encryption S3 AWS Detect Users creating keys with encrypt policy without MFA [High Process Termination Frequency](https://github.com/splunk/security_content/blob/develop/detections/endpoint/high_process_termination_frequency.yml) [Ransomware Notes bulk creation](https://github.com/splunk/security_content/blob/develop/detections/endpoint/ransomware_notes_bulk_creation.yml) [Samsam Test File Write](https://github.com/splunk/security_content/blob/develop/detections/endpoint/samsam_test_file_write.yml) [Ryuk Test Files Detected](https://github.com/splunk/security_content/blob/develop/detections/endpoint/ryuk_test_files_detected.yml) [System Information Discovery Detection](https://github.com/splunk/security_content/blob/develop/detections/endpoint/system_information_discovery_detection.yml) [Web Servers Executing Suspicious Processes](https://github.com/splunk/security_content/blob/develop/detections/experimental/application/web_servers_executing_suspicious_processes.yml) Detect attackers scanning for vulnerable JBoss servers T1071.001 Web Protocols [TOR Traffic](https://github.com/splunk/security_content/blob/develop/detections/experimental/network/tor_traffic.yml) T1140 Deobfuscate/Decode Files or Information [Powershell Using memory As Backing Store](https://github.com/splunk/security_content/blob/develop/detections/endpoint/powershell_using_memory_as_backing_store.yml) [CertUtil With Decode Argument](https://github.com/splunk/security_content/blob/develop/detections/endpoint/certutil_with_decode_argument.yml) T1112 Modify Registry [FodHelper UAC Bypass](https://github.com/splunk/security_content/blob/develop/detections/endpoint/fodhelper_uac_bypass.yml) [Revil Registry Entry](https://github.com/splunk/security_content/blob/develop/detections/endpoint/revil_registry_entry.yml) [Suspicious Reg exe Process](https://github.com/splunk/security_content/blob/develop/detections/endpoint/suspicious_reg_exe_process.yml) ----- T1055 Process Injection Reconnaissance of Process or Service Hijacking Opportunities via Mimikatz modules Suspicious DLLHost no Command Line Arguments Powershell Fileless Process Injection via GetProcAddress Illegal Service and Process Control via PowerSploit modules DLLHost with no Command Line Arguments with Network Illegal Service and Process Control via Mimikatz modules [Cobalt Strike Named Pipes](https://github.com/splunk/security_content/blob/develop/detections/endpoint/cobalt_strike_named_pipes.yml) [Trickbot Named Pipe](https://github.com/splunk/security_content/blob/develop/detections/endpoint/trickbot_named_pipe.yml) Suspicious GPUpdate no Command Line Arguments Suspicious SearchProtocolHost no Command Line Arguments Applying Stolen Credentials via Mimikatz modules SearchProtocolHost with no Command Line with Network Powershell Remote Thread To Known Windows Process Applying Stolen Credentials via PowerSploit modules GPUpdate with no Command Line Arguments with Network T1106 Native API Illegal Service and Process Control via PowerSploit modules Illegal Service and Process Control via Mimikatz modules T1490 Inhibit System Recovery [Delete ShadowCopy With PowerShell](https://github.com/splunk/security_content/blob/develop/detections/endpoint/delete_shadowcopy_with_powershell.yml) [BCDEdit Failure Recovery Modification](https://github.com/splunk/security_content/blob/develop/detections/endpoint/bcdedit_failure_recovery_modification.yml) [Known Services Killed by Ransomware](https://github.com/splunk/security_content/blob/develop/detections/endpoint/known_services_killed_by_ransomware.yml) [WBAdmin Delete System Backups](https://github.com/splunk/security_content/blob/develop/detections/endpoint/wbadmin_delete_system_backups.yml) [Resize ShadowStorage volume](https://github.com/splunk/security_content/blob/develop/detections/endpoint/resize_shadowstorage_volume.yml) [Deleting Shadow Copies](https://github.com/splunk/security_content/blob/develop/detections/endpoint/deleting_shadow_copies.yml) [Prevent Automatic Repair Mode using Bcdedit](https://github.com/splunk/security_content/blob/develop/detections/endpoint/prevent_automatic_repair_mode_using_bcdedit.yml) [Known Services Killed by Ransomware](https://github.com/splunk/security_content/blob/develop/detections/endpoint/known_services_killed_by_ransomware.yml) (NEW) ----- T1105 Ingress Tool Transfer [Download Files Using Telegram](https://github.com/splunk/security_content/blob/develop/detections/endpoint/download_files_using_telegram.yml) CertUtil Download With URLCache and Split Arguments CertUtil Download With VerifyCtl and Split Arguments [BITSAdmin Download File](https://github.com/splunk/security_content/blob/develop/detections/endpoint/bitsadmin_download_file.yml) [Suspicious Curl Network Connection](https://github.com/splunk/security_content/blob/develop/detections/experimental/endpoint/suspicious_curl_network_connection.yml) T1041 Exfiltration Over C2 Channel [Detect SNICat SNI Exfiltration](https://github.com/splunk/security_content/blob/develop/detections/experimental/network/detect_snicat_sni_exfiltration.yml) T1070.004 File Deletion [Clear Unallocated Sector Using Cipher App](https://github.com/splunk/security_content/blob/develop/detections/endpoint/clear_unallocated_sector_using_cipher_app.yml) T1547.001 Registry Run Keys / Startup Folder T1566.001 Spearphishing Attachment [Start Up During Safe Mode Boot](https://github.com/splunk/security_content/blob/develop/detections/endpoint/start_up_during_safe_mode_boot.yml) [Registry Keys Used For Persistence](https://github.com/splunk/security_content/blob/develop/detections/endpoint/registry_keys_used_for_persistence.yml) [Winword Spawning Windows Script Host](https://github.com/splunk/security_content/blob/develop/detections/endpoint/winword_spawning_windows_script_host.yml) [Winword Spawning PowerShell](https://github.com/splunk/security_content/blob/develop/detections/endpoint/winword_spawning_powershell.yml) Office Document Spawned Child Process To Download [Office Product Spawning BITSAdmin](https://github.com/splunk/security_content/blob/develop/detections/endpoint/office_product_spawning_bitsadmin.yml) [Office Application Spawn rundll32 process](https://github.com/splunk/security_content/blob/develop/detections/endpoint/office_application_spawn_rundll32_process.yml) [Office Product Spawning MSHTA](https://github.com/splunk/security_content/blob/develop/detections/endpoint/office_product_spawning_mshta.yml) [Office Document Creating Schedule Task](https://github.com/splunk/security_content/blob/develop/detections/endpoint/office_document_creating_schedule_task.yml) [Winword Spawning Cmd](https://github.com/splunk/security_content/blob/develop/detections/endpoint/winword_spawning_cmd.yml) [Office Product Spawning Wmic](https://github.com/splunk/security_content/blob/develop/detections/endpoint/office_product_spawning_wmic.yml) [Office Document Executing Macro Code](https://github.com/splunk/security_content/blob/develop/detections/endpoint/office_document_executing_macro_code.yml) [Office Product Spawning CertUtil](https://github.com/splunk/security_content/blob/develop/detections/endpoint/office_product_spawning_certutil.yml) Office Product Spawning Rundll32 with no DLL [Suspicious Email Attachment Extensions](https://github.com/splunk/security_content/blob/develop/detections/experimental/application/suspicious_email_attachment_extensions.yml) [Detect Outlook exe writing a zip file](https://github.com/splunk/security_content/blob/develop/detections/experimental/endpoint/detect_outlook_exe_writing_a_zip_file.yml) T1218.003 CMSTP [Wbemprox COM Object Execution](https://github.com/splunk/security_content/blob/develop/detections/endpoint/wbemprox_com_object_execution.yml) [CMLUA Or CMSTPLUA UAC Bypass](https://github.com/splunk/security_content/blob/develop/detections/endpoint/cmlua_or_cmstplua_uac_bypass.yml) [Wbemprox COM Object Execution (NEW)](https://github.com/splunk/security_content/blob/develop/detections/endpoint/wbemprox_com_object_execution.yml) T1047 Windows Management Instrumentation [Script Execution via WMI](https://github.com/splunk/security_content/blob/develop/detections/endpoint/script_execution_via_wmi.yml) [Process Execution via WMI](https://github.com/splunk/security_content/blob/develop/detections/endpoint/process_execution_via_wmi.yml) [Remote WMI Command Attempt](https://github.com/splunk/security_content/blob/develop/detections/endpoint/remote_wmi_command_attempt.yml) [Remote Process Instantiation via WMI](https://github.com/splunk/security_content/blob/develop/detections/endpoint/remote_process_instantiation_via_wmi.yml) Reconnaissance and Access to Operating System Elements via PowerSploit modules [WMI Permanent Event Subscription](https://github.com/splunk/security_content/blob/develop/detections/experimental/endpoint/wmi_permanent_event_subscription.yml) [WMI Temporary Event Subscription](https://github.com/splunk/security_content/blob/develop/detections/experimental/endpoint/wmi_temporary_event_subscription.yml) ----- T1491 Defacement [Modification Of Wallpaper (NEW)](https://github.com/splunk/security_content/blob/develop/detections/endpoint/modification_of_wallpaper.yml) **Here is a list of all the MITRE ATT&CK TTP’s that we have found that are relevant to** **this incident or REvil ransomware:** T1134.001 T1134.002 T1071.001 T1059.001 T1059.003 T1059.005 T1485 T1486 T1140 T1189 T1573.002 T1041 T1083 T1562.001 T1070.004 T1105 T1490 T1036.005 T1112 T1106 T1027 T1491 T1069.002 T1566.001 T1055 T1012 T1489 T1082 T1007 T1204.002 T1047 T1204 T1218.003 T1547.001 ## rcanary is a little something extra... In an attempt to get my boss off my back, I told [James Brodsky that he should “create a TA](https://www.splunk.com/en_us/blog/author/jbrodsky.html) that detects files being encrypted.” Of course, he took me seriously and went off and created [“TA-rcanary.” This TA uses fschange, a deprecated feature of the Splunk UF (which still](https://github.com/stressboi/TA-rcanary) works), to monitor a single randomly named .docx file in a hidden directory on the Windows filesystem. Upon the first run, the .docx file is created in this directory. Then, a fschange entry is added to the inputs.conf, and every 15 seconds, this file is monitored for any changes. If any changes occur to it (copy of it, delete it, rename it, etc.), an event is generated and indexed in Splunk, as shown below. Keep in mind that this is a very new TA and will probably need some changes, but if it helps, you have “Splunkspiration” and detects some encrypted files… all the better! ## Conclusion We know that many of you are coming to this blog not because you were impacted directly by the Kaseya ransomware incident but because you are worried that you might be affected in the future. Hopefully, the content above will provide you with searches that give you the ability to have more visibility into your environment and detect (and we hope it never does) a ransomware outbreak in your network. If they don’t work perfectly, think of them as “SplunkSpiration” :-). ----- We will update this blog and add new content as needed over the next week, but keep your eyes peeled for the upcoming publication on REvil ransomware by the Splunk Threat Research team. Furthermore, Splunk will be developing significantly more content this month around ransomware. Workshops, webinars, Twitter Spaces, and much more, so watch out for those coming soon. Finally, even though this blog primarily focused on ransomware, the more significant concern is that this attack appears to be propagated via the software supply chain of the victims. We recognize what a big deal this is and have dedicated sessions at October’s .conf21 around this very topic. If you are new to Supply Chain attacks and want to learn how to defend your org against things like SolarWinds or Kaseya, consider attending my talk with Marcus LaFerrerra, “Hunting the known unknown: Supply Chain Attacks” (SEC-1745). If you are a defender whose company builds software, I’d suggest attending “Securing the software factory with Splunk” (SEC-1108) by Dave Herrald and Chris Riley. No matter what you do, I hope that you could get some enjoyment this weekend and weren’t chained to the desk like we were. As always, happy hunting :-) And one more thing: As we’ve stated before, this blog ain’t the first time we’re covering our approach to Ransomware: **.conf talks and videos** [Splunking the Endpoint 2016: Ransomware Edition! and](https://conf.splunk.com/files/2016/slides/splunking-the-endpoint-hands-on.pdf) [Video](https://conf.splunk.com/files/2016/recordings/splunking-the-endpoint-hands-on.mp4) [How Splunk Can Help You Prevent Ransomware From Holding Your Business Hostage](https://www.splunk.com/en_us/blog/security/how-splunk-can-help-you-prevent-ransomware-from-holding-your-business-hostage.html) Windows Ransomware Detection with Splunk (1 of 6) – Vulnerability Detection and Windows Patch Status **Detections Blogs** **Whitepaper** [Splunk Security: Detecting Unknown Malware and Ransomware](https://www.splunk.com/en_us/form/detecting-unknown-malware.html) **Splunk SOAR Responses** **Machine Learning Method** [Detect Ransomware in Your Data with the Machine Learning Cloud Service](https://www.splunk.com/en_us/blog/security/detect-ransomware-in-your-data-with-the-machine-learning-cloud-service.html) **Operationalizing Detections** [Operationalize Ransomware Detections Quickly and Easily with Splunk](https://www.splunk.com/en_us/blog/industries/operationalize-ransomware-detections-quickly-and-easily-with-splunk.html) ## Bibliography/Reading list ----- Beaumont, Kevin. GossiTheDog/ThreatHunting. 2017. 3 July 2021, https://github.com/GossiTheDog/ThreatHunting/blob/9e3a20d7c046bd7aac765a1a7df762ac 7e3acffe/AdvancedHuntingQueries/KaseyaRansomwarePayload.ahq. ---. “Kaseya Supply Chain Attack Delivers Mass Ransomware Event to US Companies.” Medium, 3 July 2021, https://doublepulsar.com/kaseya-supply-chain-attack-delivers-massransomware-event-to-us-companies-76e4ec6ec64b. Cado-Security/DFIR_Resources_REvil_Kaseya. 2021. Cado Security, 2021. GitHub, [https://github.com/cado-security/DFIR_Resources_REvil_Kaseya.](https://github.com/cado-security/DFIR_Resources_REvil_Kaseya) [---. 2021. 4 July 2021, https://github.com/cado-security/DFIR_Resources_REvil_Kaseya.](https://github.com/cado-security/DFIR_Resources_REvil_Kaseya) cdoman1. “Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack.” Cado Security, 3 July 2021, https://www.cadosecurity.com/post/resources-for-dfir-professionals-responding-to-the-revilransomware-kaseya-supply-chain-attack. E, Mehmet. Cyb3r-Monk/Threat-Hunting-and-Detection. 2020. 3 July 2021, https://github.com/Cyb3r-Monk/Threat-Hunting-and[Detection/blob/4217cfec566f7f3b30d6e227fd3870a47ca390f6/Command%20and%20Control](https://github.com/Cyb3r-Monk/Threat-Hunting-and-Detection/blob/4217cfec566f7f3b30d6e227fd3870a47ca390f6/Command%20and%20Control/Suspicious%20Network%20Connections%20-%20Supply%20Chain%20Attack.md) /Suspicious%20Network%20Connections%20-%20Supply%20Chain%20Attack.md. Facebook, Share on, et al. “Supply Chain Attack on Kaseya Infects Hundreds with Ransomware: What We Know.” VentureBeat, 3 July 2021, https://venturebeat.com/2021/07/03/supply-chain-attack-on-kaseya-infects-hundreds-ofvictims-with-ransomware-what-we-know/. Gevers, Victor. “Kaseya Case Update 2.” DIVD CSIRT, 4 July 2021, [https://csirt.divd.nl/2021/07/04/Kaseya-Case-Update-2/.](https://csirt.divd.nl/2021/07/04/Kaseya-Case-Update-2/) Hammond, John. Rapid Response: Mass MSP Ransomware Incident. [https://www.huntress.com/blog/rapid-response-kaseya-vsa-mass-msp-ransomware-incident.](https://www.huntress.com/blog/rapid-response-kaseya-vsa-mass-msp-ransomware-incident) Accessed 4 July 2021. huntresslabs. “Crticial Ransomware Incident in Progress.” R/Msp, 2 July 2021, [www.reddit.com/r/msp/comments/ocggbv/crticial_ransomware_incident_in_progress/.](https://doi.org/www.reddit.com/r/msp/comments/ocggbv/crticial_ransomware_incident_in_progress/) “Important Notice July 3rd, 2021.” Kaseya, https://helpdesk.kaseya.com/hc/engb/articles/4403440684689-Important-Notice-July-3rd-2021. Accessed 3 July 2021. Kaseya Ransomware Supply Chain Attack: What You Need To Know. https://symantecenterprise-blogs.security.com/blogs/threat-intelligence/kaseya-ransomware-supply-chain. Accessed 3 July 2021. ----- Kaseya Supply‑chain Attack: What We Know so Far. WeLiveSecurity, 3 July 2021, https://www.welivesecurity.com/2021/07/03/kaseya-supply-chain-attack-what-we-know-sofar/. Kaseya VSA Supply-Chain Ransomware Attack. https://community.sophos.com/b/securityblog/posts/active-ransomware-attack-on-kaseya-customers. Accessed 3 July 2021. Mark Loman @🏡. “We Are Monitoring a REvil ‘supply Chain’ Attack Outbreak, Which Seems to Stem from a Malicious Kaseya Update. REvil Binary C:\Windows\mpsvc.Dll Is Side-Loaded into a Legit Microsoft Defender Copy, Copied into C:\Windows\MsMpEng.Exe to Run the Encryption from a Legit Process.” @markloman, 2 July 2021, [https://twitter.com/markloman/status/1411035534554808331.](https://twitter.com/markloman/status/1411035534554808331) Mehmet Ergene. “How to Detect Software Supply Chain Attacks with #Sysmon, #MicrosoftDefender, or Any Other #EDR: 1. You Use Specific Software in Your Environment. 2. The Software Is Usually Installed on a Few Servers That Have Privileges across the Environment.” @Cyb3rMonk, 3 July 2021, [https://twitter.com/Cyb3rMonk/status/1411404182054178826.](https://twitter.com/Cyb3rMonk/status/1411404182054178826) Shutdown Kaseya VSA Servers Now amidst Cascading REvil Attack against MSPs, Clients | Malwarebytes. https://blog.malwarebytes.com/cybercrime/2021/07/shutdown-kaseya-vsa[servers-now-amidst-cascading-revil-attack-against-msps-clients/amp/?](https://blog.malwarebytes.com/cybercrime/2021/07/shutdown-kaseya-vsa-servers-now-amidst-cascading-revil-attack-against-msps-clients/amp/?__twitter_impression=true) __twitter_impression=true. Accessed 3 July 2021. Splunk Security Content Analytic Story - Splunk Documentation. [https://docs.splunk.com/Documentation/ESSOC/3.24.0/stories/UseCase#Revil_ransomware.](https://docs.splunk.com/Documentation/ESSOC/3.24.0/stories/UseCase#Revil_ransomware) Accessed 3 July 2021. Threat-Hunting-and-Detection/Suspicious Network Connections - Supply Chain Attack.Md at Main · Cyb3r-Monk/Threat-Hunting-and-Detection. https://github.com/Cyb3r-Monk/ThreatHunting-andDetection/blob/main/Command%20and%20Control/Suspicious%20Network%20Connections %20-%20Supply%20Chain%20Attack.md. Accessed 3 July 2021. Will, Bushido. “My Current @MaltegoHQ Graph Researching the #REvil Supply-Chain Attack on #Kaseya: Https://T.Co/TOk1tiqr4S.” @BushidoToken, 3 July 2021, [https://twitter.com/BushidoToken/status/1411469864653496321.](https://twitter.com/BushidoToken/status/1411469864653496321) -----