# THREAT ANALYSIS REPORT: From Shathak Emails to the Conti Ransomware
**[cybereason.com/blog/threat-analysis-report-from-shatak-emails-to-the-conti-ransomware](https://www.cybereason.com/blog/threat-analysis-report-from-shatak-emails-to-the-conti-ransomware)**
Written By
Cybereason Global SOC Team
November 9, 2021 | 9 minute read
-----
The Cybereason Global Security Operations Center (GSOC) issues Cybereason Threat Analysis reports to
inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical
recommendations for protecting against them.
In this Threat Analysis report, the GSOC investigates recent attack campaigns that reflect the current
developments of the ITG23 threat group (also known as the TrickBot Gang or Wizard Spider). The ITG23 group is
partnering with the TA551 (Shathak) threat group to distribute ITG23’s TrickBot and BazarBackdoor malware,
which malicious actors use to deploy ITG23’s Conti ransomware on compromised systems.
## Key Findings
**Beware of Shathak Emails: In** [partnership with the ITG23 threat group, the Shathak threat group](https://securityintelligence.com/posts/trickbot-gang-doubles-down-enterprise-infection/)
distributes ITG23’s TrickBot and BazarBackdoor malware as password-protected archive files
attached to phishing emails. The archive files contain malicious documents whose macros download
and execute the TrickBot or BazarBackdoor malware. Malicious actors actively use this malware to
deploy ITG23’s Conti ransomware on compromised systems.
**Average Two Days Time-to-Ransom (TTR): Conti actors do not deploy ransomware immediately**
after initial infection using the TrickBot or BazarBackdoor malware—the actors first conduct other
activities, such as reconnaissance, credential theft, and data exfiltration. We observed an average
TTR of approximately two days after initial infection.
**Detected and Prevented: The** [Cybereason Defense Platform detects and prevents infections that use](https://www.cybereason.com/platform)
the TrickBot and BazarBackdoor malware that the Shathak threat group distributes, as well as
malicious activities that Conti actors conduct.
**Cybereason Managed Detection and Response (MDR): The Cybereason GSOC has zero tolerance**
towards attacks that involve ransomware, such as the Conti ransomware, and categorizes such
[attacks as critical, high-severity incidents. The Cybereason GSOC MDR team issues a](https://www.cybereason.com/services/managed-detection-response-mdr)
comprehensive report to customers when such an incident occurs. The report provides an in-depth
overview of the incident, which helps to scope the extent of compromise and the impact on the
customer’s environment. In addition, the report provides attribution information when possible, as well
as recommendations for mitigating and isolating the threat.
## Introduction
The threat group TA551, also known as Shathak, is an email-based malware distributor that distributes malware
[through phishing emails. Shathak has distributed a variety of malware, predominantly malware with information-](https://unit42.paloaltonetworks.com/ta551-shathak-icedid/)
stealing capabilities, such as Ursniff and Valak in 2020, and the IcedID malware after mid-July 2020.
In October 2021, the IBM X-Force [reported that the threat group ITG23, also known as the TrickBot Gang or](https://securityintelligence.com/posts/trickbot-gang-doubles-down-enterprise-infection/)
Wizard Spider, had partnered with Shathak at some time around July 2021 to distribute the TrickBot and the
BazarBackdoor (also referred to as BazarLoader) malware. ITG23 develops and maintains TrickBot and
BazarBackdoor. TrickBot and BazarBackdoor can deploy additional malware on compromised systems. TrickBot
is a feature-rich and modular malware that has been present on the threat landscape since 2016.
The implementation of TrickBot has evolved over the years, with recent versions of TrickBot implementing
malware-loading capabilities. TrickBot has played a major role in many attack campaigns conducted by different
threat actors, from common cybercriminals to nation-state actors. These campaigns have often involved the
[deployment of ransomware such as the Ryuk ransomware.](https://www.cybereason.com/blog/triple-threat-emotet-deploys-trickbot-to-steal-data-spread-ryuk-ransomware)
[Since March 2021, malicious actors have been using TrickBot and BazarBackdoor to deploy the Conti](https://www.sentinelone.com/labs/conti-unpacked-understanding-ransomware-development-as-a-response-to-detection/)
ransomware on compromised systems. The ITG23 threat group originally developed and now maintains the Conti
ransomware. ITG23 uses the [ransomware-as-a-service (RaaS) model, according to which the developers of the](https://www.cybereason.com/blog/what-is-ransomware-as-a-service-and-how-does-it-work)
ransomware pay the operators of the ransomware a wage for a successful attack, or a percentage of ransom
payments.
-----
Conti actors, or [Conti ransomware operators, have proven to be a substantial threat by compromising](https://www.cybereason.com/blog/cybereason-vs.-conti-ransomware)
organizations where IT outages can have life-threatening consequences, such as hospitals and law enforcement
agencies. In September 2021, the US Cybersecurity and Infrastructure Security Agency (CISA) and the US
[Federal Bureau of Investigation (FBI) reported that more than 400 Conti ransomware attacks had taken place on](https://us-cert.cisa.gov/ncas/alerts/aa21-265a)
U.S. and international organizations. Conti actors frequently use a double extortion tactic: if the victim refuses to
pay for data decryption, the malicious actor threatens to leak the data or sell it for profit.
This report discusses recent attack campaigns that reflect the current developments of ITG23 partnering with
Shathak to distribute the TrickBot and BazarBackdoor malware, which malicious actors use to deploy the Conti
ransomware on compromised systems. To this end, the report first provides an overview of a system infection
using the TrickBot or BazarBackdoor malware that the Shathak group distributes, based on recent Shatak
malware distribution campaigns that we analyzed.
The report then discusses Conti actor activities that are common across recent Conti actor attack campaigns that
we analyzed. We focus on activities that Conti actors conduct after establishing a foothold in a system using
[BazarBackdoor or TrickBot and before ransomware deployment. A previous report by the Cybereason Nocturnus](https://www.cybereason.com/blog/cybereason-vs.-conti-ransomware)
team documents the execution of the Conti ransomware.
## Analysis
### A Successful Partnership: Shathak and the TrickBot Gang
The figure below depicts a typical infection using the ITG23’s TrickBot or the BazarBackdoor malware that the
Shathak group distributes:
_A typical infection using the TrickBot or the BazarBackdoor malware_
The Shathak group distributes TrickBot and BazarBackdoor through malicious documents, such as Microsoft
Word documents. Shathak stores malicious documents in password-protected archive files and attaches the
archive files to phishing emails. A typical malicious document contains a macro, which a user can execute by
opening the document and enabling macro execution.
-----
The macro drops a Microsoft Hypertext Markup Language (HTML) Applications (HTA) file on the file system and
then executes the file using the mshta.exe Windows utility. Malicious actors use mshta.exe to execute malicious
HTA files and bypass application control solutions that do not account for the malicious use of the Windows utility.
An HTA file that we analyzed, named boxDeling.hta, has two main components: a base-64 encoded code stored
in the
section of the boxDeling.hta file with an ID of mainSetDel, and a VBScript script that executes the
encoded code:
_A macro in a malicious Microsoft Word document executes an HTA file as seen in the Cybereason Defense_
_Platform_
-----
_The content of boxDeling.hta: base-64 encoded code and a VBScript script that executes the encoded code_
The base-64 encoded code is a JavaScript script that the malicious actors have obfuscated by using the string
reversal technique. The JavaScript script conducts the following activities:
Contacts the attacker-controlled endpoint airloweryd.com, located in Germany, and downloads the
TrickBot malware in the form of a dynamic-link library (DLL) file. The JavaScript script in other HTA
files may contact a different endpoint and download another malware, such as BazarBackdoor.
Stores the downloaded DLL file as the boxDelInt.jpg file in the Public directory, such as
_C:\users\Public\._
Executes boxDelInt.jpg—the TrickBot malware—using the regsvr32.exe Windows utility. The
JavaScript script executes regsvr32.exe using the WshShell object of the Windows Script Host object
model:
-----
_The obfuscated and deobfuscated version of the JavaScript script in boxDeling.hta_
In recent Shathak malware distribution campaigns that we analyzed, the attacker-controlled endpoints from which
malicious HTA files downloaded malware were primarily located in European countries, with the Netherlands and
Slovakia at the top of the list.
Malicious actors use the TrickBot or BazarBackdoor malware that the Shathak group distributes to deploy
additional malware, such as the Conti ransomware. In recent Conti actor attacks that we analyzed, we observed
that Conti actors do not deploy ransomware immediately after initial compromise using TrickBot or
-----
BazarBackdoor.
The actors first conduct other activities, such as reconnaissance, credential theft, and data exfiltration. We
observed an average TTR of approximately two days after initial infection. The next section discusses Conti actor
activities that are common across recent attack campaigns that we analyzed. We focus on activities that Conti
actors conduct after establishing a foothold in a system by using the BazarBackdoor or TrickBot malware that
Shathak distributes and before ransomware deployment.
### Conti Actors Take Over from Shathak: Common Activities
**Cobalt Strike Deployment**
[Conti actors deploy a Cobalt Strike beacon after initial system compromise by using TrickBot or BazarBackdoor.](https://www.cobaltstrike.com/help-beacon)
Cobalt Strike is a common tool of Conti actors for different malicious activities, such as command execution,
credential theft, and lateral movement. Conti actors deploy a Cobalt Strike beacon in the form of a dynamic-link
library (DLL) file stored in the ProgramData directory, such as C:\ProgramData. Conti actors then invoke an
exported function of the DLL file, such as StartW or gimbild, using the rundll32.exe Windows utility:
_Conti actors execute a Cobalt Strike beacon as seen in the Cybereason Defense Platform_
Conti actors establish persistence of the deployed Cobalt Strike beacon by creating a scheduled task using the
_[schtasks Windows utility. The scheduled task executes the Cobalt Strike beacon by invoking an exported function](https://docs.microsoft.com/en-us/windows/win32/taskschd/schtasks)_
of the DLL file that implements the beacon using the rundll32.exe utility. Conti actors deploy Cobalt Strike
beacons laterally on other networked machines by executing the schtasks utility, with the command line
parameter /s specifying the target machine:
_A scheduled task executes a Cobalt Strike beacon as seen in the Cybereason Defense Platform_
**Reconnaissance**
In attack campaigns where a BazarBackdoor infection is the initial entry point into an infrastructure, Conti actors
conduct reconnaissance activities by using BazarBackdoor to execute the following commands:
-----
**Command** **Description**
_nltest_
_/domain_trusts_
_/all_trusts_
_net localgroup_
_administrator_
_net group "domain_
_admins" /domain_
_net view /all_
_/domain_
Enumerates trust relationships in a Windows Active Directory (AD) environment.
Enumerates users that are members of the administrator local group.
Enumerates users that are members of the domain admins group such that the
designated Domain Controller (DC) is conducting the enumeration activity.
Enumerates all shared computers and resources on the system and all domains in the
network.
_net view /all_ Enumerates all shared computers and resources on the system.
In addition to the nltest and net Windows utilities, Conti actors use publicly available network scanning tools for
reconnaissance, such as the _[Advanced IP Scanner and](https://www.advanced-ip-scanner.com/)_ _[NetScan tools:](https://www.softperfect.com/products/networkscanner/)_
_Conti actors conduct reconnaissance activities using net and NetScan s seen in the Cybereason Defense_
_Platform_
[In addition to the nltest and net utilities, Conti actors use the AdFind tool to explore AD environments in greater](https://www.joeware.net/freetools/tools/adfind/)
detail. Conti actors typically execute AdFind stored in a Windows Batch file (.bat) that is placed on the file system:
-----
_Conti actors execute AdFind commands as seen in the Cybereason Platform_
**Credential and Data Theft**
Conti actors steal credentials by dumping the memory of the Local Security Authority Subsystem Service (lsass)
process. Conti actors download PowerShell payload from an attacker-controlled endpoint, such as
_httpx://datasecuritytoday[.]com::757/securiday, which dumps credentials from lsass:_
_Conti actors download payload from httpx://datasecuritytoday[.]com::757/securiday as seen in the Cybereason_
_Defense Platform_
In addition to credentials present in the memory of lsass instances, Conti actors steal AD data and credentials
that are stored in ntds.dit files by copying these files. The ntds.dit files are database files that are present on AD
DCs, and these files store AD data, such as password hashes and information about AD user objects, groups,
-----
and group memberships. Conti actors copy ntds.dit files into the C:\Windows\Temp\crashpad directory by using
the ntdsutil tool:
_ntdsutil “ac i ntds” “ifm” “create full c:\windows\temp\crashpad” q q_
In addition to ntdsutil, Conti actors use the _[NtdsAudit tool to dump AD domain user details and password hashes](https://github.com/Dionach/NtdsAudit)_
from previously copied ntds.dit files:
_ntdsAudit.exe ntds.dit -s SYSTEM -p pwddump.txt -u users.csv_
On machines running Microsoft Structured Query Language (SQL) database servers, Conti actors dump data
[databases by using the sqlcmd utility. The sqlcmd commands that the actors execute follow the guidelines for](https://docs.microsoft.com/en-us/sql/tools/sqlcmd-utility?view=sql-server-ver15)
[dumping data from databases in the publicly disclosed manuals of the Conti Ransomware Affiliate Program:](https://darkfeed.io/2021/08/07/conti-affiliate/)
_Conti actors dump data from a database as seen in the Cybereason Defense Platform_
**Lateral Movement**
Conti actors move laterally to Windows Server instances primarily by using the Remote Desktop Protocol (RDP).
Conti actors enable RDP connectivity if necessary on compromised machines by creating and setting the
following registry value to 0:
_HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\fDenyTSConnections_
Conti actors then use the netsh utility to modify Windows Firewall rules:
_netsh advfirewall set allprofiles state off_
_netsh advfirewall firewall set rule group=”remote desktop” new enable=Yes_
_netsh firewall set service type = remotedesktop mode = enable_
In addition to establishing RDP connections, Conti actors deploy Cobalt Strike beacons laterally on networked
machines by executing the schtasks utility, with the command line parameter /s specifying the target machine.
Conti actors also disable the real-time monitoring feature of the Windows Defender security solution laterally on
[networked machines by executing the PowerShell command Set-MpPreference -DisableRealTimeMonitoring](https://docs.microsoft.com/en-us/powershell/module/defender/set-mppreference?view=windowsserver2019-ps)
_$true._
-----
Conti actors execute the PowerShell command laterally by using the schtasks utility and the Windows
Management Instrumentation (WMI) command-line utility (WMIC) with the node _WMIC parameter specifying the_
target machine:
Conti actors laterally disable the real-time monitoring feature of Windows Defender as seen in the Cybereason
Defense Platform
**Data Exfiltration**
Conti actors typically exfiltrate data before deploying the Conti ransomware. The exfiltrated data contains stolen
credentials and other data, including potentially sensitive data that the actors can use for extortion. To exfiltrate
[data to a remote endpoint, Conti actors use the Rclone tool, whose executable name the actors typically change](https://rclone.org/)
to evade detection. In the Conti actor campaigns that we analyzed, the actors have changed the executable
name of Rclone to sihosts.exe and serhosts.exe:
Conti actors execute Rclone (executable name changed to sihosts.exe) to exfiltrate data as seen in the
Cybereason Defense Platform
## Detection and Prevention
### The Cybereason Defense Platform
-----
The [Cybereason Defense Platform detects threats using multi layer protection that detects and blocks malicious](https://www.cybereason.com/platform)
activities with threat intelligence, machine learning, and next-generation antivirus (NGAV) capabilities. The
Cybereason Platform is able to detect and prevent infections that use the TrickBot and BazarBackdoor malware
that the Shathak threat group distributes, as well as malicious activities that Conti actors conduct. For example,
the Cybereason Platform detects:
Users opening malicious email attachments distributed by the Shathak group
_The Cybereason Defense Platform detects users opening malicious email attachments_
Conti actors deploying a Cobalt Strike beacon
-----
_The Cybereason Defense Platform detects the deployment of Cobalt Strike beacons_
Conti actors stealing credentials by dumping the memory of the lsass process
_The Cybereason Defense Platform detects the dumping of lsass memory_
Conti actors exfiltrating data using the Rclone tool
-----
_The Cybereason Defense Platform detects data exfiltration activities_
[Conti actors executing the Conti ransomware](https://www.cybereason.com/blog/cybereason-vs.-conti-ransomware)
### General Recommendations
Securely handle email messages that originate from external sources. This includes disabling
hyperlinks and investigating the content of email messages to identify phishing attempts.
Enable the Anti-Ransomware feature in Cybereason NGAV and set the _Anti-Ransomware protection_
[mode to Prevent.](https://nest.cybereason.com/documentation/product-documentation/190/anti-ransomware-settings#set-protection-mode)
[Enable the Anti-Malware feature in Cybereason NGAV and enable the Detect and Prevent modes of](https://nest.cybereason.com/documentation/product-documentation/190/anti-malware-settings)
this feature.
Disable unused RDP services, properly secure used RDP services, and regularly monitor RDP log
data for irregular activities.
Regularly backup files to a secured remote location and implement a data recovery plan. Regular data
backups ensure that you can restore your data after a ransomware attack.
Use secure passwords, regularly rotate passwords, and use multi-factor authentication where
possible.
Cybereason is dedicated to teaming with defenders to end cyber attacks from endpoints to the enterprise to
[everywhere—including modern ransomware. Schedule a demo today to learn how your organization can benefit](https://www.cybereason.com/request-a-demo)
from an [operation-centric approach to security.](https://www.cybereason.com/blog/the-cybereason-malop-achieving-operation-centric-security)
## MITRE ATT&CK Techniques
-----
**Initial Access** **Execution** **Persistence** **Defense**
**Evasion**
**Discovery** **Lateral**
**Movement**
Account
Discovery
Domain
[Trust](https://attack.mitre.org/techniques/T1482/)
Discovery
Network
[Service](https://attack.mitre.org/techniques/T1046/)
Scanning
Remote
[System](https://attack.mitre.org/techniques/T1018/)
Discovery
**Exfiltration**
Exfiltration
Over
Alternative
Protocol
Phishing:
[Spearphishing](https://attack.mitre.org/techniques/T1566/001/)
Attachment
User
[Execution:](https://attack.mitre.org/techniques/T1204/002/)
Malicious File
Scheduled
Task/Job:
Scheduled
Task
Windows
[Management](https://attack.mitre.org/techniques/T1047/)
Instrumentation
Scheduled
Task/Job:
Scheduled
Task
Signed
Binary
[Proxy](https://attack.mitre.org/techniques/T1218/005/)
Execution:
Mshta
Signed
Binary
[Proxy](https://attack.mitre.org/techniques/T1218/010/)
Execution:
Regsvr32
Signed
Binary
[Proxy](https://attack.mitre.org/techniques/T1218/011/)
Execution:
Rundll32
Modify
registry
**Credential**
**Access**
OS
Credential
[Dumping:](https://attack.mitre.org/techniques/T1003/001/)
LSASS
Memory
OS
Credential
Dumping:
NTDS
Remote
Services:
[Remote](https://attack.mitre.org/techniques/T1021/001/)
Desktop
Protocol
### About the Researchers:
**Aleksandar Milenkoski, Senior Threat and Malware Analyst, Cybereason Global SOC**
Aleksandar Milenkoski is a Senior Threat and Malware Analyst with the Cybereason Global
SOC team. He is involved primarily in reverse engineering and threat research activities. Aleksandar has a PhD
in system security. Prior to Cybereason, his work focused on research in intrusion detection and reverse
engineering security mechanisms of the Windows 10 operating system.
**Eli Salem, Senior Security Analyst, Cybereason Global SOC**
Eli is a lead threat hunter and malware reverse engineer at Cybereason. He has worked in the
private sector of the cyber security industry since 2017. In his free time, he publishes articles about malware
research and threat hunting.
**Yonatan Gidnian, Senior Security Analyst and Threat Hunter, Cybereason Global SOC**
-----
Yonatan Gidnian is a Senior Security Analyst and Threat Hunter with the Cybereason Global
SOC team. Yonatan analyses critical incidents and hunts for novel threats in order to build new detections. He
began his career in the Israeli Air Force where he was responsible for protecting and maintaining critical
infrastructures. Yonatan is passionate about malware analysis, digital forensics, and incident response.
About the Author
**Cybereason Global SOC Team**
The Cybereason Global SOC Team delivers 24/7 Managed Detection and Response services to customers on
every continent. Led by cybersecurity experts with experience working for government, the military and multiple
industry verticals, the Cybereason Global SOC Team continuously hunts for the most sophisticated and pervasive
threats to support our mission to end cyberattacks on the endpoint, across the enterprise, and everywhere the
battle moves.
[All Posts by Cybereason Global SOC Team](https://www.cybereason.com/blog/authors/cybereason-global-soc-team)
-----