Higaisa is a threat group suspected to have South Korean origins. Higaisa has targeted government, public, and trade organizations in North Korea; however, they have also carried out attacks in China, Japan, Russia, Poland, and other nations. Higaisa was first disclosed in early 2019 but is assessed to have operated as early as 2009.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1220 | XSL脚本处理 | ||
| Enterprise | T1090 | .001 | 代理: Internal Proxy |
Higaisa discovered system proxy settings and used them if available.[2] |
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
Higaisa named a shellcode loader binary |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography | |
| Enterprise | T1574 | .002 | 劫持执行流: DLL Side-Loading |
Higaisa’s JavaScript file used a legitimate Microsoft Office 2007 package to side-load the |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Higaisa used certutil to decode Base64 binaries at runtime and a 16-byte XOR key to decrypt data.[1][2] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
Higaisa added a spoofed binary to the start-up folder for persistence.[1][2] |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell | |
| .005 | 命令与脚本解释器: Visual Basic | |||
| .007 | 命令与脚本解释器: JavaScript |
Higaisa used JavaScript to execute additional files.[1][2][3] |
||
| Enterprise | T1203 | 客户端执行漏洞利用 | ||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols |
Higaisa used HTTP and HTTPS to send data back to its C2 server.[1][2] |
| Enterprise | T1001 | .003 | 数据混淆: Protocol or Service Impersonation | |
| Enterprise | T1106 | 本机API | ||
| Enterprise | T1027 | .001 | 混淆文件或信息: Binary Padding |
Higaisa performed padding with null bytes before calculating its hash.[2] |
| .013 | 混淆文件或信息: Encrypted/Encoded File | |||
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
Higaisa used malicious e-mail attachments to lure victims into executing LNK files.[1][2] |
| Enterprise | T1082 | 系统信息发现 |
Higaisa collected the system volume serial number, GUID, and computer name.[3][1] |
|
| Enterprise | T1124 | 系统时间发现 | ||
| Enterprise | T1016 | 系统网络配置发现 |
Higaisa used |
|
| Enterprise | T1057 | 进程发现 |
Higaisa’s shellcode attempted to find the process ID of the current process.[2] |
|
| Enterprise | T1041 | 通过C2信道渗出 | ||
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Higaisa has sent spearphishing emails containing malicious attachments.[1][2] |
| Enterprise | T1564 | .003 | 隐藏伪装: Hidden Window | |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Higaisa dropped and added |
| Enterprise | T1029 | 预定传输 |
Higaisa sent the victim computer identifier in a User-Agent string back to the C2 server every 10 minutes.[3] |
|