Kwampirs

Kwampirs is a backdoor Trojan used by Orangeworm. Kwampirs has been found on machines which had software installed for the use and control of high-tech imaging devices such as X-Ray and MRI machines.[1] Kwampirs has multiple technical overlaps with Shamoon based on reverse engineering analysis.[2]

ID: S0236
Type: MALWARE
Platforms: Windows
Contributors: Elger Vinicius S. Rodrigues, @elgervinicius, CYBINT Centre
Version: 1.2
Created: 17 October 2018
Last Modified: 11 April 2024

Techniques Used

Domain ID Name Use
Enterprise T1036 .004 伪装: Masquerade Task or Service

Kwampirs establishes persistence by adding a new service with the display name "WMI Performance Adapter Extension" in an attempt to masquerade as a legitimate WMI service.[1]

Enterprise T1543 .003 创建或修改系统进程: Windows Service

Kwampirs creates a new service named WmiApSrvEx to establish persistence.[1]

Enterprise T1140 反混淆/解码文件或信息

Kwampirs decrypts and extracts a copy of its main DLL payload when executing.[1]

Enterprise T1008 回退信道

Kwampirs uses a large list of C2 servers that it cycles through until a successful connection is established.[1]

Enterprise T1201 密码策略发现

Kwampirs collects password policy information with the command net accounts.[1]

Enterprise T1083 文件和目录发现

Kwampirs collects a list of files and directories in C:\ with the command dir /s /a c:\ >> "C:\windows\TEMP[RANDOM].tmp".[1]

Enterprise T1069 .001 权限组发现: Local Groups

Kwampirs collects a list of users belonging to the local users and administrators groups with the commands net localgroup administrators and net localgroup users.[1]

.002 权限组发现: Domain Groups

Kwampirs collects a list of domain groups with the command net localgroup /domain.[1]

Enterprise T1027 .001 混淆文件或信息: Binary Padding

Before writing to disk, Kwampirs inserts a randomly generated string into the middle of the decrypted payload in an attempt to evade hash-based detections.[1]

.013 混淆文件或信息: Encrypted/Encoded File

Kwampirs downloads additional files that are base64-encoded and encrypted with another cipher.[3]

Enterprise T1218 .011 系统二进制代理执行: Rundll32

Kwampirs uses rundll32.exe in a Registry value added to establish persistence.[1]

Enterprise T1082 系统信息发现

Kwampirs collects OS version information such as registered owner details, manufacturer details, processor type, available storage, installed patches, hostname, version info, system date, and other system information by using the commands systeminfo, net config workstation, hostname, ver, set, and date /t.[1]

Enterprise T1033 系统所有者/用户发现

Kwampirs collects registered owner details by using the commands systeminfo and net config workstation.[1]

Enterprise T1007 系统服务发现

Kwampirs collects a list of running services with the command tasklist /svc.[1]

Enterprise T1049 系统网络连接发现

Kwampirs collects a list of active and listening connections by using the command netstat -nao as well as a list of available network mappings with net use.[1]

Enterprise T1016 系统网络配置发现

Kwampirs collects network adapter and interface information by using the commands ipconfig /all, arp -a and route print. It also collects the system's MAC address with getmac and domain configuration with net config workstation.[1]

Enterprise T1135 网络共享发现

Kwampirs collects a list of network shares with the command net share.[1]

Enterprise T1087 .001 账号发现: Local Account

Kwampirs collects a list of accounts with the command net users.[1]

Enterprise T1105 输入工具传输

Kwampirs downloads additional files from C2 servers.[3]

Enterprise T1057 进程发现

Kwampirs collects a list of running services with the command tasklist /v.[1]

Enterprise T1021 .002 远程服务: SMB/Windows Admin Shares

Kwampirs copies itself over network shares to move laterally on a victim network.[1]

Enterprise T1018 远程系统发现

Kwampirs collects a list of available servers with the command net view.[1]

Groups That Use This Software

ID Name References
G0071 Orangeworm

[1]

References