Unit42


Time to read:

6–10 minutes

Last modified:


HTB Sherlock Unit42 Logo

Overview

On this page, I have included the IOC’s and MITRE ATT&CK mappings encountered during my analysis of this compromise, as well as my full incident report – it is embedded and linked for download.

Taking it a step further, I did so in semi-alignment with incident report guidelines listed in NIST SP 800–61 Rev. 2 (Computer Security Incident Handling Guide).

Introduction

This one is a big deal for me!

Unit42 is rated as Very Easy on HackTheBox Labs. On paper, it is exactly that – open and filter a .evtx file for various Sysmon Event IDs to answer eight simple questions. I could have done that and moved on, but I wanted to learn more, so I spent significantly more time on this Sherlock. I cross-referenced Palo Alto: Unit42’s threat intelligence report for this malware campaign, uncovered and analyzed the full attack chain, and wrote a full commercial-grade incident report in HTB CDSA format.

This is my very first Sherlock and comprehensive incident report. Although I’ve achieved the CompTIA’s Security+ and CySA+ certificates, participated in, created, and led various competitions, and completed labs, this was my first time applying knowledge gained from certificates, competitions, academics, internships, labs, and projects to a compromised environment. Beyond that, this Sherlock was extremely straightforward, which gave me the much-needed confidence to undertake a full forensic analysis and incident report creation. I understood every step, detection, and the “what” and “why” behind all of it – I am proud of this milestone!

The Scenario

This Sherlock involves a Windows host (DESKTOP-887GK2L) belonging to a single user (CyberJunkie). A malicious executable was found on the user’s system, and it was my job to identify and analyze its malicious activity through the provided Sysmon log. This malware is part of an Italian malspam (Malware-Spam) campaign tracked by Palo Alto’s Unit 42 threat intelligence team.

There are only eight official tasks within the Sherlock:

  • How many files were created?
  • What is the malicious process?
  • Which cloud drive was used to distribute the malware?
  • What timestamp was changed via Time Stomping?
  • Where was once.cmd created?
  • What dummy domain did the malware connect to?
  • What IP address did the malware reach out to?
  • When did the malicious process self-terminate?

These questions are very straightforward through EventViewer’s XML filters; however, as this is a contained environment compromised by a real-world malware campaign, I wanted the full picture.

What I Found Beyond the Tasks

Mark-of-the-Web Removal

Before the malware’s initial execution, Explorer.EXE deleted the files’ Zone.Identifier Alternate Data Stream (ADS).

The ADS is appended to any file downloaded from the internet – ex. filename.ext:Zone.Identifier – and when removed, Windows SmartScreen and User Account Control (UAC) warnings are suppressed.

This behavior maps to MITRE T155.005: Subvert Trust Controls: Mark-of-the-Web Bypass, indicating the user either manually unblocked the file or Explorer automatically stripped its Zone.Identifier on execution. Either way, an essential security warning was silenced when it should not have been.

Manipulation of Certificate Stores

The malware created registry keys in both the trusted root and Certificate Authority (CA) certificate stores – behavior mapping to MITRE T1553.004: Subvert Trust Controls: Install Root Certificate.

This malicious action was likely to suppress TLS/SSL trust warnings during the VNC session or to enable the interception of secure traffic.

Malicious DLL Loads

The loading of mscoree.dll and mscoreei.dll was consistent with MITRE T1055.001: Process Injection: Dynamic-link Library Injection, and taskschd.dll with MITRE T1053.005: Scheduled Task/Job: Scheduled Task; however, as there were no CreateRemoteThread or direct scheduled task creation events present within the Sysmon log, neither could be explicitly concluded as malicious. Still, the loading of these DLLs was suspicious behavior worth documenting.

Secure Shredding and Data Destruction

Although many related DLLs, scripts, temporary files, and installer files were deleted throughout this infection, there was one action that stood out among the others: once.cmd. This file triggered the same EventID 23 (FileDelete) as the others, except the event metadata revealed something different: Archived: shredded file with pattern 0x74697865.

This behavior aligns most closely with MITRE T1485: Data Destruction and is a defense evasion technique used to render data irrecoverable – this is not standard file deletion but rather deliberate forensic obstruction. By overwriting the file contents with a repeating byte pattern before standard deletion, the attackers prevent forensic recovery.

Every other file deleted throughout this infection was done through routine installer cleanup.

Elevated Installer Privileges

Interestingly, msiexec.exe – the executable used to extract and install the contents of this malware – was elevated to NT AUTHORITY\SYSTEM during the installation chain. As no privilege escalation exploit was confirmed, it is worth noting that, not only did this malware request elevated privileges, it received them.

All of these findings and more are included within the full incident report. I documented my forensic analysis step-by-step with Sysmon XML queries, MITRE ATT&CK mappings, and cross references to Unit 42’s threat intelligence report for this campaign.


The Incident Report

I wrote this incident report using the HTB CDSA certificate’s required format, produced in SysReptor with my reimagined version of the official HTB CDSA report template. It covers every section the CDSA format requires:

  • Executive Summary
  • Affected Systems and Users
  • Evidence Sources and Analysis
  • Indicators of Compromise (IOCs)
  • Root Cause Analysis
  • Technical Timeline
  • Nature of the Attack
  • Appendix Technical Timeline

Most notably, the Technical Analysis section includes a dedicated subsection for every Sysmon Event ID query, the XML filter used, the results, and an analysis of what I was seeing.

The full report is embedded below and available for download.


Indicators of Compromise

Files

NamePathSHA256Notes
Preventivo24.02.14.exe.exeC:\Users\CyberJunkie\Downloads\0cb44c4f8273750fa40497fca81e850f73927e70b13c8f80cdcfee9d1478e6f3Trojanized UltraVNC installer; Creates and sets specific registry keys
Fatture 2 2024.exePreventivo24.02.14.exe.exe‘s original filename as identified by its embedded metadata
~.pdfC:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\TempFolder\01fa678a302763b83703f0449fc63309cf7677fc119d2755defad6dea9d25bcdDecoy PDF, timestomped
taskhost.exeC:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\3fb38eefb8db4d52be428facc8a242997ab2ad58a8d08980a7688c9bf0b30454Renamed instance of WinVNC.exe
on.cmdC:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\1ce4768f825372d55c1d30ce3ac41afb913de6299a64ae5b0ac1b3b752421d64Launches UltraVNC, establishes persistence via registry as per Unit42 analysis
c.cmdC:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\c2ab7b8701bdc36198a8f01791c8a3479ef3e8bcc6ccd3bd8c2f60dd9672e8e1Called by on.cmd
cmmc.cmdC:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\d69e739f18bd24db5cfd451fb2bdab32b4efeef41145b75cb89c7dc56641852dObserved in Sysmon logs, not documented by Unit42
once.cmdC:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\e596899f114b5162402325dfb31fdaa792fabed718628336cc7a35a24f38eaa9Securely shredded post-execution with a repeating byte pattern 0x74697865
viewer.exeC:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\e48aac5148b261371c714b9e00268809832e4f82d23748e44f5cfbbf20ca3d3fObserved in Sysmon logs, not documented by Unit42
ddengine.dllC:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\0d44439a0425df8abf338bd1496679a144dd705a51832a05c1a4ed1f76756ebaUltraVNC component, deleted post-installation
vnchooks.dllC:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\4d12febd622266220aa2dd2074972ee82545c144dc599f68866212a29db9f442UltraVNC component, deleted post-installation
UVncVirtualDisplay.dllC:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\YVncVirtualDisplay\ff9d8f7fc2c3f5d0afaf6f76e87d41feeabf54facbe26dc59661a78830f32972UltraVNC virtual display driver, deleted post-installation
main1.msiC:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\b73b46f35142989a10c91aa887f94037271b8ee7148cc3bfb061ae9848ed1fd9MSI installer package, deleted post-extraction
powercfg.msiC:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\c5bf02c8c23dbf8798d87fad91ea44a3153fc1026248bd931f360ba0d6c5989eMSI installer package, deleted post-extraction

Network

TypeValueNotes
Dropbox delivery URLhttps://www.dropbox[.]com/ReferrerUrl at download
Dropbox CDNhttps://uc2f030016253ec53f4953980a4e.dl.dropboxusercontent[.]com/[…]HostUrl at download
Connectivity check domainwww.example[.]comNot malicious, connectivity check only
Connectivity check IP93.184.216[.]34:80Resolves to www.example[.]com
VNC C2 domainvnvariant2024.ddnsfree[.]com:5500Attacker-controlled VNC server, per Unit 42 threat intelligence
VNC C2 IP140.228.29[.]110:5500Resolves to VNC C2 domain
Compromised source IP172.17.79[.]132:61177Outbound connection from DESKTOP-887GK2L

Registry

KeyNotes
HKU\[SID]\Software\Microsoft\SystemCertificates\Root\CertificatesRoot certificate store key created by malware (T1553.004)
HKU\[SID]\Software\Microsoft\SystemCertificates\CA\CertificatesCA certificate store key created by malware (T1553.004)

Named Pipes

Pipe NameNotes
\ToServerAdvinst_Extract_C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exeCreated by ProcessID 10672 during payload extraction

Directory Artifacts

PathNotes
C:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\Root malware installation directory
C:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\TempFolder\Decoy PDF drop location
C:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\Primary payload drop location
C:\Users\CyberJunkie\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\UltraVNC virtual display driver location
C:\Users\CyberJunkie\AppData\Local\Temp\Temporary installer extraction files; deleted post-installation
C:\Windows\Installer\MSI staging directory used during elevated installation

MITRE ATT&CK TTPs

Technique IDNameObserved Behavior
T1036.007Masquerading: Double File ExtensionPreventivo24.02.14.exe.exe used a double .exe extension to disguise the executable as a benign file
T1553.005Subvert Trust Controls: Mark-of-the-Web BypassExplorer.EXE deleted the
Zone.Identifier ADS from the malicious executable prior to execution, suppressing SmartScreen and UAC warnings
T1574.002Hijack Execution Flow: DLL Side-LoadingThe malware loaded itself as a DLL at execution, flagged by Sysmon
T1055.001Process Injection: Dynamic-link Library Injection.NET runtime DLLs mscoree.dll and mscoreei.dll loaded and flagged by Sysmon as T1055.001; unconfirmed without corroborating CreateRemoteThread evidence
T1053.005Scheduled Task/Job: Scheduled Tasktaskschd.dll loaded and flagged by Sysmon as T1053.005, suggesting a persistence attempt via scheduled task; unconfirmed without direct task creation evidence
T1553.004Subvert Trust Controls: Install Root CertificateRegistry keys created in both the trusted root and CA certificate stores, likely to suppress TLS trust warnings during the VNC session
T1071Application Layer ProtocolVNC used as the C2 communication channel over TCP port 5500
T1070.006Indicator Removal: TimestompDecoy PDF ~.pdf creation timestamp forged from 2024-02-14 to 2024-01-14, approximately one month prior
T1070Indicator RemovalTemporary installer files deleted post-extraction
T1485Data Destructiononce.cmd securely shredded with repeating byte pattern 0x74697865 to prevent forensic recovery