Stealing the LIGHTSHOW (Part One) — North Korea's UNC2970 | Mandiant
Common Information
Type Value
UUID 35b0092f-d88c-4770-b722-825f63a4029f
Fingerprint 3850983345ae1784
Analysis status DONE
Considered CTI value 2
Text language
Published March 9, 2023, midnight
Added to db Nov. 6, 2023, 6:52 p.m.
Last updated Nov. 17, 2024, 11:40 p.m.
Headline Stealing the LIGHTSHOW (Part One) — North Korea's UNC2970
Title Stealing the LIGHTSHOW (Part One) — North Korea's UNC2970 | Mandiant
Detected Hints/Tags/Attributes 137/4/86
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 330 Threat Intelligence https://www.mandiant.com/resources/blog/rss.xml 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 2
microsoft.management.services
Details Domain 1
webinternal.anyplex.com
Details Domain 1
www.fainstec.com
Details Domain 1
ajayjangid.in
Details Domain 1
sede.lamarinadevalencia.com
Details Domain 3
leadsblue.com
Details Domain 1
toptradenews.com
Details Domain 1
mantis.quick.net.pl
Details Domain 1
www.keewoom.co.kr
Details Domain 1
abba-servicios.mx
Details Domain 1
www.ruscheltelefonia.com.br
Details Domain 4
olidhealth.com
Details Domain 1
doug.org
Details Domain 1
crickethighlights.today
Details File 1
destextapi.dll
Details File 1
manextapi.dll
Details File 1
pathextapi.dll
Details File 1
preextapi.dll
Details File 8
wbemcomn.dll
Details File 68
mscoree.dll
Details File 2
netplwix.dll
Details File 3
printfilterpipelinesvc.exe
Details File 1
c:\windows\branding\netplwiz.exe
Details File 7
p.dat
Details File 1
normal.doc
Details File 1
c:\programdata\mscoree.dll
Details File 1
c:\windows\system32\presentationhost.exe
Details File 14
presentationhost.exe
Details File 1
query_image.jsp
Details File 4
jquery.php
Details File 1
contentlayout.jsp
Details File 1206
index.php
Details File 3
themes.php
Details File 2
prod.php
Details File 94
config.php
Details File 4
compat.php
Details File 86
admin.php
Details File 17
contact.php
Details md5 1
e97b13b7e91edeceeac876c3869cc4eb
Details md5 1
a9e30c16df400c3f24fc4e9d76db78ef
Details md5 1
f910ffb063abe31e87982bad68fd0d87
Details md5 1
30358639af2ecc217bbc26008c5640a7
Details md5 1
41dcd8db4371574453561251701107bc
Details md5 1
866f9f205fa1d47af27173b5eb464363
Details md5 1
8c597659ede15d97914cb27512a55fc7
Details md5 1
a2109276dc704dedf481a4f6c8914c6e
Details md5 1
3bf748baecfc24def6c0393bc2354771
Details md5 1
91b6d6efa5840d6c1f10a72c66e925ce
Details md5 1
300103aff7ab676a41e47ec3d615ba3f
Details md5 1
49425d6dedb5f88bddc053cc8fd5f0f4
Details md5 1
abd91676a814f4b50ec357ca1584567e
Details md5 1
05b6f459be513bf6120e9b2b85f6c844
Details Mandiant Security Validation Actions 1
A105-491
Details Mandiant Security Validation Actions 1
A105-492
Details Mandiant Security Validation Actions 1
A105-493
Details Mandiant Security Validation Actions 1
A105-494
Details Mandiant Security Validation Actions 1
A105-507
Details Mandiant Security Validation Actions 1
A105-508
Details Mandiant Security Validation Actions 1
A105-514
Details Mandiant Temporary Group Assumption 44
TEMP.HERMIT
Details Mandiant Uncategorized Groups 44
UNC2970
Details Mandiant Uncategorized Groups 9
UNC577
Details Mandiant Uncategorized Groups 16
UNC4034
Details Url 1
http://webinternal.anyplex.com/images/query_image.jsp
Details Url 1
http://www.fainstec.com/assets/js/jquery/jquery.php
Details Url 1
https://ajayjangid.in/js/jquery/jquery.php
Details Url 1
https://sede.lamarinadevalencia.com/tablonedictal/layout/contentlayout.jsp
Details Url 1
https://leadsblue.com/wp-content/wp-utility/index.php
Details Url 1
https://toptradenews.com/wp-content/themes/themes.php
Details Url 1
http://mantis.quick.net.pl/library/securimage/index.php
Details Url 1
http://www.keewoom.co.kr/prod_img/201409/prod.php
Details Url 1
http://abba-servicios.mx/wordpress/wp-content/themes/config.php
Details Url 1
http://www.ruscheltelefonia.com.br/public/php/index.php
Details Url 1
https://olidhealth.com/wp-includes/php-compat/compat.php
Details Url 1
https://doug.org/wp-includes/admin.php
Details Url 1
https://crickethighlights.today/wp-content/plugins/contact.php
Details Windows Registry Key 25
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft
Details Yara rule 1
rule M_Hunt_APT_PLANKWALK_Code_String {
	meta:
		author = "Mandiant"
		description = "Detects a format string containing code and token found in PLANKWALK"
	strings:
		$hex = { 63 6F 64 65 [1-6] 3D 25 64 26 [1-6] 75 73 65 72 [1-6] 3D 25 73 26 [1-6] 74 6F 6B 65 }
	condition:
		(uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550) and $hex
}
Details Yara rule 1
rule M_APT_Loader_Win_LIDSHIFT_1 {
	meta:
		author = "Mandiant"
		description = "Detects LIDSHIFT implant"
	strings:
		$anchor1 = "%s:%s:%s"
		$encloop = { 83 ?? 3F 72 ?? EB ?? 8D ?? ?? B8 ?? 41 10 04 F7 ?? 8B ?? 2B ?? D1 ?? 03 ?? C1 ?? 05 6B ?? 3F 2B ?? 42 0F ?? ?? ?? 41 ?? ?? }
	condition:
		uint16(0) == 0x5a4d and all of them
}
Details Yara rule 1
rule M_APT_Loader_Win_LIDSHOT_1 {
	meta:
		author = "Mandiant"
		description = "Detects LIDSHOT implant"
	strings:
		$code1 = { 4C 89 6D ?? 4C 89 6D ?? C7 45 ?? 01 23 45 67 C7 45 ?? 89 AB CD EF C7 45 ?? FE DC BA 98 C7 45 ?? 76 54 32 10 4C 89 6C 24 ?? 48 C7 45 ?? 0F 00 00 00 C6 44 24 ?? 00 }
		$code2 = { B8 1F 85 EB 51 41 F7 E8 C1 FA 03 8B CA C1 E9 1F 03 D1 6B CA 19 }
		$code3 = { C7 45 ?? 30 6B 4C 6C 66 C7 45 ?? 55 00 }
	condition:
		uint16(0) == 0x5a4d and all of them
}
Details Yara rule 1
rule M_APT_Loader_Win_CLOUDBURST_1 {
	meta:
		author = "Mandiant"
	strings:
		$anchor1 = "Microsoft Enhanced Cryptographic Provider v1.0" ascii wide
		$code1 = { 74 79 70 }
		$code2 = { 65 71 75 69 }
		$code3 = { 62 6F 78 69 }
		$code4 = { E8 ?? ?? ?? ?? FF C6 B8 99 99 99 99 F7 EE D1 FA 8B C2 C1 E8 1F 03 D0 8D 04 16 8D 34 90 85 F6 75 ?? }
		$str1 = "%s%X"
	condition:
		uint16(0) == 0x5a4d and all of them
}
Details Yara rule 1
rule M_DropperMemonly_TOUCHSHIFT_1 {
	meta:
		author = "Mandiant"
		description = "Hunting rule for TOUCHSHIFT"
	strings:
		$p00_0 = { 09 43 ?? EB ?? FF 43 ?? B0 ?? EB ?? E8 [4] C7 00 [4] E8 [4] 32 C0 }
		$p00_1 = { 4C 63 05 [4] BA [4] 4C 8B 0D [4] 48 8B 0D [4] FF 15 [4] 4C 63 05 [4] BA [4] 4C 8B 0D [4] 48 8B 0D }
	condition:
		uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550 and (($p00_0 in (70000 .. 90000) and $p00_1 in (0 .. 64000)))
}
Details Yara rule 1
rule M_APT_Backdoor_Win_SIDESHOW_1 {
	meta:
		author = "Mandiant"
		description = "Detects string deobfuscation function in SIDESHOW, may also detect other variants of malware from the same actor"
	strings:
		$code1 = { 41 0F B6 ?? 33 ?? 48 ?? ?? 0F 1F 80 00 00 00 00 3A ?? 74 ?? FF ?? 48 FF ?? 83 ?? 48 72 ?? EB ?? 41 0F ?? ?? 2B ?? ?? 39 8E E3 38 83 ?? 48 F7 ?? C1 ?? 04 8D ?? ?? C1 ?? 03 2B ?? ?? 39 8E E3 38 }
	condition:
		uint16(0) == 0x5a4d and (all of them)
}
Details Yara rule 1
rule M_Hunting_TOUCHKEY {
	meta:
		author = "Mandiant"
		description = "Hunting rule For TOUCHKEY"
	strings:
		$a1 = "Normal.dost"
		$a2 = "Normal.docb"
		$c1 = "[SELECT]" ascii wide
		$c2 = "[SLEEP]" ascii wide
		$c3 = "[LSHIFT]" ascii wide
		$c4 = "[RSHIFT]" ascii wide
		$c5 = "[ENTER]" ascii wide
		$c6 = "[SPACE]" ascii wide
	condition:
		(uint16(0) == 0x5A4D) and uint32(uint32(0x3C)) == 0x00004550 and filesize < 200KB and (5 of ($c*)) and $a1 and $a2
}
Details Yara rule 1
rule M_Hunting_TOUCHSHOT {
	meta:
		author = "Mandiant"
		description = "Hunting rule For TOUCHSHOT"
	strings:
		$path = "%s\\Microsoft\\Windows\\Themes\\" wide
		$format = "ddd-ddd"
		$s1 = "EnumDisplaySettingsExW"
		$s2 = "GetSystemMetrics"
		$s3 = "GetDC"
		$s5 = "ReleaseDC"
	condition:
		(uint16(0) == 0x5A4D) and uint32(uint32(0x3C)) == 0x00004550 and filesize < 200KB and (3 of ($s*)) and $path and $format
}
Details Yara rule 1
rule M_Hunting_HOOKSHOT {
	meta:
		author = "Mandiant"
		description = "Hunting rule for HOOKSHOT"
	strings:
		$p00_0 = { 8B B1 [4] 40 88 73 ?? 85 F6 75 ?? 48 8B 81 [4] 48 8B 88 [4] 48 85 C9 74 ?? E8 }
		$p00_1 = { 8B F3 48 8B EA 85 DB 0F 84 [4] 4C 8D 2D [4] 66 90 4C 8D 44 24 ?? 8B D6 48 8B CD }
	condition:
		uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550 and (($p00_0 in (470000 .. 490000) and $p00_1 in (360000 .. 380000)))
}