Cyber Threat Report: 'From OneNote to RansomNote: An Ice Cold Intrusion'

Report Author The DFIR Report
Publication Date 2024-04-01
Original Reporting Source
Related Intrusion Sets Nokoyawa Ransomware Group

This case report from The DFIR Report describes an intrusion which started with a malicious OneNote attachment. Opening the OneNote file led to the download of an IcedID DLL from a remote server. Following discovery activities, on day 33 of the intrusion IcedID was used to launch multiple CobaltStrike beacons. The threat actor installed AnyDesk for additional remote access and then utilised FileZilla to exfiltrate data. Finally the actor deployed a variant of the Nokoyawa ransomware to encrypt data.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1070 Indicator Removal Defense Evasion
T1518.001 Security Software Discovery Discovery
T1048 Exfiltration Over Alternative Protocol Exfiltration
T1069.002 Domain Groups Discovery
T1046 Network Service Discovery Discovery
T1083 File and Directory Discovery Discovery
T1059.001 PowerShell Execution
T1071.001 Web Protocols Command and Control
T1018 Remote System Discovery Discovery
T1204.002 Malicious File Execution
T1566 Phishing Initial Access
T1059.003 Windows Command Shell Execution
T1036.008 Masquerade File Type Defense Evasion
T1039 Data from Network Shared Drive Collection
T1482 Domain Trust Discovery Discovery
T1552.001 Credentials In Files Credential Access
T1218.010 Regsvr32 Defense Evasion
T1021.001 Remote Desktop Protocol Lateral Movement
T1003.001 LSASS Memory Credential Access
T1218.011 Rundll32 Defense Evasion
T1053.005 Scheduled Task Execution, Persistence, Privilege Escalation
T1105 Ingress Tool Transfer Command and Control
T1055 Process Injection Defense Evasion, Privilege Escalation
T1036 Masquerading Defense Evasion
T1033 System Owner/User Discovery Discovery
T1219 Remote Access Software Command and Control
T1082 System Information Discovery Discovery
T1486 Data Encrypted for Impact Impact
T1543.003 Windows Service Persistence, Privilege Escalation
T1057 Process Discovery Discovery