Cyber Threat Report: 'KAPEKA A novel backdoor spotted in Eastern Europe'

Report Author WithSecure
Publication Date 2024-04-17
Original Reporting Source
Attributed to Nation Russia
Related Intrusion Sets Sandworm

This report from researchers at WithSecure unveils a novel backdoor: 'Kapeka'. Kapeka has been used against victims in Eastern Europe (particularly Ukraine) since mid-2022. It's an early-stage toolkit for operators, providing long-term access to victims' systems. Kapeka is linked by the researchers to the Sandworm group, operated by Russia's GRU, known for destructive attacks in Ukraine. Kapeka was discovered after analyzing artifacts from a Russian APT-linked intrusion set. It's a bespoke tool used in targeted attacks, with no previous variants reported. However analysis by the researchers identified overlap with the 'GreyEnergy' tool, which itself was considered an evolution of the BlackEnergy toolkit used in historic attacks by sandworm. The dropper is a 32-bit executable that sets up the backdoor's persistence and self-deletes. It chooses the appropriate backdoor version based on the victim's processor architecture and uses AES-256 encryption. The backdoor is a DLL masquerading as a Microsoft Word Add-In. It collects information on the victim's machine and user, communicates with C2 servers, and can execute various tasks like reading and writing files, launching processes, and self-upgrading or uninstalling. The report includes technical analysis of the dropper and back door as well as discussing the attribution to Sandworm. MITRE ATT&CK mappings and indicators of compromise (IoCs) are also included as appendices.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph

Mitigations to defend against the techniques in this report

Identified MITRE ATT&CK Techniques

ATT&CK ID Title Associated Tactics
T1497.003 Time Based Evasion Defense Evasion, Discovery
T1012 Query Registry Discovery
T1001.001 Junk Data Command and Control
T1059.003 Windows Command Shell Execution
T1105 Ingress Tool Transfer Command and Control
T1124 System Time Discovery Discovery
T1090.001 Internal Proxy Command and Control
T1112 Modify Registry Defense Evasion
T1041 Exfiltration Over C2 Channel Exfiltration
T1027 Obfuscated Files or Information Defense Evasion
T1559.001 Component Object Model Execution
T1070.009 Clear Persistence Defense Evasion
T1547.001 Registry Run Keys / Startup Folder Persistence, Privilege Escalation
T1614.001 System Language Discovery Discovery
T1082 System Information Discovery Discovery
T1070.004 File Deletion Defense Evasion
T1027.009 Embedded Payloads Defense Evasion
T1573.002 Asymmetric Cryptography Command and Control
T1218.011 Rundll32 Defense Evasion
T1573.001 Symmetric Cryptography Command and Control
T1036.008 Masquerade File Type Defense Evasion
T1564.001 Hidden Files and Directories Defense Evasion
T1053.005 Scheduled Task Execution, Persistence, Privilege Escalation
T1033 System Owner/User Discovery Discovery