【CyCraft Monthly Intelligence】When Defense Systems Become the Target: An Analysis of RansomHub Ransomware's Anti-Detection Techniques

Threat and Impact

RansomHubransomware, operated by the threat actor group Water Bakunawa, has drawnworldwide attention in the cybersecurity community despite being active forjust over a year, owing to its sophisticated tactics. RansomHub primarilytargets the disabling of EDR and antivirus software. In June 2024, it leveragedvulnerabilities such as Zerologon(CVE-2020-1472) to successfully attack multiple industries and criticalinfrastructure sectors, including water and wastewater treatment, informationtechnology, commercial and government agencies, medical, agriculture, financialservices, manufacturing, transportation, and communications.

Analyst Perspective

The RansomHub attack chain underscores the importance ofproactive threat intelligence gathering, robust security measures, andcontinuous monitoring in protecting digital assets. As organizations likeRansomHub continue to evolve with increasingly sophisticated anti-EDR tactics,enterprises must adapt their existing security strategies to effectivelyaddress the risks especially in this ever-changing cybersecurity landscape.

Incident Description

According to the Federal Bureau of Investigation (FBI),over 210 organizations have fallen victim since February 2024. The RansomHubattack chain employs advanced anti-EDR techniques, such as EDRKillShifter whichis specifically designed to disrupt security processes, evade detection, andensure persistent in compromised systems. Through batch scripts and tools likeEDRKillShifter, RansomHub can disable or terminate EDR protection processes,dump credentials from LSASS memory to escalate attacks, conduct stealthynetwork reconnaissance, exfiltrate sensitive data using tools like rclone, andultimately deploy ransomware to encrypt files as well as extort ransompayments.

The rise of RansomHub not only poses tangible economic andsecurity threats but also indicates that ransomware attacks have becomeincreasingly prevalent. The sophisticated tools and tactics used to bypasscurrent security defenses highlight the necessity of multi-layered defensestrategies and attack surface management.

Technical Details

Beyond employing advanced anti-EDR techniques to evadedetection and persist in compromised systems, RansomHub's most notable featureis the EDRKillShifter tool, which can incapacitate traditional EDR defenses andsignificantly increase attack success rates.

Initial Access

RansomHub gains initial access through various methods,including exploiting the Zerologon vulnerability (CVE-2020-1472) andcompromising user accounts.

Defense Evasion

In one incident, RansomHub utilized batch scripts such as 232.bat, tdsskiller.bat, killdeff.bat, and LogDel.bat to evade detection. These scripts disable security features, modify Windows registry settings, and clearevent logs to hinder forensic investigations.

EDRKillShifter

EDRKillShifter is a critical tool in the RansomHub attackchain. It's an executable loader that leverages vulnerable drivers to terminateEDR and antivirus software. After decrypting the embedded resource data.bin andloading it into memory for execution, EDRKillShifter can bypass securitymeasures and persist in the system.

Credential Dumping

RansomHub leverages Task Manager to dump credentials fromLSASS memory, enabling attack escalation. The ransomware not only stealssensitive credentials and causes further damage but also makes recovery effortsmore complex.

Lateral Movement

Attackers employ transfer techniques of lateral movementtools, SMB/Windows Admin Shares, and tools like NetScan to precisely andefficiently move across systems. Since this lateral movement is difficult todetect, it paves the way for subsequent targeted attacks.

Command and Control (C2)

RansomHub utilizes AnyDesk as its C2 infrastructure,abusing this legitimate remote access tool to execute commands, exfiltratedata, and conduct lateral movement activities.

Data Exfiltration

Attackers use the command-line tool rclone to stealsensitive files from compromised networks, aligning with MITRE ATT&CK'sT1041 Exfiltration Over C2 Channel, transferring data to remote servers forransom demands.

Conclusion

Once the ransomware and EDRKillShifter are successfullyexecuted, system files will be encrypted and VSS snapshots deleted withoutconfirmation, severely compromising system recovery capabilities. Therefore, athorough understanding of the RansomHub attack chain and the technical detailsof tools like EDRKillShifter can help security professionals effectivelyanticipate and defend against similar threats.

Mitigation

To effectively mitigate RansomHub and EDRKillShifter aliketools, we recommend enterprises implement a multi-layered security strategythat addresses both short-term and long-term threats:

1. Strengthen Endpoint Protection

·       Enable behavioral analysis andheuristic scanning: Activate these features todetect anomaly or behaviors associated with ransomware attacks, helpingidentify and isolate infected systems.

·       Regular updates and patching: Ensure all endpoint devices are regularly updated and patched toaddress known vulnerabilities, particularly those related to drivers andkernel-level components.

2. Restrict Endpoint Access Privileges

·       Continuous verification: Implement continuous verification mechanisms to limit lateralmovement, and leverage endpoint isolation and restoration capabilities tocontrol malware propagation.

·       Endpoint isolation: Employ isolation techniques to prevent infected endpoints fromcommunicating with other systems, reducing the scope of damage.

·       Enable restoration capabilities: Activate restoration features to restore systems to previousstates when compromised, minimizing impact.

3. Protect Drivers and Kernel Level

·       Driver management: Strictly control which drivers are allowed to execute on systems,using tools that monitor and restrict unauthorized or suspicious driverexecution.

·       Kernel-level monitoring: Monitoring kernel level to detect and intercept suspiciousactivities proactively.

4. Enhance Credential and Authentication Security

·       Multi-factor authentication (MFA): Enable MFA at all access points to add an additional securitylayer, making it harder for attackers to gain unauthorized access.

·       Regular password updates: Enforce regular password updates and use strong passwords toreduce the risk of unauthorized access.

·       Role-based access control: Limit access privileges based on roles to reduce exposure, andregularly audit authentication systems for vulnerabilities.

5. Enable Behavioral Monitoring and Anomaly Detection

·       Real-time monitoring: Continuously monitor system activities to identify ransomware orother malicious activities.

·       Autonomous alerts and analysis: Configure autonomous alert and analysis mechanisms, such asreal-time monitoring of network traffic and system logs, to enable rapidresponse to potential threats.

·       Anomaly detection: Leverage machine learning and artificial intelligence to detectand identify anomalies associated with ransomware activities.

Conclusion

Attacks targeting EDR and other defense systems areescalating. Based on our technical analysis, we emphasize strict accesscontrols and continuous monitoring. By implementing mitigation strategiesoutlined above, enterprises can build robust security defenses andsignificantly reduce the risk of falling victim to RansomHub and similarransomware campaigns.

Reference
  1. How Ransomhub Ransomware Uses EDRKillShifter toDisable EDR and Antivirus Protections
  2. Threat Actor Groups Tracked by Palo AltoNetworks Unit 42
  3. #StopRansomware: RansomHub Ransomware
  4. RansomHub Ransomware Operators Deploy NewMalware To Disable EDR Security Software In BYOVD Attacks
  5. RansomHub Ransomware Using Multiple TechniquesTo Disable EDR And Antivirus

IoCs (Indicator of Compromise)

Files

   
Context   
   
MD5   
   
SHA1   
   
SHA256   
   
EDRKILLSHIFTER Binary   
   
c618c943840269eb753cb389029d331c   
   
bcdb721d5be41a9d61bee20a458ae748e023238f   
   
be699f53c09493edcc8470b9dc256941ed310565c477afcf2c9222581a604b86   
   
EDRKILLSHIFTER Binary   
   
da3ba26033eb145ac916500725b7dfd5   
   
2d3a95e91449a366ccf56177a4542cc439635768   
   
bd70882f67da03836f372172f655456ce19f95878d70ec39fcc6c059f9ef4ca0   
   
EDRKILLSHIFTER Binary   
   
03b9b7bc71c22d078987b2640190b655   
   
77daf77d9d2a08cc22981c004689b870f74544b5   
   
f982dfc0a0984f317460ca6d27d72ad6b3274b58cb7cf984e1c3e6f001e1edf8   
   
EDRKILLSHIFTER Binary   
   
57556d30b4d1e01d5c5ca2717a2c8281   
   
6764ddb2e5b18bf5d0c621f3078d7ac72865c1c3   
   
b2a2e8e0795b2f69d96a48a49985fb67d22d1c6e8b40dadd690c299b9af970d4   
   
EDRKILLSHIFTER Binary   
   
de8e14fdd3f385d7c6d34b181903849f   
   
86cdb729094c013e411ac9b4c72485a55a629e5d   
   
46ff164e066a3a88dad76cad25c6ea42c7da6890bcba3fa3ccd4c6e93a3272d0   
   
EDRKILLSHIFTER Binary   
   
n/a   
   
2e89cf3267c8724002c3c89be90874a22812efc6   
   
n/a   
   
TDSSKILLER Binary   
   
ff1eff0e0f1f2eabe1199ae71194e560   
   
3b035da6c69f9b05868ffe55d7a267d098c6f290   
   
2d823c8b6076e932d696e8cb8a2c5c5df6d392526cba8e39b64c43635f683009   
   
RansomHub Ransomware Binaries   
   
n/a   
   
4c0d755f42902559d16b73ccc4511897f7bbce94   
   
n/a   
   
RansomHub Ransomware Binaries   
   
407dcc63e6186f7acada055169b08d81   
   
189c638388acd0189fe164cf81e455e41d9629d6   
   
bfbbba7d18be1aa2e85390fa69a761302756ee9348b7343af6f42f3b5d0a939c   
   
RansomHub Ransomware Binaries   
   
f17ceae8c5066608b5c87431bac405a9   
   
de1241a592760cc1d850be8f41beebcd460b66ec   
   
30abbbeedeeb268435899a7697f7a72f37a38e60ae2430e09bc029c7a8aa7001   
   
RansomHub Ransomware Binaries   
   
676259a72f3f770f8ad20b287d62071b   
   
8de2d38d33294586b4758599fdf65f1a265e013b   
   
869758de8334c2b201a07cfbfc0a903105a113080dde0355857de46b3eaae08e   
   
RansomHub Ransomware Binaries   
   
n/a   
   
5f2c7da181a0ef32df5b9c8a10ea5b3135489021   
   
n/a   
   
NetScan Binary   
   
719ba3d7051173982919d1e4e9e9a0ec   
   
e38082ae727aeaef4f241a1920150fdf6f149106   
   
d1347f4dccebf2fcd672dcef9c66c91b9d3f12b9881e3e390626927718fda616   
   
Rclone Binary   
   
0cd57e68236aaa585af75e3be9d5df7d   
   
e187d58f59e0444f7ef9ddefec88d2b11b96e734   
   
d9a8c4fc94655f47a127b45c71e426d0f2057b6faf78fb7b86ee2995f7def41d   

URL

  • Context: IP Address where the Anti-EDR was downloaded
  • URL: hxxp://82.147.85[.]52/Loader.exe

About CyCraft

CyCraft is a cybersecurity company founded in 2017, focusing on autonomous AI technology. Headquartered in Taiwan, it has subsidiaries in Japan and Singapore. CyCraft provides professional cybersecurity services to government agencies, police and defense forces, banks, and high-tech manufacturers throughout the Asia-Pacific region. It has received strong backing from the CID Group and Pavilion Capital, a Temasek Holdings Private Limited subsidiary.

Subscribe to CyCraft's Newsletter

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By clicking this button, you agree to CyCraft's privacy policy and consent to CyCraft using the information you provided to contact you. You may cancel your subscription at any time.