Clop A

Description

Execution of CLOP malware on Windows 10 endpoint and simulated service name.

MITRE ATT&CK Techniques

No MITRE techniques specified for this dataset.

Environment Details

Field Value
Environment attack_range
Directory clop_a
Test Date 2021-03-22

Datasets

The following datasets were collected during this attack simulation:

Windows-Xml

  • Path: /datasets/malware/clop/clop_a/windows-xml.log
  • Sourcetype: XmlWinEventLog
  • Source: XmlWinEventLog:System

Windows-Sysmon

  • Path: /datasets/malware/clop/clop_a/windows-sysmon.log
  • Sourcetype: XmlWinEventLog
  • Source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational

The following detections in our security content repository use this attack data for testing:

Detection Name Type Source MITRE ATT&CK Analytic Story
Clop Ransomware Known Service Name TTP Endpoint T1543 Compromised Windows Host, Clop Ransomware
Process Deleting Its Process File Path TTP Endpoint T1070 Clop Ransomware, Data Destruction, WhisperGate, Remcos
Ransomware Notes bulk creation Anomaly Endpoint T1486 BlackMatter Ransomware, DarkSide Ransomware, Chaos Ransomware, Rhysida Ransomware, LockBit Ransomware, Medusa Ransomware, Black Basta Ransomware, Clop Ransomware, Cactus Ransomware, Termite Ransomware, Interlock Ransomware, NailaoLocker Ransomware, Hellcat Ransomware
Resize ShadowStorage volume TTP Endpoint T1490 Medusa Ransomware, Clop Ransomware, Compromised Windows Host, BlackByte Ransomware, VanHelsing Ransomware
Windows High File Deletion Frequency Anomaly Endpoint T1485 Sandworm Tools, Handala Wiper, Data Destruction, WhisperGate, Swift Slicer, Medusa Ransomware, DarkCrystal RAT, Black Basta Ransomware, Clop Ransomware, Interlock Ransomware, NailaoLocker Ransomware, APT37 Rustonotto and FadeStealer
High Process Termination Frequency Anomaly Endpoint T1486 BlackByte Ransomware, Rhysida Ransomware, LockBit Ransomware, Medusa Ransomware, Crypto Stealer, Snake Keylogger, Clop Ransomware, Termite Ransomware, Interlock Ransomware, NailaoLocker Ransomware, Hellcat Ransomware

Usage Instructions

Replay with Splunk Attack Data

Replay attack data with replay.py from Splunk Attack Data.

1python replay.py --dataset /datasets/malware/clop/clop_a/windows-xml.log --index attack_data

Manual Import

  1. Download the dataset files from the paths listed above
  2. Configure your Splunk instance with the appropriate sourcetypes
  3. Import the logs using the Splunk Add Data wizard

Find more detections and analytics for this attack technique in our security content repository.


Source: GitHub | Version: 1.0