Winnti for Windows

Winnti for Windows is a modular remote access Trojan (RAT) that has been used likely by multiple groups to carry out intrusions in various regions since at least 2010, including by one group referred to as the same name, Winnti Group.[1][2][3][4]. The Linux variant is tracked separately under Winnti for Linux.[5]

ID: S0141
Type: MALWARE
Platforms: Windows
Version: 3.1
Created: 31 May 2017
Last Modified: 10 April 2024

Techniques Used

Domain ID Name Use
Enterprise T1548 .002 Abuse Elevation Control Mechanism: Bypass User Account Control

Winnti for Windows can use a variant of the sysprep UAC bypass.[3]

Enterprise T1071 .001 Application Layer Protocol: Web Protocols

Winnti for Windows has the ability to use encapsulated HTTP/S in C2 communications.[3]

Enterprise T1547 .001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Winnti for Windows can add a service named wind0ws to the Registry to achieve persistence after reboot.[3]

Enterprise T1543 .003 Create or Modify System Process: Windows Service

Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence.[2]

Enterprise T1140 Deobfuscate/Decode Files or Information

The Winnti for Windows dropper can decrypt and decompresses a data blob.[3]

Enterprise T1573 .001 Encrypted Channel: Symmetric Cryptography

Winnti for Windows can XOR encrypt C2 traffic.[3]

Enterprise T1480 .001 Execution Guardrails: Environmental Keying

The Winnti for Windows dropper component can verify the existence of a single command line parameter and either terminate if it is not found or later use it as a decryption key.[3]

Enterprise T1083 File and Directory Discovery

Winnti for Windows can check for the presence of specific files prior to moving to the next phase of execution.[3]

Enterprise T1070 .004 Indicator Removal: File Deletion

Winnti for Windows can delete the DLLs for its various components from a compromised host.[3]

.006 Indicator Removal: Timestomp

Winnti for Windows can set the timestamps for its worker and service components to match that of cmd.exe.[3]

Enterprise T1105 Ingress Tool Transfer

The Winnti for Windows dropper can place malicious payloads on targeted systems.[3]

Enterprise T1036 .005 Masquerading: Match Legitimate Name or Location

A Winnti for Windows implant file was named ASPNET_FILTER.DLL, mimicking the legitimate ASP.NET ISAPI filter DLL with the same name.[2]

Enterprise T1106 Native API

Winnti for Windows can use Native API to create a new process and to start services.[3]

Enterprise T1095 Non-Application Layer Protocol

Winnti for Windows can communicate using custom TCP.[3]

Enterprise T1027 .013 Obfuscated Files or Information: Encrypted/Encoded File

Winnti for Windows has the ability to encrypt and compress its payload.[3]

Enterprise T1057 Process Discovery

Winnti for Windows can check if the explorer.exe process is responsible for calling its install function.[3]

Enterprise T1090 .001 Proxy: Internal Proxy

The Winnti for Windows HTTP/S C2 mode can make use of a local proxy.[3]

.002 Proxy: External Proxy

The Winnti for Windows HTTP/S C2 mode can make use of an external proxy.[3]

Enterprise T1218 .011 System Binary Proxy Execution: Rundll32

The Winnti for Windows installer loads a DLL using rundll32.[2][3]

Enterprise T1082 System Information Discovery

Winnti for Windows can determine if the OS on a compromised host is newer than Windows XP.[3]

Enterprise T1569 .002 System Services: Service Execution

Winnti for Windows can run as a service using svchost.exe.[3]

Groups That Use This Software

ID Name References
G0143 Aquatic Panda

Aquatic Panda used Winnti for Windows for persistent access to Windows victims.[6]

G0044 Winnti Group

[1][7]

References