Register to stream ATT&CKcon 2.0 October 29-30

Data Staged

Collected data is staged in a central location or directory prior to Exfiltration. Data may be kept in separate files or combined into one file through techniques such as Data Compressed or Data Encrypted.

Interactive command shells may be used, and common functionality within cmd and bash may be used to copy data into a staging location.

ID: T1074
Tactic: Collection
Platform: Linux, macOS, Windows
Data Sources: File monitoring, Process monitoring, Process command-line parameters
Version: 1.0

Procedure Examples

Name Description
ADVSTORESHELL ADVSTORESHELL stores output from command execution in a .dat file in the %TEMP% directory. [9]
APT28 APT28 has stored captured credential information in a file named pi.log. [39]
APT3 APT3 has been known to stage files for exfiltration in a single location. [34]
Astaroth Astaroth collects data in a plaintext file named r1.log before exfiltration. [30]
BADNEWS BADNEWS copies documents under 15MB found on the victim system to is the user's %temp%\SMB\ folder. It also copies files from USB devices to a predefined directory. [13] [14]
BadPatch BadPatch stores collected data in log files before exfiltration. [23]
Calisto Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration. [7] [8]
Carbon Carbon creates a base directory that contains the files and folders that are collected. [25]
Catchamas Catchamas stores the gathered data from the machine in .db files and .bmp files under four separate locations. [1]
Dragonfly 2.0 Dragonfly 2.0 created a directory named "out" in the user's %AppData% folder and copied files to it. [44]
Duqu Modules can be pushed to and executed by Duqu that copy data to a staging area, compress it, and XOR encrypt it. [15]
Elise Elise creates a file in AppData\Local\Microsoft\Windows\Explorer and stores all harvested data in that file. [3]
FIN5 FIN5 scripts save memory dump data into a specific directory on hosts in the victim environment. [40]
FIN6 TRINITY malware used by FIN6 identifies payment card track data on the victim and then copies it to a local file in a subdirectory of C:\Windows\. Once the malware collects the data, FIN6 actors compressed data and moved it to another staging system before exfiltration. [41]
FIN8 FIN8 aggregates staged data from a network into a single location. [5]
FLASHFLOOD FLASHFLOOD stages data it copies from the local system or removable drives in the "%WINDIR%\$NtUninstallKB885884$\" directory. [2]
Gold Dragon Gold Dragon stores information gathered from the endpoint in a file named 1.hwp. [28]
Helminth Helminth creates folders to store output from batch scripts prior to sending the information to its C2 server. [4]
Honeybee Honeybee adds collected files to a temp.zip file saved in the %temp% folder, then base64 encodes it and uploads it to control server. [38]
InvisiMole InvisiMole determines a working directory where it stores all the gathered data about the compromised machine. [26]
Kazuar Kazuar stages command output and collected data in files before exfiltration. [27]
Lazarus Group Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is saved in the %TEMP% directory, then compressed, encrypted, and uploaded to a C2 server. [35] [36]
Leviathan Leviathan has used C:\Windows\Debug and C:\Perflogs as staging directories. [37]
LightNeuron LightNeuron can store email data in files and directories specified in its configuration, such as C:\Windows\ServiceProfiles\NetworkService\appdata\Local\Temp\. [33]
menuPass menuPass stages data prior to exfiltration in multi-part archives, often saved in the Recycle Bin. [42]
MoonWind MoonWind saves information from its keylogging routine as a .zip file in the present working directory. [17]
NavRAT NavRAT writes multiple outputs to a TMP file using the >> method. [20]
Night Dragon Night Dragon has copied files to company web servers and subsequently downloaded them. [45]
NOKKI NOKKI can collect data from the victim and stage it in LOCALAPPDATA%\MicroSoft Updatea\uplog.tmp. [24]
OopsIE OopsIE stages the output from command execution and collected files in specific folders before exfiltration. [6]
Patchwork Patchwork copied all targeted files to a directory called index that was eventually uploaded to the C&C server. [14]
PoisonIvy PoisonIvy stages collected data in a text file. [18]
Prikormka Prikormka creates a directory, %USERPROFILE%\AppData\Local\SKC\, which is used to store collected log files. [12]
Pteranodon Pteranodon creates various subdirectories under %Temp%\reports\% and copies files to those subdirectories. It also creates a folder at C:\Users\\AppData\Roaming\Microsoft\store to store screenshot JPEG files. [19]
PUNCHBUGGY PUNCHBUGGY has saved information to a random temp file before exfil. [32]
PUNCHTRACK PUNCHTRACK aggregates collected data in a tmp file. [5]
RawPOS Data captured by RawPOS is placed in a temporary file under a directory named "memdump". [21]
Rover Rover copies files from removable drives to C:\system. [16]
Soft Cell Soft Cell compressed and staged files in multi-part archives in the Recycle Bin prior to exfiltration. [47]
SPACESHIP SPACESHIP identifies files with certain extensions and copies them to a directory in the user's profile. [2]
TEMP.Veles TEMP.Veles has created staging folders in directories that were infrequently used by legitimate users or processes. [46]
Threat Group-3390 Threat Group-3390 has staged encrypted archives for exfiltration on Internet-facing servers that had previously been compromised with China Chopper. [43]
Trojan.Karagany Trojan.Karagany can create a directory (C:\ProgramData\Mail\MailAg\gl) to use as a temporary directory for uploading files. [22]
Ursnif Ursnif has used tmp files to stage gathered information. [31]
USBStealer USBStealer collects files matching certain criteria from the victim and stores them in a local directory for later exfiltration. [10] [11]
Zebrocy Zebrocy stores all collected information in a single file before exfiltration. [29]

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

Detection

Processes that appear to be reading files from disparate locations and writing them to the same directory or file may be an indication of data being staged, especially if they are suspected of performing encryption or compression on the files.

Monitor processes and command-line arguments for actions that could be taken to collect and combine files. Remote access tools with built-in features may interact directly with the Windows API to gather and copy to a location. Data may also be acquired and staged through Windows system management tools such as Windows Management Instrumentation and PowerShell.

References

  1. Balanza, M. (2018, April 02). Infostealer.Catchamas. Retrieved July 10, 2018.
  2. FireEye Labs. (2015, April). APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION. Retrieved May 1, 2015.
  3. Accenture Security. (2018, January 27). DRAGONFISH DELIVERS NEW FORM OF ELISE MALWARE TARGETING ASEAN DEFENCE MINISTERS’ MEETING AND ASSOCIATES. Retrieved November 14, 2018.
  4. Falcone, R. and Lee, B.. (2016, May 26). The OilRig Campaign: Attacks on Saudi Arabian Organizations Deliver Helminth Backdoor. Retrieved May 3, 2017.
  5. Elovitz, S. & Ahl, I. (2016, August 18). Know Your Enemy: New Financially-Motivated & Spear-Phishing Group. Retrieved February 26, 2018.
  6. Lee, B., Falcone, R. (2018, February 23). OopsIE! OilRig Uses ThreeDollars to Deliver New Trojan. Retrieved July 16, 2018.
  7. Kuzin, M., Zelensky S. (2018, July 20). Calisto Trojan for macOS. Retrieved September 7, 2018.
  8. Pantig, J. (2018, July 30). OSX.Calisto. Retrieved September 7, 2018.
  9. ESET. (2016, October). En Route with Sednit - Part 2: Observing the Comings and Goings. Retrieved November 21, 2016.
  10. Calvet, J. (2014, November 11). Sednit Espionage Group Attacking Air-Gapped Networks. Retrieved January 4, 2017.
  11. Kaspersky Lab's Global Research and Analysis Team. (2015, December 4). Sofacy APT hits high profile targets with updated toolset. Retrieved December 10, 2015.
  12. Cherepanov, A.. (2016, May 17). Operation Groundbait: Analysis of a surveillance toolkit. Retrieved May 18, 2016.
  13. Settle, A., et al. (2016, August 8). MONSOON - Analysis Of An APT Campaign. Retrieved September 22, 2016.
  14. Lunghi, D., et al. (2017, December). Untangling the Patchwork Cyberespionage Group. Retrieved July 10, 2018.
  15. Symantec Security Response. (2011, November). W32.Duqu: The precursor to the next Stuxnet. Retrieved September 17, 2015.
  16. Ray, V., Hayashi, K. (2016, February 29). New Malware ‘Rover’ Targets Indian Ambassador to Afghanistan. Retrieved February 29, 2016.
  17. Miller-Osborn, J. and Grunzweig, J.. (2017, March 30). Trochilus and New MoonWind RATs Used In Attack Against Thai Organizations. Retrieved March 30, 2017.
  18. Hayashi, K. (2005, August 18). Backdoor.Darkmoon. Retrieved February 23, 2018.
  19. Kasza, A. and Reichel, D.. (2017, February 27). The Gamaredon Group Toolset Evolution. Retrieved March 1, 2017.
  20. Mercer, W., Rascagneres, P. (2018, May 31). NavRAT Uses US-North Korea Summit As Decoy For Attacks In South Korea. Retrieved June 11, 2018.
  21. Nesbit, B. and Ackerman, D. (2017, January). Malware Analysis Report - RawPOS Malware: Deconstructing an Intruder’s Toolkit. Retrieved October 4, 2017.
  22. Symantec Security Response. (2014, July 7). Dragonfly: Cyberespionage Attacks Against Energy Suppliers. Retrieved April 8, 2016.
  23. Bar, T., Conant, S. (2017, October 20). BadPatch. Retrieved November 13, 2018.
  24. Grunzweig, J., Lee, B. (2018, September 27). New KONNI Malware attacking Eurasia and Southeast Asia. Retrieved November 5, 2018.
  1. ESET. (2017, March 30). Carbon Paper: Peering into Turla’s second stage backdoor. Retrieved November 7, 2018.
  2. Hromcová, Z. (2018, June 07). InvisiMole: Surprisingly equipped spyware, undercover since 2013. Retrieved July 10, 2018.
  3. Levene, B, et al. (2017, May 03). Kazuar: Multiplatform Espionage Backdoor with API Access. Retrieved July 17, 2018.
  4. Sherstobitoff, R., Saavedra-Morales, J. (2018, February 02). Gold Dragon Widens Olympics Malware Attacks, Gains Permanent Presence on Victims’ Systems. Retrieved June 6, 2018.
  5. ESET. (2018, November 20). Sednit: What’s going on with Zebrocy?. Retrieved February 12, 2019.
  6. Doaty, J., Garrett, P.. (2018, September 10). We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan. Retrieved April 17, 2019.
  7. Caragay, R. (2015, March 26). URSNIF: The Multifaceted Malware. Retrieved June 5, 2019.
  8. Gorelik, M.. (2019, June 10). SECURITY ALERT: FIN8 IS BACK IN BUSINESS, TARGETING THE HOSPITALITY INDUSTRY. Retrieved June 13, 2019.
  9. Faou, M. (2019, May). Turla LightNeuron: One email away from remote code execution. Retrieved June 24, 2019.
  10. valsmith. (2012, September 21). More on APTSim. Retrieved September 28, 2017.
  11. Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Unraveling the Long Thread of the Sony Attack. Retrieved February 25, 2016.
  12. Novetta Threat Research Group. (2016, February 24). Operation Blockbuster: Loaders, Installers and Uninstallers Report. Retrieved March 2, 2016.
  13. FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.
  14. Sherstobitoff, R. (2018, March 02). McAfee Uncovers Operation Honeybee, a Malicious Document Campaign Targeting Humanitarian Aid Groups. Retrieved May 16, 2018.
  15. Anthe, C. et al. (2015, October 19). Microsoft Security Intelligence Report Volume 19. Retrieved December 23, 2015.
  16. Bromiley, M. and Lewis, P. (2016, October 7). Attacking the Hospitality and Gaming Industries: Tracking an Attacker Around the World in 7 Years. Retrieved October 6, 2017.
  17. FireEye Threat Intelligence. (2016, April). Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6. Retrieved June 1, 2016.
  18. PwC and BAE Systems. (2017, April). Operation Cloud Hopper. Retrieved April 5, 2017.
  19. Counter Threat Unit Research Team. (2017, June 27). BRONZE UNION Cyberespionage Persists Despite Disclosures. Retrieved July 13, 2017.
  20. US-CERT. (2018, March 16). Alert (TA18-074A): Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors. Retrieved June 6, 2018.
  21. McAfee® Foundstone® Professional Services and McAfee Labs™. (2011, February 10). Global Energy Cyberattacks: “Night Dragon”. Retrieved February 19, 2018.
  22. Miller, S, et al. (2019, April 10). TRITON Actor TTP Profile, Custom Attack Tools, Detections, and ATT&CK Mapping. Retrieved April 16, 2019.
  23. Cybereason Nocturnus. (2019, June 25). Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers. Retrieved July 18, 2019.