{"id":123338,"date":"2022-06-06T01:14:06","date_gmt":"2022-06-06T08:14:06","guid":{"rendered":"https:\/\/unit42.paloaltonetworks.com\/?p=123338"},"modified":"2022-06-06T01:17:29","modified_gmt":"2022-06-06T08:17:29","slug":"popping-eagle-malware","status":"publish","type":"post","link":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/","title":{"rendered":"Popping Eagle: \u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u65b9\u6cd5"},"content":{"rendered":"<h2><a id=\"post-123338-_nhkcfdotvnpb\"><\/a>\u6982\u8981<\/h2>\n<p>\u7f72\u540d\u4ed8\u304d\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u52d5\u4f5c\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u653b\u6483(\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u653b\u6483\u3001<a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/001\/\">\u30c0\u30a4\u30ca\u30df\u30c3\u30af\u30ea\u30f3\u30af\u30e9\u30a4\u30d6\u30e9\u30ea(DLL)\u306e\u30cf\u30a4\u30b8\u30e3\u30c3\u30af<\/a>\u3001\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u3001\u60aa\u610f\u306e\u3042\u308b\u30b9\u30ec\u30c3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306a\u3069)\u3092\u7684\u78ba\u306b\u691c\u51fa\u3067\u304d\u308b\u3088\u3046\u3001\u79c1\u305f\u3061\u306f\u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u30a2\u30ce\u30de\u30ea(\u7570\u5e38)\u3092\u691c\u51fa\u3067\u304d\u308b\u5206\u6790\u691c\u51fa\u5668\u7fa4\u3092\u8003\u6848\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>\u3053\u306e\u65b0\u3057\u3044\u691c\u51fa\u5668\u3092\u4f7f\u3063\u305f\u3068\u3053\u308d\u3001\u7523\u696d\u30b9\u30d1\u30a4\u653b\u6483\u3068\u601d\u308f\u308c\u308b\u6d3b\u52d5\u304c\u307f\u3064\u304b\u308a\u307e\u3057\u305f\u3002\u3053\u306e\u6d3b\u52d5\u3092\u89b3\u6e2c\u3059\u308b\u3068\u3001\u305d\u308c\u307e\u3067\u77e5\u3089\u308c\u3066\u3044\u306a\u304b\u3063\u305f\u3042\u308b\u30de\u30eb\u30a6\u30a7\u30a2\u304c\u3001\u7279\u5225\u306a\u7d30\u5de5\u3092\u3057\u305fDLL\u30cf\u30a4\u30b8\u30e3\u30c3\u30af\u653b\u6483\u3092\u4ed5\u639b\u3051\u3066\u3044\u308b\u69d8\u5b50\u304c\u78ba\u8a8d\u3055\u308c\u307e\u3057\u305f\u3002\u3053\u306e\u30b5\u30f3\u30d7\u30eb\u306b\u78ba\u8a8d\u3055\u308c\u305f\u8907\u6570\u306e\u30a2\u30fc\u30c6\u30a3\u30d5\u30a1\u30af\u30c8\u3092\u3082\u3068\u306b\u3001\u79c1\u305f\u3061\u306f\u3053\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u306b\u300cPopping Eagle\u300d\u3068\u3044\u3046\u540d\u524d\u3092\u3064\u3051\u307e\u3057\u305f\u3002\u3053\u306e\u307b\u304b<a href=\"https:\/\/go.dev\/\">Go<\/a>\u3067\u66f8\u304b\u308c\u305f\u7b2c2\u6bb5\u968e\u306e\u60aa\u610f\u306e\u3042\u308b\u30c4\u30fc\u30eb(\u300cGoing Eagle\u300d\u3068\u547d\u540d)\u3082\u78ba\u8a8d\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u7279\u5b9a\u306e\u4e8b\u4f8b\u3067\u306f\u653b\u6483\u8005\u304c\u3053\u306e\u5f8c\u3001\u8907\u6570\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u30ad\u30e3\u30f3\u3084\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6\u624b\u9806\u3092\u5b9f\u884c\u3057\u305f\u69d8\u5b50\u3082\u78ba\u8a8d\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u4eca\u56de\u306e\u65b0\u305f\u306a\u5206\u6790\u691c\u51fa\u5668\u7fa4\u306b\u3088\u308bPopping Eagle\u767a\u898b\u306f\u3001\u4ee5\u4e0b\u306e\u5404\u30dd\u30a4\u30f3\u30c8\u306e\u91cd\u8981\u6027\u3092\u5f37\u8abf\u3059\u308b\u3082\u306e\u3068\u3044\u3048\u307e\u3059\u3002<\/p>\n<ul>\n<li>\u3053\u308c\u3089\u306e\u5206\u6790\u7d71\u8a08\u624b\u6cd5\u306f\u3001\u5f93\u6765\u898b\u9003\u3057\u3066\u3044\u305f\u306f\u305a\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u3092\u7279\u5b9a\u53ef\u80fd<\/li>\n<li>\u3053\u308c\u3089\u306e\u5206\u6790\u691c\u51fa\u5668\u7fa4\u306f\u3001\u691c\u51fa\u56de\u907f\u3092\u306d\u3089\u3046\u30de\u30eb\u30a6\u30a7\u30a2\u304c\u7f72\u540d\u4ed8\u304d\u30d7\u30ed\u30bb\u30b9\u306b\u81ea\u8eab\u3092\u30ed\u30fc\u30c9\u3057\u3066\u3082\u3001\u96e3\u8aad\u5316\u306e\u8a66\u307f\u306b\u3088\u3063\u3066\u305d\u308c\u3092\u767a\u898b\u53ef\u80fd<\/li>\n<\/ul>\n<p>\u672c\u7a3f\u306f\u3001\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u306e\u65b9\u6cd5\u3092\u8ad6\u3058\u3001\u653b\u6483\u306b\u4f7f\u7528\u3055\u308c\u305f\u30c4\u30fc\u30eb\u3092\u5206\u6790\u3057\u3001\u88ab\u5bb3\u74b0\u5883\u3067\u653b\u6483\u8005\u304c\u884c\u3063\u305f\u30a2\u30af\u30b7\u30e7\u30f3\u3092\u8a73\u7d30\u306b\u89e3\u8aac\u3057\u307e\u3059\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306e\u304a\u5ba2\u69d8\u306f\u3001Cortex XDR\u3068\u3001\u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u306e\u30af\u30e9\u30a6\u30c9\u914d\u4fe1\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30fc\u30d3\u30b9WildFire\u306b\u3088\u3063\u3066\u3001\u3053\u306e\u7a2e\u306e\u653b\u6483\u304b\u3089\u4fdd\u8b77\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u8a73\u3057\u304f\u306f\u300c<a href=\"#post-123338-_y2vks12rn6r1\">\u7d50\u8ad6<\/a>\u300d\u306e\u30bb\u30af\u30b7\u30e7\u30f3\u3092\u3054\u89a7\u304f\u3060\u3055\u3044\u3002<\/p>\n<table style=\"width: 74.9393%;\">\n<tbody>\n<tr>\n<td style=\"width: 40.4011%;\"><span style=\"font-weight: 400;\">\u672c\u7a3f\u3067\u89e3\u8aac\u3059\u308b\u4e3b\u306a\u30de\u30eb\u30a6\u30a7\u30a2<\/span><\/td>\n<td style=\"width: 255.874%;\"><span style=\"font-weight: 400;\">Popping Eagle, Going Eagle<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>\u76ee\u6b21<\/h2>\n<p><a href=\"#post-123338-_l0xmfafr470y\">\u7f72\u540d\u4ed8\u304d\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306b\u304a\u3051\u308b\u7d71\u8a08\u7684\u30a2\u30ce\u30de\u30ea(\u7570\u5e38)\u306e\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0<\/a><br \/>\n<a href=\"#post-123338-_8v6gcdw99gsr\">\u80cc\u666f<\/a><br \/>\n<a href=\"#post-123338-_fsx1o1umfcit\">\u5b9f\u88c5<\/a><br \/>\n<a href=\"#post-123338-_tewllhseaca\">Popping Eagle\u306e\u767a\u898b<\/a><br \/>\n<a href=\"#post-123338-_ii78ksvmacid\">Popping Eagle\u306e\u7b2c1\u6bb5\u968e\u306e\u5206\u6790<\/a><br \/>\n<a href=\"#post-123338-_k0mwfj24az75\">\u30ed\u30fc\u30c9\u65b9\u6cd5: DLL\u30d7\u30ed\u30ad\u30b7<\/a><br \/>\n<a href=\"#post-123338-_u6oidu4qz6gl\">uxtheme.dll\u30b5\u30f3\u30d7\u30eb\u306e\u5206\u6790<\/a><br \/>\n<a href=\"#post-123338-_vmudhtfvw1al\">Going Eagle\u306e\u7b2c2\u6bb5\u968e\u306e\u5206\u6790<\/a><br \/>\n<a href=\"#post-123338-_5aoapfyuwf95\">ClickRuntime-amd86.dll\u306e\u5206\u6790<\/a><br \/>\n<a href=\"#post-123338-_bnl0wiknyi4k\">\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6<\/a><br \/>\n<a href=\"#post-123338-_am2tfi49hyjh\">\u7b2c2\u6bb5\u968e\u306e\u30bf\u30a4\u30e0\u30e9\u30a4\u30f3<\/a><br \/>\n<a href=\"#post-123338-_tfneqquju6td\">\u95a2\u9023IoC\u306e\u691c\u7d22<\/a><br \/>\n<a href=\"#post-123338-_10cwv3n7t2da\">\u4eee\u8aac<\/a><br \/>\n<a href=\"#post-123338-_14ivncq4mxm\">\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u3068\u691c\u7d22\u306e\u65b9\u6cd5\u8ad6<\/a><br \/>\n<a href=\"#post-123338-_y2vks12rn6r1\">\u7d50\u8ad6<\/a><br \/>\n<a href=\"#post-123338-_y3g6468btc3a\">\u4ed8\u9332<\/a><br \/>\n<a href=\"#post-123338-_hdyirhrsndcs\">IoC<\/a><br \/>\n<a href=\"#Hunting-Yara-Rules\">\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u7528Yara\u30eb\u30fc\u30eb<\/a><\/p>\n<h2><a id=\"post-123338-_l0xmfafr470y\"><\/a>\u7f72\u540d\u4ed8\u304d\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306b\u304a\u3051\u308b\u7d71\u8a08\u7684\u30a2\u30ce\u30de\u30ea(\u7570\u5e38)\u306e\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0<\/h2>\n<h3><a id=\"post-123338-_8v6gcdw99gsr\"><\/a>\u80cc\u666f<\/h3>\n<p>\u3053\u3053\u6570\u5e74\u306f\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u653b\u6483\u304c\u6fc0\u5897\u3057\u3066\u304a\u308a\u3001\u305f\u3068\u3048\u3070<a href=\"https:\/\/unit42.paloaltonetworks.jp\/solarstorm-supply-chain-attack-timeline\/\">SolarStorm<\/a>\u3001<a href=\"https:\/\/unit42.paloaltonetworks.jp\/unit42-threat-brief-petya-ransomware\/\">NotPetya<\/a>\u3001<a href=\"https:\/\/unit42.paloaltonetworks.jp\/threat-brief-kaseya-vsa-ransomware-attacks\/\">Kaseya<\/a>\u3001<a href=\"https:\/\/unit42.paloaltonetworks.jp\/new-os-x-ransomware-keranger-infected-transmission-bittorrent-client-installer\/\">KeRanger<\/a>\u306a\u3069\u304c\u305d\u306e\u4f8b\u3068\u3057\u3066\u3042\u3052\u3089\u308c\u307e\u3059\u3002<\/p>\n<p>\u3053\u308c\u307e\u3067\u306e\u4e8b\u4f8b\u304b\u3089\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u653b\u6483\u3092\u884c\u3046\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u305f\u3061\u306f\u3001\u653b\u6483\u306e\u7b2c1\u6bb5\u968e\u3067\u306f\u591a\u6570\u306e\u7d44\u7e54\u3092\u5bfe\u8c61\u306b\u30b3\u30fc\u30c9\u3092\u5b9f\u884c\u3059\u308b\u3082\u306e\u306e\u3001\u653b\u6483\u306e\u7b2c2\u6bb5\u968e\u3067\u306f\u5c11\u6570\u306e\u4fa1\u5024\u306e\u9ad8\u3044\u6a19\u7684\u306b\u5bfe\u8c61\u3092\u7d5e\u308b\u50be\u5411\u304c\u5f37\u3044\u3053\u3068\u304c\u308f\u304b\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u79c1\u305f\u3061\u306fCortex XDR\u306e\u5927\u898f\u6a21\u306a\u30c7\u30fc\u30bf\u30bb\u30c3\u30c8\u3092\u6d3b\u304b\u3057\u3066\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u300c\u6b63\u5e38\u306a\u300d\u632f\u308b\u821e\u3044\u306e\u30b0\u30ed\u30fc\u30d0\u30eb\u30d9\u30fc\u30b9\u30e9\u30a4\u30f3\u3092\u69cb\u7bc9\u3057\u3001\u300c\u7570\u5e38\u306a\u300d\u632f\u308b\u821e\u3044(\u30a2\u30ce\u30de\u30ea)\u3092\u63a2\u7d22\u3057\u307e\u3057\u305f\u3002<\/p>\n<p>\u3053\u308c\u3089\u306e\u30a2\u30ce\u30de\u30ea\u3092\u7279\u5b9a\u3059\u308c\u3070\u3001\u305f\u3068\u3048\u3070\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u653b\u6483\u3084DLL\u30b5\u30a4\u30c9\u30ed\u30fc\u30c7\u30a3\u30f3\u30b0\u3001\u60aa\u610f\u306e\u3042\u308b\u30b9\u30ec\u30c3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306a\u3069\u306e\u3055\u307e\u3056\u307e\u306a\u7a2e\u985e\u306e\u30c6\u30af\u30cb\u30c3\u30af(\u6280\u8853)\u3084\u3001\u6b63\u898f\u7f72\u540d\u4ed8\u304d\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u52d5\u4f5c\u3092\u9038\u8131\u3055\u305b\u308b\u3088\u3046\u306a\u653b\u6483\u3092\u691c\u51fa\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\n<h3><a id=\"post-123338-_fsx1o1umfcit\"><\/a>\u5b9f\u88c5<\/h3>\n<p>\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306f\u305d\u308c\u305e\u308c\u306b\u5b9f\u884c\u53ef\u80fd\u306a\u30a2\u30af\u30b7\u30e7\u30f3\u304c\u7570\u306a\u308a\u307e\u3059\u304c\u3001\u8907\u6570\u306e\u74b0\u5883\u3067\u5171\u901a\u3057\u305f\u30a2\u30af\u30b7\u30e7\u30f3\u306f\u826f\u6027\u306e\u53ef\u80fd\u6027\u304c\u9ad8\u3044\u306e\u3067\u3001\u305d\u3046\u3057\u305f\u30a2\u30af\u30b7\u30e7\u30f3\u3092<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/security-operations\/how-cortex-xdr-global-analytics-protects-against-supply-chain-attacks\/\">\u3046\u307e\u304f\u3064\u304b\u3063\u3066\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3054\u3068\u306e\u30b0\u30ed\u30fc\u30d0\u30eb\u30d9\u30fc\u30b9\u30e9\u30a4\u30f3\u3092\u69cb\u7bc9<\/a>\u3057\u307e\u3059\u3002<\/p>\n<p>\u307e\u305f\u540c\u3058\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3067\u3082\u7d44\u7e54\u3054\u3068\u306b\u30a2\u30af\u30b7\u30e7\u30f3\u304c\u7570\u306a\u308b\u5834\u5408\u304c\u3042\u308a\u307e\u3059\u3002\u305f\u3068\u3048\u3070\u81ea\u7d44\u7e54\u306e\u30c9\u30e1\u30a4\u30f3\u3078\u306e\u63a5\u7d9a\u304c\u305d\u306e\u4f8b\u3067\u3059\u3002\u3053\u308c\u3092\u8e0f\u307e\u3048\u3001\u7d44\u7e54\u3054\u3068\u3084\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3054\u3068\u306e\u30ed\u30fc\u30ab\u30eb\u30d9\u30fc\u30b9\u30e9\u30a4\u30f3\u3082\u69cb\u7bc9\u3057\u307e\u3059\u3002<\/p>\n<p>\u3053\u308c\u3089\u306e\u30d9\u30fc\u30b9\u30e9\u30a4\u30f3\u3092\u3082\u3068\u306b\u3001\u5404\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u3092\u6bd4\u8f03\u3057\u3001\u7570\u5e38\u306a\u6d3b\u52d5\u304c\u3042\u308c\u3070\u30d5\u30e9\u30b0\u3092\u7acb\u3066\u307e\u3059\u3002<\/p>\n<p>\u7591\u308f\u3057\u3044\u30b1\u30fc\u30b9\u3092\u96c6\u3081\u305f\u3089\u3001\u305d\u308c\u3089\u3092\u3055\u3089\u306b\u5206\u6790\u3057\u3001\u305d\u308c\u3089\u304c\u5b9f\u969b\u306b\u653b\u6483\u306a\u306e\u304b\u3069\u3046\u304b\u3092\u691c\u8a3c\u3057\u307e\u3059\u3002<\/p>\n<h3><a id=\"post-123338-_tewllhseaca\"><\/a>Popping Eagle\u306e\u767a\u898b<\/h3>\n<p>\u65e2\u77e5\u306e\u60aa\u610f\u306e\u3042\u308bIoC(indicators of compromise)\u3092\u542b\u3080\u30b1\u30fc\u30b9\u3092\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u3057\u305f\u7d50\u679c\u3001\u6b21\u306e\u3088\u3046\u306a\u30b1\u30fc\u30b9\u306b\u884c\u304d\u5f53\u305f\u308a\u307e\u3057\u305f\u3002<\/p>\n<p><a href=\"https:\/\/www.barco.com\/en\/clickshare\/apps-accessories\/clickshare-extension-pack\">Barco N.V.\u306b\u3088\u308b\u7f72\u540d\u306e\u4ed8\u3044\u305f\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3<span style=\"font-family: 'courier new', courier, monospace;\">clicksharelauncher.exe<\/span><\/a>\u306f\u3001\u6570\u767e\u306e\u7570\u306a\u308b\u74b0\u5883\u3067\u78ba\u8a8d\u3055\u308c\u3066\u3044\u307e\u3057\u305f\u3002\u3053\u306e\u305f\u3081\u3001\u305d\u306e\u632f\u308b\u821e\u3044\u306b\u95a2\u3057\u3066\u5341\u5206\u306a\u30d9\u30fc\u30b9\u30e9\u30a4\u30f3\u304c\u3042\u308b\u3053\u3068\u304c\u793a\u5506\u3055\u308c\u308b\u3082\u306e\u3067\u3057\u305f\u304c\u3001\u3042\u308b1\u3064\u306e\u74b0\u5883\u3067\u3060\u3051\u3001\u7279\u7570\u306a\u30c9\u30e1\u30a4\u30f3\u306e\u89e3\u6c7a\u3092\u884c\u3063\u3066\u3044\u307e\u3057\u305f\u3002\u3055\u3089\u306b\u305d\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u304c\u63a5\u7d9a\u3057\u305f\u30c9\u30e1\u30a4\u30f3<span style=\"font-family: 'courier new', courier, monospace;\">dnszonetransfer[.]com<\/span>\u306f\u305d\u306e\u74b0\u5883\u3067\u3057\u304b\u78ba\u8a8d\u3055\u308c\u305a\u3001\u307b\u304b\u306b\u4f55\u5343\u53f0\u3082\u3042\u308b\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306e\u306a\u304b\u3067\u3001\u3042\u308b\u7279\u5b9a\u306e3\u53f0\u306e\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u3067\u3057\u304b\u78ba\u8a8d\u3055\u308c\u307e\u305b\u3093\u3067\u3057\u305f\u3002<\/p>\n<p>\u8abf\u67fb\u306e\u904e\u7a0b\u3067\u3001\u30db\u30b9\u30c8\u306b\u6b8b\u3055\u308c\u305f2\u7a2e\u985e\u306e\u30c4\u30fc\u30eb\u304c\u898b\u3064\u304b\u308a\u3001\u79c1\u305f\u3061\u306f\u3053\u308c\u306b\u8208\u5473\u3092\u305d\u305d\u3089\u308c\u307e\u3057\u305f\u3002\u305f\u3060\u30cf\u30c3\u30b7\u30e5\u304c\u672a\u77e5\u3067\u3042\u308b\u3068\u3044\u3046\u3060\u3051\u3067\u306a\u304f\u3001\u8abf\u67fb\u4e2d\u306b\u898b\u3064\u304b\u3063\u305f\u307b\u304b\u306e\u3059\u3079\u3066\u306eIoC(\u4fb5\u5bb3\u6307\u6a19)\u304b\u3089\u898b\u3066\u3082\u672a\u77e5\u306e\u3082\u306e\u3060\u3063\u305f\u304b\u3089\u3067\u3059(\u8a73\u3057\u304f\u306f\u300c<a href=\"#post-123338-_tfneqquju6td\">\u95a2\u9023IoC\u306e\u691c\u7d22<\/a>\u300d\u3092\u53c2\u7167)\u3002<\/p>\n<h2><a id=\"post-123338-_ii78ksvmacid\"><\/a>Popping Eagle\u306e\u7b2c1\u6bb5\u968e\u306e\u5206\u6790<\/h2>\n<h3><a id=\"post-123338-_k0mwfj24az75\"><\/a>\u30ed\u30fc\u30c9\u65b9\u6cd5: DLL\u30d7\u30ed\u30ad\u30b7<\/h3>\n<p><span style=\"font-family: 'courier new', courier, monospace;\">clicksharelauncher.exe<\/span>\u306e\u56e0\u679c\u30c1\u30a7\u30fc\u30f3(causality chain)\u3092\u8abf\u3079\u3066\u307f\u308b\u3068\u3001\u307e\u305a<span style=\"font-family: 'courier new', courier, monospace;\">uxtheme.dll<\/span>\u3068\u3044\u3046\u540d\u524d\u306e\u5b9f\u884c\u30d5\u30a1\u30a4\u30eb\u3068\u540c\u3058\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u304b\u3089\u672a\u7f72\u540dDLL\u3092\u8aad\u307f\u8fbc\u3093\u3067\u3001\u305d\u306e\u5f8c<span style=\"font-family: 'courier new', courier, monospace;\">dnszonetransfer[.]com<\/span>\u30c9\u30e1\u30a4\u30f3\u306b\u63a5\u7d9a\u3057\u3066\u3044\u308b\u3053\u3068\u304c\u308f\u304b\u308a\u307e\u3057\u305f\u3002<\/p>\n<p>\u3053\u306eDLL\u540d\u306f\u901a\u5e38<span style=\"font-family: 'courier new', courier, monospace;\">%windir%\\SysWOW64\\UxTheme.dll<\/span>\u306b\u5b58\u5728\u3059\u308b\u65e2\u77e5\u306eMicrosoft\u306e\u7f72\u540d\u4ed8\u304dDLL\u306b\u5c5e\u3059\u308b\u3082\u306e\u3067\u3001\u3053\u306eDLL\u540d\u306f<span style=\"font-family: 'courier new', courier, monospace;\">clicksharelauncher.exe<\/span>\u306e\u30a4\u30f3\u30dd\u30fc\u30c8\u30c6\u30fc\u30d6\u30eb\u306b\u3082\u542b\u307e\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_123251\" aria-describedby=\"caption-attachment-123251\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123252 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/word-image.png\" alt=\"Popping Eagle\u306e\u7b2c1\u6bb5\u968e\u306b\u306fDLL\u30d7\u30ed\u30ad\u30b7\u304c\u542b\u307e\u308c\u3066\u3044\u308b\u3002\u3053\u306e\u30b9\u30af\u30ea\u30fc\u30f3\u30b7\u30e7\u30c3\u30c8\u306fDLL Search Order Hijacking(DLL\u691c\u7d22\u9806\u5e8f\u306e\u30cf\u30a4\u30b8\u30e3\u30c3\u30af)\u306b\u4f7f\u7528\u3055\u308c\u3066\u3044\u308bclicksharelauncher.exe\u306e\u30a4\u30f3\u30dd\u30fc\u30c8\u30c6\u30fc\u30d6\u30eb\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002 \" width=\"900\" height=\"564\" \/><figcaption id=\"caption-attachment-123251\" class=\"wp-caption-text\">\u56f31. clicksharelauncher.exe\u306e\u30a4\u30f3\u30dd\u30fc\u30c8\u30c6\u30fc\u30d6\u30eb(\u90e8\u5206)<\/figcaption><\/figure>\n<p>\u3053\u308c\u306f<a href=\"https:\/\/attack.mitre.org\/techniques\/T1574\/001\/\">DLL Search Order Hijacking (DLL\u691c\u7d22\u9806\u5e8f\u306e\u30cf\u30a4\u30b8\u30e3\u30c3\u30af)<\/a>\u306e\u5178\u578b\u4f8b\u3067\u3059\u3002<span style=\"font-family: 'courier new', courier, monospace;\">clicksharelauncher.exe<\/span>\u306f\u3001<span style=\"font-family: 'courier new', courier, monospace;\">%windir%\\SysWOW64\\<\/span>\u306e\u691c\u7d22\u3088\u308a\u5148\u306b\u30ab\u30ec\u30f3\u30c8\u30c7\u30a3\u30ec\u30af\u30c8\u30ea\u304b\u3089<span style=\"font-family: 'courier new', courier, monospace;\">uxtheme.dll<\/span>\u3092\u30ed\u30fc\u30c9\u3057\u3088\u3046\u3068\u3057\u3001Microsoft\u306eDLL\u3067\u306f\u306a\u304f\u653b\u6483\u8005\u306eDLL\u3092\u30ed\u30fc\u30c9\u3057\u3066\u3057\u307e\u3046\u306e\u3067\u3059\u3002<\/p>\n<p>\u672a\u7f72\u540d<span style=\"font-family: 'courier new', courier, monospace;\">uxtheme.dll<\/span>\u306e\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u30c6\u30fc\u30d6\u30eb\u3092\u30aa\u30ea\u30b8\u30ca\u30eb\u306e\u3082\u306e\u3068\u6bd4\u8f03\u3059\u308b\u3068\u540c\u3058\u95a2\u6570\u304c\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u3055\u308c\u3066\u304a\u308a\u3001\u305d\u308c\u306b\u52a0\u3048\u3066<span style=\"font-family: 'courier new', courier, monospace;\">popo<\/span>\u3068\u3044\u3046\u95a2\u6570\u304c\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_123253\" aria-describedby=\"caption-attachment-123253\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123254 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/word-image-1.png\" alt=\"\u60aa\u610f\u306e\u3042\u308b\u30d7\u30ed\u30ad\u30b7DLL(\u5de6)\u3068\u30aa\u30ea\u30b8\u30ca\u30eb\u306eDLL(\u53f3)\u306e\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u30c6\u30fc\u30d6\u30eb\u3092\u6bd4\u8f03\u3059\u308b\u3068\u3001\u540c\u3058\u95a2\u6570\u304c\u3042\u308b\u3053\u3068\u304c\u308f\u304b\u308b\u3002\u305f\u3060\u3057\u60aa\u610f\u306e\u3042\u308b\u5074\u3067\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u3055\u308c\u308b\u95a2\u6570\u306f\u3001\u300cpopo(\u30b9\u30af\u30ea\u30fc\u30f3\u30b7\u30e7\u30c3\u30c8\u306e\u8d64\u67a0\u3067\u793a\u3057\u305f\u90e8\u5206)\u300d\u3068\u3044\u3046\u95a2\u65701\u3064\u5206\u591a\u3044\u3002 \" width=\"900\" height=\"366\" \/><figcaption id=\"caption-attachment-123253\" class=\"wp-caption-text\">\u56f32. \u60aa\u610f\u306e\u3042\u308b\u30d7\u30ed\u30ad\u30b7DLL(\u5de6)\u3068\u30aa\u30ea\u30b8\u30ca\u30eb\u306eDLL(\u53f3)\u306e\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u30c6\u30fc\u30d6\u30eb(\u90e8\u5206)<\/figcaption><\/figure>\n<h3><a id=\"post-123338-_u6oidu4qz6gl\"><\/a>uxtheme.dll\u30b5\u30f3\u30d7\u30eb\u306e\u5206\u6790<\/h3>\n<p>\u3053\u306e\u5b9f\u884c\u30d5\u30a1\u30a4\u30eb\u306f32\u30d3\u30c3\u30c8DLL\u3068\u3057\u3066C++\u3067\u4f5c\u6210\u3055\u308c\u3066\u3044\u307e\u3059\u3002DLL\u306e\u30e1\u30bf\u30c7\u30fc\u30bf\u306b\u3042\u308b\u30aa\u30ea\u30b8\u30ca\u30eb\u306e\u30b3\u30f3\u30d1\u30a4\u30eb\u540d\u306f<span style=\"font-family: 'courier new', courier, monospace;\">CoL_Final_Lib.dll<\/span>\u3067\u3001\u305d\u306e\u30b3\u30f3\u30d1\u30a4\u30eb\u30bf\u30a4\u30e0\u30b9\u30bf\u30f3\u30d7\u306b\u306f\u79c1\u305f\u3061\u306e\u521d\u8a8d\u65e5\u3068\u540c\u3058\u65e5\u304c\u8a18\u9332\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u79c1\u305f\u3061\u304c\u78ba\u8a8d\u3057\u305f3\u53f0\u306e\u30db\u30b9\u30c8\u306eSHA256\u30cf\u30c3\u30b7\u30e5\u304c\u305d\u308c\u305e\u308c\u7570\u306a\u3063\u3066\u3044\u305f\u3053\u3068\u3068\u5408\u308f\u305b\u308b\u3068\u3001\u3053\u308c\u306f\u300c\u305d\u306e\u5834\u3067\u300d\u30b3\u30f3\u30d1\u30a4\u30eb\u3055\u308c\u305f\u3053\u3068\u3092\u793a\u3057\u3066\u3044\u308b\u306e\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u3002<\/p>\n<p>\u30ed\u30fc\u30c0\u30fc\u3068\u3057\u3066Barco\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u304c\u4f7f\u308f\u308c\u3066\u3044\u308b\u3053\u3068\u3082\u3001\u3053\u308c\u304c\u3053\u306e\u88ab\u5bb3\u74b0\u5883\u306b\u5408\u308f\u305b\u3066\u4f5c\u3089\u308c\u305f\u30b5\u30f3\u30d7\u30eb\u3067\u3042\u308b\u3053\u3068\u3092\u793a\u5506\u3057\u3066\u3044\u307e\u3059\u3002Barco\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u3092\u30ed\u30fc\u30c0\u30fc\u3068\u3057\u3066\u4f7f\u3046\u306e\u306f\u304b\u306a\u308a\u30e6\u30cb\u30fc\u30af\u3060\u304b\u3089\u3067\u3059\u3002<\/p>\n<p>\u30a8\u30f3\u30c8\u30ea\u30dd\u30a4\u30f3\u30c8\u3084\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u5185\u5bb9\u306e\u30e1\u30e2\u30ea\u4f4d\u7f6e\u3092\u78ba\u8a8d\u3059\u308b\u3068\u307b\u3068\u3093\u3069\u304c\u6587\u5b57\u5217\u3067\u3001\u5b9f\u969b\u306e\u95a2\u6570\u306f1\u3064\u3060\u3051\u3067\u3059\u3002\u3053\u306e\u3053\u3068\u304b\u3089\u3001\u3053\u306eDLL\u304c\u3053\u308c\u3089\u95a2\u6570\u306e\u5b9f\u30ed\u30b8\u30c3\u30af\u306f\u5b9f\u88c5\u3057\u3066\u304a\u3089\u305a\u3001\u30d7\u30ed\u30ad\u30b7\u3055\u308c\u305fDLL\u3092\u5de7\u5999\u306b\u6a21\u5023\u3059\u308b\u305f\u3081\u3060\u3051\u306b\u5b58\u5728\u3057\u3066\u3044\u308b\u3053\u3068\u304c\u793a\u5506\u3055\u308c\u307e\u3059\u3002<\/p>\n<p>\u660e\u793a\u7684\u306b\u547c\u3073\u51fa\u3055\u308c\u308b\u307e\u3067\u5f85\u305f\u305a\u3068\u3082\u30ed\u30fc\u30c9\u6642\u3059\u3050\u306b\u95a2\u6570\u5185\u5bb9\u3092\u5b9f\u884c\u3067\u304d\u308b\u3088\u3046\u3001\u3053\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u306fmain\u306e\u30b3\u30fc\u30c9\u3092DllMain\u30a8\u30f3\u30c8\u30ea\u30dd\u30a4\u30f3\u30c8\u3067(DLL\u306e\u30ed\u30fc\u30c9\u30d5\u30ed\u30fc\u306e\u6b8b\u308a\u306e\u90e8\u5206\u3092\u30d6\u30ed\u30c3\u30af\u3057\u306a\u3044\u3088\u3046)\u65b0\u305f\u306a\u30b9\u30ec\u30c3\u30c9\u3092\u4f5c\u6210\u3057\u3066\u5b9f\u884c\u3057\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_123255\" aria-describedby=\"caption-attachment-123255\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123256 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/word-image-2.png\" alt=\"\u660e\u793a\u7684\u306b\u547c\u3073\u51fa\u3055\u308c\u308b\u307e\u3067\u5f85\u305f\u305a\u3068\u3082\u30ed\u30fc\u30c9\u6642\u3059\u3050\u306b\u95a2\u6570\u5185\u5bb9\u3092\u5b9f\u884c\u3067\u304d\u308b\u3088\u3046\u3001\u3053\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u306fmain\u306e\u30b3\u30fc\u30c9\u3092DllMain\u30a8\u30f3\u30c8\u30ea\u30dd\u30a4\u30f3\u30c8\u3067(DLL\u306e\u30ed\u30fc\u30c9\u30d5\u30ed\u30fc\u306e\u6b8b\u308a\u306e\u90e8\u5206\u3092\u30d6\u30ed\u30c3\u30af\u3057\u306a\u3044\u3088\u3046)\u65b0\u305f\u306a\u30b9\u30ec\u30c3\u30c9\u3092\u4f5c\u6210\u3057\u3066\u5b9f\u884c\u3057\u307e\u3059\u3002\u3053\u306emain\u95a2\u6570\u306f\u3001\u5358\u7d14\u306a1\u30d0\u30a4\u30c8XOR\u3067C2\u306eURL\u3092\u30c7\u30b3\u30fc\u30c9\u3057\u3066\u304b\u3089Win32API\u95a2\u6570\u3067\u30c7\u30b3\u30fc\u30c9\u3057\u305fURL\u306b\u63a5\u7d9a\u3057\u307e\u3059\u3002\u30b3\u30fc\u30c9\u4e2d\u306b\u898b\u3064\u304b\u3063\u305f\u6587\u5b57\u5217\u304b\u3089\u3059\u308b\u3068\u3001\u3053\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4f5c\u8005\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30ed\u30b8\u30c3\u30af\u306b\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9C++\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306eWinHttpClient\u3092\u4f7f\u3063\u305f\u3088\u3046\u3067\u3059\u3002\u3053\u306e\u753b\u50cf\u306f3\u3064\u306e\u30a6\u30a3\u30f3\u30c9\u30a6\u3092\u8868\u793a\u3057\u3066\u3044\u307e\u3059\u3002\u9752\u3044\u77e2\u5370\u304c\u30a6\u30a3\u30f3\u30c9\u30a6\u9593\u3092\u3064\u306a\u3044\u3067\u304a\u308a\u3001\u51e6\u7406\u306e\u6d41\u308c\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002\u91cd\u8981\u90e8\u5206\u306f\u3001\u9ec4\u8272\u3067\u30cf\u30a4\u30e9\u30a4\u30c8\u3057\u305f\u308a\u8d64\u3044\u77e9\u5f62\u3067\u56f2\u3063\u3066\u3042\u308a\u307e\u3059\u3002 \" width=\"900\" height=\"1039\" \/><figcaption id=\"caption-attachment-123255\" class=\"wp-caption-text\">\u56f33. \u3053\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u306eDLL\u5185\u306emain\u95a2\u6570\u3002\u3053\u306e\u95a2\u6570\u306fpopo\u306e\u30a8\u30f3\u30c8\u30ea\u30dd\u30a4\u30f3\u30c8\u304b\u3089\u3082\u547c\u3073\u51fa\u3055\u308c\u308b<\/figcaption><\/figure>\n<p>\u3053\u306emain\u95a2\u6570\u306f\u3001\u5358\u7d14\u306a1\u30d0\u30a4\u30c8XOR\u3067C2\u306eURL\u3092\u30c7\u30b3\u30fc\u30c9\u3057\u3066\u304b\u3089Win32API\u95a2\u6570\u3067\u30c7\u30b3\u30fc\u30c9\u3057\u305fURL\u306b\u63a5\u7d9a\u3057\u307e\u3059\u3002\u30b3\u30fc\u30c9\u4e2d\u306b\u898b\u3064\u304b\u3063\u305f\u6587\u5b57\u5217\u304b\u3089\u3059\u308b\u3068\u3001\u3053\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u4f5c\u8005\u306f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30ed\u30b8\u30c3\u30af\u306b\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9C++\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u306e<a href=\"https:\/\/github.com\/Goblenus\/WinHttpClient\/blob\/master\/WinHttpClient\/WinHttpClient.h\">WinHttpClient<\/a>\u3092\u4f7f\u3063\u305f\u3088\u3046\u3067\u3059\u3002\u305d\u306e\u5f8c\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u4e3b\u8981\u30a4\u30d9\u30f3\u30c8\u30eb\u30fc\u30d7\u306b\u5165\u3063\u3066\u4ee5\u4e0b\u306e\u30a2\u30af\u30b7\u30e7\u30f3\u3092\u5b9f\u884c\u3057\u307e\u3059\u3002<\/p>\n<ul>\n<li>\u30cf\u30fc\u30c9\u30b3\u30fc\u30c9\u3055\u308c\u305f\u53e4\u3044Linux\u306e\u30e6\u30fc\u30b6\u30fc\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u3068\u30e1\u30c3\u30bb\u30fc\u30b8\u3067\u3001\u30c7\u30b3\u30fc\u30c9\u3057\u305fURL\u306bPOST\u30ea\u30af\u30a8\u30b9\u30c8\u3092\u9001\u4fe1<\/li>\n<li>\u5fdc\u7b54\u304c Unicode 726563697074\u3001\u3064\u307e\u308a\u300crecipt\u300d(\u82f1\u8a9e\u3092\u6bcd\u8a9e\u3068\u3057\u306a\u3044\u4f5c\u8005\u304b?)\u3067\u59cb\u307e\u308b\u3053\u3068\u3092\u78ba\u8a8d<\/li>\n<li>\u3044\u304f\u3064\u304b\u306e\u7570\u306a\u308b\u30b3\u30de\u30f3\u30c9\u3067\u69cb\u9020\u4f53\u3092\u30d1\u30fc\u30b9\u3001\u3053\u308c\u306b\u306f\u4ee5\u4e0b\u3092\u542b\u3080:\n<ul>\n<li>\u30ea\u30e2\u30fc\u30c8\u30db\u30b9\u30c8\u3078\u306e\u30d5\u30a1\u30a4\u30eb\u4fdd\u5b58<\/li>\n<li>\u7279\u5b9a\u30d5\u30a9\u30eb\u30c0\u304b\u3089\u306eDLL\u30ed\u30fc\u30c9\u30fb\u5b9f\u884c<\/li>\n<\/ul>\n<\/li>\n<li>\u300c1\u6642\u9593 + \u30e9\u30f3\u30c0\u30e0\u306b\u751f\u6210\u3057\u305f\u6642\u9593\u300d\u306e\u30b9\u30ea\u30fc\u30d7<\/li>\n<\/ul>\n<figure id=\"attachment_123257\" aria-describedby=\"caption-attachment-123257\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123258 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/word-image-3.png\" alt=\"Popping Eagle\u30de\u30eb\u30a6\u30a7\u30a2\u304c\u30b5\u30fc\u30d0\u30fc\u306b\u9001\u4fe1\u3057\u305f\u6700\u521d\u306e\u30ea\u30af\u30a8\u30b9\u30c8\u3002\u30cf\u30fc\u30c9\u30b3\u30fc\u30c9\u3055\u308c\u305f\u53e4\u3044Linux\u306e\u30e6\u30fc\u30b6\u30fc\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u3068\u30e1\u30c3\u30bb\u30fc\u30b8\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u306b\u6ce8\u610f\u3002 \" width=\"900\" height=\"136\" \/><figcaption id=\"caption-attachment-123257\" class=\"wp-caption-text\">\u56f34. \u30de\u30eb\u30a6\u30a7\u30a2\u304c\u30b5\u30fc\u30d0\u30fc\u306b\u9001\u4fe1\u3057\u305f\u6700\u521d\u306e\u30ea\u30af\u30a8\u30b9\u30c8\u3002<\/figcaption><\/figure>\n<h2><a id=\"post-123338-_vmudhtfvw1al\"><\/a>Going Eagle\u306e\u7b2c2\u6bb5\u968e\u306e\u5206\u6790<\/h2>\n<p>\u3053\u306eDLL\u306f\u3001\u89b3\u6e2c\u4e2d\u306e\u5927\u534a\u306e\u671f\u9593\u3001\u30a2\u30af\u30bf\u30fc\u304b\u3089\u306e\u30b3\u30de\u30f3\u30c9\u3092\u53d7\u3051\u53d6\u3063\u3066\u3044\u308b\u69d8\u5b50\u304c\u3042\u308a\u307e\u305b\u3093\u3067\u3057\u305f\u3002\u305f\u3060\u3057\u3042\u308b\u3068\u304d\u3001\u653b\u6483\u8005\u306e\u6d3b\u52d5\u3057\u3066\u3044\u305f\u6570\u65e5\u9593\u3001<span style=\"font-family: 'courier new', courier, monospace;\">dnszonetransfer[.]com<\/span>\u306e\u89e3\u6c7a\u5148IP\u304c\u4e00\u6642\u7684\u306b<span style=\"font-family: 'courier new', courier, monospace;\">51.38.89[.]53<\/span>\u306b\u5411\u3051\u3089\u308c\u305f\u3053\u3068\u304c\u3042\u308a\u307e\u3057\u305f\u3002\u3053\u308c\u306f\u691c\u77e5\u3092\u56de\u907f\u3059\u308b\u4e00\u822c\u7684\u306a\u6226\u8853\u3067\u3001\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u304c\u5fc5\u8981\u306b\u306a\u3063\u305f\u3068\u304d\u3060\u3051C2\u30c9\u30e1\u30a4\u30f3\u304c\u653b\u6483\u8005\u306e\u30a4\u30f3\u30d5\u30e9\u3092\u5411\u304f\u3088\u3046\u306b\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u653b\u6483\u8005\u306e\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u3059\u308bIP\u306f\u3001\u7b2c1\u6bb5\u968e\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u3092\u4f7f\u3063\u3066\u7b2c2\u6bb5\u968e\u306eDLL(\u300cGoing Eagle\u300d\u3068\u547d\u540d)\u3092\u30ed\u30fc\u30c9\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<h3><a id=\"post-123338-_5aoapfyuwf95\"><\/a>ClickRuntime-amd86.dll\u306e\u5206\u6790<\/h3>\n<p>\u3053\u306e\u5b9f\u884c\u30d5\u30a1\u30a4\u30eb\u306f32\u30d3\u30c3\u30c8DLL\u3068\u3057\u3066<a href=\"https:\/\/go.dev\/\">Go<\/a>\u3067\u4f5c\u6210\u3055\u308c\u3066\u3044\u307e\u3059\u3002DLL\u306e\u30e1\u30bf\u30c7\u30fc\u30bf\u306b\u3042\u308b\u30aa\u30ea\u30b8\u30ca\u30eb\u306e\u30b3\u30f3\u30d1\u30a4\u30eb\u540d\u306f<span style=\"font-family: 'courier new', courier, monospace;\">iphlpapi.dll<\/span>\u3067\u3059\u3002\u3061\u3087\u3063\u3068\u8208\u5473\u6df1\u3044\u306e\u304c\u3053\u306eDLL\u306f\u540c\u540d\u306e\u5225Microsoft DLL\u306e\u30d7\u30ed\u30ad\u30b7\u306b\u306a\u3063\u3066\u3044\u308b(\u304b\u3064\u95a2\u9023\u3059\u308b\u540d\u306e\u3064\u3044\u305f\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u95a2\u6570\u3092\u3059\u3079\u3066\u6a21\u5023\u3057\u3066\u3044\u308b)\u70b9\u3067\u3059\u3002\u7b2c1\u6bb5\u968e\u306f<span style=\"font-family: 'courier new', courier, monospace;\">LoadLibrary<\/span>\u3067\u3053\u308c\u3092\u30ed\u30fc\u30c9\u3057\u3066\u3044\u3066DLL\u30cf\u30a4\u30b8\u30e3\u30c3\u30af\u6280\u8853\u3067\u30ed\u30fc\u30c9\u3057\u305f\u308f\u3051\u3067\u306f\u306a\u3044\u306e\u3067\u3001\u3053\u308c\u306f\u5fc5\u8981\u306e\u306a\u3044\u51e6\u7406\u3067\u3059\u3002<\/p>\n<figure id=\"attachment_123259\" aria-describedby=\"caption-attachment-123259\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123260 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/word-image-4.png\" alt=\"\u60aa\u610f\u306e\u3042\u308b\u30d7\u30ed\u30ad\u30b7DLL(\u5de6)\u3068\u30aa\u30ea\u30b8\u30ca\u30ebDLL(\u53f3)\u306e\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u30c6\u30fc\u30d6\u30eb\u306e\u6bd4\u8f03\u3002\u3053\u3053\u3067\u3082\u60aa\u610f\u306e\u3042\u308b\u30d7\u30ed\u30ad\u30b7DLL\u306bpopo\u304c\u542b\u307e\u308c\u3066\u3044\u308b\u3053\u3068\u304c\u308f\u304b\u308b(\u3053\u306e\u753b\u50cf\u306e\u8d64\u3067\u56f2\u3093\u3060\u90e8\u5206)\u3002 \" width=\"900\" height=\"365\" \/><figcaption id=\"caption-attachment-123259\" class=\"wp-caption-text\">\u56f35. \u60aa\u610f\u306e\u3042\u308b\u30d7\u30ed\u30ad\u30b7DLL(\u5de6)\u3068\u30aa\u30ea\u30b8\u30ca\u30eb\u306eDLL(\u53f3)\u306e\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u30c6\u30fc\u30d6\u30eb(\u90e8\u5206)<\/figcaption><\/figure>\n<p>\u3053\u308c\u3089\u306eDLL\u306fC++\u3068Go\u3068\u3044\u3046\u7570\u306a\u308b\u8a00\u8a9e\u3067\u66f8\u304b\u308c\u3066\u3044\u307e\u3059\u304c\u3001\u3088\u304f\u4f3c\u305f\u70b9\u304c\u305f\u304f\u3055\u3093\u3042\u308a\u307e\u3059\u3002<\/p>\n<ul>\n<li>\u30b3\u30f3\u30d1\u30a4\u30eb\u30bf\u30a4\u30e0\u30b9\u30bf\u30f3\u30d7: \u540c\u3058\u65e5\u306b\u4f5c\u6210\u30fb\u30c9\u30ed\u30c3\u30d7\u3055\u308c\u3066\u3044\u308b<\/li>\n<li>\u30d7\u30ed\u30ad\u30b7DLL\u3068\u3057\u3066\u4f5c\u6210\u3055\u308c\u3066\u3044\u308b<\/li>\n<li><span style=\"font-family: 'courier new', courier, monospace;\">popo<\/span>\u3068\u3044\u3046\u540d\u524d\u306e\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u95a2\u6570\u3092\u6301\u3064<\/li>\n<li>\u95a2\u6570<span style=\"font-family: 'courier new', courier, monospace;\">DllMain<\/span>\u3068<span style=\"font-family: 'courier new', courier, monospace;\">popo<\/span>\u304c\u3042\u308b\u95a2\u6570\u3092\u547c\u3073\u51fa\u3057\u3001\u305d\u306e\u95a2\u6570\u304c\u5225\u30b9\u30ec\u30c3\u30c9\u3067\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u5185\u90e8\u30ed\u30b8\u30c3\u30af\u3092\u547c\u3073\u51fa\u3059\u3002\u3053\u308c\u306b\u3088\u308a\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u5185\u90e8\u30ed\u30b8\u30c3\u30af\u306fDLL\u306e\u30ed\u30fc\u30c9\u6642\u3001\u307e\u305f\u306f\u5225\u306e<span style=\"font-family: 'courier new', courier, monospace;\">popo<\/span>\u306b\u3088\u308b\u547c\u3073\u51fa\u3057\u6642\u306b\u305f\u3060\u3061\u306b\u5b9f\u884c\u3055\u308c\u308b<\/li>\n<\/ul>\n<p>\u3053\u306e\u30c4\u30fc\u30eb\u306f\u305f\u3063\u305f1\u3064\u306e\u30bf\u30b9\u30af\u306e\u305f\u3081\u306b\u4f5c\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u3059\u306a\u308f\u3061\u3001\u30ea\u30d0\u30fc\u30b9SOCKS\u30d7\u30ed\u30ad\u30b7\u3092\u4f5c\u3063\u3066\u653b\u6483\u8005\u304c\u30de\u30b7\u30f3\u3092\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u3067\u304d\u308b\u3088\u3046\u306b\u3059\u308b\u3001\u3068\u3044\u3046\u3053\u3068\u3067\u3059\u3002\u3053\u308c\u306b\u3064\u3044\u3066\u306f<a href=\"#post-123338-_bnl0wiknyi4k\">\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6<\/a>\u306e\u30bb\u30af\u30b7\u30e7\u30f3\u3067\u5f8c\u8ff0\u3057\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u306fGo\u3067\u66f8\u304b\u308c\u3066\u3044\u308b\u306e\u3067\u5e73\u6587\u306e\u6587\u5b57\u5217\u304b\u3089\u3055\u3089\u306b\u30c7\u30fc\u30bf\u3092\u62bd\u51fa\u3067\u304d\u307e\u3059\u3002<\/p>\n<ul>\n<li>\u30aa\u30ea\u30b8\u30ca\u30eb\u306e\u30d1\u30c3\u30b1\u30fc\u30b8\u540d <span style=\"font-family: 'courier new', courier, monospace;\">Eagle2.5-Client-Dll<\/span>(\u56f36\u306e\u8d64\u67a0\u90e8\u5206)<\/li>\n<li>\u30aa\u30ea\u30b8\u30ca\u30eb\u306e\u95a2\u6570\u540d(<span style=\"font-family: 'courier new', courier, monospace;\">main.StartEagle\u306a\u3069<\/span>)<\/li>\n<li>Go\u6a19\u6e96\u30e9\u30a4\u30d6\u30e9\u30ea\u304a\u3088\u3073\u62e1\u5f35\u30e9\u30a4\u30d6\u30e9\u30ea\u304b\u3089\u306e\u30d1\u30c3\u30b1\u30fc\u30b8 (<span style=\"font-family: 'courier new', courier, monospace;\">bufio<\/span>\u3001<span style=\"font-family: 'courier new', courier, monospace;\">log<\/span>\u3001<span style=\"font-family: 'courier new', courier, monospace;\">x\/net<\/span>\u306a\u3069)<\/li>\n<li>GitHub\u30ea\u30dd\u30b8\u30c8\u30ea\u306a\u3069\u4ed6\u306e\u30ea\u30bd\u30fc\u30b9\u304b\u3089\u306e\u30d1\u30c3\u30b1\u30fc\u30b8(\u56f36\u306e\u9ec4\u8272\u3068\u7dd1\u3067\u56f2\u3063\u305f\u90e8\u5206)<\/li>\n<\/ul>\n<figure id=\"attachment_123261\" aria-describedby=\"caption-attachment-123261\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123262 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/word-image-5.png\" alt=\"\u56f3\u3067\u306f\u30aa\u30ea\u30b8\u30ca\u30eb\u306e\u30d1\u30c3\u30b1\u30fc\u30b8\u540d\u3092\u8d64\u3067\u56f2\u3093\u3067\u3044\u307e\u3059\u3002GitHub\u30ea\u30dd\u30b8\u30c8\u30ea\u306a\u3069\u4ed6\u306e\u30ea\u30bd\u30fc\u30b9\u304b\u3089\u306e\u30d1\u30c3\u30b1\u30fc\u30b8\u306f\u9ec4\u8272\u3068\u7dd1\u3067\u67a0\u3067\u56f2\u3063\u3066\u3044\u307e\u3059\u3002 \" width=\"900\" height=\"297\" \/><figcaption id=\"caption-attachment-123261\" class=\"wp-caption-text\">\u56f36. \u30de\u30eb\u30a6\u30a7\u30a2\u30b5\u30f3\u30d7\u30eb\u3067\u898b\u3064\u304b\u3063\u305f\u6587\u5b57\u5217<\/figcaption><\/figure>\n<figure id=\"attachment_123263\" aria-describedby=\"caption-attachment-123263\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123264 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/word-image-6.png\" alt=\"\u8d64\u67a0\u3067C2\u3092\u30d1\u30e9\u30e1\u30fc\u30bf\u3068\u3057\u3066StartEagle\u95a2\u6570\u3092\u547c\u3073\u51fa\u3059popo_inner\u306e\u547c\u3073\u51fa\u3057\u3092\u793a\u3057\u3066\u3044\u307e\u3059\u3002 \" width=\"900\" height=\"376\" \/><figcaption id=\"caption-attachment-123263\" class=\"wp-caption-text\">\u56f37 popo_inner\u306fC2\u3092\u30d1\u30e9\u30e1\u30fc\u30bf\u3068\u3057\u3066StartEagle\u95a2\u6570\u3092\u547c\u3073\u51fa\u3059<\/figcaption><\/figure>\n<figure id=\"attachment_123265\" aria-describedby=\"caption-attachment-123265\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123266 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/word-image-7.png\" alt=\"clicksharelauncher.exe\u304b\u3089DLL Search Order Hijacking (DLL\u691c\u7d22\u9806\u5e8f\u306e\u30cf\u30a4\u30b8\u30e3\u30c3\u30af)\u3001uxtheme.dll(\u30d7\u30ed\u30ad\u30b7DLL)\u3001DLL\u306e\u66f8\u304d\u8fbc\u307f\u3068\u30ed\u30fc\u30c9\u3001ClickRuntime-amd86.dll\u307e\u3067\u3002Uxtheme.dll\u306fdnszonetransfer[.]com\u3068\u901a\u4fe1\u3057\u3066\u3053\u308c\u304c\u6700\u521d\u306eC2\u3067\u3042\u308b51.38.89[.]53\u3078\u3068\u3064\u306a\u304c\u308b\u3002ClickRuntime\u306freporterror[.]net\u3068\u901a\u4fe1\u3057\u3066\u3053\u308c\u304c2\u756a\u76ee\u306eC2\u3067\u3042\u308b51.75.57[.]245\u3078\u3068\u3064\u306a\u304c\u308b\u3002\" width=\"900\" height=\"633\" \/><figcaption id=\"caption-attachment-123265\" class=\"wp-caption-text\">\u56f38. \u653b\u6483\u30d5\u30ed\u30fc\u3092\u8868\u3059\u56f3<\/figcaption><\/figure>\n<h3><a id=\"post-123338-_bnl0wiknyi4k\"><\/a>\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6<\/h3>\n<p>\u3053\u306e\u653b\u6483\u8005\u306f\u7b2c2\u6bb5\u968e\u306eSOCKS\u30d0\u30a4\u30ca\u30ea\u3067\u3042\u308bGoing Eagle\u3067\u30de\u30b7\u30f3\u3092\u30c8\u30f3\u30cd\u30ea\u30f3\u30b0\u3057\u3001\u3044\u304f\u3064\u304b\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30d9\u30fc\u30b9\u306e\u653b\u6483\u3092\u5b9f\u884c\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<p>\u307e\u305a\u8907\u6570\u306e\u30db\u30b9\u30c8\u3092\u30b9\u30ad\u30e3\u30f3\u3057\u3066\u30aa\u30fc\u30d7\u30f3\u306a<a href=\"https:\/\/ja.wikipedia.org\/wiki\/Remote_Desktop_Protocol\">RDP(Remote Desktop Protocol)<\/a>\u3084<a href=\"https:\/\/ja.wikipedia.org\/wiki\/Server_Message_Block\">SMB(Server Message Block)<\/a>\u306e\u30dd\u30fc\u30c8\u304c\u3042\u308b\u304b\u3092\u63a2\u3057\u3001\u305d\u3053\u304b\u3089\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6\u306e\u5bfe\u8c61\u3092\u898b\u3064\u3051\u3088\u3046\u3068\u3057\u307e\u3059\u3002\u3053\u306e\u653b\u6483\u8005\u306f\u3001\u30ed\u30fc\u30ab\u30eb\u306e\u7ba1\u7406\u8005\u304c\u8907\u6570\u306e\u7570\u306a\u308b\u30db\u30b9\u30c8\u3067\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u4f7f\u3044\u307e\u308f\u3057\u3066\u3044\u305f\u3053\u3068\u3092\u5229\u7528\u3057\u3001<a href=\"https:\/\/github.com\/SecureAuthCorp\/impacket\/blob\/master\/examples\/wmiexec.py\">Impacket\u306ewmiexec<\/a>\u3092\u4f7f\u3063\u3066\u8907\u6570\u306e\u30de\u30b7\u30f3\u306b\u5bfe\u3057\u691c\u51fa\u30b3\u30de\u30f3\u30c9\u3092\u767a\u884c\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<p>\u3053\u308c\u306b\u3088\u308a\u3001\u4ee5\u4e0b\u306e\u691c\u51fa\u5668\u304c\u30c8\u30ea\u30ac\u30fc\u3055\u308c\u307e\u3057\u305f\u3002<\/p>\n<figure id=\"attachment_123279\" aria-describedby=\"caption-attachment-123279\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123280 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/Table-1.png\" alt=\"Cortex XDR Analytics BIOC - \u30ea\u30e2\u30fc\u30c8 WMI \u30d7\u30ed\u30bb\u30b9\u306e\u5b9f\u884c;Cortex XDR Analytics BIOC - ipconfig.exe \u306b\u3088\u308b\u4e00\u822c\u7684\u3067\u306f\u306a\u3044 IP \u69cb\u6210\u306e\u30ea\u30b9\u30c8\u30a2\u30c3\u30d7; Cortex XDR Analytics BIOC - \u30e6\u30fc\u30b6\u30fc\u306b\u3088\u308b\u30db\u30b9\u30c8\u3078\u306e\u307e\u308c\u306a NTLM \u30a2\u30af\u30bb\u30b9; Cortex XDR Analytics - \u8907\u6570\u306e\u691c\u51fa\u30b3\u30de\u30f3\u30c9; Cortex XDR Analytics - \u63a5\u7d9a\u5931\u6557; Cortex XDR BIOC - wmiexec \u306b\u3088\u308b\u30b3\u30de\u30f3\u30c9\u5b9f\u884c; Cortex XDR Analytics BIOC - arp.exe \u306b\u3088\u308b\u4e00\u822c\u7684\u3067\u306f\u306a\u3044 ARP \u30ad\u30e3\u30c3\u30b7\u30e5 \u30ea\u30b9\u30c8\u30a2\u30c3\u30d7; Cortex XDR Analytics BIOC - net.exe \u306b\u3088\u308b\u4e00\u822c\u7684\u3067\u306a\u3044\u30e6\u30fc\u30b6\u30fc \u30de\u30cd\u30fc\u30b8\u30e1\u30f3\u30c8; Cortex XDR Agent - Behavioral Threat Protection(\u7591\u308f\u3057\u3044\u30ea\u30e2\u30fc\u30c8 \u30b5\u30fc\u30d3\u30b9); Cortex XDR Analytics - NTLM \u306b\u3088\u308b\u30db\u30b9\u30c8\u3078\u306e\u307e\u308c\u306a\u30e6\u30fc\u30b6\u30fc \u30a2\u30af\u30bb\u30b9; Cortex XDR Analytics \u306e BIOC \u306b\u3088\u308b\u4e00\u822c\u7684\u3067\u306a\u3044 IP \u69cb\u6210\u306e\u30ea\u30b9\u30c8\u30a2\u30c3\u30d7; Cortex XDR Analytics BIOC - net.exe\u7d4c\u7531\u306e\u4e00\u822c\u7684\u3067\u306a\u3044\u30e6\u30fc\u30b6\u30fc\u7ba1\u7406; Cortex XDR Agent - \u632f\u308b\u821e\u3044\u8105\u5a01\u9632\u5fa1(\u7591\u308f\u3057\u3044\u30ea\u30e2\u30fc\u30c8\u30b5\u30fc\u30d3\u30b9);Cortex XDR Agent - \u632f\u308b\u821e\u3044\u8105\u5a01\u9632\u5fa1(impacket_cmd)\" width=\"900\" height=\"725\" \/><figcaption id=\"caption-attachment-123279\" class=\"wp-caption-text\">\u88681. Going Eagle\u306e\u6d3b\u52d5\u304c\u30c8\u30ea\u30ac\u30fc\u3057\u305fCortex XDR\u306e\u691c\u51fa\u5668<\/figcaption><\/figure>\n<figure id=\"attachment_123269\" aria-describedby=\"caption-attachment-123269\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123270 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/word-image-9.png\" alt=\"Cortex XDR\u306f\u3001Popping Eagle\u306e\u6d3b\u52d5\u306b\u95a2\u9023\u3057\u3066\u89b3\u6e2c\u3055\u308c\u305f\u8907\u6570\u306e\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6\u95a2\u9023\u30a2\u30e9\u30fc\u30c8\u3092\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3068\u3057\u3066\u30b0\u30eb\u30fc\u30d7\u5316\u3057\u3066\u3044\u308b\" width=\"900\" height=\"220\" \/><figcaption id=\"caption-attachment-123269\" class=\"wp-caption-text\">\u56f39 Cortex XDR\u304c\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6\u95a2\u9023\u306e\u8907\u6570\u306e\u8b66\u544a\u30921\u3064\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3068\u3057\u3066\u30b0\u30eb\u30fc\u30d7\u5316<\/figcaption><\/figure>\n<p>wmiexec\u306e\u5229\u7528\u306b\u52a0\u3048\u3066RDP\u7d4c\u7531\u306e\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u5185\u306e\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6\u3082\u884c\u308f\u308c\u3066\u304a\u308a\u3001\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u3057\u305f<a href=\"https:\/\/attack.mitre.org\/software\/S0029\/\">PsExec<\/a>\u3067SYSTEM\u3068\u3057\u3066<span style=\"font-family: 'courier new', courier, monospace;\">taskmgr.exe<\/span>\u3092\u5b9f\u884c\u5f8c\u3001<a href=\"https:\/\/car.mitre.org\/analytics\/CAR-2019-08-001\/#:~:text=The%20Windows%20Task%20Manager%20may,clicking%20%E2%80%9CCreate%20dump%20file%E2%80%9D.\">lsass\u30e1\u30e2\u30ea\u306e\u30c0\u30f3\u30d7<\/a>\u306b\u3088\u308b\u8a8d\u8a3c\u60c5\u5831\u53ce\u96c6\u304c\u884c\u308f\u308c\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<p>Cortex XDR\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306f\u3053\u3061\u3089\u306e\u6d3b\u52d5\u3082\u30d6\u30ed\u30c3\u30af\u3057\u3066\u304a\u308a\u3001\u3053\u306e\u6d3b\u52d5\u306b\u8d77\u56e0\u3057\u3066Cortex XDR Analytics\u3001Cortex XDR BIOC\u304c\u3055\u3089\u306b\u8907\u6570\u306e\u30a2\u30e9\u30fc\u30c8\u3092\u767a\u5831\u3057\u3066\u3044\u307e\u3057\u305f\u3002<\/p>\n<figure id=\"attachment_123281\" aria-describedby=\"caption-attachment-123281\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123282 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/Table-2.png\" alt=\"Cortex XDR Agent - Behavioral Threat Protection, Cortex XDR Analytics BIOC - Suspicious process executed with a high integrity level, Cortex XDR BIOC - PsExec execution EulaAccepted flag added to the Registry; Cortex XDR BIOC - PsExec runs with System privileges\" width=\"900\" height=\"405\" \/><figcaption id=\"caption-attachment-123281\" class=\"wp-caption-text\">\u88682. Cortex XDR Analytics\u3068Cortex XDR BIOC\u304c\u767a\u5831\u3057\u305f\u30a2\u30e9\u30fc\u30c8<\/figcaption><\/figure>\n<p>\u3042\u308b\u6642\u70b9\u3067\u3053\u306e\u653b\u6483\u8005\u306f\u7279\u6a29\u30c9\u30e1\u30a4\u30f3\u30a2\u30ab\u30a6\u30f3\u30c8\u306e\u53d6\u5f97\u306b\u6210\u529f\u3057\u3001\u3053\u306e\u30a2\u30ab\u30a6\u30f3\u30c8\u3067<a href=\"https:\/\/github.com\/SecureAuthCorp\/impacket\/blob\/master\/examples\/secretsdump.py\">Impacket\u306esecretsdump<\/a>\u3092\u4f7f\u3063\u3066\u30c9\u30e1\u30a4\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9\u304b\u3089\u30b7\u30fc\u30af\u30ec\u30c3\u30c8\u3092\u76d7\u307f\u51fa\u305d\u3046\u3068\u3057\u307e\u3057\u305f\u304c\u3001\u3053\u306e\u8a66\u307f\u306fCortex XDR\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306b\u30d6\u30ed\u30c3\u30af\u3055\u308c\u3066\u3044\u307e\u3057\u305f\u3002<img  class=\"wp-image-123274 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/word-image-11.png\" width=\"1\" height=\"1\" \/><\/p>\n<figure id=\"attachment_123283\" aria-describedby=\"caption-attachment-123283\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123284 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/Table-3.png\" alt=\"Cortex XDR Agent - heuristic.b.save_sam_or_security_remote (SYNC - Credential Gathering - 3406296443)\" width=\"900\" height=\"174\" \/><figcaption id=\"caption-attachment-123283\" class=\"wp-caption-text\">\u88683. Cortex XDR\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u304c\u30c9\u30e1\u30a4\u30f3\u30b3\u30f3\u30c8\u30ed\u30fc\u30e9\u304b\u3089\u306e\u30b7\u30fc\u30af\u30ec\u30c3\u30c8\u7a83\u53d6\u3092\u30d6\u30ed\u30c3\u30af<\/figcaption><\/figure>\n<p>\u591a\u5c64\u306b\u308f\u305f\u308b\u4fdd\u8b77\u5bfe\u7b56\u306e\u5c0e\u5165\u3067\u76ee\u7684\u3092\u9054\u6210\u3067\u304d\u306a\u304b\u3063\u305f\u3053\u3068\u304b\u3089\u3001\u3053\u306e\u653b\u6483\u8005\u306f\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6\u306e\u8a66\u307f\u3092\u3084\u3081\u305f\u3088\u3046\u3067\u3059\u3002<\/p>\n<h3><a id=\"post-123338-_am2tfi49hyjh\"><\/a>\u7b2c2\u6bb5\u968e\u306e\u30bf\u30a4\u30e0\u30e9\u30a4\u30f3<\/h3>\n<table style=\"width: 100%; height: 2784px;\">\n<thead>\n<tr style=\"height: 80px;\">\n<th style=\"width: 7.38937%; height: 80px;\"><b>\u6642\u523b(UTC)<\/b><\/th>\n<th style=\"width: 16.4644%; height: 80px;\"><b>MITRE\u30c6\u30af\u30cb\u30c3\u30af<\/b><\/th>\n<th style=\"width: 34.5272%; height: 80px;\"><b>\u30a2\u30af\u30b7\u30e7\u30f3<\/b><\/th>\n<th style=\"width: 39.0401%; height: 80px;\"><b>\u691c\u51fa<\/b><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 80px;\">\n<td style=\"width: 7.38937%; height: 80px;\"><span style=\"font-weight: 400;\">1\u65e5\u76ee 17:28<\/span><\/td>\n<td style=\"width: 16.4644%; height: 80px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1568\/\"><span style=\"font-weight: 400;\">Dynamic Resolution<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 80px;\"><span style=\"font-weight: 400;\">\u653b\u6483\u8005\u304c<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">dnszonetransfer[.]com<\/span><span style=\"font-weight: 400;\">\u306eIP\u30a2\u30c9\u30ec\u30b9\u306e\u89e3\u6c7a\u5148\u3092<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">51.38.89[.]53<\/span>\u306b\u5909\u66f4<\/td>\n<td style=\"width: 39.0401%; height: 80px;\"><\/td>\n<\/tr>\n<tr style=\"height: 72px;\">\n<td style=\"width: 7.38937%; height: 304px;\" rowspan=\"4\"><span style=\"font-weight: 400;\">2\u65e5\u76ee 20:19<\/span><\/td>\n<td style=\"width: 16.4644%; height: 72px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1071\/\"><span style=\"font-weight: 400;\">Application Layer Protocol<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 72px;\"><span style=\"font-weight: 400;\">\u611f\u67d3\u30db\u30b9\u30c8\u304c\u6700\u521d\u306e\u30b3\u30de\u30f3\u30c9\u3092<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">51.38.89[.]53<\/span>\u304b\u3089\u53d7\u4fe1<\/td>\n<td style=\"width: 39.0401%; height: 72px;\"><\/td>\n<\/tr>\n<tr style=\"height: 80px;\">\n<td style=\"width: 16.4644%; height: 80px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1218\/\"><span style=\"font-weight: 400;\">Signed Binary Proxy Execution<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 80px;\"><span style=\"font-weight: 400;\">\u7b2c2\u6bb5\u968e\u306eDLL\u3067\u3042\u308bGoing Eagle(<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">ClickRuntime-amd86.dll<\/span><span style=\"font-weight: 400;\">)\u3092\u30ed\u30fc\u30c9<\/span><\/td>\n<td style=\"width: 39.0401%; height: 80px;\"><span style=\"font-weight: 400;\">Globally uncommon image load from a signed process (Added after the fact)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 96px;\">\n<td style=\"width: 16.4644%; height: 96px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1071\/\"><span style=\"font-weight: 400;\">Application Layer Protocol<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 96px;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">reporterror[.]net<\/span>\u3078\u306e\u521d\u3081\u3066\u306e\u9001\u4fe1<\/td>\n<td style=\"width: 39.0401%; height: 96px;\"><span style=\"font-weight: 400;\">Globally uncommon root domain from a signed process<\/span><br \/>\n<span style=\"font-weight: 400;\">(Added after the fact)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 16.4644%; height: 56px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1090\/\"><span style=\"font-weight: 400;\">Proxy<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 56px;\"><span style=\"font-weight: 400;\">\u653b\u6483\u8005\u306e\u30de\u30b7\u30f3\u304cSOCKS\u30d7\u30ed\u30ad\u30b7\u3067\u30c8\u30f3\u30cd\u30ea\u30f3\u30b0<\/span><\/td>\n<td style=\"width: 39.0401%; height: 56px;\"><\/td>\n<\/tr>\n<tr style=\"height: 80px;\">\n<td style=\"width: 7.38937%; height: 80px;\"><span style=\"font-weight: 400;\">2\u65e5\u76ee 20:29<\/span><\/td>\n<td style=\"width: 16.4644%; height: 80px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1046\/\"><span style=\"font-weight: 400;\">Network Service Scanning<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 80px;\"><span style=\"font-weight: 400;\">\u8907\u6570\u306e\u30db\u30b9\u30c8\u3092\u30b9\u30ad\u30e3\u30f3\u3057\u3066\u30aa\u30fc\u30d7\u30f3\u306b\u306a\u3063\u3066\u3044\u308bRDP\u3001SMB\u3001<\/span><a href=\"https:\/\/ja.wikipedia.org\/wiki\/Remote_Desktop_Protocol\"><span style=\"font-weight: 400;\">\u30ea\u30e2\u30fc\u30c8\u30d7\u30ed\u30b7\u30fc\u30b8\u30e3\u30b3\u30fc\u30eb <\/span><\/a><span style=\"font-weight: 400;\">(RPC)\u7528\u306e\u30dd\u30fc\u30c8<\/span>\u3092\u691c\u51fa<\/td>\n<td style=\"width: 39.0401%; height: 80px;\"><span style=\"font-weight: 400;\">Failed Connections<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 7.38937%; height: 528px;\" rowspan=\"9\"><span style=\"font-weight: 400;\">Day 2 20:35<\/span><\/td>\n<td style=\"width: 16.4644%; height: 280px;\" rowspan=\"5\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1021\/\"><span style=\"font-weight: 400;\">Remote Services<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 280px;\" rowspan=\"5\"><span style=\"font-weight: 400;\">wmiexec\u30671\u53f0\u76ee\u306e\u30db\u30b9\u30c8\u306b\u63a5\u7d9a<\/span><\/td>\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Remote WMI process execution<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Rare NTLM Access By User To Host<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Command execution via wmiexec<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Behavioral Threat Protection (<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">suspicious_remote_service<\/span><span style=\"font-weight: 400;\">)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Behavioral Threat Protection (<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">impacket_cmd<\/span><span style=\"font-weight: 400;\">)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 80px;\">\n<td style=\"width: 16.4644%; height: 80px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1016\/\"><span style=\"font-weight: 400;\">System Network Configuration Discovery<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 248px;\" rowspan=\"4\"><span style=\"font-weight: 400;\">\u30c7\u30a3\u30b9\u30ab\u30d0\u30ea(\u691c\u51fa)\u30b3\u30de\u30f3\u30c9\u306e\u5b9f\u884c<\/span><\/td>\n<td style=\"width: 39.0401%; height: 80px;\"><span style=\"font-weight: 400;\">Uncommon IP Configuration Listing via <\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">ipconfig.exe<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 16.4644%; height: 168px;\" rowspan=\"3\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1087\/\"><span style=\"font-weight: 400;\">Account Discovery<\/span><\/a><\/td>\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Uncommon user management via <\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">net.exe<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Uncommon ARP cache listing via <\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">arp.exe<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Multiple Discovery Commands<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 7.38937%; height: 528px;\" rowspan=\"9\"><span style=\"font-weight: 400;\">2\u65e5\u76ee 20:50<\/span><\/td>\n<td style=\"width: 16.4644%; height: 280px;\" rowspan=\"5\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1021\/\"><span style=\"font-weight: 400;\">Remote Services<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 280px;\" rowspan=\"5\"><span style=\"font-weight: 400;\">wmiexec\u30672\u53f0\u76ee\u306e\u30db\u30b9\u30c8\u306b\u63a5\u7d9a<\/span><\/td>\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Remote WMI process execution<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Rare NTLM Access By User To Host<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Command execution via wmiexec<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Behavioral Threat Protection (<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">suspicious_remote_service<\/span><span style=\"font-weight: 400;\">)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Behavioral Threat Protection (<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">impacket_cmd<\/span><span style=\"font-weight: 400;\">)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 80px;\">\n<td style=\"width: 16.4644%; height: 80px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1016\/\"><span style=\"font-weight: 400;\">System Network Configuration Discovery<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 248px;\" rowspan=\"4\"><span style=\"font-weight: 400;\">\u30c7\u30a3\u30b9\u30ab\u30d0\u30ea(\u691c\u51fa)\u30b3\u30de\u30f3\u30c9\u306e\u5b9f\u884c<\/span><\/td>\n<td style=\"width: 39.0401%; height: 80px;\"><span style=\"font-weight: 400;\">Uncommon IP Configuration Listing via <\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">ipconfig.exe<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 16.4644%; height: 168px;\" rowspan=\"3\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1087\/\"><span style=\"font-weight: 400;\">Account Discovery<\/span><\/a><\/td>\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Uncommon user management via <\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">net.exe<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Uncommon ARP cache listing via <\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">arp.exe<\/span><\/td>\n<\/tr>\n<tr style=\"height: 2px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Multiple Discovery Commands<\/span><\/td>\n<\/tr>\n<tr style=\"height: 24px;\">\n<td style=\"width: 7.38937%; height: 24px;\"><span style=\"font-weight: 400;\">2\u65e5\u76ee <\/span><span style=\"font-weight: 400;\">20:53<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/td>\n<td style=\"width: 16.4644%; height: 24px;\"><span style=\"font-weight: 400;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1046\/\">Network Service Scanning<\/a><\/span><\/td>\n<td style=\"width: 34.5272%; height: 24px;\"><span style=\"font-weight: 400;\">\u8907\u6570\u306e\u30db\u30b9\u30c8\u3067RDP\u3001SMB\u3001RPC\u306e\u30aa\u30fc\u30d7\u30f3\u30dd\u30fc\u30c8\u3092\u30b9\u30ad\u30e3\u30f3<\/span><\/td>\n<td style=\"width: 39.0401%; height: 24px;\"><span style=\"font-weight: 400;\">Failed Connections<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 7.38937%; height: 504px;\" rowspan=\"9\"><span style=\"font-weight: 400;\">2\u65e5\u76ee 20:54<\/span><\/td>\n<td style=\"width: 16.4644%; height: 280px;\" rowspan=\"5\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1021\/\"><span style=\"font-weight: 400;\">Remote Services<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 280px;\" rowspan=\"5\"><span style=\"font-weight: 400;\">wmiexec\u30673\u53f0\u76ee\u306e\u30db\u30b9\u30c8\u306b\u63a5\u7d9a<\/span><\/td>\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Remote WMI process execution<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Rare NTLM Access By User To Host<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Command execution via wmiexec<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Behavioral Threat Protection (<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">suspicious_remote_service<\/span><span style=\"font-weight: 400;\">)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Behavioral Threat Protection (<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">impacket_cmd<\/span><span style=\"font-weight: 400;\">)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 16.4644%; height: 112px;\" rowspan=\"2\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1016\/\"><span style=\"font-weight: 400;\">System Network Configuration Discovery<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 224px;\" rowspan=\"4\"><span style=\"font-weight: 400;\">\u30c7\u30a3\u30b9\u30ab\u30d0\u30ea(\u691c\u51fa)\u30b3\u30de\u30f3\u30c9\u306e\u5b9f\u884c<\/span><\/td>\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Uncommon IP Configuration Listing via <\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">ipconfig.exe<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Uncommon user management via <\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">net.exe<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 16.4644%; height: 112px;\" rowspan=\"2\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1087\/\"><span style=\"font-weight: 400;\">Account Discovery<\/span><\/a><\/td>\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Uncommon ARP cache listing via <\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">arp.exe<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Multiple Discovery Commands<\/span><\/td>\n<\/tr>\n<tr style=\"height: 80px;\">\n<td style=\"width: 7.38937%; height: 80px;\"><span style=\"font-weight: 400;\">2\u65e5\u76ee 21:40<\/span><\/td>\n<td style=\"width: 16.4644%; height: 80px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1046\/\"><span style=\"font-weight: 400;\">Network Service Scanning<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 80px;\"><span style=\"font-weight: 400;\">\u8907\u6570\u306e\u30db\u30b9\u30c8\u3067RDP\u3001SMB\u3001RPC\u306e\u30aa\u30fc\u30d7\u30f3\u30dd\u30fc\u30c8\u3092\u30b9\u30ad\u30e3\u30f3<\/span><\/td>\n<td style=\"width: 39.0401%; height: 80px;\"><span style=\"font-weight: 400;\">Failed Connections<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 7.38937%; height: 56px;\"><span style=\"font-weight: 400;\">2\u65e5\u76ee 21:54<\/span><\/td>\n<td style=\"width: 16.4644%; height: 56px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1021\/001\/\"><span style=\"font-weight: 400;\">Remote Desktop Protocol<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 56px;\"><span style=\"font-weight: 400;\">RDP\u30674\u53f0\u76ee\u306e\u30db\u30b9\u30c8\u306b\u30e9\u30c6\u30e9\u30eb\u30e0\u30fc\u30d6<\/span><\/td>\n<td style=\"width: 39.0401%; height: 56px;\"><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 7.38937%; height: 56px;\"><span style=\"font-weight: 400;\">2\u65e5\u76ee 21:56<\/span><\/td>\n<td style=\"width: 16.4644%; height: 56px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1003\/001\/\"><span style=\"font-weight: 400;\">LSASS Memory<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 56px;\"><span style=\"font-weight: 400;\">taskmgr\u306b\u3088\u308blsass\u306e\u30c0\u30f3\u30d7\u8a66\u884c<\/span><\/td>\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Behavioral Threat Protection (<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">minidumpwritedump_handle_terminate<\/span><span style=\"font-weight: 400;\">)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 7.38937%; height: 224px;\" rowspan=\"4\"><span style=\"font-weight: 400;\">2\u65e5\u76ee 22:01<\/span><\/td>\n<td style=\"width: 16.4644%; height: 224px;\" rowspan=\"4\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1003\/001\/\"><span style=\"font-weight: 400;\">LSASS Memory<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 224px;\" rowspan=\"4\"><span style=\"font-weight: 400;\">SYSTEM\u3068\u3057\u3066taskmgr\u3092\u5b9f\u884c\u3057\u3066lsass\u306e\u30c0\u30f3\u30d7\u3092\u8a66\u884c<\/span><\/td>\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Behavioral Threat Protection (<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">minidumpwritedump_handle_terminate<\/span><span style=\"font-weight: 400;\">)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">Suspicious process executed with a high integrity level<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">PsExec execution EulaAccepted flag added to the Registry<\/span><\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td style=\"width: 39.0401%; height: 56px;\"><span style=\"font-weight: 400;\">PsExec runs with System privileges<\/span><\/td>\n<\/tr>\n<tr style=\"height: 80px;\">\n<td style=\"width: 7.38937%; height: 80px;\"><span style=\"font-weight: 400;\">3\u65e5\u76ee 01:10<\/span><\/td>\n<td style=\"width: 16.4644%; height: 80px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1003\/003\/\"><span style=\"font-weight: 400;\">NTDS<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 80px;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">secretsdump<\/span><span style=\"font-weight: 400;\">\u30921\u53f0\u76ee\u306eDC\u3067\u5b9f\u884c\u3057\u3066\u30d6\u30ed\u30c3\u30af\u3055\u308c\u308b<\/span><\/td>\n<td style=\"width: 39.0401%; height: 80px;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">heuristic.b.save_sam_or_security_remote<\/span><span style=\"font-weight: 400;\"> (SYNC - Credential Gathering - 3406296443)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 80px;\">\n<td style=\"width: 7.38937%; height: 80px;\"><span style=\"font-weight: 400;\">3\u65e5\u76ee 01:36<\/span><\/td>\n<td style=\"width: 16.4644%; height: 80px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1003\/003\/\"><span style=\"font-weight: 400;\">NTDS<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 80px;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">secretsdump<\/span><span style=\"font-weight: 400;\">\u30922\u53f0\u76ee\u306eDC\u3067\u5b9f\u884c\u3057\u3066\u30d6\u30ed\u30c3\u30af\u3055\u308c\u308b<\/span><\/td>\n<td style=\"width: 39.0401%; height: 80px;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">heuristic.b.save_sam_or_security_remote<\/span><span style=\"font-weight: 400;\"> (SYNC - Credential Gathering - 3406296443)<\/span><\/td>\n<\/tr>\n<tr style=\"height: 80px;\">\n<td style=\"width: 7.38937%; height: 80px;\"><span style=\"font-weight: 400;\">8\u65e5\u76ee 11:16<\/span><\/td>\n<td style=\"width: 16.4644%; height: 80px;\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1568\/\"><span style=\"font-weight: 400;\">Dynamic Resolution<\/span><\/a><\/td>\n<td style=\"width: 34.5272%; height: 80px;\"><span style=\"font-weight: 400;\">\u653b\u6483\u8005\u304c<\/span><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">dnszonetransfer[.]com<\/span><span style=\"font-weight: 400;\">\u306eIP\u89e3\u6c7a\u5148\u3092\u826f\u6027IP\u306b\u5909\u66f4<\/span><\/td>\n<td style=\"width: 39.0401%; height: 80px;\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><span style=\"font-size: 10pt; color: #999999;\"><em>\u88684 Popping Eagle\u306e\u653b\u6483\u306b\u95a2\u9023\u3059\u308b\u6d3b\u52d5\u3001\u653b\u6483\u624b\u6cd5\u3001\u691c\u51fa\u306e\u30bf\u30a4\u30e0\u30e9\u30a4\u30f3<\/em><\/span><\/p>\n<h2><a id=\"post-123338-_tfneqquju6td\"><\/a>\u95a2\u9023IoC\u306e\u691c\u7d22<\/h2>\n<p>\u30de\u30eb\u30a6\u30a7\u30a2\u306e\u632f\u308b\u821e\u3044\u5206\u6790\u3092\u7d42\u3048\u305f\u5f8c\u3001\u540c\u4e00\u30a2\u30af\u30bf\u30fc\u306b\u3088\u308b\u95a2\u9023\u30b5\u30f3\u30d7\u30eb\u3092\u63a2\u3057\u3066\u307f\u308b\u3053\u3068\u306b\u3057\u307e\u3057\u305f\u3002<\/p>\n<h3><a id=\"post-123338-_10cwv3n7t2da\"><\/a>\u4eee\u8aac<\/h3>\n<p>\u4e8b\u5b9f\u306e\u89b3\u6e2c:<\/p>\n<ul>\n<li>\u7b2c1\u6bb5\u968e\u306eDLL\u304c\u7b2c2\u6bb5\u968e\u306eDLL\u3092\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u30ed\u30fc\u30c9\u3057\u3001\u305d\u3053\u304b\u3089\u95a2\u6570<span style=\"font-family: 'courier new', courier, monospace;\">popo\u3092<\/span>\u547c\u3073\u51fa\u3059\u3002\u3069\u3061\u3089\u306eDLL\u3082\u95a2\u6570<span style=\"font-family: 'courier new', courier, monospace;\">popo<\/span>\u3092\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u3059\u308b\u3002<\/li>\n<li>\u7b2c2\u6bb5\u968e\u306f\u4e0d\u8981\u306aDLL\u30d7\u30ed\u30ad\u30b7\u304c\u884c\u308f\u308c\u3066\u3044\u308b\u3002<\/li>\n<\/ul>\n<p>\u307e\u305f\u3069\u3061\u3089\u306eDLL\u3082\u30d0\u30fc\u30b8\u30e7\u30f3\u3084\u958b\u767a\u6e96\u5099\u72b6\u6cc1\u3092\u793a\u3059\u30a4\u30f3\u30b8\u30b1\u30fc\u30bf\u306e\u6587\u5b57\u5217\u3092\u542b\u3080\u53ef\u80fd\u6027\u304c\u3042\u308b\u3002<\/p>\n<ul>\n<li><span style=\"font-family: 'courier new', courier, monospace;\">CoL_<strong>Final_Lib<\/strong>.dll<\/span><\/li>\n<li><span style=\"font-family: 'courier new', courier, monospace;\">Eagle<strong>2.5-Client-Dll<\/strong><\/span><\/li>\n<\/ul>\n<p>\u3053\u306e\u30c7\u30fc\u30bf\u304b\u3089\u985e\u63a8\u3067\u304d\u308b\u653b\u6483\u8005\u306e\u624b\u53e3:<\/p>\n<ul>\n<li>\u65e2\u77e5\u306e\u516c\u958b\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u3084\u30e9\u30a4\u30d6\u30e9\u30ea\u3092\u4f7f\u3044\u3001\u3042\u307e\u308a\u52b4\u529b\u3092\u304b\u3051\u305a\u306b\u30c4\u30fc\u30eb\u3092\u8907\u6570\u4f5c\u6210\u30fb\u4f7f\u7528\u3067\u304d\u308b\u3002<\/li>\n<li>\u5358\u4e00\u306e\u30a8\u30af\u30b9\u30dd\u30fc\u30c8\u95a2\u6570(\u3053\u306e\u30b1\u30fc\u30b9\u3067\u306f<span style=\"font-family: 'courier new', courier, monospace;\">popo<\/span>)\u3092\u6301\u3064\u30d7\u30ed\u30ad\u30b7DLL\u3092\u5bb9\u6613\u306b\u4f5c\u6210\u3067\u304d\u308b\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3092\u6301\u3063\u3066\u3044\u308b\u3068\u8003\u3048\u3089\u308c\u308b\u3002<\/li>\n<li>\u958b\u767a\u8005\u306f\u8907\u6570\u306e\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u8a00\u8a9e(C++\u3001Go\u3001Python)\u306e\u77e5\u8b58\u304c\u3042\u308b\u3002<\/li>\n<\/ul>\n<h3><a id=\"post-123338-_14ivncq4mxm\"><\/a>\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u3068\u691c\u7d22\u306e\u65b9\u6cd5\u8ad6<\/h3>\n<p>\u5f53\u521d\u3001AutoFocus\u3084\u4e00\u822c\u7684\u306a\u516c\u958b\u8105\u5a01\u60c5\u5831\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3067\u521d\u671f\u306e\u30a4\u30f3\u30b8\u30b1\u30fc\u30bf(\u30cf\u30c3\u30b7\u30e5\u3001\u30c9\u30e1\u30a4\u30f3\u3001IP\u3001URL)\u3092\u691c\u7d22\u3057\u307e\u3057\u305f\u304c\u3001\u65b0\u305f\u306a\u3082\u306e\u306f\u898b\u3064\u304b\u308a\u307e\u305b\u3093\u3067\u3057\u305f\u3002<\/p>\n<p>\u3055\u3089\u306b\u30de\u30eb\u30a6\u30a7\u30a2\u5206\u6790\u4e2d\u306b\u6c4e\u7528\u300chunting\u300dYara\u30eb\u30fc\u30eb\u3068\u7279\u5b9a\u7528\u9014\u306e\u300cadversary\u300d\u306eYara\u30eb\u30fc\u30eb\u3092\u4f5c\u6210\u3057\u3001\u95a2\u9023\u30b5\u30f3\u30d7\u30eb\u3092\u691c\u7d22\u3057\u307e\u3057\u305f\u3002\u3053\u306e\u6c4e\u7528\u30eb\u30fc\u30eb\u306f\u3001\u3053\u306e\u30a2\u30af\u30bf\u30fc\u3068\u306f\u7121\u95a2\u4fc2\u306e\u300cGo socks\u300d\u30b5\u30f3\u30d7\u30eb\u3092\u8ffd\u52a0\u3067\u691c\u51fa\u3057\u3001\u305d\u306e\u307b\u3068\u3093\u3069\u304c\u30de\u30eb\u30a6\u30a7\u30a2\u3067\u3042\u308b\u3068\u3044\u3046\u9a5a\u304f\u3079\u304d\u7d50\u679c\u3092\u5f97\u307e\u3057\u305f\u3002<\/p>\n<p>\u3053\u306e\u7279\u5b9a\u7528\u9014\u306e\u300cadversary\u300d\u30eb\u30fc\u30eb\u3067\u306f\u8ffd\u52a0\u30b5\u30f3\u30d7\u30eb\u304c\u898b\u3064\u304b\u308a\u307e\u305b\u3093\u3067\u3057\u305f\u3002<\/p>\n<h2><a id=\"post-123338-_y2vks12rn6r1\"><\/a>\u7d50\u8ad6<\/h2>\n<p>\u4e0a\u8a18\u306e\u4e8b\u4f8b\u3067\u898b\u3066\u304d\u305f\u3088\u3046\u306b\u3001\u653b\u6483\u8005\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u88fd\u54c1\u306e\u691c\u51fa\u56de\u907f\u3092\u72d9\u3063\u3066\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u3092\u4f7f\u3063\u305f\u30ab\u30b9\u30bf\u30e0\u30de\u30eb\u30a6\u30a7\u30a2\u3092\u958b\u767a\u3057\u3066\u3044\u307e\u3059\u3002\u9ad8\u5ea6\u306a\u653b\u6483\u8005\u3078\u306e\u5bfe\u6297\u306b\u306f\u9ad8\u5ea6\u306a\u691c\u77e5\u6280\u8853\u306e\u99c6\u4f7f\u304c\u6c42\u3081\u3089\u308c\u307e\u3059\u3002\u7f72\u540d\u4ed8\u304d\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u898b\u305b\u308b\u7570\u5e38\u306a\u632f\u308b\u821e\u3044\u3092\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u3059\u308b\u3053\u3068\u3067\u3001\u305d\u308c\u307e\u3067\u306f\u77e5\u3089\u308c\u3066\u3044\u306a\u304b\u3063\u305f\u653b\u6483\u3084\u4f11\u7720\u4e2d\u306e\u30d0\u30c3\u30af\u30c9\u30a2\u767a\u898b\u306b\u5bc4\u4e0e\u3059\u308b\u3053\u3068\u304c\u308f\u304b\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u3053\u306e\u30de\u30eb\u30a6\u30a7\u30a2\u306f\u3001\u653b\u6483\u5bfe\u8c61\u3068\u306a\u3063\u305f\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306b\u5408\u308f\u305b\u3066\u4f5c\u3089\u308c\u305f\u3075\u3057\u304c\u3042\u308a\u3001\u653b\u6483\u306b\u306f\u6c4e\u7528\u30c4\u30fc\u30eb\u304c\u4f7f\u7528\u3055\u308c\u3066\u3044\u308b\u3053\u3068\u304b\u3089\u3001\u3053\u306e\u653b\u6483\u3092\u7279\u5b9a\u306e\u30a2\u30af\u30bf\u30fc\u306b\u5e30\u5c5e\u3055\u305b\u308b\u3053\u3068\u306f\u3067\u304d\u307e\u305b\u3093\u3067\u3057\u305f\u3002<\/p>\n<p>\u30d1\u30ed\u30a2\u30eb\u30c8\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9\u306e\u304a\u5ba2\u69d8\u306f\u3001\u6b21\u306e\u65b9\u6cd5\u3067\u3053\u306e\u7a2e\u306e\u653b\u6483\u304b\u3089\u4fdd\u8b77\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>1. <a href=\"https:\/\/www.paloaltonetworks.jp\/cortex\/cortex-xdr\">Cortex XDR\u306e<\/a>Global Analytics BIOC\u306e\u30a2\u30e9\u30fc\u30c8\u306b\u306f\u3001\u524d\u8ff0\u306e\u7d71\u8a08\u7684\u624b\u6cd5\u304c\u591a\u304f\u5b9f\u88c5\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<figure id=\"attachment_123301\" aria-describedby=\"caption-attachment-123301\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><img  class=\"wp-image-123302 lozad\"  data-src=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2022\/06\/Table-5.png\" alt=\"Cortex XDR Analytics BIOC - globally uncommon root domain from a signed process; Cortex XDR Analytics BIOC - Globally uncommon injection from a signed process; Cortex XDR Analytics BIOC - Globally uncommon image load from a signed process\" width=\"900\" height=\"291\" \/><figcaption id=\"caption-attachment-123301\" class=\"wp-caption-text\">\u88685. Cortex XDR Global Analytics\u306eBIOC\u30a2\u30e9\u30fc\u30c8\u306fPopping Eagle\u304b\u3089\u306e\u4fdd\u8b77\u306b\u5f79\u7acb\u3064<\/figcaption><\/figure>\n<p>2. Cortex XDR \u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306eBTP(\u632f\u308b\u821e\u3044\u8105\u5a01\u9632\u5fa1)\u306f\u3001\u8106\u5f31\u306a\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306b\u5bfe\u3059\u308bDLL\u30cf\u30a4\u30b8\u30e3\u30c3\u30af\u653b\u6483\u3092\u30d6\u30ed\u30c3\u30af\u3057\u3001\u4eca\u5f8c\u540c\u3058\u30ed\u30fc\u30c9\u65b9\u6cd5\u3092\u4f7f\u7528\u3059\u308b\u30de\u30eb\u30a6\u30a7\u30a2\u3092\u9632\u6b62\u3057\u307e\u3059\u3002<\/p>\n<p>3. \u6b21\u4e16\u4ee3\u30d5\u30a1\u30a4\u30a2\u30a6\u30a9\u30fc\u30eb\u7528\u306e\u30af\u30e9\u30a6\u30c9\u578b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30d6\u30b9\u30af\u30ea\u30d7\u30b7\u30e7\u30f3<a href=\"https:\/\/www.paloaltonetworks.jp\/products\/secure-the-network\/wildfire\">WildFire<\/a>\u3068Cortex XDR\u306f\u672c\u7a3f\u3067\u8a00\u53ca\u3057\u305f\u3059\u3079\u3066\u306eIoC\u3068Yara\u30eb\u30fc\u30eb\u306b\u3088\u308a\u7279\u5b9a\u3055\u308c\u308b\u5c06\u6765\u306e\u3059\u3079\u3066\u306eIoC\u3092\u7279\u5b9a\u30fb\u30d6\u30ed\u30c3\u30af\u3057\u307e\u3059\u3002<\/p>\n<h2><a id=\"post-123338-_y3g6468btc3a\"><\/a>\u4ed8\u9332<\/h2>\n<h3><a id=\"post-123338-_hdyirhrsndcs\"><\/a>IoC<\/h3>\n<table style=\"width: 82.1416%;\">\n<tbody>\n<tr>\n<td style=\"width: 74.2424%;\"><b>SHA256<\/b><\/td>\n<td style=\"width: 82.7824%;\"><b>\u30d5\u30a1\u30a4\u30eb\u540d<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 74.2424%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">e5e89d8db12c7dacddff5c2a76b1f3b52c955c2e86af8f0b3e36c8a5d954b5e8<\/span><\/td>\n<td style=\"width: 82.7824%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">uxtheme.dll<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 74.2424%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">95676c8eeaab93396597e05bb4df3ff8cc5780ad166e4ee54484387b97f381df<\/span><\/td>\n<td style=\"width: 82.7824%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">uxtheme.dll<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 74.2424%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">59d12f26cbc3e49e28be13f0306f5a9b1a9fd62909df706e58768d2f0ccca189<\/span><\/td>\n<td style=\"width: 82.7824%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">uxtheme.dll<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 74.2424%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">0dc8f17b053d9bfab45aed21340a1f85325f79e0925caf21b9eaf9fbdc34a47a<\/span><\/td>\n<td style=\"width: 82.7824%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">ClickRuntime-amd86.dll<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 82.5456%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b>\u30c9\u30e1\u30a4\u30f3<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">dnszonetransfer[.]com<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">reporterror[.]net<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"width: 82.701%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b>IP<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">51.38.89[.]53<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">51.75.57[.]245<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n<table style=\"width: 82.8354%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b>URL<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%;\"><span style=\"font-weight: 400; font-family: 'courier new', courier, monospace;\">hxxps[:]\/\/dnszonetransfer[.]com\/Protocol\/extensions.php<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n<table style=\"width: 82.7172%;\">\n<tbody>\n<tr>\n<td style=\"width: 100%;\"><b>User agent<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"width: 100%;\"><span style=\"font-weight: 400;\">Mozilla\/5.0 (X11; Linux x86_64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/51.0.2704.103 Safari\/537.36<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><a id=\"Hunting-Yara-Rules\"><\/a>\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u7528Yara\u30eb\u30fc\u30eb<\/h3>\n<h4>\u7591\u308f\u3057\u3044Go\u306e\u5b9f\u884c\u30d5\u30a1\u30a4\u30eb<\/h4>\n<p><!-- Crayon Syntax Highlighter v_2.7.2_beta --><\/p>\n<pre class=\"lang:default decode:true\">rule general_win_golang_socks\r\n{\r\n    meta:\r\n        author = \"paloaltonetworks\"\r\n        date = \"2022-03-13\"\r\n        description = \"potentially unwanted GO application with proxy communication capabilities\"\r\n\r\n    strings:\r\n        $go_name_1 = \"main.go\" nocase ascii \/\/ default go name for the \"func main(){...}\" in \"package main\"\r\n        $go_name_2 = \"eagle\" nocase ascii\r\n        $go_name_3 = \"popo\" nocase ascii\r\n        $go_name_4 = \"-Client-Dll\/\" nocase ascii\r\n\r\n        $go_pkg_1 = \"github.com\/armon\/go-socks5\" nocase wide ascii\r\n        $go_pkg_2 = \"github.com\/hashicorp\/yamux\" nocase wide ascii\r\n        $go_pkg_3 = \"github.com\/fatedier\/frp\/vendor\" wide ascii\r\n        $go_pkg_4 = \"github.com\/rofl0r\/rocksocks5\" wide ascii\r\n\r\n    condition:\r\n        uint16(0) == 0x5a4d and\r\n        filesize &lt; 7MB and\r\n        (\r\n            1 of ($go_name_*) and\r\n            2 of ($go_pkg_*)\r\n        )\r\n}\r\n\r\nrule general_win_dll_golang_socks\r\n{\r\n    meta:\r\n        author = \"paloaltonetworks\"\r\n        date = \"2022-03-13\"\r\n        description = \"Highly suspicious GO DLL with proxy communication capabilities\"\r\n\r\n    condition:\r\n        general_win_golang_socks and\r\n        (pe.characteristics &amp; pe.DLL) and pe.is_dll()\r\n}<\/pre>\n<p><!-- [Format Time: 0.0015 seconds] --><\/p>\n<h4>\u3053\u306e\u653b\u6483\u8005\u306e\u3082\u306e\u3067\u3042\u308b\u53ef\u80fd\u6027\u304c\u3042\u308b\u30c4\u30fc\u30eb<\/h4>\n<p><!-- Crayon Syntax Highlighter v_2.7.2_beta --><\/p>\n<pre class=\"lang:default decode:true\">rule general_win_faked_dlls_export_popo    \r\n{\r\n    meta:\r\n        author = \"paloaltonetworks\"\r\n        date = \"2022-03-13\"\r\n        description = \"Detects DLL files with an export function named 'popo'\"\r\n        hash0 = \"e5e89d8db12c7dacddff5c2a76b1f3b52c955c2e86af8f0b3e36c8a5d954b5e8\"    \/\/ fake uxtheme.dll\r\n        hash1 = \"95676c8eeaab93396597e05bb4df3ff8cc5780ad166e4ee54484387b97f381df\"   \/\/ fake uxtheme.dll\r\n        hash2 = \"59d12f26cbc3e49e28be13f0306f5a9b1a9fd62909df706e58768d2f0ccca189\"    \/\/ fake uxtheme.dll\r\n        hash3 = \"0dc8f17b053d9bfab45aed21340a1f85325f79e0925caf21b9eaf9fbdc34a47a\"    \/\/ ClickRuntime-amd86.dll\r\n\r\n    condition:\r\n        (pe.characteristics &amp; pe.DLL) and pe.is_dll() and\r\n        filesize &lt; 20MB and\r\n        (\r\n             pe.exports(\"popo\") or\r\n             pe.exports(\"Popo\")\r\n        )\r\n}<\/pre>\n<p><!-- [Format Time: 0.0008 seconds] --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u6982\u8981 \u7f72\u540d\u4ed8\u304d\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u52d5\u4f5c\u306b\u5f71\u97ff\u3092\u4e0e\u3048\u308b\u653b\u6483(\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u653b\u6483\u3001\u30c0\u30a4\u30ca\u30df\u30c3\u30af\u30ea\u30f3\u30af\u30e9\u30a4\u30d6\u30e9\u30ea(DLL)\u306e\u30cf\u30a4\u30b8\u30e3\u30c3\u30af\u3001\u30a8\u30af\u30b9\u30d7\u30ed\u30a4\u30c8\u3001\u60aa\u610f\u306e\u3042\u308b\u30b9\u30ec\u30c3\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306a\u3069)\u3092\u7684\u78ba\u306b\u691c\u51fa\u3067\u304d\u308b\u3088\u3046\u3001\u79c1\u305f\u3061\u306f<\/p>\n","protected":false},"author":323,"featured_media":134326,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4321,1974,4428],"tags":[4501,4843,4645,4647,5663,5664],"product_categories":[4444,4446,4343,4448,4456],"coauthors":[3184,3185],"class_list":["post-123338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threat-research","category-malware-ja","category-threat-research-ja","tag-backdoor-ja","tag-c2-ja","tag-dll-ja","tag-dll-sideloading-ja","tag-going-eagle-ja","tag-popping-eagle","product_categories-advanced-wildfire-ja","product_categories-cloud-delivered-security-services-ja","product_categories-cortex-xdr","product_categories-cortex-xdr-ja","product_categories-next-generation-firewall-ja"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Popping Eagle: \u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u65b9\u6cd5<\/title>\n<meta name=\"description\" content=\"Unit 42\u306f\u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u691c\u51fa\u5668\u3092\u8003\u6848\u3057\u307e\u3057\u305f\u3002\u540c\u691c\u51fa\u5668\u306b\u3088\u308a\u65b0\u305f\u306a\u8105\u5a01Popping Eagle\u3092\u767a\u898b\u3057\u307e\u3057\u305f\u306e\u3067\u3001\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u306e\u624b\u6cd5\u3084\u653b\u6483\u30c4\u30fc\u30eb\u306e\u5206\u6790\u7d50\u679c\u3092\u5171\u6709\u3057\u307e\u3059\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Popping Eagle: \u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u65b9\u6cd5\" \/>\n<meta property=\"og:description\" content=\"Unit 42\u306f\u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u691c\u51fa\u5668\u3092\u8003\u6848\u3057\u307e\u3057\u305f\u3002\u540c\u691c\u51fa\u5668\u306b\u3088\u308a\u65b0\u305f\u306a\u8105\u5a01Popping Eagle\u3092\u767a\u898b\u3057\u307e\u3057\u305f\u306e\u3067\u3001\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u306e\u624b\u6cd5\u3084\u653b\u6483\u30c4\u30fc\u30eb\u306e\u5206\u6790\u7d50\u679c\u3092\u5171\u6709\u3057\u307e\u3059\u3002\" \/>\n<meta property=\"og:url\" content=\"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Unit 42\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-06T08:14:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-06T08:17:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/03_Malware_Category_1920x900.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yuval Zan, Chen Evgi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Popping Eagle: \u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u65b9\u6cd5","description":"Unit 42\u306f\u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u691c\u51fa\u5668\u3092\u8003\u6848\u3057\u307e\u3057\u305f\u3002\u540c\u691c\u51fa\u5668\u306b\u3088\u308a\u65b0\u305f\u306a\u8105\u5a01Popping Eagle\u3092\u767a\u898b\u3057\u307e\u3057\u305f\u306e\u3067\u3001\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u306e\u624b\u6cd5\u3084\u653b\u6483\u30c4\u30fc\u30eb\u306e\u5206\u6790\u7d50\u679c\u3092\u5171\u6709\u3057\u307e\u3059\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/","og_locale":"ja_JP","og_type":"article","og_title":"Popping Eagle: \u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u65b9\u6cd5","og_description":"Unit 42\u306f\u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u691c\u51fa\u5668\u3092\u8003\u6848\u3057\u307e\u3057\u305f\u3002\u540c\u691c\u51fa\u5668\u306b\u3088\u308a\u65b0\u305f\u306a\u8105\u5a01Popping Eagle\u3092\u767a\u898b\u3057\u307e\u3057\u305f\u306e\u3067\u3001\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u306e\u624b\u6cd5\u3084\u653b\u6483\u30c4\u30fc\u30eb\u306e\u5206\u6790\u7d50\u679c\u3092\u5171\u6709\u3057\u307e\u3059\u3002","og_url":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/","og_site_name":"Unit 42","article_published_time":"2022-06-06T08:14:06+00:00","article_modified_time":"2022-06-06T08:17:29+00:00","og_image":[{"width":1920,"height":900,"url":"https:\/\/unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/03_Malware_Category_1920x900.jpg","type":"image\/jpeg"}],"author":"Yuval Zan, Chen Evgi","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/#article","isPartOf":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/"},"author":{"name":"Ayako Kimijima","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/5502567dd627cdd5a306432cd651a90e"},"headline":"Popping Eagle: \u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u65b9\u6cd5","datePublished":"2022-06-06T08:14:06+00:00","dateModified":"2022-06-06T08:17:29+00:00","mainEntityOfPage":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/"},"wordCount":808,"commentCount":0,"image":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/03_Malware_Category_1920x900.jpg","keywords":["backdoor","C2","DLL","DLL Sideloading","Going Eagle","Popping Eagle"],"articleSection":["Threat Research","\u30de\u30eb\u30a6\u30a7\u30a2","\u8105\u5a01\u30ea\u30b5\u30fc\u30c1"],"inLanguage":"ja","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/","url":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/","name":"Popping Eagle: \u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u65b9\u6cd5","isPartOf":{"@id":"https:\/\/unit42.paloaltonetworks.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/#primaryimage"},"image":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/03_Malware_Category_1920x900.jpg","datePublished":"2022-06-06T08:14:06+00:00","dateModified":"2022-06-06T08:17:29+00:00","author":{"@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/5502567dd627cdd5a306432cd651a90e"},"description":"Unit 42\u306f\u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u691c\u51fa\u5668\u3092\u8003\u6848\u3057\u307e\u3057\u305f\u3002\u540c\u691c\u51fa\u5668\u306b\u3088\u308a\u65b0\u305f\u306a\u8105\u5a01Popping Eagle\u3092\u767a\u898b\u3057\u307e\u3057\u305f\u306e\u3067\u3001\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u306e\u624b\u6cd5\u3084\u653b\u6483\u30c4\u30fc\u30eb\u306e\u5206\u6790\u7d50\u679c\u3092\u5171\u6709\u3057\u307e\u3059\u3002","breadcrumb":{"@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/#primaryimage","url":"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/03_Malware_Category_1920x900.jpg","contentUrl":"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2024\/06\/03_Malware_Category_1920x900.jpg","width":1920,"height":900,"caption":"A laptop on a desk displaying a vibrant graphical interface with a circular red pattern, possibly representing cybersecurity or data analysis. The laptop is illuminated by the screen\u2019s glow in a dimly lit room, which also shows a blurred background suggesting a secondary monitor and small desk objects."},{"@type":"BreadcrumbList","@id":"https:\/\/unit42.paloaltonetworks.com\/ja\/popping-eagle-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/unit42.paloaltonetworks.com\/ja\/"},{"@type":"ListItem","position":2,"name":"Popping Eagle: \u30b0\u30ed\u30fc\u30d0\u30eb\u306a\u7d71\u8a08\u7684\u5206\u6790\u3092\u9ad8\u5ea6\u306a\u8105\u5a01\u30a2\u30af\u30bf\u30fc\u306e\u767a\u898b\u306b\u6d3b\u304b\u3059\u65b9\u6cd5"}]},{"@type":"WebSite","@id":"https:\/\/unit42.paloaltonetworks.com\/#website","url":"https:\/\/unit42.paloaltonetworks.com\/","name":"Unit 42","description":"Palo Alto Networks","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/unit42.paloaltonetworks.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Person","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/5502567dd627cdd5a306432cd651a90e","name":"Ayako Kimijima","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/unit42.paloaltonetworks.com\/#\/schema\/person\/image\/9213e49ea48b7676660bac40d05c9e3e","url":"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2018\/11\/unit-news-meta.svg","contentUrl":"https:\/\/origin-unit42.paloaltonetworks.com\/wp-content\/uploads\/2018\/11\/unit-news-meta.svg","caption":"Ayako Kimijima"},"url":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/author\/akimijima\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/posts\/123338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/users\/323"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/comments?post=123338"}],"version-history":[{"count":8,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/posts\/123338\/revisions"}],"predecessor-version":[{"id":123397,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/posts\/123338\/revisions\/123397"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/media\/134326"}],"wp:attachment":[{"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/media?parent=123338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/categories?post=123338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/tags?post=123338"},{"taxonomy":"product_categories","embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/product_categories?post=123338"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-unit42.paloaltonetworks.com\/ja\/wp-json\/wp\/v2\/coauthors?post=123338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}