Scenario
Scenario
You have recently joined the Cyber Threat Intelligence (CTI) team at a mid-sized organization. Your manager asks you to get familiar with MISP, the organization’s threat intelligence platform. You’ve been given access to a MISP instance containing threat events, tags, and correlations. Your task is to explore the platform and answer key questions that reflect day-to-day intelligence work. Optional task: This lab provides a fillable Threat Intelligence Template. This can be used to get the full experience of communicating your findings as an Analyst.
we are given access to a MISP, the event we are after is event ID 10128

Event Title: CERT-UA: Targeted Espionage Activity UAC-0226 Against Innovation Hubs, Government, and Law Enforcement — Utilizing the GIFTEDCROOK Stealer (CERT-UA#14303)
Event ID: 10128
Date of Publication: 2025-04-08 08:43:37
Issuing Country: Ukraine
Campaign Identified: Cyber-Espionage
Org (Creator): rcsti.bin.re
TLP: tlp:clear
2.1 Info Field:
CERT-UA: Targeted Espionage Activity UAC-0226 Against Innovation Hubs, Government, and Law Enforcement — Utilizing the GIFTEDCROOK Stealer (CERT-UA#14303)
2.2 Originating Organization (Org):
rcsti.bin.re
This event was published by CERT-UA — the Computer Emergency Response Team of Ukraine — and ingested into the MISP instance via rcsti.bin.re. The campaign targets Ukrainian innovation hubs, government bodies, and law enforcement agencies using a stealer malware strain tracked as GIFTEDCROOK, attributed to threat actor cluster UAC-0226.
3.1 Total Number of Attributes: 56
3.2 Total Number of Objects: 21
3.3 Number of Unique Attribute Categories: 4
The event contains 56 attributes structured across 21 MISP objects. The four unique attribute categories observed are consistent with a payload-delivery focused event: Payload delivery, Artifacts dropped, Network activity, and External analysis. The high ratio of objects to attributes indicates most IOCs are grouped into file objects (md5 + sha256 + filename triads), reflecting structured ingestion from the original CERT-UA advisory.
4.1 Unique File Extensions Found (alphabetical):
.ps1, .xlsm, .zip
Three distinct file types are present across the event attributes. The .xlsm files serve as the initial lure documents — macro-enabled Excel workbooks weaponised for payload delivery. The .ps1 scripts handle post-open execution, and the .zip archive is the artifact dropped at the start of infection.
4.2 Office Documents Identified: 9
Nine macro-enabled Excel workbooks (.xlsm) were identified across the event attributes. These files are used as phishing lures themed around administrative fines and government notifications — a social engineering technique consistent with UAC-0226’s documented TTPs targeting Ukrainian public sector employees. Filenames include numeric identifiers and Cyrillic-named variants such as майно.xlsm (property) suggesting localised targeting.
4.3 Script File Names (alphabetical):
kpbbknwf32mm.ps1, nnnnrth.ps1
Both scripts carry randomised names consistent with obfuscation tradecraft. These PowerShell scripts are likely responsible for staging or executing the GIFTEDCROOK stealer payload post-macro execution.
4.4 Dropped Artifact Location & Name:
status.zip, %TMP%\nmpoyqv5l0ig\
A zip archive named status.zip is dropped into a randomly-named subdirectory under the user’s %TMP% path at the start of infection. The randomised directory name (nmpoyqv5l0ig) is a common sandbox-evasion and forensic-obfuscation technique, making the drop location unpredictable across victims.

5.1 First Command & Control (C2):
89[.]44[.]9[.]18632405.2 Second Command & Control (C2):
37[.]120[.]239[.]1876501Both C2 endpoints use non-standard ports, consistent with attempts to blend into noisy outbound traffic and avoid signature-based port blocking. The use of two separate C2 nodes suggests redundancy in the adversary’s infrastructure — common in state-linked espionage operations.
6.1 Country of First C2 (via ICANN Lookup):
France — 89[.]44[.]9[.]186 resolves to infrastructure hosted in France, likely a bulletproof or rented VPS used to avoid direct attribution to the threat actor’s origin.
6.2 Country of Second C2 (via ICANN Lookup):
Netherlands — 37[.]120[.]239[.]187 resolves to Dutch-hosted infrastructure. The Netherlands is a common hosting jurisdiction for threat actors due to permissive hosting providers and high-bandwidth infrastructure.
7.1 TLP Level Assigned: tlp:clear
7.2 Sharing Restrictions: None — this event is cleared for public distribution.
UAC-0226 / GIFTEDCROOK represents a well-structured phishing-to-stealer pipeline targeting Ukrainian institutions. The lure documents are socially engineered around administrative and legal themes (fines, compensation, property notices) — a technique that exploits the bureaucratic context of government employees rather than relying on generic pretexts.
The use of macro-enabled .xlsm files is notable given Microsoft’s 2022 decision to block macros by default in Office. This suggests either the targets are running unpatched or legacy Office versions, or the lures are crafted to socially engineer victims into enabling macros manually.
The dual C2 infrastructure hosted across France and the Netherlands is consistent with operational security practices seen in state-nexus APT activity — leveraging European hosting to avoid geolocation-based blocking while maintaining redundancy.
MITRE ATT&CK references:
Report compiled by: Tate Pannam Analyst Name: Tate Pannam Date Submitted: 2025-03-15