diff --git "a/tech2proc.csv" "b/tech2proc.csv" --- "a/tech2proc.csv" +++ "b/tech2proc.csv" @@ -14,7 +14,7 @@ prompt,procedure Gather Victim Host Information:Software,It has captured the user-agent strings from visitors to their phishing sites. Gather Victim Host Information:Software,"It has researched software code to enable supply-chain operations, most notably for the 2017 NotPetya attack. It also collected a list of computers using specific software as part of its targeting efforts." Gather Victim Host Information:Client Configurations,It has interacted with Office 365 tenants to gather details regarding target's environments. - Gather Victim Identity Information,It2 has conducted targeted surveillance against activists and bloggers. + Gather Victim Identity Information,It has conducted targeted surveillance against activists and bloggers. Gather Victim Identity Information,It has researched employees to target for social engineering attacks. Gather Victim Identity Information,It has identified specific potential victims at targeted organizations. Gather Victim Identity Information,It has gathered detailed information of target employees to enhance their social engineering lures. @@ -29,7 +29,7 @@ prompt,procedure Gather Victim Identity Information:Credentials,"It gathered credentials from two victims that they then attempted to validate across 75 different websites. It has also collected credentials from over 900 Fortinet VPN servers in the US, Europe, and Israel." Gather Victim Identity Information:Credentials,"For the SolarWinds Compromise, It conducted credential theft operations to obtain credentials to be used for access to victim environments." Gather Victim Identity Information:Email Addresses,AADInternals can check for the existence of user email addresses using public Microsoft APIs. - Gather Victim Identity Information:Email Addresses,It2 has collected e-mail addresses for activists and bloggers in order to target them with spyware. + Gather Victim Identity Information:Email Addresses,It has collected e-mail addresses for activists and bloggers in order to target them with spyware. Gather Victim Identity Information:Email Addresses,It has gathered targeted individuals' e-mail addresses through open source research and website contact forms. Gather Victim Identity Information:Email Addresses,It has collected e-mail addresses for users they intended to target. Gather Victim Identity Information:Email Addresses,"It has targeted executives, human resources staff, and IT personnel for spearphishing." @@ -70,7 +70,7 @@ prompt,procedure Phishing for Information:Spearphishing Attachment,It has sent e-mails with malicious attachments that lead victims to credential harvesting websites. Phishing for Information:Spearphishing Link,AADInternals can send phishing emails containing malicious links designed to collect users’ credentials. Phishing for Information:Spearphishing Link,It has conducted credential phishing campaigns with embedded links to attacker-controlled domains. - Phishing for Information:Spearphishing Link,It2 has used malicious links to direct users to web pages designed to harvest credentials. + Phishing for Information:Spearphishing Link,It has used malicious links to direct users to web pages designed to harvest credentials. Phishing for Information:Spearphishing Link,It has used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites. Phishing for Information:Spearphishing Link,It has used links in e-mail to steal account information. Phishing for Information:Spearphishing Link,It has used SMS and email messages with links designed to steal credentials or track victims. @@ -96,7 +96,7 @@ prompt,procedure Gather Victim Host Information:Software,It has captured the user-agent strings from visitors to their phishing sites. Gather Victim Host Information:Software,"It has researched software code to enable supply-chain operations, most notably for the 2017 NotPetya attack. It also collected a list of computers using specific software as part of its targeting efforts." Gather Victim Host Information:Client Configurations,It has interacted with Office 365 tenants to gather details regarding target's environments. - Gather Victim Identity Information,It2 has conducted targeted surveillance against activists and bloggers. + Gather Victim Identity Information,It has conducted targeted surveillance against activists and bloggers. Gather Victim Identity Information,It has researched employees to target for social engineering attacks. Gather Victim Identity Information,It has identified specific potential victims at targeted organizations. Gather Victim Identity Information,It has gathered detailed information of target employees to enhance their social engineering lures. @@ -111,7 +111,7 @@ prompt,procedure Gather Victim Identity Information:Credentials,"It gathered credentials from two victims that they then attempted to validate across 75 different websites. It has also collected credentials from over 900 Fortinet VPN servers in the US, Europe, and Israel." Gather Victim Identity Information:Credentials,"For the SolarWinds Compromise, It conducted credential theft operations to obtain credentials to be used for access to victim environments." Gather Victim Identity Information:Email Addresses,AADInternals can check for the existence of user email addresses using public Microsoft APIs. - Gather Victim Identity Information:Email Addresses,It2 has collected e-mail addresses for activists and bloggers in order to target them with spyware. + Gather Victim Identity Information:Email Addresses,It has collected e-mail addresses for activists and bloggers in order to target them with spyware. Gather Victim Identity Information:Email Addresses,It has gathered targeted individuals' e-mail addresses through open source research and website contact forms. Gather Victim Identity Information:Email Addresses,It has collected e-mail addresses for users they intended to target. Gather Victim Identity Information:Email Addresses,"It has targeted executives, human resources staff, and IT personnel for spearphishing." @@ -152,7 +152,7 @@ prompt,procedure Phishing for Information:Spearphishing Attachment,It has sent e-mails with malicious attachments that lead victims to credential harvesting websites. Phishing for Information:Spearphishing Link,AADInternals can send phishing emails containing malicious links designed to collect users’ credentials. Phishing for Information:Spearphishing Link,It has conducted credential phishing campaigns with embedded links to attacker-controlled domains. - Phishing for Information:Spearphishing Link,It2 has used malicious links to direct users to web pages designed to harvest credentials. + Phishing for Information:Spearphishing Link,It has used malicious links to direct users to web pages designed to harvest credentials. Phishing for Information:Spearphishing Link,It has used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites. Phishing for Information:Spearphishing Link,It has used links in e-mail to steal account information. Phishing for Information:Spearphishing Link,It has used SMS and email messages with links designed to steal credentials or track victims. @@ -179,7 +179,7 @@ prompt,procedure Search Victim-Owned Websites,"It has searched victim's websites to identify the interests and academic areas of targeted individuals and to scrape source code, branding, and organizational contact information for phishing pages." Acquire Infrastructure:Domains,It has registered hundreds of domains for use in operations. Acquire Infrastructure:Domains,"It registered domains imitating NATO, OSCE security websites, Caucasus information resources, and other organizations." - Acquire Infrastructure:Domains,It2 has set up and operated websites to gather information and deliver malware. + Acquire Infrastructure:Domains,It has set up and operated websites to gather information and deliver malware. Acquire Infrastructure:Domains,It has registered a variety of domains to host malicious payloads and for C2. Acquire Infrastructure:Domains,"For C0010, UNC3890 actors established domains that appeared to be legitimate services and entities, such as LinkedIn, Facebook, Office 365, and Pfizer." Acquire Infrastructure:Domains,"For C0011, It registered domains likely designed to appear relevant to student targets in India." @@ -232,10 +232,10 @@ prompt,procedure Acquire Infrastructure:Server,"For Operation Honeybee, at least one identified persona was used to register for a free account for a control server. " Acquire Infrastructure:Server,"For Operation Wocao, the threat actors purchased servers with Bitcoin to use during the operation." Acquire Infrastructure:Server,It has leased servers from resellers instead of leasing infrastructure directly from hosting companies to enable its operations. - Acquire Infrastructure:Web Services,It7 has created profile pages in Microsoft TechNet that were used as C2 infrastructure. + Acquire Infrastructure:Web Services,It has created profile pages in Microsoft TechNet that were used as C2 infrastructure. Acquire Infrastructure:Web Services,It has used newly-created Blogspot pages for credential harvesting operations. Acquire Infrastructure:Web Services,"It has registered algorithmically generated Twitter handles that are used for C2 by malware, such as HAMMERTOSS. It has also used legitimate web services such as Dropbox and Constant Contact in their operations." - Acquire Infrastructure:Web Services,"It2 has set up Dropbox, Amazon S3, and Google Drive to host malicious downloads." + Acquire Infrastructure:Web Services,"It has set up Dropbox, Amazon S3, and Google Drive to host malicious downloads." Acquire Infrastructure:Web Services,It has obtained cloud storage service accounts to host stolen data. Acquire Infrastructure:Web Services,It has established GitHub accounts to host their malware. Acquire Infrastructure:Web Services,It has set up Amazon S3 buckets to host trojanized digital products. @@ -273,7 +273,7 @@ prompt,procedure Compromise Infrastructure:Domains,It has compromised domains for use in targeted malicious campaigns. Compromise Infrastructure:DNS Server,It has reconfigured a victim's DNS records to actor-controlled domains and websites. Compromise Infrastructure:Virtual Private Server,It has used the VPS infrastructure of compromised Iranian threat actors. - Compromise Infrastructure:Server,It6 has compromised otherwise legitimate sites as staging servers for second-stage payloads. + Compromise Infrastructure:Server,It has compromised otherwise legitimate sites as staging servers for second-stage payloads. Compromise Infrastructure:Server,It has compromised legitimate websites to host C2 and malware modules. Compromise Infrastructure:Server,It has used compromised web servers as part of their operational infrastructure. Compromise Infrastructure:Server,It has served fake updates via legitimate websites that have been compromised. @@ -316,9 +316,9 @@ prompt,procedure Develop Capabilities:Digital Certificates,It has created self-signed digital certificates to enable mutual TLS authentication for malware. Develop Capabilities:Digital Certificates,"For C0011, It established SSL certificates on the typo-squatted domains the group registered." Develop Capabilities:Digital Certificates,It has created self-signed digital certificates for use in HTTPS C2 traffic. - Establish Accounts,"It7 has created and cultivated profile pages in Microsoft TechNet. To make profile pages appear more legitimate, It7 has created biographical sections and posted in forum threads." + Establish Accounts,"It has created and cultivated profile pages in Microsoft TechNet. To make profile pages appear more legitimate, It has created biographical sections and posted in forum threads." Establish Accounts,It has created KeyBase accounts to communicate with ransomware victims. - Establish Accounts:Social Media Accounts,It2 has set up Facebook pages in tandem with fake websites. + Establish Accounts:Social Media Accounts,It has set up Facebook pages in tandem with fake websites. Establish Accounts:Social Media Accounts,"It has created fake LinkedIn profiles that included profile photos, details, and connections." Establish Accounts:Social Media Accounts,"It has established a network of fictitious social media accounts, including on Facebook and LinkedIn, to establish relationships with victims, often posing as an attractive woman." Establish Accounts:Social Media Accounts,It has established social media profiles to mimic employees of targeted companies. @@ -367,13 +367,13 @@ prompt,procedure Obtain Capabilities:Tool,It obtained the Heyoka open source exfiltration tool and subsequently modified it for their operations. Obtain Capabilities:Tool,It obtained and used a modified variant of Imminent Monitor. Obtain Capabilities:Tool,It has used various open-source tools for privilege escalation purposes. - Obtain Capabilities:Tool,It9 has obtained and used publicly-available tools like Empire. + Obtain Capabilities:Tool,It has obtained and used publicly-available tools like Empire. Obtain Capabilities:Tool,"It has obtained and used open-source tools like Koadic, Mimikatz, and Responder." Obtain Capabilities:Tool,"It has obtained and used a variety of tools including Mimikatz, SDelete, Tor, meek, and Cobalt Strike." - Obtain Capabilities:Tool,"It2 has obtained and used tools such as Mimikatz and Cobalt Strike, and a variety of other open-source tools from GitHub." - Obtain Capabilities:Tool,It3 has obtained and leveraged publicly-available tools for early intrusion activities. - Obtain Capabilities:Tool,It8 has obtained and used open-source tools such as Mimikatz. - Obtain Capabilities:Tool,It9 has modified and used customized versions of publicly-available tools like PLINK and Mimikatz. + Obtain Capabilities:Tool,"It has obtained and used tools such as Mimikatz and Cobalt Strike, and a variety of other open-source tools from GitHub." + Obtain Capabilities:Tool,It has obtained and leveraged publicly-available tools for early intrusion activities. + Obtain Capabilities:Tool,It has obtained and used open-source tools such as Mimikatz. + Obtain Capabilities:Tool,It has modified and used customized versions of publicly-available tools like PLINK and Mimikatz. Obtain Capabilities:Tool,"It has obtained and used tools such as Mimikatz, pwdump, PowerSploit, and Windows Credential Editor." Obtain Capabilities:Tool,It has acquired and used Cobalt Strike in its operations. Obtain Capabilities:Tool,It has obtained a variety of open-source reconnaissance and red team tools for discovery and lateral movement. @@ -459,7 +459,7 @@ prompt,procedure Obtain Capabilities:Exploits,It has obtained exploit code for various CVEs. Obtain Capabilities:Vulnerabilities,"In 2017, It conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee, a Korean power company, and a Korean airport." Stage Capabilities,It has used servers under their control to validate tracking pixels sent to phishing victims. - Stage Capabilities:Upload Malware,"It2 has hosted malicious payloads in Dropbox, Amazon S3, and Google Drive for use during targeting." + Stage Capabilities:Upload Malware,"It has hosted malicious payloads in Dropbox, Amazon S3, and Google Drive for use during targeting." Stage Capabilities:Upload Malware,It has registered domains to stage payloads. Stage Capabilities:Upload Malware,"For C0010, UNC3890 actors staged malware on their infrastructure for direct download onto a compromised system. " Stage Capabilities:Upload Malware,"For C0011, It hosted malicious documents on domains registered by the group. " @@ -485,7 +485,7 @@ prompt,procedure Stage Capabilities:Upload Tool,"For C0010, UNC3890 actors staged tools on their infrastructure to download directly onto a compromised system." Stage Capabilities:Upload Tool,"For Operation Dream Job, It used multiple servers to host malicious tools." Stage Capabilities:Upload Tool,"It has staged tools, including gsecdump and WCE, on previously compromised websites." - Stage Capabilities:Drive-by Target,"It2 has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate, but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update." + Stage Capabilities:Drive-by Target,"It has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate, but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update." Stage Capabilities:Drive-by Target,"For C0010, the threat actors compromised the login page of a legitimate Israeli shipping company and likely established a watering hole that collected visitor information." Stage Capabilities:Drive-by Target,It has compromised websites to redirect traffic and to host exploit kits. Stage Capabilities:Drive-by Target,It has compromised a digital product website and modified multiple download links to point to trojanized versions of offered digital products. @@ -497,11 +497,11 @@ prompt,procedure Content Injection,"Disco has achieved initial access and execution through content injection into DNS, HTTP, and SMB replies to targeted hosts that redirect them to download malicious files." Content Injection,"It has injected content into DNS, HTTP, and SMB replies to redirect specifically-targeted victims to a fake Windows Update page to download malware." Drive-by Compromise,"It has used watering hole attacks, often with zero-day exploits, to gain initial access to victims within a specific IP range." - Drive-by Compromise,It9 performed a watering hole attack on forbes.com in 2014 to compromise targets. + Drive-by Compromise,It performed a watering hole attack on forbes.com in 2014 to compromise targets. Drive-by Compromise,It has compromised targets via strategic web compromise utilizing custom exploit kits. - Drive-by Compromise,It2 has infected victims by tricking them into visiting compromised watering hole websites. - Drive-by Compromise,"It7 has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim's web browser and deliver malicious code accordingly." - Drive-by Compromise,It8 has conducted watering holes schemes to gain initial access to victims. + Drive-by Compromise,It has infected victims by tricking them into visiting compromised watering hole websites. + Drive-by Compromise,"It has used strategic web compromises, particularly of South Korean websites, to distribute malware. The group has also used torrent file-sharing sites to more indiscriminately disseminate malware to victims. As part of their compromises, the group has used a Javascript based profiler called RICECURRY to profile a victim's web browser and deliver malicious code accordingly." + Drive-by Compromise,It has conducted watering holes schemes to gain initial access to victims. Drive-by Compromise,It has used watering hole attacks to gain access. Drive-by Compromise,Bad Rabbit spread through watering holes on popular sites by injecting JavaScript into the HTML body or a .js file. Drive-by Compromise,It compromised three Japanese websites using a Flash exploit to perform watering hole attacks. @@ -535,7 +535,7 @@ prompt,procedure Drive-by Compromise,It has used compromised websites to register custom URL schemes on a remote system. Exploit Public-Facing Application,"It has used a variety of public exploits, including CVE 2020-0688 and CVE 2020-17144, to gain execution on vulnerable Microsoft Exchange; they have also conducted SQL injection attacks against external websites." Exploit Public-Facing Application,"It has exploited CVE-2019-19781 for Citrix, CVE-2019-11510 for Pulse Secure VPNs, CVE-2018-13379 for FortiGate VPNs, and CVE-2019-9670 in Zimbra software to gain access." - Exploit Public-Facing Application,It9 has used SQL injection for initial compromise. + Exploit Public-Facing Application,It has used SQL injection for initial compromise. Exploit Public-Facing Application,"It exploited CVE-2020-10189 against Zoho ManageEngine Desktop Central, and CVE-2019-19781 to compromise Citrix Application Delivery Controllers (ADC) and gateway devices." Exploit Public-Facing Application,It has been observed using SQL injection to gain access to systems. Exploit Public-Facing Application,"It has exploited CVE-2020-5902, an F5 BIP-IP vulnerability, to drop a Linux backdoor. It has also exploited mis-configured Plesk servers." @@ -571,7 +571,7 @@ prompt,procedure Exploit Public-Facing Application,It gained initial access through exploitation of CVE-2021-40539 in internet-facing ManageEngine ADSelfService Plus servers. Exploit Public-Facing Application,"ZxShell has been dropped through exploitation of CVE-2011-2462, CVE-2013-3163, and CVE-2014-0322." External Remote Services,"During the 2015 Ukraine Electric Power Attack, It installed a modified Dropbear SSH client as the backdoor to target systems. " - External Remote Services,It8 actors leverage legitimate credentials to log into external remote services. + External Remote Services,It actors leverage legitimate credentials to log into external remote services. External Remote Services,It has used Tor and a variety of commercial VPN services to route brute force authentication attempts. External Remote Services,It has used compromised identities to access networks via VPNs and Citrix. External Remote Services,It compromised an online billing/payment service using VPN access between a third-party service provider and the targeted payment service. @@ -616,16 +616,16 @@ prompt,procedure Phishing:Spearphishing Attachment,AppleSeed has been distributed to victims through malicious e-mail attachments. Phishing:Spearphishing Attachment,It has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway. Phishing:Spearphishing Attachment,It has sent spearphishing emails containing malicious attachments. - Phishing:Spearphishing Attachment,It2 has sent emails with malicious Microsoft Office documents and PDFs attached. - Phishing:Spearphishing Attachment,It9 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits. + Phishing:Spearphishing Attachment,It has sent emails with malicious Microsoft Office documents and PDFs attached. + Phishing:Spearphishing Attachment,It sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits. Phishing:Spearphishing Attachment,It sent spearphishing emails containing malicious Microsoft Office and RAR attachments. Phishing:Spearphishing Attachment,It has used spearphishing emails with an attachment to deliver files with exploits to initial victims. - Phishing:Spearphishing Attachment,It0 has used spearphishing emails with malicious DOC attachments. - Phishing:Spearphishing Attachment,It2 has sent spearphishing emails with a malicious executable disguised as a document or spreadsheet. - Phishing:Spearphishing Attachment,It3 has sent spearphishing e-mails with archive attachments. - Phishing:Spearphishing Attachment,It7 delivers malware using spearphishing emails with malicious HWP attachments. - Phishing:Spearphishing Attachment,It8 has conducted spearphishing campaigns using malicious email attachments. - Phishing:Spearphishing Attachment,It9 leveraged spearphishing emails with malicious attachments to initially compromise victims. + Phishing:Spearphishing Attachment,It has used spearphishing emails with malicious DOC attachments. + Phishing:Spearphishing Attachment,It has sent spearphishing emails with a malicious executable disguised as a document or spreadsheet. + Phishing:Spearphishing Attachment,It has sent spearphishing e-mails with archive attachments. + Phishing:Spearphishing Attachment,It delivers malware using spearphishing emails with malicious HWP attachments. + Phishing:Spearphishing Attachment,It has conducted spearphishing campaigns using malicious email attachments. + Phishing:Spearphishing Attachment,It leveraged spearphishing emails with malicious attachments to initially compromise victims. Phishing:Spearphishing Attachment,It sent spearphishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims. Phishing:Spearphishing Attachment,Astaroth has been delivered via malicious e-mail attachments. Phishing:Spearphishing Attachment,BADFLICK has been distributed via spearphishing campaigns containing malicious Microsoft Word documents. @@ -741,9 +741,9 @@ prompt,procedure Phishing:Spearphishing Link,It sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites. Phishing:Spearphishing Link,It has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files. Phishing:Spearphishing Link,It has sent spearphishing emails containing malicious links. - Phishing:Spearphishing Link,It2 has sent spearphishing emails containing malicious links. - Phishing:Spearphishing Link,It3 has sent spearphishing emails containing links to .hta files. - Phishing:Spearphishing Link,It9 leveraged spearphishing emails with malicious links to initially compromise victims. + Phishing:Spearphishing Link,It has sent spearphishing emails containing malicious links. + Phishing:Spearphishing Link,It has sent spearphishing emails containing links to .hta files. + Phishing:Spearphishing Link,It leveraged spearphishing emails with malicious links to initially compromise victims. Phishing:Spearphishing Link,Bazar has been spread via emails with embedded malicious links. Phishing:Spearphishing Link,It has used spearphishing e-mails with links to cloud services to deliver malware. Phishing:Spearphishing Link,Bumblebee has been spread through e-mail campaigns with malicious links. @@ -832,7 +832,7 @@ prompt,procedure Replication Through Removable Media,njRAT can be configured to spread via removable drives. Replication Through Removable Media,QakBot has the ability to use removable drives to spread through compromised networks. Replication Through Removable Media,Ramsay can spread itself by infecting other portable executable files on removable drives. - Replication Through Removable Media,It0 may have used the SHIPSHAPE malware to move onto air-gapped networks. SHIPSHAPE targets removable drives to spread to other systems by modifying the drive to use Autorun to execute or by hiding legitimate document files and copying an executable to the folder with the same name as the legitimate document. + Replication Through Removable Media,It may have used the SHIPSHAPE malware to move onto air-gapped networks. SHIPSHAPE targets removable drives to spread to other systems by modifying the drive to use Autorun to execute or by hiding legitimate document files and copying an executable to the folder with the same name as the legitimate document. Replication Through Removable Media,Stuxnet can propagate via removable media using an autorun.inf file or the CVE-2010-2568 LNK vulnerability. Replication Through Removable Media,It has attempted to transfer USBferry from an infected USB device by copying an Autorun function to the target machine. Replication Through Removable Media,Unknown Logger is capable of spreading to USB devices. @@ -861,11 +861,11 @@ prompt,procedure Trusted Relationship,"During the SolarWinds Compromise, It gained access through compromised accounts at cloud solution partners, and used compromised certificates issued by Mimecast to authenticate to Mimecast customer systems." Trusted Relationship,It has compromised third party service providers to gain access to victim's environments. Valid Accounts,"During the 2015 Ukraine Electric Power Attack, It used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network. " - Valid Accounts,It8 actors leverage legitimate credentials to log into external remote services. + Valid Accounts,It actors leverage legitimate credentials to log into external remote services. Valid Accounts,"It has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder." Valid Accounts,It has used a compromised account to access an organization's VPN infrastructure. - Valid Accounts,It3 has used valid accounts for initial access and privilege escalation. - Valid Accounts,It9 has used stolen credentials to compromise Outlook Web Access (OWA). + Valid Accounts,It has used valid accounts for initial access and privilege escalation. + Valid Accounts,It has used stolen credentials to compromise Outlook Web Access (OWA). Valid Accounts,It used compromised credentials to log on to other systems. Valid Accounts,It has used previously compromised administrative accounts to escalate privileges. Valid Accounts,It actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars. @@ -927,7 +927,7 @@ prompt,procedure Valid Accounts:Domain Accounts,"It actors used compromised domain credentials for the victim's endpoint management platform, Altiris, to move laterally." Valid Accounts:Domain Accounts,It has used compromised domain accounts to authenticate to devices on compromised networks. Valid Accounts:Domain Accounts,"It has used administrative accounts, including Domain Admin, to move laterally within a victim network." - Valid Accounts:Local Accounts,It2 has used legitimate local admin account credentials. + Valid Accounts:Local Accounts,It has used legitimate local admin account credentials. Valid Accounts:Local Accounts,Cobalt Strike can use known credentials to run commands and spawn processes as a local user account. Valid Accounts:Local Accounts,"Emotet can brute force a local admin password, then use it to facilitate lateral movement." Valid Accounts:Local Accounts,It has moved laterally using the Local Administrator account. @@ -942,7 +942,7 @@ prompt,procedure Valid Accounts:Local Accounts,Umbreon creates valid local users to provide access to the system. Valid Accounts:Cloud Accounts,It has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes. Valid Accounts:Cloud Accounts,It has gained access to a global administrator account in Azure AD and has used Service Principal credentials in Exchange. - Valid Accounts:Cloud Accounts,It3 has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints. + Valid Accounts:Cloud Accounts,It has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints. Valid Accounts:Cloud Accounts,"During C0027, It leveraged compromised credentials from victim users to authenticate to Azure tenants." Valid Accounts:Cloud Accounts,It has used compromised credentials to sign into victims’ Microsoft 365 accounts. Valid Accounts:Cloud Accounts,It has used compromised credentials to access cloud assets within a target organization. @@ -953,10 +953,10 @@ prompt,procedure Cloud Administration Command,AADInternals can execute commands on Azure virtual machines using the VM agent. Cloud Administration Command,It has used Azure Run Command and Azure Admin-on-Behalf-of (AOBO) to execute code on virtual machines. Cloud Administration Command,Pacu can run commands on EC2 instances using AWS Systems Manager Run Command. - Command and Scripting Interpreter,It9 downloaded and launched code within a SCT file. - Command and Scripting Interpreter,It2 has used COM scriptlets to download Cobalt Strike beacons. - Command and Scripting Interpreter,It7 has used Ruby scripts to execute payloads. - Command and Scripting Interpreter,It9 has utilized AutoIt and custom scripts to perform internal reconnaissance. + Command and Scripting Interpreter,It downloaded and launched code within a SCT file. + Command and Scripting Interpreter,It has used COM scriptlets to download Cobalt Strike beacons. + Command and Scripting Interpreter,It has used Ruby scripts to execute payloads. + Command and Scripting Interpreter,It has utilized AutoIt and custom scripts to perform internal reconnaissance. Command and Scripting Interpreter,Bandook can support commands to execute Java-based payloads. Command and Scripting Interpreter,Bonadan can create bind and reverse shells on the infected system. Command and Scripting Interpreter,CHOPSTICK is capable of performing remote command execution. @@ -989,14 +989,14 @@ prompt,procedure Command and Scripting Interpreter:PowerShell,"During the 2016 Ukraine Electric Power Attack, It used PowerShell scripts to run a credential harvesting tool in memory to evade defenses." Command and Scripting Interpreter:PowerShell,AADInternals is written and executed via PowerShell. Command and Scripting Interpreter:PowerShell,AppleSeed has the ability to execute its payload via PowerShell. - Command and Scripting Interpreter:PowerShell,It9 used PowerShell commands to execute payloads. + Command and Scripting Interpreter:PowerShell,It used PowerShell commands to execute payloads. Command and Scripting Interpreter:PowerShell,It downloads and executes PowerShell scripts and performs PowerShell commands. Command and Scripting Interpreter:PowerShell,It has used encoded PowerShell scripts uploaded to CozyCar installations to download and install SeaDuke. Command and Scripting Interpreter:PowerShell,It has used PowerShell on victim systems to download and run payloads after exploitation. - Command and Scripting Interpreter:PowerShell,"It2 has used PowerShell-based tools, PowerShell one-liners, and shellcode loaders for execution." - Command and Scripting Interpreter:PowerShell,It3 has utilized PowerShell to download files from the C2 server and run various scripts. - Command and Scripting Interpreter:PowerShell,It8 has used PowerShell to execute commands and other operational tasks. - Command and Scripting Interpreter:PowerShell,It9 has used PowerShell to execute malicious code. + Command and Scripting Interpreter:PowerShell,"It has used PowerShell-based tools, PowerShell one-liners, and shellcode loaders for execution." + Command and Scripting Interpreter:PowerShell,It has utilized PowerShell to download files from the C2 server and run various scripts. + Command and Scripting Interpreter:PowerShell,It has used PowerShell to execute commands and other operational tasks. + Command and Scripting Interpreter:PowerShell,It has used PowerShell to execute malicious code. Command and Scripting Interpreter:PowerShell,It leveraged PowerShell to deploy malware families in victims’ environments. Command and Scripting Interpreter:PowerShell,It has downloaded additional scripts and executed Base64 encoded commands in PowerShell. Command and Scripting Interpreter:PowerShell,AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader. @@ -1172,12 +1172,12 @@ prompt,procedure Command and Scripting Interpreter:Windows Command Shell,ADVSTORESHELL can create a remote shell and run a given command. Command and Scripting Interpreter:Windows Command Shell,Anchor has used cmd.exe to run its self deletion routine. Command and Scripting Interpreter:Windows Command Shell,"It has used the Windows command shell to execute commands, and batch scripting to automate execution." - Command and Scripting Interpreter:Windows Command Shell,It8 uses cmd.exe to execute commands on the victim’s machine. + Command and Scripting Interpreter:Windows Command Shell,It uses cmd.exe to execute commands on the victim’s machine. Command and Scripting Interpreter:Windows Command Shell,An It loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads. Command and Scripting Interpreter:Windows Command Shell,"An It downloader uses the Windows command ""cmd.exe"" /C whoami. The group also uses a tool to execute commands on remote computers." - Command and Scripting Interpreter:Windows Command Shell,It2 has used cmd.exe for execution. - Command and Scripting Interpreter:Windows Command Shell,It7 has used the command-line interface. - Command and Scripting Interpreter:Windows Command Shell,"It8 has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine." + Command and Scripting Interpreter:Windows Command Shell,It has used cmd.exe for execution. + Command and Scripting Interpreter:Windows Command Shell,It has used the command-line interface. + Command and Scripting Interpreter:Windows Command Shell,"It has used a command-line tunneler, NACHOCHEESE, to give them shell access to a victim’s machine." Command and Scripting Interpreter:Windows Command Shell,It used cmd.exe /c to execute commands on remote machines.It used a batch file to install persistence for the Cobalt Strike BEACON loader. Command and Scripting Interpreter:Windows Command Shell,It has attempted and failed to run Bash commands on a Windows host by passing them to cmd /C. Command and Scripting Interpreter:Windows Command Shell,Astaroth spawns a CMD process to execute commands. @@ -1519,11 +1519,11 @@ prompt,procedure Command and Scripting Interpreter:Visual Basic,"During the 2015 Ukraine Electric Power Attack, It installed a VBA script called vba_macro.exe. This macro dropped FONTCACHE.DAT, the primary BlackEnergy implant; rundll32.exe, for executing the malware; NTUSER.log, an empty file; and desktop.ini, the default file used to determine folder displays on Windows machines. " Command and Scripting Interpreter:Visual Basic,"During the 2016 Ukraine Electric Power Attack, It created VBScripts to run on an SSH server." Command and Scripting Interpreter:Visual Basic,It has embedded a VBScript within a malicious Word document which is executed upon the document opening. - Command and Scripting Interpreter:Visual Basic,"It2 has used macros, COM scriptlets, and VBS scripts. " - Command and Scripting Interpreter:Visual Basic,It3 has used VBScript to initiate the delivery of payloads. - Command and Scripting Interpreter:Visual Basic,It7 executes shellcode and a VBA script to decode Base64 strings. - Command and Scripting Interpreter:Visual Basic,It8 has used VBScript to execute commands and other operational tasks. - Command and Scripting Interpreter:Visual Basic,It9 has utilized malicious VBS scripts in malware. + Command and Scripting Interpreter:Visual Basic,"It has used macros, COM scriptlets, and VBS scripts. " + Command and Scripting Interpreter:Visual Basic,It has used VBScript to initiate the delivery of payloads. + Command and Scripting Interpreter:Visual Basic,It executes shellcode and a VBA script to decode Base64 strings. + Command and Scripting Interpreter:Visual Basic,It has used VBScript to execute commands and other operational tasks. + Command and Scripting Interpreter:Visual Basic,It has utilized malicious VBS scripts in malware. Command and Scripting Interpreter:Visual Basic,Astaroth has used malicious VBS e-mail attachments for execution. Command and Scripting Interpreter:Visual Basic,BackConfig has used VBS to install its downloader component and malicious documents with VBA macro code. Command and Scripting Interpreter:Visual Basic,Bandook has used malicious VBA code against the target system. @@ -1630,8 +1630,8 @@ prompt,procedure Command and Scripting Interpreter:Visual Basic,It has used VBScript in its operations. Command and Scripting Interpreter:Visual Basic,Xbash can execute malicious VBScript payloads on the victim’s machine. Command and Scripting Interpreter:Python,It has developed malware variants written in Python. - Command and Scripting Interpreter:Python,It7 has used Python scripts to execute payloads. - Command and Scripting Interpreter:Python,It9 has used a command line utility and a network scanner written in python. + Command and Scripting Interpreter:Python,It has used Python scripts to execute payloads. + Command and Scripting Interpreter:Python,It has used a command line utility and a network scanner written in python. Command and Scripting Interpreter:Python,Bandook can support commands to execute Python-based payloads. Command and Scripting Interpreter:Python,It has made use of Python-based remote access tools. Command and Scripting Interpreter:Python,Bundlore has used Python scripts to execute payloads. @@ -1668,7 +1668,7 @@ prompt,procedure Command and Scripting Interpreter:Python,It has used IronPython scripts as part of the IronNetInjector toolchain to drop payloads. Command and Scripting Interpreter:Python,ItM has used Python-based implants to interact with compromised hosts. Command and Scripting Interpreter:JavaScript,AppleSeed has the ability to use JavaScript to execute PowerShell. - Command and Scripting Interpreter:JavaScript,It2 has used JavaScript for drive-by downloads and C2 communications. + Command and Scripting Interpreter:JavaScript,It has used JavaScript for drive-by downloads and C2 communications. Command and Scripting Interpreter:JavaScript,Astaroth uses JavaScript to perform its core functionalities. Command and Scripting Interpreter:JavaScript,Avaddon has been executed through a malicious JScript downloader. Command and Scripting Interpreter:JavaScript,Bundlore can execute JavaScript by injecting it into the victim's browser. @@ -1727,13 +1727,13 @@ prompt,procedure Exploitation for Client Execution,Agent Tesla has exploited Office vulnerabilities such as CVE-2017-11882 and CVE-2017-8570 for execution during delivery. Exploitation for Client Execution,"It has exploited numerous ActiveX vulnerabilities, including zero-days." Exploitation for Client Execution,It has exploited CVE-2012-0158 and CVE-2010-3333 for execution against targeted systems. - Exploitation for Client Execution,"It2 has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities (CVE-2009-3129, CVE-2012-0158) and vulnerabilities in Adobe Reader and Flash (CVE-2009-4324, CVE-2009-0927, CVE-2011-0609, CVE-2011-0611)." + Exploitation for Client Execution,"It has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities (CVE-2009-3129, CVE-2012-0158) and vulnerabilities in Adobe Reader and Flash (CVE-2009-4324, CVE-2009-0927, CVE-2011-0609, CVE-2011-0611)." Exploitation for Client Execution,It has exploited Microsoft Office vulnerability CVE-2017-0262 for execution. Exploitation for Client Execution,"It has used multiple software exploits for common client software, like Microsoft Word, Exchange, and Adobe Reader, to gain code execution." Exploitation for Client Execution,It has exploited the Adobe Flash Player vulnerability CVE-2015-3113 and Internet Explorer vulnerability CVE-2014-1776. - Exploitation for Client Execution,It2 has used RTF document that includes an exploit to execute malicious code. (CVE-2017-11882) - Exploitation for Client Execution,"It3 has attempted to exploit a known vulnerability in WinRAR (CVE-2018-20250), and attempted to gain remote code execution via a security bypass vulnerability (CVE-2017-11774)." - Exploitation for Client Execution,"It7 has used exploits for Flash Player (CVE-2016-4117, CVE-2018-4878), Word (CVE-2017-0199), Internet Explorer (CVE-2020-1380 and CVE-2020-26411), and Microsoft Edge (CVE-2021-26411) for execution." + Exploitation for Client Execution,It has used RTF document that includes an exploit to execute malicious code. (CVE-2017-11882) + Exploitation for Client Execution,"It has attempted to exploit a known vulnerability in WinRAR (CVE-2018-20250), and attempted to gain remote code execution via a security bypass vulnerability (CVE-2017-11774)." + Exploitation for Client Execution,"It has used exploits for Flash Player (CVE-2016-4117, CVE-2018-4878), Word (CVE-2017-0199), Internet Explorer (CVE-2020-1380 and CVE-2020-26411), and Microsoft Edge (CVE-2021-26411) for execution." Exploitation for Client Execution,"It leveraged the follow exploits in their operations: CVE-2012-0158, CVE-2015-1641, CVE-2017-0199, CVE-2017-11882, and CVE-2019-3396. " Exploitation for Client Execution,"It has used exploits for multiple vulnerabilities including CVE-2014-0322, CVE-2012-4792, CVE-2012-1889, and CVE-2013-3893." Exploitation for Client Execution,Bankshot leverages a known zero-day vulnerability in Adobe Flash to execute the implant into the victims’ machines. @@ -1793,7 +1793,7 @@ prompt,procedure Inter-Process Communication:Component Object Model,TrickBot used COM to setup scheduled task for persistence. Inter-Process Communication:Component Object Model,Ursnif droppers have used COM objects to execute the malware's full executable payload. Inter-Process Communication:Dynamic Data Exchange,It has delivered JHUHUGIT and Koadic by executing PowerShell commands through DDE in Word documents. - Inter-Process Communication:Dynamic Data Exchange,It7 has used Windows DDE for execution of commands and a malicious VBS. + Inter-Process Communication:Dynamic Data Exchange,It has used Windows DDE for execution of commands and a malicious VBS. Inter-Process Communication:Dynamic Data Exchange,It has executed OLE objects using Microsoft It Editor to download and run malicious payloads. Inter-Process Communication:Dynamic Data Exchange,It has sent malicious Word OLE compound documents to victims. Inter-Process Communication:Dynamic Data Exchange,It spear phishing campaigns have included malicious Word documents with DDE execution. @@ -1815,8 +1815,8 @@ prompt,procedure Native API,ADVSTORESHELL is capable of starting a process using CreateProcess. Native API,"Amadey has used a variety of Windows API calls, including GetComputerNameA, GetUserNameA, and CreateProcessA." Native API,AppleSeed has the ability to use multiple dynamically resolved API calls. - Native API,"It7 leverages the Windows API calls: VirtualAlloc(), WriteProcessMemory(), and CreateRemoteThread() for process injection." - Native API,It8 has used the Windows API to execute code within a victim's system. + Native API,"It leverages the Windows API calls: VirtualAlloc(), WriteProcessMemory(), and CreateRemoteThread() for process injection." + Native API,It has used the Windows API to execute code within a victim's system. Native API,Aria-body has the ability to launch files using ShellExecute. Native API,AsyncRAT has the ability to use OS APIs including CheckRemoteDebuggerPresent. Native API,Attor's dispatcher has used CreateProcessW API for execution. @@ -1990,14 +1990,14 @@ prompt,procedure Scheduled Task,"Lokibot's second stage DLL has set a timer using ""timeSetEvent"" to schedule its next execution." Scheduled Task,Remsec schedules the execution one of its modules by creating a new scheduler task. Scheduled Task,StrifeWater has create a scheduled task named Mozilla\Firefox Default Browser Agent 409046Z0FF4A39CB for persistence. - Scheduled Task,It8 actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network. + Scheduled Task,It actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network. Scheduled Task,at can be used to schedule a task on a system to be executed at a specific date or time. Scheduled Task,It has used at to register a scheduled task to execute malware during lateral movement. Scheduled Task,CrackMapExec can set a scheduled task on the target system to execute commands remotely using at. Scheduled Task,MURKYTOP has the capability to schedule remote AT jobs. Scheduled Task,"It actors use at to schedule tasks to run self-extracting RAR archives, which install HTTPBrowser or PlugX on other victims on a network." Scheduled Task,Anchor can install itself as a cron job. - Scheduled Task,It8 has used cron to create pre-scheduled and periodic background jobs on a Linux system. + Scheduled Task,It has used cron to create pre-scheduled and periodic background jobs on a Linux system. Scheduled Task,Exaramel for Linux uses crontab for persistence if it does not have root privileges. Scheduled Task,The GoldMax Linux variant has used a crontab entry with a @reboot line to gain persistence. Scheduled Task,Janicab used a cron job for persistence on Mac devices. @@ -2014,11 +2014,11 @@ prompt,procedure Scheduled Task,"It has used a macro function to set scheduled tasks, disguised as those used by Google." Scheduled Task,It has used named and hijacked scheduled tasks to establish persistence. Scheduled Task,"An It downloader creates persistence by creating the following scheduled task: schtasks /create /tn ""mysc"" /tr C:\Users\Public\test.exe /sc ONLOGON /ru ""System""." - Scheduled Task,It2 has used scheduled tasks to persist on victim systems. - Scheduled Task,It3 has created a scheduled task to execute a .vbe file multiple times a day. - Scheduled Task,It7 has created scheduled tasks to run malicious scripts on a compromised host. - Scheduled Task,It8 has used Task Scheduler to run programs at system startup or on a scheduled basis for persistence. - Scheduled Task,It9 has created scheduled tasks for persistence. + Scheduled Task,It has used scheduled tasks to persist on victim systems. + Scheduled Task,It has created a scheduled task to execute a .vbe file multiple times a day. + Scheduled Task,It has created scheduled tasks to run malicious scripts on a compromised host. + Scheduled Task,It has used Task Scheduler to run programs at system startup or on a scheduled basis for persistence. + Scheduled Task,It has created scheduled tasks for persistence. Scheduled Task,It used a compromised account to create a scheduled task on a system. Scheduled Task,AsyncRAT can create a scheduled task to maintain persistence on system start-up. Scheduled Task,Attor's installer plugin can schedule a new task that loads the dispatcher on boot/logon. @@ -2172,7 +2172,7 @@ prompt,procedure Shared Modules,RotaJakiro uses dynamically linked shared libraries (.so files) to execute additional functionality using dlopen() and dlsym(). Shared Modules,Stuxnet calls LoadLibrary then executes exports from a DLL. Shared Modules,TajMahal has the ability to inject the LoadLibrary call template DLL into running processes. - Software Deployment Tools,It2 compromised McAfee ePO to move laterally by distributing malware as a software deployment task. + Software Deployment Tools,It compromised McAfee ePO to move laterally by distributing malware as a software deployment task. Software Deployment Tools,"During C0018, the threat actors used PDQ Deploy to move AvosLocker and tools across the network." Software Deployment Tools,It has used the commercially available tool RemoteExec for agentless remote code execution. Software Deployment Tools,"It has used RAdmin, a remote software tool used to remotely control workstations and ATMs." @@ -2185,9 +2185,9 @@ prompt,procedure System Services:Launchctl,macOS.OSAMiner has used launchctl to restart the Launch Agent. System Services:Launchctl,XCSSET loads a system level launchdaemon using the launchctl load -w command from /System/Librarby/LaunchDaemons/ssh.plist. System Services:Service Execution,Anchor can create and execute services to load its payload. - System Services:Service Execution,It2's backdoor has used Windows services as a way to execute its malicious payload. - System Services:Service Execution,"It8 has created new services or modified existing ones to run executables, commands, or scripts." - System Services:Service Execution,It9 has used post-exploitation tools including RemCom and the Non-sucking Service Manager (NSSM) to execute processes. + System Services:Service Execution,It's backdoor has used Windows services as a way to execute its malicious payload. + System Services:Service Execution,"It has created new services or modified existing ones to run executables, commands, or scripts." + System Services:Service Execution,It has used post-exploitation tools including RemCom and the Non-sucking Service Manager (NSSM) to execute processes. System Services:Service Execution,It used svchost.exe and Net to execute a system service installed to launch a Cobalt Strike BEACON loader. System Services:Service Execution,Attor's dispatcher can be executed as a service. System Services:Service Execution,Bad Rabbit drops a file named infpub.datinto the Windows directory and is executed through SCManager and rundll.exe. @@ -2246,9 +2246,9 @@ prompt,procedure User Execution:Malicious Link,It has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders. User Execution:Malicious Link,It has used various forms of spearphishing attempting to get a user to click on a malicous link. User Execution:Malicious Link,It has lured victims into clicking malicious links delivered through spearphishing. - User Execution:Malicious Link,It2 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails. - User Execution:Malicious Link,It3 has lured users to click links to malicious HTML applications delivered via spearphishing emails. - User Execution:Malicious Link,It9 has sent spearphishing emails in an attempt to lure users to click on a malicious link. + User Execution:Malicious Link,It has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails. + User Execution:Malicious Link,It has lured users to click links to malicious HTML applications delivered via spearphishing emails. + User Execution:Malicious Link,It has sent spearphishing emails in an attempt to lure users to click on a malicious link. User Execution:Malicious Link,BackConfig has compromised victims via links to URLs hosting malicious content. User Execution:Malicious Link,Bazar can gain execution after a user clicks on a malicious link to decoy landing pages hosted on Google Docs. User Execution:Malicious Link,It has used e-mails with malicious links to lure victims into installing malware. @@ -2319,16 +2319,16 @@ prompt,procedure User Execution:Malicious File,AppleJeus has required user execution of a malicious MSI installer. User Execution:Malicious File,AppleSeed can achieve execution through users running malicious file attachments distributed via email. User Execution:Malicious File,It has prompted victims to accept macros in order to execute the subsequent payload. - User Execution:Malicious File,It2 has attempted to get victims to open malicious Microsoft Word and PDF attachment sent via spearphishing. - User Execution:Malicious File,It9 attempted to get users to launch malicious attachments delivered via spearphishing emails. + User Execution:Malicious File,It has attempted to get victims to open malicious Microsoft Word and PDF attachment sent via spearphishing. + User Execution:Malicious File,It attempted to get users to launch malicious attachments delivered via spearphishing emails. User Execution:Malicious File,It attempted to get users to click on Microsoft Office attachments containing malicious macro scripts. User Execution:Malicious File,"It has used various forms of spearphishing attempting to get a user to open attachments, including, but not limited to, malicious Microsoft Word documents, .pdf, and .lnk files. " - User Execution:Malicious File,It0 has relied on users to execute malicious file attachments delivered via spearphishing emails. - User Execution:Malicious File,It2 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment. - User Execution:Malicious File,It3 has used malicious e-mail attachments to lure victims into executing malware. - User Execution:Malicious File,It7 has sent spearphishing attachments attempting to get a user to open them. - User Execution:Malicious File,It8 has attempted to lure victims into enabling malicious macros within email attachments. - User Execution:Malicious File,It9 has sent spearphishing emails in an attempt to lure users to click on a malicious attachment. + User Execution:Malicious File,It has relied on users to execute malicious file attachments delivered via spearphishing emails. + User Execution:Malicious File,It has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment. + User Execution:Malicious File,It has used malicious e-mail attachments to lure victims into executing malware. + User Execution:Malicious File,It has sent spearphishing attachments attempting to get a user to open them. + User Execution:Malicious File,It has attempted to lure victims into enabling malicious macros within email attachments. + User Execution:Malicious File,It has sent spearphishing emails in an attempt to lure users to click on a malicious attachment. User Execution:Malicious File,"Astaroth has used malicious files including VBS, LNK, and HTML for execution." User Execution:Malicious File,Bad Rabbit has been executed through user installation of an executable disguised as a flash installer. User Execution:Malicious File,BADFLICK has relied upon users clicking on a malicious attachment delivered through spearphishing. @@ -2477,7 +2477,7 @@ prompt,procedure Windows Management Instrumentation,Action RAT can use WMI to gather AV products installed on an infected host. Windows Management Instrumentation,Agent Tesla has used wmi queries to gather information from the system. Windows Management Instrumentation,It used WMI to steal credentials and execute backdoors at a future time. - Windows Management Instrumentation,It2 used WMI to deploy their tools on remote machines and to gather information about the Outlook process. + Windows Management Instrumentation,It used WMI to deploy their tools on remote machines and to gather information about the Outlook process. Windows Management Instrumentation,"It used WMI in several ways, including for execution of commands via WMIEXEC as well as for persistence via PowerSploit." Windows Management Instrumentation,Astaroth uses WMIC to execute payloads. Windows Management Instrumentation,Avaddon uses wmic.exe to delete shadow copies. @@ -2617,7 +2617,7 @@ prompt,procedure Account Manipulation:Device Registration,It has enrolled a device in MFA to an Azure AD environment following a successful password guessing attack against a dormant account. Account Manipulation:Device Registration,"During C0027, It registered devices for MFA to maintain persistence through victims' VPN." Account Manipulation:Device Registration,"During the SolarWinds Compromise, It registered devices in order to enable mailbox syncing via the Set-CASMailbox command." - BITS Jobs,It9 has used the BITS protocol to exfiltrate stolen data from a compromised host. + BITS Jobs,It has used the BITS protocol to exfiltrate stolen data from a compromised host. BITS Jobs,It used BITSAdmin to download and install payloads. BITS Jobs,Bazar has been downloaded via Windows BITS functionality. BITS Jobs,BITSAdmin can be used to create BITS Jobs to launch a malicious process. @@ -2640,15 +2640,15 @@ prompt,procedure Boot or Logon Autostart Execution:Registry Run Keys ,Amadey has changed the Startup folder to the one containing its executable by overwriting the registry keys. Boot or Logon Autostart Execution:Registry Run Keys ,ANDROMEDA can establish persistence by dropping a sample of itself to C:\ProgramData\Local Settings\Temp\mskmde.com and adding a Registry run key to execute every time a user logs on. Boot or Logon Autostart Execution:Registry Run Keys ,AppleSeed has the ability to create the Registry key name EstsoftAutoUpdate at HKCU\Software\Microsoft/Windows\CurrentVersion\RunOnce to establish persistence. - Boot or Logon Autostart Execution:Registry Run Keys ,It8 establishes persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key. - Boot or Logon Autostart Execution:Registry Run Keys ,An It9 HTTP malware variant establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\. + Boot or Logon Autostart Execution:Registry Run Keys ,It establishes persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key. + Boot or Logon Autostart Execution:Registry Run Keys ,An It HTTP malware variant establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\. Boot or Logon Autostart Execution:Registry Run Keys ,It has deployed malware that has copied itself to the startup directory for persistence. Boot or Logon Autostart Execution:Registry Run Keys ,It added Registry Run keys to establish persistence. Boot or Logon Autostart Execution:Registry Run Keys ,It places scripts in the startup folder for persistence. - Boot or Logon Autostart Execution:Registry Run Keys ,"It2 established persistence using Registry Run keys, both to execute PowerShell and VBS scripts as well as to execute their backdoor directly." - Boot or Logon Autostart Execution:Registry Run Keys ,"It3 has deployed a tool known as DarkComet to the Startup folder of a victim, and used Registry run keys to gain persistence." - Boot or Logon Autostart Execution:Registry Run Keys ,It7's has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\. - Boot or Logon Autostart Execution:Registry Run Keys ,It9 has maintained persistence using the startup folder. + Boot or Logon Autostart Execution:Registry Run Keys ,"It established persistence using Registry Run keys, both to execute PowerShell and VBS scripts as well as to execute their backdoor directly." + Boot or Logon Autostart Execution:Registry Run Keys ,"It has deployed a tool known as DarkComet to the Startup folder of a victim, and used Registry run keys to gain persistence." + Boot or Logon Autostart Execution:Registry Run Keys ,It's has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\. + Boot or Logon Autostart Execution:Registry Run Keys ,It has maintained persistence using the startup folder. Boot or Logon Autostart Execution:Registry Run Keys ,It created and modified startup files for persistence. It added a registry key in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost to establish persistence for Cobalt Strike. Boot or Logon Autostart Execution:Registry Run Keys ,Aria-body has established persistence via the Startup folder or Run Registry key. Boot or Logon Autostart Execution:Registry Run Keys ,Astaroth creates a startup item for persistence. @@ -2882,7 +2882,7 @@ prompt,procedure Boot or Logon Autostart Execution:Kernel Modules and Extensions,Skidmap has the ability to install several loadable kernel modules (LKMs) on infected machines. Boot or Logon Autostart Execution:LSASS Driver,Pasam establishes by infecting the Security Accounts Manager (SAM) DLL to load a malicious DLL dropped to disk. Boot or Logon Autostart Execution:LSASS Driver,"Wingbird drops a malicious file (sspisrv.dll) alongside a copy of lsass.exe, which is used to register a service that loads sspisrv.dll as a driver. The payload of the malicious driver (located in its entry-point function) is executed when loaded by lsass.exe before the spoofed service becomes unstable and crashes." - Boot or Logon Autostart Execution:Shortcut Modification,It9 has modified LNK shortcuts. + Boot or Logon Autostart Execution:Shortcut Modification,It has modified LNK shortcuts. Boot or Logon Autostart Execution:Shortcut Modification,Astaroth's initial payload is a malicious .LNK file. Boot or Logon Autostart Execution:Shortcut Modification,BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory. Boot or Logon Autostart Execution:Shortcut Modification,Bazar can establish persistence by writing shortcuts to the Windows Startup folder. @@ -2953,7 +2953,7 @@ prompt,procedure Create Account,"During the 2016 Ukraine Electric Power Attack, It added a login to a SQL Server with sp_addlinkedsrvlogin." Create Account,It used wmic.exe to add a new user to the system. Create Account:Local Account,"It has been known to create or enable accounts, such as support_388945a0." - Create Account:Local Account,It9 has created accounts on multiple compromised hosts to perform actions within the network. + Create Account:Local Account,It has created accounts on multiple compromised hosts to perform actions within the network. Create Account:Local Account,It has created user accounts. Create Account:Local Account,Calisto has the capability to add its own account to the victim's machine. Create Account:Local Account,It can create a Windows account. @@ -3019,10 +3019,10 @@ prompt,procedure Create or Modify System Process:Windows Service,"During the 2016 Ukraine Electric Power Attack, It used an arbitrary system service to load at system boot for persistence for Industroyer. They also replaced the ImagePath registry value of a Windows service with a new backdoor binary. " Create or Modify System Process:Windows Service,Anchor can establish persistence by creating a service. Create or Modify System Process:Windows Service,AppleJeus can install itself as a service. - Create or Modify System Process:Windows Service,An It9 Port 22 malware variant registers itself as a service. + Create or Modify System Process:Windows Service,An It Port 22 malware variant registers itself as a service. Create or Modify System Process:Windows Service,It has a tool that creates a new service for persistence. - Create or Modify System Process:Windows Service,It2 modified Windows Services to ensure PowerShell scripts were loaded on the system. It2 also creates a Windows service to establish persistence. - Create or Modify System Process:Windows Service,It8 has installed a new Windows service to establish persistence. + Create or Modify System Process:Windows Service,It modified Windows Services to ensure PowerShell scripts were loaded on the system. It also creates a Windows service to establish persistence. + Create or Modify System Process:Windows Service,It has installed a new Windows service to establish persistence. Create or Modify System Process:Windows Service,It modified legitimate Windows services to install malware backdoors. It created the StorSyncSvc service to provide persistence for Cobalt Strike. Create or Modify System Process:Windows Service,Attor's dispatcher can establish persistence by registering a new service. Create or Modify System Process:Windows Service,AuditCred is installed as a new service on the system. @@ -3149,7 +3149,7 @@ prompt,procedure Event Triggered Execution:Screensaver,Gazer can establish persistence through the system screensaver by configuring it to execute the malware. Event Triggered Execution:Windows Management Instrumentation Event Subscription,adbupd can use a WMI script to achieve persistence. Event Triggered Execution:Windows Management Instrumentation Event Subscription,It has used WMI event subscriptions for persistence. - Event Triggered Execution:Windows Management Instrumentation Event Subscription,It3 has attempted to use WMI event subscriptions to establish persistence on compromised hosts. + Event Triggered Execution:Windows Management Instrumentation Event Subscription,It has attempted to use WMI event subscriptions to establish persistence on compromised hosts. Event Triggered Execution:Windows Management Instrumentation Event Subscription,BADHATCH can use WMI event subscriptions for persistence. Event Triggered Execution:Windows Management Instrumentation Event Subscription,It has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file. Event Triggered Execution:Windows Management Instrumentation Event Subscription,It has used WMI event subscriptions for persistence. @@ -3180,7 +3180,7 @@ prompt,procedure Event Triggered Execution:Accessibility Features,"Empire can leverage WMI debugging to remotely replace binaries like sethc.exe, Utilman.exe, and Magnify.exe with cmd.exe." Event Triggered Execution:Accessibility Features,It has used sticky keys to launch a command prompt. Event Triggered Execution:AppCert DLLs,PUNCHBUGGY can establish using a AppCertDLLs Registry key. - Event Triggered Execution:AppInit DLLs,It9 has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence. + Event Triggered Execution:AppInit DLLs,It has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence. Event Triggered Execution:AppInit DLLs,"Some variants of Cherry Picker use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows ""AppInit_DLLs""=""pserver32.dll""" Event Triggered Execution:AppInit DLLs,Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key. Event Triggered Execution:AppInit DLLs,"If a victim meets certain criteria, T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL, ResN32.dll. It does this by creating the following Registry keys: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs – %APPDATA%\Intel\ResN32.dll and HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs – 0x1." @@ -3206,7 +3206,7 @@ prompt,procedure Event Triggered Execution:Component Object Model Hijacking,WarzoneRAT can perform COM hijacking by setting the path to itself to the HKCU\Software\Classes\Folder\shell\open\command key with a DelegateExecute parameter. Event Triggered Execution:Installer Packages,"During AppleJeus's installation process, it uses postinstall scripts to extract a hidden plist from the application's /Resources folder and execute the plist file as a Launch Daemon with elevated permissions." External Remote Services,"During the 2015 Ukraine Electric Power Attack, It installed a modified Dropbear SSH client as the backdoor to target systems. " - External Remote Services,It8 actors leverage legitimate credentials to log into external remote services. + External Remote Services,It actors leverage legitimate credentials to log into external remote services. External Remote Services,It has used Tor and a variety of commercial VPN services to route brute force authentication attempts. External Remote Services,It has used compromised identities to access networks via VPNs and Citrix. External Remote Services,It compromised an online billing/payment service using VPN access between a third-party service provider and the targeted payment service. @@ -3272,9 +3272,9 @@ prompt,procedure Hijack Execution Flow:DLL Search Order Hijacking,WastedLocker has performed DLL hijacking before execution. Hijack Execution Flow:DLL Search Order Hijacking,"Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll)." Hijack Execution Flow:DLL Search Order Hijacking,It has used search order hijacking to run the loader Vcrodat. - Hijack Execution Flow:DLL Side-Loading,It9 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL. + Hijack Execution Flow:DLL Side-Loading,It launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL. Hijack Execution Flow:DLL Side-Loading,It has been known to side load DLLs with a valid version of Chrome with one of their tools. - Hijack Execution Flow:DLL Side-Loading,"It2 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder)." + Hijack Execution Flow:DLL Side-Loading,"It ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder)." Hijack Execution Flow:DLL Side-Loading,It used legitimate executables to perform DLL side-loading of their malware. Hijack Execution Flow:DLL Side-Loading,BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable. Hijack Execution Flow:DLL Side-Loading,"DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable, ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper." @@ -3360,7 +3360,7 @@ prompt,procedure Modify Authentication Process:Multi-Factor Authentication,The AADInternals Set-AADIntUserMFA command can be used to disable MFA for a specified user. Modify Authentication Process:Hybrid Identity,AADInternals can inject a malicious DLL (PTASpy) into the AzureADConnectAuthenticationAgentService to backdoor Azure AD Pass-Through Authentication. Modify Authentication Process:Hybrid Identity,"It has edited the Microsoft.IdentityServer.Servicehost.exe.config file to load a malicious DLL into the AD FS process, thereby enabling persistent access to any service federated with AD FS for a user with a specified User Principal Name." - Office Application Startup,It2 have replaced Microsoft Outlook's VbaProject.OTM file to install a backdoor macro for persistence. + Office Application Startup,It have replaced Microsoft Outlook's VbaProject.OTM file to install a backdoor macro for persistence. Office Application Startup,"It has inserted malicious macros into existing documents, providing persistence when they are reopened. It has loaded the group's previously delivered VBA project by relaunching Microsoft Outlook with the /altvba option, once the Application.Startup event is received." Office Application Startup:Office Template Macros,BackConfig has the ability to use hidden columns in Excel spreadsheets to store executable files or commands for VBA macros. Office Application Startup:Office Template Macros,Cobalt Strike has the ability to use an Excel Workbook to execute additional code by enabling Office to trust macros and execute code without user permission. @@ -3391,14 +3391,14 @@ prompt,procedure Scheduled Task,"Lokibot's second stage DLL has set a timer using ""timeSetEvent"" to schedule its next execution." Scheduled Task,Remsec schedules the execution one of its modules by creating a new scheduler task. Scheduled Task,StrifeWater has create a scheduled task named Mozilla\Firefox Default Browser Agent 409046Z0FF4A39CB for persistence. - Scheduled Task,It8 actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network. + Scheduled Task,It actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network. Scheduled Task,at can be used to schedule a task on a system to be executed at a specific date or time. Scheduled Task,It has used at to register a scheduled task to execute malware during lateral movement. Scheduled Task,CrackMapExec can set a scheduled task on the target system to execute commands remotely using at. Scheduled Task,MURKYTOP has the capability to schedule remote AT jobs. Scheduled Task,"It actors use at to schedule tasks to run self-extracting RAR archives, which install HTTPBrowser or PlugX on other victims on a network." Scheduled Task,Anchor can install itself as a cron job. - Scheduled Task,It8 has used cron to create pre-scheduled and periodic background jobs on a Linux system. + Scheduled Task,It has used cron to create pre-scheduled and periodic background jobs on a Linux system. Scheduled Task,Exaramel for Linux uses crontab for persistence if it does not have root privileges. Scheduled Task,The GoldMax Linux variant has used a crontab entry with a @reboot line to gain persistence. Scheduled Task,Janicab used a cron job for persistence on Mac devices. @@ -3415,11 +3415,11 @@ prompt,procedure Scheduled Task,"It has used a macro function to set scheduled tasks, disguised as those used by Google." Scheduled Task,It has used named and hijacked scheduled tasks to establish persistence. Scheduled Task,"An It downloader creates persistence by creating the following scheduled task: schtasks /create /tn ""mysc"" /tr C:\Users\Public\test.exe /sc ONLOGON /ru ""System""." - Scheduled Task,It2 has used scheduled tasks to persist on victim systems. - Scheduled Task,It3 has created a scheduled task to execute a .vbe file multiple times a day. - Scheduled Task,It7 has created scheduled tasks to run malicious scripts on a compromised host. - Scheduled Task,It8 has used Task Scheduler to run programs at system startup or on a scheduled basis for persistence. - Scheduled Task,It9 has created scheduled tasks for persistence. + Scheduled Task,It has used scheduled tasks to persist on victim systems. + Scheduled Task,It has created a scheduled task to execute a .vbe file multiple times a day. + Scheduled Task,It has created scheduled tasks to run malicious scripts on a compromised host. + Scheduled Task,It has used Task Scheduler to run programs at system startup or on a scheduled basis for persistence. + Scheduled Task,It has created scheduled tasks for persistence. Scheduled Task,It used a compromised account to create a scheduled task on a system. Scheduled Task,AsyncRAT can create a scheduled task to maintain persistence on system start-up. Scheduled Task,Attor's installer plugin can schedule a new task that loads the dispatcher on boot/logon. @@ -3559,9 +3559,9 @@ prompt,procedure Server Software Component:Transport Agent,LightNeuron has used a malicious Microsoft Exchange transport agent for persistence. Server Software Component:Web Shell,It has used a modified and obfuscated version of the reGeorg web shell to maintain persistence on a target's Outlook Web Access (OWA) server. Server Software Component:Web Shell,It has installed web shells on exploited Microsoft Exchange servers. - Server Software Component:Web Shell,It2 has used Web shells to maintain access to victim websites. - Server Software Component:Web Shell,It8 has used web shells for persistence or to ensure redundant access. - Server Software Component:Web Shell,It9 has installed ANTAK and ASPXSPY web shells. + Server Software Component:Web Shell,It has used Web shells to maintain access to victim websites. + Server Software Component:Web Shell,It has used web shells for persistence or to ensure redundant access. + Server Software Component:Web Shell,It has installed ANTAK and ASPXSPY web shells. Server Software Component:Web Shell,ASPXSpy is a Web shell. The ASPXTool version used by It has been deployed to accessible servers running Internet Information Services (IIS). Server Software Component:Web Shell,It has used web shells to establish an initial foothold and for lateral movement within a victim's system. Server Software Component:Web Shell,"During C0017, It deployed JScript web shells through the creation of malicious ViewState objects." @@ -3608,11 +3608,11 @@ prompt,procedure Traffic Signaling:Port Knocking,It has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports. Traffic Signaling:Socket Filters,Penquin installs a TCP and UDP filter on the eth0 interface. Valid Accounts,"During the 2015 Ukraine Electric Power Attack, It used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network. " - Valid Accounts,It8 actors leverage legitimate credentials to log into external remote services. + Valid Accounts,It actors leverage legitimate credentials to log into external remote services. Valid Accounts,"It has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder." Valid Accounts,It has used a compromised account to access an organization's VPN infrastructure. - Valid Accounts,It3 has used valid accounts for initial access and privilege escalation. - Valid Accounts,It9 has used stolen credentials to compromise Outlook Web Access (OWA). + Valid Accounts,It has used valid accounts for initial access and privilege escalation. + Valid Accounts,It has used stolen credentials to compromise Outlook Web Access (OWA). Valid Accounts,It used compromised credentials to log on to other systems. Valid Accounts,It has used previously compromised administrative accounts to escalate privileges. Valid Accounts,It actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars. @@ -3674,7 +3674,7 @@ prompt,procedure Valid Accounts:Domain Accounts,"It actors used compromised domain credentials for the victim's endpoint management platform, Altiris, to move laterally." Valid Accounts:Domain Accounts,It has used compromised domain accounts to authenticate to devices on compromised networks. Valid Accounts:Domain Accounts,"It has used administrative accounts, including Domain Admin, to move laterally within a victim network." - Valid Accounts:Local Accounts,It2 has used legitimate local admin account credentials. + Valid Accounts:Local Accounts,It has used legitimate local admin account credentials. Valid Accounts:Local Accounts,Cobalt Strike can use known credentials to run commands and spawn processes as a local user account. Valid Accounts:Local Accounts,"Emotet can brute force a local admin password, then use it to facilitate lateral movement." Valid Accounts:Local Accounts,It has moved laterally using the Local Administrator account. @@ -3689,7 +3689,7 @@ prompt,procedure Valid Accounts:Local Accounts,Umbreon creates valid local users to provide access to the system. Valid Accounts:Cloud Accounts,It has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes. Valid Accounts:Cloud Accounts,It has gained access to a global administrator account in Azure AD and has used Service Principal credentials in Exchange. - Valid Accounts:Cloud Accounts,It3 has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints. + Valid Accounts:Cloud Accounts,It has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints. Valid Accounts:Cloud Accounts,"During C0027, It leveraged compromised credentials from victim users to authenticate to Azure tenants." Valid Accounts:Cloud Accounts,It has used compromised credentials to sign into victims’ Microsoft 365 accounts. Valid Accounts:Cloud Accounts,It has used compromised credentials to access cloud assets within a target organization. @@ -3701,7 +3701,7 @@ prompt,procedure Abuse Elevation Control Mechanism:Setuid and Setgid,Keydnap adds the setuid flag to a binary so it can easily elevate in the future. Abuse Elevation Control Mechanism:Bypass User Account Control,AppleJeus has presented the user with a UAC prompt to elevate privileges while installing. Abuse Elevation Control Mechanism:Bypass User Account Control,It has bypassed UAC. - Abuse Elevation Control Mechanism:Bypass User Account Control,It7 has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges. + Abuse Elevation Control Mechanism:Bypass User Account Control,It has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges. Abuse Elevation Control Mechanism:Bypass User Account Control,AutoIt backdoor attempts to escalate privileges by bypassing User Access Control. Abuse Elevation Control Mechanism:Bypass User Account Control,Avaddon bypasses UAC using the CMSTPLUA COM interface. Abuse Elevation Control Mechanism:Bypass User Account Control,Bad Rabbit has attempted to bypass UAC and gain elevated administrative privileges. @@ -3853,15 +3853,15 @@ prompt,procedure Boot or Logon Autostart Execution:Registry Run Keys ,Amadey has changed the Startup folder to the one containing its executable by overwriting the registry keys. Boot or Logon Autostart Execution:Registry Run Keys ,ANDROMEDA can establish persistence by dropping a sample of itself to C:\ProgramData\Local Settings\Temp\mskmde.com and adding a Registry run key to execute every time a user logs on. Boot or Logon Autostart Execution:Registry Run Keys ,AppleSeed has the ability to create the Registry key name EstsoftAutoUpdate at HKCU\Software\Microsoft/Windows\CurrentVersion\RunOnce to establish persistence. - Boot or Logon Autostart Execution:Registry Run Keys ,It8 establishes persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key. - Boot or Logon Autostart Execution:Registry Run Keys ,An It9 HTTP malware variant establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\. + Boot or Logon Autostart Execution:Registry Run Keys ,It establishes persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key. + Boot or Logon Autostart Execution:Registry Run Keys ,An It HTTP malware variant establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\. Boot or Logon Autostart Execution:Registry Run Keys ,It has deployed malware that has copied itself to the startup directory for persistence. Boot or Logon Autostart Execution:Registry Run Keys ,It added Registry Run keys to establish persistence. Boot or Logon Autostart Execution:Registry Run Keys ,It places scripts in the startup folder for persistence. - Boot or Logon Autostart Execution:Registry Run Keys ,"It2 established persistence using Registry Run keys, both to execute PowerShell and VBS scripts as well as to execute their backdoor directly." - Boot or Logon Autostart Execution:Registry Run Keys ,"It3 has deployed a tool known as DarkComet to the Startup folder of a victim, and used Registry run keys to gain persistence." - Boot or Logon Autostart Execution:Registry Run Keys ,It7's has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\. - Boot or Logon Autostart Execution:Registry Run Keys ,It9 has maintained persistence using the startup folder. + Boot or Logon Autostart Execution:Registry Run Keys ,"It established persistence using Registry Run keys, both to execute PowerShell and VBS scripts as well as to execute their backdoor directly." + Boot or Logon Autostart Execution:Registry Run Keys ,"It has deployed a tool known as DarkComet to the Startup folder of a victim, and used Registry run keys to gain persistence." + Boot or Logon Autostart Execution:Registry Run Keys ,It's has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\. + Boot or Logon Autostart Execution:Registry Run Keys ,It has maintained persistence using the startup folder. Boot or Logon Autostart Execution:Registry Run Keys ,It created and modified startup files for persistence. It added a registry key in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost to establish persistence for Cobalt Strike. Boot or Logon Autostart Execution:Registry Run Keys ,Aria-body has established persistence via the Startup folder or Run Registry key. Boot or Logon Autostart Execution:Registry Run Keys ,Astaroth creates a startup item for persistence. @@ -4095,7 +4095,7 @@ prompt,procedure Boot or Logon Autostart Execution:Kernel Modules and Extensions,Skidmap has the ability to install several loadable kernel modules (LKMs) on infected machines. Boot or Logon Autostart Execution:LSASS Driver,Pasam establishes by infecting the Security Accounts Manager (SAM) DLL to load a malicious DLL dropped to disk. Boot or Logon Autostart Execution:LSASS Driver,"Wingbird drops a malicious file (sspisrv.dll) alongside a copy of lsass.exe, which is used to register a service that loads sspisrv.dll as a driver. The payload of the malicious driver (located in its entry-point function) is executed when loaded by lsass.exe before the spoofed service becomes unstable and crashes." - Boot or Logon Autostart Execution:Shortcut Modification,It9 has modified LNK shortcuts. + Boot or Logon Autostart Execution:Shortcut Modification,It has modified LNK shortcuts. Boot or Logon Autostart Execution:Shortcut Modification,Astaroth's initial payload is a malicious .LNK file. Boot or Logon Autostart Execution:Shortcut Modification,BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory. Boot or Logon Autostart Execution:Shortcut Modification,Bazar can establish persistence by writing shortcuts to the Windows Startup folder. @@ -4181,10 +4181,10 @@ prompt,procedure Create or Modify System Process:Windows Service,"During the 2016 Ukraine Electric Power Attack, It used an arbitrary system service to load at system boot for persistence for Industroyer. They also replaced the ImagePath registry value of a Windows service with a new backdoor binary. " Create or Modify System Process:Windows Service,Anchor can establish persistence by creating a service. Create or Modify System Process:Windows Service,AppleJeus can install itself as a service. - Create or Modify System Process:Windows Service,An It9 Port 22 malware variant registers itself as a service. + Create or Modify System Process:Windows Service,An It Port 22 malware variant registers itself as a service. Create or Modify System Process:Windows Service,It has a tool that creates a new service for persistence. - Create or Modify System Process:Windows Service,It2 modified Windows Services to ensure PowerShell scripts were loaded on the system. It2 also creates a Windows service to establish persistence. - Create or Modify System Process:Windows Service,It8 has installed a new Windows service to establish persistence. + Create or Modify System Process:Windows Service,It modified Windows Services to ensure PowerShell scripts were loaded on the system. It also creates a Windows service to establish persistence. + Create or Modify System Process:Windows Service,It has installed a new Windows service to establish persistence. Create or Modify System Process:Windows Service,It modified legitimate Windows services to install malware backdoors. It created the StorSyncSvc service to provide persistence for Cobalt Strike. Create or Modify System Process:Windows Service,Attor's dispatcher can establish persistence by registering a new service. Create or Modify System Process:Windows Service,AuditCred is installed as a new service on the system. @@ -4324,7 +4324,7 @@ prompt,procedure Event Triggered Execution:Screensaver,Gazer can establish persistence through the system screensaver by configuring it to execute the malware. Event Triggered Execution:Windows Management Instrumentation Event Subscription,adbupd can use a WMI script to achieve persistence. Event Triggered Execution:Windows Management Instrumentation Event Subscription,It has used WMI event subscriptions for persistence. - Event Triggered Execution:Windows Management Instrumentation Event Subscription,It3 has attempted to use WMI event subscriptions to establish persistence on compromised hosts. + Event Triggered Execution:Windows Management Instrumentation Event Subscription,It has attempted to use WMI event subscriptions to establish persistence on compromised hosts. Event Triggered Execution:Windows Management Instrumentation Event Subscription,BADHATCH can use WMI event subscriptions for persistence. Event Triggered Execution:Windows Management Instrumentation Event Subscription,It has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file. Event Triggered Execution:Windows Management Instrumentation Event Subscription,It has used WMI event subscriptions for persistence. @@ -4355,7 +4355,7 @@ prompt,procedure Event Triggered Execution:Accessibility Features,"Empire can leverage WMI debugging to remotely replace binaries like sethc.exe, Utilman.exe, and Magnify.exe with cmd.exe." Event Triggered Execution:Accessibility Features,It has used sticky keys to launch a command prompt. Event Triggered Execution:AppCert DLLs,PUNCHBUGGY can establish using a AppCertDLLs Registry key. - Event Triggered Execution:AppInit DLLs,It9 has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence. + Event Triggered Execution:AppInit DLLs,It has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence. Event Triggered Execution:AppInit DLLs,"Some variants of Cherry Picker use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows ""AppInit_DLLs""=""pserver32.dll""" Event Triggered Execution:AppInit DLLs,Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key. Event Triggered Execution:AppInit DLLs,"If a victim meets certain criteria, T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL, ResN32.dll. It does this by creating the following Registry keys: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs – %APPDATA%\Intel\ResN32.dll and HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs – 0x1." @@ -4382,8 +4382,8 @@ prompt,procedure Event Triggered Execution:Installer Packages,"During AppleJeus's installation process, it uses postinstall scripts to extract a hidden plist from the application's /Resources folder and execute the plist file as a Launch Daemon with elevated permissions." Exploitation for Privilege Escalation,"It has exploited CVE-2014-4076, CVE-2015-2387, CVE-2015-1701, CVE-2017-0263 to escalate privileges." Exploitation for Privilege Escalation,It has exploited CVE-2021-36934 to escalate privileges on a compromised host. - Exploitation for Privilege Escalation,It2 has used CVE-2016-7255 to escalate privileges. - Exploitation for Privilege Escalation,It3 has used a publicly available exploit for CVE-2017-0213 to escalate privileges on a local system. + Exploitation for Privilege Escalation,It has used CVE-2016-7255 to escalate privileges. + Exploitation for Privilege Escalation,It has used a publicly available exploit for CVE-2017-0213 to escalate privileges on a local system. Exploitation for Privilege Escalation,It has exploited CVE-2021-1732 for privilege escalation. Exploitation for Privilege Escalation,"During C0017, It abused named pipe impersonation for privilege escalation." Exploitation for Privilege Escalation,"Carberp has exploited multiple Windows vulnerabilities (CVE-2010-2743, CVE-2010-3338, CVE-2010-4398, CVE-2008-1084) and a .NET Runtime Optimization vulnerability for privilege escalation." @@ -4448,9 +4448,9 @@ prompt,procedure Hijack Execution Flow:DLL Search Order Hijacking,WastedLocker has performed DLL hijacking before execution. Hijack Execution Flow:DLL Search Order Hijacking,"Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll)." Hijack Execution Flow:DLL Search Order Hijacking,It has used search order hijacking to run the loader Vcrodat. - Hijack Execution Flow:DLL Side-Loading,It9 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL. + Hijack Execution Flow:DLL Side-Loading,It launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL. Hijack Execution Flow:DLL Side-Loading,It has been known to side load DLLs with a valid version of Chrome with one of their tools. - Hijack Execution Flow:DLL Side-Loading,"It2 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder)." + Hijack Execution Flow:DLL Side-Loading,"It ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder)." Hijack Execution Flow:DLL Side-Loading,It used legitimate executables to perform DLL side-loading of their malware. Hijack Execution Flow:DLL Side-Loading,BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable. Hijack Execution Flow:DLL Side-Loading,"DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable, ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper." @@ -4526,8 +4526,8 @@ prompt,procedure Process Injection,ABK has the ability to inject shellcode into svchost.exe. Process Injection,"Agent Tesla can inject into known, vulnerable binaries on targeted hosts. " Process Injection,ANDROMEDA can inject into the wuauclt.exe process to perform C2 actions. - Process Injection,It2 malware has injected a Cobalt Strike beacon into Rundll32.exe. - Process Injection,"It7 injects its malware variant, ROKRAT, into the cmd.exe process." + Process Injection,It malware has injected a Cobalt Strike beacon into Rundll32.exe. + Process Injection,"It injects its malware variant, ROKRAT, into the cmd.exe process." Process Injection,It malware TIDYELF loaded the main WINTERLOVE component by injecting it into the iexplore.exe process. Process Injection,Attor's dispatcher can inject itself into running processes to gain higher privileges and to evade detection. Process Injection,AuditCred can inject code from files to other running processes. @@ -4715,14 +4715,14 @@ prompt,procedure Scheduled Task,"Lokibot's second stage DLL has set a timer using ""timeSetEvent"" to schedule its next execution." Scheduled Task,Remsec schedules the execution one of its modules by creating a new scheduler task. Scheduled Task,StrifeWater has create a scheduled task named Mozilla\Firefox Default Browser Agent 409046Z0FF4A39CB for persistence. - Scheduled Task,It8 actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network. + Scheduled Task,It actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network. Scheduled Task,at can be used to schedule a task on a system to be executed at a specific date or time. Scheduled Task,It has used at to register a scheduled task to execute malware during lateral movement. Scheduled Task,CrackMapExec can set a scheduled task on the target system to execute commands remotely using at. Scheduled Task,MURKYTOP has the capability to schedule remote AT jobs. Scheduled Task,"It actors use at to schedule tasks to run self-extracting RAR archives, which install HTTPBrowser or PlugX on other victims on a network." Scheduled Task,Anchor can install itself as a cron job. - Scheduled Task,It8 has used cron to create pre-scheduled and periodic background jobs on a Linux system. + Scheduled Task,It has used cron to create pre-scheduled and periodic background jobs on a Linux system. Scheduled Task,Exaramel for Linux uses crontab for persistence if it does not have root privileges. Scheduled Task,The GoldMax Linux variant has used a crontab entry with a @reboot line to gain persistence. Scheduled Task,Janicab used a cron job for persistence on Mac devices. @@ -4739,11 +4739,11 @@ prompt,procedure Scheduled Task,"It has used a macro function to set scheduled tasks, disguised as those used by Google." Scheduled Task,It has used named and hijacked scheduled tasks to establish persistence. Scheduled Task,"An It downloader creates persistence by creating the following scheduled task: schtasks /create /tn ""mysc"" /tr C:\Users\Public\test.exe /sc ONLOGON /ru ""System""." - Scheduled Task,It2 has used scheduled tasks to persist on victim systems. - Scheduled Task,It3 has created a scheduled task to execute a .vbe file multiple times a day. - Scheduled Task,It7 has created scheduled tasks to run malicious scripts on a compromised host. - Scheduled Task,It8 has used Task Scheduler to run programs at system startup or on a scheduled basis for persistence. - Scheduled Task,It9 has created scheduled tasks for persistence. + Scheduled Task,It has used scheduled tasks to persist on victim systems. + Scheduled Task,It has created a scheduled task to execute a .vbe file multiple times a day. + Scheduled Task,It has created scheduled tasks to run malicious scripts on a compromised host. + Scheduled Task,It has used Task Scheduler to run programs at system startup or on a scheduled basis for persistence. + Scheduled Task,It has created scheduled tasks for persistence. Scheduled Task,It used a compromised account to create a scheduled task on a system. Scheduled Task,AsyncRAT can create a scheduled task to maintain persistence on system start-up. Scheduled Task,Attor's installer plugin can schedule a new task that loads the dispatcher on boot/logon. @@ -4879,11 +4879,11 @@ prompt,procedure Scheduled Task,zwShell has used SchTasks for execution. Scheduled Task,ZxxZ has used scheduled tasks for persistence and execution. Valid Accounts,"During the 2015 Ukraine Electric Power Attack, It used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network. " - Valid Accounts,It8 actors leverage legitimate credentials to log into external remote services. + Valid Accounts,It actors leverage legitimate credentials to log into external remote services. Valid Accounts,"It has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder." Valid Accounts,It has used a compromised account to access an organization's VPN infrastructure. - Valid Accounts,It3 has used valid accounts for initial access and privilege escalation. - Valid Accounts,It9 has used stolen credentials to compromise Outlook Web Access (OWA). + Valid Accounts,It has used valid accounts for initial access and privilege escalation. + Valid Accounts,It has used stolen credentials to compromise Outlook Web Access (OWA). Valid Accounts,It used compromised credentials to log on to other systems. Valid Accounts,It has used previously compromised administrative accounts to escalate privileges. Valid Accounts,It actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars. @@ -4945,7 +4945,7 @@ prompt,procedure Valid Accounts:Domain Accounts,"It actors used compromised domain credentials for the victim's endpoint management platform, Altiris, to move laterally." Valid Accounts:Domain Accounts,It has used compromised domain accounts to authenticate to devices on compromised networks. Valid Accounts:Domain Accounts,"It has used administrative accounts, including Domain Admin, to move laterally within a victim network." - Valid Accounts:Local Accounts,It2 has used legitimate local admin account credentials. + Valid Accounts:Local Accounts,It has used legitimate local admin account credentials. Valid Accounts:Local Accounts,Cobalt Strike can use known credentials to run commands and spawn processes as a local user account. Valid Accounts:Local Accounts,"Emotet can brute force a local admin password, then use it to facilitate lateral movement." Valid Accounts:Local Accounts,It has moved laterally using the Local Administrator account. @@ -4960,7 +4960,7 @@ prompt,procedure Valid Accounts:Local Accounts,Umbreon creates valid local users to provide access to the system. Valid Accounts:Cloud Accounts,It has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes. Valid Accounts:Cloud Accounts,It has gained access to a global administrator account in Azure AD and has used Service Principal credentials in Exchange. - Valid Accounts:Cloud Accounts,It3 has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints. + Valid Accounts:Cloud Accounts,It has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints. Valid Accounts:Cloud Accounts,"During C0027, It leveraged compromised credentials from victim users to authenticate to Azure tenants." Valid Accounts:Cloud Accounts,It has used compromised credentials to sign into victims’ Microsoft 365 accounts. Valid Accounts:Cloud Accounts,It has used compromised credentials to access cloud assets within a target organization. @@ -4972,7 +4972,7 @@ prompt,procedure Abuse Elevation Control Mechanism:Setuid and Setgid,Keydnap adds the setuid flag to a binary so it can easily elevate in the future. Abuse Elevation Control Mechanism:Bypass User Account Control,AppleJeus has presented the user with a UAC prompt to elevate privileges while installing. Abuse Elevation Control Mechanism:Bypass User Account Control,It has bypassed UAC. - Abuse Elevation Control Mechanism:Bypass User Account Control,It7 has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges. + Abuse Elevation Control Mechanism:Bypass User Account Control,It has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges. Abuse Elevation Control Mechanism:Bypass User Account Control,AutoIt backdoor attempts to escalate privileges by bypassing User Access Control. Abuse Elevation Control Mechanism:Bypass User Account Control,Avaddon bypasses UAC using the CMSTPLUA COM interface. Abuse Elevation Control Mechanism:Bypass User Account Control,Bad Rabbit has attempted to bypass UAC and gain elevated administrative privileges. @@ -5082,7 +5082,7 @@ prompt,procedure Access Token Manipulation:Parent PID Spoofing,PipeMon can use parent PID spoofing to elevate privileges. Access Token Manipulation:SID-History Injection,Empire can add a SID-History to a user if on a domain controller. Access Token Manipulation:SID-History Injection,Mimikatz's MISC::AddSid module can appended any SID or user/group account to a user's SID-History. Mimikatz also utilizes SID-History Injection to expand the scope of other components such as generated Kerberos Golden Tickets and DCSync beyond a single domain. - BITS Jobs,It9 has used the BITS protocol to exfiltrate stolen data from a compromised host. + BITS Jobs,It has used the BITS protocol to exfiltrate stolen data from a compromised host. BITS Jobs,It used BITSAdmin to download and install payloads. BITS Jobs,Bazar has been downloaded via Windows BITS functionality. BITS Jobs,BITSAdmin can be used to create BITS Jobs to launch a malicious process. @@ -5111,9 +5111,9 @@ prompt,procedure Deobfuscate,Amadey has decoded antivirus name strings. Deobfuscate,AppleJeus has decoded files received from a C2. Deobfuscate,AppleSeed can decode its payload prior to execution. - Deobfuscate,An It9 HTTP malware variant decrypts strings using single-byte XOR keys. + Deobfuscate,An It HTTP malware variant decrypts strings using single-byte XOR keys. Deobfuscate,An It macro uses the command certutil -decode to decode contents of a .txt file storing the base64 encoded payload. - Deobfuscate,It9 has used malware to decrypt encrypted CAB files. + Deobfuscate,It has used malware to decrypt encrypted CAB files. Deobfuscate,Aria-body has the ability to decrypt the loader configuration and payload DLL. Deobfuscate,Astaroth uses a fromCharCode() deobfuscation method to avoid explicitly writing execution commands and to hide its code. Deobfuscate,AuditCred uses XOR and RC4 to perform decryption on the code functions. @@ -5385,7 +5385,7 @@ prompt,procedure File and Directory Permissions Modification:Windows File and Directory Permissions Modification,WannaCry uses attrib +h and icacls . /grant Everyone:F /T /C /Q to make some of its files hidden and grant all users full access controls. File and Directory Permissions Modification:Windows File and Directory Permissions Modification,WastedLocker has a command to take ownership of a file and reset the ACL permissions using the takeown.exe /F filepath command. File and Directory Permissions Modification:Windows File and Directory Permissions Modification,"It has used the icacls command to modify access control to backup servers, providing them with full control of all the system folders." - File and Directory Permissions Modification:Linux and Mac File and Directory Permissions Modification,It2's macOS backdoor changes the permission of the file it wants to execute to 755. + File and Directory Permissions Modification:Linux and Mac File and Directory Permissions Modification,It's macOS backdoor changes the permission of the file it wants to execute to 755. File and Directory Permissions Modification:Linux and Mac File and Directory Permissions Modification,The Black Basta binary can use chmod to gain full permissions to targeted files. File and Directory Permissions Modification:Linux and Mac File and Directory Permissions Modification,Bundlore changes the permissions of a payload using the command chmod -R 755. File and Directory Permissions Modification:Linux and Mac File and Directory Permissions Modification,Dok gives all users execute permissions for the application using the command chmod +x /Users/Shared/AppStore.app. @@ -5405,7 +5405,7 @@ prompt,procedure Hide Artifacts:Hidden Files and Directories,Agent Tesla has created hidden folders. Hide Artifacts:Hidden Files and Directories,"AppleJeus has added a leading . to plist filenames, unlisting them from the Finder app and default Terminal directory listings." Hide Artifacts:Hidden Files and Directories,It has saved files with hidden file attributes. - Hide Artifacts:Hidden Files and Directories,It2's macOS backdoor hides the clientID file via a chflags function. + Hide Artifacts:Hidden Files and Directories,It's macOS backdoor hides the clientID file via a chflags function. Hide Artifacts:Hidden Files and Directories,"Attor can set attributes of log files and directories to HIDDEN, SYSTEM, ARCHIVE, or a combination of those." Hide Artifacts:Hidden Files and Directories,BackConfig has the ability to set folders or files to be hidden from the Windows Explorer default view. Hide Artifacts:Hidden Files and Directories,Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration. @@ -5454,10 +5454,10 @@ prompt,procedure Hide Artifacts:Hidden Users,It has run reg add ‘HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList’ /v to hide a newly created user. Hide Artifacts:Hidden Users,SMOKEDHAM has modified the Registry to hide created user accounts from the Windows logon screen. Hide Artifacts:Hidden Window,Agent Tesla has used ProcessWindowStyle.Hidden to hide windows. - Hide Artifacts:Hidden Window,It9 used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden. + Hide Artifacts:Hidden Window,It used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden. Hide Artifacts:Hidden Window,It has used the WindowStyle parameter to conceal PowerShell windows. Hide Artifacts:Hidden Window,It has been known to use -WindowStyle Hidden to conceal PowerShell windows. - Hide Artifacts:Hidden Window,It2 has used the WindowStyle parameter to conceal PowerShell windows. + Hide Artifacts:Hidden Window,It has used the WindowStyle parameter to conceal PowerShell windows. Hide Artifacts:Hidden Window,"Astaroth loads its module with the XSL script parameter vShow set to zero, which opens the application with a hidden window. " Hide Artifacts:Hidden Window,AsyncRAT can hide the execution of scheduled tasks using ProcessWindowStyle.Hidden. Hide Artifacts:Hidden Window,AvosLocker has hidden its console window by using the ShowWindow API function. @@ -5494,7 +5494,7 @@ prompt,procedure Hide Artifacts:Hidden Window,Ursnif droppers have used COM properties to execute malware in hidden windows. Hide Artifacts:Hidden Window,WindTail can instruct the OS to execute an application without a dock icon or menu. Hide Artifacts:NTFS File Attributes,Anchor has used NTFS to hide files. - Hide Artifacts:NTFS File Attributes,It2 used NTFS alternate data streams to hide their payloads. + Hide Artifacts:NTFS File Attributes,It used NTFS alternate data streams to hide their payloads. Hide Artifacts:NTFS File Attributes,Astaroth can abuse alternate data streams (ADS) to store content for malicious payloads. Hide Artifacts:NTFS File Attributes,BitPaymer has copied itself to the :bin alternate data stream of a newly created file. Hide Artifacts:NTFS File Attributes,The DEADEYE.EMBED variant of DEADEYE can embed its payload in an alternate data stream of a local file. @@ -5558,9 +5558,9 @@ prompt,procedure Hijack Execution Flow:DLL Search Order Hijacking,WastedLocker has performed DLL hijacking before execution. Hijack Execution Flow:DLL Search Order Hijacking,"Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll)." Hijack Execution Flow:DLL Search Order Hijacking,It has used search order hijacking to run the loader Vcrodat. - Hijack Execution Flow:DLL Side-Loading,It9 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL. + Hijack Execution Flow:DLL Side-Loading,It launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL. Hijack Execution Flow:DLL Side-Loading,It has been known to side load DLLs with a valid version of Chrome with one of their tools. - Hijack Execution Flow:DLL Side-Loading,"It2 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder)." + Hijack Execution Flow:DLL Side-Loading,"It ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder)." Hijack Execution Flow:DLL Side-Loading,It used legitimate executables to perform DLL side-loading of their malware. Hijack Execution Flow:DLL Side-Loading,BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable. Hijack Execution Flow:DLL Side-Loading,"DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable, ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper." @@ -5717,9 +5717,9 @@ prompt,procedure Impair Defenses:Disable Windows Event Logging,"During the SolarWinds Compromise, It, used AUDITPOL to prevent the collection of audit logs." Impair Defenses:Disable Windows Event Logging,It has used appcmd.exe to disable logging on a victim server. Impair Defenses:Disable Windows Event Logging,Wevtutil can be used to disable specific event logs on the system. - Impair Defenses:Impair Command History Logging,It8 has prepended a space to all of their terminal commands to operate without leaving traces in the HISTCONTROL environment. + Impair Defenses:Impair Command History Logging,It has prepended a space to all of their terminal commands to operate without leaving traces in the HISTCONTROL environment. Impair Defenses:Impair Command History Logging,SILENTTRINITY can bypass ScriptBlock logging to execute unmanaged PowerShell code from memory. - Impair Defenses:Disable or Modify System Firewall,"It8 have created firewall exemptions on specific ports, including ports 443, 6443, 8443, and 9443." + Impair Defenses:Disable or Modify System Firewall,"It have created firewall exemptions on specific ports, including ports 443, 6443, 8443, and 9443." Impair Defenses:Disable or Modify System Firewall,"The ""ZR"" variant of BACKSPACE will check to see if known host-based firewalls are installed on the infected systems. BACKSPACE will attempt to establish a C2 channel, then will examine open windows to identify a pop-up from the firewall software and will simulate a mouse-click to allow the connection to proceed." Impair Defenses:Disable or Modify System Firewall,BADCALL disables the Windows firewall before binding to a port. Impair Defenses:Disable or Modify System Firewall,It may use netsh to add local firewall rule exceptions. @@ -5785,8 +5785,8 @@ prompt,procedure Indicator Removal,Stuxnet can delete OLE Automation and SQL stored procedures used to store malicious payloads. Indicator Removal,SUNBURST removed HTTP proxy registry values to clean up traces of execution. Indicator Removal:Clear Windows Event Logs,"It has cleared event logs, including by using the commands wevtutil cl System and wevtutil cl Security." - Indicator Removal:Clear Windows Event Logs,It2 has cleared select event log entries. - Indicator Removal:Clear Windows Event Logs,It8 clears Window Event logs and Sysmon logs from the system. + Indicator Removal:Clear Windows Event Logs,It has cleared select event log entries. + Indicator Removal:Clear Windows Event Logs,It clears Window Event logs and Sysmon logs from the system. Indicator Removal:Clear Windows Event Logs,It attempted to remove evidence of some of its activity by clearing Windows security and system events. Indicator Removal:Clear Windows Event Logs,BlackCat can clear Windows event logs using wevtutil.exe. Indicator Removal:Clear Windows Event Logs,The BlackEnergy component KillDisk is capable of deleting Windows Event Logs. @@ -5828,13 +5828,13 @@ prompt,procedure Indicator Removal:File Deletion,Anchor can self delete its dropper after the malware is successfully deployed. Indicator Removal:File Deletion,AppleJeus has deleted the MSI file after installation. Indicator Removal:File Deletion,AppleSeed can delete files from a compromised host after they are exfiltrated. - Indicator Removal:File Deletion,It8 actors deleted tools and batch files from victim systems. + Indicator Removal:File Deletion,It actors deleted tools and batch files from victim systems. Indicator Removal:File Deletion,"It has intentionally deleted computer files to cover their tracks, including with use of the program CCleaner." Indicator Removal:File Deletion,It has used SDelete to remove artifacts from victim networks. Indicator Removal:File Deletion,It has a tool that can delete files. - Indicator Removal:File Deletion,"It2's macOS backdoor can receive a ""delete"" command." - Indicator Removal:File Deletion,"It8 has used a utility called CLOSESHAVE that can securely delete a file from the system. They have also removed malware, tools, or other non-native files used during the intrusion to reduce their footprint or as part of the post-intrusion cleanup process." - Indicator Removal:File Deletion,It9 has used malware to delete files after they are deployed on a compromised host. + Indicator Removal:File Deletion,"It's macOS backdoor can receive a ""delete"" command." + Indicator Removal:File Deletion,"It has used a utility called CLOSESHAVE that can securely delete a file from the system. They have also removed malware, tools, or other non-native files used during the intrusion to reduce their footprint or as part of the post-intrusion cleanup process." + Indicator Removal:File Deletion,It has used malware to delete files after they are deployed on a compromised host. Indicator Removal:File Deletion,It deleted files from the system. Indicator Removal:File Deletion,It has deleted malicious executables from compromised machines. Indicator Removal:File Deletion,Aria-body has the ability to delete files and directories on compromised hosts. @@ -6073,8 +6073,8 @@ prompt,procedure Indicator Removal:Timestomp,3PARA RAT has a command to set certain attributes such as creation/modification timestamps on files. Indicator Removal:Timestomp,It has performed timestomping on victim files. Indicator Removal:Timestomp,It has used timestomping to alter the Standard Information timestamps on their web shells to match other files in the same directory. - Indicator Removal:Timestomp,"It2 has used scheduled task raw XML with a backdated timestamp of June 2, 2016. The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll. Additionally, It2 has used a random value to modify the timestamp of the file storing the clientID." - Indicator Removal:Timestomp,It8 has modified data timestamps to mimic files that are in the same folder on a compromised host. + Indicator Removal:Timestomp,"It has used scheduled task raw XML with a backdated timestamp of June 2, 2016. The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll. Additionally, It has used a random value to modify the timestamp of the file storing the clientID." + Indicator Removal:Timestomp,It has modified data timestamps to mimic files that are in the same folder on a compromised host. Indicator Removal:Timestomp,Attor has manipulated the time of last access to files and registry keys after they have been created or modified. Indicator Removal:Timestomp,Bankshot modifies the time of a file as specified by the control server. Indicator Removal:Timestomp,BitPaymer can modify the timestamp of an executable so that it can be identified and restored by the decryption tool. @@ -6134,7 +6134,7 @@ prompt,procedure Indirect Command Execution,Revenge RAT uses the Forfiles utility to execute commands on the system. Masquerading,AppleSeed can disguise JavaScript files as PDFs. Masquerading,It has renamed the WinRAR utility to avoid detection. - Masquerading,It2 has disguised a Cobalt Strike beacon as a Flash Installer. + Masquerading,It has disguised a Cobalt Strike beacon as a Flash Installer. Masquerading,Bisonal dropped a decoy payload with a .jpg extension that contained a malicious Visual Basic script. Masquerading,BoomBox has the ability to mask malicious data strings as PDF files. Masquerading,It has masked executables with document file icons including Word and Adobe PDF. @@ -6178,7 +6178,7 @@ prompt,procedure Masquerading,WindTail has used icons mimicking MS Office files to mask payloads. Masquerading,XCSSET builds a malicious application bundle to resemble Safari through using the Safari icon and Info.plist. Masquerading,ItM has spoofed legitimate applications in phishing lures and changed file extensions to conceal installation of malware. - Masquerading:Invalid Code Signature,"It7 has signed its malware with an invalid digital certificates listed as ""Tencent Technology (Shenzhen) Company Limited.""" + Masquerading:Invalid Code Signature,"It has signed its malware with an invalid digital certificates listed as ""Tencent Technology (Shenzhen) Company Limited.""" Masquerading:Invalid Code Signature,BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate. Masquerading:Invalid Code Signature,Gelsemium has used unverified signatures on malicious DLLs. Masquerading:Invalid Code Signature,The NETWIRE client has been signed by fake and invalid digital certificates. @@ -6191,14 +6191,14 @@ prompt,procedure Masquerading:Right-to-Left Override,"It has used right-to-left override to reverse executables’ names to make them appear to have different file extensions, rather than their real ones." Masquerading:Right-to-Left Override,It has used the right-to-left override character in spearphishing attachment names to trick targets into executing .scr and .exe files. Masquerading:Right-to-Left Override,It has used the left-to-right override character in self-extracting RAR archive spearphishing attachment file names. - Masquerading:Rename System Utilities,It2 has moved and renamed pubprn.vbs to a .txt file to avoid detection. + Masquerading:Rename System Utilities,It has moved and renamed pubprn.vbs to a .txt file to avoid detection. Masquerading:Rename System Utilities,The CozyCar dropper has masqueraded a copy of the infected system's rundll32.exe executable that was moved to the malware's install directory and renamed according to a predefined configuration file. Masquerading:Rename System Utilities,It used a renamed cmd.exe file to evade detection. Masquerading:Rename System Utilities,Kevin has renamed an image of cmd.exe with a random name followed by a .tmpl extension. Masquerading:Rename System Utilities,It has renamed system utilities such as wscript.exe and mshta.exe. Masquerading:Rename System Utilities,It has renamed certutil and moved it to a different location on the system to avoid detection based on use of the tool. Masquerading:Masquerade Task or Service,It has disguised its scheduled tasks as those used by Google. - Masquerading:Masquerade Task or Service,"It2 has used hidden or non-printing characters to help masquerade service names, such as appending a Unicode no-break space character to a legitimate service name. It2 has also impersonated the legitimate Flash installer file name ""install_flashplayer.exe""." + Masquerading:Masquerade Task or Service,"It has used hidden or non-printing characters to help masquerade service names, such as appending a Unicode no-break space character to a legitimate service name. It has also impersonated the legitimate Flash installer file name ""install_flashplayer.exe""." Masquerading:Masquerade Task or Service,It has created services to appear as benign system tools. Masquerading:Masquerade Task or Service,"Attor's dispatcher disguises itself as a legitimate task (i.e., the task name and description appear legitimate)." Masquerading:Masquerade Task or Service,It has disguised their backdoor droppers with naming conventions designed to blend into normal operations. @@ -6281,8 +6281,8 @@ prompt,procedure Masquerading:Match Legitimate Name or Location,"The file name AcroRD32.exe, a legitimate process name for Adobe's Acrobat Reader, was used by It as a name for malware." Masquerading:Match Legitimate Name or Location,"It has changed extensions on files containing exfiltrated data to make them appear benign, and renamed a web shell instance to appear as a legitimate OWA page." Masquerading:Match Legitimate Name or Location,It has renamed malicious DLLs with legitimate names to appear benign; they have also created an Azure AD certificate with a Common Name that matched the display name of the compromised service principal. - Masquerading:Match Legitimate Name or Location,It2 has renamed a NetCat binary to kb-10233.exe to masquerade as a Windows update. It2 has also renamed a Cobalt Strike beacon payload to install_flashplayers.exe. - Masquerading:Match Legitimate Name or Location,"It9 has used malware disguised as Mozilla Firefox and a tool named mfevtpse.exe to proxy C2 communications, closely mimicking a legitimate McAfee file mfevtps.exe." + Masquerading:Match Legitimate Name or Location,It has renamed a NetCat binary to kb-10233.exe to masquerade as a Windows update. It has also renamed a Cobalt Strike beacon payload to install_flashplayers.exe. + Masquerading:Match Legitimate Name or Location,"It has used malware disguised as Mozilla Firefox and a tool named mfevtpse.exe to proxy C2 communications, closely mimicking a legitimate McAfee file mfevtps.exe." Masquerading:Match Legitimate Name or Location,It attempted to masquerade their files as popular anti-virus software. Masquerading:Match Legitimate Name or Location,BackConfig has hidden malicious payloads in %USERPROFILE%\Adobe\Driver\dwg\ and mimicked the legitimate DHCP service binary. Masquerading:Match Legitimate Name or Location,It has dropped implants in folders named for legitimate software. @@ -6473,9 +6473,9 @@ prompt,procedure Modify Registry,ADVSTORESHELL is capable of setting and deleting Registry values. Modify Registry,Agent Tesla can achieve persistence by modifying Registry key entries. Modify Registry,Amadey has overwritten registry keys for persistence. - Modify Registry,It9 uses a Port 22 malware variant to modify several Registry keys. - Modify Registry,It2's backdoor has modified the Windows Registry to store the backdoor's configuration. - Modify Registry,It8 uses a tool called CLEANTOAD that has the capability to modify Registry keys. + Modify Registry,It uses a Port 22 malware variant to modify several Registry keys. + Modify Registry,It's backdoor has modified the Windows Registry to store the backdoor's configuration. + Modify Registry,It uses a tool called CLEANTOAD that has the capability to modify Registry keys. Modify Registry,It used a malware variant called GOODLUCK to modify the registry in order to steal credentials. Modify Registry,Attor's dispatcher can modify the Run registry key. Modify Registry,Avaddon modifies several registry keys for persistence and UAC bypass. @@ -6623,14 +6623,14 @@ prompt,procedure Obfuscated Files or Information,AppleJeus has XOR-encrypted collected system information prior to sending to a C2. AppleJeus has also used the open source ADVObfuscation library for its components. Obfuscated Files or Information,AppleSeed has the ability to Base64 encode its payload and custom encrypt API calls. Obfuscated Files or Information,"It has used ConfuserEx to obfuscate its variant of Imminent Monitor, compressed payload and RAT packages, and password protected encrypted email attachments to avoid detection." - Obfuscated Files or Information,It8 obfuscates strings in the payload. - Obfuscated Files or Information,It9 used Base64 to obfuscate payloads. + Obfuscated Files or Information,It obfuscates strings in the payload. + Obfuscated Files or Information,It used Base64 to obfuscate payloads. Obfuscated Files or Information,"It encrypted a .dll payload using RTL and a custom encryption algorithm. It has also obfuscated payloads with base64, XOR, and RC4." Obfuscated Files or Information,It obfuscates files or information to help evade defensive measures. - Obfuscated Files or Information,"It2 has performed code obfuscation, including encoding payloads using Base64 and using a framework called ""Dont-Kill-My-Cat (DKMC). It2 also encrypts the library used for network exfiltration with AES-256 in CBC mode in their macOS backdoor." - Obfuscated Files or Information,It3 has used base64 to encode payloads. - Obfuscated Files or Information,It7 obfuscates strings and payloads. - Obfuscated Files or Information,It9 has used malware to drop encrypted CAB files. + Obfuscated Files or Information,"It has performed code obfuscation, including encoding payloads using Base64 and using a framework called ""Dont-Kill-My-Cat (DKMC). It also encrypts the library used for network exfiltration with AES-256 in CBC mode in their macOS backdoor." + Obfuscated Files or Information,It has used base64 to encode payloads. + Obfuscated Files or Information,It obfuscates strings and payloads. + Obfuscated Files or Information,It has used malware to drop encrypted CAB files. Obfuscated Files or Information,It used VMProtected binaries in multiple intrusions. Obfuscated Files or Information,Aria-body has used an encrypted configuration file for its loader. Obfuscated Files or Information,Astaroth has used an XOR-based algorithm to encrypt payloads twice with different keys. @@ -6923,7 +6923,7 @@ prompt,procedure Obfuscated Files or Information,Zox has been encoded with Base64. Obfuscated Files or Information,ZxxZ has been encoded to avoid detection from static analysis tools. Obfuscated Files or Information:Binary Padding,It used large size files to avoid detection by security solutions with hardcoded size limits. - Obfuscated Files or Information:Binary Padding,It2 includes garbage code to mislead anti-malware software and researchers. + Obfuscated Files or Information:Binary Padding,It includes garbage code to mislead anti-malware software and researchers. Obfuscated Files or Information:Binary Padding,Bisonal has appended random binary data to the end of itself to generate a large binary. Obfuscated Files or Information:Binary Padding,Black Basta had added data prior to the Portable Executable (PE) header to prevent automatic scanners from identifying the payload. Obfuscated Files or Information:Binary Padding,"It downloader code has included ""0"" characters at the end of the file to inflate the file size in a likely attempt to evade anti-virus detection." @@ -6964,8 +6964,8 @@ prompt,procedure Obfuscated Files or Information:Software Packing,AppleSeed has used UPX packers for its payload DLL. Obfuscated Files or Information:Software Packing,It used UPX to pack files. Obfuscated Files or Information:Software Packing,It has been known to pack their tools. - Obfuscated Files or Information:Software Packing,"It8 has used several code packing methods such as Themida, Enigma, VMProtect, and Obsidium, to pack their implants." - Obfuscated Files or Information:Software Packing,"It9 has packed tools with UPX, and has repacked a modified version of Mimikatz to thwart anti-virus detection." + Obfuscated Files or Information:Software Packing,"It has used several code packing methods such as Themida, Enigma, VMProtect, and Obsidium, to pack their implants." + Obfuscated Files or Information:Software Packing,"It has packed tools with UPX, and has repacked a modified version of Mimikatz to thwart anti-virus detection." Obfuscated Files or Information:Software Packing,Astaroth uses a software packer called Pe123\RPolyCryptor. Obfuscated Files or Information:Software Packing,Versions of Babuk have been packed. Obfuscated Files or Information:Software Packing,Bazar has a variant with a packed payload. @@ -7048,7 +7048,7 @@ prompt,procedure Obfuscated Files or Information:Software Packing,ItM has used multi-stage packers for exploit code. Obfuscated Files or Information:Steganography,ABK can extract a malicious Portable Executable (PE) from a photo. Obfuscated Files or Information:Steganography,It has hidden malicious executables within PNG files. - Obfuscated Files or Information:Steganography,It7 uses steganography to send images to users that are embedded with shellcode. + Obfuscated Files or Information:Steganography,It uses steganography to send images to users that are embedded with shellcode. Obfuscated Files or Information:Steganography,Avenger can extract backdoor malware from downloaded images. Obfuscated Files or Information:Steganography,Bandook has used .PNG images within a zip file to build the executable. Obfuscated Files or Information:Steganography,BBK can extract a malicious Portable Executable (PE) from a photo. @@ -7118,8 +7118,8 @@ prompt,procedure Obfuscated Files or Information:Embedded Payloads,Netwalker's DLL has been embedded within the PowerShell script in hex format. Obfuscated Files or Information:Embedded Payloads,The SMOKEDHAM source code is embedded in the dropper as an encrypted string. Obfuscated Files or Information:Embedded Payloads,"The Uroburos Queue file contains embedded executable files along with key material, communication channels, and modes of operation." - Obfuscated Files or Information:Command Obfuscation,It9 used Base64 to obfuscate executed commands. - Obfuscated Files or Information:Command Obfuscation,It2 has used the Invoke-Obfuscation framework to obfuscate their PowerShell. + Obfuscated Files or Information:Command Obfuscation,It used Base64 to obfuscate executed commands. + Obfuscated Files or Information:Command Obfuscation,It has used the Invoke-Obfuscation framework to obfuscate their PowerShell. Obfuscated Files or Information:Command Obfuscation,It has encoded PowerShell commands in Base64. Obfuscated Files or Information:Command Obfuscation,Astaroth has obfuscated and randomized parts of the JScript code it is initiating. Obfuscated Files or Information:Command Obfuscation,BackConfig has used compressed and decimal encoded VBS scripts. @@ -7177,7 +7177,7 @@ prompt,procedure Obfuscated Files or Information:Command Obfuscation,Ursnif droppers execute base64 encoded PowerShell commands. Obfuscated Files or Information:Command Obfuscation,It used Base64 encoding to obfuscate an Empire service and PowerShell commands. Obfuscated Files or Information:Command Obfuscation,Zeus Panda obfuscates the macro commands in its initial payload. - Obfuscated Files or Information:Fileless Storage,It2's backdoor has stored its configuration in a registry key. + Obfuscated Files or Information:Fileless Storage,It's backdoor has stored its configuration in a registry key. Obfuscated Files or Information:Fileless Storage,Some versions of Chaes stored its instructions (otherwise in a instructions.ini file) in the Registry. Obfuscated Files or Information:Fileless Storage,CHOPSTICK may store RC4 encrypted configuration information in the Windows Registry. Obfuscated Files or Information:Fileless Storage,ComRAT has stored encrypted orchestrator code and payloads in the Registry. @@ -7225,8 +7225,8 @@ prompt,procedure Process Injection,ABK has the ability to inject shellcode into svchost.exe. Process Injection,"Agent Tesla can inject into known, vulnerable binaries on targeted hosts. " Process Injection,ANDROMEDA can inject into the wuauclt.exe process to perform C2 actions. - Process Injection,It2 malware has injected a Cobalt Strike beacon into Rundll32.exe. - Process Injection,"It7 injects its malware variant, ROKRAT, into the cmd.exe process." + Process Injection,It malware has injected a Cobalt Strike beacon into Rundll32.exe. + Process Injection,"It injects its malware variant, ROKRAT, into the cmd.exe process." Process Injection,It malware TIDYELF loaded the main WINTERLOVE component by injecting it into the iexplore.exe process. Process Injection,Attor's dispatcher can inject itself into running processes to gain higher privileges and to evade detection. Process Injection,AuditCred can inject code from files to other running processes. @@ -7528,13 +7528,13 @@ prompt,procedure Subvert Trust Controls:Mark-of-the-Web Bypass,It has embedded ISO images and VHDX files in HTML to evade Mark-of-the-Web. Subvert Trust Controls:Mark-of-the-Web Bypass,QakBot has been packaged in ISO files in order to bypass Mark of the Web (MOTW) security measures. Subvert Trust Controls:Mark-of-the-Web Bypass,It has used .iso files to deploy malicious .lnk files. - Subvert Trust Controls:Code Signing Policy Modification,It9 has used malware to turn off the RequireSigned feature which ensures only signed DLLs can be run on Windows. + Subvert Trust Controls:Code Signing Policy Modification,It has used malware to turn off the RequireSigned feature which ensures only signed DLLs can be run on Windows. Subvert Trust Controls:Code Signing Policy Modification,BlackEnergy has enabled the TESTSIGNING boot configuration option to facilitate loading of a driver component. Subvert Trust Controls:Code Signing Policy Modification,Hikit has attempted to disable driver signing verification by tampering with several Registry keys prior to the loading of a rootkit driver component. Subvert Trust Controls:Code Signing Policy Modification,Pandora can use CVE-2017-15303 to disable Windows Driver Signature Enforcement (DSE) protection and load its driver. Subvert Trust Controls:Code Signing Policy Modification,It has modified variables in kernel memory to turn off Driver Signature Enforcement after exploiting vulnerabilities that obtained kernel mode privileges. System Binary Proxy Execution,It lnk files used for persistence have abused the Windows Update Client (wuauclt.exe) to execute a malicious DLL. - System Binary Proxy Execution:Compiled HTML File,It8 has used CHM files to move concealed payloads. + System Binary Proxy Execution:Compiled HTML File,It has used CHM files to move concealed payloads. System Binary Proxy Execution:Compiled HTML File,It used compiled HTML (.chm) files for targeting. System Binary Proxy Execution:Compiled HTML File,Astaroth uses ActiveX objects for file execution and manipulation. System Binary Proxy Execution:Compiled HTML File,It leveraged a compiled HTML file that contained a command to download and run an executable. @@ -7551,7 +7551,7 @@ prompt,procedure System Binary Proxy Execution:InstallUtil,Saint Bot had used InstallUtil.exe to download and deploy executables. System Binary Proxy Execution:InstallUtil,WhisperGate has used InstallUtil.exe as part of its process to disable Windows Defender. System Binary Proxy Execution:Mshta,It has use mshta to execute malicious scripts on a compromised host. - System Binary Proxy Execution:Mshta,It2 has used mshta.exe for code execution. + System Binary Proxy Execution:Mshta,It has used mshta.exe for code execution. System Binary Proxy Execution:Mshta,BabyShark has used mshta.exe to download and execute applications from a remote server. System Binary Proxy Execution:Mshta,"During C0015, the threat actors used mshta to execute DLLs." System Binary Proxy Execution:Mshta,It has used mshta.exe to execute malicious VBScript. @@ -7603,8 +7603,8 @@ prompt,procedure System Binary Proxy Execution:Odbcconf,It has used odbcconf to proxy the execution of malicious DLL files. System Binary Proxy Execution:Regsvcs,Agent Tesla has dropped RegAsm.exe onto systems for performing malicious activity. System Binary Proxy Execution:Regsvr32,AppleSeed can call regsvr32.exe for execution. - System Binary Proxy Execution:Regsvr32,It9 used Regsvr32 to bypass application control techniques. - System Binary Proxy Execution:Regsvr32,It2 created a Scheduled Task/Job that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory. The group has also used regsvr32 to run their backdoor. + System Binary Proxy Execution:Regsvr32,It used Regsvr32 to bypass application control techniques. + System Binary Proxy Execution:Regsvr32,It created a Scheduled Task/Job that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory. The group has also used regsvr32 to run their backdoor. System Binary Proxy Execution:Regsvr32,Astaroth can be loaded through regsvr32.exe. System Binary Proxy Execution:Regsvr32,It has executed custom-compiled XMRIG miner DLLs using regsvr32.exe. System Binary Proxy Execution:Regsvr32,"During C0015, the threat actors employed code that used regsvr32 for execution." @@ -7635,11 +7635,11 @@ prompt,procedure System Binary Proxy Execution:Regsvr32,Xbash can use regsvr32 for executing scripts. System Binary Proxy Execution:Rundll32,"During the 2015 Ukraine Electric Power Attack, It used a backdoor which could execute a supplied DLL using rundll32.exe. " System Binary Proxy Execution:Rundll32,ADVSTORESHELL has used rundll32.exe in a Registry value to establish persistence. - System Binary Proxy Execution:Rundll32,It9 configured its payload to inject into the rundll32.exe. + System Binary Proxy Execution:Rundll32,It configured its payload to inject into the rundll32.exe. System Binary Proxy Execution:Rundll32,"It executed CHOPSTICK by using rundll32 commands such as rundll32.exe ""C:\Windows\twain_64.dll"". It also executed a .dll for a first stage dropper using rundll32.exe. An It loader Trojan saved a batch script that uses rundll32 to execute a DLL payload." System Binary Proxy Execution:Rundll32,It has a tool that can run DLLs. - System Binary Proxy Execution:Rundll32,It2 malware has used rundll32.exe to execute an initial infection process. - System Binary Proxy Execution:Rundll32,"It8 has used rundll32.exe to execute binaries, scripts, and Control Panel Item files and to execute code via proxy to avoid triggering security tools." + System Binary Proxy Execution:Rundll32,It malware has used rundll32.exe to execute an initial infection process. + System Binary Proxy Execution:Rundll32,"It has used rundll32.exe to execute binaries, scripts, and Control Panel Item files and to execute code via proxy to avoid triggering security tools." System Binary Proxy Execution:Rundll32,It has used rundll32.exe to execute a loader. System Binary Proxy Execution:Rundll32,Attor's installer plugin can schedule rundll32.exe to load the dispatcher. System Binary Proxy Execution:Rundll32,Backdoor.Oldrea can use rundll32 for execution on compromised hosts. @@ -7723,7 +7723,7 @@ prompt,procedure System Binary Proxy Execution:Rundll32,It has utilized rundll32.exe to deploy ransomware commands with the use of WebDAV. System Binary Proxy Execution:Rundll32,ZxShell has used rundll32.exe to execute other DLLs and named pipes. System Binary Proxy Execution:Verclsid,Hancitor has used verclsid.exe to download and execute a malicious script. - System Script Proxy Execution:PubPrn,"It2 has used PubPrn.vbs within execution scripts to execute malware, possibly bypassing defenses." + System Script Proxy Execution:PubPrn,"It has used PubPrn.vbs within execution scripts to execute malware, possibly bypassing defenses." Template Injection,It used weaponized Microsoft Word documents abusing the remote template function to retrieve a malicious macro. Template Injection,Chaes changed the template target of the settings.xml file embedded in the Word document and populated that field with the downloaded URL of the next payload. Template Injection,It has used a weaponized Microsoft Word document with an embedded RTF exploit. @@ -7759,7 +7759,7 @@ prompt,procedure Use Alternate Authentication Material:Application Access Token,"During the SolarWinds Compromise, It used compromised service principals to make changes to the Office 365 environment." Use Alternate Authentication Material:Pass the Hash,The It group is known to have used pass the hash. Use Alternate Authentication Material:Pass the Hash,It has used pass the hash for lateral movement. - Use Alternate Authentication Material:Pass the Hash,It2 has used pass the hash for lateral movement. + Use Alternate Authentication Material:Pass the Hash,It has used pass the hash for lateral movement. Use Alternate Authentication Material:Pass the Hash,BADHATCH can perform pass the hash on compromised machines with x64 versions. Use Alternate Authentication Material:Pass the Hash,It has dumped password hashes for use in pass the hash authentication attacks. Use Alternate Authentication Material:Pass the Hash,Cobalt Strike can perform pass the hash. @@ -7775,18 +7775,18 @@ prompt,procedure Use Alternate Authentication Material:Pass the Hash,PoshC2 has a number of modules that leverage pass the hash for lateral movement. Use Alternate Authentication Material:Pass the Hash,It has used the Invoke-SMBExec PowerShell cmdlet to execute the pass-the-hash technique and utilized stolen password hashes to move laterally. Use Alternate Authentication Material:Pass the Ticket,It used Kerberos ticket attacks for lateral movement. - Use Alternate Authentication Material:Pass the Ticket,It2 successfully gained remote access by using pass the ticket. + Use Alternate Authentication Material:Pass the Ticket,It successfully gained remote access by using pass the ticket. Use Alternate Authentication Material:Pass the Ticket,It has created forged Kerberos Ticket Granting Ticket (TGT) and Ticket Granting Service (TGS) tickets to maintain administrative access. Use Alternate Authentication Material:Pass the Ticket,Mimikatz’s LSADUMP::DCSync and KERBEROS::PTT modules implement the three steps required to extract the krbtgt account hash and create/use Kerberos tickets. Use Alternate Authentication Material:Pass the Ticket,Pupy can also perform pass-the-ticket. Use Alternate Authentication Material:Pass the Ticket,Some SeaDuke samples have a module to use pass the ticket with Kerberos for authentication. Use Alternate Authentication Material:Web Session Cookie,"During the SolarWinds Compromise, It used stolen cookies to access cloud resources and a forged duo-sid cookie to bypass MFA set on an email account." Valid Accounts,"During the 2015 Ukraine Electric Power Attack, It used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network. " - Valid Accounts,It8 actors leverage legitimate credentials to log into external remote services. + Valid Accounts,It actors leverage legitimate credentials to log into external remote services. Valid Accounts,"It has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder." Valid Accounts,It has used a compromised account to access an organization's VPN infrastructure. - Valid Accounts,It3 has used valid accounts for initial access and privilege escalation. - Valid Accounts,It9 has used stolen credentials to compromise Outlook Web Access (OWA). + Valid Accounts,It has used valid accounts for initial access and privilege escalation. + Valid Accounts,It has used stolen credentials to compromise Outlook Web Access (OWA). Valid Accounts,It used compromised credentials to log on to other systems. Valid Accounts,It has used previously compromised administrative accounts to escalate privileges. Valid Accounts,It actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars. @@ -7848,7 +7848,7 @@ prompt,procedure Valid Accounts:Domain Accounts,"It actors used compromised domain credentials for the victim's endpoint management platform, Altiris, to move laterally." Valid Accounts:Domain Accounts,It has used compromised domain accounts to authenticate to devices on compromised networks. Valid Accounts:Domain Accounts,"It has used administrative accounts, including Domain Admin, to move laterally within a victim network." - Valid Accounts:Local Accounts,It2 has used legitimate local admin account credentials. + Valid Accounts:Local Accounts,It has used legitimate local admin account credentials. Valid Accounts:Local Accounts,Cobalt Strike can use known credentials to run commands and spawn processes as a local user account. Valid Accounts:Local Accounts,"Emotet can brute force a local admin password, then use it to facilitate lateral movement." Valid Accounts:Local Accounts,It has moved laterally using the Local Administrator account. @@ -7863,7 +7863,7 @@ prompt,procedure Valid Accounts:Local Accounts,Umbreon creates valid local users to provide access to the system. Valid Accounts:Cloud Accounts,It has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes. Valid Accounts:Cloud Accounts,It has gained access to a global administrator account in Azure AD and has used Service Principal credentials in Exchange. - Valid Accounts:Cloud Accounts,It3 has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints. + Valid Accounts:Cloud Accounts,It has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints. Valid Accounts:Cloud Accounts,"During C0027, It leveraged compromised credentials from victim users to authenticate to Azure tenants." Valid Accounts:Cloud Accounts,It has used compromised credentials to sign into victims’ Microsoft 365 accounts. Valid Accounts:Cloud Accounts,It has used compromised credentials to access cloud assets within a target organization. @@ -8006,8 +8006,8 @@ prompt,procedure Adversary-in-the-Middle:ARP Cache Poisoning,It has used ARP spoofing to redirect a compromised machine to an actor-controlled website. Brute Force,"During the 2016 Ukraine Electric Power Attack, It used a script to attempt RPC authentication against a number of hosts." Brute Force,It can perform brute force attacks to obtain credentials. - Brute Force,It8 has used brute force techniques to attempt account access when passwords are unknown or when password hashes are unavailable. - Brute Force,It9 has used Ncrack to reveal credentials. + Brute Force,It has used brute force techniques to attempt account access when passwords are unknown or when password hashes are unavailable. + Brute Force,It has used Ncrack to reveal credentials. Brute Force,Caterpillar WebShell has a module to perform brute force attacks on a system. Brute Force,Chaos conducts brute force attacks against SSH services to gain initial access. Brute Force,CrackMapExec can brute force supplied user credentials across a network range. @@ -8042,7 +8042,7 @@ prompt,procedure Brute Force:Password Cracking,"During Night Dragon, threat actors used Cain & Abel to crack password hashes." Brute Force:Password Spraying,"It has used a brute-force/password-spray tooling that operated in two modes: in password-spraying mode it conducted approximately four authentication attempts per hour per targeted account over the course of several days or weeks. It has also used a Kubernetes cluster to conduct distributed, large-scale password spray attacks." Brute Force:Password Spraying,It has conducted brute force password spray attacks. - Brute Force:Password Spraying,It3 has used password spraying to gain access to target systems. + Brute Force:Password Spraying,It has used password spraying to gain access to target systems. Brute Force:Password Spraying,Bad Rabbit’s infpub.dat file uses NTLM login credentials to brute force Windows machines. Brute Force:Password Spraying,It has used multiple password spraying attacks against victim's remote services to obtain valid user and administrator accounts. Brute Force:Password Spraying,CrackMapExec can brute force credential authentication by using a supplied list of usernames and a single password. @@ -8055,8 +8055,8 @@ prompt,procedure Brute Force:Credential Stuffing,It has used credential stuffing against victim's remote services to obtain valid accounts. Brute Force:Credential Stuffing,TrickBot uses brute-force attack against RDP with rdpscanDll module. Credentials from Password Stores,Agent Tesla has the ability to steal credentials from FTP clients and wireless profiles. - Credentials from Password Stores,It3 has used a variety of publicly available tools like LaZagne to gather credentials. - Credentials from Password Stores,It9 has used the Smartftp Password Decryptor tool to decrypt FTP passwords. + Credentials from Password Stores,It has used a variety of publicly available tools like LaZagne to gather credentials. + Credentials from Password Stores,It has used the Smartftp Password Decryptor tool to decrypt FTP passwords. Credentials from Password Stores,Astaroth uses an external software known as NetPass to recover passwords. Credentials from Password Stores,"Carberp's passw.plug plugin can gather account information from multiple instant messaging, email, and social media services, as well as FTP, VNC, and VPN clients." Credentials from Password Stores,"CosmicDuke collects user credentials, including passwords, for various programs including popular instant messaging applications and email clients as well as WLAN keys." @@ -8092,8 +8092,8 @@ prompt,procedure Credentials from Password Stores:Credentials from Web Browsers,Agent Tesla can gather credentials from a number of browsers. Credentials from Password Stores:Credentials from Web Browsers,"It has used FireMalv custom-developed malware, which collected passwords from the Firefox browser storage." Credentials from Password Stores:Credentials from Web Browsers,It has used tools to dump passwords from browsers. - Credentials from Password Stores:Credentials from Web Browsers,It3 has used a variety of publicly available tools like LaZagne to gather credentials. - Credentials from Password Stores:Credentials from Web Browsers,It7 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers. + Credentials from Password Stores:Credentials from Web Browsers,It has used a variety of publicly available tools like LaZagne to gather credentials. + Credentials from Password Stores:Credentials from Web Browsers,It has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers. Credentials from Password Stores:Credentials from Web Browsers,Azorult can steal credentials from the victim's browser. Credentials from Password Stores:Credentials from Web Browsers,Some Backdoor.Oldrea samples contain a publicly available Web browser password recovery tool. Credentials from Password Stores:Credentials from Web Browsers,"BlackEnergy has used a plug-in to gather credentials from web browsers including FireFox, Google Chrome, and Internet Explorer." @@ -8187,7 +8187,7 @@ prompt,procedure Forge Web Credentials:Web Cookies,"During the SolarWinds Compromise, It bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key." Forge Web Credentials:SAML Tokens,AADInternals can be used to create SAML tokens using the AD Federated Services token signing certificate. Forge Web Credentials:SAML Tokens,"During the SolarWinds Compromise, It created tokens using compromised SAML signing certificates." - Input Capture,It9 has utilized tools to capture mouse movements. + Input Capture,It has utilized tools to capture mouse movements. Input Capture,Chaes has a module to perform any API hooking it desires. Input Capture,FlawedAmmyy can collect mouse events. Input Capture,"Kobalos has used a compromised SSH client to capture the hostname, port, username and password used to establish an SSH connection from the compromised host. " @@ -8200,9 +8200,9 @@ prompt,procedure Input Capture:Keylogging,AppleSeed can use GetKeyState and GetKeyboardState to capture keystrokes on the victim’s machine. Input Capture:Keylogging,It has used tools to perform keylogging. Input Capture:Keylogging,It has used a keylogging tool that records keystrokes in encrypted files. - Input Capture:Keylogging,It2 has abused the PasswordChangeNotify to monitor for and capture account password changes. - Input Capture:Keylogging,It8 used a Trojan called KEYLIME to capture keystrokes from the victim’s machine. - Input Capture:Keylogging,It9 has used tools for capturing keystrokes. + Input Capture:Keylogging,It has abused the PasswordChangeNotify to monitor for and capture account password changes. + Input Capture:Keylogging,It used a Trojan called KEYLIME to capture keystrokes from the victim’s machine. + Input Capture:Keylogging,It has used tools for capturing keystrokes. Input Capture:Keylogging,It used a keylogger called GEARSHIFT on a target system. Input Capture:Keylogging,Astaroth logs keystrokes from the victim's machine. Input Capture:Keylogging,AsyncRAT can capture keystrokes on the victim’s machine. @@ -8376,7 +8376,7 @@ prompt,procedure Multi-Factor Authentication Request Generation,It has used multifactor authentication (MFA) fatigue by sending repeated MFA authentication requests to targets. Network Sniffing,"During the 2015 Ukraine Electric Power Attack, It used BlackEnergy’s network sniffer module to discover user credentials being sent over the network between the local LAN and the power grid’s industrial control systems. " Network Sniffing,"It deployed the open source tool Responder to conduct NetBIOS Name Service poisoning, which captured usernames and hashed passwords that allowed access to legitimate credentials. It close-access teams have used Wi-Fi pineapples to intercept Wi-Fi signals and user credentials." - Network Sniffing,It3 has used SniffPass to collect credentials by sniffing network traffic. + Network Sniffing,It has used SniffPass to collect credentials by sniffing network traffic. Network Sniffing,It used network sniffing to obtain login data. Network Sniffing,Emotet has been observed to hook network APIs to monitor network traffic. Network Sniffing,Empire can be used to conduct packet captures on target hosts. @@ -8391,8 +8391,8 @@ prompt,procedure Network Sniffing,Responder captures hashes and credentials that are sent to the system after the name services have been poisoned. Network Sniffing,It has used intercepter-NG to sniff passwords in network traffic. OS Credential Dumping,It regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims. - OS Credential Dumping,It2 used GetPassword_x64 to harvest credentials. - OS Credential Dumping,It9 has used different versions of Mimikatz to obtain credentials. + OS Credential Dumping,It used GetPassword_x64 to harvest credentials. + OS Credential Dumping,It has used different versions of Mimikatz to obtain credentials. OS Credential Dumping,It has been known to dump credentials. OS Credential Dumping,It obtains Windows logon password details. OS Credential Dumping,HOMEFRY can perform credential dumping. @@ -8409,9 +8409,9 @@ prompt,procedure OS Credential Dumping:LSASS Memory,It has been known to use credential dumping using Mimikatz. OS Credential Dumping:LSASS Memory,It regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims. They have also dumped the LSASS process memory using the MiniDump function. OS Credential Dumping:LSASS Memory,"It has used a tool to dump credentials by injecting itself into lsass.exe and triggering with the argument ""dig.""" - OS Credential Dumping:LSASS Memory,It2 used Mimikatz and customized versions of Windows Credential Dumper to harvest credentials. - OS Credential Dumping:LSASS Memory,"It3 has used a variety of publicly available tools like LaZagne, Mimikatz, and ProcDump to dump credentials." - OS Credential Dumping:LSASS Memory,"It9 has used Mimikatz, Windows Credential Editor and ProcDump to dump credentials." + OS Credential Dumping:LSASS Memory,It used Mimikatz and customized versions of Windows Credential Dumper to harvest credentials. + OS Credential Dumping:LSASS Memory,"It has used a variety of publicly available tools like LaZagne, Mimikatz, and ProcDump to dump credentials." + OS Credential Dumping:LSASS Memory,"It has used Mimikatz, Windows Credential Editor and ProcDump to dump credentials." OS Credential Dumping:LSASS Memory,"It has used hashdump, Mimikatz, and the Windows Credential Editor to dump password hashes from memory and authenticate to other user accounts." OS Credential Dumping:LSASS Memory,It has attempted to harvest credentials through LSASS memory dumping. OS Credential Dumping:LSASS Memory,Bad Rabbit has used Mimikatz to harvest credentials from the victim's machine. @@ -8511,7 +8511,7 @@ prompt,procedure OS Credential Dumping:NTDS,"It has gained access to credentials via exported copies of the ntds.dit Active Directory database. It has also created a volume shadow copy and used a batch script file to collect NTDS.dit with the use of the Windows utility, ntdsutil." OS Credential Dumping:LSA Secrets,AADInternals can dump secrets from the Local Security Authority. OS Credential Dumping:LSA Secrets,It has used the reg save command to extract LSA secrets offline. - OS Credential Dumping:LSA Secrets,It3 has used a variety of publicly available tools like LaZagne to gather credentials. + OS Credential Dumping:LSA Secrets,It has used a variety of publicly available tools like LaZagne to gather credentials. OS Credential Dumping:LSA Secrets,CosmicDuke collects LSA secrets. OS Credential Dumping:LSA Secrets,CrackMapExec can dump hashed passwords from LSA secrets for the targeted system. OS Credential Dumping:LSA Secrets,It has dropped and executed SecretsDump to dump password hashes. @@ -8527,7 +8527,7 @@ prompt,procedure OS Credential Dumping:LSA Secrets,It has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. OS Credential Dumping:LSA Secrets,Pupy can use Lazagne for harvesting credentials. OS Credential Dumping:LSA Secrets,It actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers. - OS Credential Dumping:Cached Domain Credentials,It3 has used a variety of publicly available tools like LaZagne to gather credentials. + OS Credential Dumping:Cached Domain Credentials,It has used a variety of publicly available tools like LaZagne to gather credentials. OS Credential Dumping:Cached Domain Credentials,Cachedump can extract cached password hashes from cache entry information. OS Credential Dumping:Cached Domain Credentials,LaZagne can perform credential dumping from MSCache to obtain account and password information. OS Credential Dumping:Cached Domain Credentials,"It used several tools for retrieving login and password information, including LaZagne." @@ -8585,7 +8585,7 @@ prompt,procedure Unsecured Credentials:Credentials In Files,"AADInternals can gather unsecured credentials for Azure AD services, such as Azure AD Connect, from a local machine." Unsecured Credentials:Credentials In Files,Agent Tesla has the ability to extract credentials from configuration or support files. Unsecured Credentials:Credentials In Files,It has a tool that can locate credentials in files on the file system such as those from Firefox or Chrome. - Unsecured Credentials:Credentials In Files,It3 has used a variety of publicly available tools like LaZagne to gather credentials. + Unsecured Credentials:Credentials In Files,It has used a variety of publicly available tools like LaZagne to gather credentials. Unsecured Credentials:Credentials In Files,"Azorult can steal credentials in files belonging to common software such as Skype, Telegram, and Steam." Unsecured Credentials:Credentials In Files,"BlackEnergy has used a plug-in to gather credentials stored in files on the host by various software programs, including The Bat! email client, Outlook, and Windows Credential Store." Unsecured Credentials:Credentials In Files,Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user. @@ -8610,7 +8610,7 @@ prompt,procedure Unsecured Credentials:Credentials In Files,"TrickBot can obtain passwords stored in files from several applications such as Outlook, Filezilla, OpenSSH, OpenVPN and WinSCP. Additionally, it searches for the "".vnc.lnk"" affix to steal VNC credentials." Unsecured Credentials:Credentials In Files,XTunnel is capable of accessing locally stored passwords on victims. Unsecured Credentials:Credentials in Registry,Agent Tesla has the ability to extract credentials from the Registry. - Unsecured Credentials:Credentials in Registry,It2 used Outlook Credential Dumper to harvest credentials stored in Windows registry. + Unsecured Credentials:Credentials in Registry,It used Outlook Credential Dumper to harvest credentials stored in Windows registry. Unsecured Credentials:Credentials in Registry,IceApple can harvest credentials from local and remote host registries. Unsecured Credentials:Credentials in Registry,"PowerSploit has several modules that search the Windows Registry for stored credentials: Get-UnattendedInstallFile, Get-Webconfig, Get-ApplicationHost, Get-SiteListPassword, Get-CachedGPPPassword, and Get-RegistryAutoLogon." Unsecured Credentials:Credentials in Registry,Reg may be used to find credentials in the Windows Registry. @@ -8634,7 +8634,7 @@ prompt,procedure Unsecured Credentials:Cloud Instance Metadata API,Hildegard has queried the Cloud Instance Metadata API for cloud credentials. Unsecured Credentials:Cloud Instance Metadata API,Peirates can query the query AWS and GCP metadata APIs for secrets. Unsecured Credentials:Cloud Instance Metadata API,It has queried the AWS instance metadata service for credentials. - Unsecured Credentials:Group Policy Preferences,It3 has used a variety of publicly available tools like Gpppassword to gather credentials. + Unsecured Credentials:Group Policy Preferences,It has used a variety of publicly available tools like Gpppassword to gather credentials. Unsecured Credentials:Group Policy Preferences,PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Group Policy Preferences. Unsecured Credentials:Group Policy Preferences,SILENTTRINITY has a module that can extract cached GPP passwords. Unsecured Credentials:Group Policy Preferences,It has used PowerShell cmdlets Get-GPPPassword and Find-GPOPassword to find unsecured credentials in a compromised network group policy. @@ -8649,7 +8649,7 @@ prompt,procedure Account Discovery:Local Account,Agent Tesla can collect account information from the victim’s machine. Account Discovery:Local Account,"It used the commands net localgroup,net user, and net group to find accounts on the system." Account Discovery:Local Account,"It has used a tool that can obtain info about local and global group users, power users, and administrators." - Account Discovery:Local Account,It2 enumerated administrative users using the commands net localgroup administrators. + Account Discovery:Local Account,It enumerated administrative users using the commands net localgroup administrators. Account Discovery:Local Account,Bankshot gathers domain and account names/information through process monitoring. Account Discovery:Local Account,Bazar can identify administrator accounts on an infected host. Account Discovery:Local Account,BitPaymer can enumerate the sessions for each user logged onto the infected host. @@ -8784,7 +8784,7 @@ prompt,procedure Application Window Discovery,SOUNDBITE is capable of enumerating application windows. Application Window Discovery,Trojan.Karagany can monitor the titles of open windows to identify specific keywords. Application Window Discovery,WINERACK can enumerate active windows. - Browser Information Discovery,"It8 has collected browser bookmark information to learn more about compromised hosts, obtain personal information about users, and acquire details about internal network resources." + Browser Information Discovery,"It has collected browser bookmark information to learn more about compromised hosts, obtain personal information about users, and acquire details about internal network resources." Browser Information Discovery,Calisto collects information on bookmarks from Google Chrome. Browser Information Discovery,It has used type \\c$\Users\\Favorites\Links\Bookmarks bar\Imported From IE*citrix* for bookmark discovery. Browser Information Discovery,DarkWatchman can retrieve browser history. @@ -8845,12 +8845,12 @@ prompt,procedure File and Directory Discovery,Amadey has searched for folders associated with antivirus software. File and Directory Discovery,It has run scripts to identify file formats including Microsoft Word. File and Directory Discovery,"AppleSeed has the ability to search for .txt, .ppt, .hwp, .pdf, and .doc files in specified directories." - File and Directory Discovery,It8 can list files information for specific directories. + File and Directory Discovery,It can list files information for specific directories. File and Directory Discovery,"It has used Forfiles to locate PDF, Excel, and Word documents during collection. The group also searched a compromised DCCC computer for specific terms." File and Directory Discovery,It has a tool that looks for files and directories on the local file system. - File and Directory Discovery,It2's backdoor possesses the capability to list files and directories on a machine. - File and Directory Discovery,"It8 have enumerated files and directories, or searched in specific locations within a compromised host." - File and Directory Discovery,It9 has used tools with the ability to search for files on a compromised host. + File and Directory Discovery,It's backdoor possesses the capability to list files and directories on a machine. + File and Directory Discovery,"It have enumerated files and directories, or searched in specific locations within a compromised host." + File and Directory Discovery,It has used tools with the ability to search for files on a compromised host. File and Directory Discovery,"It has executed file /bin/pwd on exploited victims, perhaps to return architecture related information." File and Directory Discovery,Aria-body has the ability to gather metadata from a file and to search for file and directory names. File and Directory Discovery,Attor has a plugin that enumerates files with specific extensions on all hard disk drives and stores file information in encrypted log files. @@ -9136,8 +9136,8 @@ prompt,procedure Group Policy Discovery,It surveys a system upon check-in to discover Group Policy details using the gpresult command. Log Enumeration,Pacu can collect CloudTrail event histories and CloudWatch logs. Log Enumeration,It has used wevtutil.exe and the PowerShell command Get-EventLog security to enumerate Windows logs to search for successful logons. - Network Service Discovery,"It2 performed network scanning on the network to search for open ports, services, OS finger-printing, and other vulnerabilities." - Network Service Discovery,It9 has used CrackMapExec and a custom port scanner known as BLUETORCH for network scanning. + Network Service Discovery,"It performed network scanning on the network to search for open ports, services, OS finger-printing, and other vulnerabilities." + Network Service Discovery,It has used CrackMapExec and a custom port scanner known as BLUETORCH for network scanning. Network Service Discovery,It used a malware variant called WIDETONE to conduct port scans on specified subnets. Network Service Discovery,Backdoor.Oldrea can use a network scanning module to identify ICS-related ports. Network Service Discovery,"It has used SMBTouch, a vulnerability scanner, to determine whether a target is vulnerable to EternalBlue malware." @@ -9194,9 +9194,9 @@ prompt,procedure Network Service Discovery,XTunnel is capable of probing the network for open ports. Network Service Discovery,ZxShell can launch port scans. Network Share Discovery,It listed connected network shares. - Network Share Discovery,"It2 used the net view command to show all shares available, including the administrative shares such as C$ and ADMIN$." - Network Share Discovery,It8 has enumerated network shares on a compromised host. - Network Share Discovery,It9 has used the post exploitation tool CrackMapExec to enumerate network shares. + Network Share Discovery,"It used the net view command to show all shares available, including the administrative shares such as C$ and ADMIN$." + Network Share Discovery,It has enumerated network shares on a compromised host. + Network Share Discovery,It has used the post exploitation tool CrackMapExec to enumerate network shares. Network Share Discovery,It used the net share command as part of network reconnaissance. Network Share Discovery,Avaddon has enumerated shared folders and mapped volumes. Network Share Discovery,AvosLocker has enumerated shared drives on a compromised network. @@ -9254,7 +9254,7 @@ prompt,procedure Network Share Discovery,Zebrocy identifies network drives when they are added to victim systems. Network Sniffing,"During the 2015 Ukraine Electric Power Attack, It used BlackEnergy’s network sniffer module to discover user credentials being sent over the network between the local LAN and the power grid’s industrial control systems. " Network Sniffing,"It deployed the open source tool Responder to conduct NetBIOS Name Service poisoning, which captured usernames and hashed passwords that allowed access to legitimate credentials. It close-access teams have used Wi-Fi pineapples to intercept Wi-Fi signals and user credentials." - Network Sniffing,It3 has used SniffPass to collect credentials by sniffing network traffic. + Network Sniffing,It has used SniffPass to collect credentials by sniffing network traffic. Network Sniffing,It used network sniffing to obtain login data. Network Sniffing,Emotet has been observed to hook network APIs to monitor network traffic. Network Sniffing,Empire can be used to conduct packet captures on target hosts. @@ -9279,7 +9279,7 @@ prompt,procedure Password Policy Discovery,It has used net accounts and net accounts /domain to acquire password policy information. Peripheral Device Discovery,ADVSTORESHELL can list connected devices. Peripheral Device Discovery,It uses a module to receive a notification every time a USB mass storage device is inserted into a victim. - Peripheral Device Discovery,"It7 has a Bluetooth device harvester, which uses Windows Bluetooth APIs to find information on connected Bluetooth devices. " + Peripheral Device Discovery,"It has a Bluetooth device harvester, which uses Windows Bluetooth APIs to find information on connected Bluetooth devices. " Peripheral Device Discovery,"Attor has a plugin that collects information about inserted storage devices, modems, and phone devices." Peripheral Device Discovery,"It has used an executable to detect removable media, such as USB flash drives." Peripheral Device Discovery,"BADNEWS checks for new hard drives on the victim, such as USB devices, by listening for the WM_DEVICECHANGE window message." @@ -9404,8 +9404,8 @@ prompt,procedure Process Discovery,It gathered a list of running processes on the system using tasklist /v. Process Discovery,An It loader Trojan will enumerate the victim's processes searching for explorer.exe if its current process does not have necessary permissions. Process Discovery,It has a tool that can list out currently running processes. - Process Discovery,It7's Freenki malware lists running processes using the Microsoft Windows API. - Process Discovery,"It8 leveraged Sysmon to understand the processes, services in the organization." + Process Discovery,It's Freenki malware lists running processes using the Microsoft Windows API. + Process Discovery,"It leveraged Sysmon to understand the processes, services in the organization." Process Discovery,Aria-body has the ability to enumerate loaded modules for a process.. Process Discovery,Astaroth searches for different processes on the system. Process Discovery,AsyncRAT can examine running processes to determine if a debugger is present. @@ -9656,8 +9656,8 @@ prompt,procedure Process Discovery,"ZxShell has a command, ps, to obtain a listing of processes on the system. " Process Discovery,ZxxZ has created a snapshot of running processes using CreateToolhelp32Snapshot. Query Registry,ADVSTORESHELL can enumerate registry keys. - Query Registry,It2's backdoor can query the Windows Registry to gather system information. - Query Registry,It9 has used various strains of malware to query the Registry. + Query Registry,It's backdoor can query the Windows Registry to gather system information. + Query Registry,It has used various strains of malware to query the Registry. Query Registry,Attor has opened the registry and performed query searches. Query Registry,Azorult can check for installed software on the system under the Registry key Software\Microsoft\Windows\CurrentVersion\Uninstall. Query Registry,BabyShark has executed the reg query command for HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default. @@ -9762,8 +9762,8 @@ prompt,procedure Remote System Discovery,"During the 2016 Ukraine Electric Power Attack, It checked for connectivity to resources within the network and used LDAP to query Active Directory, discovering information about computers listed in AD." Remote System Discovery,AdFind has the ability to query Active Directory for computers. Remote System Discovery,It has a tool that can detect the existence of remote systems. - Remote System Discovery,"It2 has enumerated DC servers using the command net group ""Domain Controllers"" /domain. The group has also used the ping command." - Remote System Discovery,It9 has used NBTscan and custom tools to discover remote systems. + Remote System Discovery,"It has enumerated DC servers using the command net group ""Domain Controllers"" /domain. The group has also used the ping command." + Remote System Discovery,It has used NBTscan and custom tools to discover remote systems. Remote System Discovery,"Arp can be used to display a host's ARP cache, which may include address resolutions for remote systems." Remote System Discovery,Backdoor.Oldrea can enumerate and map ICS-specific systems in victim environments. Remote System Discovery,"BADHATCH can use a PowerShell object such as, System.Net.NetworkInformation.Ping to ping a computer." @@ -9882,7 +9882,7 @@ prompt,procedure Software Discovery:Security Software Discovery,ABK has the ability to identify the installed anti-virus product on the compromised host. Software Discovery:Security Software Discovery,Action RAT can identify AV products on an infected host using the following command: cmd.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List. Software Discovery:Security Software Discovery,Amadey has checked for a variety of antivirus products. - Software Discovery:Security Software Discovery,"It8 has identified security software, configurations, defensive tools, and sensors installed on a compromised system." + Software Discovery:Security Software Discovery,"It has identified security software, configurations, defensive tools, and sensors installed on a compromised system." Software Discovery:Security Software Discovery,It has attempted to discover third party endpoint detection and response (EDR) tools on compromised systems. Software Discovery:Security Software Discovery,Astaroth checks for the presence of Avast antivirus in the C:\Program\Files\ folder. Software Discovery:Security Software Discovery,AuTo Stealer has the ability to collect information about installed AV products from an infected host. @@ -9997,12 +9997,12 @@ prompt,procedure System Information Discovery,Anchor can determine the hostname and linux version on a compromised host. System Information Discovery,AppleJeus has collected the victim host information after infection. System Information Discovery,AppleSeed can identify the OS version of a targeted system. - System Information Discovery,It8 can collect system information from the victim’s machine. - System Information Discovery,It9 collected system architecture information. It9 used an HTTP malware variant and a Port 22 malware variant to gather the hostname and CPU information from the victim’s machine. + System Information Discovery,It can collect system information from the victim’s machine. + System Information Discovery,It collected system architecture information. It used an HTTP malware variant and a Port 22 malware variant to gather the hostname and CPU information from the victim’s machine. System Information Discovery,It has a tool that can obtain information about the local system. - System Information Discovery,"It2 has collected the OS version and computer name from victims. One of the group's backdoors can also query the Windows Registry to gather system information, and another macOS backdoor performs a fingerprint of the machine on its first connection to the C&C server. It2 executed shellcode to identify the name of the infected host." - System Information Discovery,"It7 collects the computer name, the BIOS model, and execution path." - System Information Discovery,"It8 has attempted to get detailed information about a compromised host, including the operating system, version, patches, hotfixes, and service packs." + System Information Discovery,"It has collected the OS version and computer name from victims. One of the group's backdoors can also query the Windows Registry to gather system information, and another macOS backdoor performs a fingerprint of the machine on its first connection to the C&C server. It executed shellcode to identify the name of the infected host." + System Information Discovery,"It collects the computer name, the BIOS model, and execution path." + System Information Discovery,"It has attempted to get detailed information about a compromised host, including the operating system, version, patches, hotfixes, and service packs." System Information Discovery,It has used native OS commands to understand privilege levels and system details. System Information Discovery,"Aria-body has the ability to identify the hostname, computer name, Windows version, processor speed, machine GUID, and disk information on a compromised host." System Information Discovery,Astaroth collects the machine name and keyboard language from the system. @@ -10386,9 +10386,9 @@ prompt,procedure System Network Configuration Discovery,Anchor can determine the public IP and location of a compromised host. System Network Configuration Discovery,AppleSeed can identify the IP of a targeted system. System Network Configuration Discovery,It used the ipconfig /all command to gather network configuration information. - System Network Configuration Discovery,It9 used an HTTP malware variant and a Port 22 malware variant to collect the MAC address and IP address from the victim’s machine. + System Network Configuration Discovery,It used an HTTP malware variant and a Port 22 malware variant to collect the MAC address and IP address from the victim’s machine. System Network Configuration Discovery,"A keylogging tool used by It gathers network information from the victim, including the MAC address, IP address, WINS, DHCP server, and gateway." - System Network Configuration Discovery,It2 used the ipconfig /all command to gather the IP address from the system. + System Network Configuration Discovery,It used the ipconfig /all command to gather the IP address from the system. System Network Configuration Discovery,It collected MAC addresses from victim machines. System Network Configuration Discovery,"Aria-body has the ability to identify the location, public IP address, and domain name on a compromised host." System Network Configuration Discovery,Arp can be used to display ARP configuration information on the host. @@ -10644,8 +10644,8 @@ prompt,procedure System Network Connections Discovery,It has used the netstat -naop tcp command to display TCP connections on a victim's machine. System Network Connections Discovery,It used the net use command to get a listing on network connections. System Network Connections Discovery,It has a tool that can enumerate current network connections. - System Network Connections Discovery,It2 used the netstat -anpo tcp command to display TCP connections on the victim's machine. - System Network Connections Discovery,"It8 installed a port monitoring tool, MAPMAKER, to print the active TCP connections on the local system." + System Network Connections Discovery,It used the netstat -anpo tcp command to display TCP connections on the victim's machine. + System Network Connections Discovery,"It installed a port monitoring tool, MAPMAKER, to print the active TCP connections on the local system." System Network Connections Discovery,"It has enumerated IP addresses of network resources and used the netstat command as part of network reconnaissance. The group has also used a malware variant, HIGHNOON, to enumerate active RDP sessions." System Network Connections Discovery,Aria-body has the ability to gather TCP and UDP table status listings. System Network Connections Discovery,"Babuk can use ""WNetOpenEnumW"" and ""WNetEnumResourceW"" to enumerate files in network resources for encryption." @@ -10733,12 +10733,12 @@ prompt,procedure System Owner,Agent Tesla can collect the username from the victim’s machine. System Owner,Agent.btz obtains the victim username and saves it to a file. System Owner,Amadey has collected the user name from a compromised host using GetUserNameA. - System Owner,It9 used an HTTP malware variant and a Port 22 malware variant to collect the victim’s username. + System Owner,It used an HTTP malware variant and a Port 22 malware variant to collect the victim’s username. System Owner,"An It downloader uses the Windows command ""cmd.exe"" /C whoami to verify that it is running with the elevated privileges of ""System.""" - System Owner,It2 collected the victim's username and executed the whoami command on the victim's machine. It2 executed shellcode to collect the username on the victim's machine. - System Owner,It7 identifies the victim username. - System Owner,"It8 has identified primary users, currently logged in users, sets of users that commonly use a system, or inactive users." - System Owner,It9 used Remexi to collect usernames from the system. + System Owner,It collected the victim's username and executed the whoami command on the victim's machine. It executed shellcode to collect the username on the victim's machine. + System Owner,It identifies the victim username. + System Owner,"It has identified primary users, currently logged in users, sets of users that commonly use a system, or inactive users." + System Owner,It used Remexi to collect usernames from the system. System Owner,It used the WMIEXEC utility to execute whoami commands on remote machines. System Owner,Aria-body has the ability to identify the username on a compromised host. System Owner,AsyncRAT can check if the current user of a compromised system is an administrator. @@ -11218,7 +11218,7 @@ prompt,procedure Lateral Tool Transfer,"During the 2015 Ukraine Electric Power Attack, It moved their tools laterally within the corporate network and between the ICS and corporate network. " Lateral Tool Transfer,"During the 2016 Ukraine Electric Power Attack, It used move to transfer files to a network share." Lateral Tool Transfer,It has spread malware in target networks by copying modules to folders masquerading as removable devices. - Lateral Tool Transfer,It2 has deployed tools after moving laterally using administrative accounts. + Lateral Tool Transfer,It has deployed tools after moving laterally using administrative accounts. Lateral Tool Transfer,BITSAdmin can be used to create BITS Jobs to upload and/or download files from SMB file servers. Lateral Tool Transfer,BlackCat can replicate itself across connected servers via psexec. Lateral Tool Transfer,"During C0015, the threat actors used WMI to load Cobalt Strike onto additional hosts within a compromised network." @@ -11256,7 +11256,7 @@ prompt,procedure Remote Services,It has used the WebDAV protocol to execute Ryuk payloads hosted on network file shares. Remote Services:Remote Desktop Protocol,The It group is known to have used RDP during operations. Remote Services:Remote Desktop Protocol,It enables the Remote Desktop Protocol for persistence. It has also interacted with compromised systems to browse and copy files through RDP sessions. - Remote Services:Remote Desktop Protocol,"It9 has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions." + Remote Services:Remote Desktop Protocol,"It has been seen using RDP for lateral movement and persistence, in some cases employing the rdpwinst tool for mangement of multiple sessions." Remote Services:Remote Desktop Protocol,It used RDP for lateral movement. Remote Services:Remote Desktop Protocol,It has used RDP during operations. Remote Services:Remote Desktop Protocol,It has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts. @@ -11303,8 +11303,8 @@ prompt,procedure Remote Services:SMB,Anchor can support windows execution via SMB shares. Remote Services:SMB,It has mapped network drives using Net and administrator credentials. Remote Services:SMB,It will copy files over to Windows Admin Shares (like ADMIN$) as part of lateral movement. - Remote Services:SMB,It2 used Net to use Windows' hidden network shares to copy their tools to remote machines for execution. - Remote Services:SMB,It9 has used SMB for lateral movement. + Remote Services:SMB,It used Net to use Windows' hidden network shares to copy their tools to remote machines for execution. + Remote Services:SMB,It has used SMB for lateral movement. Remote Services:SMB,It has transferred implant files using Windows Admin Shares. Remote Services:SMB,BlackEnergy has run a plug-in on a victim to spread through the local network by using PsExec and accessing admin shares. Remote Services:SMB,It has used Windows Explorer to manually copy malicious files to remote hosts over SMB. @@ -11348,7 +11348,7 @@ prompt,procedure Remote Services:Distributed Component Object Model,Cobalt Strike can deliver Beacon payloads for lateral movement by leveraging remote COM execution. Remote Services:Distributed Component Object Model,Empire can utilize Invoke-DCOM to leverage remote COM execution for lateral movement. Remote Services:Distributed Component Object Model,SILENTTRINITY can use System namespace methods to execute lateral movement using DCOM. - Remote Services:SSH,It9 used secure shell (SSH) to move laterally among their targets. + Remote Services:SSH,It used secure shell (SSH) to move laterally among their targets. Remote Services:SSH,It has used Putty for remote access. Remote Services:SSH,Cobalt Strike can SSH to a remote service. Remote Services:SSH,Empire contains modules for executing commands over SSH as well as in-memory VNC agent injection. @@ -11401,14 +11401,14 @@ prompt,procedure Replication Through Removable Media,njRAT can be configured to spread via removable drives. Replication Through Removable Media,QakBot has the ability to use removable drives to spread through compromised networks. Replication Through Removable Media,Ramsay can spread itself by infecting other portable executable files on removable drives. - Replication Through Removable Media,It0 may have used the SHIPSHAPE malware to move onto air-gapped networks. SHIPSHAPE targets removable drives to spread to other systems by modifying the drive to use Autorun to execute or by hiding legitimate document files and copying an executable to the folder with the same name as the legitimate document. + Replication Through Removable Media,It may have used the SHIPSHAPE malware to move onto air-gapped networks. SHIPSHAPE targets removable drives to spread to other systems by modifying the drive to use Autorun to execute or by hiding legitimate document files and copying an executable to the folder with the same name as the legitimate document. Replication Through Removable Media,Stuxnet can propagate via removable media using an autorun.inf file or the CVE-2010-2568 LNK vulnerability. Replication Through Removable Media,It has attempted to transfer USBferry from an infected USB device by copying an Autorun function to the target machine. Replication Through Removable Media,Unknown Logger is capable of spreading to USB devices. Replication Through Removable Media,Ursnif has copied itself to and infected removable drives for propagation. Replication Through Removable Media,USBferry can copy its installer to attached USB storage devices. Replication Through Removable Media,USBStealer drops itself onto removable media and relies on Autorun to execute the malicious file when a user opens the removable media on another system. - Software Deployment Tools,It2 compromised McAfee ePO to move laterally by distributing malware as a software deployment task. + Software Deployment Tools,It compromised McAfee ePO to move laterally by distributing malware as a software deployment task. Software Deployment Tools,"During C0018, the threat actors used PDQ Deploy to move AvosLocker and tools across the network." Software Deployment Tools,It has used the commercially available tool RemoteExec for agentless remote code execution. Software Deployment Tools,"It has used RAdmin, a remote software tool used to remotely control workstations and ATMs." @@ -11432,7 +11432,7 @@ prompt,procedure Use Alternate Authentication Material:Application Access Token,"During the SolarWinds Compromise, It used compromised service principals to make changes to the Office 365 environment." Use Alternate Authentication Material:Pass the Hash,The It group is known to have used pass the hash. Use Alternate Authentication Material:Pass the Hash,It has used pass the hash for lateral movement. - Use Alternate Authentication Material:Pass the Hash,It2 has used pass the hash for lateral movement. + Use Alternate Authentication Material:Pass the Hash,It has used pass the hash for lateral movement. Use Alternate Authentication Material:Pass the Hash,BADHATCH can perform pass the hash on compromised machines with x64 versions. Use Alternate Authentication Material:Pass the Hash,It has dumped password hashes for use in pass the hash authentication attacks. Use Alternate Authentication Material:Pass the Hash,Cobalt Strike can perform pass the hash. @@ -11448,7 +11448,7 @@ prompt,procedure Use Alternate Authentication Material:Pass the Hash,PoshC2 has a number of modules that leverage pass the hash for lateral movement. Use Alternate Authentication Material:Pass the Hash,It has used the Invoke-SMBExec PowerShell cmdlet to execute the pass-the-hash technique and utilized stolen password hashes to move laterally. Use Alternate Authentication Material:Pass the Ticket,It used Kerberos ticket attacks for lateral movement. - Use Alternate Authentication Material:Pass the Ticket,It2 successfully gained remote access by using pass the ticket. + Use Alternate Authentication Material:Pass the Ticket,It successfully gained remote access by using pass the ticket. Use Alternate Authentication Material:Pass the Ticket,It has created forged Kerberos Ticket Granting Ticket (TGT) and Ticket Granting Service (TGS) tickets to maintain administrative access. Use Alternate Authentication Material:Pass the Ticket,Mimikatz’s LSADUMP::DCSync and KERBEROS::PTT modules implement the three steps required to extract the krbtgt account hash and create/use Kerberos tickets. Use Alternate Authentication Material:Pass the Ticket,Pupy can also perform pass-the-ticket. @@ -11469,7 +11469,7 @@ prompt,procedure Archive Collected Data,Agent Tesla can encrypt data with 3DES before sending it over to a C2 server. Archive Collected Data,AppleSeed has compressed collected data before exfiltration. Archive Collected Data,It used a publicly available tool to gather and compress multiple documents on the DCCC and DNC networks. - Archive Collected Data,It2's backdoor has used LZMA compression and RC4 encryption before exfiltration. + Archive Collected Data,It's backdoor has used LZMA compression and RC4 encryption before exfiltration. Archive Collected Data,Aria-body has used ZIP to compress data gathered on a compromised host. Archive Collected Data,It has compressed and encrypted data prior to exfiltration. Archive Collected Data,Backdoor.Oldrea writes collected data to a temporary file in an encrypted form before exfiltration to a C2 server. @@ -11517,8 +11517,8 @@ prompt,procedure Archive Collected Data:Archive via Utility,It has used RAR to compress files before moving them outside of the victim network. Archive Collected Data:Archive via Utility,"It has used a variety of utilities, including WinRAR, to archive collected data with password protection." Archive Collected Data:Archive via Utility,It has used tools to compress data before exfilling it. - Archive Collected Data:Archive via Utility,It3 has used WinRAR to compress data prior to exfil. - Archive Collected Data:Archive via Utility,It9 has used WinRAR and 7-Zip to compress an archive stolen data. + Archive Collected Data:Archive via Utility,It has used WinRAR to compress data prior to exfil. + Archive Collected Data:Archive via Utility,It has used WinRAR and 7-Zip to compress an archive stolen data. Archive Collected Data:Archive via Utility,It created a RAR archive of targeted files for exfiltration. Archive Collected Data:Archive via Utility,It has used WinRAR to compress memory dumps prior to exfiltration. Archive Collected Data:Archive via Utility,It has compressed data into password-protected RAR archives prior to exfiltration. @@ -11622,7 +11622,7 @@ prompt,procedure Archive Collected Data:Archive via Custom Method,Stuxnet encrypts exfiltrated data via C2 with static 31-byte long XOR keys. Archive Collected Data:Archive via Custom Method,SUGARDUMP has encrypted collected data using AES CBC mode and encoded it using Base64. Archive Collected Data:Archive via Custom Method,T9000 encrypts collected data using a single byte XOR key. - Audio Capture,It7 has used an audio capturing utility known as SOUNDWAVE that captures microphone input. + Audio Capture,It has used an audio capturing utility known as SOUNDWAVE that captures microphone input. Audio Capture,Attor's has a plugin that is capable of recording audio using available input sound devices. Audio Capture,Bandook has modules that are capable of capturing audio. Audio Capture,Cadelspy has the ability to record audio from the compromised host. @@ -11717,8 +11717,8 @@ prompt,procedure Browser Session Hijacking,TrickBot uses web injects and browser redirection to trick the user into providing their login credentials on a fake or modified web page. Browser Session Hijacking,Ursnif has injected HTML codes into banking sites to steal sensitive online banking information (ex: usernames and passwords). Clipboard Data,Agent Tesla can steal data from the victim’s clipboard. - Clipboard Data,It8 used a Trojan called KEYLIME to collect data from the clipboard. - Clipboard Data,It9 has used tools capable of stealing contents of the clipboard. + Clipboard Data,It used a Trojan called KEYLIME to collect data from the clipboard. + Clipboard Data,It has used tools capable of stealing contents of the clipboard. Clipboard Data,Astaroth collects information from the clipboard by using the OpenClipboard() and GetClipboardData() libraries. Clipboard Data,Attor has a plugin that collects data stored in the Windows clipboard by using the OpenClipboard and GetClipboardData APIs. Clipboard Data,Cadelspy has the ability to steal data from the clipboard. @@ -11780,9 +11780,9 @@ prompt,procedure Data from Local System,"It has retrieved internal documents from machines inside victim environments, including by using Forfiles to stage documents before exfiltration." Data from Local System,It has stolen data from compromised hosts. Data from Local System,It will identify Microsoft Office documents on the victim's computer. - Data from Local System,It7 has collected data from victims' local systems. - Data from Local System,It8 has collected data from a compromised host. - Data from Local System,It9 has used various tools to steal files from the compromised host. + Data from Local System,It has collected data from victims' local systems. + Data from Local System,It has collected data from a compromised host. + Data from Local System,It has used various tools to steal files from the compromised host. Data from Local System,It has uploaded files and data from a compromised host. Data from Local System,"AuTo Stealer can collect data such as PowerPoint files, Word documents, Excel files, PDF files, text files, database files, and image files from an infected machine." Data from Local System,It has collected data from a compromised network. @@ -12005,7 +12005,7 @@ prompt,procedure Data Staged:Local Data Staging,AppleSeed can stage files in a central location prior to exfiltration. Data Staged:Local Data Staging,It has stored captured credential information in a file named pi.log. Data Staged:Local Data Staging,It has been known to stage files for exfiltration in a single location. - Data Staged:Local Data Staging,It9 has utilized tools to aggregate data prior to exfiltration. + Data Staged:Local Data Staging,It has utilized tools to aggregate data prior to exfiltration. Data Staged:Local Data Staging,Astaroth collects data in a plaintext file named r1.log before exfiltration. Data Staged:Local Data Staging,Attor has staged collected data in a central upload directory prior to exfiltration. Data Staged:Local Data Staging,AuTo Stealer can store collected data from an infected host to a file named Hostname_UserName.txt prior to exfiltration. @@ -12143,7 +12143,7 @@ prompt,procedure Email Collection:Email Forwarding Rule,It has set auto-forward rules on victim's e-mail accounts. Email Collection:Email Forwarding Rule,It has set an Office 365 tenant level mail transport rule to send all mail in and out of the targeted organization to the newly created account. Email Collection:Email Forwarding Rule,It has set up auto forwarding rules on compromised e-mail accounts. - Input Capture,It9 has utilized tools to capture mouse movements. + Input Capture,It has utilized tools to capture mouse movements. Input Capture,Chaes has a module to perform any API hooking it desires. Input Capture,FlawedAmmyy can collect mouse events. Input Capture,"Kobalos has used a compromised SSH client to capture the hostname, port, username and password used to establish an SSH connection from the compromised host. " @@ -12156,9 +12156,9 @@ prompt,procedure Input Capture:Keylogging,AppleSeed can use GetKeyState and GetKeyboardState to capture keystrokes on the victim’s machine. Input Capture:Keylogging,It has used tools to perform keylogging. Input Capture:Keylogging,It has used a keylogging tool that records keystrokes in encrypted files. - Input Capture:Keylogging,It2 has abused the PasswordChangeNotify to monitor for and capture account password changes. - Input Capture:Keylogging,It8 used a Trojan called KEYLIME to capture keystrokes from the victim’s machine. - Input Capture:Keylogging,It9 has used tools for capturing keystrokes. + Input Capture:Keylogging,It has abused the PasswordChangeNotify to monitor for and capture account password changes. + Input Capture:Keylogging,It used a Trojan called KEYLIME to capture keystrokes from the victim’s machine. + Input Capture:Keylogging,It has used tools for capturing keystrokes. Input Capture:Keylogging,It used a keylogger called GEARSHIFT on a target system. Input Capture:Keylogging,Astaroth logs keystrokes from the victim's machine. Input Capture:Keylogging,AsyncRAT can capture keystrokes on the victim’s machine. @@ -12310,7 +12310,7 @@ prompt,procedure Screen Capture,Agent Tesla can capture screenshots of the victim’s desktop. Screen Capture,AppleSeed can take screenshots on a compromised host by calling a series of APIs. Screen Capture,It has used tools to take screenshots from victims. - Screen Capture,It9 has used a screen capture utility to take screenshots on a compromised host. + Screen Capture,It has used a screen capture utility to take screenshots on a compromised host. Screen Capture,Aria-body has the ability to capture screenshots on compromised hosts. Screen Capture,AsyncRAT has the ability to view the screen on compromised hosts. Screen Capture,Attor's has a plugin that captures screenshots of the target applications. @@ -12506,14 +12506,14 @@ prompt,procedure Application Layer Protocol:Web Protocols,ANDROMEDA has the ability to make GET requests to download files from C2. Application Layer Protocol:Web Protocols,AppleJeus has sent data to its C2 server via POST requests. Application Layer Protocol:Web Protocols,AppleSeed has the ability to communicate with C2 over HTTP. - Application Layer Protocol:Web Protocols,It8 uses HTTP for C2 communications. - Application Layer Protocol:Web Protocols,It9 used HTTP for C2 communications. It9 also used an HTTP malware variant to communicate over HTTP for C2. + Application Layer Protocol:Web Protocols,It uses HTTP for C2 communications. + Application Layer Protocol:Web Protocols,It used HTTP for C2 communications. It also used an HTTP malware variant to communicate over HTTP for C2. Application Layer Protocol:Web Protocols,"Later implants used by It, such as CHOPSTICK, use a blend of HTTP, HTTPS, and other legitimate channels for C2, depending on module configuration." - Application Layer Protocol:Web Protocols,It2 has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. The group has also used downloaded encrypted payloads over HTTP. - Application Layer Protocol:Web Protocols,It3 has used HTTP for command and control. - Application Layer Protocol:Web Protocols,It7 uses HTTPS to conceal C2 communications. - Application Layer Protocol:Web Protocols,"It8 used a backdoor, QUICKRIDE, to communicate to the C2 server over HTTP and HTTPS." - Application Layer Protocol:Web Protocols,It9 has used HTTP in communications with C2. + Application Layer Protocol:Web Protocols,It has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. The group has also used downloaded encrypted payloads over HTTP. + Application Layer Protocol:Web Protocols,It has used HTTP for command and control. + Application Layer Protocol:Web Protocols,It uses HTTPS to conceal C2 communications. + Application Layer Protocol:Web Protocols,"It used a backdoor, QUICKRIDE, to communicate to the C2 server over HTTP and HTTPS." + Application Layer Protocol:Web Protocols,It has used HTTP in communications with C2. Application Layer Protocol:Web Protocols,It used HTTP to download payloads for CVE-2019-19781 and CVE-2020-10189 exploits. Application Layer Protocol:Web Protocols,Aria-body has used HTTP in C2 communications. Application Layer Protocol:Web Protocols,AuTo Stealer can use HTTP to communicate with its C2 servers. @@ -12739,7 +12739,7 @@ prompt,procedure Application Layer Protocol:Web Protocols,Remsec is capable of using HTTP and HTTPS for C2. Application Layer Protocol:Web Protocols,REvil has used HTTP and HTTPS in communication with C2. Application Layer Protocol:Web Protocols,RGDoor uses HTTP for C2 communications. - Application Layer Protocol:Web Protocols,"It2 has used RIPTIDE, a RAT that uses HTTP to communicate." + Application Layer Protocol:Web Protocols,"It has used RIPTIDE, a RAT that uses HTTP to communicate." Application Layer Protocol:Web Protocols,Rising Sun has used HTTP and HTTPS for command and control. Application Layer Protocol:Web Protocols,It has executed wget and curl commands to Pastebin over the HTTPS protocol. Application Layer Protocol:Web Protocols,ROKRAT can use HTTP and HTTPS for command and control communication. @@ -12847,7 +12847,7 @@ prompt,procedure Application Layer Protocol:File Transfer Protocols,ZxShell has used FTP for C2 connections. Application Layer Protocol:Mail Protocols,Agent Tesla has used SMTP for C2 communications. Application Layer Protocol:Mail Protocols,"It has used IMAP, POP3, and SMTP for a communication channel in various implants, including using self-registered Google Mail accounts and later compromised email servers of its victims." - Application Layer Protocol:Mail Protocols,It2 has used email for C2 via an Office macro. + Application Layer Protocol:Mail Protocols,It has used email for C2 via an Office macro. Application Layer Protocol:Mail Protocols,BadPatch uses SMTP for C2. Application Layer Protocol:Mail Protocols,Cannon uses SMTP/S and POP3/S for C2 communications by sending and receiving emails. Application Layer Protocol:Mail Protocols,Various implementations of CHOPSTICK communicate with C2 over SMTP and POP3. @@ -12868,8 +12868,8 @@ prompt,procedure Application Layer Protocol:Mail Protocols,Uroburos can use custom communications protocols that ride over SMTP. Application Layer Protocol:Mail Protocols,Zebrocy uses SMTP and POP3 for C2. Application Layer Protocol:DNS,Variants of Anchor can use DNS tunneling to communicate with C2. - Application Layer Protocol:DNS,It8 uses DNS for C2 communications. - Application Layer Protocol:DNS,It9 has used remote access tools that leverage DNS in communications with C2. + Application Layer Protocol:DNS,It uses DNS for C2 communications. + Application Layer Protocol:DNS,It has used remote access tools that leverage DNS in communications with C2. Application Layer Protocol:DNS,It used DNS for C2 communications. Application Layer Protocol:DNS,BONDUPDATER can use DNS and TXT records within its DNS tunneling protocol for command and control. Application Layer Protocol:DNS,Brute Ratel C4 can use DNS over HTTPS for C2. @@ -12928,8 +12928,8 @@ prompt,procedure Data Encoding,Mythic provides various transform functions to encode and/or randomize C2 data. Data Encoding,Ursnif has used encoded data in HTTP URLs for C2. Data Encoding:Standard Encoding,"C2 traffic from ADVSTORESHELL is encrypted, then encoded with Base64 encoding." - Data Encoding:Standard Encoding,An It9 HTTP malware variant used Base64 to encode communications to the C2 server. - Data Encoding:Standard Encoding,It3 has used base64 to encode command and control traffic. + Data Encoding:Standard Encoding,An It HTTP malware variant used Base64 to encode communications to the C2 server. + Data Encoding:Standard Encoding,It has used base64 to encode command and control traffic. Data Encoding:Standard Encoding,Astaroth encodes data using Base64 before sending it to the C2 server. Data Encoding:Standard Encoding,AutoIt backdoor has sent a C2 response that was base64-encoded. Data Encoding:Standard Encoding,BabyShark has encoded data using certutil before exfiltration. @@ -13128,7 +13128,7 @@ prompt,procedure Dynamic Resolution:Domain Generation Algorithms,SombRAT can use a custom DGA to generate a subdomain for C2. Dynamic Resolution:Domain Generation Algorithms,It has used a DGA to generate URLs from executed macros. Dynamic Resolution:Domain Generation Algorithms,Ursnif has used a DGA to generate domain names for C2. - Dynamic Resolution:DNS Calculation,It2 has used multiple variants of DNS Calculation including multiplying the first two octets of an IP address and adding the third octet to that value in order to get a resulting command and control port. + Dynamic Resolution:DNS Calculation,It has used multiple variants of DNS Calculation including multiplying the first two octets of an IP address and adding the third octet to that value in order to get a resulting command and control port. Encrypted Channel,It has used multiple layers of encryption within malware to protect C2 communication. Encrypted Channel,It has encrypted their C2 communications. Encrypted Channel,Chaes has used encryption for its C2 channel. @@ -13146,7 +13146,7 @@ prompt,procedure Encrypted Channel:Symmetric Cryptography,4H RAT obfuscates C2 communication using a 1-byte XOR with the key 0xBE. Encrypted Channel:Symmetric Cryptography,A variant of ADVSTORESHELL encrypts some C2 with 3DES. Encrypted Channel:Symmetric Cryptography,It installed a Delphi backdoor that used a custom algorithm for C2 communications. - Encrypted Channel:Symmetric Cryptography,It3 has used AES for encryption of command and control traffic. + Encrypted Channel:Symmetric Cryptography,It has used AES for encryption of command and control traffic. Encrypted Channel:Symmetric Cryptography,Attor has encrypted data symmetrically using a randomly generated Blowfish (OFB) key which is encrypted with a public RSA key. Encrypted Channel:Symmetric Cryptography,Azorult can encrypt C2 traffic using XOR. Encrypted Channel:Symmetric Cryptography,BADCALL encrypts C2 traffic using an XOR/ADD cipher. @@ -13252,7 +13252,7 @@ prompt,procedure Encrypted Channel:Symmetric Cryptography,RDAT has used AES ciphertext to encode C2 communications. Encrypted Channel:Symmetric Cryptography,"RedLeaves has encrypted C2 traffic with RC4, previously using keys of 88888888 and babybear." Encrypted Channel:Symmetric Cryptography,Rifdoor has encrypted command and control (C2) communications with a stream cipher. - Encrypted Channel:Symmetric Cryptography,"It2 has used the RIPTIDE RAT, which communicates over HTTP with a payload encrypted with RC4." + Encrypted Channel:Symmetric Cryptography,"It has used the RIPTIDE RAT, which communicates over HTTP with a payload encrypted with RC4." Encrypted Channel:Symmetric Cryptography,"RotaJakiro encrypts C2 communication using a combination of AES, XOR, ROTATE encryption, and ZLIB compression." Encrypted Channel:Symmetric Cryptography,It encrypts C2 traffic with a custom RC4 variant. Encrypted Channel:Symmetric Cryptography,Sakula encodes C2 traffic with single-byte XOR keys. @@ -13414,15 +13414,15 @@ prompt,procedure Ingress Tool Transfer,It has downloaded additional tools and malware onto compromised hosts. Ingress Tool Transfer,ANDROMEDA can download additional payloads from C2. Ingress Tool Transfer,It has downloaded binary data from a specified domain after the malicious document is opened. - Ingress Tool Transfer,It8 can upload a file to the victim’s machine. + Ingress Tool Transfer,It can upload a file to the victim’s machine. Ingress Tool Transfer,"It has downloaded additional files, including by using a first-stage downloader to contact the C2 server to obtain the second-stage implant." Ingress Tool Transfer,It has downloaded additional tools and malware onto compromised networks. Ingress Tool Transfer,It has a tool that can copy files to remote machines. - Ingress Tool Transfer,It2 has added JavaScript to victim websites to download additional frameworks that profile and compromise website visitors. - Ingress Tool Transfer,It3 has downloaded additional files and programs from its C2 server. - Ingress Tool Transfer,It7 has downloaded second stage malware from compromised websites. - Ingress Tool Transfer,"It8 used a backdoor, NESTEGG, that has the capability to download and upload files to and from a victim’s machine." - Ingress Tool Transfer,It9 has downloaded tools to compromised hosts. + Ingress Tool Transfer,It has added JavaScript to victim websites to download additional frameworks that profile and compromise website visitors. + Ingress Tool Transfer,It has downloaded additional files and programs from its C2 server. + Ingress Tool Transfer,It has downloaded second stage malware from compromised websites. + Ingress Tool Transfer,"It used a backdoor, NESTEGG, that has the capability to download and upload files to and from a victim’s machine." + Ingress Tool Transfer,It has downloaded tools to compromised hosts. Ingress Tool Transfer,It used certutil to download additional files. Ingress Tool Transfer,It has downloaded additional malware onto compromised hosts. Ingress Tool Transfer,Aria-body has the ability to download additional payloads from C2. @@ -13923,8 +13923,8 @@ prompt,procedure Non-Application Layer Protocol,"Winnti for Linux has used ICMP, custom TCP, and UDP in outbound communications." Non-Application Layer Protocol,Winnti for Windows can communicate using custom TCP. Non-Standard Port,It has used port 4050 for C2 communications. - Non-Standard Port,An It2 backdoor can use HTTP over a non-standard TCP port (e.g 14146) which is specified in the backdoor configuration. - Non-Standard Port,It3 has used HTTP over TCP ports 808 and 880 for command and control. + Non-Standard Port,An It backdoor can use HTTP over a non-standard TCP port (e.g 14146) which is specified in the backdoor configuration. + Non-Standard Port,It has used HTTP over TCP ports 808 and 880 for command and control. Non-Standard Port,BADCALL communicates on ports 443 and 8000 with a FakeTLS method. Non-Standard Port,Bankshot binds and listens on port 1058 for HTTP traffic while also utilizing a FakeTLS method. Non-Standard Port,BendyBear has used a custom RC4 and XOR encrypted protocol over port 443 for C2. @@ -14039,7 +14039,7 @@ prompt,procedure Proxy,It has delivered a generic Windows proxy Win32/Glubteta.M. It has also used multiple reverse proxy chains as part of their C2 infrastructure. Proxy,XTunnel relays traffic between a C2 server and a victim. Proxy,ZxShell can set up an HTTP or SOCKS proxy. - Proxy:Internal Proxy,It9 used custom tools to create SOCK5 and custom protocol proxies between infected hosts. + Proxy:Internal Proxy,It used custom tools to create SOCK5 and custom protocol proxies between infected hosts. Proxy:Internal Proxy,"The ""ZJ"" variant of BACKSPACE allows ""ZJ link"" infections with Internet access to relay traffic from ""ZJ listen"" to a command server." Proxy:Internal Proxy,CHOPSTICK used a proxy server between victims and the C2 server. Proxy:Internal Proxy,"Cobalt Strike can be configured to have commands relayed over a peer-to-peer network of infected hosts. This can be used to limit the number of egress points, or provide access to a host without direct internet access." @@ -14066,7 +14066,7 @@ prompt,procedure Proxy:Internal Proxy,The Winnti for Windows HTTP/S C2 mode can make use of a local proxy. Proxy:External Proxy,"It used other victims as proxies to relay command traffic, for instance using a compromised Georgian military email server as a hop point to NATO victims. The group has also used a tool that acts as a proxy to allow C2 even if the victim is behind a router. It has also used a machine to relay and obscure communications between CHOPSTICK and their server." Proxy:External Proxy,An It downloader establishes SOCKS5 connections for its initial C2. - Proxy:External Proxy,It9 has used various tools to proxy C2 communications. + Proxy:External Proxy,It has used various tools to proxy C2 communications. Proxy:External Proxy,It maintains access to victim environments by using FLIPSIDE to create a proxy for a backup RDP tunnel. Proxy:External Proxy,It used a modified version of HTRAN to redirect connections between networks. Proxy:External Proxy,InvisiMole InvisiMole can identify proxy servers used by the victim and use them for C2 communication. @@ -14147,7 +14147,7 @@ prompt,procedure Traffic Signaling:Port Knocking,"metaMain has authenticated itself to a different implant, Cryshell, through a port knocking and handshake procedure." Traffic Signaling:Port Knocking,It has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports. Traffic Signaling:Socket Filters,Penquin installs a TCP and UDP filter on the eth0 interface. - Web Service,"It2 has used Dropbox, Amazon S3, and Google Drive to host malicious downloads." + Web Service,"It has used Dropbox, Amazon S3, and Google Drive to host malicious downloads." Web Service,"BADHATCH can be utilized to abuse sslip.io, a free IP to domain mapping service, as part of actor-controlled C2 channels." Web Service,Bazar downloads have been hosted on Google Docs. Web Service,BoomBox can download files from Dropbox using a hardcoded access token. @@ -14201,10 +14201,10 @@ prompt,procedure Web Service:Dead Drop Resolver,It has used an RSS feed on Livejournal to update a list of encrypted C2 server names. It has also hidden Pony C2 server IP addresses within transactions on the Bitcoin and Namecoin blockchain. Web Service:Dead Drop Resolver,It has used an RSS feed on Livejournal to update a list of encrypted C2 server names. Web Service:Dead Drop Resolver,Xbash can obtain a webpage hosted on Pastebin to update its C2 domain list. - Web Service:Bidirectional Communication,It2 has used blogs and WordPress for C2 infrastructure. + Web Service:Bidirectional Communication,It has used blogs and WordPress for C2 infrastructure. Web Service:Bidirectional Communication,It has used Google Drive for C2. - Web Service:Bidirectional Communication,"It7 leverages social networking sites and cloud platforms (AOL, Twitter, Yandex, Mediafire, pCloud, Dropbox, and Box) for C2." - Web Service:Bidirectional Communication,It9 has communicated with C2 through files uploaded to and downloaded from DropBox. + Web Service:Bidirectional Communication,"It leverages social networking sites and cloud platforms (AOL, Twitter, Yandex, Mediafire, pCloud, Dropbox, and Box) for C2." + Web Service:Bidirectional Communication,It has communicated with C2 through files uploaded to and downloaded from DropBox. Web Service:Bidirectional Communication,"BADNEWS can use multiple C2 channels, including RSS feeds, Github, forums, and blogs." Web Service:Bidirectional Communication,BLACKCOFFEE has also obfuscated its C2 traffic as normal traffic to sites such as Github. Web Service:Bidirectional Communication,BLUELIGHT can use different cloud providers for its C2. @@ -14302,8 +14302,8 @@ prompt,procedure Exfiltration Over Alternative Protocol:Exfiltration Over Asymmetric Encrypted Non-C2 Protocol,Rclone can exfiltrate data over SFTP or HTTPS via WebDAV. Exfiltration Over Alternative Protocol:Exfiltration Over Asymmetric Encrypted Non-C2 Protocol,"During the SolarWinds Compromise, It exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers." Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol,"Agent Tesla has routines for exfiltration over SMTP, FTP, and HTTP." - Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol,It2's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets. - Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol,It3 has used FTP to exfiltrate files (separately from the C2 channel). + Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol,It's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets. + Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol,It has used FTP to exfiltrate files (separately from the C2 channel). Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol,BITSAdmin can be used to create BITS Jobs to upload files from a compromised host. Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol,"Some Brave Prince variants have used South Korea's Daum email service to exfiltrate information, and later variants have posted the data to a web server via an HTTP post command." Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol,"During C0017, It exfiltrated victim data via DNS lookups by encoding and prepending it as subdomains to the attacker-controlled domain." @@ -14333,8 +14333,8 @@ prompt,procedure Exfiltration Over C2 Channel,AppleJeus has exfiltrated collected host information to a C2 server. Exfiltration Over C2 Channel,AppleSeed can exfiltrate files via the C2 channel. Exfiltration Over C2 Channel,It has a tool that exfiltrates data over the C2 channel. - Exfiltration Over C2 Channel,It2's backdoor has exfiltrated data using the already opened channel with its C&C server. - Exfiltration Over C2 Channel,It9 has exfiltrated stolen victim data through C2 communications. + Exfiltration Over C2 Channel,It's backdoor has exfiltrated data using the already opened channel with its C&C server. + Exfiltration Over C2 Channel,It has exfiltrated stolen victim data through C2 communications. Exfiltration Over C2 Channel,Astaroth exfiltrates collected information from its r1.log file to the external C2 server. Exfiltration Over C2 Channel,Attor has exfiltrated data over the C2 channel. Exfiltration Over C2 Channel,AuTo Stealer can exfiltrate data over actor-controlled C2 servers via HTTP or TCP. @@ -14538,7 +14538,7 @@ prompt,procedure Account Access Removal,LockerGoga has been observed changing account passwords and logging off current users. Account Access Removal,MegaCortex has changed user account passwords and logged users off the system. Account Access Removal,Meteor has the ability to change the password of local users on compromised hosts and can log off users. - Data Destruction,It8 has used a custom secure delete function to make deleted files unrecoverable. + Data Destruction,It has used a custom secure delete function to make deleted files unrecoverable. Data Destruction,"BlackEnergy 2 contains a ""Destroy"" plug-in that destroys data stored on victim hard drives by overwriting file contents." Data Destruction,CaddyWiper can work alphabetically through drives on a compromised system to take ownership of and overwrite all files. Data Destruction,Diavol can delete specified files from a targeted system. @@ -14561,7 +14561,7 @@ prompt,procedure Data Destruction,StoneDrill has a disk wiper module that targets files other than those in the Windows directory. Data Destruction,WhisperGate can corrupt files by overwriting the first 1 MB with 0xcc and appending random extensions. Data Destruction,Xbash has destroyed Linux-based databases as part of its ransomware capabilities. - Data Encrypted for Impact,It8 has used Hermes ransomware to encrypt files with AES256. + Data Encrypted for Impact,It has used Hermes ransomware to encrypt files with AES256. Data Encrypted for Impact,It used a ransomware called Encryptor RaaS to encrypt files on the targeted systems and provide a ransom note to the user. Data Encrypted for Impact,Avaddon encrypts the victim system using a combination of AES256 and RSA encryption schemes. Data Encrypted for Impact,"AvosLocker has encrypted files and network resources using AES-256 and added an .avos, .avos2, or .AvosLinux extension to filenames." @@ -14614,13 +14614,13 @@ prompt,procedure Data Encrypted for Impact,Xbash has maliciously encrypted victim's database systems and demanded a cryptocurrency ransom be paid. Data Encrypted for Impact,"XCSSET performs AES-CBC encryption on files under ~/Documents, ~/Downloads, and~/Desktop with a fixed key and renames files to give them a .enc extension. Only files with sizes less than 500MB are encrypted." Data Manipulation,It has injected fraudulent transactions into compromised networks that mimic legitimate behavior to siphon off incremental amounts of money. - Data Manipulation:Stored Data Manipulation,"It8 has used DYEPACK to create, delete, and alter records in databases used for SWIFT transactions." + Data Manipulation:Stored Data Manipulation,"It has used DYEPACK to create, delete, and alter records in databases used for SWIFT transactions." Data Manipulation:Stored Data Manipulation,"SUNSPOT created a copy of the SolarWinds Orion software source file with a .bk extension to backup the original content, wrote SUNBURST using the same filename but with a .tmp extension, and then moved SUNBURST using MoveFileEx to the original filename with a .cs extension so it could be compiled within Orion software." - Data Manipulation:Transmitted Data Manipulation,It8 has used DYEPACK to manipulate SWIFT messages en route to a printer. + Data Manipulation:Transmitted Data Manipulation,It has used DYEPACK to manipulate SWIFT messages en route to a printer. Data Manipulation:Transmitted Data Manipulation,"LightNeuron is capable of modifying email content, headers, and attachments during transit." Data Manipulation:Transmitted Data Manipulation,Melcoz can monitor the clipboard for cryptocurrency addresses and change the intended address to one controlled by the adversary. Data Manipulation:Transmitted Data Manipulation,"Metamorfo has a function that can watch the contents of the system clipboard for valid bitcoin addresses, which it then overwrites with the attacker's address. " - Data Manipulation:Runtime Data Manipulation,It8 has used DYEPACK.FOX to manipulate PDF data as it is accessed to remove traces of fraudulent SWIFT transactions from the data displayed to the end user. + Data Manipulation:Runtime Data Manipulation,It has used DYEPACK.FOX to manipulate PDF data as it is accessed to remove traces of fraudulent SWIFT transactions from the data displayed to the end user. Defacement:Internal Defacement,Black Basta has set the desktop wallpaper on victims' machines to display a ransom note. Defacement:Internal Defacement,BlackCat can change the desktop wallpaper on compromised hosts. Defacement:Internal Defacement,"After encryption, Diavol will capture the desktop background window, set the background color to black, and change the desktop wallpaper to a newly created bitmap image with the text ""All your files are encrypted! For more information see ""README-FOR-DECRYPT.txt""." @@ -14635,8 +14635,8 @@ prompt,procedure Disk Wipe:Disk Content Wipe,RawDisk has been used to directly access the hard disk to help overwrite arbitrarily sized portions of disk content. Disk Wipe:Disk Content Wipe,StoneDrill can wipe the accessible physical or logical drives of the infected machine. Disk Wipe:Disk Content Wipe,WhisperGate can overwrite sectors of a victim host's hard drive at periodic offsets. - Disk Wipe:Disk Structure Wipe,It7 has access to destructive malware that is capable of overwriting a machine's Master Boot Record (MBR). - Disk Wipe:Disk Structure Wipe,It8 has used a custom MBR wiper named BOOTWRECK to render systems inoperable. + Disk Wipe:Disk Structure Wipe,It has access to destructive malware that is capable of overwriting a machine's Master Boot Record (MBR). + Disk Wipe:Disk Structure Wipe,It has used a custom MBR wiper named BOOTWRECK to render systems inoperable. Disk Wipe:Disk Structure Wipe,"CaddyWiper has the ability to destroy information about a physical drive's partitions including the MBR, GPT, and partition entries." Disk Wipe:Disk Structure Wipe,"HermeticWiper has the ability to corrupt disk partitions, damage the Master Boot Record (MBR), and overwrite the Master File Table (MFT) of all available physical drives." Disk Wipe:Disk Structure Wipe,"KillDisk overwrites the first sector of the Master Boot Record with ""0x00""." @@ -14735,8 +14735,8 @@ prompt,procedure Service Stop,SLOTHFULMEDIA has the capability to stop processes and services. Service Stop,"WannaCry attempts to kill processes associated with Exchange, Microsoft SQL Server, and MySQL to make it possible to encrypt their data stores." Service Stop,"It has used taskkill.exe and net.exe to stop backup, catalog, cloud, and other services prior to network encryption." - System Shutdown,It7 has used malware that will issue the command shutdown /r /t 1 to reboot a system after wiping its MBR. - System Shutdown,"It8 has used a custom MBR wiper named BOOTWRECK, which will initiate a system reboot after wiping the victim's MBR." + System Shutdown,It has used malware that will issue the command shutdown /r /t 1 to reboot a system after wiping its MBR. + System Shutdown,"It has used a custom MBR wiper named BOOTWRECK, which will initiate a system reboot after wiping the victim's MBR." System Shutdown,AvosLocker’s Linux variant has terminated ESXi virtual machines. System Shutdown,DCSrv has a function to sleep for two hours before rebooting the system. System Shutdown,HermeticWiper can initiate a system shutdown.