id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1560
archive collected data
null
archival software and archived files can be detected in many ways
t1560
archive collected data
null
citation wikipedia file header signatures
t1560
archive collected data
null
common utilities that may be present on the system or brought in by an adversary may be detectable through process monitoring and monitoring for command line arguments for known archival utilities
t1560
archive collected data
null
compressing the data can help to obfuscate the collected data and minimize the amount of data sent over the network
t1560
archive collected data
null
consider detecting writing of files with extensions andor headers associated with compressed or encrypted file types
t1560
archive collected data
null
detection efforts may focus on follow on exfiltration activity where compressed or encrypted files can be detected in transit with a network intrusion detection or data loss prevention system analyzing file headers
t1560
archive collected data
null
dll may be used to perform encryption decryption or verification of file signatures
t1560
archive collected data
null
process process creation command command execution file file creation script script execution
t1560
archive collected data
null
this may yield a significant number of benign events depending on how systems in the environment are typically used
t1561
disk wipe
null
notation
t1561
disk wipe
null
adversaries may wipe or corrupt raw disk data on specific systems or in large numbers in a network to interrupt availability to system and network resources
t1561
disk wipe
null
citation microsoft sysmon v6 may 2017 monitor for unusual kernel driver installation activity
t1561
disk wipe
null
look for attempts to readwrite to sensitive locations like the partition boot sector master boot record disk partition table or bios parameter blocksuperblock
t1561
disk wipe
null
monitor for direct access readwrite attempts using the
t1561
disk wipe
null
process process creation command command execution driver driver load drive drive access drive drive modification
t1561
disk wipe
null
with direct write access to a disk adversaries may attempt to overwrite portions of disk data
t1562
impair defenses
null
adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms
t1562
impair defenses
null
lack of log events may be suspicious
t1562
impair defenses
null
monitor environment variables and apis that can be leveraged to disable security measures
t1562
impair defenses
null
monitor processes and command line arguments to see if security tools or logging services are killed or stop running
t1562
impair defenses
null
monitor registry edits for modifications to services and startup programs that correspond to security tools
t1562
impair defenses
null
process process creation process process termination windows registry windows registry key modification windows registry windows registry key deletion command command execution service service metadata sensor health host status script script execution firewall firewall disable firewall firewall rule modification cloud service cloud service modification cloud service cloud service disable
t1562
impair defenses
null
this not only involves impairing preventative defenses such as firewalls and anti virus but also detection capabilities that defenders can use to audit activity and identify malicious behavior
t1562.001
impair defenses
disable modify tools
agent tesla has the capability to kill any running analysis processes and av software.
t1562.001
impair defenses
disable modify tools
apt29 used the service control manager on a remote system to disable services associated with security monitoring products.
t1562.001
impair defenses
disable modify tools
bazar has manually loaded ntdll from disk in order to identity and remove api hooks set by security products.
t1562.001
impair defenses
disable modify tools
brave prince terminates antimalware processes.
t1562.001
impair defenses
disable modify tools
bronze butler has incorporated code into several tools that attempts to terminate anti-virus processes.
t1562.001
impair defenses
disable modify tools
bundlore can change macos security settings and browser preferences to enable follow-on behaviors.
t1562.001
impair defenses
disable modify tools
carberp has attempted to disable security software by creating a suspended process for the security software and injecting code to delete antivirus core files when the process is resumed.
t1562.001
impair defenses
disable modify tools
chches can alter the victim's proxy configuration.
t1562.001
impair defenses
disable modify tools
cobalt strike has the ability to use smart applet attacks to disable the java securitymanager sandbox.
t1562.001
impair defenses
disable modify tools
darkcomet can disable security center functions like anti-virus.
t1562.001
impair defenses
disable modify tools
ebury can disable selinux role-based access control and deactivate pam modules.
t1562.001
impair defenses
disable modify tools
egregor has disabled windows defender to evade protections.
t1562.001
impair defenses
disable modify tools
fin6 has deployed a utility script named kill.bat to disable anti-virus.
t1562.001
impair defenses
disable modify tools
gamaredon group has delivered macros which can tamper with microsoft office security settings.
t1562.001
impair defenses
disable modify tools
gold dragon terminates anti-malware processes if theyre found running on the system.
t1562.001
impair defenses
disable modify tools
goopy has the ability to disable microsoft outlook's security policies to disable macro warnings.
t1562.001
impair defenses
disable modify tools
gorgon group malware can attempt to disable security features in microsoft office and windows defender using the taskkill command.
t1562.001
impair defenses
disable modify tools
grandoreiro can hook apis kill processes break file system paths and change acls to prevent security tools from running.
t1562.001
impair defenses
disable modify tools
h1n1 kills and disables services for windows security center and windows defender.
t1562.001
impair defenses
disable modify tools
hdoor kills anti-virus found on the victim.
t1562.001
impair defenses
disable modify tools
hildegard has modified dns resolvers to evade dns monitoring tools.
t1562.001
impair defenses
disable modify tools
imminent monitor has a feature to disable windows task manager.
t1562.001
impair defenses
disable modify tools
jpin can lower security settings by changing registry keys.
t1562.001
impair defenses
disable modify tools
kimsuky has been observed turning off windows security center.
t1562.001
impair defenses
disable modify tools
lazarus group malware tangodelta attempts to terminate various processes associated with mcafee. additionally lazarus group malware sharpknot disables the microsoft windows system event notification and alerter services.. during a 2019 intrusion lazarus group disabled windows defender and credential guard as some of their first actions on host.
t1562.001
impair defenses
disable modify tools
lockergoga installation has been immediately preceded by a task kill command in order to disable anti-virus.
t1562.001
impair defenses
disable modify tools
maze has disabled dynamic analysis and other security tools including ida debugger x32dbg and ollydbg. it has also disabled windows defender's real-time monitoring feature and attempted to disable endpoint protection services.
t1562.001
impair defenses
disable modify tools
megacortex was used to kill endpoint security processes.
t1562.001
impair defenses
disable modify tools
metamorfo has a function to kill processes associated with defenses and can prevent certain processes from launching.
t1562.001
impair defenses
disable modify tools
muddy water can disable the system's local proxy settings.
t1562.001
impair defenses
disable modify tools
nanhaishu can change internet explorer settings to reduce warnings about malware activity.
t1562.001
impair defenses
disable modify tools
nanocore can modify the victim's anti-virus.
t1562.001
impair defenses
disable modify tools
netwalker can detect and terminate active security software-related processes on infected systems.
t1562.001
impair defenses
disable modify tools
night dragon has disabled anti-virus and anti-spyware tools in some instances on the victims machines. the actors have also disabled proxy settings to allow direct communication from victims to the internet.
t1562.001
impair defenses
disable modify tools
powerstats can disable microsoft office protected view by changing registry keys.
t1562.001
impair defenses
disable modify tools
proton kills security tools like wireshark that are running.
t1562.001
impair defenses
disable modify tools
malware used by putter panda attempts to terminate processes corresponding to two components of sophos anti-virus savadminservice.exe and savservice.exe.
t1562.001
impair defenses
disable modify tools
pysa has the capability to stop antivirus services and disable windows defender.
t1562.001
impair defenses
disable modify tools
ragnar locker has attempted to terminatestop processes and services associated with endpoint security products.
t1562.001
impair defenses
disable modify tools
revil can connect to and disable the symantec server on the victim's network.
t1562.001
impair defenses
disable modify tools
robbinhood will search for windows services that are associated with antivirus software on the system and kill the process.
t1562.001
impair defenses
disable modify tools
rocke used scripts which detected and uninstalled antivirus software.
t1562.001
impair defenses
disable modify tools
runningrat kills antimalware running process.
t1562.001
impair defenses
disable modify tools
ryuk has stopped services related to anti-virus.
t1562.001
impair defenses
disable modify tools
skidmap has the ability to set selinux to permissive mode.
t1562.001
impair defenses
disable modify tools
sslmm identifies and kills anti-malware processes.
t1562.001
impair defenses
disable modify tools
strongpity can add directories used by the malware to the windows defender exclusions list to prevent detection.
t1562.001
impair defenses
disable modify tools
sunburst attempted to disable software security services following checks against a fnv-1a + xor hashed hardcoded blocklist.
t1562.001
impair defenses
disable modify tools
thiefquest uses the function kill_unwanted to obtain a list of running processes and kills each process matching a list of security related processes.
t1562.001
impair defenses
disable modify tools
tinyzbot can disable avira anti-virus.
t1562.001
impair defenses
disable modify tools
trickbot can disable windows defender.
t1562.001
impair defenses
disable modify tools
turla has used a amsi bypass which patches the in-memory amsi.dll in powershell scripts to bypass windows antimalware products.
t1562.001
impair defenses
disable modify tools
unc 2452 used the service control manager on a remote system to disable services associated with security monitoring products.
t1562.001
impair defenses
disable modify tools
unknown logger has functionality to disable security tools including kaspersky bitdefender and malwarebytes.
t1562.001
impair defenses
disable modify tools
wizard spider has shut down or uninstalled security applications on victim systems that might prevent ransomware from executing.
t1562.001
impair defenses
disable modify tools
zxshell can kill av products' processes.
t1562.003
impair defenses
Technique history logging
apt 38 has prepended a space to all of their terminal commands to operate without leaving traces in the histcontrol environment.
t1562.003
impair defenses
Technique history logging
attackers set savenothing option for psreadline to turn off logging powershell command history.
t1562.003
impair defenses
Technique history logging
threat actors set the command history size to zero export histfilesize=0 to prevent logging of commands.
t1562.003
impair defenses
Technique history logging
prior to executing powershell commands, attackers meddled with psreadline module to disable logging.
t1562.003
impair defenses
Technique history logging
after getting the initial access to the windows server, hackers changed psreadline logging destination to confuse incident responders.
t1563
remote service session hijacking
null
adversaries may take control of preexisting sessions with remote services to move laterally in an environment
t1563
remote service session hijacking
null
monitor for processes and command line arguments associated with hijacking service sessions
t1563
remote service session hijacking
null
monitor for user accounts logged into systems they would not normally access or access patterns to multiple systems over a relatively short period of time
t1563
remote service session hijacking
null
network traffic network traffic flow network traffic network traffic content logon session logon session creation command command execution process process creation
t1563
remote service session hijacking
null
other factors such as access patterns and activity that occurs after a remote login may indicate suspicious or malicious behavior with that service
t1563
remote service session hijacking
null
use of these services may be legitimate depending upon the network environment and how it is used
t1563
remote service session hijacking
null
users may use valid credentials to log into a service specifically designed to accept remote connections such as telnet ssh and rdp
t1564
hide artifacts
null
adversaries may attempt to hide artifacts associated with their behaviors to evade detection
t1564
hide artifacts
null
monitor event and authentication logs for records of hidden artifacts being used
t1564
hide artifacts
null
monitor files processes and command line arguments for actions indicative of hidden artifacts
t1564
hide artifacts
null
monitor the file system and shell commands for hidden attribute usage
t1564
hide artifacts
null
operating systems may have features to hide various artifacts such as important system files and administrative task execution to avoid disrupting user work environments and prevent users from changing files or features on the system
t1564
hide artifacts
null
process process creation file file creation application log application log content command command execution file file metadata user account user account creation user account user account metadata file file modification script script execution process os api execution windows registry windows registry key modification firmware firmware modification service service creation
t1565
data manipulation
null
adversaries may insert delete or manipulate data in order to manipulate external outcomes or hide activity
t1565
data manipulation
null
by manipulating data adversaries may attempt to affect a business process organizational understanding or decision making
t1565
data manipulation
null
file file metadata process os api execution file file creation file file deletion file file modification network traffic network traffic content network traffic network traffic flow