value,subtecnique,answer,id,name "Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password, from the operating system and software. Credentials can then be used to perform [Lateral Movement](TA0008) and access restricted information. Several of the tools mentioned in associated sub-techniques may be used by both adversaries and professional security testers. Additional custom tools likely exist as well. ",0,reject,T1003,OS Credential Dumping "Adversaries may search local system sources, such as file systems or local databases, to find files of interest and sensitive data prior to Exfiltration. Adversaries may do this using a [Command and Scripting Interpreter](T1059), such as [cmd](S0106), which has functionality to interact with the file system to gather information. Some adversaries may also use [Automated Collection](T1119) on the local system. ",0,reject,T1005,Data from Local System "Adversaries may directly access a volume to bypass file access controls and file system monitoring. Windows allows programs to have direct access to logical volumes. Programs with direct access may read and write files directly from the drive by analyzing file system data structures. This technique bypasses Windows file access controls as well as file system monitoring tools. (Citation: Hakobyan 2009) Utilities, such as NinjaCopy, exist to perform these actions in PowerShell. (Citation: Github PowerSploit Ninjacopy)",0,reject,T1006,Direct Volume Access "Adversaries may try to get information about registered services. Commands that may obtain information about services using operating system utilities are ""sc,"" ""tasklist /svc"" using [Tasklist](S0057), and ""net start"" using [Net](S0039), but adversaries may also use other tools as well. Adversaries may use the information from [System Service Discovery](T1007) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.",0,reject,T1007,System Service Discovery Adversaries may use fallback or alternate communication channels if the primary channel is compromised or inaccessible in order to maintain reliable command and control and to avoid data transfer thresholds.,0,reject,T1008,Fallback Channels Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used or give context to information collected by a keylogger.,0,reject,T1010,Application Window Discovery "Adversaries may attempt to exfiltrate data over a different network medium than the command and control channel. If the command and control network is a wired Internet connection, the exfiltration may occur, for example, over a WiFi connection, modem, cellular data connection, Bluetooth, or another radio frequency (RF) channel. Adversaries may choose to do this if they have sufficient access or proximity, and the connection might not be secured or defended as well as the primary Internet-connected channel because it is not routed through the same enterprise network",0,reject,T1011,Exfiltration Over Other Network Medium "Adversaries may interact with the Windows Registry to gather information about the system, configuration, and installed software. The Registry contains a significant amount of information about the operating system, configuration, software, and security.(Citation: Wikipedia Windows Registry) Information can easily be queried using the [Reg](S0075) utility, though other means to access the Registry exist. Some of the information may help adversaries to further their operation within a network. Adversaries may use the information from [Query Registry](T1012) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.",0,reject,T1012,Query Registry "Adversaries may use rootkits to hide the presence of programs, files, network connections, services, drivers, and other system components. Rootkits are programs that hide the existence of malware by intercepting/hooking and modifying operating system API calls that supply system information. (Citation: Symantec Windows Rootkits) Rootkits or rootkit enabling functionality may reside at the user or kernel level in the operating system or lower, to include a hypervisor, Master Boot Record, or [System Firmware](T1542.001). (Citation: Wikipedia Rootkit) Rootkits have been seen for Windows, Linux, and Mac OS X systems. (Citation: CrowdStrike Linux Rootkit) (Citation: BlackHat Mac OSX Rootkit)",0,reject,T1014,Rootkit "Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include [Arp](S0099), [ipconfig](S0100)/[ifconfig](S0101), [nbtstat](S0102), and [route](S0103). Adversaries may use the information from [System Network Configuration Discovery](T1016) during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do next. ",0,reject,T1016,System Network Configuration Discovery "Adversaries may attempt to get a listing of other systems by IP address, hostname, or other logical identifier on a network that may be used for Lateral Movement from the current system. Functionality could exist within remote access tools to enable this, but utilities available on the operating system could also be used such as [Ping](S0097) or `net view` using [Net](S0039). Adversaries may also use local host files (ex: `C:\Windows\System32\Drivers\etc\hosts` or `/etc/hosts`) in order to discover the hostname to IP address mappings of remote systems. ",0,reject,T1018,Remote System Discovery "Adversaries may exfiltrate data, such as sensitive documents, through the use of automated processing after being gathered during Collection. When automated exfiltration is used, other exfiltration techniques likely apply as well to transfer the information out of the network, such as [Exfiltration Over C2 Channel](T1041) and [Exfiltration Over Alternative Protocol](T1048).",0,reject,T1020,Automated Exfiltration "Adversaries may use [Valid Accounts](T1078) to log into a service specifically designed to accept remote connections, such as telnet, SSH, and VNC. The adversary may then perform actions as the logged-on user. In an enterprise environment, servers and workstations can be organized into domains. Domains provide centralized identity management, allowing users to login using one set of credentials across the entire network. If an adversary is able to obtain a set of valid domain credentials, they could login to many different machines using remote access protocols such as secure shell (SSH) or remote desktop protocol (RDP).(Citation: SSH Secure Shell)(Citation: TechNet Remote Desktop Services) Legitimate applications (such as [Software Deployment Tools](T1072) and other administrative programs) may utilize [Remote Services](T1021) to access remote hosts. For example, Apple Remote Desktop (ARD) on macOS is native software used for remote management. ARD leverages a blend of protocols, including [VNC](T1021.005) to send the screen and control buffers and [SSH](T1021.004) for secure file transfer.(Citation: Remote Management MDM macOS)(Citation: Kickstart Apple Remote Desktop commands)(Citation: Apple Remote Desktop Admin Guide 3.3) Adversaries can abuse applications such as ARD to gain remote code execution and perform lateral movement. In versions of macOS prior to 10.14, an adversary can escalate an SSH session to an ARD session which enables an adversary to accept TCC (Transparency, Consent, and Control) prompts without user interaction and gain access to data.(Citation: FireEye 2019 Apple Remote Desktop)(Citation: Lockboxx ARD 2019)(Citation: Kickstart Apple Remote Desktop commands)",0,reject,T1021,Remote Services "Adversaries may search connected removable media on computers they have compromised to find files of interest. Sensitive data can be collected from any removable media (optical disk drive, USB memory, etc.) connected to the compromised system prior to Exfiltration. Interactive command shells may be in use, and common functionality within [cmd](S0106) may be used to gather information. Some adversaries may also use [Automated Collection](T1119) on removable media.",0,reject,T1025,Data from Removable Media "Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit. This is common behavior that can be used across different platforms and the network to evade defenses. Payloads may be compressed, archived, or encrypted in order to avoid detection. These payloads may be used during Initial Access or later to mitigate detection. Sometimes a user's action may be required to open and [Deobfuscate/Decode Files or Information](T1140) for [User Execution](T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary. (Citation: Volexity PowerDuke November 2016) Adversaries may also used compressed or archived scripts, such as JavaScript. Portions of files can also be encoded to hide the plain-text strings that would otherwise help defenders with discovery. (Citation: Linux/Cdorked.A We Live Security Analysis) Payloads may also be split into separate, seemingly benign files that only reveal malicious functionality when reassembled. (Citation: Carbon Black Obfuscation Sept 2016) Adversaries may also obfuscate commands executed from payloads or directly via a [Command and Scripting Interpreter](T1059). Environment variables, aliases, characters, and other platform/language specific semantics can be used to evade signature based detections and application control mechanisms. (Citation: FireEye Obfuscation June 2017) (Citation: FireEye Revoke-Obfuscation July 2017)(Citation: PaloAlto EncodedCommand March 2017) ",0,reject,T1027,Obfuscated Files or Information "Adversaries may schedule data exfiltration to be performed only at certain times of day or at certain intervals. This could be done to blend traffic patterns with normal activity or availability. When scheduled exfiltration is used, other exfiltration techniques likely apply as well to transfer the information out of the network, such as [Exfiltration Over C2 Channel](T1041) or [Exfiltration Over Alternative Protocol](T1048).",0,reject,T1029,Scheduled Transfer An adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds. This approach may be used to avoid triggering network data transfer threshold alerts.,0,reject,T1030,Data Transfer Size Limits "Adversaries may attempt to identify the primary user, currently logged in user, set of users that commonly uses a system, or whether a user is actively using the system. They may do this, for example, by retrieving account usernames or by using [OS Credential Dumping](T1003). The information may be collected in a number of different ways using other Discovery techniques, because user and username details are prevalent throughout a system and include running process ownership, file/directory ownership, session information, and system logs. Adversaries may use the information from [System Owner/User Discovery](T1033) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Various utilities and commands may acquire this information, including `whoami`. In macOS and Linux, the currently logged in user can be identified with `w` and `who`. On macOS the `dscl . list /Users | grep -v '_'` command can also be used to enumerate user accounts. Environment variables, such as `%USERNAME%` and `$USER`, may also be used to access this information.",0,reject,T1033,System Owner/User Discovery "Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names. Renaming abusable system utilities to evade security monitoring is also a form of [Masquerading](T1036).(Citation: LOLBAS Main Site)",0,reject,T1036,Masquerading "Adversaries may use scripts automatically executed at boot or logon initialization to establish persistence. Initialization scripts can be used to perform administrative functions, which may often execute other programs or send information to an internal logging server. These scripts can vary based on operating system and whether applied locally or remotely. Adversaries may use these scripts to maintain persistence on a single system. Depending on the access configuration of the logon scripts, either local credentials or an administrator account may be necessary. An adversary may also be able to escalate their privileges since some boot or logon initialization scripts run with higher privileges.",0,reject,T1037,Boot or Logon Initialization Scripts "Adversaries may search network shares on computers they have compromised to find files of interest. Sensitive data can be collected from remote systems via shared network drives (host shared directory, network file server, etc.) that are accessible from the current system prior to Exfiltration. Interactive command shells may be in use, and common functionality within [cmd](S0106) may be used to gather information.",0,reject,T1039,Data from Network Shared Drive "Adversaries may delete or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. Locations and format of logs are platform or product-specific, however standard operating system logs are captured as Windows events or Linux/macOS files such as [Bash History](T1552.003) and /var/log/*. These actions may interfere with event collection, reporting, or other notifications used to detect intrusion activity. This may compromise the integrity of security solutions by causing notable events to go unreported. This activity may also impede forensic analysis and incident response, due to lack of sufficient data to determine what occurred.",0,reject,T1070,Indicator Removal on Host "Adversaries may communicate using application layer protocols to avoid detection/network filtering by blending in with existing traffic. Commands to the remote system, and often the results of those commands, will be embedded within the protocol traffic between the client and server. Adversaries may utilize many different protocols, including those used for web browsing, transferring files, electronic mail, or DNS. For connections that occur internally within an enclave (such as those between a proxy or pivot node and other nodes), commonly used protocols are SMB, SSH, or RDP. ",0,reject,T1071,Application Layer Protocol "Adversaries may gain access to and use third-party software suites installed within an enterprise network, such as administration, monitoring, and deployment systems, to move laterally through the network. Third-party applications and software deployment systems may be in use in the network environment for administration purposes (e.g., SCCM, HBSS, Altiris, etc.). Access to a third-party network-wide or enterprise-wide software system may enable an adversary to have remote code execution on all systems that are connected to such a system. The access may be used to laterally move to other systems, gather information, or cause a specific effect, such as wiping the hard drives on all endpoints. The permissions required for this action vary by system configuration; local credentials may be sufficient with direct access to the third-party system, or specific domain credentials may be required. However, the system may require an administrative account to log in or to perform it's intended purpose.",0,reject,T1072,Software Deployment Tools "Adversaries may stage collected data in a central location or directory prior to Exfiltration. Data may be kept in separate files or combined into one file through techniques such as [Archive Collected Data](T1560). Interactive command shells may be used, and common functionality within [cmd](S0106) and bash may be used to copy data into a staging location.(Citation: PWC Cloud Hopper April 2017) In cloud environments, adversaries may stage data within a particular instance or virtual machine before exfiltration. An adversary may [Create Cloud Instance](T1578.002) and stage data in that instance.(Citation: Mandiant M-Trends 2020) Adversaries may choose to stage data from a victim network in a centralized location prior to Exfiltration to minimize the number of connections made to their C2 server and better evade detection.",0,reject,T1074,Data Staged "Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion. Compromised credentials may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access and remote desktop. Compromised credentials may also grant an adversary increased privilege to specific systems or access to restricted areas of the network. Adversaries may choose not to use malware or tools in conjunction with the legitimate access those credentials provide to make it harder to detect their presence. The overlap of permissions for local, domain, and cloud accounts across a network of systems is of concern because the adversary may be able to pivot across accounts and systems to reach a high level of access (i.e., domain or enterprise administrator) to bypass access controls set within the enterprise. (Citation: TechNet Credential Theft)",0,reject,T1078,Valid Accounts " Adversaries may deliver payloads to remote systems by adding content to shared storage locations, such as network drives or internal code repositories. Content stored on network drives or in other shared locations may be tainted by adding malicious programs, scripts, or exploit code to otherwise valid files. Once a user opens the shared tainted content, the malicious portion can be executed to run the adversary's code on a remote system. Adversaries may use tainted shared content to move laterally. A directory share pivot is a variation on this technique that uses several other techniques to propagate malware when users access a shared network directory. It uses [Shortcut Modification](T1547.009) of directory .LNK files that use [Masquerading](T1036) to look like the real directories, which are hidden through [Hidden Files and Directories](T1564.001). The malicious .LNK-based directories have an embedded command that executes the hidden malware file in the directory and then opens the real intended directory so that the user's expected action still occurs. When used with frequently used network directories, the technique may result in frequent reinfections and broad access to systems and potentially to new and higher privileged accounts. (Citation: Retwin Directory Share Pivot) Adversaries may also compromise shared network directories through binary infections by appending or prepending its code to the healthy binary on the shared network directory. The malware may modify the original entry point (OEP) of the healthy binary to ensure that it is executed before the legitimate code. The infection could continue to spread via the newly infected file when it is executed by a remote system. These infections may target both binary and non-binary formats that end with extensions including, but not limited to, .EXE, .DLL, .SCR, .BAT, and/or .VBS.",0,reject,T1080,Taint Shared Content "An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use the information from [System Information Discovery](T1082) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Tools such as [Systeminfo](S0096) can be used to gather detailed system information. If running with privileged access, a breakdown of system data can be gathered through the `systemsetup` configuration tool on macOS. As an example, adversaries with user-level access can execute the `df -aH` command to obtain currently mounted disks and associated freely available space. [System Information Discovery](T1082) combined with information gathered from other forms of discovery and reconnaissance can drive payload development and concealment.(Citation: OSX.FairyTale)(Citation: 20 macOS Common Tools and Techniques) Infrastructure as a Service (IaaS) cloud providers such as AWS, GCP, and Azure allow access to instance and virtual machine information via APIs. Successful authenticated API calls can return data such as the operating system platform and status of a particular instance or the model view of a virtual machine.(Citation: Amazon Describe Instance)(Citation: Google Instances Resource)(Citation: Microsoft Virutal Machine API)",0,reject,T1082,System Information Discovery "Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. Adversaries may use the information from [File and Directory Discovery](T1083) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Many command shell utilities can be used to obtain this information. Examples include `dir`, `tree`, `ls`, `find`, and `locate`.(Citation: Windows Commands JPCERT) Custom tools may also be used to gather file and directory information and interact with the [Native API](T1106).",0,reject,T1083,File and Directory Discovery "Adversaries may create multiple stages for command and control that are employed under different conditions or for certain functions. Use of multiple stages may obfuscate the command and control channel to make detection more difficult. Remote access tools will call back to the first-stage command and control server for instructions. The first stage may have automated capabilities to collect basic host information, update tools, and upload additional files. A second remote access tool (RAT) could be uploaded at that point to redirect the host to the second-stage command and control server. The second stage will likely be more fully featured and allow the adversary to interact with the system through a reverse shell and additional RAT features. The different stages will likely be hosted separately with no overlapping infrastructure. The loader may also have backup first-stage callbacks or [Fallback Channels](T1008) in case the original first-stage communication path is discovered and blocked.",0,reject,T1104,Multi-Stage Channels "Adversaries may transfer tools or other files from an external system into a compromised environment. Files may be copied from an external adversary controlled system through the command and control channel to bring tools into the victim network or through alternate protocols with another tool such as FTP. Files can also be copied over on Mac and Linux with native tools like scp, rsync, and sftp.",0,reject,T1105,Ingress Tool Transfer "An adversary can leverage a computer's peripheral devices (e.g., integrated cameras or webcams) or applications (e.g., video call services) to capture video recordings for the purpose of gathering information. Images may also be captured from devices or applications, potentially in specified intervals, in lieu of video files. Malware or scripts may be used to interact with the devices through an available API provided by the operating system or an application to capture video or images. Video or image files may be written to disk and exfiltrated later. This technique differs from [Screen Capture](T1113) due to use of specific devices or applications for video recording rather than capturing the victim's screen. In macOS, there are a few different malware samples that record the user's webcam such as FruitFly and Proton. (Citation: objective-see 2017 review)",0,reject,T1125,Video Capture "Adversaries may take advantage of trusted developer utilities to proxy execution of malicious payloads. There are many utilities used for software development related tasks that can be used to execute code in various forms to assist in development, debugging, and reverse engineering.(Citation: engima0x3 DNX Bypass)(Citation: engima0x3 RCSI Bypass)(Citation: Exploit Monday WinDbg)(Citation: LOLBAS Tracker) These utilities may often be signed with legitimate certificates that allow them to execute on a system and proxy execution of malicious code through a trusted process that effectively bypasses application control solutions.",0,reject,T1127,Trusted Developer Utilities Proxy Execution "Adversaries may execute malicious payloads via loading shared modules. The Windows module loader can be instructed to load DLLs from arbitrary local paths and arbitrary Universal Naming Convention (UNC) network paths. This functionality resides in NTDLL.dll and is part of the Windows [Native API](T1106) which is called from functions like `CreateProcess`, `LoadLibrary`, etc. of the Win32 API. (Citation: Wikipedia Windows Library Files) The module loader can load DLLs: * via specification of the (fully-qualified or relative) DLL pathname in the IMPORT directory; * via EXPORT forwarded to another DLL, specified with (fully-qualified or relative) pathname (but without extension); * via an NTFS junction or symlink program.exe.local with the fully-qualified or relative pathname of a directory containing the DLLs specified in the IMPORT directory or forwarded EXPORTs; * via `<file name=""filename.extension"" loadFrom=""fully-qualified or relative pathname"">` in an embedded or external ""application manifest"". The file name refers to an entry in the IMPORT directory or a forwarded EXPORT. Adversaries may use this functionality as a way to execute arbitrary payloads on a victim system. For example, malware may execute share modules to load additional components or features.",0,reject,T1129,Shared Modules "Adversaries may encode data to make the content of command and control traffic more difficult to detect. Command and control (C2) information can be encoded using a standard data encoding system. Use of data encoding may adhere to existing protocol specifications and includes use of ASCII, Unicode, Base64, MIME, or other binary-to-text and character encoding systems.(Citation: Wikipedia Binary-to-text Encoding) (Citation: Wikipedia Character Encoding) Some data encoding systems may also result in data compression, such as gzip.",0,reject,T1132,Data Encoding "Adversaries may leverage external-facing remote services to initially access and/or persist within a network. Remote services such as VPNs, Citrix, and other access mechanisms allow users to connect to internal enterprise network resources from external locations. There are often remote service gateways that manage connections and credential authentication for these services. Services such as [Windows Remote Management](T1021.006) and [VNC](T1021.005) can also be used externally.(Citation: MacOS VNC software for Remote Desktop) Access to [Valid Accounts](T1078) to use the service is often a requirement, which could be obtained through credential pharming or by obtaining the credentials from users after compromising the enterprise network.(Citation: Volexity Virtual Private Keylogging) Access to remote services may be used as a redundant or persistent access mechanism during an operation. Access may also be gained through an exposed service that doesn’t require authentication. In containerized environments, this may include an exposed Docker API, Kubernetes API server, kubelet, or web application such as the Kubernetes dashboard.(Citation: Trend Micro Exposed Docker Server)(Citation: Unit 42 Hildegard Malware)",0,reject,T1133,External Remote Services "Adversaries may modify access tokens to operate under a different user or system security context to perform actions and bypass access controls. Windows uses access tokens to determine the ownership of a running process. A user can manipulate access tokens to make a running process appear as though it is the child of a different process or belongs to someone other than the user that started the process. When this occurs, the process also takes on the security context associated with the new token. An adversary can use built-in Windows API functions to copy access tokens from existing processes; this is known as token stealing. These token can then be applied to an existing process (i.e. [Token Impersonation/Theft](T1134.001)) or used to spawn a new process (i.e. [Create Process with Token](T1134.002)). An adversary must already be in a privileged user context (i.e. administrator) to steal a token. However, adversaries commonly use token stealing to elevate their security context from the administrator level to the SYSTEM level. An adversary can then use a token to authenticate to a remote system as the account for that token if the account has appropriate permissions on the remote system.(Citation: Pentestlab Token Manipulation) Any standard user can use the `runas` command, and the Windows API functions, to create impersonation tokens; it does not require access to an administrator account. There are also other mechanisms, such as Active Directory fields, that can be used to modify access tokens.",0,reject,T1134,Access Token Manipulation "Adversaries may look for folders and drives shared on remote systems as a means of identifying sources of information to gather as a precursor for Collection and to identify potential systems of interest for Lateral Movement. Networks often contain shared network drives and folders that enable users to access file directories on various systems across a network. File sharing over a Windows network occurs over the SMB protocol. (Citation: Wikipedia Shared Resource) (Citation: TechNet Shared Folder) [Net](S0039) can be used to query a remote system for available shared drives using the `net view \\\\remotesystem` command. It can also be used to query shared drives on the local system using `net share`. For macOS, the `sharing -l` command lists all shared points used for smb services.",0,reject,T1135,Network Share Discovery "Adversaries may create an account to maintain access to victim systems. With a sufficient level of access, creating such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system. Accounts may be created on the local system or within a domain or cloud tenant. In cloud environments, adversaries may create accounts that only have access to specific services, which can reduce the chance of detection.",0,reject,T1136,Create Account "Adversaries may leverage Microsoft Office-based applications for persistence between startups. Microsoft Office is a fairly common application suite on Windows-based operating systems within an enterprise network. There are multiple mechanisms that can be used with Office for persistence when an Office-based application is started; this can include the use of Office Template Macros and add-ins. A variety of features have been discovered in Outlook that can be abused to obtain persistence, such as Outlook rules, forms, and Home Page.(Citation: SensePost Ruler GitHub) These persistence mechanisms can work within Outlook or be used through Office 365.(Citation: TechNet O365 Outlook Rules)",0,reject,T1137,Office Application Startup "Adversaries may use [Obfuscated Files or Information](T1027) to hide artifacts of an intrusion from analysis. They may require separate mechanisms to decode or deobfuscate that information depending on how they intend to use it. Methods for doing that include built-in functionality of malware or by using utilities present on the system. One such example is use of [certutil](S0160) to decode a remote access tool portable executable file that has been hidden inside a certificate file. (Citation: Malwarebytes Targeted Attack against Saudi Arabia) Another example is using the Windows `copy /b` command to reassemble binary fragments into a malicious payload. (Citation: Carbon Black Obfuscation Sept 2016) Sometimes a user's action may be required to open it for deobfuscation or decryption as part of [User Execution](T1204). The user may also be required to input a password to open a password protected compressed/encrypted file that was provided by the adversary. (Citation: Volexity PowerDuke November 2016)",0,reject,T1140,Deobfuscate/Decode Files or Information "Adversaries may abuse Internet browser extensions to establish persistent access to victim systems. Browser extensions or plugins are small programs that can add functionality and customize aspects of Internet browsers. They can be installed directly or through a browser's app store and generally have access and permissions to everything that the browser can access.(Citation: Wikipedia Browser Extension)(Citation: Chrome Extensions Definition) Malicious extensions can be installed into a browser through malicious app store downloads masquerading as legitimate extensions, through social engineering, or by an adversary that has already compromised a system. Security can be limited on browser app stores so it may not be difficult for malicious extensions to defeat automated scanners.(Citation: Malicious Chrome Extension Numbers) Depending on the browser, adversaries may also manipulate an extension's update url to install updates from an adversary controlled server or manipulate the mobile configuration file to silently install additional extensions. Previous to macOS 11, adversaries could silently install browser extensions via the command line using the `profiles` tool to install malicious `.mobileconfig` files. In macOS 11+, the use of the `profiles` tool can no longer install configuration profiles, however `.mobileconfig` files can be planted and installed with user interaction.(Citation: xorrior chrome extensions macOS) Once the extension is installed, it can browse to websites in the background,(Citation: Chrome Extension Crypto Miner)(Citation: ICEBRG Chrome Extensions) steal all information that a user enters into a browser (including credentials)(Citation: Banker Google Chrome Extension Steals Creds)(Citation: Catch All Chrome Extension) and be used as an installer for a RAT for persistence. There have also been instances of botnets using a persistent backdoor through malicious Chrome extensions.(Citation: Stantinko Botnet) There have also been similar examples of extensions being used for command & control.(Citation: Chrome Extension C2 Malware)",0,reject,T1176,Browser Extensions "Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.(Citation: Wikipedia Man in the Browser) A specific example is when an adversary injects software into a browser that allows them to inherit cookies, HTTP sessions, and SSL client certificates of a user then use the browser as a way to pivot into an authenticated intranet.(Citation: Cobalt Strike Browser Pivot)(Citation: ICEBRG Chrome Extensions) Executing browser-based behaviors such as pivoting may require specific process permissions, such as `SeDebugPrivilege` and/or high-integrity/administrator rights. Another example involves pivoting browser traffic from the adversary's browser through the user's browser by setting up a proxy which will redirect web traffic. This does not alter the user's traffic in any way, and the proxy connection can be severed as soon as the browser is closed. The adversary assumes the security context of whichever browser process the proxy is injected into. Browsers typically create a new process for each tab that is opened and permissions and certificates are separated accordingly. With these permissions, an adversary could potentially browse to any resource on an intranet, such as [Sharepoint](T1213.002) or webmail, that is accessible through the browser and which the browser has sufficient permissions. Browser pivoting may also bypass security provided by 2-factor authentication.(Citation: cobaltstrike manual)",0,reject,T1185,Browser Session Hijacking "Adversaries may gather credential material by invoking or forcing a user to automatically provide authentication information through a mechanism in which they can intercept. The Server Message Block (SMB) protocol is commonly used in Windows networks for authentication and communication between systems for access to resources and file sharing. When a Windows system attempts to connect to an SMB resource it will automatically attempt to authenticate and send credential information for the current user to the remote system. (Citation: Wikipedia Server Message Block) This behavior is typical in enterprise environments so that users do not need to enter credentials to access network resources. Web Distributed Authoring and Versioning (WebDAV) is also typically used by Windows systems as a backup protocol when SMB is blocked or fails. WebDAV is an extension of HTTP and will typically operate over TCP ports 80 and 443. (Citation: Didier Stevens WebDAV Traffic) (Citation: Microsoft Managing WebDAV Security) Adversaries may take advantage of this behavior to gain access to user account hashes through forced SMB/WebDAV authentication. An adversary can send an attachment to a user through spearphishing that contains a resource link to an external server controlled by the adversary (i.e. [Template Injection](T1221)), or place a specially crafted file on navigation path for privileged accounts (e.g. .SCF file placed on desktop) or on a publicly accessible share to be accessed by victim(s). When the user's system accesses the untrusted resource it will attempt authentication and send information, including the user's hashed credentials, over SMB to the adversary controlled server. (Citation: GitHub Hashjacking) With access to the credential hash, an adversary can perform off-line [Brute Force](T1110) cracking to gain access to plaintext credentials. (Citation: Cylance Redirect to SMB) There are several different ways this can occur. (Citation: Osanda Stealing NetNTLM Hashes) Some specifics from in-the-wild use include: * A spearphishing attachment containing a document with a resource that is automatically loaded when the document is opened (i.e. [Template Injection](T1221)). The document can include, for example, a request similar to `file[:]//[remote address]/Normal.dotm` to trigger the SMB request. (Citation: US-CERT APT Energy Oct 2017) * A modified .LNK or .SCF file with the icon filename pointing to an external reference such as `\\[remote address]\pic.png` that will force the system to load the resource when the icon is rendered to repeatedly gather credentials. (Citation: US-CERT APT Energy Oct 2017)",0,reject,T1187,Forced Authentication "Adversaries may gain access to a system through a user visiting a website over the normal course of browsing. With this technique, the user's web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring [Application Access Token](T1550.001). Multiple ways of delivering exploit code to a browser exist, including: * A legitimate website is compromised where adversaries have injected some form of malicious code such as JavaScript, iFrames, and cross-site scripting. * Malicious ads are paid for and served through legitimate ad providers. * Built-in web application interfaces are leveraged for the insertion of any other kind of object that can be used to display web content or contain a script that executes on the visiting client (e.g. forum posts, comments, and other user controllable web content). Often the website used by an adversary is one visited by a specific community, such as government, a particular industry, or region, where the goal is to compromise a specific user or set of users based on a shared interest. This kind of targeted attack is referred to a strategic web compromise or watering hole attack. There are several known examples of this occurring.(Citation: Shadowserver Strategic Web Compromise) Typical drive-by compromise process: 1. A user visits a website that is used to host the adversary controlled content. 2. Scripts automatically execute, typically searching versions of the browser and plugins for a potentially vulnerable version. * The user may be required to assist in this process by enabling scripting or active website components and ignoring warning dialog boxes. 3. Upon finding a vulnerable version, exploit code is delivered to the browser. 4. If exploitation is successful, then it will give the adversary code execution on the user's system unless other protections are in place. * In some cases a second visit to the website after the initial scan is required before exploit code is delivered. Unlike [Exploit Public-Facing Application](T1190), the focus of this technique is to exploit software on a client endpoint upon visiting a website. This will commonly give an adversary access to systems on the internal network instead of external systems that may be in a DMZ. Adversaries may also use compromised websites to deliver a user to a malicious application designed to [Steal Application Access Token](T1528)s, like OAuth tokens, to gain access to protected applications and information. These malicious applications have been delivered through popups on legitimate websites.(Citation: Volexity OceanLotus Nov 2017)",0,reject,T1189,Drive-by Compromise "Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands in order to cause unintended or unanticipated behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability. These applications are often websites, but can include databases (like SQL)(Citation: NVD CVE-2016-6662), standard services (like SMB(Citation: CIS Multiple SMB Vulnerabilities) or SSH), network device administration and management protocols (like SNMP and Smart Install(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)), and any other applications with Internet accessible open sockets, such as web servers and related services.(Citation: NVD CVE-2014-7169) Depending on the flaw being exploited this may include [Exploitation for Defense Evasion](T1211). If an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs, exploit container host access via [Escape to Host](T1611), or take advantage of weak identity and access management policies. For websites and databases, the OWASP top 10 and CWE top 25 highlight the most common web-based vulnerabilities.(Citation: OWASP Top 10)(Citation: CWE top 25)",0,reject,T1190,Exploit Public-Facing Application "Adversaries may manipulate products or product delivery mechanisms prior to receipt by a final consumer for the purpose of data or system compromise. Supply chain compromise can take place at any stage of the supply chain including: * Manipulation of development tools * Manipulation of a development environment * Manipulation of source code repositories (public or private) * Manipulation of source code in open-source dependencies * Manipulation of software update/distribution mechanisms * Compromised/infected system images (multiple cases of removable media infected at the factory) (Citation: IBM Storwize) (Citation: Schneider Electric USB Malware) * Replacement of legitimate software with modified versions * Sales of modified/counterfeit products to legitimate distributors * Shipment interdiction While supply chain compromise can impact any component of hardware or software, attackers looking to gain execution have often focused on malicious additions to legitimate software in software distribution or update channels. (Citation: Avast CCleaner3 2018) (Citation: Microsoft Dofoil 2018) (Citation: Command Five SK 2011) Targeting may be specific to a desired victim set (Citation: Symantec Elderwood Sept 2012) or malicious software may be distributed to a broad set of consumers but only move on to additional tactics on specific victims. (Citation: Avast CCleaner3 2018) (Citation: Command Five SK 2011) Popular open source projects that are used as dependencies in many applications may also be targeted as a means to add malicious code to users of the dependency. (Citation: Trendmicro NPM Compromise)",0,reject,T1195,Supply Chain Compromise "Adversaries may abuse BITS jobs to persistently execute or clean up after malicious payloads. Windows Background Intelligent Transfer Service (BITS) is a low-bandwidth, asynchronous file transfer mechanism exposed through [Component Object Model](T1559.001) (COM).(Citation: Microsoft COM)(Citation: Microsoft BITS) BITS is commonly used by updaters, messengers, and other applications preferred to operate in the background (using available idle bandwidth) without interrupting other networked applications. File transfer tasks are implemented as BITS jobs, which contain a queue of one or more file operations. The interface to create and manage BITS jobs is accessible through [PowerShell](T1059.001) and the [BITSAdmin](S0190) tool.(Citation: Microsoft BITS)(Citation: Microsoft BITSAdmin) Adversaries may abuse BITS to download, execute, and even clean up after running malicious code. BITS tasks are self-contained in the BITS job database, without new files or registry modifications, and often permitted by host firewalls.(Citation: CTU BITS Malware June 2016)(Citation: Mondok Windows PiggyBack BITS May 2007)(Citation: Symantec BITS May 2007) BITS enabled execution may also enable persistence by creating long-standing jobs (the default maximum lifetime is 90 days and extendable) or invoking an arbitrary program when a job completes or errors (including after system reboots).(Citation: PaloAlto UBoatRAT Nov 2017)(Citation: CTU BITS Malware June 2016) BITS upload functionalities can also be used to perform [Exfiltration Over Alternative Protocol](T1048).(Citation: CTU BITS Malware June 2016)",0,reject,T1197,BITS Jobs "Adversaries may breach or otherwise leverage organizations who have access to intended victims. Access through trusted third party relationship exploits an existing connection that may not be protected or receives less scrutiny than standard mechanisms of gaining access to a network. Organizations often grant elevated access to second or third-party external providers in order to allow them to manage internal systems as well as cloud-based environments. Some examples of these relationships include IT services contractors, managed security providers, infrastructure contractors (e.g. HVAC, elevators, physical security). The third-party provider's access may be intended to be limited to the infrastructure being maintained, but may exist on the same network as the rest of the enterprise. As such, [Valid Accounts](T1078) used by the other party for access to internal network systems may be compromised and used.(Citation: CISA IT Service Providers)",0,reject,T1199,Trusted Relationship "Adversaries may introduce computer accessories, computers, or networking hardware into a system or network that can be used as a vector to gain access. While public references of usage by threat actors are scarce, many red teams/penetration testers leverage hardware additions for initial access. Commercial and open source products can be leveraged with capabilities such as passive network tapping (Citation: Ossmann Star Feb 2011), network traffic modification (i.e. [Adversary-in-the-Middle](T1557)) (Citation: Aleks Weapons Nov 2015), keystroke injection (Citation: Hak5 RubberDuck Dec 2016), kernel memory reading via DMA (Citation: Frisk DMA August 2016), addition of new wireless access to an existing network (Citation: McMillan Pwn March 2012), and others.",0,reject,T1200,Hardware Additions "Adversaries may attempt to access detailed information about the password policy used within an enterprise network or cloud environment. Password policies are a way to enforce complex passwords that are difficult to guess or crack through [Brute Force](T1110). This information may help the adversary to create a list of common passwords and launch dictionary and/or brute force attacks which adheres to the policy (e.g. if the minimum password length should be 8, then not trying passwords such as 'pass123'; not checking for more than 3-4 passwords per account if the lockout is set to 6 as to not lock out accounts). Password policies can be set and discovered on Windows, Linux, and macOS systems via various command shell utilities such as `net accounts (/domain)`, `Get-ADDefaultDomainPasswordPolicy`, `chage -l `, `cat /etc/pam.d/common-password`, and `pwpolicy getaccountpolicies` (Citation: Superuser Linux Password Policies) (Citation: Jamf User Password Policies). Password policies can be discovered in cloud environments using available APIs such as `GetAccountPasswordPolicy` in AWS (Citation: AWS GetPasswordPolicy).",0,reject,T1201,Password Policy Discovery "Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters. Various Windows utilities may be used to execute commands, possibly without invoking [cmd](S0106). For example, [Forfiles](S0193), the Program Compatibility Assistant (pcalua.exe), components of the Windows Subsystem for Linux (WSL), as well as other utilities may invoke the execution of programs and commands from a [Command and Scripting Interpreter](T1059), Run window, or via scripts. (Citation: VectorSec ForFiles Aug 2017) (Citation: Evi1cg Forfiles Nov 2017) Adversaries may abuse these features for [Defense Evasion](TA0005), specifically to perform arbitrary execution while subverting detections and/or mitigation controls (such as Group Policy) that limit/prevent the usage of [cmd](S0106) or file extensions more commonly associated with malicious payloads.",0,reject,T1202,Indirect Command Execution "Adversaries may exploit software vulnerabilities in client applications to execute code. Vulnerabilities can exist in software due to unsecure coding practices that can lead to unanticipated behavior. Adversaries can take advantage of certain vulnerabilities through targeted exploitation for the purpose of arbitrary code execution. Oftentimes the most valuable exploits to an offensive toolkit are those that can be used to obtain code execution on a remote system because they can be used to gain access to that system. Users will expect to see files related to the applications they commonly used to do work, so they are a useful target for exploit research and development because of their high utility. Several types exist: # Browser-based Exploitation # Web browsers are a common target through [Drive-by Compromise](T1189) and [Spearphishing Link](T1566.002). Endpoint systems may be compromised through normal web browsing or from certain users being targeted by links in spearphishing emails to adversary controlled sites used to exploit the web browser. These often do not require an action by the user for the exploit to be executed. # Office Applications # Common office and productivity applications such as Microsoft Office are also targeted through [Phishing](T1566). Malicious files will be transmitted directly as attachments or through links to download them. These require the user to open the document or file for the exploit to run. # Common Third-party Applications # Other applications that are commonly seen or are part of the software deployed in a target network may also be used for exploitation. Applications such as Adobe Reader and Flash, which are common in enterprise environments, have been routinely targeted by adversaries attempting to gain access to systems. Depending on the software and nature of the vulnerability, some may be exploited in the browser or require the user to open a file. For instance, some Flash exploits have been delivered as objects within Microsoft Office documents.",0,reject,T1203,Exploitation for Client Execution "An adversary may rely upon specific actions by a user in order to gain execution. Users may be subjected to social engineering to get them to execute malicious code by, for example, opening a malicious document file or link. These user actions will typically be observed as follow-on behavior from forms of [Phishing](T1566). While [User Execution](T1204) frequently occurs shortly after Initial Access it may occur at other phases of an intrusion, such as when an adversary places a file in a shared directory or on a user's desktop hoping that a user will click on it. This activity may also be seen shortly after [Internal Spearphishing](T1534).",0,reject,T1204,User Execution "Adversaries may use traffic signaling to hide open ports or other malicious functionality used for persistence or command and control. Traffic signaling involves the use of a magic value or sequence that must be sent to a system to trigger a special response, such as opening a closed port or executing a malicious task. This may take the form of sending a series of packets with certain characteristics before a port will be opened that the adversary can use for command and control. Usually this series of packets consists of attempted connections to a predefined sequence of closed ports (i.e. [Port Knocking](T1205.001)), but can involve unusual flags, specific strings, or other unique characteristics. After the sequence is completed, opening a port may be accomplished by the host-based firewall, but could also be implemented by custom software. Adversaries may also communicate with an already open port, but the service listening on that port will only respond to commands or trigger other malicious functionality if passed the appropriate magic value(s). The observation of the signal packets to trigger the communication can be conducted through different methods. One means, originally implemented by Cd00r (Citation: Hartrell cd00r 2002), is to use the libpcap libraries to sniff for the packets in question. Another method leverages raw sockets, which enables the malware to use ports that are already open for use by other programs. On network devices, adversaries may use crafted packets to enable [Network Device Authentication](T1556.004) for standard services offered by the device such as telnet. Such signaling may also be used to open a closed service port such as telnet, or to trigger module modification of malware implants on the device, adding, removing, or changing malicious capabilities.(Citation: Cisco Synful Knock Evolution) (Citation: FireEye - Synful Knock) (Citation: Cisco Blog Legacy Device Attacks) To enable this traffic signaling on embedded devices, adversaries must first achieve and leverage [Patch System Image](T1601.001) due to the monolithic nature of the architecture. Adversaries may also use the Wake-on-LAN feature to turn on powered off systems. Wake-on-LAN is a hardware feature that allows a powered down system to be powered on, or woken up, by sending a magic packet to it. Once the system is powered on, it may become a target for lateral movement.(Citation: Bleeping Computer - Ryuk WoL) (Citation: AMD Magic Packet)",0,reject,T1205,Traffic Signaling "Adversaries may register a rogue Domain Controller to enable manipulation of Active Directory data. DCShadow may be used to create a rogue Domain Controller (DC). DCShadow is a method of manipulating Active Directory (AD) data, including objects and schemas, by registering (or reusing an inactive registration) and simulating the behavior of a DC. (Citation: DCShadow Blog) Once registered, a rogue DC may be able to inject and replicate changes into AD infrastructure for any domain object, including credentials and keys. Registering a rogue DC involves creating a new server and nTDSDSA objects in the Configuration partition of the AD schema, which requires Administrator privileges (either Domain or local to the DC) or the KRBTGT hash. (Citation: Adsecurity Mimikatz Guide) This technique may bypass system logging and security monitors such as security information and event management (SIEM) products (since actions taken on a rogue DC may not be reported to these sensors). (Citation: DCShadow Blog) The technique may also be used to alter and delete replication and other associated metadata to obstruct forensic analysis. Adversaries may also utilize this technique to perform [SID-History Injection](T1134.005) and/or manipulate AD objects (such as accounts, access control lists, schemas) to establish backdoors for Persistence. (Citation: DCShadow Blog)",0,reject,T1207,Rogue Domain Controller "Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. A common goal for post-compromise exploitation of remote services is for lateral movement to enable access to a remote system. An adversary may need to determine if the remote system is in a vulnerable state, which may be done through [Network Service Scanning](T1046) or other Discovery methods looking for common, vulnerable software that may be deployed in the network, the lack of certain patches that may indicate vulnerabilities, or security software that may be used to detect or contain remote exploitation. Servers are likely a high value target for lateral movement exploitation, but endpoint systems may also be at risk if they provide an advantage or access to additional resources. There are several well-known vulnerabilities that exist in common services such as SMB (Citation: CIS Multiple SMB Vulnerabilities) and RDP (Citation: NVD CVE-2017-0176) as well as applications that may be used within internal networks such as MySQL (Citation: NVD CVE-2016-6662) and web server services. (Citation: NVD CVE-2014-7169) Depending on the permissions level of the vulnerable remote service an adversary may achieve [Exploitation for Privilege Escalation](T1068) as a result of lateral movement exploitation as well.",0,reject,T1210,Exploitation of Remote Services "Adversaries may exploit a system or application vulnerability to bypass security features. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Vulnerabilities may exist in defensive security software that can be used to disable or circumvent them. Adversaries may have prior knowledge through reconnaissance that security software exists within an environment or they may perform checks during or shortly after the system is compromised for [Security Software Discovery](T1518.001). The security software will likely be targeted directly for exploitation. There are examples of antivirus software being targeted by persistent threat groups to avoid detection.",0,reject,T1211,Exploitation for Defense Evasion "Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. Credentialing and authentication mechanisms may be targeted for exploitation by adversaries as a means to gain access to useful credentials or circumvent the process to gain access to systems. One example of this is MS14-068, which targets Kerberos and can be used to forge Kerberos tickets using domain user permissions.(Citation: Technet MS14-068)(Citation: ADSecurity Detecting Forged Tickets) Exploitation for credential access may also result in Privilege Escalation depending on the process targeted or credentials obtained.",0,reject,T1212,Exploitation for Credential Access "Adversaries may leverage information repositories to mine valuable information. Information repositories are tools that allow for storage of information, typically to facilitate collaboration or information sharing between users, and can store a wide variety of data that may aid adversaries in further objectives, or direct access to the target information. Adversaries may also abuse external sharing features to share sensitive documents with recipients outside of the organization. The following is a brief list of example information that may hold potential value to an adversary and may also be found on an information repository: * Policies, procedures, and standards * Physical / logical network diagrams * System architecture diagrams * Technical system documentation * Testing / development credentials * Work / project schedules * Source code snippets * Links to network shares and other internal resources Information stored in a repository may vary based on the specific instance or environment. Specific common information repositories include web-based platforms such as [Sharepoint](T1213.002) and [Confluence](T1213.001), specific services such as Code Repositories, IaaS databases, enterprise databases, and other storage infrastructure such as SQL Server.",0,reject,T1213,Data from Information Repositories Adversaries may use scripts signed with trusted certificates to proxy execution of malicious files. Several Microsoft signed scripts that are default on Windows installations can be used to proxy execution of other files. This behavior may be abused by adversaries to execute malicious files that could bypass application control and signature validation on systems.(Citation: GitHub Ultimate AppLocker Bypass List),0,reject,T1216,Signed Script Proxy Execution "Adversaries may enumerate browser bookmarks to learn more about compromised hosts. Browser bookmarks may reveal personal information about users (ex: banking sites, interests, social media, etc.) as well as details about internal network resources such as servers, tools/dashboards, or other related infrastructure. Browser bookmarks may also highlight additional targets after an adversary has access to valid credentials, especially [Credentials In Files](T1552.001) associated with logins cached by a browser. Specific storage locations vary based on platform and/or application, but browser bookmarks are typically stored in local files/databases.",0,reject,T1217,Browser Bookmark Discovery Adversaries may bypass process and/or signature-based defenses by proxying execution of malicious content with signed binaries. Binaries signed with trusted digital certificates can execute on Windows systems protected by digital signature validation. Several Microsoft signed binaries that are default on Windows installations can be used to proxy execution of other files.,0,reject,T1218,Signed Binary Proxy Execution "An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target systems within networks. These services are commonly used as legitimate technical support software, and may be allowed by application control within a target environment. Remote access tools like VNC, Ammyy, and Teamviewer are used frequently when compared with other legitimate software commonly used by adversaries. (Citation: Symantec Living off the Land) Remote access tools may be established and used post-compromise as alternate communications channel for redundant access or as a way to establish an interactive remote desktop session with the target system. They may also be used as a component of malware to establish a reverse connection or back-connect to a service or adversary controlled system. Admin tools such as TeamViewer have been used by several groups targeting institutions in countries of interest to the Russian state and criminal campaigns. (Citation: CrowdStrike 2015 Global Threat Report) (Citation: CrySyS Blog TeamSpy)",0,reject,T1219,Remote Access Software "Adversaries may bypass application control and obscure execution of code by embedding scripts inside XSL files. Extensible Stylesheet Language (XSL) files are commonly used to describe the processing and rendering of data within XML files. To support complex operations, the XSL standard includes support for embedded scripting in various languages. (Citation: Microsoft XSLT Script Mar 2017) Adversaries may abuse this functionality to execute arbitrary files while potentially bypassing application control. Similar to [Trusted Developer Utilities Proxy Execution](T1127), the Microsoft common line transformation utility binary (msxsl.exe) (Citation: Microsoft msxsl.exe) can be installed and used to execute malicious JavaScript embedded within local or remote (URL referenced) XSL files. (Citation: Penetration Testing Lab MSXSL July 2017) Since msxsl.exe is not installed by default, an adversary will likely need to package it with dropped files. (Citation: Reaqta MSXSL Spearphishing MAR 2018) Msxsl.exe takes two main arguments, an XML source file and an XSL stylesheet. Since the XSL file is valid XML, the adversary may call the same XSL file twice. When using msxsl.exe adversaries may also give the XML/XSL files an arbitrary file extension.(Citation: XSL Bypass Mar 2019) Command-line examples:(Citation: Penetration Testing Lab MSXSL July 2017)(Citation: XSL Bypass Mar 2019) * `msxsl.exe customers[.]xml script[.]xsl` * `msxsl.exe script[.]xsl script[.]xsl` * `msxsl.exe script[.]jpeg script[.]jpeg` Another variation of this technique, dubbed “Squiblytwo”, involves using [Windows Management Instrumentation](T1047) to invoke JScript or VBScript within an XSL file.(Citation: LOLBAS Wmic) This technique can also execute local/remote scripts and, similar to its [Regsvr32](T1218.010)/ ""Squiblydoo"" counterpart, leverages a trusted, built-in Windows tool. Adversaries may abuse any alias in [Windows Management Instrumentation](T1047) provided they utilize the /FORMAT switch.(Citation: XSL Bypass Mar 2019) Command-line examples:(Citation: XSL Bypass Mar 2019)(Citation: LOLBAS Wmic) * Local File: `wmic process list /FORMAT:evil[.]xsl` * Remote File: `wmic os get /FORMAT:”https[:]//example[.]com/evil[.]xsl”`",0,reject,T1220,XSL Script Processing "Adversaries may create or modify references in Office document templates to conceal malicious code or force authentication attempts. Microsoft’s Office Open XML (OOXML) specification defines an XML-based format for Office documents (.docx, xlsx, .pptx) to replace older binary formats (.doc, .xls, .ppt). OOXML files are packed together ZIP archives compromised of various XML files, referred to as parts, containing properties that collectively define how a document is rendered. (Citation: Microsoft Open XML July 2017) Properties within parts may reference shared public resources accessed via online URLs. For example, template properties reference a file, serving as a pre-formatted document blueprint, that is fetched when the document is loaded. Adversaries may abuse this technology to initially conceal malicious code to be executed via documents. Template references injected into a document may enable malicious payloads to be fetched and executed when the document is loaded. (Citation: SANS Brian Wiltse Template Injection) These documents can be delivered via other techniques such as [Phishing](T1566) and/or [Taint Shared Content](T1080) and may evade static detections since no typical indicators (VBA macro, script, etc.) are present until after the malicious payload is fetched. (Citation: Redxorblue Remote Template Injection) Examples have been seen in the wild where template injection was used to load malicious code containing an exploit. (Citation: MalwareBytes Template Injection OCT 2017) This technique may also enable [Forced Authentication](T1187) by injecting a SMB/HTTPS (or other credential prompting) URL and triggering an authentication attempt. (Citation: Anomali Template Injection MAR 2018) (Citation: Talos Template Injection July 2017) (Citation: ryhanson phishery SEPT 2016)",0,reject,T1221,Template Injection "Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.). Modifications may include changing specific access rights, which may require taking ownership of a file or directory and/or elevated permissions depending on the file or directory’s existing permissions. This may enable malicious activity such as modifying, replacing, or deleting specific files or directories. Specific file and directory modifications may be a required step for many techniques, such as establishing Persistence via [Accessibility Features](T1546.008), [Boot or Logon Initialization Scripts](T1037), [Unix Shell Configuration Modification](T1546.004), or tainting/hijacking other instrumental binary/configuration files via [Hijack Execution Flow](T1574).",0,reject,T1222,File and Directory Permissions Modification "Adversaries may use execution guardrails to constrain execution or actions based on adversary supplied and environment specific conditions that are expected to be present on the target. Guardrails ensure that a payload only executes against an intended target and reduces collateral damage from an adversary’s campaign.(Citation: FireEye Kevin Mandia Guardrails) Values an adversary can provide about a target system or environment to use as guardrails may include specific network share names, attached physical devices, files, joined Active Directory (AD) domains, and local/external IP addresses.(Citation: FireEye Outlook Dec 2019) Guardrails can be used to prevent exposure of capabilities in environments that are not intended to be compromised or operated within. This use of guardrails is distinct from typical [Virtualization/Sandbox Evasion](T1497). While use of [Virtualization/Sandbox Evasion](T1497) may involve checking for known sandbox values and continuing with execution only if there is no match, the use of guardrails will involve checking for an expected target-specific value and only continuing with execution if there is such a match.",0,reject,T1480,Execution Guardrails "Adversaries may attempt to gather information on domain trust relationships that may be used to identify lateral movement opportunities in Windows multi-domain/forest environments. Domain trusts provide a mechanism for a domain to allow access to resources based on the authentication procedures of another domain.(Citation: Microsoft Trusts) Domain trusts allow the users of the trusted domain to access resources in the trusting domain. The information discovered may help the adversary conduct [SID-History Injection](T1134.005), [Pass the Ticket](T1550.003), and [Kerberoasting](T1558.003).(Citation: AdSecurity Forging Trust Tickets)(Citation: Harmj0y Domain Trusts) Domain trusts can be enumerated using the `DSEnumerateDomainTrusts()` Win32 API call, .NET methods, and LDAP.(Citation: Harmj0y Domain Trusts) The Windows utility [Nltest](S0359) is known to be used by adversaries to enumerate domain trusts.(Citation: Microsoft Operation Wilysupply)",0,reject,T1482,Domain Trust Discovery "Adversaries may modify the configuration settings of a domain to evade defenses and/or escalate privileges in domain environments. Domains provide a centralized means of managing how computer resources (ex: computers, user accounts) can act, and interact with each other, on a network. The policy of the domain also includes configuration settings that may apply between domains in a multi-domain/forest environment. Modifications to domain settings may include altering domain Group Policy Objects (GPOs) or changing trust settings for domains, including federation trusts. With sufficient permissions, adversaries can modify domain policy settings. Since domain configuration settings control many of the interactions within the Active Directory (AD) environment, there are a great number of potential attacks that can stem from this abuse. Examples of such abuse include modifying GPOs to push a malicious [Scheduled Task](T1053.005) to computers throughout the domain environment(Citation: ADSecurity GPO Persistence 2016)(Citation: Wald0 Guide to GPOs)(Citation: Harmj0y Abusing GPO Permissions) or modifying domain trusts to include an adversary controlled domain where they can control access tokens that will subsequently be accepted by victim domain resources.(Citation: Microsoft - Customer Guidance on Recent Nation-State Cyber Attacks) Adversaries can also change configuration settings within the AD environment to implement a [Rogue Domain Controller](T1207). Adversaries may temporarily modify domain policy, carry out a malicious action(s), and then revert the change to remove suspicious indicators.",0,reject,T1484,Domain Policy Modification "Adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems, services, and network resources. Data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives.(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016)(Citation: Palo Alto Shamoon Nov 2016)(Citation: Kaspersky StoneDrill 2017)(Citation: Unit 42 Shamoon3 2018)(Citation: Talos Olympic Destroyer 2018) Common operating system file deletion commands such as `del` and `rm` often only remove pointers to files without wiping the contents of the files themselves, making the files recoverable by proper forensic methodology. This behavior is distinct from [Disk Content Wipe](T1561.001) and [Disk Structure Wipe](T1561.002) because individual files are destroyed rather than sections of a storage disk or the disk's logical structure. Adversaries may attempt to overwrite files and directories with randomly generated data to make it irrecoverable.(Citation: Kaspersky StoneDrill 2017)(Citation: Unit 42 Shamoon3 2018) In some cases politically oriented image files have been used to overwrite data.(Citation: FireEye Shamoon Nov 2016)(Citation: Palo Alto Shamoon Nov 2016)(Citation: Kaspersky StoneDrill 2017) To maximize impact on the target organization in operations where network-wide availability interruption is the goal, malware designed for destroying data may have worm-like features to propagate across a network by leveraging additional techniques like [Valid Accounts](T1078), [OS Credential Dumping](T1003), and [SMB/Windows Admin Shares](T1021.002).(Citation: Symantec Shamoon 2012)(Citation: FireEye Shamoon Nov 2016)(Citation: Palo Alto Shamoon Nov 2016)(Citation: Kaspersky StoneDrill 2017)(Citation: Talos Olympic Destroyer 2018). In cloud environments, adversaries may leverage access to delete cloud storage, cloud storage accounts, machine images, and other infrastructure crucial to operations to damage an organization or their customers.(Citation: Data Destruction - Threat Post)(Citation: DOJ - Cisco Insider)",0,reject,T1485,Data Destruction "Adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources. They can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key. This may be done in order to extract monetary compensation from a victim in exchange for decryption or a decryption key (ransomware) or to render data permanently inaccessible in cases where the key is not saved or transmitted.(Citation: US-CERT Ransomware 2016)(Citation: FireEye WannaCry 2017)(Citation: US-CERT NotPetya 2017)(Citation: US-CERT SamSam 2018) In the case of ransomware, it is typical that common user files like Office documents, PDFs, images, videos, audio, text, and source code files will be encrypted. In some cases, adversaries may encrypt critical system files, disk partitions, and the MBR.(Citation: US-CERT NotPetya 2017) To maximize impact on the target organization, malware designed for encrypting data may have worm-like features to propagate across a network by leveraging other attack techniques like [Valid Accounts](T1078), [OS Credential Dumping](T1003), and [SMB/Windows Admin Shares](T1021.002).(Citation: FireEye WannaCry 2017)(Citation: US-CERT NotPetya 2017) In cloud environments, storage objects within compromised accounts may also be encrypted.(Citation: Rhino S3 Ransomware Part 1)",0,reject,T1486,Data Encrypted for Impact "Adversaries may stop or disable services on a system to render those services unavailable to legitimate users. Stopping critical services or processes can inhibit or stop response to an incident or aid in the adversary's overall objectives to cause damage to the environment.(Citation: Talos Olympic Destroyer 2018)(Citation: Novetta Blockbuster) Adversaries may accomplish this by disabling individual services of high importance to an organization, such as `MSExchangeIS`, which will make Exchange content inaccessible (Citation: Novetta Blockbuster). In some cases, adversaries may stop or disable many or all services to render systems unusable.(Citation: Talos Olympic Destroyer 2018) Services or processes may not allow for modification of their data stores while running. Adversaries may stop services or processes in order to conduct [Data Destruction](T1485) or [Data Encrypted for Impact](T1486) on the data stores of services like Exchange and SQL Server.(Citation: SecureWorks WannaCry Analysis)",0,reject,T1489,Service Stop "Adversaries may delete or remove built-in operating system data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery.(Citation: Talos Olympic Destroyer 2018)(Citation: FireEye WannaCry 2017) Operating systems may contain features that can help fix corrupted systems, such as a backup catalog, volume shadow copies, and automatic repair features. Adversaries may disable or delete system recovery features to augment the effects of [Data Destruction](T1485) and [Data Encrypted for Impact](T1486).(Citation: Talos Olympic Destroyer 2018)(Citation: FireEye WannaCry 2017) A number of native Windows utilities have been used by adversaries to disable or delete system recovery features: * `vssadmin.exe` can be used to delete all volume shadow copies on a system - `vssadmin.exe delete shadows /all /quiet` * [Windows Management Instrumentation](T1047) can be used to delete volume shadow copies - `wmic shadowcopy delete` * `wbadmin.exe` can be used to delete the Windows Backup Catalog - `wbadmin.exe delete catalog -quiet` * `bcdedit.exe` can be used to disable automatic Windows recovery features by modifying boot configuration data - `bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no`",0,reject,T1490,Inhibit System Recovery "Adversaries may modify visual content available internally or externally to an enterprise network. Reasons for [Defacement](T1491) include delivering messaging, intimidation, or claiming (possibly false) credit for an intrusion. Disturbing or offensive images may be used as a part of [Defacement](T1491) in order to cause user discomfort, or to pressure compliance with accompanying messages. ",0,reject,T1491,Defacement "Adversaries may overwrite or corrupt the flash memory contents of system BIOS or other firmware in devices attached to a system in order to render them inoperable or unable to boot.(Citation: Symantec Chernobyl W95.CIH) Firmware is software that is loaded and executed from non-volatile memory on hardware devices in order to initialize and manage device functionality. These devices could include the motherboard, hard drive, or video cards.",0,reject,T1495,Firmware Corruption "Adversaries may leverage the resources of co-opted systems in order to solve resource intensive problems which may impact system and/or hosted service availability. One common purpose for Resource Hijacking is to validate transactions of cryptocurrency networks and earn virtual currency. Adversaries may consume enough system resources to negatively impact and/or cause affected machines to become unresponsive.(Citation: Kaspersky Lazarus Under The Hood Blog 2017) Servers and cloud-based(Citation: CloudSploit - Unused AWS Regions) systems are common targets because of the high potential for available resources, but user endpoint systems may also be compromised and used for Resource Hijacking and cryptocurrency mining. Containerized environments may also be targeted due to the ease of deployment via exposed APIs and the potential for scaling mining activities by deploying or compromising multiple containers within an environment or cluster.(Citation: Unit 42 Hildegard Malware)(Citation: Trend Micro Exposed Docker APIs) Additionally, some cryptocurrency mining malware kills off processes for competing malware to ensure it’s not competing for resources.(Citation: Trend Micro War of Crypto Miners)",0,reject,T1496,Resource Hijacking "Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox. If the adversary detects a VME, they may alter their malware to disengage from the victim or conceal the core functions of the implant. They may also search for VME artifacts before dropping secondary or additional payloads. Adversaries may use the information learned from [Virtualization/Sandbox Evasion](T1497) during automated discovery to shape follow-on behaviors.(Citation: Deloitte Environment Awareness) Adversaries may use several methods to accomplish [Virtualization/Sandbox Evasion](T1497) such as checking for security monitoring tools (e.g., Sysinternals, Wireshark, etc.) or other system artifacts associated with analysis or virtualization. Adversaries may also check for legitimate user activity to help determine if it is in an analysis environment. Additional methods include use of sleep timers or loops within malware code to avoid operating within a temporary sandbox.(Citation: Unit 42 Pirpi July 2015) ",0,reject,T1497,Virtualization/Sandbox Evasion "Adversaries may perform Network Denial of Service (DoS) attacks to degrade or block the availability of targeted resources to users. Network DoS can be performed by exhausting the network bandwidth services rely on. Example resources include specific websites, email services, DNS, and web-based applications. Adversaries have been observed conducting network DoS attacks for political purposes(Citation: FireEye OpPoisonedHandover February 2016) and to support other malicious activities, including distraction(Citation: FSISAC FraudNetDoS September 2012), hacktivism, and extortion.(Citation: Symantec DDoS October 2014) A Network DoS will occur when the bandwidth capacity of the network connection to a system is exhausted due to the volume of malicious traffic directed at the resource or the network connections and network devices the resource relies on. For example, an adversary may send 10Gbps of traffic to a server that is hosted by a network with a 1Gbps connection to the internet. This traffic can be generated by a single system or multiple systems spread across the internet, which is commonly referred to as a distributed DoS (DDoS). To perform Network DoS attacks several aspects apply to multiple methods, including IP address spoofing, and botnets. Adversaries may use the original IP address of an attacking system, or spoof the source IP address to make the attack traffic more difficult to trace back to the attacking system or to enable reflection. This can increase the difficulty defenders have in defending against the attack by reducing or eliminating the effectiveness of filtering by the source address on network defense devices. For DoS attacks targeting the hosting system directly, see [Endpoint Denial of Service](T1499).",0,reject,T1498,Network Denial of Service "Adversaries may perform Endpoint Denial of Service (DoS) attacks to degrade or block the availability of services to users. Endpoint DoS can be performed by exhausting the system resources those services are hosted on or exploiting the system to cause a persistent crash condition. Example services include websites, email services, DNS, and web-based applications. Adversaries have been observed conducting DoS attacks for political purposes(Citation: FireEye OpPoisonedHandover February 2016) and to support other malicious activities, including distraction(Citation: FSISAC FraudNetDoS September 2012), hacktivism, and extortion.(Citation: Symantec DDoS October 2014) An Endpoint DoS denies the availability of a service without saturating the network used to provide access to the service. Adversaries can target various layers of the application stack that is hosted on the system used to provide the service. These layers include the Operating Systems (OS), server applications such as web servers, DNS servers, databases, and the (typically web-based) applications that sit on top of them. Attacking each layer requires different techniques that take advantage of bottlenecks that are unique to the respective components. A DoS attack may be generated by a single system or multiple systems spread across the internet, which is commonly referred to as a distributed DoS (DDoS). To perform DoS attacks against endpoint resources, several aspects apply to multiple methods, including IP address spoofing and botnets. Adversaries may use the original IP address of an attacking system, or spoof the source IP address to make the attack traffic more difficult to trace back to the attacking system or to enable reflection. This can increase the difficulty defenders have in defending against the attack by reducing or eliminating the effectiveness of filtering by the source address on network defense devices. Botnets are commonly used to conduct DDoS attacks against networks and services. Large botnets can generate a significant amount of traffic from systems spread across the global internet. Adversaries may have the resources to build out and control their own botnet infrastructure or may rent time on an existing botnet to conduct an attack. In some of the worst cases for DDoS, so many systems are used to generate requests that each one only needs to send out a small amount of traffic to produce enough volume to exhaust the target's resources. In such circumstances, distinguishing DDoS traffic from legitimate clients becomes exceedingly difficult. Botnets have been used in some of the most high-profile DDoS attacks, such as the 2012 series of incidents that targeted major US banks.(Citation: USNYAG IranianBotnet March 2016) In cases where traffic manipulation is used, there may be points in the the global network (such as high traffic gateway routers) where packets can be altered and cause legitimate clients to execute code that directs network packets toward a target in high volume. This type of capability was previously used for the purposes of web censorship where client HTTP traffic was modified to include a reference to JavaScript that generated the DDoS code to overwhelm target web servers.(Citation: ArsTechnica Great Firewall of China) For attacks attempting to saturate the providing network, see [Network Denial of Service](T1498). ",0,reject,T1499,Endpoint Denial of Service Adversaries may abuse legitimate extensible development features of servers to establish persistent access to systems. Enterprise server applications may include features that allow developers to write and install software or scripts to extend the functionality of the main application. Adversaries may install malicious components to extend and abuse server applications.,0,reject,T1505,Server Software Component "Adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment. Adversaries may use the information from [Software Discovery](T1518) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Adversaries may attempt to enumerate software for a variety of reasons, such as figuring out what security measures are present or if the compromised system has a version of software that is vulnerable to [Exploitation for Privilege Escalation](T1068).",0,reject,T1518,Software Discovery "Adversaries may implant cloud or container images with malicious code to establish persistence after gaining access to an environment. Amazon Web Services (AWS) Amazon Machine Images (AMIs), Google Cloud Platform (GCP) Images, and Azure Images as well as popular container runtimes such as Docker can be implanted or backdoored. Unlike [Upload Malware](T1608.001), this technique focuses on adversaries implanting an image in a registry within a victim’s environment. Depending on how the infrastructure is provisioned, this could provide persistent access if the infrastructure provisioning tool is instructed to always use the latest image.(Citation: Rhino Labs Cloud Image Backdoor Technique Sept 2019) A tool has been developed to facilitate planting backdoors in cloud container images.(Citation: Rhino Labs Cloud Backdoor September 2019) If an attacker has access to a compromised AWS instance, and permissions to list the available container images, they may implant a backdoor such as a [Web Shell](T1505.003).(Citation: Rhino Labs Cloud Image Backdoor Technique Sept 2019)",0,reject,T1525,Implant Internal Image "An adversary may attempt to enumerate the cloud services running on a system after gaining access. These methods can differ from platform-as-a-service (PaaS), to infrastructure-as-a-service (IaaS), or software-as-a-service (SaaS). Many services exist throughout the various cloud providers and can include Continuous Integration and Continuous Delivery (CI/CD), Lambda Functions, Azure AD, etc. Adversaries may attempt to discover information about the services enabled throughout the environment. Azure tools and APIs, such as the Azure AD Graph API and Azure Resource Manager API, can enumerate resources and services, including applications, management groups, resources and policy definitions, and their relationships that are accessible by an identity.(Citation: Azure - Resource Manager API)(Citation: Azure AD Graph API) Stormspotter is an open source tool for enumerating and constructing a graph for Azure resources and services, and Pacu is an open source AWS exploitation framework that supports several methods for discovering cloud services.(Citation: Azure - Stormspotter)(Citation: GitHub Pacu)",0,reject,T1526,Cloud Service Discovery "Adversaries can steal user application access tokens as a means of acquiring credentials to access remote systems and resources. This can occur through social engineering and typically requires user action to grant access. Application access tokens are used to make authorized API requests on behalf of a user and are commonly used as a way to access resources in cloud-based applications and software-as-a-service (SaaS).(Citation: Auth0 - Why You Should Always Use Access Tokens to Secure APIs Sept 2019) OAuth is one commonly implemented framework that issues tokens to users for access to systems. An application desiring access to cloud-based services or protected APIs can gain entry using OAuth 2.0 through a variety of authorization protocols. An example commonly-used sequence is Microsoft's Authorization Code Grant flow.(Citation: Microsoft Identity Platform Protocols May 2019)(Citation: Microsoft - OAuth Code Authorization flow - June 2019) An OAuth access token enables a third-party application to interact with resources containing user data in the ways requested by the application without obtaining user credentials. Adversaries can leverage OAuth authorization by constructing a malicious application designed to be granted access to resources with the target user's OAuth token. The adversary will need to complete registration of their application with the authorization server, for example Microsoft Identity Platform using Azure Portal, the Visual Studio IDE, the command-line interface, PowerShell, or REST API calls.(Citation: Microsoft - Azure AD App Registration - May 2019) Then, they can send a link through [Spearphishing Link](T1566.002) to the target user to entice them to grant access to the application. Once the OAuth access token is granted, the application can gain potentially long-term access to features of the user account through [Application Access Token](T1550.001).(Citation: Microsoft - Azure AD Identity Tokens - Aug 2019) Adversaries have been seen targeting Gmail, Microsoft Outlook, and Yahoo Mail users.(Citation: Amnesty OAuth Phishing Attacks, August 2019)(Citation: Trend Micro Pawn Storm OAuth 2017)",0,reject,T1528,Steal Application Access Token "Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems. Operating systems may contain commands to initiate a shutdown/reboot of a machine. In some cases, these commands may also be used to initiate a shutdown/reboot of a remote computer.(Citation: Microsoft Shutdown Oct 2017) Shutting down or rebooting systems may disrupt access to computer resources for legitimate users. Adversaries may attempt to shutdown/reboot a system after impacting it in other ways, such as [Disk Structure Wipe](T1561.002) or [Inhibit System Recovery](T1490), to hasten the intended effects on system availability.(Citation: Talos Nyetya June 2017)(Citation: Talos Olympic Destroyer 2018)",0,reject,T1529,System Shutdown/Reboot "Adversaries may access data objects from improperly secured cloud storage. Many cloud service providers offer solutions for online data storage such as Amazon S3, Azure Storage, and Google Cloud Storage. These solutions differ from other storage solutions (such as SQL or Elasticsearch) in that there is no overarching application. Data from these solutions can be retrieved directly using the cloud provider's APIs. Solution providers typically offer security guides to help end users configure systems.(Citation: Amazon S3 Security, 2019)(Citation: Microsoft Azure Storage Security, 2019)(Citation: Google Cloud Storage Best Practices, 2019) Misconfiguration by end users is a common problem. There have been numerous incidents where cloud storage has been improperly secured (typically by unintentionally allowing public access by unauthenticated users or overly-broad access by all users), allowing open access to credit cards, personally identifiable information, medical records, and other sensitive information.(Citation: Trend Micro S3 Exposed PII, 2017)(Citation: Wired Magecart S3 Buckets, 2019)(Citation: HIPAA Journal S3 Breach, 2017) Adversaries may also obtain leaked credentials in source repositories, logs, or other means as a way to gain access to cloud storage objects that have access permission controls.",0,reject,T1530,Data from Cloud Storage Object "Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: changed credentials) to remove access to accounts. Adversaries may also subsequently log off and/or reboot boxes to set malicious changes into place.(Citation: CarbonBlack LockerGoga 2019)(Citation: Unit42 LockerGoga 2019)",0,reject,T1531,Account Access Removal "Adversaries may use internal spearphishing to gain access to additional information or exploit other users within the same organization after they already have access to accounts or systems within the environment. Internal spearphishing is multi-staged attack where an email account is owned either by controlling the user's device with previously installed malware or by compromising the account credentials of the user. Adversaries attempt to take advantage of a trusted internal account to increase the likelihood of tricking the target into falling for the phish attempt.(Citation: Trend Micro When Phishing Starts from the Inside 2017) Adversaries may leverage [Spearphishing Attachment](T1566.001) or [Spearphishing Link](T1566.002) as part of internal spearphishing to deliver a payload or redirect to an external site to capture credentials through [Input Capture](T1056) on sites that mimic email login interfaces. There have been notable incidents where internal spearphishing has been used. The Eye Pyramid campaign used phishing emails with malicious attachments for lateral movement between victims, compromising nearly 18,000 email accounts in the process.(Citation: Trend Micro When Phishing Starts from the Inside 2017) The Syrian Electronic Army (SEA) compromised email accounts at the Financial Times (FT) to steal additional account credentials. Once FT learned of the attack and began warning employees of the threat, the SEA sent phishing emails mimicking the Financial Times IT department and were able to compromise even more users.(Citation: THE FINANCIAL TIMES LTD 2019.)",0,reject,T1534,Internal Spearphishing "Adversaries may create cloud instances in unused geographic service regions in order to evade detection. Access is usually obtained through compromising accounts used to manage cloud infrastructure. Cloud service providers often provide infrastructure throughout the world in order to improve performance, provide redundancy, and allow customers to meet compliance requirements. Oftentimes, a customer will only use a subset of the available regions and may not actively monitor other regions. If an adversary creates resources in an unused region, they may be able to operate undetected. A variation on this behavior takes advantage of differences in functionality across cloud regions. An adversary could utilize regions which do not support advanced detection services in order to avoid detection of their activity. An example of adversary use of unused AWS regions is to mine cryptocurrency through [Resource Hijacking](T1496), which can cost organizations substantial amounts of money over time depending on the processing power used.(Citation: CloudSploit - Unused AWS Regions)",0,reject,T1535,Unused/Unsupported Cloud Regions "Adversaries may exfiltrate data by transferring the data, including backups of cloud environments, to another cloud account they control on the same service to avoid typical file transfers/downloads and network-based exfiltration detection. A defender who is monitoring for large transfers to outside the cloud environment through normal file transfers or over command and control channels may not be watching for data transfers to another account within the same cloud provider. Such transfers may utilize existing cloud provider APIs and the internal address space of the cloud provider to blend into normal traffic or avoid data transfers over external network interfaces. Incidents have been observed where adversaries have created backups of cloud instances and transferred them to separate accounts.(Citation: DOJ GRU Indictment Jul 2018) ",0,reject,T1537,Transfer Data to Cloud Account "An adversary may use a cloud service dashboard GUI with stolen credentials to gain useful information from an operational cloud environment, such as specific services, resources, and features. For example, the GCP Command Center can be used to view all assets, findings of potential security risks, and to run additional queries, such as finding public IP addresses and open ports.(Citation: Google Command Center Dashboard) Depending on the configuration of the environment, an adversary may be able to enumerate more information via the graphical dashboard than an API. This allows the adversary to gain information without making any API requests.",0,reject,T1538,Cloud Service Dashboard "An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials. Web applications and services often use session cookies as an authentication token after a user has authenticated to a website. Cookies are often valid for an extended period of time, even if the web application is not actively used. Cookies can be found on disk, in the process memory of the browser, and in network traffic to remote systems. Additionally, other applications on the targets machine might store sensitive authentication cookies in memory (e.g. apps which authenticate to cloud services). Session cookies can be used to bypasses some multi-factor authentication protocols.(Citation: Pass The Cookie) There are several examples of malware targeting cookies from web browsers on the local system.(Citation: Kaspersky TajMahal April 2019)(Citation: Unit 42 Mac Crypto Cookies January 2019) There are also open source frameworks such as Evilginx 2 and Muraena that can gather session cookies through a malicious proxy (ex: [Adversary-in-the-Middle](T1557)) that can be set up by an adversary and used in phishing campaigns.(Citation: Github evilginx2)(Citation: GitHub Mauraena) After an adversary acquires a valid cookie, they can then perform a [Web Session Cookie](T1550.004) technique to login to the corresponding web application.",0,reject,T1539,Steal Web Session Cookie "Adversaries may abuse Pre-OS Boot mechanisms as a way to establish persistence on a system. During the booting process of a computer, firmware and various startup services are loaded before the operating system. These programs control flow of execution before the operating system takes control.(Citation: Wikipedia Booting) Adversaries may overwrite data in boot drivers or firmware such as BIOS (Basic Input/Output System) and The Unified Extensible Firmware Interface (UEFI) to persist on systems at a layer below the operating system. This can be particularly difficult to detect as malware at this level will not be detected by host software-based defenses.",0,reject,T1542,Pre-OS Boot "Adversaries may create or modify system-level processes to repeatedly execute malicious payloads as part of persistence. When operating systems boot up, they can start processes that perform background system functions. On Windows and Linux, these system processes are referred to as services. (Citation: TechNet Services) On macOS, launchd processes known as [Launch Daemon](T1543.004) and [Launch Agent](T1543.001) are run to finish system initialization and load user specific parameters.(Citation: AppleDocs Launch Agent Daemons) Adversaries may install new services, daemons, or agents that can be configured to execute at startup or a repeatable interval in order to establish persistence. Similarly, adversaries may modify existing services, daemons, or agents to achieve the same effect. Services, daemons, or agents may be created with administrator privileges but executed under root/SYSTEM privileges. Adversaries may leverage this functionality to create or modify system processes in order to escalate privileges. (Citation: OSX Malware Detection). ",0,reject,T1543,Create or Modify System Process "Adversaries may establish persistence and/or elevate privileges using system mechanisms that trigger execution based on specific events. Various operating systems have means to monitor and subscribe to events such as logons or other user activity such as running specific applications/binaries. Adversaries may abuse these mechanisms as a means of maintaining persistent access to a victim via repeatedly executing malicious code. After gaining access to a victim system, adversaries may create/modify event triggers to point to malicious content that will be executed whenever the event trigger is invoked.(Citation: FireEye WMI 2015)(Citation: Malware Persistence on OS X)(Citation: amnesia malware) Since the execution can be proxied by an account with higher permissions, such as SYSTEM or service accounts, an adversary may be able to abuse these triggered execution mechanisms to escalate their privileges. ",0,reject,T1546,Event Triggered Execution "Adversaries may configure system settings to automatically execute a program during system boot or logon to maintain persistence or gain higher-level privileges on compromised systems. Operating systems may have mechanisms for automatically running a program on system boot or account logon.(Citation: Microsoft Run Key)(Citation: MSDN Authentication Packages)(Citation: Microsoft TimeProvider)(Citation: Cylance Reg Persistence Sept 2013)(Citation: Linux Kernel Programming)  These mechanisms may include automatically executing programs that are placed in specially designated directories or are referenced by repositories that store configuration information, such as the Windows Registry. An adversary may achieve the same goal by modifying or extending features of the kernel. Since some boot or logon autostart programs run with higher privileges, an adversary may leverage these to elevate privileges.",0,reject,T1547,Boot or Logon Autostart Execution Adversaries may circumvent mechanisms designed to control elevate privileges to gain higher-level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can perform on a machine. Authorization has to be granted to specific users in order to perform tasks that can be considered of higher risk. An adversary can perform several methods to take advantage of built-in control mechanisms in order to escalate privileges on a system.,0,reject,T1548,Abuse Elevation Control Mechanism "Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls. Authentication processes generally require a valid identity (e.g., username) along with one or more authentication factors (e.g., password, pin, physical smart card, token generator, etc.). Alternate authentication material is legitimately generated by systems after a user or application successfully authenticates by providing a valid identity and the required authentication factor(s). Alternate authentication material may also be generated during the identity creation process.(Citation: NIST Authentication)(Citation: NIST MFA) Caching alternate authentication material allows the system to verify an identity has successfully authenticated without asking the user to reenter authentication factor(s). Because the alternate authentication must be maintained by the system—either in memory or on disk—it may be at risk of being stolen through [Credential Access](TA0006) techniques. By stealing alternate authentication material, adversaries are able to bypass system access controls and authenticate to systems without knowing the plaintext password or any additional authentication factors. ",0,reject,T1550,Use Alternate Authentication Material "Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. [Bash History](T1552.003)), operating system or application-specific repositories (e.g. [Credentials in Registry](T1552.002)), or other specialized files/artifacts (e.g. [Private Keys](T1552.004)).",0,reject,T1552,Unsecured Credentials "Adversaries may undermine security controls that will either warn users of untrusted activity or prevent execution of untrusted programs. Operating systems and security products may contain mechanisms to identify programs or websites as possessing some level of trust. Examples of such features would include a program being allowed to run because it is signed by a valid code signing certificate, a program prompting the user with a warning because it has an attribute set from being downloaded from the Internet, or getting an indication that you are about to connect to an untrusted site. Adversaries may attempt to subvert these trust mechanisms. The method adversaries use will depend on the specific mechanism they seek to subvert. Adversaries may conduct [File and Directory Permissions Modification](T1222) or [Modify Registry](T1112) in support of subverting these controls.(Citation: SpectorOps Subverting Trust Sept 2017) Adversaries may also create or steal code signing certificates to acquire trust on target systems.(Citation: Securelist Digital Certificates)(Citation: Symantec Digital Certificates) ",0,reject,T1553,Subvert Trust Controls "Adversaries may modify client software binaries to establish persistent access to systems. Client software enables users to access services provided by a server. Common client software types are SSH clients, FTP clients, email clients, and web browsers. Adversaries may make modifications to client software binaries to carry out malicious tasks when those applications are in use. For example, an adversary may copy source code for the client software, add a backdoor, compile for the target, and replace the legitimate application binary (or support files) with the backdoored one. Since these applications may be routinely executed by the user, the adversary can leverage this for persistent access to the host.",0,reject,T1554,Compromise Client Software Binary "Adversaries may search for common password storage locations to obtain user credentials. Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications that store passwords to make it easier for users manage and maintain. Once credentials are obtained, they can be used to perform lateral movement and access restricted information.",0,reject,T1555,Credentials from Password Stores "Adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts. The authentication process is handled by mechanisms, such as the Local Security Authentication Server (LSASS) process and the Security Accounts Manager (SAM) on Windows, pluggable authentication modules (PAM) on Unix-based systems, and authorization plugins on MacOS systems, responsible for gathering, storing, and validating credentials. By modifying an authentication process, an adversary may be able to authenticate to a service or system without using [Valid Accounts](T1078). Adversaries may maliciously modify a part of this process to either reveal credentials or bypass authentication mechanisms. Compromised credentials or access may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access and remote desktop.",0,reject,T1556,Modify Authentication Process "Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](T1040) or [Transmitted Data Manipulation](T1565.002). By abusing features of common networking protocols that can determine the flow of network traffic (e.g. ARP, DNS, LLMNR, etc.), adversaries may force a device to communicate through an adversary controlled system so they can collect information or perform additional actions.(Citation: Rapid7 MiTM Basics) Adversaries may leverage the AiTM position to attempt to modify traffic, such as in [Transmitted Data Manipulation](T1565.002). Adversaries can also stop traffic from flowing to the appropriate destination, causing denial of service.",0,reject,T1557,Adversary-in-the-Middle "Adversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable [Pass the Ticket](T1550.003). Kerberos is an authentication protocol widely used in modern Windows domain environments. In Kerberos environments, referred to as “realms”, there are three basic participants: client, service, and Key Distribution Center (KDC).(Citation: ADSecurity Kerberos Ring Decoder) Clients request access to a service and through the exchange of Kerberos tickets, originating from KDC, they are granted access after having successfully authenticated. The KDC is responsible for both authentication and ticket granting. Attackers may attempt to abuse Kerberos by stealing tickets or forging tickets to enable unauthorized access. On Windows, the built-in `klist` utility can be used to list and analyze cached Kerberos tickets.(Citation: Microsoft Klist) Linux systems on Active Directory domains store Kerberos credentials locally in the credential cache file referred to as the ""ccache"". The credentials are stored in the ccache file while they remain valid and generally while a user's session lasts.(Citation: MIT ccache) On modern Redhat Enterprise Linux systems, and derivative distributions, the System Security Services Daemon (SSSD) handles Kerberos tickets. By default SSSD maintains a copy of the ticket database that can be found in `/var/lib/sss/secrets/secrets.ldb` as well as the corresponding key located in `/var/lib/sss/secrets/.secrets.mkey`. Both files require root access to read. If an adversary is able to access the database and key, the credential cache Kerberos blob can be extracted and converted into a usable Kerberos ccache file that adversaries may use for [Pass the Ticket](T1550.003). The ccache file may also be converted into a Windows format using tools such as Kekeo.(Citation: Linux Kerberos Tickets)(Citation: Brining MimiKatz to Unix)(Citation: Kekeo) Kerberos tickets on macOS are stored in a standard ccache format, similar to Linux. By default, access to these ccache entries is federated through the KCM daemon process via the Mach RPC protocol, which uses the caller's environment to determine access. The storage location for these ccache entries is influenced by the `/etc/krb5.conf` configuration file and the `KRB5CCNAME` environment variable which can specify to save them to disk or keep them protected via the KCM daemon. Users can interact with ticket storage using `kinit`, `klist`, `ktutil`, and `kcc` built-in binaries or via Apple's native Kerberos framework. Adversaries can use open source tools to interact with the ccache files directly or to use the Kerberos framework to call lower-level APIs for extracting the user's TGT or Service Tickets.(Citation: SpectorOps Bifrost Kerberos macOS 2019)(Citation: macOS kerberos framework MIT) ",0,reject,T1558,Steal or Forge Kerberos Tickets "Adversaries may abuse inter-process communication (IPC) mechanisms for local code or command execution. IPC is typically used by processes to share data, communicate with each other, or synchronize execution. IPC is also commonly used to avoid situations such as deadlocks, which occurs when processes are stuck in a cyclic waiting pattern. Adversaries may abuse IPC to execute arbitrary code or commands. IPC mechanisms may differ depending on OS, but typically exists in a form accessible through programming languages/libraries or native interfaces such as Windows [Dynamic Data Exchange](T1559.002) or [Component Object Model](T1559.001). Higher level execution mediums, such as those of [Command and Scripting Interpreter](T1059)s, may also leverage underlying IPC mechanisms. Adversaries may also use [Remote Services](T1021) such as [Distributed Component Object Model](T1021.003) to facilitate remote IPC execution.(Citation: Fireeye Hunting COM June 2019)",0,reject,T1559,Inter-Process Communication "An adversary may compress and/or encrypt data that is collected prior to exfiltration. Compressing the data can help to obfuscate the collected data and minimize the amount of data sent over the network. Encryption can be used to hide information that is being exfiltrated from detection or make exfiltration less conspicuous upon inspection by a defender. Both compression and encryption are done prior to exfiltration, and can be performed using a utility, 3rd party library, or custom method.",0,reject,T1560,Archive Collected Data "Adversaries may wipe or corrupt raw disk data on specific systems or in large numbers in a network to interrupt availability to system and network resources. With direct write access to a disk, adversaries may attempt to overwrite portions of disk data. Adversaries may opt to wipe arbitrary portions of disk data and/or wipe disk structures like the master boot record (MBR). A complete wipe of all disk sectors may be attempted. To maximize impact on the target organization in operations where network-wide availability interruption is the goal, malware used for wiping disks may have worm-like features to propagate across a network by leveraging additional techniques like [Valid Accounts](T1078), [OS Credential Dumping](T1003), and [SMB/Windows Admin Shares](T1021.002).(Citation: Novetta Blockbuster Destructive Malware)",0,reject,T1561,Disk Wipe "Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms. This not only involves impairing preventative defenses, such as firewalls and anti-virus, but also detection capabilities that defenders can use to audit activity and identify malicious behavior. This may also span both native defenses as well as supplemental capabilities installed by users and administrators. Adversaries could also target event aggregation and analysis mechanisms, or otherwise disrupt these procedures by altering other system components.",0,reject,T1562,Impair Defenses "Adversaries may take control of preexisting sessions with remote services to move laterally in an environment. Users may use valid credentials to log into a service specifically designed to accept remote connections, such as telnet, SSH, and RDP. When a user logs into a service, a session will be established that will allow them to maintain a continuous interaction with that service. Adversaries may commandeer these sessions to carry out actions on remote systems. [Remote Service Session Hijacking](T1563) differs from use of [Remote Services](T1021) because it hijacks an existing session rather than creating a new session using [Valid Accounts](T1078).(Citation: RDP Hijacking Medium)(Citation: Breach Post-mortem SSH Hijack)",0,reject,T1563,Remote Service Session Hijacking "Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have features to hide various artifacts, such as important system files and administrative task execution, to avoid disrupting user work environments and prevent users from changing files or features on the system. Adversaries may abuse these features to hide artifacts such as files, directories, user accounts, or other system activity to evade detection.(Citation: Sofacy Komplex Trojan)(Citation: Cybereason OSX Pirrit)(Citation: MalwareBytes ADS July 2015) Adversaries may also attempt to hide artifacts associated with malicious behavior by creating computing regions that are isolated from common security instrumentation, such as through the use of virtualization technology.(Citation: Sophos Ragnar May 2020)",0,reject,T1564,Hide Artifacts "Adversaries may insert, delete, or manipulate data in order to manipulate external outcomes or hide activity. By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making. The type of modification and the impact it will have depends on the target application and process as well as the goals and objectives of the adversary. For complex systems, an adversary would likely need special expertise and possibly access to specialized software related to the system that would typically be gained through a prolonged information gathering campaign in order to have the desired impact.",0,reject,T1565,Data Manipulation "Adversaries may send phishing messages to gain access to victim systems. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass malware spam campaigns. Adversaries may send victims emails containing malicious attachments or links, typically to execute malicious code on victim systems. Phishing may also be conducted via third-party services, like social media platforms. Phishing may also involve social engineering techniques, such as posing as a trusted source.",0,reject,T1566,Phishing "Adversaries may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. Popular Web services acting as an exfiltration mechanism may give a significant amount of cover due to the likelihood that hosts within a network are already communicating with them prior to compromise. Firewall rules may also already exist to permit traffic to these services. Web service providers also commonly use SSL/TLS encryption, giving adversaries an added level of protection.",0,reject,T1567,Exfiltration Over Web Service "Adversaries may dynamically establish connections to command and control infrastructure to evade common detections and remediations. This may be achieved by using malware that shares a common algorithm with the infrastructure the adversary uses to receive the malware's communications. These calculations can be used to dynamically adjust parameters such as the domain name, IP address, or port number the malware uses for command and control. Adversaries may use dynamic resolution for the purpose of [Fallback Channels](T1008). When contact is lost with the primary command and control server malware may employ dynamic resolution as a means to reestablishing command and control.(Citation: Talos CCleanup 2017)(Citation: FireEye POSHSPY April 2017)(Citation: ESET Sednit 2017 Activity)",0,reject,T1568,Dynamic Resolution "Adversaries may abuse system services or daemons to execute commands or programs. Adversaries can execute malicious content by interacting with or creating services either locally or remotely. Many services are set to run at boot, which can aid in achieving persistence ([Create or Modify System Process](T1543)), but adversaries can also abuse services for one-time or temporary execution.",0,reject,T1569,System Services "Adversaries may transfer tools or other files between systems in a compromised environment. Files may be copied from one system to another to stage adversary tools or other files over the course of an operation. Adversaries may copy files laterally between internal victim systems to support lateral movement using inherent file sharing protocols such as file sharing over SMB to connected network shares or with authenticated connections with [SMB/Windows Admin Shares](T1021.002) or [Remote Desktop Protocol](T1021.001). Files can also be copied over on Mac and Linux with native tools like scp, rsync, and sftp.",0,reject,T1570,Lateral Tool Transfer "Adversaries may communicate using a protocol and port paring that are typically not associated. For example, HTTPS over port 8088(Citation: Symantec Elfin Mar 2019) or port 587(Citation: Fortinet Agent Tesla April 2018) as opposed to the traditional port 443. Adversaries may make changes to the standard port used by a protocol to bypass filtering or muddle analysis/parsing of network data.",0,reject,T1571,Non-Standard Port "Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems. Tunneling involves explicitly encapsulating a protocol within another. This behavior may conceal malicious traffic by blending in with existing traffic and/or provide an outer layer of encryption (similar to a VPN). Tunneling could also enable routing of network packets that would otherwise not reach their intended destination, such as SMB, RDP, or other traffic that would be filtered by network appliances or not routed over the Internet. There are various means to encapsulate a protocol within another protocol. For example, adversaries may perform SSH tunneling (also known as SSH port forwarding), which involves forwarding arbitrary data over an encrypted SSH tunnel.(Citation: SSH Tunneling) [Protocol Tunneling](T1572) may also be abused by adversaries during [Dynamic Resolution](T1568). Known as DNS over HTTPS (DoH), queries to resolve C2 infrastructure may be encapsulated within encrypted HTTPS packets.(Citation: BleepingComp Godlua JUL19) Adversaries may also leverage [Protocol Tunneling](T1572) in conjunction with [Proxy](T1090) and/or [Protocol Impersonation](T1001.003) to further conceal C2 communications and infrastructure. ",0,reject,T1572,Protocol Tunneling "Adversaries may employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Despite the use of a secure algorithm, these implementations may be vulnerable to reverse engineering if secret keys are encoded and/or generated within malware samples/configuration files.",0,reject,T1573,Encrypted Channel "Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs. Hijacking execution flow can be for the purposes of persistence, since this hijacked execution may reoccur over time. Adversaries may also use these mechanisms to elevate privileges or evade defenses, such as application control or other restrictions on execution. There are many ways an adversary may hijack the flow of execution, including by manipulating how the operating system locates programs to be executed. How the operating system locates libraries to be used by a program can also be intercepted. Locations where the operating system looks for programs/resources, such as file directories and in the case of Windows the Registry, could also be poisoned to include malicious payloads.",0,reject,T1574,Hijack Execution Flow "An adversary may attempt to modify a cloud account's compute service infrastructure to evade defenses. A modification to the compute service infrastructure can include the creation, deletion, or modification of one or more components such as compute instances, virtual machines, and snapshots. Permissions gained from the modification of infrastructure components may bypass restrictions that prevent access to existing infrastructure. Modifying infrastructure components may also allow an adversary to evade detection and remove evidence of their presence.(Citation: Mandiant M-Trends 2020)",0,reject,T1578,Modify Cloud Compute Infrastructure "An adversary may attempt to discover resources that are available within an infrastructure-as-a-service (IaaS) environment. This includes compute service resources such as instances, virtual machines, and snapshots as well as resources of other services including the storage and database services. Cloud providers offer methods such as APIs and commands issued through CLIs to serve information about infrastructure. For example, AWS provides a `DescribeInstances` API within the Amazon EC2 API that can return information about one or more instances within an account, the `ListBuckets` API that returns a list of all buckets owned by the authenticated sender of the request, or the `GetPublicAccessBlock` API to retrieve access block configuration for a bucket (Citation: Amazon Describe Instance)(Citation: Amazon Describe Instances API)(Citation: AWS Get Public Access Block). Similarly, GCP's Cloud SDK CLI provides the `gcloud compute instances list` command to list all Google Compute Engine instances in a project (Citation: Google Compute Instances), and Azure's CLI command `az vm list` lists details of virtual machines.(Citation: Microsoft AZ CLI) An adversary may enumerate resources using a compromised user's access keys to determine which are available to that user.(Citation: Expel IO Evil in AWS) The discovery of these available resources may help adversaries determine their next steps in the Cloud environment, such as establishing Persistence.(Citation: Mandiant M-Trends 2020)An adversary may also use this information to change the configuration to make the bucket publicly accessible, allowing data to be accessed without authentication. Adversaries have also may use infrastructure discovery APIs such as `DescribeDBInstances` to determine size, owner, permissions, and network ACLs of database resources. (Citation: AWS Describe DB Instances) Adversaries can use this information to determine the potential value of databases and discover the requirements to access them. Unlike in [Cloud Service Discovery](T1526), this technique focuses on the discovery of components of the provided services rather than the services themselves.",0,reject,T1580,Cloud Infrastructure Discovery "Adversaries may buy, lease, or rent infrastructure that can be used during targeting. A wide variety of infrastructure exists for hosting and orchestrating adversary operations. Infrastructure solutions include physical or cloud servers, domains, and third-party web services.(Citation: TrendmicroHideoutsLease) Additionally, botnets are available for rent or purchase. Use of these infrastructure solutions allows an adversary to stage, launch, and execute an operation. Solutions may help adversary operations blend in with traffic that is seen as normal, such as contact to third-party web services. Depending on the implementation, adversaries may use infrastructure that makes it difficult to physically tie back to them as well as utilize infrastructure that can be rapidly provisioned, modified, and shut down.",0,reject,T1583,Acquire Infrastructure "Adversaries may compromise third-party infrastructure that can be used during targeting. Infrastructure solutions include physical or cloud servers, domains, and third-party web services. Instead of buying, leasing, or renting infrastructure an adversary may compromise infrastructure and use it during other phases of the adversary lifecycle.(Citation: Mandiant APT1)(Citation: ICANNDomainNameHijacking)(Citation: Talos DNSpionage Nov 2018)(Citation: FireEye EPS Awakens Part 2) Additionally, adversaries may compromise numerous machines to form a botnet they can leverage. Use of compromised infrastructure allows an adversary to stage, launch, and execute an operation. Compromised infrastructure can help adversary operations blend in with traffic that is seen as normal, such as contact with high reputation or trusted sites. By using compromised infrastructure, adversaries may make it difficult to tie their actions back to them. Prior to targeting, adversaries may compromise the infrastructure of other adversaries.(Citation: NSA NCSC Turla OilRig)",0,reject,T1584,Compromise Infrastructure "Adversaries may create and cultivate accounts with services that can be used during targeting. Adversaries can create accounts that can be used to build a persona to further operations. Persona development consists of the development of public information, presence, history and appropriate affiliations. This development could be applied to social media, website, or other publicly available information that could be referenced and scrutinized for legitimacy over the course of an operation using that persona or identity.(Citation: NEWSCASTER2014)(Citation: BlackHatRobinSage) For operations incorporating social engineering, the utilization of an online persona may be important. These personas may be fictitious or impersonate real people. The persona may exist on a single site or across multiple sites (ex: Facebook, LinkedIn, Twitter, Google, GitHub, Docker Hub, etc.). Establishing a persona may require development of additional documentation to make them seem real. This could include filling out profile information, developing social networks, or incorporating photos.(Citation: NEWSCASTER2014)(Citation: BlackHatRobinSage) Establishing accounts can also include the creation of accounts with email providers, which may be directly leveraged for [Phishing for Information](T1598) or [Phishing](T1566).(Citation: Mandiant APT1)",0,reject,T1585,Establish Accounts "Adversaries may compromise accounts with services that can be used during targeting. For operations incorporating social engineering, the utilization of an online persona may be important. Rather than creating and cultivating accounts (i.e. [Establish Accounts](T1585)), adversaries may compromise existing accounts. Utilizing an existing persona may engender a level of trust in a potential victim if they have a relationship, or knowledge of, the compromised persona. A variety of methods exist for compromising accounts, such as gathering credentials via [Phishing for Information](T1598), purchasing credentials from third-party sites, or by brute forcing credentials (ex: password reuse from breach credential dumps).(Citation: AnonHBGary) Prior to compromising accounts, adversaries may conduct Reconnaissance to inform decisions about which accounts to compromise to further their operation. Personas may exist on a single site or across multiple sites (ex: Facebook, LinkedIn, Twitter, Google, etc.). Compromised accounts may require additional development, this could include filling out or modifying profile information, further developing social networks, or incorporating photos. Adversaries may directly leverage compromised email accounts for [Phishing for Information](T1598) or [Phishing](T1566).",0,reject,T1586,Compromise Accounts "Adversaries may build capabilities that can be used during targeting. Rather than purchasing, freely downloading, or stealing capabilities, adversaries may develop their own capabilities in-house. This is the process of identifying development requirements and building solutions such as malware, exploits, and self-signed certificates. Adversaries may develop capabilities to support their operations throughout numerous phases of the adversary lifecycle.(Citation: Mandiant APT1)(Citation: Kaspersky Sofacy)(Citation: Bitdefender StrongPity June 2020)(Citation: Talos Promethium June 2020) As with legitimate development efforts, different skill sets may be required for developing capabilities. The skills needed may be located in-house, or may need to be contracted out. Use of a contractor may be considered an extension of that adversary's development capabilities, provided the adversary plays a role in shaping requirements and maintains a degree of exclusivity to the capability.",0,reject,T1587,Develop Capabilities "Adversaries may buy and/or steal capabilities that can be used during targeting. Rather than developing their own capabilities in-house, adversaries may purchase, freely download, or steal them. Activities may include the acquisition of malware, software (including licenses), exploits, certificates, and information relating to vulnerabilities. Adversaries may obtain capabilities to support their operations throughout numerous phases of the adversary lifecycle. In addition to downloading free malware, software, and exploits from the internet, adversaries may purchase these capabilities from third-party entities. Third-party entities can include technology companies that specialize in malware and exploits, criminal marketplaces, or from individuals.(Citation: NationsBuying)(Citation: PegasusCitizenLab) In addition to purchasing capabilities, adversaries may steal capabilities from third-party entities (including other adversaries). This can include stealing software licenses, malware, SSL/TLS and code-signing certificates, or raiding closed databases of vulnerabilities or exploits.(Citation: DiginotarCompromise)",0,reject,T1588,Obtain Capabilities "Adversaries may gather information about the victim's organization that can be used during targeting. Information about an organization may include a variety of details, including the names of divisions/departments, specifics of business operations, as well as the roles and responsibilities of key employees. Adversaries may gather this information in various ways, such as direct elicitation via [Phishing for Information](T1598). Information about an organization may also be exposed to adversaries via online or other accessible data sets (ex: [Social Media](T1593.001) or [Search Victim-Owned Websites](T1594)).(Citation: ThreatPost Broadvoice Leak)(Citation: SEC EDGAR Search) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](T1598) or [Search Open Websites/Domains](T1593)), establishing operational resources (ex: [Establish Accounts](T1585) or [Compromise Accounts](T1586)), and/or initial access (ex: [Phishing](T1566) or [Trusted Relationship](T1199)).",0,reject,T1591,Gather Victim Org Information "Adversaries may gather information about the victim's hosts that can be used during targeting. Information about hosts may include a variety of details, including administrative data (ex: name, assigned IP, functionality, etc.) as well as specifics regarding its configuration (ex: operating system, language, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](T1595) or [Phishing for Information](T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about hosts may also be exposed to adversaries via online or other accessible data sets (ex: [Social Media](T1593.001) or [Search Victim-Owned Websites](T1594)). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](T1593) or [Search Open Technical Databases](T1596)), establishing operational resources (ex: [Develop Capabilities](T1587) or [Obtain Capabilities](T1588)), and/or initial access (ex: [Supply Chain Compromise](T1195) or [External Remote Services](T1133)).",0,reject,T1592,Gather Victim Host Information "Adversaries may search freely available websites and/or domains for information about victims that can be used during targeting. Information about victims may be available in various online sites, such as social media, new sites, or those hosting information about business operations such as hiring or requested/rewarded contracts.(Citation: Cyware Social Media)(Citation: SecurityTrails Google Hacking)(Citation: ExploitDB GoogleHacking) Adversaries may search in different online sites depending on what information they seek to gather. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](T1598) or [Search Open Technical Databases](T1596)), establishing operational resources (ex: [Establish Accounts](T1585) or [Compromise Accounts](T1586)), and/or initial access (ex: [External Remote Services](T1133) or [Phishing](T1566)).",0,reject,T1593,Search Open Websites/Domains "Adversaries may search websites owned by the victim for information that can be used during targeting. Victim-owned websites may contain a variety of details, including names of departments/divisions, physical locations, and data about key employees such as names, roles, and contact info (ex: [Email Addresses](T1589.002)). These sites may also have details highlighting business operations and relationships.(Citation: Comparitech Leak) Adversaries may search victim-owned websites to gather actionable information. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](T1598) or [Search Open Technical Databases](T1596)), establishing operational resources (ex: [Establish Accounts](T1585) or [Compromise Accounts](T1586)), and/or initial access (ex: [Trusted Relationship](T1199) or [Phishing](T1566)).",0,reject,T1594,Search Victim-Owned Websites "Adversaries may execute active reconnaissance scans to gather information that can be used during targeting. Active scans are those where the adversary probes victim infrastructure via network traffic, as opposed to other forms of reconnaissance that do not involve direct interaction. Adversaries may perform different forms of active scanning depending on what information they seek to gather. These scans can also be performed in various ways, including using native features of network protocols such as ICMP.(Citation: Botnet Scan)(Citation: OWASP Fingerprinting) Information from these scans may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](T1593) or [Search Open Technical Databases](T1596)), establishing operational resources (ex: [Develop Capabilities](T1587) or [Obtain Capabilities](T1588)), and/or initial access (ex: [External Remote Services](T1133) or [Exploit Public-Facing Application](T1190)).",0,reject,T1595,Active Scanning "Adversaries may search freely available technical databases for information about victims that can be used during targeting. Information about victims may be available in online databases and repositories, such as registrations of domains/certificates as well as public collections of network data/artifacts gathered from traffic and/or scans.(Citation: WHOIS)(Citation: DNS Dumpster)(Citation: Circl Passive DNS)(Citation: Medium SSL Cert)(Citation: SSLShopper Lookup)(Citation: DigitalShadows CDN)(Citation: Shodan) Adversaries may search in different open databases depending on what information they seek to gather. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](T1598) or [Search Open Websites/Domains](T1593)), establishing operational resources (ex: [Acquire Infrastructure](T1583) or [Compromise Infrastructure](T1584)), and/or initial access (ex: [External Remote Services](T1133) or [Trusted Relationship](T1199)).",0,reject,T1596,Search Open Technical Databases "Adversaries may search and gather information about victims from closed sources that can be used during targeting. Information about victims may be available for purchase from reputable private sources and databases, such as paid subscriptions to feeds of technical/threat intelligence data.(Citation: D3Secutrity CTI Feeds) Adversaries may also purchase information from less-reputable sources such as dark web or cybercrime blackmarkets.(Citation: ZDNET Selling Data) Adversaries may search in different closed databases depending on what information they seek to gather. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Phishing for Information](T1598) or [Search Open Websites/Domains](T1593)), establishing operational resources (ex: [Develop Capabilities](T1587) or [Obtain Capabilities](T1588)), and/or initial access (ex: [External Remote Services](T1133) or [Valid Accounts](T1078)).",0,reject,T1597,Search Closed Sources "Adversaries may send phishing messages to elicit sensitive information that can be used during targeting. Phishing for information is an attempt to trick targets into divulging information, frequently credentials or other actionable information. Phishing for information is different from [Phishing](T1566) in that the objective is gathering data from the victim rather than executing malicious code. All forms of phishing are electronically delivered social engineering. Phishing can be targeted, known as spearphishing. In spearphishing, a specific individual, company, or industry will be targeted by the adversary. More generally, adversaries can conduct non-targeted phishing, such as in mass credential harvesting campaigns. Adversaries may also try to obtain information directly through the exchange of emails, instant messages, or other electronic conversation means.(Citation: ThreatPost Social Media Phishing)(Citation: TrendMictro Phishing)(Citation: PCMag FakeLogin)(Citation: Sophos Attachment)(Citation: GitHub Phishery) Phishing for information frequently involves social engineering techniques, such as posing as a source with a reason to collect information (ex: [Establish Accounts](T1585) or [Compromise Accounts](T1586)) and/or sending multiple, seemingly urgent messages.",0,reject,T1598,Phishing for Information "Adversaries may bridge network boundaries by compromising perimeter network devices. Breaching these devices may enable an adversary to bypass restrictions on traffic routing that otherwise separate trusted and untrusted networks. Devices such as routers and firewalls can be used to create boundaries between trusted and untrusted networks. They achieve this by restricting traffic types to enforce organizational policy in an attempt to reduce the risk inherent in such connections. Restriction of traffic can be achieved by prohibiting IP addresses, layer 4 protocol ports, or through deep packet inspection to identify applications. To participate with the rest of the network, these devices can be directly addressable or transparent, but their mode of operation has no bearing on how the adversary can bypass them when compromised. When an adversary takes control of such a boundary device, they can bypass its policy enforcement to pass normally prohibited traffic across the trust boundary between the two separated networks without hinderance. By achieving sufficient rights on the device, an adversary can reconfigure the device to allow the traffic they want, allowing them to then further achieve goals such as command and control via [Multi-hop Proxy](T1090.003) or exfiltration of data via [Traffic Duplication](T1020.001). In the cases where a border device separates two separate organizations, the adversary can also facilitate lateral movement into new victim environments.",0,reject,T1599,Network Boundary Bridging "Adversaries may compromise a network device’s encryption capability in order to bypass encryption that would otherwise protect data communications. (Citation: Cisco Synful Knock Evolution) Encryption can be used to protect transmitted network traffic to maintain its confidentiality (protect against unauthorized disclosure) and integrity (protect against unauthorized changes). Encryption ciphers are used to convert a plaintext message to ciphertext and can be computationally intensive to decipher without the associated decryption key. Typically, longer keys increase the cost of cryptanalysis, or decryption without the key. Adversaries can compromise and manipulate devices that perform encryption of network traffic. For example, through behaviors such as [Modify System Image](T1601), [Reduce Key Space](T1600.001), and [Disable Crypto Hardware](T1600.002), an adversary can negatively effect and/or eliminate a device’s ability to securely encrypt network traffic. This poses a greater risk of unauthorized disclosure and may help facilitate data manipulation, Credential Access, or Collection efforts. (Citation: Cisco Blog Legacy Device Attacks)",0,reject,T1600,Weaken Encryption "Adversaries may make changes to the operating system of embedded network devices to weaken defenses and provide new capabilities for themselves. On such devices, the operating systems are typically monolithic and most of the device functionality and capabilities are contained within a single file. To change the operating system, the adversary typically only needs to affect this one file, replacing or modifying it. This can either be done live in memory during system runtime for immediate effect, or in storage to implement the change on the next boot of the network device.",0,reject,T1601,Modify System Image "Adversaries may collect data related to managed devices from configuration repositories. Configuration repositories are used by management systems in order to configure, manage, and control data on remote systems. Configuration repositories may also facilitate remote access and administration of devices. Adversaries may target these repositories in order to collect large quantities of sensitive system administration data. Data from configuration repositories may be exposed by various protocols and software and can store a wide variety of data, much of which may align with adversary Discovery objectives.(Citation: US-CERT-TA18-106A)(Citation: US-CERT TA17-156A SNMP Abuse 2017)",0,reject,T1602,Data from Configuration Repository "Adversaries may forge credential materials that can be used to gain access to web applications or Internet services. Web applications and services (hosted in cloud SaaS environments or on-premise servers) often use session cookies, tokens, or other materials to authenticate and authorize user access. Adversaries may generate these credential materials in order to gain access to web resources. This differs from [Steal Web Session Cookie](T1539), [Steal Application Access Token](T1528), and other similar behaviors in that the credentials are new and forged by the adversary, rather than stolen or intercepted from legitimate users. The generation of web credentials often requires secret values, such as passwords, [Private Keys](T1552.004), or other cryptographic seed values.(Citation: GitHub AWS-ADFS-Credential-Generator) Once forged, adversaries may use these web credentials to access resources (ex: [Use Alternate Authentication Material](T1550)), which may bypass multi-factor and other authentication protection mechanisms.(Citation: Pass The Cookie)(Citation: Unit 42 Mac Crypto Cookies January 2019)(Citation: Microsoft SolarWinds Customer Guidance)",0,reject,T1606,Forge Web Credentials "Adversaries may upload, install, or otherwise set up capabilities that can be used during targeting. To support their operations, an adversary may need to take capabilities they developed ([Develop Capabilities](T1587)) or obtained ([Obtain Capabilities](T1588)) and stage them on infrastructure under their control. These capabilities may be staged on infrastructure that was previously purchased/rented by the adversary ([Acquire Infrastructure](T1583)) or was otherwise compromised by them ([Compromise Infrastructure](T1584)). Capabilities can also be staged on web services, such as GitHub or Pastebin.(Citation: Volexity Ocean Lotus November 2020) Staging of capabilities can aid the adversary in a number of initial access and post-compromise behaviors, including (but not limited to): * Staging web resources necessary to conduct [Drive-by Compromise](T1189) when a user browses to a site.(Citation: FireEye CFR Watering Hole 2012)(Citation: Gallagher 2015)(Citation: ATT ScanBox) * Staging web resources for a link target to be used with spearphishing.(Citation: Malwarebytes Silent Librarian October 2020)(Citation: Proofpoint TA407 September 2019) * Uploading malware or tools to a location accessible to a victim network to enable [Ingress Tool Transfer](T1105).(Citation: Volexity Ocean Lotus November 2020) * Installing a previously acquired SSL/TLS certificate to use to encrypt command and control traffic (ex: [Asymmetric Cryptography](T1573.002) with [Web Protocols](T1071.001)).(Citation: DigiCert Install SSL Cert)",0,reject,T1608,Stage Capabilities "Adversaries may abuse a container administration service to execute commands within a container. A container administration service such as the Docker daemon, the Kubernetes API server, or the kubelet may allow remote management of containers within an environment.(Citation: Docker Daemon CLI)(Citation: Kubernetes API)(Citation: Kubernetes Kubelet) In Docker, adversaries may specify an entrypoint during container deployment that executes a script or command, or they may use a command such as `docker exec` to execute a command within a running container.(Citation: Docker Entrypoint)(Citation: Docker Exec) In Kubernetes, if an adversary has sufficient permissions, they may gain remote execution in a container in the cluster via interaction with the Kubernetes API server, the kubelet, or by running a command such as `kubectl exec`.(Citation: Kubectl Exec Get Shell)",0,reject,T1609,Container Administration Command "Adversaries may deploy a container into an environment to facilitate execution or evade defenses. In some cases, adversaries may deploy a new container to execute processes associated with a particular image or deployment, such as processes that execute or download malware. In others, an adversary may deploy a new container configured without network rules, user limitations, etc. to bypass existing defenses within the environment. Containers can be deployed by various means, such as via Docker's `create` and `start` APIs or via a web application such as the Kubernetes dashboard or Kubeflow.(Citation: Docker Containers API)(Citation: Kubernetes Dashboard)(Citation: Kubeflow Pipelines) Adversaries may deploy containers based on retrieved or built malicious images or from benign images that download and execute malicious payloads at runtime.(Citation: Aqua Build Images on Hosts)",0,reject,T1610,Deploy Container "Adversaries may break out of a container to gain access to the underlying host. This can allow an adversary access to other containerized resources from the host level or to the host itself. In principle, containerized resources should provide a clear separation of application functionality and be isolated from the host environment.(Citation: Docker Overview) There are multiple ways an adversary may escape to a host environment. Examples include creating a container configured to mount the host’s filesystem using the bind parameter, which allows the adversary to drop payloads and execute control utilities such as cron on the host, or utilizing a privileged container to run commands on the underlying host.(Citation: Docker Bind Mounts)(Citation: Trend Micro Privileged Container)(Citation: Intezer Doki July 20) Adversaries may also escape via [Exploitation for Privilege Escalation](T1068), such as exploiting vulnerabilities in global symbolic links in order to access the root directory of a host machine.(Citation: Windows Server Containers Are Open) Gaining access to the host may provide the adversary with the opportunity to achieve follow-on objectives, such as establishing persistence, moving laterally within the environment, or setting up a command and control channel on the host.",0,reject,T1611,Escape to Host "Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. A remote `build` request may be sent to the Docker API that includes a Dockerfile that pulls a vanilla base image, such as alpine, from a public or local registry and then builds a custom image upon it.(Citation: Docker Build Image) An adversary may take advantage of that `build` API to build a custom image on the host that includes malware downloaded from their C2 server, and then they then may utilize [Deploy Container](T1610) using that custom image.(Citation: Aqua Build Images on Hosts)(Citation: Aqua Security Cloud Native Threat Report June 2021) If the base image is pulled from a public registry, defenses will likely not detect the image as malicious since it’s a vanilla image. If the base image already resides in a local registry, the pull may be considered even less suspicious since the image is already in the environment. ",0,reject,T1612,Build Image on Host "Adversaries may attempt to discover containers and other resources that are available within a containers environment. Other resources may include images, deployments, pods, nodes, and other information such as the status of a cluster. These resources can be viewed within web applications such as the Kubernetes dashboard or can be queried via the Docker and Kubernetes APIs.(Citation: Docker API)(Citation: Kubernetes API) In Docker, logs may leak information about the environment, such as the environment’s configuration, which services are available, and what cloud provider the victim may be utilizing. The discovery of these resources may inform an adversary’s next steps in the environment, such as how to perform lateral movement and which methods to utilize for execution. ",0,reject,T1613,Container and Resource Discovery "Adversaries may gather information on Group Policy settings to identify paths for privilege escalation, security measures applied within a domain, and to discover patterns in domain objects that can be manipulated or used to blend in the environment. Group Policy allows for centralized management of user and computer settings in Active Directory (AD). Group policy objects (GPOs) are containers for group policy settings made up of files stored within a predicable network path `\\SYSVOL\\Policies\`.(Citation: TechNet Group Policy Basics)(Citation: ADSecurity GPO Persistence 2016) Adversaries may use commands such as `gpresult` or various publicly available PowerShell functions, such as `Get-DomainGPO` and `Get-DomainGPOLocalGroup`, to gather information on Group Policy settings.(Citation: Microsoft gpresult)(Citation: Github PowerShell Empire) Adversaries may use this information to shape follow-on behaviors, including determining potential attack paths within the target network as well as opportunities to manipulate Group Policy settings (i.e. [Domain Policy Modification](T1484)) for their benefit.",0,reject,T1615,Group Policy Discovery "Adversaries may enumerate objects in cloud storage infrastructure. Adversaries may use this information during automated discovery to shape follow-on behaviors, including requesting all or specific objects from cloud storage. Similar to [File and Directory Discovery](T1083) on a local host, after identifying available storage services (i.e. [Cloud Infrastructure Discovery](T1580)) adversaries may access the contents/objects stored in cloud infrastructure. Cloud service providers offer APIs allowing users to enumerate objects stored within cloud storage. Examples include ListObjectsV2 in AWS (Citation: ListObjectsV2) and List Blobs in Azure(Citation: List Blobs) .",0,reject,T1619,Cloud Storage Object Discovery "Adversaries may reflectively load code into a process in order to conceal the execution of malicious payloads. Reflective loading involves allocating then executing payloads directly within the memory of the process, vice creating a thread or process backed by a file path on disk. Reflectively loaded payloads may be compiled binaries, anonymous files (only present in RAM), or just snubs of fileless executable code (ex: position-independent shellcode).(Citation: Introducing Donut)(Citation: S1 Custom Shellcode Tool)(Citation: Stuart ELF Memory)(Citation: 00sec Droppers)(Citation: Mandiant BYOL) Reflective code injection is very similar to [Process Injection](T1055) except that the injection loads code into the processes own memory instead of that of a separate process. Reflective loading may evade process-based detections since the execution of the arbitrary code may be masked within a legitimate or otherwise benign process. Reflectively loading payloads directly into memory may also avoid creating files or other artifacts on disk, while also enabling malware to keep these payloads encrypted (or otherwise obfuscated) until execution.(Citation: Stuart ELF Memory)(Citation: 00sec Droppers)(Citation: Intezer ACBackdoor)(Citation: S1 Old Rat New Tricks)",0,reject,T1620,Reflective Code Loading Astaroth has been delivered via malicious e-mail attachments. ,1,accept,T1598.002,Phishing for Information: Spearphishing Attachment Sidewinder has sent e-mails with malicious attachments that lead victims to credential harvesting websites.,1,accept,T1598.002,Phishing for Information: Spearphishing Attachment "A phishing campaign has been observed by researchers from Trend Micro that contain a macro-enabled document that exploits the legitimate script engine, “AutoHotKey.” ",1,accept,T1598.002,Phishing for Information: Spearphishing Attachment Researchers have discovered a wave of emails with malicious attachments orchestrated by Russian Advanced Persistent Threat (APT) group APT29. ,1,accept,T1598.002,Phishing for Information: Spearphishing Attachment " Using attached HTML files containing JavaScript, the email will write an ISO file to disk; this contains a Cobalt Strike beacon that will activate on completion. ",1,accept,T1598.002,Phishing for Information: Spearphishing Attachment " Strrat, a Java-based malware, is currently being delivered as an attached PDF document via a phishing campaign using compromised email accounts. ",1,accept,T1598.002,Phishing for Information: Spearphishing Attachment " Although the email may look official and legitimate, if you have no reason to receive such an email or if the content is questionable, you should not open any attached files. ",1,accept,T1598.002,Phishing for Information: Spearphishing Attachment "Some spam lists are selected to target a specific business role, for example identified sales representatives. ",1,accept,T1591.004,Gather Victim Org Information: Identify Roles " Through reading the extracted emails, threat actors identified that fund transfers were originating in the accounting department by person A and approved by manager B. ",1,accept,T1591.004,Gather Victim Org Information: Identify Roles "RestorePrivacy, an information site about privacy, examined the proof the seller put out and found the following information, scraped from LinkedIn user profiles: Email addresses, Full names, Phone numbers, Physical addresses, LinkedIn username and profile URL, Personal and professional experience/background. ",1,accept,T1591.004,Gather Victim Org Information: Identify Roles " Targets are identified, groomed, and then deceived by quite sophisticated email techniques into wiring funds to 'burner' bank accounts, and thinking that the email request comes from the CEO, the victim willingly sends the money. ",1,accept,T1591.004,Gather Victim Org Information: Identify Roles " This threat group instructs its affiliates to parse companies’ websites and social media to identify leadership, HR, and accounting staff for following targeted spear phishing attacks. ",1,accept,T1591.004,Gather Victim Org Information: Identify Roles Threat actors identified that long holiday weekend in the US will be the best time to lunch a cyber attack against this company. ,1,accept,T1591.003,Gather Victim Org Information: Identify Business Tempo " The federal advisory makes note of ""recent holiday targeting,"" stating that ""cyber actors have conducted increasingly impactful attacks against U.S. entities on or around holiday weekends."" Neither FBI nor CISA has information about a cyberattack ""coinciding with upcoming holidays and weekends,"" per the advisory, but the document says cybercriminals may see holidays and weekends as ""as attractive timeframes"" to ""target potential victims."" ",1,accept,T1591.003,Gather Victim Org Information: Identify Business Tempo " Whether you celebrate Christmas, Hanukkah, or Thanksgiving, your chances of being the victim of a cyber attack increase. The vacation season is yet another perfect period for cyber attacks. If a hacker had a choice between attacking your organization when your IT security team is fully staffed or when it isn’t- what do you think they will choose? ",1,accept,T1591.003,Gather Victim Org Information: Identify Business Tempo " Many times, organizations are overburdened, and cyberattacks during the holidays are the last thing on their minds. The current pandemic heightened the threat, which has resulted in many firms operating with significant cybersecurity flaws resulting from the rapid shift to working from home. Cybercriminals exploit these flaws to get access to systems – and vulnerabilities increase with less network supervision during the holidays. ",1,accept,T1591.003,Gather Victim Org Information: Identify Business Tempo " Once they had infected the computers of the personnel in charge of cash transfer systems or ATMs, the attackers collected snapshots of victims’ screens and studied their daily activities in the bank. ",1,accept,T1591.003,Gather Victim Org Information: Identify Business Tempo "REvil was previously known as GandCrab, and one of the many things GandCrab had in common with REvil was that both programs barred affiliates from infecting victims in Syria. ",1,accept,T1591.001,Gather Victim Org Information: Determine Physical Locations " As we can see from the chart above, Syria is also exempted from infections by DarkSide ransomware. ",1,accept,T1591.001,Gather Victim Org Information: Determine Physical Locations " However, upon closer inspection, it turns out this is actually a clever language check to ensure that the payload will not be downloaded outside of France. ",1,accept,T1591.001,Gather Victim Org Information: Determine Physical Locations "The majority of the actors behind the ransomware are likely based outside of the CIS, for example, ransomware Fonix won’t run if IP geolocation is Iranian. ",1,accept,T1591.001,Gather Victim Org Information: Determine Physical Locations " DarkSide, like a great many other malware strains, has a hard-coded do-not-install list of countries which are the principal members of the Commonwealth of Independent States (CIS) — former Soviet satellites that mostly have favorable relations with the Kremlin. ",1,accept,T1591.001,Gather Victim Org Information: Determine Physical Locations " REvil was previously known as GandCrab, and one of the many things GandCrab had in common with REvil was that both programs barred affiliates from infecting victims in Syria. ",1,accept,T1591.001,Gather Victim Org Information: Determine Physical Locations " As we can see from the chart above, Syria is also exempted from infections by DarkSide ransomware. ;; However, upon closer inspection, it turns out this is actually a clever language check to ensure that the payload will not be downloaded outside of France. ",1,accept,T1591.001,Gather Victim Org Information: Determine Physical Locations In preparation for its attack against the 2018 Winter Olympics Sandworm Team conducted online research of partner organizations listed on an official PyeongChang Olympics partnership site.,1,accept,T1591.002,Gather Victim Org Information: Business Relationships "Generally, supply chain attacks on information systems begin with an advanced persistent threat (APT) that determines a member of the supply network with the weakest cyber security in order to affect the target organization. ",1,accept,T1591.002,Gather Victim Org Information: Business Relationships " It also found that hackers can steal sensitive data, including information about partners. ",1,accept,T1591.002,Gather Victim Org Information: Business Relationships The attackers were after Facebook’s information about partners. ,1,accept,T1591.002,Gather Victim Org Information: Business Relationships " Clues about business partners can provide a hacker with other potential avenues of attack. ",1,accept,T1591.002,Gather Victim Org Information: Business Relationships Attackers identified and impersonated the company’s foreign supplier in a Bogus Invoice Scheme attack. ,1,accept,T1591.002,Gather Victim Org Information: Business Relationships "Attackers are looking for IT service providers that have privileged access to their clients’ networks. ",1,accept,T1590.003,Gather Victim Network Information: Network Trust Dependencies " Nation-state sponsored hackers are targeting IT service providers and discovering network trust relationships with their client organizations from government and military sectors. ",1,accept,T1590.003,Gather Victim Network Information: Network Trust Dependencies " The threat actors were looking for MSPs and MSSPs managing IT and security within the target organization. ",1,accept,T1590.003,Gather Victim Network Information: Network Trust Dependencies " In all of the cases, attackers enumerated network trust relationships, hijacked the managed service providers’ internal management tools to distribute Sodinokibi ransomware to their customers. ",1,accept,T1590.003,Gather Victim Network Information: Network Trust Dependencies " A hacker can make one strategic breach into an MSP, discover network access to their clients, and gain access to multiple customers’ information across multiple industries. ",1,accept,T1590.003,Gather Victim Network Information: Network Trust Dependencies "The group utilizes active scanning to collect information on the victim network. ",1,accept,T1590.004,Gather Victim Network Information: Network Topology " After the initial foothold the actors were scanning to map the local network devices and plan the lateral movement. ",1,accept,T1590.004,Gather Victim Network Information: Network Topology " During the exfiltration stage, attackers were identifying documents related to local accounts, network security and topology. ",1,accept,T1590.004,Gather Victim Network Information: Network Topology " Requirement to publish procurement documents made it possible for the attackers to access specifics regarding network devices used by the organization (gateways, routers, etc.) ",1,accept,T1590.004,Gather Victim Network Information: Network Topology " All the graphs, mind maps, presentations including the physical and/or logical arrangement of both external-facing and internal network environments should be treated as sensitive information. ",1,accept,T1590.004,Gather Victim Network Information: Network Topology This firewall company had a few large customers listed on their website thus providing the attackers with convenient targets. ,1,accept,T1590.006,Gather Victim Network Information: Network Security Appliances " Requirement to publish procurement documents made it possible for the attackers to access specifics regarding network security appliances used by the organization (firewalls, content filters, NIDS, etc.) ",1,accept,T1590.006,Gather Victim Network Information: Network Security Appliances " Following the intrusion, actors were scanning to identify firewalls and other deployed security appliances. ",1,accept,T1590.006,Gather Victim Network Information: Network Security Appliances " This group phishes for information trying to identify deployed security appliances and leverage it for initial access. ",1,accept,T1590.006,Gather Victim Network Information: Network Security Appliances This APT group was identifying the use of proxies and company VPN and then utilizing these security appliances for stealthy lateral movement. ,1,accept,T1590.006,Gather Victim Network Information: Network Security Appliances HAFNIUM has obtained IP addresses for publicly-accessible Exchange servers.,1,accept,T1590.005,Gather Victim Network Information: Ip Addresses "Andariel has limited its watering hole attacks to specific IP address ranges. ",1,accept,T1590.005,Gather Victim Network Information: Ip Addresses " Initially the attackers research the victim’s IP ranges and scan them for open ports and opportunities for the initial access. ",1,accept,T1590.005,Gather Victim Network Information: Ip Addresses " Anonymous OpIsrael campaign published a Pastebin post listing IP addresses of organizations that hacktivists plan to target. ",1,accept,T1590.005,Gather Victim Network Information: Ip Addresses " Actor obtains list of the victim IP blocks and proceeds to run a Shodan or Zoomeye scan of the ranges. ",1,accept,T1590.005,Gather Victim Network Information: Ip Addresses Keyword search on Hurricane Electric allows attackers to find IP addresses of a certain company they want to target. ,1,accept,T1590.005,Gather Victim Network Information: Ip Addresses Sandworm Team conducted technical reconnaissance of the Parliament of Georgia's official internet domain prior to its 2019 attack.,1,accept,T1590.001,Gather Victim Network Information: Domain Properties "There is an active campaign targeting domain owners via email addresses that were derived by actors in the domain registration data. ",1,accept,T1590.001,Gather Victim Network Information: Domain Properties " Attackers were able to leverage domain registration data to find additional domains belonging to the same victim organization. ",1,accept,T1590.001,Gather Victim Network Information: Domain Properties " Domain administrator was targeted with a tailored spear phishing after the attackers determined the domain registrar and impersonated it. ",1,accept,T1590.001,Gather Victim Network Information: Domain Properties " Many victims avoided using domain registration anonymization services and their domain properties were leveraged by the hackers. ",1,accept,T1590.001,Gather Victim Network Information: Domain Properties This DDoS service offered TDoS and email bombing to target domain administrator contacts if those were available from the gathered domain properties. ,1,accept,T1590.001,Gather Victim Network Information: Domain Properties "During the reconnaissance phase, this group paid special attention to collect and analyze DNS information. ",1,accept,T1590.002,Gather Victim Network Information: Dns " Gathering DNS information allowed the attackers to identify victim’s subdomains that were supposed to remain private. ",1,accept,T1590.002,Gather Victim Network Information: Dns " Targeting of mail servers were starting by gathering mail server records from the victim’s DNS. ",1,accept,T1590.002,Gather Victim Network Information: Dns " Some of the information on targets were gathered free of charge such as from DNS records. ",1,accept,T1590.002,Gather Victim Network Information: Dns Passive DNS information helped the attackers to map the victim’s hosts and plan the intrusion.,1,accept,T1590.002,Gather Victim Network Information: Dns Sandworm Team's research of potential victim organizations included the identification and collection of employee information. ,1,accept,T1589.003,Gather Victim Identity Information: Employee Names Silent Librarian has collected lists of names for individuals from targeted organizations.,1,accept,T1589.003,Gather Victim Identity Information: Employee Names "Collecting victim organization’s employee list allowed the attacker to generate actual email addresses due to conservative alias naming convention. ",1,accept,T1589.003,Gather Victim Identity Information: Employee Names " Social media such as LinkedIn and Facebook allow threat actors to identify employee names for the organizations they plan to target. ",1,accept,T1589.003,Gather Victim Identity Information: Employee Names This threat group collects employee names from the organization’s website and use them for impersonation in spear phishing attacks.,1,accept,T1589.003,Gather Victim Identity Information: Employee Names APT32 has collected e-mail addresses for activists and bloggers in order to target them with spyware. ,1,accept,T1589.002,Gather Victim Identity Information: Email Addresses HAFNIUM has collected e-mail addresses for users they intended to target. ,1,accept,T1589.002,Gather Victim Identity Information: Email Addresses MuddyWater has specifically targeted government agency employees with spearphishing e-mails. ,1,accept,T1589.002,Gather Victim Identity Information: Email Addresses Sandworm Team has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spearphishing campaigns. ,1,accept,T1589.002,Gather Victim Identity Information: Email Addresses Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches. ,1,accept,T1589.002,Gather Victim Identity Information: Email Addresses TA551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals. ,1,accept,T1589.002,Gather Victim Identity Information: Email Addresses Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches. ;; TA551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals. ,1,accept,T1589.002,Gather Victim Identity Information: Email Addresses APT28 has harvested user's login credentials. ,1,accept,T1589.001,Gather Victim Identity Information: Credentials Chimera has collected credentials for the target organization from previous breaches for use in brute force attacks. ,1,accept,T1589.001,Gather Victim Identity Information: Credentials Magic Hound gathered credentials from two victims that they then attempted to validate across 75 different websites. ,1,accept,T1589.001,Gather Victim Identity Information: Credentials "Strontium is launching campaigns to harvest people’s log-in credentials or compromise their accounts, presumably to aid in intelligence gathering or disruption operations.",1,accept,T1589.001,Gather Victim Identity Information: Credentials Attackers appear to have purchased credential and other information from an underground forum for use in this attack. ,1,accept,T1589.001,Gather Victim Identity Information: Credentials Sandworm Team has researched software code to enable supply-chain operations most notably for the 2017 NotPetya attack. Sandworm Team also collected a list of computers using specific software as part of its targeting efforts. ,1,accept,T1592.002,Gather Victim Host Information: Software "Public procurement data such as purchase invoices for software allowed attackers to plan their exploitation for the initial access. ",1,accept,T1592.002,Gather Victim Host Information: Software " Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data. ",1,accept,T1592.002,Gather Victim Host Information: Software " Some threat groups use supply chain compromise as an opportunistic attack on whomever is a client, others – specifically research software suppliers for a given target. ",1,accept,T1592.002,Gather Victim Host Information: Software Gathering information from server banners allows attackers to use known vulnerabilities for certain kinds of server software. ,1,accept,T1592.002,Gather Victim Host Information: Software "Actors targeting poor countries pay attention to learn victim’s hardware, as it is often so old that doesn’t support newer more secure operation systems. ",1,accept,T1592.001,Gather Victim Host Information: Hardware " Another door in for initial access are IoT devices, and hackers are trying to learn the used hardware versions, as it is often produced to never be fully updated or secured. ",1,accept,T1592.001,Gather Victim Host Information: Hardware " This group was using job postings, resumes, and public purchase invoices to determine the hardware used by the victim organization. ",1,accept,T1592.001,Gather Victim Host Information: Hardware " After the attacker gathered information about the hardware used in the organization, they proceeded to register typosquatted domains mimicking these hardware manufactures. ",1,accept,T1592.001,Gather Victim Host Information: Hardware This Russian APT gathered information on the specific type of industrial controllers used by some Ukrainian power transmission stations. ,1,accept,T1592.001,Gather Victim Host Information: Hardware "Intruders impersonated the CEO and demanded information on the age and patch level of the network appliances. ",1,accept,T1592.003,Gather Victim Host Information: Firmware " While the problem with the firmware update level was outlined in the previous assessment report, the company failed to act on it, moreover the very assessment ended up in the hands of the threat actors. ",1,accept,T1592.003,Gather Victim Host Information: Firmware " Slow implementation of the firmware patch for this vulnerability became apparent to the attackers who started directing their botnets to target it. ",1,accept,T1592.003,Gather Victim Host Information: Firmware "Attackers did research on the backdoor in the standard router firmware in that country. ",1,accept,T1592.003,Gather Victim Host Information: Firmware This botnet handers gather information on the dominating types of IoT firmware with known vulnerabilities.,1,accept,T1592.003,Gather Victim Host Information: Firmware HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments. ,1,accept,T1592.004,Gather Victim Host Information: Client Configurations "Attackers’ website was checking visitors’ host information and serving the malicious content only to those with certain language settings. ",1,accept,T1592.004,Gather Victim Host Information: Client Configurations " This group was studying organization’s purchase invoices to learn what operating systems are in use, their versions and architecture. ",1,accept,T1592.004,Gather Victim Host Information: Client Configurations " The Scanbox framework first configures the remote C&C server that it will use and collects a small amount of information about the victim that is visiting the compromised website including: Referer User-Agent Location Cookie Title (To identify specific content that the victim is visiting) Domain Charset Screen width and height Operating System Language ",1,accept,T1592.004,Gather Victim Host Information: Client Configurations " The attackers were able to compromise the website and include code that loaded a malicious Javascript file from a remote server that records visitors’ User-Agent, Location, Charset, Operating System, and Language. ",1,accept,T1592.004,Gather Victim Host Information: Client Configurations Hackers were checking client configuration virtualization status and generally were trying to avoid targeting virtual machines. ,1,accept,T1592.004,Gather Victim Host Information: Client Configurations APT28 has performed large-scale scans in an attempt to find vulnerable servers. ,1,accept,T1595.002,Active Scanning: Vulnerability Scanning Sandworm Team has scanned network infrastructure for vulnerabilities as part of its operational planning. ,1,accept,T1595.002,Active Scanning: Vulnerability Scanning Volatile Cedar has performed vulnerability scans of the target server.,1,accept,T1595.002,Active Scanning: Vulnerability Scanning "First, this threat group would engage in vulnerability reconnaissance via application-specific vulnerability discovery and identifying vulnerable content management systems (CMS) and CMS components. ",1,accept,T1595.002,Active Scanning: Vulnerability Scanning " Adversaries scan victims for vulnerabilities that can be used during targeting. ",1,accept,T1595.002,Active Scanning: Vulnerability Scanning " These scans may also include more broad attempts to Gather Victim Host Information that can be used to identify more commonly known, exploitable vulnerabilities. ",1,accept,T1595.002,Active Scanning: Vulnerability Scanning " Vulnerability scans typically harvest running software and version numbers via server banners, listening ports, or other network artifacts. ",1,accept,T1595.002,Active Scanning: Vulnerability Scanning Vulnerability scans typically check if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit the adversary may seek to use. ,1,accept,T1595.002,Active Scanning: Vulnerability Scanning "The adversaries were scanning victim IP blocks to gather information that can be used during targeting. ",1,accept,T1595.001,Active Scanning: Scanning Ip Blocks " After finding victim’s ASNs, attackers continued by scanning these net ranges to detect active IP addresses and open ports. ",1,accept,T1595.001,Active Scanning: Scanning Ip Blocks " One member of Anonymous was sharing victim’s IP addresses, another – was scanning them to reveal host software versions. ",1,accept,T1595.001,Active Scanning: Scanning Ip Blocks " This attacker was scanning company’s IP space for any artifact he could find. ",1,accept,T1595.001,Active Scanning: Scanning Ip Blocks " First, the attacker was using simple pings (ICMP requests and responses) to detect which target’s IP addresses are actively in use.",1,accept,T1595.001,Active Scanning: Scanning Ip Blocks In 2017 Sandworm Team conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee a Korean power company and a Korean airport.,1,accept,T1588.006,Obtain Capabilities: Vulnerabilities "Multiple threat actors obtained Log4Shell vulnerability simply by studying the public vulnerability disclosures from Apache, watching POC presentations, and analyzing reports of the zero-day exploitation. ",1,accept,T1588.006,Obtain Capabilities: Vulnerabilities " Israeli spyware companies were purchasing vulnerabilities from undisclosed researchers, often using specialized vulnerability brokers. ",1,accept,T1588.006,Obtain Capabilities: Vulnerabilities " Soon after the patch was released, the attackers were able to reverse-engineer the changes, understand the fix, and weaponize the vulnerability that patch was addressing. ",1,accept,T1588.006,Obtain Capabilities: Vulnerabilities The botnet handlers were monitoring new vulnerability disclosures to add new vulnerabilities to their list.,1,accept,T1588.006,Obtain Capabilities: Vulnerabilities GALLIUM has used a variety of widely-available tools which in some cases they modified to add functionality and/or subvert antimalware solutions. ,1,accept,T1588.002,Obtain Capabilities: Tool MuddyWater has made use of legitimate tools ConnectWise and RemoteUtilities for access to target environments. ,1,accept,T1588.002,Obtain Capabilities: Tool Sandworm Team has acquired open-source tools for some of it's operations; for example it acquired Invoke-PSImage to establish an encrypted channel from a compromised host to Sandworm Team's C2 server as part of its preparation for the 2018 Winter Olympics attack. ,1,accept,T1588.002,Obtain Capabilities: Tool Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations.,1,accept,T1588.002,Obtain Capabilities: Tool Cozy Bear stole Cobalt Strike Beacon code and modified the tool to their liking.,1,accept,T1588.002,Obtain Capabilities: Tool APT1 used publicly available malware for privilege escalation. ,1,accept,T1588.001,Obtain Capabilities: Malware Turla has used malware obtained after compromising other threat actors such as OilRig.,1,accept,T1588.001,Obtain Capabilities: Malware "Ransomware-as-a-Service (RaaS) model allowed even unskilled hackers to obtain this malware and use it for a relatively small affiliate fee. ",1,accept,T1588.001,Obtain Capabilities: Malware " New IoT botnet actors obtained leaked Mirai botnet code and slightly modified it. ",1,accept,T1588.001,Obtain Capabilities: Malware Citadel Trojan developers Vartanyan and Belorossov initially obtained Zeus Trojan code that they planned to use as a base for their own Trojan.,1,accept,T1588.001,Obtain Capabilities: Malware "DarkHotel APT group is known for stealing exploits from Hacking Team and use them for attacks on corporate executives staying in luxury hotels. ",1,accept,T1588.005,Obtain Capabilities: Exploits "Uzbek intelligence officers bought exploits from German subsidiary of the Gamma Group that specializes in surveillance. ",1,accept,T1588.005,Obtain Capabilities: Exploits "The attackers leveraged RIG exploit kit that they purchased on a criminal marketplace. ",1,accept,T1588.005,Obtain Capabilities: Exploits "UAE purchased NSO Group’s iPhone zero-day exploits. ",1,accept,T1588.005,Obtain Capabilities: Exploits These hacktivists were relying on exploits that they found online on various cybersecurity and hacker forums.,1,accept,T1588.005,Obtain Capabilities: Exploits KGH_SPY can collect credentials from the Windows Credential Manager. ,1,accept,T1555.004,Credentials from Password Stores: Windows Credential Manager LaZagne can obtain credentials from Vault files. ,1,accept,T1555.004,Credentials from Password Stores: Windows Credential Manager Mimikatz contains functionality to acquire credentials from the Windows Credential Manager. ,1,accept,T1555.004,Credentials from Password Stores: Windows Credential Manager OilRig has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager. ,1,accept,T1555.004,Credentials from Password Stores: Windows Credential Manager PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects. ,1,accept,T1555.004,Credentials from Password Stores: Windows Credential Manager ROKRAT steals credentials by leveraging the Windows Vault mechanism. ,1,accept,T1555.004,Credentials from Password Stores: Windows Credential Manager Stealth Falcon malware gathers passwords from the Windows Credential Vault. ,1,accept,T1555.004,Credentials from Password Stores: Windows Credential Manager Turla has gathered credentials from the Windows Credential Manager tool. ;; Valak can use a .NET compiled module named exchgrabber to enumerate credentials from the Credential Manager.,1,accept,T1555.004,Credentials from Password Stores: Windows Credential Manager Empire has a dylib hijacker module that generates a malicious dylib given the path to a legitimate dylib of a vulnerable application.,1,accept,T1574.004,Hijack Execution Flow: Dylib Hijacking "Abusing Dynamic Loader/Linker (dyld) logic allowed attackers to perform dylib hijacking. ",1,accept,T1574.004,Hijack Execution Flow: Dylib Hijacking "Attackers ran Dylib Hijack Scanner tool and attacked identified vulnerable apps. ",1,accept,T1574.004,Hijack Execution Flow: Dylib Hijacking "Developers should replace weak linking with version check to mitigate dylib hijacking attacks from these threat actors. ",1,accept,T1574.004,Hijack Execution Flow: Dylib Hijacking "After the initial access to the Apple device, attackers were escalating their privileges by placing malicious dylib files with expected names to hijack the normal execution flow.",1,accept,T1574.004,Hijack Execution Flow: Dylib Hijacking HiddenWasp installs reboot persistence by adding itself to /etc/rc.local. ,1,accept,T1037.004,Boot or Logon Initialization Scripts: Rc Scripts iKitten adds an entry to the rc.common file for persistence.,1,accept,T1037.004,Boot or Logon Initialization Scripts: Rc Scripts "Install persistence through rc.d services: rc.d (/etc/rc.d/init.d/linux_kill). ",1,accept,T1037.004,Boot or Logon Initialization Scripts: Rc Scripts "Backwards compatibility on Ubuntu allowed attackers to achieve persistence via RC scripts. ",1,accept,T1037.004,Boot or Logon Initialization Scripts: Rc Scripts "As the malware tries to achieve persistence, Hatching Triage analysis reports suspicious behavior: “Modifies rc script.”",1,accept,T1037.004,Boot or Logon Initialization Scripts: Rc Scripts APT41 has configured payloads to load via LD_PRELOAD. ,1,accept,T1574.006,Hijack Execution Flow: Dynamic Linker Hijacking Ebury has injected its dynamic library into descendent processes of sshd via LD_PRELOAD. ,1,accept,T1574.006,Hijack Execution Flow: Dynamic Linker Hijacking HiddenWasp adds itself as a shared object to the LD_PRELOAD environment variable. ,1,accept,T1574.006,Hijack Execution Flow: Dynamic Linker Hijacking Hildegard has modified /etc/ld.so.preload to intercept shared library import functions. ,1,accept,T1574.006,Hijack Execution Flow: Dynamic Linker Hijacking Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists.,1,accept,T1574.006,Hijack Execution Flow: Dynamic Linker Hijacking APT32 has used JavaScript for drive-by downloads and C2 communications. ,1,accept,T1059.007,Command and Scripting Interpreter: Javascript Astaroth uses JavaScript to perform its core functionalities. ,1,accept,T1059.007,Command and Scripting Interpreter: Javascript Bundlore can execute JavaScript by injecting it into the victim's browser. ,1,accept,T1059.007,Command and Scripting Interpreter: Javascript Cobalt Group has executed JavaScript scriptlets on the victim's machine. ,1,accept,T1059.007,Command and Scripting Interpreter: Javascript The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions. ,1,accept,T1059.007,Command and Scripting Interpreter: Javascript Evilnum has used malicious JavaScript files on the victim's machine. ,1,accept,T1059.007,Command and Scripting Interpreter: Javascript FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites. ,1,accept,T1059.007,Command and Scripting Interpreter: Javascript FIN7 used JavaScript scripts to help perform tasks on the victim's machine. ;; GRIFFON is written in and executed as JavaScript. ;; Higaisa used JavaScript to execute additional files. ;; InvisiMole can use a JavaScript file as part of its execution chain. ;; jRAT has been distributed as HTA files with JScript. ;; Kimsuky has used JScript for logging and downloading additional tools. ;; Leafminer infected victims using JavaScript code. ;; Metamorfo includes payloads written in JavaScript. ;; ;;Molerats used various implants including those built with JS on target machines. ;; MuddyWater has used JavaScript files to execute its POWERSTATS payload. ;; NanHaiShu executes additional Jscript code on the victim's machine. ;; POWERSTATS can use JavaScript code for execution. ;; Sidewinder has used JavaScript to drop and execute malware loaders. ;; Silence has used JS scripts. ;; TA505 has used JavaScript for code execution. ;; Turla has used various JavaScript-based backdoors. ;; Valak can execute JavaScript containing configuration data for establishing persistence. ,1,accept,T1059.007,Command and Scripting Interpreter: Javascript Silent Librarian has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. Silent Librarian has also made use of a variety of URL shorteners for these staged websites.,1,accept,T1608.005,Stage Capabilities: Link Target "The attackers prepared over 39,000 phishing pages mimicking the four platforms' login pages. ",1,accept,T1608.005,Stage Capabilities: Link Target "They used Ngrok’s paid option to acquire customized phishing URLs displaying Meta’s trademarks (such as hxxp://facebook[.]in[.]ngrok[.]io/). ",1,accept,T1608.005,Stage Capabilities: Link Target "Prior to the attack, they registered typosquatted domains, set up phishing pages and employed URL shortener service. ",1,accept,T1608.005,Stage Capabilities: Link Target The attacker placed archived malicious Office Documents at the link target.,1,accept,T1608.005,Stage Capabilities: Link Target APT32 has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update. ,1,accept,T1608.004,Stage Capabilities: Drive Threat Group-3390 has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest.,1,accept,T1608.004,Stage Capabilities: Drive "The attackers prepared an malvertizing: an ad combined of image and a JavaScript, which contained malicious code, and pushed it to legitimate websites via ad networks. ",1,accept,T1608.004,Stage Capabilities: Drive "Second stage of the Magecart attack included injecting malicious Javascript on the vulnerable checkout pages. ",1,accept,T1608.004,Stage Capabilities: Drive This APT group was looking to compromise industry’s online publications to prepare for watering whole attacks.,1,accept,T1608.004,Stage Capabilities: Drive "Adversaries created self-signed certificates and installed them on their web servers. ",1,accept,T1608.003,Stage Capabilities: Install Digital Certificate "Attackers installed Let’s Encrypt certificates on their phishing servers to gain additional trust from the visitors. ",1,accept,T1608.003,Stage Capabilities: Install Digital Certificate "They prepare phishing pages with valid SSL/TLS certificates installed. ",1,accept,T1608.003,Stage Capabilities: Install Digital Certificate "According to PhishLabs, in the last quarter of 2019, 74% of reported phishing websites were 'secure,' being both HTTPS and with the lock symbol, meaning cybercriminals installed SSL certificates and circumvented so-called verification processes. ",1,accept,T1608.003,Stage Capabilities: Install Digital Certificate Actors installed SSL certificates they made using OpenSSL (where you can even be your own Certificate Authority).,1,accept,T1608.003,Stage Capabilities: Install Digital Certificate Threat Group-3390 has staged tools including gsecdump and WCE on previously compromised websites.,1,accept,T1608.002,Stage Capabilities: Upload Tool "Prior to the attack, the adversaries uploaded remote administration tools to compromised websites they controlled. ",1,accept,T1608.002,Stage Capabilities: Upload Tool "Threat actor placed several double-purpose tools on his GitHub repository. ",1,accept,T1608.002,Stage Capabilities: Upload Tool "The attackers uploaded Remote Utilities RAT tool to a third-party compromised website to be used if the victim environment won’t have a remote administration tool installed. ",1,accept,T1608.002,Stage Capabilities: Upload Tool FIN5 staged a customized version of PsExec.,1,accept,T1608.002,Stage Capabilities: Upload Tool APT32 has hosted malicious payloads in Dropbox Amazon S3 and Google Drive for use during targeting.,1,accept,T1608.001,Stage Capabilities: Upload Malware "They were posting obfuscated malicious payloads on Pastebin to be used later during the attack. ",1,accept,T1608.001,Stage Capabilities: Upload Malware "Some of the compromised websites were used to stage post-compromise malware such as keyloggers. ",1,accept,T1608.001,Stage Capabilities: Upload Malware "These government hackers staged malicious Java scripts on the Microsoft typosquatted domains they registered earlier. ",1,accept,T1608.001,Stage Capabilities: Upload Malware Gamaredon stage malicious VBA scripts on various compromised websites.,1,accept,T1608.001,Stage Capabilities: Upload Malware APT41 has used search order hijacking to execute malicious payloads such as Winnti RAT. ,1,accept,T1574.001,Hijack Execution Flow: Dll Search Order Hijacking Astaroth can launch itself via DLL Search Order Hijacking. ,1,accept,T1574.001,Hijack Execution Flow: Dll Search Order Hijacking BOOSTWRITE has exploited the loading of the legitimate Dwrite.dll file by actually loading the gdi library which then loads the gdiplus library and ultimately loads the local Dwrite dll. ,1,accept,T1574.001,Hijack Execution Flow: Dll Search Order Hijacking Crutch can persist via DLL search order hijacking on Google Chrome Mozilla Firefox or Microsoft OneDrive. ,1,accept,T1574.001,Hijack Execution Flow: Dll Search Order Hijacking Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges. ,1,accept,T1574.001,Hijack Execution Flow: Dll Search Order Hijacking Empire contains modules that can discover and exploit various DLL hijacking opportunities. ,1,accept,T1574.001,Hijack Execution Flow: Dll Search Order Hijacking Evilnum has used the malware variant TerraTV to load a malicious DLL placed in the TeamViewer directory instead of the original Windows DLL located in a system folder. ,1,accept,T1574.001,Hijack Execution Flow: Dll Search Order Hijacking A FinFisher variant uses DLL search order hijacking. ;; Hikit has used DLL Search Order Hijacking to load oci.dll as a persistence mechanism. ;; HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary VPDN_LU.exe to load a malicious DLL that mimics a legitimate Symantec DLL navlu.dll. ;; InvisiMole can be launched by using DLL search order hijacking in which the wrapper DLL is placed in the same folder as explorer.exe and loaded during startup into the Windows Explorer process instead of the legitimate library. ;; Melcoz can use DLL hijacking to bypass security controls. ;; menuPass has used DLL search order hijacking. ;; MirageFox is likely loaded via DLL hijacking into a legitimate McAfee binary. ;; PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes. ;; Prikormka uses DLL search order hijacking for persistence by saving itself as ntshrui.dll to the Windows directory so it will load before the legitimate ntshrui.dll saved in the System32 subdirectory. ;; Ramsay can hijack outdated Windows application dependencies with malicious versions of its own DLL payload. ;; RedLeaves is launched through use of DLL search order hijacking to load a malicious dll. ;; RTM has used search order hijacking to force TeamViewer to load a malicious DLL. ;; Threat Group-3390 has performed DLL search order hijacking to execute their payload. ;; Variants of WEBC2 achieve persistence by using DLL search order hijacking usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll). ;; Whitefly has used search order hijacking to run the loader Vcrodat.,1,accept,T1574.001,Hijack Execution Flow: Dll Search Order Hijacking APT19 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL. ,1,accept,T1574.002,Hijack Execution Flow: Dll Side APT3 has been known to side load DLLs with a valid version of Chrome with one of their tools. ,1,accept,T1574.002,Hijack Execution Flow: Dll Side APT32 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate signed executable (AcroTranscoder). ,1,accept,T1574.002,Hijack Execution Flow: Dll Side APT41 used legitimate executables to perform DLL side-loading of their malware. ,1,accept,T1574.002,Hijack Execution Flow: Dll Side BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable. ,1,accept,T1574.002,Hijack Execution Flow: Dll Side DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper. ,1,accept,T1574.002,Hijack Execution Flow: Dll Side BlackTech has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories. ,1,accept,T1574.002,Hijack Execution Flow: Dll Side BRONZE BUTLER has used legitimate applications to side-load malicious DLLs. ;; Chimera has used side loading to place malicious DLLs in memory. ;; Denis exploits a security vulnerability to load a fake DLL and execute its code. ;; Egregor has used DLL side-loading to execute its payload. ;; FinFisher uses DLL side-loading to load malicious programs. ;; GALLIUM used DLL side-loading to covertly load PoisonIvy into memory on the victim machine. ;; A gh0st RAT variant has used DLL side-loading. ;; Goopy has the ability to side-load malicious DLLs with legitimate applications from Kaspersky Microsoft and Google. ;; Higaisa’s JavaScript file used a legitimate Microsoft Office 2007 package to side-load the OINFO12.OCX dynamic link library. ;; HTTPBrowser has used DLL side-loading. ;; HyperBro has used a legitimate application to sideload a DLL to decrypt decompress and run a payload. ;; Javali can use DLL side-loading to load malicious DLLs into legitimate executables. ;; LookBack side loads its communications module as a DLL into the libcurl.dll loader. ;; menuPass has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as UPPERCUT. ;; Metamorfo has side-loaded its malicious DLL file. ;; Mustang Panda has used a legitimately signed executable to execute a malicious payload within a DLL file. ;; Naikon has used DLL side-loading to load malicious DLL's into legitimate executables. ;; OwaAuth has been loaded onto Exchange servers and disguised as an ISAPI filter (DLL file). The IIS w3wp.exe process then loads the malicious DLL. ;; A Patchwork .dll that contains BADNEWS is loaded and executed using DLL side-loading. ;; PlugX has used DLL side-loading to evade anti-virus. ;; Sakula uses DLL side-loading typically using a digitally signed sample of Kaspersky Anti-Virus (AV) 6.0 for Windows Workstations or McAfee's Outlook Scan About Box to load malicious DLL files. ;; Sidewinder has used DLL side-loading to drop and execute malicious payloads including the hijacking of the legitimate Windows application file rekeywiz.exe. ;; During the T9000 installation process it drops a copy of the legitimate Microsoft binary igfxtray.exe. The executable contains a side-loading weakness which is used to load a portion of the malware. ;; Threat Group-3390 has used DLL side-loading including by using legitimate Kaspersky antivirus variants in which the DLL acts as a stub loader that loads and executes the shell code. ;; Tropic Trooper has been known to side-load DLLs using a valid version of a Windows Address Book and Windows Defender executable with one of their tools. ;; Waterbear has used DLL side loading to import and load a malicious DLL loader. ;; Wingbird side loads a malicious file sspisrv.dll in part of a spoofed lssas.exe service. ;; ZeroT has used DLL side-loading to load malicious payloads.,1,accept,T1574.002,Hijack Execution Flow: Dll Side APT39 has used malware to turn off the RequireSigned feature which ensures only signed DLLs can be run on Windows. ,1,accept,T1553.006,Subvert Trust Controls: Code Signing Policy Modification BlackEnergy has enabled the TESTSIGNING boot configuration option to facilitate loading of a driver component. ,1,accept,T1553.006,Subvert Trust Controls: Code Signing Policy Modification Hikit has attempted to disable driver signing verification by tampering with several Registry keys prior to the loading of a rootkit driver component. ,1,accept,T1553.006,Subvert Trust Controls: Code Signing Policy Modification Turla has modified variables in kernel memory to turn off Driver Signature Enforcement after exploiting vulnerabilities that obtained kernel mode privileges.,1,accept,T1553.006,Subvert Trust Controls: Code Signing Policy Modification ESPecter patches Windows kernel function SepInitializeCodeIntegrity directly in memory to disable Driver Signature Enforcement (DSE).,1,accept,T1553.006,Subvert Trust Controls: Code Signing Policy Modification "APT38 has prepended a space to all of their terminal commands to operate without leaving traces in the HISTCONTROL environment. ",1,accept,T1562.003,Impair Defenses: Impair Command History Logging "Attackers set SaveNothing option for PSReadLine to turn off logging PowerShell command history. ",1,accept,T1562.003,Impair Defenses: Impair Command History Logging "Threat actors set the command history size to zero (export HISTFILESIZE=0) to prevent logging of commands. ",1,accept,T1562.003,Impair Defenses: Impair Command History Logging "Prior to executing PowerShell commands, attackers meddled with PSReadLine module to disable logging. ",1,accept,T1562.003,Impair Defenses: Impair Command History Logging "After getting the initial access to the Windows Server, hackers changed PSReadLine logging destination to confuse incident responders.",1,accept,T1562.003,Impair Defenses: Impair Command History Logging APT-C-36 has disguised its scheduled tasks as those used by Google. ,1,accept,T1036.004,Masquerading: Masquerade Task Or Service APT29 named tasks \Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager in order to appear legitimate. ,1,accept,T1036.004,Masquerading: Masquerade Task Or Service " APT32 has used hidden or non-printing characters to help masquerade service names such as appending a Unicode no-break space character to a legitimate service name. APT32 has also impersonated the legitimate Flash installer file name install_flashplayer.exe"". ",1,accept,T1036.004,Masquerading: Masquerade Task Or Service Attor's dispatcher disguises itself as a legitimate task (i.e. the task name and description appear legitimate). ,1,accept,T1036.004,Masquerading: Masquerade Task Or Service Bazar can create a task named to appear benign. ,1,accept,T1036.004,Masquerading: Masquerade Task Or Service " build_downer has added itself to the Registry Run key as ""NVIDIA"" to appear legitimate. ",1,accept,T1036.004,Masquerading: Masquerade Task Or Service Carbanak has copied legitimate service names to use for malicious services. ,1,accept,T1036.004,Masquerading: Masquerade Task Or Service " Catchamas adds a new service named NetAdapter in an apparent attempt to masquerade as a legitimate service. ;; ComRAT has used a task name associated with Windows SQM Consolidator. ;; Crutch has established persistence with a scheduled task impersonating the Outlook item finder. ;; CSPY Downloader has attempted to appear as a legitimate Windows service with a fake description claiming it is used to support packed applications. ;; Egregor has masqueraded the svchost.exe process to exfiltrate data. ;; The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description “Windows Check AV” in an apparent attempt to masquerade as a legitimate service. ;; FIN6 has renamed the ""psexec"" service name to ""mstdc"" to masquerade as a legitimate Windows service. ;; FIN7 has created a scheduled task named “AdobeFlashSync” to establish persistence. ;; Fox Kitten has named the task for a reverse proxy lpupdate to appear legitimate. ;; Fysbis has masqueraded as the rsyncd and dbus-inotifier services. ;; GoldMax has impersonated systems management software to avoid detection. ;; Higaisa named a shellcode loader binary svchast.exe to spoof the legitimate svchost.exe. ;; InnaputRAT variants have attempted to appear legitimate by adding a new service named OfficeUpdateService. ;; InvisiMole has attempted to disguise itself by registering under a seemingly legitimate service name. ;; IronNetInjector has been disguised as a legitimate service using the name PythonUpdateSrvc. ;; Kimsuky has disguised services to appear as benign software or related to operating system functions. ;; Kwampirs establishes persistence by adding a new service with the display name ""WMI Performance Adapter Extension"" in an attempt to masquerade as a legitimate WMI service. ;; A Lazarus Group custom backdoor implant included a custom PE loader named ""Security Package"" that was added into the lsass.exe process via registry key. ;; Machete renamed task names to masquerade as legitimate Google Chrome Java Dropbox Adobe Reader and Python tasks. ;; Maze operators have created scheduled tasks masquerading as ""Windows Update Security"" ""Windows Update Security Patches"" and ""Google Chrome Security Update"" designed to launch the ransomware. ;; Nidiran can create a new service named msamger (Microsoft Security Accounts Manager) which mimics the legitimate Microsoft database by the same name. ;; Okrum can establish persistence by adding a new service NtmsSvc with the display name Removable Storage to masquerade as a legitimate Removable Storage Manager. ;; OSX_OCEANLOTUS.D has disguised its app bundle by adding special characters to the filename and using the icon for legitimate Word documents. ;; In one instance menuPass added PlugX as a service with a display name of ""Corel Writing Tools Utility."" ;; POWERSTATS has created a scheduled task named ""MicrosoftEdge"" to establish persistence. ;; PROMETHIUM has named services to appear legitimate. ;; New services created by RawPOS are made to appear like legitimate Windows services with names such as ""Windows Management Help Service"" ""Microsoft Support"" and ""Windows Advanced Task Manager"". ;; RDAT has used Windows Video Service as a name for malicious services. ;; RTM has named the scheduled task it creates ""Windows Update"". ;; Seasalt has masqueraded as a service called ""SaSaut"" with a display name of ""System Authorization Service"" in an apparent attempt to masquerade as a legitimate service. ;; Shamoon creates a new service named “ntssrv” that attempts to appear legitimate; the service's display name is “Microsoft Network Realtime Inspection Service” and its description is “Helps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols.” Newer versions create the ""MaintenaceSrv"" service which misspells the word ""maintenance."" ;; ShimRat can impersonate Windows services and antivirus products to avoid detection on compromised systems. ;; SLOTHFULMEDIA has named a service it establishes on victim machines as ""TaskFrame"" to hide its malicious purpose. ;; StrongPity has named services to appear legitimate. ;; To establish persistence Truvasys adds a Registry Run key with a value ""TaskMgr"" in an attempt to masquerade as the legitimate Windows Task Manager. ;; UNC2452 named tasks \Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager in order to appear legitimate. ;; Some Volgmer variants add new services with display names generated by a list of hard-coded strings such as Application Background Security and Windows presumably as a way to masquerade as a legitimate service. ;; Wizard Spider has used scheduled tasks to install TrickBot using task names to appear legitimate such as WinDotNet GoogleTask or Sysnetsf. It has also used common document file names for other malware binaries. ;; ZIRCONIUM has created a run key named Dropbox Update Setup to mask a persistence mechanism for a malicious binary.""",1,accept,T1036.004,Masquerading: Masquerade Task Or Service APT29 leveraged privileged accounts to replicate directory service data with domain controllers. ,1,accept,T1003.006,OS Credential Dumping: Dcsync Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from DCSync/NetSync. ,1,accept,T1003.006,OS Credential Dumping: Dcsync Operation Wocao has used Mimikatz's DCSync to dump credentials from the memory of the targeted system. ,1,accept,T1003.006,OS Credential Dumping: Dcsync UNC2452 leveraged privileged accounts to replicate directory service data with domain controllers.,1,accept,T1003.006,OS Credential Dumping: Dcsync "The attacker discovered domain controllers (DCs) and submitted a replication request. This prompted the primary DC to replicate the credentials of other DCs back to the compromised domain administrator, using the Directory Replication Service (DRS) remote protocol.",1,accept,T1003.006,OS Credential Dumping: Dcsync APT33 has used a variety of publicly available tools like LaZagne to gather credentials. ,1,accept,T1003.004,OS Credential Dumping: Lsa Secrets CosmicDuke collects LSA secrets. ,1,accept,T1003.004,OS Credential Dumping: Lsa Secrets CrackMapExec can dump hashed passwords from LSA secrets for the targeted system. ,1,accept,T1003.004,OS Credential Dumping: Lsa Secrets Dragonfly 2.0 dropped and executed SecretsDump to dump password hashes. ,1,accept,T1003.004,OS Credential Dumping: Lsa Secrets gsecdump can dump LSA secrets. ,1,accept,T1003.004,OS Credential Dumping: Lsa Secrets SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information. ,1,accept,T1003.004,OS Credential Dumping: Lsa Secrets Ke3chang has dumped credentials including by using gsecdump. ,1,accept,T1003.004,OS Credential Dumping: Lsa Secrets LaZagne can perform credential dumping from LSA secrets to obtain account and password information. ;; Leafminer used several tools for retrieving login and password information including LaZagne. ;; menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials. ;; Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from the LSA. ;; MuddyWater has performed credential dumping with LaZagne. ;; OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. ;; Pupy can use Lazagne for harvesting credentials. ;; Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.,1,accept,T1003.004,OS Credential Dumping: Lsa Secrets APT28 has used a brute-force/password-spray tooling that operated in two modes: in brute-force mode it typically sent over 300 authentication attempts per hour per targeted account over the course of several hours or days. ,1,accept,T1110.001,Brute Force: Password Guessing China Chopper's server component can perform brute force password guessing against authentication portals. ,1,accept,T1110.001,Brute Force: Password Guessing CrackMapExec can brute force passwords for a specified user on a single target system or across an entire network. ,1,accept,T1110.001,Brute Force: Password Guessing Emotet has been observed using a hard coded list of passwords to brute force user accounts. ,1,accept,T1110.001,Brute Force: Password Guessing Lucifer has attempted to brute force TCP ports 135 (RPC) and 1433 (MSSQL) with the default username or list of usernames and passwords. ,1,accept,T1110.001,Brute Force: Password Guessing P.A.S. Webshell can use predefined users and passwords to execute brute force attacks against SSH FTP POP3 MySQL MSSQL and PostgreSQL services. ,1,accept,T1110.001,Brute Force: Password Guessing Pony has used a small dictionary of common passwords against a collected list of local accounts. ,1,accept,T1110.001,Brute Force: Password Guessing SpeakUp can perform brute forcing using a pre-defined list of usernames and passwords in an attempt to log in to administrative panels. ;; Xbash can obtain a list of weak passwords from the C2 server to use for brute forcing as well as attempt to brute force services with open ports.,1,accept,T1110.001,Brute Force: Password Guessing Cleaver has used custom tools to facilitate ARP cache poisoning.,1,accept,T1557.002,Man "Iran’s cyber hacking skills have evolved to include customized private tools with ARP poisoning function. ",1,accept,T1557.002,Man "Alireza’s C++ tools include the following techniques: • ARP poisoning ",1,accept,T1557.002,Man "Jasus is an ARP cache poisoner developed by the Operation Cleaver team. ",1,accept,T1557.002,Man Cain & Abel is a publicly available toolkit with the ability to conduct attacks like ARP cache poisoning in order to capture credentials being transmitted on the network.,1,accept,T1557.002,Man Astaroth can check for Windows product ID's used by sandboxes and usernames and disk serial numbers associated with analyst environments. ,1,accept,T1497.001,Virtualization/Sandbox Evasion: System Checks Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts such as communication with I/O ports and using VM-specific instructions. ,1,accept,T1497.001,Virtualization/Sandbox Evasion: System Checks BadPatch attempts to detect if it is being run in a Virtual Machine (VM) using a WMI query for disk drive name BIOS and motherboard information. ,1,accept,T1497.001,Virtualization/Sandbox Evasion: System Checks CSPY Downloader can search loaded modules PEB structure file paths Registry keys and memory to determine if it is being debugged or running in a virtual environment. ,1,accept,T1497.001,Virtualization/Sandbox Evasion: System Checks Darkhotel malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names if a filename ends with .Md5.exe and if the program is executed from the root of the C:\ drive as well as checks for sandbox-related libraries. ,1,accept,T1497.001,Virtualization/Sandbox Evasion: System Checks Denis ran multiple system checks looking for processor and register characteristics to evade emulation and analysis. ,1,accept,T1497.001,Virtualization/Sandbox Evasion: System Checks Dyre can detect sandbox analysis environments by inspecting the process list and Registry. ,1,accept,T1497.001,Virtualization/Sandbox Evasion: System Checks " EvilBunny's dropper has checked the number of processes and the length and strings of its own file name to identify if the malware is in a sandbox environment. ;; Evilnum has used a component called TerraLoader to check certain hardware and file information to detect sandboxed environments. ;; FinFisher obtains the hardware device list and checks if the MD5 of the vendor ID is equal to a predefined list in order to check for sandbox/virtualized environments. ;; Frankenstein has used WMI queries to check if various security applications were running including VMWare and Virtualbox. ;; GoldMax will check if it is being run in a virtualized environment by comparing the collected MAC address to c8:27:cc:c2:37:5a. ;; Grandoreiro can detect VMWare via its I/O port and Virtual PC via the vpcext instruction. ;; GravityRAT uses WMI to check the BIOS and manufacturer information for strings like VMWare"" ""Virtual"" and ""XEN"" and another WMI request to get the current temperature of the hardware to determine if it's a virtual machine environment. ;; InvisiMole can check for artifacts of VirtualBox Virtual PC and VMware environment and terminate itself if they are detected. ;; Lucifer can check for specific usernames computer names device drivers DLL's and virtual devices associated with sandboxed environments and can enter an infinite loop and stop itself if any are detected. ;; MegaCortex has checked the number of CPUs in the system to avoid being run in a sandbox or emulator. ;; Okrum's loader can check the amount of physical memory and terminates itself if the host has less than 1.5 Gigabytes of physical memory in total. ;; OopsIE performs several anti-VM and sandbox checks on the victim's machine. One technique the group has used was to perform a WMI query SELECT * FROM MSAcpi_ThermalZoneTemperature to check the temperature to see if it’s running in a virtual environment. ;; OSX_OCEANLOTUS.D has a variant that checks a number of system parameters to see if it is being run on real hardware or in a virtual machine environment. ;; PlugX checks if VMware tools is running in the background by searching for any process named ""vmtoolsd"". ;; PoetRAT checked the size of the hard drive to determine if it was being run in a sandbox environment. In the event of sandbox detection it would delete itself by overwriting the malware scripts with the contents of ""License.txt"" and exiting. ;; Pupy has a module that checks a number of indicators on the system to determine if its running on a virtual machine. ;; Remcos searches for Sandboxie and VMware on the system. ;; RogueRobin uses WMI to check BIOS version for VBOX bochs qemu virtualbox and vm to check for evidence that the script might be executing within an analysis environment. ;; ROKRAT checks for sandboxing libraries. ;; Smoke Loader scans processes to perform anti-VM checks. ;; SUNBURST checked the domain name of the compromised host to verify it was running in a real environment. ;; SynAck checks its directory location in an attempt to avoid launching in a sandbox. ;; ThiefQuest uses a function named is_debugging to perform anti-debugging logic. The function invokes sysctl checking the returned value of P_TRACED. ThiefQuest also calls ptrace with the PTRACE_DENY_ATTACH flag to prevent debugging. ;; Trojan.Karagany can detect commonly used and generic virtualization platforms based primarily on drivers and file paths. ;; UBoatRAT checks for virtualization software such as VMWare VirtualBox or QEmu on the compromised machine. ;; yty has some basic anti-sandbox detection that tries to detect Virtual PC Sandboxie and VMware. """,1,accept,T1497.001,Virtualization/Sandbox Evasion: System Checks Ebury can deactivate PAM modules to tamper with the sshd configuration. ,1,accept,T1556.003,Modify Authentication Process: Pluggable Authentication Modules Skidmap has the ability to replace the pam_unix.so file on an infected machine with its own malicious version that accepts a specific backdoor password for all users.,1,accept,T1556.003,Modify Authentication Process: Pluggable Authentication Modules "This malware downgrades security features by deactivating pluggable authentication modules (PAM) modules. ",1,accept,T1556.003,Modify Authentication Process: Pluggable Authentication Modules "The malware replaces the system’s pam_unix.so file (the module responsible for standard Unix authentication) with its own malicious version (detected as Backdoor.Linux.PAMDOR.A). As shown in Figure 2, this malicious pam_unix.so file accepts a specific password for any users, thus allowing the attackers to log in as any user in the machine. ",1,accept,T1556.003,Modify Authentication Process: Pluggable Authentication Modules Our roadmap is pretty simple: add a custom PAM module that logs the credential in plaintext and send it to our C&C though a DNS resolution.,1,accept,T1556.003,Modify Authentication Process: Pluggable Authentication Modules Remsec harvests plain-text credentials as a password filter registered on domain controllers. ,1,accept,T1556.002,Modify Authentication Process: Password Filter Dll Strider has registered its persistence module on domain controllers as a Windows LSA (Local System Authority) password filter to acquire credentials any time a domain local user or administrator logs in or changes a password.,1,accept,T1556.002,Modify Authentication Process: Password Filter Dll "The library was masquerading as a Windows password filter, which is something administrators typically use to ensure passwords match specific requirements for length and complexity. The module started every time a network or local user logged in or changed a password, and it was able to view passcodes in plaintext. ",1,accept,T1556.002,Modify Authentication Process: Password Filter Dll "ProjectSauron usually registers its persistence module on domain controllers as a Windows LSA (Local. System Authority) password filter. ",1,accept,T1556.002,Modify Authentication Process: Password Filter Dll The library was registered as a Windows password filter and had access to sensitive data such as administrative passwords in cleartext.,1,accept,T1556.002,Modify Authentication Process: Password Filter Dll SYNful Knock has the capability to add its own custom backdoor password when it modifies the operating system of the affected network device.,1,accept,T1556.004,Modify Authentication Process: Network Device Authentication "The SYNful Knock implant consists of a modified Cisco IOS image that allows the attacker to load different functional modules provides unrestricted access using a secret backdoor password while preventing the size of the image from changing. ",1,accept,T1556.004,Modify Authentication Process: Network Device Authentication "Adversaries used Patch System Image to hard code a password in the operating system, thus bypassing of native authentication mechanisms for local accounts on network devices. ",1,accept,T1556.004,Modify Authentication Process: Network Device Authentication "Attacker modified the system image to provide attacker-controlled network devices access using a specific password. ",1,accept,T1556.004,Modify Authentication Process: Network Device Authentication "After the initial access to the router, hackers modified its operation system in a way to install a backdoor access for network device authentication.",1,accept,T1556.004,Modify Authentication Process: Network Device Authentication Chimera's malware has altered the NTLM authentication program on domain controllers to allow Chimera to login without a valid credential. ,1,accept,T1556.001,Modify Authentication Process: Domain Controller Authentication Skeleton Key is used to patch an enterprise domain controller authentication process with a backdoor password. It allows adversaries to bypass the standard authentication system to use a defined password for all accounts authenticating to that domain controller.,1,accept,T1556.001,Modify Authentication Process: Domain Controller Authentication "Skeleton Key is deployed as an in-memory patch on a victim's AD domain controllers to allow the threat actor to authenticate as any user, while legitimate users can continue to authenticate as normal. ",1,accept,T1556.001,Modify Authentication Process: Domain Controller Authentication "The malware employed a technique that altered the NTLM authentication program and implanted a skeleton key to allow adversaries to log-in without a valid credential. ",1,accept,T1556.001,Modify Authentication Process: Domain Controller Authentication "In the RC4 initialization function, a new RC4 NTLM was injected with a pre-calculated hash value of the skeleton key. When the authentication check failed due to incorrect credentials, the RC4 decryption function prompted the authentication process to compare the credentials with the skeleton key. ",1,accept,T1556.001,Modify Authentication Process: Domain Controller Authentication adbupd contains a copy of the OpenSSL library to encrypt C2 traffic. ,1,accept,T1573.002,Encrypted Channel: Asymmetric Cryptography A variant of ADVSTORESHELL encrypts some C2 with RSA. ,1,accept,T1573.002,Encrypted Channel: Asymmetric Cryptography Attor's Blowfish key is encrypted with a public RSA key. ,1,accept,T1573.002,Encrypted Channel: Asymmetric Cryptography Bazar can use TLS in C2 communications. ,1,accept,T1573.002,Encrypted Channel: Asymmetric Cryptography BISCUIT uses SSL for encrypting C2 communications. ,1,accept,T1573.002,Encrypted Channel: Asymmetric Cryptography Carbon has used RSA encryption for C2 communications. ,1,accept,T1573.002,Encrypted Channel: Asymmetric Cryptography CHOPSTICK encrypts C2 communications with TLS. ,1,accept,T1573.002,Encrypted Channel: Asymmetric Cryptography " Cobalt Group has used the Plink utility to create SSH tunnels. ;; Cobalt Strike can use RSA asymmetric encryption with PKCS1 padding to encrypt data sent to the C2 server. ;; ComRAT can use SSL/TLS encryption for its HTTP-based C2 channel. ComRAT has used public key cryptography with RSA and AES encrypted email attachments for its Gmail C2 channel. ;; Doki has used the embedTLS library for network communications. ;; Dridex has encrypted traffic with RSA. ;; Emotet is known to use RSA keys for encrypting C2 traffic. ;; Empire can use TLS to encrypt its C2 channel. ;; FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers. ;; FIN8 has used the Plink utility to tunnel RDP back to C2 infrastructure. ;; Gazer uses custom encryption for C2 that uses RSA. ;; GoldMax has RSA-encrypted its communication with the C2 server. ;; Grandoreiro can use SSL in C2 communication. ;; GreyEnergy encrypts communications using RSA-2048. ;; Hi-Zor encrypts C2 traffic with TLS. ;; IcedID has used SSL and TLS in communications with C2. ;; Koadic can use SSL and TLS for communications. ;; Machete has used TLS-encrypted FTP to exfiltrate data. ;; Metamorfo's C2 communication has been encrypted using OpenSSL. ;; OilRig used the Plink utility and other tools to create tunnels to C2 servers. ;; Operation Wocao's proxy implementation Agent"" can upgrade the socket in use to a TLS socket. ;; Pay2Key has used RSA encrypted communications with C2. ;; Penquin can encrypt communications using the BlowFish algorithm and a symmetric key exchanged with Diffie Hellman. ;; PoetRAT used TLS to encrypt command and control (C2) communications. ;; POSHSPY encrypts C2 traffic with AES and RSA. ;; POWERSTATS has encrypted C2 traffic with RSA. ;; Pupy's default encryption for its C2 communication channel is SSL but it also has transport options for RSA and AES. ;; REvil has encrypted C2 communications with the ECIES algorithm. ;; ServHelper may set up a reverse SSH tunnel to give the attacker access to services running on the victim such as RDP. ;; StrongPity has encrypted C2 traffic using SSL/TLS. ;; Sykipot uses SSL for encrypting C2 communications. ;; Tor encapsulates traffic in multiple layers of encryption using TLS by default. ;; Trojan.Karagany can secure C2 communications with SSL and TLS. ;; Tropic Trooper has used SSL to connect to C2 servers. ;; Some Volgmer variants use SSL to encrypt C2 communications. ;; WannaCry uses Tor for command and control traffic and routes a custom cryptographic protocol over the Tor circuit. ;; WellMail can use hard coded client and certificate authority certificates to communicate with C2 over mutual TLS. ;; WellMess can communicate to C2 with mutual TLS where client and server mutually check certificates. ;; XTunnel uses SSL/TLS and RC4 to encrypt traffic. ;; Zebrocy uses SSL and AES ECB for encrypting C2 communications. """,1,accept,T1573.002,Encrypted Channel: Asymmetric Cryptography "admin@338 actors used the following command to rename one of their tools to a benign file name: ren %temp%\upload"" audiodg.exe ",1,accept,T1036.005,Masquerading: Match Legitimate Name Or Location The file name AcroRD32.exe a legitimate process name for Adobe's Acrobat Reader was used by APT1 as a name for malware. ,1,accept,T1036.005,Masquerading: Match Legitimate Name Or Location APT29 renamed a version of AdFind to sqlceip.exe or csrss.exe in an attempt to appear as the SQL Server Telemetry Client or Client Service Runtime Process respectively. ,1,accept,T1036.005,Masquerading: Match Legitimate Name Or Location APT32 has renamed a NetCat binary to kb-10233.exe to masquerade as a Windows update. APT32 has also renamed a Cobalt Strike beacon payload to install_flashplayers.exe. ,1,accept,T1036.005,Masquerading: Match Legitimate Name Or Location APT39 has used malware disguised as Mozilla Firefox and a tool named mfevtpse.exe to proxy C2 communications closely mimicking a legitimate McAfee file mfevtps.exe. ,1,accept,T1036.005,Masquerading: Match Legitimate Name Or Location APT41 attempted to masquerade their files as popular anti-virus software. ,1,accept,T1036.005,Masquerading: Match Legitimate Name Or Location BackConfig has hidden malicious payloads in %USERPROFILE%\Adobe\Driver\dwg\ and mimicked the legitimate DHCP service binary. ,1,accept,T1036.005,Masquerading: Match Legitimate Name Or Location " BADNEWS attempts to hide its payloads using legitimate filenames. ;; The Bazar loader has named malicious shortcuts adobe. ;; BLINDINGCAN has attempted to hide its payload by using legitimate file names such as ""iconcache.db"". ;; Blue Mockingbird has masqueraded their XMRIG payload name by naming it wercplsupporte.dll after the legitimate wercplsupport.dll file. ;; BRONZE BUTLER has given malware the same name as an existing file on the file share server to cause users to unwittingly launch and install the malware on additional systems. ;; Bundlore has disguised a malicious .app file as a Flash Player update. ;; Calisto's installation file is an unsigned DMG image under the guise of Intego’s security solution for mac. ;; Carbanak has named malware ""svchost.exe "" which is the name of the Windows shared service host program. ;; Carberp has masqueraded as Windows system file names as well as ""chkntfs.exe"" and ""syscron.exe"". ;; ChChes copies itself to an .exe file with a filename that is likely intended to imitate Norton Antivirus but has several letters reversed (e.g. notron.exe). ;; Chimera has renamed malware to GoogleUpdate.exe and WinRAR to jucheck.exe RecordedTV.ms teredo.tmp update.exe and msadcs1.exe. ;; DarkComet has dropped itself onto victim machines with file names such as WinDefender.Exe and winupdate.exe in an apparent attempt to masquerade as a legitimate file. ;; Darkhotel has used malware that is disguised as a Secure Shell (SSH) tool. ;; Daserf uses file and folder names related to legitimate programs in order to blend in such as HP Intel Adobe and perflogs. ;; Doki has disguised a file as a Linux kernel module. ;; One of Dtrack can hide in replicas of legitimate programs like OllyDbg 7-Zip and FileZilla. ;; If installing itself as a service fails Elise instead writes itself as a file named svchost.exe saved in %APPDATA%\Microsoft\Network. ;; FatDuke has attempted to mimic a compromised user's traffic by using the same user agent as the installed browser. ;; Felismus has masqueraded as legitimate Adobe Content Management System files. ;; FinFisher renames one of its .dll files to uxtheme.dll in an apparent attempt to masquerade as a legitimate file. ;; Fox Kitten has named binaries and configuration files svhost and dllhost respectively to appear legitimate. ;; Fysbis has masqueraded as trusted software rsyncd and dbus-inotifier. ;; GoldenSpy's setup file installs initial executables under the folder %WinDir%\System32\PluginManager. ;; GoldMax appeared as a scheduled task impersonating systems management software within the corresponding ProgramData subfolder. ;; Goopy has impersonated the legitimate goopdate.dll which was dropped on the target system with a legitimate GoogleUpdate.exe. ;; Grandoreiro has named malicious browser extensions and update files to appear legitimate. ;; Hildegard has disguised itself as a known Linux process. ;; HTTPBrowser's installer contains a malicious file named navlu.dll to decrypt and run the RAT. navlu.dll is also the name of a legitimate Symantec DLL. ;; Indrik Spider used fake updates for FlashPlayer plugin and Google Chrome as initial infection vectors. ;; InnaputRAT variants have attempted to appear legitimate by using the file names SafeApp.exe and NeutralApp.exe. ;; InvisiMole has disguised its droppers as legitimate software or documents matching their original names and locations and saved its files as mpr.dll in the Windows folder. ;; Ixeshe has used registry values and file names associated with Adobe software such as AcroRd32.exe. ;; KGH_SPY has masqueraded as a legitimate Windows tool. ;; KONNI creates a shortcut called ""Anti virus service.lnk"" in an apparent attempt to masquerade as a legitimate file. ;; Lazarus Group has renamed the TAINTEDSCRIBE main executable to disguise itself as Microsoft's narrator. ;; LightNeuron has used filenames associated with Exchange and Outlook for binary and configuration files such as winmail.dat. ;; LookBack has a C2 proxy tool that masquerades as GUP.exe which is software used by Notepad++. ;; Machete's Machete MSI installer has masqueraded as a legitimate Adobe Acrobat Reader installer. ;; Machete renamed payloads to masquerade as legitimate Google Chrome Java Dropbox Adobe Reader and Python executables. ;; MCMD has been named Readme.txt to appear legitimate. ;; MechaFlounder has been downloaded as a file named lsass.exe which matches the legitimate Windows file. ;; menuPass has been seen changing malicious files to appear legitimate. ;; Metamorfo has disguised an MSI file as the Adobe Acrobat Reader Installer. ;; Mis-Type saves itself as a file named msdtc.exe which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary. ;; Misdat saves itself as a file named msdtc.exe which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary. ;; MuddyWater has disguised malicious executables and used filenames and Registry key names associated with Windows Defender. ;; Mustang Panda has used 'adobeupdate.dat' as a PlugX loader and a file named 'OneDrive.exe' to load a Cobalt Strike payload. ;; NETWIRE has masqueraded as legitimate software including TeamViewer and macOS Finder. ;; NOKKI is written to %LOCALAPPDATA%\MicroSoft Updatea\svServiceUpdate.exe prior being executed in a new process in an apparent attempt to masquerade as a legitimate folder and file. ;; OLDBAIT installs itself in %ALLUSERPROFILE%\Application Data\Microsoft\MediaPlayer\updatewindws.exe; the directory name is missing a space and the file name is missing the letter ""o."" ;; OSX/Shlayer can masquerade as a Flash Player update. ;; OwaAuth uses the filename owaauth.dll which is a legitimate file that normally resides in %ProgramFiles%\Microsoft\Exchange Server\ClientAccess\Owa\Auth\; the malicious file by the same name is saved in %ProgramFiles%\Microsoft\Exchange Server\ClientAccess\Owa\bin\. ;; Patchwork installed its payload in the startup programs folder as ""Baidu Software Update."" The group also adds its second stage payload to the startup programs as “Net Monitor."" They have also dropped QuasarRAT binaries as files named microsoft_network.exe and crome.exe. ;; Penquin has mimicked the Cron binary to hide itself on compromised systems. ;; PipeMon modules are stored on disk with seemingly benign names including use of a file extension associated with a popular word processor. ;; Pony has used the Adobe Reader icon for the downloaded file to look more trustworthy. ;; Poseidon Group tools attempt to spoof anti-virus processes as a means of self-defense. ;; PROMETHIUM has disguised malicious installer files by bundling them with legitimate software installers. ;; PUNCHBUGGY mimics filenames from %SYSTEM%\System32 to hide DLLs in %WINDIR% and/or %TEMP%. ;; Pysa has executed a malicious executable by naming it svchost.exe. ;; QUADAGENT used the PowerShell filenames Office365DCOMCheck.ps1 and SystemDiskClean.ps1. ;; Raindrop was installed under names that resembled legitimate Windows file and directory names. ;; Ramsay has masqueraded as a 7zip installer. ;; RDAT has masqueraded as VMware.exe. ;; The Remsec loader implements itself with the name Security Support Provider a legitimate Windows function. Various Remsec .exe files mimic legitimate file names used by Microsoft Symantec Kaspersky Hewlett-Packard and VMWare. Remsec also disguised malicious modules using similar filenames as custom network encryption software on victims. ;; REvil can mimic the names of known executables. ;; Rocke has used shell scripts which download mining executables and saves them with the filename ""java"". ;; Ryuk has constructed legitimate appearing installation folder paths by calling GetWindowsDirectoryW and then inserting a null byte at the fourth character of the path. For Windows Vista or higher the path would appear as C:\Users\Public. ;; S-Type may save itself as a file named msdtc.exe which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary. ;; Sandworm Team has avoided detection by naming a malicious binary explorer.exe. ;; ShimRatReporter spoofed itself as AlphaZawgyl_font.exe a specialized Unicode font. ;; Sibot has downloaded a DLL to the C:\windows\system32\drivers\ folder and renamed it with a .sys extension. ;; Sidewinder has named malicious files rekeywiz.exe to match the name of a legitimate Windows executable. ;; Silence has named its backdoor ""WINWORD.exe"". ;; Skidmap has created a fake rm binary to replace the legitimate Linux binary. ;; SLOTHFULMEDIA has mimicked the names of known executables such as mediaplayer.exe. ;; Sowbug named its tools to masquerade as Windows or Adobe Reader software such as by using the file name adobecms.exe and the directory CSIDL_APPDATA\microsoft\security. ;; To establish persistence SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an “Office Start ” “Yahoo Talk ” “MSN Gaming Z0ne ” or “MSN Talk” shortcut. ;; Starloader has masqueraded as legitimate software update packages such as Adobe Acrobat Reader and Intel. ;; StrongPity has been bundled with legitimate software installation files for disguise. ;; SUNBURST created VBScripts that were named after existing services or folders to blend into legitimate activities. ;; SUNSPOT was identified on disk with a filename of taskhostsvc.exe and it created an encrypted log file at C:\Windows\Temp\vmware-vmdmp.log. ;; SUPERNOVA has masqueraded as a legitimate SolarWinds DLL. ;; The TAINTEDSCRIBE main executable has disguised itself as Microsoft’s Narrator. ;; TEARDROP files had names that resembled legitimate Window file and directory names. ;; TEMP.Veles has renamed files to look like legitimate files such as Windows update files or Schneider Electric application files. ;; ThiefQuest prepends a copy of itself to the beginning of an executable file while maintaining the name of the executable. ;; Tropic Trooper has hidden payloads in Flash directories and fake installer files. ;; UNC2452 renamed a version of AdFind to sqlceip.exe or csrss.exe in an attempt to appear as the SQL Server Telemetry Client or Client Service Runtime Process respectively. ;; Ursnif has used strings from legitimate system files and existing folders for its file folder and Registry entry names. ;; USBStealer mimics a legitimate Russian program called USB Disk Security. ;; Whitefly has named the malicious DLL the same name as DLLs belonging to legitimate software from various security vendors. ;; A Winnti for Windows implant file was named ASPNET_FILTER.DLL mimicking the legitimate ASP.NET ISAPI filter DLL with the same name. ;; ZLib mimics the resource version information of legitimate Realtek Semiconductor Nvidia or Synaptics modules.""",1,accept,T1036.005,Masquerading: Match Legitimate Name Or Location Agent Tesla has the capability to kill any running analysis processes and AV software. ,1,accept,T1562.001,Impair Defenses: Disable Or Modify Tools APT29 used the service control manager on a remote system to disable services associated with security monitoring products. ,1,accept,T1562.001,Impair Defenses: Disable Or Modify Tools Bazar has manually loaded ntdll from disk in order to identity and remove API hooks set by security products. ,1,accept,T1562.001,Impair Defenses: Disable Or Modify Tools Brave Prince terminates antimalware processes. ,1,accept,T1562.001,Impair Defenses: Disable Or Modify Tools BRONZE BUTLER has incorporated code into several tools that attempts to terminate anti-virus processes. ,1,accept,T1562.001,Impair Defenses: Disable Or Modify Tools Bundlore can change macOS security settings and browser preferences to enable follow-on behaviors. ,1,accept,T1562.001,Impair Defenses: Disable Or Modify Tools Carberp has attempted to disable security software by creating a suspended process for the security software and injecting code to delete antivirus core files when the process is resumed. ,1,accept,T1562.001,Impair Defenses: Disable Or Modify Tools " ChChes can alter the victim's proxy configuration. ;; Cobalt Strike has the ability to use Smart Applet attacks to disable the Java SecurityManager sandbox. ;; DarkComet can disable Security Center functions like anti-virus. ;; Ebury can disable SELinux Role-Based Access Control and deactivate PAM modules. ;; Egregor has disabled Windows Defender to evade protections. ;; FIN6 has deployed a utility script named kill.bat to disable anti-virus. ;; Gamaredon Group has delivered macros which can tamper with Microsoft Office security settings. ;; Gold Dragon terminates anti-malware processes if they’re found running on the system. ;; Goopy has the ability to disable Microsoft Outlook's security policies to disable macro warnings. ;; Gorgon Group malware can attempt to disable security features in Microsoft Office and Windows Defender using the taskkill command. ;; Grandoreiro can hook APIs kill processes break file system paths and change ACLs to prevent security tools from running. ;; H1N1 kills and disables services for Windows Security Center and Windows Defender. ;; HDoor kills anti-virus found on the victim. ;; Hildegard has modified DNS resolvers to evade DNS monitoring tools. ;; Imminent Monitor has a feature to disable Windows Task Manager. ;; JPIN can lower security settings by changing Registry keys. ;; Kimsuky has been observed turning off Windows Security Center. ;; Lazarus Group malware TangoDelta attempts to terminate various processes associated with McAfee. Additionally Lazarus Group malware SHARPKNOT disables the Microsoft Windows System Event Notification and Alerter services.. During a 2019 intrusion Lazarus Group disabled Windows Defender and Credential Guard as some of their first actions on host. ;; LockerGoga installation has been immediately preceded by a task kill"" command in order to disable anti-virus. ;; Maze has disabled dynamic analysis and other security tools including IDA debugger x32dbg and OllyDbg. It has also disabled Windows Defender's Real-Time Monitoring feature and attempted to disable endpoint protection services. ;; MegaCortex was used to kill endpoint security processes. ;; Metamorfo has a function to kill processes associated with defenses and can prevent certain processes from launching. ;; MuddyWater can disable the system's local proxy settings. ;; NanHaiShu can change Internet Explorer settings to reduce warnings about malware activity. ;; NanoCore can modify the victim's anti-virus. ;; Netwalker can detect and terminate active security software-related processes on infected systems. ;; Night Dragon has disabled anti-virus and anti-spyware tools in some instances on the victim’s machines. The actors have also disabled proxy settings to allow direct communication from victims to the Internet. ;; POWERSTATS can disable Microsoft Office Protected View by changing Registry keys. ;; Proton kills security tools like Wireshark that are running. ;; Malware used by Putter Panda attempts to terminate processes corresponding to two components of Sophos Anti-Virus (SAVAdminService.exe and SavService.exe). ;; Pysa has the capability to stop antivirus services and disable Windows Defender. ;; Ragnar Locker has attempted to terminate/stop processes and services associated with endpoint security products. ;; REvil can connect to and disable the Symantec server on the victim's network. ;; RobbinHood will search for Windows services that are associated with antivirus software on the system and kill the process. ;; Rocke used scripts which detected and uninstalled antivirus software. ;; RunningRAT kills antimalware running process. ;; Ryuk has stopped services related to anti-virus. ;; Skidmap has the ability to set SELinux to permissive mode. ;; SslMM identifies and kills anti-malware processes. ;; StrongPity can add directories used by the malware to the Windows Defender exclusions list to prevent detection. ;; SUNBURST attempted to disable software security services following checks against a FNV-1a + XOR hashed hardcoded blocklist. ;; ThiefQuest uses the function kill_unwanted to obtain a list of running processes and kills each process matching a list of security related processes. ;; TinyZBot can disable Avira anti-virus. ;; TrickBot can disable Windows Defender. ;; Turla has used a AMSI bypass which patches the in-memory amsi.dll in PowerShell scripts to bypass Windows antimalware products. ;; UNC2452 used the service control manager on a remote system to disable services associated with security monitoring products. ;; Unknown Logger has functionality to disable security tools including Kaspersky BitDefender and MalwareBytes. ;; Wizard Spider has shut down or uninstalled security applications on victim systems that might prevent ransomware from executing. ;; ZxShell can kill AV products' processes. """,1,accept,T1562.001,Impair Defenses: Disable Or Modify Tools Kimsuky has used Twitter to monitor potential victims and to prepare targeted phishing e-mails. ,1,accept,T1593.001,Search Open Websites/Domains: Social Media ,1,accept,T1593.001,Search Open Websites/Domains: Social Media "Hackers use social media observe activities by interns or new employees from targeted organizations and find relevant information using hashtags such as #NewJob, #Firstday, #internship, #FirstDayatWork, etc. ",1,accept,T1593.001,Search Open Websites/Domains: Social Media "Attackers analyzed company employees’ social media images to try to find information like internal office layouts, desktop applications, digital files, badge pictures, Outlook calendars in the background of a quintessential coffee cup post, passwords openly written over whiteboards and desks, etc. ",1,accept,T1593.001,Search Open Websites/Domains: Social Media "A short video shared by an employee about a day in the office may provide the attackers with check-in procedures, building layout, parking structure, weak door controls, credentials, employees' dress code/ trappings, premise security arrangements, operating systems, antivirus choice, phone numbers, and much more. ",1,accept,T1593.001,Search Open Websites/Domains: Social Media This group was identifying employees social media accounts and researching interpersonal connection to abuse it in the following spear phishing attacks.,1,accept,T1593.001,Search Open Websites/Domains: Social Media "APT 31 used its own anonymization network to collect information on the victim’s website via search engine queries. ",1,accept,T1593.002,Search Open Websites/Domains: Search Engines "File “CobaltStrike MANUAL_V2 .docx” encourage affiliates to search for the right victims based on income found using google dorks. ",1,accept,T1593.002,Search Open Websites/Domains: Search Engines "The following Google Dork was used to detect vulnerable or hacked servers. ",1,accept,T1593.002,Search Open Websites/Domains: Search Engines "Attackers were able to collect plaintext passwords from a specially crafted Google query looking for publicly exposed .env files. ",1,accept,T1593.002,Search Open Websites/Domains: Search Engines "This group used search engine queries to inspect victim organization website for logfiles, spreadsheets, and other documents potentially exposing sensitive information.",1,accept,T1593.002,Search Open Websites/Domains: Search Engines Kaseya has used a single IP address in a range to find the total size of the range. ,1,accept,T1596.002,Search Open Technical Databases: Whois Domain names can be used to find ownership and contact information. ,1,accept,T1596.002,Search Open Technical Databases: Whois WHOIS can be queried for assigned IP block and DNS name. ,1,accept,T1596.002,Search Open Technical Databases: Whois " Kaseya has used active scanning for reconnaissance on networks, open ports, and services.. ",1,accept,T1596.002,Search Open Technical Databases: Whois Kaseya has used Shodan to establish operational resources that can be exploited. ,1,accept,T1596.002,Search Open Technical Databases: Whois "Adversaries can search public databases for active IP addresses, hostnames, open ports, certificates, and even server banners. ",1,accept,T1596.005,Search Open Technical Databases: Scan Databases Threat actors can use online resources and lookup tools to harvest information from these services. ,1,accept,T1596.005,Search Open Technical Databases: Scan Databases REvil has performed recon against victims by scanning for vulnerable services and open ports. ,1,accept,T1596.005,Search Open Technical Databases: Scan Databases Attackers can use passive and active methods to obtain active port services. ,1,accept,T1596.005,Search Open Technical Databases: Scan Databases Threat actors can use shodan to search for internet-facing hosts and IP addresses. ,1,accept,T1596.005,Search Open Technical Databases: Scan Databases Threat actors search DNS records to gather information about target hosts. ,1,accept,T1596.001,Search Open Technical Databases: Dns/Passive Dns Adversaries can use DNS to discover subdomains. ,1,accept,T1596.001,Search Open Technical Databases: Dns/Passive Dns Threat actors can use DNS misconfigurations for initial access. ,1,accept,T1596.001,Search Open Technical Databases: Dns/Passive Dns Threat actors can search central repositories of logged responses for information. ,1,accept,T1596.001,Search Open Technical Databases: Dns/Passive Dns DNS leaks can provide information about a domain to attackers. ,1,accept,T1596.001,Search Open Technical Databases: Dns/Passive Dns Adversaries use the DNS information of mail servers as a pivot to attack. ,1,accept,T1596.001,Search Open Technical Databases: Dns/Passive Dns Threat actors use site certificates to gain intel about a target. ,1,accept,T1596.003,Search Open Technical Databases: Digital Certificates Threat Actors often perform reconnaissance through data searching via digital certificates. ,1,accept,T1596.003,Search Open Technical Databases: Digital Certificates Threat actors check digital certificates for geolocation information to ascertain if a potential target is outwith their protected regions. ,1,accept,T1596.003,Search Open Technical Databases: Digital Certificates Certain CobaltStrike functionality allows the malware to check openly available digital security data to assist in reconnaissance. ,1,accept,T1596.003,Search Open Technical Databases: Digital Certificates APT27 often checks digital certificates to consolidate and contribute to their information before launching an attack. ,1,accept,T1596.003,Search Open Technical Databases: Digital Certificates Adversaries use content delivery networks to discover centralized assets. ,1,accept,T1596.004,Search Open Technical Databases: Cdns Threat actors can find leaked CDN content that may not have protections of other assets and can be exploited. ,1,accept,T1596.004,Search Open Technical Databases: Cdns CDNs may incorrectly expose login portals on the internet. ,1,accept,T1596.004,Search Open Technical Databases: Cdns Threat actors can use OSINT tools to scan open CDN repositories. ,1,accept,T1596.004,Search Open Technical Databases: Cdns Attackers can use found assets to determine links to CDNs. ,1,accept,T1596.004,Search Open Technical Databases: Cdns Threat actors can use threat intel feeds for valuable information. ,1,accept,T1597.001,Search Closed Sources: Threat Intel Vendors Threat actors can use paid platforms to monitor what intelligence is being provided to potential targets. ,1,accept,T1597.001,Search Closed Sources: Threat Intel Vendors Adversaries can monitor what IOCs are being discovered about their campaign to change tactics. ,1,accept,T1597.001,Search Closed Sources: Threat Intel Vendors Threat actors can determine what other groups are targeting through intel platforms. ,1,accept,T1597.001,Search Closed Sources: Threat Intel Vendors Threat actors can use intelligence feeds to target new victims. ,1,accept,T1597.001,Search Closed Sources: Threat Intel Vendors Adversaries may purchase technical information about victims that can be used during targeting. ,1,accept,T1597.002,Search Closed Sources: Purchase Technical Data Threat actors may purchase information from dark web or black markets. ,1,accept,T1597.002,Search Closed Sources: Purchase Technical Data Reputable private resources have scan database subscriptions. ,1,accept,T1597.002,Search Closed Sources: Purchase Technical Data Attackers can use known or unknown repositories of data from tor sites. ,1,accept,T1597.002,Search Closed Sources: Purchase Technical Data Threat actors can gain network and login information purchased from other attacker groups. ,1,accept,T1597.002,Search Closed Sources: Purchase Technical Data Attackers will use spearphishing messages to elicit sensative information from targets. ,1,accept,T1598.001,Phishing for Information: Spearphishing Service Spearphishing uses social engineering techniques to get credentials or other information. ,1,accept,T1598.001,Phishing for Information: Spearphishing Service " Emails or social media messaging spearphishing is generally aimed at IT departments, C-suite executives, or non-tech related departments. ",1,accept,T1598.001,Phishing for Information: Spearphishing Service Threat actors use spearphishing against non-enterprise controlled services as they have less protections. ,1,accept,T1598.001,Phishing for Information: Spearphishing Service Adversaries may pose as recruiters to garner interest and communication. ,1,accept,T1598.001,Phishing for Information: Spearphishing Service APT32 has used malicious links to direct users to web pages designed to harvest credentials. ,1,accept,T1598.003,Phishing for Information: Spearphishing Link Kimsuky has used links in e-mail to steal account information. ,1,accept,T1598.003,Phishing for Information: Spearphishing Link Sandworm Team has crafted spearphishing emails with hyperlinks designed to trick unwitting recipients into revealing their account credentials. ,1,accept,T1598.003,Phishing for Information: Spearphishing Link Sidewinder has sent e-mails with malicious links to credential harvesting websites. ,1,accept,T1598.003,Phishing for Information: Spearphishing Link Silent Librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page.,1,accept,T1598.003,Phishing for Information: Spearphishing Link MegaCortex has used code signing certificates issued to fake companies to bypass security controls. ,1,accept,T1588.003,Obtain Capabilities: Code Signing Certificates Wizard Spider obtained a code signing certificate signed by Digicert for some of its malware.,1,accept,T1588.003,Obtain Capabilities: Code Signing Certificates Adversaries may buy code signing certificates to use during targeting. ,1,accept,T1588.003,Obtain Capabilities: Code Signing Certificates Certificates for fake companies provide legitimacy to run arbitrary code on targeted systems. ,1,accept,T1588.003,Obtain Capabilities: Code Signing Certificates Adversaries may also steal code signing materials directly from a compromised third-party. ,1,accept,T1588.003,Obtain Capabilities: Code Signing Certificates APT32 has set up Facebook pages in tandem with fake websites. ,1,accept,T1585.001,Establish Accounts: Social Media Accounts Cleaver has created fake LinkedIn profiles that included profile photos details and connections. ,1,accept,T1585.001,Establish Accounts: Social Media Accounts Fox Kitten has used a Twitter account to communicate with ransomware victims. ,1,accept,T1585.001,Establish Accounts: Social Media Accounts Sandworm Team has established social media accounts to disseminate victim internal-only documents and other sensitive data.,1,accept,T1585.001,Establish Accounts: Social Media Accounts Leviathan has created new social media accounts for targeting efforts. ,1,accept,T1585.001,Establish Accounts: Social Media Accounts APT1 has created email accounts for later use in social engineering phishing and when registering domains. ,1,accept,T1585.002,Establish Accounts: Email Accounts Magic Hound has established email accounts using fake personas for spear-phishing operations. ,1,accept,T1585.002,Establish Accounts: Email Accounts Sandworm Team has created email accounts that mimic legitimate organizations for its spearphishing operations. ,1,accept,T1585.002,Establish Accounts: Email Accounts Silent Librarian has established e-mail accounts to receive e-mails forwarded from compromised accounts.,1,accept,T1585.002,Establish Accounts: Email Accounts Leviathan has created new email accounts for targeting efforts. ,1,accept,T1585.002,Establish Accounts: Email Accounts APT29 developed SUNSPOT SUNBURST TEARDROP and Raindrop; SUNSPOT and SUNBURST were tailored to be incorporated into SolarWind's Orion software library. ,1,accept,T1587.001,Develop Capabilities: Malware Cleaver has created customized tools and payloads for functions including ARP poisoning encryption credential dumping ASP.NET shells web backdoors process enumeration WMI querying HTTP and SMB communications network interface sniffing and keystroke logging. ,1,accept,T1587.001,Develop Capabilities: Malware FIN7 has developed malware for use in operations including the creation of infected removable media. ,1,accept,T1587.001,Develop Capabilities: Malware Lazarus Group has developed several custom malware for use in operations. ,1,accept,T1587.001,Develop Capabilities: Malware Night Dragon used privately developed and customized remote access tools. ,1,accept,T1587.001,Develop Capabilities: Malware Sandworm Team has developed malware for its operations including malicious mobile applications and destructive malware such as NotPetya and Olympic Destroyer. ,1,accept,T1587.001,Develop Capabilities: Malware Turla has developed its own unique malware for use in operations. ,1,accept,T1587.001,Develop Capabilities: Malware UNC2452 developed SUNSPOT SUNBURST TEARDROP and Raindrop; SUNSPOT and SUNBURST were tailored to be incorporated into SolarWind's Orion software library.,1,accept,T1587.001,Develop Capabilities: Malware Phosphorous has been deploying ransomware using a Log4J exploit. ,1,accept,T1587.004,Develop Capabilities: Exploits Wizard Spider developed an exploit targeting CVE-2021-40444. ,1,accept,T1587.004,Develop Capabilities: Exploits Adversaries may develop exploits that can be used during targeting. ,1,accept,T1587.004,Develop Capabilities: Exploits DEV-0322 created exploits for ZOHO ManageEngine ADSelfService Plus software. ,1,accept,T1587.004,Develop Capabilities: Exploits " TG1021 uses a custom-made malware framework, built around a common core, tailor-made for IIS servers. ",1,accept,T1587.004,Develop Capabilities: Exploits Patchwork has created self-signed certificates from fictitious and spoofed legitimate software companies that were later used to sign malware. ,1,accept,T1587.002,Develop Capabilities: Code Signing Certificates PROMETHIUM has created self-signed certificates to sign malicious installers.,1,accept,T1587.002,Develop Capabilities: Code Signing Certificates Adversaries may create self-signed code signing certificates that can be used during targeting. ,1,accept,T1587.002,Develop Capabilities: Code Signing Certificates " Users are more likely to run signed code certificates, which can be attached to malware. ",1,accept,T1587.002,Develop Capabilities: Code Signing Certificates Malware actors can spoof legitimate certificates. ,1,accept,T1587.002,Develop Capabilities: Code Signing Certificates Turla has frequently used compromised WordPress sites for C2 infrastructure.,1,accept,T1584.006,Compromise Infrastructure: Web Services Adversaries may compromise access to third-party web services that can be used during targeting. ,1,accept,T1584.006,Compromise Infrastructure: Web Services " Adversaries may try to take ownership of a legitimate user's access to a web service and use that web service as infrastructure in support of cyber operations. ",1,accept,T1584.006,Compromise Infrastructure: Web Services " Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. ",1,accept,T1584.006,Compromise Infrastructure: Web Services " NotPetya, it is suspected that attackers compromised a vulnerable server used to distribute the software and replaced the legitimate code with their compromised version. ",1,accept,T1584.006,Compromise Infrastructure: Web Services Turla has used the VPS infrastructure of compromised Iranian threat actors.,1,accept,T1584.003,Compromise Infrastructure: Virtual Private Server "By compromising a VPS to use as infrastructure, adversaries can make it difficult to physically tie back operations to themselves. ",1,accept,T1584.003,Compromise Infrastructure: Virtual Private Server NOBELLIUM compromised a Microsoft Azure AD account within a Cloud Service Provider’s (CSP) tenant.,1,accept,T1584.003,Compromise Infrastructure: Virtual Private Server UNC2452 provisioned a system within Microsoft Azure that was within close proximity to a legitimate Azure-hosted system belonging to the CSP that they used to access their customer’s environment. ,1,accept,T1584.003,Compromise Infrastructure: Virtual Private Server A threat actor performed initial reconnaissance via a VPS provider located in the same region as the victim. ,1,accept,T1584.003,Compromise Infrastructure: Virtual Private Server APT16 has compromised otherwise legitimate sites as staging servers for second-stage payloads. ,1,accept,T1584.004,Compromise Infrastructure: Server Indrik Spider has served fake updates via legitimate websites that have been compromised. ,1,accept,T1584.004,Compromise Infrastructure: Server Turla has used compromised servers as infrastructure.,1,accept,T1584.004,Compromise Infrastructure: Server Malicious emails sent to targets contain links to a compromised server that redirects to the download of Janeleiro. ,1,accept,T1584.004,Compromise Infrastructure: Server Candiru operators compromised several high-profile websites.,1,accept,T1584.004,Compromise Infrastructure: Server APT1 hijacked FQDNs associated with legitimate websites hosted by hop points. ,1,accept,T1584.001,Compromise Infrastructure: Domains APT29 has compromised domains to use for C2. ,1,accept,T1584.001,Compromise Infrastructure: Domains UNC2452 has compromised domains to use for C2. ,1,accept,T1584.001,Compromise Infrastructure: Domains Magic Hound has used compromised domains to host links targeted to specific phishing victims. ,1,accept,T1584.001,Compromise Infrastructure: Domains Transparent Tribe has compromised domains for use in targeted malicious campaigns. ,1,accept,T1584.001,Compromise Infrastructure: Domains "Adversaries may utilize DNS traffic for various tasks, including for Command and Control. ",1,accept,T1584.002,Compromise Infrastructure: Dns Server Adversaries may compromise third-party DNS servers that can be used during targeting. ,1,accept,T1584.002,Compromise Infrastructure: Dns Server Threat actors can alter DNS records. ,1,accept,T1584.002,Compromise Infrastructure: Dns Server " DNS control can allow for redirection of an organization's traffic, facilitating Collection and Credential Access efforts for the adversary. ",1,accept,T1584.002,Compromise Infrastructure: Dns Server Adversaries may also be able to silently create subdomains pointed at malicious servers without tipping off the actual owner of the DNS server. ,1,accept,T1584.002,Compromise Infrastructure: Dns Server Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. ,1,accept,T1584.005,Compromise Infrastructure: Botnet " Attackers may conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers. ",1,accept,T1584.005,Compromise Infrastructure: Botnet FreakOut attacked POS systems in order to use them as a botnet infrastructure. ,1,accept,T1584.005,Compromise Infrastructure: Botnet Mirai malware created a botnet used by multiple threat actor groups. ,1,accept,T1584.005,Compromise Infrastructure: Botnet Meris attacked Yandex with DDOS using botnets. ,1,accept,T1584.005,Compromise Infrastructure: Botnet Leviathan has compromised social media accounts to conduct social engineering attacks. ,1,accept,T1586.001,Compromise Accounts: Social Media Accounts Adversaries may compromise social media accounts that can be used during targeting. ,1,accept,T1586.001,Compromise Accounts: Social Media Accounts " Utilizing an existing persona may engender a level of trust in a potential victim if they have a relationship, or knowledge of, the compromised persona. ",1,accept,T1586.001,Compromise Accounts: Social Media Accounts " Attackers can gather credentials via Phishing for Information, purchasing credentials from third-party sites, or by brute forcing credentials. ",1,accept,T1586.001,Compromise Accounts: Social Media Accounts Attacker personas may exist on a single site or across multiple sites. ,1,accept,T1586.001,Compromise Accounts: Social Media Accounts Kimsuky has compromised web portal email accounts to send spearphishing e-mails. ,1,accept,T1586.002,Compromise Accounts: Email Accounts Magic Hound has compromised personal email accounts through the use of legitimate credentials and gathered additional victim information.,1,accept,T1586.002,Compromise Accounts: Email Accounts IndigoZebra has compromised legitimate email accounts to use in their spearphishing operations. ,1,accept,T1586.002,Compromise Accounts: Email Accounts Leviathan has compromised email accounts to conduct social engineering attacks. ,1,accept,T1586.002,Compromise Accounts: Email Accounts Emotet compromised email systems to spread the trojan. ,1,accept,T1586.002,Compromise Accounts: Email Accounts APT17 has created profile pages in Microsoft TechNet that were used as C2 infrastructure. ,1,accept,T1583.006,Acquire Infrastructure: Web Services APT29 has registered algorithmically generated Twitter handles that are used for C2 by malware such as HAMMERTOSS. ,1,accept,T1583.006,Acquire Infrastructure: Web Services APT32 has set up Dropbox Amazon S3 and Google Drive to host malicious downloads. ,1,accept,T1583.006,Acquire Infrastructure: Web Services HAFNIUM has acquired web services for use in C2 and exfiltration. ,1,accept,T1583.006,Acquire Infrastructure: Web Services Lazarus Group has hosted malicious downloads on Github. ,1,accept,T1583.006,Acquire Infrastructure: Web Services MuddyWater has used file sharing services including OneHub to distribute tools. ,1,accept,T1583.006,Acquire Infrastructure: Web Services Turla has created web accounts including Dropbox and GitHub for C2 and document exfiltration. ,1,accept,T1583.006,Acquire Infrastructure: Web Services ZIRCONIUM has used GitHub to host malware linked in spearphishing e-mails.,1,accept,T1583.006,Acquire Infrastructure: Web Services HAFNIUM has operated from leased virtual private servers (VPS) in the United States. ,1,accept,T1583.003,Acquire Infrastructure: Virtual Private Server TEMP.Veles has used Virtual Private Server (VPS) infrastructure.,1,accept,T1583.003,Acquire Infrastructure: Virtual Private Server Adversaries may rent Virtual Private Servers (VPSs) that can be used during targeting. ,1,accept,T1583.003,Acquire Infrastructure: Virtual Private Server Attackers can make it difficult to physically tie back operations to them using a VPS. ,1,accept,T1583.003,Acquire Infrastructure: Virtual Private Server Adversaries may also acquire infrastructure from VPS service providers that are known for renting VPSs with minimal registration information. ,1,accept,T1583.003,Acquire Infrastructure: Virtual Private Server GALLIUM has used Taiwan-based servers that appear to be exclusive to GALLIUM. ,1,accept,T1583.004,Acquire Infrastructure: Server Sandworm Team has leased servers from resellers instead of leasing infrastructure directly from hosting companies to enable its operations.,1,accept,T1583.004,Acquire Infrastructure: Server "Adversaries may buy, lease, or rent physical servers that can be used during targeting. ",1,accept,T1583.004,Acquire Infrastructure: Server FamousSparrow rented servers at Shanghai Ruisu Network Technology and DAOU TECHNOLOGY. ,1,accept,T1583.004,Acquire Infrastructure: Server SparklingGoblin uses servers hosted by various providers for its C&C servers. ,1,accept,T1583.004,Acquire Infrastructure: Server APT1 has registered hundreds of domains for use in operations. ,1,accept,T1583.001,Acquire Infrastructure: Domains APT28 registered domains imitating NATO OSCE security websites Caucasus information resources and other organizations. ,1,accept,T1583.001,Acquire Infrastructure: Domains APT29 has acquired C2 domains through resellers. ,1,accept,T1583.001,Acquire Infrastructure: Domains APT32 has set up and operated websites to gather information and deliver malware. ,1,accept,T1583.001,Acquire Infrastructure: Domains Kimsuky has registered domains to spoof targeted organizations and trusted third parties. ,1,accept,T1583.001,Acquire Infrastructure: Domains Lazarus Group has acquired infrastructure related to their campaigns to act as distribution points and C2 channels. ,1,accept,T1583.001,Acquire Infrastructure: Domains menuPass has registered malicious domains for use in intrusion campaigns. ,1,accept,T1583.001,Acquire Infrastructure: Domains Mustang Panda have acquired C2 domains prior to operations. ;; Sandworm Team has registered domain names and created URLs that are often designed to mimic or spoof legitimate websites such as email login pages online file sharing and storage websites and password reset pages. ;; Silent Librarian has acquired domains to establish credential harvesting pages often spoofing the target organization and using free top level domains .TK .ML .GA .CF and .GQ. ;; UNC2452 has acquired C2 domains through resellers. ;; ZIRCONIUM has purchased domains for use in targeted campaigns.,1,accept,T1583.001,Acquire Infrastructure: Domains Attackers may opt to configure and run their own DNS servers in support of operations. ,1,accept,T1583.002,Acquire Infrastructure: Dns Server " Adversaries may utilize DNS traffic for various tasks, including for Command and Control. ",1,accept,T1583.002,Acquire Infrastructure: Dns Server APT31 will utilize their own DNS server for use when conducting malicious activities. ,1,accept,T1583.002,Acquire Infrastructure: Dns Server " Moses Staff will acquire their own infrastructure, usually domains and DNS. ",1,accept,T1583.002,Acquire Infrastructure: Dns Server TigerRAT variants can be modified to utilize a threat actor's own DNS infrastructure. ,1,accept,T1583.002,Acquire Infrastructure: Dns Server Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. ,1,accept,T1583.005,Acquire Infrastructure: Botnet " Attackers may conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers. ",1,accept,T1583.005,Acquire Infrastructure: Botnet FreakOut attacked POS systems in order to use them as a botnet infrastructure. ,1,accept,T1583.005,Acquire Infrastructure: Botnet Mirai malware created a botnet used by multiple threat actor groups. ,1,accept,T1583.005,Acquire Infrastructure: Botnet Meris attacked Yandex with DDOS using botnets. ,1,accept,T1583.005,Acquire Infrastructure: Botnet APT29 has created self-signed digital certificates to enable mutual TLS authentication for malware. ,1,accept,T1587.003,Develop Capabilities: Digital Certificates PROMETHIUM has created self-signed digital certificates for use in HTTPS C2 traffic.,1,accept,T1587.003,Develop Capabilities: Digital Certificates "Adversaries may create self-signed SSL/TLS certificates that can be used to further their operations, such as encrypting C2 traffic. ",1,accept,T1587.003,Develop Capabilities: Digital Certificates UNC2190 created self-signed certificates to spread SABBATH ransomware. ,1,accept,T1587.003,Develop Capabilities: Digital Certificates FIN13 used SSL certificates for C2 communication via email. ,1,accept,T1587.003,Develop Capabilities: Digital Certificates Lazarus Group has obtained SSL certificates for their C2 domains. ,1,accept,T1588.004,Obtain Capabilities: Digital Certificates Silent Librarian has obtained free Let's Encrypt SSL certificates for use on their phishing pages.,1,accept,T1588.004,Obtain Capabilities: Digital Certificates Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting. ,1,accept,T1588.004,Obtain Capabilities: Digital Certificates " Certificate authorities exist that allow adversaries to acquire SSL/TLS certificates, such as domain validation certificates, for free. ",1,accept,T1588.004,Obtain Capabilities: Digital Certificates Adversaries may register or hijack domains that they will later purchase an SSL/TLS certificate for.. ,1,accept,T1588.004,Obtain Capabilities: Digital Certificates Fox Kitten has used scripts to access credential information from the KeePass database. ,1,accept,T1555.005,Credentials from Password Stores: Password Managers Operation Wocao has accessed and collected credentials from password managers. ,1,accept,T1555.005,Credentials from Password Stores: Password Managers Proton gathers credentials in files for 1password. ,1,accept,T1555.005,Credentials from Password Stores: Password Managers TrickBot can steal passwords from the KeePass open source password manager.,1,accept,T1555.005,Credentials from Password Stores: Password Managers MarkiRAT can gather information from the Keepass password manager. ,1,accept,T1555.005,Credentials from Password Stores: Password Managers APT28 has used several malicious applications that abused OAuth access tokens to gain access to target email accounts including Gmail and Yahoo Mail.,1,accept,T1550.001,Use Alternate Authentication Material: Application Access Token "Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls. ",1,accept,T1550.001,Use Alternate Authentication Material: Application Access Token With an OAuth access token an adversary can use the user-granted REST API to perform functions such as email searching and contact enumeration. ,1,accept,T1550.001,Use Alternate Authentication Material: Application Access Token " Obtaining a token which grants access to a victim’s primary email, the adversary may be able to extend access to all other services which the target subscribes by triggering forgotten password routines.",1,accept,T1550.001,Use Alternate Authentication Material: Application Access Token OAuth is one commonly implemented framework that issues tokens to users for access to Software-as-a-Service. ,1,accept,T1550.001,Use Alternate Authentication Material: Application Access Token 4H RAT has the capability to create a remote shell. ,1,accept,T1059.003,Command and Scripting Interpreter: Windows Command Shell ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host. ,1,accept,T1059.003,Command and Scripting Interpreter: Windows Command Shell adbupd can run a copy of cmd.exe. ,1,accept,T1059.003,Command and Scripting Interpreter: Windows Command Shell Following exploitation with LOWBALL malware admin@338 actors created a file containing a list of commands to be executed on the compromised computer. ,1,accept,T1059.003,Command and Scripting Interpreter: Windows Command Shell ADVSTORESHELL can create a remote shell and run a given command. ,1,accept,T1059.003,Command and Scripting Interpreter: Windows Command Shell Anchor has used cmd.exe to run its self deletion routine. ,1,accept,T1059.003,Command and Scripting Interpreter: Windows Command Shell APT1 has used the Windows command shell to execute commands and batch scripting to automate execution. ,1,accept,T1059.003,Command and Scripting Interpreter: Windows Command Shell " APT18 uses cmd.exe to execute commands on the victim’s machine. ;; An APT28 loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads. ;; APT29 used cmd.exe to execute commands on remote machines. ;; An APT3 downloader uses the Windows command cmd.exe"" /C whoami. The group also uses a tool to execute commands on remote computers. ;; APT32 has used cmd.exe for execution. ;; APT37 has used the command-line interface. ;; APT38 has used a command-line tunneler NACHOCHEESE to give them shell access to a victim’s machine. ;; APT41 used cmd.exe /c to execute commands on remote machines.APT41 used a batch file to install persistence for the Cobalt Strike BEACON loader. ;; Astaroth spawns a CMD process to execute commands. ;; AuditCred can open a reverse shell on the system to execute commands. ;; BabyShark has used cmd.exe to execute commands. ;; BackConfig can download and run batch files to execute commands on a compromised host. ;; Adversaries can direct BACKSPACE to execute from the command line on infected hosts or have BACKSPACE create a reverse shell. ;; BADNEWS is capable of executing commands via cmd.exe. ;; Bandook is capable of spawning a Windows command shell. ;; Bankshot uses the command-line interface to execute arbitrary commands. ;; Bazar can launch cmd.exe to perform reconnaissance commands. ;; BBK has the ability to use cmd to run a Portable Executable (PE) on the compromised host. ;; BISCUIT has a command to launch a command shell on the system. ;; Bisonal can launch cmd.exe to execute commands on the system. ;; BLACKCOFFEE has the capability to create a reverse shell. ;; BlackMould can run cmd.exe with parameters. ;; BLINDINGCAN has executed commands via cmd.exe. ;; Blue Mockingbird has used batch script files to automate execution and deployment of payloads. ;; BONDUPDATER can read batch commands in a file sent from its C2 server and execute them with cmd.exe. ;; BRONZE BUTLER has used batch scripts and the command-line interface for execution. ;; CALENDAR has a command to run cmd.exe to execute commands. ;; Carbanak has a command to create a reverse shell. ;; Cardinal RAT can execute commands. ;; CARROTBAT has the ability to execute command line arguments on a compromised host. ;; Caterpillar WebShell can run commands on the compromised asset with CMD functions. ;; Chimera has used the Windows Command Shell and batch scripts for execution on compromised hosts. ;; China Chopper's server component is capable of opening a command terminal. ;; cmd is used to execute programs and other actions at the command-line interface. ;; Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands. The group has used an exploit toolkit known as Threadkit that launches .bat files. ;; Cobalt Strike uses a command-line interface to interact with systems. ;; Cobian RAT can launch a remote command shell interface for executing commands. ;; CoinTicker executes a bash script to establish a reverse shell. ;; Comnie executes BAT scripts. ;; ComRAT has used cmd.exe to execute commands. ;; Conti can utilize command line options to allow an attacker control over how it scans and encrypts files. ;; A module in CozyCar allows arbitrary commands to be executed by invoking C:\Windows\System32\cmd.exe. ;; Dark Caracal has used macros in Word documents that would download a second stage if executed. ;; DarkComet can launch a remote shell to execute commands on the victim’s machine. ;; Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file. ;; Daserf can execute shell commands. ;; DealersChoice makes modifications to open-source scripts from GitHub and executes them on the victim’s machine. ;; Denis can launch a remote shell to execute arbitrary commands on the victim’s machine. ;; Dipsind can spawn remote shells. ;; DownPaper uses the command line. ;; Dragonfly 2.0 used various types of scripting to perform operations including batch scripts. ;; DropBook can execute arbitrary shell commands on the victims' machines. ;; Dtrack has used cmd.exe to add a persistent service. ;; ECCENTRICBANDWAGON can use cmd to execute commands on a victim’s machine. ;; Egregor has used batch files for execution and can launch Internet Explorer from cmd.exe. ;; Emissary has the capability to create a remote shell and execute specified commands. ;; Emotet has used cmd.exe to run a PowerShell script. ;; Empire has modules for executing scripts. ;; EvilBunny has an integrated scripting engine to download and execute Lua scripts. ;; Exaramel for Windows has a command to launch a remote shell and executes commands on the victim’s machine. ;; Felismus uses command line for execution. ;; FELIXROOT executes batch scripts on the victim’s machine and can launch a reverse shell for command execution. ;; FIN10 has executed malicious .bat files containing PowerShell commands. ;; FIN6 has used kill.bat script to disable security tools. ;; FIN7 used the command prompt to launch commands on the victim’s machine. ;; FIN8 has used a Batch file to automate frequently executed post compromise cleanup activities. FIN8 executes commands remotely via cmd.exe. ;; Fox Kitten has used cmd.exe likely as a password changing mechanism. ;; Frankenstein has run a command script to set up persistence as a scheduled task named ""WinUpdate"" as well as other encoded commands from the command-line. ;; GALLIUM used the Windows command shell to execute commands. ;; Gamaredon Group has used various batch scripts to establish C2 and download additional files. Gamaredon Group's backdoor malware has also been written to a batch file. ;; Gold Dragon uses cmd.exe to execute commands for discovery. ;; GoldenSpy can execute remote commands via the command-line interface. ;; GoldMax can spawn a command shell and execute native commands. ;; Goopy has the ability to use cmd.exe to execute commands passed from an Outlook C2 channel. ;; Gorgon Group malware can use cmd.exe to download and execute payloads and to execute commands on the system. ;; GravityRAT executes commands remotely on the infected host. ;; GreyEnergy uses cmd.exe to execute itself in-memory. ;; H1N1 kills and disables services by using cmd.exe. ;; HARDRAIN uses cmd.exe to execute netshcommands. ;; HAWKBALL has created a cmd.exe reverse shell executed commands and uploaded output via the command line. ;; hcdLoader provides command-line access to the compromised system. ;; Helminth can provide a remote shell. One version of Helminth uses batch scripting. ;; Hi-Zor has the ability to create a reverse shell. ;; HiddenWasp uses a script to automate tasks on the victim's machine and to assist in execution. ;; Higaisa used cmd.exe for execution. ;; Hikit has the ability to create a remote shell and run given commands. ;; HOMEFRY uses a command-line interface. ;; Several commands are supported by the Honeybee's implant via the command-line interface and there’s also a utility to execute any custom command on an infected endpoint. Honeybee used batch scripting. ;; HOPLIGHT can launch cmd.exe to execute commands on the system. ;; HotCroissant can remotely open applications on the infected host with the ShellExecuteA command. ;; HTTPBrowser is capable of spawning a reverse shell on a victim. ;; httpclient opens cmd.exe on the victim. ;; Indrik Spider has used batch scripts on victim's machines. ;; InnaputRAT launches a shell to execute commands on the victim’s machine. ;; InvisiMole can launch a remote shell to execute commands. ;; Ixeshe is capable of executing commands via cmd. ;; JCry has used cmd.exe to launch PowerShell. ;; JHUHUGIT uses a .bat file to execute a .dll. ;; JPIN can use the command-line utility cacls.exe to change file permissions. ;; jRAT has command line access. ;; Kasidet can execute commands using cmd.exe. ;; Kazuar uses cmd.exe to execute commands on the victim’s machine. ;; Ke3chang has used batch scripts in its malware to install persistence mechanisms. ;; KeyBoy can launch interactive shells for communicating with the victim machine. ;; KEYMARBLE can execute shell commands using cmd.exe. ;; KGH_SPY has the ability to set a Registry key to run a cmd.exe command. ;; Koadic can open an interactive command-shell to perform command line functions on victim machines. Koadic performs most of its operations using Windows Script Host (Jscript) and runs arbitrary shellcode . ;; KOMPROGO is capable of creating a reverse shell. ;; KONNI has used cmd.exe execute arbitrary commands on the infected host across different stages of the infection change. ;; Lazarus Group malware uses cmd.exe to execute commands on victims. A Destover-like variant used by Lazarus Group uses a batch file mechanism to delete its binaries from the system. ;; Leviathan uses a backdoor known as BADFLICK that is is capable of generating a reverse shell and has used multiple types of scripting for execution including JavaScript and JavaScript Scriptlets in XML.. ;; LightNeuron is capable of executing commands via cmd.exe. ;; Linfo creates a backdoor through which remote attackers can start a remote shell. ;; LookBack executes the cmd.exe command. ;; LoudMiner used a batch script to run the Linux virtual machine as a service. ;; Lucifer can issue shell commands to download and execute additional payloads. ;; Machete has used batch files to initiate additional downloads of malicious files. ;; Magic Hound has used the command-line interface. ;; The Maze encryption process has used batch scripts with various commands. ;; MCMD can launch a console process (cmd.exe) with redirected standard input and output. ;; MechaFlounder has the ability to run commands on a compromised host. ;; MegaCortex has used .cmd scripts on the victim's system. ;; menuPass executes commands using a command-line interface and reverse shell. The group has used a modified version of pentesting script wmiexec.vbs to execute commands. menuPass has used malicious macros embedded inside Office documents to execute files. ;; Metamorfo has used cmd.exe /c to execute files. ;; Micropsia creates a command-line shell using cmd.exe. ;; MirageFox has the capability to execute commands using cmd.exe. ;; Mis-Type uses cmd.exe to run commands for enumerating the host. ;; Misdat is capable of providing shell functionality to the attacker to execute commands. ;; Mivast has the capability to open a remote shell and run basic commands. ;; MoleNet can execute commands via the command line utility. ;; MoonWind can execute commands via an interactive command shell. MoonWind uses batch scripts for various purposes including to restart and uninstall itself. ;; More_eggs has used cmd.exe for execution. ;; Mosquito executes cmd.exe and uses a pipe to read the results and send back the output to the C2 server. ;; MuddyWater has used a custom tool for creating reverse shells. ;; MURKYTOP uses the command-line interface. ;; Mustang Panda has executed HTA files via cmd.exe and used batch scripts for collection. ;; NanoCore can open a remote command-line interface and execute commands. NanoCore uses JavaScript files. ;; NavRAT leverages cmd.exe to perform discovery techniques. NavRAT loads malicious shellcode and executes it in memory. ;; NETEAGLE allows adversaries to execute shell commands on the infected host. ;; Operators deploying Netwalker have used batch scripts to retrieve the Netwalker payload. ;; NETWIRE can issue commands using cmd.exe. ;; njRAT can launch a command shell interface for executing commands. ;; OceanSalt can create a reverse shell on the infected endpoint using cmd.exe. OceanSalt has been executed via malicious macros. ;; OilRig has used macros to deliver malware such as QUADAGENT and OopsIE. OilRig has used batch scripts. ;; Okrum's backdoor has used cmd.exe to execute arbitrary commands as well as batch scripts to update itself to a newer version. ;; OopsIE uses the command prompt to execute commands on the victim's machine. ;; Operation Wocao has spawned a new cmd.exe process to execute commands. ;; Orz can execute shell commands. Orz can execute commands with JavaScript. ;; Out1 can use native command line for execution. ;; Patchwork ran a reverse shell with Meterpreter. Patchwork used JavaScript code and .SCT files on victim machines. ;; PHOREAL is capable of creating reverse shell. ;; Pisloader uses cmd.exe to set the Registry Run key value. It also has a command to spawn a command shell. ;; PLAINTEE uses cmd.exe to execute commands on the victim’s machine. ;; PLEAD has the ability to execute shell commands on the compromised host. ;; PlugX allows actors to spawn a reverse shell on a victim. ;; PoetRAT has called cmd through a Word document macro. ;; PoisonIvy creates a backdoor through which remote attackers can open a command-line interface. ;; Pony has used batch scripts to delete itself after execution. ;; PowerDuke runs cmd.exe /c and sends the output to its C2. ;; POWRUNER can execute commands from its C2 server. ;; Proxysvc executes a binary on the system and logs the results into a temp file by using: cmd.exe /c "" > %temp%\PM* .tmp 2>&1"". ;; Pteranodon can execute commands on the victim. ;; QUADAGENT uses cmd.exe to execute scripts and commands on the victim’s machine. ;; QuasarRAT can launch a remote shell to execute commands on the victim’s machine. ;; Ragnar Locker has used cmd.exe and batch scripts to execute commands. ;; Rancor has used cmd.exe to execute commmands. ;; RATANKBA uses cmd.exe to execute commands. ;; RDAT has executed commands using cmd.exe /c. ;; RedLeaves can receive and execute commands with cmd.exe. It can also provide a reverse shell. ;; Remcos can launch a remote command line to execute commands on the victim’s machine. ;; Remexi silently executes received commands with cmd.exe. ;; Revenge RAT uses cmd.exe to execute commands and run scripts on the victim's machine. ;; REvil can use the Windows command line to delete volume shadow copies and disable recovery. ;; RGDoor uses cmd.exe to execute commands on the victim’s machine. ;; Rising Sun executed commands using cmd.exe. ;; RobbinHood uses cmd.exe on the victim's computer. ;; RogueRobin uses Windows Script Components. ;; RTM uses the command line and rundll32.exe to execute. ;; RunningRAT uses a batch file to kill a security program task and then attempts to remove itself. ;; Ryuk has used cmd.exe to create a Registry entry to establish persistence. ;; Sakula calls cmd.exe to run various DLL files via rundll32 and also to perform file cleanup. Sakula also has the capability to invoke a reverse shell. ;; SamSam uses custom batch scripts to execute some of its components. ;; SDBbot has the ability to use the command shell to execute commands on a compromised host. ;; SeaDuke is capable of executing commands. ;; Seasalt uses cmd.exe to create a reverse shell on the infected endpoint. ;; SEASHARPEE can execute commands on victims. ;; ServHelper can execute shell commands against cmd. ;; SharpStage can execute arbitrary commands with the command line. ;; ShimRat can be issued a command shell function from the C2. ;; Silence has used Windows command-line to run commands. ;; SLOTHFULMEDIA can open a command line to execute commands. ;; SNUGRIDE is capable of executing commands and spawning a reverse shell. ;; Sowbug has used command line during its intrusions. ;; Spark can use cmd.exe to run commands. ;; SQLRat has used SQL to execute JavaScript and VB scripts on the host system. ;; StreamEx has the ability to remotely execute commands. ;; Several tools used by Suckfly have been command-line driven. ;; SYSCON has the ability to execute commands through cmd on a compromised host. ;; TA505 has executed commands using cmd.exe. ;; TA551 has used cmd.exe to execute commands. ;; TAINTEDSCRIBE can enable Windows CLI access and execute files. ;; TDTESS provides a reverse shell on the victim. ;; TEXTMATE executes cmd.exe to provide a reverse shell to adversaries. ;; Threat Group-1314 actors spawned shells on remote systems on a victim network to execute commands. ;; Threat Group-3390 has used command-line interfaces for execution. ;; TinyZBot supports execution from the command-line. ;; TrickBot has used macros in Excel documents to download and deploy the malware on the user’s machine. ;; Trojan.Karagany can perform reconnaissance commands on a victim machine via a cmd.exe process. ;; Tropic Trooper has used Windows command scripts. ;; TSCookie has the ability to execute shell commands on the infected host. ;; Turla RPC backdoors have used cmd.exe to execute commands. ;; TURNEDUP is capable of creating a reverse shell. ;; TYPEFRAME can uninstall malware components using a batch script. TYPEFRAME can execute commands using a shell. ;; UBoatRAT can start a command shell. ;; Umbreon provides access using both standard facilities like SSH and additional access using its backdoor Espeon providing a reverse shell upon receipt of a special packet ;; UNC2452 used cmd.exe to execute commands on remote machines. ;; UPPERCUT uses cmd.exe to execute commands on the victim’s machine. ;; USBferry can execute various Windows commands. ;; Volgmer can execute commands on the victim's machine. ;; WEBC2 can open an interactive command shell. ;; WellMess can execute command line scripts received from C2. ;; Wiarp creates a backdoor through which remote attackers can open a command line interface. ;; Wizard Spider has used cmd.exe to execute commands on a victim's machine. ;; XTunnel has been used to execute remote commands. ;; Zebrocy uses cmd.exe to execute commands on the system. ;; Zeus Panda can launch an interface where it can execute several commands on the victim’s PC. ;; ZIRCONIUM has used a tool to open a Windows Command Shell on a remote host. ;; ZLib has the ability to execute shell commands. ;; zwShell can launch command-line shells. ;; ZxShell can launch a reverse command shell.""",1,accept,T1059.003,Command and Scripting Interpreter: Windows Command Shell AppleJeus has been distributed via spearphishing link. ,1,accept,T1566.002,Phishing: Spearphishing Link APT1 has sent spearphishing emails containing hyperlinks to malicious files. ,1,accept,T1566.002,Phishing: Spearphishing Link APT28 sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites. ,1,accept,T1566.002,Phishing: Spearphishing Link APT29 has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files. ,1,accept,T1566.002,Phishing: Spearphishing Link APT32 has sent spearphishing emails containing malicious links. ,1,accept,T1566.002,Phishing: Spearphishing Link APT33 has sent spearphishing emails containing links to .hta files. ,1,accept,T1566.002,Phishing: Spearphishing Link APT39 leveraged spearphishing emails with malicious links to initially compromise victims. ,1,accept,T1566.002,Phishing: Spearphishing Link Bazar has been spread via e-mails with embedded malicious links. ;; BlackTech has used spearphishing e-mails with links to cloud services to deliver malware. ;; Cobalt Group has sent emails with URLs pointing to malicious documents. ;; Dragonfly 2.0 used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites. ;; Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server. ;; Emotet has been delivered by phishing emails containing links. ;; Evilnum has sent spearphishing emails containing a link to a zip file hosted on Google Drive. ;; FIN4 has used spearphishing emails (often sent from compromised accounts) containing malicious links. ;; FIN8 has distributed targeted emails containing links to malicious documents with embedded macros. ;; Grandoreiro has been spread via malicious links embedded in e-mails. ;; GuLoader has been spread in phishing campaigns using malicious web links. ;; Hancitor has been delivered via phishing emails which contained malicious links. ;; Javali has been delivered via malicious links embedded in e-mails. ;; Kerrdown has been distributed via e-mails containing a malicious link. ;; Kimsuky has used an email containing a link to a document that contained malicious macros. ;; Leviathan has sent spearphishing emails with links often using a fraudulent lookalike domain and stolen branding. ;; Machete has sent phishing emails that contain a link to an external server with ZIP and RAR archives. ;; Magic Hound sent shortened URL links over email to victims. The URLs linked to Word documents with malicious macros that execute PowerShells scripts to download Pupy. ;; Melcoz has been spread through malicious links embedded in e-mails. ;; Mofang delivered spearphishing emails with malicious links included. ;; Molerats has sent phishing emails with malicious links included. ;; MuddyWater has sent targeted spearphishing e-mails with malicious links. ;; Mustang Panda has delivered spearphishing links to their target. ;; NETWIRE has been spread via e-mail campaigns utilizing malicious links. ;; Night Dragon sent spearphishing emails containing links to compromised websites where malware was downloaded. ;; OilRig has sent spearphising emails with malicious links to potential victims. ;; Patchwork has used spearphishing with links to deliver files with exploits to initial victims. The group has also used embedded image tags (known as web bugs) with unique per-recipient tracking links in their emails for the purpose of identifying which recipients opened messages. ;; Pony has been delivered via spearphishing emails which contained malicious links. ;; Sandworm Team has crafted phishing emails containing malicious hyperlinks. ;; Sidewinder has sent e-mails with malicious links often crafted for specific targets. ;; Stolen Pencil sent spearphishing emails containing links to domains controlled by the threat actor. ;; TA505 has sent spearphishing emails containing malicious links. ;; TrickBot has been delivered via malicious links in phishing e-mails. ;; Turla attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from Adobe.com to download their malware and gain initial access. ;; Valak has been delivered via malicious links in e-mail. ;; Windshift has sent spearphishing emails with links to harvest credentials and deliver malware. ;; Wizard Spider has sent phishing emails containing a link to an actor-controlled Google Drive document or other free online file hosting services. ;; ZIRCONIUM has used malicious links and web beacons in e-mails for malware download and to track hits to attacker-controlled URL's.,1,accept,T1566.002,Phishing: Spearphishing Link APT29 created tokens using compromised SAML signing certificates. ,1,accept,T1606.002,Forge Web Credentials: Saml Tokens UNC2452 created tokens using compromised SAML signing certificates.,1,accept,T1606.002,Forge Web Credentials: Saml Tokens "Supply chain breaches, such as Solarwinds, are partially exploited via forged credentials that obtain access such as the forging of SMAL tokens. ",1,accept,T1606.002,Forge Web Credentials: Saml Tokens APT30 can break single sign on (SSO) if it is SMAL v2.0 through the forgery of SMAL tokens. ,1,accept,T1606.002,Forge Web Credentials: Saml Tokens Threat actors can change the normal 1 hour limit upon the legitimacy of a token through accessing the AccessTokenLifetime element. ,1,accept,T1606.002,Forge Web Credentials: Saml Tokens Agent Tesla can gather credentials from a number of browsers. ,1,accept,T1555.003,Credentials from Password Stores: Credentials From Web Browsers Ajax Security Team has used FireMalv custom-developed malware which collected passwords from the Firefox browser storage. ,1,accept,T1555.003,Credentials from Password Stores: Credentials From Web Browsers APT3 has used tools to dump passwords from browsers. ,1,accept,T1555.003,Credentials from Password Stores: Credentials From Web Browsers APT33 has used a variety of publicly available tools like LaZagne to gather credentials. ,1,accept,T1555.003,Credentials from Password Stores: Credentials From Web Browsers APT37 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers. ,1,accept,T1555.003,Credentials from Password Stores: Credentials From Web Browsers Azorult can steal credentials from the victim's browser. ,1,accept,T1555.003,Credentials from Password Stores: Credentials From Web Browsers Some Backdoor.Oldrea samples contain a publicly available Web browser password recovery tool. ,1,accept,T1555.003,Credentials from Password Stores: Credentials From Web Browsers BlackEnergy has used a plug-in to gather credentials from web browsers including FireFox Google Chrome and Internet Explorer. ;; Carberp's passw.plug plugin can gather passwords saved in Opera Internet Explorer Safari Firefox and Chrome. ;; ChChes steals credentials stored inside Internet Explorer. ;; CookieMiner can steal saved usernames and passwords in Chrome as well as credit card credentials. ;; CosmicDuke collects user credentials including passwords for various programs including Web browsers. ;; Crimson contains a module to steal credentials from Web browsers on the victim machine. ;; Emotet has been observed dropping browser password grabber modules. ;; Empire can use modules that extract passwords from common web browsers such as Firefox and Chrome. ;; FIN6 has used the Stealer One credential stealer to target web browsers. ;; Grandoreiro can steal cookie data and credentials from Google Chrome. ;; H1N1 dumps usernames and passwords from Firefox Internet Explorer and Outlook. ;; Imminent Monitor has a PasswordRecoveryPacket module for recovering browser passwords. ;; Inception used a browser plugin to steal passwords and sessions from Internet Explorer Chrome Opera Firefox Torch and Yandex. ;; Javali can capture login credentials from open browsers including Firefox Chrome Internet Explorer and Edge. ;; jRAT can capture passwords from common web browsers such as Internet Explorer Google Chrome and Firefox. ;; KeyBoy attempts to collect passwords from browsers. ;; KGH_SPY has the ability to steal data from the Chrome Edge Firefox Thunderbird and Opera browsers. ;; Kimsuky has used browser extensions including Google Chrome to steal passwords and cookies from browsers. ;; KONNI can steal profiles (containing credential information) from Firefox Chrome and Opera. ;; LaZagne can obtain credentials from web browsers such as Google Chrome Internet Explorer and Firefox. ;; Leafminer used several tools for retrieving login and password information including LaZagne. ;; Lokibot has demonstrated the ability to steal credentials from multiple applications and data sources including Safari and the Chromium and Mozilla Firefox-based web browsers. ;; Machete collects stored credentials from several web browsers. ;; Melcoz has the ability to steal credentials from web browsers. ;; Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from DPAPI. ;; Molerats used the public tool BrowserPasswordDump10 to dump passwords saved in browsers on victims. ;; MuddyWater has run tools including Browser64 to steal passwords saved in victim web browsers. ;; NETWIRE has the ability to steal credentials from web browsers including Internet Explorer Opera Yandex and Chrome. ;; njRAT has a module that steals passwords saved in victim web browsers. ;; OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. OilRig has also used tool named PICKPOCKET to dump passwords from web browsers. ;; OLDBAIT collects credentials from Internet Explorer Mozilla Firefox and Eudora. ;; Olympic Destroyer contains a module that tries to obtain stored credentials from web browsers. ;; Patchwork dumped the login data database from \AppData\Local\Google\Chrome\User Data\Default\Login Data. ;; PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated with many sources such as Netscape Navigator Mozilla Firefox Mozilla Thunderbird and Internet Explorer. ;; PLEAD has the ability to steal saved credentials from web browsers. ;; PoetRAT has used a Python tool named Browdec.exe to steal browser credentials. ;; A module in Prikormka gathers logins and passwords stored in applications on the victims including Google Chrome Mozilla Firefox and several other browsers. ;; Proton gathers credentials for Google Chrome. ;; Pupy can use Lazagne for harvesting credentials. ;; QuasarRAT can obtain passwords from common web browsers. ;; RedLeaves can gather browser usernames and passwords. ;; ROKRAT steals credentials stored in Web browsers by querying the sqlite database. ;; Sandworm Team's CredRaptor tool can collect saved passwords from various internet browsers. ;; Smoke Loader searches for credentials stored from web browsers. ;; Stealth Falcon malware gathers passwords from multiple sources including Internet Explorer Firefox and Chrome. ;; Stolen Pencil has used tools that are capable of obtaining credentials from web browsers. ;; TA505 has used malware to gather credentials from Internet Explorer. ;; TrickBot can obtain passwords stored in files from web browsers such as Chrome Firefox Internet Explorer and Microsoft Edge sometimes using esentutl. ;; Trojan.Karagany can steal data and credentials from browsers. ;; TSCookie has the ability to steal saved passwords from the Internet Explorer Edge Firefox and Chrome browsers. ;; Unknown Logger is capable of stealing usernames and passwords from browsers on the victim machine. ;; XAgentOSX contains the getFirefoxPassword function to attempt to locate Firefox passwords. ;; Zebrocy has the capability to upload dumper tools that extract credentials from web browsers and store them in database files. ;; ZIRCONIUM has used a tool to steal credentials from installed web browsers including Microsoft Internet Explorer and Google Chrome.,1,accept,T1555.003,Credentials from Password Stores: Credentials From Web Browsers APT29 used a forged duo-sid cookie to bypass MFA set on an email account. ,1,accept,T1550.004,Use Alternate Authentication Material: Web Session Cookie UNC2452 used a forged duo-sid cookie to bypass MFA set on an email account.,1,accept,T1550.004,Use Alternate Authentication Material: Web Session Cookie Attackers bypass some multi-factor authentication protocols since the session is already authenticated. ,1,accept,T1550.004,Use Alternate Authentication Material: Web Session Cookie Threat actors may have used browser cookies to defeat MFA with a “pass-the-cookie” attack. ,1,accept,T1550.004,Use Alternate Authentication Material: Web Session Cookie Solarwinds attackers bypassed MFA to obtain access on multiple target networks. ,1,accept,T1550.004,Use Alternate Authentication Material: Web Session Cookie TA505 has used .iso files to deploy malicious .lnk files.,1,accept,T1553.005,Subvert Trust Controls: Mark Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls. ,1,accept,T1553.005,Subvert Trust Controls: Mark " Attackers use ZIP archives to disseminate malware, bypassing security controls. ",1,accept,T1553.005,Subvert Trust Controls: Mark Maldocs often abuse MOTW policies to get users to run macros and ActiveX controls. ,1,accept,T1553.005,Subvert Trust Controls: Mark Adversaries bypass Microsoft SmartScreen using archive files that do not have MOTW NTFS streams. ,1,accept,T1553.005,Subvert Trust Controls: Mark admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: net user >> %temp%\download net user /domain >> %temp%\download ,1,accept,T1087.001,Account Discovery: Local Account Agent Tesla can collect account information from the victim’s machine. ,1,accept,T1087.001,Account Discovery: Local Account APT1 used the commands net localgroup net user and net group to find accounts on the system. ,1,accept,T1087.001,Account Discovery: Local Account APT3 has used a tool that can obtain info about local and global group users power users and administrators. ,1,accept,T1087.001,Account Discovery: Local Account APT32 enumerated administrative users using the commands net localgroup administrators. ,1,accept,T1087.001,Account Discovery: Local Account Bankshot gathers domain and account names/information through process monitoring. ,1,accept,T1087.001,Account Discovery: Local Account Bazar can identify administrator accounts on an infected host. ,1,accept,T1087.001,Account Discovery: Local Account " BitPaymer can enumerate the sessions for each user logged onto the infected host. ;; BloodHound can identify users with local administrator rights. ;; Chimera has used net user for account discovery. ;; Comnie uses the net user command. ;; The discovery modules used with Duqu can collect information on accounts and permissions. ;; Elise executes net user after initial communication is made to the remote server. ;; Empire can acquire local and domain user account information. ;; Epic gathers a list of all user accounts privilege classes and time of last logon. ;; Fox Kitten has accessed ntuser.dat and UserClass.dat on compromised hosts. ;; GeminiDuke collects information on local user accounts from the victim. ;; HyperStack can enumerate all account names on a remote share. ;; InvisiMole has a command to list account information on the victim’s machine. ;; Kazuar gathers information on local groups and members on the victim’s machine. ;; Ke3chang performs account discovery using commands such as net localgroup administrators and net group REDACTED"" /domain on specific permissions groups. ;; Kwampirs collects a list of accounts with the command net users. ;; Mis-Type may create a file containing the results of the command cmd.exe /c net user {Username}. ;; MURKYTOP has the capability to retrieve information about users on remote hosts. ;; Commands under net user can be used in Net to gather information about and manipulate user accounts. ;; OilRig has run net user net user /domain net group “domain admins” /domain and net group “Exchange Trusted Subsystem” /domain to get account listings on a victim. ;; OSInfo enumerates local and domain users ;; P.A.S. Webshell can display the /etc/passwd file on a compromised host. ;; Pony has used the NetUserEnum function to enumerate local accounts. ;; Poseidon Group searches for administrator accounts on both the local victim machine and the network. ;; PoshC2 can enumerate local and domain user account information. ;; PowerSploit's Get-ProcessTokenGroup Privesc-PowerUp module can enumerate all SIDs associated with its current token. ;; POWERSTATS can retrieve usernames from compromised hosts. ;; PUNCHBUGGY can gather user names. ;; Pupy uses PowerView and Pywerview to perform discovery commands such as net user net group net local group etc. ;; RATANKBA uses the net user command. ;; Remsec can obtain a list of users. ;; S-Type runs the command net user on a victim. S-Type also runs tests to determine the privilege level of the compromised user. ;; SHOTPUT has a command to retrieve information about connected users. ;; SoreFang can collect usernames from the local system via net.exe user. ;; Threat Group-3390 has used net user to conduct internal discovery of systems. ;; TrickBot collects the users of the system. ;; Turla has used net user to enumerate local accounts on the system. ;; USBferry can use net user to gather information about local accounts. ;; Valak has the ability to enumerate local admin accounts.""",1,accept,T1087.001,Account Discovery: Local Account adbupd can use a WMI script to achieve persistence. ,1,accept,T1546.003,Event Triggered Execution: Windows Management Instrumentation Event Subscription APT29 has used WMI event subscriptions for persistence. ,1,accept,T1546.003,Event Triggered Execution: Windows Management Instrumentation Event Subscription APT33 has attempted to use WMI event subscriptions to establish persistence on compromised hosts. ,1,accept,T1546.003,Event Triggered Execution: Windows Management Instrumentation Event Subscription Blue Mockingbird has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file. ,1,accept,T1546.003,Event Triggered Execution: Windows Management Instrumentation Event Subscription Leviathan has used WMI for persistence. ,1,accept,T1546.003,Event Triggered Execution: Windows Management Instrumentation Event Subscription Mustang Panda's custom ORat tool uses a WMI event consumer to maintain persistence. ,1,accept,T1546.003,Event Triggered Execution: Windows Management Instrumentation Event Subscription PoshC2 has the ability to persist on a system using WMI events. ,1,accept,T1546.003,Event Triggered Execution: Windows Management Instrumentation Event Subscription POSHSPY uses a WMI event subscription to establish persistence. ;; POWERTON can use WMI for persistence. ;; RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started. ;; SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup. ;; Turla has used WMI event filters and consumers to establish persistence. ;; UNC2452 used WMI event subscriptions for persistence.,1,accept,T1546.003,Event Triggered Execution: Windows Management Instrumentation Event Subscription APT29 drops a Windows shortcut file for execution. ,1,accept,T1547.009,Boot or Logon Autostart Execution: Shortcut Modification APT39 has modified LNK shortcuts. ,1,accept,T1547.009,Boot or Logon Autostart Execution: Shortcut Modification Astaroth's initial payload is a malicious .LNK file. ,1,accept,T1547.009,Boot or Logon Autostart Execution: Shortcut Modification BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory. ,1,accept,T1547.009,Boot or Logon Autostart Execution: Shortcut Modification Bazar can establish persistence by writing shortcuts to the Windows Startup folder. ,1,accept,T1547.009,Boot or Logon Autostart Execution: Shortcut Modification The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder. ,1,accept,T1547.009,Boot or Logon Autostart Execution: Shortcut Modification Comnie establishes persistence via a .lnk file in the victim’s startup path. ,1,accept,T1547.009,Boot or Logon Autostart Execution: Shortcut Modification Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file. ;; Dragonfly 2.0 manipulated .lnk files to gather user credentials in conjunction with Forced Authentication. ;; Empire can persist by modifying a .LNK file to include a backdoor. ;; FELIXROOT creates a .LNK file for persistence. ;; Gazer can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe. ;; Gorgon Group malware can create a .lnk file and add a Registry Run key to establish persistence. ;; Grandoreiro can write or modify browser shortcuts to enable launching of malicious browser extensions. ;; Helminth establishes persistence by creating a shortcut. ;; InvisiMole can use a .lnk shortcut for the Control Panel to establish persistence. ;; Kazuar adds a .lnk file to the Windows startup folder. ;; A version of KONNI drops a Windows shortcut on the victim’s machine to establish persistence. ;; A Lazarus Group malware sample adds persistence on the system by creating a shortcut in the user’s Startup folder. ;; Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor. ;; Micropsia creates a shortcut to maintain persistence. ;; Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder. ;; Reaver creates a shortcut file and saves it in a Startup folder to establish persistence. ;; RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence. ;; RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in. ;; S-Type may create the file %HOMEPATH%\Start Menu\Programs\Startup\Realtek {Unique Identifier}.lnk which points to the malicious msdtc.exe file already created in the %CommonFiles% directory. ;; SeaDuke is capable of persisting via a .lnk file stored in the Startup directory. ;; SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder. ;; SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder. ;; To establish persistence SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an “Office Start ” “Yahoo Talk ” “MSN Gaming Z0ne ” or “MSN Talk” shortcut. ;; TinyZBot can create a shortcut in the Windows startup folder for persistence.,1,accept,T1547.009,Boot or Logon Autostart Execution: Shortcut Modification Agent Tesla has the ability to extract credentials from configuration or support files. ,1,accept,T1552.001,Unsecured Credentials: Credentials In Files APT3 has a tool that can locate credentials in files on the file system such as those from Firefox or Chrome. ,1,accept,T1552.001,Unsecured Credentials: Credentials In Files APT33 has used a variety of publicly available tools like LaZagne to gather credentials. ,1,accept,T1552.001,Unsecured Credentials: Credentials In Files Azorult can steal credentials in files belonging to common software such as Skype Telegram and Steam. ,1,accept,T1552.001,Unsecured Credentials: Credentials In Files BlackEnergy has used a plug-in to gather credentials stored in files on the host by various software programs including The Bat! email client Outlook and Windows Credential Store. ,1,accept,T1552.001,Unsecured Credentials: Credentials In Files Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user. ,1,accept,T1552.001,Unsecured Credentials: Credentials In Files Empire can use various modules to search for files containing passwords. ,1,accept,T1552.001,Unsecured Credentials: Credentials In Files " Fox Kitten has accessed files to gain valid credentials. ;; Hildegard has searched for SSH keys Docker credentials and Kubernetes service tokens. ;; jRAT can capture passwords from common chat applications such as MSN Messenger AOL Instant Messenger and and Google Talk. ;; LaZagne can obtain credentials from chats databases mail and WiFi. ;; Leafminer used several tools for retrieving login and password information including LaZagne. ;; MuddyWater has run a tool that steals passwords saved in victim email. ;; OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. ;; If an initial connectivity check fails pngdowner attempts to extract proxy details and credentials from Windows Protected Storage and from the IE Credentials Store. This allows the adversary to use the proxy credentials for subsequent requests if they enable outbound HTTP access. ;; PoshC2 contains modules for searching for passwords in local and remote files. ;; Pupy can use Lazagne for harvesting credentials. ;; Pysa has extracted credentials from the password database before encrypting the files. ;; QuasarRAT can obtain passwords from FTP clients. ;; Smoke Loader searches for files named logins.json to parse for credentials. ;; Stolen Pencil has used tools that are capable of obtaining credentials from saved mail. ;; TA505 has used malware to gather credentials from FTP clients and Outlook. ;; TrickBot can obtain passwords stored in files from several applications such as Outlook Filezilla OpenSSH OpenVPN and WinSCP. Additionally it searches for the .vnc.lnk"" affix to steal VNC credentials. ;; XTunnel is capable of accessing locally stored passwords on victims.""",1,accept,T1552.001,Unsecured Credentials: Credentials In Files Limit communications with the container service to local Unix sockets or remote access via SSH. ,1,accept,T1552.007,Unsecured Credentials: Container Api Require secure port access to communicate with the APIs over TLS by disabling unauthenticated access to the Docker API and Kubernetes API Server. ,1,accept,T1552.007,Unsecured Credentials: Container Api " Deny direct remote access to internal systems through the use of network proxies, gateways, and firewalls. ",1,accept,T1552.007,Unsecured Credentials: Container Api Use the principle of least privilege for privileged accounts such as the service account in Kubernetes. ,1,accept,T1552.007,Unsecured Credentials: Container Api " An adversary may access the Docker API to collect logs that contain credentials to cloud, container, and various other resources in the environment. ",1,accept,T1552.007,Unsecured Credentials: Container Api Ensure containers are not running as root by default. ,1,accept,T1053.007,Scheduled Task/Job: Container Orchestration Job Limit privileges of user accounts and remediate privilege escalation vectors so only authorized administrators can create container orchestration jobs. ,1,accept,T1053.007,Scheduled Task/Job: Container Orchestration Job Threat actors can create clusters of containers to maintain persistence. ,1,accept,T1053.007,Scheduled Task/Job: Container Orchestration Job Ransomware such as DarkMatter can utilize containers to schedule the execution of the encryption payload. ,1,accept,T1053.007,Scheduled Task/Job: Container Orchestration Job APT23 abuses container creation programs such as Kubernetes to repeatedly execute malicious code. ,1,accept,T1053.007,Scheduled Task/Job: Container Orchestration Job TeamTNT relies on users to download and execute malicious Docker images. ,1,accept,T1204.003,User Execution: Malicious Image TigerDownloader can be modified to be executed once a user is tricked into downloading a malicious AWS image. ,1,accept,T1204.003,User Execution: Malicious Image DarkSide ransomware can be executed once a user downloads a malicious GCP image. ,1,accept,T1204.003,User Execution: Malicious Image Persistence can be maintained via backdoor installations through the medium of malicious docker images. ,1,accept,T1204.003,User Execution: Malicious Image REvil ransomware can install itself once a user downloads an image that has been modified to contain malicious functionality. ,1,accept,T1204.003,User Execution: Malicious Image APT28 has used a brute-force/password-spray tooling that operated in two modes: in password-spraying mode it conducted approximately four authentication attempts per hour per targeted account over the course of several days or weeks. ,1,accept,T1110.003,Brute Force: Password Spraying APT33 has used password spraying to gain access to target systems. ,1,accept,T1110.003,Brute Force: Password Spraying Chimera has used multiple password spraying attacks against victim's remote services to obtain valid user and administrator accounts. ,1,accept,T1110.003,Brute Force: Password Spraying CrackMapExec can brute force credential authentication by using a supplied list of usernames and a single password. ,1,accept,T1110.003,Brute Force: Password Spraying Lazarus Group malware attempts to connect to Windows shares for lateral movement by using a generated list of usernames which center around permutations of the username Administrator and weak passwords. ,1,accept,T1110.003,Brute Force: Password Spraying Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying. ,1,accept,T1110.003,Brute Force: Password Spraying Linux Rabbit brute forces SSH passwords in order to attempt to gain access and install its malware onto the server. ,1,accept,T1110.003,Brute Force: Password Spraying MailSniper can be used for password spraying against Exchange and Office 365. ;; Silent Librarian has used collected lists of names and e-mail accounts to use in password spraying attacks against private sector targets.,1,accept,T1110.003,Brute Force: Password Spraying Chimera has used credential stuffing against victim's remote services to obtain valid accounts. ,1,accept,T1110.004,Brute Force: Credential Stuffing TrickBot uses brute-force attack against RDP with rdpscanDll module.,1,accept,T1110.004,Brute Force: Credential Stuffing APT22 uses credential stuffing to enumerate the number of compromised accounts they can access. ,1,accept,T1110.004,Brute Force: Credential Stuffing " Skimmers, such as those utilised by Magecart, will often use credential stuffing to access multiple user accounts across multiple ecommerce websites. ",1,accept,T1110.004,Brute Force: Credential Stuffing Credential stuffing is a technique often used by threat actors to gain access to new accounts which they can then abuse the trust of to assist in social engineering attacks. ,1,accept,T1110.004,Brute Force: Credential Stuffing Ransomware such as REvil can credential stuff to gain access to more valid accounts before moving laterally and vertically within the network. ,1,accept,T1110.004,Brute Force: Credential Stuffing Threat actors can credential stuff to gain access to users accounts if they reuse passwords. ,1,accept,T1110.004,Brute Force: Credential Stuffing HyperStack can use default credentials to connect to IPC$ shares on remote machines.,1,accept,T1078.001,Valid Accounts: Default Accounts Stuxnet infected WinCC machines via a hardcoded database server password. ,1,accept,T1078.001,Valid Accounts: Default Accounts Threat actors targeting government sectors will abuse default guest and administrator accounts on older windows OS to gain initial access. ,1,accept,T1078.001,Valid Accounts: Default Accounts APT40 abuses default administrator accounts for initial access. ,1,accept,T1078.001,Valid Accounts: Default Accounts Certain CobaltStrike beacons can maintain persistence via access to default administrator accounts. ,1,accept,T1078.001,Valid Accounts: Default Accounts APT32 has used legitimate local admin account credentials. ,1,accept,T1078.003,Valid Accounts: Local Accounts Cobalt Strike can use known credentials to run commands and spawn processes as a local user account. ,1,accept,T1078.003,Valid Accounts: Local Accounts Emotet can brute force a local admin password then use it to facilitate lateral movement. ,1,accept,T1078.003,Valid Accounts: Local Accounts FIN10 has moved laterally using the Local Administrator account. ,1,accept,T1078.003,Valid Accounts: Local Accounts HAFNIUM has used the NT AUTHORITY\SYSTEM account to create files on Exchange servers. ,1,accept,T1078.003,Valid Accounts: Local Accounts NotPetya can use valid credentials with PsExec or wmic to spread itself to remote systems. ,1,accept,T1078.003,Valid Accounts: Local Accounts Operation Wocao has used local account credentials found during the intrusion for lateral movement and privilege escalation. ,1,accept,T1078.003,Valid Accounts: Local Accounts PROMETHIUM has created admin accounts on a compromised host. ;; Stolen Pencil has a tool to add a Windows admin account in order to allow them to ensure continued access via RDP. ;; Tropic Trooper has used known administrator account credentials to execute the backdoor directly. ;; Turla has abused local accounts that have the same password across the victim’s network. ;; Umbreon creates valid local users to provide access to the system.,1,accept,T1078.003,Valid Accounts: Local Accounts admin@338 has sent emails with malicious Microsoft Office documents attached. ,1,accept,T1566.001,Phishing: Spearphishing Attachment The primary delivered mechaism for Agent Tesla is through email phishing messages. ,1,accept,T1566.001,Phishing: Spearphishing Attachment Ajax Security Team has used personalized spearphishing attachments. ,1,accept,T1566.001,Phishing: Spearphishing Attachment APT-C-36 has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway. ,1,accept,T1566.001,Phishing: Spearphishing Attachment APT1 has sent spearphishing emails containing malicious attachments. ,1,accept,T1566.001,Phishing: Spearphishing Attachment APT12 has sent emails with malicious Microsoft Office documents and PDFs attached. ,1,accept,T1566.001,Phishing: Spearphishing Attachment APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits. ,1,accept,T1566.001,Phishing: Spearphishing Attachment APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments. ;; APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims. ;; APT30 has used spearphishing emails with malicious DOC attachments. ;; APT32 has sent spearphishing emails with a malicious executable disguised as a document or spreadsheet. ;; APT33 has sent spearphishing e-mails with archive attachments. ;; APT37 delivers malware using spearphishing emails with malicious HWP attachments. ;; APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims. ;; APT41 sent spearphishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims. ;; BlackTech has used spearphishing e-mails with malicious documents to deliver malware. ;; BLINDINGCAN has been delivered by phishing emails containing malicious Microsoft Office documents. ;; BRONZE BUTLER used spearphishing emails with malicious Microsoft Word attachments to infect victims. ;; Cobalt Group has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf .doc .xls archives containing LNK files and password protected archives containing .exe and .scr executables. ;; Darkhotel has sent spearphishing emails with malicious RAR and .LNK attachments. ;; DarkHydrus has sent spearphishing emails with password-protected RAR archives containing malicious Excel Web Query files (.iqy). The group has also sent spearphishing emails that contained malicious Microsoft Office documents that use the “attachedTemplate” technique to load a template from a remote server. ;; Dragonfly 2.0 used spearphishing with Microsoft Office attachments to target victims. ;; Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments. ;; Emotet has been delivered by phishing emails containing attachments. ;; FIN4 has used spearphishing emails containing attachments (which are often stolen legitimate documents sent from compromised accounts) with embedded malicious macros. ;; FIN6 has targeted victims with e-mails containing malicious attachments. ;; FIN7 sent spearphishing emails with either malicious Microsoft Documents or RTF files attached. ;; FIN8 has distributed targeted emails containing Word documents with embedded malicious macros. ;; Frankenstein has used spearphishing emails to send trojanized Microsoft Word documents. ;; Gallmaker sent emails with malicious Microsoft Office documents attached. ;; Gamaredon Group has delivered spearphishing emails with malicious attachments to targets. ;; Gorgon Group sent emails to victims with malicious Microsoft Office documents attached. ;; Hancitor has been delivered via phishing emails with malicious attachments. ;; Higaisa has sent spearphishing emails containing malicious attachments. ;; IcedID has been delivered via phishing e-mails with malicious attachments. ;; Inception has used weaponized documents attached to spearphishing emails for reconnaissance and initial compromise. ;; Javali has been delivered as malicious e-mail attachments. ;; Kerrdown has been distributed through malicious e-mail attachments. ;; Kimsuky has used emails containing Word Excel and/or HWP (Hangul Word Processor) documents in their spearphishing campaigns. ;; Lazarus Group has targeted victims with spearphishing emails containing malicious Microsoft Word documents. ;; Leviathan has sent spearphishing emails with malicious attachments including .rtf .doc and .xls files. ;; Machete has delivered spearphishing emails that contain a zipped file with malicious contents. ;; menuPass has sent malicious Office documents via email as part of spearphishing campaigns as well as executables disguised as documents. ;; Metamorfo has been delivered to victims via emails containing malicious HTML attachments. ;; Mofang delivered spearphishing emails with malicious documents PDFs or Excel files attached. ;; Molerats has sent phishing emails with malicious Microsoft Word and PDF attachments. ;; MuddyWater has compromised third parties and used compromised accounts to send spearphishing emails with targeted attachments to recipients. ;; Mustang Panda has used spearphishing attachments to deliver initial access payloads. ;; Naikon has used malicious e-mail attachments to deliver malware. ;; NETWIRE has been spread via e-mail campaigns utilizing malicious attachments. ;; OceanSalt has been delivered via spearphishing emails with Microsoft Office attachments. ;; OilRig has sent spearphising emails with malicious attachments to potential victims using compromised and/or spoofed email accounts. ;; Patchwork has used spearphishing with an attachment to deliver files with exploits to initial victims. ;; PLATINUM has sent spearphishing emails with attachments to victims as its primary initial access vector. ;; PoetRAT was distributed via malicious Word documents. ;; Pony has been delivered via spearphishing attachments. ;; Ramsay has been distributed through spearphishing emails with malicious attachments. ;; Rancor has attached a malicious document to an email to gain initial access. ;; REvil has been distributed via malicious e-mail attachments including MS Word Documents. ;; Rifdoor has been distributed in e-mails with malicious Excel or Word documents. ;; RTM has been delivered via spearphishing attachments disguised as PDF documents. ;; RTM has used spearphishing attachments to distribute its malware. ;; Sandworm Team has delivered malicious Microsoft Office attachments via spearphishing emails. ;; Sharpshooter has sent malicious attachments via emails to targets. ;; Sidewinder has sent e-mails with malicious attachments often crafted for specific targets. ;; Silence has sent emails with malicious DOCX CHM LNK and ZIP attachments. ;; TA459 has targeted victims using spearphishing emails with malicious Microsoft Word attachments. ;; TA505 has used spearphishing emails with malicious attachments to initially compromise victims. ;; TA551 has sent spearphishing attachments with password protected ZIP files. ;; The White Company has sent phishing emails with malicious Microsoft Word attachments to victims. ;; TrickBot has used an email with an Excel sheet containing a malicious macro to deploy the malware ;; Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments. ;; Valak has been delivered via spearphishing e-mails with password protected ZIP files. ;; Windshift has sent spearphishing emails with attachment to harvest credentials and deliver malware. ;; Wizard Spider has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet Bokbot TrickBot or Bazar.,1,accept,T1566.001,Phishing: Spearphishing Attachment AppleJeus has waited a specified time before downloading a second stage payload. ,1,accept,T1497.003,Virtualization/Sandbox Evasion: Time Based Evasion Bazar can use a timer to delay execution of core functionality. ,1,accept,T1497.003,Virtualization/Sandbox Evasion: Time Based Evasion BendyBear can check for analysis environments and signs of debugging using the Windows API kernel32!GetTickCountKernel32 call. ,1,accept,T1497.003,Virtualization/Sandbox Evasion: Time Based Evasion Egregor can perform a long sleep (greater than or equal to 3 minutes) to evade detection. ,1,accept,T1497.003,Virtualization/Sandbox Evasion: Time Based Evasion EvilBunny has used time measurements from 3 different APIs before and after performing sleep operations to check and abort if the malware is running in a sandbox. ,1,accept,T1497.003,Virtualization/Sandbox Evasion: Time Based Evasion FatDuke can turn itself on or off at random intervals. ,1,accept,T1497.003,Virtualization/Sandbox Evasion: Time Based Evasion GoldenSpy's installer has delayed installation of GoldenSpy for two hours after it reaches a victim system. ,1,accept,T1497.003,Virtualization/Sandbox Evasion: Time Based Evasion GoldMax has set an execution trigger date and time stored as an ASCII Unix/Epoch time value. ;; Okrum's loader can detect presence of an emulator by using two calls to GetTickCount API and checking whether the time has been accelerated. ;; Pony has delayed execution using a built-in function to avoid detection and analysis. ;; After initial installation Raindrop runs a computation to delay execution. ;; SUNBURST remained dormant after initial access for a period of up to two weeks. ;; ThiefQuest invokes time call to check the system's time executes a sleep command invokes a second time call and then compares the time difference between the two time calls and the amount of time the system slept to identify the sandbox. ;; Ursnif has used a 30 minute delay after execution to evade sandbox monitoring tools.,1,accept,T1497.003,Virtualization/Sandbox Evasion: Time Based Evasion Hildegard has queried the Cloud Instance Metadata API for cloud credentials.,1,accept,T1552.005,Unsecured Credentials: Cloud Instance Metadata Api TeamTNT has queried the AWS instance metadata service for credentials. ,1,accept,T1552.005,Unsecured Credentials: Cloud Instance Metadata Api APT33 will query Cloud Instance APIs to harvest insecurely stored credentials that can then be used for user enumeration. ,1,accept,T1552.005,Unsecured Credentials: Cloud Instance Metadata Api " In addition to credential harvesting, other valuable data can be extracted by threat actors via the AWS instance if it is not properly secured. ",1,accept,T1552.005,Unsecured Credentials: Cloud Instance Metadata Api " APT25 can harvest credentials from Cloud Instance APIs, then use those credentials to gain access to systems. ",1,accept,T1552.005,Unsecured Credentials: Cloud Instance Metadata Api Backdoor.Oldrea collects address book information from Outlook. ,1,accept,T1087.003,Account Discovery: Email Account Emotet has been observed leveraging a module that can scrape email addresses from Outlook. ,1,accept,T1087.003,Account Discovery: Email Account Grandoreiro can parse Outlook .pst files to extract e-mail addresses. ,1,accept,T1087.003,Account Discovery: Email Account MailSniper can be used to obtain account names from Exchange and Office 365 using the Get-GlobalAddressList cmdlet. ,1,accept,T1087.003,Account Discovery: Email Account Ruler can be used to enumerate Exchange users and dump the GAL. ,1,accept,T1087.003,Account Discovery: Email Account Sandworm Team used malware to enumerate email settings including usernames and passwords from the M.E.Doc application. ,1,accept,T1087.003,Account Discovery: Email Account TA505 has used the tool EmailStealer to steal and send lists of e-mail addresses to a remote server. ,1,accept,T1087.003,Account Discovery: Email Account " TrickBot collects email addresses from Outlook.;;Threat actors will often attempt to gather more targets by using tools that lists of users from memory, and combine this with a company’s email naming convention to create a target list of email addresses. ;; Some actors use open-source malware and tools to target and steal email account credentials from popular email clients such as, Apple Mail, Gmail, and Outlook. ;; Spearphising is used by the most advanced threat groups in the world, which shows the potential value that skilled threat actors can extract by discovering which email addresses to target. ;; Malware can used by actors to automate email account discovery. ;; Actors can exploit vulnerabilities, such as Log4Shell, to move into different directories to quickly locate email addresses. ",1,accept,T1087.003,Account Discovery: Email Account Threat actors will attempt to gather cloud accounts and their appropriate groups in attempts to find weak or default settings to exploit for malicious purposes. ,1,accept,T1069.003,Permission Groups Discovery: Cloud Groups " Identifying cloud groups and cloud permissions can be accomplished by various commands, such as: ‘az ad user get-member-groups’ to get groups associated to a user account in Azure. ",1,accept,T1069.003,Permission Groups Discovery: Cloud Groups " Some actors and malware will attempt to launch commands, via PowerShell for example (among others), to gather cloud group user settings and permissions for Google with the command: ‘GET https://cloudidentity.googleapis.com/v1/groups’. ",1,accept,T1069.003,Permission Groups Discovery: Cloud Groups " As more organizations utilize cloud services, more actors and malware will attempt to engage in malicious activity by locating cloud groups and their corresponding cloud user settings. ",1,accept,T1069.003,Permission Groups Discovery: Cloud Groups " Targeting an access control list (ACL) could grant actors the ability to discover cloud account users and settings, for Amazon Web Services (AWS) this can be done with the ‘GetBucketAcl’ command. ",1,accept,T1069.003,Permission Groups Discovery: Cloud Groups Drovorub can use kernel modules to establish persistence. ,1,accept,T1547.006,Boot or Logon Autostart Execution: Kernel Modules And Extensions Skidmap has the ability to install several loadable kernel modules (LKMs) on infected machines.,1,accept,T1547.006,Boot or Logon Autostart Execution: Kernel Modules And Extensions Threat actors can leverage malicious loadable kernel modules (LKMs) to gain Rootkit level access on an affected machine. ,1,accept,T1547.006,Boot or Logon Autostart Execution: Kernel Modules And Extensions " Actors are always looking for ways keep control of an infected machine, one way this can be done is through malicious kernel modules to covertly escalate privileges and maintain persistence. ",1,accept,T1547.006,Boot or Logon Autostart Execution: Kernel Modules And Extensions LKMs used by actors and malware are often loaded into the ‘/lib/modules/’ with a .ko extension on Linux systems. ,1,accept,T1547.006,Boot or Logon Autostart Execution: Kernel Modules And Extensions " Malware trying to get kernel access may run commands before loading a malicious module, and some of these include ‘modprobe’, ‘insmod’, ‘lsmod’, ‘rmmod’, and ‘modinfo’. ",1,accept,T1547.006,Boot or Logon Autostart Execution: Kernel Modules And Extensions " Some malware will attempt to load Kexts into the kernel, which create new rows in KextPolicy tables. ",1,accept,T1547.006,Boot or Logon Autostart Execution: Kernel Modules And Extensions Dok persists via a plist login item. ,1,accept,T1547.011,Boot or Logon Autostart Execution: Plist Modification LoudMiner used plists to execute shell scripts and maintain persistence on boot. LoudMiner also added plist files in /Library/LaunchDaemons with KeepAlive set to true which would restart the process if stopped. ,1,accept,T1547.011,Boot or Logon Autostart Execution: Plist Modification NETWIRE can persist via startup options for Login items.,1,accept,T1547.011,Boot or Logon Autostart Execution: Plist Modification Property list (plist) files can be manipulated by malware to execute their own malicious executables. ,1,accept,T1547.011,Boot or Logon Autostart Execution: Plist Modification Some malware will create property list files (.plist) to download and execute code as part of maintaining persistence. ,1,accept,T1547.011,Boot or Logon Autostart Execution: Plist Modification macOs malware may try to use the ‘plist’ command to manipulate keys in property list (plist) files to elevate privileges or establish persistence. ,1,accept,T1547.011,Boot or Logon Autostart Execution: Plist Modification " Modifying plist files in specific locations can be advantageous to threat actors with ‘LSEnvironment’ for persistence, and ‘DYLD_INSERT_LIBRARIES’ with a path to a malicious DLL under ‘EnvironmentVariables’ for execution. ",1,accept,T1547.011,Boot or Logon Autostart Execution: Plist Modification " Plist files, which are written in XML, are valuable targets on macOS because actors can gain elevated privileges, execute code, and maintain persistence if the correct areas are modified. ",1,accept,T1547.011,Boot or Logon Autostart Execution: Plist Modification Threat actors may create malicious Macho-O binaries with modified LC_LOAD_DYLIB headers to change which dynamic link libraries (DLLs) should be executed on execution. ,1,accept,T1546.006,Event Triggered Execution: Lc_Load_Dylib Addition " While changing binaries will invalidate digital signatures, threat actors can remove the LC_CODE_SIGNATURE command from the binary to prevent signature checks when loading dynamic libraries (DYLIB). ",1,accept,T1546.006,Event Triggered Execution: Lc_Load_Dylib Addition Malware focused on macOS may change the Mach-O header (LC_LOAD_DYLIB) to instruct the executable which DLLs will be ran upon execution. ,1,accept,T1546.006,Event Triggered Execution: Lc_Load_Dylib Addition Actors will create malware targeting macOS that will have custom LC_LOAD_DYLIB headers to instruct which dylibs (DLLs) should be executed. ,1,accept,T1546.006,Event Triggered Execution: Lc_Load_Dylib Addition Malicious dylibs (DLLs) targeting macOS can be loaded and executed through the LC_LOAD_DYLIB header in a Mach-O binary. ,1,accept,T1546.006,Event Triggered Execution: Lc_Load_Dylib Addition APT41 has encrypted payloads using the Data Protection API (DPAPI) which relies on keys tied to specific user accounts on specific machines. APT41 has also environmentally keyed second stage malware with an RC5 key derived in part from the infected system's volume serial number. ,1,accept,T1480.001,Execution Guardrails: Environmental Keying Equation has been observed utilizing environmental keying in payload delivery. ,1,accept,T1480.001,Execution Guardrails: Environmental Keying InvisiMole can use Data Protection API to encrypt its components on the victim’s computer to evade detection and to make sure the payload can only be decrypted and loaded on one specific compromised computer.,1,accept,T1480.001,Execution Guardrails: Environmental Keying "Malware with actor-created environment keys can gather elements to use in deciding if a second-stage, encrypted payload should be dropped. ",1,accept,T1480.001,Execution Guardrails: Environmental Keying " Some actors will implement environmental keying to gather legitimate, cryptographic processes such as data protection API (DPAPI), to encrypt their payloads. ",1,accept,T1480.001,Execution Guardrails: Environmental Keying Malware using environmental keying will check for specific items to be present on an infected machine or system and use the discoveries to encrypt its malicious activity. ,1,accept,T1480.001,Execution Guardrails: Environmental Keying Environmental keying using data protection API makes an encrypted payload that can only be decrypted from the infected hist. ,1,accept,T1480.001,Execution Guardrails: Environmental Keying Searching for environment keys within a compromised environment can allow an actor to abuse legitimate components to encrypt their malicious activity. ,1,accept,T1480.001,Execution Guardrails: Environmental Keying "Threat actors can use third-party services to conduct network denial-of-service (DoS) by spoofing the target IP, and forcing the real IP to attempt to resolve high volumes of network traffic back and forth via UDP or TCP. ",1,accept,T1498.002,Network Denial of Service: Reflection Amplification Some botnet malware may attempt to use denial of service reflection attacks by tricking a target IP address into responding to a third party server in a back and forth of UDP/TCP packets. ,1,accept,T1498.002,Network Denial of Service: Reflection Amplification " Actors can conduct denial-of-service (DoS) attacks by using tricking a legitimate sever into responding to requests made from a spoofed (target) IP address in a reflection attack, and then combined with small request and a large reply to amplify the attack. ",1,accept,T1498.002,Network Denial of Service: Reflection Amplification A large flood of packets flooding into the same source port but with different destination port numbers may be a sign of an amplification reflection attack. ,1,accept,T1498.002,Network Denial of Service: Reflection Amplification " Malware can use seemingly benign servers that show no indication of compromised and force them to request information from a target’s IP, forcing them to respond to the requests and filling up bandwidth. ",1,accept,T1498.002,Network Denial of Service: Reflection Amplification Denial of service attacks that consist of packets directly sent to target in aims of exhausting that resource ,1,accept,T1498.001,Network Denial of Service: Direct Network Flood " Distributed denial-of-service attacks are conducted by botnets, such as Mirai, with the objective of sending so much fake traffic or legitimate requests as to prevent the target from functioning normally. ",1,accept,T1498.001,Network Denial of Service: Direct Network Flood Threat actors may conduct reconnaissance to find targets that are most vulnerable to flooding the network with traffic to deny or disrupt service. ,1,accept,T1498.001,Network Denial of Service: Direct Network Flood " Network flooding is a common tool amongst threat actors, and there are online locations that offer DDoS services for purchase. ",1,accept,T1498.001,Network Denial of Service: Direct Network Flood Some botnet malware will use thousands if not millions of compromised devices to conduct distributed denial-of-service (DDoS) attacks directly at their target. ,1,accept,T1498.001,Network Denial of Service: Direct Network Flood "Actors can conduct endpoint denial of service attacks by targeting endpoints including DNS, email services, and web-based applications in attempts to prevent that one target from functioning. ",1,accept,T1499.002,Endpoint Denial of Service: Service Exhaustion Flood Botnet malware can launch distributed denial-of-service (DDoS) attacks targeting endpoints to flood traffic and overwhelm the target system with service exhaustion. ,1,accept,T1499.002,Endpoint Denial of Service: Service Exhaustion Flood Malware may use HTTP flooding or SSL renegotiation attacks to create a service exhaustion flood. ,1,accept,T1499.002,Endpoint Denial of Service: Service Exhaustion Flood Actors can attack targets in attempts to render them unusable to users through HTTP requests or renegotiating SSL/TSL crypto algorithms. ,1,accept,T1499.002,Endpoint Denial of Service: Service Exhaustion Flood Exhausting services with fake requests or protocol negotiations can be an affect way to prevent users from accessing the target. ,1,accept,T1499.002,Endpoint Denial of Service: Service Exhaustion Flood Industroyer uses a custom DoS tool that leverages CVE-2015-5374 and targets hardcoded IP addresses of Siemens SIPROTEC devices. ,1,accept,T1499.004,Endpoint Denial of Service: Application Or System Exploitation "Actors may try to exploit a vulnerability in an application or system to launch denial of service (DoS) attacks, some of these vulnerabilities include CVE-2021-45078, CVE-2021-45046, CVE-2021-44686, CVE-2021-44429, among thousands of others. ",1,accept,T1499.004,Endpoint Denial of Service: Application Or System Exploitation Some malware will attempt to cause applications or systems to crash by exploiting a vulnerability and denying service. ,1,accept,T1499.004,Endpoint Denial of Service: Application Or System Exploitation " Some actors will exploit vulnerabilities to force apps and systems to crash or restart, leaving it inaccessible by users. ",1,accept,T1499.004,Endpoint Denial of Service: Application Or System Exploitation " Exploitation of vulnerabilities can cause applications or systems to overflow and crash, and persistent re-exploitation can deny service completely. ",1,accept,T1499.004,Endpoint Denial of Service: Application Or System Exploitation Successful exploitation of certain vulnerabilities can result in denial-of-service attacks. ,1,accept,T1499.004,Endpoint Denial of Service: Application Or System Exploitation Web applications positioned on top of web servers are attractive targets during endpoint denial-of-service attacks. ,1,accept,T1499.003,Endpoint Denial of Service: Application Exhaustion Flood Public-facing apps are easily identifiable targets for denial of service. ,1,accept,T1499.003,Endpoint Denial of Service: Application Exhaustion Flood Application servers can be targeted for denial of service (DoS) attacks by simply repeating legitimate requests at a large scale. ,1,accept,T1499.003,Endpoint Denial of Service: Application Exhaustion Flood Legitimate apps and services are open targets for malware that repeats legitimate or spoofed requests to deny access by sheer volume. ,1,accept,T1499.003,Endpoint Denial of Service: Application Exhaustion Flood " Exhausting resources can cause real damage to a company, and threat actors will sometimes threaten specific applications (apps) with denial-of-service (DoS) to disrupt business operations at key points in time. ",1,accept,T1499.003,Endpoint Denial of Service: Application Exhaustion Flood ABK has the ability to identify the installed anti-virus product on the compromised host. ,1,accept,T1518.001,Software Discovery: Security Software Discovery Astaroth checks for the presence of Avast antivirus in the C:\Program\Files\ folder. ,1,accept,T1518.001,Software Discovery: Security Software Discovery Avenger has the ability to identify installed anti-virus products on a compromised host. ,1,accept,T1518.001,Software Discovery: Security Software Discovery BadPatch uses WMI to enumerate installed security products in the victim’s environment. ,1,accept,T1518.001,Software Discovery: Security Software Discovery Bazar can identify the installed antivirus engine. ,1,accept,T1518.001,Software Discovery: Security Software Discovery build_downer has the ability to detect if the infected host is running an anti-virus process. ,1,accept,T1518.001,Software Discovery: Security Software Discovery Carberp has queried the infected system's registry searching for specific registry keys associated with antivirus products. ,1,accept,T1518.001,Software Discovery: Security Software Discovery " CHOPSTICK checks for antivirus and forensics software. ;; Cobalt Group used a JavaScript backdoor that is capable of collecting a list of the security solutions installed on the victim's machine. ;; Comnie attempts to detect several anti-virus products. ;; CookieMiner has checked for the presence of Little Snitch"" macOS network monitoring and application firewall software stopping and exiting if it is found. ;; The main CozyCar dropper checks whether the victim has an anti-virus product installed. If the installed product is on a predetermined list the dropper will exit. ;; Crimson contains a command to collect information about anti-virus software on the victim. ;; Darkhotel has searched for anti-malware strings and anti-virus processes running on the system. ;; down_new has the ability to detect anti-virus products and processes on a compromised host. ;; DustySky checks for the existence of anti-virus. ;; Empire can enumerate antivirus software on the target. ;; Epic searches for anti-malware services running on the victim’s machine and terminates itself if it finds them. ;; EvilBunny has been observed querying installed antivirus software. ;; EVILNUM can search for anti-virus products on the system. ;; Felismus checks for processes associated with anti-virus vendors. ;; FELIXROOT checks for installed security software like antivirus and firewall. ;; FIN8 has used Registry keys to detect and avoid executing in potential sandboxes. ;; FinFisher probes the system to check for antimalware processes. ;; Flame identifies security software such as antivirus through the Security module. ;; FlawedAmmyy will attempt to detect anti-virus products during the initial infection. ;; Frankenstein has used WMI queries to detect if virtualization environments or analysis tools were running on the system. ;; Gold Dragon checks for anti-malware products and processes. ;; Grandoreiro can list installed security products including the Trusteer and Diebold Warsaw GAS Tecnologia online banking protections. ;; InvisiMole can check for the presence of network sniffers AV and BitDefender firewall. ;; JPIN checks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them. ;; jRAT can list security software such as by using WMIC to identify anti-virus products installed on the victim’s machine and to obtain firewall details. ;; Kasidet has the ability to identify any anti-virus installed on the infected system. ;; Metamorfo collects a list of installed antivirus software from the victim’s system. ;; Micropsia searches for anti-virus software and firewall products installed on the victim’s machine using WMI. ;; MoleNet can use WMI commands to check the system for firewall and antivirus software. ;; More_eggs can obtain information on installed anti-malware programs. ;; Mosquito's installer searches the Registry and system to see if specific antivirus tools are installed on the system. ;; MuddyWater has used malware to check running processes against a hard-coded list of security tools often used by malware researchers. ;; Naikon uses commands such as netsh advfirewall firewall to discover local firewall settings. ;; netsh can be used to discover system firewall settings. ;; Netwalker can detect and terminate active security software-related processes on infected systems. ;; NotPetya determines if specific antivirus programs are running on an infected host machine. ;; Operation Wocao has used scripts to detect security software. ;; Patchwork scanned the “Program Files” directories for a directory with the string “Total Security” (the installation path of the “360 Total Security” antivirus tool). ;; PipeMon can check for the presence of ESET and Kaspersky security software. ;; POWERSTATS has detected security tools. ;; POWRUNER may collect information on the victim's anti-virus software. ;; A module in Prikormka collects information from the victim about installed anti-virus software. ;; PUNCHBUGGY can gather AVs registered in the system. ;; Remsec has a plugin to detect active drivers of some security products. ;; Rocke used scripts which detected and uninstalled antivirus software. ;; RogueRobin enumerates running processes to search for Wireshark and Windows Sysinternals suite. ;; ROKRAT checks for debugging tools. ;; RTM can obtain information about security software on the victim. ;; Sidewinder has used the Windows service winmgmts:\.\root\SecurityCenter2 to check installed antivirus products. ;; Skidmap has the ability to check if /usr/sbin/setenforce exists. This file controls what mode SELinux is in. ;; StoneDrill can check for antivirus and antimalware programs. ;; StreamEx has the ability to scan for security tools such as firewalls and antivirus tools. ;; StrongPity can identify if ESET or BitDefender antivirus are installed before dropping its payload. ;; SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution. ;; T9000 performs checks for various antivirus and security products during installation. ;; TajMahal has the ability to identify which anti-virus products firewalls and anti-spyware products are in use. ;; Tasklist can be used to enumerate security software currently running on a system by process name of known products. ;; The White Company has checked for specific antivirus products on the target’s computer including Kaspersky Quick Heal AVG BitDefender Avira Sophos Avast! and ESET. ;; ThiefQuest uses the kill_unwanted function to get a list of running processes compares each process with an encrypted list of “unwanted” security related programs and kills the processes for security related programs. ;; Tropic Trooper can search for anti-virus software running on the system. ;; Turla has obtained information on security software including security logging information that may indicate whether their malware has been detected. ;; Valak can determine if a compromised host has security products installed. ;; VERMIN uses WMI to check for anti-virus software installed on the system. ;; Waterbear can find the presence of a specific security software. ;; Windshift has used malware to identify installed AV and commonly used forensic and malware analysis tools. ;; Wingbird checks for the presence of Bitdefender security software. ;; Wizard Spider has used WMI to identify anti-virus products installed on a victim's machine. ;; YAHOYAH checks for antimalware solution processes on the system. ;; Zeus Panda checks to see if anti-virus anti-spyware or firewall products are installed in the victim’s environment.""",1,accept,T1518.001,Software Discovery: Security Software Discovery APT29 has used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through. ,1,accept,T1016.001,System Network Configuration Discovery: Internet Connection Discovery GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through. ,1,accept,T1016.001,System Network Configuration Discovery: Internet Connection Discovery More_eggs has used HTTP GET requests to check internet connectivity. ,1,accept,T1016.001,System Network Configuration Discovery: Internet Connection Discovery Turla has used tracert to check internet connectivity. ,1,accept,T1016.001,System Network Configuration Discovery: Internet Connection Discovery UNC2452 has used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through.,1,accept,T1016.001,System Network Configuration Discovery: Internet Connection Discovery APT1 uses two utilities GETMAIL and MAPIGET to steal email. MAPIGET steals email still on Exchange servers that has not yet been archived. ,1,accept,T1114.002,Email Collection: Remote Email Collection APT28 has collected emails from victim Microsoft Exchange servers. ,1,accept,T1114.002,Email Collection: Remote Email Collection APT29 collected emails from specific individuals such as executives and IT staff using New-MailboxExportRequest followed by Get-MailboxExportRequest. ,1,accept,T1114.002,Email Collection: Remote Email Collection Chimera has harvested data from remote mailboxes including through execution of \\c$\Users\\AppData\Local\Microsoft\Outlook*.ost. ,1,accept,T1114.002,Email Collection: Remote Email Collection Dragonfly 2.0 accessed email accounts using Outlook Web Access. ,1,accept,T1114.002,Email Collection: Remote Email Collection FIN4 has accessed and hijacked online email communications using stolen credentials. ,1,accept,T1114.002,Email Collection: Remote Email Collection HAFNIUM has used web shells to export mailbox data. ,1,accept,T1114.002,Email Collection: Remote Email Collection Ke3chang used a .NET tool to dump data from Microsoft Exchange mailboxes. ;; Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords. ;; LightNeuron collects Exchange emails matching rules specified in its configuration. ;; MailSniper can be used for searching through email in Exchange and Office 365 environments. ;; Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials. ;; UNC2452 collected emails from specific individuals such as executives and IT staff using New-MailboxExportRequest followed by Get-MailboxExportRequest. ;; Valak can collect sensitive mailing information from Exchange servers including credentials and the domain certificate of an enterprise.,1,accept,T1114.002,Email Collection: Remote Email Collection Kimsuky has set auto-forward rules on victim's e-mail accounts. ,1,accept,T1114.003,Email Collection: Email Forwarding Rule Silent Librarian has set up auto forwarding rules on compromised e-mail accounts.,1,accept,T1114.003,Email Collection: Email Forwarding Rule Some groups will have their malware create email forwarding rules to gain control over a mail servers sent and received messages. ,1,accept,T1114.003,Email Collection: Email Forwarding Rule Email forwarding rules can grant malware the ability to retain control over a mail server even if the credentials have been changed. ,1,accept,T1114.003,Email Collection: Email Forwarding Rule Actors may use Microsoft Messaging API (MAPI) to modify email rule properties to conceal them from email clients and tools. ,1,accept,T1114.003,Email Collection: Email Forwarding Rule Information-motivated groups may use previously-compromised email credentials to set up email forwarding rules on multiple compromised accounts in attempts to cast a wide net to steal valuable data. ,1,accept,T1114.003,Email Collection: Email Forwarding Rule Threat groups may set up forwarding rules on compromised email accounts to gather more information and credentials. ,1,accept,T1114.003,Email Collection: Email Forwarding Rule Actors can use the ‘Get-MsolRoleMember’ PowerShell command-let (cmdlet) to get user role and permissions groups in Office 365. ,1,accept,T1087.004,Account Discovery: Cloud Account " In Azure, malware or actors may try to run commands to get user and group information, and this can be done with the ‘az ad user list’ command. ",1,accept,T1087.004,Account Discovery: Cloud Account " In Kubernetes, actors may try to run commands such as ‘kubectl config view -o jsonpath='{.users[*].name}'’ to get a list of all users or ‘kubectl config get-users’ to display users defined in the kubeconfig. ",1,accept,T1087.004,Account Discovery: Cloud Account " Actors or malware may run the AWS command ‘aws iam list-users’ to get users on a the account, or run ‘aws iam list-roles’ to get IAM role information. ",1,accept,T1087.004,Account Discovery: Cloud Account " For GCP, actors or malware may run the ‘gcloud iam service-accounts list’ or ‘gcloud projects get-iam-policy’ to obtain cloud account and project information. ",1,accept,T1087.004,Account Discovery: Cloud Account ,1,accept,T1136.003,Create Account: Cloud Account Some actors will create additional accounts on target cloud environments to deploy tools or other malicious activity. ,1,accept,T1136.003,Create Account: Cloud Account " Adversaries may create accounts that only have access to specific cloud services, which can reduce the chance of detection. ",1,accept,T1136.003,Create Account: Cloud Account Creating accounts on specific cloud systems with the correct permissions can allow malware or actors to conceal themselves while stealing data. ,1,accept,T1136.003,Create Account: Cloud Account Actors targeting cloud providers may create fake accounts to blend in with normal activity. ,1,accept,T1136.003,Create Account: Cloud Account " Malware or actors will sometimes create dedicated accounts for their targets, such as cloud providers, to maintain persistence in the environment. ",1,accept,T1136.003,Create Account: Cloud Account APT33 has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints. ,1,accept,T1078.004,Valid Accounts: Cloud Accounts APT28 has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes. ,1,accept,T1078.004,Valid Accounts: Cloud Accounts "Some threat actors will create legitimate accounts on targeted platforms or services, such as cloud providers, to elevate privileges and maintain persistence. ",1,accept,T1078.004,Valid Accounts: Cloud Accounts Threat actors and adversaries may create accounts with global administrator privileges on targeted cloud environment to steal large amounts of data. ,1,accept,T1078.004,Valid Accounts: Cloud Accounts Compromised credentials for cloud-related accounts can allow malware or actors to steal data and information by using authentic accounts for malicious purposes. ,1,accept,T1078.004,Valid Accounts: Cloud Accounts Using valid cloud accounts for malicious purposes is a good technique for actors and malware to remain under the radar while conducting nefarious activity. ,1,accept,T1078.004,Valid Accounts: Cloud Accounts Abusing trusted relationships of any cloud account given to employees is an effective means to conduct malicious activity. ,1,accept,T1078.004,Valid Accounts: Cloud Accounts APT29 used Kerberos ticket attacks for lateral movement. ,1,accept,T1550.003,Use Alternate Authentication Material: Pass The Ticket APT32 successfully gained remote access by using pass the ticket. ,1,accept,T1550.003,Use Alternate Authentication Material: Pass The Ticket BRONZE BUTLER has created forged Kerberos Ticket Granting Ticket (TGT) and Ticket Granting Service (TGS) tickets to maintain administrative access. ,1,accept,T1550.003,Use Alternate Authentication Material: Pass The Ticket Mimikatz’s LSADUMP::DCSync and KERBEROS::PTT modules implement the three steps required to extract the krbtgt account hash and create/use Kerberos tickets. ,1,accept,T1550.003,Use Alternate Authentication Material: Pass The Ticket Pupy can also perform pass-the-ticket. ,1,accept,T1550.003,Use Alternate Authentication Material: Pass The Ticket Some SeaDuke samples have a module to use pass the ticket with Kerberos for authentication.,1,accept,T1550.003,Use Alternate Authentication Material: Pass The Ticket The APT1 group is known to have used pass the hash. ,1,accept,T1550.002,Use Alternate Authentication Material: Pass The Hash APT28 has used pass the hash for lateral movement. ,1,accept,T1550.002,Use Alternate Authentication Material: Pass The Hash APT32 has used pass the hash for lateral movement. ,1,accept,T1550.002,Use Alternate Authentication Material: Pass The Hash Chimera has dumped password hashes for use in pass the hash authentication attacks. ,1,accept,T1550.002,Use Alternate Authentication Material: Pass The Hash Cobalt Strike can perform pass the hash. ,1,accept,T1550.002,Use Alternate Authentication Material: Pass The Hash CrackMapExec can pass the hash to authenticate via SMB. ,1,accept,T1550.002,Use Alternate Authentication Material: Pass The Hash Empire can perform pass the hash attacks. ,1,accept,T1550.002,Use Alternate Authentication Material: Pass The Hash GALLIUM used dumped hashes to authenticate to other machines via pass the hash. ;; HOPLIGHT has been observed loading several APIs associated with Pass the Hash. ;; Kimsuky has used pass the hash for authentication to remote access software used in C2. ;; Mimikatz's SEKURLSA::Pth module can impersonate a user with only a password hash to execute arbitrary commands. ;; Night Dragon used pass-the-hash tools to gain usernames and passwords. ;; Pass-The-Hash Toolkit can perform pass the hash. ;; PoshC2 has a number of modules that leverage pass the hash for lateral movement.,1,accept,T1550.002,Use Alternate Authentication Material: Pass The Hash Threat actors may try to collect cloud log data and subsequently disable the logs to hide their activity. ,1,accept,T1562.008,Impair Defenses: Disable Cloud Logs Malware or actors may disable cloud logs in Amazon Web Services (AWS) with commands like ‘StopLogging’ and ‘DeleteTrail’. ,1,accept,T1562.008,Impair Defenses: Disable Cloud Logs Disabling logs in cloud environments can allow actors or malware to conceal their malicious activity. ,1,accept,T1562.008,Impair Defenses: Disable Cloud Logs " In efforts to conceal their actions, adversaries may disable cloud logs in GCP while deploying other apps or containers. ",1,accept,T1562.008,Impair Defenses: Disable Cloud Logs Adversaries may disable event logging in Kubernetes to hide their deployment applications or containers on a target environment. ,1,accept,T1562.008,Impair Defenses: Disable Cloud Logs Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files.,1,accept,T1546.004,Event Triggered Execution: Unix Shell Configuration Modification Some malware will maintain persistence via rc.local and .bashrc files. ,1,accept,T1546.004,Event Triggered Execution: Unix Shell Configuration Modification " On Linux and Unix systems, malware may try to maintain persistence by using bash scripts. ",1,accept,T1546.004,Event Triggered Execution: Unix Shell Configuration Modification " Login environments, such as .bash or ZSH, can be used by malware to create events that are launched on every boot or login. ",1,accept,T1546.004,Event Triggered Execution: Unix Shell Configuration Modification " Using shell commands contained in files, actors can instruct infected hosts to launch specific events at pre-determined times. ",1,accept,T1546.004,Event Triggered Execution: Unix Shell Configuration Modification Many actors and malware will use login environments to force an infected machine to execute scripts at any specified time. ,1,accept,T1546.004,Event Triggered Execution: Unix Shell Configuration Modification Adversaries may attempt to modify cloud firewall settings to allow connections for further downloads or uploads. ,1,accept,T1562.007,Impair Defenses: Disable Or Modify Cloud Firewall " Some actors and malware will disable cloud firewall settings for short periods of time to allow connections, and then restore restrictions to avoid detection. ",1,accept,T1562.007,Impair Defenses: Disable Or Modify Cloud Firewall Malware that manipulates cloud firewall settings can allow threat actors to steal data and resources. ,1,accept,T1562.007,Impair Defenses: Disable Or Modify Cloud Firewall " If actors get control of a cloud firewall, they will be able to change settings to allow further malicious activity. ",1,accept,T1562.007,Impair Defenses: Disable Or Modify Cloud Firewall " Modifying or disabling a cloud firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. ",1,accept,T1562.007,Impair Defenses: Disable Or Modify Cloud Firewall "Reverting cloud infrastructure instances allows malware and actors to conduct malicious activities, and then revert to a clean state to hide their actions. ",1,accept,T1578.004,Modify Cloud Compute Infrastructure: Revert Cloud Instance Actors can hide their malicious activity while in cloud instances by restoring the virtual machine to a previous state. ,1,accept,T1578.004,Modify Cloud Compute Infrastructure: Revert Cloud Instance Restoring a virtual machine to its original state after malicious activity has been completed is a good technique to conceal malicious activity. ,1,accept,T1578.004,Modify Cloud Compute Infrastructure: Revert Cloud Instance Adversaries may restore cloud environments to previous snapshots once cybercriminal activity has been completed. ,1,accept,T1578.004,Modify Cloud Compute Infrastructure: Revert Cloud Instance Actors and malware can take advantage of ephemeral storage types because they often restart/reset once the VM is stopped or rebooted. ,1,accept,T1578.004,Modify Cloud Compute Infrastructure: Revert Cloud Instance Threat actors may delete a cloud instance or virtual machine to hide their malicious activity. ,1,accept,T1578.003,Modify Cloud Compute Infrastructure: Delete Cloud Instance " CloudTrail logs, in Amazon Web Services (AWS), can capture cloud instance deletion in the ‘TerminateInstaces’ event. ",1,accept,T1578.003,Modify Cloud Compute Infrastructure: Delete Cloud Instance " Within Google’s Admin Activity audit logs, the Cloud Audit logs can detect when instances or virtual machines (VMs) are deleted via the gcloud ‘compute instances delete’ command. ",1,accept,T1578.003,Modify Cloud Compute Infrastructure: Delete Cloud Instance " In Kubernetes, malware or threat actors may attempt to remove finalizers (finalizer key) prior to deleting a cloud instance. ",1,accept,T1578.003,Modify Cloud Compute Infrastructure: Delete Cloud Instance " Deleting evidence of malicious operations, such as manipulating or removing cloud instances or VMs, may be done by actors or malware to conceal their operations. ",1,accept,T1578.003,Modify Cloud Compute Infrastructure: Delete Cloud Instance Malware may attempt to modify existing cloud infrastructure by creating new snapshots to steal resources or data. ,1,accept,T1578.001,Modify Cloud Compute Infrastructure: Create Snapshot Cybercriminals may create snapshots on cloud systems and grant only themselves access to it establish or maintain persistence. ,1,accept,T1578.001,Modify Cloud Compute Infrastructure: Create Snapshot Creating a snapshot with firewall-restricted access in a cloud instance can give adversaries concealed access and persistence on a target system. ,1,accept,T1578.001,Modify Cloud Compute Infrastructure: Create Snapshot Actors may create a snapshot on a virtual hard drive or volume from which to maintain access onto a target’s system. ,1,accept,T1578.001,Modify Cloud Compute Infrastructure: Create Snapshot Actors can create snapshots on cloud systems to launch attacks from. ,1,accept,T1578.001,Modify Cloud Compute Infrastructure: Create Snapshot "On Google Admin Activity audit logs, actors can use the command ‘gcloud compute instances create’ to create a new cloud instance. ",1,accept,T1578.002,Modify Cloud Compute Infrastructure: Create Cloud Instance Adversaries may a new virtual machine to launch attacks from and evade defenses. ,1,accept,T1578.002,Modify Cloud Compute Infrastructure: Create Cloud Instance Threat actors can create a new cloud instance to bypass firewall rules and permissions that may exist in an account. ,1,accept,T1578.002,Modify Cloud Compute Infrastructure: Create Cloud Instance Cybercriminals can utilize cloud systems by creating new instances that are hidden from view and do not affect the targets operations. ,1,accept,T1578.002,Modify Cloud Compute Infrastructure: Create Cloud Instance Actors may setup their own infrastructure in a target network by creating cloud instances with custom security settings to avoid detection. ,1,accept,T1578.002,Modify Cloud Compute Infrastructure: Create Cloud Instance APT29 staged data and files in password-protected archives on a victim's OWA server. ,1,accept,T1074.002,Data Staged: Remote Data Staging Chimera has staged stolen data on designated servers in the target environment. ,1,accept,T1074.002,Data Staged: Remote Data Staging FIN6 actors have compressed data from remote systems and moved it to another staging system before exfiltration. ,1,accept,T1074.002,Data Staged: Remote Data Staging FIN8 aggregates staged data from a network into a single location. ,1,accept,T1074.002,Data Staged: Remote Data Staging menuPass has staged data on remote MSP systems or other victim networks prior to exfiltration. ,1,accept,T1074.002,Data Staged: Remote Data Staging Night Dragon has copied files to company web servers and subsequently downloaded them. ,1,accept,T1074.002,Data Staged: Remote Data Staging Threat Group-3390 has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration. ,1,accept,T1074.002,Data Staged: Remote Data Staging UNC2452 staged data and files in password-protected archives on a victim's OWA server.,1,accept,T1074.002,Data Staged: Remote Data Staging Sandworm Team defaced approximately 15 000 websites belonging to Georgian government non-government and private sector organizations in 2019.,1,accept,T1491.002,Defacement: External Defacement Threat actors who want to make a socioeconomical point or deliver a message may deface well-known websites to ensure their point is seen. ,1,accept,T1491.002,Defacement: External Defacement Some websites are defaced by hacktivists or malware in attempts to gather support from other adversaries to accomplish an objective. ,1,accept,T1491.002,Defacement: External Defacement " Cybercriminals of lower sophisticated are typically the ones that deface websites, however, advanced groups such as Sandworm Team have defaced thousands of websites. ",1,accept,T1491.002,Defacement: External Defacement Some state-sponsored groups may use website defacement as a diversionary tactic to distract from their true objectives. ,1,accept,T1491.002,Defacement: External Defacement Website defacements may be used to setup future attacks as an initial access point. ,1,accept,T1491.002,Defacement: External Defacement APT29 has added credentials to OAuth Applications and Service Principals. ,1,accept,T1098.001,Account Manipulation: Additional Cloud Credentials UNC2452 added credentials to OAuth Applications and Service Principals.,1,accept,T1098.001,Account Manipulation: Additional Cloud Credentials Threat actors may add their own credentials into a created or compromised cloud service account to setup legitimate services on a system under their control. ,1,accept,T1098.001,Account Manipulation: Additional Cloud Credentials " Some malware and actors will gain illicit access to an account that inside a cloud environment, such as AWS, GCP, or Kubernetes, and credentials for own accounts. ",1,accept,T1098.001,Account Manipulation: Additional Cloud Credentials " If an actor can breach cloud accounts with the correct privileges, there are numerous ways the adversary could add their own credentials into a target system. ",1,accept,T1098.001,Account Manipulation: Additional Cloud Credentials PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.,1,accept,T1547.014,Boot or Logon Autostart Execution: Active Setup Cybercriminals may manipulate Active Setup by adding a registry key so that the malicious key will be executed when a user logs in. ,1,accept,T1547.014,Boot or Logon Autostart Execution: Active Setup Threat actors can maintain persistence on a machine by adding a registry to the Active Setup on Windows operating systems. ,1,accept,T1547.014,Boot or Logon Autostart Execution: Active Setup An actor can add registry keys to Windows Active Setup to execute programs from a user’s account every time he/she/them logs in. ,1,accept,T1547.014,Boot or Logon Autostart Execution: Active Setup Malware may attempt to use Active Setup components on Windows systems to execute specific actions upon every login. ,1,accept,T1547.014,Boot or Logon Autostart Execution: Active Setup Active Setup components can be utilized by adversaries to force breached or compromised accounts to conduct malicious activity while disguised as a legitimate user. ,1,accept,T1547.014,Boot or Logon Autostart Execution: Active Setup Empire can use built-in modules to abuse trusted utilities like MSBuild.exe. ,1,accept,T1127.001,Trusted Developer Utilities Proxy Execution: Msbuild Frankenstein has used MSbuild to execute an actor-created file. ,1,accept,T1127.001,Trusted Developer Utilities Proxy Execution: Msbuild A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe presumably to bypass application control techniques.,1,accept,T1127.001,Trusted Developer Utilities Proxy Execution: Msbuild Adversaries may use MSBuild to proxy execution of code through a trusted Windows utility. ,1,accept,T1127.001,Trusted Developer Utilities Proxy Execution: Msbuild " Legitimate software, such as Windows’ Microsoft Build Engine (MSBuild.exe), can be abused by threat actors to execute malware under the guise of a trusted utility. ",1,accept,T1127.001,Trusted Developer Utilities Proxy Execution: Msbuild Malware or actors can bypass security features by using MSBuild to execute files that will be allowed by security controls because it is a trusted program. ,1,accept,T1127.001,Trusted Developer Utilities Proxy Execution: Msbuild Adversaries may tamper with SIP and trust provider components to mislead the operating system and application control tools when conducting signature validation checks. ,1,accept,T1553.003,Subvert Trust Controls: Sip And Trust Provider Hijacking Subject Interface Packages (SIPs) can be manipulated by threat actors to trick operating systems into executing code that could otherwise blocked by security features. ,1,accept,T1553.003,Subvert Trust Controls: Sip And Trust Provider Hijacking Cybercriminals or malware may try to change trust controls that only allow code execution from software with valid digital certificates to conduct malicious activity. ,1,accept,T1553.003,Subvert Trust Controls: Sip And Trust Provider Hijacking Actors may try to subvert operating system (OS) trust controls to hide from security solutions when executing malware. ,1,accept,T1553.003,Subvert Trust Controls: Sip And Trust Provider Hijacking Threat actors or groups are known to try to hijack OS trust provider architecture to allow execution of code that does not have a valid digital certificate. ,1,accept,T1553.003,Subvert Trust Controls: Sip And Trust Provider Hijacking Egregor can modify the GPO to evade detection. ,1,accept,T1484.001,Domain Policy Modification: Group Policy Modification Empire can use New-GPOImmediateTask to modify a GPO that will install and execute a malicious Scheduled Task/Job. ,1,accept,T1484.001,Domain Policy Modification: Group Policy Modification Indrik Spider has used Group Policy Objects to deploy batch scripts.,1,accept,T1484.001,Domain Policy Modification: Group Policy Modification "Adversaries may modify group policy objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on the domain. ",1,accept,T1484.001,Domain Policy Modification: Group Policy Modification " Threat actors can use GPOs (virtual collection of policy settings) to force infect machines to connect to command and control (C2) IPs, domains, or servers for further malicious activity. ",1,accept,T1484.001,Domain Policy Modification: Group Policy Modification " Policy settings for groups on Windows operating systems (OSs) can be used to created scheduled tasks for persistence, download payloads, modify settings, and steal data. ",1,accept,T1484.001,Domain Policy Modification: Group Policy Modification " Group policy objects can be modified by cybercriminals to disable tools, elevate privileges, establish persistence, and execute code, among numerous other malicious activities. ",1,accept,T1484.001,Domain Policy Modification: Group Policy Modification " Malicious GPO modifications can be used to implement many other malicious behaviors such as Scheduled Task/Job, Disable or Modify Tools, Ingress Tool Transfer, Create Account, Service Execution, and more. ",1,accept,T1484.001,Domain Policy Modification: Group Policy Modification Empire can add a SID-History to a user if on a domain controller. ,1,accept,T1134.005,Access Token Manipulation: Sid Mimikatz's MISC::AddSid module can appended any SID or user/group account to a user's SID-History. Mimikatz also utilizes SID-History Injection to expand the scope of other components such as generated Kerberos Golden Tickets and DCSync beyond a single domain.,1,accept,T1134.005,Access Token Manipulation: Sid Adversaries may use SID-History Injection to escalate privileges and bypass access controls. ,1,accept,T1134.005,Access Token Manipulation: Sid Cybercriminals can manipulate the Windows security identifier (SID) to gather user account history and identifiers to impersonate other users or groups to conduct malicious activity. ,1,accept,T1134.005,Access Token Manipulation: Sid User account and group information stored in Sid-history can be stolen by threat actors to masquerade as legitimate users while launching attacks. ,1,accept,T1134.005,Access Token Manipulation: Sid Bazar can inject into a target process using process doppelgänging. ,1,accept,T1055.013,Process Injection: Process Doppelgänging Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems. ,1,accept,T1055.013,Process Injection: Process Doppelgänging SynAck abuses NTFS transactions to launch and conceal malicious processes.,1,accept,T1055.013,Process Injection: Process Doppelgänging Adversaries may inject malicious code into process via process doppelgänging to evade process-based defenses as well as possibly elevate privileges. ,1,accept,T1055.013,Process Injection: Process Doppelgänging Process doppelgänging is a method of executing arbitrary code in the address space of a separate live process. ,1,accept,T1055.013,Process Injection: Process Doppelgänging Cobalt Strike can spawn processes with alternate PPIDs. ,1,accept,T1134.004,Access Token Manipulation: Parent Pid Spoofing PipeMon can use parent PID spoofing to elevate privileges.,1,accept,T1134.004,Access Token Manipulation: Parent Pid Spoofing Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to elevate privileges. ,1,accept,T1134.004,Access Token Manipulation: Parent Pid Spoofing Cybercriminals can create fake PPIDs for their malicious activity to elevate privileges or evade security defenses. ,1,accept,T1134.004,Access Token Manipulation: Parent Pid Spoofing Parent process identifiers can be spoofed by actors or malware to allow and conceal execution of malicious processes. ,1,accept,T1134.004,Access Token Manipulation: Parent Pid Spoofing InvisiMole can disconnect previously connected remote drives. ,1,accept,T1070.005,Indicator Removal on Host: Network Share Connection Removal The net use \system\share /delete command can be used in Net to remove an established connection to a network share. ,1,accept,T1070.005,Indicator Removal on Host: Network Share Connection Removal RobbinHood disconnects all network shares from the computer with the command net use * /DELETE /Y. ,1,accept,T1070.005,Indicator Removal on Host: Network Share Connection Removal Threat Group-3390 has detached network shares after exfiltrating files likely to evade detection.,1,accept,T1070.005,Indicator Removal on Host: Network Share Connection Removal Adversaries may remove share connections that are no longer useful to clean up traces of their operation. ,1,accept,T1070.005,Indicator Removal on Host: Network Share Connection Removal ADVSTORESHELL has used rundll32.exe in a Registry value to establish persistence. ,1,accept,T1218.011,Signed Binary Proxy Execution: Rundll32 APT19 configured its payload to inject into the rundll32.exe. ,1,accept,T1218.011,Signed Binary Proxy Execution: Rundll32 APT28 executed CHOPSTICK by using rundll32 commands such as rundll32.exe “C:\Windows\twain_64.dll”. APT28 also executed a .dll for a first stage dropper using rundll32.exe. An APT28 loader Trojan saved a batch script that uses rundll32 to execute a DLL payload. ,1,accept,T1218.011,Signed Binary Proxy Execution: Rundll32 APT29 has used Rundll32.exe to execute payloads. ,1,accept,T1218.011,Signed Binary Proxy Execution: Rundll32 APT3 has a tool that can run DLLs. ,1,accept,T1218.011,Signed Binary Proxy Execution: Rundll32 APT32 malware has used rundll32.exe to execute an initial infection process. ,1,accept,T1218.011,Signed Binary Proxy Execution: Rundll32 APT41 has used rundll32.exe to execute a loader. ,1,accept,T1218.011,Signed Binary Proxy Execution: Rundll32 " Attor's installer plugin can schedule rundll32.exe to load the dispatcher. ;; Bisonal uses rundll32.exe to execute as part of the Registry Run key it adds: HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Run\”vert” = “rundll32.exe c:\windows\temp\pvcu.dll Qszdez”. ;; BLINDINGCAN has used Rundll32 to load a malicious DLL. ;; Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using rundll32.exe. ;; Briba uses rundll32 within Registry Run Keys / Startup Folder entries to execute malicious DLLs. ;; Carbanak installs VNC server software that executes through rundll32. ;; Comnie uses Rundll32 to load a malicious DLL. ;; CopyKittens uses rundll32 to load various tools on victims including a lateral movement tool named Vminst Cobalt Strike and shellcode. ;; CORESHELL is installed via execution of rundll32 with an export named init"" or ""InitW."" ;; The CozyCar dropper copies the system file rundll32.exe to the install location for the malware then uses the copy of rundll32.exe to load and execute the main CozyCar component. ;; DDKONG uses Rundll32 to ensure only a single instance of itself is running at once. ;; Egregor has used rundll32 during execution. ;; After copying itself to a DLL file a variant of Elise calls the DLL file using rundll32.exe. ;; Variants of Emissary have used rundll32.exe in Registry values added to establish persistence. ;; EVILNUM can execute commands and scripts through rundll32. ;; FatDuke can execute via rundll32. ;; FELIXROOT uses Rundll32 for executing the dropper program. ;; Rundll32.exe is used as a way of executing Flame at the command-line. ;; Gamaredon Group malware has used rundll32 to launch additional malicious components. ;; A gh0st RAT variant has used rundll32 for execution. ;; GreyEnergy uses PsExec locally in order to execute rundll32.exe at the highest privileges (NTAUTHORITY\SYSTEM). ;; HAFNIUM has used rundll32 to load malicious DLLs. ;; InvisiMole has used rundll32.exe for execution. ;; JHUHUGIT is executed using rundll32.exe. ;; Koadic can use Rundll32 to execute additional payloads. ;; KONNI has used Rundll32 to execute its loader for privilege escalation purposes. ;; Kwampirs uses rundll32.exe in a Registry value added to establish persistence. ;; Matryoshka uses rundll32.exe in a Registry Run key value for execution as part of its persistence mechanism. ;; MegaCortex has used rundll32.exe to load a DLL for file encryption. ;; Mosquito's launcher uses rundll32.exe in a Registry Key value to start the main backdoor capability. ;; MuddyWater has used malware that leveraged rundll32.exe in a Registry Run key to execute a .dll. ;; NOKKI has used rundll32 for execution. ;; NotPetya uses rundll32.exe to install itself on remote systems when accessed via PsExec or wmic. ;; PolyglotDuke can be executed using rundll32.exe. ;; PowerDuke uses rundll32.exe to load. ;; Prikormka uses rundll32.exe to load its DLL. ;; Pteranodon executes functions using rundll32.exe. ;; PUNCHBUGGY can load a DLL using Rundll32. ;; Ragnar Locker has used rundll32.exe to execute components of VirtualBox. ;; RTM runs its core DLL file using rundll32.exe. ;; Sakula calls cmd.exe to run various DLL files via rundll32. ;; Sandworm Team used a backdoor which could execute a supplied DLL using rundll32.exe. ;; ServHelper contains a module for downloading and executing DLLs that leverages rundll32.exe. ;; Sibot has executed downloaded DLLs with rundll32.exe. ;; StreamEx uses rundll32 to call an exported function. ;; SUNBURST used Rundll32 to execute payloads. ;; TA505 has leveraged rundll32.exe to execute malicious DLLs. ;; TA551 has used rundll32.exe to load malicious DLLs. ;; UNC2452 used Rundll32 to execute payloads. ;; USBferry can execute rundll32.exe in memory to avoid detection. ;; The Winnti for Windows installer loads a DLL using rundll32. ;; ZxShell has used rundll32.exe to execute other DLLs and named pipes. """,1,accept,T1218.011,Signed Binary Proxy Execution: Rundll32 Ebury can hook logging functions so that nothing from the backdoor gets sent to the logging facility. ,1,accept,T1562.006,Impair Defenses: Indicator Blocking Waterbear can hook the ZwOpenProcess and GetExtendedTcpTable APIs called by the process of a security product to hide PIDs and TCP records from detection.,1,accept,T1562.006,Impair Defenses: Indicator Blocking An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. ,1,accept,T1562.006,Impair Defenses: Indicator Blocking " Actors or malware may prevent IOCs from their operations from being detected with redirections, disabling security tools, or changing the telemetry flow inside a target environment. ",1,accept,T1562.006,Impair Defenses: Indicator Blocking Cybercriminals can block indicators and event traffic on compromised systems to avoid detection. ,1,accept,T1562.006,Impair Defenses: Indicator Blocking APT29 has bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key. ,1,accept,T1606.001,Forge Web Credentials: Web Cookies UNC2452 bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key.,1,accept,T1606.001,Forge Web Credentials: Web Cookies Adversaries may forge web cookies that can be used to gain access to web applications or Internet services. ,1,accept,T1606.001,Forge Web Credentials: Web Cookies " Generating cookies for web apps often requires previously known or illicitly-acquired information, but once created these spoofed web cookies. ",1,accept,T1606.001,Forge Web Credentials: Web Cookies Some actors and malware may create fake web cookies for to access additional resources. ,1,accept,T1606.001,Forge Web Credentials: Web Cookies APT29 changed domain federation trust settings using Azure AD administrative permissions to configure the domain to accept authorization tokens signed by their own SAML signing certificate. ,1,accept,T1484.002,Domain Policy Modification: Domain Trust Modification UNC2452 changed domain federation trust settings using Azure AD administrative permissions to configure the domain to accept authorization tokens signed by their own SAML signing certificate.,1,accept,T1484.002,Domain Policy Modification: Domain Trust Modification Adversaries may add new domain trusts or modify the properties of existing domain trusts to evade defenses and/or elevate privileges. ,1,accept,T1484.002,Domain Policy Modification: Domain Trust Modification Manipulating the domain trusts may allow an adversary to escalate privileges and/or evade defenses by modifying settings to add objects which they control. ,1,accept,T1484.002,Domain Policy Modification: Domain Trust Modification " Actors or malware can modify domain trust settings for the next phase of the attack, such as communicating to domains that may otherwise be unreachable. ",1,accept,T1484.002,Domain Policy Modification: Domain Trust Modification ADVSTORESHELL achieves persistence by adding itself to the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key. ,1,accept,T1547.001,Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder Agent Tesla can add itself to the Registry as a startup program to establish persistence. ,1,accept,T1547.001,Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder APT18 establishes persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key. ,1,accept,T1547.001,Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder An APT19 HTTP malware variant establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\. ,1,accept,T1547.001,Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder APT28 has deployed malware that has copied itself to the startup directory for persistence. ,1,accept,T1547.001,Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder APT29 added Registry Run keys to establish persistence. ,1,accept,T1547.001,Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder APT3 places scripts in the startup folder for persistence. ,1,accept,T1547.001,Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder APT32 established persistence using Registry Run keys both to execute PowerShell and VBS scripts as well as to execute their backdoor directly. ;; APT33 has deployed a tool known as DarkComet to the Startup folder of a victim and used Registry run keys to gain persistence. ;; APT37's has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\. ;; APT39 has maintained persistence using the startup folder. ;; APT41 created and modified startup files for persistence. APT41 added a registry key in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost to establish persistence for Cobalt Strike. ;; Aria-body has established persistence via the Startup folder or Run Registry key. ;; Astaroth creates a startup item for persistence. ;; BabyShark has added a Registry key to ensure all future macros are enabled for Microsoft Word and Excel as well as for additional persistence. ;; Backdoor.Oldrea adds Registry Run keys to achieve persistence. ;; BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory. ;; BADNEWS installs a registry Run key to establish persistence. ;; BadPatch establishes a foothold by adding a link to the malware executable in the startup folder. ;; Bazar can create or add files to Registry Run Keys to establish persistence. ;; BBSRAT has been loaded through DLL side-loading of a legitimate Citrix executable that is set to persist through the Registry Run key location HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssonsvr.exe. ;; Bisonal adds itself to the Registry key HKEY_CURRENT_USER\Software\Microsoft\CurrentVersion\Run\ for persistence. ;; BitPaymer has set the run key HKCU\Software\Microsoft\Windows\CurrentVersion\Run for persistence. ;; The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder. ;; Briba creates run key Registry entries pointing to malicious DLLs dropped to disk. ;; BRONZE BUTLER has used a batch script that adds a Registry Run key to establish malware persistence. ;; build_downer has the ability to add itself to the Registry Run key for persistence. ;; Carbanak stores a configuration files in the startup directory to automatically execute commands in order to persist across reboots. ;; Carberp has maintained persistence by placing itself inside the current user's startup folder. ;; Cardinal RAT establishes Persistence by setting the HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load Registry key to point to its executable. ;; ChChes establishes persistence by adding a Registry Run key. ;; Cobalt Group has used Registry Run keys for persistence. The group has also set a Startup path to launch the PowerShell shell command and download Cobalt Strike. ;; Cobian RAT creates an autostart Registry key to ensure persistence. ;; Comnie achieves persistence by adding a shortcut of itself to the startup path in the Registry. ;; CORESHELL has established persistence by creating autostart extensibility point (ASEP) Registry entries in the Run key and other Registry keys as well as by creating shortcuts in the Internet Explorer Quick Start folder. ;; One persistence mechanism used by CozyCar is to set itself to be executed at system startup by adding a Registry value under one of the following Registry keys: HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ;; CrossRAT uses run keys for persistence on Windows ;; Dark Caracal's version of Bandook adds a registry key to HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run for persistence. ;; DarkComet adds several Registry entries to enable automatic execution at every system startup. ;; Darkhotel has been known to establish persistence by adding programs to the Run Registry key. ;; DownPaper uses PowerShell to add a Registry Run key in order to establish persistence. ;; Dragonfly 2.0 added the registry value ntdll to the Registry Run key to establish persistence. ;; DustySky achieves persistence by creating a Registry entry in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. ;; If establishing persistence by installation as a new service fails one variant of Elise establishes persistence for the created .exe file by setting the following Registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\svchost : %APPDATA%\Microsoft\Network\svchost.exe. Other variants have set the following Registry keys for persistence: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\imejp : [self] and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\IAStorD. ;; Variants of Emissary have added Run Registry keys to establish persistence. ;; Emotet has been observed adding the downloaded payload to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to maintain persistence. ;; Empire can modify the registry run keys HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run for persistence. ;; EvilBunny has created Registry keys for persistence in [HKLM|HKCU]\…\CurrentVersion\Run. ;; EvilGrab adds a Registry Run key for ctfmon.exe to establish persistence. ;; EVILNUM can achieve persistence through the Registry Run key. ;; FatDuke has used HKLM\SOFTWARE\Microsoft\CurrentVersion\Run to establish persistence. ;; FELIXROOT adds a shortcut file to the startup folder for persistence. ;; FIN10 has established persistence by using the Registry option in PowerShell Empire to add a Run key. ;; FIN6 has used Registry Run keys to establish persistence for its downloader tools known as HARDTACK and SHIPBREAD. ;; FIN7 malware has created Registry Run and RunOnce keys to establish persistence and has also added items to the Startup folder. ;; Final1stspy creates a Registry Run key to establish persistence. ;; FinFisher establishes persistence by creating the Registry key HKCU\Software\Microsoft\Windows\Run. ;; FLASHFLOOD achieves persistence by making an entry in the Registry's Run key. ;; Gamaredon Group tools have registered Run keys in the registry to give malicious VBS files persistence. ;; Gazer can establish persistence by creating a .lnk file in the Start menu. ;; gh0st RAT has added a Registry Run key to establish persistence. ;; Gold Dragon establishes persistence in the Startup folder. ;; Gorgon Group malware can create a .lnk file and add a Registry Run key to establish persistence. ;; Grandoreiro can use run keys and create link files in the startup folder for persistence. ;; GRIFFON has used a persistence module that stores the implant inside the Registry which executes at logon. ;; GuLoader can establish persistence via the Registry under HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce. ;; Hancitor has added Registry Run keys to establish persistence. ;; Helminth establishes persistence by creating a shortcut in the Start Menu folder. ;; Hi-Zor creates a Registry Run key to establish persistence. ;; Higaisa added a spoofed binary to the start-up folder for persistence. ;; Honeybee uses a batch file that configures the ComSysApp service to autostart in order to establish persistence. ;; HTTPBrowser has established persistence by setting the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key value for wdm to the path of the executable. It has also used the Registry entry HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run vpdn “%ALLUSERPROFILE%\%APPDATA%\vpdn\VPDN_LU.exe” to establish persistence. ;; IcedID has established persistence by creating a Registry run key. ;; Inception has maintained persistence by modifying Registry run key value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\. ;; Some InnaputRAT variants establish persistence by modifying the Registry key HKU\\Software\Microsoft\Windows\CurrentVersion\Run:%appdata%\NeutralApp\NeutralApp.exe. ;; InvisiMole can place a lnk file in the Startup Folder to achieve persistence. ;; Ixeshe can achieve persistence by adding itself to the HKCU\Software\Microsoft\Windows\CurrentVersion\Run Registry key. ;; JCry has created payloads in the Startup directory to maintain persistence. ;; JHUHUGIT has used a Registry Run key to establish persistence by executing JavaScript code within the rundll32.exe process. ;; Kasidet creates a Registry Run key to establish persistence. ;; Kazuar adds a sub-key under several Registry run keys. ;; Several Ke3chang backdoors achieved persistence by adding a Run key. ;; Kimsuky has placed scripts in the startup folder for persistence. ;; A version of KONNI drops a Windows shortcut into the Startup folder to establish persistence. ;; Lazarus Group malware attempts to maintain persistence by saving itself in the Start menu folder or by adding a Registry Run key. ;; Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor. ;; LoJax has modified the Registry key ‘HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute’ from ‘autocheck autochk ’ to ‘autocheck autoche,1,accept,T1547.001,Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder APT32 has used mshta.exe for code execution. ,1,accept,T1218.005,Signed Binary Proxy Execution: Mshta BabyShark has used mshta.exe to download and execute applications from a remote server. ,1,accept,T1218.005,Signed Binary Proxy Execution: Mshta FIN7 has used mshta.exe to execute VBScript to execute malicious code on victim systems. ,1,accept,T1218.005,Signed Binary Proxy Execution: Mshta Inception has used malicious HTA files to drop and execute malware. ,1,accept,T1218.005,Signed Binary Proxy Execution: Mshta Kimsuky has used mshta.exe to run malicious scripts on the system. ,1,accept,T1218.005,Signed Binary Proxy Execution: Mshta Koadic can use MSHTA to serve additional payloads. ,1,accept,T1218.005,Signed Binary Proxy Execution: Mshta Lazarus Group has used mshta.exe to run malicious scripts and download programs. ,1,accept,T1218.005,Signed Binary Proxy Execution: Mshta Metamorfo has used mshta.exe to execute a HTA payload. ;; MuddyWater has used mshta.exe to execute its POWERSTATS payload and to pass a PowerShell one-liner for execution. ;; Mustang Panda has used mshta.exe to launch collection scripts. ;; NanHaiShu uses mshta.exe to load its program and files. ;; POWERSTATS can use Mshta.exe to execute additional payloads on compromised hosts. ;; Revenge RAT uses mshta.exe to run malicious scripts on the system. ;; Sibot has been executed via MSHTA application. ;; Sidewinder has used mshta.exe to execute malicious payloads. ;; TA551 has used mshta.exe to execute malicious payloads. ;; Xbash can use mshta for executing scripts.,1,accept,T1218.005,Signed Binary Proxy Execution: Mshta Agent Tesla has achieved persistence via scheduled tasks. ,1,accept,T1053.005,Scheduled Task/Job: Scheduled Task Anchor can create a scheduled task for persistence. ,1,accept,T1053.005,Scheduled Task/Job: Scheduled Task AppleJeus has created a scheduled SYSTEM task that runs when a user logs in. ,1,accept,T1053.005,Scheduled Task/Job: Scheduled Task APT-C-36 has used a macro function to set scheduled tasks disguised as those used by Google. ,1,accept,T1053.005,Scheduled Task/Job: Scheduled Task APT29 used scheduler and schtasks to create new tasks on remote hosts as part of lateral movement. They have manipulated scheduled tasks by updating an existing legitimate task to execute their tools and then returned the scheduled task to its original configuration. APT29 also created a scheduled task to maintain SUNSPOT persistence when the host booted during the 2020 SolarWinds intrusion. They previously used named and hijacked scheduled tasks to also establish persistence. ,1,accept,T1053.005,Scheduled Task/Job: Scheduled Task " An APT3 downloader creates persistence by creating the following scheduled task: schtasks /create /tn mysc"" /tr C:\Users\Public\test.exe /sc ONLOGON /ru ""System"". ",1,accept,T1053.005,Scheduled Task/Job: Scheduled Task APT32 has used scheduled tasks to persist on victim systems. ,1,accept,T1053.005,Scheduled Task/Job: Scheduled Task " APT33 has created a scheduled task to execute a .vbe file multiple times a day. ;; APT39 has created scheduled tasks for persistence. ;; APT41 used a compromised account to create a scheduled task on a system. ;; Attor's installer plugin can schedule a new task that loads the dispatcher on boot/logon. ;; BabyShark has used scheduled tasks to maintain persistence. ;; BackConfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host. ;; BADNEWS creates a scheduled task to establish by executing a malicious payload every subsequent minute. ;; Bazar can create a scheduled task for persistence. ;; Blue Mockingbird has used Windows Scheduled Tasks to establish persistence on local and remote hosts. ;; BONDUPDATER persists using a scheduled task that executes every minute. ;; BRONZE BUTLER has used schtasks to register a scheduled task to execute malware during lateral movement. ;; Carbon creates several tasks for later execution to continue persistence on the victim’s machine. ;; Chimera has used scheduled tasks to invoke Cobalt Strike including through batch script schtasks /create /ru ""SYSTEM"" /tn ""update"" /tr ""cmd /c c:\windows\temp\update.bat"" /sc once /f /st and to maintain persistence. ;; Cobalt Group has created Windows tasks to establish persistence. ;; ComRAT has used a scheduled task to launch its PowerShell loader. ;; CosmicDuke uses scheduled tasks typically named ""Watchmon Service"" for persistence. ;; One persistence mechanism used by CozyCar is to register itself as a scheduled task. ;; Crutch has the ability to persist using scheduled tasks. ;; CSPY Downloader can use the schtasks utility to bypass UAC. ;; Dragonfly 2.0 used scheduled tasks to automatically log out of created accounts every 8 hours as well as to execute malicious files. ;; Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware. ;; Dyre has the ability to achieve persistence by adding a new task in the task scheduler to run every minute. ;; Emotet has maintained persistence through a scheduled task. ;; Empire has modules to interact with the Windows task scheduler. ;; EvilBunny has executed commands via scheduled tasks. ;; FIN10 has established persistence by using S4U tasks as well as the Scheduled Task option in PowerShell Empire. ;; FIN6 has used scheduled tasks to establish persistence for various malware it uses including downloaders known as HARDTACK and SHIPBREAD and FrameworkPOS. ;; FIN7 malware has created scheduled tasks to establish persistence. ;; FIN8 has used scheduled tasks to maintain RDP backdoors. ;; Fox Kitten has used Scheduled Tasks for persistence and to load and execute a reverse proxy binary. ;; Frankenstein has established persistence through a scheduled task using the command: /Create /F /SC DAILY /ST 09:00 /TN WinUpdate /TR named ""WinUpdate"". ;; GALLIUM established persistence for PoisonIvy by created a scheduled task. ;; Gamaredon Group has created a scheduled task to launch an executable every 10 minutes. ;; Gazer can establish persistence by creating a scheduled task. ;; GoldMax has used scheduled tasks to maintain persistence. ;; Goopy has the ability to maintain persistence by creating scheduled tasks set to run every hour. ;; GravityRAT creates a scheduled task to ensure it is re-executed everyday. ;; GRIFFON has used sctasks for persistence. ;; Helminth has used a scheduled task for persistence. ;; Higaisa dropped and added officeupdate.exe to scheduled tasks. ;; HotCroissant has attempted to install a scheduled task named “Java Maintenance64” on startup to establish persistence. ;; IcedID has created a scheduled task that executes every hour to establish persistence. ;; InvisiMole has used scheduled tasks named MSST and \Microsoft\Windows\Autochk\Scheduled to establish persistence. ;; IronNetInjector has used a task XML file named mssch.xml to run an IronPython script when a user logs in or when specific system events are created. ;; ISMInjector creates scheduled tasks to establish persistence. ;; JHUHUGIT has registered itself as a scheduled task to run each time the current user logs in. ;; Lucifer has established persistence by creating the following scheduled task schtasks /create /sc minute /mo 1 /tn QQMusic ^ /tr C:Users\%USERPROFILE%\Downloads\spread.exe /F. ;; The different components of Machete are executed by Windows Task Scheduler. ;; Machete has created scheduled tasks to maintain Machete's persistence. ;; Matryoshka can establish persistence by adding a Scheduled Task named ""Microsoft Boost Kernel Optimization"". ;; Maze has created scheduled tasks using name variants such as ""Windows Update Security"" ""Windows Update Security Patches"" and ""Google Chrome Security Update"" to launch Maze at a specific time. ;; MCMD can use scheduled tasks for persistence. ;; menuPass has used a script (atexec.py) to execute a command on a target machine via Task Scheduler. ;; Molerats has created scheduled tasks to persistently run VBScripts. ;; MuddyWater has used scheduled tasks to establish persistence. ;; Mustang Panda has created a scheduled task to execute additional malicious software as well as maintain persistence. ;; NETWIRE can create a scheduled task to establish persistence. ;; NotPetya creates a task to reboot the system one hour after infection. ;; OilRig has created scheduled tasks that run a VBScript to execute a payload on victim machines. ;; Okrum's installer can attempt to achieve persistence by creating a scheduled task. ;; OopsIE creates a scheduled task to run itself every three minutes. ;; Operation Wocao has used scheduled tasks to execute malicious PowerShell code on remote systems. ;; A Patchwork file stealer can run a TaskScheduler DLL to add persistence. ;; PowerSploit's New-UserPersistenceOption Persistence argument can be used to establish via a Scheduled Task/Job. ;; POWERSTATS has established persistence through a scheduled task using the command ”C:\Windows\system32\schtasks.exe” /Create /F /SC DAILY /ST 12:00 /TN MicrosoftEdge /TR “c:\Windows\system32\wscript.exe C:\Windows\temp\Windows.vbe”. ;; POWRUNER persists through a scheduled task that executes it every minute. ;; Pteranodon schedules tasks to invoke its components in order to establish persistence. ;; QUADAGENT creates a scheduled task to maintain persistence on the victim’s machine. ;; QuasarRAT contains a .NET wrapper DLL for creating and managing scheduled tasks for maintaining persistence upon reboot. ;; Ramsay can schedule tasks via the Windows COM API to maintain persistence. ;; Rancor launched a scheduled task to gain persistence using the schtasks /create /sc command. ;; Remexi utilizes scheduled tasks as a persistence mechanism. ;; RemoteCMD can execute commands remotely by creating a new schedule task on the remote system ;; Revenge RAT schedules tasks to run malicious scripts at different intervals. ;; RTM tries to add a scheduled task to establish persistence. ;; Ryuk can remotely create a scheduled task to execute itself on a system. ;; schtasks is used to schedule tasks on a Windows system to run at a specific date and time. ;; ServHelper contains modules that will use schtasks to carry out malicious operations. ;; Shamoon copies an executable payload to the target system by using SMB/Windows Admin Shares and then scheduling an unnamed task to execute the malware. ;; SharpStage has a persistence component to write a scheduled task for the payload. ;; Sibot has been executed via a scheduled task. ;; Silence has used scheduled tasks to stage its operation. ;; Smoke Loader launches a scheduled task. ;; SoreFang can gain persistence through use of scheduled tasks. ;; SQLRat has created scheduled tasks in %appdata%\Roaming\Microsoft\Templates\. ;; Stealth Falcon malware creates a scheduled task entitled “IE Web Cache” to execute a malicious file hourly. ;; TEMP.Veles has used scheduled task XML triggers. ;; TrickBot creates a scheduled task on the system that provides persistence. ;; UNC2452 used scheduler and schtasks to create new tasks on remote hosts as part of lateral movement. They also manipulated scheduled tasks by updating an existing legitimate task to execute their tools and then returned the scheduled task to its original configuration. UNC2452 also created a scheduled task to maintain SUNSPOT persistence when the host booted. ;; Valak has used scheduled tasks to execute additional payloads and to gain persistence on a compromised host. ;; Wizard Spider has used scheduled tasks establish persistence for TrickBot and other malware. ;; yty establishes persistence by creating a scheduled task with the command SchTasks /Create /SC DAILY /TN BigData /TR “ + path_file + “/ST 09:30“. ;; Zebrocy has a command to create a scheduled task for persistence. ;; zwShell has used SchTasks for execution.""",1,accept,T1053.005,Scheduled Task/Job: Scheduled Task "Chimera has gathered the SYSTEM registry and ntds.dit files from target systems. Chimera specifically has used the NtdsAudit tool to dump the password hashes of domain users via cmsadcs.exe NTDS.dit"" -s ""SYSTEM"" -p RecordedTV_pdmp.txt --users-csv RecordedTV_users.csv and used ntdsutil to copy the Active Directory database. ",1,accept,T1003.003,OS Credential Dumping: Ntds CrackMapExec can dump hashed passwords associated with Active Directory using Windows' Directory Replication Services API (DRSUAPI) or Volume Shadow Copy. ,1,accept,T1003.003,OS Credential Dumping: Ntds Dragonfly 2.0 dropped and executed SecretsDump to dump password hashes. They also obtained ntds.dit from domain controllers. ,1,accept,T1003.003,OS Credential Dumping: Ntds esentutl can use Volume Shadow Copy to copy locked files such as ntds.dit. ,1,accept,T1003.003,OS Credential Dumping: Ntds FIN6 has used Metasploit’s PsExec NTDSGRAB module to obtain a copy of the victim's Active Directory database. ,1,accept,T1003.003,OS Credential Dumping: Ntds Fox Kitten has used Volume Shadow Copy to access credential information from NTDS. ,1,accept,T1003.003,OS Credential Dumping: Ntds HAFNIUM has stolen copies of the Active Directory database (NTDS.DIT). ,1,accept,T1003.003,OS Credential Dumping: Ntds " SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information from NTDS.dit. ;; Koadic can gather hashed passwords by gathering domain controller hashes from NTDS. ;; menuPass has used Ntdsutil to dump credentials. ;; Mustang Panda has used vssadmin to create a volume shadow copy and retrieve the NTDS.dit file. Mustang Panda has also used reg save on the SYSTEM file Registry location to help extract the NTDS.dit file. ;; Wizard Spider has gained access to credentials via exported copies of the ntds.dit Active Directory database.""",1,accept,T1003.003,OS Credential Dumping: Ntds AppleJeus has been installed via MSI installer. ,1,accept,T1218.007,Signed Binary Proxy Execution: Msiexec Duqu has used msiexec to execute malicious Windows Installer packages. Additionally a PROPERTY=VALUE pair containing a 56-bit encryption key has been used to decrypt the main payload from the installer packages. ,1,accept,T1218.007,Signed Binary Proxy Execution: Msiexec Grandoreiro can use MSI files to execute DLLs. ,1,accept,T1218.007,Signed Binary Proxy Execution: Msiexec IcedID can inject itself into a suspended msiexec.exe process to send beacons to C2 while appearing as a normal msi application. ,1,accept,T1218.007,Signed Binary Proxy Execution: Msiexec Javali has used the MSI installer to download and execute malicious payloads. ,1,accept,T1218.007,Signed Binary Proxy Execution: Msiexec LoudMiner used an MSI installer to install the virtualization software. ,1,accept,T1218.007,Signed Binary Proxy Execution: Msiexec Machete has used msiexec to install the Machete malware. ,1,accept,T1218.007,Signed Binary Proxy Execution: Msiexec Maze has delivered components for its ransomware attacks using MSI files some of which have been executed from the command-line using msiexec. ;; Melcoz can use MSI files with embedded VBScript for execution. ;; Metamorfo has used MsiExec.exe to automatically execute files. ;; Molerats has used msiexec.exe to execute an MSI payload. ;; Ragnar Locker has been delivered as an unsigned MSI package that was executed with msiexec.exe. ;; Rancor has used msiexec to download and execute malicious installer files over HTTP. ;; RemoteUtilities can use Msiexec to install a service. ;; TA505 has used msiexec to download and execute malicious Windows Installer files. ;; ZIRCONIUM has used the msiexec.exe command-line utility to download and execute malicious MSI files.,1,accept,T1218.007,Signed Binary Proxy Execution: Msiexec APT32 has moved and renamed pubprn.vbs to a .txt file to avoid detection. ,1,accept,T1036.003,Masquerading: Rename System Utilities The CozyCar dropper has masqueraded a copy of the infected system's rundll32.exe executable that was moved to the malware's install directory and renamed according to a predefined configuration file. ,1,accept,T1036.003,Masquerading: Rename System Utilities GALLIUM used a renamed cmd.exe file to evade detection. ,1,accept,T1036.003,Masquerading: Rename System Utilities menuPass has renamed certutil and moved it to a different location on the system to avoid detection based on use of the tool.,1,accept,T1036.003,Masquerading: Rename System Utilities Adversaries may rename legitimate system utilities to try to evade security mechanisms concerning the usage of those utilities. ,1,accept,T1036.003,Masquerading: Rename System Utilities Carberp has hooked several Windows API functions during its Man in the Browser attack to steal credentials. ,1,accept,T1056.004,Input Capture: Credential Api Hooking Empire contains some modules that leverage API hooking to carry out tasks such as netripper. ,1,accept,T1056.004,Input Capture: Credential Api Hooking FinFisher hooks processes by modifying IAT pointers to CreateWindowEx. ,1,accept,T1056.004,Input Capture: Credential Api Hooking NOKKI uses the Windows call SetWindowsHookEx and begins injecting it into every GUI process running on the victim's machine. ,1,accept,T1056.004,Input Capture: Credential Api Hooking PLATINUM is capable of using Windows hook interfaces for information gathering such as credential access. ,1,accept,T1056.004,Input Capture: Credential Api Hooking RDFSNIFFER hooks several Win32 API functions to hijack elements of the remote system management user-interface. ,1,accept,T1056.004,Input Capture: Credential Api Hooking TrickBot has the ability to capture RDP credentials by capturing the CredEnumerateA API ,1,accept,T1056.004,Input Capture: Credential Api Hooking Ursnif has hooked APIs to perform a wide variety of information theft such as monitoring traffic from browsers. ;; Zebrocy installs an application-defined Windows hook to get notified when a network drive has been attached so it can then use the hook to call its RecordToFile file stealing method. ;; Zeus Panda hooks processes by leveraging its own IAT hooked functions. ;; ZxShell hooks several API functions to spawn system threads.,1,accept,T1056.004,Input Capture: Credential Api Hooking SDBbot has the ability to use image file execution options for persistence if it detects it is running with admin privileges on a Windows version newer than Windows 7. ,1,accept,T1546.012,Event Triggered Execution: Image File Execution Options Injection SUNBURST created an Image File Execution Options (IFEO) Debugger registry value for the process dllhost.exe to trigger the installation of Cobalt Strike. ,1,accept,T1546.012,Event Triggered Execution: Image File Execution Options Injection TEMP.Veles has modified and added entries within HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options to maintain persistence.,1,accept,T1546.012,Event Triggered Execution: Image File Execution Options Injection Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by Image File Execution Options (IFEO) debuggers. ,1,accept,T1546.012,Event Triggered Execution: Image File Execution Options Injection Threat actors can use the IFEO registry key for loading DLLs into running processes. ,1,accept,T1546.012,Event Triggered Execution: Image File Execution Options Injection FIN7 has used application shim databases for persistence. ,1,accept,T1546.011,Event Triggered Execution: Application Shimming Pillowmint has used a malicious shim database to maintain persistence. ,1,accept,T1546.011,Event Triggered Execution: Application Shimming SDBbot has the ability to use application shimming for persistence if it detects it is running as admin on Windows XP or 7 by creating a shim database to patch services.exe. ,1,accept,T1546.011,Event Triggered Execution: Application Shimming ShimRat has installed shim databases in the AppPatch folder.,1,accept,T1546.011,Event Triggered Execution: Application Shimming Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims. ,1,accept,T1546.011,Event Triggered Execution: Application Shimming APT39 has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence. ,1,accept,T1546.010,Event Triggered Execution: Appinit Dlls " Some variants of Cherry Picker use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows AppInit_DLLs""=""pserver32.dll"" ",1,accept,T1546.010,Event Triggered Execution: Appinit Dlls Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key. ,1,accept,T1546.010,Event Triggered Execution: Appinit Dlls " If a victim meets certain criteria T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL ResN32.dll. It does this by creating the following Registry keys: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs – %APPDATA%\Intel\ResN32.dll and HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs – 0x1.""",1,accept,T1546.010,Event Triggered Execution: Appinit Dlls Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes. ,1,accept,T1546.010,Event Triggered Execution: Appinit Dlls Honeybee's service-based DLL implant can execute a downloaded file with parameters specified using CreateProcessAsUser. ,1,accept,T1546.009,Event Triggered Execution: Appcert Dlls PUNCHBUGGY can establish using a AppCertDLLs Registry key.,1,accept,T1546.009,Event Triggered Execution: Appcert Dlls Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppCert DLLs loaded into processes. ,1,accept,T1546.009,Event Triggered Execution: Appcert Dlls " Threat actors can use AppCertDLLs, which are loaded by numerous processes during their first launch, to force applications to load malicious code or execute malware. ",1,accept,T1546.009,Event Triggered Execution: Appcert Dlls " Malware can use AppCert dynamic link libraries (dylibs, DLLs) to force application to load dylibs of their choosing every time an application is launched. ",1,accept,T1546.009,Event Triggered Execution: Appcert Dlls Agent Tesla has used process hollowing to create and manipulate processes through sections of unmapped memory by reallocating that space with its malicious code. ,1,accept,T1055.012,Process Injection: Process Hollowing Astaroth can create a new process in a suspended state from a targeted legitimate process in order to unmap its memory and replace it with malicious code. ,1,accept,T1055.012,Process Injection: Process Hollowing Azorult can decrypt the payload into memory create a new suspended process of itself then inject a decrypted payload to the new process and resume new process execution. ,1,accept,T1055.012,Process Injection: Process Hollowing BADNEWS has a command to download an .exe and use process hollowing to inject it into a new process. ,1,accept,T1055.012,Process Injection: Process Hollowing Bandook has been launched by starting iexplore.exe and replacing it with Bandook's payload. ,1,accept,T1055.012,Process Injection: Process Hollowing Bazar can inject into a target process including Svchost Explorer and cmd using process hollowing. ,1,accept,T1055.012,Process Injection: Process Hollowing BBSRAT has been seen loaded into msiexec.exe through process hollowing to hide its execution. ,1,accept,T1055.012,Process Injection: Process Hollowing Cobalt Strike can use process hollowing for execution. ;; Denis performed process hollowing through the API calls CreateRemoteThread ResumeThread and Wow64SetThreadContext. ;; Dtrack has used process hollowing shellcode to target a predefined list of processes from %SYSTEM32%. ;; Duqu is capable of loading executable code via process hollowing. ;; Gorgon Group malware can use process hollowing to inject one of its trojans into another process. ;; ISMInjector hollows out a newly created process RegASM.exe and injects its payload into the hollowed process. ;; Lokibot has used process hollowing to inject into legitimate Windows process vbc.exe. ;; menuPass has used process hollowing in iexplore.exe to load the RedLeaves implant. ;; The NETWIRE payload has been injected into benign Microsoft executables via process hollowing. ;; Some Orz versions have an embedded DLL known as MockDll that uses process hollowing and Regsvr32 to execute another payload. ;; A Patchwork payload uses process hollowing to hide the UAC bypass vulnerability exploitation inside svchost.exe. ;; Smoke Loader spawns a new copy of c:\windows\syswow64\explorer.exe and then replaces the executable code in memory with malware. ;; A Threat Group-3390 tool can spawn svchost.exe and inject the payload into that process. ;; TrickBot injects into the svchost.exe process. ;; Ursnif has used process hollowing to inject into child processes.,1,accept,T1055.012,Process Injection: Process Hollowing Epic has overwritten the function pointer in the extra window memory of Explorer's Shell_TrayWnd in order to execute malicious code in the context of the explorer.exe process. ,1,accept,T1055.011,Process Injection: Extra Window Memory Injection Power Loader overwrites Explorer’s Shell_TrayWnd extra window memory to redirect execution to a NTDLL function that is abused to assemble and execute a return-oriented programming (ROP) chain and create a malicious thread within Explorer.exe.,1,accept,T1055.011,Process Injection: Extra Window Memory Injection "North Korean actors often inject arbitrary code into legitimate processes, possibly through abusing the additional memory provided by EWM. ",1,accept,T1055.011,Process Injection: Extra Window Memory Injection The threat actor TEMP.Splinter employs the tactic of code injection via the Extra Window Memory to evade detection by security software. ,1,accept,T1055.011,Process Injection: Extra Window Memory Injection " Chinese-nexus apt group APT27 often abuse EWM to inject code into a different process, escalating the privileges of their malicious code to the privileges of the hijacked process. ",1,accept,T1055.011,Process Injection: Extra Window Memory Injection Ursnif has injected code into target processes via thread local storage callbacks.,1,accept,T1055.005,Process Injection: Thread Local Storage "The MAZE ransomware can evade detection through the injection of code into different processes, achieved via injecting the code into thread local storage callbacks. ",1,accept,T1055.005,Process Injection: Thread Local Storage Diavol Ransomware can escalate it's privileges through injecting code into a process through thread local storage. ,1,accept,T1055.005,Process Injection: Thread Local Storage FIN13 often evades detection through granting their malware the ability to inject code into processes via thread local storage callbacks. ,1,accept,T1055.005,Process Injection: Thread Local Storage Bazar Ransomware escalates it's privileges via code injection through thread local storage. ,1,accept,T1055.005,Process Injection: Thread Local Storage Attor performs the injection by attaching its code into the APC queue using NtQueueApcThread API. ,1,accept,T1055.004,Process Injection: Asynchronous Procedure Call Carberp has queued an APC routine to explorer.exe by calling ZwQueueApcThread. ,1,accept,T1055.004,Process Injection: Asynchronous Procedure Call IcedID has used ZwQueueApcThread to inject itself into remote processes. ,1,accept,T1055.004,Process Injection: Asynchronous Procedure Call InvisiMole can inject its code into a trusted process via the APC queue. ,1,accept,T1055.004,Process Injection: Asynchronous Procedure Call Pillowmint has used the NtQueueApcThread syscall to inject code into svchost.exe. ,1,accept,T1055.004,Process Injection: Asynchronous Procedure Call " TURNEDUP is capable of injecting code into the APC queue of a created Rundll32 process as part of an Early Bird injection.""",1,accept,T1055.004,Process Injection: Asynchronous Procedure Call Gazer performs thread execution hijacking to inject its orchestrator into a running thread from a remote process. ,1,accept,T1055.003,Process Injection: Thread Execution Hijacking Trojan.Karagany can inject a suspended thread of its own process into a new process and initiate via the ResumeThread API. ,1,accept,T1055.003,Process Injection: Thread Execution Hijacking Waterbear can use thread injection to inject shellcode into the process of security software.,1,accept,T1055.003,Process Injection: Thread Execution Hijacking APT13 often employs the technique of thread injection hijacking to execute malicious code. ,1,accept,T1055.003,Process Injection: Thread Execution Hijacking " Through injecting its own process into another process thread, malware is often able to bypass security controls. ",1,accept,T1055.003,Process Injection: Thread Execution Hijacking Carbanak downloads an executable and injects it directly into a new process. ,1,accept,T1055.002,Process Injection: Portable Executable Injection Gorgon Group malware can download a remote access tool ShiftyBug and inject into another process. ,1,accept,T1055.002,Process Injection: Portable Executable Injection GreyEnergy has a module to inject a PE binary into a remote process. ,1,accept,T1055.002,Process Injection: Portable Executable Injection InvisiMole can inject its backdoor as a portable executable into a target process. ,1,accept,T1055.002,Process Injection: Portable Executable Injection PowerSploit reflectively loads a Windows PE file into a process. ,1,accept,T1055.002,Process Injection: Portable Executable Injection " Rocke's miner TermsHost.exe"" evaded defenses by injecting itself into Windows processes including Notepad.exe. ",1,accept,T1055.002,Process Injection: Portable Executable Injection " Zeus Panda checks processes on the system and if they meet the necessary requirements it injects into that process.""",1,accept,T1055.002,Process Injection: Portable Executable Injection Aria-body has the ability to inject itself into another process such as rundll32.exe and dllhost.exe. ,1,accept,T1055.001,Process Injection: Dynamic BlackEnergy injects its DLL component into svchost.exe. ,1,accept,T1055.001,Process Injection: Dynamic Carberp's bootkit can inject a malicious DLL into the address space of running processes. ,1,accept,T1055.001,Process Injection: Dynamic Carbon has a command to inject code into a process. ,1,accept,T1055.001,Process Injection: Dynamic Cobalt Strike has the ability to load DLLs via reflective injection. ,1,accept,T1055.001,Process Injection: Dynamic ComRAT has injected its orchestrator DLL into explorer.exe. ComRAT has also injected its communications module into the victim's default browser to make C2 connections appear less suspicious as all network connections will be initiated by the browser process. ,1,accept,T1055.001,Process Injection: Dynamic Conti has loaded an encrypted DLL into memory and then executes it. ,1,accept,T1055.001,Process Injection: Dynamic Derusbi injects itself into the secure shell (SSH) process. ;; Duqu will inject itself into different processes to evade detection. The selection of the target process is influenced by the security software that is installed on the system (Duqu will inject into different processes depending on which security suite is installed on the infected host). ;; Dyre injects into other processes to load modules. ;; Elise injects DLL files into iexplore.exe. ;; Emissary injects its DLL file into a newly spawned Internet Explorer process. ;; Emotet has been observed injecting in to Explorer.exe and other processes. ;; FinFisher injects itself into various processes depending on whether it is low integrity or high integrity. ;; Get2 has the ability to inject DLLs into processes. ;; HIDEDRV injects a DLL for Downdelph into the explorer.exe process. ;; IronNetInjector has the ability to inject a DLL into running processes including the IronNetInjector DLL into explorer.exe. ;; If running in a Windows environment Kazuar saves a DLL to disk that is injected into the explorer.exe process to execute the payload. Kazuar can also be configured to inject and execute within specific processes. ;; Koadic can perform process injection by using a reflective DLL. ;; A Lazarus Group malware sample performs reflective DLL injection. ;; Matryoshka uses reflective DLL injection to inject the malicious library and execute the RAT. ;; Maze has injected the malware DLL into a target process. ;; MegaCortex loads injecthelper.dll into a newly created rundll32.exe process. ;; Metamorfo has injected a malicious DLL into the Windows Media Player process (wmplayer.exe). ;; The Netwalker DLL has been injected reflectively into the memory of a legitimate running process. ;; PipeMon can inject its modules into various processes using reflective DLL loading. ;; PoisonIvy can inject a malicious DLL into a process. ;; PowerSploit contains a collection of CodeExecution modules that inject code (DLL shellcode) into a process. ;; Pupy can migrate into another process using reflective DLL injection. ;; An executable dropped onto victims by Putter Panda aims to inject the specified DLL into a process that would normally be accessing the network including Outlook Express (msinm.exe) Outlook (outlook.exe) Internet Explorer (iexplore.exe) and Firefox (firefox.exe). ;; Ramsay can use ImprovedReflectiveDLLInjection to deploy components. ;; After decrypting itself in memory RARSTONE downloads a DLL file from its C2 server and loads it in the memory space of a hidden Internet Explorer process. This “downloaded” file is actually not dropped onto the system. ;; RATANKBA performs a reflective DLL injection using a given pid. ;; Remsec can perform DLL injection. ;; SDBbot has the ability to inject a downloaded DLL into a newly created rundll32.exe process. ;; ShadowPad has injected a DLL into svchost.exe. ;; Socksbot creates a suspended svchost process and injects its DLL into it. ;; Sykipot injects itself into running instances of outlook.exe iexplore.exe or firefox.exe. ;; TA505 has been seen injecting a DLL into winword.exe. ;; TajMahal has the ability to inject DLLs for malicious plugins into running processes. ;; Tropic Trooper has injected a DLL backdoor into dllhost.exe and svchost.exe. ;; Turla has used Metasploit to perform reflective DLL injection in order to escalate privileges. ;; Wizard Spider has injected malicious DLLs into memory with read write and execute permissions. ;; ZxShell is injected into a shared SVCHOST process.,1,accept,T1055.001,Process Injection: Dynamic APT41 has used DGAs to change their C2 servers monthly. ,1,accept,T1568.002,Dynamic Resolution: Domain Generation Algorithms Aria-body has the ability to use a DGA for C2 communications. ,1,accept,T1568.002,Dynamic Resolution: Domain Generation Algorithms Astaroth has used a DGA in C2 communications. ,1,accept,T1568.002,Dynamic Resolution: Domain Generation Algorithms Bazar can implement DGA using the current date as a seed variable. ,1,accept,T1568.002,Dynamic Resolution: Domain Generation Algorithms BONDUPDATER uses a DGA to communicate with command and control servers. ,1,accept,T1568.002,Dynamic Resolution: Domain Generation Algorithms CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost. ,1,accept,T1568.002,Dynamic Resolution: Domain Generation Algorithms CHOPSTICK can use a DGA for Fallback Channels domains are generated by concatenating words from lists. ,1,accept,T1568.002,Dynamic Resolution: Domain Generation Algorithms Doki has used the DynDNS service and a DGA based on the Dogecoin blockchain to generate C2 domains. ;; Ebury has used a DGA to generate a domain name for C2. ;; Grandoreiro can use a DGA for hiding C2 addresses including use of an algorithm with a user-specific key that changes daily. ;; MiniDuke can use DGA to generate new Twitter URLs for C2. ;; Ngrok can provide DGA for C2 servers through the use of random URL strings that change every 12 hours. ;; POSHSPY uses a DGA to derive command and control URLs from a word list. ;; ShadowPad uses a DGA that is based on the day of the month for C2 servers. ;; TA551 has used a DGA to generate URLs from executed macros. ;; Ursnif has used a DGA to generate domain names for C2.,1,accept,T1568.002,Dynamic Resolution: Domain Generation Algorithms Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object. ,1,accept,T1546.015,Event Triggered Execution: Component Object Model Hijacking APT28 has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload. ,1,accept,T1546.015,Event Triggered Execution: Component Object Model Hijacking BBSRAT has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture. ,1,accept,T1546.015,Event Triggered Execution: Component Object Model Hijacking ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\Software\Classes\CLSID{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32. ,1,accept,T1546.015,Event Triggered Execution: Component Object Model Hijacking JHUHUGIT has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}). ,1,accept,T1546.015,Event Triggered Execution: Component Object Model Hijacking KONNI has modified ComSysApp service to load the malicious DLL payload. ,1,accept,T1546.015,Event Triggered Execution: Component Object Model Hijacking Mosquito uses COM hijacking as a method of persistence.,1,accept,T1546.015,Event Triggered Execution: Component Object Model Hijacking Fysbis has installed itself as an autostart entry under ~/.config/autostart/dbus-inotifier.desktop to establish persistence. ,1,accept,T1547.013,Boot or Logon Autostart Execution: Xdg Autostart Entries NETWIRE can use XDG Autostart Entries to establish persistence.,1,accept,T1547.013,Boot or Logon Autostart Execution: Xdg Autostart Entries Linux environments that rely upon XDG are vulnerable to malicious code execution upon startup. ,1,accept,T1547.013,Boot or Logon Autostart Execution: Xdg Autostart Entries " REvil often maintain persistence through code executed upon boot, via exploitation of XDG. ",1,accept,T1547.013,Boot or Logon Autostart Execution: Xdg Autostart Entries XDG autostart can allow for privilege escalation if malicious binaries exploit it's autorun on boot capabilities. ,1,accept,T1547.013,Boot or Logon Autostart Execution: Xdg Autostart Entries Empire can leverage its implementation of Mimikatz to obtain and use golden tickets. ,1,accept,T1558.001,Steal or Forge Kerberos Tickets: Golden Ticket Ke3chang has used Mimikatz to generate Kerberos golden tickets. ,1,accept,T1558.001,Steal or Forge Kerberos Tickets: Golden Ticket Mimikatz's kerberos module can create golden tickets.,1,accept,T1558.001,Steal or Forge Kerberos Tickets: Golden Ticket Ransomware such as DarkSide often steal KRBTGT account passwords with the intent to forge golden Kerberos keys. ,1,accept,T1558.001,Steal or Forge Kerberos Tickets: Golden Ticket " APT groups can authenticate all of their activity via granting them Kerberos tickets from a stolen, golden one. ",1,accept,T1558.001,Steal or Forge Kerberos Tickets: Golden Ticket SYNful Knock is malware that is inserted into a network device by patching the operating system image.,1,accept,T1601.001,Modify System Image: Patch System Image ESPecter can patch various windows functions to attribute to it malicious functionality. ,1,accept,T1601.001,Modify System Image: Patch System Image KEYHOLE PANDA can modify the OS to grant persistence. ,1,accept,T1601.001,Modify System Image: Patch System Image " Through damaging the OS via scripts, APT groups can bypass security mechanisms and achieve persistence. ",1,accept,T1601.001,Modify System Image: Patch System Image Magecart can modify the image of it's host system to obfuscate their malicious activity. ,1,accept,T1601.001,Modify System Image: Patch System Image ,1,accept,T1601.002,Modify System Image: Downgrade System Image "Conti ransomware can downgrade vulnerable drivers to older versions, exploiting previously patched vulnerabilities. ",1,accept,T1601.002,Modify System Image: Downgrade System Image Network devices can be downgraded to previous versions through techniques implemented by APT20. ,1,accept,T1601.002,Modify System Image: Downgrade System Image DarkSide ransomware can bypass detection through installing an older version of a network device and exploiting it's now vulnerable state. ,1,accept,T1601.002,Modify System Image: Downgrade System Image " ESPecter can install OS drivers of an older version, rendering them vulnerable to exploitation. ",1,accept,T1601.002,Modify System Image: Downgrade System Image " Care should be taken to maintain devices as if they are unprotected, malware can install older versions to exploit. ",1,accept,T1601.002,Modify System Image: Downgrade System Image ,1,accept,T1059.008,Command and Scripting Interpreter: Network Device Cli "APT17 can abuse the CLI on network devices to execute arbitrary, malicious code. ",1,accept,T1059.008,Command and Scripting Interpreter: Network Device Cli MAZE ransomware can achieve persistence through scripts executed via a network device CLI. ,1,accept,T1059.008,Command and Scripting Interpreter: Network Device Cli APT14 can acquire permissions of an administrator on many network devices and abuse the privileges that come with that permission when executing their own scripts. ,1,accept,T1059.008,Command and Scripting Interpreter: Network Device Cli Network devices should be secured as their CLI can access data that can be exploited by APT groups. ,1,accept,T1059.008,Command and Scripting Interpreter: Network Device Cli Malware can escalate privileges through abusing network device CLI administrator credentials. ,1,accept,T1059.008,Command and Scripting Interpreter: Network Device Cli ,1,accept,T1542.005,Pre Malware can abuse netbooting to achieve persistence. ,1,accept,T1542.005,Pre Pre OS boot operations may be hijacked by ransomware such as BazarLoader to obfuscate persistence mechanisms. ,1,accept,T1542.005,Pre Some variant CobaltStrike modules can abuse netbooting operations to execute malicious code. ,1,accept,T1542.005,Pre " Ransomware, once installed, can abuse pre OS boot operations to mask their presence on a system. ",1,accept,T1542.005,Pre APT groups will abuse insecure netbooting functionality to grant their malware persistence. ,1,accept,T1542.005,Pre ,1,accept,T1020.001,Automated Exfiltration: Traffic Duplication Maze can mirror traffic to obfuscate data exfiltration. ,1,accept,T1020.001,Automated Exfiltration: Traffic Duplication Threat actor PROMETHIUM can hide their data exfiltration through abusing functionality of some network analysis tools to duplicate network traffic. ,1,accept,T1020.001,Automated Exfiltration: Traffic Duplication CyberGate RAT masks it's C2 communication within mirrored traffic. ,1,accept,T1020.001,Automated Exfiltration: Traffic Duplication RedLine Stealer will exfiltrate data hidden within legitimate traffic. ,1,accept,T1020.001,Automated Exfiltration: Traffic Duplication The TEMP.Isotope campaign featured many instances of malware mirroring legitimate traffic to obfuscate malicious activity. ,1,accept,T1020.001,Automated Exfiltration: Traffic Duplication DarkSide ransomware will obfuscate it's activity via code injected into ROMMON. ,1,accept,T1542.004,Pre Malware can load firmware with malicious code into ROMMON to obfuscate activity. ,1,accept,T1542.004,Pre Specific CobaltStrike modules can achieve persistence via code injection into ROMMON. ,1,accept,T1542.004,Pre Malware with ROMMONkits can maintain persistence or obfuscate malicious activity. ,1,accept,T1542.004,Pre APT24 abuses ROM monitoring functionality to obfuscate their activity. ,1,accept,T1542.004,Pre SNMP can dump configuration data that malware can abuse if it proves to be vulnerable. ,1,accept,T1602.001,Data from Configuration Repository: Snmp (Mib Dump) Conti ransomware can determine vulnerabilities within configured security mechanisms by dumping the contents of a MIB database. ,1,accept,T1602.001,Data from Configuration Repository: Snmp (Mib Dump) CobaltStrike modules can utilize SNMP to determine vulnerable configurations for later exploitation. ,1,accept,T1602.001,Data from Configuration Repository: Snmp (Mib Dump) APT22 employs the technique of dumping the MIB database to learn about the vulnerabilities and strengths of a target during the Reconnaissance phase of an attack. ,1,accept,T1602.001,Data from Configuration Repository: Snmp (Mib Dump) Caution should be taken to secure configuration management systems as they can become a single point of failure for attackers to learn about a target system. ,1,accept,T1602.001,Data from Configuration Repository: Snmp (Mib Dump) User credentials should be stored securely on network devices so that adversaries cannot claim plaintext passwords and usernames if they are compromised. ,1,accept,T1602.002,Data from Configuration Repository: Network Device Configuration Dump APT13 can access offline storage of network devices to enumerate user credentials. ,1,accept,T1602.002,Data from Configuration Repository: Network Device Configuration Dump " BazarLoader can dump configuration details from active memory of a network device, and can then examine them for vulnerabilities. ",1,accept,T1602.002,Data from Configuration Repository: Network Device Configuration Dump " Host enumeration can occur if networks don't secure their memory, as neighbour details are stored in active memory. ",1,accept,T1602.002,Data from Configuration Repository: Network Device Configuration Dump Malware can dump the contents of non volatile memory to identify misconfigurations to exploit. ,1,accept,T1602.002,Data from Configuration Repository: Network Device Configuration Dump ,1,accept,T1600.002,Weaken Encryption: Disable Crypto Hardware "CozyBear can disable network device encryption, therefore exploiting weaker software encryption. ",1,accept,T1600.002,Weaken Encryption: Disable Crypto Hardware " Malware often has capabilities to bypass device encryption, as software encryption is often weaker, and easier to exploit. ",1,accept,T1600.002,Weaken Encryption: Disable Crypto Hardware " Adversaries such as Magecart will often skim data that is only encrypted by software, after having disabled the device encryption. ",1,accept,T1600.002,Weaken Encryption: Disable Crypto Hardware " Data exfiltration can be made easier if hardware device encryption is disabled, as it is often more difficult to bypass than software encryption. ",1,accept,T1600.002,Weaken Encryption: Disable Crypto Hardware CronRAT can exfiltrate data that was encrypted by a hardware device after disabling said encryption. ,1,accept,T1600.002,Weaken Encryption: Disable Crypto Hardware ,1,accept,T1600.001,Weaken Encryption: Reduce Key Space APT27 employs the technique of weakening encryption strength to ease data extraction. ,1,accept,T1600.001,Weaken Encryption: Reduce Key Space " Ransomware such as MAZE can reduce the number of cipher keys utilised in encryption, aiding in data access and exfiltration. ",1,accept,T1600.001,Weaken Encryption: Reduce Key Space " Threat actors can gain access to communications through weakening the cipher strength, often through the reduction of key space. ",1,accept,T1600.001,Weaken Encryption: Reduce Key Space Interception of data over communication can occur if ciphers are broken or weakened. ,1,accept,T1600.001,Weaken Encryption: Reduce Key Space Malware can reduce key space to ease the breaking of ciphers which could grant access to data or aid in exfiltration. ,1,accept,T1600.001,Weaken Encryption: Reduce Key Space InvisiMole can register itself for execution and persistence via the Control Panel. ,1,accept,T1218.002,Signed Binary Proxy Execution: Control Panel Reaver drops and executes a malicious CPL file as its payload.,1,accept,T1218.002,Signed Binary Proxy Execution: Control Panel Adversaries may abuse control.exe to proxy execution of malicious payloads. ,1,accept,T1218.002,Signed Binary Proxy Execution: Control Panel Some actors will use items in the control panel on Windows operating systems to execute malware. ,1,accept,T1218.002,Signed Binary Proxy Execution: Control Panel CPL files can be used to execute malicious code to bypass defenses. ,1,accept,T1218.002,Signed Binary Proxy Execution: Control Panel APT28 has routed traffic over Tor and VPN servers to obfuscate their activities. ,1,accept,T1090.003,Proxy: Multi A backdoor used by APT29 created a Tor hidden service to forward traffic from the Tor client to local ports 3389 (RDP) 139 (Netbios) and 445 (SMB) enabling full remote access from outside the network. ,1,accept,T1090.003,Proxy: Multi Attor has used Tor for C2 communication. ,1,accept,T1090.003,Proxy: Multi Dok downloads and installs Tor via homebrew. ,1,accept,T1090.003,Proxy: Multi FIN4 has used Tor to log in to victims' email accounts. ,1,accept,T1090.003,Proxy: Multi GreyEnergy has used Tor relays for Command and Control servers. ,1,accept,T1090.003,Proxy: Multi Inception used chains of compromised routers to proxy C2 communications between them and cloud service providers. ,1,accept,T1090.003,Proxy: Multi Keydnap uses a copy of tor2web proxy for HTTPS communications. ;; MacSpy uses Tor for command and control. ;; Operation Wocao has executed commands through the installed web shell via Tor exit nodes. ;; StrongPity can use multiple layers of proxy servers to hide terminal nodes in its infrastructure. ;; Traffic traversing the Tor network will be forwarded to multiple nodes before exiting the Tor network and continuing on to its intended destination. ;; Ursnif has used Tor for C2. ;; WannaCry uses Tor for command and control traffic.,1,accept,T1090.003,Proxy: Multi Agent Tesla has used SMTP for C2 communications. ,1,accept,T1071.003,Application Layer Protocol: Mail Protocols APT28 used SMTP as a communication channel in various implants initially using self-registered Google Mail accounts and later compromised email servers of its victims. ,1,accept,T1071.003,Application Layer Protocol: Mail Protocols APT32 has used email for C2 via an Office macro. ,1,accept,T1071.003,Application Layer Protocol: Mail Protocols BadPatch uses SMTP for C2. ,1,accept,T1071.003,Application Layer Protocol: Mail Protocols Cannon uses SMTP/S and POP3/S for C2 communications by sending and receiving emails. ,1,accept,T1071.003,Application Layer Protocol: Mail Protocols Various implementations of CHOPSTICK communicate with C2 over SMTP and POP3. ,1,accept,T1071.003,Application Layer Protocol: Mail Protocols ComRAT can use email attachments for command and control. ,1,accept,T1071.003,Application Layer Protocol: Mail Protocols CORESHELL can communicate over SMTP and POP3 for C2. ;; Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2. ;; JPIN can send email over SMTP. ;; Kimsuky has used e-mail to send exfiltrated data to C2 servers. ;; LightNeuron uses SMTP for C2. ;; NavRAT uses the email platform Naver for C2 communications leveraging SMTP. ;; OLDBAIT can use SMTP for C2. ;; RDAT can use email attachments for C2 communications. ;; Remsec is capable of using SMTP for C2. ;; SilverTerrier uses SMTP for C2 communications. ;; Turla has used multiple backdoors which communicate with a C2 server via email attachments. ;; Zebrocy uses SMTP and POP3 for C2.,1,accept,T1071.003,Application Layer Protocol: Mail Protocols Variants of Anchor can use DNS tunneling to communicate with C2. ,1,accept,T1071.004,Application Layer Protocol: Dns APT18 uses DNS for C2 communications. ,1,accept,T1071.004,Application Layer Protocol: Dns APT39 has used remote access tools that leverage DNS in communications with C2. ,1,accept,T1071.004,Application Layer Protocol: Dns APT41 used DNS for C2 communications. ,1,accept,T1071.004,Application Layer Protocol: Dns BONDUPDATER can use DNS and TXT records within its DNS tunneling protocol for command and control. ,1,accept,T1071.004,Application Layer Protocol: Dns Chimera has used Cobalt Strike to encapsulate C2 in DNS traffic. ,1,accept,T1071.004,Application Layer Protocol: Dns Cobalt Group has used DNS tunneling for C2. ,1,accept,T1071.004,Application Layer Protocol: Dns Cobalt Strike can use a custom command and control protocol that can encapsulated in DNS. All protocols use their standard assigned ports. ;; Cobian RAT uses DNS for C2. ;; Denis has used DNS tunneling for C2 communications. ;; Ebury has used DNS requests over UDP port 53 for C2. ;; FIN7 has performed C2 using DNS via A OPT and TXT records. ;; Goopy has the ability to communicate with its C2 over DNS. ;; Helminth can use DNS for C2. ;; HTTPBrowser has used DNS for command and control. ;; InvisiMole has used a custom implementation of DNS tunneling to embed C2 communications in DNS requests and replies. ;; Ke3chang malware RoyalDNS has used DNS for C2. ;; Matryoshka uses DNS for C2. ;; NanHaiShu uses DNS for the C2 communications. ;; OilRig has used DNS for C2. ;; Pisloader uses DNS as its C2 protocol. ;; PlugX can be configured to use DNS for command and control. ;; POWERSOURCE uses DNS TXT records for C2. ;; POWRUNER can use DNS for C2 communications. ;; QUADAGENT uses DNS for C2 communications. ;; RDAT has used DNS to communicate with the C2. ;; Remsec is capable of using DNS for C2. ;; ShadowPad has used DNS tunneling for C2 communications. ;; SOUNDBITE communicates via DNS for C2. ;; SUNBURST used DNS for C2 traffic designed to mimic normal SolarWinds API communications. ;; TEXTMATE uses DNS TXT records for C2. ;; Tropic Trooper's backdoor has communicated to the C2 over the DNS protocol. ;; WellMess has the ability to use DNS tunneling for C2 communications.,1,accept,T1071.004,Application Layer Protocol: Dns ,1,accept,T1599.001,Network Boundary Bridging: Network Address Translation Traversal Adversaries may bridge network boundaries by modifying a network device’s Network Address Translation (NAT) configuration. ,1,accept,T1599.001,Network Boundary Bridging: Network Address Translation Traversal Malicious modifications to NAT may enable an adversary to bypass restrictions on traffic routing that otherwise separate trusted and untrusted networks. ,1,accept,T1599.001,Network Boundary Bridging: Network Address Translation Traversal Actors may modify a target network by adding a bridge to gain access to other infrastructure that is normally protected. ,1,accept,T1599.001,Network Boundary Bridging: Network Address Translation Traversal Malware may try to gain access to sensitive information on other systems by adding a network bridge. ,1,accept,T1599.001,Network Boundary Bridging: Network Address Translation Traversal Cybercriminals can manipulate NATs by adding network bridges to bypass network boundaries. ,1,accept,T1599.001,Network Boundary Bridging: Network Address Translation Traversal ADVSTORESHELL can perform keylogging. ,1,accept,T1056.001,Input Capture: Keylogging Agent Tesla can log keystrokes on the victim’s machine. ,1,accept,T1056.001,Input Capture: Keylogging Ajax Security Team has used CWoolger and MPK custom-developed malware which recorded all keystrokes on an infected system. ,1,accept,T1056.001,Input Capture: Keylogging APT28 has used tools to perform keylogging. ,1,accept,T1056.001,Input Capture: Keylogging APT3 has used a keylogging tool that records keystrokes in encrypted files. ,1,accept,T1056.001,Input Capture: Keylogging APT32 has abused the PasswordChangeNotify to monitor for and capture account password changes. ,1,accept,T1056.001,Input Capture: Keylogging APT38 used a Trojan called KEYLIME to capture keystrokes from the victim’s machine. ,1,accept,T1056.001,Input Capture: Keylogging APT39 has used tools for capturing keystrokes. ;; APT41 used a keylogger called GEARSHIFT on a target system. ;; Astaroth logs keystrokes from the victim's machine. ;; One of Attor's plugins can collect user credentials via capturing keystrokes and can capture keystrokes pressed within the window of the injected process. ;; BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger. ;; When it first starts BADNEWS spawns a new thread to log keystrokes. ;; BadPatch has a keylogging capability. ;; Bandook contains keylogging capabilities ;; BISCUIT can capture keystrokes. ;; BlackEnergy has run a keylogger plug-in on a victim. ;; Cadelspy has the ability to log keystrokes on the compromised host. ;; Carbanak logs key strokes for configured processes and sends them back to the C2 server. ;; Cardinal RAT can log keystrokes. ;; Catchamas collects keystrokes from the victim’s machine. ;; CHOPSTICK is capable of performing keylogging. ;; Cobalt Strike can track key presses with a keylogger module. ;; Cobian RAT has a feature to perform keylogging on the victim’s machine. ;; CosmicDuke uses a keylogger. ;; DarkComet has a keylogging capability. ;; Darkhotel has used a keylogger. ;; Daserf can log keystrokes. ;; Derusbi is capable of logging keystrokes. ;; DOGCALL is capable of logging keystrokes. ;; Dtrack’s dropper contains a keylogging executable. ;; Duqu can track key presses with a keylogger module. ;; DustySky contains a keylogger. ;; ECCENTRICBANDWAGON can capture and store keystrokes. ;; Empire includes keylogging capabilities for Windows Linux and macOS systems. ;; EvilGrab has the capability to capture keystrokes. ;; Explosive has leveraged its keylogging capabilities to gain access to administrator accounts on target servers. ;; FakeM contains a keylogger module. ;; FIN4 has captured credentials via fake Outlook Web App (OWA) login pages and has also used a .NET based keylogger. ;; Fysbis can perform keylogging. ;; gh0st RAT has a keylogger. ;; Grandoreiro can log keystrokes on the victim's machine. ;; GreyEnergy has a module to harvest pressed keystrokes. ;; Malware used by Group5 is capable of capturing keystrokes. ;; The executable version of Helminth has a module to log keystrokes. ;; HTTPBrowser is capable of capturing keystrokes on victims. ;; Imminent Monitor has a keylogging module. ;; InvisiMole can capture keystrokes on a compromised host. ;; JPIN contains a custom keylogger. ;; jRAT has the capability to log keystrokes from the victim’s machine both offline and online. ;; Kasidet has the ability to initiate keylogging. ;; Ke3chang has used keyloggers. ;; KeyBoy installs a keylogger for intercepting credentials and keystrokes. ;; KGH_SPY can perform keylogging by polling the GetAsyncKeyState() function. ;; Kimsuky has used a PowerShell-based keylogger. ;; Kivars has the ability to initiate keylogging on the infected host. ;; KONNI has the capability to perform keylogging. ;; Lazarus Group malware KiloAlfa contains keylogging functionality. ;; Lokibot has the ability to capture input on the compromised host via keylogging. ;; Machete logs keystrokes from the victim’s machine. ;; MacSpy captures keystrokes. ;; Magic Hound malware is capable of keylogging. ;; Matryoshka is capable of keylogging. ;; menuPass has used key loggers to steal usernames and passwords. ;; Metamorfo has a command to launch a keylogger on the victim’s machine. ;; Micropsia has keylogging capabilities. ;; MoonWind has a keylogger. ;; NanoCore can perform keylogging on the victim’s machine. ;; NavRAT logs the keystrokes on the targeted system. ;; NetTraveler contains a keylogger. ;; NETWIRE can perform keylogging. ;; njRAT is capable of logging keystrokes. ;; OilRig has used keylogging tools called KEYPUNCH and LONGWATCH. ;; Okrum was seen using a keylogger tool to capture keystrokes. ;; Operation Wocao has obtained the password for the victim's password manager via a custom keylogger. ;; OwaAuth captures and DES-encrypts credentials before writing the username and password to a log file C:\log.txt. ;; PLATINUM has used several different keyloggers. ;; PlugX has a module for capturing keystrokes per process including window titles. ;; PoetRAT has used a Python tool named klog.exe for keylogging. ;; PoisonIvy contains a keylogger. ;; PoshC2 has modules for keystroke logging and capturing credentials from spoofed Outlook authentication messages. ;; PowerSploit's Get-Keystrokes Exfiltration module can log keystrokes. ;; Prikormka contains a keylogger module that collects keystrokes and the titles of foreground windows. ;; Proton uses a keylogger to capture keystrokes. ;; Pupy uses a keylogger to capture keystrokes it then sends back to the server after it is stopped. ;; QuasarRAT has a built-in keylogger. ;; Regin contains a keylogger. ;; Remcos has a command for keylogging. ;; Remexi gathers and exfiltrates keystrokes from the machine. ;; Remsec contains a keylogger component. ;; Revenge RAT has a plugin for keylogging. ;; ROKRAT uses a keylogger to capture keystrokes and location of where the user is typing. ;; Rover has keylogging functionality. ;; RTM can record keystrokes from both the keyboard and virtual keyboard. ;; RunningRAT captures keystrokes and sends them back to the C2 server. ;; Sandworm Team has used a keylogger to capture keystrokes by using the SetWindowsHookEx function. ;; SLOTHFULMEDIA has a keylogging capability. ;; Sowbug has used keylogging tools. ;; SslMM creates a new thread implementing a keylogging facility using Windows Keyboard Accelerators. ;; Stolen Pencil has a tool to log keystrokes to %userprofile%\appdata\roaming\apach.{txt log}. ;; Sykipot contains keylogging functionality to steal passwords. ;; TajMahal has the ability to capture keystrokes on an infected host. ;; ThiefQuest uses the CGEventTap functions to perform keylogging. ;; Threat Group-3390 actors installed a credential logger on Microsoft Exchange servers. Threat Group-3390 also leveraged the reconnaissance framework ScanBox to capture keystrokes. ;; TinyZBot contains keylogger functionality. ;; Trojan.Karagany can capture keystrokes on a compromised host. ;; Unknown Logger is capable of recording keystrokes. ;; VERMIN collects keystrokes from the victim machine. ;; XAgentOSX contains keylogging functionality that will monitor for active application windows and write them to the log it can handle special characters and it will buffer by default 50 characters before sending them out over the C2 infrastructure. ;; yty uses a keylogger plugin to gather keystrokes. ;; Zeus Panda can perform keylogging on the victim’s machine by hooking the functions TranslateMessage and WM_KEYDOWN. ;; ZxShell has a feature to capture a remote computer's keystrokes using a keylogger.,1,accept,T1056.001,Input Capture: Keylogging PROMETHIUM has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports.,1,accept,T1205.001,Traffic Signaling: Port Knocking Threat actor TEMP.Veles abuses port knocking for C2 communication and data exfiltration. ,1,accept,T1205.001,Traffic Signaling: Port Knocking " Port knocking can obfuscate malicious activity and assist in evasion from defence mechanisms, a common technique of APT28. ",1,accept,T1205.001,Traffic Signaling: Port Knocking The Cryptcat backdoor utilises port knocking to hide it's C2 communications. ,1,accept,T1205.001,Traffic Signaling: Port Knocking Ryuk ransomware utilises a series of obscure connections to indicate when a C2 channel should be opened. ,1,accept,T1205.001,Traffic Signaling: Port Knocking ,1,accept,T1558.004,Steal or Forge Kerberos Tickets: As APT13 devotes malware to cracking kerberos accounts who have disabled authentication to bypass authentication. ,1,accept,T1558.004,Steal or Forge Kerberos Tickets: As Kerberos accounts should always maintain strong password protection as these accounts can be used by adversaries to bypass authentication if they are compromised. ,1,accept,T1558.004,Steal or Forge Kerberos Tickets: As " Conti ransomware attacks weak kerberos accounts, spraying passwords until it obtains access. ",1,accept,T1558.004,Steal or Forge Kerberos Tickets: As " Some CobaltStrike beacons can attack weak passwords, allowing access to full kerberos authentication if the password is not secure. ",1,accept,T1558.004,Steal or Forge Kerberos Tickets: As Pioneer Kitten often exploit kerberos for tickets after compromising a weak account and utilising it's privileges and access. ,1,accept,T1558.004,Steal or Forge Kerberos Tickets: As APT29 obtained Ticket Granting Service (TGS) tickets for Active Directory Service Principle Names to crack offline. ,1,accept,T1558.003,Steal or Forge Kerberos Tickets: Kerberoasting Empire uses PowerSploit's Invoke-Kerberoast to request service tickets and return crackable ticket hashes. ,1,accept,T1558.003,Steal or Forge Kerberos Tickets: Kerberoasting Impacket modules like GetUserSPNs can be used to get Service Principal Names (SPNs) for user accounts. The output is formatted to be compatible with cracking tools like John the Ripper and Hashcat. ,1,accept,T1558.003,Steal or Forge Kerberos Tickets: Kerberoasting Operation Wocao has used PowerSploit's Invoke-Kerberoast module to request encrypted service tickets and bruteforce the passwords of Windows service accounts offline. ,1,accept,T1558.003,Steal or Forge Kerberos Tickets: Kerberoasting PowerSploit's Invoke-Kerberoast module can request service tickets and return crackable ticket hashes. ,1,accept,T1558.003,Steal or Forge Kerberos Tickets: Kerberoasting UNC2452 obtained Ticket Granting Service (TGS) tickets for Active Directory Service Principle Names to crack offline. ,1,accept,T1558.003,Steal or Forge Kerberos Tickets: Kerberoasting Wizard Spider has used Rubeus MimiKatz Kerberos module and the Invoke-Kerberoast cmdlet to steal AES hashes.,1,accept,T1558.003,Steal or Forge Kerberos Tickets: Kerberoasting Ajax Security Team has used various social media channels to spearphish victims. ,1,accept,T1566.003,Phishing: Spearphishing Via Service Dark Caracal spearphished victims via Facebook and Whatsapp. ,1,accept,T1566.003,Phishing: Spearphishing Via Service FIN6 has used fake job advertisements sent via LinkedIn to spearphish targets. ,1,accept,T1566.003,Phishing: Spearphishing Via Service Lazarus Group has used fake job advertisements sent via LinkedIn to spearphish victims. ,1,accept,T1566.003,Phishing: Spearphishing Via Service Magic Hound used various social media channels to spearphish victims. ,1,accept,T1566.003,Phishing: Spearphishing Via Service OilRig has used LinkedIn to send spearphishing links. ,1,accept,T1566.003,Phishing: Spearphishing Via Service Windshift has used fake personas on social media to engage and target victims.,1,accept,T1566.003,Phishing: Spearphishing Via Service APT41 attempted to remove evidence of some of its activity by deleting Bash histories. ,1,accept,T1070.003,Indicator Removal on Host: Clear Command History Hildegard has used history -c to clear script shell logs.,1,accept,T1070.003,Indicator Removal on Host: Clear Command History WastedLocker ransomware possesses functionality to delete CLI command history with the aim to avoid detection for as long a time as possible. ,1,accept,T1070.003,Indicator Removal on Host: Clear Command History FIN11 will remove indicators of their intrusion on machines such as deleting the command line history. ,1,accept,T1070.003,Indicator Removal on Host: Clear Command History Lazarus group often delete their command history to prolong the duration of their unobserved activity. ,1,accept,T1070.003,Indicator Removal on Host: Clear Command History ,1,accept,T1053.006,Scheduled Task/Job: Systemd Timers "Threat actors such as Golden Chickens schedule malicious activity to reoccur on target machines, often through the use of systemd timers. ",1,accept,T1053.006,Scheduled Task/Job: Systemd Timers Cryptocurrency miners will abuse the systemd timers to regularly schedule the activation of the clipper. ,1,accept,T1053.006,Scheduled Task/Job: Systemd Timers Middle Eastern threat actors embed malicious macros within Office 356 documents that can exploit systemd for repeated execution. ,1,accept,T1053.006,Scheduled Task/Job: Systemd Timers CobaltStrike possesses the ability to communicate via ssh with the systemctl to schedule repeated tasks. ,1,accept,T1053.006,Scheduled Task/Job: Systemd Timers FIN6 often abuses systemd to exfiltrate data at a specific time each day. ,1,accept,T1053.006,Scheduled Task/Job: Systemd Timers The PipeMon installer has modified the Registry key HKLM\SYSTEM\CurrentControlSet\Control\Print\Environments\Windows x64\Print Processors to install PipeMon as a Print Processor.,1,accept,T1547.012,Boot or Logon Autostart Execution: Print Processors The Ghostwriter campaign featured malware that could modify the kernel to initiate malicious code execution on boot. ,1,accept,T1547.012,Boot or Logon Autostart Execution: Print Processors Warzone RAT often injects LKM that auto executes code upon startup. ,1,accept,T1547.012,Boot or Logon Autostart Execution: Print Processors Malware such as POWERHOSE can repeatedly execute arbitrary code upon boot via kernel modification. ,1,accept,T1547.012,Boot or Logon Autostart Execution: Print Processors CozyBear will often modify a machine's kernel to allow for automatic code execution upon startup. ,1,accept,T1547.012,Boot or Logon Autostart Execution: Print Processors Exaramel for Linux has a hardcoded location under systemd that it uses to achieve persistence if it is running as root. ,1,accept,T1543.002,Create or Modify System Process: Systemd Service Fysbis has established persistence using a systemd service. ,1,accept,T1543.002,Create or Modify System Process: Systemd Service Hildegard has started a monero service. ,1,accept,T1543.002,Create or Modify System Process: Systemd Service Pupy can be used to establish persistence using a systemd service. ,1,accept,T1543.002,Create or Modify System Process: Systemd Service Rocke has installed a systemd service script to maintain persistence.,1,accept,T1543.002,Create or Modify System Process: Systemd Service ,1,accept,T1564.007,Hide Artifacts: Vba Stomping WastedLocker ransomware can inject malicious VBA scripts into MS Office documents for obfuscation. ,1,accept,T1564.007,Hide Artifacts: Vba Stomping ChamelGang utilizes VBA stomping to hide malicious payloads. ,1,accept,T1564.007,Hide Artifacts: Vba Stomping CozyBear often employs the tactic of obscuring VBA payloads within benign data. ,1,accept,T1564.007,Hide Artifacts: Vba Stomping MS Office can be used to hide malicious VBA code by replacing source code with legitimate data. ,1,accept,T1564.007,Hide Artifacts: Vba Stomping UNC215 will obfuscate their malicious payloads within MS Office documents. ,1,accept,T1564.007,Hide Artifacts: Vba Stomping APT28 has deployed a bootkit along with Downdelph to ensure its persistence on the victim. The bootkit shares code with some variants of BlackEnergy. ,1,accept,T1542.003,Pre APT41 deployed Master Boot Record bootkits on Windows systems to hide their malware and maintain persistence on victim systems. ,1,accept,T1542.003,Pre BOOTRASH is a Volume Boot Record (VBR) bootkit that uses the VBR to maintain persistence. ,1,accept,T1542.003,Pre Carberp has installed a bootkit on the system to maintain persistence. ,1,accept,T1542.003,Pre Some FinFisher variants incorporate an MBR rootkit. ,1,accept,T1542.003,Pre Lazarus Group malware WhiskeyAlfa-Three modifies sector 0 of the Master Boot Record (MBR) to ensure that the malware will persist even if a victim machine shuts down. ,1,accept,T1542.003,Pre ROCKBOOT is a Master Boot Record (MBR) bootkit that uses the MBR to establish persistence. ,1,accept,T1542.003,Pre TrickBot can implant malicious code into a compromised device's firmware.,1,accept,T1542.003,Pre Empire contains modules that can discover and exploit unquoted path vulnerabilities. ,1,accept,T1574.009,Hijack Execution Flow: Path Interception By Unquoted Path PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit unquoted path vulnerabilities.,1,accept,T1574.009,Hijack Execution Flow: Path Interception By Unquoted Path UNC2215 abuse path calls that are unquoted to execute their malware at a higher level in the file path than the legitimate one. ,1,accept,T1574.009,Hijack Execution Flow: Path Interception By Unquoted Path REvil ransomware will execute it's payloads through placing them high up the file path of unprotected file calls from programs. ,1,accept,T1574.009,Hijack Execution Flow: Path Interception By Unquoted Path Care should be taken to always place quotation marks around file path calls to prevent malware from abusing it's lack of security to execute malicious code. ,1,accept,T1574.009,Hijack Execution Flow: Path Interception By Unquoted Path Empire contains modules that can discover and exploit search order hijacking vulnerabilities. ,1,accept,T1574.008,Hijack Execution Flow: Path Interception By Search Order Hijacking PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit search order hijacking vulnerabilities.,1,accept,T1574.008,Hijack Execution Flow: Path Interception By Search Order Hijacking Pakdoor can replace legitimate file paths with it's own malicious file paths. ,1,accept,T1574.008,Hijack Execution Flow: Path Interception By Search Order Hijacking ChamelGang will often install malware and then execute it by hijacking other programs filepath searches. ,1,accept,T1574.008,Hijack Execution Flow: Path Interception By Search Order Hijacking " Earth Centaur can escalate the privileges of their malware via the hijacking of the path calls of other, higher privileged programs. ",1,accept,T1574.008,Hijack Execution Flow: Path Interception By Search Order Hijacking APT32 includes garbage code to mislead anti-malware software and researchers. ,1,accept,T1027.001,Obfuscated Files or Information: Binary Padding " BRONZE BUTLER downloader code has included 0"" characters at the end of the file to inflate the file size in a likely attempt to evade anti-virus detection. ",1,accept,T1027.001,Obfuscated Files or Information: Binary Padding Comnie appends a total of 64MB of garbage data to a file to deter any security products in place that may be scanning files on disk. ,1,accept,T1027.001,Obfuscated Files or Information: Binary Padding CORESHELL contains unused machine instructions in a likely attempt to hinder analysis. ,1,accept,T1027.001,Obfuscated Files or Information: Binary Padding A variant of Emissary appends junk data to the end of its DLL file to create a large file that may exceed the maximum size that anti-virus programs can scan. ,1,accept,T1027.001,Obfuscated Files or Information: Binary Padding FatDuke has been packed with junk code and strings. ,1,accept,T1027.001,Obfuscated Files or Information: Binary Padding FinFisher contains junk code in its functions in an effort to confuse disassembly programs. ,1,accept,T1027.001,Obfuscated Files or Information: Binary Padding " Gamaredon Group has obfuscated .NET executables by inserting junk code. ;; Goopy has had null characters padded in its malicious DLL payload. ;; Grandoreiro has added BMP images to the resources section of its Portable Executable (PE) file increasing each binary to at least 300MB in size. ;; Higaisa performed padding with null bytes before calculating its hash. ;; Javali can use large obfuscated libraries to hinder detection and analysis. ;; Before writing to disk Kwampirs inserts a randomly generated string into the middle of the decrypted payload in an attempt to evade hash-based detections. ;; Leviathan has inserted garbage characters into code presumably to avoid anti-virus detection. ;; Maze has inserted large blocks of junk code including some components to decrypt strings and other important information for later in the encryption process. ;; Moafee has been known to employ binary padding. ;; Mustang Panda has used junk code within their DLL files to hinder analysis. ;; Patchwork apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes. ;; POWERSTATS has used useless code blocks to counter analysis. ;; Rifdoor has added four additional bytes of data upon launching then saved the changed version as C:\ProgramData\Initech\Initech.exe. ;; SamSam has used garbage code to pad some of its malware components. ;; TAINTEDSCRIBE can execute FileRecvWriteRand to append random bytes to the end of a file received from C2. ;; A version of XTunnel introduced in July 2015 inserted junk code into the binary in a likely attempt to obfuscate it and bypass security products. ;; yty contains junk code in its binary likely to confuse malware analysts. ;; ZeroT has obfuscated DLLs and functions using dummy API calls inserted between real instructions.""",1,accept,T1027.001,Obfuscated Files or Information: Binary Padding APT29 has used valid accounts including administrator accounts to help facilitate lateral movement on compromised networks. ,1,accept,T1078.002,Valid Accounts: Domain Accounts APT3 leverages valid accounts after gaining credentials for use within the victim domain. ,1,accept,T1078.002,Valid Accounts: Domain Accounts Chimera has used compromised domain accounts to gain access to the target environment. ,1,accept,T1078.002,Valid Accounts: Domain Accounts Cobalt Strike can use known credentials to run commands and spawn processes as a domain user account. ,1,accept,T1078.002,Valid Accounts: Domain Accounts Indrik Spider has collected credentials from infected systems including domain accounts. ,1,accept,T1078.002,Valid Accounts: Domain Accounts Operation Wocao has used domain credentials including domain admin for lateral movement and privilege escalation. ,1,accept,T1078.002,Valid Accounts: Domain Accounts Ryuk can use stolen domain admin accounts to move laterally within a victim domain. ,1,accept,T1078.002,Valid Accounts: Domain Accounts Sandworm Team has used stolen credentials to access administrative accounts within the domain. ;; If Shamoon cannot access shares using current privileges it attempts access using hard coded domain-specific credentials gathered earlier in the intrusion. ;; TA505 has used stolen domain admin accounts to compromise additional hosts. ;; Threat Group-1314 actors used compromised domain credentials for the victim's endpoint management platform Altiris to move laterally. ;; Wizard Spider has used administrative accounts including Domain Admin to move laterally within a victim network.,1,accept,T1078.002,Valid Accounts: Domain Accounts APT32 has used Web shells to maintain access to victim websites. ,1,accept,T1505.003,Server Software Component: Web Shell APT39 has installed ANTAK and ASPXSPY web shells. ,1,accept,T1505.003,Server Software Component: Web Shell ASPXSpy is a Web shell. The ASPXTool version used by Threat Group-3390 has been deployed to accessible servers running Internet Information Services (IIS). ,1,accept,T1505.003,Server Software Component: Web Shell China Chopper's server component is a Web Shell payload. ,1,accept,T1505.003,Server Software Component: Web Shell Deep Panda uses Web shells on publicly accessible Web servers to access victim networks. ,1,accept,T1505.003,Server Software Component: Web Shell Dragonfly 2.0 commonly created Web shells on victims' publicly accessible email and web servers which they used to maintain access to a victim network and download additional malicious files. ,1,accept,T1505.003,Server Software Component: Web Shell Fox Kitten has installed web shells on compromised hosts to maintain access. ,1,accept,T1505.003,Server Software Component: Web Shell " GALLIUM used Web shells to persist in victim environments and assist in execution and exfiltration. ;; HAFNIUM has deployed multiple web shells on compromised servers including SIMPLESEESHARP SPORTSBALL China Chopper and ASPXSpy. ;; Kimsuky has used modified versions of open source PHP web shells to maintain access often adding Dinosaur"" references within the code. ;; Leviathan relies on web shells for an initial foothold as well as persistence into the victim's systems. ;; OilRig has used web shells often to maintain access to a victim network. ;; Operation Wocao has used their own web shells as well as those previously placed on target systems by other threat actors for reconnaissance and lateral movement. ;; OwaAuth is a Web shell that appears to be exclusively used by Threat Group-3390. It is installed as an ISAPI filter on Exchange servers and shares characteristics with the China Chopper Web shell. ;; P.A.S. Webshell can gain remote access and execution on target web servers. ;; Sandworm Team has used webshells including P.A.S. Webshell to maintain access to victim networks. ;; SEASHARPEE is a Web shell. ;; SUPERNOVA is a Web shell. ;; TEMP.Veles has planted Web shells on Outlook Exchange servers. ;; Threat Group-3390 has used a variety of Web shells. ;; Tropic Trooper has started a web service in the target host and wait for the adversary to connect acting as a web shell. ;; Volatile Cedar can inject web shell code into a server. """,1,accept,T1505.003,Server Software Component: Web Shell APT29 has used the meek domain fronting plugin for Tor to hide the destination of C2 traffic. ,1,accept,T1090.004,Proxy: Domain Fronting meek uses Domain Fronting to disguise the destination of network traffic as another server that is hosted in the same Content Delivery Network (CDN) as the intended destination.,1,accept,T1090.004,Proxy: Domain Fronting The Prometei botnet will utilise domain fronting to hide it's C2 infrastructure and it's compromised bots. ,1,accept,T1090.004,Proxy: Domain Fronting ATP29 often inserts multiple domains from the same CDN inside the SNI field to obfuscate the real C2 domain. ,1,accept,T1090.004,Proxy: Domain Fronting " Evilnum utilises scripts that facilitate a proxy connection, sometimes involving domain fronting. ",1,accept,T1090.004,Proxy: Domain Fronting ABK can extract a malicious Portable Executable (PE) from a photo. ,1,accept,T1027.003,Obfuscated Files or Information: Steganography APT37 uses steganography to send images to users that are embedded with shellcode. ,1,accept,T1027.003,Obfuscated Files or Information: Steganography Avenger can extract backdoor malware from downloaded images. ,1,accept,T1027.003,Obfuscated Files or Information: Steganography BBK can extract a malicious Portable Executable (PE) from a photo. ,1,accept,T1027.003,Obfuscated Files or Information: Steganography BRONZE BUTLER has used steganography in multiple operations to conceal malicious payloads. ,1,accept,T1027.003,Obfuscated Files or Information: Steganography build_downer can extract malware from a downloaded JPEG. ,1,accept,T1027.003,Obfuscated Files or Information: Steganography IcedID has embedded binaries within RC4 encrypted .png files. ,1,accept,T1027.003,Obfuscated Files or Information: Steganography MuddyWater has stored obfuscated JavaScript code in an image file named temp.jpg. ;; Okrum's payload is encrypted and embedded within its loader or within a legitimate PNG file. ;; PolyglotDuke can use steganography to hide C2 information in images. ;; PowerDuke uses steganography to hide backdoors in PNG files which are also encrypted using the Tiny Encryption Algorithm (TEA). ;; Raindrop used steganography to locate the start of its encoded payload within legitimate 7-Zip code. ;; Ramsay has PE data embedded within JPEG files contained within Word documents. ;; RDAT can also embed data within a BMP image prior to exfiltration. ;; RegDuke can hide data in images including use of the Least Significant Bit (LSB). ;; TA551 has hidden encoded data for malware DLLs in a PNG. ;; Tropic Trooper has used JPG files with encrypted payloads to mask their backdoor routines and evade detection.,1,accept,T1027.003,Obfuscated Files or Information: Steganography One variant of BlackEnergy locates existing driver services that have been disabled and drops its driver component into one of those service's paths replacing the legitimate executable. The malware then sets the hijacked service to start automatically to establish persistence.,1,accept,T1574.010,Hijack Execution Flow: Services File Permissions Weakness Threat actors will often hijack execution for malicious code execution through exploiting weakly protected service binaries. ,1,accept,T1574.010,Hijack Execution Flow: Services File Permissions Weakness The Sidewalk backdoor can escalate it's privileges by hijacking the execution flow or services that possess privileges above it. ,1,accept,T1574.010,Hijack Execution Flow: Services File Permissions Weakness Hive ransomware can abuse improperly set permissions of some services to perform privilege execution. ,1,accept,T1574.010,Hijack Execution Flow: Services File Permissions Weakness UNC215 will exploit poorly protected service binaries to execute their installed malware. ,1,accept,T1574.010,Hijack Execution Flow: Services File Permissions Weakness ,1,accept,T1574.011,Hijack Execution Flow: Services Registry Permissions Weakness APT31 executes their own malicious payloads through hijacking registry services that have misconfigured permissions. ,1,accept,T1574.011,Hijack Execution Flow: Services Registry Permissions Weakness REvil abuse powershell to modify HKLM\SYSTEM\CurrentControlSet\Services to allow for the execution of their own malicious payloads. ,1,accept,T1574.011,Hijack Execution Flow: Services Registry Permissions Weakness APT31 abuses registry keys related to services to point to and execute malicious scripts installed on a machine. ,1,accept,T1574.011,Hijack Execution Flow: Services Registry Permissions Weakness UNC215 abuses registry related services to redirect the service's desired executable to a malicious one. ,1,accept,T1574.011,Hijack Execution Flow: Services Registry Permissions Weakness Dridex will modify a windows registry to allow associated services to execute malware. ,1,accept,T1574.011,Hijack Execution Flow: Services Registry Permissions Weakness Empire contains modules that can discover and exploit path interception opportunities in the PATH environment variable. ,1,accept,T1574.007,Hijack Execution Flow: Path Interception By Path Environment Variable PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit path interception opportunities in the PATH environment variable.,1,accept,T1574.007,Hijack Execution Flow: Path Interception By Path Environment Variable Grief ransomware utilises malware that inserts malicious payloads to be executed with the environmental variable PATH's list of directories. ,1,accept,T1574.007,Hijack Execution Flow: Path Interception By Path Environment Variable Certain CobaltStrike payloads will abuse the PATH variable to allow for malicious execution of files. ,1,accept,T1574.007,Hijack Execution Flow: Path Interception By Path Environment Variable The APT Naikon will abuse the Windows PATH variable to sequentially execute inserted malware. ,1,accept,T1574.007,Hijack Execution Flow: Path Interception By Path Environment Variable ,1,accept,T1499.001,Endpoint Denial of Service: Os Exhaustion Flood The Lucifer cryptojacker can overwhelm the self imposed limits of resources of an OS when mining for cryptocurrency. ,1,accept,T1499.001,Endpoint Denial of Service: Os Exhaustion Flood " Quantum Stresser could perform DDoS as a service through the targets of an OS' resources, forcing the machine to slow down and lock up. ",1,accept,T1499.001,Endpoint Denial of Service: Os Exhaustion Flood BlackNurse would target OS of victim machines and overwhelm their capacity to handle the demands placed upon it. ,1,accept,T1499.001,Endpoint Denial of Service: Os Exhaustion Flood " GoBotKR can initiate a variety of DDoS attacks, including ones that target the finite resources of a system. ",1,accept,T1499.001,Endpoint Denial of Service: Os Exhaustion Flood Ransomware will often begin to damage the OS' ability to manage resources to coerce victims into paying the ransom. ,1,accept,T1499.001,Endpoint Denial of Service: Os Exhaustion Flood Anchor can establish persistence by creating a service. ,1,accept,T1543.003,Create or Modify System Process: Windows Service AppleJeus can install itself as a service. ,1,accept,T1543.003,Create or Modify System Process: Windows Service An APT19 Port 22 malware variant registers itself as a service. ,1,accept,T1543.003,Create or Modify System Process: Windows Service APT3 has a tool that creates a new service for persistence. ,1,accept,T1543.003,Create or Modify System Process: Windows Service APT32 modified Windows Services to ensure PowerShell scripts were loaded on the system. APT32 also creates a Windows service to establish persistence. ,1,accept,T1543.003,Create or Modify System Process: Windows Service APT41 modified legitimate Windows services to install malware backdoors. APT41 created the StorSyncSvc service to provide persistence for Cobalt Strike. ,1,accept,T1543.003,Create or Modify System Process: Windows Service Attor's dispatcher can establish persistence by registering a new service. ,1,accept,T1543.003,Create or Modify System Process: Windows Service " AuditCred is installed as a new service on the system. ;; Bankshot can terminate a specific process by its process id. ;; BBSRAT can modify service configurations. ;; BitPaymer has attempted to install itself as a service to maintain persistence. ;; One variant of BlackEnergy creates a new service using either a hard-coded or randomly generated name. ;; Blue Mockingbird has made their XMRIG payloads persistent as a Windows Service. ;; Briba installs a service pointing to a malicious DLL dropped to disk. ;; Carbanak malware installs itself as a service to provide persistence and SYSTEM privileges. ;; Carbon establishes persistence by creating a service and naming it based off the operating system version running on the current machine. ;; Catchamas adds a new service named NetAdapter to establish persistence. ;; Cobalt Group has created new services to establish persistence. ;; Cobalt Strike can install a new service. ;; CosmicDuke uses Windows services typically named javamtsup"" for persistence. ;; One persistence mechanism used by CozyCar is to register itself as a Windows service. ;; DarkVishnya created new services for shellcode loaders distribution. ;; Dtrack can add a service called WBService to establish persistence. ;; Duqu creates a new service that loads a malicious driver when the system starts. When Duqu is active the operating system believes that the driver is legitimate as it has been signed with a valid private key. ;; Dyre registers itself as a service by adding several Registry keys. ;; Elise configures itself as a service. ;; Emissary is capable of configuring itself as a service. ;; Emotet has been observed creating new services to maintain persistence. ;; Empire can utilize built-in modules to modify service binaries and restore them to their original state. ;; The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description “Windows Check AV.” ;; FALLCHILL has been installed as a Windows service. ;; FIN7 created new Windows services and added them to the startup directories for persistence. ;; FinFisher creates a new Windows service with the malicious executable for persistence. ;; gh0st RAT can create a new service to establish persistence. ;; GoldenSpy has established persistence by running in the background as an autostart service. ;; GreyEnergy chooses a service drops a DLL file and writes it to that serviceDLL Registry key. ;; hcdLoader installs itself as a service for persistence. ;; Honeybee has batch files that modify the system service COMSysApp to load a malicious DLL. ;; Hydraq creates new services to establish persistence. ;; Some InnaputRAT variants create a new Windows service to establish persistence. ;; InvisiMole can register a Windows service named CsPower as part of its execution chain and a Windows service named clr_optimization_v2.0.51527_X86 to achieve persistence. ;; JHUHUGIT has registered itself as a service to establish persistence. ;; Kazuar can install itself as a new service. ;; Ke3chang backdoor RoyalDNS established persistence through adding a service called Nwsapagent. ;; KeyBoy installs a service pointing to a malicious DLL dropped to disk. ;; Kimsuky has created new services for persistence. ;; Kwampirs creates a new service named WmiApSrvEx to establish persistence. ;; Several Lazarus Group malware families install themselves as new services on victims. ;; LoudMiner can automatically launch a Linux virtual machine as a service at startup if the AutoStart option is enabled in the VBoxVmService configuration file. ;; MoonWind installs itself as a new service with automatic startup to establish persistence. The service checks every 60 seconds to determine if the malware is running; if not it will spawn a new instance. ;; Naid creates a new service to establish. ;; Nerex creates a Registry subkey that registers a new service. ;; Nidiran can create a new service named msamger (Microsoft Security Accounts Manager). ;; To establish persistence Okrum can install itself as a new service named NtmSsvc. ;; PipeMon can establish persistence by registering a malicious DLL as an alternative Print Processor which is loaded when the print spooler service starts. ;; PlugX can be added as a service to establish persistence. PlugX also has a module to change service configurations as well as start control and delete services. ;; PoisonIvy creates a Registry subkey that registers a new service. PoisonIvy also creates a Registry entry modifying the Logical Disk Manager service to point to a malicious DLL dropped to disk. ;; PowerSploit contains a collection of Privesc-PowerUp modules that can discover and replace/modify service binaries paths and configs. ;; PROMETHIUM has created new services and modified existing services for persistence. ;; Ragnar Locker has used sc.exe to create a new service for the VirtualBox driver. ;; RawPOS installs itself as a service to maintain persistence. ;; RDAT has created a service when it is installed on the victim machine. ;; Reaver installs itself as a new service. ;; Some Sakula samples install themselves as services for persistence by calling WinExec with the net start argument. ;; Seasalt is capable of installing itself as a service. ;; Shamoon creates a new service named “ntssrv” to execute the payload. Newer versions create the ""MaintenaceSrv"" and ""hdv_725x"" services. ;; ShimRat has installed a Windows service to maintain persistence on victim machines. ;; SLOTHFULMEDIA has created a service on victim machines named ""TaskFrame"" to establish persistence. ;; StreamEx establishes persistence by installing a new service pointing to its DLL and setting the service to auto-start. ;; StrongPity has created new services and modified existing services for persistence. ;; If running as administrator TDTESS installs itself as a new service named bmwappushservice to establish persistence. ;; TEARDROP ran as a Windows service from the c:\windows\syswow64 folder. ;; A Threat Group-3390 tool can create a new service naming it after the config information to gain persistence. ;; TinyZBot can install as a Windows service for persistence. ;; TrickBot establishes persistence by creating an autostart service that allows it to run whenever the machine boots. ;; Tropic Trooper has installed a service pointing to a malicious DLL dropped to disk. ;; TYPEFRAME variants can add malicious DLL modules as new services.TYPEFRAME can also delete services from the victim’s machine. ;; Ursnif has registered itself as a system service in the Registry for automatic execution at system startup. ;; Volgmer installs a copy of itself in a randomly selected service then overwrites the ServiceDLL entry in the service's Registry entry. Some Volgmer variants also install .dll files as services with names generated by a list of hard-coded strings. ;; WannaCry creates the service ""mssecsvc2.0"" with the display name ""Microsoft Security Center (2.0) Service."" ;; Wiarp creates a backdoor through which remote attackers can create a service. ;; Wingbird uses services.exe to register a new autostart service named ""Audit Service"" using a copy of the local lsass.exe file. ;; Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence. ;; Wizard Spider has installed TrickBot as a service named ControlServiceA in order to establish persistence. ;; ZeroT can add a new service to ensure PlugX persists on the system when delivered as another payload onto the system. ;; ZLib creates Registry keys to allow itself to run as various services. ;; zwShell has established persistence by adding itself as a new service. ;; ZxShell can create a new service using the service parser function ProcessScCommand. """,1,accept,T1543.003,Create or Modify System Process: Windows Service AppleJeus has placed a plist file within the LaunchDaemons folder and launched it manually. ,1,accept,T1543.004,Create or Modify System Process: Launch Daemon Bundlore can persist via a LaunchDaemon. ,1,accept,T1543.004,Create or Modify System Process: Launch Daemon Dacls can establish persistence via a Launch Daemon. ,1,accept,T1543.004,Create or Modify System Process: Launch Daemon LoudMiner added plist files in /Library/LaunchDaemons with RunAtLoad set to true. ,1,accept,T1543.004,Create or Modify System Process: Launch Daemon OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchDaemons. ,1,accept,T1543.004,Create or Modify System Process: Launch Daemon When running with root privileges after a Launch Agent is installed ThiefQuest installs a plist file to the /Library/LaunchDaemons/ folder with the RunAtLoad key set to true establishing persistence as a Launch Daemon.,1,accept,T1543.004,Create or Modify System Process: Launch Daemon APT3 has been known to brute force password hashes to be able to leverage plain text credentials. ,1,accept,T1110.002,Brute Force: Password Cracking APT41 performed password brute-force attacks on the local admin account. ,1,accept,T1110.002,Brute Force: Password Cracking Dragonfly 2.0 dropped and executed tools used for password cracking including Hydra and CrackMapExec. ,1,accept,T1110.002,Brute Force: Password Cracking FIN6 has extracted password hashes from ntds.dit to crack offline. ,1,accept,T1110.002,Brute Force: Password Cracking Net Crawler uses a list of known credentials gathered through credential dumping to guess passwords to accounts as it spreads throughout a network.,1,accept,T1110.002,Brute Force: Password Cracking BitPaymer can use icacls /reset and takeown /F to reset a targeted executable's permissions and then take ownership. ,1,accept,T1222.001,File and Directory Permissions Modification: Windows File And Directory Permissions Modification Grandoreiro can modify the binary ACL to prevent security tools from running. ,1,accept,T1222.001,File and Directory Permissions Modification: Windows File And Directory Permissions Modification JPIN can use the command-line utility cacls.exe to change file permissions. ,1,accept,T1222.001,File and Directory Permissions Modification: Windows File And Directory Permissions Modification Ryuk can launch icacls /grant Everyone:F /T /C /Q to delete every access-based restrictions on files and directories. ,1,accept,T1222.001,File and Directory Permissions Modification: Windows File And Directory Permissions Modification WannaCry uses attrib +h and icacls . /grant Everyone:F /T /C /Q to make some of its files hidden and grant all users full access controls. ,1,accept,T1222.001,File and Directory Permissions Modification: Windows File And Directory Permissions Modification Wizard Spider has used the icacls command to modify access control to backup servers providing them with full control of all the system folders.,1,accept,T1222.001,File and Directory Permissions Modification: Windows File And Directory Permissions Modification APT41 used exploit payloads that initiate download via FTP. ,1,accept,T1071.002,Application Layer Protocol: File Transfer Protocols Attor has used FTP protocol for C2 communication. ,1,accept,T1071.002,Application Layer Protocol: File Transfer Protocols CARROTBALL has the ability to use FTP in C2 communications. ,1,accept,T1071.002,Application Layer Protocol: File Transfer Protocols Honeybee uses FTP for command and control. ,1,accept,T1071.002,Application Layer Protocol: File Transfer Protocols JPIN can communicate over FTP. ,1,accept,T1071.002,Application Layer Protocol: File Transfer Protocols Kazuar uses FTP and FTPS to communicate with the C2 server. ,1,accept,T1071.002,Application Layer Protocol: File Transfer Protocols Kimsuky has used FTP to download additional malware to the target machine. ,1,accept,T1071.002,Application Layer Protocol: File Transfer Protocols Machete uses FTP for Command & Control. ;; NOKKI has used FTP for C2 communications. ;; PoetRAT has used FTP for C2 communications. ;; ShadowPad has used FTP for C2 communications. ;; SilverTerrier uses FTP for C2 communications. ;; SYSCON has the ability to use FTP in C2 communications. ;; XAgentOSX contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system. ;; ZxShell has used FTP for C2 connections.,1,accept,T1071.002,Application Layer Protocol: File Transfer Protocols Hancitor has used verclsid.exe to download and execute a malicious script.,1,accept,T1218.012,Signed Binary Proxy Execution: Verclsid Adversaries may abuse verclsid.exe to execute malicious COM payloads ,1,accept,T1218.012,Signed Binary Proxy Execution: Verclsid " Using verclsid.exe, attacker bypassed application control policies to execute malicious payload. ",1,accept,T1218.012,Signed Binary Proxy Execution: Verclsid Malware loads malicious COM payload inside Internet Explorer using verclsid.exe,1,accept,T1218.012,Signed Binary Proxy Execution: Verclsid Using verclsid.exe to register malicious extension inside cmd.exe,1,accept,T1218.012,Signed Binary Proxy Execution: Verclsid APT-C-36 has embedded a VBScript within a malicious Word document which is executed upon the document opening. ,1,accept,T1059.005,Command and Scripting Interpreter: Visual Basic APT32 has used macros COM scriptlets and VBS scripts. ,1,accept,T1059.005,Command and Scripting Interpreter: Visual Basic APT33 has used VBScript to initiate the delivery of payloads. ,1,accept,T1059.005,Command and Scripting Interpreter: Visual Basic APT37 executes shellcode and a VBA script to decode Base64 strings. ,1,accept,T1059.005,Command and Scripting Interpreter: Visual Basic APT39 has utilized malicious VBS scripts in malware. ,1,accept,T1059.005,Command and Scripting Interpreter: Visual Basic Astaroth has used malicious VBS e-mail attachments for execution. ,1,accept,T1059.005,Command and Scripting Interpreter: Visual Basic BackConfig has used VBS to install its downloader component and malicious documents with VBA macro code. ,1,accept,T1059.005,Command and Scripting Interpreter: Visual Basic " Bisonal's dropper creates VBS scripts on the victim’s machine. ;; BRONZE BUTLER has used VBS and VBE scripts for execution. ;; Cobalt Group has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution. ;; Cobalt Strike can use VBA to perform execution. ;; Comnie executes VBS scripts. ;; Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads. ;; Exaramel for Windows has a command to execute VBS scripts on the victim’s machine. ;; FIN4 has used VBA macros to display a dialog box and collect victim credentials. ;; FIN7 used VBS scripts to help perform tasks on the victim's machine. ;; Frankenstein has used Word documents that prompts the victim to enable macros and run a Visual Basic script. ;; Gamaredon Group has embedded malicious macros in document templates which executed VBScript. Gamaredon Group has also delivered Microsoft Outlook VBA projects with embedded macros. ;; Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2. ;; Gorgon Group has used macros in Spearphishing Attachments as well as executed VBScripts on victim machines. ;; Grandoreiro can use VBScript to execute malicious code. ;; One version of Helminth consists of VBScript scripts. ;; Higaisa has used VBScript code on the victim's machine. ;; Honeybee embeds a Visual Basic script within a malicious Word document as part of initial access; the script is executed when the Word document is opened. ;; IcedID has used obfuscated VBA string expressions. ;; Inception has used VBScript to execute malicious commands and payloads. ;; Javali has used embedded VBScript to download malicious payloads from C2. ;; JCry has used VBS scripts. ;; jRAT has been distributed as HTA files with VBScript. ;; KeyBoy uses VBS scripts for installing files and performing execution. ;; Kimsuky has used Visual Basic to download malicious payloads. ;; Koadic performs most of its operations using Windows Script Host (VBScript) and runs arbitrary shellcode . ;; Lazarus Group has used VBScript to gather information about a victim machine. ;; Leviathan has used VBScript. ;; LookBack has used VBA macros in Microsoft Word attachments to drop additional files to the host. ;; Machete has embedded malicious macros within spearphishing attachments to download additional files. ;; Magic Hound malware has used VBS scripts for execution. ;; Melcoz can use VBS scripts to execute malicious DLLs. ;; Metamorfo has used VBS code on victims’ systems. ;; Molerats used various implants including those built with VBScript on target machines. ;; MuddyWater has used VBScript files to execute its POWERSTATS payload as well as macros. ;; Mustang Panda has embedded VBScript components in LNK files to download additional files and automate collection. ;; NanHaiShu executes additional VBScript code on the victim's machine. ;; NanoCore uses VBS files. ;; NETWIRE has been executed through use of VBScripts. ;; OopsIE creates and uses a VBScript as part of its persistent execution. ;; Operation Wocao has used a VBScript to conduct reconnaissance on targeted systems. ;; OSX_OCEANLOTUS.D uses Word macros for execution. ;; Patchwork used Visual Basic Scripts (VBS) on victim machines. ;; PoetRAT has used Word documents with VBScripts to execute malicious activities. ;; PowerShower has the ability to save and execute VBScript. ;; POWERSTATS can use VBScript (VBE) code for execution. ;; QUADAGENT uses VBScripts. ;; Ramsay has included embedded Visual Basic scripts in malicious documents. ;; Rancor has used VBS scripts as well as embedded macros for execution. ;; Remexi uses AutoIt and VBS scripts throughout its execution process. ;; REvil has used obfuscated VBA macros for execution. ;; Sandworm Team has created VBScripts to run an SSH server. ;; Sharpshooter's first-stage downloader was a VBA macro. ;; Sibot executes commands using VBScript. ;; Sidewinder has used VBScript to drop and execute malware loaders. ;; Silence has used VBS scripts. ;; Smoke Loader adds a Visual Basic script in the Startup folder to deploy the payload. ;; StoneDrill has several VBS scripts used throughout the malware's lifecycle. ;; SUNBURST used VBScripts to initiate the execution of payloads. ;; TA459 has a VBScript for execution. ;; TA505 has used VBS for code execution. ;; Turla has used VBS scripts throughout its operations. ;; TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution. ;; Ursnif droppers have used VBA macros to download and execute the malware's full executable payload. ;; VBShower has the ability to execute VBScript files. ;; Windshift has used Visual Basic 6 (VB6) payloads. ;; WIRTE has used VBS scripts throughout its operation. ;; Xbash can execute malicious VBScript payloads on the victim’s machine.;;archive contains malicious BornSlippy VBScript (VBS) files that attempt to write a DLL file to disk and execute it using rundll32.exe ;; WMIEXEC is a lightweight backdoor written in VBScript that uses WMI to execute shell commands or create a reverse shell on a remote system ;; RATDispenser malware decodes itself and launches a stand-alone VBScript, which then installs a remote access Trojan on the infected device ",1,accept,T1059.005,Command and Scripting Interpreter: Visual Basic Bundlore can use AppleScript to inject malicious JavaScript into a browser. ,1,accept,T1059.002,Command and Scripting Interpreter: Applescript Dok uses AppleScript to create a login item for persistence. ,1,accept,T1059.002,Command and Scripting Interpreter: Applescript ThiefQuest uses AppleScript's osascript -e command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon.,1,accept,T1059.002,Command and Scripting Interpreter: Applescript Malware used AppleScript to run unauthorised commands into an open SSH connection,1,accept,T1059.002,Command and Scripting Interpreter: Applescript AppleScript is used by APT-1 to open fake login prompt to trick user into entering password. ,1,accept,T1059.002,Command and Scripting Interpreter: Applescript Attackers run malicious AppleScript via Automator workflows to gather system information,1,accept,T1059.002,Command and Scripting Interpreter: Applescript ,1,accept,T1564.002,Hide Artifacts: Hidden Users Adversaries may use hidden users to mask the presence of user accounts they create ,1,accept,T1564.002,Hide Artifacts: Hidden Users The software contains a hidden user account ,1,accept,T1564.002,Hide Artifacts: Hidden Users Adding a hidden user to the victim computer ,1,accept,T1564.002,Hide Artifacts: Hidden Users Attacker conceal user accounts to not let them appear on log screen ,1,accept,T1564.002,Hide Artifacts: Hidden Users Backdoor creates hidden user account to enable remote access without getting immidiately noticed by user,1,accept,T1564.002,Hide Artifacts: Hidden Users AppleJeus has presented the user with a UAC prompt to elevate privileges while installing. ,1,accept,T1548.002,Abuse Elevation Control Mechanism: Bypass User Account Control APT29 has bypassed UAC. ,1,accept,T1548.002,Abuse Elevation Control Mechanism: Bypass User Account Control APT37 has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges. ,1,accept,T1548.002,Abuse Elevation Control Mechanism: Bypass User Account Control AutoIt backdoor attempts to escalate privileges by bypassing User Access Control. ,1,accept,T1548.002,Abuse Elevation Control Mechanism: Bypass User Account Control BitPaymer can suppress UAC prompts by setting the HKCU\Software\Classes\ms-settings\shell\open\command registry key on Windows 10 or HKCU\Software\Classes\mscfile\shell\open\command on Windows 7 and launching the eventvwr.msc process which launches BitPaymer with elevated privileges. ,1,accept,T1548.002,Abuse Elevation Control Mechanism: Bypass User Account Control BlackEnergy attempts to bypass default User Access Control (UAC) settings by exploiting a backward-compatibility setting found in Windows 7 and later. ,1,accept,T1548.002,Abuse Elevation Control Mechanism: Bypass User Account Control BRONZE BUTLER has used a Windows 10 specific tool and xxmm to bypass UAC for privilege escalation. ,1,accept,T1548.002,Abuse Elevation Control Mechanism: Bypass User Account Control Cobalt Group has bypassed UAC. ;; Cobalt Strike can use a number of known techniques to bypass Windows UAC. ;; CSPY Downloader can bypass UAC using the SilentCleanup task to execute the binary with elevated privileges. ;; Downdelph bypasses UAC to escalate privileges by using a custom “RedirectEXE” shim database. ;; Empire includes various modules to attempt to bypass UAC for escalation of privileges. ;; Evilnum has used PowerShell to bypass UAC. ;; FinFisher performs UAC bypass. ;; Grandoreiro can bypass UAC by registering as the default handler for .MSC files. ;; H1N1 bypasses user access control by using a DLL hijacking vulnerability in the Windows Update Standalone Installer (wusa.exe). ;; Honeybee uses a combination of NTWDBLIB.dll and cliconfg.exe to bypass UAC protections using DLL hijacking. ;; InvisiMole can use fileless UAC bypass and create an elevated COM object to escalate privileges. ;; Koadic has 2 methods for elevating integrity. It can bypass UAC through eventvwr.exe and sdclt.exe. ;; KONNI bypassed UAC with the “AlwaysNotify” settings. ;; MuddyWater uses various techniques to bypass UAC. ;; Patchwork bypassed User Access Control (UAC). ;; PipeMon installer can use UAC bypass techniques to install the payload. ;; An older variant of PLAINTEE performs UAC bypass. ;; PoshC2 can utilize multiple methods to bypass UAC. ;; Pupy can bypass Windows UAC through either DLL hijacking eventvwr or appPaths. ;; Ramsay can use UACMe for privilege escalation. ;; Remcos has a command for UAC bypassing. ;; RTM can attempt to run the program as admin then show a fake error message and a legitimate UAC bypass prompt to the user in an attempt to socially engineer the user into escalating privileges. ;; Sakula contains UAC bypass code for both 32- and 64-bit systems. ;; Shamoon attempts to disable UAC remote restrictions by modifying the Registry. ;; ShimRat has hijacked the cryptbase.dll within migwiz.exe to escalate privileges. This prevented the User Access Control window from appearing. ;; A Threat Group-3390 tool can use a public UAC bypass method to elevate privileges. ;; UACMe contains many methods for bypassing Windows User Account Control on multiple versions of the operating system. ;; Many ZeroT samples can perform UAC bypass by using eventvwr.exe to execute a malicious file.,1,accept,T1548.002,Abuse Elevation Control Mechanism: Bypass User Account Control LoudMiner has used QEMU and VirtualBox to run a Tiny Core Linux virtual machine which runs XMRig and makes connections to the C2 server for updates. ,1,accept,T1564.006,Hide Artifacts: Run Virtual Instance Maze operators have used VirtualBox and a Windows 7 virtual machine to run the ransomware; the virtual machine's configuration file mapped the shared network drives of the target company presumably so Maze can encrypt files on the shared drives as well as the local machine. ,1,accept,T1564.006,Hide Artifacts: Run Virtual Instance Ragnar Locker has used VirtualBox and a stripped Windows XP virtual machine to run itself. The use of a shared folder specified in the configuration enables Ragnar Locker to encrypt files on the host operating system including files on any mapped drives.,1,accept,T1564.006,Hide Artifacts: Run Virtual Instance Malware connects to C2 server via VirtulBox machine to avoid detection by IPS,1,accept,T1564.006,Hide Artifacts: Run Virtual Instance Data is exfilterated through a shared folder on QEMU linux machine to evade DLP solution,1,accept,T1564.006,Hide Artifacts: Run Virtual Instance Darkhotel has used malware that repeatedly checks the mouse cursor position to determine if a real user is on the system. ,1,accept,T1497.002,Virtualization/Sandbox Evasion: User Activity Based Checks FIN7 used images embedded into document lures that only activate the payload when a user double clicks to avoid sandboxes. ,1,accept,T1497.002,Virtualization/Sandbox Evasion: User Activity Based Checks Okrum loader only executes the payload after the left mouse button has been pressed at least three times in order to avoid being executed within virtualized or emulated environments. ,1,accept,T1497.002,Virtualization/Sandbox Evasion: User Activity Based Checks Spark has used a splash screen to check whether an user actively clicks on the screen before running malicious code.,1,accept,T1497.002,Virtualization/Sandbox Evasion: User Activity Based Checks Wanacry looks for minimum system drive size to check if it is getting run inside sandbox,1,accept,T1497.002,Virtualization/Sandbox Evasion: User Activity Based Checks " If malware finds a very limited and old browser history, then it exits immidiately",1,accept,T1497.002,Virtualization/Sandbox Evasion: User Activity Based Checks Malware checks number of files in downloads folder to determine if it is a real user system,1,accept,T1497.002,Virtualization/Sandbox Evasion: User Activity Based Checks BOOTRASH has used unallocated disk space between partitions for a hidden file system that stores components of the Nemesis bootkit. ,1,accept,T1564.005,Hide Artifacts: Hidden File System ComRAT has used a portable FAT16 partition image placed in %TEMP% as a hidden file system. ,1,accept,T1564.005,Hide Artifacts: Hidden File System Equation has used an encrypted virtual file system stored in the Windows Registry. ,1,accept,T1564.005,Hide Artifacts: Hidden File System Regin has used a hidden file system to store some of its components. ,1,accept,T1564.005,Hide Artifacts: Hidden File System Strider has used a hidden file system that is stored as a file on disk.,1,accept,T1564.005,Hide Artifacts: Hidden File System Blue Mockingbird has used wmic.exe and Windows Registry modifications to set the COR_PROFILER environment variable to execute a malicious DLL whenever a process loads the .NET CLR.,1,accept,T1574.012,Hijack Execution Flow: Cor_Profiler Actors exploring all things .NET including COR_PROFILER unmanaged code loading for defense evasion/UAC bypass and the Ghost Loader AppDomainManager injection technique ,1,accept,T1574.012,Hijack Execution Flow: Cor_Profiler The most novel technique was the use of a COR_PROFILER COM hijack to execute a malicious DLL and restore items removed by defenders ,1,accept,T1574.012,Hijack Execution Flow: Cor_Profiler " To use COR_PROFILER, malware used wmic.exe and Windows Registry modifications to set environment variables and specify a DLL payload ",1,accept,T1574.012,Hijack Execution Flow: Cor_Profiler COR_PROFILER environment variable is set to execute malicious DLL when .NET application is run,1,accept,T1574.012,Hijack Execution Flow: Cor_Profiler BackConfig has the ability to use hidden columns in Excel spreadsheets to store executable files or commands for VBA macros. ,1,accept,T1137.001,Office Application Startup: Office Template Macros Cobalt Strike has the ability to use an Excel Workbook to execute additional code by enabling Office to trust macros and execute code without user permission. ,1,accept,T1137.001,Office Application Startup: Office Template Macros MuddyWater has used a Word Template Normal.dotm for persistence.,1,accept,T1137.001,Office Application Startup: Office Template Macros Malware leveraged search order hijacking to load malicious Normal.dotm template,1,accept,T1137.001,Office Application Startup: Office Template Macros Adversaries register a the template as trusted document to execute malicious macros without explicit user permissioin,1,accept,T1137.001,Office Application Startup: Office Template Macros Bundlore creates a new key pair with ssh-keygen and drops the newly created user key in authorized_keys to enable remote login. ,1,accept,T1098.004,Account Manipulation: Ssh Authorized Keys Skidmap has the ability to add the public key of its handlers to the authorized_keys file to maintain persistence on an infected host.,1,accept,T1098.004,Account Manipulation: Ssh Authorized Keys TeamTNT’s public key is appended to /root/.ssh/authorized_keys so that the threat actors can now login using the generated public-private key pair ,1,accept,T1098.004,Account Manipulation: Ssh Authorized Keys the server can manipulate subdirectories as well (for example overwrite .ssh/authorized_keys) ,1,accept,T1098.004,Account Manipulation: Ssh Authorized Keys " By creating a privileged container that mounts the host filesystem and overwrites root’s SSH authorized_keys, the attacker can then connect through SSH from the container to the host and execute anything they want ",1,accept,T1098.004,Account Manipulation: Ssh Authorized Keys APT19 used PowerShell commands to execute payloads. ,1,accept,T1059.001,Command and Scripting Interpreter: Powershell APT28 downloads and executes PowerShell scripts and performs PowerShell commands. ,1,accept,T1059.001,Command and Scripting Interpreter: Powershell APT29 has used encoded PowerShell scripts uploaded to CozyCar installations to download and install SeaDuke. APT29 also used PowerShell to create new tasks on remote machines identify configuration settings evade defenses exfiltrate data and to execute other commands.. ,1,accept,T1059.001,Command and Scripting Interpreter: Powershell APT3 has used PowerShell on victim systems to download and run payloads after exploitation. ,1,accept,T1059.001,Command and Scripting Interpreter: Powershell APT32 has used PowerShell-based tools PowerShell one-liners and shellcode loaders for execution. ,1,accept,T1059.001,Command and Scripting Interpreter: Powershell APT33 has utilized PowerShell to download files from the C2 server and run various scripts. ,1,accept,T1059.001,Command and Scripting Interpreter: Powershell APT39 has used PowerShell to execute malicious code. ,1,accept,T1059.001,Command and Scripting Interpreter: Powershell APT41 leveraged PowerShell to deploy malware families in victims’ environments. ;; AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader. ;; Bazar can execute a PowerShell script received from C2. ;; BloodHound can use PowerShell to pull Active Directory information from the target environment. ;; Blue Mockingbird has used PowerShell reverse TCP shells to issue interactive commands over a network connection. ;; BONDUPDATER is written in PowerShell. ;; BRONZE BUTLER has used PowerShell for execution. ;; Chimera has used PowerShell scripts to execute malicious payloads and the DSInternals PowerShell module to make use of Active Directory features. ;; Cobalt Group has used powershell.exe to download and execute scripts. ;; Cobalt Strike can execute a payload on a remote host with PowerShell. This technique does not write any data to disk. Cobalt Strike can also use PowerSploit and other scripting frameworks to perform execution. ;; ComRAT has used PowerShell to load itself every time a user logs in to the system. ComRAT can execute PowerShell scripts loaded into memory or from the file system. ;; ConnectWise can be used to execute PowerShell commands on target machines. ;; CopyKittens has used PowerShell Empire. ;; CrackMapExec can execute PowerShell commands via WMI. ;; DarkHydrus leveraged PowerShell to download and execute additional scripts for execution. ;; DarkVishnya used PowerShell to create shellcode loaders. ;; Deep Panda has used PowerShell scripts to download and execute programs in memory without writing to disk. ;; Denis has a version written in PowerShell. ;; DownPaper uses PowerShell for execution. ;; Dragonfly 2.0 used PowerShell scripts for execution. ;; Egregor has used an encoded PowerShell command by a service created by Cobalt Strike for lateral movement. ;; Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz. ;; Empire leverages PowerShell for the majority of its client-side agent tasks. Empire also contains the ability to conduct PowerShell remoting with the Invoke-PSRemoting module. ;; FatDuke has the ability to execute PowerShell scripts. ;; FIN10 uses PowerShell for execution as well as PowerShell Empire to establish persistence. ;; FIN6 has used PowerShell to gain access to merchant's networks and a Metasploit PowerShell module to download and execute shellcode and to set up a local listener. ;; FIN7 used a PowerShell script to launch shellcode that retrieved an additional payload. ;; FIN8's malicious spearphishing payloads are executed as PowerShell. FIN8 has also used PowerShell during Lateral Movement and Credential Access. ;; Fox Kitten has used PowerShell scripts to access credential data. ;; Frankenstein has used PowerShell to run a series of base64-encoded commands that acted as a stager and enumerated hosts. ;; GALLIUM used PowerShell for execution to assist in lateral movement as well as for dumping credentials stored on compromised machines. ;; Gallmaker used PowerShell to download additional payloads and for execution. ;; GOLD SOUTHFIELD has staged and executed PowerShell scripts on compromised hosts. ;; Gorgon Group malware can use PowerShell commands to download and execute a payload and open a decoy document on the victim’s machine. ;; GRIFFON has used PowerShell to execute the Meterpreter downloader TinyMet. ;; HAFNIUM has used the Exchange Power Shell module Set-OabVirtualDirectoryPowerShell to export mailbox data. ;; HALFBAKED can execute PowerShell scripts. ;; HAMMERTOSS is known to use PowerShell. ;; Hancitor has used PowerShell to execute commands. ;; One version of Helminth uses a PowerShell script. ;; Inception has used PowerShell to execute malicious commands and payloads. ;; Indrik Spider has used PowerShell Empire for execution of malware. ;; JCry has used PowerShell to execute payloads. ;; KeyBoy uses PowerShell commands to download and execute payloads. ;; KGH_SPY can execute PowerShell commands on the victim's machine. ;; Kimsuky has executed a variety of PowerShell scripts. ;; KONNI used PowerShell to download and execute a specific 64-bit version of the malware. ;; Lazarus Group has used Powershell to download malicious payloads. ;; Leviathan has used PowerShell for execution. ;; Magic Hound has used PowerShell for execution and privilege escalation. ;; menuPass uses PowerSploit to inject shellcode into PowerShell. ;; MoleNet can use PowerShell to set persistence. ;; Molerats used PowerShell implants on target machines. ;; Mosquito can launch PowerShell Scripts. ;; MuddyWater has used PowerShell for execution. ;; Mustang Panda has used malicious PowerShell scripts to enable execution. ;; Netwalker has been written in PowerShell and executed directly in memory avoiding detection. ;; The NETWIRE binary has been executed via PowerShell script. ;; njRAT has executed PowerShell commands via auto-run registry key persistence. ;; OilRig has used PowerShell scripts for execution including use of a macro to run a PowerShell command to decode file contents. ;; Operation Wocao has used PowerShell on compromised systems. ;; OSX_OCEANLOTUS.D uses PowerShell scripts. ;; Patchwork used PowerSploit to download payloads run a reverse shell and execute malware on the victim's machine. ;; Pillowmint has used a PowerShell script to install a shim database. ;; The Poseidon Group's Information Gathering Tool (IGT) includes PowerShell components. ;; POSHSPY uses PowerShell to execute various commands one to execute its payload. ;; PowerShower is a backdoor written in PowerShell. ;; POWERSOURCE is a PowerShell backdoor. ;; PowerSploit modules are written in and executed via PowerShell. ;; PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server. ;; POWERSTATS uses PowerShell for obfuscation and execution. ;; POWERTON is written in PowerShell. ;; POWRUNER is written in PowerShell. ;; PUNCHBUGGY has used PowerShell scripts. ;; Pupy has a module for loading and executing PowerShell scripts. ;; Pysa has used Powershell scripts to deploy its ransomware. ;; QUADAGENT uses PowerShell scripts for execution. ;; There is a variant of RATANKBA that uses a PowerShell script instead of the traditional PE form. ;; RegDuke can extract and execute PowerShell scripts from C2 communications. ;; Revenge RAT uses the PowerShell command Reflection.Assembly to load itself into memory to aid in execution. ;; REvil has used PowerShell to delete volume shadow copies and download files. ;; RogueRobin uses a command prompt to run a PowerShell script from Excel. To assist in establishing persistence RogueRobin creates %APPDATA%\OneDrive.bat and saves the following string to it:powershell.exe -WindowStyle Hidden -exec bypass -File “%APPDATA%\OneDrive.ps1”. ;; Sandworm Team has used PowerShell scripts to run a credential harvesting tool in memory to evade defenses. ;; SeaDuke uses a module to execute Mimikatz with PowerShell to perform Pass the Ticket. ;; ServHelper has the ability to execute a PowerShell script to get information from the infected host. ;; SharpStage can execute arbitrary commands with PowerShell. ;; SHARPSTATS has the ability to employ a custom PowerShell script. ;; Sidewinder has used PowerShell to drop and execute malware loaders. ;; Silence has used PowerShell to download and execute payloads. ;; Socksbot can write and execute PowerShell scripts. ;; SQLRat has used PowerShell to create a Meterpreter session. ;; Stealth Falcon malware uses PowerShell commands to perform various functions including gathering system information via WMI and executing commands from its C2 server. ;; StrongPity can use PowerShell to add files to the Windows Defender exclusions list. ;; TA459 has used PowerShell for execution of a payload. ;; TA505 has used PowerShell to download and execute malware and reconnaissance scripts. ;; TEMP.Veles has used a publicly-available PowerShell-based tool WMImplant. The group has also used PowerShell to perform Timestomping. ;; Threat Group-3390 has used PowerShell for execution. ;; Thrip leveraged PowerShell to run commands to download payloads traverse the compromised networks and carry out reconnaissance. ;; Turla has used PowerShell to execute commands/scripts in some cases via a custom executable or code from Empire's PSInject. Turla has also used PowerShell scripts to load and execute malware in memory. ;; UNC2452 used PowerShell to create new tasks on remote machines identify configuration settings exfiltrate data and to execute other commands. ;; Ursnif droppers have used PowerShell in download cradles to download and execute the malware's full executable payload. ;; Valak has used PowerShell to download additional modules. ;; WellMess can execute PowerShell scripts received from C2. ;; WIRTE has used PowerShell for script execution. ;; Wizard Spider has used macros to execute PowerShell scripts to download malware on victim's machines. It has also used PowerShell to execute commands and move laterally through a victim network. ;; Xbash can use scripts to invoke PowerShell to download a malicious PE executable or PE DLL for execution. ;; Zeus Panda uses PowerShell to download and execute the payload.,1,accept,T1059.001,Command and Scripting Interpreter: Powershell APT29 has developed malware variants written in Python. ,1,accept,T1059.006,Command and Scripting Interpreter: Python APT39 has used a command line utility and a network scanner written in python. ,1,accept,T1059.006,Command and Scripting Interpreter: Python BRONZE BUTLER has made use of Python-based remote access tools. ,1,accept,T1059.006,Command and Scripting Interpreter: Python Bundlore has used Python scripts to execute payloads. ,1,accept,T1059.006,Command and Scripting Interpreter: Python Cobalt Strike can use Python to perform execution. ,1,accept,T1059.006,Command and Scripting Interpreter: Python CoinTicker executes a Python script to download its second stage. ,1,accept,T1059.006,Command and Scripting Interpreter: Python CookieMiner has used python scripts on the user’s system as well as the Python variant of the Empire agent EmPyre. ,1,accept,T1059.006,Command and Scripting Interpreter: Python Dragonfly 2.0 used various types of scripting to perform operations including Python scripts. The group was observed installing Python 2.7 on a victim. ;; DropBook is a Python-based backdoor compiled with PyInstaller. ;; Ebury has used Python to implement its DGA. ;; IronNetInjector can use IronPython scripts to load payloads with the help of a .NET injector. ;; KeyBoy uses Python scripts for installing files and performing execution. ;; Keydnap uses Python for scripting to execute additional commands. ;; Kimsuky has used a Mac OS Python implant to gather data. ;; Machete used multiple compiled Python scripts on the victim’s system. Machete's main backdoor Machete is also written in Python. ;; Machete is written in Python and is used in conjunction with additional Python scripts. ;; MechaFlounder uses a python-based payload. ;; MuddyWater has used developed tools in Python including Out1. ;; Operation Wocao's backdoors have been written in Python and compiled with py2exe. ;; PoetRAT was executed with a Python script and worked in conjunction with additional Python-based post-exploitation tools. ;; PUNCHBUGGY has used python scripts. ;; Pupy can use an add on feature when creating payloads that allows you to create custom Python scripts (“scriptlets”) to perform tasks offline (without requiring a session) such as sandbox detection adding persistence etc. ;; Pysa has used Python scripts to deploy ransomware. ;; Remcos uses Python scripts. ;; Rocke has used Python-based malware to install and spread their coinminer. ;; SpeakUp uses Python scripts. ;; Turla has used IronPython scripts as part of the IronNetInjector toolchain to drop payloads. ;; ZIRCONIUM has used Python-based implants to interact with compromised hosts.,1,accept,T1059.006,Command and Scripting Interpreter: Python CoinTicker downloads the EggShell mach-o binary using curl which does not set the quarantine flag. ,1,accept,T1553.001,Subvert Trust Controls: Gatekeeper Bypass OSX_OCEANLOTUS.D can delete the file quarantine attribute.,1,accept,T1553.001,Subvert Trust Controls: Gatekeeper Bypass MacOS exploit allows execution of untrusted binaries using Gatekeeper Bypass,1,accept,T1553.001,Subvert Trust Controls: Gatekeeper Bypass Command xattr when run as root can disable quarantine flag flag to enable execution of downloaded binary without user prompt. ,1,accept,T1553.001,Subvert Trust Controls: Gatekeeper Bypass Administrator should flag removal of com.apple.quarantine flag by user as suspicious activity,1,accept,T1553.001,Subvert Trust Controls: Gatekeeper Bypass Cobalt Group has used odbcconf to proxy the execution of malicious DLL files.,1,accept,T1218.008,Signed Binary Proxy Execution: Odbcconf Actors can use REGSVR flag from odbcconf.exe to execute malicious DLLs ,1,accept,T1218.008,Signed Binary Proxy Execution: Odbcconf A Microsoft Signed database utility odbcconf can be misused to run malicious payload bypassing application control solutions ,1,accept,T1218.008,Signed Binary Proxy Execution: Odbcconf " Similar to Regsvr32, odbcconf.exe can also be used to proxy execution of malicious code ",1,accept,T1218.008,Signed Binary Proxy Execution: Odbcconf APT-21 actors attempt to bypass application control policies via proxy execution through odbcconf ,1,accept,T1218.008,Signed Binary Proxy Execution: Odbcconf APT19 used Regsvr32 to bypass application control techniques. ,1,accept,T1218.010,Signed Binary Proxy Execution: Regsvr32 APT32 created a Scheduled Task/Job that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory. The group has also used regsvr32 to run their backdoor. ,1,accept,T1218.010,Signed Binary Proxy Execution: Regsvr32 Astaroth can be loaded through regsvr32.exe. ,1,accept,T1218.010,Signed Binary Proxy Execution: Regsvr32 Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using regsvr32.exe. ,1,accept,T1218.010,Signed Binary Proxy Execution: Regsvr32 Cobalt Group has used regsvr32.exe to execute scripts. ,1,accept,T1218.010,Signed Binary Proxy Execution: Regsvr32 Deep Panda has used regsvr32.exe to execute a server variant of Derusbi in victim networks. ,1,accept,T1218.010,Signed Binary Proxy Execution: Regsvr32 Derusbi variants have been seen that use Registry persistence to proxy execution through regsvr32.exe. ,1,accept,T1218.010,Signed Binary Proxy Execution: Regsvr32 Egregor has used regsvr32.exe to execute malicious DLLs. ;; EVILNUM can run a remote scriptlet that drops a file and executes it via regsvr32.exe. ;; Hi-Zor executes using regsvr32.exe called from the Registry Run Keys / Startup Folder persistence mechanism. ;; Inception has ensured persistence at system boot by setting the value regsvr32 %path%\ctfmonrn.dll /s. ;; Koadic can use Regsvr32 to execute additional payloads. ;; Leviathan has used regsvr32 for execution. ;; More_eggs has used regsvr32.exe to execute the malicious DLL. ;; Some Orz versions have an embedded DLL known as MockDll that uses Process Hollowing and regsvr32 to execute another payload. ;; Ragnar Locker has used regsvr32.exe to execute components of VirtualBox. ;; RogueRobin uses regsvr32.exe to run a .sct file for execution. ;; TA551 has used regsvr32.exe to load malicious DLLs. ;; Valak has used regsvr32.exe to launch malicious DLLs. ;; WIRTE has used Regsvr32.exe to trigger the execution of a malicious script. ;; Xbash can use regsvr32 for executing scripts.,1,accept,T1218.010,Signed Binary Proxy Execution: Regsvr32 Agent Tesla has dropped RegAsm.exe onto systems for performing malicious activity.,1,accept,T1218.009,Signed Binary Proxy Execution: Regsvcs/Regasm Malware then drops Regscvs.exe to perform malicious activity ,1,accept,T1218.009,Signed Binary Proxy Execution: Regsvcs/Regasm A windows command-line utility Regasm.exe to run malicious code before COM object registration ,1,accept,T1218.009,Signed Binary Proxy Execution: Regsvcs/Regasm Actors download Regscvs on the system to perform proxy execution of malicious code,1,accept,T1218.009,Signed Binary Proxy Execution: Regsvcs/Regasm Microsoft signed binaries regscvs.exe and regasm.exe are used to execute malicious code onto infected system,1,accept,T1218.009,Signed Binary Proxy Execution: Regsvcs/Regasm menuPass has used InstallUtil.exe to execute malicious software. ,1,accept,T1218.004,Signed Binary Proxy Execution: Installutil Mustang Panda has used InstallUtil.exe to execute a malicious Beacon stager.,1,accept,T1218.004,Signed Binary Proxy Execution: Installutil InstallUtil.exe is used to execute malicious installer components in .Net binaries ,1,accept,T1218.004,Signed Binary Proxy Execution: Installutil Actors use microsoft signed InstallUtil.exe for performing proxy execution of malicious .Net code ,1,accept,T1218.004,Signed Binary Proxy Execution: Installutil Malware performs proxy execution via InstallUtil to evade application control solutions ,1,accept,T1218.004,Signed Binary Proxy Execution: Installutil Cobalt Group has used the command cmstp.exe /s /ns C:\Users\ADMINI~W\AppData\Local\Temp\XKNqbpzl.txt to bypass AppLocker and launch a malicious script. ,1,accept,T1218.003,Signed Binary Proxy Execution: Cmstp MuddyWater has used CMSTP.exe and a malicious INF to execute its POWERSTATS payload.,1,accept,T1218.003,Signed Binary Proxy Execution: Cmstp obfuscated service profile file is written to %APPDATA%\Microsoft\%RANDOM%%RANDOM%.txt that is executed using cmstp.exe to download and execute a first-stage scriptlet ,1,accept,T1218.003,Signed Binary Proxy Execution: Cmstp " That batch file writes a malicious INF file and supplies it as a parameter to the Microsoft utility cmstp.exe, which executes a remote scriptlet specified in the INF file. ",1,accept,T1218.003,Signed Binary Proxy Execution: Cmstp The LNK file runs cmd.exe to create %APPDATA%\Microsoft\.txt. This txt file will be further run by the cmstp.exe utility ,1,accept,T1218.003,Signed Binary Proxy Execution: Cmstp APT41 used compiled HTML (.chm) files for targeting. ,1,accept,T1218.001,Signed Binary Proxy Execution: Compiled Html File Astaroth uses ActiveX objects for file execution and manipulation. ,1,accept,T1218.001,Signed Binary Proxy Execution: Compiled Html File Dark Caracal leveraged a compiled HTML file that contained a command to download and run an executable. ,1,accept,T1218.001,Signed Binary Proxy Execution: Compiled Html File Lazarus Group has used CHM files to move concealed payloads. ,1,accept,T1218.001,Signed Binary Proxy Execution: Compiled Html File OilRig has used a CHM payload to load and execute another malicious file once delivered to a victim. ,1,accept,T1218.001,Signed Binary Proxy Execution: Compiled Html File Silence has weaponized CHM files in their phishing campaigns.,1,accept,T1218.001,Signed Binary Proxy Execution: Compiled Html File ,1,accept,T1055.014,Process Injection: Vdso Hijacking "By writing shellcode in vDSO and hijacking the invocation process of a normal function, an attacker that successfully exploits this vulnerability could obtain reverse shell on a host to escape the container. ",1,accept,T1055.014,Process Injection: Vdso Hijacking Malware performs VDSO hijacking by redirecting calls to dynamically linked shared libraries to run malicious code ,1,accept,T1055.014,Process Injection: Vdso Hijacking adversary may hijack the syscall interface code stubs mapped into a process from the vdso shared object to execute syscalls to open and map a malicious shared object ,1,accept,T1055.014,Process Injection: Vdso Hijacking Execution via VDSO hijacking may also evade detection from security products since the execution is masked under a legitimate process ,1,accept,T1055.014,Process Injection: Vdso Hijacking Rootkits inject malicious code into processes via VDSO hijacking in order to evade process-based defenses as well as possibly elevate privileges,1,accept,T1055.014,Process Injection: Vdso Hijacking ,1,accept,T1055.009,Process Injection: Proc Memory Attacker uses Proc memory injection to execute malicious code in the address space of a legitimate process,1,accept,T1055.009,Process Injection: Proc Memory Malware overwrites the target processes’ stack using memory mappings provided by the /proc filesystem ,1,accept,T1055.009,Process Injection: Proc Memory Malware enumerates the memory of a process via the /proc filesystem (/proc/[pid]) then crafting ROP payload to run malicious instructions. ,1,accept,T1055.009,Process Injection: Proc Memory Attackers use /proc filesystem to overwrite memory of legitimate process to perform malicious activity ,1,accept,T1055.009,Process Injection: Proc Memory Malicious code is run without detection using /proc filesystem together with ROP payloads,1,accept,T1055.009,Process Injection: Proc Memory ,1,accept,T1055.008,Process Injection: Ptrace System Calls Malware inject malicious code into processes via ptrace system calls to elevate privilages and evade process-based defenses ,1,accept,T1055.008,Process Injection: Ptrace System Calls " Using proces injection via ptrace, attackers get access to the process's memory, system/network resources, and possibly elevated privileges ",1,accept,T1055.008,Process Injection: Ptrace System Calls Campaign uses Ptrace system call injection for executing malicious code in the address space of a trusted process. ,1,accept,T1055.008,Process Injection: Ptrace System Calls Malware then used ptrace to elevate privilage to modify hosts file. ,1,accept,T1055.008,Process Injection: Ptrace System Calls Infostealer used ptrace to dump authentication token from process memory. ,1,accept,T1055.008,Process Injection: Ptrace System Calls APT33 has used a variety of publicly available tools like Gpppassword to gather credentials. ,1,accept,T1552.006,Unsecured Credentials: Group Policy Preferences PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Group Policy Preferences.,1,accept,T1552.006,Unsecured Credentials: Group Policy Preferences Attackers try to find unsecured credentials in Group Policy Preferences (GPP) using Metasploit module,1,accept,T1552.006,Unsecured Credentials: Group Policy Preferences APT campaign uses Gpppassword tool to extract credentials from GPP ,1,accept,T1552.006,Unsecured Credentials: Group Policy Preferences Attackers use opensource tools to gather and decrypt the password file from Group Policy Preference XML files ,1,accept,T1552.006,Unsecured Credentials: Group Policy Preferences Anchor can execute payloads via shell scripting. ,1,accept,T1059.004,Command and Scripting Interpreter: Unix Shell AppleJeus has used shell scripts to execute commands after installation and set persistence mechanisms. ,1,accept,T1059.004,Command and Scripting Interpreter: Unix Shell APT41 executed file /bin/pwd in activity exploiting CVE-2019-19781 against Citrix devices. ,1,accept,T1059.004,Command and Scripting Interpreter: Unix Shell Bundlore has leveraged /bin/sh and /bin/bash to execute commands on the victim machine. ,1,accept,T1059.004,Command and Scripting Interpreter: Unix Shell CallMe has the capability to create a reverse shell on victims. ,1,accept,T1059.004,Command and Scripting Interpreter: Unix Shell Chaos provides a reverse shell connection on 8338/TCP encrypted via AES. ,1,accept,T1059.004,Command and Scripting Interpreter: Unix Shell CoinTicker executes a bash script to establish a reverse shell. ,1,accept,T1059.004,Command and Scripting Interpreter: Unix Shell CookieMiner has used a Unix shell script to run a series of commands targeting macOS. ;; Derusbi is capable of creating a remote Bash shell and executing commands. ;; Doki has executed shell scripts with /bin/sh. ;; Drovorub can execute arbitrary commands as root on a compromised system. ;; Exaramel for Linux has a command to execute a shell command on the system. ;; Fysbis has the ability to create and execute commands in a remote shell for CLI. ;; Hildegard has used shell scripts for execution. ;; Kazuar uses /bin/bash to execute commands on the victim’s machine. ;; Kinsing has used Unix shell scripts to execute commands in the victim environment. ;; LoudMiner used shell scripts to launch various services and to start/stop the QEMU virtualization. ;; NETWIRE has the ability to use /bin/bash and /bin/sh to execute commands. ;; OSX/Shlayer can use bash scripts to check the macOS version and download payloads. ;; OSX_OCEANLOTUS.D can use shell script to execute malicious code. ;; Penquin can execute remote commands using bash scripts. ;; Proton uses macOS' .command file type to script actions. ;; Rocke used shell scripts to run commands which would obtain persistence and execute the cryptocurrency mining malware. ;; Skidmap has used pm.sh to download and install its main payload. ;; WindTail can use the open command to execute an application.,1,accept,T1059.004,Command and Scripting Interpreter: Unix Shell APT1 has been known to use credential dumping using Mimikatz. ,1,accept,T1003.001,OS Credential Dumping: Lsass Memory APT28 regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims. ,1,accept,T1003.001,OS Credential Dumping: Lsass Memory " APT3 has used a tool to dump credentials by injecting itself into lsass.exe and triggering with the argument dig."" ",1,accept,T1003.001,OS Credential Dumping: Lsass Memory APT32 used Mimikatz and customized versions of Windows Credential Dumper to harvest credentials. ,1,accept,T1003.001,OS Credential Dumping: Lsass Memory APT33 has used a variety of publicly available tools like LaZagne Mimikatz and ProcDump to dump credentials. ,1,accept,T1003.001,OS Credential Dumping: Lsass Memory APT39 has used Mimikatz Windows Credential Editor and ProcDump to dump credentials. ,1,accept,T1003.001,OS Credential Dumping: Lsass Memory APT41 used the Windows Credential Editor to dump password hashes from memory and authenticate to other user accounts. ,1,accept,T1003.001,OS Credential Dumping: Lsass Memory " Blue Mockingbird has used Mimikatz to retrieve credentials from LSASS memory. ;; BRONZE BUTLER has used various tools (such as Mimikatz and WCE) to perform credential dumping. ;; Cleaver has been known to dump credentials using Mimikatz and Windows Credential Editor. ;; CozyCar has executed Mimikatz to harvest stored credentials from the victim and further victim penetration. ;; Daserf leverages Mimikatz and Windows Credential Editor to steal credentials. ;; Emotet has been observed dropping password grabber modules including Mimikatz. ;; Empire contains an implementation of Mimikatz to gather credentials from memory. ;; FIN6 has used Windows Credential Editor for credential dumping. ;; FIN8 harvests credentials using Invoke-Mimikatz or Windows Credentials Editor (WCE). ;; Fox Kitten has used prodump to dump credentials from LSASS. ;; GALLIUM used a modified version of Mimikatz along with a PowerShell-based Mimikatz to dump credentials on the victim machines. ;; GreyEnergy has a module for Mimikatz to collect Windows credentials from the victim’s machine. ;; HAFNIUM has used procdump to dump the LSASS process memory. ;; SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information. ;; Ke3chang has dumped credentials including by using Mimikatz. ;; Kimsuky has used ProcDump to dump credentials. ;; LaZagne can perform credential dumping from memory to obtain account and password information. ;; Lazarus Group leveraged Mimikatz to extract Windows Credentials of currently logged-in users and steals passwords stored in browsers. Lazarus Group has also used a custom version Mimikatz to capture credentials. ;; Leafminer used several tools for retrieving login and password information including LaZagne and Mimikatz. ;; Leviathan has used publicly available tools to dump password hashes including ProcDump and WCE. ;; Lslsass can dump active logon session password hashes from the lsass process. ;; Magic Hound stole domain credentials from Microsoft Active Directory Domain Controller and leveraged Mimikatz. ;; Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from the LSASS Memory. ;; MuddyWater has performed credential dumping with Mimikatz and procdump64.exe. ;; Net Crawler uses credential dumpers such as Mimikatz and Windows Credential Editor to extract cached credentials from Windows systems. ;; NotPetya contains a modified version of Mimikatz to help gather credentials that are later used for lateral movement. ;; OilRig has used credential dumping tools such as Mimikatz to steal credentials to accounts logged into the compromised system and to Outlook Web Access. ;; Okrum was seen using MimikatzLite to perform credential dumping. ;; Olympic Destroyer contains a module that tries to obtain credentials from LSASS similar to Mimikatz. These credentials are used with PsExec and Windows Management Instrumentation to help the malware propagate itself across a network. ;; Operation Wocao has used ProcDump to dump credentials from memory. ;; PLATINUM has used keyloggers that are also capable of dumping credentials. ;; PoetRAT used voStro.exe a compiled pypykatz (Python version of Mimikatz) to steal credentials. ;; PoshC2 contains an implementation of Mimikatz to gather credentials from memory. ;; PowerSploit contains a collection of Exfiltration modules that can harvest credentials using Mimikatz. ;; Pupy can execute Lazagne as well as Mimikatz using PowerShell. ;; Pysa can perform OS credential dumping using Mimikatz. ;; Sandworm Team's plainpwd tool is a modified version of Mimikatz and dumps Windows credentials from system memory. ;; Silence has used the Farse6.1 utility (based on Mimikatz) to extract credentials from lsass.exe. ;; Stolen Pencil gathers credentials using Mimikatz and Procdump. ;; TEMP.Veles has used Mimikatz and a custom tool SecHack to harvest credentials. ;; Threat Group-3390 actors have used a modified version of Mimikatz called Wrapikatz to dump credentials. They have also dumped credentials from domain controllers. ;; Whitefly has used Mimikatz to obtain credentials. ;; Windows Credential Editor can dump credentials.""",1,accept,T1003.001,OS Credential Dumping: Lsass Memory APT32 has used PubPrn.vbs within execution scripts to execute malware possibly bypassing defenses.,1,accept,T1216.001,Signed Script Proxy Execution: Pubprn PubPrn.vbs can be used to proxy execution from a remote site ,1,accept,T1216.001,Signed Script Proxy Execution: Pubprn attacker uses a signed Microsoft WSH script (PubPrn.vbs) to run malicious code and bypass application whitelisting restrictions ,1,accept,T1216.001,Signed Script Proxy Execution: Pubprn Adversaries use the trusted PubPrn script to proxy execution of malicious files ,1,accept,T1216.001,Signed Script Proxy Execution: Pubprn " To bypass application control restrictions, malware uses PubPrn script to execute malicious files from remote site ",1,accept,T1216.001,Signed Script Proxy Execution: Pubprn AppleJeus has loaded a plist file using the launchctl command. ,1,accept,T1569.001,System Services: Launchctl Calisto uses launchctl to enable screen sharing on the victim’s machine. ,1,accept,T1569.001,System Services: Launchctl LoudMiner launched the QEMU services in the /Library/LaunchDaemons/ folder using launchctl.,1,accept,T1569.001,System Services: Launchctl Adversaries abuse launchctl to execute malicious commands on victim system ,1,accept,T1569.001,System Services: Launchctl Using launchctl adversaries can install persistence or execute changes they made,1,accept,T1569.001,System Services: Launchctl ADVSTORESHELL stores output from command execution in a .dat file in the %TEMP% directory. ,1,accept,T1074.001,Data Staged: Local Data Staging APT28 has stored captured credential information in a file named pi.log. ,1,accept,T1074.001,Data Staged: Local Data Staging APT3 has been known to stage files for exfiltration in a single location. ,1,accept,T1074.001,Data Staged: Local Data Staging APT39 has utilized tools to aggregate data prior to exfiltration. ,1,accept,T1074.001,Data Staged: Local Data Staging Astaroth collects data in a plaintext file named r1.log before exfiltration. ,1,accept,T1074.001,Data Staged: Local Data Staging Attor has staged collected data in a central upload directory prior to exfiltration. ,1,accept,T1074.001,Data Staged: Local Data Staging BADNEWS copies documents under 15MB found on the victim system to is the user's %temp%\SMB\ folder. It also copies files from USB devices to a predefined directory. ,1,accept,T1074.001,Data Staged: Local Data Staging " BadPatch stores collected data in log files before exfiltration. ;; Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration. ;; Carbon creates a base directory that contains the files and folders that are collected. ;; Catchamas stores the gathered data from the machine in .db files and .bmp files under four separate locations. ;; Chimera has staged stolen data locally on compromised hosts. ;; Crutch has staged stolen files in the C:\AMD\Temp directory. ;; Dragonfly 2.0 created a directory named out"" in the user's %AppData% folder and copied files to it. ;; Dtrack can save collected data to disk different file formats and network shares. ;; Modules can be pushed to and executed by Duqu that copy data to a staging area compress it and XOR encrypt it. ;; DustySky created folders in temp directories to host collected files before exfiltration. ;; Dyre has the ability to create files in a TEMP folder to act as a database to store information. ;; ECCENTRICBANDWAGON has stored keystrokes and screenshots within the %temp%\GoogleChrome %temp%\Downloads and %temp%\TrendMicroUpdate directories. ;; Elise creates a file in AppData\Local\Microsoft\Windows\Explorer and stores all harvested data in that file. ;; Exaramel for Windows specifies a path to store files scheduled for exfiltration. ;; FIN5 scripts save memory dump data into a specific directory on hosts in the victim environment. ;; FLASHFLOOD stages data it copies from the local system or removable drives in the ""%WINDIR%\$NtUninstallKB885884$\"" directory. ;; FrameworkPOS can identifiy payment card track data on the victim and copy it to a local file in a subdirectory of C:\Windows. ;; GALLIUM compressed and staged files in multi-part archives in the Recycle Bin prior to exfiltration. ;; Gold Dragon stores information gathered from the endpoint in a file named 1.hwp. ;; Helminth creates folders to store output from batch scripts prior to sending the information to its C2 server. ;; Honeybee adds collected files to a temp.zip file saved in the %temp% folder then base64 encodes it and uploads it to control server. ;; InvisiMole determines a working directory where it stores all the gathered data about the compromised machine. ;; Kazuar stages command output and collected data in files before exfiltration. ;; KGH_SPY can save collected system information to a file named ""info"" before exfiltration. ;; Kimsuky has staged collected data files under C:\Program Files\Common Files\System\Ole DB\. ;; Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is saved in the %TEMP% directory then compressed encrypted and uploaded to a C2 server. ;; Leviathan has used C:\Windows\Debug and C:\Perflogs as staging directories. ;; LightNeuron can store email data in files and directories specified in its configuration such as C:\Windows\ServiceProfiles\NetworkService\appdata\Local\Temp\. ;; Machete stores files and logs in a folder on the local drive. ;; menuPass stages data prior to exfiltration in multi-part archives often saved in the Recycle Bin. ;; MESSAGETAP stored targeted SMS messages that matched its target list in CSV files on the compromised system. ;; MoonWind saves information from its keylogging routine as a .zip file in the present working directory. ;; Mustang Panda has stored collected credential files in c:\windows\temp prior to exfiltration. Mustang Panda has also stored documents for exfiltration in a hidden folder on USB drives. ;; NavRAT writes multiple outputs to a TMP file using the >> method. ;; NETWIRE has the ability to write collected data to a file created in the ./LOGS directory. ;; NOKKI can collect data from the victim and stage it in LOCALAPPDATA%\MicroSoft Updatea\uplog.tmp. ;; OopsIE stages the output from command execution and collected files in specific folders before exfiltration. ;; Operation Wocao has staged archived files in a temporary directory prior to exfiltration. ;; Patchwork copied all targeted files to a directory called index that was eventually uploaded to the C&C server. ;; PoisonIvy stages collected data in a text file. ;; Prikormka creates a directory %USERPROFILE%\AppData\Local\SKC\ which is used to store collected log files. ;; Pteranodon creates various subdirectories under %Temp%\reports\% and copies files to those subdirectories. It also creates a folder at C:\Users\\AppData\Roaming\Microsoft\store to store screenshot JPEG files. ;; PUNCHBUGGY has saved information to a random temp file before exfil. ;; PUNCHTRACK aggregates collected data in a tmp file. ;; Ramsay can stage data prior to exfiltration in %APPDATA%\Microsoft\UserSetting and %APPDATA%\Microsoft\UserSetting\MediaCache. ;; Data captured by RawPOS is placed in a temporary file under a directory named ""memdump"". ;; Rover copies files from removable drives to C:\system. ;; Sidewinder has collected stolen files in a temporary folder in preparation for exfiltration. ;; SPACESHIP identifies files with certain extensions and copies them to a directory in the user's profile. ;; TEMP.Veles has created staging folders in directories that were infrequently used by legitimate users or processes. ;; Threat Group-3390 has locally staged encrypted archives for later exfiltration efforts. ;; Trojan.Karagany can create directories to store plugin output and stage data for exfiltration. ;; Ursnif has used tmp files to stage gathered information. ;; USBStealer collects files matching certain criteria from the victim and stores them in a local directory for later exfiltration. ;; Zebrocy stores all collected information in a single file before exfiltration.""",1,accept,T1074.001,Data Staged: Local Data Staging Hacking Team UEFI Rootkit is a UEFI BIOS rootkit developed by the company Hacking Team to persist remote access software on some targeted systems. ,1,accept,T1542.001,Pre LoJax is a UEFI BIOS rootkit deployed to persist remote access software on some targeted systems. ,1,accept,T1542.001,Pre Trojan.Mebromi performs BIOS modification and can download and execute a file as well as protect itself from removal.,1,accept,T1542.001,Pre Sophisticated adversaries overwrite firmware to install malicious firmware updates as a means of persistence on a system that may be difficult to detect,1,accept,T1542.001,Pre Rootkit malwares presist and evade detection by installing malicioufirmware updates on infected system,1,accept,T1542.001,Pre APT29 used sticky-keys to obtain unauthenticated privileged console access. ,1,accept,T1546.008,Event Triggered Execution: Accessibility Features APT3 replaces the Sticky Keys binary C:\Windows\System32\sethc.exe for persistence. ,1,accept,T1546.008,Event Triggered Execution: Accessibility Features APT41 leveraged sticky keys to establish persistence. ,1,accept,T1546.008,Event Triggered Execution: Accessibility Features Axiom actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence. ,1,accept,T1546.008,Event Triggered Execution: Accessibility Features Deep Panda has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions. ,1,accept,T1546.008,Event Triggered Execution: Accessibility Features Empire can leverage WMI debugging to remotely replace binaries like sethc.exe Utilman.exe and Magnify.exe with cmd.exe. ,1,accept,T1546.008,Event Triggered Execution: Accessibility Features Fox Kitten has used sticky keys to launch a command prompt.,1,accept,T1546.008,Event Triggered Execution: Accessibility Features APT29 added their own devices as allowed IDs for active sync using Set-CASMailbox allowing it to obtain copies of victim mailboxes. It also added additional permissions (such as Mail.Read and Mail.ReadWrite) to compromised Application or Service Principals. ,1,accept,T1098.002,Account Manipulation: Exchange Email Delegate Permissions Magic Hound granted compromised email accounts read access to the email boxes of additional targeted accounts. The group then was able to authenticate to the intended victim's OWA (Outlook Web Access) portal and read hundreds of email communications for information on Middle East organizations. ,1,accept,T1098.002,Account Manipulation: Exchange Email Delegate Permissions UNC2452 added their own devices as allowed IDs for active sync using Set-CASMailbox allowing it to obtain copies of victim mailboxes. It also added additional permissions (such as Mail.Read and Mail.ReadWrite) to compromised Application or Service Principals.,1,accept,T1098.002,Account Manipulation: Exchange Email Delegate Permissions Attacker added their own devices as allowed IDs for active sync for a number of mailboxes using Set-CASMailbox ,1,accept,T1098.002,Account Manipulation: Exchange Email Delegate Permissions Set-CASMailbox is used by adversary to assign more access rights to the accounts they wish to compromise and use these accounts,1,accept,T1098.002,Account Manipulation: Exchange Email Delegate Permissions Bazar can use Winlogon Helper DLL to establish persistence. ,1,accept,T1547.004,Boot or Logon Autostart Execution: Winlogon Helper Dll Cannon adds the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon to establish persistence. ,1,accept,T1547.004,Boot or Logon Autostart Execution: Winlogon Helper Dll A Dipsind variant registers as a Winlogon Event Notify DLL to establish persistence. ,1,accept,T1547.004,Boot or Logon Autostart Execution: Winlogon Helper Dll Gazer can establish persistence by setting the value “Shell” with “explorer.exe %malware_pathfile%” under the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon. ,1,accept,T1547.004,Boot or Logon Autostart Execution: Winlogon Helper Dll KeyBoy issues the command reg add “HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon” to achieve persistence. ,1,accept,T1547.004,Boot or Logon Autostart Execution: Winlogon Helper Dll Remexi achieves persistence using Userinit by adding the Registry key HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit. ,1,accept,T1547.004,Boot or Logon Autostart Execution: Winlogon Helper Dll Tropic Trooper has created the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell and sets the value to establish persistence. ,1,accept,T1547.004,Boot or Logon Autostart Execution: Winlogon Helper Dll Turla established persistence by adding a Shell value under the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon. ;; Wizard Spider has established persistence using Userinit by adding the Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon.,1,accept,T1547.004,Boot or Logon Autostart Execution: Winlogon Helper Dll Empire can use Inveigh to conduct name service poisoning for credential theft and associated relay attacks. ,1,accept,T1557.001,Man Impacket modules like ntlmrelayx and smbrelayx can be used in conjunction with Network Sniffing and LLMNR/NBT-NS Poisoning and SMB Relay to gather NetNTLM credentials for Brute Force or relay attacks that can gain code execution. ,1,accept,T1557.001,Man PoshC2 can use Inveigh to conduct name service poisoning for credential theft and associated relay attacks. ,1,accept,T1557.001,Man Pupy can sniff plaintext network credentials and use NBNS Spoofing to poison name services. ,1,accept,T1557.001,Man Responder is used to poison name services to gather hashes and credentials from systems within a local network. ,1,accept,T1557.001,Man Wizard Spider has used the Invoke-Inveigh PowerShell cmdlets likely for name service poisoning.,1,accept,T1557.001,Man APT32's macOS backdoor changes the permission of the file it wants to execute to 755. ,1,accept,T1222.002,File and Directory Permissions Modification: Linux And Mac File And Directory Permissions Modification Kinsing has used chmod to modify permissions on key files for use. ,1,accept,T1222.002,File and Directory Permissions Modification: Linux And Mac File And Directory Permissions Modification OSX/Shlayer can use the chmod utility to set a .app file as executable and the spctl application to disable Gatekeeper protection for a downloaded file.. ,1,accept,T1222.002,File and Directory Permissions Modification: Linux And Mac File And Directory Permissions Modification P.A.S. Webshell has the ability to modify file permissions. ,1,accept,T1222.002,File and Directory Permissions Modification: Linux And Mac File And Directory Permissions Modification Penquin can add the executable flag to a downloaded file. ,1,accept,T1222.002,File and Directory Permissions Modification: Linux And Mac File And Directory Permissions Modification Rocke has changed file permissions of files so they could not be modified.,1,accept,T1222.002,File and Directory Permissions Modification: Linux And Mac File And Directory Permissions Modification Lazarus Group replaced the background wallpaper of systems with a threatening image after rendering the system unbootable with a Disk Structure Wipe,1,accept,T1491.001,Defacement: Internal Defacement Ransomware defaced internal website to show threatening message about exposing sensitive data,1,accept,T1491.001,Defacement: Internal Defacement Adversary may deface systems internal to an organization in an attempt to intimidate or mislead users ,1,accept,T1491.001,Defacement: Internal Defacement Actor group replaced system wallpaper with company trade secret information to intimidate company paying the ransom ,1,accept,T1491.001,Defacement: Internal Defacement Ransomware replaces background wallpaper with ransom message after encrypting the data ,1,accept,T1491.001,Defacement: Internal Defacement Agent Tesla has used ProcessWindowStyle.Hidden to hide windows. ,1,accept,T1564.003,Hide Artifacts: Hidden Window APT19 used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden. ,1,accept,T1564.003,Hide Artifacts: Hidden Window APT28 has used the WindowStyle parameter to conceal PowerShell windows. ,1,accept,T1564.003,Hide Artifacts: Hidden Window APT3 has been known to use -WindowStyle Hidden to conceal PowerShell windows. ,1,accept,T1564.003,Hide Artifacts: Hidden Window APT32 has used the WindowStyle parameter to conceal PowerShell windows. ,1,accept,T1564.003,Hide Artifacts: Hidden Window Astaroth loads its module with the XSL script parameter vShow set to zero which opens the application with a hidden window. ,1,accept,T1564.003,Hide Artifacts: Hidden Window BONDUPDATER uses -windowstyle hidden to conceal a PowerShell window that downloads a payload. ,1,accept,T1564.003,Hide Artifacts: Hidden Window CopyKittens has used -w hidden and -windowstyle hidden to conceal PowerShell windows. ;; DarkHydrus has used -WindowStyle Hidden to conceal PowerShell windows. ;; Deep Panda has used -w hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden. ;; Gorgon Group has used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden. ;; HAMMERTOSS has used -WindowStyle hidden to conceal PowerShell windows. ;; Higaisa used a payload that creates a hidden window. ;; HotCroissant has the ability to hide the window for operations performed on a given file. ;; InvisiMole has executed legitimate tools in hidden windows. ;; KeyBoy uses -w Hidden to conceal a PowerShell window that downloads a payload. ;; Kivars has the ability to conceal its activity through hiding active windows. ;; Magic Hound malware has a function to determine whether the C2 server wishes to execute the newly dropped file in a hidden window. ;; MCMD can modify processes to prevent them from being visible on the desktop. ;; Metamorfo has hidden its GUI using the ShowWindow() WINAPI call. ;; PowerShower has added a registry key so future powershell.exe instances are spawned with coordinates for a window position off-screen by default. ;; StrongPity has the ability to hide the console window for its document search module from the user. ;; Ursnif droppers have used COM properties to execute malware in hidden windows. ;; WindTail can instruct the OS to execute an application without a dock icon or menu.,1,accept,T1564.003,Hide Artifacts: Hidden Window Anchor has used NTFS to hide files. ,1,accept,T1564.004,Hide Artifacts: Ntfs File Attributes APT32 used NTFS alternate data streams to hide their payloads. ,1,accept,T1564.004,Hide Artifacts: Ntfs File Attributes Astaroth can abuse alternate data streams (ADS) to store content for malicious payloads. ,1,accept,T1564.004,Hide Artifacts: Ntfs File Attributes BitPaymer has copied itself to the :bin alternate data stream of a newly created file. ,1,accept,T1564.004,Hide Artifacts: Ntfs File Attributes esentutl can be used to read and write alternate data streams. ,1,accept,T1564.004,Hide Artifacts: Ntfs File Attributes Expand can be used to download or copy a file into an alternate data stream. ,1,accept,T1564.004,Hide Artifacts: Ntfs File Attributes Gazer stores configuration items in alternate data streams (ADSs) if the Registry is not accessible. ,1,accept,T1564.004,Hide Artifacts: Ntfs File Attributes LoJax has loaded an embedded NTFS DXE driver to be able to access and write to NTFS partitions. ;; PowerDuke hides many of its backdoor payloads in an alternate data stream (ADS). ;; If the victim is using PowerShell 3.0 or later POWERSOURCE writes its decoded payload to an alternate data stream (ADS) named kernel32.dll that is saved in %PROGRAMDATA%\Windows\. ;; The Regin malware platform uses Extended Attributes to store encrypted executables. ;; Valak has the ability save and execute files as alternate data streams (ADS). ;; Some variants of the Zeroaccess Trojan have been known to store data in Extended Attributes.,1,accept,T1564.004,Hide Artifacts: Ntfs File Attributes Agent Tesla has created hidden folders. ,1,accept,T1564.001,Hide Artifacts: Hidden Files And Directories AppleJeus has added a leading . to plist filenames unlisting them from the Finder app and default Terminal directory listings. ,1,accept,T1564.001,Hide Artifacts: Hidden Files And Directories APT28 has saved files with hidden file attributes. ,1,accept,T1564.001,Hide Artifacts: Hidden Files And Directories APT32's macOS backdoor hides the clientID file via a chflags function. ,1,accept,T1564.001,Hide Artifacts: Hidden Files And Directories Attor can set attributes of log files and directories to HIDDEN SYSTEM ARCHIVE or a combination of those. ,1,accept,T1564.001,Hide Artifacts: Hidden Files And Directories BackConfig has the ability to set folders or files to be hidden from the Windows Explorer default view. ,1,accept,T1564.001,Hide Artifacts: Hidden Files And Directories Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration. ,1,accept,T1564.001,Hide Artifacts: Hidden Files And Directories " Carberp has created a hidden file in the Startup folder of the current user. ;; CoinTicker downloads the following hidden files to evade detection and maintain persistence: /private/tmp/.info.enc /private/tmp/.info.py /private/tmp/.server.sh ~/Library/LaunchAgents/.espl.plist ~/Library/Containers/.[random string]/[random string]. ;; Dacls has had its payload named with a dot prefix to make it hidden from view in the Finder application. ;; Explosive has commonly set file and path attributes to hidden. ;; FruitFly saves itself with a leading ."" to make it a hidden file. ;; iKitten saves itself with a leading ""."" so that it's hidden from users by default. ;; Imminent Monitor has a dynamic debugging feature to set the file attribute to hidden. ;; InvisiMole can create hidden system directories. ;; Ixeshe sets its own executable file's attributes to hidden. ;; The Komplex payload is stored in a hidden directory at /Users/Shared/.local/kextd. ;; Lazarus Group has used a VBA Macro to set its file attributes to System and Hidden and has named files with a dot prefix to hide them from the Finder application. ;; Lokibot has the ability to copy itself to a hidden file and directory. ;; LoudMiner has set the attributes of the VirtualBox directory and VBoxVmService parent directory to ""hidden"". ;; Machete has the capability to exfiltrate stolen data to a hidden folder on a removable drive. ;; MacSpy stores itself in ~/Library/.DS_Stores/ ;; Micropsia creates a new hidden directory to store all components' outputs in a dedicated sub-folder for each. ;; Mustang Panda's PlugX variant has created a hidden folder on USB drives named RECYCLE.BIN to store malicious executables and collected data. ;; NETWIRE can copy itself to and launch itself from hidden folders. ;; Before exfiltration Okrum's backdoor has used hidden files to store logs and outputs from backdoor commands. ;; OSX/Shlayer executes a .command script from a hidden directory in a mounted DMG. ;; OSX_OCEANLOTUS.D sets the main loader file’s attributes to hidden. ;; PoetRAT has the ability to hide and unhide files. ;; Rising Sun can modify file attributes to hide files. ;; Rocke downloaded a file ""libprocesshider"" which could hide files on the target system. ;; SLOTHFULMEDIA has been created with a hidden attribute to insure it's not visible to the victim. ;; ThiefQuest hides a copy of itself in the user's ~/Library directory by using a . at the beginning of the file name followed by 9 random characters. ;; Tropic Trooper has created a hidden directory under C:\ProgramData\Apple\Updates\ and C:\Users\Public\Documents\Flash\. ;; WannaCry uses attrib +h to make some of its files hidden.""",1,accept,T1564.001,Hide Artifacts: Hidden Files And Directories APT29 used netsh to configure firewall rules that limited certain UDP outbound packets. ,1,accept,T1562.004,Impair Defenses: Disable Or Modify System Firewall " The ZR"" variant of BACKSPACE will check to see if known host-based firewalls are installed on the infected systems. BACKSPACE will attempt to establish a C2 channel then will examine open windows to identify a pop-up from the firewall software and will simulate a mouse-click to allow the connection to proceed. ",1,accept,T1562.004,Impair Defenses: Disable Or Modify System Firewall BADCALL disables the Windows firewall before binding to a port. ,1,accept,T1562.004,Impair Defenses: Disable Or Modify System Firewall Carbanak may use netsh to add local firewall rule exceptions. ,1,accept,T1562.004,Impair Defenses: Disable Or Modify System Firewall " CookieMiner has checked for the presence of ""Little Snitch"" macOS network monitoring and application firewall software stopping and exiting if it is found. ",1,accept,T1562.004,Impair Defenses: Disable Or Modify System Firewall DarkComet can disable Security Center functions like the Windows Firewall. ,1,accept,T1562.004,Impair Defenses: Disable Or Modify System Firewall Dragonfly 2.0 has disabled host-based firewalls. The group has also globally opened port 3389. ,1,accept,T1562.004,Impair Defenses: Disable Or Modify System Firewall " Grandoreiro can block the Deibold Warsaw GAS Tecnologia security tool at the firewall level. ;; H1N1 kills and disables services for Windows Firewall. ;; HARDRAIN opens the Windows Firewall to modify incoming connections. ;; HOPLIGHT has modified the firewall using netsh. ;; InvisiMole has a command to disable routing and the Firewall on the victim’s machine. ;; Kasidet has the ability to change firewall settings to allow a plug-in to be downloaded. ;; Kimsuky has been observed disabling the system firewall. ;; Various Lazarus Group malware modifies the Windows firewall to allow incoming connections or disable it entirely using netsh. ;; NanoCore can modify the victim's firewall. ;; netsh can be used to disable local firewall settings. ;; njRAT has modified the Windows firewall to allow itself to communicate through the firewall. ;; Operation Wocao has used PowerShell to add and delete rules in the Windows firewall. ;; Remsec can add or remove applications or ports on the Windows firewall or disable it entirely. ;; Rocke used scripts which killed processes and added firewall rules to block traffic related to other cryptominers. ;; TYPEFRAME can open the Windows Firewall on the victim’s machine to allow incoming connections. ;; UNC2452 used netsh to configure firewall rules that limited certain UDP outbound packets. ;; ZxShell can disable the firewall by modifying the registry key HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile. """,1,accept,T1562.004,Impair Defenses: Disable Or Modify System Firewall APT29 used AUDITPOL to prevent the collection of audit logs. ,1,accept,T1562.002,Impair Defenses: Disable Windows Event Logging Threat Group-3390 has used appcmd.exe to disable logging on a victim server. ,1,accept,T1562.002,Impair Defenses: Disable Windows Event Logging UNC2452 used AUDITPOL to prevent the collection of audit logs.,1,accept,T1562.002,Impair Defenses: Disable Windows Event Logging Malware disable Windows event logging to limit data that can be leveraged for detections and audits ,1,accept,T1562.002,Impair Defenses: Disable Windows Event Logging Adversary disabled windows event logging for database application to supress evidance of exfilteration ,1,accept,T1562.002,Impair Defenses: Disable Windows Event Logging 3PARA RAT has a command to set certain attributes such as creation/modification timestamps on files. ,1,accept,T1070.006,Indicator Removal on Host: Timestomp APT28 has performed timestomping on victim files. ,1,accept,T1070.006,Indicator Removal on Host: Timestomp APT29 modified timestamps of backdoors to match legitimate Windows files. ,1,accept,T1070.006,Indicator Removal on Host: Timestomp APT32 has used scheduled task raw XML with a backdated timestamp of June 2 2016. The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll. Additionally APT32 has used a random value to modify the timestamp of the file storing the clientID. ,1,accept,T1070.006,Indicator Removal on Host: Timestomp Attor has manipulated the time of last access to files and registry keys after they have been created or modified. ,1,accept,T1070.006,Indicator Removal on Host: Timestomp Bankshot modifies the time of a file as specified by the control server. ,1,accept,T1070.006,Indicator Removal on Host: Timestomp BitPaymer can modify the timestamp of an executable so that it can be identified and restored by the decryption tool. ,1,accept,T1070.006,Indicator Removal on Host: Timestomp BLINDINGCAN has modified file and directory timestamps. ;; Chimera has used a Windows version of the Linux touch command to modify the date and time stamp on DLLs. ;; China Chopper's server component can change the timestamp of files. ;; Cobalt Strike can timestomp any files or payloads placed on a target machine to help them blend in. ;; The Derusbi malware supports timestomping. ;; Elise performs timestomping of a CAB file it creates. ;; Empire can timestomp any files or payloads placed on a target machine to help them blend in. ;; EVILNUM has changed the creation date of files. ;; FALLCHILL can modify file or directory timestamps. ;; For early Gazer versions the compilation timestamp was faked. ;; InvisiMole samples were timestomped by the authors by setting the PE timestamps to all zero values. InvisiMole also has a built-in command to modify file times. ;; KeyBoy time-stomped its DLL in order to evade detection. ;; Kimsuky has manipulated timestamps for creation or compilation dates to defeat anti-forensics. ;; Several Lazarus Group malware families use timestomping including modifying the last write timestamp of a specified Registry key to a random date as well as copying the timestamp for legitimate .exe files (such as calc.exe or mspaint.exe) to its dropped files. ;; Many Misdat samples were programmed using Borland Delphi which will mangle the default PE compile timestamp of a file. ;; OSX_OCEANLOTUS.D can use the touch command to change timestamps. ;; OwaAuth has a command to timestop a file or directory. ;; POSHSPY modifies timestamps of all downloaded executables to match a randomly selected file created prior to 2013. ;; PowerStallion modifies the MAC times of its local log files to match that of the victim's desktop.ini file. ;; Psylo has a command to conduct timestomping by setting a specified file’s timestamps to match those of a system file in the System32 directory. ;; Rocke has changed the time stamp of certain files. ;; SEASHARPEE can timestomp files on victims using a Web shell. ;; Shamoon can change the modified time for files to evade forensic detection. ;; TAINTEDSCRIBE can change the timestamp of specified filenames. ;; After creating a new service for persistence TDTESS sets the file creation time for the service to the creation time of the victim's legitimate svchost.exe file. ;; TEMP.Veles used timestomping to modify the $STANDARD_INFORMATION attribute on tools. ;; UNC2452 modified timestamps of backdoors to match legitimate Windows files. ;; USBStealer sets the timestamps of its dropper files to the last-access and last-write timestamps of a standard Windows library chosen on the system.,1,accept,T1070.006,Indicator Removal on Host: Timestomp APT29 obtained the private encryption key from an Active Directory Federation Services (AD FS) container to decrypt corresponding SAML signing certificates. ,1,accept,T1552.004,Unsecured Credentials: Private Keys Ebury has intercepted unencrypted private keys as well as private key pass-phrases. ,1,accept,T1552.004,Unsecured Credentials: Private Keys Empire can use modules like Invoke-SessionGopher to extract private key and session information. ,1,accept,T1552.004,Unsecured Credentials: Private Keys Hildegard has searched for private keys in .ssh. ,1,accept,T1552.004,Unsecured Credentials: Private Keys jRAT can steal keys for VPNs and cryptocurrency wallets. ,1,accept,T1552.004,Unsecured Credentials: Private Keys Kinsing has searched for private keys. ,1,accept,T1552.004,Unsecured Credentials: Private Keys Machete has scanned and looked for cryptographic keys and certificate file extensions. ,1,accept,T1552.004,Unsecured Credentials: Private Keys Mimikatz's CRYPTO::Extract module can extract keys by interacting with Windows cryptographic application programming interface (API) functions. ;; Operation Wocao has used Mimikatz to dump certificates and private keys from the Windows certificate store. ;; Rocke has used SSH private keys on the infected machine to spread its coinminer throughout a network. ;; UNC2452 obtained the private encryption key from an Active Directory Federation Services (AD FS) container to decrypt corresponding SAML signing certificates.,1,accept,T1552.004,Unsecured Credentials: Private Keys ADVSTORESHELL can delete files and directories. ,1,accept,T1070.004,Indicator Removal on Host: File Deletion Anchor can self delete its dropper after the malware is successfully deployed. ,1,accept,T1070.004,Indicator Removal on Host: File Deletion AppleJeus has deleted the MSI file after installation. ,1,accept,T1070.004,Indicator Removal on Host: File Deletion APT18 actors deleted tools and batch files from victim systems. ,1,accept,T1070.004,Indicator Removal on Host: File Deletion APT28 has intentionally deleted computer files to cover their tracks including with use of the program CCleaner. ,1,accept,T1070.004,Indicator Removal on Host: File Deletion APT29 routinely removed their tools including custom backdoors once remote access was achieved. APT29 has also used SDelete to remove artifacts from victims. ,1,accept,T1070.004,Indicator Removal on Host: File Deletion APT3 has a tool that can delete files. ,1,accept,T1070.004,Indicator Removal on Host: File Deletion " APT32's macOS backdoor can receive a “delete” command. ;; APT38 has used a utility called CLOSESHAVE that can securely delete a file from the system. ;; APT39 has used malware to delete files after they are deployed on a compromised host. ;; APT41 deleted files from the system. ;; Aria-body has the ability to delete files and directories on compromised hosts. ;; Attor’s plugin deletes the collected files and log files after exfiltration. ;; AuditCred can delete files from the system. ;; Azorult can delete files from victim machines. ;; BabyShark has cleaned up all files associated with the secondary payload execution. ;; BackConfig has the ability to remove files and folders related to previous infections. ;; Backdoor.Oldrea contains a cleanup module that removes traces of itself from the victim. ;; Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system. ;; Bazar can delete its loader using a batch file in the Windows temporary folder. ;; BBSRAT can delete files and directories. ;; Bisonal deletes its dropper and VBS scripts from the victim’s machine. ;; BLACKCOFFEE has the capability to delete files. ;; BLINDINGCAN has deleted itself and associated artifacts from victim machines. ;; The BRONZE BUTLER uploader or malware the uploader uses command to delete the RAR archives after they have been exfiltrated. ;; Calisto has the capability to use rm -rf to remove folders and files from the victim's machine. ;; Carbanak has a command to delete files. ;; Cardinal RAT can uninstall itself including deleting its executable. ;; CARROTBAT has the ability to delete downloaded files from a compromised host. ;; Recent versions of Cherry Picker delete files and registry keys created by the malware. ;; Chimera has performed file deletion to evade detection. ;; cmd can be used to delete files from the file system. ;; Cobalt Group deleted the DLL dropper from the victim’s machine to cover their tracks. ;; Cryptoistic has the ability delete files from a compromised host. ;; CSPY Downloader has the ability to self delete. ;; Denis has a command to delete files from the victim’s machine. ;; Derusbi is capable of deleting files. It has been observed loading a Linux Kernel Module (LKM) and then deleting it from the hard disk as well as overwriting the data with null bytes. ;; Dragonfly 2.0 deleted many of its files used during operations as part of cleanup including removing applications and deleting screenshots. ;; Drovorub can delete specific files from a compromised host. ;; Dtrack can remove its persistence and delete itself. ;; DustySky can delete files it creates from the infected system. ;; ECCENTRICBANDWAGON can delete log files generated from the malware stored at C:\windows\temp\tmp0207. ;; Elise is capable of launching a remote shell on the host to delete itself. ;; Epic has a command to delete a file from the machine. ;; EvilBunny has deleted the initial dropper after running through the environment checks. ;; Evilnum has deleted files used during infection. ;; Exaramel for Linux can uninstall its persistence mechanism and delete its configuration file. ;; FALLCHILL can delete malware and associated artifacts from the victim. ;; FatDuke can secure delete its DLL. ;; FELIXROOT deletes the .LNK file from the startup directory as well as the dropper components. ;; FIN10 has used batch scripts and scheduled tasks to delete critical system files. ;; FIN5 uses SDelete to clean up the environment and attempt to prevent detection. ;; FIN6 has removed files from victim machines. ;; FIN8 has deleted tmp and prefetch files during post compromise cleanup activities. ;; FruitFly will delete files on the system. ;; Fysbis has the ability to delete files. ;; Gamaredon Group tools can delete files used during an infection. ;; Gazer has commands to delete files and persistence mechanisms from the victim. ;; gh0st RAT has the capability to to delete files. ;; Gold Dragon deletes one of its files 2.hwp from the endpoint after establishing persistence. ;; GoldenSpy's uninstaller can delete registry entries files and folders and finally itself once these tasks have been completed. ;; Grandoreiro can delete .LNK files created in the Startup folder. ;; GreyEnergy can securely delete a file by hooking into the DeleteFileA and DeleteFileW functions in the Windows API. ;; Malware used by Group5 is capable of remotely deleting files from victims. ;; GuLoader can delete its executable from the AppData\Local\Temp directory on the compromised host. ;; HALFBAKED can delete a specified file. ;; Hancitor has deleted files using the VBA kill function. ;; HAWKBALL has the ability to delete files. ;; Hi-Zor deletes its RAT installer file as it executes its DLL payload file. ;; Hildegard has deleted scripts after execution. ;; Honeybee removes batch files to reduce fingerprint on the system as well as deletes the CAB file that gets encoded upon infection. ;; HotCroissant has the ability to clean up installed files delete files and delete itself from the victim’s machine. ;; HTTPBrowser deletes its original installer file once installation is complete. ;; Hydraq creates a backdoor through which remote attackers can delete files. ;; HyperBro has the ability to delete a specified file. ;; Imminent Monitor has deleted files related to its dynamic debugger feature. ;; InnaputRAT has a command to delete files. ;; InvisiMole has deleted files and directories including XML and files successfully uploaded to C2 servers. ;; Ixeshe has a command to delete a file from the machine. ;; The JHUHUGIT dropper can delete itself from the victim. Another JHUHUGIT variant has the capability to delete specified files. ;; JPIN's installer/uninstaller component deletes itself if it encounters a version of Windows earlier than Windows XP or identifies security-related processes running. ;; jRAT has a function to delete files from the victim’s machine. ;; Kazuar can delete files. ;; KEYMARBLE has the capability to delete files off the victim’s machine. ;; Kimsuky has deleted the exfiltrated data on disk after transmission. ;; Kivars has the ability to uninstall malware from the infected host. ;; The Komplex trojan supports file deletion. ;; KONNI can delete files. ;; Lazarus Group malware deletes files in various ways including suicide scripts"" to delete malware binaries from the victim. Lazarus Group also uses secure file deletion to delete files from the victim. ;; LightNeuron has a function to delete files. ;; Linfo creates a backdoor through which remote attackers can delete files. ;; LockerGoga has been observed deleting its original launcher after execution. ;; LookBack removes itself after execution and can delete files on the system. ;; LoudMiner deleted installation files after completion. ;; Once a file is uploaded Machete will delete it from the machine. ;; MacSpy deletes any temporary files it creates ;; Magic Hound has deleted and overwrote files to cover tracks. ;; A menuPass macro deletes files after it has decoded and decompressed them. ;; Once loaded into memory MESSAGETAP deletes the keyword_parm.txt and parm.txt configuration files from disk. ;; Metamorfo has deleted itself from the system after execution. ;; Misdat is capable of deleting the backdoor file. ;; MoonWind can delete itself or specified files. ;; More_eggs can remove itself from a system. ;; Mosquito deletes files using DeleteFileW API call. ;; MURKYTOP has the capability to delete local files. ;; Mustang Panda will delete their tools and files and kill processes after their objectives are reached. ;; NanHaiShu launches a script to delete their original decoy file to cover tracks. ;; NOKKI can delete files to cover tracks. ;; OceanSalt can delete files from the system. ;; OilRig has deleted files associated with their payload after execution. ;; Okrum's backdoor deletes files after they have been successfully uploaded to C2 servers. ;; OopsIE has the capability to delete files and scripts from the victim's machine. ;; Operation Wocao has deleted logs and executable files used during an intrusion. ;; OSX_OCEANLOTUS.D has a command to delete a file from the system. ;; P.A.S. Webshell can delete scripts from a subdirectory of /tmp after they are run. ;; Pasam creates a backdoor through which remote attackers can delete files. ;; Patchwork removed certain files and replaced them so they could not be retrieved. ;; Pay2Key can remove its log file from disk. ;; Penquin can delete downloaded executables after running them. ;; Pillowmint has deleted the filepath %APPDATA%\Intel\devmonsrv.exe. ;; PLEAD has the ability to delete files on the compromised host. ;; pngdowner deletes content from C2 communications that was saved to the user's temporary directory. ;; Pony has used scripts to delete itself after execution. ;; PowerDuke has a command to write random data across a file and delete it. ;; PowerShower has the ability to remove all files created during the dropper process. ;; POWERSTATS can delete all files on the C:\ D:\ E:\ and F:\ drives using PowerShell Remove-Item commands. ;; Proton removes all files in the /tmp directory. ;; Proxysvc can delete files indicated by the attacker and remove itself from disk using a batch file. ;; Pteranodon can delete files that may interfere with it executing. It also can delete temporary files and itself after the initial script executes. ;; PUNCHBUGGY can delete files written to disk. ;; Pysa has deleted batch files after execution. ;; QUADAGENT has a command to delete its Registry key and scheduled task. ;; RDAT can issue SOAP requests to delete already processed C2 emails. RDAT can also delete itself from the infected system. ;; RDFSNIFFER has the capability of deleting local files. ;; Reaver deletes the original dropped file from the victim. ;; RedLeaves can delete specified files. ;; Remsec is capable of deleting files on the victim. It also securely removes itself after collecting and exfiltrating data. ;; REvil can mark its binary code for deletion after reboot. ;; Rising Sun can delete files specified by the C2. ;; Rocke has deleted files on infected machines. ;; ROKRAT can request to delete files. ;; RTM can delete all files created during its execution. ;; RunningRAT contains code to delete files from the victim’s machine. ;; Some Sakula samples use cmd.exe to delete temporary files. ;; SamSam has been seen deleting its own files and payloads to make analysis of the attack more difficult. ;; Sandworm Team has used backdoors that can delete files used in an attack from an infected system. ;; SDBbot has the ability to delete files from a compromised host. ;; SDelete deletes data in a way that makes it unrecoverable. ;; SeaDuke can securely delete files including deleting itself from the victim. ;; Seasalt has a command to delete a specified file. ;; ServHelper has a module to delete itself from the infected machine. ;; ShimRat can uninstall itself from compromised hosts as well create and modify directories delete move copy and rename files. ;; Sibot will delete itself if a certain server response is received. ;; Silence has deleted artifacts including scheduled tasks communicates files from the C2 and other logs. ;; SLOTHFULMEDIA has deleted itself and the 'index.dat' file on a compromised machine to remove recent Internet history from the system. ;; SpeakUp deletes files to remove evidence on the machine. ;; SQLRat has used been observed deleting scripts once used. ;; StoneDrill has been observed deleting the temporary files once they fulfill their task. ;; StrongPity can delete previously exfiltrated files from the compromised host. ;; SUNBURST had a command to delete files. ;; Following the successful injection of SUNBURST SUNSPOT deleted a temporary file it created named InventoryManager.bk after restoring the original SolarWinds Orion source code to the software library. ;; TAINTEDSCRIBE can delete files from a compromised host. ;; TDTESS creates then deletes log files during installation of itself as a service. ;; TEMP.Veles routinely deleted tools logs and other files after they were finished with them. ;; The White Company has the ability to delete its malware entirely from the target system. ;; Threat Group-3390 has deleted existing logs and exfiltrated file archives from a victim. ;; Trojan.Karagany has used plugins with a self-delete capability. ;; Tropic Trooper has deleted dropper files on an infected system using command scripts. ;; TYPEFRAME can delete files off the system. ;; UNC2452 routinely removed their tools including custom backdoors once remote access was achieved. ;; Ursnif has deleted data staged in tmp files after exfiltration. ;; USBStealer has several commands to delete files associated with the malware from the victim. ;; VBShower has attempted to complicate forensic analysis by deleting all the files contained in %APPDATA%..\Local\Temporary Internet Files\Content.Word and %APPDATA%..\Local Settings\Temporary Internet Files\Content.Word\. ;; VERMIN can delete files on the victim’s machine. ;; Volgmer can delete files and itself after infection to avoid analysis. ;; WINDSHIELD is capable of file deletion along with other file system interaction. ;; WindTail has the ability to receive and execute a self-delete command. ;; Wingbird deletes its payload along with the payload's parent process after it finishes copying files. ;; Wizard Spider has used file deletion to remove some modules and configurations from an infected host after use. ;; XAgentOSX contains the deletFileFromPath function to delete a specified file using the NSFileManager:removeFileAtPath method. ;; Zebrocy has a command to delete files and directories. ;; Zeus Panda has a command to delete a file. It also can uninstall scripts and delete files to cover its track. ;; zwShell has deleted itself after creating a service as well as deleted a temporary file when the system reboots. ;; ZxShell can delete files from the system. """,1,accept,T1070.004,Indicator Removal on Host: File Deletion Proton removes logs from /var/logs and /Library/logs. ,1,accept,T1070.002,Indicator Removal on Host: Clear Linux Or Mac System Logs Rocke has cleared log files within the /var/log/ folder.,1,accept,T1070.002,Indicator Removal on Host: Clear Linux Or Mac System Logs Adversaries deleted /var/log/auth.log after braking into system by password bruteforce attack ,1,accept,T1070.002,Indicator Removal on Host: Clear Linux Or Mac System Logs Actor clear system logs to hide evidence of an intrusion ,1,accept,T1070.002,Indicator Removal on Host: Clear Linux Or Mac System Logs Malware deletes /var/log/cron.log to hide evidence of tampering with cron jobs to enable persistence ,1,accept,T1070.002,Indicator Removal on Host: Clear Linux Or Mac System Logs APT28 has cleared event logs including by using the commands wevtutil cl System and wevtutil cl Security. ,1,accept,T1070.001,Indicator Removal on Host: Clear Windows Event Logs APT32 has cleared select event log entries. ,1,accept,T1070.001,Indicator Removal on Host: Clear Windows Event Logs APT38 clears Window Event logs and Sysmon logs from the system. ,1,accept,T1070.001,Indicator Removal on Host: Clear Windows Event Logs APT41 attempted to remove evidence of some of its activity by clearing Windows security and system events. ,1,accept,T1070.001,Indicator Removal on Host: Clear Windows Event Logs The BlackEnergy component KillDisk is capable of deleting Windows Event Logs. ,1,accept,T1070.001,Indicator Removal on Host: Clear Windows Event Logs Chimera has cleared event logs on compromised hosts. ,1,accept,T1070.001,Indicator Removal on Host: Clear Windows Event Logs Dragonfly 2.0 cleared Windows event logs and other logs produced by tools they used including system security terminal services remote services and audit logs. The actors also deleted specific Registry keys. ,1,accept,T1070.001,Indicator Removal on Host: Clear Windows Event Logs FIN5 has cleared event logs from victims. ;; FIN8 has cleared logs during post compromise cleanup activities. ;; FinFisher clears the system event logs using OpenEventLog/ClearEventLog APIs . ;; gh0st RAT is able to wipe event logs. ;; Hydraq creates a backdoor through which remote attackers can clear all system event logs. ;; Lucifer can clear and remove event logs. ;; NotPetya uses wevtutil to clear the Windows event logs. ;; Olympic Destroyer will attempt to clear the System and Security event logs using wevtutil. ;; Operation Wocao has deleted Windows Event Logs to hinder forensic investigation. ;; Pupy has a module to clear event logs with PowerShell. ;; RunningRAT contains code to clear event logs. ;; SynAck clears event logs. ;; ZxShell has a command to clear system event logs.,1,accept,T1070.001,Indicator Removal on Host: Clear Windows Event Logs APT3 has been known to remove indicators of compromise from tools. ,1,accept,T1027.005,Obfuscated Files or Information: Indicator Removal From Tools " Cobalt Strike includes a capability to modify the beacon"" payload to eliminate known signatures or unpacking methods. ",1,accept,T1027.005,Obfuscated Files or Information: Indicator Removal From Tools Analysis of Daserf has shown that it regularly undergoes technical improvements to evade anti-virus detection. ,1,accept,T1027.005,Obfuscated Files or Information: Indicator Removal From Tools Deep Panda has updated and modified its malware resulting in different hash values that evade detection. ,1,accept,T1027.005,Obfuscated Files or Information: Indicator Removal From Tools GALLIUM ensured each payload had a unique hash including by using different types of packers. ,1,accept,T1027.005,Obfuscated Files or Information: Indicator Removal From Tools The author of GravityRAT submitted samples to VirusTotal for testing showing that the author modified the code to try to hide the DDE object in a different part of the document. ,1,accept,T1027.005,Obfuscated Files or Information: Indicator Removal From Tools InvisiMole has undergone regular technical improvements in an attempt to evade detection. ,1,accept,T1027.005,Obfuscated Files or Information: Indicator Removal From Tools " OilRig has tested malware samples to determine AV detection and subsequently modified the samples to ensure AV evasion. ;; Operation Wocao has edited variable names within the Impacket suite to avoid automated detection. ;; Patchwork apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes. ;; Penquin can remove strings from binaries. ;; PowerSploit's Find-AVSignature AntivirusBypass module can be used to locate single byte anti-virus signatures. ;; SUNBURST source code used generic variable names and pre-obfuscated strings and was likely sanitized of developer comments before being added to SUNSPOT. ;; TEMP.Veles has modified files based on the open-source project cryptcat in an apparent attempt to decrease AV detection rates. ;; Based on comparison of Gazer versions Turla made an effort to obfuscate strings in the malware that could be used as IoCs including the mutex name and named pipe. ;; Waterbear can scramble functions not to be executed again with random values.""",1,accept,T1027.005,Obfuscated Files or Information: Indicator Removal From Tools Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded uncompiled source code. ,1,accept,T1027.004,Obfuscated Files or Information: Compile After Delivery Gamaredon Group has compiled the source code for a downloader directly on the infected system using the built-in Microsoft.CSharp.CSharpCodeProvider class. ,1,accept,T1027.004,Obfuscated Files or Information: Compile After Delivery MuddyWater has used the .NET csc.exe tool to compile executables from downloaded C# code. ,1,accept,T1027.004,Obfuscated Files or Information: Compile After Delivery njRAT has used AutoIt to compile the payload and main script into a single executable after delivery. ,1,accept,T1027.004,Obfuscated Files or Information: Compile After Delivery Rocke has compiled malware delivered to victims as .c files with the GNU Compiler Collection (GCC).,1,accept,T1027.004,Obfuscated Files or Information: Compile After Delivery Keydnap puts a space after a false .jpg extension so that execution actually goes through the Terminal.app program.,1,accept,T1036.006,Masquerading: Space After Filename Adversary put extra space after .doc extension inside a filename to trick users into double clicking assuming its benign document and instead executing malicious binary through Terminal App,1,accept,T1036.006,Masquerading: Space After Filename Malware put extra space after a false .png extension so user inadvertantly clicks it assuming its a harmless photo ,1,accept,T1036.006,Masquerading: Space After Filename Campaign puts blank space after filename to evade monitoring rules for blocking executable files ,1,accept,T1036.006,Masquerading: Space After Filename then drops a malware with extension having an extra space at the end ' so that it will actually run via terminal app instead of opening via photo app,1,accept,T1036.006,Masquerading: Space After Filename BlackTech has used right-to-left-override to obfuscate the filenames of malicious e-mail attachments. ,1,accept,T1036.002,Masquerading: Right BRONZE BUTLER has used Right-to-Left Override to deceive victims into executing several strains of malware. ,1,accept,T1036.002,Masquerading: Right Ke3chang has used the right-to-left override character in spearphishing attachment names to trick targets into executing .scr and .exe files. ,1,accept,T1036.002,Masquerading: Right Scarlet Mimic has used the left-to-right override character in self-extracting RAR archive spearphishing attachment file names.,1,accept,T1036.002,Masquerading: Right Adversary use the right-to-left override (RTLO) as a means of tricking a user into executing what they think is a benign file type but is actually executable code,1,accept,T1036.002,Masquerading: Right BBSRAT can compress data with ZLIB prior to sending it back to the C2 server. ,1,accept,T1560.002,Archive Collected Data: Archive Via Library Cardinal RAT applies compression to C2 traffic using the ZLIB library. ,1,accept,T1560.002,Archive Collected Data: Archive Via Library Denis compressed collected data using zlib. ,1,accept,T1560.002,Archive Collected Data: Archive Via Library Epic compresses the collected data with bzip2 before sending it to the C2 server. ,1,accept,T1560.002,Archive Collected Data: Archive Via Library InvisiMole can use zlib to compress and decompress data. ,1,accept,T1560.002,Archive Collected Data: Archive Via Library Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is compressed with Zlib encrypted and uploaded to a C2 server. ,1,accept,T1560.002,Archive Collected Data: Archive Via Library SeaDuke compressed data with zlib prior to sending it over C2. ,1,accept,T1560.002,Archive Collected Data: Archive Via Library TajMahal has the ability to use the open source libraries XZip/Xunzip and zlib to compress files. ;; Threat Group-3390 has used RAR to compress encrypt and password-protect files prior to exfiltration. ;; The ZLib backdoor compresses communications using the standard Zlib compression library.,1,accept,T1560.002,Archive Collected Data: Archive Via Library APT38 has used DYEPACK.FOX to manipulate PDF data as it is accessed to remove traces of fraudulent SWIFT transactions from the data displayed to the end user.,1,accept,T1565.003,Data Manipulation: Runtime Data Manipulation DYEPACK malware modifies documents before they are accessed and executes the legitimate Foxit reader program to display the modified documents ,1,accept,T1565.003,Data Manipulation: Runtime Data Manipulation Malware removes failed authentication entries from log before they are accessed to evade detection by administrator ,1,accept,T1565.003,Data Manipulation: Runtime Data Manipulation Malware changes bank account numbers from payable receipts before displaying to user to cause fund transfer to adversary account ,1,accept,T1565.003,Data Manipulation: Runtime Data Manipulation Malware changes bitcoin address from clipboard before they are pasted by user to cause funds getting transfered to adversary account. ,1,accept,T1565.003,Data Manipulation: Runtime Data Manipulation APT37 has access to destructive malware that is capable of overwriting a machine's Master Boot Record (MBR). ,1,accept,T1561.002,Disk Wipe: Disk Structure Wipe APT38 has used a custom MBR wiper named BOOTWRECK to render systems inoperable. ,1,accept,T1561.002,Disk Wipe: Disk Structure Wipe Lazarus Group malware SHARPKNOT overwrites and deletes the Master Boot Record (MBR) on the victim's machine and has possessed MBR wiper malware since at least 2009. ,1,accept,T1561.002,Disk Wipe: Disk Structure Wipe RawDisk was used in Shamoon to help overwrite components of disk structure like the MBR and disk partitions. ,1,accept,T1561.002,Disk Wipe: Disk Structure Wipe Sandworm Team has used the BlackEnergy KillDisk component to corrupt the infected system's master boot record. ,1,accept,T1561.002,Disk Wipe: Disk Structure Wipe Shamoon has been seen overwriting features of disk structure such as the MBR. ,1,accept,T1561.002,Disk Wipe: Disk Structure Wipe StoneDrill can wipe the master boot record of an infected computer.,1,accept,T1561.002,Disk Wipe: Disk Structure Wipe Lazarus Group has used malware like WhiskeyAlfa to overwrite the first 64MB of every drive with a mix of static and random buffers. A similar process is then used to wipe content in logical drives and finally attempt to wipe every byte of every sector on every drive. WhiskeyBravo can be used to overwrite the first 4.9MB of physical drives. WhiskeyDelta can overwrite the first 132MB or 1.5MB of each drive with random data from heap memory. ,1,accept,T1561.001,Disk Wipe: Disk Content Wipe MegaCortex can wipe deleted data from all drives using cipher.exe. ,1,accept,T1561.001,Disk Wipe: Disk Content Wipe RawDisk has been used to directly access the hard disk to help overwrite arbitrarily sized portions of disk content. ,1,accept,T1561.001,Disk Wipe: Disk Content Wipe StoneDrill can wipe the accessible physical or logical drives of the infected machine.,1,accept,T1561.001,Disk Wipe: Disk Content Wipe The group carried out the attack using a custom modular ransomware executable and master boot record (MBR) wiper dubbed “Apostle.” ,1,accept,T1561.001,Disk Wipe: Disk Content Wipe " NotPetya infects the master boot record (MBR) and prevents any system from booting. Even if the ransom is paid, however, the damage from NotPetya is irreversible, so it is likely that the actor’s aim was to sabotage the infected system rather than gaining money out of it. ",1,accept,T1561.001,Disk Wipe: Disk Content Wipe APT28 has delivered JHUHUGIT and Koadic by executing PowerShell commands through DDE in Word documents. ,1,accept,T1559.002,Inter APT37 has used Windows DDE for execution of commands and a malicious VBS. ,1,accept,T1559.002,Inter Cobalt Group has sent malicious Word OLE compound documents to victims. ,1,accept,T1559.002,Inter FIN7 spear phishing campaigns have included malicious Word documents with DDE execution. ,1,accept,T1559.002,Inter Gallmaker attempted to exploit Microsoft’s DDE protocol in order to gain access to victim machines and for execution. ,1,accept,T1559.002,Inter GravityRAT has been delivered via Word documents using DDE for execution. ,1,accept,T1559.002,Inter HAWKBALL has used an OLE object that uses Equation Editor to drop the embedded shellcode. ,1,accept,T1559.002,Inter KeyBoy uses the Dynamic Data Exchange (DDE) protocol to download remote payloads. ;; MuddyWater has used malware that can execute PowerShell scripts via DDE. ;; Patchwork leveraged the DDE protocol to deliver their malware. ;; PoetRAT was delivered with documents using DDE to execute malicious code. ;; POWERSTATS can use DDE to execute additional payloads on compromised hosts. ;; Ramsay has been delivered using OLE objects in malicious documents. ;; RTM can search for specific strings within browser tabs using a Dynamic Data Exchange mechanism. ;; Sharpshooter has sent malicious Word OLE documents to victims. ;; Sidewinder has used the ActiveXObject utility to create OLE objects to obtain execution through Internet Explorer. ;; TA505 has leveraged malicious Word documents that abused DDE. ;; Valak can execute tasks via OLE.,1,accept,T1559.002,Inter Gamaredon Group malware can insert malicious macros into documents using a Microsoft.Office.Interop object. ,1,accept,T1559.001,Inter InvisiMole can use the ITaskService ITaskDefinition and ITaskSettings COM interfaces to schedule a task. ,1,accept,T1559.001,Inter MuddyWater has used malware that has the capability to execute malicious code via COM DCOM and Outlook. ,1,accept,T1559.001,Inter POWERSTATS can use DCOM (targeting the 127.0.0.1 loopback address) to execute additional payloads on compromised hosts. ,1,accept,T1559.001,Inter Ramsay can use the Windows COM API to schedule tasks and maintain persistence. ,1,accept,T1559.001,Inter TrickBot used COM to setup scheduled task for persistence. ,1,accept,T1559.001,Inter Ursnif droppers have used COM objects to execute the malware's full executable payload.,1,accept,T1559.001,Inter Anchor can create and execute services to load its payload. ,1,accept,T1569.002,System Services: Service Execution APT32's backdoor has used Windows services as a way to execute its malicious payload. ,1,accept,T1569.002,System Services: Service Execution APT39 has used post-exploitation tools including RemCom and the Non-sucking Service Manager (NSSM) to execute processes. ,1,accept,T1569.002,System Services: Service Execution APT41 used Net to execute a system service installed to launch a Cobalt Strike BEACON loader. ,1,accept,T1569.002,System Services: Service Execution Attor's dispatcher can be executed as a service. ,1,accept,T1569.002,System Services: Service Execution BBSRAT can start stop or delete services. ,1,accept,T1569.002,System Services: Service Execution " Blue Mockingbird has executed custom-compiled XMRIG miner DLLs by configuring them to execute via the wercplsupport"" service. ",1,accept,T1569.002,System Services: Service Execution " Chimera has used PsExec to deploy beacons on compromised systems. ;; Cobalt Strike can use PsExec to execute a payload on a remote host. It can also use Service Control Manager to start new services. ;; Empire can use PsExec to execute a payload on a remote host. ;; FIN6 has created Windows services to execute encoded PowerShell commands. ;; gh0st RAT can execute its service if the Service key exists. If the key does not exist gh0st RAT will create and run the service. ;; Honeybee launches a DLL file that gets executed as a service using svchost.exe ;; HOPLIGHT has used svchost.exe to execute a malicious DLL . ;; Hydraq uses svchost.exe to execute a malicious DLL included in a new service group. ;; HyperBro has the ability to start and stop a specified service. ;; Impacket contains various modules emulating other service execution tools such as PsExec. ;; InvisiMole has used Windows services as a way to execute its malicious payload. ;; Ke3chang has used a tool known as RemoteExec (similar to PsExec) to remotely execute batch scripts and binaries. ;; Koadic can run a command on another machine using PsExec. ;; LoudMiner started the cryptomining virtual machine as a service on the infected machine. ;; The net start and net stop commands can be used in Net to execute or stop Windows services. ;; Net Crawler uses PsExec to perform remote service manipulation to execute a copy of itself as part of lateral movement. ;; Operators deploying Netwalker have used psexec and certutil to retrieve the Netwalker payload. ;; NotPetya can use PsExec to help propagate itself across a network. ;; Okrum's loader can create a new service named NtmsSvc to execute the payload. ;; Olympic Destroyer utilizes PsExec to help propagate itself across a network. ;; Operation Wocao has created services on remote systems for execution purposes. ;; PoshC2 contains an implementation of PsExec for remote execution. ;; Proxysvc registers itself as a service on the victim’s machine to run as a standalone process. ;; Microsoft Sysinternals PsExec is a popular administration tool that can be used to execute binaries on remote systems using a temporary Windows service. ;; Pupy uses PsExec to execute a payload or commands on a remote host. ;; Pysa has used PsExec to copy and execute the ransomware. ;; Ragnar Locker has used sc.exe to execute a service that it creates. ;; RemoteCMD can execute commands remotely by creating a new service on the remote system. ;; Shamoon creates a new service named “ntssrv” to execute the payload. Shamoon can also spread via PsExec. ;; Silence has used Winexe to install a service on the remote system. ;; SLOTHFULMEDIA has the capability to start services. ;; StrongPity can install a service to execute itself as a service. ;; Winexe installs a service on the remote system executes the command then uninstalls the service. ;; Wingbird uses services.exe to register a new autostart service named ""Audit Service"" using a copy of the local lsass.exe file. ;; Wizard Spider has used services.exe to execute scripts and executables during lateral movement within a victim network. ;; xCmd can be used to execute binaries on remote systems by creating and starting a service.""",1,accept,T1569.002,System Services: Service Execution Chimera has exfiltrated stolen data to OneDrive accounts. ,1,accept,T1567.002,Exfiltration Over Web Service: Exfiltration To Cloud Storage Crutch has exfiltrated stolen data to Dropbox. ,1,accept,T1567.002,Exfiltration Over Web Service: Exfiltration To Cloud Storage Empire can use Dropbox for data exfiltration. ,1,accept,T1567.002,Exfiltration Over Web Service: Exfiltration To Cloud Storage HAFNIUM has exfiltrated data to file sharing sites including MEGA. ,1,accept,T1567.002,Exfiltration Over Web Service: Exfiltration To Cloud Storage HAMMERTOSS exfiltrates data by uploading it to accounts created by the actors on Web cloud storage providers for the adversaries to retrieve later. ,1,accept,T1567.002,Exfiltration Over Web Service: Exfiltration To Cloud Storage Leviathan has used an uploader known as LUNCHMONEY that can exfiltrate files to Dropbox. ,1,accept,T1567.002,Exfiltration Over Web Service: Exfiltration To Cloud Storage Turla has used WebDAV to upload stolen USB files to a cloud drive. Turla has also exfiltrated stolen files to OneDrive and 4shared. ,1,accept,T1567.002,Exfiltration Over Web Service: Exfiltration To Cloud Storage ZIRCONIUM has exfiltrated stolen data to Dropbox.,1,accept,T1567.002,Exfiltration Over Web Service: Exfiltration To Cloud Storage Empire can use GitHub for data exfiltration.,1,accept,T1567.001,Exfiltration Over Web Service: Exfiltration To Code Repository Actors appear to have leveraged the popular github service to host the breached data during exfiltration. Leveraging popular services such as github can assist them evading security controls. ,1,accept,T1567.001,Exfiltration Over Web Service: Exfiltration To Code Repository GitHub can be used as exfiltration destination for organizational data. ,1,accept,T1567.001,Exfiltration Over Web Service: Exfiltration To Code Repository Stolen data has been compressed as rar files and exfiltrated to github. ,1,accept,T1567.001,Exfiltration Over Web Service: Exfiltration To Code Repository Actor is believed to have been able to compromise organizations around the globe and exfiltrated large amounts of sensitive information to a code repository. ,1,accept,T1567.001,Exfiltration Over Web Service: Exfiltration To Code Repository Agent Tesla has routines for exfiltration over SMTP FTP and HTTP. ,1,accept,T1048.003,Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non APT32's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets. ,1,accept,T1048.003,Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non APT33 has used FTP to exfiltrate files (separately from the C2 channel). ,1,accept,T1048.003,Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non BITSAdmin can be used to create BITS Jobs to upload files from a compromised host. ,1,accept,T1048.003,Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non Some Brave Prince variants have used South Korea's Daum email service to exfiltrate information and later variants have posted the data to a web server via an HTTP post command. ,1,accept,T1048.003,Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non Carbon uses HTTP to send data to the C2 server. ,1,accept,T1048.003,Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non Cherry Picker exfiltrates files over FTP. ,1,accept,T1048.003,Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non CookieMiner has used the curl --upload-file command to exfiltrate data over HTTP. ;; CORALDECK has exfiltrated data in HTTP POST headers. ;; CosmicDuke exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers. ;; FIN6 has sent stolen payment card data to remote servers via HTTP POSTs. ;; FIN8 has used FTP to exfiltrate collected data. ;; FTP may be used to exfiltrate data separate from the main command and control protocol. ;; Kessel can exfiltrate credentials and other information via HTTP POST request TCP and DNS. ;; KONNI has used FTP to exfiltrate reconnaissance data out. ;; Lazarus Group malware SierraBravo-Two generates an email message via SMTP containing information about newly infected victims. ;; OilRig has exfiltrated data over FTP separately from its primary C2 channel over DNS. ;; PoetRAT has used FTP for exfiltration. ;; Remsec can exfiltrate data via a DNS tunnel or email separately from its C2 channel. ;; Thrip has used WinSCP to exfiltrate data from a targeted organization over FTP. ;; WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl. ;; Wizard Spider has exfiltrated victim information using FTP.,1,accept,T1048.003,Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non APT29 has exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers. ,1,accept,T1048.002,Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non UNC2452 exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers.,1,accept,T1048.002,Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non The threat actors collected and exfiltrated the contents of network shares for use in a double extortion demand. The data exported was encrypted using public and private keys. ,1,accept,T1048.002,Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non The actors downloaded archives of collected data that was asymmetrically encrypted. ,1,accept,T1048.002,Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non The attack involved uploading password-protected archives of collected data that had been staged on the victim's servers. ,1,accept,T1048.002,Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non ,1,accept,T1048.001,Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non "Adversaries may opt to manually share keys and implement symmetric cryptographic algorithms (ex: RC4, AES) even while utilizing otherwise encrypted protocols, such as HTTPS. ",1,accept,T1048.001,Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non Attackers used a pre-shared key to symmetrically encrypt the collected data for upload to separate infrastructure from the C2 channel. ,1,accept,T1048.001,Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non Actor was observed to have encrypted the breached information before exfiltrating it to their FTP server. ,1,accept,T1048.001,Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non " The group has the ability to read file contents, encrypt the information, and exfiltrate them to attacker controlled infrastructure separate from their C2 channel. ",1,accept,T1048.001,Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non The functionality that they all have in common is that each exfiltrates collected credentials and its bash command history as an encrypted bundle to servers they control. ,1,accept,T1048.001,Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non Flame has a module named BeetleJuice that contains Bluetooth functionality that may be used in different ways including transmitting encoded information from the infected system over the Bluetooth protocol acting as a Bluetooth beacon and identifying other Bluetooth devices in the vicinity.,1,accept,T1011.001,Exfiltration Over Other Network Medium: Exfiltration Over Bluetooth "Bluetooth is rarely used, and only if the other network options are inaccessible or are not properly set up to exfiltrate data without the risk of detection. ",1,accept,T1011.001,Exfiltration Over Other Network Medium: Exfiltration Over Bluetooth Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. ,1,accept,T1011.001,Exfiltration Over Other Network Medium: Exfiltration Over Bluetooth We believe the malicious APKs may be distributed through links sent to the victims via text messages. The APK has the capability to turn bluetooh on which would allow for data exfiltration via that channel. ,1,accept,T1011.001,Exfiltration Over Other Network Medium: Exfiltration Over Bluetooth StarCruft became known for creating new tools and techniques to identify Bluetooth devices. These are used for information gathering for export. ,1,accept,T1011.001,Exfiltration Over Other Network Medium: Exfiltration Over Bluetooth Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs. ,1,accept,T1052.001,Exfiltration Over Physical Medium: Exfiltration Over Usb Machete has a feature to copy files from every drive onto a removable drive in a hidden folder. ,1,accept,T1052.001,Exfiltration Over Physical Medium: Exfiltration Over Usb Mustang Panda has used a customized PlugX variant which could exfiltrate documents from air-gapped networks. ,1,accept,T1052.001,Exfiltration Over Physical Medium: Exfiltration Over Usb Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device. ,1,accept,T1052.001,Exfiltration Over Physical Medium: Exfiltration Over Usb SPACESHIP copies staged data to removable drives when they are inserted into the system. ,1,accept,T1052.001,Exfiltration Over Physical Medium: Exfiltration Over Usb Tropic Trooper has exfiltrated data using USB storage devices. ,1,accept,T1052.001,Exfiltration Over Physical Medium: Exfiltration Over Usb USBStealer exfiltrates collected files via removable media from air-gapped victims.,1,accept,T1052.001,Exfiltration Over Physical Medium: Exfiltration Over Usb APT12 has used multiple variants of DNS Calculation including multiplying the first two octets of an IP address and adding the third octet to that value in order to get a resulting command and control port.,1,accept,T1568.003,Dynamic Resolution: Dns Calculation Adversaries may perform calculations on addresses returned in DNS results to determine which port and IP address to use for command and control. ,1,accept,T1568.003,Dynamic Resolution: Dns Calculation Necurs also uses a a method of DNS calculation to determine the proper IP address of the C2 host. ,1,accept,T1568.003,Dynamic Resolution: Dns Calculation Mekotio uses an algorithm to modify the resolved IP address to obtain the actual C&C address. ,1,accept,T1568.003,Dynamic Resolution: Dns Calculation This malware uses a caclulation on the returned DNS data to find the correct C2 server to use. ,1,accept,T1568.003,Dynamic Resolution: Dns Calculation APT28 used other victims as proxies to relay command traffic for instance using a compromised Georgian military email server as a hop point to NATO victims. The group has also used a tool that acts as a proxy to allow C2 even if the victim is behind a router. APT28 has also used a machine to relay and obscure communications between CHOPSTICK and their server. ,1,accept,T1090.002,Proxy: External Proxy An APT3 downloader establishes SOCKS5 connections for its initial C2. ,1,accept,T1090.002,Proxy: External Proxy APT39 has used various tools to proxy C2 communications. ,1,accept,T1090.002,Proxy: External Proxy FIN5 maintains access to victim environments by using FLIPSIDE to create a proxy for a backup RDP tunnel. ,1,accept,T1090.002,Proxy: External Proxy GALLIUM used a modified version of HTRAN to redirect connections between networks. ,1,accept,T1090.002,Proxy: External Proxy InvisiMole InvisiMole can identify proxy servers used by the victim and use them for C2 communication. ,1,accept,T1090.002,Proxy: External Proxy Lazarus Group uses multiple proxies to obfuscate network traffic from victims. ,1,accept,T1090.002,Proxy: External Proxy menuPass has used a global service provider's IP as a proxy for C2 traffic from a victim. ;; MuddyWater has controlled POWERSTATS from behind a proxy network to obfuscate the C2 location. MuddyWater has used a series of compromised websites that victims connected to randomly to relay information to command and control (C2). ;; Okrum can identify proxy servers configured and used by the victim and use it to make HTTP requests to C2 its server. ;; POWERSTATS has connected to C2 servers through proxies. ;; Regin leveraged several compromised universities as proxies to obscure its origin. ;; ShimRat can use pre-configured HTTP proxies. ;; Silence has used ProxyBot which allows the attacker to redirect traffic from the current node to the backconnect server via Sock4\Socks5.,1,accept,T1090.002,Proxy: External Proxy ,1,accept,T1037.002,Boot or Logon Initialization Scripts: Logon Script (Mac) Adversaries may use macOS logon scripts automatically executed at logon initialization to establish persistence. ,1,accept,T1037.002,Boot or Logon Initialization Scripts: Logon Script (Mac) " A login hook tells Mac OS X to execute a certain script when a user logs in, but unlike Startup Items, a login hook executes as the elevated root user. ",1,accept,T1037.002,Boot or Logon Initialization Scripts: Logon Script (Mac) Monitor logon scripts for unusual access by abnormal users or at abnormal times. ,1,accept,T1037.002,Boot or Logon Initialization Scripts: Logon Script (Mac) " LoginHooks and LogoutHooks have been around for years and are rarely used these days, but are still a perfectly viable way of running a persistence script on macOS Mojave. ",1,accept,T1037.002,Boot or Logon Initialization Scripts: Logon Script (Mac) Access to login hook scripts may allow an adversary to insert additional malicious code. ,1,accept,T1037.002,Boot or Logon Initialization Scripts: Logon Script (Mac) gh0st RAT operators have used dynamic DNS to mask the true location of their C2 behind rapidly changing IP addresses. ,1,accept,T1568.001,Dynamic Resolution: Fast Flux Dns menuPass has used dynamic DNS service providers to host malicious domains. ,1,accept,T1568.001,Dynamic Resolution: Fast Flux Dns njRAT has used a fast flux DNS for C2 IP resolution. ,1,accept,T1568.001,Dynamic Resolution: Fast Flux Dns TA505 has used fast flux to mask botnets by distributing payloads across multiple IPs.,1,accept,T1568.001,Dynamic Resolution: Fast Flux Dns Adversaries may use Fast Flux DNS to hide a command and control channel behind an array of rapidly changing IP addresses linked to a single domain resolution. ,1,accept,T1568.001,Dynamic Resolution: Fast Flux Dns A researcher has published a blog identifying nameservers servicing malware command and control (C2) domains and providing Fast Flux DNS to the malicious botnets. ,1,accept,T1568.001,Dynamic Resolution: Fast Flux Dns OSX/Shlayer can escalate privileges to root by asking the user for credentials.,1,accept,T1548.004,Abuse Elevation Control Mechanism: Elevated Execution With Prompt Adversaries may leverage the AuthorizationExecuteWithPrivileges API to escalate privileges by prompting the user for credentials. ,1,accept,T1548.004,Abuse Elevation Control Mechanism: Elevated Execution With Prompt " The software downloaded has a multi-stage installer that, once given authentication from the user, gathers system information and ultimately installs multiple adware programs as root. ",1,accept,T1548.004,Abuse Elevation Control Mechanism: Elevated Execution With Prompt " All infection vectors required user interaction at some level in order to compromise the host, including installation of software packages and authentication. ",1,accept,T1548.004,Abuse Elevation Control Mechanism: Elevated Execution With Prompt The downloaded installer is designed to look like a legitimate installation to trick the user into authenticating with their password to continue the second stage infection. ,1,accept,T1548.004,Abuse Elevation Control Mechanism: Elevated Execution With Prompt Proton modifies the tty_tickets line in the sudoers file.,1,accept,T1548.003,Abuse Elevation Control Mechanism: Sudo And Sudo Caching Adversaries may perform sudo caching and/or use the suoders file to elevate privileges. ,1,accept,T1548.003,Abuse Elevation Control Mechanism: Sudo And Sudo Caching " However, the sudoers file can also specify when to not prompt users for passwords. ",1,accept,T1548.003,Abuse Elevation Control Mechanism: Sudo And Sudo Caching " Within Linux and MacOS systems, sudo (sometimes referred to as ""superuser do"") allows users to perform commands from terminals with elevated privileges and to control who can perform these commands on the system. ",1,accept,T1548.003,Abuse Elevation Control Mechanism: Sudo And Sudo Caching " Adversaries can leverage initial access and elevate privileges using sudo caching, which leverages the time between when sudo can be used without authentication after a previous authenticated call. ",1,accept,T1548.003,Abuse Elevation Control Mechanism: Sudo And Sudo Caching Exaramel for Linux can execute commands with high privileges via a specific binary with setuid functionality. ,1,accept,T1548.001,Abuse Elevation Control Mechanism: Setuid And Setgid Keydnap adds the setuid flag to a binary so it can easily elevate in the future.,1,accept,T1548.001,Abuse Elevation Control Mechanism: Setuid And Setgid An adversary may perform shell escapes or exploit vulnerabilities in an application with the setsuid or setgid bits to get code running in a different user’s context. ,1,accept,T1548.001,Abuse Elevation Control Mechanism: Setuid And Setgid " Instead of creating an entry in the sudoers file, which must be done by root, any user can specify the setuid or setgid flag to be set for their own applications. ",1,accept,T1548.001,Abuse Elevation Control Mechanism: Setuid And Setgid An additional binary was identified with SetUID functionalities on the path /bin/backup. It offers the execution of a list of commands with high privileges. The decompiled code is noted below. ,1,accept,T1548.001,Abuse Elevation Control Mechanism: Setuid And Setgid EVILNUM has used a one-way communication method via GitLab and Digital Point to perform C2. ,1,accept,T1102.003,Web Service: One " The tDiscoverer"" variant of HAMMERTOSS establishes a C2 channel by downloading resources from Web services like Twitter and GitHub. HAMMERTOSS binaries contain an algorithm that generates a different Twitter handle for the malware to check for instructions every day. ",1,accept,T1102.003,Web Service: One Leviathan has received C2 instructions from user profiles created on legitimate websites such as Github and TechNet. ,1,accept,T1102.003,Web Service: One Metamorfo has downloaded a zip file for execution on the system. ,1,accept,T1102.003,Web Service: One " OnionDuke uses Twitter as a backup C2.""",1,accept,T1102.003,Web Service: One APT12 has used blogs and WordPress for C2 infrastructure. ,1,accept,T1102.002,Web Service: Bidirectional Communication APT28 has used Google Drive for C2. ,1,accept,T1102.002,Web Service: Bidirectional Communication APT29 has used social media platforms to hide communications to C2 servers. ,1,accept,T1102.002,Web Service: Bidirectional Communication APT37 leverages social networking sites and cloud platforms (AOL Twitter Yandex Mediafire pCloud Dropbox and Box) for C2. ,1,accept,T1102.002,Web Service: Bidirectional Communication APT39 has communicated with C2 through files uploaded to and downloaded from DropBox. ,1,accept,T1102.002,Web Service: Bidirectional Communication BADNEWS can use multiple C2 channels including RSS feeds Github forums and blogs. ,1,accept,T1102.002,Web Service: Bidirectional Communication BLACKCOFFEE has also obfuscated its C2 traffic as normal traffic to sites such as Github. ,1,accept,T1102.002,Web Service: Bidirectional Communication " The CALENDAR malware communicates through the use of events in Google Calendar. ;; Carbanak has used a VBScript named ggldr"" that uses Google Apps Script Sheets and Forms services for C2. ;; One variant of CloudDuke uses a Microsoft OneDrive account to exchange commands and stolen data with its operators. ;; Comnie uses blogs and third-party sites (GitHub tumbler and BlogSpot) to avoid DNS-based blocking of their communication to the command and control server. ;; ComRAT has the ability to use the Gmail web UI to receive commands and exfiltrate information. ;; CozyCar uses Twitter as a backup C2 channel to Twitter accounts specified in its configuration file. ;; Crutch can use Dropbox to receive commands and upload stolen data. ;; DOGCALL is capable of leveraging cloud storage APIs such as Cloud Box Dropbox and Yandex for C2. ;; Empire can use Dropbox and GitHub for C2. ;; FIN7 used legitimate services like Google Docs Google Scripts and Pastebin for C2. ;; GLOOXMAIL communicates to servers operated by Google using the Jabber/XMPP protocol. ;; Grandoreiro can utilize web services including Google sites to send and receive C2 data. ;; KARAE can use public cloud-based storage providers for command and control. ;; Kazuar has used compromised WordPress blogs as C2 servers. ;; LOWBALL uses the Dropbox cloud storage service for command and control. ;; Magic Hound malware can use a SOAP Web service to communicate with its C2 server. ;; MuddyWater has used web services including OneHub to distribute remote access tools. ;; Orz has used Technet and Pastebin web pages for command and control. ;; POORAIM has used AOL Instant Messenger for C2. ;; PowerStallion uses Microsoft OneDrive as a C2 server via a network drive mapped with net use. ;; RegDuke can use Dropbox as its C2 server. ;; Revenge RAT used blogpost.com as its primary command and control server during a campaign. ;; RogueRobin has used Google Drive as a Command and Control channel. ;; ROKRAT leverages legitimate social networking sites and cloud platforms (Twitter Yandex and Mediafire) for C2 communications. ;; Sandworm Team has used the Telegram Bot API from Telegram Messenger to send and receive commands to its Python backdoor. Sandworm Team also used legitimate M.E.Doc software update check requests for sending and receiving commands and hosted malicious payloads on putdrive.com. ;; SLOWDRIFT uses cloud based services for C2. ;; A Turla JavaScript backdoor has used Google Apps Script as its C2 server. ;; UBoatRAT has used GitHub and a public blog service in Hong Kong for C2 communications. ;; yty communicates to the C2 server by retrieving a Google Doc. ;; ZIRCONIUM has used Dropbox for C2 allowing upload and download of files as well as execution of arbitrary commands.""",1,accept,T1102.002,Web Service: Bidirectional Communication APT41 used legitimate websites for C2 through dead drop resolvers (DDR) including GitHub Pastebin and Microsoft TechNet. ,1,accept,T1102.001,Web Service: Dead Drop Resolver Astaroth can store C2 information on cloud hosting services such as AWS and CloudFlare and websites like YouTube and Facebook. ,1,accept,T1102.001,Web Service: Dead Drop Resolver BADNEWS collects C2 information via a dead drop resolver. ,1,accept,T1102.001,Web Service: Dead Drop Resolver BLACKCOFFEE uses Microsoft’s TechNet Web portal to obtain a dead drop resolver containing an encoded tag with the IP address of a command and control server. ,1,accept,T1102.001,Web Service: Dead Drop Resolver BRONZE BUTLER's MSGET downloader uses a dead drop resolver to access malicious payloads. ,1,accept,T1102.001,Web Service: Dead Drop Resolver Grandoreiro can obtain C2 information from Google Docs. ,1,accept,T1102.001,Web Service: Dead Drop Resolver Javali can read C2 information from Google Documents and YouTube. ,1,accept,T1102.001,Web Service: Dead Drop Resolver Some MiniDuke components use Twitter to initially obtain the address of a C2 server or as a backup if no hard-coded C2 server responds. ;; Patchwork hides base64-encoded and encrypted C2 server locations in comments on legitimate websites. ;; PlugX uses Pastebin to store C2 addresses. ;; PolyglotDuke can use Twitter Reddit Imgur and other websites to get a C2 URL. ;; Rocke has used Pastebin to check the version of beaconing malware and redirect to another Pastebin hosting updated malware. ;; RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names. ;; RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names. RTM has also hidden Pony C2 server IP addresses within transactions on the Bitcoin and Namecoin blockchain. ;; Xbash can obtain a webpage hosted on Pastebin to update its C2 domain list.,1,accept,T1102.001,Web Service: Dead Drop Resolver APT28 has used CVE-2015-1701 to access the SYSTEM token and copy it into the current process as part of privilege escalation. ,1,accept,T1134.001,Access Token Manipulation: Token Impersonation/Theft Aria-body has the ability to duplicate a token from ntprint.exe. ,1,accept,T1134.001,Access Token Manipulation: Token Impersonation/Theft BitPaymer can use the tokens of users to create processes on infected systems. ,1,accept,T1134.001,Access Token Manipulation: Token Impersonation/Theft Cobalt Strike can steal access tokens from exiting processes. ,1,accept,T1134.001,Access Token Manipulation: Token Impersonation/Theft FinFisher uses token manipulation with NtFilterToken as part of UAC bypass. ,1,accept,T1134.001,Access Token Manipulation: Token Impersonation/Theft Okrum can impersonate a logged-on user's security context using a call to the ImpersonateLoggedOnUser API. ,1,accept,T1134.001,Access Token Manipulation: Token Impersonation/Theft Pupy can obtain a list of SIDs and provide the option for selecting process tokens to impersonate. ,1,accept,T1134.001,Access Token Manipulation: Token Impersonation/Theft REvil can obtain the token from the user that launched the explorer.exe process to avoid affecting the desktop of the SYSTEM user. ;; Shamoon can impersonate tokens using LogonUser ImpersonateLoggedOnUser and ImpersonateNamedPipeClient.,1,accept,T1134.001,Access Token Manipulation: Token Impersonation/Theft Aria-body has the ability to execute a process using runas. ,1,accept,T1134.002,Access Token Manipulation: Create Process With Token Azorult can call WTSQueryUserToken and CreateProcessAsUser to start a new process with local system privileges. ,1,accept,T1134.002,Access Token Manipulation: Create Process With Token Bankshot grabs a user token using WTSQueryUserToken and then creates a process by impersonating a logged-on user. ,1,accept,T1134.002,Access Token Manipulation: Create Process With Token Empire can use Invoke-RunAs to make tokens. ,1,accept,T1134.002,Access Token Manipulation: Create Process With Token KONNI has duplicated the token of a high integrity process to spawn an instance of cmd.exe under an impersonated user. ,1,accept,T1134.002,Access Token Manipulation: Create Process With Token Lazarus Group keylogger KiloAlfa obtains user tokens from interactive sessions to execute itself with API call CreateProcessAsUserA under that user's context. ,1,accept,T1134.002,Access Token Manipulation: Create Process With Token PipeMon can attempt to gain administrative privileges using token impersonation. ,1,accept,T1134.002,Access Token Manipulation: Create Process With Token PoshC2 can use Invoke-RunAs to make tokens. ;; REvil can launch an instance of itself with administrative rights using runas. ;; Turla RPC backdoors can impersonate or steal process tokens before executing commands. ;; ZxShell has a command called RunAs which creates a new process as another user or process context.,1,accept,T1134.002,Access Token Manipulation: Create Process With Token 3PARA RAT command and control commands are encrypted within the HTTP C2 channel using the DES algorithm in CBC mode with a key derived from the MD5 hash of the string HYF54&%9&jkMCXuiS. 3PARA RAT will use an 8-byte XOR key derived from the string HYF54&%9&jkMCXuiS if the DES decoding fails ,1,accept,T1573.001,Encrypted Channel: Symmetric Cryptography 4H RAT obfuscates C2 communication using a 1-byte XOR with the key 0xBE. ,1,accept,T1573.001,Encrypted Channel: Symmetric Cryptography A variant of ADVSTORESHELL encrypts some C2 with 3DES. ,1,accept,T1573.001,Encrypted Channel: Symmetric Cryptography APT28 installed a Delphi backdoor that used a custom algorithm for C2 communications. ,1,accept,T1573.001,Encrypted Channel: Symmetric Cryptography APT33 has used AES for encryption of command and control traffic. ,1,accept,T1573.001,Encrypted Channel: Symmetric Cryptography Attor has encrypted data symmetrically using a randomly generated Blowfish (OFB) key which is encrypted with a public RSA key. ,1,accept,T1573.001,Encrypted Channel: Symmetric Cryptography Azorult can encrypt C2 traffic using XOR. ,1,accept,T1573.001,Encrypted Channel: Symmetric Cryptography " BADCALL encrypts C2 traffic using an XOR/ADD cipher. ;; BADNEWS encrypts C2 data with a ROR by 3 and an XOR by 0x23. ;; Bazar can send C2 communications with XOR encryption. ;; BBSRAT uses a custom encryption algorithm on data sent back to the C2 server over HTTP. ;; BendyBear communicates to a C2 server over port 443 using modified RC4 and XOR-encrypted chunks. ;; Bisonal variants reported on in 2014 and 2015 used a simple XOR cipher for C2. Some Bisonal samples encrypt C2 communications with RC4. ;; BLINDINGCAN has encrypted its C2 traffic with RC4. ;; Bonadan can XOR-encrypt C2 communications. ;; BRONZE BUTLER has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic. BRONZE BUTLER has also used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server. ;; CallMe uses AES to encrypt C2 traffic. ;; Carbanak encrypts the message body of HTTP traffic with RC2 (in CBC mode). Carbanak also uses XOR with random keys for its communications. ;; Cardinal RAT uses a secret key with a series of XOR and addition operations to encrypt C2 traffic. ;; Chaos provides a reverse shell connection on 8338/TCP encrypted via AES. ;; ChChes can encrypt C2 traffic with AES or RC4. ;; CHOPSTICK encrypts C2 communications with RC4. ;; Cobalt Strike has the ability to use AES-256 symmetric encryption in CBC mode with HMAC-SHA-256 to encrypt task commands and XOR to encrypt shell code and configuration data. ;; Comnie encrypts command and control communications with RC4. ;; CORESHELL C2 messages are encrypted with custom stream ciphers using six-byte or eight-byte keys. ;; CosmicDuke contains a custom version of the RC4 algorithm that includes a programming error. ;; Darkhotel has used AES-256 and 3DES for C2 communications. ;; Daserf uses RC4 encryption to obfuscate HTTP traffic. ;; Derusbi obfuscates C2 traffic with variable 4-byte XOR keys. ;; Dipsind encrypts C2 data with AES256 in ECB mode. ;; down_new has the ability to AES encrypt C2 communications. ;; Downdelph uses RC4 to encrypt C2 responses. ;; Dridex has encrypted traffic with RC4. ;; The Duqu command and control protocol's data stream can be encrypted with AES-CBC. ;; Ebury has encrypted C2 traffic using the client IP address then encoded it as a hexadecimal string. ;; Elise encrypts exfiltrated data with RC4. ;; The C2 server response to a beacon sent by a variant of Emissary contains a 36-character GUID value that is used as an encryption key for subsequent network communications. Some variants of Emissary use various XOR operations to encrypt C2 data. ;; Epic encrypts commands from the C2 server using a hardcoded key. ;; Explosive has encrypted communications with the RC4 method. ;; The original variant of FakeM encrypts C2 traffic using a custom encryption cipher that uses an XOR key of “YHCRA” and bit rotation between each XOR operation. Some variants of FakeM use RC4 to encrypt C2 traffic. ;; FALLCHILL encrypts C2 data with RC4 encryption. ;; FatDuke can AES encrypt C2 communications. ;; Some Felismus samples use a custom encryption method for C2 traffic that utilizes AES and multiple keys. ;; FlawedAmmyy has used SEAL encryption during the initial C2 handshake. ;; Frankenstein has communicated with a C2 via an encrypted RC4 byte stream and AES-CBC. ;; Gazer uses custom encryption for C2 that uses 3DES. ;; gh0st RAT uses RC4 and XOR to encrypt C2 traffic. ;; GreyEnergy encrypts communications using AES256. ;; H1N1 encrypts C2 traffic using an RC4 key. ;; Before being appended to image files HAMMERTOSS commands are encrypted with a key composed of both a hard-coded value and a string contained on that day's tweet. To decrypt the commands an investigator would need access to the intended malware sample the day's tweet and the image file containing the command. ;; Helminth encrypts data sent to its C2 server over HTTP with RC4. ;; Hi-Zor encrypts C2 traffic with a double XOR using two distinct single-byte keys. ;; HiddenWasp uses an RC4-like algorithm with an already computed PRGA generated key-stream for network communication. ;; Higaisa used AES-128 to encrypt C2 traffic. ;; Hikit performs XOR encryption. ;; HotCroissant has compressed network communications and encrypted them with a custom stream cipher. ;; httpclient encrypts C2 content with XOR using a single byte 0x12. ;; Hydraq C2 traffic is encrypted using bitwise NOT and XOR operations. ;; HyperStack has used RSA encryption for C2 communications. ;; Inception has encrypted network communications with AES. ;; InvisiMole uses variations of a simple XOR encryption routine for C&C communications. ;; KEYMARBLE uses a customized XOR algorithm to encrypt C2 communications. ;; The Komplex C2 channel uses an 11-byte XOR algorithm to hide data. ;; Several Lazarus Group malware families encrypt C2 traffic using custom code that uses XOR with an ADD operation and XOR with a SUB operation. Another Lazarus Group malware sample XORs C2 traffic. Other Lazarus Group malware uses Caracachs encryption to encrypt C2 payloads. ;; LightNeuron uses AES to encrypt C2 traffic. ;; LookBack uses a modified version of RC4 for data transfer. ;; Lucifer can perform a decremental-xor encryption on the initial C2 request before sending it over the wire. ;; Lurid performs XOR encryption. ;; Machete has used AES to exfiltrate documents. ;; MoonWind encrypts C2 traffic using RC4 with a static key. ;; More_eggs has used an RC4-based encryption method for its C2 communications. ;; Mosquito uses a custom encryption algorithm which consists of XOR and a stream that is similar to the Blum Blum Shub algorithm. ;; Mustang Panda has encrypted C2 communications with RC4. ;; NanoCore uses DES to encrypt the C2 traffic. ;; NDiskMonitor uses AES to encrypt certain information sent over its C2 channel. ;; NETEAGLE will decrypt resources it downloads with HTTP requests by using RC4 with the key ScoutEagle."" ;; NETWIRE can use AES encryption for C2 data transferred. ;; Okrum uses AES to encrypt network traffic. The key can be hardcoded or negotiated with the C2 server in the registration phase. ;; PipeMon communications are RC4 encrypted. ;; PLAINTEE encodes C2 beacons using XOR. ;; PLEAD has used RC4 encryption to download modules. ;; PoisonIvy uses the Camellia cipher to encrypt communications. ;; POWERTON has used AES for encrypting C2 traffic. ;; Prikormka encrypts some C2 traffic with the Blowfish cipher. ;; QuasarRAT uses AES to encrypt network communication. ;; RDAT has used AES ciphertext to encode C2 communications. ;; RedLeaves has encrypted C2 traffic with RC4 previously using keys of 88888888 and babybear. ;; Rifdoor has encrypted command and control (C2) communications with a stream cipher. ;; APT12 has used the RIPTIDE RAT which communicates over HTTP with a payload encrypted with RC4. ;; RTM encrypts C2 traffic with a custom RC4 variant. ;; Sakula encodes C2 traffic with single-byte XOR keys. ;; SeaDuke C2 traffic has been encrypted with RC4 and AES. ;; SNUGRIDE encrypts C2 traffic using AES with a static key. ;; Stealth Falcon malware encrypts C2 traffic using RC4 with a hard-coded key. ;; SUNBURST encrypted C2 traffic using a single-byte-XOR cipher. ;; Sys10 uses an XOR 0x1 loop to encrypt its C2 domain. ;; Taidoor uses RC4 to encrypt the message body of HTTP content. ;; TAINTEDSCRIBE uses a Linear Feedback Shift Register (LFSR) algorithm for network encryption. ;; TrickBot uses a custom crypter leveraging Microsoft’s CryptoAPI to encrypt C2 traffic. ;; TSCookie has encrypted network communications with RC4. ;; Some versions of UPPERCUT have used the hard-coded string “this is the encrypt key” for Blowfish encryption when communicating with a C2. Later versions have hard-coded keys uniquely for each C2 address. ;; Volgmer uses a simple XOR cipher to encrypt traffic and files. ;; WellMess can encrypt HTTP POST data using RC6 and a dynamically generated AES key encrypted with a hard coded RSA public key. ;; Winnti for Linux has used a custom TCP protocol with four-byte XOR for command and control (C2). ;; ZeroT has used RC4 to encrypt C2 traffic. ;; ZIRCONIUM has used AES encrypted communications in C2.""",1,accept,T1573.001,Encrypted Channel: Symmetric Cryptography 3PARA RAT uses HTTP for command and control. ,1,accept,T1071.001,Application Layer Protocol: Web Protocols 4H RAT uses HTTP for command and control. ,1,accept,T1071.001,Application Layer Protocol: Web Protocols ABK has the ability to use HTTP in communications with C2. ,1,accept,T1071.001,Application Layer Protocol: Web Protocols ADVSTORESHELL connects to port 80 of a C2 server using Wininet API. Data is exchanged via HTTP POSTs. ,1,accept,T1071.001,Application Layer Protocol: Web Protocols Agent Tesla has used HTTP for C2 communications. ,1,accept,T1071.001,Application Layer Protocol: Web Protocols Anchor has used HTTP and HTTPS in C2 communications. ,1,accept,T1071.001,Application Layer Protocol: Web Protocols AppleJeus has sent data to its C2 server via POST requests. ,1,accept,T1071.001,Application Layer Protocol: Web Protocols " APT18 uses HTTP for C2 communications. ;; APT19 used HTTP for C2 communications. APT19 also used an HTTP malware variant to communicate over HTTP for C2. ;; Later implants used by APT28 such as CHOPSTICK use a blend of HTTP and other legitimate channels for C2 depending on module configuration. ;; APT29 has used HTTP for C2 and data exfiltration. ;; APT32 has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. The group has also used downloaded encrypted payloads over HTTP. ;; APT33 has used HTTP for command and control. ;; APT37 uses HTTPS to conceal C2 communications. ;; APT38 used a backdoor QUICKRIDE to communicate to the C2 server over HTTP and HTTPS. ;; APT39 has used HTTP in communications with C2. ;; APT41 used HTTP to download payloads for CVE-2019-19781 and CVE-2020-10189 exploits. ;; Aria-body has used HTTP in C2 communications. ;; Avenger has the ability to use HTTP in communication with C2. ;; BackConfig has the ability to use HTTPS for C2 communiations. ;; BACKSPACE uses HTTP as a transport to communicate with its command server. ;; BADNEWS establishes a backdoor over HTTP. ;; BadPatch uses HTTP for C2. ;; Bankshot uses HTTP for command and control communication. ;; Bazar can use HTTP and HTTPS over ports 80 and 443 in C2 communications. ;; BBK has the ability to use HTTP in communications with C2. ;; BBSRAT uses GET and POST requests over HTTP or HTTPS for command and control to obtain commands and send ZLIB compressed data back to the C2 server. ;; Bisonal uses HTTP for C2 communications. ;; BlackEnergy communicates with its C2 server over HTTP. ;; BlackMould can send commands to C2 in the body of HTTP POST requests. ;; BLINDINGCAN has used HTTPS over port 443 for command and control. ;; BRONZE BUTLER malware has used HTTP for C2. ;; BUBBLEWRAP can communicate using HTTP or HTTPS. ;; Bundlore uses HTTP requests for C2. ;; The Carbanak malware communicates to its command server using HTTP with an encrypted payload. ;; Carberp has connected to C2 servers via HTTP. ;; Carbon can use HTTP in C2 communications. ;; Cardinal RAT is downloaded using HTTP over port 443. ;; ChChes communicates to its C2 server over HTTP and embeds data within the Cookie HTTP header. ;; Chimera has used HTTPS for C2 communications. ;; China Chopper's server component executes code sent via HTTP POST commands. ;; Various implementations of CHOPSTICK communicate with C2 over HTTP. ;; One variant of CloudDuke uses HTTP and HTTPS for C2. ;; Cobalt Group has used HTTPS for C2. ;; Cobalt Strike can use a custom command and control protocol that can be encapsulated in HTTP or HTTPS. All protocols use their standard assigned ports. ;; Comnie uses HTTP for C2 communication. ;; ComRAT has used HTTP requests for command and control. ;; CORESHELL can communicate over HTTP for C2. ;; CosmicDuke can use HTTP or HTTPS for command and control to hard-coded C2 servers. ;; CozyCar's main method of communicating with its C2 servers is using HTTP or HTTPS. ;; Crutch has conducted C2 communications with a Dropbox account using the HTTP API. ;; CSPY Downloader can use GET requests to download additional payloads from C2. ;; Dacls can use HTTPS in C2 communications. ;; Dark Caracal's version of Bandook communicates with their server over a TCP port using HTTP payloads Base64 encoded and suffixed with the string “&&&”. ;; DarkComet can use HTTP for C2 communications. ;; Daserf uses HTTP for C2. ;; DealersChoice uses HTTP for communication with the C2 server. ;; Dipsind uses HTTP for C2. ;; Doki has communicated with C2 over HTTPS. ;; down_new has the ability to use HTTP in C2 communications. ;; DownPaper communicates to its C2 server over HTTP. ;; Dridex has used HTTPS for C2 communications. ;; Drovorub can use the WebSocket protocol and has initiated communication with C2 servers with an HTTP Upgrade request. ;; DustySky has used both HTTP and HTTPS for C2. ;; Dyre uses HTTPS for C2 communications. ;; Egregor has communicated with its C2 servers via HTTPS protocol. ;; Elise communicates over HTTP or HTTPS for C2. ;; ELMER uses HTTP for command and control. ;; Emissary uses HTTP or HTTPS for C2. ;; Empire can conduct command and control over protocols like HTTP and HTTPS. ;; Epic uses HTTP and HTTPS for C2 communications. ;; EvilBunny has executed C2 commands directly via HTTP. ;; Exaramel for Linux uses HTTPS for C2 communications. ;; Explosive has used HTTP for communication. ;; FatDuke can be controlled via a custom C2 protocol over HTTP. ;; Felismus uses HTTP for C2. ;; FELIXROOT uses HTTP and HTTPS to communicate with the C2 server. ;; FIN4 has used HTTP POST requests to transmit data. ;; Final1stspy uses HTTP for C2. ;; FlawedAmmyy has used HTTP for C2. ;; A Gamaredon Group file stealer can communicate over HTTP for C2. ;; Gazer communicates with its C2 servers over HTTP. ;; GeminiDuke uses HTTP and HTTPS for command and control. ;; Get2 has the ability to use HTTP to send information collected from an infected host to C2. ;; Gold Dragon uses HTTP for communication to the control servers. ;; GoldenSpy has used the Ryeol HTTP Client to facilitate HTTP internet communication. ;; GoldFinder has used HTTP for C2. ;; GoldMax has used HTTPS and HTTP GET requests with custom HTTP cookies for C2. ;; Goopy has the ability to communicate with its C2 over HTTP. ;; Grandoreiro has the ability to use HTTP in C2 communications. ;; GravityRAT uses HTTP for C2. ;; GreyEnergy uses HTTP and HTTPS for C2 communications. ;; GuLoader can use HTTP to retrieve additional binaries. ;; HAFNIUM has used open-source C2 frameworks including Covenant. ;; The Uploader"" variant of HAMMERTOSS visits a hard-coded server over HTTP/S to download the images HAMMERTOSS uses to receive commands. ;; HAWKBALL has used HTTP to communicate with a single hard-coded C2 server. ;; Helminth can use HTTP for C2. ;; Hi-Zor communicates with its C2 server over HTTPS. ;; Higaisa used HTTP and HTTPS to send data back to its C2 server. ;; Hikit has used HTTP for C2. ;; HTTPBrowser has used HTTP and HTTPS for command and control. ;; httpclient uses HTTP for command and control. ;; HyperBro has used HTTPS for C2 communications. ;; IcedID has used HTTPS in communications with C2. ;; Inception has used HTTP HTTPS and WebDav in network communications. ;; InvisiMole uses HTTP for C2 communications. ;; Ixeshe uses HTTP for command and control. ;; JHUHUGIT variants have communicated with C2 servers over HTTP and HTTPS. ;; Kazuar uses HTTP and HTTPS to communicate with the C2 server. Kazuar can also act as a webserver and listen for inbound HTTP requests through an exposed API. ;; Ke3chang malware RoyalCli and BS2005 have communicated over HTTP with the C2 server through Internet Explorer (IE) by using the COM interface IWebBrowser2. ;; Keydnap uses HTTPS for command and control. ;; KGH_SPY can send data to C2 with HTTP POST requests. ;; Kinsing has communicated with C2 over HTTP. ;; The Komplex C2 channel uses HTTP POST requests. ;; KONNI has used HTTP for C2. ;; Lazarus Group malware has conducted C2 over HTTP and HTTPS. ;; Lokibot has used HTTP for C2 communications. ;; LookBack’s C2 proxy tool sends data to a C2 server over HTTP. ;; LOWBALL command and control occurs via HTTPS over port 443. ;; Machete uses HTTP for Command & Control. ;; MacSpy uses HTTP for command and control. ;; Magic Hound malware has used HTTP for C2. ;; Maze has communicated to hard-coded IP addresses via HTTP. ;; MCMD can use HTTPS in communication with C2 web servers. ;; MechaFlounder has the ability to use HTTP in communication with C2. ;; Metamorfo has used HTTP for downloading items. ;; Micropsia uses HTTP and HTTPS for C2 network communications. ;; MiniDuke uses HTTP and HTTPS for command and control. ;; Mis-Type network traffic can communicate over HTTP. ;; More_eggs uses HTTPS for C2. ;; MuddyWater has used HTTP for C2 communications. ;; Mustang Panda has communicated with its C2 via HTTP POST requests. ;; NETEAGLE will attempt to detect if the infected host is configured to a proxy. If so NETEAGLE will send beacons via an HTTP POST request. NETEAGLE will also use HTTP to download resources that contain an IP address and Port Number pair to connect to for further C2. ;; NETWIRE has the ability to communicate over HTTP. ;; Night Dragon has used HTTP for C2. ;; njRAT has used HTTP for C2 communications. ;; NOKKI has used HTTP for C2 communications. ;; Octopus uses HTTP for C2 communications. ;; OilRig has used HTTP for C2. ;; Okrum uses HTTP for communication with its C2. ;; OLDBAIT can use HTTP for C2. ;; OnionDuke uses HTTP and HTTPS for C2. ;; OopsIE uses HTTP for C2 communications. ;; Orangeworm has used HTTP for C2. ;; OSX_OCEANLOTUS.D can use HTTP POST and GET requests to send and receive C2 information. ;; Out1 can use HTTP and HTTPS in communications with remote hosts. ;; OwaAuth uses incoming HTTP requests with a username keyword and commands and handles them as instructions to perform actions. ;; P.A.S. Webshell can issue commands via HTTP POST. ;; PinchDuke transfers files from the compromised host via HTTP or HTTPS to a C2 server. ;; PLEAD has used HTTP for communications with command and control (C2) servers. ;; PlugX can be configured to use HTTP for command and control. ;; pngdowner uses HTTP for command and control. ;; PoetRAT has used HTTP and HTTPs for C2 communications. ;; PolyglotDuke has has used HTTP GET requests in C2 communications. ;; Pony has sent collected information to the C2 via HTTP POST request. ;; PoshC2 can use protocols like HTTP/HTTPS for command and control traffic. ;; PowerShower has sent HTTP GET and POST requests to C2 servers to send information and receive instructions. ;; POWERTON has used HTTP/HTTPS for C2 traffic. ;; POWRUNER can use HTTP for C2 communications. ;; Proxysvc uses HTTP over SSL to communicate commands with the control server. ;; Psylo uses HTTPS for C2. ;; Pteranodon can use HTTP for C2. ;; PUNCHBUGGY enables remote interaction and can obtain additional code over HTTPS GET and POST requests. ;; Pupy can communicate over HTTP for C2. ;; QUADAGENT uses HTTPS and HTTP for C2 communications. ;; Ramsay has used HTTP for C2. ;; Rancor has used HTTP for C2. ;; RATANKBA uses HTTP/HTTPS for command and control communication. ;; RDAT can use HTTP communications for C2 as well as using the WinHTTP library to make requests to the Exchange Web Services API. ;; Some Reaver variants use HTTP for C2. ;; RedLeaves can communicate to its C2 over HTTP and HTTPS if directed. ;; The Regin malware platform supports many standard protocols including HTTP and HTTPS. ;; Remexi uses BITSAdmin to communicate with the C2 server over HTTP. ;; Remsec is capable of using HTTP and HTTPS for C2. ;; REvil has used HTTP and HTTPS in communication with C2. ;; RGDoor uses HTTP for C2 communications. ;; APT12 has used RIPTIDE a RAT that uses HTTP to communicate. ;; Rising Sun has used HTTP for command and control. ;; Rocke has executed wget and curl commands to Pastebin over the HTTPS protocol. ;; ROKRAT use HTTPS for all command and control communication methods. ;; RTM has initiated connections to external domains using HTTPS. ;; S-Type uses HTTP for C2. ;; Sakula uses HTTP for C2. ;; Sandworm Team's BCS-server tool connects to the designated C2 server via HTTP. ;; SeaDuke uses HTTP and HTTPS for C2. ;; Seasalt uses HTTP for C2 communications. ;; ServHelper uses HTTP for C2. ;; ShadowPad communicates over HTTP to retrieve a string that is decoded into a C2 server URL. ;; Shamoon has used HTTP for C2. ;; ShimRat communicated over HTTP and HTTPS with C2 servers. ;; ShimRatReporter communicated over HTTP with preconfigured C2 servers. ;; Sibot communicated with its C2 server via HTTP GET requests. ;; Sidewinder has used HTTP in C2 communications. ;; SilverTerrier uses HTTP for C2 communications. ;; SLOTHFULMEDIA has used HTTP and HTTPS for C2 communications. ;; Smoke Loader uses HTTP for C2. ;; SNUGRIDE communicates with its C2 server over HTTP. ;; SoreFang can use HTTP in C2 communications. ;; Spark has used HTTP POST requests to communicate with its C2 server to receive commands. ;; SpeakUp uses POST and GET requests over HTTP to communicate with its main C&C server. ;; Stealth Falcon malware communicates with its C2 server via HTTPS. ;; StrongPity can use HTTP and HTTPS in C2 communications. ;; SUNBURST communicated via HTTP GET or HTTP POST requests to third party servers for C2. ;; SUPERNOVA had to receive an HTTP GET request containing a specific set of parameters in order to execute. ;; Sys10 uses HTTP for C2. ;; TA505 has used HTTP to communiate with C2 nodes. ;; TA551 has used HTTP for C2 communications. ;; ThiefQuest uploads files via unencrypted HTTP. ;; Threat Group-3390 malware has used HTTP for C2. ;; TrickBot uses HTTPS to communicate with its C2 servers to get malware updates modules that perform most of the malware logic and various configuration files. ;; Trojan.Karagany can communicate with C2 via HTTP POST requests. ;; Tropic Trooper has used HTTP in communication with the C2. ;; TSCookie can multiple protocols including HTTP and HTTPS in communication with command and control (C2) servers. ;; Turla has used HTTP and HTTPS for C2 communications. ;; UBoatRAT has used HTTP for C2 communications. ;; UNC2452 used HTTP for C2 and data exfiltration. ;; UPPERCUT has used HTTP for C2 including sending error codes in Cookie headers. ;; Ursnif has used HTTPS for C2. ;; Valak has used HTTP in communications with C2. ;; Vasport creates a backdoor by making a connection using a HTTP POST. ;; VBShower has attempted to obtain a VBS script from command and control (C2) nodes over HTTP. ;; VERMIN uses HTTP for C2 communications. ;; WellMess can use HTTP and HTTPS in C2 communications. ;; Windshift has used tools that communicate with C2 over HTTP. ;; WindTail has the ability to use HTTP for C2 communications. ;; WinMM uses HTTP for C2. ;; Winnti for Linux has used HTTP in outbound communications. ;; WIRTE has used HTTP for network communication. ;; Wizard Spider has used HTTP for network communications. ;; Xbash uses HTTP for C2 communications. ;; YAHOYAH uses HTTP for C2. ;; Zebrocy uses HTTP for C2. ;; ZeroT has used HTTP for C2. ;; Zeus Panda uses HTTP for C2 communications. ;; ZLib communicates over HTTP for C2. ;; ZxShell has used HTTP for C2 connections. """,1,accept,T1071.001,Application Layer Protocol: Web Protocols ,1,accept,T1574.005,Hijack Execution Flow: Executable Installer File Permissions Weakness Adversaries may execute their own malicious payloads by hijacking the binaries used by an installer. ,1,accept,T1574.005,Hijack Execution Flow: Executable Installer File Permissions Weakness " When installers create subdirectories and files they often do not set appropriate permissions to restrict write access, which allows for execution of untrusted code placed in the subdirectories or overwriting of binaries used in the installation process. ",1,accept,T1574.005,Hijack Execution Flow: Executable Installer File Permissions Weakness Attackers can leverage file permissions weaknessses in software installers to get their payload deployed without the user being aware. ,1,accept,T1574.005,Hijack Execution Flow: Executable Installer File Permissions Weakness An external tool or installer is required to enable the malware to maintain persistence through reboot. ,1,accept,T1574.005,Hijack Execution Flow: Executable Installer File Permissions Weakness PowerSpritz decrypts a legitimate Skype or Telegram installer using a custom Spritz implementation with the key “Znxkai@ if8qa9w9489”. PowerSpritz then writes the legitimate installer to disk in the directory returned by GetTempPathA. ,1,accept,T1574.005,Hijack Execution Flow: Executable Installer File Permissions Weakness admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to list local groups: net localgroup administrator >> %temp%\download ,1,accept,T1069.001,Permission Groups Discovery: Local Groups BloodHound can collect information about local groups and members. ,1,accept,T1069.001,Permission Groups Discovery: Local Groups Caterpillar WebShell can obtain a list of local groups of users from a system. ,1,accept,T1069.001,Permission Groups Discovery: Local Groups Chimera has used net localgroup administrators to identify accounts with local administrative rights. ,1,accept,T1069.001,Permission Groups Discovery: Local Groups Emissary has the capability to execute the command net localgroup administrators. ,1,accept,T1069.001,Permission Groups Discovery: Local Groups Epic gathers information on local group names. ,1,accept,T1069.001,Permission Groups Discovery: Local Groups FlawedAmmyy enumerates the privilege level of the victim during the initial infection. ,1,accept,T1069.001,Permission Groups Discovery: Local Groups Helminth has checked the local administrators group. ;; JPIN can obtain the permissions of the victim user. ;; Kazuar gathers information about local groups and members. ;; Kwampirs collects a list of users belonging to the local users and administrators groups with the commands net localgroup administrators and net localgroup users. ;; Commands such as net group and net localgroup can be used in Net to gather information about and manipulate groups. ;; OilRig has used net localgroup administrators to find local administrators on compromised systems. ;; Operation Wocao has used the command net localgroup administrators to list all administrators part of a local group. ;; OSInfo has enumerated the local administrators group. ;; PoshC2 contains modules such as Get-LocAdm for enumerating permission groups. ;; POWRUNER may collect local group information by running net localgroup administrators or a series of other commands on a victim. ;; Sys10 collects the group name of the logged-in user and sends it to the C2. ;; Turla has used net localgroup and net localgroup Administrators to enumerate group information including members of the local administrators group.,1,accept,T1069.001,Permission Groups Discovery: Local Groups Ruler can be used to automate the abuse of Outlook Rules to establish persistence.,1,accept,T1137.005,Office Application Startup: Outlook Rules Adversaries may abuse Microsoft Outlook rules to obtain persistence on a compromised system. ,1,accept,T1137.005,Office Application Startup: Outlook Rules Malicious Outlook rules can be created that can trigger code execution when an adversary sends a specifically crafted email to that user. ,1,accept,T1137.005,Office Application Startup: Outlook Rules " In summary, inbox rules can be hidden by leveraging an API called Messaging Application Programming Interface (MAPI), which provides low level access to exchange data stores. ",1,accept,T1137.005,Office Application Startup: Outlook Rules " User interaction is required to exploit this vulnerability, wherein the victim must import a malformed Outlook Rules (.RWZ) file. ",1,accept,T1137.005,Office Application Startup: Outlook Rules OilRig has abused the Outlook Home Page feature for persistence. OilRig has also used CVE-2017-11774 to roll back the initial patch designed to protect against Home Page abuse. ,1,accept,T1137.004,Office Application Startup: Outlook Home Page Ruler can be used to automate the abuse of Outlook Home Pages to establish persistence.,1,accept,T1137.004,Office Application Startup: Outlook Home Page Adversaries may abuse Microsoft Outlook's Home Page feature to obtain persistence on a compromised system. ,1,accept,T1137.004,Office Application Startup: Outlook Home Page " Once malicious home pages have been added to the user’s mailbox, they will be loaded when Outlook is started. ",1,accept,T1137.004,Office Application Startup: Outlook Home Page " After APT33 initially gained access to Microsoft Exchange accounts through password spraying, the threat actors replaced the Outlook homepage for the victim accounts with a malicious Microsoft Outlook homepage URL crafted through Ruler. ",1,accept,T1137.004,Office Application Startup: Outlook Home Page Ruler can be used to automate the abuse of Outlook Forms to establish persistence.,1,accept,T1137.003,Office Application Startup: Outlook Forms Custom Outlook forms can be created that will execute code when a specifically crafted email is sent by an adversary utilizing the same custom Outlook form. ,1,accept,T1137.003,Office Application Startup: Outlook Forms Adversaries may abuse Microsoft Outlook forms to obtain persistence on a compromised system. ,1,accept,T1137.003,Office Application Startup: Outlook Forms " Once malicious forms have been added to the user’s mailbox, they will be loaded when Outlook is started. ",1,accept,T1137.003,Office Application Startup: Outlook Forms The custom form is triggered when the mailbox receives a specific message from the attacker that requires the mailbox to load the custom form. ,1,accept,T1137.003,Office Application Startup: Outlook Forms Naikon has used the RoyalRoad exploit builder to drop a second stage loader intel.wll into the Word Startup folder on the compromised host.,1,accept,T1137.006,Office Application Startup: Add Add-ins can be used to obtain persistence because they can be set to execute code when an Office application starts. ,1,accept,T1137.006,Office Application Startup: Add Actors may abuse Microsoft Office add-ins to obtain persistence on a compromised system. ,1,accept,T1137.006,Office Application Startup: Add " XLAM files are add-in files for Excel 2010 and Excel 2007 based on XML with support for macros. As victims interacted with these files, an attacker-controlled cloud storage was set up on the local system as a network drive and launched RedCurl.Dropper, which was hosted there. ",1,accept,T1137.006,Office Application Startup: Add Further investigation of this “StartUp” trusted location found that it could host “Word Add-Ins” of a “*.wll” extension. ,1,accept,T1137.006,Office Application Startup: Add AdFind can enumerate domain users. ,1,accept,T1087.002,Account Discovery: Domain Account Bankshot gathers domain and account names/information through process monitoring. ,1,accept,T1087.002,Account Discovery: Domain Account Bazar has the ability to identify domain administrator accounts. ,1,accept,T1087.002,Account Discovery: Domain Account BloodHound can collect information about domain users including identification of domain admin accounts. ,1,accept,T1087.002,Account Discovery: Domain Account BRONZE BUTLER has used net user /domain to identify account information. ,1,accept,T1087.002,Account Discovery: Domain Account Chimera has has used net user /dom and net user Administrator to enumerate domain accounts including administrator accounts. ,1,accept,T1087.002,Account Discovery: Domain Account Cobalt Strike can determine if the user on an infected machine is in the admin or domain admin group. ,1,accept,T1087.002,Account Discovery: Domain Account " CrackMapExec can enumerate the domain user accounts on a targeted system. ;; Dragonfly 2.0 used batch scripts to enumerate users on a victim domain controller. ;; dsquery can be used to gather information on user accounts within a domain. ;; Empire can acquire local and domain user account information. ;; FIN6 has used Metasploit’s PsExec NTDSGRAB module to obtain a copy of the victim's Active Directory database. ;; Fox Kitten has used the Softerra LDAP browser to browse documentation on service accounts. ;; IcedID can query LDAP to identify additional users on the network to infect. ;; Ke3chang performs account discovery using commands such as net localgroup administrators and net group REDACTED"" /domain on specific permissions groups. ;; menuPass has used the Microsoft administration tool csvde.exe to export Active Directory data. ;; MuddyWater has used cmd.exe net user /domain to enumerate domain users. ;; Net commands used with the /domain flag can be used to gather information about and manipulate user accounts on the current domain. ;; OilRig has run net user net user /domain net group “domain admins” /domain and net group “Exchange Trusted Subsystem” /domain to get account listings on a victim. ;; Operation Wocao has used the net command to retrieve information about domain accounts. ;; OSInfo enumerates local and domain users ;; Poseidon Group searches for administrator accounts on both the local victim machine and the network. ;; PoshC2 can enumerate local and domain user account information. ;; POWRUNER may collect user account information by running net user /domain or a series of other commands on a victim. ;; Sandworm Team has used a tool to query Active Directory using LDAP discovering information about usernames listed in AD. ;; SoreFang can enumerate domain accounts via net.exe user /domain. ;; Sykipot may use net group ""domain admins"" /domain to display accounts in the ""domain admins"" permissions group and net localgroup ""administrators"" to list local system administrator group membership. ;; Turla has used net user /domain to enumerate domain accounts. ;; Valak has the ability to enumerate domain admin accounts. ;; Wizard Spider has identified domain admins through the use of “net group ‘Domain admins’” commands.""",1,accept,T1087.002,Account Discovery: Domain Account ,1,accept,T1505.001,Server Software Component: Sql Stored Procedures Threat actors may abuse SQL stored procedures to establish persistent access to systems. ,1,accept,T1505.001,Server Software Component: Sql Stored Procedures Adversaries may craft or modify CLR assemblies that are linked to stored procedures since these CLR assemblies can be made to execute arbitrary commands. ,1,accept,T1505.001,Server Software Component: Sql Stored Procedures " As a result, the stored procedures will run the next time a patch is applied to SQL Server, or the server is restarted. ",1,accept,T1505.001,Server Software Component: Sql Stored Procedures Create a stored procedure to use the xp_cmdshell stored procedure to download and execute a PowerShell payload from the internet using the query below. ,1,accept,T1505.001,Server Software Component: Sql Stored Procedures The SQL injection string attempted to launch PowerShell via the xp_cmdshell stored procedure. ,1,accept,T1505.001,Server Software Component: Sql Stored Procedures " An unspecified vulnerability exists within the Stored Procedure component in Oracle MySQL Server 8.0.23 that, when exploited, allows an authenticated attacker to remotely manipulate data and cause a complete denial-of-service (DoS) condition. ",1,accept,T1505.001,Server Software Component: Sql Stored Procedures LightNeuron has used a malicious Microsoft Exchange transport agent for persistence.,1,accept,T1505.002,Server Software Component: Transport Agent Adversaries may abuse Microsoft transport agents to establish persistent access to systems. ,1,accept,T1505.002,Server Software Component: Transport Agent " Though a malicious transport agent may be invoked for all emails passing through the Exchange transport pipeline, the agent can be configured to only carry out specific tasks in response to adversary defined criteria. ",1,accept,T1505.002,Server Software Component: Transport Agent Leveraging a Microsoft Exchange Transport Agent for persistence is something unique and never before seen. ,1,accept,T1505.002,Server Software Component: Transport Agent The Turla tool leverages a Microsoft Exchange transport agent in parallel with XTRANS to receive and process email messages delivered to the Exchange server. ,1,accept,T1505.002,Server Software Component: Transport Agent ADVSTORESHELL compresses output data generated by command execution with a custom implementation of the Lempel–Ziv–Welch (LZW) algorithm. ,1,accept,T1560.003,Archive Collected Data: Archive Via Custom Method Agent.btz saves system information into an XML file that is then XOR-encoded. ,1,accept,T1560.003,Archive Collected Data: Archive Via Custom Method Attor encrypts collected data with a custom implementation of Blowfish and RSA ciphers. ,1,accept,T1560.003,Archive Collected Data: Archive Via Custom Method CopyKittens encrypts data with a substitute cipher prior to exfiltration. ,1,accept,T1560.003,Archive Collected Data: Archive Via Custom Method Modules can be pushed to and executed by Duqu that copy data to a staging area compress it and XOR encrypt it. ,1,accept,T1560.003,Archive Collected Data: Archive Via Custom Method FIN6 has encoded data gathered from the victim with a simple substitution cipher and single-byte XOR using the 0xAA key and Base64 with character permutation. ,1,accept,T1560.003,Archive Collected Data: Archive Via Custom Method FLASHFLOOD employs the same encoding scheme as SPACESHIP for data it stages. Data is compressed with zlib and bytes are rotated four times before being XOR'ed with 0x23. ,1,accept,T1560.003,Archive Collected Data: Archive Via Custom Method FrameworkPOS can XOR credit card information before exfiltration. ;; HAWKBALL has encrypted data with XOR before sending it over the C2 channel. ;; InvisiMole uses a variation of the XOR cipher to encrypt files before exfiltration. ;; Kimsuky has used RC4 encryption before exfil. ;; A Lazarus Group malware sample encrypts data using a simple byte based XOR operation prior to exfiltration. ;; Machete's collected data is encrypted with AES before exfiltration. ;; MESSAGETAP has XOR-encrypted and stored contents of SMS messages that matched its target list. ;; Mustang Panda has encrypted documents with RC4 prior to exfiltration. ;; NETWIRE has used a custom encryption algorithm to encrypt collected data. ;; Okrum has used a custom implementation of AES encryption to encrypt collected data. ;; OopsIE compresses collected files with a simple character replacement scheme before sending them to its C2 server. ;; OwaAuth DES-encrypts captured credentials using the key 12345678 before writing the credentials to a log file. ;; Ramsay can store collected documents in a custom container after encrypting and compressing them using RC4 and WinRAR. ;; RawPOS encodes credit card data it collected from the victim with XOR. ;; Reaver encrypts collected data with an incremental XOR key prior to exfiltration. ;; RGDoor encrypts files with XOR before sending them back to the C2 server. ;; Rising Sun can archive data using RC4 encryption and Base64 encoding prior to exfiltration. ;; Data SPACESHIP copies to the staging area is compressed with zlib. Bytes are rotated by four positions and XOR'ed with 0x23. ;; StrongPity can compress and encrypt archived files into multiple .sft files with a repeated xor encryption scheme. ;; T9000 encrypts collected data using a single byte XOR key.,1,accept,T1560.003,Archive Collected Data: Archive Via Custom Method Bundlore can persist via a LaunchAgent. ,1,accept,T1543.001,Create or Modify System Process: Launch Agent Calisto adds a .plist file to the /Library/LaunchAgents folder to maintain persistence. ,1,accept,T1543.001,Create or Modify System Process: Launch Agent CoinTicker creates user launch agents named .espl.plist and com.apple.[random string].plist to establish persistence. ,1,accept,T1543.001,Create or Modify System Process: Launch Agent CookieMiner has installed multiple new Launch Agents in order to maintain persistence for cryptocurrency mining software. ,1,accept,T1543.001,Create or Modify System Process: Launch Agent CrossRAT creates a Launch Agent on macOS. ,1,accept,T1543.001,Create or Modify System Process: Launch Agent Dacls can establish persistence via a LaunchAgent. ,1,accept,T1543.001,Create or Modify System Process: Launch Agent Dok persists via a Launch Agent. ,1,accept,T1543.001,Create or Modify System Process: Launch Agent FruitFly persists via a Launch Agent. ;; Keydnap uses a Launch Agent to persist. ;; The Komplex trojan creates a persistent launch agent called with $HOME/Library/LaunchAgents/com.apple.updates.plist with launchctl load -w ~/Library/LaunchAgents/com.apple.updates.plist. ;; MacSpy persists via a Launch Agent. ;; NETWIRE can use launch agents for persistence. ;; OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchAgents. ;; Proton persists via Launch Agent. ;; ThiefQuest installs a launch item using an embedded encrypted launch agent property list template. The plist file is installed in the ~/Library/LaunchAgents/ folder and configured with the path to the persistent binary located in the ~/Library/ folder.,1,accept,T1543.001,Create or Modify System Process: Launch Agent APT1 has used RAR to compress files before moving them outside of the victim network. ,1,accept,T1560.001,Archive Collected Data: Archive Via Utility APT29 used 7-Zip to compress stolen emails into password-protected archives prior to exfiltration. ,1,accept,T1560.001,Archive Collected Data: Archive Via Utility APT3 has used tools to compress data before exfilling it. ,1,accept,T1560.001,Archive Collected Data: Archive Via Utility APT33 has used WinRAR to compress data prior to exfil. ,1,accept,T1560.001,Archive Collected Data: Archive Via Utility APT39 has used WinRAR and 7-Zip to compress an archive stolen data. ,1,accept,T1560.001,Archive Collected Data: Archive Via Utility APT41 created a RAR archive of targeted files for exfiltration. ,1,accept,T1560.001,Archive Collected Data: Archive Via Utility BRONZE BUTLER has compressed data into password-protected RAR archives prior to exfiltration. ,1,accept,T1560.001,Archive Collected Data: Archive Via Utility Calisto uses the zip -r command to compress the data collected on the local system. ;; Chimera has used gzip for Linux OS and a modified RAR software to archive data on Windows hosts. ;; CopyKittens uses ZPP a .NET console program to compress files with ZIP. ;; CORALDECK has created password-protected RAR WinImage and zip archives to be exfiltrated. ;; Crutch has used the WinRAR utility to compress and encrypt stolen files. ;; Daserf hides collected data in password-protected .rar archives. ;; DustySky can compress files via RAR while staging data to be exfiltrated. ;; FIN8 has used RAR to compress collected data before Exfiltration. ;; Fox Kitten has used 7-Zip to archive data. ;; GALLIUM used WinRAR to compress and encrypt stolen data prior to exfiltration. ;; Gallmaker has used WinZip likely to archive data prior to exfiltration. ;; HAFNIUM has used 7-Zip and WinRAR to compress stolen files for exfiltration. ;; iKitten will zip up the /Library/Keychains directory before exfiltrating it. ;; InvisiMole uses WinRAR to compress data that is intended to be exfiltrated. ;; Ke3chang is known to use RAR with passwords to encrypt data prior to exfiltration. ;; Magic Hound has used RAR to stage and compress local folders. ;; menuPass has compressed files before exfiltration using TAR and RAR. ;; Micropsia creates a RAR archive based on collected files on the victim's machine. ;; MuddyWater has used the native Windows cabinet creation tool makecab.exe likely to compress stolen data to be uploaded. ;; Mustang Panda has used RAR to create password-protected archives of collected documents prior to exfiltration. ;; Okrum was seen using a RAR archiver tool to compress/decompress data. ;; OopsIE compresses collected files with GZipStream before sending them to its C2 server. ;; Operation Wocao has archived collected files with WinRAR prior to exfiltration. ;; PoetRAT has the ability to compress files with zip. ;; PoshC2 contains a module for compressing data using ZIP. ;; PowerShower has used 7Zip to compress .txt .pdf .xls or .doc files prior to exfiltration. ;; PUNCHBUGGY has Gzipped information and saved it to a random temp file before exfil. ;; Pupy can compress data with Zip before sending it over C2. ;; Ramsay can compress and archive collected files using WinRAR. ;; Sowbug extracted documents and bundled them into a RAR archive. ;; Turla has encrypted files stolen from connected USB drives into a RAR file before exfiltration. ;; UNC2452 used 7-Zip to compress stolen emails into password-protected archives prior to exfiltration. ;; WindTail has the ability to use the macOS built-in zip utility to archive files.,1,accept,T1560.001,Archive Collected Data: Archive Via Utility Empire can leverage its implementation of Mimikatz to obtain and use silver tickets. ,1,accept,T1558.002,Steal or Forge Kerberos Tickets: Silver Ticket Mimikatz's kerberos module can create silver tickets.,1,accept,T1558.002,Steal or Forge Kerberos Tickets: Silver Ticket "Silver Tickets are forged Kerberos Ticket Granting Service (TGS) tickets, also called service tickets. ",1,accept,T1558.002,Steal or Forge Kerberos Tickets: Silver Ticket " Adversaries who have the password hash of a target service account (e.g. SharePoint, MSSQL) may forge Kerberos ticket granting service (TGS) tickets, also known as silver tickets. ",1,accept,T1558.002,Steal or Forge Kerberos Tickets: Silver Ticket " Silver Tickets can be more dangerous than Golden Tickets – while the scope is more limited than Golden Tickets, the required hash is easier to get and there is no communication with a DC when using them, so detection is more difficult than Golden Tickets. ",1,accept,T1558.002,Steal or Forge Kerberos Tickets: Silver Ticket " Once a threat actor has gained access to at least one service account and extracted the password, they can conduct a silver-ticket attack, creating forged service tickets that provide access to the service that was compromised with the extracting password attack. ",1,accept,T1558.002,Steal or Forge Kerberos Tickets: Silver Ticket Pasam establishes by infecting the Security Accounts Manager (SAM) DLL to load a malicious DLL dropped to disk. ,1,accept,T1547.008,Boot or Logon Autostart Execution: Lsass Driver Wingbird drops a malicious file (sspisrv.dll) alongside a copy of lsass.exe which is used to register a service that loads sspisrv.dll as a driver. The payload of the malicious driver (located in its entry-point function) is executed when loaded by lsass.exe before the spoofed service becomes unstable and crashes.,1,accept,T1547.008,Boot or Logon Autostart Execution: Lsass Driver "Adversaries may target LSASS drivers to obtain persistence. By either replacing or adding illegitimate drivers (e.g., Hijack Execution Flow), an adversary can use LSA operations to continuously execute malicious payloads. ",1,accept,T1547.008,Boot or Logon Autostart Execution: Lsass Driver Adversaries may modify or add LSASS drivers to obtain persistence on compromised systems. ,1,accept,T1547.008,Boot or Logon Autostart Execution: Lsass Driver Hunting efforts identified an atypical living-off-the-land technique being employed to exploit the LSASS process via the use of comsvcs.dll. ,1,accept,T1547.008,Boot or Logon Autostart Execution: Lsass Driver Empire can enumerate Security Support Providers (SSPs) as well as utilize PowerSploit's Install-SSP and Invoke-Mimikatz to install malicious SSPs and log authentication events. ,1,accept,T1547.005,Boot or Logon Autostart Execution: Security Support Provider Lazarus Group has rebooted victim machines to establish persistence by installing a SSP DLL. ,1,accept,T1547.005,Boot or Logon Autostart Execution: Security Support Provider The Mimikatz credential dumper contains an implementation of an SSP. ,1,accept,T1547.005,Boot or Logon Autostart Execution: Security Support Provider PowerSploit's Install-SSP Persistence module can be used to establish by installing a SSP DLL.,1,accept,T1547.005,Boot or Logon Autostart Execution: Security Support Provider Adversaries may abuse security support providers (SSPs) to execute DLLs when the system boots. ,1,accept,T1547.005,Boot or Logon Autostart Execution: Security Support Provider ,1,accept,T1547.003,Boot or Logon Autostart Execution: Time Providers "Adversaries may abuse this architecture to establish persistence, specifically by registering and enabling a malicious DLL as a time provider. ",1,accept,T1547.003,Boot or Logon Autostart Execution: Time Providers Actors may abuse time providers to execute DLLs when the system boots. ,1,accept,T1547.003,Boot or Logon Autostart Execution: Time Providers Reports indicate that any user may start the W32Time service. This may be used to aid in further attacks launched against the vulnerable computer. ,1,accept,T1547.003,Boot or Logon Autostart Execution: Time Providers " Once initial access was obtained, the attacker was able to achieve persistence via a custom crafted DLL that presented as a time provider. ",1,accept,T1547.003,Boot or Logon Autostart Execution: Time Providers During this incident Time Provider Registry keys were modified to enable the implanted DLL to be run as a time service. ,1,accept,T1547.003,Boot or Logon Autostart Execution: Time Providers Cobalt Strike can recover hashed passwords. ,1,accept,T1003.002,OS Credential Dumping: Security Account Manager CosmicDuke collects Windows account hashes. ,1,accept,T1003.002,OS Credential Dumping: Security Account Manager Password stealer and NTLM stealer modules in CozyCar harvest stored credentials from the victim including credentials used as part of Windows NTLM user authentication. ,1,accept,T1003.002,OS Credential Dumping: Security Account Manager CrackMapExec can dump usernames and hashed passwords from the SAM. ,1,accept,T1003.002,OS Credential Dumping: Security Account Manager Dragonfly 2.0 dropped and executed SecretsDump to dump password hashes. ,1,accept,T1003.002,OS Credential Dumping: Security Account Manager Fgdump can dump Windows password hashes. ,1,accept,T1003.002,OS Credential Dumping: Security Account Manager GALLIUM used reg commands to dump specific hives from the Windows Registry such as the SAM hive and obtain password hashes. ,1,accept,T1003.002,OS Credential Dumping: Security Account Manager gsecdump can dump Windows password hashes from the SAM. ;; HOPLIGHT has the capability to harvest credentials and passwords from the SAM database. ;; SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information. ;; Ke3chang has dumped credentials including by using gsecdump. ;; Koadic can gather hashed passwords by dumping SAM/SECURITY hive. ;; menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials. ;; Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from the SAM table. ;; Mivast has the capability to gather NTLM password information. ;; Night Dragon has dumped account hashes with Carbanak and cracked them with Cain & Abel. ;; POWERTON has the ability to dump password hashes. ;; pwdump can be used to dump credentials from the SAM. ;; Remsec can dump the SAM database. ;; Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers. ;; Wizard Spider has acquired credentials from the SAM/SECURITY registry hives.,1,accept,T1003.002,OS Credential Dumping: Security Account Manager Flame can use Windows Authentication Packages for persistence.,1,accept,T1547.002,Boot or Logon Autostart Execution: Authentication Package Adversaries may abuse authentication packages to execute DLLs when the system boots. ,1,accept,T1547.002,Boot or Logon Autostart Execution: Authentication Package Adversaries can use the autostart mechanism provided by LSA authentication packages for persistence by placing a reference to a binary in the Windows Registry. ,1,accept,T1547.002,Boot or Logon Autostart Execution: Authentication Package " An authentication package (AP) can be used by a malicious actor to extend interactive logon authentication, i.e. to enable RSA token authentication. ",1,accept,T1547.002,Boot or Logon Autostart Execution: Authentication Package " At startup, mssecmgr.ocx is loaded as LSA Authentication Package. ",1,accept,T1547.002,Boot or Logon Autostart Execution: Authentication Package APT29 has used WinRM via PowerShell to execute command and payloads on remote hosts. ,1,accept,T1021.006,Remote Services: Windows Remote Management Chimera has used WinRM for lateral movement. ,1,accept,T1021.006,Remote Services: Windows Remote Management Cobalt Strike can use WinRM to execute a payload on a remote host. ,1,accept,T1021.006,Remote Services: Windows Remote Management Threat Group-3390 has used WinRM to enable remote execution. ,1,accept,T1021.006,Remote Services: Windows Remote Management UNC2452 has used WinRM via PowerShell to execute command and payloads on remote hosts. ,1,accept,T1021.006,Remote Services: Windows Remote Management Wizard Spider has used Window Remote Management to move laterally through a victim network.,1,accept,T1021.006,Remote Services: Windows Remote Management jRAT can list and manage startup entries.,1,accept,T1037.005,Boot or Logon Initialization Scripts: Startup Items Adversaries may use startup items automatically executed at boot initialization to establish persistence. ,1,accept,T1037.005,Boot or Logon Initialization Scripts: Startup Items Attackers can create the appropriate folders/files in the StartupItems directory to register their own persistence mechanism. ,1,accept,T1037.005,Boot or Logon Initialization Scripts: Startup Items Renepo is an older OS X malware sample that persists as a startup item. ,1,accept,T1037.005,Boot or Logon Initialization Scripts: Startup Items The malware achieves persistence by placing its script (and a StartupParameters.plist) in a sub-directory in either the /System/Library/StartupItems or /Library/StartupItems directory. ,1,accept,T1037.005,Boot or Logon Initialization Scripts: Startup Items ,1,accept,T1037.003,Boot or Logon Initialization Scripts: Network Logon Script Adversaries may use network logon scripts automatically executed at logon initialization to establish persistence. ,1,accept,T1037.003,Boot or Logon Initialization Scripts: Network Logon Script APT31 has been known to leverage boot or logon initialization scripts to achieve persistence and lateral movement. ,1,accept,T1037.003,Boot or Logon Initialization Scripts: Network Logon Script " Attackers may use boot or logon scripts to maintain persistence on a network. Depending on the access configuration of the logon scripts, either local credentials or an administrator account may be necessary. ",1,accept,T1037.003,Boot or Logon Initialization Scripts: Network Logon Script One of FontOnLake’s rootkits can be executed with a startup script. ,1,accept,T1037.003,Boot or Logon Initialization Scripts: Network Logon Script " At first machine reboot, the LNK file, placed into system' Startup folder, triggers the execution of devtmrn.exe executable. ",1,accept,T1037.003,Boot or Logon Initialization Scripts: Network Logon Script An APT28 loader Trojan adds the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence. ,1,accept,T1037.001,Boot or Logon Initialization Scripts: Logon Script (Windows) " Attor's dispatcher can establish persistence via adding a Registry key with a logon script HKEY_CURRENT_USER\Environment UserInitMprLogonScript"" . ",1,accept,T1037.001,Boot or Logon Initialization Scripts: Logon Script (Windows) Cobalt Group has added persistence by registering the file name for the next stage malware under HKCU\Environment\UserInitMprLogonScript. ,1,accept,T1037.001,Boot or Logon Initialization Scripts: Logon Script (Windows) JHUHUGIT has registered a Windows shell script under the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence. ,1,accept,T1037.001,Boot or Logon Initialization Scripts: Logon Script (Windows) KGH_SPY has the ability to set the HKCU\Environment\UserInitMprLogonScript Registry key to execute logon scripts. ,1,accept,T1037.001,Boot or Logon Initialization Scripts: Logon Script (Windows) " Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\Environment\UserInitMprLogonScript.""",1,accept,T1037.001,Boot or Logon Initialization Scripts: Logon Script (Windows) ,1,accept,T1546.014,Event Triggered Execution: Emond Adversaries may gain persistence and elevate privileges by executing malicious content triggered by the Event Monitor Daemon (emond). ,1,accept,T1546.014,Event Triggered Execution: Emond " Attackers abuse the emond service by writing a rule to execute commands when a defined event occurs, such as system start up or user authentication. ",1,accept,T1546.014,Event Triggered Execution: Emond Actors may also be able to escalate privileges from administrator to root as the emond service is executed with root privileges by the Launch Daemon service. ,1,accept,T1546.014,Event Triggered Execution: Emond The ransomware was triggered by a custom rule that caused the event monitor daemon to execute the malware during user logon. ,1,accept,T1546.014,Event Triggered Execution: Emond Malware was executed by forcing a reboot of the victim's computer after placing a custom rule that was executed by the emond process during startup. ,1,accept,T1546.014,Event Triggered Execution: Emond Turla has used PowerShell profiles to maintain persistence on an infected machine.,1,accept,T1546.013,Event Triggered Execution: Powershell Profile Adversaries may gain persistence and elevate privileges by executing malicious content triggered by PowerShell profiles. A PowerShell profile (profile.ps1) is a script that runs when PowerShell starts and can be used as a logon script to customize user environments. ,1,accept,T1546.013,Event Triggered Execution: Powershell Profile " An adversary may also be able to escalate privileges if a script in a PowerShell profile is loaded and executed by an account with higher privileges, such as a domain administrator. ",1,accept,T1546.013,Event Triggered Execution: Powershell Profile " The actor started using PowerShell scripts that provide direct, in-memory loading and execution of malware executables and libraries. ",1,accept,T1546.013,Event Triggered Execution: Powershell Profile The activity used PowerShell likely to load the BELUGASTURGEON implant COMRAT on compromised clients. ,1,accept,T1546.013,Event Triggered Execution: Powershell Profile ,1,accept,T1056.003,Input Capture: Web Portal Capture "Adversaries may install code on externally facing portals, such as a VPN login page, to capture and transmit credentials of users who attempt to log into the service. ",1,accept,T1056.003,Input Capture: Web Portal Capture Attackers have been able to successfully implant JavaScript code on the login pages that enables them to surreptitiously steal employee credentials as they login to access internal corporate resources. ,1,accept,T1056.003,Input Capture: Web Portal Capture " A vulnerability in the Clientless SSL VPN portal customization framework could allow an unauthenticated, remote attacker to modify the content of the Clientless SSL VPN portal, which could lead to several attacks including the stealing of credentials, cross-site scripting (XSS), and other types of web attacks on the client using the affected system. ",1,accept,T1056.003,Input Capture: Web Portal Capture Threat actors sold and deployed phishing pages mimicking financial sites to obtain credentials or financial information. ,1,accept,T1056.003,Input Capture: Web Portal Capture Threat actors sold and deployed phishing pages mimicking government e-portals to obtain credentials or financial information. ,1,accept,T1056.003,Input Capture: Web Portal Capture Bundlore prompts the user for their credentials. ,1,accept,T1056.002,Input Capture: Gui Input Capture Calisto presents an input prompt asking for the user's login and password. ,1,accept,T1056.002,Input Capture: Gui Input Capture Dok prompts the user for credentials. ,1,accept,T1056.002,Input Capture: Gui Input Capture FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials. ,1,accept,T1056.002,Input Capture: Gui Input Capture iKitten prompts the user for their credentials. ,1,accept,T1056.002,Input Capture: Gui Input Capture Keydnap prompts the users for credentials. ,1,accept,T1056.002,Input Capture: Gui Input Capture Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims. ,1,accept,T1056.002,Input Capture: Gui Input Capture Proton prompts users for their credentials.,1,accept,T1056.002,Input Capture: Gui Input Capture APT33 has used a variety of publicly available tools like LaZagne to gather credentials. ,1,accept,T1003.005,OS Credential Dumping: Cached Domain Credentials Cachedump can extract cached password hashes from cache entry information. ,1,accept,T1003.005,OS Credential Dumping: Cached Domain Credentials LaZagne can perform credential dumping from MSCache to obtain account and password information. ,1,accept,T1003.005,OS Credential Dumping: Cached Domain Credentials Leafminer used several tools for retrieving login and password information including LaZagne. ,1,accept,T1003.005,OS Credential Dumping: Cached Domain Credentials MuddyWater has performed credential dumping with LaZagne. ,1,accept,T1003.005,OS Credential Dumping: Cached Domain Credentials OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. ,1,accept,T1003.005,OS Credential Dumping: Cached Domain Credentials Okrum was seen using modified Quarks PwDump to perform credential dumping. ,1,accept,T1003.005,OS Credential Dumping: Cached Domain Credentials Pupy can use Lazagne for harvesting credentials.,1,accept,T1003.005,OS Credential Dumping: Cached Domain Credentials netsh can be used as a persistence proxy technique to execute a helper DLL when netsh.exe is executed.,1,accept,T1546.007,Event Triggered Execution: Netsh Helper Dll Adversaries can use netsh.exe helper DLLs to trigger execution of arbitrary code in a persistent manner. ,1,accept,T1546.007,Event Triggered Execution: Netsh Helper Dll The attackers established persistence by executing malicious content triggered by Netsh Helper DLLs. ,1,accept,T1546.007,Event Triggered Execution: Netsh Helper Dll Threat group FIN13 has been observed to use netsh to install the downloader known as DRAWSTRING. ,1,accept,T1546.007,Event Triggered Execution: Netsh Helper Dll A previously unknown Chinese hacking group used netsh rules to attempt to bypass network restrictions on the victim machine. ,1,accept,T1546.007,Event Triggered Execution: Netsh Helper Dll APT1 uses two utilities GETMAIL and MAPIGET to steal email. GETMAIL extracts emails from archived Outlook .pst files. ,1,accept,T1114.001,Email Collection: Local Email Collection Carbanak searches recursively for Outlook personal storage tables (PST) files within user directories and sends them back to the C2 server. ,1,accept,T1114.001,Email Collection: Local Email Collection " Chimera has harvested data from victim's e-mail including through execution of wmic /node: process call create cmd /c copy c:\Users\\\backup.pst c:\windows\temp\backup.pst"" copy ""i:\\\My Documents\.pst""copy. ",1,accept,T1114.001,Email Collection: Local Email Collection CosmicDuke searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration. ,1,accept,T1114.001,Email Collection: Local Email Collection Crimson contains a command to collect and exfiltrate emails from Outlook. ,1,accept,T1114.001,Email Collection: Local Email Collection Emotet has been observed leveraging a module that scrapes email data from Outlook. ,1,accept,T1114.001,Email Collection: Local Email Collection Empire has the ability to collect emails on a target system. ,1,accept,T1114.001,Email Collection: Local Email Collection " KGH_SPY can harvest data from mail clients. ;; Magic Hound has collected .PST archives. ;; Out1 can parse e-mails on a target machine. ;; Pupy can interact with a victim’s Outlook session and look through folders and emails. ;; Smoke Loader searches through Outlook files and directories (e.g. inbox sent templates drafts archives etc.)."";;The FBI and CISA have detected multiple zero-day exploits, with actors attempting to collect mailbox data in the form of .ost files from Microsoft Exchange servers. ;; Warzone features functionality precipitating the theft of browser and email clients. ;; The cmdlet New-MailboxExportRequest within Powershell is used to steal email boxes, and has been observed to be used by Chinese state sponsored actors. ",1,accept,T1114.001,Email Collection: Local Email Collection ,1,accept,T1546.005,Event Triggered Execution: Trap Cobaltstrike often achieves persistence through executing malicious code through a system event triggered by the trap command. ,1,accept,T1546.005,Event Triggered Execution: Trap WMI runs commands on remote systems via malicious commands triggered through a system event such as the trap command. ,1,accept,T1546.005,Event Triggered Execution: Trap " Helper .dll files can be utilized for persistence, often executed through the trap command. ",1,accept,T1546.005,Event Triggered Execution: Trap " Remote access trojans (RATs), such as Neurevt maintain persistence on a machine with malicious payloads triggered via a system event such as the trap command. ",1,accept,T1546.005,Event Triggered Execution: Trap The trap command can be utilised to achieve remote code execution when an interrupt signal is received. ,1,accept,T1546.005,Event Triggered Execution: Trap ,1,accept,T1213.001,Data from Information Repositories: Confluence APT41 often gather information from popular data sharing repositories such as Confluence. ,1,accept,T1213.001,Data from Information Repositories: Confluence " ""Lebanese Cedar '', an APT group, often creates campaigns where a large amount of data is stolen from Confluence. ",1,accept,T1213.001,Data from Information Repositories: Confluence Confluence and JIRA are popular targets for APT groups wishing to receive sensitive documents and share them publicly. ,1,accept,T1213.001,Data from Information Repositories: Confluence " A popular reconnaissance technique that threat actors employ is to steal data from company data repositories, such as Confluence. ",1,accept,T1213.001,Data from Information Repositories: Confluence " Given that companies often store development documentation on Confluence, it is often a target for APT27 to harvest data from. ",1,accept,T1213.001,Data from Information Repositories: Confluence APT28 has collected information from Microsoft SharePoint services within target networks. ,1,accept,T1213.002,Data from Information Repositories: Sharepoint Chimera has collected documents from the victim's SharePoint. ,1,accept,T1213.002,Data from Information Repositories: Sharepoint Ke3chang used a SharePoint enumeration and data dumping tool known as spwebmember. ,1,accept,T1213.002,Data from Information Repositories: Sharepoint spwebmember is used to enumerate and dump information from Microsoft SharePoint.,1,accept,T1213.002,Data from Information Repositories: Sharepoint "After achieving persistence on a network, threat actors will often move to harvesting data from popular data repositories such as SharePoint. ",1,accept,T1213.002,Data from Information Repositories: Sharepoint APT18 actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network. ,1,accept,T1053.002,Scheduled Task/Job: At (Windows) at can be used to schedule a task on a system. ,1,accept,T1053.002,Scheduled Task/Job: At (Windows) BRONZE BUTLER has used at to register a scheduled task to execute malware during lateral movement. ,1,accept,T1053.002,Scheduled Task/Job: At (Windows) CrackMapExec can set a scheduled task on the target system to execute commands remotely using at. ,1,accept,T1053.002,Scheduled Task/Job: At (Windows) MURKYTOP has the capability to schedule remote AT jobs. ,1,accept,T1053.002,Scheduled Task/Job: At (Windows) Threat Group-3390 actors use at to schedule tasks to run self-extracting RAR archives which install HTTPBrowser or PlugX on other victims on a network.,1,accept,T1053.002,Scheduled Task/Job: At (Windows) "Lateral movement within infrastructure has been observed by CTU analysts, with attackers utilising at.exe for the movement. ",1,accept,T1053.002,Scheduled Task/Job: At (Windows) Scheduled tasks that run using at.exe could be an indicator of a depreciated program that needs to be updated or malicious activity. ;; The Bamital Trojan utilised at.exe for privilege escalation. ,1,accept,T1053.002,Scheduled Task/Job: At (Windows) ,1,accept,T1098.003,Account Manipulation: Add Office 365 Global Administrator Role "WastedLocker often achieves persistence through creating user accounts, or upgrading existing accounts to have Office 365 Administrator privileges. ",1,accept,T1098.003,Account Manipulation: Add Office 365 Global Administrator Role " Phishing campaigns targeting business, tech, and telecom industries often use phishing emails to compromise an account before upgrading it to an Office 365 Administrator for further malicious activity. ",1,accept,T1098.003,Account Manipulation: Add Office 365 Global Administrator Role " SODINOKIBI, a REvil ransomware as a service (RaaS), can compromise accounts and achieve persistence through malicious code executed via privileges achieved via an account being upgraded to an administrator of Office 365. ",1,accept,T1098.003,Account Manipulation: Add Office 365 Global Administrator Role " APT41 employs a variety of persistence methods, one of which involved increasing a compromised account's privileges through the Office 365 Administrator role. ",1,accept,T1098.003,Account Manipulation: Add Office 365 Global Administrator Role " In order to compromise more accounts, TEMP.Zagros employs malicious software which will increase the privileges of an already compromised account via increasing it's Office 365 account to an administrator one. ",1,accept,T1098.003,Account Manipulation: Add Office 365 Global Administrator Role Equation is known to have the capability to overwrite the firmware on hard drives from some manufacturers.,1,accept,T1542.002,Pre Trickbot will often achieve persistence through compromising the firmware of a system. ,1,accept,T1542.002,Pre UEFI-related attacks increasingly involve the component firmware of critical systems being compromised. ,1,accept,T1542.002,Pre Attackers are increasingly targeting the firmware of component systems to achieve persistence as they often cannot verify their integrity as well as the main system components. ,1,accept,T1542.002,Pre " APT34 can achieve persistence on machines via compromising component firmware, allowing them to execute low level commands before the BIOS loads. ",1,accept,T1542.002,Pre APT39 used secure shell (SSH) to move laterally among their targets. ,1,accept,T1021.004,Remote Services: Ssh Cobalt Strike can SSH to a remote service. ,1,accept,T1021.004,Remote Services: Ssh Empire contains modules for executing commands over SSH as well as in-memory VNC agent injection. ,1,accept,T1021.004,Remote Services: Ssh Fox Kitten has used the PuTTY and Plink tools for lateral movement. ,1,accept,T1021.004,Remote Services: Ssh GCMAN uses Putty for lateral movement. ,1,accept,T1021.004,Remote Services: Ssh Kinsing has used SSH for lateral movement. ,1,accept,T1021.004,Remote Services: Ssh Leviathan used ssh for internal reconnaissance. ,1,accept,T1021.004,Remote Services: Ssh " menuPass has used Putty Secure Copy Client (PSCP) to transfer data. ;; OilRig has used Putty to access compromised systems. ;; Rocke has spread its coinminer via SSH. ;; TEMP.Veles has relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution.;;SSH fingerprint data shows that Sysrv-hello compromised 26 servers, utilising them as C2 servers. ;; APT24 has utilised SSH, in addition to a credential stealer such as MIMIKATZ to operate on victim hosts. ;; SSH client Bitvise was used to log into a VMWare ESXi with an open SSH connection. ",1,accept,T1021.004,Remote Services: Ssh Anchor can install itself as a cron job. ,1,accept,T1053.003,Scheduled Task/Job: Cron Exaramel for Linux uses crontab for persistence if it does not have root privileges. ,1,accept,T1053.003,Scheduled Task/Job: Cron Janicab used a cron job for persistence on Mac devices. ,1,accept,T1053.003,Scheduled Task/Job: Cron Kinsing has used crontab to download and run shell scripts every minute to ensure persistence. ,1,accept,T1053.003,Scheduled Task/Job: Cron NETWIRE can use crontabs to establish persistence. ,1,accept,T1053.003,Scheduled Task/Job: Cron Penquin can use Cron to create periodic and pre-scheduled background jobs. ,1,accept,T1053.003,Scheduled Task/Job: Cron Rocke installed a cron job that downloaded and executed files from the C2. ,1,accept,T1053.003,Scheduled Task/Job: Cron " Skidmap has installed itself via crontab. ;; SpeakUp uses cron tasks to ensure persistence. ;; Xbash can create a cronjob for persistence if it determines it is on a Linux system.;;Muhstik, a threat actor group often abuses the cron utility, using crontab files within scripts such as IDM scripts to establish persistence. ;; Chinese state sponsored actors often utilise CLI tools, such as crontab to schedule malicious tasks that enumerate victim devices. ;; Moobot, a Mirai botnet variant, achieves persistence through crontab and connections to malicious domains for communication and malware downloads. ",1,accept,T1053.003,Scheduled Task/Job: Cron WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session.,1,accept,T1563.002,Remote Service Session Hijacking: Rdp Hijacking REvil will hijack Remote Desktop Services (RDS) for lateral movement. ,1,accept,T1563.002,Remote Service Session Hijacking: Rdp Hijacking " CIS based ransomware, such as Fonix will often try to infect as many machines that are accessed via lateral movement instagated from the hijacking of a Remote Desktop Protocol (RDP). ",1,accept,T1563.002,Remote Service Session Hijacking: Rdp Hijacking " Companies should ensure that Remote Desktop Services are secure, as they are commonly hijacked my ransomware such as CryptConsole for movements and victim enumeration. ",1,accept,T1563.002,Remote Service Session Hijacking: Rdp Hijacking " Blocking RDP access from the internet is a recommended security policy to prevent them from being abused by Phobos, a ransomware that can hijack RDP sessions. ",1,accept,T1563.002,Remote Service Session Hijacking: Rdp Hijacking ,1,accept,T1563.001,Remote Service Session Hijacking: Ssh Hijacking "From old ransomware such as Cryakl to new ones like XMRLocker, lateral movement via SSH hijacking is a popular TTP. ",1,accept,T1563.001,Remote Service Session Hijacking: Ssh Hijacking Ransomware will utilise SSH vulnerabilities to move laterally within a system. ,1,accept,T1563.001,Remote Service Session Hijacking: Ssh Hijacking Password policies should be implemented and enforced for SSH usage to prevent hijacking of weak/standard passwords by malicious actors. ,1,accept,T1563.001,Remote Service Session Hijacking: Ssh Hijacking Linux/Mac OS administrators should be wary of unprotected SSH communications within the network as these remote connections are a favourite way of maintaining persistence by threat actors. ,1,accept,T1563.001,Remote Service Session Hijacking: Ssh Hijacking SSH certificates should always be validated as forged credentials will allow actors to move laterally within the network. ,1,accept,T1563.001,Remote Service Session Hijacking: Ssh Hijacking ,1,accept,T1053.004,Scheduled Task/Job: Launchd Malware that installs .msi files often abuse the root privileges of launchd daemons to repeatedly execute malicious activity. ,1,accept,T1053.004,Scheduled Task/Job: Launchd " Launchd can change the permissions of files, escalating the privileges of malware. ",1,accept,T1053.004,Scheduled Task/Job: Launchd Copying malicious files from the installer location to /Library/LaunchDaemons/folder will escalate the copied privileges. ,1,accept,T1053.004,Scheduled Task/Job: Launchd " BeagleBoyz, North Korean Actors, will often obfuscate their malware whilst simultaneously escalating it's privilege through running the malware under launchd's privileged context. ",1,accept,T1053.004,Scheduled Task/Job: Launchd Reconnaissance and background checks can be routinely automated through scheduling a launchd task. ,1,accept,T1053.004,Scheduled Task/Job: Launchd ,1,accept,T1053.001,Scheduled Task/Job: At (Linux) Cryptocurrency miners abuse the at command on Linux to schedule recurring mining on victim machines. ,1,accept,T1053.001,Scheduled Task/Job: At (Linux) Communication with a CnC server can be automated via the at command on Linux OS. ,1,accept,T1053.001,Scheduled Task/Job: At (Linux) Golden Chickens Malware-as-a-Service (MaaS) will utilize to schedule malicious tasks. ,1,accept,T1053.001,Scheduled Task/Job: At (Linux) Malware will exfiltrate stolen data at regular intervals on Linux servers through abusing the at command functionality ,1,accept,T1053.001,Scheduled Task/Job: At (Linux) Ransomware will often schedule the encryption of victim data via the at command. ,1,accept,T1053.001,Scheduled Task/Job: At (Linux) Anchor can support windows execution via SMB shares. ,1,accept,T1021.002,Remote Services: Smb/Windows Admin Shares APT3 will copy files over to Windows Admin Shares (like ADMIN$) as part of lateral movement. ,1,accept,T1021.002,Remote Services: Smb/Windows Admin Shares APT32 used Net to use Windows' hidden network shares to copy their tools to remote machines for execution. ,1,accept,T1021.002,Remote Services: Smb/Windows Admin Shares APT39 has used SMB for lateral movement. ,1,accept,T1021.002,Remote Services: Smb/Windows Admin Shares APT41 has transferred implant files using Windows Admin Shares. ,1,accept,T1021.002,Remote Services: Smb/Windows Admin Shares BlackEnergy has run a plug-in on a victim to spread through the local network by using PsExec and accessing admin shares. ,1,accept,T1021.002,Remote Services: Smb/Windows Admin Shares Blue Mockingbird has used Windows Explorer to manually copy malicious files to remote hosts over SMB. ,1,accept,T1021.002,Remote Services: Smb/Windows Admin Shares " Chimera has used Windows admin shares to move laterally. ;; Cobalt Strike can use Window admin shares (C$ and ADMIN$) for lateral movement. ;; Conti can spread via SMB and encrypts files on different hosts potentially compromising an entire network. ;; Deep Panda uses net.exe to connect to network shares using net use commands with compromised credentials. ;; Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware. ;; Emotet leverages the Admin$ share for lateral movement once the local admin password has been brute forced. ;; FIN8 has attempted to map to C$ on enumerated hosts to test the scope of their current credentials/context. ;; Fox Kitten has used valid accounts to access SMB shares. ;; Ke3chang actors have been known to copy files to the network shares of other computers to move laterally. ;; Kwampirs copies itself over network shares to move laterally on a victim network. ;; Lazarus Group malware SierraAlfa accesses the ADMIN$ share via SMB to conduct lateral movement. ;; Lucifer can infect victims by brute forcing SMB. ;; Lateral movement can be done with Net through net use commands to connect to the on remote systems. ;; Net Crawler uses Windows admin shares to establish authenticated sessions to remote systems over SMB as part of lateral movement. ;; NotPetya can use PsExec which interacts with the ADMIN$ network share to execute commands on remote systems. ;; Olympic Destroyer uses PsExec to interact with the ADMIN$ network share to execute commands on remote systems. ;; Operation Wocao has used Impacket's smbexec.py as well as accessing the C$ and IPC$ shares to move laterally. ;; Orangeworm has copied its backdoor across open network shares including ADMIN$ C$WINDOWS D$WINDOWS and E$WINDOWS. ;; PsExec a tool that has been used by adversaries writes programs to the ADMIN$ network share to execute commands on remote systems. ;; The Regin malware platform can use Windows admin shares to move laterally. ;; Ryuk has used the C$ network share for lateral movement. ;; Shamoon accesses network share(s) enables share access to the target device copies an executable payload to the target system and uses a Scheduled Task/Job to execute the malware. ;; Threat Group-1314 actors mapped network drives using net use. ;; Turla used net use commands to connect to lateral systems within a network. ;; Wizard Spider has used SMB to drop Cobalt Strike Beacon on a domain controller for lateral movement. ;; zwShell has been copied over network shares to move laterally.;;BlackMatter ransomware, with stolen credentials, often uses SMB to access the active directory (AD) and perform host discovery. ;; Attackers often use CobaltStrike functionality, specifically named pipes, in combination with SMB for lateral movement within networks. ;; Net, a utility program in windows systems, is often used by APT groups synchronously with SMB to perform a variety of tasks on host machines such as discovery, lateral movement and system/network information gathering. ",1,accept,T1021.002,Remote Services: Smb/Windows Admin Shares Carberp can start a remote VNC session by downloading a new plugin. ,1,accept,T1021.005,Remote Services: Vnc Fox Kitten has installed TightVNC server and client on compromised servers and endpoints for lateral movement. ,1,accept,T1021.005,Remote Services: Vnc GCMAN uses VNC for lateral movement. ,1,accept,T1021.005,Remote Services: Vnc Proton uses VNC to connect into systems. ,1,accept,T1021.005,Remote Services: Vnc ZxShell supports functionality for VNC sessions.,1,accept,T1021.005,Remote Services: Vnc "Ramnit banking trojan and botnet uses VNC to access victim machines, typically deploying the technique in later stages of the kill chain on command via the attacker C&C server. ",1,accept,T1021.005,Remote Services: Vnc " The SMOKEDHAM backdoor, after executing Powershell commands, installs the UltraVNC application, renamed winvnc.exe, to establish remote control of a target computer. ",1,accept,T1021.005,Remote Services: Vnc Many ransomware variants that utilise CobaltStrike often combine it's functionality with dual-use tools such as TightVNC for remote access to a target machine. ,1,accept,T1021.005,Remote Services: Vnc "Cobalt Strike can deliver beacon"" payloads for lateral movement by leveraging remote COM execution. ",1,accept,T1021.003,Remote Services: Distributed Component Object Model " Empire can utilize Invoke-DCOM to leverage remote COM execution for lateral movement.""",1,accept,T1021.003,Remote Services: Distributed Component Object Model JuicyPotato exploits the windows DCOM and SeImpersonate token privilege to elevate an unprivileged account to the highest level of privilege. ,1,accept,T1021.003,Remote Services: Distributed Component Object Model The ExecuteShellCommand Method in Microsoft Management Console (MMC) 2.0 allows for lateral movement within a network when abusing DCOM with valid credentials. ,1,accept,T1021.003,Remote Services: Distributed Component Object Model " IcedID malware often accesses victim machines utilizing DCOM in combination with wuauclt.exe, a CobaltStrike tool. ",1,accept,T1021.003,Remote Services: Distributed Component Object Model Empire has a module for creating a new domain user if permissions allow. ,1,accept,T1136.002,Create Account: Domain Account GALLIUM created high-privileged domain user accounts to maintain access to victim networks. ,1,accept,T1136.002,Create Account: Domain Account HAFNIUM has created and granted privileges to domain accounts. ,1,accept,T1136.002,Create Account: Domain Account The net user username \password \domain commands in Net can be used to create a domain account. ,1,accept,T1136.002,Create Account: Domain Account Pupy can user PowerView to execute “net user” commands and create domain accounts.,1,accept,T1136.002,Create Account: Domain Account "A reverse proxy that establishes a RDP connection can allow for lateral movement and control of a domain account after which, local administrator accounts can be created for persistence. ",1,accept,T1136.002,Create Account: Domain Account " Prior to infecting a victim with malware such as Black Kingdom ransomware, attackers will often create domain administrator accounts, achieved through various means such as VPN login with compromised credentials. ",1,accept,T1136.002,Create Account: Domain Account " CobaltStrike persistence functionality allows for the creation of a new administrator account once a domain account has been compromised, which is then added to the Administrator domain and granting the new account AD domain privileges. ",1,accept,T1136.002,Create Account: Domain Account APT3 has been known to create or enable accounts such as support_388945a0. ,1,accept,T1136.001,Create Account: Local Account APT39 has created accounts on multiple compromised hosts to perform actions within the network. ,1,accept,T1136.001,Create Account: Local Account APT41 created user accounts and adds them to the User and Admin groups. ,1,accept,T1136.001,Create Account: Local Account Calisto has the capability to add its own account to the victim's machine. ,1,accept,T1136.001,Create Account: Local Account Carbanak can create a Windows account. ,1,accept,T1136.001,Create Account: Local Account Dragonfly 2.0 created accounts on victims including administrator accounts some of which appeared to be tailored to each individual staging target. ,1,accept,T1136.001,Create Account: Local Account Empire has a module for creating a local user if permissions allow. ,1,accept,T1136.001,Create Account: Local Account " Flame can create backdoor accounts with login “HelpAssistant” on domain connected systems if appropriate rights are available. ;; Fox Kitten has created a local user account with administrator privileges. ;; GoldenSpy can create new users on an infected system. ;; HiddenWasp creates a user account as a means to provide initial persistence to the compromised machine. ;; Hildegard has created a user named “monerodaemon”. ;; Leafminer used a tool called Imecab to set up a persistent remote access account on the victim machine. ;; Mis-Type may create a temporary user on the system named “Lost_{Unique Identifier}.” ;; The net user username \password commands in Net can be used to create a local account. ;; Pupy can user PowerView to execute “net user” commands and create local system accounts. ;; S-Type may create a temporary user on the system named “Lost_{Unique Identifier}” with the password “pond~!@6”{Unique Identifier}.” ;; ServHelper has created a new user and added it to the Remote Desktop Users"" and ""Administrators"" groups. ;; ZxShell has a feature to create local user accounts."";;A known TTP of APT34 is to create local user accounts with the net command for the purpose of lateral movement. ;; BazarLoader is known to deploy CobaltStrike beacons which create local accounts in addition to domain accounts. ;; Threat actors often create local accounts to maintain presence within a network before infecting machines with ransomware such as Phobos or RagnarLocker. ",1,accept,T1136.001,Create Account: Local Account ,1,accept,T1195.003,Supply Chain Compromise: Compromise Hardware Supply Chain "APT41 historically executed supply chain compromises, often via modification of hardware systems. ",1,accept,T1195.003,Supply Chain Compromise: Compromise Hardware Supply Chain " Through modifying the hardware functionality of certain systems, backdoors can be maintained and utilized. ",1,accept,T1195.003,Supply Chain Compromise: Compromise Hardware Supply Chain " APT groups will often attempt to manipulate hardware components of systems to their advantage, such as with Stuxnet. ",1,accept,T1195.003,Supply Chain Compromise: Compromise Hardware Supply Chain Industrial Control Systems (ICS) are often a target of attack with threat actors aiming to abuse hardware functionality. ,1,accept,T1195.003,Supply Chain Compromise: Compromise Hardware Supply Chain Threat actors will often establish initial access with a system via the abuse of hardware components. ,1,accept,T1195.003,Supply Chain Compromise: Compromise Hardware Supply Chain Gazer can establish persistence through the system screensaver by configuring it to execute the malware.,1,accept,T1546.002,Event Triggered Execution: Screensaver Persistence can be maintained via user inactivity through masking a malicious executable as a screensaver .scr file. ,1,accept,T1546.002,Event Triggered Execution: Screensaver FIN13 will modify screensaver files to execute persistence functionality. ,1,accept,T1546.002,Event Triggered Execution: Screensaver " By hiding code as screensaver files, their privileges can be executed as these files are run within the privileged environment of the C:\Windows\System32\, and C:\Windows\sysWOW64\ folders. ",1,accept,T1546.002,Event Triggered Execution: Screensaver CobaltStrike functionality allows for the creation of disposable processes that can establish persistence via the injection of malicious code into .scr files on Windows machines. ,1,accept,T1546.002,Event Triggered Execution: Screensaver LaZagne can obtain credential information from /etc/shadow using the shadow.py module.,1,accept,T1003.008,OS Credential Dumping: /Etc/Passwd And /Etc/Shadow "MAZE ransomware will enumerate user credentials by dumping user passwords, usually hashed passwords from /passwd directory. ",1,accept,T1003.008,OS Credential Dumping: /Etc/Passwd And /Etc/Shadow Dumping credentials from the /etc/shadow directory is one way that EKANS ransomware steals credentials. ,1,accept,T1003.008,OS Credential Dumping: /Etc/Passwd And /Etc/Shadow " Netwalker deploys various methods for credential stealing, including utilising LaZagne to dump the shadow directory contents. ",1,accept,T1003.008,OS Credential Dumping: /Etc/Passwd And /Etc/Shadow Ransomware such as SODINOKIBI will attempt to dump hashed files from the /etc/passwd directory for offline breaking as they are easier to acquire than the shadow directory. ,1,accept,T1003.008,OS Credential Dumping: /Etc/Passwd And /Etc/Shadow APT28 has used the Office Test persistence mechanism within Microsoft Office by adding the Registry key HKCU\Software\Microsoft\Office test\Special\Perf to execute code.,1,accept,T1137.002,Office Application Startup: Office Test "Cybersecurity professionals should monitor registry activity for Office, to ensure that on startup, it does not execute malicious binaries within the registry. ",1,accept,T1137.002,Office Application Startup: Office Test DIRTPYLE malware will use Office startup to execute malicious binaries utilising the registry key HKCU\Software\Microsoft\Office test\Special\Perf. ,1,accept,T1137.002,Office Application Startup: Office Test Gamaredon group favour the tactic of maintaining persistence through abusing Office startup registry keys. ,1,accept,T1137.002,Office Application Startup: Office Test " The ""Office Test '' Registry key does not come installed with Office by default so detecting it's presence within a system could be a sign of malicious activity. ",1,accept,T1137.002,Office Application Startup: Office Test certutil can be used to install browser root certificates as a precursor to performing man-in-the-middle between connections to banking websites. Example command: certutil -addstore -f -user ROOT ProgramData\cert512121.der. ,1,accept,T1553.004,Subvert Trust Controls: Install Root Certificate Dok installs a root certificate to aid in man-in-the-middle actions. ,1,accept,T1553.004,Subvert Trust Controls: Install Root Certificate Hikit uses certmgr.exe -add GlobalSign.cer -c -s -r localMachine Root and certmgr.exe -add GlobalSign.cer -c -s -r localMachineTrustedPublisher to install a self-generated certificate to the local trust store as a root CA and Trusted Publisher. ,1,accept,T1553.004,Subvert Trust Controls: Install Root Certificate RTM can add a certificate to the Windows store.,1,accept,T1553.004,Subvert Trust Controls: Install Root Certificate "Babuk ransomware often installs a root certificate during its initial download stages to legitimise it's connections, often to C2 servers. ",1,accept,T1553.004,Subvert Trust Controls: Install Root Certificate " Netfilter.sys, a malicious driver for Windows Hardware Quality Labs (WHQL), installs a root certificate to authenticate the C2 server domains that are contained within a simultaneously downloaded code. ",1,accept,T1553.004,Subvert Trust Controls: Install Root Certificate " A common TTP of APT Group DarkSide is to bypass detection on victim machines through installing a root certificate, before installing ransomware of the machine. ",1,accept,T1553.004,Subvert Trust Controls: Install Root Certificate LaZagne can obtain credential information running Linux processes. ,1,accept,T1003.007,OS Credential Dumping: Proc Filesystem MimiPenguin can dump process memory and extract clear-text credentials.,1,accept,T1003.007,OS Credential Dumping: Proc Filesystem APT31 can dump credentials from programs in memory by running proc as root using stolen credentials. ,1,accept,T1003.007,OS Credential Dumping: Proc Filesystem " DarkSide, an APT group, will obtain access to an account using legitimate credentials, then gather information about the /proc directory to enumerate user credentials. ",1,accept,T1003.007,OS Credential Dumping: Proc Filesystem " Care should be taken around how much data proc gathers, as it can steal credentials in memory that cannot be obfuscated there. ",1,accept,T1003.007,OS Credential Dumping: Proc Filesystem APT29 configured at least one instance of Cobalt Strike to use a network pipe over SMB during the 2020 SolarWinds intrusion. ,1,accept,T1090.001,Proxy: Internal Proxy APT39 used custom tools to create SOCK5 and custom protocol proxies between infected hosts. ,1,accept,T1090.001,Proxy: Internal Proxy " The ZJ"" variant of BACKSPACE allows ""ZJ link"" infections with Internet access to relay traffic from ""ZJ listen"" to a command server. ",1,accept,T1090.001,Proxy: Internal Proxy CHOPSTICK used a proxy server between victims and the C2 server. ,1,accept,T1090.001,Proxy: Internal Proxy Cobalt Strike can be configured to have commands relayed over a peer-to-peer network of infected hosts. This can be used to limit the number of egress points or provide access to a host without direct internet access. ,1,accept,T1090.001,Proxy: Internal Proxy Drovorub can use a port forwarding rule on its agent module to relay network traffic through the client module to a remote host on the same network. ,1,accept,T1090.001,Proxy: Internal Proxy Duqu can be configured to have commands relayed over a peer-to-peer network of infected hosts if some of the hosts do not have Internet access. ,1,accept,T1090.001,Proxy: Internal Proxy " FatDuke can used pipes to connect machines with restricted internet access to remote machines via other infected hosts. ;; Higaisa discovered system proxy settings and used them if available. ;; Hikit supports peer connections. ;; InvisiMole can function as a proxy to create a server that relays communication between the client and C&C server or between two clients. ;; Kazuar has used internal nodes on the compromised network for C2 communications. ;; MiniDuke can can use a named pipe to forward communications from one compromised machine with internet access to other compromised machines. ;; Operation Wocao can proxy traffic through multiple infected systems. ;; Pay2Key has designated machines in the compromised network to serve as reverse proxy pivot points to channel communications with C2. ;; Strider has used local servers with both local network and Internet access to act as internal proxy nodes to exfiltrate data from other parts of the network without direct Internet access. ;; UNC2452 configured at least one instance of Cobalt Strike to use a network pipe over SMB during the 2020 SolarWinds intrusion."";;APT group SparklingGoblin often deploy SideWalk, a backdoor which utilises shellcode containing C2 domains which are communicated with through the use of an internal proxy. ;; Pysa, a prolific ransomware group, utilises a Chisel tunneling tool named MagicSocks to obfuscate malicious, outbound traffic. ;; SOCKS proxy tool Earthworm is a commonly distributed proxy tool that hosts a variety of functionality for communication with outside networks. ",1,accept,T1090.001,Proxy: Internal Proxy BADCALL uses a FakeTLS method during C2. ,1,accept,T1001.003,Data Obfuscation: Protocol Impersonation Bankshot generates a false TLS handshake using a public certificate to disguise C2 network communications. ,1,accept,T1001.003,Data Obfuscation: Protocol Impersonation FakeM C2 traffic attempts to evade detection by resembling data generated by legitimate messenger applications such as MSN and Yahoo! messengers. Additionally some variants of FakeM use modified SSL code for communications back to C2 servers making SSL decryption ineffective. ,1,accept,T1001.003,Data Obfuscation: Protocol Impersonation FALLCHILL uses fake Transport Layer Security (TLS) to communicate with its C2 server. ,1,accept,T1001.003,Data Obfuscation: Protocol Impersonation HARDRAIN uses FakeTLS to communicate with its C2 server. ,1,accept,T1001.003,Data Obfuscation: Protocol Impersonation Higaisa used a FakeTLS session for C2 communications. ,1,accept,T1001.003,Data Obfuscation: Protocol Impersonation InvisiMole can mimic HTTP protocol with custom HTTP “verbs” HIDE ZVVP and NOP. ,1,accept,T1001.003,Data Obfuscation: Protocol Impersonation KeyBoy uses custom SSL libraries to impersonate SSL in C2 traffic. ;; Lazarus Group malware also uses a unique form of communication encryption known as FakeTLS that mimics TLS but uses a different encryption method evading SSL man-in-the-middle decryption attacks. ;; Okrum mimics HTTP protocol for C2 communication while hiding the actual messages in the Cookie and Set-Cookie headers of the HTTP requests. ;; SUNBURST masqueraded its network traffic as the Orion Improvement Program (OIP) protocol. ;; TAINTEDSCRIBE has used FakeTLS for session authentication.;;WellMass malware obfuscates it's C2 communications through abusing TLS via a hardcoded certificate. ;; APT40 includes API keys for Dropbox in every command when uploading stolen data in an attempt to mask the activity as legitimate. ;; Winnti (APT41) utilises the Crosswalk backdoor which abuses FakeTLS to obfuscate C2 traffic. ,1,accept,T1001.003,Data Obfuscation: Protocol Impersonation APT29 has used steganography to hide C2 communications in images. ,1,accept,T1001.002,Data Obfuscation: Steganography Some malware that has been used by Axiom also uses steganography to hide communication in PNG image files. ,1,accept,T1001.002,Data Obfuscation: Steganography Daserf can use steganography to hide malicious code downloaded to the victim. ,1,accept,T1001.002,Data Obfuscation: Steganography When the Duqu command and control is operating over HTTP or HTTPS Duqu uploads data to its controller by appending it to a blank JPG file. ,1,accept,T1001.002,Data Obfuscation: Steganography HAMMERTOSS is controlled via commands that are appended to image files. ,1,accept,T1001.002,Data Obfuscation: Steganography LightNeuron is controlled via commands that are embedded into PDFs and JPGs using steganographic methods. ,1,accept,T1001.002,Data Obfuscation: Steganography RDAT can process steganographic images attached to email messages to send and receive C2 commands. RDAT can also embed additional messages within BMP images to communicate with the RDAT operator. ,1,accept,T1001.002,Data Obfuscation: Steganography SUNBURST C2 data attempted to appear as benign XML related to .NET assemblies or as a faux JSON blob. ;; ZeroT has retrieved stage 2 payloads as Bitmap images that use Least Significant Bit (LSB) steganography.,1,accept,T1001.002,Data Obfuscation: Steganography "APT28 added junk data"" to each encoded string preventing trivial decoding without knowledge of the junk removal algorithm. Each implant was given a ""junk length"" value when created tracked by the controller software to allow seamless communication but prevent analysis of the command protocol on the wire. ",1,accept,T1001.001,Data Obfuscation: Junk Data BendyBear has used byte randomization to obscure its behavior. ,1,accept,T1001.001,Data Obfuscation: Junk Data Downdelph inserts pseudo-random characters between each original character during encoding of C2 network requests making it difficult to write signatures on them. ,1,accept,T1001.001,Data Obfuscation: Junk Data GoldMax has used decoy traffic to surround its malicious network traffic to avoid detection. ,1,accept,T1001.001,Data Obfuscation: Junk Data P2P ZeuS added junk data to outgoing UDP packets to peer implants. ,1,accept,T1001.001,Data Obfuscation: Junk Data PLEAD samples were found to be highly obfuscated with junk code. ,1,accept,T1001.001,Data Obfuscation: Junk Data SUNBURST added junk bytes to its C2 over HTTP. ,1,accept,T1001.001,Data Obfuscation: Junk Data " WellMess can use junk data in the Base64 string for additional obfuscation."";;Data obfuscation is acheived for the WellMass malware through adding junk to it's C2 communications, achieved by replacing characters with base64 encoded ones. ;; CISA notes that junk data to obfuscate Command and Control activities is a favourite Technique of APT groups which target America. ;; With the aim to make analysis of their code more difficult and time consuming, the develepers of Cerberus jumble their code to hide it's functionality. ",1,accept,T1001.001,Data Obfuscation: Junk Data Newer variants of BACKSPACE will encode C2 communications with a custom system. ,1,accept,T1132.002,Data Encoding: Non Bankshot encodes commands from the control server using a range of characters and gzip. ,1,accept,T1132.002,Data Encoding: Non InvisiMole can use a modified base32 encoding to encode data within the subdomain of C2 requests. ,1,accept,T1132.002,Data Encoding: Non OceanSalt can encode data with a NOT operation before sending the data to the control server. ,1,accept,T1132.002,Data Encoding: Non RDAT can communicate with the C2 via subdomains that utilize base64 with character substitutions. ,1,accept,T1132.002,Data Encoding: Non ShadowPad has encoded data as readable Latin characters.,1,accept,T1132.002,Data Encoding: Non C2 traffic from ADVSTORESHELL is encrypted then encoded with Base64 encoding. ,1,accept,T1132.001,Data Encoding: Standard Encoding An APT19 HTTP malware variant used Base64 to encode communications to the C2 server. ,1,accept,T1132.001,Data Encoding: Standard Encoding APT33 has used base64 to encode command and control traffic. ,1,accept,T1132.001,Data Encoding: Standard Encoding Astaroth encodes data using Base64 before sending it to the C2 server. ,1,accept,T1132.001,Data Encoding: Standard Encoding AutoIt backdoor has sent a C2 response that was base64-encoded. ,1,accept,T1132.001,Data Encoding: Standard Encoding BabyShark has encoded data using certutil before exfiltration. ,1,accept,T1132.001,Data Encoding: Standard Encoding Some Backdoor.Oldrea samples use standard Base64 + bzip2 and some use standard Base64 + reverse XOR + RSA-2048 to decrypt data received from C2 servers. ,1,accept,T1132.001,Data Encoding: Standard Encoding " BADNEWS encodes C2 traffic with base64. ;; BLINDINGCAN has encoded its C2 traffic with Base64. ;; Several BRONZE BUTLER tools encode data with base64 when posting it to a C2 server. ;; BS2005 uses Base64 encoding for communication in the message body of an HTTP request. ;; Carbanak encodes the message body of HTTP traffic with Base64. ;; ChChes can encode C2 data with a custom technique that utilizes Base64. ;; Cobian RAT obfuscates communications with the C2 server using Base64 encoding. ;; CORESHELL C2 messages are Base64-encoded. ;; Daserf uses custom base64 encoding to obfuscate HTTP traffic. ;; Denis encodes the data sent to the server in Base64. ;; Dipsind encodes C2 traffic with base64. ;; down_new has the ability to base64 encode C2 communications. ;; Ebury has encoded C2 traffic in hexadecimal format. ;; Elise exfiltrates data using cookie values that are Base64-encoded. ;; Some Felismus samples use a custom method for C2 traffic that utilizes Base64. ;; Fysbis can use Base64 to encode its C2 traffic. ;; gh0st RAT has used Zlib to compress C2 communications data before encrypting it. ;; HAFNIUM has used ASCII encoding for C2 traffic. ;; For C2 over HTTP Helminth encodes data with base64 and sends it via the Cookie"" field of HTTP requests. For C2 over DNS Helminth converts ASCII characters into their hexadecimal values and sends the data in cleartext. ;; HOPLIGHT has utilized Zlib compression to obfuscate the communications payload. ;; Ixeshe uses custom Base64 encoding schemes to obfuscate command and control traffic in the message body of HTTP requests. ;; A JHUHUGIT variant encodes C2 POST data base64. ;; Kazuar encodes communications to the C2 server in Base64. ;; Kessel has exfiltrated data via hexadecimal-encoded subdomain fields of DNS queries. ;; KONNI has used a custom base64 key to encode stolen data before exfiltration. ;; A Lazarus Group malware sample encodes data with base64. ;; Machete has used base64 encoding. ;; MechaFlounder has the ability to use base16 encoded strings in C2. ;; Mis-Type uses Base64 encoding for C2 traffic. ;; Misdat network traffic is Base64-encoded plaintext. ;; More_eggs has used basE91 encoding along with encryption for C2 communication. ;; MuddyWater has used tools to encode C2 communications including Base64 encoding. ;; njRAT uses Base64 encoding for C2 traffic. ;; Octopus encodes C2 communications in Base64. ;; Okrum has used base64 to encode C2 communication. ;; OopsIE encodes data in hexadecimal format over the C2 channel. ;; Patchwork used Base64 to encode C2 traffic. ;; Responses from the Pisloader C2 server are base32-encoded. ;; PowerShower has the ability to encode C2 communications with base64 encoding. ;; POWERSTATS encoded C2 traffic with base64. ;; POWRUNER can use base64 encoded C2 communications. ;; Prikormka encodes C2 traffic with Base64. ;; QUADAGENT encodes C2 communications with base64. ;; Ramsay has used base64 to encode its C2 traffic. ;; RDAT can communicate with the C2 via base32-encoded subdomains. ;; Revenge RAT uses Base64 to encode information sent to the C2 server. ;; RogueRobin base64 encodes strings that are sent to the C2 over its DNS tunnel. ;; S-Type uses Base64 encoding for C2 traffic. ;; Sandworm Team's BCS-server tool uses base64 encoding and HTML tags for the communication traffic between the C2 server. ;; SeaDuke C2 traffic is base64-encoded. ;; Spark has encoded communications with the C2 server with base64. ;; SpeakUp encodes C&C communication using Base64. ;; SUNBURST used Base64 encoding in its C2 traffic. ;; TA551 has used encoded ASCII text for initial C2 communications. ;; TrickBot can Base64-encode C2 commands. ;; Tropic Trooper has used base64 encoding to hide command strings delivered from the C2. ;; Valak has returned C2 data as encoded ASCII. ;; WellMess has used Base64 encoding to uniquely identify communication to and from the C2. ;; Zebrocy has used URL/Percent Encoding on data exfiltrated via HTTP POST requests.""",1,accept,T1132.001,Data Encoding: Standard Encoding AdFind can enumerate domain groups. ,1,accept,T1069.002,Permission Groups Discovery: Domain Groups BloodHound can collect information about domain groups and members. ,1,accept,T1069.002,Permission Groups Discovery: Domain Groups CrackMapExec can gather the user accounts within domain groups. ,1,accept,T1069.002,Permission Groups Discovery: Domain Groups Dragonfly 2.0 used batch scripts to enumerate administrators and users in the domain. ,1,accept,T1069.002,Permission Groups Discovery: Domain Groups dsquery can be used to gather information on permission groups within a domain. ,1,accept,T1069.002,Permission Groups Discovery: Domain Groups Egregor can conduct Active Directory reconnaissance using tools such as Sharphound or AdFind. ,1,accept,T1069.002,Permission Groups Discovery: Domain Groups GRIFFON has used a reconnaissance module that can be used to retrieve Windows domain membership information. ,1,accept,T1069.002,Permission Groups Discovery: Domain Groups " Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commands net group Exchange Trusted Subsystem /domain and net group domain admins /domain. ;; Inception has used specific malware modules to gather domain membership. ;; Ke3chang performs discovery of permission groups net group /domain. ;; Kwampirs collects a list of domain groups with the command net localgroup /domain. ;; Commands such as net group /domain can be used in Net to gather information about and manipulate groups. ;; OilRig has used net group /domain net group “domain admins” /domain and net group “Exchange Trusted Subsystem” /domain to find domain group permission settings. ;; OSInfo specifically looks for Domain Admins and power users within the domain. ;; POWRUNER may collect domain group information by running net group /domain or a series of other commands on a victim. ;; REvil can identify the domain membership of a compromised host. ;; SoreFang can enumerate domain groups by executing net.exe group /domain. ;; Turla has used net group Domain Admins"" /domain to identify domain administrators. ;; WellMess can identify domain group membership for the current user.""",1,accept,T1069.002,Permission Groups Discovery: Domain Groups admin@338 has attempted to get victims to launch malicious Microsoft Word attachments delivered via spearphishing emails. ,1,accept,T1204.002,User Execution: Malicious File Agent Tesla has been executed through malicious e-mail attachments ,1,accept,T1204.002,User Execution: Malicious File Ajax Security Team has lured victims into executing malicious files. ,1,accept,T1204.002,User Execution: Malicious File AppleJeus has required user execution of a malicious MSI installer. ,1,accept,T1204.002,User Execution: Malicious File APT-C-36 has prompted victims to accept macros in order to execute the subsequent payload. ,1,accept,T1204.002,User Execution: Malicious File APT12 has attempted to get victims to open malicious Microsoft Word and PDF attachment sent via spearphishing. ,1,accept,T1204.002,User Execution: Malicious File APT19 attempted to get users to launch malicious attachments delivered via spearphishing emails. ,1,accept,T1204.002,User Execution: Malicious File " APT28 attempted to get users to click on Microsoft Office attachments containing malicious macro scripts. ;; APT29 has used various forms of spearphishing attempting to get a user to open attachments including but not limited to malicious Microsoft Word documents .pdf and .lnk files. ;; APT30 has relied on users to execute malicious file attachments delivered via spearphishing emails. ;; APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment. ;; APT33 has used malicious e-mail attachments to lure victims into executing malware. ;; APT37 has sent spearphishing attachments attempting to get a user to open them. ;; APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious attachment. ;; Astaroth has used malicious files including VBS LNK and HTML for execution. ;; BlackTech has used e-mails with malicious documents to lure victims into installing malware. ;; BLINDINGCAN has lured victims into executing malicious macros embedded within Microsoft Office documents. ;; BRONZE BUTLER has attempted to get users to launch malicious Microsoft Word attachments delivered via spearphishing emails. ;; Bundlore has attempted to get users to execute a malicious .app file that looks like a Flash Player update. ;; Cardinal RAT lures victims into executing malicious macros embedded within Microsoft Excel documents. ;; CARROTBALL has been executed through users being lured into opening malicious e-mail attachments. ;; Cobalt Group has sent emails containing malicious attachments that require users to execute a file or macro to infect the victim machine. ;; CSPY Downloader has been delivered via malicious documents with embedded macros. ;; Dark Caracal makes their malware look like Flash Player Office or PDF documents in order to entice a user to click on it. ;; Darkhotel has sent spearphishing emails in an attempt to lure users into clicking on a malicious attachments. ;; DarkHydrus has sent malware that required users to hit the enable button in Microsoft Excel to allow an .iqy file to be downloaded. ;; Dragonfly 2.0 has used various forms of spearphishing in attempts to get users to open attachments. ;; Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open attachments. ;; Emotet has relied upon users clicking on a malicious attachment delivered through spearphishing. ;; FIN4 has lured victims to launch malicious attachments delivered via spearphishing emails (often sent from compromised accounts). ;; FIN6 has used malicious documents to lure victims into allowing execution of PowerShell scripts. ;; FIN7 lured victims to double-click on images in the attachments they sent which would then execute the hidden LNK file. ;; FIN8 has leveraged Spearphishing Attachments attempting to gain User Execution. ;; Frankenstein has used trojanized Microsoft Word documents sent via email which prompted the victim to enable macros. ;; Gallmaker sent victims a lure document with a warning that asked victims to “enable content” for execution. ;; Gamaredon Group has attempted to get users to click on Office attachments with malicious macros embedded. ;; Gorgon Group attempted to get users to launch malicious Microsoft Office attachments delivered via spearphishing emails. ;; Grandoreiro has infected victims via malicious attachments. ;; The GuLoader executable has been retrieved via embedded macros in malicious Word documents. ;; Hancitor has used malicious Microsoft Word documents sent via email which prompted the victim to enable macros. ;; Higaisa used malicious e-mail attachments to lure victims into executing LNK files. ;; IcedID has been executed through Word documents with malicious embedded macros. ;; Inception lured victims into clicking malicious files for machine reconnaissance and to execute malware. ;; InvisiMole can deliver trojanized versions of software and documents relying on user execution. ;; Javali has achieved execution through victims opening malicious attachments including MSI files with embedded VBScript. ;; JCry has achieved execution by luring users to click on a file that appeared to be an Adobe Flash Player update installer. ;; Kerrdown has gained execution through victims opening malicious files. ;; KGH_SPY has been spread through Word documents containing malicious macros. ;; Kimsuky has used attempted to lure victims into opening malicious e-mail attachments. ;; Lazarus Group has attempted to get users to launch a malicious Microsoft Word attachment delivered via a spearphishing email. ;; Leviathan has sent spearphishing attachments attempting to get a user to click. ;; Lokibot has been executed through malicious documents contained in spearphishing e-mails. ;; Machete has has relied on users opening malicious attachments delivered through spearphishing to execute malware. ;; menuPass has attempted to get victims to open malicious files such as Windows Shortcuts (.lnk) and/or Microsoft Office documents sent via email as part of spearphishing campaigns. ;; Metamorfo requires the user to double-click the executable to run the malicious HTA file. ;; Mofang's malicious spearphishing attachments required a user to open the file after receiving. ;; Molerats has sent malicious files via email that tricked users into clicking Enable Content to run an embedded macro and to download malicious archives. ;; MuddyWater has attempted to get users to enable macros and launch malicious Microsoft Word documents delivered via spearphishing emails. ;; Mustang Panda has sent malicious files requiring direct victim interaction to execute. ;; Naikon has convinced victims to open malicious attachments to execute malware. ;; NETWIRE has been executed through luring victims into opening malicious documents. ;; OilRig has delivered macro-enabled documents that required targets to click the enable content"" button to execute the payload on the system. ;; OSX/Shlayer relies on users mounting and executing a malicious DMG file. ;; Patchwork embedded a malicious macro in a Word document and lured the victim to click on an icon to execute the malware. ;; PLATINUM has attempted to get users to open malicious files by sending spearphishing emails with attachments to victims. ;; PLEAD has been executed via malicious e-mail attachments. ;; PoetRAT has used spearphishing attachments to infect victims. ;; Pony has attempted to lure targets into downloading an attached executable (ZIP RAR or CAB archives) or document (PDF or other MS Office format). ;; PROMETHIUM has attempted to get users to execute compromised installation files for legitimate software including compression applications security software browsers file recovery applications and other tools and utilities. ;; Ramsay has been executed through malicious e-mail attachments. ;; Rancor attempted to get users to click on an embedded macro within a Microsoft Office Excel document to launch their malware. ;; REvil has been executed via malicious MS Word e-mail attachments. ;; Rifdoor has been executed from malicious Excel or Word documents containing macros. ;; RTM has attempted to lure victims into opening e-mail attachments to execute malicious code. ;; RTM has relied on users opening malicious email attachments decompressing the attached archive and double-clicking the executable within. ;; Sandworm Team has tricked unwitting recipients into clicking on spearphishing attachments and enabling malicious macros embedded within files. ;; Sharpshooter has sent malicious DOC and PDF files to targets so that they can be opened by a user. ;; Sidewinder has lured targets to click on malicious files to gain execution in the target environment. ;; Silence attempts to get users to launch malicious attachments delivered via spearphishing emails. ;; SQLRat relies on users clicking on an embedded image to execute the scripts. ;; StrongPity has been executed via compromised installation files for legitimate software including compression applications security software browsers file recovery applications and other tools and utilities. ;; SYSCON has been executed by luring victims to open malicious e-mail attachments. ;; TA459 has attempted to get victims to open malicious Microsoft Word attachment sent via spearphishing. ;; TA505 has used lures to get users to enable content in malicious attachments and execute malicious files contained in archives. For example TA505 makes their malware look like legitimate Microsoft Word documents .pdf and/or .lnk files. ;; TA551 has prompted users to enable macros within spearphishing attachments to install malware. ;; The White Company has used phishing lure documents that trick users into opening them and infecting their computers. ;; TrickBot has attempted to get users to launch malicious documents to deliver its payload. ;; Tropic Trooper has lured victims into executing malware via malicious e-mail attachments. ;; A Word document delivering TYPEFRAME prompts the user to enable macro execution. ;; Valak has been executed via Microsoft Word documents containing malicious macros. ;; Whitefly has used malicious .exe or .dll files disguised as documents or images. ;; Windshift has used e-mail attachments to lure victims into executing malicious code. ;; Wizard Spider has lured victims to execute malware with spearphishing attachments containing macros to download either Emotet Bokbot or TrickBot.""",1,accept,T1204.002,User Execution: Malicious File AppleJeus's spearphishing links required user interaction to navigate to the malicious website. ,1,accept,T1204.001,User Execution: Malicious Link APT28 has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders. ,1,accept,T1204.001,User Execution: Malicious Link APT29 has used various forms of spearphishing attempting to get a user to click on a malicous link. ,1,accept,T1204.001,User Execution: Malicious Link APT32 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails. ,1,accept,T1204.001,User Execution: Malicious Link APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails. ,1,accept,T1204.001,User Execution: Malicious Link APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious link. ,1,accept,T1204.001,User Execution: Malicious Link BackConfig has compromised victims via links to URLs hosting malicious content. ,1,accept,T1204.001,User Execution: Malicious Link Bazar can gain execution via malicious links to decoy landing pages hosted on Google Docs. ;; BlackTech has used e-mails with malicious links to lure victims into installing malware. ;; Cobalt Group has sent emails containing malicious links that require users to execute a file or macro to infect the victim machine. ;; Dragonfly 2.0 has used various forms of spearphishing in attempts to get users to open links. ;; Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open links. ;; Emotet has relied upon users clicking on a malicious link delivered through spearphishing. ;; Evilnum has sent spearphishing emails designed to trick the recipient into opening malicious shortcut links which downloads a .LNK file. ;; FIN4 has lured victims to click malicious links delivered via spearphishing emails (often sent from compromised accounts). ;; FIN8 has leveraged Spearphishing Links attempting to gain User Execution. ;; Grandoreiro has used malicious links to gain execution on victim machines. ;; GuLoader has relied upon users clicking on links to malicious documents. ;; Hancitor has relied upon users clicking on a malicious link delivered through phishing. ;; Javali has achieved execution through victims clicking links to malicious websites. ;; Kerrdown has gained execution through victims opening malicious links. ;; Leviathan has sent spearphishing email links attempting to get a user to click. ;; Machete has has relied on users opening malicious links delivered through spearphishing to execute malware. ;; Melcoz has gained execution through victims opening malicious links. ;; Mofang's spearphishing emails required a user to click the link to connect to a compromised website. ;; Molerats has sent malicious links via email trick users into opening a RAR archive and running an executable. ;; MuddyWater has distributed URLs in phishing e-mails that link to lure documents. ;; Mustang Panda has sent malicious links directing victims to a Google Drive folder. ;; NETWIRE has been executed through convincing victims into clicking malicious links. ;; Night Dragon enticed users to click on links in spearphishing emails to download malware. ;; OilRig has delivered malicious links to achieve execution on the target system. ;; Patchwork has used spearphishing with links to try to get users to click download and open malicious files. ;; PLEAD has been executed via malicious links in e-mails. ;; Pony has attempted to lure targets into clicking links in spoofed emails from legitimate banks. ;; Sandworm Team has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders. ;; Sidewinder has lured targets to click on malicious links to gain execution in the target environment. ;; TA505 has used lures to get users to click links in emails and attachments. For example TA505 makes their malware look like legitimate Microsoft Word documents .pdf and/or .lnk files. ;; TSCookie has been executed via malicious links embedded in e-mails spoofing the Ministries of Education Culture Sports Science and Technology of Japan. ;; Turla has used spearphishing via a link to get users to download and run their malware. ;; Windshift has used links embedded in e-mails to lure victims into executing malicious code. ;; Wizard Spider has lured victims into clicking a malicious link delivered through spearphishing. ;; ZIRCONIUM has used malicious links in e-mails to lure victims into downloading malware.,1,accept,T1204.001,User Execution: Malicious Link APT29 gained initial network access to some victims via a trojanized update of SolarWinds Orion software. ,1,accept,T1195.002,Supply Chain Compromise: Compromise Software Supply Chain APT41 gained access to production environments where they could inject malicious code into legitimate signed files and widely distribute them to end users. ,1,accept,T1195.002,Supply Chain Compromise: Compromise Software Supply Chain CCBkdr was added to a legitimate signed version 5.33 of the CCleaner software and distributed on CCleaner's distribution site. ,1,accept,T1195.002,Supply Chain Compromise: Compromise Software Supply Chain Cobalt Group has compromised legitimate web browser updates to deliver a backdoor. ,1,accept,T1195.002,Supply Chain Compromise: Compromise Software Supply Chain Dragonfly has placed trojanized installers on legitimate vendor app stores. ,1,accept,T1195.002,Supply Chain Compromise: Compromise Software Supply Chain GOLD SOUTHFIELD has distributed ransomware by backdooring software installers via a strategic web compromise of the site hosting Italian WinRAR. ,1,accept,T1195.002,Supply Chain Compromise: Compromise Software Supply Chain GoldenSpy has been packaged with a legitimate tax preparation software. ,1,accept,T1195.002,Supply Chain Compromise: Compromise Software Supply Chain Sandworm Team has distributed NotPetya by compromising the legitimate Ukrainian accounting software M.E.Doc and replacing a legitimate software update with a malicious one. ;; SUNSPOT malware was designed and used to insert SUNBURST into software builds of the SolarWinds Orion IT management product. ;; UNC2452 gained initial network access via a trojanized update of SolarWinds Orion software.,1,accept,T1195.002,Supply Chain Compromise: Compromise Software Supply Chain ,1,accept,T1195.001,Supply Chain Compromise: Compromise Software Dependencies And Development Tools APT10 (HOGFISH) will commonly comprise the software dependency of a company with the aim of gaining access to said company's infrastructure and their customers. ,1,accept,T1195.001,Supply Chain Compromise: Compromise Software Dependencies And Development Tools " Supply chain compromise was common with COVID-19 domains, as over 5000 domains were registered within a few months, with many aiming to deliver malware. ",1,accept,T1195.001,Supply Chain Compromise: Compromise Software Dependencies And Development Tools " Rowhammer attacks compromise RAM, leading to the potential compromise of systems that use RAM from manufacturers that are vulnerable to such attacks. ",1,accept,T1195.001,Supply Chain Compromise: Compromise Software Dependencies And Development Tools A Javascript skimmer named Pipka can skim the credentials of customers of over 27 e-commerce sites. ,1,accept,T1195.001,Supply Chain Compromise: Compromise Software Dependencies And Development Tools APT41 will use supply chain compromise attacks for initial access. ,1,accept,T1195.001,Supply Chain Compromise: Compromise Software Dependencies And Development Tools APT38 has used DYEPACK to manipulate SWIFT messages en route to a printer. ,1,accept,T1565.002,Data Manipulation: Transmitted Data Manipulation LightNeuron is capable of modifying email content headers and attachments during transit. ,1,accept,T1565.002,Data Manipulation: Transmitted Data Manipulation Melcoz can monitor the clipboard for cryptocurrency addresses and change the intended address to one controlled by the adversary. ,1,accept,T1565.002,Data Manipulation: Transmitted Data Manipulation Metamorfo has a function that can watch the contents of the system clipboard for valid bitcoin addresses which it then overwrites with the attacker's address.,1,accept,T1565.002,Data Manipulation: Transmitted Data Manipulation Ransomware such as Babuk will modify the data within transmissions between their C2 servers and the compromised host to hide their malicious activity. ,1,accept,T1565.002,Data Manipulation: Transmitted Data Manipulation APT38 has used DYEPACK to create delete and alter records in databases used for SWIFT transactions. ,1,accept,T1565.001,Data Manipulation: Stored Data Manipulation " FIN4 has created rules in victims' Microsoft Outlook accounts to automatically delete emails containing words such as “hacked ""phish "" and “malware"" in a likely attempt to prevent organizations from communicating about their activities. ",1,accept,T1565.001,Data Manipulation: Stored Data Manipulation " SUNSPOT created a copy of the SolarWinds Orion software source file with a .bk extension to backup the original content wrote SUNBURST using the same filename but with a .tmp extension and then moved SUNBURST using MoveFileEx to the original filename with a .cs extension so it could be compiled within Orion software.""",1,accept,T1565.001,Data Manipulation: Stored Data Manipulation XMRLocker will delete log files to obfuscate malicious activity. ,1,accept,T1565.001,Data Manipulation: Stored Data Manipulation REvil will compromise end users and modify data stored on machines to hide their presence before delivery of an encryption payload. ,1,accept,T1565.001,Data Manipulation: Stored Data Manipulation The APT1 group is known to have used RDP during operations. ,1,accept,T1021.001,Remote Services: Remote Desktop Protocol APT3 enables the Remote Desktop Protocol for persistence. APT3 has also interacted with compromised systems to browse and copy files through RDP sessions. ,1,accept,T1021.001,Remote Services: Remote Desktop Protocol APT39 has been seen using RDP for lateral movement and persistence in some cases employing the rdpwinst tool for mangement of multiple sessions. ,1,accept,T1021.001,Remote Services: Remote Desktop Protocol APT41 used RDP for lateral movement. ,1,accept,T1021.001,Remote Services: Remote Desktop Protocol The Axiom group is known to have used RDP during operations. ,1,accept,T1021.001,Remote Services: Remote Desktop Protocol Blue Mockingbird has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts. ,1,accept,T1021.001,Remote Services: Remote Desktop Protocol Carbanak enables concurrent Remote Desktop Protocol (RDP) sessions. ,1,accept,T1021.001,Remote Services: Remote Desktop Protocol Chimera has used RDP to access targeted systems. ;; Cobalt Group has used Remote Desktop Protocol to conduct lateral movement. ;; Cobalt Strike can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel. ;; DarkComet can open an active screen of the victim’s machine and take control of the mouse and keyboard. ;; Dragonfly 2.0 moved laterally via RDP. ;; FIN10 has used RDP to move laterally to systems in the victim environment. ;; FIN6 used RDP to move laterally in victim networks. ;; FIN8 has used RDP for Lateral Movement. ;; Fox Kitten has used RDP to log in and move laterally in the target environment. ;; Imminent Monitor has a module for performing remote desktop access. ;; jRAT can support RDP control. ;; Koadic can enable remote desktop on the victim's machine. ;; Lazarus Group malware SierraCharlie uses RDP for propagation. ;; Leviathan has targeted RDP credentials and used it to move through the victim environment. ;; menuPass has used RDP connections to move across the victim network. ;; njRAT has a module for performing remote desktop access. ;; OilRig has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment. ;; Patchwork attempted to use RDP to move laterally. ;; Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client. ;; Pysa has laterally moved using RDP connections. ;; QuasarRAT has a module for performing remote desktop access. ;; Revenge RAT has a plugin to perform RDP access. ;; SDBbot has the ability to use RDP to connect to victim's machines. ;; ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel. ;; Silence has used RDP for lateral movement. ;; Stolen Pencil utilized RDP for direct remote point-and-click access. ;; TEMP.Veles utilized RDP throughout an operation. ;; Wizard Spider has used RDP for lateral movement. ;; zwShell has used RDP for lateral movement. ;; ZxShell has remote desktop functionality.,1,accept,T1021.001,Remote Services: Remote Desktop Protocol Cobalt Strike can make tokens from known credentials.,1,accept,T1134.003,Access Token Manipulation: Make And Impersonate Token RC2CL backdoor can modify access tokens to escalate privilege to the privileges of a process to the ones associated with the new token. ,1,accept,T1134.003,Access Token Manipulation: Make And Impersonate Token " Through creating a new login session and setting the token to another thread, LazyCat can escalate privileges. ",1,accept,T1134.003,Access Token Manipulation: Make And Impersonate Token " The SetThreadToken command ifsoften used by malware to impersonate legitimate threads or processes, ",1,accept,T1134.003,Access Token Manipulation: Make And Impersonate Token The creation of duplicate tokens allows for adversaries to escalate their privileges. ,1,accept,T1134.003,Access Token Manipulation: Make And Impersonate Token Keydnap uses the keychaindump project to read securityd memory.,1,accept,T1555.002,Credentials from Password Stores: Securityd Memory Malware such as Mimikatz can elevate themselves to root privileges and then read Securityd's memory to harvest plaintext passwords. ,1,accept,T1555.002,Credentials from Password Stores: Securityd Memory " APT15, a chinese based threat actor, acquire password through reading Securityd's memory. ",1,accept,T1555.002,Credentials from Password Stores: Securityd Memory " REvil utilizes many methods of credential harvesting, including reading plaintext passwords from a root account. ",1,accept,T1555.002,Credentials from Password Stores: Securityd Memory Qakbot can read passwords from Securityd's memory. ,1,accept,T1555.002,Credentials from Password Stores: Securityd Memory Calisto collects Keychain storage data and copies those passwords/tokens to a file. ,1,accept,T1555.001,Credentials from Password Stores: Keychain iKitten collects the keychains on the system. ,1,accept,T1555.001,Credentials from Password Stores: Keychain LaZagne can obtain credentials from macOS Keychains. ,1,accept,T1555.001,Credentials from Password Stores: Keychain Proton gathers credentials in files for keychains.,1,accept,T1555.001,Credentials from Password Stores: Keychain Matiex keylogger can harvest passwords from keychains. ,1,accept,T1555.001,Credentials from Password Stores: Keychain APT37 has signed its malware with an invalid digital certificates listed as “Tencent Technology (Shenzhen) Company Limited.” ,1,accept,T1036.001,Masquerading: Invalid Code Signature BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate. ,1,accept,T1036.001,Masquerading: Invalid Code Signature The NETWIRE client has been signed by fake and invalid digital certificates. ,1,accept,T1036.001,Masquerading: Invalid Code Signature Regin stage 1 modules for 64-bit systems have been found to be signed with fake certificates masquerading as originating from Microsoft Corporation and Broadcom Corporation. ,1,accept,T1036.001,Masquerading: Invalid Code Signature Windshift has used revoked certificates to sign malware. ,1,accept,T1036.001,Masquerading: Invalid Code Signature WindTail has been incompletely signed with revoked certificates.,1,accept,T1036.001,Masquerading: Invalid Code Signature Anchor has been signed with valid certificates to evade detection by security tools. ,1,accept,T1553.002,Subvert Trust Controls: Code Signing AppleJeus has used a valid digital signature from Sectigo to appear legitimate. ,1,accept,T1553.002,Subvert Trust Controls: Code Signing APT29 was able to get SUNBURST signed by SolarWinds code signing certificates by injecting the malware into the SolarWinds Orion software lifecycle. ,1,accept,T1553.002,Subvert Trust Controls: Code Signing APT41 leveraged code-signing certificates to sign malware when targeting both gaming and non-gaming organizations. ,1,accept,T1553.002,Subvert Trust Controls: Code Signing BackConfig has been signed with self signed digital certificates mimicking a legitimate software company. ,1,accept,T1553.002,Subvert Trust Controls: Code Signing Bazar has been signed with fake certificates including those appearing to be from VB CORPORATE PTY. LTD. ,1,accept,T1553.002,Subvert Trust Controls: Code Signing BLINDINGCAN has been signed with code-signing certificates such as CodeRipper. ,1,accept,T1553.002,Subvert Trust Controls: Code Signing " BOOSTWRITE has been signed by a valid CA. ;; ChChes samples were digitally signed with a certificate originally used by Hacking Team that was later leaked and subsequently revoked. ;; Cobalt Strike can use self signed Java applets to execute signed applet attacks. ;; CopyKittens digitally signed an executable with a stolen certificate from legitimate company AI Squared. ;; CSPY Downloader has come signed with revoked certificates. ;; Darkhotel has used code-signing certificates on its malware that are either forged due to weak keys or stolen. Darkhotel has also stolen certificates and signed backdoors and downloaders with them. ;; Some Daserf samples were signed with a stolen digital certificate. ;; Ebury has installed a self-signed RPM package mimicking the original system package on RPM based systems. ;; Turla has used valid digital certificates from Sysprint AG to sign its Epic dropper. ;; FIN6 has used Comodo code-signing certificates. ;; FIN7 has signed Carbanak payloads with legally purchased code signing certificates. FIN7 has also digitally signed their phishing documents backdoors and other staging tools to bypass security controls. ;; GALLIUM has used stolen certificates to sign its tools including those from Whizzimo LLC. ;; Gazer versions are signed with various valid certificates; one was likely faked and issued by Comodo for Solid Loop Ltd "" and another was issued for ""Ultimate Computer Support Ltd."" ;; GreyEnergy digitally signs the malware with a code-signing certificate. ;; Helminth samples have been signed with legitimate compromised code signing certificates owned by software company AI Squared. ;; Honeybee uses a dropper called MaoCheng that harvests a stolen digital signature from Adobe Systems. ;; Janicab used a valid AppleDeveloperID to sign the code to get past security restrictions. ;; Kimsuky has signed files with the name EGIS CO . Ltd.. ;; Leviathan has used stolen code signing certificates to sign malware. ;; LockerGoga has been signed with stolen certificates in order to make it look more legitimate. ;; Metamorfo has digitally signed executables using AVAST Software certificates. ;; Molerats has used forged Microsoft code-signing certificates on malware. ;; More_eggs has used a signed binary shellcode loader and a signed Dynamic Link Library (DLL) to create a reverse shell. ;; Nerex drops a signed Microsoft DLL to disk. ;; Patchwork has signed malware with self-signed certificates from fictitious and spoofed legitimate software companies. ;; PipeMon its installer and tools are signed with stolen code-signing certificates. ;; PROMETHIUM has signed code with self-signed certificates. ;; A QuasarRAT .dll file is digitally signed by a certificate from AirVPN. ;; RTM samples have been signed with a code-signing certificates. ;; Silence has used a valid certificate to sign their primary loader Silence.Downloader (aka TrueBot). ;; StrongPity has been signed with self-signed certificates. ;; Suckfly has used stolen certificates to sign its malware. ;; SUNBURST was digitally signed by SolarWinds from March - May 2020. ;; TA505 has signed payloads with code signing certificates from Thawte and Sectigo. ;; TrickBot has come with a signed downloader component. ;; UNC2452 was able to get SUNBURST signed by SolarWinds code signing certificates by injecting the malware into the SolarWinds Orion software lifecycle. ;; Winnti Group used stolen certificates to sign its malware. ;; Wizard Spider has used Digicert code-signing certificates for some of its malware.""",1,accept,T1553.002,Subvert Trust Controls: Code Signing Agent Tesla has the ability to extract credentials from the Registry. ,1,accept,T1552.002,Unsecured Credentials: Credentials In Registry APT32 used Outlook Credential Dumper to harvest credentials stored in Windows registry. ,1,accept,T1552.002,Unsecured Credentials: Credentials In Registry PowerSploit has several modules that search the Windows Registry for stored credentials: Get-UnattendedInstallFile Get-Webconfig Get-ApplicationHost Get-SiteListPassword Get-CachedGPPPassword and Get-RegistryAutoLogon. ,1,accept,T1552.002,Unsecured Credentials: Credentials In Registry Reg may be used to find credentials in the Windows Registry. ,1,accept,T1552.002,Unsecured Credentials: Credentials In Registry TrickBot has retrieved PuTTY credentials by querying the Software\SimonTatham\Putty\Sessions registry key ,1,accept,T1552.002,Unsecured Credentials: Credentials In Registry Valak can use the clientgrabber module to steal e-mail credentials from the Registry.,1,accept,T1552.002,Unsecured Credentials: Credentials In Registry Kinsing has searched bash_history for credentials.,1,accept,T1552.003,Unsecured Credentials: Bash History Tropic Trooper favors the tactic of harvesting credentials from a bash_history file. ,1,accept,T1552.003,Unsecured Credentials: Bash History The ransomware Diavol contains functionality that allows it to search user's historical bash commands for usernames and passwords that were used as parameters. ,1,accept,T1552.003,Unsecured Credentials: Bash History FIN13 can enumerate their user credentials via searching the bash_history file of users for insecurely stored passwords. ,1,accept,T1552.003,Unsecured Credentials: Bash History The ~/.bash_history directory can contain credentials for APT groups to harvest if they are stored insecurely. ,1,accept,T1552.003,Unsecured Credentials: Bash History Anchor has come with a packed payload. ,1,accept,T1027.002,Obfuscated Files or Information: Software Packing APT29 used UPX to pack files. ,1,accept,T1027.002,Obfuscated Files or Information: Software Packing APT3 has been known to pack their tools. ,1,accept,T1027.002,Obfuscated Files or Information: Software Packing APT38 has used several code packing methods such as Themida Enigma VMProtect and Obsidium to pack their implants. ,1,accept,T1027.002,Obfuscated Files or Information: Software Packing APT39 has packed tools with UPX and has repacked a modified version of Mimikatz to thwart anti-virus detection. ,1,accept,T1027.002,Obfuscated Files or Information: Software Packing Astaroth uses a software packer called Pe123\RPolyCryptor. ,1,accept,T1027.002,Obfuscated Files or Information: Software Packing Bazar has a variant with a packed payload. ,1,accept,T1027.002,Obfuscated Files or Information: Software Packing BLINDINGCAN has been packed with the UPX packer. ;; China Chopper's client component is packed with UPX. ;; CSPY Downloader has been packed with UPX. ;; Dark Caracal has used UPX to pack Bandook. ;; DarkComet has the option to compress its payload using UPX or MPRESS. ;; A version of Daserf uses the MPRESS packer. ;; Dyre has been delivered with encrypted resources and must be unpacked for execution. ;; Egregor's payloads are custom-packed archived and encrypted to prevent analysis. ;; Elderwood has packed malware payloads before delivery to victims. ;; Emotet has used custom packers to protect its payloads. ;; FatDuke has been regularly repacked by its operators to create large binaries and evade detection. ;; A FinFisher variant uses a custom packer. ;; GALLIUM packed some payloads using different types of packers both known and custom. ;; GoldMax has been packed for obfuscation. ;; GreyEnergy is packed for obfuscation. ;; H1N1 uses a custom packing algorithm. ;; Hildegard has packed ELF files into other binaries. ;; HotCroissant has used the open source UPX executable packer. ;; IcedID has packed and encrypted its loader module. ;; jRAT payloads have been packed. ;; Lazarus Group has used Themida to pack at least two separate backdoor implants. ;; Lokibot has used several packing methods for obfuscation. ;; Lucifer has used UPX packed binaries. ;; Machete has been packed with NSIS. ;; Melcoz has been packed with VMProtect and Themida. ;; Metamorfo has used VMProtect to pack and protect files. ;; NETWIRE has used .NET packer tools to evade detection. ;; Night Dragon is known to use software packing in its tools. ;; OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2. ;; OSX_OCEANLOTUS.D has a variant that is packed with UPX. ;; A Patchwork payload was packed with UPX. ;; Raindrop used a custom packer for its Cobalt Strike payload which was compressed using the LZMA algorithm. ;; Rocke's miner has created UPX-packed files in the Windows Start Menu Folder. ;; SDBbot has used a packed installer file. ;; SeaDuke has been packed with the UPX packer. ;; ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack. ;; Spark has been packed with Enigma Protector to obfuscate its contents. ;; TA505 has used UPX to obscure malicious code. ;; The White Company has obfuscated their payloads through packing. ;; TrickBot leverages a custom packer to obfuscate its functionality. ;; Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer. ;; Uroburos uses a custom packer. ;; Valak has used packed DLL payloads. ;; VERMIN is initially packed. ;; yty packs a plugin with UPX. ;; Zebrocy's Delphi variant was packed with UPX. ;; Some ZeroT DLL files have been packed with UPX. ;; ZIRCONIUM has used multi-stage packers for exploit code.,1,accept,T1027.002,Obfuscated Files or Information: Software Packing The hostwriter campaign utilised malware that edited plist files so that data could be exfiltrated on startup. ,1,accept,T1547.007,Boot or Logon Autostart Execution: Re " APT29 CozyBear modify startup files so that upon booting a machine, malicious activity is executed. ",1,accept,T1547.007,Boot or Logon Autostart Execution: Re Ryuk ransomeware has the ability to launch it's encryption program upon booting up the infected machine. ,1,accept,T1547.007,Boot or Logon Autostart Execution: Re " REvil ransomware performs a variety of malicious activity after startup, having modified the infected machine to do so. ",1,accept,T1547.007,Boot or Logon Autostart Execution: Re The threat actor FIN13 often modifies plist files with the aim to run malicious code upon startup. ,1,accept,T1547.007,Boot or Logon Autostart Execution: Re "REvil can escalate it's privileges by loading a dll file before startup, allowing it to run with SYSTEM level privileges. ",1,accept,T1547.010,Boot or Logon Autostart Execution: Port Monitors Ransomeware can achieve persistence by abusing port monitors for code execution upon startup. ,1,accept,T1547.010,Boot or Logon Autostart Execution: Port Monitors QakBot malware can send a .dll file to be executed during system boot. ,1,accept,T1547.010,Boot or Logon Autostart Execution: Port Monitors " Malware such as Emotet can achieve persistence through executing code during startup, often via dll injection via port monitors during startup. ",1,accept,T1547.010,Boot or Logon Autostart Execution: Port Monitors " Russian threat actors deploy a variety of techniques to achieve persistence, sometimes involving the abuse of port monitors to execute arbitrary code during the boot process. ",1,accept,T1547.010,Boot or Logon Autostart Execution: Port Monitors Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents.,1,accept,T1546.001,Event Triggered Execution: Change Default File Association Cring Ransomware can escalate privileges via changes to the default handlers. ,1,accept,T1546.001,Event Triggered Execution: Change Default File Association " Through manipulation of the registry, FIN13 can achieve persistence by changing the file association to allow for malicious code execution. ",1,accept,T1546.001,Event Triggered Execution: Change Default File Association CobaltStrike contains modules that can modify default file associations. ,1,accept,T1546.001,Event Triggered Execution: Change Default File Association " Neurevt trojan persists itself via executing arbitrary code, often achieved by modifying default file associations. ",1,accept,T1546.001,Event Triggered Execution: Change Default File Association