Subtechnique ID,technique,subtech,Value T1598.002,Phishing for Information, Spearphishing Attachment,Astaroth has been delivered via malicious e-mail attachments. T1598.002,Phishing for Information, Spearphishing Attachment, Sidewinder has sent e-mails with malicious attachments that lead victims to credential harvesting websites. T1598.002,Phishing for Information, Spearphishing Attachment,"A phishing campaign has been observed by researchers from Trend Micro that contain a macro-enabled document that exploits the legitimate script engine,AutoHotKey. " T1598.002,Phishing for Information, Spearphishing Attachment, Researchers have discovered a wave of emails with malicious attachments orchestrated by Russian Advanced Persistent Threat (APT) group APT29. T1598.002,Phishing for Information, Spearphishing Attachment," Using attached HTML files containing JavaScript, the email will write an ISO file to disk; this contains a Cobalt Strike beacon that will activate on completion. " T1598.002,Phishing for Information, Spearphishing Attachment," Strrat, a Java-based malware, is currently being delivered as an attached PDF document via a phishing campaign using compromised email accounts. " T1598.002,Phishing for Information, Spearphishing Attachment," Although the email may look official and legitimate, if you have no reason to receive such an email or if the content is questionable, you should not open any attached files. " T1591.004,Gather Victim Org Information, Identify Roles,"RestorePrivacy, an information site about privacy, examined the proof the seller put out and found the following information, scraped from LinkedIn user profiles: Email addresses, Full names, Phone numbers, Physical addresses, LinkedIn username and profile URL, Personal and professional experience/background. " T1591.004,Gather Victim Org Information, Identify Roles," Targets are identified, groomed, and then deceived by quite sophisticated email techniques into wiring funds to 'burner' bank accounts, and thinking that the email request comes from the CEO, the victim willingly sends the money. " T1591.004,Gather Victim Org Information, Identify Roles," This threat group instructs its affiliates to parse companies websites and social media to identify leadership, HR, and accounting staff for following targeted spear phishing attacks. " T1591.004,Gather Victim Org Information, Identify Roles," Some spam lists are selected to target a specific business role, for example identified sales representatives. " T1591.004,Gather Victim Org Information, Identify Roles," Through reading the extracted emails, threat actors identified that fund transfers were originating in the accounting department by person A and approved by manager B. " T1591.003,Gather Victim Org Information, Identify Business Tempo,Threat actors identified that long holiday weekend in the US will be the best time to lunch a cyber attack against this company. T1591.003,Gather Victim Org Information, Identify Business Tempo," The federal advisory makes note of ""recent holiday targeting,"" stating that ""cyber actors have conducted increasingly impactful attacks against U.S. entities on or around holiday weekends."" Neither FBI nor CISA has information about a cyberattack ""coinciding with upcoming holidays and weekends,"" per the advisory, but the document says cybercriminals may see holidays and weekends as ""as attractive timeframes"" to ""target potential victims."" " T1591.003,Gather Victim Org Information, Identify Business Tempo," Whether you celebrate Christmas, Hanukkah, or Thanksgiving, your chances of being the victim of a cyber attack increase. The vacation season is yet another perfect period for cyber attacks. If a hacker had a choice between attacking your organization when your IT security team is fully staffed or when it isnt- what do you think they will choose? " T1591.003,Gather Victim Org Information, Identify Business Tempo," Many times, organizations are overburdened, and cyberattacks during the holidays are the last thing on their minds. The current pandemic heightened the threat, which has resulted in many firms operating with significant cybersecurity flaws resulting from the rapid shift to working from home. Cybercriminals exploit these flaws to get access to systems“ and vulnerabilities increase with less network supervision during the holidays. " T1591.003,Gather Victim Org Information, Identify Business Tempo," Once they had infected the computers of the personnel in charge of cash transfer systems or ATMs, the attackers collected snapshots of victims screens and studied their daily activities in the bank. " T1591.001,Gather Victim Org Information, Determine Physical Locations,"The majority of the actors behind the ransomware are likely based outside of the CIS, for example, ransomware Fonix wont run if IP geolocation is Iranian. " T1591.001,Gather Victim Org Information, Determine Physical Locations," DarkSide, like a great many other malware strains, has a hard-coded do-not-install list of countries which are the principal members of the Commonwealth of Independent States (CIS)” former Soviet satellites that mostly have favorable relations with the Kremlin. " T1591.001,Gather Victim Org Information, Determine Physical Locations," REvil was previously known as GandCrab, and one of the many things GandCrab had in common with REvil was that both programs barred affiliates from infecting victims in Syria. " T1591.001,Gather Victim Org Information, Determine Physical Locations," As we can see from the chart above, Syria is also exempted from infections by DarkSide ransomware. " T1591.001,Gather Victim Org Information, Determine Physical Locations," However, upon closer inspection, it turns out this is actually a clever language check to ensure that the payload will not be downloaded outside of France. " T1591.002,Gather Victim Org Information, Business Relationships,In preparation for its attack against the 2018 Winter Olympics Sandworm Team conducted online research of partner organizations listed on an official PyeongChang Olympics partnership site. T1591.002,Gather Victim Org Information, Business Relationships,"Generally, supply chain attacks on information systems begin with an advanced persistent threat (APT) that determines a member of the supply network with the weakest cyber security in order to affect the target organization. " T1591.002,Gather Victim Org Information, Business Relationships," It also found that hackers can steal sensitive data, including information about partners. " T1591.002,Gather Victim Org Information, Business Relationships, The attackers were after Facebookinformation about partners. T1591.002,Gather Victim Org Information, Business Relationships," Clues about business partners can provide a hacker with other potential avenues of attack. " T1591.002,Gather Victim Org Information, Business Relationships, Attackers identified and impersonated the companyforeign supplier in a Bogus Invoice Scheme attack. T1590.003,Gather Victim Network Information, Network Trust Dependencies,"Attackers are looking for IT service providers that have privileged access to their clients networks. " T1590.003,Gather Victim Network Information, Network Trust Dependencies," Nation-state sponsored hackers are targeting IT service providers and discovering network trust relationships with their client organizations from government and military sectors. " T1590.003,Gather Victim Network Information, Network Trust Dependencies," The threat actors were looking for MSPs and MSSPs managing IT and security within the target organization. " T1590.003,Gather Victim Network Information, Network Trust Dependencies," In all of the cases, attackers enumerated network trust relationships, hijacked the managed service providers internal management tools to distribute Sodinokibi ransomware to their customers. " T1590.003,Gather Victim Network Information, Network Trust Dependencies," A hacker can make one strategic breach into an MSP, discover network access to their clients, and gain access to multiple customers information across multiple industries. " T1590.004,Gather Victim Network Information, Network Topology,"The group utilizes active scanning to collect information on the victim network. " T1590.004,Gather Victim Network Information, Network Topology," After the initial foothold the actors were scanning to map the local network devices and plan the lateral movement. " T1590.004,Gather Victim Network Information, Network Topology," During the exfiltration stage, attackers were identifying documents related to local accounts, network security and topology. " T1590.004,Gather Victim Network Information, Network Topology," Requirement to publish procurement documents made it possible for the attackers to access specifics regarding network devices used by the organization (gateways, routers, etc.) " T1590.004,Gather Victim Network Information, Network Topology," All the graphs, mind maps, presentations including the physical and/or logical arrangement of both external-facing and internal network environments should be treated as sensitive information. " T1590.006,Gather Victim Network Information, Network Security Appliances,This firewall company had a few large customers listed on their website thus providing the attackers with convenient targets. T1590.006,Gather Victim Network Information, Network Security Appliances," Requirement to publish procurement documents made it possible for the attackers to access specifics regarding network security appliances used by the organization (firewalls, content filters, NIDS, etc.) " T1590.006,Gather Victim Network Information, Network Security Appliances," Following the intrusion, actors were scanning to identify firewalls and other deployed security appliances. " T1590.006,Gather Victim Network Information, Network Security Appliances," This group phishes for information trying to identify deployed security appliances and leverage it for initial access. " T1590.006,Gather Victim Network Information, Network Security Appliances, This APT group was identifying the use of proxies and company VPN and then utilizing these security appliances for stealthy lateral movement. T1590.005,Gather Victim Network Information, Ip Addresses,HAFNIUM has obtained IP addresses for publicly-accessible Exchange servers. T1590.005,Gather Victim Network Information, Ip Addresses,"Andariel has limited its watering hole attacks to specific IP address ranges. " T1590.005,Gather Victim Network Information, Ip Addresses," Initially the attackers research the victimIP ranges and scan them for open ports and opportunities for the initial access. " T1590.005,Gather Victim Network Information, Ip Addresses," Anonymous OpIsrael campaign published a Pastebin post listing IP addresses of organizations that hacktivists plan to target. " T1590.005,Gather Victim Network Information, Ip Addresses," Actor obtains list of the victim IP blocks and proceeds to run a Shodan or Zoomeye scan of the ranges. " T1590.005,Gather Victim Network Information, Ip Addresses, Keyword search on Hurricane Electric allows attackers to find IP addresses of a certain company they want to target. T1590.001,Gather Victim Network Information, Domain Properties,Sandworm Team conducted technical reconnaissance of the Parliament of Georgia's official internet domain prior to its 2019 attack. T1590.001,Gather Victim Network Information, Domain Properties,"There is an active campaign targeting domain owners via email addresses that were derived by actors in the domain registration data. " T1590.001,Gather Victim Network Information, Domain Properties," Attackers were able to leverage domain registration data to find additional domains belonging to the same victim organization. " T1590.001,Gather Victim Network Information, Domain Properties," Domain administrator was targeted with a tailored spear phishing after the attackers determined the domain registrar and impersonated it. " T1590.001,Gather Victim Network Information, Domain Properties," Many victims avoided using domain registration anonymization services and their domain properties were leveraged by the hackers. " T1590.001,Gather Victim Network Information, Domain Properties, This DDoS service offered TDoS and email bombing to target domain administrator contacts if those were available from the gathered domain properties. T1590.002,Gather Victim Network Information, Dns,"During the reconnaissance phase, this group paid special attention to collect and analyze DNS information. " T1590.002,Gather Victim Network Information, Dns," Gathering DNS information allowed the attackers to identify victimsubdomains that were supposed to remain private. " T1590.002,Gather Victim Network Information, Dns," Targeting of mail servers were starting by gathering mail server records from the victimDNS. " T1590.002,Gather Victim Network Information, Dns," Some of the information on targets were gathered free of charge such as from DNS records. " T1590.002,Gather Victim Network Information, Dns, Passive DNS information helped the attackers to map the victimhosts and plan the intrusion. T1589.003,Gather Victim Identity Information, Employee Names,Sandworm Team's research of potential victim organizations included the identification and collection of employee information. T1589.003,Gather Victim Identity Information, Employee Names, Silent Librarian has collected lists of names for individuals from targeted organizations. T1589.003,Gather Victim Identity Information, Employee Names,"Collecting victim organizationemployee list allowed the attacker to generate actual email addresses due to conservative alias naming convention. " T1589.003,Gather Victim Identity Information, Employee Names," Social media such as LinkedIn and Facebook allow threat actors to identify employee names for the organizations they plan to target. " T1589.003,Gather Victim Identity Information, Employee Names, This threat group collects employee names from the organizationwebsite and use them for impersonation in spear phishing attacks. T1589.002,Gather Victim Identity Information, Email Addresses,APT32 has collected e-mail addresses for activists and bloggers in order to target them with spyware. T1589.002,Gather Victim Identity Information, Email Addresses, HAFNIUM has collected e-mail addresses for users they intended to target. T1589.002,Gather Victim Identity Information, Email Addresses, MuddyWater has specifically targeted government agency employees with spearphishing e-mails. T1589.002,Gather Victim Identity Information, Email Addresses, Sandworm Team has obtained valid emails addresses while conducting research against target organizations that were subsequently used in spearphishing campaigns. T1589.002,Gather Victim Identity Information, Email Addresses, Silent Librarian has collected e-mail addresses from targeted organizations from open Internet searches. T1589.002,Gather Victim Identity Information, Email Addresses, TA551 has used spoofed company emails that were acquired from email clients on previously infected hosts to target other individuals. T1589.001,Gather Victim Identity Information, Credentials,APT28 has harvested user's login credentials. T1589.001,Gather Victim Identity Information, Credentials, Chimera has collected credentials for the target organization from previous breaches for use in brute force attacks. T1589.001,Gather Victim Identity Information, Credentials, Magic Hound gathered credentials from two victims that they then attempted to validate across 75 different websites. T1589.001,Gather Victim Identity Information, Credentials,"Strontium is launching campaigns to harvest peoplelog-in credentials or compromise their accounts, presumably to aid in intelligence gathering or disruption operations." T1589.001,Gather Victim Identity Information, Credentials, Attackers appear to have purchased credential information from an underground forum for use in this attack. T1592.002,Gather Victim Host Information, Software,Sandworm Team has researched software code to enable supply-chain operations most notably for the 2017 NotPetya attack. Sandworm Team also collected a list of computers using specific software as part of its targeting efforts. T1592.002,Gather Victim Host Information, Software,"Public procurement data such as purchase invoices for software allowed attackers to plan their exploitation for the initial access. " T1592.002,Gather Victim Host Information, Software," Andariel has inserted a malicious script within compromised websites to collect potential victim information such as browser type, system language, Flash Player version, and other data. " T1592.002,Gather Victim Host Information, Software," Some threat groups use supply chain compromise as an opportunistic attack on whomever is a client, others“ specifically research software suppliers for a given target. " T1592.002,Gather Victim Host Information, Software, Gathering information from server banners allows attackers to use known vulnerabilities for certain kinds of server software. T1592.001,Gather Victim Host Information, Hardware,"Actors targeting poor countries pay attention to learn victimhardware, as it is often so old that doesnt support newer more secure operation systems. " T1592.001,Gather Victim Host Information, Hardware," Another door in for initial access are IoT devices, and hackers are trying to learn the used hardware versions, as it is often produced to never be fully updated or secured. " T1592.001,Gather Victim Host Information, Hardware," This group was using job postings, resumes, and public purchase invoices to determine the hardware used by the victim organization. " T1592.001,Gather Victim Host Information, Hardware," After the attacker gathered information about the hardware used in the organization, they proceeded to register typosquatted domains mimicking these hardware manufactures. " T1592.001,Gather Victim Host Information, Hardware, This Russian APT gathered information on the specific type of industrial controllers used by some Ukrainian power transmission stations. T1592.003,Gather Victim Host Information, Firmware,"Intruders impersonated the CEO and demanded information on the age and patch level of the network appliances. " T1592.003,Gather Victim Host Information, Firmware," While the problem with the firmware update level was outlined in the previous assessment report, the company failed to act on it, moreover the very assessment ended up in the hands of the threat actors. " T1592.003,Gather Victim Host Information, Firmware," Slow implementation of the firmware patch for this vulnerability became apparent to the attackers who started directing their botnets to target it. " T1592.003,Gather Victim Host Information, Firmware," Attackers did research on the backdoor in the standard router firmware in that country. " T1592.003,Gather Victim Host Information, Firmware, This botnet handers gather information on the dominating types of IoT firmware with known vulnerabilities. T1592.004,Gather Victim Host Information, Client Configurations,HAFNIUM has interacted with Office 365 tenants to gather details regarding target's environments. T1592.004,Gather Victim Host Information, Client Configurations,"Attackers website was checking visitors host information and serving the malicious content only to those with certain language settings. " T1592.004,Gather Victim Host Information, Client Configurations," This group was studying organizationpurchase invoices to learn what operating systems are in use, their versions and architecture. " T1592.004,Gather Victim Host Information, Client Configurations," The Scanbox framework first configures the remote C&C server that it will use and collects a small amount of information about the victim that is visiting the compromised website including: Referer User-Agent Location Cookie Title (To identify specific content that the victim is visiting) Domain Charset Screen width and height Operating System Language " T1592.004,Gather Victim Host Information, Client Configurations," The attackers were able to compromise the website and include code that loaded a malicious Javascript file from a remote server that records visitors User-Agent, Location, Charset, Operating System, and Language. " T1592.004,Gather Victim Host Information, Client Configurations, Hackers were checking client configuration virtualization status and generally were trying to avoid targeting virtual machines. T1595.002,Active Scanning, Vulnerability Scanning,APT28 has performed large-scale scans in an attempt to find vulnerable servers. T1595.002,Active Scanning, Vulnerability Scanning, Sandworm Team has scanned network infrastructure for vulnerabilities as part of its operational planning. T1595.002,Active Scanning, Vulnerability Scanning, Volatile Cedar has performed vulnerability scans of the target server. T1595.002,Active Scanning, Vulnerability Scanning,"First, this threat group would engage in vulnerability reconnaissance via application-specific vulnerability discovery and identifying vulnerable content management systems (CMS) and CMS components. " T1595.002,Active Scanning, Vulnerability Scanning," Adversaries scan victims for vulnerabilities that can be used during targeting. " T1595.002,Active Scanning, Vulnerability Scanning," These scans may also include more broad attempts to Gather Victim Host Information that can be used to identify more commonly known, exploitable vulnerabilities. " T1595.002,Active Scanning, Vulnerability Scanning," Vulnerability scans typically harvest running software and version numbers via server banners, listening ports, or other network artifacts. " T1595.002,Active Scanning, Vulnerability Scanning, Vulnerability scans typically check if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit the adversary may seek to use. T1595.001,Active Scanning, Scanning Ip Blocks,"The adversaries were scanning victim IP blocks to gather information that can be used during targeting. " T1595.001,Active Scanning, Scanning Ip Blocks," After finding victimASNs, attackers continued by scanning these net ranges to detect active IP addresses and open ports. " T1595.001,Active Scanning, Scanning Ip Blocks," One member of Anonymous was sharing victimIP addresses, another“ was scanning them to reveal host software versions. " T1595.001,Active Scanning, Scanning Ip Blocks," This attacker was scanning companyIP space for any artifact he could find. " T1595.001,Active Scanning, Scanning Ip Blocks," First, the attacker was using simple pings (ICMP requests and responses) to detect which targetIP addresses are actively in use." T1588.006,Obtain Capabilities, Vulnerabilities,In 2017 Sandworm Team conducted technical research related to vulnerabilities associated with websites used by the Korean Sport and Olympic Committee a Korean power company and a Korean airport. T1588.006,Obtain Capabilities, Vulnerabilities,"Multiple threat actors obtained Log4Shell vulnerability simply by studying the public vulnerability disclosures from Apache, watching POC presentations, and analyzing reports of the zero-day exploitation. " T1588.006,Obtain Capabilities, Vulnerabilities," Israeli spyware companies were purchasing vulnerabilities from undisclosed researchers, often using specialized vulnerability brokers. " T1588.006,Obtain Capabilities, Vulnerabilities," Soon after the patch was released, the attackers were able to reverse-engineer the changes, understand the fix, and weaponize the vulnerability that patch was addressing. " T1588.006,Obtain Capabilities, Vulnerabilities, The botnet handlers were monitoring new vulnerability disclosures to add new vulnerabilities to their list. T1588.002,Obtain Capabilities, Tool,GALLIUM has used a variety of widely-available tools which in some cases they modified to add functionality and/or subvert antimalware solutions. T1588.002,Obtain Capabilities, Tool, MuddyWater has made use of legitimate tools ConnectWise and RemoteUtilities for access to target environments. T1588.002,Obtain Capabilities, Tool, Sandworm Team has acquired open-source tools for some of it's operations; for example it acquired Invoke-PSImage to establish an encrypted channel from a compromised host to Sandworm Team's C2 server as part of its preparation for the 2018 Winter Olympics attack. T1588.002,Obtain Capabilities, Tool, Silent Librarian has obtained free and publicly available tools including SingleFile and HTTrack to copy login pages of targeted organizations. T1588.002,Obtain Capabilities, Tool,Cozy Bear stole Cobalt Strike Beacon code and modified the tool to their liking. T1588.001,Obtain Capabilities, Malware,APT1 used publicly available malware for privilege escalation. T1588.001,Obtain Capabilities, Malware, Turla has used malware obtained after compromising other threat actors such as OilRig. T1588.001,Obtain Capabilities, Malware,"Ransomware-as-a-Service (RaaS) model allowed even unskilled hackers to obtain this malware and use it for a relatively small affiliate fee. " T1588.001,Obtain Capabilities, Malware," New IoT botnet actors obtained leaked Mirai botnet code and slightly modified it. " T1588.001,Obtain Capabilities, Malware, Citadel Trojan developers Vartanyan and Belorossov initially obtained Zeus Trojan code that they planned to use as a base for their own Trojan. T1588.005,Obtain Capabilities, Exploits,"DarkHotel APT group is known for stealing exploits from Hacking Team and use them for attacks on corporate executives staying in luxury hotels. " T1588.005,Obtain Capabilities, Exploits,"Uzbek intelligence officers bought exploits from German subsidiary of the Gamma Group that specializes in surveillance. " T1588.005,Obtain Capabilities, Exploits,"The attackers leveraged RIG exploit kit that they purchased on a criminal marketplace. " T1588.005,Obtain Capabilities, Exploits,"UAE purchased NSO GroupiPhone zero-day exploits. " T1588.005,Obtain Capabilities, Exploits,These hacktivists were relying on exploits that they found online on various cybersecurity and hacker forums. T1555.004,Credentials from Password Stores, Windows Credential Manager,KGH_SPY can collect credentials from the Windows Credential Manager. T1555.004,Credentials from Password Stores, Windows Credential Manager, LaZagne can obtain credentials from Vault files. T1555.004,Credentials from Password Stores, Windows Credential Manager, Mimikatz contains functionality to acquire credentials from the Windows Credential Manager. T1555.004,Credentials from Password Stores, Windows Credential Manager, OilRig has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager. T1555.004,Credentials from Password Stores, Windows Credential Manager, PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects. T1555.004,Credentials from Password Stores, Windows Credential Manager, ROKRAT steals credentials by leveraging the Windows Vault mechanism. T1555.004,Credentials from Password Stores, Windows Credential Manager, Stealth Falcon malware gathers passwords from the Windows Credential Vault. T1555.004,Credentials from Password Stores, Windows Credential Manager, Turla has gathered credentials from the Windows Credential Manager tool. T1555.004,Credentials from Password Stores, Windows Credential Manager, Valak can use a .NET compiled module named exchgrabber to enumerate credentials from the Credential Manager. T1574.004,Hijack Execution Flow, Dylib Hijacking,Empire has a dylib hijacker module that generates a malicious dylib given the path to a legitimate dylib of a vulnerable application. T1574.004,Hijack Execution Flow, Dylib Hijacking,"Abusing Dynamic Loader/Linker (dyld) logic allowed attackers to perform dylib hijacking. " T1574.004,Hijack Execution Flow, Dylib Hijacking,"Attackers ran Dylib Hijack Scanner tool and attacked identified vulnerable apps. " T1574.004,Hijack Execution Flow, Dylib Hijacking,"Developers should replace weak linking with version check to mitigate dylib hijacking attacks from these threat actors. " T1574.004,Hijack Execution Flow, Dylib Hijacking,"After the initial access to the Apple device, attackers were escalating their privileges by placing malicious dylib files with expected names to hijack the normal execution flow." T1037.004,Boot or Logon Initialization Scripts, Rc Scripts,HiddenWasp installs reboot persistence by adding itself to /etc/rc.local. T1037.004,Boot or Logon Initialization Scripts, Rc Scripts, iKitten adds an entry to the rc.common file for persistence. T1037.004,Boot or Logon Initialization Scripts, Rc Scripts,"Install persistence through rc.d services: rc.d (/etc/rc.d/init.d/linux_kill). " T1037.004,Boot or Logon Initialization Scripts, Rc Scripts,"Backwards compatibility on Ubuntu allowed attackers to achieve persistence via RC scripts. " T1037.004,Boot or Logon Initialization Scripts, Rc Scripts,"As the malware tries to achieve persistence, Hatching Triage analysis reports suspicious behavior:Modifies rc script." T1574.006,Hijack Execution Flow, Dynamic Linker Hijacking,APT41 has configured payloads to load via LD_PRELOAD. T1574.006,Hijack Execution Flow, Dynamic Linker Hijacking, Ebury has injected its dynamic library into descendent processes of sshd via LD_PRELOAD. T1574.006,Hijack Execution Flow, Dynamic Linker Hijacking, HiddenWasp adds itself as a shared object to the LD_PRELOAD environment variable. T1574.006,Hijack Execution Flow, Dynamic Linker Hijacking, Hildegard has modified /etc/ld.so.preload to intercept shared library import functions. T1574.006,Hijack Execution Flow, Dynamic Linker Hijacking, Rocke has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists. T1059.007,Command and Scripting Interpreter, Javascript,APT32 has used JavaScript for drive-by downloads and C2 communications. T1059.007,Command and Scripting Interpreter, Javascript, Astaroth uses JavaScript to perform its core functionalities. T1059.007,Command and Scripting Interpreter, Javascript, Bundlore can execute JavaScript by injecting it into the victim's browser. T1059.007,Command and Scripting Interpreter, Javascript, Cobalt Group has executed JavaScript scriptlets on the victim's machine. T1059.007,Command and Scripting Interpreter, Javascript, The Cobalt Strike System Profiler can use JavaScript to perform reconnaissance actions. T1059.007,Command and Scripting Interpreter, Javascript, Evilnum has used malicious JavaScript files on the victim's machine. T1059.007,Command and Scripting Interpreter, Javascript, FIN6 has used malicious JavaScript to steal payment card data from e-commerce sites. T1059.007,Command and Scripting Interpreter, Javascript, FIN7 used JavaScript scripts to help perform tasks on the victim's machine. T1059.007,Command and Scripting Interpreter, Javascript, GRIFFON is written in and executed as JavaScript. T1059.007,Command and Scripting Interpreter, Javascript, Higaisa used JavaScript to execute additional files. T1059.007,Command and Scripting Interpreter, Javascript, InvisiMole can use a JavaScript file as part of its execution chain. T1059.007,Command and Scripting Interpreter, Javascript, jRAT has been distributed as HTA files with JScript. T1059.007,Command and Scripting Interpreter, Javascript, Kimsuky has used JScript for logging and downloading additional tools. T1059.007,Command and Scripting Interpreter, Javascript, Leafminer infected victims using JavaScript code. T1059.007,Command and Scripting Interpreter, Javascript, Metamorfo includes payloads written in JavaScript. T1059.007,Command and Scripting Interpreter, Javascript, Molerats used various implants including those built with JS on target machines. T1059.007,Command and Scripting Interpreter, Javascript, MuddyWater has used JavaScript files to execute its POWERSTATS payload. T1059.007,Command and Scripting Interpreter, Javascript, NanHaiShu executes additional Jscript code on the victim's machine. T1059.007,Command and Scripting Interpreter, Javascript, POWERSTATS can use JavaScript code for execution. T1059.007,Command and Scripting Interpreter, Javascript, Sidewinder has used JavaScript to drop and execute malware loaders. T1059.007,Command and Scripting Interpreter, Javascript, Silence has used JS scripts. T1059.007,Command and Scripting Interpreter, Javascript, TA505 has used JavaScript for code execution. T1059.007,Command and Scripting Interpreter, Javascript, Turla has used various JavaScript-based backdoors. T1059.007,Command and Scripting Interpreter, Javascript, Valak can execute JavaScript containing configuration data for establishing persistence. T1059.007,Command and Scripting Interpreter, Javascript, Xbash can execute malicious JavaScript payloads on the victimmachine. T1608.005,Stage Capabilities, Link Target,Silent Librarian has cloned victim organization login pages and staged them for later use in credential harvesting campaigns. Silent Librarian has also made use of a variety of URL shorteners for these staged websites. T1608.005,Stage Capabilities, Link Target,"The attackers prepared over 39,000 phishing pages mimicking the four platforms' login pages. " T1608.005,Stage Capabilities, Link Target,"They used Ngrokpaid option to acquire customized phishing URLs displaying Metatrademarks (such as hxxp://facebook[.]in[.]ngrok[.]io/). " T1608.005,Stage Capabilities, Link Target,"Prior to the attack, they registered typosquatted domains, set up phishing pages and employed URL shortener service. " T1608.005,Stage Capabilities, Link Target,The attacker placed archived malicious Office Documents at the link target. T1608.004,Stage Capabilities, Drive,APT32 has stood up websites containing numerous articles and content scraped from the Internet to make them appear legitimate but some of these pages include malicious JavaScript to profile the potential victim or infect them via a fake software update. T1608.004,Stage Capabilities, Drive, Threat Group-3390 has embedded malicious code into websites to screen a potential victim's IP address and then exploit their browser if they are of interest. T1608.004,Stage Capabilities, Drive,"The attackers prepared an malvertizing: an ad combined of image and a JavaScript, which contained malicious code, and pushed it to legitimate websites via ad networks. " T1608.004,Stage Capabilities, Drive,"Second stage of the Magecart attack included injecting malicious Javascript on the vulnerable checkout pages. " T1608.004,Stage Capabilities, Drive,This APT group was looking to compromise industryonline publications to prepare for watering whole attacks. T1608.003,Stage Capabilities, Install Digital Certificate,"Adversaries created self-signed certificates and installed them on their web servers. " T1608.003,Stage Capabilities, Install Digital Certificate,"Attackers installed LetEncrypt certificates on their phishing servers to gain additional trust from the visitors. " T1608.003,Stage Capabilities, Install Digital Certificate,"They prepare phishing pages with valid SSL/TLS certificates installed. " T1608.003,Stage Capabilities, Install Digital Certificate,"According to PhishLabs, in the last quarter of 2019, 74% of reported phishing websites were 'secure,' being both HTTPS and with the lock symbol, meaning cybercriminals installed SSL certificates and circumvented so-called verification processes. " T1608.003,Stage Capabilities, Install Digital Certificate,Actors installed SSL certificates they made using OpenSSL (where you can even be your own Certificate Authority). T1608.002,Stage Capabilities, Upload Tool,Threat Group-3390 has staged tools including gsecdump and WCE on previously compromised websites. T1608.002,Stage Capabilities, Upload Tool,"Prior to the attack, the adversaries uploaded remote administration tools to compromised websites they controlled. " T1608.002,Stage Capabilities, Upload Tool,"Threat actor placed several double-purpose tools on his GitHub repository. " T1608.002,Stage Capabilities, Upload Tool,"The attackers uploaded Remote Utilities RAT tool to a third-party compromised website to be used if the victim environment wont have a remote administration tool installed. " T1608.002,Stage Capabilities, Upload Tool,FIN5 staged a customized version of PsExec. T1608.001,Stage Capabilities, Upload Malware,APT32 has hosted malicious payloads in Dropbox Amazon S3 and Google Drive for use during targeting. T1608.001,Stage Capabilities, Upload Malware,"They were posting obfuscated malicious payloads on Pastebin to be used later during the attack. " T1608.001,Stage Capabilities, Upload Malware,"Some of the compromised websites were used to stage post-compromise malware such as keyloggers. " T1608.001,Stage Capabilities, Upload Malware,"These government hackers staged malicious Java scripts on the Microsoft typosquatted domains they registered earlier. " T1608.001,Stage Capabilities, Upload Malware,Gamaredon stage malicious VBA scripts on various compromised websites. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking,APT41 has used search order hijacking to execute malicious payloads such as Winnti RAT. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, Astaroth can launch itself via DLL Search Order Hijacking. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, BOOSTWRITE has exploited the loading of the legitimate Dwrite.dll file by actually loading the gdi library which then loads the gdiplus library and ultimately loads the local Dwrite dll. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, Crutch can persist via DLL search order hijacking on Google Chrome Mozilla Firefox or Microsoft OneDrive. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, Empire contains modules that can discover and exploit various DLL hijacking opportunities. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, Evilnum has used the malware variant TerraTV to load a malicious DLL placed in the TeamViewer directory instead of the original Windows DLL located in a system folder. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, A FinFisher variant uses DLL search order hijacking. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, Hikit has used DLL Search Order Hijacking to load oci.dll as a persistence mechanism. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary VPDN_LU.exe to load a malicious DLL that mimics a legitimate Symantec DLL navlu.dll. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, InvisiMole can be launched by using DLL search order hijacking in which the wrapper DLL is placed in the same folder as explorer.exe and loaded during startup into the Windows Explorer process instead of the legitimate library. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, Melcoz can use DLL hijacking to bypass security controls. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, menuPass has used DLL search order hijacking. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, MirageFox is likely loaded via DLL hijacking into a legitimate McAfee binary. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, Prikormka uses DLL search order hijacking for persistence by saving itself as ntshrui.dll to the Windows directory so it will load before the legitimate ntshrui.dll saved in the System32 subdirectory. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, Ramsay can hijack outdated Windows application dependencies with malicious versions of its own DLL payload. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, RedLeaves is launched through use of DLL search order hijacking to load a malicious dll. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, RTM has used search order hijacking to force TeamViewer to load a malicious DLL. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, Threat Group-3390 has performed DLL search order hijacking to execute their payload. T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, Variants of WEBC2 achieve persistence by using DLL search order hijacking usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll). T1574.001,Hijack Execution Flow, Dll Search Order Hijacking, Whitefly has used search order hijacking to run the loader Vcrodat. T1574.002,Hijack Execution Flow, Dll Side,APT19 launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL. T1574.002,Hijack Execution Flow, Dll Side, APT3 has been known to side load DLLs with a valid version of Chrome with one of their tools. T1574.002,Hijack Execution Flow, Dll Side, APT32 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate signed executable (AcroTranscoder). T1574.002,Hijack Execution Flow, Dll Side, APT41 used legitimate executables to perform DLL side-loading of their malware. T1574.002,Hijack Execution Flow, Dll Side, BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable. T1574.002,Hijack Execution Flow, Dll Side, DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper. T1574.002,Hijack Execution Flow, Dll Side, BlackTech has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories. T1574.002,Hijack Execution Flow, Dll Side, BRONZE BUTLER has used legitimate applications to side-load malicious DLLs. T1574.002,Hijack Execution Flow, Dll Side, Chimera has used side loading to place malicious DLLs in memory. T1574.002,Hijack Execution Flow, Dll Side, Denis exploits a security vulnerability to load a fake DLL and execute its code. T1574.002,Hijack Execution Flow, Dll Side, Egregor has used DLL side-loading to execute its payload. T1574.002,Hijack Execution Flow, Dll Side, FinFisher uses DLL side-loading to load malicious programs. T1574.002,Hijack Execution Flow, Dll Side, GALLIUM used DLL side-loading to covertly load PoisonIvy into memory on the victim machine. T1574.002,Hijack Execution Flow, Dll Side, A gh0st RAT variant has used DLL side-loading. T1574.002,Hijack Execution Flow, Dll Side, Goopy has the ability to side-load malicious DLLs with legitimate applications from Kaspersky Microsoft and Google. T1574.002,Hijack Execution Flow, Dll Side, HigaisaJavaScript file used a legitimate Microsoft Office 2007 package to side-load the OINFO12.OCX dynamic link library. T1574.002,Hijack Execution Flow, Dll Side, HTTPBrowser has used DLL side-loading. T1574.002,Hijack Execution Flow, Dll Side, HyperBro has used a legitimate application to sideload a DLL to decrypt decompress and run a payload. T1574.002,Hijack Execution Flow, Dll Side, Javali can use DLL side-loading to load malicious DLLs into legitimate executables. T1574.002,Hijack Execution Flow, Dll Side, LookBack side loads its communications module as a DLL into the libcurl.dll loader. T1574.002,Hijack Execution Flow, Dll Side, menuPass has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as UPPERCUT. T1574.002,Hijack Execution Flow, Dll Side, Metamorfo has side-loaded its malicious DLL file. T1574.002,Hijack Execution Flow, Dll Side, Mustang Panda has used a legitimately signed executable to execute a malicious payload within a DLL file. T1574.002,Hijack Execution Flow, Dll Side, Naikon has used DLL side-loading to load malicious DLL's into legitimate executables. T1574.002,Hijack Execution Flow, Dll Side, OwaAuth has been loaded onto Exchange servers and disguised as an ISAPI filter (DLL file). The IIS w3wp.exe process then loads the malicious DLL. T1574.002,Hijack Execution Flow, Dll Side, A Patchwork .dll that contains BADNEWS is loaded and executed using DLL side-loading. T1574.002,Hijack Execution Flow, Dll Side, PlugX has used DLL side-loading to evade anti-virus. T1574.002,Hijack Execution Flow, Dll Side, Sakula uses DLL side-loading typically using a digitally signed sample of Kaspersky Anti-Virus (AV) 6.0 for Windows Workstations or McAfee's Outlook Scan About Box to load malicious DLL files. T1574.002,Hijack Execution Flow, Dll Side, Sidewinder has used DLL side-loading to drop and execute malicious payloads including the hijacking of the legitimate Windows application file rekeywiz.exe. T1574.002,Hijack Execution Flow, Dll Side, During the T9000 installation process it drops a copy of the legitimate Microsoft binary igfxtray.exe. The executable contains a side-loading weakness which is used to load a portion of the malware. T1574.002,Hijack Execution Flow, Dll Side, Threat Group-3390 has used DLL side-loading including by using legitimate Kaspersky antivirus variants in which the DLL acts as a stub loader that loads and executes the shell code. T1574.002,Hijack Execution Flow, Dll Side, Tropic Trooper has been known to side-load DLLs using a valid version of a Windows Address Book and Windows Defender executable with one of their tools. T1574.002,Hijack Execution Flow, Dll Side, Waterbear has used DLL side loading to import and load a malicious DLL loader. T1574.002,Hijack Execution Flow, Dll Side, Wingbird side loads a malicious file sspisrv.dll in part of a spoofed lssas.exe service. T1574.002,Hijack Execution Flow, Dll Side, ZeroT has used DLL side-loading to load malicious payloads. T1553.006,Subvert Trust Controls, Code Signing Policy Modification,APT39 has used malware to turn off the RequireSigned feature which ensures only signed DLLs can be run on Windows. T1553.006,Subvert Trust Controls, Code Signing Policy Modification, BlackEnergy has enabled the TESTSIGNING boot configuration option to facilitate loading of a driver component. T1553.006,Subvert Trust Controls, Code Signing Policy Modification, Hikit has attempted to disable driver signing verification by tampering with several Registry keys prior to the loading of a rootkit driver component. T1553.006,Subvert Trust Controls, Code Signing Policy Modification, Turla has modified variables in kernel memory to turn off Driver Signature Enforcement after exploiting vulnerabilities that obtained kernel mode privileges. T1553.006,Subvert Trust Controls, Code Signing Policy Modification,ESPecter patches Windows kernel function SepInitializeCodeIntegrity directly in memory to disable Driver Signature Enforcement (DSE). T1562.003,Impair Defenses, Impair Command History Logging,"APT38 has prepended a space to all of their terminal commands to operate without leaving traces in the HISTCONTROL environment. " T1562.003,Impair Defenses, Impair Command History Logging,"Attackers set SaveNothing option for PSReadLine to turn off logging PowerShell command history. " T1562.003,Impair Defenses, Impair Command History Logging,"Threat actors set the command history size to zero (export HISTFILESIZE=0) to prevent logging of commands. " T1562.003,Impair Defenses, Impair Command History Logging,"Prior to executing PowerShell commands, attackers meddled with PSReadLine module to disable logging. " T1562.003,Impair Defenses, Impair Command History Logging,"After getting the initial access to the Windows Server, hackers changed PSReadLine logging destination to confuse incident responders." T1036.004,Masquerading, Masquerade Task Or Service,APT-C-36 has disguised its scheduled tasks as those used by Google. T1036.004,Masquerading, Masquerade Task Or Service, APT29 named tasks \Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager in order to appear legitimate. T1036.004,Masquerading, Masquerade Task Or Service," APT32 has used hidden or non-printing characters to help masquerade service names such as appending a Unicode no-break space character to a legitimate service name. APT32 has also impersonated the legitimate Flash installer file name install_flashplayer.exe"". " T1036.004,Masquerading, Masquerade Task Or Service, Attor's dispatcher disguises itself as a legitimate task (i.e. the task name and description appear legitimate). T1036.004,Masquerading, Masquerade Task Or Service, Bazar can create a task named to appear benign. T1036.004,Masquerading, Masquerade Task Or Service," build_downer has added itself to the Registry Run key as ""NVIDIA"" to appear legitimate. " T1036.004,Masquerading, Masquerade Task Or Service, Carbanak has copied legitimate service names to use for malicious services. T1036.004,Masquerading, Masquerade Task Or Service, Catchamas adds a new service named NetAdapter in an apparent attempt to masquerade as a legitimate service. T1036.004,Masquerading, Masquerade Task Or Service, ComRAT has used a task name associated with Windows SQM Consolidator. T1036.004,Masquerading, Masquerade Task Or Service, Crutch has established persistence with a scheduled task impersonating the Outlook item finder. T1036.004,Masquerading, Masquerade Task Or Service, CSPY Downloader has attempted to appear as a legitimate Windows service with a fake description claiming it is used to support packed applications. T1036.004,Masquerading, Masquerade Task Or Service, Egregor has masqueraded the svchost.exe process to exfiltrate data. T1036.004,Masquerading, Masquerade Task Or Service, The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the descriptionWindows Check AV in an apparent attempt to masquerade as a legitimate service. T1036.004,Masquerading, Masquerade Task Or Service," FIN6 has renamed the ""psexec"" service name to ""mstdc"" to masquerade as a legitimate Windows service. " T1036.004,Masquerading, Masquerade Task Or Service, FIN7 has created a scheduled task namedAdobeFlashSync to establish persistence. T1036.004,Masquerading, Masquerade Task Or Service, Fox Kitten has named the task for a reverse proxy lpupdate to appear legitimate. T1036.004,Masquerading, Masquerade Task Or Service, Fysbis has masqueraded as the rsyncd and dbus-inotifier services. T1036.004,Masquerading, Masquerade Task Or Service, GoldMax has impersonated systems management software to avoid detection. T1036.004,Masquerading, Masquerade Task Or Service, Higaisa named a shellcode loader binary svchast.exe to spoof the legitimate svchost.exe. T1036.004,Masquerading, Masquerade Task Or Service, InnaputRAT variants have attempted to appear legitimate by adding a new service named OfficeUpdateService. T1036.004,Masquerading, Masquerade Task Or Service, InvisiMole has attempted to disguise itself by registering under a seemingly legitimate service name. T1036.004,Masquerading, Masquerade Task Or Service, IronNetInjector has been disguised as a legitimate service using the name PythonUpdateSrvc. T1036.004,Masquerading, Masquerade Task Or Service, Kimsuky has disguised services to appear as benign software or related to operating system functions. T1036.004,Masquerading, Masquerade Task Or Service," Kwampirs establishes persistence by adding a new service with the display name ""WMI Performance Adapter Extension"" in an attempt to masquerade as a legitimate WMI service. " T1036.004,Masquerading, Masquerade Task Or Service," A Lazarus Group custom backdoor implant included a custom PE loader named ""Security Package"" that was added into the lsass.exe process via registry key. " T1036.004,Masquerading, Masquerade Task Or Service, Machete renamed task names to masquerade as legitimate Google Chrome Java Dropbox Adobe Reader and Python tasks. T1036.004,Masquerading, Masquerade Task Or Service," Maze operators have created scheduled tasks masquerading as ""Windows Update Security"" ""Windows Update Security Patches"" and ""Google Chrome Security Update"" designed to launch the ransomware. " T1036.004,Masquerading, Masquerade Task Or Service, Nidiran can create a new service named msamger (Microsoft Security Accounts Manager) which mimics the legitimate Microsoft database by the same name. T1036.004,Masquerading, Masquerade Task Or Service, Okrum can establish persistence by adding a new service NtmsSvc with the display name Removable Storage to masquerade as a legitimate Removable Storage Manager. T1036.004,Masquerading, Masquerade Task Or Service, OSX_OCEANLOTUS.D has disguised its app bundle by adding special characters to the filename and using the icon for legitimate Word documents. T1036.004,Masquerading, Masquerade Task Or Service," In one instance menuPass added PlugX as a service with a display name of ""Corel Writing Tools Utility."" " T1036.004,Masquerading, Masquerade Task Or Service," POWERSTATS has created a scheduled task named ""MicrosoftEdge"" to establish persistence. " T1036.004,Masquerading, Masquerade Task Or Service, PROMETHIUM has named services to appear legitimate. T1036.004,Masquerading, Masquerade Task Or Service," New services created by RawPOS are made to appear like legitimate Windows services with names such as ""Windows Management Help Service"" ""Microsoft Support"" and ""Windows Advanced Task Manager"". " T1036.004,Masquerading, Masquerade Task Or Service, RDAT has used Windows Video Service as a name for malicious services. T1036.004,Masquerading, Masquerade Task Or Service," RTM has named the scheduled task it creates ""Windows Update"". " T1036.004,Masquerading, Masquerade Task Or Service," Seasalt has masqueraded as a service called ""SaSaut"" with a display name of ""System Authorization Service"" in an apparent attempt to masquerade as a legitimate service. " T1036.004,Masquerading, Masquerade Task Or Service," Shamoon creates a new service namedntssrv that attempts to appear legitimate; the service's display name isMicrosoft Network Realtime Inspection Service and its description isHelps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols. Newer versions create the ""MaintenaceSrv"" service which misspells the word ""maintenance."" " T1036.004,Masquerading, Masquerade Task Or Service, ShimRat can impersonate Windows services and antivirus products to avoid detection on compromised systems. T1036.004,Masquerading, Masquerade Task Or Service," SLOTHFULMEDIA has named a service it establishes on victim machines as ""TaskFrame"" to hide its malicious purpose. " T1036.004,Masquerading, Masquerade Task Or Service, StrongPity has named services to appear legitimate. T1036.004,Masquerading, Masquerade Task Or Service," To establish persistence Truvasys adds a Registry Run key with a value ""TaskMgr"" in an attempt to masquerade as the legitimate Windows Task Manager. " T1036.004,Masquerading, Masquerade Task Or Service, UNC2452 named tasks \Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager in order to appear legitimate. T1036.004,Masquerading, Masquerade Task Or Service, Some Volgmer variants add new services with display names generated by a list of hard-coded strings such as Application Background Security and Windows presumably as a way to masquerade as a legitimate service. T1036.004,Masquerading, Masquerade Task Or Service, Wizard Spider has used scheduled tasks to install TrickBot using task names to appear legitimate such as WinDotNet GoogleTask or Sysnetsf. It has also used common document file names for other malware binaries. T1036.004,Masquerading, Masquerade Task Or Service," ZIRCONIUM has created a run key named Dropbox Update Setup to mask a persistence mechanism for a malicious binary.""" T1003.006,OS Credential Dumping, Dcsync,APT29 leveraged privileged accounts to replicate directory service data with domain controllers. T1003.006,OS Credential Dumping, Dcsync, Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from DCSync/NetSync. T1003.006,OS Credential Dumping, Dcsync, Operation Wocao has used Mimikatz's DCSync to dump credentials from the memory of the targeted system. T1003.006,OS Credential Dumping, Dcsync, UNC2452 leveraged privileged accounts to replicate directory service data with domain controllers. T1003.006,OS Credential Dumping, Dcsync,"The attacker discovered domain controllers (DCs) and submitted a replication request. This prompted the primary DC to replicate the credentials of other DCs back to the compromised domain administrator, using the Directory Replication Service (DRS) remote protocol." T1003.004,OS Credential Dumping, Lsa Secrets,APT33 has used a variety of publicly available tools like LaZagne to gather credentials. T1003.004,OS Credential Dumping, Lsa Secrets, CosmicDuke collects LSA secrets. T1003.004,OS Credential Dumping, Lsa Secrets, CrackMapExec can dump hashed passwords from LSA secrets for the targeted system. T1003.004,OS Credential Dumping, Lsa Secrets, Dragonfly 2.0 dropped and executed SecretsDump to dump password hashes. T1003.004,OS Credential Dumping, Lsa Secrets, gsecdump can dump LSA secrets. T1003.004,OS Credential Dumping, Lsa Secrets, SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information. T1003.004,OS Credential Dumping, Lsa Secrets, Ke3chang has dumped credentials including by using gsecdump. T1003.004,OS Credential Dumping, Lsa Secrets, LaZagne can perform credential dumping from LSA secrets to obtain account and password information. T1003.004,OS Credential Dumping, Lsa Secrets, Leafminer used several tools for retrieving login and password information including LaZagne. T1003.004,OS Credential Dumping, Lsa Secrets, menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials. T1003.004,OS Credential Dumping, Lsa Secrets, Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from the LSA. T1003.004,OS Credential Dumping, Lsa Secrets, MuddyWater has performed credential dumping with LaZagne. T1003.004,OS Credential Dumping, Lsa Secrets, OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. T1003.004,OS Credential Dumping, Lsa Secrets, Pupy can use Lazagne for harvesting credentials. T1003.004,OS Credential Dumping, Lsa Secrets, Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers. T1110.001,Brute Force, Password Guessing,APT28 has used a brute-force/password-spray tooling that operated in two modes: in brute-force mode it typically sent over 300 authentication attempts per hour per targeted account over the course of several hours or days. T1110.001,Brute Force, Password Guessing, China Chopper's server component can perform brute force password guessing against authentication portals. T1110.001,Brute Force, Password Guessing, CrackMapExec can brute force passwords for a specified user on a single target system or across an entire network. T1110.001,Brute Force, Password Guessing, Emotet has been observed using a hard coded list of passwords to brute force user accounts. T1110.001,Brute Force, Password Guessing, Lucifer has attempted to brute force TCP ports 135 (RPC) and 1433 (MSSQL) with the default username or list of usernames and passwords. T1110.001,Brute Force, Password Guessing, P.A.S. Webshell can use predefined users and passwords to execute brute force attacks against SSH FTP POP3 MySQL MSSQL and PostgreSQL services. T1110.001,Brute Force, Password Guessing, Pony has used a small dictionary of common passwords against a collected list of local accounts. T1110.001,Brute Force, Password Guessing, SpeakUp can perform brute forcing using a pre-defined list of usernames and passwords in an attempt to log in to administrative panels. T1110.001,Brute Force, Password Guessing, Xbash can obtain a list of weak passwords from the C2 server to use for brute forcing as well as attempt to brute force services with open ports. T1557.002,Man,man,Cleaver has used custom tools to facilitate ARP cache poisoning. T1557.002,Man,man,"Irancyber hacking skills have evolved to include customized private tools with ARP poisoning function. " T1557.002,Man,man,"AlirezaC++ tools include the following techniques: ARP poisoning " T1557.002,Man,man,"Jasus is an ARP cache poisoner developed by the Operation Cleaver team. " T1557.002,Man,man,Cain & Abel is a publicly available toolkit with the ability to conduct attacks like ARP cache poisoning in order to capture credentials being transmitted on the network. T1497.001,Virtualization/Sandbox Evasion, System Checks,Astaroth can check for Windows product ID's used by sandboxes and usernames and disk serial numbers associated with analyst environments. T1497.001,Virtualization/Sandbox Evasion, System Checks, Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts such as communication with I/O ports and using VM-specific instructions. T1497.001,Virtualization/Sandbox Evasion, System Checks, BadPatch attempts to detect if it is being run in a Virtual Machine (VM) using a WMI query for disk drive name BIOS and motherboard information. T1497.001,Virtualization/Sandbox Evasion, System Checks, CSPY Downloader can search loaded modules PEB structure file paths Registry keys and memory to determine if it is being debugged or running in a virtual environment. T1497.001,Virtualization/Sandbox Evasion, System Checks, Darkhotel malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names if a filename ends with .Md5.exe and if the program is executed from the root of the C:\ drive as well as checks for sandbox-related libraries. T1497.001,Virtualization/Sandbox Evasion, System Checks, Denis ran multiple system checks looking for processor and register characteristics to evade emulation and analysis. T1497.001,Virtualization/Sandbox Evasion, System Checks, Dyre can detect sandbox analysis environments by inspecting the process list and Registry. T1497.001,Virtualization/Sandbox Evasion, System Checks, EvilBunny's dropper has checked the number of processes and the length and strings of its own file name to identify if the malware is in a sandbox environment. T1497.001,Virtualization/Sandbox Evasion, System Checks, Evilnum has used a component called TerraLoader to check certain hardware and file information to detect sandboxed environments. T1497.001,Virtualization/Sandbox Evasion, System Checks, FinFisher obtains the hardware device list and checks if the MD5 of the vendor ID is equal to a predefined list in order to check for sandbox/virtualized environments. T1497.001,Virtualization/Sandbox Evasion, System Checks, Frankenstein has used WMI queries to check if various security applications were running including VMWare and Virtualbox. T1497.001,Virtualization/Sandbox Evasion, System Checks, GoldMax will check if it is being run in a virtualized environment by comparing the collected MAC address to c8:27:cc:c2:37:5a. T1497.001,Virtualization/Sandbox Evasion, System Checks, Grandoreiro can detect VMWare via its I/O port and Virtual PC via the vpcext instruction. T1497.001,Virtualization/Sandbox Evasion, System Checks," GravityRAT uses WMI to check the BIOS and manufacturer information for strings like VMWare"" ""Virtual"" and ""XEN"" and another WMI request to get the current temperature of the hardware to determine if it's a virtual machine environment. " T1497.001,Virtualization/Sandbox Evasion, System Checks, InvisiMole can check for artifacts of VirtualBox Virtual PC and VMware environment and terminate itself if they are detected. T1497.001,Virtualization/Sandbox Evasion, System Checks, Lucifer can check for specific usernames computer names device drivers DLL's and virtual devices associated with sandboxed environments and can enter an infinite loop and stop itself if any are detected. T1497.001,Virtualization/Sandbox Evasion, System Checks, MegaCortex has checked the number of CPUs in the system to avoid being run in a sandbox or emulator. T1497.001,Virtualization/Sandbox Evasion, System Checks, Okrum's loader can check the amount of physical memory and terminates itself if the host has less than 1.5 Gigabytes of physical memory in total. T1497.001,Virtualization/Sandbox Evasion, System Checks, OopsIE performs several anti-VM and sandbox checks on the victim's machine. One technique the group has used was to perform a WMI query SELECT * FROM MSAcpi_ThermalZoneTemperature to check the temperature to see if itrunning in a virtual environment. T1497.001,Virtualization/Sandbox Evasion, System Checks, OSX_OCEANLOTUS.D has a variant that checks a number of system parameters to see if it is being run on real hardware or in a virtual machine environment. T1497.001,Virtualization/Sandbox Evasion, System Checks," PlugX checks if VMware tools is running in the background by searching for any process named ""vmtoolsd"". " T1497.001,Virtualization/Sandbox Evasion, System Checks," PoetRAT checked the size of the hard drive to determine if it was being run in a sandbox environment. In the event of sandbox detection it would delete itself by overwriting the malware scripts with the contents of ""License.txt"" and exiting. " T1497.001,Virtualization/Sandbox Evasion, System Checks, Pupy has a module that checks a number of indicators on the system to determine if its running on a virtual machine. T1497.001,Virtualization/Sandbox Evasion, System Checks, Remcos searches for Sandboxie and VMware on the system. T1497.001,Virtualization/Sandbox Evasion, System Checks, RogueRobin uses WMI to check BIOS version for VBOX bochs qemu virtualbox and vm to check for evidence that the script might be executing within an analysis environment. T1497.001,Virtualization/Sandbox Evasion, System Checks, ROKRAT checks for sandboxing libraries. T1497.001,Virtualization/Sandbox Evasion, System Checks, Smoke Loader scans processes to perform anti-VM checks. T1497.001,Virtualization/Sandbox Evasion, System Checks, SUNBURST checked the domain name of the compromised host to verify it was running in a real environment. T1497.001,Virtualization/Sandbox Evasion, System Checks, SynAck checks its directory location in an attempt to avoid launching in a sandbox. T1497.001,Virtualization/Sandbox Evasion, System Checks, ThiefQuest uses a function named is_debugging to perform anti-debugging logic. The function invokes sysctl checking the returned value of P_TRACED. ThiefQuest also calls ptrace with the PTRACE_DENY_ATTACH flag to prevent debugging. T1497.001,Virtualization/Sandbox Evasion, System Checks, Trojan.Karagany can detect commonly used and generic virtualization platforms based primarily on drivers and file paths. T1497.001,Virtualization/Sandbox Evasion, System Checks, UBoatRAT checks for virtualization software such as VMWare VirtualBox or QEmu on the compromised machine. T1497.001,Virtualization/Sandbox Evasion, System Checks," yty has some basic anti-sandbox detection that tries to detect Virtual PC Sandboxie and VMware. """ T1556.003,Modify Authentication Process, Pluggable Authentication Modules,Ebury can deactivate PAM modules to tamper with the sshd configuration. T1556.003,Modify Authentication Process, Pluggable Authentication Modules, Skidmap has the ability to replace the pam_unix.so file on an infected machine with its own malicious version that accepts a specific backdoor password for all users. T1556.003,Modify Authentication Process, Pluggable Authentication Modules,"This malware downgrades security features by deactivating pluggable authentication modules (PAM) modules. " T1556.003,Modify Authentication Process, Pluggable Authentication Modules,"The malware replaces the systempam_unix.so file (the module responsible for standard Unix authentication) with its own malicious version (detected as Backdoor.Linux.PAMDOR.A). As shown in Figure 2, this malicious pam_unix.so file accepts a specific password for any users, thus allowing the attackers to log in as any user in the machine. " T1556.003,Modify Authentication Process, Pluggable Authentication Modules,Our roadmap is pretty simple: add a custom PAM module that logs the credential in plaintext and send it to our C&C though a DNS resolution. T1556.002,Modify Authentication Process, Password Filter Dll,Remsec harvests plain-text credentials as a password filter registered on domain controllers. T1556.002,Modify Authentication Process, Password Filter Dll, Strider has registered its persistence module on domain controllers as a Windows LSA (Local System Authority) password filter to acquire credentials any time a domain local user or administrator logs in or changes a password. T1556.002,Modify Authentication Process, Password Filter Dll,"The library was masquerading as a Windows password filter, which is something administrators typically use to ensure passwords match specific requirements for length and complexity. The module started every time a network or local user logged in or changed a password, and it was able to view passcodes in plaintext. " T1556.002,Modify Authentication Process, Password Filter Dll,"ProjectSauron usually registers its persistence module on domain controllers as a Windows LSA (Local. System Authority) password filter. " T1556.002,Modify Authentication Process, Password Filter Dll,The library was registered as a Windows password filter and had access to sensitive data such as administrative passwords in cleartext. T1556.004,Modify Authentication Process, Network Device Authentication,SYNful Knock has the capability to add its own custom backdoor password when it modifies the operating system of the affected network device. T1556.004,Modify Authentication Process, Network Device Authentication,"The SYNful Knock implant consists of a modified Cisco IOS image that allows the attacker to load different functional modules provides unrestricted access using a secret backdoor password while preventing the size of the image from changing. " T1556.004,Modify Authentication Process, Network Device Authentication,"Adversaries used Patch System Image to hard code a password in the operating system, thus bypassing of native authentication mechanisms for local accounts on network devices. " T1556.004,Modify Authentication Process, Network Device Authentication,"Attacker modified the system image to provide attacker-controlled network devices access using a specific password. " T1556.004,Modify Authentication Process, Network Device Authentication,"After the initial access to the router, hackers modified its operation system in a way to install a backdoor access for network device authentication." T1556.001,Modify Authentication Process, Domain Controller Authentication,Chimera's malware has altered the NTLM authentication program on domain controllers to allow Chimera to login without a valid credential. T1556.001,Modify Authentication Process, Domain Controller Authentication, Skeleton Key is used to patch an enterprise domain controller authentication process with a backdoor password. It allows adversaries to bypass the standard authentication system to use a defined password for all accounts authenticating to that domain controller. T1556.001,Modify Authentication Process, Domain Controller Authentication,"Skeleton Key is deployed as an in-memory patch on a victim's AD domain controllers to allow the threat actor to authenticate as any user, while legitimate users can continue to authenticate as normal. " T1556.001,Modify Authentication Process, Domain Controller Authentication,"The malware employed a technique that altered the NTLM authentication program and implanted a skeleton key to allow adversaries to log-in without a valid credential. " T1556.001,Modify Authentication Process, Domain Controller Authentication,"In the RC4 initialization function, a new RC4 NTLM was injected with a pre-calculated hash value of the skeleton key. When the authentication check failed due to incorrect credentials, the RC4 decryption function prompted the authentication process to compare the credentials with the skeleton key. " T1573.002,Encrypted Channel, Asymmetric Cryptography,adbupd contains a copy of the OpenSSL library to encrypt C2 traffic. T1573.002,Encrypted Channel, Asymmetric Cryptography, A variant of ADVSTORESHELL encrypts some C2 with RSA. T1573.002,Encrypted Channel, Asymmetric Cryptography, Attor's Blowfish key is encrypted with a public RSA key. T1573.002,Encrypted Channel, Asymmetric Cryptography, Bazar can use TLS in C2 communications. T1573.002,Encrypted Channel, Asymmetric Cryptography, BISCUIT uses SSL for encrypting C2 communications. T1573.002,Encrypted Channel, Asymmetric Cryptography, Carbon has used RSA encryption for C2 communications. T1573.002,Encrypted Channel, Asymmetric Cryptography, CHOPSTICK encrypts C2 communications with TLS. T1573.002,Encrypted Channel, Asymmetric Cryptography, Cobalt Group has used the Plink utility to create SSH tunnels. T1573.002,Encrypted Channel, Asymmetric Cryptography, Cobalt Strike can use RSA asymmetric encryption with PKCS1 padding to encrypt data sent to the C2 server. T1573.002,Encrypted Channel, Asymmetric Cryptography, ComRAT can use SSL/TLS encryption for its HTTP-based C2 channel. ComRAT has used public key cryptography with RSA and AES encrypted email attachments for its Gmail C2 channel. T1573.002,Encrypted Channel, Asymmetric Cryptography, Doki has used the embedTLS library for network communications. T1573.002,Encrypted Channel, Asymmetric Cryptography, Dridex has encrypted traffic with RSA. T1573.002,Encrypted Channel, Asymmetric Cryptography, Emotet is known to use RSA keys for encrypting C2 traffic. T1573.002,Encrypted Channel, Asymmetric Cryptography, Empire can use TLS to encrypt its C2 channel. T1573.002,Encrypted Channel, Asymmetric Cryptography, FIN6 used the Plink command-line utility to create SSH tunnels to C2 servers. T1573.002,Encrypted Channel, Asymmetric Cryptography, FIN8 has used the Plink utility to tunnel RDP back to C2 infrastructure. T1573.002,Encrypted Channel, Asymmetric Cryptography, Gazer uses custom encryption for C2 that uses RSA. T1573.002,Encrypted Channel, Asymmetric Cryptography, GoldMax has RSA-encrypted its communication with the C2 server. T1573.002,Encrypted Channel, Asymmetric Cryptography, Grandoreiro can use SSL in C2 communication. T1573.002,Encrypted Channel, Asymmetric Cryptography, GreyEnergy encrypts communications using RSA-2048. T1573.002,Encrypted Channel, Asymmetric Cryptography, Hi-Zor encrypts C2 traffic with TLS. T1573.002,Encrypted Channel, Asymmetric Cryptography, IcedID has used SSL and TLS in communications with C2. T1573.002,Encrypted Channel, Asymmetric Cryptography, Koadic can use SSL and TLS for communications. T1573.002,Encrypted Channel, Asymmetric Cryptography, Machete has used TLS-encrypted FTP to exfiltrate data. T1573.002,Encrypted Channel, Asymmetric Cryptography, Metamorfo's C2 communication has been encrypted using OpenSSL. T1573.002,Encrypted Channel, Asymmetric Cryptography, OilRig used the Plink utility and other tools to create tunnels to C2 servers. T1573.002,Encrypted Channel, Asymmetric Cryptography," Operation Wocao's proxy implementation Agent"" can upgrade the socket in use to a TLS socket. " T1573.002,Encrypted Channel, Asymmetric Cryptography, Pay2Key has used RSA encrypted communications with C2. T1573.002,Encrypted Channel, Asymmetric Cryptography, Penquin can encrypt communications using the BlowFish algorithm and a symmetric key exchanged with Diffie Hellman. T1573.002,Encrypted Channel, Asymmetric Cryptography, PoetRAT used TLS to encrypt command and control (C2) communications. T1573.002,Encrypted Channel, Asymmetric Cryptography, POSHSPY encrypts C2 traffic with AES and RSA. T1573.002,Encrypted Channel, Asymmetric Cryptography, POWERSTATS has encrypted C2 traffic with RSA. T1573.002,Encrypted Channel, Asymmetric Cryptography, Pupy's default encryption for its C2 communication channel is SSL but it also has transport options for RSA and AES. T1573.002,Encrypted Channel, Asymmetric Cryptography, REvil has encrypted C2 communications with the ECIES algorithm. T1573.002,Encrypted Channel, Asymmetric Cryptography, ServHelper may set up a reverse SSH tunnel to give the attacker access to services running on the victim such as RDP. T1573.002,Encrypted Channel, Asymmetric Cryptography, StrongPity has encrypted C2 traffic using SSL/TLS. T1573.002,Encrypted Channel, Asymmetric Cryptography, Sykipot uses SSL for encrypting C2 communications. T1573.002,Encrypted Channel, Asymmetric Cryptography, Tor encapsulates traffic in multiple layers of encryption using TLS by default. T1573.002,Encrypted Channel, Asymmetric Cryptography, Trojan.Karagany can secure C2 communications with SSL and TLS. T1573.002,Encrypted Channel, Asymmetric Cryptography, Tropic Trooper has used SSL to connect to C2 servers. T1573.002,Encrypted Channel, Asymmetric Cryptography, Some Volgmer variants use SSL to encrypt C2 communications. T1573.002,Encrypted Channel, Asymmetric Cryptography, WannaCry uses Tor for command and control traffic and routes a custom cryptographic protocol over the Tor circuit. T1573.002,Encrypted Channel, Asymmetric Cryptography, WellMail can use hard coded client and certificate authority certificates to communicate with C2 over mutual TLS. T1573.002,Encrypted Channel, Asymmetric Cryptography, WellMess can communicate to C2 with mutual TLS where client and server mutually check certificates. T1573.002,Encrypted Channel, Asymmetric Cryptography, XTunnel uses SSL/TLS and RC4 to encrypt traffic. T1573.002,Encrypted Channel, Asymmetric Cryptography," Zebrocy uses SSL and AES ECB for encrypting C2 communications. """ T1036.005,Masquerading, Match Legitimate Name Or Location,"admin@338 actors used the following command to rename one of their tools to a benign file name: ren %temp%\upload"" audiodg.exe " T1036.005,Masquerading, Match Legitimate Name Or Location, The file name AcroRD32.exe a legitimate process name for Adobe's Acrobat Reader was used by APT1 as a name for malware. T1036.005,Masquerading, Match Legitimate Name Or Location, APT29 renamed a version of AdFind to sqlceip.exe or csrss.exe in an attempt to appear as the SQL Server Telemetry Client or Client Service Runtime Process respectively. T1036.005,Masquerading, Match Legitimate Name Or Location, APT32 has renamed a NetCat binary to kb-10233.exe to masquerade as a Windows update. APT32 has also renamed a Cobalt Strike beacon payload to install_flashplayers.exe. T1036.005,Masquerading, Match Legitimate Name Or Location, APT39 has used malware disguised as Mozilla Firefox and a tool named mfevtpse.exe to proxy C2 communications closely mimicking a legitimate McAfee file mfevtps.exe. T1036.005,Masquerading, Match Legitimate Name Or Location, APT41 attempted to masquerade their files as popular anti-virus software. T1036.005,Masquerading, Match Legitimate Name Or Location, BackConfig has hidden malicious payloads in %USERPROFILE%\Adobe\Driver\dwg\ and mimicked the legitimate DHCP service binary. T1036.005,Masquerading, Match Legitimate Name Or Location, BADNEWS attempts to hide its payloads using legitimate filenames. T1036.005,Masquerading, Match Legitimate Name Or Location, The Bazar loader has named malicious shortcuts adobe. T1036.005,Masquerading, Match Legitimate Name Or Location," BLINDINGCAN has attempted to hide its payload by using legitimate file names such as ""iconcache.db"". " T1036.005,Masquerading, Match Legitimate Name Or Location, Blue Mockingbird has masqueraded their XMRIG payload name by naming it wercplsupporte.dll after the legitimate wercplsupport.dll file. T1036.005,Masquerading, Match Legitimate Name Or Location, BRONZE BUTLER has given malware the same name as an existing file on the file share server to cause users to unwittingly launch and install the malware on additional systems. T1036.005,Masquerading, Match Legitimate Name Or Location, Bundlore has disguised a malicious .app file as a Flash Player update. T1036.005,Masquerading, Match Legitimate Name Or Location, Calisto's installation file is an unsigned DMG image under the guise of Integosecurity solution for mac. T1036.005,Masquerading, Match Legitimate Name Or Location," Carbanak has named malware ""svchost.exe "" which is the name of the Windows shared service host program. " T1036.005,Masquerading, Match Legitimate Name Or Location," Carberp has masqueraded as Windows system file names as well as ""chkntfs.exe"" and ""syscron.exe"". " T1036.005,Masquerading, Match Legitimate Name Or Location, ChChes copies itself to an .exe file with a filename that is likely intended to imitate Norton Antivirus but has several letters reversed (e.g. notron.exe). T1036.005,Masquerading, Match Legitimate Name Or Location, Chimera has renamed malware to GoogleUpdate.exe and WinRAR to jucheck.exe RecordedTV.ms teredo.tmp update.exe and msadcs1.exe. T1036.005,Masquerading, Match Legitimate Name Or Location, DarkComet has dropped itself onto victim machines with file names such as WinDefender.Exe and winupdate.exe in an apparent attempt to masquerade as a legitimate file. T1036.005,Masquerading, Match Legitimate Name Or Location, Darkhotel has used malware that is disguised as a Secure Shell (SSH) tool. T1036.005,Masquerading, Match Legitimate Name Or Location, Daserf uses file and folder names related to legitimate programs in order to blend in such as HP Intel Adobe and perflogs. T1036.005,Masquerading, Match Legitimate Name Or Location, Doki has disguised a file as a Linux kernel module. T1036.005,Masquerading, Match Legitimate Name Or Location, One of Dtrack can hide in replicas of legitimate programs like OllyDbg 7-Zip and FileZilla. T1036.005,Masquerading, Match Legitimate Name Or Location, If installing itself as a service fails Elise instead writes itself as a file named svchost.exe saved in %APPDATA%\Microsoft\Network. T1036.005,Masquerading, Match Legitimate Name Or Location, FatDuke has attempted to mimic a compromised user's traffic by using the same user agent as the installed browser. T1036.005,Masquerading, Match Legitimate Name Or Location, Felismus has masqueraded as legitimate Adobe Content Management System files. T1036.005,Masquerading, Match Legitimate Name Or Location, FinFisher renames one of its .dll files to uxtheme.dll in an apparent attempt to masquerade as a legitimate file. T1036.005,Masquerading, Match Legitimate Name Or Location, Fox Kitten has named binaries and configuration files svhost and dllhost respectively to appear legitimate. T1036.005,Masquerading, Match Legitimate Name Or Location, Fysbis has masqueraded as trusted software rsyncd and dbus-inotifier. T1036.005,Masquerading, Match Legitimate Name Or Location, GoldenSpy's setup file installs initial executables under the folder %WinDir%\System32\PluginManager. T1036.005,Masquerading, Match Legitimate Name Or Location, GoldMax appeared as a scheduled task impersonating systems management software within the corresponding ProgramData subfolder. T1036.005,Masquerading, Match Legitimate Name Or Location, Goopy has impersonated the legitimate goopdate.dll which was dropped on the target system with a legitimate GoogleUpdate.exe. T1036.005,Masquerading, Match Legitimate Name Or Location, Grandoreiro has named malicious browser extensions and update files to appear legitimate. T1036.005,Masquerading, Match Legitimate Name Or Location, Hildegard has disguised itself as a known Linux process. T1036.005,Masquerading, Match Legitimate Name Or Location, HTTPBrowser's installer contains a malicious file named navlu.dll to decrypt and run the RAT. navlu.dll is also the name of a legitimate Symantec DLL. T1036.005,Masquerading, Match Legitimate Name Or Location, Indrik Spider used fake updates for FlashPlayer plugin and Google Chrome as initial infection vectors. T1036.005,Masquerading, Match Legitimate Name Or Location, InnaputRAT variants have attempted to appear legitimate by using the file names SafeApp.exe and NeutralApp.exe. T1036.005,Masquerading, Match Legitimate Name Or Location, InvisiMole has disguised its droppers as legitimate software or documents matching their original names and locations and saved its files as mpr.dll in the Windows folder. T1036.005,Masquerading, Match Legitimate Name Or Location, Ixeshe has used registry values and file names associated with Adobe software such as AcroRd32.exe. T1036.005,Masquerading, Match Legitimate Name Or Location, KGH_SPY has masqueraded as a legitimate Windows tool. T1036.005,Masquerading, Match Legitimate Name Or Location," KONNI creates a shortcut called ""Anti virus service.lnk"" in an apparent attempt to masquerade as a legitimate file. " T1036.005,Masquerading, Match Legitimate Name Or Location, Lazarus Group has renamed the TAINTEDSCRIBE main executable to disguise itself as Microsoft's narrator. T1036.005,Masquerading, Match Legitimate Name Or Location, LightNeuron has used filenames associated with Exchange and Outlook for binary and configuration files such as winmail.dat. T1036.005,Masquerading, Match Legitimate Name Or Location, LookBack has a C2 proxy tool that masquerades as GUP.exe which is software used by Notepad++. T1036.005,Masquerading, Match Legitimate Name Or Location, Machete's Machete MSI installer has masqueraded as a legitimate Adobe Acrobat Reader installer. T1036.005,Masquerading, Match Legitimate Name Or Location, Machete renamed payloads to masquerade as legitimate Google Chrome Java Dropbox Adobe Reader and Python executables. T1036.005,Masquerading, Match Legitimate Name Or Location, MCMD has been named Readme.txt to appear legitimate. T1036.005,Masquerading, Match Legitimate Name Or Location, MechaFlounder has been downloaded as a file named lsass.exe which matches the legitimate Windows file. T1036.005,Masquerading, Match Legitimate Name Or Location, menuPass has been seen changing malicious files to appear legitimate. T1036.005,Masquerading, Match Legitimate Name Or Location, Metamorfo has disguised an MSI file as the Adobe Acrobat Reader Installer. T1036.005,Masquerading, Match Legitimate Name Or Location, Mis-Type saves itself as a file named msdtc.exe which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary. T1036.005,Masquerading, Match Legitimate Name Or Location, Misdat saves itself as a file named msdtc.exe which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary. T1036.005,Masquerading, Match Legitimate Name Or Location, MuddyWater has disguised malicious executables and used filenames and Registry key names associated with Windows Defender. T1036.005,Masquerading, Match Legitimate Name Or Location, Mustang Panda has used 'adobeupdate.dat' as a PlugX loader and a file named 'OneDrive.exe' to load a Cobalt Strike payload. T1036.005,Masquerading, Match Legitimate Name Or Location, NETWIRE has masqueraded as legitimate software including TeamViewer and macOS Finder. T1036.005,Masquerading, Match Legitimate Name Or Location, NOKKI is written to %LOCALAPPDATA%\MicroSoft Updatea\svServiceUpdate.exe prior being executed in a new process in an apparent attempt to masquerade as a legitimate folder and file. T1036.005,Masquerading, Match Legitimate Name Or Location," OLDBAIT installs itself in %ALLUSERPROFILE%\Application Data\Microsoft\MediaPlayer\updatewindws.exe; the directory name is missing a space and the file name is missing the letter ""o."" " T1036.005,Masquerading, Match Legitimate Name Or Location, OSX/Shlayer can masquerade as a Flash Player update. T1036.005,Masquerading, Match Legitimate Name Or Location, OwaAuth uses the filename owaauth.dll which is a legitimate file that normally resides in %ProgramFiles%\Microsoft\Exchange Server\ClientAccess\Owa\Auth\; the malicious file by the same name is saved in %ProgramFiles%\Microsoft\Exchange Server\ClientAccess\Owa\bin\. T1036.005,Masquerading, Match Legitimate Name Or Location," Patchwork installed its payload in the startup programs folder as ""Baidu Software Update."" The group also adds its second stage payload to the startup programs asNet Monitor."" They have also dropped QuasarRAT binaries as files named microsoft_network.exe and crome.exe. " T1036.005,Masquerading, Match Legitimate Name Or Location, Penquin has mimicked the Cron binary to hide itself on compromised systems. T1036.005,Masquerading, Match Legitimate Name Or Location, PipeMon modules are stored on disk with seemingly benign names including use of a file extension associated with a popular word processor. T1036.005,Masquerading, Match Legitimate Name Or Location, Pony has used the Adobe Reader icon for the downloaded file to look more trustworthy. T1036.005,Masquerading, Match Legitimate Name Or Location, Poseidon Group tools attempt to spoof anti-virus processes as a means of self-defense. T1036.005,Masquerading, Match Legitimate Name Or Location, PROMETHIUM has disguised malicious installer files by bundling them with legitimate software installers. T1036.005,Masquerading, Match Legitimate Name Or Location, PUNCHBUGGY mimics filenames from %SYSTEM%\System32 to hide DLLs in %WINDIR% and/or %TEMP%. T1036.005,Masquerading, Match Legitimate Name Or Location, Pysa has executed a malicious executable by naming it svchost.exe. T1036.005,Masquerading, Match Legitimate Name Or Location, QUADAGENT used the PowerShell filenames Office365DCOMCheck.ps1 and SystemDiskClean.ps1. T1036.005,Masquerading, Match Legitimate Name Or Location, Raindrop was installed under names that resembled legitimate Windows file and directory names. T1036.005,Masquerading, Match Legitimate Name Or Location, Ramsay has masqueraded as a 7zip installer. T1036.005,Masquerading, Match Legitimate Name Or Location, RDAT has masqueraded as VMware.exe. T1036.005,Masquerading, Match Legitimate Name Or Location, The Remsec loader implements itself with the name Security Support Provider a legitimate Windows function. Various Remsec .exe files mimic legitimate file names used by Microsoft Symantec Kaspersky Hewlett-Packard and VMWare. Remsec also disguised malicious modules using similar filenames as custom network encryption software on victims. T1036.005,Masquerading, Match Legitimate Name Or Location, REvil can mimic the names of known executables. T1036.005,Masquerading, Match Legitimate Name Or Location," Rocke has used shell scripts which download mining executables and saves them with the filename ""java"". " T1036.005,Masquerading, Match Legitimate Name Or Location, Ryuk has constructed legitimate appearing installation folder paths by calling GetWindowsDirectoryW and then inserting a null byte at the fourth character of the path. For Windows Vista or higher the path would appear as C:\Users\Public. T1036.005,Masquerading, Match Legitimate Name Or Location, S-Type may save itself as a file named msdtc.exe which is also the name of the legitimate Microsoft Distributed Transaction Coordinator service binary. T1036.005,Masquerading, Match Legitimate Name Or Location, Sandworm Team has avoided detection by naming a malicious binary explorer.exe. T1036.005,Masquerading, Match Legitimate Name Or Location, ShimRatReporter spoofed itself as AlphaZawgyl_font.exe a specialized Unicode font. T1036.005,Masquerading, Match Legitimate Name Or Location, Sibot has downloaded a DLL to the C:\windows\system32\drivers\ folder and renamed it with a .sys extension. T1036.005,Masquerading, Match Legitimate Name Or Location, Sidewinder has named malicious files rekeywiz.exe to match the name of a legitimate Windows executable. T1036.005,Masquerading, Match Legitimate Name Or Location," Silence has named its backdoor ""WINWORD.exe"". " T1036.005,Masquerading, Match Legitimate Name Or Location, Skidmap has created a fake rm binary to replace the legitimate Linux binary. T1036.005,Masquerading, Match Legitimate Name Or Location, SLOTHFULMEDIA has mimicked the names of known executables such as mediaplayer.exe. T1036.005,Masquerading, Match Legitimate Name Or Location, Sowbug named its tools to masquerade as Windows or Adobe Reader software such as by using the file name adobecms.exe and the directory CSIDL_APPDATA\microsoft\security. T1036.005,Masquerading, Match Legitimate Name Or Location, To establish persistence SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as anOffice StartYahoo TalkMSN Gaming Z0ne orMSN Talk❠shortcut. T1036.005,Masquerading, Match Legitimate Name Or Location, Starloader has masqueraded as legitimate software update packages such as Adobe Acrobat Reader and Intel. T1036.005,Masquerading, Match Legitimate Name Or Location, StrongPity has been bundled with legitimate software installation files for disguise. T1036.005,Masquerading, Match Legitimate Name Or Location, SUNBURST created VBScripts that were named after existing services or folders to blend into legitimate activities. T1036.005,Masquerading, Match Legitimate Name Or Location, SUNSPOT was identified on disk with a filename of taskhostsvc.exe and it created an encrypted log file at C:\Windows\Temp\vmware-vmdmp.log. T1036.005,Masquerading, Match Legitimate Name Or Location, SUPERNOVA has masqueraded as a legitimate SolarWinds DLL. T1036.005,Masquerading, Match Legitimate Name Or Location, The TAINTEDSCRIBE main executable has disguised itself as MicrosoftNarrator. T1036.005,Masquerading, Match Legitimate Name Or Location, TEARDROP files had names that resembled legitimate Window file and directory names. T1036.005,Masquerading, Match Legitimate Name Or Location, TEMP.Veles has renamed files to look like legitimate files such as Windows update files or Schneider Electric application files. T1036.005,Masquerading, Match Legitimate Name Or Location, ThiefQuest prepends a copy of itself to the beginning of an executable file while maintaining the name of the executable. T1036.005,Masquerading, Match Legitimate Name Or Location, Tropic Trooper has hidden payloads in Flash directories and fake installer files. T1036.005,Masquerading, Match Legitimate Name Or Location, UNC2452 renamed a version of AdFind to sqlceip.exe or csrss.exe in an attempt to appear as the SQL Server Telemetry Client or Client Service Runtime Process respectively. T1036.005,Masquerading, Match Legitimate Name Or Location, Ursnif has used strings from legitimate system files and existing folders for its file folder and Registry entry names. T1036.005,Masquerading, Match Legitimate Name Or Location, USBStealer mimics a legitimate Russian program called USB Disk Security. T1036.005,Masquerading, Match Legitimate Name Or Location, Whitefly has named the malicious DLL the same name as DLLs belonging to legitimate software from various security vendors. T1036.005,Masquerading, Match Legitimate Name Or Location, A Winnti for Windows implant file was named ASPNET_FILTER.DLL mimicking the legitimate ASP.NET ISAPI filter DLL with the same name. T1036.005,Masquerading, Match Legitimate Name Or Location," ZLib mimics the resource version information of legitimate Realtek Semiconductor Nvidia or Synaptics modules.""" T1562.001,Impair Defenses, Disable Or Modify Tools,Agent Tesla has the capability to kill any running analysis processes and AV software. T1562.001,Impair Defenses, Disable Or Modify Tools, APT29 used the service control manager on a remote system to disable services associated with security monitoring products. T1562.001,Impair Defenses, Disable Or Modify Tools, Bazar has manually loaded ntdll from disk in order to identity and remove API hooks set by security products. T1562.001,Impair Defenses, Disable Or Modify Tools, Brave Prince terminates antimalware processes. T1562.001,Impair Defenses, Disable Or Modify Tools, BRONZE BUTLER has incorporated code into several tools that attempts to terminate anti-virus processes. T1562.001,Impair Defenses, Disable Or Modify Tools, Bundlore can change macOS security settings and browser preferences to enable follow-on behaviors. T1562.001,Impair Defenses, Disable Or Modify Tools, Carberp has attempted to disable security software by creating a suspended process for the security software and injecting code to delete antivirus core files when the process is resumed. T1562.001,Impair Defenses, Disable Or Modify Tools, ChChes can alter the victim's proxy configuration. T1562.001,Impair Defenses, Disable Or Modify Tools, Cobalt Strike has the ability to use Smart Applet attacks to disable the Java SecurityManager sandbox. T1562.001,Impair Defenses, Disable Or Modify Tools, DarkComet can disable Security Center functions like anti-virus. T1562.001,Impair Defenses, Disable Or Modify Tools, Ebury can disable SELinux Role-Based Access Control and deactivate PAM modules. T1562.001,Impair Defenses, Disable Or Modify Tools, Egregor has disabled Windows Defender to evade protections. T1562.001,Impair Defenses, Disable Or Modify Tools, FIN6 has deployed a utility script named kill.bat to disable anti-virus. T1562.001,Impair Defenses, Disable Or Modify Tools, Gamaredon Group has delivered macros which can tamper with Microsoft Office security settings. T1562.001,Impair Defenses, Disable Or Modify Tools, Gold Dragon terminates anti-malware processes if theyre found running on the system. T1562.001,Impair Defenses, Disable Or Modify Tools, Goopy has the ability to disable Microsoft Outlook's security policies to disable macro warnings. T1562.001,Impair Defenses, Disable Or Modify Tools, Gorgon Group malware can attempt to disable security features in Microsoft Office and Windows Defender using the taskkill command. T1562.001,Impair Defenses, Disable Or Modify Tools, Grandoreiro can hook APIs kill processes break file system paths and change ACLs to prevent security tools from running. T1562.001,Impair Defenses, Disable Or Modify Tools, H1N1 kills and disables services for Windows Security Center and Windows Defender. T1562.001,Impair Defenses, Disable Or Modify Tools, HDoor kills anti-virus found on the victim. T1562.001,Impair Defenses, Disable Or Modify Tools, Hildegard has modified DNS resolvers to evade DNS monitoring tools. T1562.001,Impair Defenses, Disable Or Modify Tools, Imminent Monitor has a feature to disable Windows Task Manager. T1562.001,Impair Defenses, Disable Or Modify Tools, JPIN can lower security settings by changing Registry keys. T1562.001,Impair Defenses, Disable Or Modify Tools, Kimsuky has been observed turning off Windows Security Center. T1562.001,Impair Defenses, Disable Or Modify Tools, Lazarus Group malware TangoDelta attempts to terminate various processes associated with McAfee. Additionally Lazarus Group malware SHARPKNOT disables the Microsoft Windows System Event Notification and Alerter services.. During a 2019 intrusion Lazarus Group disabled Windows Defender and Credential Guard as some of their first actions on host. T1562.001,Impair Defenses, Disable Or Modify Tools," LockerGoga installation has been immediately preceded by a task kill"" command in order to disable anti-virus. " T1562.001,Impair Defenses, Disable Or Modify Tools, Maze has disabled dynamic analysis and other security tools including IDA debugger x32dbg and OllyDbg. It has also disabled Windows Defender's Real-Time Monitoring feature and attempted to disable endpoint protection services. T1562.001,Impair Defenses, Disable Or Modify Tools, MegaCortex was used to kill endpoint security processes. T1562.001,Impair Defenses, Disable Or Modify Tools, Metamorfo has a function to kill processes associated with defenses and can prevent certain processes from launching. T1562.001,Impair Defenses, Disable Or Modify Tools, MuddyWater can disable the system's local proxy settings. T1562.001,Impair Defenses, Disable Or Modify Tools, NanHaiShu can change Internet Explorer settings to reduce warnings about malware activity. T1562.001,Impair Defenses, Disable Or Modify Tools, NanoCore can modify the victim's anti-virus. T1562.001,Impair Defenses, Disable Or Modify Tools, Netwalker can detect and terminate active security software-related processes on infected systems. T1562.001,Impair Defenses, Disable Or Modify Tools, Night Dragon has disabled anti-virus and anti-spyware tools in some instances on the victimmachines. The actors have also disabled proxy settings to allow direct communication from victims to the Internet. T1562.001,Impair Defenses, Disable Or Modify Tools, POWERSTATS can disable Microsoft Office Protected View by changing Registry keys. T1562.001,Impair Defenses, Disable Or Modify Tools, Proton kills security tools like Wireshark that are running. T1562.001,Impair Defenses, Disable Or Modify Tools, Malware used by Putter Panda attempts to terminate processes corresponding to two components of Sophos Anti-Virus (SAVAdminService.exe and SavService.exe). T1562.001,Impair Defenses, Disable Or Modify Tools, Pysa has the capability to stop antivirus services and disable Windows Defender. T1562.001,Impair Defenses, Disable Or Modify Tools, Ragnar Locker has attempted to terminate/stop processes and services associated with endpoint security products. T1562.001,Impair Defenses, Disable Or Modify Tools, REvil can connect to and disable the Symantec server on the victim's network. T1562.001,Impair Defenses, Disable Or Modify Tools, RobbinHood will search for Windows services that are associated with antivirus software on the system and kill the process. T1562.001,Impair Defenses, Disable Or Modify Tools, Rocke used scripts which detected and uninstalled antivirus software. T1562.001,Impair Defenses, Disable Or Modify Tools, RunningRAT kills antimalware running process. T1562.001,Impair Defenses, Disable Or Modify Tools, Ryuk has stopped services related to anti-virus. T1562.001,Impair Defenses, Disable Or Modify Tools, Skidmap has the ability to set SELinux to permissive mode. T1562.001,Impair Defenses, Disable Or Modify Tools, SslMM identifies and kills anti-malware processes. T1562.001,Impair Defenses, Disable Or Modify Tools, StrongPity can add directories used by the malware to the Windows Defender exclusions list to prevent detection. T1562.001,Impair Defenses, Disable Or Modify Tools, SUNBURST attempted to disable software security services following checks against a FNV-1a + XOR hashed hardcoded blocklist. T1562.001,Impair Defenses, Disable Or Modify Tools, ThiefQuest uses the function kill_unwanted to obtain a list of running processes and kills each process matching a list of security related processes. T1562.001,Impair Defenses, Disable Or Modify Tools, TinyZBot can disable Avira anti-virus. T1562.001,Impair Defenses, Disable Or Modify Tools, TrickBot can disable Windows Defender. T1562.001,Impair Defenses, Disable Or Modify Tools, Turla has used a AMSI bypass which patches the in-memory amsi.dll in PowerShell scripts to bypass Windows antimalware products. T1562.001,Impair Defenses, Disable Or Modify Tools, UNC2452 used the service control manager on a remote system to disable services associated with security monitoring products. T1562.001,Impair Defenses, Disable Or Modify Tools, Unknown Logger has functionality to disable security tools including Kaspersky BitDefender and MalwareBytes. T1562.001,Impair Defenses, Disable Or Modify Tools, Wizard Spider has shut down or uninstalled security applications on victim systems that might prevent ransomware from executing. T1562.001,Impair Defenses, Disable Or Modify Tools," ZxShell can kill AV products' processes. """ T1593.001,Search Open Websites/Domains, Social Media,Kimsuky has used Twitter to monitor potential victims and to prepare targeted phishing e-mails. T1593.001,Search Open Websites/Domains, Social Media,"Hackers use social media observe activities by interns or new employees from targeted organizations and find relevant information using hashtags such as #NewJob, #Firstday, #internship, #FirstDayatWork, etc. " T1593.001,Search Open Websites/Domains, Social Media,"Attackers analyzed company employees social media images to try to find information like internal office layouts, desktop applications, digital files, badge pictures, Outlook calendars in the background of a quintessential coffee cup post, passwords openly written over whiteboards and desks, etc. " T1593.001,Search Open Websites/Domains, Social Media,"A short video shared by an employee about a day in the office may provide the attackers with check-in procedures, building layout, parking structure, weak door controls, credentials, employees' dress code/ trappings, premise security arrangements, operating systems, antivirus choice, phone numbers, and much more. " T1593.001,Search Open Websites/Domains, Social Media,This group was identifying employees social media accounts and researching interpersonal connection to abuse it in the following spear phishing attacks. T1593.002,Search Open Websites/Domains, Search Engines,"APT 31 used its own anonymization network to collect information on the victimwebsite via search engine queries. " T1593.002,Search Open Websites/Domains, Search Engines,"FileCobaltStrike MANUAL_V2 .docx encourage affiliates to search for the right victims based on income found using google dorks. " T1593.002,Search Open Websites/Domains, Search Engines,"The following Google Dork was used to detect vulnerable or hacked servers. " T1593.002,Search Open Websites/Domains, Search Engines,"Attackers were able to collect plaintext passwords from a specially crafted Google query looking for publicly exposed .env files. " T1593.002,Search Open Websites/Domains, Search Engines,"This group used search engine queries to inspect victim organization website for logfiles, spreadsheets, and other documents potentially exposing sensitive information." T1596.002,Search Open Technical Databases, Whois,Kaseya has used a single IP address in a range to find the total size of the range. T1596.002,Search Open Technical Databases, Whois, Domain names can be used to find ownership and contact information. T1596.002,Search Open Technical Databases, Whois, WHOIS can be queried for assigned IP block and DNS name. T1596.002,Search Open Technical Databases, Whois," Kaseya has used active scanning for reconnaissance on networks, open ports, and services.. " T1596.002,Search Open Technical Databases, Whois, Kaseya has used Shodan to establish operational resources that can be exploited. T1596.005,Search Open Technical Databases, Scan Databases,"Adversaries can search public databases for active IP addresses, hostnames, open ports, certificates, and even server banners. " T1596.005,Search Open Technical Databases, Scan Databases, Threat actors can use online resources and lookup tools to harvest information from these services. T1596.005,Search Open Technical Databases, Scan Databases, REvil has performed recon against victims by scanning for vulnerable services and open ports. T1596.005,Search Open Technical Databases, Scan Databases, Attackers can use passive and active methods to obtain active port services. T1596.005,Search Open Technical Databases, Scan Databases, Threat actors can use shodan to search for internet-facing hosts and IP addresses. T1596.001,Search Open Technical Databases, Dns/Passive Dns,Threat actors search DNS records to gather information about target hosts. T1596.001,Search Open Technical Databases, Dns/Passive Dns, Adversaries can use DNS to discover subdomains. T1596.001,Search Open Technical Databases, Dns/Passive Dns, Threat actors can use DNS misconfigurations for initial access. T1596.001,Search Open Technical Databases, Dns/Passive Dns, Threat actors can search central repositories of logged responses for information. T1596.001,Search Open Technical Databases, Dns/Passive Dns, DNS leaks can provide information about a domain to attackers. T1596.001,Search Open Technical Databases, Dns/Passive Dns, Adversaries use the DNS information of mail servers as a pivot to attack. T1596.003,Search Open Technical Databases, Digital Certificates,Threat actors use site certificates to gain intel about a target. T1596.003,Search Open Technical Databases, Digital Certificates, Threat Actors often perform reconnaissance through data searching via digital certificates. T1596.003,Search Open Technical Databases, Digital Certificates, Threat actors check digital certificates for geolocation information to ascertain if a potential target is outwith their protected regions. T1596.003,Search Open Technical Databases, Digital Certificates, Certain CobaltStrike functionality allows the malware to check openly available digital security data to assist in reconnaissance. T1596.003,Search Open Technical Databases, Digital Certificates, APT27 often checks digital certificates to consolidate and contribute to their information before launching an attack. T1596.004,Search Open Technical Databases, Cdns,Adversaries use content delivery networks to discover centralized assets. T1596.004,Search Open Technical Databases, Cdns, Threat actors can find leaked CDN content that may not have protections of other assets and can be exploited. T1596.004,Search Open Technical Databases, Cdns, CDNs may incorrectly expose login portals on the internet. T1596.004,Search Open Technical Databases, Cdns, Threat actors can use OSINT tools to scan open CDN repositories. T1596.004,Search Open Technical Databases, Cdns, Attackers can use found assets to determine links to CDNs. T1597.001,Search Closed Sources, Threat Intel Vendors,Threat actors can use threat intel feeds for valuable information. T1597.001,Search Closed Sources, Threat Intel Vendors, Threat actors can use paid platforms to monitor what intelligence is being provided to potential targets. T1597.001,Search Closed Sources, Threat Intel Vendors, Adversaries can monitor what IOCs are being discovered about their campaign to change tactics. T1597.001,Search Closed Sources, Threat Intel Vendors, Threat actors can determine what other groups are targeting through intel platforms. T1597.001,Search Closed Sources, Threat Intel Vendors, Threat actors can use intelligence feeds to target new victims. T1597.002,Search Closed Sources, Purchase Technical Data,Adversaries may purchase technical information about victims that can be used during targeting. T1597.002,Search Closed Sources, Purchase Technical Data, Threat actors may purchase information from dark web or black markets. T1597.002,Search Closed Sources, Purchase Technical Data, Reputable private resources have scan database subscriptions. T1597.002,Search Closed Sources, Purchase Technical Data, Attackers can use known or unknown repositories of data from tor sites. T1597.002,Search Closed Sources, Purchase Technical Data, Threat actors can gain network and login information purchased from other attacker groups. T1598.001,Phishing for Information, Spearphishing Service,Attackers will use spearphishing messages to elicit sensative information from targets. T1598.001,Phishing for Information, Spearphishing Service, Spearphishing uses social engineering techniques to get credentials or other information. T1598.001,Phishing for Information, Spearphishing Service," Emails or social media messaging spearphishing is generally aimed at IT departments, C-suite executives, or non-tech related departments. " T1598.001,Phishing for Information, Spearphishing Service, Threat actors use spearphishing against non-enterprise controlled services as they have less protections. T1598.001,Phishing for Information, Spearphishing Service, Adversaries may pose as recruiters to garner interest and communication. T1598.003,Phishing for Information, Spearphishing Link,APT32 has used malicious links to direct users to web pages designed to harvest credentials. T1598.003,Phishing for Information, Spearphishing Link, Kimsuky has used links in e-mail to steal account information. T1598.003,Phishing for Information, Spearphishing Link, Sandworm Team has crafted spearphishing emails with hyperlinks designed to trick unwitting recipients into revealing their account credentials. T1598.003,Phishing for Information, Spearphishing Link, Sidewinder has sent e-mails with malicious links to credential harvesting websites. T1598.003,Phishing for Information, Spearphishing Link, Silent Librarian has used links in e-mails to direct victims to credential harvesting websites designed to appear like the targeted organization's login page. T1588.003,Obtain Capabilities, Code Signing Certificates,MegaCortex has used code signing certificates issued to fake companies to bypass security controls. T1588.003,Obtain Capabilities, Code Signing Certificates, Wizard Spider obtained a code signing certificate signed by Digicert for some of its malware. T1588.003,Obtain Capabilities, Code Signing Certificates,Adversaries may buy code signing certificates to use during targeting. T1588.003,Obtain Capabilities, Code Signing Certificates, Certificates for fake companies provide legitimacy to run arbitrary code on targeted systems. T1588.003,Obtain Capabilities, Code Signing Certificates, Adversaries may also steal code signing materials directly from a compromised third-party. T1585.001,Establish Accounts, Social Media Accounts,APT32 has set up Facebook pages in tandem with fake websites. T1585.001,Establish Accounts, Social Media Accounts, Cleaver has created fake LinkedIn profiles that included profile photos details and connections. T1585.001,Establish Accounts, Social Media Accounts, Fox Kitten has used a Twitter account to communicate with ransomware victims. T1585.001,Establish Accounts, Social Media Accounts, Sandworm Team has established social media accounts to disseminate victim internal-only documents and other sensitive data. T1585.001,Establish Accounts, Social Media Accounts,Leviathan has created new social media accounts for targeting efforts. T1585.002,Establish Accounts, Email Accounts,APT1 has created email accounts for later use in social engineering phishing and when registering domains. T1585.002,Establish Accounts, Email Accounts, Magic Hound has established email accounts using fake personas for spear-phishing operations. T1585.002,Establish Accounts, Email Accounts, Sandworm Team has created email accounts that mimic legitimate organizations for its spearphishing operations. T1585.002,Establish Accounts, Email Accounts, Silent Librarian has established e-mail accounts to receive e-mails forwarded from compromised accounts. T1585.002,Establish Accounts, Email Accounts,Leviathan has created new email accounts for targeting efforts. T1587.001,Develop Capabilities, Malware,APT29 developed SUNSPOT SUNBURST TEARDROP and Raindrop; SUNSPOT and SUNBURST were tailored to be incorporated into SolarWind's Orion software library. T1587.001,Develop Capabilities, Malware, Cleaver has created customized tools and payloads for functions including ARP poisoning encryption credential dumping ASP.NET shells web backdoors process enumeration WMI querying HTTP and SMB communications network interface sniffing and keystroke logging. T1587.001,Develop Capabilities, Malware, FIN7 has developed malware for use in operations including the creation of infected removable media. T1587.001,Develop Capabilities, Malware, Lazarus Group has developed several custom malware for use in operations. T1587.001,Develop Capabilities, Malware, Night Dragon used privately developed and customized remote access tools. T1587.001,Develop Capabilities, Malware, Sandworm Team has developed malware for its operations including malicious mobile applications and destructive malware such as NotPetya and Olympic Destroyer. T1587.001,Develop Capabilities, Malware, Turla has developed its own unique malware for use in operations. T1587.001,Develop Capabilities, Malware, UNC2452 developed SUNSPOT SUNBURST TEARDROP and Raindrop; SUNSPOT and SUNBURST were tailored to be incorporated into SolarWind's Orion software library. T1587.004,Develop Capabilities, Exploits,Phosphorous has been deploying ransomware using a Log4J exploit. T1587.004,Develop Capabilities, Exploits, Wizard Spider developed an exploit targeting CVE-2021-40444. T1587.004,Develop Capabilities, Exploits, Adversaries may develop exploits that can be used during targeting. T1587.004,Develop Capabilities, Exploits, DEV-0322 created exploits for ZOHO ManageEngine ADSelfService Plus software. T1587.004,Develop Capabilities, Exploits," TG1021 uses a custom-made malware framework, built around a common core, tailor-made for IIS servers. " T1587.002,Develop Capabilities, Code Signing Certificates,Patchwork has created self-signed certificates from fictitious and spoofed legitimate software companies that were later used to sign malware. T1587.002,Develop Capabilities, Code Signing Certificates, PROMETHIUM has created self-signed certificates to sign malicious installers. T1587.002,Develop Capabilities, Code Signing Certificates,Adversaries may create self-signed code signing certificates that can be used during targeting. T1587.002,Develop Capabilities, Code Signing Certificates," Users are more likely to run signed code certificates, which can be attached to malware. " T1587.002,Develop Capabilities, Code Signing Certificates, Malware actors can spoof legitimate certificates. T1584.006,Compromise Infrastructure, Web Services,Turla has frequently used compromised WordPress sites for C2 infrastructure. T1584.006,Compromise Infrastructure, Web Services,Adversaries may compromise access to third-party web services that can be used during targeting. T1584.006,Compromise Infrastructure, Web Services," Adversaries may try to take ownership of a legitimate user's access to a web service and use that web service as infrastructure in support of cyber operations. " T1584.006,Compromise Infrastructure, Web Services," Using common services, such as those offered by Google or Twitter, makes it easier for adversaries to hide in expected noise. " T1584.006,Compromise Infrastructure, Web Services," NotPetya, it is suspected that attackers compromised a vulnerable server used to distribute the software and replaced the legitimate code with their compromised version. " T1584.003,Compromise Infrastructure, Virtual Private Server,Turla has used the VPS infrastructure of compromised Iranian threat actors. T1584.003,Compromise Infrastructure, Virtual Private Server,"By compromising a VPS to use as infrastructure, adversaries can make it difficult to physically tie back operations to themselves. " T1584.003,Compromise Infrastructure, Virtual Private Server, NOBELLIUM compromised a Microsoft Azure AD account within a Cloud Service Provider(CSP) tenant. T1584.003,Compromise Infrastructure, Virtual Private Server, UNC2452 provisioned a system within Microsoft Azure that was within close proximity to a legitimate Azure-hosted system belonging to the CSP that they used to access their customerenvironment. T1584.003,Compromise Infrastructure, Virtual Private Server, A threat actor performed initial reconnaissance via a VPS provider located in the same region as the victim. T1584.004,Compromise Infrastructure, Server,APT16 has compromised otherwise legitimate sites as staging servers for second-stage payloads. T1584.004,Compromise Infrastructure, Server, Indrik Spider has served fake updates via legitimate websites that have been compromised. T1584.004,Compromise Infrastructure, Server, Turla has used compromised servers as infrastructure. T1584.004,Compromise Infrastructure, Server,Malicious emails sent to targets contain links to a compromised server that redirects to the download of Janeleiro. T1584.004,Compromise Infrastructure, Server, Candiru operators compromised several high-profile websites. T1584.001,Compromise Infrastructure, Domains,APT1 hijacked FQDNs associated with legitimate websites hosted by hop points. T1584.001,Compromise Infrastructure, Domains, APT29 has compromised domains to use for C2. T1584.001,Compromise Infrastructure, Domains, UNC2452 has compromised domains to use for C2. T1584.001,Compromise Infrastructure, Domains,Magic Hound has used compromised domains to host links targeted to specific phishing victims. T1584.001,Compromise Infrastructure, Domains, Transparent Tribe has compromised domains for use in targeted malicious campaigns. T1584.002,Compromise Infrastructure, Dns Server,"Adversaries may utilize DNS traffic for various tasks, including for Command and Control. " T1584.002,Compromise Infrastructure, Dns Server, Adversaries may compromise third-party DNS servers that can be used during targeting. T1584.002,Compromise Infrastructure, Dns Server, Threat actors can alter DNS records. T1584.002,Compromise Infrastructure, Dns Server," DNS control can allow for redirection of an organization's traffic, facilitating Collection and Credential Access efforts for the adversary. " T1584.002,Compromise Infrastructure, Dns Server, Adversaries may also be able to silently create subdomains pointed at malicious servers without tipping off the actual owner of the DNS server. T1584.005,Compromise Infrastructure, Botnet,Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. T1584.005,Compromise Infrastructure, Botnet," Attackers may conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers. " T1584.005,Compromise Infrastructure, Botnet, FreakOut attacked POS systems in order to use them as a botnet infrastructure. T1584.005,Compromise Infrastructure, Botnet, Mirai malware created a botnet used by multiple threat actor groups. T1584.005,Compromise Infrastructure, Botnet, Meris attacked Yandex with DDOS using botnets. T1586.001,Compromise Accounts, Social Media Accounts,Leviathan has compromised social media accounts to conduct social engineering attacks. T1586.001,Compromise Accounts, Social Media Accounts, Adversaries may compromise social media accounts that can be used during targeting. T1586.001,Compromise Accounts, Social Media Accounts," Utilizing an existing persona may engender a level of trust in a potential victim if they have a relationship, or knowledge of, the compromised persona. " T1586.001,Compromise Accounts, Social Media Accounts," Attackers can gather credentials via Phishing for Information, purchasing credentials from third-party sites, or by brute forcing credentials. " T1586.001,Compromise Accounts, Social Media Accounts, Attacker personas may exist on a single site or across multiple sites. T1586.002,Compromise Accounts, Email Accounts,Kimsuky has compromised web portal email accounts to send spearphishing e-mails. T1586.002,Compromise Accounts, Email Accounts, Magic Hound has compromised personal email accounts through the use of legitimate credentials and gathered additional victim information. T1586.002,Compromise Accounts, Email Accounts,IndigoZebra has compromised legitimate email accounts to use in their spearphishing operations. T1586.002,Compromise Accounts, Email Accounts, Leviathan has compromised email accounts to conduct social engineering attacks. T1586.002,Compromise Accounts, Email Accounts, Emotet compromised email systems to spread the trojan. T1583.006,Acquire Infrastructure, Web Services,APT17 has created profile pages in Microsoft TechNet that were used as C2 infrastructure. T1583.006,Acquire Infrastructure, Web Services, APT29 has registered algorithmically generated Twitter handles that are used for C2 by malware such as HAMMERTOSS. T1583.006,Acquire Infrastructure, Web Services, APT32 has set up Dropbox Amazon S3 and Google Drive to host malicious downloads. T1583.006,Acquire Infrastructure, Web Services, HAFNIUM has acquired web services for use in C2 and exfiltration. T1583.006,Acquire Infrastructure, Web Services, Lazarus Group has hosted malicious downloads on Github. T1583.006,Acquire Infrastructure, Web Services, MuddyWater has used file sharing services including OneHub to distribute tools. T1583.006,Acquire Infrastructure, Web Services, Turla has created web accounts including Dropbox and GitHub for C2 and document exfiltration. T1583.006,Acquire Infrastructure, Web Services, ZIRCONIUM has used GitHub to host malware linked in spearphishing e-mails. T1583.003,Acquire Infrastructure, Virtual Private Server,HAFNIUM has operated from leased virtual private servers (VPS) in the United States. T1583.003,Acquire Infrastructure, Virtual Private Server, TEMP.Veles has used Virtual Private Server (VPS) infrastructure. T1583.003,Acquire Infrastructure, Virtual Private Server,Adversaries may rent Virtual Private Servers (VPSs) that can be used during targeting. T1583.003,Acquire Infrastructure, Virtual Private Server, Attackers can make it difficult to physically tie back operations to them using a VPS. T1583.003,Acquire Infrastructure, Virtual Private Server, Adversaries may also acquire infrastructure from VPS service providers that are known for renting VPSs with minimal registration information. T1583.004,Acquire Infrastructure, Server,GALLIUM has used Taiwan-based servers that appear to be exclusive to GALLIUM. T1583.004,Acquire Infrastructure, Server, Sandworm Team has leased servers from resellers instead of leasing infrastructure directly from hosting companies to enable its operations. T1583.004,Acquire Infrastructure, Server,"Adversaries may buy, lease, or rent physical servers that can be used during targeting. " T1583.004,Acquire Infrastructure, Server, FamousSparrow rented servers at Shanghai Ruisu Network Technology and DAOU TECHNOLOGY. T1583.004,Acquire Infrastructure, Server, SparklingGoblin uses servers hosted by various providers for its C&C servers. T1583.001,Acquire Infrastructure, Domains,APT1 has registered hundreds of domains for use in operations. T1583.001,Acquire Infrastructure, Domains, APT28 registered domains imitating NATO OSCE security websites Caucasus information resources and other organizations. T1583.001,Acquire Infrastructure, Domains, APT29 has acquired C2 domains through resellers. T1583.001,Acquire Infrastructure, Domains, APT32 has set up and operated websites to gather information and deliver malware. T1583.001,Acquire Infrastructure, Domains, Kimsuky has registered domains to spoof targeted organizations and trusted third parties. T1583.001,Acquire Infrastructure, Domains, Lazarus Group has acquired infrastructure related to their campaigns to act as distribution points and C2 channels. T1583.001,Acquire Infrastructure, Domains, menuPass has registered malicious domains for use in intrusion campaigns. T1583.001,Acquire Infrastructure, Domains, Mustang Panda have acquired C2 domains prior to operations. T1583.001,Acquire Infrastructure, Domains, Sandworm Team has registered domain names and created URLs that are often designed to mimic or spoof legitimate websites such as email login pages online file sharing and storage websites and password reset pages. T1583.001,Acquire Infrastructure, Domains, Silent Librarian has acquired domains to establish credential harvesting pages often spoofing the target organization and using free top level domains .TK .ML .GA .CF and .GQ. T1583.001,Acquire Infrastructure, Domains, UNC2452 has acquired C2 domains through resellers. T1583.001,Acquire Infrastructure, Domains, ZIRCONIUM has purchased domains for use in targeted campaigns. T1583.002,Acquire Infrastructure, Dns Server,Attackers may opt to configure and run their own DNS servers in support of operations. T1583.002,Acquire Infrastructure, Dns Server," Adversaries may utilize DNS traffic for various tasks, including for Command and Control. " T1583.002,Acquire Infrastructure, Dns Server, APT31 will utilize their own DNS server for use when conducting malicious activities. T1583.002,Acquire Infrastructure, Dns Server," Moses Staff will acquire their own infrastructure, usually domains and DNS. " T1583.002,Acquire Infrastructure, Dns Server, TigerRAT variants can be modified to utilize a threat actor's own DNS infrastructure. T1583.005,Acquire Infrastructure, Botnet,Adversaries may compromise numerous third-party systems to form a botnet that can be used during targeting. T1583.005,Acquire Infrastructure, Botnet," Attackers may conduct a takeover of an existing botnet, such as redirecting bots to adversary-controlled C2 servers. " T1583.005,Acquire Infrastructure, Botnet, FreakOut attacked POS systems in order to use them as a botnet infrastructure. T1583.005,Acquire Infrastructure, Botnet, Mirai malware created a botnet used by multiple threat actor groups. T1583.005,Acquire Infrastructure, Botnet, Meris attacked Yandex with DDOS using botnets. T1587.003,Develop Capabilities, Digital Certificates,APT29 has created self-signed digital certificates to enable mutual TLS authentication for malware. T1587.003,Develop Capabilities, Digital Certificates, PROMETHIUM has created self-signed digital certificates for use in HTTPS C2 traffic. T1587.003,Develop Capabilities, Digital Certificates,"Adversaries may create self-signed SSL/TLS certificates that can be used to further their operations, such as encrypting C2 traffic. " T1587.003,Develop Capabilities, Digital Certificates, UNC2190 created self-signed certificates to spread SABBATH ransomware. T1587.003,Develop Capabilities, Digital Certificates, FIN13 used SSL certificates for C2 communication via email. T1588.004,Obtain Capabilities, Digital Certificates,Lazarus Group has obtained SSL certificates for their C2 domains. T1588.004,Obtain Capabilities, Digital Certificates, Silent Librarian has obtained free Let's Encrypt SSL certificates for use on their phishing pages. T1588.004,Obtain Capabilities, Digital Certificates,Adversaries may buy and/or steal SSL/TLS certificates that can be used during targeting. T1588.004,Obtain Capabilities, Digital Certificates," Certificate authorities exist that allow adversaries to acquire SSL/TLS certificates, such as domain validation certificates, for free. " T1588.004,Obtain Capabilities, Digital Certificates, Adversaries may register or hijack domains that they will later purchase an SSL/TLS certificate for.. T1555.005,Credentials from Password Stores, Password Managers,Fox Kitten has used scripts to access credential information from the KeePass database. T1555.005,Credentials from Password Stores, Password Managers, Operation Wocao has accessed and collected credentials from password managers. T1555.005,Credentials from Password Stores, Password Managers, Proton gathers credentials in files for 1password. T1555.005,Credentials from Password Stores, Password Managers, TrickBot can steal passwords from the KeePass open source password manager. T1555.005,Credentials from Password Stores, Password Managers,MarkiRAT can gather information from the Keepass password manager. T1550.001,Use Alternate Authentication Material, Application Access Token,APT28 has used several malicious applications that abused OAuth access tokens to gain access to target email accounts including Gmail and Yahoo Mail. T1550.001,Use Alternate Authentication Material, Application Access Token,"Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls. " T1550.001,Use Alternate Authentication Material, Application Access Token, With an OAuth access token an adversary can use the user-granted REST API to perform functions such as email searching and contact enumeration. T1550.001,Use Alternate Authentication Material, Application Access Token," Obtaining a token which grants access to a victimprimary email, the adversary may be able to extend access to all other services which the target subscribes by triggering forgotten password routines." T1550.001,Use Alternate Authentication Material, Application Access Token, OAuth is one commonly implemented framework that issues tokens to users for access to Software-as-a-Service. T1059.003,Command and Scripting Interpreter, Windows Command Shell,4H RAT has the capability to create a remote shell. T1059.003,Command and Scripting Interpreter, Windows Command Shell, ABK has the ability to use cmd to run a Portable Executable (PE) on the compromised host. T1059.003,Command and Scripting Interpreter, Windows Command Shell, adbupd can run a copy of cmd.exe. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Following exploitation with LOWBALL malware admin@338 actors created a file containing a list of commands to be executed on the compromised computer. T1059.003,Command and Scripting Interpreter, Windows Command Shell, ADVSTORESHELL can create a remote shell and run a given command. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Anchor has used cmd.exe to run its self deletion routine. T1059.003,Command and Scripting Interpreter, Windows Command Shell, APT1 has used the Windows command shell to execute commands and batch scripting to automate execution. T1059.003,Command and Scripting Interpreter, Windows Command Shell, APT18 uses cmd.exe to execute commands on the victimmachine. T1059.003,Command and Scripting Interpreter, Windows Command Shell, An APT28 loader Trojan uses a cmd.exe and batch script to run its payload. The group has also used macros to execute payloads. T1059.003,Command and Scripting Interpreter, Windows Command Shell, APT29 used cmd.exe to execute commands on remote machines. T1059.003,Command and Scripting Interpreter, Windows Command Shell," An APT3 downloader uses the Windows command cmd.exe"" /C whoami. The group also uses a tool to execute commands on remote computers. " T1059.003,Command and Scripting Interpreter, Windows Command Shell, APT32 has used cmd.exe for execution. T1059.003,Command and Scripting Interpreter, Windows Command Shell, APT37 has used the command-line interface. T1059.003,Command and Scripting Interpreter, Windows Command Shell, APT38 has used a command-line tunneler NACHOCHEESE to give them shell access to a victimmachine. T1059.003,Command and Scripting Interpreter, Windows Command Shell, APT41 used cmd.exe /c to execute commands on remote machines.APT41 used a batch file to install persistence for the Cobalt Strike BEACON loader. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Astaroth spawns a CMD process to execute commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, AuditCred can open a reverse shell on the system to execute commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, BabyShark has used cmd.exe to execute commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, BackConfig can download and run batch files to execute commands on a compromised host. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Adversaries can direct BACKSPACE to execute from the command line on infected hosts or have BACKSPACE create a reverse shell. T1059.003,Command and Scripting Interpreter, Windows Command Shell, BADNEWS is capable of executing commands via cmd.exe. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Bandook is capable of spawning a Windows command shell. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Bankshot uses the command-line interface to execute arbitrary commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Bazar can launch cmd.exe to perform reconnaissance commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, BBK has the ability to use cmd to run a Portable Executable (PE) on the compromised host. T1059.003,Command and Scripting Interpreter, Windows Command Shell, BISCUIT has a command to launch a command shell on the system. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Bisonal can launch cmd.exe to execute commands on the system. T1059.003,Command and Scripting Interpreter, Windows Command Shell, BLACKCOFFEE has the capability to create a reverse shell. T1059.003,Command and Scripting Interpreter, Windows Command Shell, BlackMould can run cmd.exe with parameters. T1059.003,Command and Scripting Interpreter, Windows Command Shell, BLINDINGCAN has executed commands via cmd.exe. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Blue Mockingbird has used batch script files to automate execution and deployment of payloads. T1059.003,Command and Scripting Interpreter, Windows Command Shell, BONDUPDATER can read batch commands in a file sent from its C2 server and execute them with cmd.exe. T1059.003,Command and Scripting Interpreter, Windows Command Shell, BRONZE BUTLER has used batch scripts and the command-line interface for execution. T1059.003,Command and Scripting Interpreter, Windows Command Shell, CALENDAR has a command to run cmd.exe to execute commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Carbanak has a command to create a reverse shell. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Cardinal RAT can execute commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, CARROTBAT has the ability to execute command line arguments on a compromised host. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Caterpillar WebShell can run commands on the compromised asset with CMD functions. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Chimera has used the Windows Command Shell and batch scripts for execution on compromised hosts. T1059.003,Command and Scripting Interpreter, Windows Command Shell, China Chopper's server component is capable of opening a command terminal. T1059.003,Command and Scripting Interpreter, Windows Command Shell, cmd is used to execute programs and other actions at the command-line interface. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands. The group has used an exploit toolkit known as Threadkit that launches .bat files. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Cobalt Strike uses a command-line interface to interact with systems. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Cobian RAT can launch a remote command shell interface for executing commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, CoinTicker executes a bash script to establish a reverse shell. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Comnie executes BAT scripts. T1059.003,Command and Scripting Interpreter, Windows Command Shell, ComRAT has used cmd.exe to execute commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Conti can utilize command line options to allow an attacker control over how it scans and encrypts files. T1059.003,Command and Scripting Interpreter, Windows Command Shell, A module in CozyCar allows arbitrary commands to be executed by invoking C:\Windows\System32\cmd.exe. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Dark Caracal has used macros in Word documents that would download a second stage if executed. T1059.003,Command and Scripting Interpreter, Windows Command Shell, DarkComet can launch a remote shell to execute commands on the victimmachine. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Daserf can execute shell commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, DealersChoice makes modifications to open-source scripts from GitHub and executes them on the victimmachine. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Denis can launch a remote shell to execute arbitrary commands on the victimmachine. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Dipsind can spawn remote shells. T1059.003,Command and Scripting Interpreter, Windows Command Shell, DownPaper uses the command line. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Dragonfly 2.0 used various types of scripting to perform operations including batch scripts. T1059.003,Command and Scripting Interpreter, Windows Command Shell, DropBook can execute arbitrary shell commands on the victims' machines. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Dtrack has used cmd.exe to add a persistent service. T1059.003,Command and Scripting Interpreter, Windows Command Shell, ECCENTRICBANDWAGON can use cmd to execute commands on a victimmachine. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Egregor has used batch files for execution and can launch Internet Explorer from cmd.exe. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Emissary has the capability to create a remote shell and execute specified commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Emotet has used cmd.exe to run a PowerShell script. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Empire has modules for executing scripts. T1059.003,Command and Scripting Interpreter, Windows Command Shell, EvilBunny has an integrated scripting engine to download and execute Lua scripts. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Exaramel for Windows has a command to launch a remote shell and executes commands on the victimmachine. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Felismus uses command line for execution. T1059.003,Command and Scripting Interpreter, Windows Command Shell, FELIXROOT executes batch scripts on the victimmachine and can launch a reverse shell for command execution. T1059.003,Command and Scripting Interpreter, Windows Command Shell, FIN10 has executed malicious .bat files containing PowerShell commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, FIN6 has used kill.bat script to disable security tools. T1059.003,Command and Scripting Interpreter, Windows Command Shell, FIN7 used the command prompt to launch commands on the victimmachine. T1059.003,Command and Scripting Interpreter, Windows Command Shell, FIN8 has used a Batch file to automate frequently executed post compromise cleanup activities. FIN8 executes commands remotely via cmd.exe. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Fox Kitten has used cmd.exe likely as a password changing mechanism. T1059.003,Command and Scripting Interpreter, Windows Command Shell," Frankenstein has run a command script to set up persistence as a scheduled task named ""WinUpdate"" as well as other encoded commands from the command-line. " T1059.003,Command and Scripting Interpreter, Windows Command Shell, GALLIUM used the Windows command shell to execute commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Gamaredon Group has used various batch scripts to establish C2 and download additional files. Gamaredon Group's backdoor malware has also been written to a batch file. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Gold Dragon uses cmd.exe to execute commands for discovery. T1059.003,Command and Scripting Interpreter, Windows Command Shell, GoldenSpy can execute remote commands via the command-line interface. T1059.003,Command and Scripting Interpreter, Windows Command Shell, GoldMax can spawn a command shell and execute native commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Goopy has the ability to use cmd.exe to execute commands passed from an Outlook C2 channel. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Gorgon Group malware can use cmd.exe to download and execute payloads and to execute commands on the system. T1059.003,Command and Scripting Interpreter, Windows Command Shell, GravityRAT executes commands remotely on the infected host. T1059.003,Command and Scripting Interpreter, Windows Command Shell, GreyEnergy uses cmd.exe to execute itself in-memory. T1059.003,Command and Scripting Interpreter, Windows Command Shell, H1N1 kills and disables services by using cmd.exe. T1059.003,Command and Scripting Interpreter, Windows Command Shell, HARDRAIN uses cmd.exe to execute netshcommands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, HAWKBALL has created a cmd.exe reverse shell executed commands and uploaded output via the command line. T1059.003,Command and Scripting Interpreter, Windows Command Shell, hcdLoader provides command-line access to the compromised system. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Helminth can provide a remote shell. One version of Helminth uses batch scripting. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Hi-Zor has the ability to create a reverse shell. T1059.003,Command and Scripting Interpreter, Windows Command Shell, HiddenWasp uses a script to automate tasks on the victim's machine and to assist in execution. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Higaisa used cmd.exe for execution. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Hikit has the ability to create a remote shell and run given commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, HOMEFRY uses a command-line interface. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Several commands are supported by the Honeybee's implant via the command-line interface and therealso a utility to execute any custom command on an infected endpoint. Honeybee used batch scripting. T1059.003,Command and Scripting Interpreter, Windows Command Shell, HOPLIGHT can launch cmd.exe to execute commands on the system. T1059.003,Command and Scripting Interpreter, Windows Command Shell, HotCroissant can remotely open applications on the infected host with the ShellExecuteA command. T1059.003,Command and Scripting Interpreter, Windows Command Shell, HTTPBrowser is capable of spawning a reverse shell on a victim. T1059.003,Command and Scripting Interpreter, Windows Command Shell, httpclient opens cmd.exe on the victim. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Indrik Spider has used batch scripts on victim's machines. T1059.003,Command and Scripting Interpreter, Windows Command Shell, InnaputRAT launches a shell to execute commands on the victimmachine. T1059.003,Command and Scripting Interpreter, Windows Command Shell, InvisiMole can launch a remote shell to execute commands. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Ixeshe is capable of executing commands via cmd. T1059.003,Command and Scripting Interpreter, Windows Command Shell, JCry has used cmd.exe to launch PowerShell. T1059.003,Command and Scripting Interpreter, Windows Command Shell, JHUHUGIT uses a .bat file to execute a .dll. T1059.003,Command and Scripting Interpreter, Windows Command Shell, JPIN can use the command-line utility cacls.exe to change file permissions. T1059.003,Command and Scripting Interpreter, Windows Command Shell, jRAT has command line access. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Kasidet can execute commands using cmd.exe. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Kazuar uses cmd.exe to execute commands on the victimmachine. T1059.003,Command and Scripting Interpreter, Windows Command Shell, Ke3chang has used batch scripts in its malware to install persistence mechanisms. T1059.003,Command and Scripting Interpreter, Windows Command Shell, KeyBoy can launch interactive shells for communicating with the victim machine. T1059.003,Command and Scripting Interpreter, Windows Command Shell, KEYMARBLE can execute shell commands using cmd.exe. T1059.003,Command and Scripting Interpreter, Windows Command Shell, KGH_SPY has the ability to set a Registry key to run a cmd.exe command. T1566.002,Phishing, Spearphishing Link,AppleJeus has been distributed via spearphishing link. T1566.002,Phishing, Spearphishing Link, APT1 has sent spearphishing emails containing hyperlinks to malicious files. T1566.002,Phishing, Spearphishing Link, APT28 sent spearphishing emails which used a URL-shortener service to masquerade as a legitimate service and to redirect targets to credential harvesting sites. T1566.002,Phishing, Spearphishing Link, APT29 has used spearphishing with a link to trick victims into clicking on a link to a zip file containing malicious files. T1566.002,Phishing, Spearphishing Link, APT32 has sent spearphishing emails containing malicious links. T1566.002,Phishing, Spearphishing Link, APT33 has sent spearphishing emails containing links to .hta files. T1566.002,Phishing, Spearphishing Link, APT39 leveraged spearphishing emails with malicious links to initially compromise victims. T1566.002,Phishing, Spearphishing Link, Bazar has been spread via e-mails with embedded malicious links. T1566.002,Phishing, Spearphishing Link, BlackTech has used spearphishing e-mails with links to cloud services to deliver malware. T1566.002,Phishing, Spearphishing Link, Cobalt Group has sent emails with URLs pointing to malicious documents. T1566.002,Phishing, Spearphishing Link, Dragonfly 2.0 used spearphishing with PDF attachments containing malicious links that redirected to credential harvesting websites. T1566.002,Phishing, Spearphishing Link, Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing a link to malicious content hosted on an uncommon Web server. T1566.002,Phishing, Spearphishing Link, Emotet has been delivered by phishing emails containing links. T1566.002,Phishing, Spearphishing Link, Evilnum has sent spearphishing emails containing a link to a zip file hosted on Google Drive. T1566.002,Phishing, Spearphishing Link, FIN4 has used spearphishing emails (often sent from compromised accounts) containing malicious links. T1566.002,Phishing, Spearphishing Link, FIN8 has distributed targeted emails containing links to malicious documents with embedded macros. T1566.002,Phishing, Spearphishing Link, Grandoreiro has been spread via malicious links embedded in e-mails. T1566.002,Phishing, Spearphishing Link, GuLoader has been spread in phishing campaigns using malicious web links. T1566.002,Phishing, Spearphishing Link, Hancitor has been delivered via phishing emails which contained malicious links. T1566.002,Phishing, Spearphishing Link, Javali has been delivered via malicious links embedded in e-mails. T1566.002,Phishing, Spearphishing Link, Kerrdown has been distributed via e-mails containing a malicious link. T1566.002,Phishing, Spearphishing Link, Kimsuky has used an email containing a link to a document that contained malicious macros. T1566.002,Phishing, Spearphishing Link, Leviathan has sent spearphishing emails with links often using a fraudulent lookalike domain and stolen branding. T1566.002,Phishing, Spearphishing Link, Machete has sent phishing emails that contain a link to an external server with ZIP and RAR archives. T1566.002,Phishing, Spearphishing Link, Magic Hound sent shortened URL links over email to victims. The URLs linked to Word documents with malicious macros that execute PowerShells scripts to download Pupy. T1566.002,Phishing, Spearphishing Link, Melcoz has been spread through malicious links embedded in e-mails. T1566.002,Phishing, Spearphishing Link, Mofang delivered spearphishing emails with malicious links included. T1566.002,Phishing, Spearphishing Link, Molerats has sent phishing emails with malicious links included. T1566.002,Phishing, Spearphishing Link, MuddyWater has sent targeted spearphishing e-mails with malicious links. T1566.002,Phishing, Spearphishing Link, Mustang Panda has delivered spearphishing links to their target. T1566.002,Phishing, Spearphishing Link, NETWIRE has been spread via e-mail campaigns utilizing malicious links. T1566.002,Phishing, Spearphishing Link, Night Dragon sent spearphishing emails containing links to compromised websites where malware was downloaded. T1566.002,Phishing, Spearphishing Link, OilRig has sent spearphising emails with malicious links to potential victims. T1566.002,Phishing, Spearphishing Link, Patchwork has used spearphishing with links to deliver files with exploits to initial victims. The group has also used embedded image tags (known as web bugs) with unique per-recipient tracking links in their emails for the purpose of identifying which recipients opened messages. T1566.002,Phishing, Spearphishing Link, Pony has been delivered via spearphishing emails which contained malicious links. T1566.002,Phishing, Spearphishing Link, Sandworm Team has crafted phishing emails containing malicious hyperlinks. T1566.002,Phishing, Spearphishing Link, Sidewinder has sent e-mails with malicious links often crafted for specific targets. T1566.002,Phishing, Spearphishing Link, Stolen Pencil sent spearphishing emails containing links to domains controlled by the threat actor. T1566.002,Phishing, Spearphishing Link, TA505 has sent spearphishing emails containing malicious links. T1566.002,Phishing, Spearphishing Link, TrickBot has been delivered via malicious links in phishing e-mails. T1566.002,Phishing, Spearphishing Link, Turla attempted to trick targets into clicking on a link featuring a seemingly legitimate domain from Adobe.com to download their malware and gain initial access. T1566.002,Phishing, Spearphishing Link, Valak has been delivered via malicious links in e-mail. T1566.002,Phishing, Spearphishing Link, Windshift has sent spearphishing emails with links to harvest credentials and deliver malware. T1566.002,Phishing, Spearphishing Link, Wizard Spider has sent phishing emails containing a link to an actor-controlled Google Drive document or other free online file hosting services. T1566.002,Phishing, Spearphishing Link, ZIRCONIUM has used malicious links and web beacons in e-mails for malware download and to track hits to attacker-controlled URL's. T1606.002,Forge Web Credentials, Saml Tokens,APT29 created tokens using compromised SAML signing certificates. T1606.002,Forge Web Credentials, Saml Tokens, UNC2452 created tokens using compromised SAML signing certificates. T1606.002,Forge Web Credentials, Saml Tokens,"Supply chain breaches, such as Solarwinds, are partially exploited via forged credentials that obtain access such as the forging of SMAL tokens. " T1606.002,Forge Web Credentials, Saml Tokens, APT30 can break single sign on (SSO) if it is SMAL v2.0 through the forgery of SMAL tokens. T1606.002,Forge Web Credentials, Saml Tokens, Threat actors can change the normal 1 hour limit upon the legitimacy of a token through accessing the AccessTokenLifetime element. T1555.003,Credentials from Password Stores, Credentials From Web Browsers,Agent Tesla can gather credentials from a number of browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Ajax Security Team has used FireMalv custom-developed malware which collected passwords from the Firefox browser storage. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, APT3 has used tools to dump passwords from browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, APT33 has used a variety of publicly available tools like LaZagne to gather credentials. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, APT37 has used a credential stealer known as ZUMKONG that can harvest usernames and passwords stored in browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Azorult can steal credentials from the victim's browser. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Some Backdoor.Oldrea samples contain a publicly available Web browser password recovery tool. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, BlackEnergy has used a plug-in to gather credentials from web browsers including FireFox Google Chrome and Internet Explorer. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Carberp's passw.plug plugin can gather passwords saved in Opera Internet Explorer Safari Firefox and Chrome. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, ChChes steals credentials stored inside Internet Explorer. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, CookieMiner can steal saved usernames and passwords in Chrome as well as credit card credentials. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, CosmicDuke collects user credentials including passwords for various programs including Web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Crimson contains a module to steal credentials from Web browsers on the victim machine. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Emotet has been observed dropping browser password grabber modules. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Empire can use modules that extract passwords from common web browsers such as Firefox and Chrome. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, FIN6 has used the Stealer One credential stealer to target web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Grandoreiro can steal cookie data and credentials from Google Chrome. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, H1N1 dumps usernames and passwords from Firefox Internet Explorer and Outlook. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Imminent Monitor has a PasswordRecoveryPacket module for recovering browser passwords. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Inception used a browser plugin to steal passwords and sessions from Internet Explorer Chrome Opera Firefox Torch and Yandex. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Javali can capture login credentials from open browsers including Firefox Chrome Internet Explorer and Edge. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, jRAT can capture passwords from common web browsers such as Internet Explorer Google Chrome and Firefox. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, KeyBoy attempts to collect passwords from browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, KGH_SPY has the ability to steal data from the Chrome Edge Firefox Thunderbird and Opera browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Kimsuky has used browser extensions including Google Chrome to steal passwords and cookies from browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, KONNI can steal profiles (containing credential information) from Firefox Chrome and Opera. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, LaZagne can obtain credentials from web browsers such as Google Chrome Internet Explorer and Firefox. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Leafminer used several tools for retrieving login and password information including LaZagne. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Lokibot has demonstrated the ability to steal credentials from multiple applications and data sources including Safari and the Chromium and Mozilla Firefox-based web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Machete collects stored credentials from several web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Melcoz has the ability to steal credentials from web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from DPAPI. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Molerats used the public tool BrowserPasswordDump10 to dump passwords saved in browsers on victims. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, MuddyWater has run tools including Browser64 to steal passwords saved in victim web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, NETWIRE has the ability to steal credentials from web browsers including Internet Explorer Opera Yandex and Chrome. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, njRAT has a module that steals passwords saved in victim web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. OilRig has also used tool named PICKPOCKET to dump passwords from web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, OLDBAIT collects credentials from Internet Explorer Mozilla Firefox and Eudora. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Olympic Destroyer contains a module that tries to obtain stored credentials from web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Patchwork dumped the login data database from \AppData\Local\Google\Chrome\User Data\Default\Login Data. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated with many sources such as Netscape Navigator Mozilla Firefox Mozilla Thunderbird and Internet Explorer. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, PLEAD has the ability to steal saved credentials from web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, PoetRAT has used a Python tool named Browdec.exe to steal browser credentials. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, A module in Prikormka gathers logins and passwords stored in applications on the victims including Google Chrome Mozilla Firefox and several other browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Proton gathers credentials for Google Chrome. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Pupy can use Lazagne for harvesting credentials. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, QuasarRAT can obtain passwords from common web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, RedLeaves can gather browser usernames and passwords. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, ROKRAT steals credentials stored in Web browsers by querying the sqlite database. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Sandworm Team's CredRaptor tool can collect saved passwords from various internet browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Smoke Loader searches for credentials stored from web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Stealth Falcon malware gathers passwords from multiple sources including Internet Explorer Firefox and Chrome. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Stolen Pencil has used tools that are capable of obtaining credentials from web browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, TA505 has used malware to gather credentials from Internet Explorer. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, TrickBot can obtain passwords stored in files from web browsers such as Chrome Firefox Internet Explorer and Microsoft Edge sometimes using esentutl. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Trojan.Karagany can steal data and credentials from browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, TSCookie has the ability to steal saved passwords from the Internet Explorer Edge Firefox and Chrome browsers. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Unknown Logger is capable of stealing usernames and passwords from browsers on the victim machine. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, XAgentOSX contains the getFirefoxPassword function to attempt to locate Firefox passwords. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, Zebrocy has the capability to upload dumper tools that extract credentials from web browsers and store them in database files. T1555.003,Credentials from Password Stores, Credentials From Web Browsers, ZIRCONIUM has used a tool to steal credentials from installed web browsers including Microsoft Internet Explorer and Google Chrome. T1550.004,Use Alternate Authentication Material, Web Session Cookie,APT29 used a forged duo-sid cookie to bypass MFA set on an email account. T1550.004,Use Alternate Authentication Material, Web Session Cookie, UNC2452 used a forged duo-sid cookie to bypass MFA set on an email account. T1550.004,Use Alternate Authentication Material, Web Session Cookie,Attackers bypass some multi-factor authentication protocols since the session is already authenticated. T1550.004,Use Alternate Authentication Material, Web Session Cookie, Threat actors may have used browser cookies to defeat MFA with apass-the-cookie attack. T1550.004,Use Alternate Authentication Material, Web Session Cookie, Solarwinds attackers bypassed MFA to obtain access on multiple target networks. T1553.005,Subvert Trust Controls, Mark,TA505 has used .iso files to deploy malicious .lnk files. T1553.005,Subvert Trust Controls, Mark,Adversaries may abuse specific file formats to subvert Mark-of-the-Web (MOTW) controls. T1553.005,Subvert Trust Controls, Mark," Attackers use ZIP archives to disseminate malware, bypassing security controls. " T1553.005,Subvert Trust Controls, Mark, Maldocs often abuse MOTW policies to get users to run macros and ActiveX controls. T1553.005,Subvert Trust Controls, Mark, Adversaries bypass Microsoft SmartScreen using archive files that do not have MOTW NTFS streams. T1087.001,Account Discovery, Local Account,admin@338 actors used the following commands following exploitation of a machine with LOWBALL malware to enumerate user accounts: net user >> %temp%\download net user /domain >> %temp%\download T1087.001,Account Discovery, Local Account, Agent Tesla can collect account information from the victimmachine. T1087.001,Account Discovery, Local Account, APT1 used the commands net localgroup net user and net group to find accounts on the system. T1087.001,Account Discovery, Local Account, APT3 has used a tool that can obtain info about local and global group users power users and administrators. T1087.001,Account Discovery, Local Account, APT32 enumerated administrative users using the commands net localgroup administrators. T1087.001,Account Discovery, Local Account, Bankshot gathers domain and account names/information through process monitoring. T1087.001,Account Discovery, Local Account, Bazar can identify administrator accounts on an infected host. T1087.001,Account Discovery, Local Account, BitPaymer can enumerate the sessions for each user logged onto the infected host. T1087.001,Account Discovery, Local Account, BloodHound can identify users with local administrator rights. T1087.001,Account Discovery, Local Account, Chimera has used net user for account discovery. T1087.001,Account Discovery, Local Account, Comnie uses the net user command. T1087.001,Account Discovery, Local Account, The discovery modules used with Duqu can collect information on accounts and permissions. T1087.001,Account Discovery, Local Account, Elise executes net user after initial communication is made to the remote server. T1087.001,Account Discovery, Local Account, Empire can acquire local and domain user account information. T1087.001,Account Discovery, Local Account, Epic gathers a list of all user accounts privilege classes and time of last logon. T1087.001,Account Discovery, Local Account, Fox Kitten has accessed ntuser.dat and UserClass.dat on compromised hosts. T1087.001,Account Discovery, Local Account, GeminiDuke collects information on local user accounts from the victim. T1087.001,Account Discovery, Local Account, HyperStack can enumerate all account names on a remote share. T1087.001,Account Discovery, Local Account, InvisiMole has a command to list account information on the victimmachine. T1087.001,Account Discovery, Local Account, Kazuar gathers information on local groups and members on the victimmachine. T1087.001,Account Discovery, Local Account," Ke3chang performs account discovery using commands such as net localgroup administrators and net group REDACTED"" /domain on specific permissions groups. " T1087.001,Account Discovery, Local Account, Kwampirs collects a list of accounts with the command net users. T1087.001,Account Discovery, Local Account, Mis-Type may create a file containing the results of the command cmd.exe /c net user {Username}. T1087.001,Account Discovery, Local Account, MURKYTOP has the capability to retrieve information about users on remote hosts. T1087.001,Account Discovery, Local Account, Commands under net user can be used in Net to gather information about and manipulate user accounts. T1087.001,Account Discovery, Local Account, OilRig has run net user net user /domain net groupdomain admins /domain and net groupExchange Trusted Subsystem /domain to get account listings on a victim. T1087.001,Account Discovery, Local Account, OSInfo enumerates local and domain users T1087.001,Account Discovery, Local Account, P.A.S. Webshell can display the /etc/passwd file on a compromised host. T1087.001,Account Discovery, Local Account, Pony has used the NetUserEnum function to enumerate local accounts. T1087.001,Account Discovery, Local Account, Poseidon Group searches for administrator accounts on both the local victim machine and the network. T1087.001,Account Discovery, Local Account, PoshC2 can enumerate local and domain user account information. T1087.001,Account Discovery, Local Account, PowerSploit's Get-ProcessTokenGroup Privesc-PowerUp module can enumerate all SIDs associated with its current token. T1087.001,Account Discovery, Local Account, POWERSTATS can retrieve usernames from compromised hosts. T1087.001,Account Discovery, Local Account, PUNCHBUGGY can gather user names. T1087.001,Account Discovery, Local Account, Pupy uses PowerView and Pywerview to perform discovery commands such as net user net group net local group etc. T1087.001,Account Discovery, Local Account, RATANKBA uses the net user command. T1087.001,Account Discovery, Local Account, Remsec can obtain a list of users. T1087.001,Account Discovery, Local Account, S-Type runs the command net user on a victim. S-Type also runs tests to determine the privilege level of the compromised user. T1087.001,Account Discovery, Local Account, SHOTPUT has a command to retrieve information about connected users. T1087.001,Account Discovery, Local Account, SoreFang can collect usernames from the local system via net.exe user. T1087.001,Account Discovery, Local Account, Threat Group-3390 has used net user to conduct internal discovery of systems. T1087.001,Account Discovery, Local Account, TrickBot collects the users of the system. T1087.001,Account Discovery, Local Account, Turla has used net user to enumerate local accounts on the system. T1087.001,Account Discovery, Local Account, USBferry can use net user to gather information about local accounts. T1087.001,Account Discovery, Local Account," Valak has the ability to enumerate local admin accounts.""" T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription,adbupd can use a WMI script to achieve persistence. T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription, APT29 has used WMI event subscriptions for persistence. T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription, APT33 has attempted to use WMI event subscriptions to establish persistence on compromised hosts. T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription, Blue Mockingbird has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file. T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription, Leviathan has used WMI for persistence. T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription, Mustang Panda's custom ORat tool uses a WMI event consumer to maintain persistence. T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription, PoshC2 has the ability to persist on a system using WMI events. T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription, POSHSPY uses a WMI event subscription to establish persistence. T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription, POWERTON can use WMI for persistence. T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription, RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started. T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription, SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup. T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription, Turla has used WMI event filters and consumers to establish persistence. T1546.003,Event Triggered Execution, Windows Management Instrumentation Event Subscription, UNC2452 used WMI event subscriptions for persistence. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification,APT29 drops a Windows shortcut file for execution. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, APT39 has modified LNK shortcuts. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Astaroth's initial payload is a malicious .LNK file. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Bazar can establish persistence by writing shortcuts to the Windows Startup folder. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Comnie establishes persistence via a .lnk file in the victimstartup path. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Darkhotel has dropped an mspaint.lnk shortcut to disk which launches a shell script that downloads and executes a file. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Dragonfly 2.0 manipulated .lnk files to gather user credentials in conjunction with Forced Authentication. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Empire can persist by modifying a .LNK file to include a backdoor. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, FELIXROOT creates a .LNK file for persistence. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Gazer can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Gorgon Group malware can create a .lnk file and add a Registry Run key to establish persistence. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Grandoreiro can write or modify browser shortcuts to enable launching of malicious browser extensions. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Helminth establishes persistence by creating a shortcut. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, InvisiMole can use a .lnk shortcut for the Control Panel to establish persistence. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Kazuar adds a .lnk file to the Windows startup folder. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, A version of KONNI drops a Windows shortcut on the victimmachine to establish persistence. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, A Lazarus Group malware sample adds persistence on the system by creating a shortcut in the userStartup folder. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Micropsia creates a shortcut to maintain persistence. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, Reaver creates a shortcut file and saves it in a Startup folder to establish persistence. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, S-Type may create the file %HOMEPATH%\Start Menu\Programs\Startup\Realtek {Unique Identifier}.lnk which points to the malicious msdtc.exe file already created in the %CommonFiles% directory. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, SeaDuke is capable of persisting via a .lnk file stored in the Startup directory. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, To establish persistence SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as anOffice StartYahoo TalkMSN Gaming Z0ne orMSN Talk shortcut. T1547.009,Boot or Logon Autostart Execution, Shortcut Modification, TinyZBot can create a shortcut in the Windows startup folder for persistence. T1552.001,Unsecured Credentials, Credentials In Files,Agent Tesla has the ability to extract credentials from configuration or support files. T1552.001,Unsecured Credentials, Credentials In Files, APT3 has a tool that can locate credentials in files on the file system such as those from Firefox or Chrome. T1552.001,Unsecured Credentials, Credentials In Files, APT33 has used a variety of publicly available tools like LaZagne to gather credentials. T1552.001,Unsecured Credentials, Credentials In Files, Azorult can steal credentials in files belonging to common software such as Skype Telegram and Steam. T1552.001,Unsecured Credentials, Credentials In Files, BlackEnergy has used a plug-in to gather credentials stored in files on the host by various software programs including The Bat! email client Outlook and Windows Credential Store. T1552.001,Unsecured Credentials, Credentials In Files, Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user. T1552.001,Unsecured Credentials, Credentials In Files, Empire can use various modules to search for files containing passwords. T1552.001,Unsecured Credentials, Credentials In Files, Fox Kitten has accessed files to gain valid credentials. T1552.001,Unsecured Credentials, Credentials In Files, Hildegard has searched for SSH keys Docker credentials and Kubernetes service tokens. T1552.001,Unsecured Credentials, Credentials In Files, jRAT can capture passwords from common chat applications such as MSN Messenger AOL Instant Messenger and and Google Talk. T1552.001,Unsecured Credentials, Credentials In Files, LaZagne can obtain credentials from chats databases mail and WiFi. T1552.001,Unsecured Credentials, Credentials In Files, Leafminer used several tools for retrieving login and password information including LaZagne. T1552.001,Unsecured Credentials, Credentials In Files, MuddyWater has run a tool that steals passwords saved in victim email. T1552.001,Unsecured Credentials, Credentials In Files, OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. T1552.001,Unsecured Credentials, Credentials In Files, If an initial connectivity check fails pngdowner attempts to extract proxy details and credentials from Windows Protected Storage and from the IE Credentials Store. This allows the adversary to use the proxy credentials for subsequent requests if they enable outbound HTTP access. T1552.001,Unsecured Credentials, Credentials In Files, PoshC2 contains modules for searching for passwords in local and remote files. T1552.001,Unsecured Credentials, Credentials In Files, Pupy can use Lazagne for harvesting credentials. T1552.001,Unsecured Credentials, Credentials In Files, Pysa has extracted credentials from the password database before encrypting the files. T1552.001,Unsecured Credentials, Credentials In Files, QuasarRAT can obtain passwords from FTP clients. T1552.001,Unsecured Credentials, Credentials In Files, Smoke Loader searches for files named logins.json to parse for credentials. T1552.001,Unsecured Credentials, Credentials In Files, Stolen Pencil has used tools that are capable of obtaining credentials from saved mail. T1552.001,Unsecured Credentials, Credentials In Files, TA505 has used malware to gather credentials from FTP clients and Outlook. T1552.001,Unsecured Credentials, Credentials In Files," TrickBot can obtain passwords stored in files from several applications such as Outlook Filezilla OpenSSH OpenVPN and WinSCP. Additionally it searches for the .vnc.lnk"" affix to steal VNC credentials. " T1552.001,Unsecured Credentials, Credentials In Files," XTunnel is capable of accessing locally stored passwords on victims.""" T1552.007,Unsecured Credentials, Container Api,Limit communications with the container service to local Unix sockets or remote access via SSH. T1552.007,Unsecured Credentials, Container Api, Require secure port access to communicate with the APIs over TLS by disabling unauthenticated access to the Docker API and Kubernetes API Server. T1552.007,Unsecured Credentials, Container Api," Deny direct remote access to internal systems through the use of network proxies, gateways, and firewalls. " T1552.007,Unsecured Credentials, Container Api, Use the principle of least privilege for privileged accounts such as the service account in Kubernetes. T1552.007,Unsecured Credentials, Container Api," An adversary may access the Docker API to collect logs that contain credentials to cloud, container, and various other resources in the environment. " T1053.007,Scheduled Task/Job, Container Orchestration Job,Ensure containers are not running as root by default. T1053.007,Scheduled Task/Job, Container Orchestration Job, Limit privileges of user accounts and remediate privilege escalation vectors so only authorized administrators can create container orchestration jobs. T1053.007,Scheduled Task/Job, Container Orchestration Job, Threat actors can create clusters of containers to maintain persistence. T1053.007,Scheduled Task/Job, Container Orchestration Job, Ransomware such as DarkMatter can utilize containers to schedule the execution of the encryption payload. T1053.007,Scheduled Task/Job, Container Orchestration Job, APT23 abuses container creation programs such as Kubernetes to repeatedly execute malicious code. T1204.003,User Execution, Malicious Image,TeamTNT relies on users to download and execute malicious Docker images. T1204.003,User Execution, Malicious Image, TigerDownloader can be modified to be executed once a user is tricked into downloading a malicious AWS image. T1204.003,User Execution, Malicious Image, DarkSide ransomware can be executed once a user downloads a malicious GCP image. T1204.003,User Execution, Malicious Image, Persistence can be maintained via backdoor installations through the medium of malicious docker images. T1204.003,User Execution, Malicious Image, REvil ransomware can install itself once a user downloads an image that has been modified to contain malicious functionality. T1110.003,Brute Force, Password Spraying,APT28 has used a brute-force/password-spray tooling that operated in two modes: in password-spraying mode it conducted approximately four authentication attempts per hour per targeted account over the course of several days or weeks. T1110.003,Brute Force, Password Spraying, APT33 has used password spraying to gain access to target systems. T1110.003,Brute Force, Password Spraying, Chimera has used multiple password spraying attacks against victim's remote services to obtain valid user and administrator accounts. T1110.003,Brute Force, Password Spraying, CrackMapExec can brute force credential authentication by using a supplied list of usernames and a single password. T1110.003,Brute Force, Password Spraying, Lazarus Group malware attempts to connect to Windows shares for lateral movement by using a generated list of usernames which center around permutations of the username Administrator and weak passwords. T1110.003,Brute Force, Password Spraying, Leafminer used a tool called Total SMB BruteForcer to perform internal password spraying. T1110.003,Brute Force, Password Spraying, Linux Rabbit brute forces SSH passwords in order to attempt to gain access and install its malware onto the server. T1110.003,Brute Force, Password Spraying, MailSniper can be used for password spraying against Exchange and Office 365. T1110.003,Brute Force, Password Spraying, Silent Librarian has used collected lists of names and e-mail accounts to use in password spraying attacks against private sector targets. T1110.004,Brute Force, Credential Stuffing,Chimera has used credential stuffing against victim's remote services to obtain valid accounts. T1110.004,Brute Force, Credential Stuffing, TrickBot uses brute-force attack against RDP with rdpscanDll module. T1110.004,Brute Force, Credential Stuffing,APT22 uses credential stuffing to enumerate the number of compromised accounts they can access. T1110.004,Brute Force, Credential Stuffing," Skimmers, such as those utilised by Magecart, will often use credential stuffing to access multiple user accounts across multiple ecommerce websites. " T1110.004,Brute Force, Credential Stuffing, Credential stuffing is a technique often used by threat actors to gain access to new accounts which they can then abuse the trust of to assist in social engineering attacks. T1110.004,Brute Force, Credential Stuffing, Ransomware such as REvil can credential stuff to gain access to more valid accounts before moving laterally and vertically within the network. T1110.004,Brute Force, Credential Stuffing, Threat actors can credential stuff to gain access to users accounts if they reuse passwords. T1078.001,Valid Accounts, Default Accounts,HyperStack can use default credentials to connect to IPC$ shares on remote machines. T1078.001,Valid Accounts, Default Accounts,Stuxnet infected WinCC machines via a hardcoded database server password. T1078.001,Valid Accounts, Default Accounts, Threat actors targeting government sectors will abuse default guest and administrator accounts on older windows OS to gain initial access. T1078.001,Valid Accounts, Default Accounts, APT40 abuses default administrator accounts for initial access. T1078.001,Valid Accounts, Default Accounts, Certain CobaltStrike beacons can maintain persistence via access to default administrator accounts. T1078.003,Valid Accounts, Local Accounts,APT32 has used legitimate local admin account credentials. T1078.003,Valid Accounts, Local Accounts, Cobalt Strike can use known credentials to run commands and spawn processes as a local user account. T1078.003,Valid Accounts, Local Accounts, Emotet can brute force a local admin password then use it to facilitate lateral movement. T1078.003,Valid Accounts, Local Accounts, FIN10 has moved laterally using the Local Administrator account. T1078.003,Valid Accounts, Local Accounts, HAFNIUM has used the NT AUTHORITY\SYSTEM account to create files on Exchange servers. T1078.003,Valid Accounts, Local Accounts, NotPetya can use valid credentials with PsExec or wmic to spread itself to remote systems. T1078.003,Valid Accounts, Local Accounts, Operation Wocao has used local account credentials found during the intrusion for lateral movement and privilege escalation. T1078.003,Valid Accounts, Local Accounts, PROMETHIUM has created admin accounts on a compromised host. T1078.003,Valid Accounts, Local Accounts, Stolen Pencil has a tool to add a Windows admin account in order to allow them to ensure continued access via RDP. T1078.003,Valid Accounts, Local Accounts, Tropic Trooper has used known administrator account credentials to execute the backdoor directly. T1078.003,Valid Accounts, Local Accounts, Turla has abused local accounts that have the same password across the victimnetwork. T1078.003,Valid Accounts, Local Accounts, Umbreon creates valid local users to provide access to the system. T1566.001,Phishing, Spearphishing Attachment,admin@338 has sent emails with malicious Microsoft Office documents attached. T1566.001,Phishing, Spearphishing Attachment, The primary delivered mechaism for Agent Tesla is through email phishing messages. T1566.001,Phishing, Spearphishing Attachment, Ajax Security Team has used personalized spearphishing attachments. T1566.001,Phishing, Spearphishing Attachment, APT-C-36 has used spearphishing emails with password protected RAR attachment to avoid being detected by the email gateway. T1566.001,Phishing, Spearphishing Attachment, APT1 has sent spearphishing emails containing malicious attachments. T1566.001,Phishing, Spearphishing Attachment, APT12 has sent emails with malicious Microsoft Office documents and PDFs attached. T1566.001,Phishing, Spearphishing Attachment, APT19 sent spearphishing emails with malicious attachments in RTF and XLSM formats to deliver initial exploits. T1566.001,Phishing, Spearphishing Attachment, APT28 sent spearphishing emails containing malicious Microsoft Office and RAR attachments. T1566.001,Phishing, Spearphishing Attachment, APT29 has used spearphishing emails with an attachment to deliver files with exploits to initial victims. T1566.001,Phishing, Spearphishing Attachment, APT30 has used spearphishing emails with malicious DOC attachments. T1566.001,Phishing, Spearphishing Attachment, APT32 has sent spearphishing emails with a malicious executable disguised as a document or spreadsheet. T1566.001,Phishing, Spearphishing Attachment, APT33 has sent spearphishing e-mails with archive attachments. T1566.001,Phishing, Spearphishing Attachment, APT37 delivers malware using spearphishing emails with malicious HWP attachments. T1566.001,Phishing, Spearphishing Attachment, APT39 leveraged spearphishing emails with malicious attachments to initially compromise victims. T1566.001,Phishing, Spearphishing Attachment, APT41 sent spearphishing emails with attachments such as compiled HTML (.chm) files to initially compromise their victims. T1566.001,Phishing, Spearphishing Attachment, BlackTech has used spearphishing e-mails with malicious documents to deliver malware. T1566.001,Phishing, Spearphishing Attachment, BLINDINGCAN has been delivered by phishing emails containing malicious Microsoft Office documents. T1566.001,Phishing, Spearphishing Attachment, BRONZE BUTLER used spearphishing emails with malicious Microsoft Word attachments to infect victims. T1566.001,Phishing, Spearphishing Attachment, Cobalt Group has sent spearphishing emails with various attachment types to corporate and personal email accounts of victim organizations. Attachment types have included .rtf .doc .xls archives containing LNK files and password protected archives containing .exe and .scr executables. T1566.001,Phishing, Spearphishing Attachment, Darkhotel has sent spearphishing emails with malicious RAR and .LNK attachments. T1566.001,Phishing, Spearphishing Attachment, DarkHydrus has sent spearphishing emails with password-protected RAR archives containing malicious Excel Web Query files (.iqy). The group has also sent spearphishing emails that contained malicious Microsoft Office documents that use theattachedTemplate technique to load a template from a remote server. T1566.001,Phishing, Spearphishing Attachment, Dragonfly 2.0 used spearphishing with Microsoft Office attachments to target victims. T1566.001,Phishing, Spearphishing Attachment, Elderwood has delivered zero-day exploits and malware to victims via targeted emails containing malicious attachments. T1566.001,Phishing, Spearphishing Attachment, Emotet has been delivered by phishing emails containing attachments. T1566.001,Phishing, Spearphishing Attachment, FIN4 has used spearphishing emails containing attachments (which are often stolen legitimate documents sent from compromised accounts) with embedded malicious macros. T1566.001,Phishing, Spearphishing Attachment, FIN6 has targeted victims with e-mails containing malicious attachments. T1566.001,Phishing, Spearphishing Attachment, FIN7 sent spearphishing emails with either malicious Microsoft Documents or RTF files attached. T1566.001,Phishing, Spearphishing Attachment, FIN8 has distributed targeted emails containing Word documents with embedded malicious macros. T1566.001,Phishing, Spearphishing Attachment, Frankenstein has used spearphishing emails to send trojanized Microsoft Word documents. T1566.001,Phishing, Spearphishing Attachment, Gallmaker sent emails with malicious Microsoft Office documents attached. T1566.001,Phishing, Spearphishing Attachment, Gamaredon Group has delivered spearphishing emails with malicious attachments to targets. T1566.001,Phishing, Spearphishing Attachment, Gorgon Group sent emails to victims with malicious Microsoft Office documents attached. T1566.001,Phishing, Spearphishing Attachment, Hancitor has been delivered via phishing emails with malicious attachments. T1566.001,Phishing, Spearphishing Attachment, Higaisa has sent spearphishing emails containing malicious attachments. T1566.001,Phishing, Spearphishing Attachment, IcedID has been delivered via phishing e-mails with malicious attachments. T1566.001,Phishing, Spearphishing Attachment, Inception has used weaponized documents attached to spearphishing emails for reconnaissance and initial compromise. T1566.001,Phishing, Spearphishing Attachment, Javali has been delivered as malicious e-mail attachments. T1566.001,Phishing, Spearphishing Attachment, Kerrdown has been distributed through malicious e-mail attachments. T1566.001,Phishing, Spearphishing Attachment, Kimsuky has used emails containing Word Excel and/or HWP (Hangul Word Processor) documents in their spearphishing campaigns. T1566.001,Phishing, Spearphishing Attachment, Lazarus Group has targeted victims with spearphishing emails containing malicious Microsoft Word documents. T1566.001,Phishing, Spearphishing Attachment, Leviathan has sent spearphishing emails with malicious attachments including .rtf .doc and .xls files. T1566.001,Phishing, Spearphishing Attachment, Machete has delivered spearphishing emails that contain a zipped file with malicious contents. T1566.001,Phishing, Spearphishing Attachment, menuPass has sent malicious Office documents via email as part of spearphishing campaigns as well as executables disguised as documents. T1566.001,Phishing, Spearphishing Attachment, Metamorfo has been delivered to victims via emails containing malicious HTML attachments. T1566.001,Phishing, Spearphishing Attachment, Mofang delivered spearphishing emails with malicious documents PDFs or Excel files attached. T1566.001,Phishing, Spearphishing Attachment, Molerats has sent phishing emails with malicious Microsoft Word and PDF attachments. T1566.001,Phishing, Spearphishing Attachment, MuddyWater has compromised third parties and used compromised accounts to send spearphishing emails with targeted attachments to recipients. T1566.001,Phishing, Spearphishing Attachment, Mustang Panda has used spearphishing attachments to deliver initial access payloads. T1566.001,Phishing, Spearphishing Attachment, Naikon has used malicious e-mail attachments to deliver malware. T1566.001,Phishing, Spearphishing Attachment, NETWIRE has been spread via e-mail campaigns utilizing malicious attachments. T1566.001,Phishing, Spearphishing Attachment, OceanSalt has been delivered via spearphishing emails with Microsoft Office attachments. T1566.001,Phishing, Spearphishing Attachment, OilRig has sent spearphising emails with malicious attachments to potential victims using compromised and/or spoofed email accounts. T1566.001,Phishing, Spearphishing Attachment, Patchwork has used spearphishing with an attachment to deliver files with exploits to initial victims. T1566.001,Phishing, Spearphishing Attachment, PLATINUM has sent spearphishing emails with attachments to victims as its primary initial access vector. T1566.001,Phishing, Spearphishing Attachment, PoetRAT was distributed via malicious Word documents. T1566.001,Phishing, Spearphishing Attachment, Pony has been delivered via spearphishing attachments. T1566.001,Phishing, Spearphishing Attachment, Ramsay has been distributed through spearphishing emails with malicious attachments. T1566.001,Phishing, Spearphishing Attachment, Rancor has attached a malicious document to an email to gain initial access. T1566.001,Phishing, Spearphishing Attachment, REvil has been distributed via malicious e-mail attachments including MS Word Documents. T1566.001,Phishing, Spearphishing Attachment, Rifdoor has been distributed in e-mails with malicious Excel or Word documents. T1566.001,Phishing, Spearphishing Attachment, RTM has been delivered via spearphishing attachments disguised as PDF documents. T1566.001,Phishing, Spearphishing Attachment, RTM has used spearphishing attachments to distribute its malware. T1566.001,Phishing, Spearphishing Attachment, Sandworm Team has delivered malicious Microsoft Office attachments via spearphishing emails. T1566.001,Phishing, Spearphishing Attachment, Sharpshooter has sent malicious attachments via emails to targets. T1566.001,Phishing, Spearphishing Attachment, Sidewinder has sent e-mails with malicious attachments often crafted for specific targets. T1566.001,Phishing, Spearphishing Attachment, Silence has sent emails with malicious DOCX CHM LNK and ZIP attachments. T1566.001,Phishing, Spearphishing Attachment, TA459 has targeted victims using spearphishing emails with malicious Microsoft Word attachments. T1566.001,Phishing, Spearphishing Attachment, TA505 has used spearphishing emails with malicious attachments to initially compromise victims. T1566.001,Phishing, Spearphishing Attachment, TA551 has sent spearphishing attachments with password protected ZIP files. T1566.001,Phishing, Spearphishing Attachment, The White Company has sent phishing emails with malicious Microsoft Word attachments to victims. T1566.001,Phishing, Spearphishing Attachment, TrickBot has used an email with an Excel sheet containing a malicious macro to deploy the malware T1566.001,Phishing, Spearphishing Attachment, Tropic Trooper sent spearphishing emails that contained malicious Microsoft Office and fake installer file attachments. T1566.001,Phishing, Spearphishing Attachment, Valak has been delivered via spearphishing e-mails with password protected ZIP files. T1566.001,Phishing, Spearphishing Attachment, Windshift has sent spearphishing emails with attachment to harvest credentials and deliver malware. T1566.001,Phishing, Spearphishing Attachment, Wizard Spider has used spearphishing attachments to deliver Microsoft documents containing macros or PDFs containing malicious links to download either Emotet Bokbot TrickBot or Bazar. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion,AppleJeus has waited a specified time before downloading a second stage payload. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, Bazar can use a timer to delay execution of core functionality. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, BendyBear can check for analysis environments and signs of debugging using the Windows API kernel32!GetTickCountKernel32 call. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, Egregor can perform a long sleep (greater than or equal to 3 minutes) to evade detection. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, EvilBunny has used time measurements from 3 different APIs before and after performing sleep operations to check and abort if the malware is running in a sandbox. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, FatDuke can turn itself on or off at random intervals. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, GoldenSpy's installer has delayed installation of GoldenSpy for two hours after it reaches a victim system. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, GoldMax has set an execution trigger date and time stored as an ASCII Unix/Epoch time value. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, Okrum's loader can detect presence of an emulator by using two calls to GetTickCount API and checking whether the time has been accelerated. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, Pony has delayed execution using a built-in function to avoid detection and analysis. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, After initial installation Raindrop runs a computation to delay execution. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, SUNBURST remained dormant after initial access for a period of up to two weeks. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, ThiefQuest invokes time call to check the system's time executes a sleep command invokes a second time call and then compares the time difference between the two time calls and the amount of time the system slept to identify the sandbox. T1497.003,Virtualization/Sandbox Evasion, Time Based Evasion, Ursnif has used a 30 minute delay after execution to evade sandbox monitoring tools. T1552.005,Unsecured Credentials, Cloud Instance Metadata Api,Hildegard has queried the Cloud Instance Metadata API for cloud credentials. T1552.005,Unsecured Credentials, Cloud Instance Metadata Api,TeamTNT has queried the AWS instance metadata service for credentials. T1552.005,Unsecured Credentials, Cloud Instance Metadata Api, APT33 will query Cloud Instance APIs to harvest insecurely stored credentials that can then be used for user enumeration. T1552.005,Unsecured Credentials, Cloud Instance Metadata Api," In addition to credential harvesting, other valuable data can be extracted by threat actors via the AWS instance if it is not properly secured. " T1552.005,Unsecured Credentials, Cloud Instance Metadata Api," APT25 can harvest credentials from Cloud Instance APIs, then use those credentials to gain access to systems. " T1087.003,Account Discovery, Email Account,Backdoor.Oldrea collects address book information from Outlook. T1087.003,Account Discovery, Email Account, Emotet has been observed leveraging a module that can scrape email addresses from Outlook. T1087.003,Account Discovery, Email Account, Grandoreiro can parse Outlook .pst files to extract e-mail addresses. T1087.003,Account Discovery, Email Account, MailSniper can be used to obtain account names from Exchange and Office 365 using the Get-GlobalAddressList cmdlet. T1087.003,Account Discovery, Email Account, Ruler can be used to enumerate Exchange users and dump the GAL. T1087.003,Account Discovery, Email Account, Sandworm Team used malware to enumerate email settings including usernames and passwords from the M.E.Doc application. T1087.003,Account Discovery, Email Account, TA505 has used the tool EmailStealer to steal and send lists of e-mail addresses to a remote server. T1087.003,Account Discovery, Email Account, TrickBot collects email addresses from Outlook. T1087.003,Account Discovery, Email Account,"Threat actors will often attempt to gather more targets by using tools that lists of users from memory, and combine this with a companyemail naming convention to create a target list of email addresses. " T1087.003,Account Discovery, Email Account," Some actors use open-source malware and tools to target and steal email account credentials from popular email clients such as, Apple Mail, Gmail, and Outlook. " T1087.003,Account Discovery, Email Account," Spearphising is used by the most advanced threat groups in the world, which shows the potential value that skilled threat actors can extract by discovering which email addresses to target. " T1087.003,Account Discovery, Email Account, Malware can used by actors to automate email account discovery. T1087.003,Account Discovery, Email Account," Actors can exploit vulnerabilities, such as Log4Shell, to move into different directories to quickly locate email addresses. " T1069.003,Permission Groups Discovery, Cloud Groups,Threat actors will attempt to gather cloud accounts and their appropriate groups in attempts to find weak or default settings to exploit for malicious purposes. T1069.003,Permission Groups Discovery, Cloud Groups," Identifying cloud groups and cloud permissions can be accomplished by various commands, such as:˜az ad user get-member-groups to get groups associated to a user account in Azure. " T1069.003,Permission Groups Discovery, Cloud Groups," Some actors and malware will attempt to launch commands, via PowerShell for example (among others), to gather cloud group user settings and permissions for Google with the command:˜GET https://cloudidentity.googleapis.com/v1/groups. " T1069.003,Permission Groups Discovery, Cloud Groups," As more organizations utilize cloud services, more actors and malware will attempt to engage in malicious activity by locating cloud groups and their corresponding cloud user settings. " T1069.003,Permission Groups Discovery, Cloud Groups," Targeting an access control list (ACL) could grant actors the ability to discover cloud account users and settings, for Amazon Web Services (AWS) this can be done with the˜GetBucketAcl command. " T1547.006,Boot or Logon Autostart Execution, Kernel Modules And Extensions,Drovorub can use kernel modules to establish persistence. T1547.006,Boot or Logon Autostart Execution, Kernel Modules And Extensions, Skidmap has the ability to install several loadable kernel modules (LKMs) on infected machines. T1547.006,Boot or Logon Autostart Execution, Kernel Modules And Extensions,Threat actors can leverage malicious loadable kernel modules (LKMs) to gain Rootkit level access on an affected machine. T1547.006,Boot or Logon Autostart Execution, Kernel Modules And Extensions," Actors are always looking for ways keep control of an infected machine, one way this can be done is through malicious kernel modules to covertly escalate privileges and maintain persistence. " T1547.006,Boot or Logon Autostart Execution, Kernel Modules And Extensions, LKMs used by actors and malware are often loaded into the˜/lib/modules/ with a .ko extension on Linux systems. T1547.006,Boot or Logon Autostart Execution, Kernel Modules And Extensions," Malware trying to get kernel access may run commands before loading a malicious module, and some of these include˜modprobe,˜insmod,˜lsmod,˜rmmod, and˜modinfo. " T1547.006,Boot or Logon Autostart Execution, Kernel Modules And Extensions," Some malware will attempt to load Kexts into the kernel, which create new rows in KextPolicy tables. " T1547.011,Boot or Logon Autostart Execution, Plist Modification,Dok persists via a plist login item. T1547.011,Boot or Logon Autostart Execution, Plist Modification, LoudMiner used plists to execute shell scripts and maintain persistence on boot. LoudMiner also added plist files in /Library/LaunchDaemons with KeepAlive set to true which would restart the process if stopped. T1547.011,Boot or Logon Autostart Execution, Plist Modification, NETWIRE can persist via startup options for Login items. T1547.011,Boot or Logon Autostart Execution, Plist Modification,Property list (plist) files can be manipulated by malware to execute their own malicious executables. T1547.011,Boot or Logon Autostart Execution, Plist Modification, Some malware will create property list files (.plist) to download and execute code as part of maintaining persistence. T1547.011,Boot or Logon Autostart Execution, Plist Modification, macOs malware may try to use the˜plist command to manipulate keys in property list (plist) files to elevate privileges or establish persistence. T1547.011,Boot or Logon Autostart Execution, Plist Modification," Modifying plist files in specific locations can be advantageous to threat actors with˜LSEnvironment for persistence, and˜DYLD_INSERT_LIBRARIES with a path to a malicious DLL under˜EnvironmentVariables for execution. " T1547.011,Boot or Logon Autostart Execution, Plist Modification," Plist files, which are written in XML, are valuable targets on macOS because actors can gain elevated privileges, execute code, and maintain persistence if the correct areas are modified. " T1546.006,Event Triggered Execution, Lc_Load_Dylib Addition,Threat actors may create malicious Macho-O binaries with modified LC_LOAD_DYLIB headers to change which dynamic link libraries (DLLs) should be executed on execution. T1546.006,Event Triggered Execution, Lc_Load_Dylib Addition," While changing binaries will invalidate digital signatures, threat actors can remove the LC_CODE_SIGNATURE command from the binary to prevent signature checks when loading dynamic libraries (DYLIB). " T1546.006,Event Triggered Execution, Lc_Load_Dylib Addition, Malware focused on macOS may change the Mach-O header (LC_LOAD_DYLIB) to instruct the executable which DLLs will be ran upon execution. T1546.006,Event Triggered Execution, Lc_Load_Dylib Addition, Actors will create malware targeting macOS that will have custom LC_LOAD_DYLIB headers to instruct which dylibs (DLLs) should be executed. T1546.006,Event Triggered Execution, Lc_Load_Dylib Addition, Malicious dylibs (DLLs) targeting macOS can be loaded and executed through the LC_LOAD_DYLIB header in a Mach-O binary. T1480.001,Execution Guardrails, Environmental Keying,APT41 has encrypted payloads using the Data Protection API (DPAPI) which relies on keys tied to specific user accounts on specific machines. APT41 has also environmentally keyed second stage malware with an RC5 key derived in part from the infected system's volume serial number. T1480.001,Execution Guardrails, Environmental Keying, Equation has been observed utilizing environmental keying in payload delivery. T1480.001,Execution Guardrails, Environmental Keying, InvisiMole can use Data Protection API to encrypt its components on the victimcomputer to evade detection and to make sure the payload can only be decrypted and loaded on one specific compromised computer. T1480.001,Execution Guardrails, Environmental Keying,"Malware with actor-created environment keys can gather elements to use in deciding if a second-stage, encrypted payload should be dropped. " T1480.001,Execution Guardrails, Environmental Keying," Some actors will implement environmental keying to gather legitimate, cryptographic processes such as data protection API (DPAPI), to encrypt their payloads. " T1480.001,Execution Guardrails, Environmental Keying, Malware using environmental keying will check for specific items to be present on an infected machine or system and use the discoveries to encrypt its malicious activity. T1480.001,Execution Guardrails, Environmental Keying, Environmental keying using data protection API makes an encrypted payload that can only be decrypted from the infected hist. T1480.001,Execution Guardrails, Environmental Keying, Searching for environment keys within a compromised environment can allow an actor to abuse legitimate components to encrypt their malicious activity. T1498.002,Network Denial of Service, Reflection Amplification,"Threat actors can use third-party services to conduct network denial-of-service (DoS) by spoofing the target IP, and forcing the real IP to attempt to resolve high volumes of network traffic back and forth via UDP or TCP. " T1498.002,Network Denial of Service, Reflection Amplification, Some botnet malware may attempt to use denial of service reflection attacks by tricking a target IP address into responding to a third party server in a back and forth of UDP/TCP packets. T1498.002,Network Denial of Service, Reflection Amplification," Actors can conduct denial-of-service (DoS) attacks by using tricking a legitimate sever into responding to requests made from a spoofed (target) IP address in a reflection attack, and then combined with small request and a large reply to amplify the attack. " T1498.002,Network Denial of Service, Reflection Amplification, A large flood of packets flooding into the same source port but with different destination port numbers may be a sign of an amplification reflection attack. T1498.002,Network Denial of Service, Reflection Amplification," Malware can use seemingly benign servers that show no indication of compromised and force them to request information from a targetIP, forcing them to respond to the requests and filling up bandwidth. " T1498.001,Network Denial of Service, Direct Network Flood,Denial of service attacks that consist of packets directly sent to target in aims of exhausting that resource T1498.001,Network Denial of Service, Direct Network Flood," Distributed denial-of-service attacks are conducted by botnets, such as Mirai, with the objective of sending so much fake traffic or legitimate requests as to prevent the target from functioning normally. " T1498.001,Network Denial of Service, Direct Network Flood, Threat actors may conduct reconnaissance to find targets that are most vulnerable to flooding the network with traffic to deny or disrupt service. T1498.001,Network Denial of Service, Direct Network Flood," Network flooding is a common tool amongst threat actors, and there are online locations that offer DDoS services for purchase. " T1498.001,Network Denial of Service, Direct Network Flood, Some botnet malware will use thousands if not millions of compromised devices to conduct distributed denial-of-service (DDoS) attacks directly at their target. T1499.002,Endpoint Denial of Service, Service Exhaustion Flood,"Actors can conduct endpoint denial of service attacks by targeting endpoints including DNS, email services, and web-based applications in attempts to prevent that one target from functioning. " T1499.002,Endpoint Denial of Service, Service Exhaustion Flood, Botnet malware can launch distributed denial-of-service (DDoS) attacks targeting endpoints to flood traffic and overwhelm the target system with service exhaustion. T1499.002,Endpoint Denial of Service, Service Exhaustion Flood, Malware may use HTTP flooding or SSL renegotiation attacks to create a service exhaustion flood. T1499.002,Endpoint Denial of Service, Service Exhaustion Flood, Actors can attack targets in attempts to render them unusable to users through HTTP requests or renegotiating SSL/TSL crypto algorithms. T1499.002,Endpoint Denial of Service, Service Exhaustion Flood, Exhausting services with fake requests or protocol negotiations can be an affect way to prevent users from accessing the target. T1499.004,Endpoint Denial of Service, Application Or System Exploitation,Industroyer uses a custom DoS tool that leverages CVE-2015-5374 and targets hardcoded IP addresses of Siemens SIPROTEC devices. T1499.004,Endpoint Denial of Service, Application Or System Exploitation,"Actors may try to exploit a vulnerability in an application or system to launch denial of service (DoS) attacks, some of these vulnerabilities include CVE-2021-45078, CVE-2021-45046, CVE-2021-44686, CVE-2021-44429, among thousands of others. " T1499.004,Endpoint Denial of Service, Application Or System Exploitation, Some malware will attempt to cause applications or systems to crash by exploiting a vulnerability and denying service. T1499.004,Endpoint Denial of Service, Application Or System Exploitation," Some actors will exploit vulnerabilities to force apps and systems to crash or restart, leaving it inaccessible by users. " T1499.004,Endpoint Denial of Service, Application Or System Exploitation," Exploitation of vulnerabilities can cause applications or systems to overflow and crash, and persistent re-exploitation can deny service completely. " T1499.004,Endpoint Denial of Service, Application Or System Exploitation, Successful exploitation of certain vulnerabilities can result in denial-of-service attacks. T1499.003,Endpoint Denial of Service, Application Exhaustion Flood,Web applications positioned on top of web servers are attractive targets during endpoint denial-of-service attacks. T1499.003,Endpoint Denial of Service, Application Exhaustion Flood, Public-facing apps are easily identifiable targets for denial of service. T1499.003,Endpoint Denial of Service, Application Exhaustion Flood, Application servers can be targeted for denial of service (DoS) attacks by simply repeating legitimate requests at a large scale. T1499.003,Endpoint Denial of Service, Application Exhaustion Flood, Legitimate apps and services are open targets for malware that repeats legitimate or spoofed requests to deny access by sheer volume. T1499.003,Endpoint Denial of Service, Application Exhaustion Flood," Exhausting resources can cause real damage to a company, and threat actors will sometimes threaten specific applications (apps) with denial-of-service (DoS) to disrupt business operations at key points in time. " T1518.001,Software Discovery, Security Software Discovery,ABK has the ability to identify the installed anti-virus product on the compromised host. T1518.001,Software Discovery, Security Software Discovery, Astaroth checks for the presence of Avast antivirus in the C:\Program\Files\ folder. T1518.001,Software Discovery, Security Software Discovery, Avenger has the ability to identify installed anti-virus products on a compromised host. T1518.001,Software Discovery, Security Software Discovery, BadPatch uses WMI to enumerate installed security products in the victimenvironment. T1518.001,Software Discovery, Security Software Discovery, Bazar can identify the installed antivirus engine. T1518.001,Software Discovery, Security Software Discovery, build_downer has the ability to detect if the infected host is running an anti-virus process. T1518.001,Software Discovery, Security Software Discovery, Carberp has queried the infected system's registry searching for specific registry keys associated with antivirus products. T1518.001,Software Discovery, Security Software Discovery, CHOPSTICK checks for antivirus and forensics software. T1518.001,Software Discovery, Security Software Discovery, Cobalt Group used a JavaScript backdoor that is capable of collecting a list of the security solutions installed on the victim's machine. T1518.001,Software Discovery, Security Software Discovery, Comnie attempts to detect several anti-virus products. T1518.001,Software Discovery, Security Software Discovery," CookieMiner has checked for the presence of Little Snitch"" macOS network monitoring and application firewall software stopping and exiting if it is found. " T1518.001,Software Discovery, Security Software Discovery, The main CozyCar dropper checks whether the victim has an anti-virus product installed. If the installed product is on a predetermined list the dropper will exit. T1518.001,Software Discovery, Security Software Discovery, Crimson contains a command to collect information about anti-virus software on the victim. T1518.001,Software Discovery, Security Software Discovery, Darkhotel has searched for anti-malware strings and anti-virus processes running on the system. T1518.001,Software Discovery, Security Software Discovery, down_new has the ability to detect anti-virus products and processes on a compromised host. T1518.001,Software Discovery, Security Software Discovery, DustySky checks for the existence of anti-virus. T1518.001,Software Discovery, Security Software Discovery, Empire can enumerate antivirus software on the target. T1518.001,Software Discovery, Security Software Discovery, Epic searches for anti-malware services running on the victimmachine and terminates itself if it finds them. T1518.001,Software Discovery, Security Software Discovery, EvilBunny has been observed querying installed antivirus software. T1518.001,Software Discovery, Security Software Discovery, EVILNUM can search for anti-virus products on the system. T1518.001,Software Discovery, Security Software Discovery, Felismus checks for processes associated with anti-virus vendors. T1518.001,Software Discovery, Security Software Discovery, FELIXROOT checks for installed security software like antivirus and firewall. T1518.001,Software Discovery, Security Software Discovery, FIN8 has used Registry keys to detect and avoid executing in potential sandboxes. T1518.001,Software Discovery, Security Software Discovery, FinFisher probes the system to check for antimalware processes. T1518.001,Software Discovery, Security Software Discovery, Flame identifies security software such as antivirus through the Security module. T1518.001,Software Discovery, Security Software Discovery, FlawedAmmyy will attempt to detect anti-virus products during the initial infection. T1518.001,Software Discovery, Security Software Discovery, Frankenstein has used WMI queries to detect if virtualization environments or analysis tools were running on the system. T1518.001,Software Discovery, Security Software Discovery, Gold Dragon checks for anti-malware products and processes. T1518.001,Software Discovery, Security Software Discovery, Grandoreiro can list installed security products including the Trusteer and Diebold Warsaw GAS Tecnologia online banking protections. T1518.001,Software Discovery, Security Software Discovery, InvisiMole can check for the presence of network sniffers AV and BitDefender firewall. T1518.001,Software Discovery, Security Software Discovery, JPIN checks for the presence of certain security-related processes and deletes its installer/uninstaller component if it identifies any of them. T1518.001,Software Discovery, Security Software Discovery, jRAT can list security software such as by using WMIC to identify anti-virus products installed on the victimmachine and to obtain firewall details. T1518.001,Software Discovery, Security Software Discovery, Kasidet has the ability to identify any anti-virus installed on the infected system. T1518.001,Software Discovery, Security Software Discovery, Metamorfo collects a list of installed antivirus software from the victimsystem. T1518.001,Software Discovery, Security Software Discovery, Micropsia searches for anti-virus software and firewall products installed on the victimmachine using WMI. T1518.001,Software Discovery, Security Software Discovery, MoleNet can use WMI commands to check the system for firewall and antivirus software. T1518.001,Software Discovery, Security Software Discovery, More_eggs can obtain information on installed anti-malware programs. T1518.001,Software Discovery, Security Software Discovery, Mosquito's installer searches the Registry and system to see if specific antivirus tools are installed on the system. T1518.001,Software Discovery, Security Software Discovery, MuddyWater has used malware to check running processes against a hard-coded list of security tools often used by malware researchers. T1518.001,Software Discovery, Security Software Discovery, Naikon uses commands such as netsh advfirewall firewall to discover local firewall settings. T1518.001,Software Discovery, Security Software Discovery, netsh can be used to discover system firewall settings. T1518.001,Software Discovery, Security Software Discovery, Netwalker can detect and terminate active security software-related processes on infected systems. T1518.001,Software Discovery, Security Software Discovery, NotPetya determines if specific antivirus programs are running on an infected host machine. T1518.001,Software Discovery, Security Software Discovery, Operation Wocao has used scripts to detect security software. T1518.001,Software Discovery, Security Software Discovery, Patchwork scanned theProgram Files directories for a directory with the stringTotal Security (the installation path of the360 Total Security antivirus tool). T1518.001,Software Discovery, Security Software Discovery, PipeMon can check for the presence of ESET and Kaspersky security software. T1518.001,Software Discovery, Security Software Discovery, POWERSTATS has detected security tools. T1518.001,Software Discovery, Security Software Discovery, POWRUNER may collect information on the victim's anti-virus software. T1518.001,Software Discovery, Security Software Discovery, A module in Prikormka collects information from the victim about installed anti-virus software. T1518.001,Software Discovery, Security Software Discovery, PUNCHBUGGY can gather AVs registered in the system. T1518.001,Software Discovery, Security Software Discovery, Remsec has a plugin to detect active drivers of some security products. T1518.001,Software Discovery, Security Software Discovery, Rocke used scripts which detected and uninstalled antivirus software. T1518.001,Software Discovery, Security Software Discovery, RogueRobin enumerates running processes to search for Wireshark and Windows Sysinternals suite. T1518.001,Software Discovery, Security Software Discovery, ROKRAT checks for debugging tools. T1518.001,Software Discovery, Security Software Discovery, RTM can obtain information about security software on the victim. T1518.001,Software Discovery, Security Software Discovery, Sidewinder has used the Windows service winmgmts:\.\root\SecurityCenter2 to check installed antivirus products. T1518.001,Software Discovery, Security Software Discovery, Skidmap has the ability to check if /usr/sbin/setenforce exists. This file controls what mode SELinux is in. T1518.001,Software Discovery, Security Software Discovery, StoneDrill can check for antivirus and antimalware programs. T1518.001,Software Discovery, Security Software Discovery, StreamEx has the ability to scan for security tools such as firewalls and antivirus tools. T1518.001,Software Discovery, Security Software Discovery, StrongPity can identify if ESET or BitDefender antivirus are installed before dropping its payload. T1518.001,Software Discovery, Security Software Discovery, SUNBURST checked for a variety of antivirus/endpoint detection agents prior to execution. T1518.001,Software Discovery, Security Software Discovery, T9000 performs checks for various antivirus and security products during installation. T1518.001,Software Discovery, Security Software Discovery, TajMahal has the ability to identify which anti-virus products firewalls and anti-spyware products are in use. T1518.001,Software Discovery, Security Software Discovery, Tasklist can be used to enumerate security software currently running on a system by process name of known products. T1518.001,Software Discovery, Security Software Discovery, The White Company has checked for specific antivirus products on the targetcomputer including Kaspersky Quick Heal AVG BitDefender Avira Sophos Avast! and ESET. T1518.001,Software Discovery, Security Software Discovery, ThiefQuest uses the kill_unwanted function to get a list of running processes compares each process with an encrypted list ofunwanted security related programs and kills the processes for security related programs. T1518.001,Software Discovery, Security Software Discovery, Tropic Trooper can search for anti-virus software running on the system. T1518.001,Software Discovery, Security Software Discovery, Turla has obtained information on security software including security logging information that may indicate whether their malware has been detected. T1518.001,Software Discovery, Security Software Discovery, Valak can determine if a compromised host has security products installed. T1518.001,Software Discovery, Security Software Discovery, VERMIN uses WMI to check for anti-virus software installed on the system. T1518.001,Software Discovery, Security Software Discovery, Waterbear can find the presence of a specific security software. T1518.001,Software Discovery, Security Software Discovery, Windshift has used malware to identify installed AV and commonly used forensic and malware analysis tools. T1518.001,Software Discovery, Security Software Discovery, Wingbird checks for the presence of Bitdefender security software. T1518.001,Software Discovery, Security Software Discovery, Wizard Spider has used WMI to identify anti-virus products installed on a victim's machine. T1518.001,Software Discovery, Security Software Discovery, YAHOYAH checks for antimalware solution processes on the system. T1518.001,Software Discovery, Security Software Discovery," Zeus Panda checks to see if anti-virus anti-spyware or firewall products are installed in the victimenvironment.""" T1016.001,System Network Configuration Discovery, Internet Connection Discovery,APT29 has used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through. T1016.001,System Network Configuration Discovery, Internet Connection Discovery, GoldFinder performed HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request traveled through. T1016.001,System Network Configuration Discovery, Internet Connection Discovery, More_eggs has used HTTP GET requests to check internet connectivity. T1016.001,System Network Configuration Discovery, Internet Connection Discovery, Turla has used tracert to check internet connectivity. T1016.001,System Network Configuration Discovery, Internet Connection Discovery, UNC2452 has used GoldFinder to perform HTTP GET requests to check internet connectivity and identify HTTP proxy servers and other redirectors that an HTTP request travels through. T1114.002,Email Collection, Remote Email Collection,APT1 uses two utilities GETMAIL and MAPIGET to steal email. MAPIGET steals email still on Exchange servers that has not yet been archived. T1114.002,Email Collection, Remote Email Collection, APT28 has collected emails from victim Microsoft Exchange servers. T1114.002,Email Collection, Remote Email Collection, APT29 collected emails from specific individuals such as executives and IT staff using New-MailboxExportRequest followed by Get-MailboxExportRequest. T1114.002,Email Collection, Remote Email Collection, Chimera has harvested data from remote mailboxes including through execution of \\c$\Users\\AppData\Local\Microsoft\Outlook*.ost. T1114.002,Email Collection, Remote Email Collection, Dragonfly 2.0 accessed email accounts using Outlook Web Access. T1114.002,Email Collection, Remote Email Collection, FIN4 has accessed and hijacked online email communications using stolen credentials. T1114.002,Email Collection, Remote Email Collection, HAFNIUM has used web shells to export mailbox data. T1114.002,Email Collection, Remote Email Collection, Ke3chang used a .NET tool to dump data from Microsoft Exchange mailboxes. T1114.002,Email Collection, Remote Email Collection, Leafminer used a tool called MailSniper to search through the Exchange server mailboxes for keywords. T1114.002,Email Collection, Remote Email Collection, LightNeuron collects Exchange emails matching rules specified in its configuration. T1114.002,Email Collection, Remote Email Collection, MailSniper can be used for searching through email in Exchange and Office 365 environments. T1114.002,Email Collection, Remote Email Collection, Some SeaDuke samples have a module to extract email from Microsoft Exchange servers using compromised credentials. T1114.002,Email Collection, Remote Email Collection, UNC2452 collected emails from specific individuals such as executives and IT staff using New-MailboxExportRequest followed by Get-MailboxExportRequest. T1114.002,Email Collection, Remote Email Collection, Valak can collect sensitive mailing information from Exchange servers including credentials and the domain certificate of an enterprise. T1114.003,Email Collection, Email Forwarding Rule,Kimsuky has set auto-forward rules on victim's e-mail accounts. T1114.003,Email Collection, Email Forwarding Rule, Silent Librarian has set up auto forwarding rules on compromised e-mail accounts. T1114.003,Email Collection, Email Forwarding Rule,Some groups will have their malware create email forwarding rules to gain control over a mail servers sent and received messages. T1114.003,Email Collection, Email Forwarding Rule, Email forwarding rules can grant malware the ability to retain control over a mail server even if the credentials have been changed. T1114.003,Email Collection, Email Forwarding Rule, Actors may use Microsoft Messaging API (MAPI) to modify email rule properties to conceal them from email clients and tools. T1114.003,Email Collection, Email Forwarding Rule, Information-motivated groups may use previously-compromised email credentials to set up email forwarding rules on multiple compromised accounts in attempts to cast a wide net to steal valuable data. T1114.003,Email Collection, Email Forwarding Rule, Threat groups may set up forwarding rules on compromised email accounts to gather more information and credentials. T1087.004,Account Discovery, Cloud Account,Actors can use the˜Get-MsolRoleMember PowerShell command-let (cmdlet) to get user role and permissions groups in Office 365. T1087.004,Account Discovery, Cloud Account," In Azure, malware or actors may try to run commands to get user and group information, and this can be done with the˜az ad user list command. " T1087.004,Account Discovery, Cloud Account," In Kubernetes, actors may try to run commands such as˜kubectl config view -o jsonpath='{.users[*].name}' to get a list of all users or˜kubectl config get-users to display users defined in the kubeconfig. " T1087.004,Account Discovery, Cloud Account," Actors or malware may run the AWS command˜aws iam list-users to get users on a the account, or run˜aws iam list-roles to get IAM role information. " T1087.004,Account Discovery, Cloud Account," For GCP, actors or malware may run the˜gcloud iam service-accounts list or˜gcloud projects get-iam-policy to obtain cloud account and project information. " T1136.003,Create Account, Cloud Account,Some actors will create additional accounts on target cloud environments to deploy tools or other malicious activity. T1136.003,Create Account, Cloud Account," Adversaries may create accounts that only have access to specific cloud services, which can reduce the chance of detection. " T1136.003,Create Account, Cloud Account, Creating accounts on specific cloud systems with the correct permissions can allow malware or actors to conceal themselves while stealing data. T1136.003,Create Account, Cloud Account, Actors targeting cloud providers may create fake accounts to blend in with normal activity. T1136.003,Create Account, Cloud Account," Malware or actors will sometimes create dedicated accounts for their targets, such as cloud providers, to maintain persistence in the environment. " T1078.004,Valid Accounts, Cloud Accounts,APT33 has used compromised Office 365 accounts in tandem with Ruler in an attempt to gain control of endpoints. T1078.004,Valid Accounts, Cloud Accounts, APT28 has used compromised Office 365 service accounts with Global Administrator privileges to collect email from user inboxes. T1078.004,Valid Accounts, Cloud Accounts,"Some threat actors will create legitimate accounts on targeted platforms or services, such as cloud providers, to elevate privileges and maintain persistence. " T1078.004,Valid Accounts, Cloud Accounts, Threat actors and adversaries may create accounts with global administrator privileges on targeted cloud environment to steal large amounts of data. T1078.004,Valid Accounts, Cloud Accounts, Compromised credentials for cloud-related accounts can allow malware or actors to steal data and information by using authentic accounts for malicious purposes. T1078.004,Valid Accounts, Cloud Accounts, Using valid cloud accounts for malicious purposes is a good technique for actors and malware to remain under the radar while conducting nefarious activity. T1078.004,Valid Accounts, Cloud Accounts, Abusing trusted relationships of any cloud account given to employees is an effective means to conduct malicious activity. T1550.003,Use Alternate Authentication Material, Pass The Ticket,APT29 used Kerberos ticket attacks for lateral movement. T1550.003,Use Alternate Authentication Material, Pass The Ticket, APT32 successfully gained remote access by using pass the ticket. T1550.003,Use Alternate Authentication Material, Pass The Ticket, BRONZE BUTLER has created forged Kerberos Ticket Granting Ticket (TGT) and Ticket Granting Service (TGS) tickets to maintain administrative access. T1550.003,Use Alternate Authentication Material, Pass The Ticket, MimikatzLSADUMP::DCSync and KERBEROS::PTT modules implement the three steps required to extract the krbtgt account hash and create/use Kerberos tickets. T1550.003,Use Alternate Authentication Material, Pass The Ticket, Pupy can also perform pass-the-ticket. T1550.003,Use Alternate Authentication Material, Pass The Ticket, Some SeaDuke samples have a module to use pass the ticket with Kerberos for authentication. T1550.002,Use Alternate Authentication Material, Pass The Hash,The APT1 group is known to have used pass the hash. T1550.002,Use Alternate Authentication Material, Pass The Hash, APT28 has used pass the hash for lateral movement. T1550.002,Use Alternate Authentication Material, Pass The Hash, APT32 has used pass the hash for lateral movement. T1550.002,Use Alternate Authentication Material, Pass The Hash, Chimera has dumped password hashes for use in pass the hash authentication attacks. T1550.002,Use Alternate Authentication Material, Pass The Hash, Cobalt Strike can perform pass the hash. T1550.002,Use Alternate Authentication Material, Pass The Hash, CrackMapExec can pass the hash to authenticate via SMB. T1550.002,Use Alternate Authentication Material, Pass The Hash, Empire can perform pass the hash attacks. T1550.002,Use Alternate Authentication Material, Pass The Hash, GALLIUM used dumped hashes to authenticate to other machines via pass the hash. T1550.002,Use Alternate Authentication Material, Pass The Hash, HOPLIGHT has been observed loading several APIs associated with Pass the Hash. T1550.002,Use Alternate Authentication Material, Pass The Hash, Kimsuky has used pass the hash for authentication to remote access software used in C2. T1550.002,Use Alternate Authentication Material, Pass The Hash, Mimikatz's SEKURLSA::Pth module can impersonate a user with only a password hash to execute arbitrary commands. T1550.002,Use Alternate Authentication Material, Pass The Hash, Night Dragon used pass-the-hash tools to gain usernames and passwords. T1550.002,Use Alternate Authentication Material, Pass The Hash, Pass-The-Hash Toolkit can perform pass the hash. T1550.002,Use Alternate Authentication Material, Pass The Hash, PoshC2 has a number of modules that leverage pass the hash for lateral movement. T1562.008,Impair Defenses, Disable Cloud Logs,Threat actors may try to collect cloud log data and subsequently disable the logs to hide their activity. T1562.008,Impair Defenses, Disable Cloud Logs, Malware or actors may disable cloud logs in Amazon Web Services (AWS) with commands like˜StopLogging and˜DeleteTrail. T1562.008,Impair Defenses, Disable Cloud Logs, Disabling logs in cloud environments can allow actors or malware to conceal their malicious activity. T1562.008,Impair Defenses, Disable Cloud Logs," In efforts to conceal their actions, adversaries may disable cloud logs in GCP while deploying other apps or containers. " T1562.008,Impair Defenses, Disable Cloud Logs, Adversaries may disable event logging in Kubernetes to hide their deployment applications or containers on a target environment. T1546.004,Event Triggered Execution, Unix Shell Configuration Modification,Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files. T1546.004,Event Triggered Execution, Unix Shell Configuration Modification,Some malware will maintain persistence via rc.local and .bashrc files. T1546.004,Event Triggered Execution, Unix Shell Configuration Modification," On Linux and Unix systems, malware may try to maintain persistence by using bash scripts. " T1546.004,Event Triggered Execution, Unix Shell Configuration Modification," Login environments, such as .bash or ZSH, can be used by malware to create events that are launched on every boot or login. " T1546.004,Event Triggered Execution, Unix Shell Configuration Modification," Using shell commands contained in files, actors can instruct infected hosts to launch specific events at pre-determined times. " T1546.004,Event Triggered Execution, Unix Shell Configuration Modification, Many actors and malware will use login environments to force an infected machine to execute scripts at any specified time. T1562.007,Impair Defenses, Disable Or Modify Cloud Firewall,Adversaries may attempt to modify cloud firewall settings to allow connections for further downloads or uploads. T1562.007,Impair Defenses, Disable Or Modify Cloud Firewall," Some actors and malware will disable cloud firewall settings for short periods of time to allow connections, and then restore restrictions to avoid detection. " T1562.007,Impair Defenses, Disable Or Modify Cloud Firewall, Malware that manipulates cloud firewall settings can allow threat actors to steal data and resources. T1562.007,Impair Defenses, Disable Or Modify Cloud Firewall," If actors get control of a cloud firewall, they will be able to change settings to allow further malicious activity. " T1562.007,Impair Defenses, Disable Or Modify Cloud Firewall," Modifying or disabling a cloud firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed. " T1578.004,Modify Cloud Compute Infrastructure, Revert Cloud Instance,"Reverting cloud infrastructure instances allows malware and actors to conduct malicious activities, and then revert to a clean state to hide their actions. " T1578.004,Modify Cloud Compute Infrastructure, Revert Cloud Instance, Actors can hide their malicious activity while in cloud instances by restoring the virtual machine to a previous state. T1578.004,Modify Cloud Compute Infrastructure, Revert Cloud Instance, Restoring a virtual machine to its original state after malicious activity has been completed is a good technique to conceal malicious activity. T1578.004,Modify Cloud Compute Infrastructure, Revert Cloud Instance, Adversaries may restore cloud environments to previous snapshots once cybercriminal activity has been completed. T1578.004,Modify Cloud Compute Infrastructure, Revert Cloud Instance, Actors and malware can take advantage of ephemeral storage types because they often restart/reset once the VM is stopped or rebooted. T1578.003,Modify Cloud Compute Infrastructure, Delete Cloud Instance,Threat actors may delete a cloud instance or virtual machine to hide their malicious activity. T1578.003,Modify Cloud Compute Infrastructure, Delete Cloud Instance," CloudTrail logs, in Amazon Web Services (AWS), can capture cloud instance deletion in the˜TerminateInstaces event. " T1578.003,Modify Cloud Compute Infrastructure, Delete Cloud Instance," Within GoogleAdmin Activity audit logs, the Cloud Audit logs can detect when instances or virtual machines (VMs) are deleted via the gcloud˜compute instances delete command. " T1578.003,Modify Cloud Compute Infrastructure, Delete Cloud Instance," In Kubernetes, malware or threat actors may attempt to remove finalizers (finalizer key) prior to deleting a cloud instance. " T1578.003,Modify Cloud Compute Infrastructure, Delete Cloud Instance," Deleting evidence of malicious operations, such as manipulating or removing cloud instances or VMs, may be done by actors or malware to conceal their operations. " T1578.001,Modify Cloud Compute Infrastructure, Create Snapshot,Malware may attempt to modify existing cloud infrastructure by creating new snapshots to steal resources or data. T1578.001,Modify Cloud Compute Infrastructure, Create Snapshot, Cybercriminals may create snapshots on cloud systems and grant only themselves access to it establish or maintain persistence. T1578.001,Modify Cloud Compute Infrastructure, Create Snapshot, Creating a snapshot with firewall-restricted access in a cloud instance can give adversaries concealed access and persistence on a target system. T1578.001,Modify Cloud Compute Infrastructure, Create Snapshot, Actors may create a snapshot on a virtual hard drive or volume from which to maintain access onto a targetsystem. T1578.001,Modify Cloud Compute Infrastructure, Create Snapshot, Actors can create snapshots on cloud systems to launch attacks from. T1578.002,Modify Cloud Compute Infrastructure, Create Cloud Instance,"On Google Admin Activity audit logs, actors can use the command˜gcloud compute instances create to create a new cloud instance. " T1578.002,Modify Cloud Compute Infrastructure, Create Cloud Instance, Adversaries may a new virtual machine to launch attacks from and evade defenses. T1578.002,Modify Cloud Compute Infrastructure, Create Cloud Instance, Threat actors can create a new cloud instance to bypass firewall rules and permissions that may exist in an account. T1578.002,Modify Cloud Compute Infrastructure, Create Cloud Instance, Cybercriminals can utilize cloud systems by creating new instances that are hidden from view and do not affect the targets operations. T1578.002,Modify Cloud Compute Infrastructure, Create Cloud Instance, Actors may setup their own infrastructure in a target network by creating cloud instances with custom security settings to avoid detection. T1074.002,Data Staged, Remote Data Staging,APT29 staged data and files in password-protected archives on a victim's OWA server. T1074.002,Data Staged, Remote Data Staging, Chimera has staged stolen data on designated servers in the target environment. T1074.002,Data Staged, Remote Data Staging, FIN6 actors have compressed data from remote systems and moved it to another staging system before exfiltration. T1074.002,Data Staged, Remote Data Staging, FIN8 aggregates staged data from a network into a single location. T1074.002,Data Staged, Remote Data Staging, menuPass has staged data on remote MSP systems or other victim networks prior to exfiltration. T1074.002,Data Staged, Remote Data Staging, Night Dragon has copied files to company web servers and subsequently downloaded them. T1074.002,Data Staged, Remote Data Staging, Threat Group-3390 has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration. T1074.002,Data Staged, Remote Data Staging, UNC2452 staged data and files in password-protected archives on a victim's OWA server. T1491.002,Defacement, External Defacement,Sandworm Team defaced approximately 15 000 websites belonging to Georgian government non-government and private sector organizations in 2019. T1491.002,Defacement, External Defacement,Threat actors who want to make a socioeconomical point or deliver a message may deface well-known websites to ensure their point is seen. T1491.002,Defacement, External Defacement, Some websites are defaced by hacktivists or malware in attempts to gather support from other adversaries to accomplish an objective. T1491.002,Defacement, External Defacement," Cybercriminals of lower sophisticated are typically the ones that deface websites, however, advanced groups such as Sandworm Team have defaced thousands of websites. " T1491.002,Defacement, External Defacement, Some state-sponsored groups may use website defacement as a diversionary tactic to distract from their true objectives. T1491.002,Defacement, External Defacement, Website defacements may be used to setup future attacks as an initial access point. T1098.001,Account Manipulation, Additional Cloud Credentials,APT29 has added credentials to OAuth Applications and Service Principals. T1098.001,Account Manipulation, Additional Cloud Credentials, UNC2452 added credentials to OAuth Applications and Service Principals. T1098.001,Account Manipulation, Additional Cloud Credentials,Threat actors may add their own credentials into a created or compromised cloud service account to setup legitimate services on a system under their control. T1098.001,Account Manipulation, Additional Cloud Credentials," Some malware and actors will gain illicit access to an account that inside a cloud environment, such as AWS, GCP, or Kubernetes, and credentials for own accounts. " T1098.001,Account Manipulation, Additional Cloud Credentials," If an actor can breach cloud accounts with the correct privileges, there are numerous ways the adversary could add their own credentials into a target system. " T1547.014,Boot or Logon Autostart Execution, Active Setup,PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable. T1547.014,Boot or Logon Autostart Execution, Active Setup,Cybercriminals may manipulate Active Setup by adding a registry key so that the malicious key will be executed when a user logs in. T1547.014,Boot or Logon Autostart Execution, Active Setup, Threat actors can maintain persistence on a machine by adding a registry to the Active Setup on Windows operating systems. T1547.014,Boot or Logon Autostart Execution, Active Setup, An actor can add registry keys to Windows Active Setup to execute programs from a useraccount every time he/she/them logs in. T1547.014,Boot or Logon Autostart Execution, Active Setup, Malware may attempt to use Active Setup components on Windows systems to execute specific actions upon every login. T1547.014,Boot or Logon Autostart Execution, Active Setup, Active Setup components can be utilized by adversaries to force breached or compromised accounts to conduct malicious activity while disguised as a legitimate user. T1127.001,Trusted Developer Utilities Proxy Execution, Msbuild,Empire can use built-in modules to abuse trusted utilities like MSBuild.exe. T1127.001,Trusted Developer Utilities Proxy Execution, Msbuild, Frankenstein has used MSbuild to execute an actor-created file. T1127.001,Trusted Developer Utilities Proxy Execution, Msbuild, A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe presumably to bypass application control techniques. T1127.001,Trusted Developer Utilities Proxy Execution, Msbuild,Adversaries may use MSBuild to proxy execution of code through a trusted Windows utility. T1127.001,Trusted Developer Utilities Proxy Execution, Msbuild," Legitimate software, such as Windows Microsoft Build Engine (MSBuild.exe), can be abused by threat actors to execute malware under the guise of a trusted utility. " T1127.001,Trusted Developer Utilities Proxy Execution, Msbuild, Malware or actors can bypass security features by using MSBuild to execute files that will be allowed by security controls because it is a trusted program. T1553.003,Subvert Trust Controls, Sip And Trust Provider Hijacking,Adversaries may tamper with SIP and trust provider components to mislead the operating system and application control tools when conducting signature validation checks. T1553.003,Subvert Trust Controls, Sip And Trust Provider Hijacking, Subject Interface Packages (SIPs) can be manipulated by threat actors to trick operating systems into executing code that could otherwise blocked by security features. T1553.003,Subvert Trust Controls, Sip And Trust Provider Hijacking, Cybercriminals or malware may try to change trust controls that only allow code execution from software with valid digital certificates to conduct malicious activity. T1553.003,Subvert Trust Controls, Sip And Trust Provider Hijacking, Actors may try to subvert operating system (OS) trust controls to hide from security solutions when executing malware. T1553.003,Subvert Trust Controls, Sip And Trust Provider Hijacking, Threat actors or groups are known to try to hijack OS trust provider architecture to allow execution of code that does not have a valid digital certificate. T1484.001,Domain Policy Modification, Group Policy Modification,Egregor can modify the GPO to evade detection. T1484.001,Domain Policy Modification, Group Policy Modification, Empire can use New-GPOImmediateTask to modify a GPO that will install and execute a malicious Scheduled Task/Job. T1484.001,Domain Policy Modification, Group Policy Modification, Indrik Spider has used Group Policy Objects to deploy batch scripts. T1484.001,Domain Policy Modification, Group Policy Modification,"Adversaries may modify group policy objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on the domain. " T1484.001,Domain Policy Modification, Group Policy Modification," Threat actors can use GPOs (virtual collection of policy settings) to force infect machines to connect to command and control (C2) IPs, domains, or servers for further malicious activity. " T1484.001,Domain Policy Modification, Group Policy Modification," Policy settings for groups on Windows operating systems (OSs) can be used to created scheduled tasks for persistence, download payloads, modify settings, and steal data. " T1484.001,Domain Policy Modification, Group Policy Modification," Group policy objects can be modified by cybercriminals to disable tools, elevate privileges, establish persistence, and execute code, among numerous other malicious activities. " T1484.001,Domain Policy Modification, Group Policy Modification," Malicious GPO modifications can be used to implement many other malicious behaviors such as Scheduled Task/Job, Disable or Modify Tools, Ingress Tool Transfer, Create Account, Service Execution, and more. " T1134.005,Access Token Manipulation, Sid,Empire can add a SID-History to a user if on a domain controller. T1134.005,Access Token Manipulation, Sid, Mimikatz's MISC::AddSid module can appended any SID or user/group account to a user's SID-History. Mimikatz also utilizes SID-History Injection to expand the scope of other components such as generated Kerberos Golden Tickets and DCSync beyond a single domain. T1134.005,Access Token Manipulation, Sid,Adversaries may use SID-History Injection to escalate privileges and bypass access controls. T1134.005,Access Token Manipulation, Sid, Cybercriminals can manipulate the Windows security identifier (SID) to gather user account history and identifiers to impersonate other users or groups to conduct malicious activity. T1134.005,Access Token Manipulation, Sid, User account and group information stored in Sid-history can be stolen by threat actors to masquerade as legitimate users while launching attacks. T1055.013,Process Injection, Process Doppelgänging,Bazar can inject into a target process using process doppelgänging. T1055.013,Process Injection, Process Doppelgänging, Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems. T1055.013,Process Injection, Process Doppelgänging, SynAck abuses NTFS transactions to launch and conceal malicious processes. T1055.013,Process Injection, Process Doppelgänging,Adversaries may inject malicious code into process via process doppelgänging to evade process-based defenses as well as possibly elevate privileges. T1055.013,Process Injection, Process Doppelgänging, Process doppelgänging is a method of executing arbitrary code in the address space of a separate live process. T1134.004,Access Token Manipulation, Parent Pid Spoofing,Cobalt Strike can spawn processes with alternate PPIDs. T1134.004,Access Token Manipulation, Parent Pid Spoofing, PipeMon can use parent PID spoofing to elevate privileges. T1134.004,Access Token Manipulation, Parent Pid Spoofing,Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to elevate privileges. T1134.004,Access Token Manipulation, Parent Pid Spoofing, Cybercriminals can create fake PPIDs for their malicious activity to elevate privileges or evade security defenses. T1134.004,Access Token Manipulation, Parent Pid Spoofing, Parent process identifiers can be spoofed by actors or malware to allow and conceal execution of malicious processes. T1070.005,Indicator Removal on Host, Network Share Connection Removal,InvisiMole can disconnect previously connected remote drives. T1070.005,Indicator Removal on Host, Network Share Connection Removal, The net use \system\share /delete command can be used in Net to remove an established connection to a network share. T1070.005,Indicator Removal on Host, Network Share Connection Removal, RobbinHood disconnects all network shares from the computer with the command net use * /DELETE /Y. T1070.005,Indicator Removal on Host, Network Share Connection Removal, Threat Group-3390 has detached network shares after exfiltrating files likely to evade detection. T1070.005,Indicator Removal on Host, Network Share Connection Removal,Adversaries may remove share connections that are no longer useful to clean up traces of their operation. T1218.011,Signed Binary Proxy Execution, Rundll32,ADVSTORESHELL has used rundll32.exe in a Registry value to establish persistence. T1218.011,Signed Binary Proxy Execution, Rundll32, APT19 configured its payload to inject into the rundll32.exe. T1218.011,Signed Binary Proxy Execution, Rundll32, APT28 executed CHOPSTICK by using rundll32 commands such as rundll32.exeC:\Windows\twain_64.dll. APT28 also executed a .dll for a first stage dropper using rundll32.exe. An APT28 loader Trojan saved a batch script that uses rundll32 to execute a DLL payload. T1218.011,Signed Binary Proxy Execution, Rundll32, APT29 has used Rundll32.exe to execute payloads. T1218.011,Signed Binary Proxy Execution, Rundll32, APT3 has a tool that can run DLLs. T1218.011,Signed Binary Proxy Execution, Rundll32, APT32 malware has used rundll32.exe to execute an initial infection process. T1218.011,Signed Binary Proxy Execution, Rundll32, APT41 has used rundll32.exe to execute a loader. T1218.011,Signed Binary Proxy Execution, Rundll32, Attor's installer plugin can schedule rundll32.exe to load the dispatcher. T1218.011,Signed Binary Proxy Execution, Rundll32, Bisonal uses rundll32.exe to execute as part of the Registry Run key it adds: HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Run\vert =rundll32.exe c:\windows\temp\pvcu.dll Qszdez. T1218.011,Signed Binary Proxy Execution, Rundll32, BLINDINGCAN has used Rundll32 to load a malicious DLL. T1218.011,Signed Binary Proxy Execution, Rundll32, Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using rundll32.exe. T1218.011,Signed Binary Proxy Execution, Rundll32, Briba uses rundll32 within Registry Run Keys / Startup Folder entries to execute malicious DLLs. T1218.011,Signed Binary Proxy Execution, Rundll32, Carbanak installs VNC server software that executes through rundll32. T1218.011,Signed Binary Proxy Execution, Rundll32, Comnie uses Rundll32 to load a malicious DLL. T1218.011,Signed Binary Proxy Execution, Rundll32, CopyKittens uses rundll32 to load various tools on victims including a lateral movement tool named Vminst Cobalt Strike and shellcode. T1218.011,Signed Binary Proxy Execution, Rundll32," CORESHELL is installed via execution of rundll32 with an export named init"" or ""InitW."" " T1218.011,Signed Binary Proxy Execution, Rundll32, The CozyCar dropper copies the system file rundll32.exe to the install location for the malware then uses the copy of rundll32.exe to load and execute the main CozyCar component. T1218.011,Signed Binary Proxy Execution, Rundll32, DDKONG uses Rundll32 to ensure only a single instance of itself is running at once. T1218.011,Signed Binary Proxy Execution, Rundll32, Egregor has used rundll32 during execution. T1218.011,Signed Binary Proxy Execution, Rundll32, After copying itself to a DLL file a variant of Elise calls the DLL file using rundll32.exe. T1218.011,Signed Binary Proxy Execution, Rundll32, Variants of Emissary have used rundll32.exe in Registry values added to establish persistence. T1218.011,Signed Binary Proxy Execution, Rundll32, EVILNUM can execute commands and scripts through rundll32. T1218.011,Signed Binary Proxy Execution, Rundll32, FatDuke can execute via rundll32. T1218.011,Signed Binary Proxy Execution, Rundll32, FELIXROOT uses Rundll32 for executing the dropper program. T1218.011,Signed Binary Proxy Execution, Rundll32, Rundll32.exe is used as a way of executing Flame at the command-line. T1218.011,Signed Binary Proxy Execution, Rundll32, Gamaredon Group malware has used rundll32 to launch additional malicious components. T1218.011,Signed Binary Proxy Execution, Rundll32, A gh0st RAT variant has used rundll32 for execution. T1218.011,Signed Binary Proxy Execution, Rundll32, GreyEnergy uses PsExec locally in order to execute rundll32.exe at the highest privileges (NTAUTHORITY\SYSTEM). T1218.011,Signed Binary Proxy Execution, Rundll32, HAFNIUM has used rundll32 to load malicious DLLs. T1218.011,Signed Binary Proxy Execution, Rundll32, InvisiMole has used rundll32.exe for execution. T1218.011,Signed Binary Proxy Execution, Rundll32, JHUHUGIT is executed using rundll32.exe. T1218.011,Signed Binary Proxy Execution, Rundll32, Koadic can use Rundll32 to execute additional payloads. T1218.011,Signed Binary Proxy Execution, Rundll32, KONNI has used Rundll32 to execute its loader for privilege escalation purposes. T1218.011,Signed Binary Proxy Execution, Rundll32, Kwampirs uses rundll32.exe in a Registry value added to establish persistence. T1218.011,Signed Binary Proxy Execution, Rundll32, Matryoshka uses rundll32.exe in a Registry Run key value for execution as part of its persistence mechanism. T1218.011,Signed Binary Proxy Execution, Rundll32, MegaCortex has used rundll32.exe to load a DLL for file encryption. T1218.011,Signed Binary Proxy Execution, Rundll32, Mosquito's launcher uses rundll32.exe in a Registry Key value to start the main backdoor capability. T1218.011,Signed Binary Proxy Execution, Rundll32, MuddyWater has used malware that leveraged rundll32.exe in a Registry Run key to execute a .dll. T1218.011,Signed Binary Proxy Execution, Rundll32, NOKKI has used rundll32 for execution. T1218.011,Signed Binary Proxy Execution, Rundll32, NotPetya uses rundll32.exe to install itself on remote systems when accessed via PsExec or wmic. T1218.011,Signed Binary Proxy Execution, Rundll32, PolyglotDuke can be executed using rundll32.exe. T1218.011,Signed Binary Proxy Execution, Rundll32, PowerDuke uses rundll32.exe to load. T1218.011,Signed Binary Proxy Execution, Rundll32, Prikormka uses rundll32.exe to load its DLL. T1218.011,Signed Binary Proxy Execution, Rundll32, Pteranodon executes functions using rundll32.exe. T1218.011,Signed Binary Proxy Execution, Rundll32, PUNCHBUGGY can load a DLL using Rundll32. T1218.011,Signed Binary Proxy Execution, Rundll32, Ragnar Locker has used rundll32.exe to execute components of VirtualBox. T1218.011,Signed Binary Proxy Execution, Rundll32, RTM runs its core DLL file using rundll32.exe. T1218.011,Signed Binary Proxy Execution, Rundll32, Sakula calls cmd.exe to run various DLL files via rundll32. T1218.011,Signed Binary Proxy Execution, Rundll32, Sandworm Team used a backdoor which could execute a supplied DLL using rundll32.exe. T1218.011,Signed Binary Proxy Execution, Rundll32, ServHelper contains a module for downloading and executing DLLs that leverages rundll32.exe. T1218.011,Signed Binary Proxy Execution, Rundll32, Sibot has executed downloaded DLLs with rundll32.exe. T1218.011,Signed Binary Proxy Execution, Rundll32, StreamEx uses rundll32 to call an exported function. T1218.011,Signed Binary Proxy Execution, Rundll32, SUNBURST used Rundll32 to execute payloads. T1218.011,Signed Binary Proxy Execution, Rundll32, TA505 has leveraged rundll32.exe to execute malicious DLLs. T1218.011,Signed Binary Proxy Execution, Rundll32, TA551 has used rundll32.exe to load malicious DLLs. T1218.011,Signed Binary Proxy Execution, Rundll32, UNC2452 used Rundll32 to execute payloads. T1218.011,Signed Binary Proxy Execution, Rundll32, USBferry can execute rundll32.exe in memory to avoid detection. T1218.011,Signed Binary Proxy Execution, Rundll32, The Winnti for Windows installer loads a DLL using rundll32. T1218.011,Signed Binary Proxy Execution, Rundll32," ZxShell has used rundll32.exe to execute other DLLs and named pipes. """ T1562.006,Impair Defenses, Indicator Blocking,Ebury can hook logging functions so that nothing from the backdoor gets sent to the logging facility. T1562.006,Impair Defenses, Indicator Blocking, Waterbear can hook the ZwOpenProcess and GetExtendedTcpTable APIs called by the process of a security product to hide PIDs and TCP records from detection. T1562.006,Impair Defenses, Indicator Blocking,An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. T1562.006,Impair Defenses, Indicator Blocking," Actors or malware may prevent IOCs from their operations from being detected with redirections, disabling security tools, or changing the telemetry flow inside a target environment. " T1562.006,Impair Defenses, Indicator Blocking, Cybercriminals can block indicators and event traffic on compromised systems to avoid detection. T1606.001,Forge Web Credentials, Web Cookies,APT29 has bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key. T1606.001,Forge Web Credentials, Web Cookies, UNC2452 bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key. T1606.001,Forge Web Credentials, Web Cookies,Adversaries may forge web cookies that can be used to gain access to web applications or Internet services. T1606.001,Forge Web Credentials, Web Cookies," Generating cookies for web apps often requires previously known or illicitly-acquired information, but once created these spoofed web cookies. " T1606.001,Forge Web Credentials, Web Cookies, Some actors and malware may create fake web cookies for to access additional resources. T1484.002,Domain Policy Modification, Domain Trust Modification,APT29 changed domain federation trust settings using Azure AD administrative permissions to configure the domain to accept authorization tokens signed by their own SAML signing certificate. T1484.002,Domain Policy Modification, Domain Trust Modification, UNC2452 changed domain federation trust settings using Azure AD administrative permissions to configure the domain to accept authorization tokens signed by their own SAML signing certificate. T1484.002,Domain Policy Modification, Domain Trust Modification,Adversaries may add new domain trusts or modify the properties of existing domain trusts to evade defenses and/or elevate privileges. T1484.002,Domain Policy Modification, Domain Trust Modification, Manipulating the domain trusts may allow an adversary to escalate privileges and/or evade defenses by modifying settings to add objects which they control. T1484.002,Domain Policy Modification, Domain Trust Modification," Actors or malware can modify domain trust settings for the next phase of the attack, such as communicating to domains that may otherwise be unreachable. " T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder,ADVSTORESHELL achieves persistence by adding itself to the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Agent Tesla can add itself to the Registry as a startup program to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, APT18 establishes persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, An APT19 HTTP malware variant establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, APT28 has deployed malware that has copied itself to the startup directory for persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, APT29 added Registry Run keys to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, APT3 places scripts in the startup folder for persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, APT32 established persistence using Registry Run keys both to execute PowerShell and VBS scripts as well as to execute their backdoor directly. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, APT33 has deployed a tool known as DarkComet to the Startup folder of a victim and used Registry run keys to gain persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, APT37's has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, APT39 has maintained persistence using the startup folder. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, APT41 created and modified startup files for persistence. APT41 added a registry key in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost to establish persistence for Cobalt Strike. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Aria-body has established persistence via the Startup folder or Run Registry key. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Astaroth creates a startup item for persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, BabyShark has added a Registry key to ensure all future macros are enabled for Microsoft Word and Excel as well as for additional persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Backdoor.Oldrea adds Registry Run keys to achieve persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, BADNEWS installs a registry Run key to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, BadPatch establishes a foothold by adding a link to the malware executable in the startup folder. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Bazar can create or add files to Registry Run Keys to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, BBSRAT has been loaded through DLL side-loading of a legitimate Citrix executable that is set to persist through the Registry Run key location HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssonsvr.exe. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Bisonal adds itself to the Registry key HKEY_CURRENT_USER\Software\Microsoft\CurrentVersion\Run\ for persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, BitPaymer has set the run key HKCU\Software\Microsoft\Windows\CurrentVersion\Run for persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Briba creates run key Registry entries pointing to malicious DLLs dropped to disk. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, BRONZE BUTLER has used a batch script that adds a Registry Run key to establish malware persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, build_downer has the ability to add itself to the Registry Run key for persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Carbanak stores a configuration files in the startup directory to automatically execute commands in order to persist across reboots. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Carberp has maintained persistence by placing itself inside the current user's startup folder. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Cardinal RAT establishes Persistence by setting the HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load Registry key to point to its executable. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, ChChes establishes persistence by adding a Registry Run key. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Cobalt Group has used Registry Run keys for persistence. The group has also set a Startup path to launch the PowerShell shell command and download Cobalt Strike. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Cobian RAT creates an autostart Registry key to ensure persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Comnie achieves persistence by adding a shortcut of itself to the startup path in the Registry. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, CORESHELL has established persistence by creating autostart extensibility point (ASEP) Registry entries in the Run key and other Registry keys as well as by creating shortcuts in the Internet Explorer Quick Start folder. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, One persistence mechanism used by CozyCar is to set itself to be executed at system startup by adding a Registry value under one of the following Registry keys: HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, CrossRAT uses run keys for persistence on Windows T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Dark Caracal's version of Bandook adds a registry key to HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run for persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, DarkComet adds several Registry entries to enable automatic execution at every system startup. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Darkhotel has been known to establish persistence by adding programs to the Run Registry key. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, DownPaper uses PowerShell to add a Registry Run key in order to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Dragonfly 2.0 added the registry value ntdll to the Registry Run key to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, DustySky achieves persistence by creating a Registry entry in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, If establishing persistence by installation as a new service fails one variant of Elise establishes persistence for the created .exe file by setting the following Registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\svchost : %APPDATA%\Microsoft\Network\svchost.exe. Other variants have set the following Registry keys for persistence: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\imejp : [self] and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\IAStorD. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Variants of Emissary have added Run Registry keys to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Emotet has been observed adding the downloaded payload to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to maintain persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Empire can modify the registry run keys HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run for persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, EvilBunny has created Registry keys for persistence in [HKLM|HKCU]\¦\CurrentVersion\Run. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, EvilGrab adds a Registry Run key for ctfmon.exe to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, EVILNUM can achieve persistence through the Registry Run key. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, FatDuke has used HKLM\SOFTWARE\Microsoft\CurrentVersion\Run to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, FELIXROOT adds a shortcut file to the startup folder for persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, FIN10 has established persistence by using the Registry option in PowerShell Empire to add a Run key. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, FIN6 has used Registry Run keys to establish persistence for its downloader tools known as HARDTACK and SHIPBREAD. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, FIN7 malware has created Registry Run and RunOnce keys to establish persistence and has also added items to the Startup folder. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Final1stspy creates a Registry Run key to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, FinFisher establishes persistence by creating the Registry key HKCU\Software\Microsoft\Windows\Run. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, FLASHFLOOD achieves persistence by making an entry in the Registry's Run key. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Gamaredon Group tools have registered Run keys in the registry to give malicious VBS files persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Gazer can establish persistence by creating a .lnk file in the Start menu. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, gh0st RAT has added a Registry Run key to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Gold Dragon establishes persistence in the Startup folder. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Gorgon Group malware can create a .lnk file and add a Registry Run key to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Grandoreiro can use run keys and create link files in the startup folder for persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, GRIFFON has used a persistence module that stores the implant inside the Registry which executes at logon. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, GuLoader can establish persistence via the Registry under HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Hancitor has added Registry Run keys to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Helminth establishes persistence by creating a shortcut in the Start Menu folder. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Hi-Zor creates a Registry Run key to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Higaisa added a spoofed binary to the start-up folder for persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Honeybee uses a batch file that configures the ComSysApp service to autostart in order to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, HTTPBrowser has established persistence by setting the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key value for wdm to the path of the executable. It has also used the Registry entry HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run vpdn œ%ALLUSERPROFILE%\%APPDATA%\vpdn\VPDN_LU.exe to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, IcedID has established persistence by creating a Registry run key. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Inception has maintained persistence by modifying Registry run key value HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Some InnaputRAT variants establish persistence by modifying the Registry key HKU\\Software\Microsoft\Windows\CurrentVersion\Run:%appdata%\NeutralApp\NeutralApp.exe. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, InvisiMole can place a lnk file in the Startup Folder to achieve persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Ixeshe can achieve persistence by adding itself to the HKCU\Software\Microsoft\Windows\CurrentVersion\Run Registry key. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, JCry has created payloads in the Startup directory to maintain persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, JHUHUGIT has used a Registry Run key to establish persistence by executing JavaScript code within the rundll32.exe process. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Kasidet creates a Registry Run key to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Kazuar adds a sub-key under several Registry run keys. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Several Ke3chang backdoors achieved persistence by adding a Run key. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Kimsuky has placed scripts in the startup folder for persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, A version of KONNI drops a Windows shortcut into the Startup folder to establish persistence. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Lazarus Group malware attempts to maintain persistence by saving itself in the Start menu folder or by adding a Registry Run key. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, Leviathan has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor. T1547.001,Boot or Logon Autostart Execution, Registry Run Keys / Startup Folder, LoJax has modified the Registry key ˜HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\BootExecute™ from ˜autocheck autochk ™ to ˜autocheck autoche T1218.005,Signed Binary Proxy Execution, Mshta,APT32 has used mshta.exe for code execution. T1218.005,Signed Binary Proxy Execution, Mshta, BabyShark has used mshta.exe to download and execute applications from a remote server. T1218.005,Signed Binary Proxy Execution, Mshta, FIN7 has used mshta.exe to execute VBScript to execute malicious code on victim systems. T1218.005,Signed Binary Proxy Execution, Mshta, Inception has used malicious HTA files to drop and execute malware. T1218.005,Signed Binary Proxy Execution, Mshta, Kimsuky has used mshta.exe to run malicious scripts on the system. T1218.005,Signed Binary Proxy Execution, Mshta, Koadic can use MSHTA to serve additional payloads. T1218.005,Signed Binary Proxy Execution, Mshta, Lazarus Group has used mshta.exe to run malicious scripts and download programs. T1218.005,Signed Binary Proxy Execution, Mshta, Metamorfo has used mshta.exe to execute a HTA payload. T1218.005,Signed Binary Proxy Execution, Mshta, MuddyWater has used mshta.exe to execute its POWERSTATS payload and to pass a PowerShell one-liner for execution. T1218.005,Signed Binary Proxy Execution, Mshta, Mustang Panda has used mshta.exe to launch collection scripts. T1218.005,Signed Binary Proxy Execution, Mshta, NanHaiShu uses mshta.exe to load its program and files. T1218.005,Signed Binary Proxy Execution, Mshta, POWERSTATS can use Mshta.exe to execute additional payloads on compromised hosts. T1218.005,Signed Binary Proxy Execution, Mshta, Revenge RAT uses mshta.exe to run malicious scripts on the system. T1218.005,Signed Binary Proxy Execution, Mshta, Sibot has been executed via MSHTA application. T1218.005,Signed Binary Proxy Execution, Mshta, Sidewinder has used mshta.exe to execute malicious payloads. T1218.005,Signed Binary Proxy Execution, Mshta, TA551 has used mshta.exe to execute malicious payloads. T1218.005,Signed Binary Proxy Execution, Mshta, Xbash can use mshta for executing scripts. T1053.005,Scheduled Task/Job, Scheduled Task,Agent Tesla has achieved persistence via scheduled tasks. T1053.005,Scheduled Task/Job, Scheduled Task, Anchor can create a scheduled task for persistence. T1053.005,Scheduled Task/Job, Scheduled Task, AppleJeus has created a scheduled SYSTEM task that runs when a user logs in. T1053.005,Scheduled Task/Job, Scheduled Task, APT-C-36 has used a macro function to set scheduled tasks disguised as those used by Google. T1053.005,Scheduled Task/Job, Scheduled Task, APT29 used scheduler and schtasks to create new tasks on remote hosts as part of lateral movement. They have manipulated scheduled tasks by updating an existing legitimate task to execute their tools and then returned the scheduled task to its original configuration. APT29 also created a scheduled task to maintain SUNSPOT persistence when the host booted during the 2020 SolarWinds intrusion. They previously used named and hijacked scheduled tasks to also establish persistence. T1053.005,Scheduled Task/Job, Scheduled Task," An APT3 downloader creates persistence by creating the following scheduled task: schtasks /create /tn mysc"" /tr C:\Users\Public\test.exe /sc ONLOGON /ru ""System"". " T1053.005,Scheduled Task/Job, Scheduled Task, APT32 has used scheduled tasks to persist on victim systems. T1053.005,Scheduled Task/Job, Scheduled Task, APT33 has created a scheduled task to execute a .vbe file multiple times a day. T1053.005,Scheduled Task/Job, Scheduled Task, APT39 has created scheduled tasks for persistence. T1053.005,Scheduled Task/Job, Scheduled Task, APT41 used a compromised account to create a scheduled task on a system. T1053.005,Scheduled Task/Job, Scheduled Task, Attor's installer plugin can schedule a new task that loads the dispatcher on boot/logon. T1053.005,Scheduled Task/Job, Scheduled Task, BabyShark has used scheduled tasks to maintain persistence. T1053.005,Scheduled Task/Job, Scheduled Task, BackConfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host. T1053.005,Scheduled Task/Job, Scheduled Task, BADNEWS creates a scheduled task to establish by executing a malicious payload every subsequent minute. T1053.005,Scheduled Task/Job, Scheduled Task, Bazar can create a scheduled task for persistence. T1053.005,Scheduled Task/Job, Scheduled Task, Blue Mockingbird has used Windows Scheduled Tasks to establish persistence on local and remote hosts. T1053.005,Scheduled Task/Job, Scheduled Task, BONDUPDATER persists using a scheduled task that executes every minute. T1053.005,Scheduled Task/Job, Scheduled Task, BRONZE BUTLER has used schtasks to register a scheduled task to execute malware during lateral movement. T1053.005,Scheduled Task/Job, Scheduled Task, Carbon creates several tasks for later execution to continue persistence on the victimmachine. T1053.005,Scheduled Task/Job, Scheduled Task," Chimera has used scheduled tasks to invoke Cobalt Strike including through batch script schtasks /create /ru ""SYSTEM"" /tn ""update"" /tr ""cmd /c c:\windows\temp\update.bat"" /sc once /f /st and to maintain persistence. " T1053.005,Scheduled Task/Job, Scheduled Task, Cobalt Group has created Windows tasks to establish persistence. T1053.005,Scheduled Task/Job, Scheduled Task, ComRAT has used a scheduled task to launch its PowerShell loader. T1053.005,Scheduled Task/Job, Scheduled Task," CosmicDuke uses scheduled tasks typically named ""Watchmon Service"" for persistence. " T1053.005,Scheduled Task/Job, Scheduled Task, One persistence mechanism used by CozyCar is to register itself as a scheduled task. T1053.005,Scheduled Task/Job, Scheduled Task, Crutch has the ability to persist using scheduled tasks. T1053.005,Scheduled Task/Job, Scheduled Task, CSPY Downloader can use the schtasks utility to bypass UAC. T1053.005,Scheduled Task/Job, Scheduled Task, Dragonfly 2.0 used scheduled tasks to automatically log out of created accounts every 8 hours as well as to execute malicious files. T1053.005,Scheduled Task/Job, Scheduled Task, Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware. T1053.005,Scheduled Task/Job, Scheduled Task, Dyre has the ability to achieve persistence by adding a new task in the task scheduler to run every minute. T1053.005,Scheduled Task/Job, Scheduled Task, Emotet has maintained persistence through a scheduled task. T1053.005,Scheduled Task/Job, Scheduled Task, Empire has modules to interact with the Windows task scheduler. T1053.005,Scheduled Task/Job, Scheduled Task, EvilBunny has executed commands via scheduled tasks. T1053.005,Scheduled Task/Job, Scheduled Task, FIN10 has established persistence by using S4U tasks as well as the Scheduled Task option in PowerShell Empire. T1053.005,Scheduled Task/Job, Scheduled Task, FIN6 has used scheduled tasks to establish persistence for various malware it uses including downloaders known as HARDTACK and SHIPBREAD and FrameworkPOS. T1053.005,Scheduled Task/Job, Scheduled Task, FIN7 malware has created scheduled tasks to establish persistence. T1053.005,Scheduled Task/Job, Scheduled Task, FIN8 has used scheduled tasks to maintain RDP backdoors. T1053.005,Scheduled Task/Job, Scheduled Task, Fox Kitten has used Scheduled Tasks for persistence and to load and execute a reverse proxy binary. T1053.005,Scheduled Task/Job, Scheduled Task," Frankenstein has established persistence through a scheduled task using the command: /Create /F /SC DAILY /ST 09:00 /TN WinUpdate /TR named ""WinUpdate"". " T1053.005,Scheduled Task/Job, Scheduled Task, GALLIUM established persistence for PoisonIvy by created a scheduled task. T1053.005,Scheduled Task/Job, Scheduled Task, Gamaredon Group has created a scheduled task to launch an executable every 10 minutes. T1053.005,Scheduled Task/Job, Scheduled Task, Gazer can establish persistence by creating a scheduled task. T1053.005,Scheduled Task/Job, Scheduled Task, GoldMax has used scheduled tasks to maintain persistence. T1053.005,Scheduled Task/Job, Scheduled Task, Goopy has the ability to maintain persistence by creating scheduled tasks set to run every hour. T1053.005,Scheduled Task/Job, Scheduled Task, GravityRAT creates a scheduled task to ensure it is re-executed everyday. T1053.005,Scheduled Task/Job, Scheduled Task, GRIFFON has used sctasks for persistence. T1053.005,Scheduled Task/Job, Scheduled Task, Helminth has used a scheduled task for persistence. T1053.005,Scheduled Task/Job, Scheduled Task, Higaisa dropped and added officeupdate.exe to scheduled tasks. T1053.005,Scheduled Task/Job, Scheduled Task, HotCroissant has attempted to install a scheduled task namedJava Maintenance64 on startup to establish persistence. T1053.005,Scheduled Task/Job, Scheduled Task, IcedID has created a scheduled task that executes every hour to establish persistence. T1053.005,Scheduled Task/Job, Scheduled Task, InvisiMole has used scheduled tasks named MSST and \Microsoft\Windows\Autochk\Scheduled to establish persistence. T1053.005,Scheduled Task/Job, Scheduled Task, IronNetInjector has used a task XML file named mssch.xml to run an IronPython script when a user logs in or when specific system events are created. T1053.005,Scheduled Task/Job, Scheduled Task, ISMInjector creates scheduled tasks to establish persistence. T1053.005,Scheduled Task/Job, Scheduled Task, JHUHUGIT has registered itself as a scheduled task to run each time the current user logs in. T1053.005,Scheduled Task/Job, Scheduled Task, Lucifer has established persistence by creating the following scheduled task schtasks /create /sc minute /mo 1 /tn QQMusic ^ /tr C:Users\%USERPROFILE%\Downloads\spread.exe /F. T1053.005,Scheduled Task/Job, Scheduled Task, The different components of Machete are executed by Windows Task Scheduler. T1053.005,Scheduled Task/Job, Scheduled Task, Machete has created scheduled tasks to maintain Machete's persistence. T1053.005,Scheduled Task/Job, Scheduled Task," Matryoshka can establish persistence by adding a Scheduled Task named ""Microsoft Boost Kernel Optimization"". " T1053.005,Scheduled Task/Job, Scheduled Task," Maze has created scheduled tasks using name variants such as ""Windows Update Security"" ""Windows Update Security Patches"" and ""Google Chrome Security Update"" to launch Maze at a specific time. " T1053.005,Scheduled Task/Job, Scheduled Task, MCMD can use scheduled tasks for persistence. T1053.005,Scheduled Task/Job, Scheduled Task, menuPass has used a script (atexec.py) to execute a command on a target machine via Task Scheduler. T1053.005,Scheduled Task/Job, Scheduled Task, Molerats has created scheduled tasks to persistently run VBScripts. T1053.005,Scheduled Task/Job, Scheduled Task, MuddyWater has used scheduled tasks to establish persistence. T1053.005,Scheduled Task/Job, Scheduled Task, Mustang Panda has created a scheduled task to execute additional malicious software as well as maintain persistence. T1053.005,Scheduled Task/Job, Scheduled Task, NETWIRE can create a scheduled task to establish persistence. T1053.005,Scheduled Task/Job, Scheduled Task, NotPetya creates a task to reboot the system one hour after infection. T1053.005,Scheduled Task/Job, Scheduled Task, OilRig has created scheduled tasks that run a VBScript to execute a payload on victim machines. T1053.005,Scheduled Task/Job, Scheduled Task, Okrum's installer can attempt to achieve persistence by creating a scheduled task. T1053.005,Scheduled Task/Job, Scheduled Task, OopsIE creates a scheduled task to run itself every three minutes. T1053.005,Scheduled Task/Job, Scheduled Task, Operation Wocao has used scheduled tasks to execute malicious PowerShell code on remote systems. T1053.005,Scheduled Task/Job, Scheduled Task, A Patchwork file stealer can run a TaskScheduler DLL to add persistence. T1053.005,Scheduled Task/Job, Scheduled Task, PowerSploit's New-UserPersistenceOption Persistence argument can be used to establish via a Scheduled Task/Job. T1053.005,Scheduled Task/Job, Scheduled Task, POWERSTATS has established persistence through a scheduled task using the commandC:\Windows\system32\schtasks.exe /Create /F /SC DAILY /ST 12:00 /TN MicrosoftEdge /TRc:\Windows\system32\wscript.exe C:\Windows\temp\Windows.vbe. T1053.005,Scheduled Task/Job, Scheduled Task, POWRUNER persists through a scheduled task that executes it every minute. T1053.005,Scheduled Task/Job, Scheduled Task, Pteranodon schedules tasks to invoke its components in order to establish persistence. T1053.005,Scheduled Task/Job, Scheduled Task, QUADAGENT creates a scheduled task to maintain persistence on the victimmachine. T1053.005,Scheduled Task/Job, Scheduled Task, QuasarRAT contains a .NET wrapper DLL for creating and managing scheduled tasks for maintaining persistence upon reboot. T1053.005,Scheduled Task/Job, Scheduled Task, Ramsay can schedule tasks via the Windows COM API to maintain persistence. T1053.005,Scheduled Task/Job, Scheduled Task, Rancor launched a scheduled task to gain persistence using the schtasks /create /sc command. T1053.005,Scheduled Task/Job, Scheduled Task, Remexi utilizes scheduled tasks as a persistence mechanism. T1053.005,Scheduled Task/Job, Scheduled Task, RemoteCMD can execute commands remotely by creating a new schedule task on the remote system T1053.005,Scheduled Task/Job, Scheduled Task, Revenge RAT schedules tasks to run malicious scripts at different intervals. T1053.005,Scheduled Task/Job, Scheduled Task, RTM tries to add a scheduled task to establish persistence. T1053.005,Scheduled Task/Job, Scheduled Task, Ryuk can remotely create a scheduled task to execute itself on a system. T1053.005,Scheduled Task/Job, Scheduled Task, schtasks is used to schedule tasks on a Windows system to run at a specific date and time. T1053.005,Scheduled Task/Job, Scheduled Task, ServHelper contains modules that will use schtasks to carry out malicious operations. T1053.005,Scheduled Task/Job, Scheduled Task, Shamoon copies an executable payload to the target system by using SMB/Windows Admin Shares and then scheduling an unnamed task to execute the malware. T1053.005,Scheduled Task/Job, Scheduled Task, SharpStage has a persistence component to write a scheduled task for the payload. T1053.005,Scheduled Task/Job, Scheduled Task, Sibot has been executed via a scheduled task. T1053.005,Scheduled Task/Job, Scheduled Task, Silence has used scheduled tasks to stage its operation. T1053.005,Scheduled Task/Job, Scheduled Task, Smoke Loader launches a scheduled task. T1053.005,Scheduled Task/Job, Scheduled Task, SoreFang can gain persistence through use of scheduled tasks. T1053.005,Scheduled Task/Job, Scheduled Task, SQLRat has created scheduled tasks in %appdata%\Roaming\Microsoft\Templates\. T1053.005,Scheduled Task/Job, Scheduled Task, Stealth Falcon malware creates a scheduled task entitledIE Web Cache to execute a malicious file hourly. T1053.005,Scheduled Task/Job, Scheduled Task, TEMP.Veles has used scheduled task XML triggers. T1053.005,Scheduled Task/Job, Scheduled Task, TrickBot creates a scheduled task on the system that provides persistence. T1053.005,Scheduled Task/Job, Scheduled Task, UNC2452 used scheduler and schtasks to create new tasks on remote hosts as part of lateral movement. They also manipulated scheduled tasks by updating an existing legitimate task to execute their tools and then returned the scheduled task to its original configuration. UNC2452 also created a scheduled task to maintain SUNSPOT persistence when the host booted. T1053.005,Scheduled Task/Job, Scheduled Task, Valak has used scheduled tasks to execute additional payloads and to gain persistence on a compromised host. T1053.005,Scheduled Task/Job, Scheduled Task, Wizard Spider has used scheduled tasks establish persistence for TrickBot and other malware. T1053.005,Scheduled Task/Job, Scheduled Task, yty establishes persistence by creating a scheduled task with the command SchTasks /Create /SC DAILY /TN BigData /TR + path_file +/ST 09:30. T1053.005,Scheduled Task/Job, Scheduled Task, Zebrocy has a command to create a scheduled task for persistence. T1053.005,Scheduled Task/Job, Scheduled Task," zwShell has used SchTasks for execution.""" T1003.003,OS Credential Dumping, Ntds,"Chimera has gathered the SYSTEM registry and ntds.dit files from target systems. Chimera specifically has used the NtdsAudit tool to dump the password hashes of domain users via cmsadcs.exe NTDS.dit"" -s ""SYSTEM"" -p RecordedTV_pdmp.txt --users-csv RecordedTV_users.csv and used ntdsutil to copy the Active Directory database. " T1003.003,OS Credential Dumping, Ntds, CrackMapExec can dump hashed passwords associated with Active Directory using Windows' Directory Replication Services API (DRSUAPI) or Volume Shadow Copy. T1003.003,OS Credential Dumping, Ntds, Dragonfly 2.0 dropped and executed SecretsDump to dump password hashes. They also obtained ntds.dit from domain controllers. T1003.003,OS Credential Dumping, Ntds, esentutl can use Volume Shadow Copy to copy locked files such as ntds.dit. T1003.003,OS Credential Dumping, Ntds, FIN6 has used MetasploitPsExec NTDSGRAB module to obtain a copy of the victim's Active Directory database. T1003.003,OS Credential Dumping, Ntds, Fox Kitten has used Volume Shadow Copy to access credential information from NTDS. T1003.003,OS Credential Dumping, Ntds, HAFNIUM has stolen copies of the Active Directory database (NTDS.DIT). T1003.003,OS Credential Dumping, Ntds, SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information from NTDS.dit. T1003.003,OS Credential Dumping, Ntds, Koadic can gather hashed passwords by gathering domain controller hashes from NTDS. T1003.003,OS Credential Dumping, Ntds, menuPass has used Ntdsutil to dump credentials. T1003.003,OS Credential Dumping, Ntds, Mustang Panda has used vssadmin to create a volume shadow copy and retrieve the NTDS.dit file. Mustang Panda has also used reg save on the SYSTEM file Registry location to help extract the NTDS.dit file. T1003.003,OS Credential Dumping, Ntds," Wizard Spider has gained access to credentials via exported copies of the ntds.dit Active Directory database.""" T1218.007,Signed Binary Proxy Execution, Msiexec,AppleJeus has been installed via MSI installer. T1218.007,Signed Binary Proxy Execution, Msiexec, Duqu has used msiexec to execute malicious Windows Installer packages. Additionally a PROPERTY=VALUE pair containing a 56-bit encryption key has been used to decrypt the main payload from the installer packages. T1218.007,Signed Binary Proxy Execution, Msiexec, Grandoreiro can use MSI files to execute DLLs. T1218.007,Signed Binary Proxy Execution, Msiexec, IcedID can inject itself into a suspended msiexec.exe process to send beacons to C2 while appearing as a normal msi application. T1218.007,Signed Binary Proxy Execution, Msiexec, Javali has used the MSI installer to download and execute malicious payloads. T1218.007,Signed Binary Proxy Execution, Msiexec, LoudMiner used an MSI installer to install the virtualization software. T1218.007,Signed Binary Proxy Execution, Msiexec, Machete has used msiexec to install the Machete malware. T1218.007,Signed Binary Proxy Execution, Msiexec, Maze has delivered components for its ransomware attacks using MSI files some of which have been executed from the command-line using msiexec. T1218.007,Signed Binary Proxy Execution, Msiexec, Melcoz can use MSI files with embedded VBScript for execution. T1218.007,Signed Binary Proxy Execution, Msiexec, Metamorfo has used MsiExec.exe to automatically execute files. T1218.007,Signed Binary Proxy Execution, Msiexec, Molerats has used msiexec.exe to execute an MSI payload. T1218.007,Signed Binary Proxy Execution, Msiexec, Ragnar Locker has been delivered as an unsigned MSI package that was executed with msiexec.exe. T1218.007,Signed Binary Proxy Execution, Msiexec, Rancor has used msiexec to download and execute malicious installer files over HTTP. T1218.007,Signed Binary Proxy Execution, Msiexec, RemoteUtilities can use Msiexec to install a service. T1218.007,Signed Binary Proxy Execution, Msiexec, TA505 has used msiexec to download and execute malicious Windows Installer files. T1218.007,Signed Binary Proxy Execution, Msiexec, ZIRCONIUM has used the msiexec.exe command-line utility to download and execute malicious MSI files. T1036.003,Masquerading, Rename System Utilities,APT32 has moved and renamed pubprn.vbs to a .txt file to avoid detection. T1036.003,Masquerading, Rename System Utilities, The CozyCar dropper has masqueraded a copy of the infected system's rundll32.exe executable that was moved to the malware's install directory and renamed according to a predefined configuration file. T1036.003,Masquerading, Rename System Utilities, GALLIUM used a renamed cmd.exe file to evade detection. T1036.003,Masquerading, Rename System Utilities, menuPass has renamed certutil and moved it to a different location on the system to avoid detection based on use of the tool. T1036.003,Masquerading, Rename System Utilities,Adversaries may rename legitimate system utilities to try to evade security mechanisms concerning the usage of those utilities. T1056.004,Input Capture, Credential Api Hooking,Carberp has hooked several Windows API functions during its Man in the Browser attack to steal credentials. T1056.004,Input Capture, Credential Api Hooking, Empire contains some modules that leverage API hooking to carry out tasks such as netripper. T1056.004,Input Capture, Credential Api Hooking, FinFisher hooks processes by modifying IAT pointers to CreateWindowEx. T1056.004,Input Capture, Credential Api Hooking, NOKKI uses the Windows call SetWindowsHookEx and begins injecting it into every GUI process running on the victim's machine. T1056.004,Input Capture, Credential Api Hooking, PLATINUM is capable of using Windows hook interfaces for information gathering such as credential access. T1056.004,Input Capture, Credential Api Hooking, RDFSNIFFER hooks several Win32 API functions to hijack elements of the remote system management user-interface. T1056.004,Input Capture, Credential Api Hooking, TrickBot has the ability to capture RDP credentials by capturing the CredEnumerateA API T1056.004,Input Capture, Credential Api Hooking, Ursnif has hooked APIs to perform a wide variety of information theft such as monitoring traffic from browsers. T1056.004,Input Capture, Credential Api Hooking, Zebrocy installs an application-defined Windows hook to get notified when a network drive has been attached so it can then use the hook to call its RecordToFile file stealing method. T1056.004,Input Capture, Credential Api Hooking, Zeus Panda hooks processes by leveraging its own IAT hooked functions. T1056.004,Input Capture, Credential Api Hooking, ZxShell hooks several API functions to spawn system threads. T1546.012,Event Triggered Execution, Image File Execution Options Injection,SDBbot has the ability to use image file execution options for persistence if it detects it is running with admin privileges on a Windows version newer than Windows 7. T1546.012,Event Triggered Execution, Image File Execution Options Injection, SUNBURST created an Image File Execution Options (IFEO) Debugger registry value for the process dllhost.exe to trigger the installation of Cobalt Strike. T1546.012,Event Triggered Execution, Image File Execution Options Injection, TEMP.Veles has modified and added entries within HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options to maintain persistence. T1546.012,Event Triggered Execution, Image File Execution Options Injection,Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by Image File Execution Options (IFEO) debuggers. T1546.012,Event Triggered Execution, Image File Execution Options Injection, Threat actors can use the IFEO registry key for loading DLLs into running processes. T1546.011,Event Triggered Execution, Application Shimming,FIN7 has used application shim databases for persistence. T1546.011,Event Triggered Execution, Application Shimming, Pillowmint has used a malicious shim database to maintain persistence. T1546.011,Event Triggered Execution, Application Shimming, SDBbot has the ability to use application shimming for persistence if it detects it is running as admin on Windows XP or 7 by creating a shim database to patch services.exe. T1546.011,Event Triggered Execution, Application Shimming, ShimRat has installed shim databases in the AppPatch folder. T1546.011,Event Triggered Execution, Application Shimming,Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims. T1546.010,Event Triggered Execution, Appinit Dlls,APT39 has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence. T1546.010,Event Triggered Execution, Appinit Dlls," Some variants of Cherry Picker use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows AppInit_DLLs""=""pserver32.dll"" " T1546.010,Event Triggered Execution, Appinit Dlls, Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key. T1546.010,Event Triggered Execution, Appinit Dlls," If a victim meets certain criteria T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL ResN32.dll. It does this by creating the following Registry keys: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs“ %APPDATA%\Intel\ResN32.dll and HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs“ 0x1.""" T1546.010,Event Triggered Execution, Appinit Dlls,Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes. T1546.009,Event Triggered Execution, Appcert Dlls,Honeybee's service-based DLL implant can execute a downloaded file with parameters specified using CreateProcessAsUser. T1546.009,Event Triggered Execution, Appcert Dlls, PUNCHBUGGY can establish using a AppCertDLLs Registry key. T1546.009,Event Triggered Execution, Appcert Dlls,Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppCert DLLs loaded into processes. T1546.009,Event Triggered Execution, Appcert Dlls," Threat actors can use AppCertDLLs, which are loaded by numerous processes during their first launch, to force applications to load malicious code or execute malware. " T1546.009,Event Triggered Execution, Appcert Dlls," Malware can use AppCert dynamic link libraries (dylibs, DLLs) to force application to load dylibs of their choosing every time an application is launched. " T1055.012,Process Injection, Process Hollowing,Agent Tesla has used process hollowing to create and manipulate processes through sections of unmapped memory by reallocating that space with its malicious code. T1055.012,Process Injection, Process Hollowing, Astaroth can create a new process in a suspended state from a targeted legitimate process in order to unmap its memory and replace it with malicious code. T1055.012,Process Injection, Process Hollowing, Azorult can decrypt the payload into memory create a new suspended process of itself then inject a decrypted payload to the new process and resume new process execution. T1055.012,Process Injection, Process Hollowing, BADNEWS has a command to download an .exe and use process hollowing to inject it into a new process. T1055.012,Process Injection, Process Hollowing, Bandook has been launched by starting iexplore.exe and replacing it with Bandook's payload. T1055.012,Process Injection, Process Hollowing, Bazar can inject into a target process including Svchost Explorer and cmd using process hollowing. T1055.012,Process Injection, Process Hollowing, BBSRAT has been seen loaded into msiexec.exe through process hollowing to hide its execution. T1055.012,Process Injection, Process Hollowing, Cobalt Strike can use process hollowing for execution. T1055.012,Process Injection, Process Hollowing, Denis performed process hollowing through the API calls CreateRemoteThread ResumeThread and Wow64SetThreadContext. T1055.012,Process Injection, Process Hollowing, Dtrack has used process hollowing shellcode to target a predefined list of processes from %SYSTEM32%. T1055.012,Process Injection, Process Hollowing, Duqu is capable of loading executable code via process hollowing. T1055.012,Process Injection, Process Hollowing, Gorgon Group malware can use process hollowing to inject one of its trojans into another process. T1055.012,Process Injection, Process Hollowing, ISMInjector hollows out a newly created process RegASM.exe and injects its payload into the hollowed process. T1055.012,Process Injection, Process Hollowing, Lokibot has used process hollowing to inject into legitimate Windows process vbc.exe. T1055.012,Process Injection, Process Hollowing, menuPass has used process hollowing in iexplore.exe to load the RedLeaves implant. T1055.012,Process Injection, Process Hollowing, The NETWIRE payload has been injected into benign Microsoft executables via process hollowing. T1055.012,Process Injection, Process Hollowing, Some Orz versions have an embedded DLL known as MockDll that uses process hollowing and Regsvr32 to execute another payload. T1055.012,Process Injection, Process Hollowing, A Patchwork payload uses process hollowing to hide the UAC bypass vulnerability exploitation inside svchost.exe. T1055.012,Process Injection, Process Hollowing, Smoke Loader spawns a new copy of c:\windows\syswow64\explorer.exe and then replaces the executable code in memory with malware. T1055.012,Process Injection, Process Hollowing, A Threat Group-3390 tool can spawn svchost.exe and inject the payload into that process. T1055.012,Process Injection, Process Hollowing, TrickBot injects into the svchost.exe process. T1055.012,Process Injection, Process Hollowing, Ursnif has used process hollowing to inject into child processes. T1055.011,Process Injection, Extra Window Memory Injection,Epic has overwritten the function pointer in the extra window memory of Explorer's Shell_TrayWnd in order to execute malicious code in the context of the explorer.exe process. T1055.011,Process Injection, Extra Window Memory Injection, Power Loader overwrites ExplorerShell_TrayWnd extra window memory to redirect execution to a NTDLL function that is abused to assemble and execute a return-oriented programming (ROP) chain and create a malicious thread within Explorer.exe. T1055.011,Process Injection, Extra Window Memory Injection,"North Korean actors often inject arbitrary code into legitimate processes, possibly through abusing the additional memory provided by EWM. " T1055.011,Process Injection, Extra Window Memory Injection, The threat actor TEMP.Splinter employs the tactic of code injection via the Extra Window Memory to evade detection by security software. T1055.011,Process Injection, Extra Window Memory Injection," Chinese-nexus apt group APT27 often abuse EWM to inject code into a different process, escalating the privileges of their malicious code to the privileges of the hijacked process. " T1055.005,Process Injection, Thread Local Storage,Ursnif has injected code into target processes via thread local storage callbacks. T1055.005,Process Injection, Thread Local Storage,"The MAZE ransomware can evade detection through the injection of code into different processes, achieved via injecting the code into thread local storage callbacks. " T1055.005,Process Injection, Thread Local Storage, Diavol Ransomware can escalate it's privileges through injecting code into a process through thread local storage. T1055.005,Process Injection, Thread Local Storage, FIN13 often evades detection through granting their malware the ability to inject code into processes via thread local storage callbacks. T1055.005,Process Injection, Thread Local Storage, Bazar Ransomware escalates it's privileges via code injection through thread local storage. T1055.004,Process Injection, Asynchronous Procedure Call,Attor performs the injection by attaching its code into the APC queue using NtQueueApcThread API. T1055.004,Process Injection, Asynchronous Procedure Call, Carberp has queued an APC routine to explorer.exe by calling ZwQueueApcThread. T1055.004,Process Injection, Asynchronous Procedure Call, IcedID has used ZwQueueApcThread to inject itself into remote processes. T1055.004,Process Injection, Asynchronous Procedure Call, InvisiMole can inject its code into a trusted process via the APC queue. T1055.004,Process Injection, Asynchronous Procedure Call, Pillowmint has used the NtQueueApcThread syscall to inject code into svchost.exe. T1055.004,Process Injection, Asynchronous Procedure Call," TURNEDUP is capable of injecting code into the APC queue of a created Rundll32 process as part of an Early Bird injection.""" T1055.003,Process Injection, Thread Execution Hijacking,Gazer performs thread execution hijacking to inject its orchestrator into a running thread from a remote process. T1055.003,Process Injection, Thread Execution Hijacking, Trojan.Karagany can inject a suspended thread of its own process into a new process and initiate via the ResumeThread API. T1055.003,Process Injection, Thread Execution Hijacking, Waterbear can use thread injection to inject shellcode into the process of security software. T1055.003,Process Injection, Thread Execution Hijacking,APT13 often employs the technique of thread injection hijacking to execute malicious code. T1055.003,Process Injection, Thread Execution Hijacking," Through injecting its own process into another process thread, malware is often able to bypass security controls. " T1055.002,Process Injection, Portable Executable Injection,Carbanak downloads an executable and injects it directly into a new process. T1055.002,Process Injection, Portable Executable Injection, Gorgon Group malware can download a remote access tool ShiftyBug and inject into another process. T1055.002,Process Injection, Portable Executable Injection, GreyEnergy has a module to inject a PE binary into a remote process. T1055.002,Process Injection, Portable Executable Injection, InvisiMole can inject its backdoor as a portable executable into a target process. T1055.002,Process Injection, Portable Executable Injection, PowerSploit reflectively loads a Windows PE file into a process. T1055.002,Process Injection, Portable Executable Injection," Rocke's miner TermsHost.exe"" evaded defenses by injecting itself into Windows processes including Notepad.exe. " T1055.002,Process Injection, Portable Executable Injection," Zeus Panda checks processes on the system and if they meet the necessary requirements it injects into that process.""" T1055.001,Process Injection, Dynamic,Aria-body has the ability to inject itself into another process such as rundll32.exe and dllhost.exe. T1055.001,Process Injection, Dynamic, BlackEnergy injects its DLL component into svchost.exe. T1055.001,Process Injection, Dynamic, Carberp's bootkit can inject a malicious DLL into the address space of running processes. T1055.001,Process Injection, Dynamic, Carbon has a command to inject code into a process. T1055.001,Process Injection, Dynamic, Cobalt Strike has the ability to load DLLs via reflective injection. T1055.001,Process Injection, Dynamic, ComRAT has injected its orchestrator DLL into explorer.exe. ComRAT has also injected its communications module into the victim's default browser to make C2 connections appear less suspicious as all network connections will be initiated by the browser process. T1055.001,Process Injection, Dynamic, Conti has loaded an encrypted DLL into memory and then executes it. T1055.001,Process Injection, Dynamic, Derusbi injects itself into the secure shell (SSH) process. T1055.001,Process Injection, Dynamic, Duqu will inject itself into different processes to evade detection. The selection of the target process is influenced by the security software that is installed on the system (Duqu will inject into different processes depending on which security suite is installed on the infected host). T1055.001,Process Injection, Dynamic, Dyre injects into other processes to load modules. T1055.001,Process Injection, Dynamic, Elise injects DLL files into iexplore.exe. T1055.001,Process Injection, Dynamic, Emissary injects its DLL file into a newly spawned Internet Explorer process. T1055.001,Process Injection, Dynamic, Emotet has been observed injecting in to Explorer.exe and other processes. T1055.001,Process Injection, Dynamic, FinFisher injects itself into various processes depending on whether it is low integrity or high integrity. T1055.001,Process Injection, Dynamic, Get2 has the ability to inject DLLs into processes. T1055.001,Process Injection, Dynamic, HIDEDRV injects a DLL for Downdelph into the explorer.exe process. T1055.001,Process Injection, Dynamic, IronNetInjector has the ability to inject a DLL into running processes including the IronNetInjector DLL into explorer.exe. T1055.001,Process Injection, Dynamic, If running in a Windows environment Kazuar saves a DLL to disk that is injected into the explorer.exe process to execute the payload. Kazuar can also be configured to inject and execute within specific processes. T1055.001,Process Injection, Dynamic, Koadic can perform process injection by using a reflective DLL. T1055.001,Process Injection, Dynamic, A Lazarus Group malware sample performs reflective DLL injection. T1055.001,Process Injection, Dynamic, Matryoshka uses reflective DLL injection to inject the malicious library and execute the RAT. T1055.001,Process Injection, Dynamic, Maze has injected the malware DLL into a target process. T1055.001,Process Injection, Dynamic, MegaCortex loads injecthelper.dll into a newly created rundll32.exe process. T1055.001,Process Injection, Dynamic, Metamorfo has injected a malicious DLL into the Windows Media Player process (wmplayer.exe). T1055.001,Process Injection, Dynamic, The Netwalker DLL has been injected reflectively into the memory of a legitimate running process. T1055.001,Process Injection, Dynamic, PipeMon can inject its modules into various processes using reflective DLL loading. T1055.001,Process Injection, Dynamic, PoisonIvy can inject a malicious DLL into a process. T1055.001,Process Injection, Dynamic, PowerSploit contains a collection of CodeExecution modules that inject code (DLL shellcode) into a process. T1055.001,Process Injection, Dynamic, Pupy can migrate into another process using reflective DLL injection. T1055.001,Process Injection, Dynamic, An executable dropped onto victims by Putter Panda aims to inject the specified DLL into a process that would normally be accessing the network including Outlook Express (msinm.exe) Outlook (outlook.exe) Internet Explorer (iexplore.exe) and Firefox (firefox.exe). T1055.001,Process Injection, Dynamic, Ramsay can use ImprovedReflectiveDLLInjection to deploy components. T1055.001,Process Injection, Dynamic, After decrypting itself in memory RARSTONE downloads a DLL file from its C2 server and loads it in the memory space of a hidden Internet Explorer process. Thisdownloaded file is actually not dropped onto the system. T1055.001,Process Injection, Dynamic, RATANKBA performs a reflective DLL injection using a given pid. T1055.001,Process Injection, Dynamic, Remsec can perform DLL injection. T1055.001,Process Injection, Dynamic, SDBbot has the ability to inject a downloaded DLL into a newly created rundll32.exe process. T1055.001,Process Injection, Dynamic, ShadowPad has injected a DLL into svchost.exe. T1055.001,Process Injection, Dynamic, Socksbot creates a suspended svchost process and injects its DLL into it. T1055.001,Process Injection, Dynamic, Sykipot injects itself into running instances of outlook.exe iexplore.exe or firefox.exe. T1055.001,Process Injection, Dynamic, TA505 has been seen injecting a DLL into winword.exe. T1055.001,Process Injection, Dynamic, TajMahal has the ability to inject DLLs for malicious plugins into running processes. T1055.001,Process Injection, Dynamic, Tropic Trooper has injected a DLL backdoor into dllhost.exe and svchost.exe. T1055.001,Process Injection, Dynamic, Turla has used Metasploit to perform reflective DLL injection in order to escalate privileges. T1055.001,Process Injection, Dynamic, Wizard Spider has injected malicious DLLs into memory with read write and execute permissions. T1055.001,Process Injection, Dynamic, ZxShell is injected into a shared SVCHOST process. T1568.002,Dynamic Resolution, Domain Generation Algorithms,APT41 has used DGAs to change their C2 servers monthly. T1568.002,Dynamic Resolution, Domain Generation Algorithms, Aria-body has the ability to use a DGA for C2 communications. T1568.002,Dynamic Resolution, Domain Generation Algorithms, Astaroth has used a DGA in C2 communications. T1568.002,Dynamic Resolution, Domain Generation Algorithms, Bazar can implement DGA using the current date as a seed variable. T1568.002,Dynamic Resolution, Domain Generation Algorithms, BONDUPDATER uses a DGA to communicate with command and control servers. T1568.002,Dynamic Resolution, Domain Generation Algorithms, CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost. T1568.002,Dynamic Resolution, Domain Generation Algorithms, CHOPSTICK can use a DGA for Fallback Channels domains are generated by concatenating words from lists. T1568.002,Dynamic Resolution, Domain Generation Algorithms, Doki has used the DynDNS service and a DGA based on the Dogecoin blockchain to generate C2 domains. T1568.002,Dynamic Resolution, Domain Generation Algorithms, Ebury has used a DGA to generate a domain name for C2. T1568.002,Dynamic Resolution, Domain Generation Algorithms, Grandoreiro can use a DGA for hiding C2 addresses including use of an algorithm with a user-specific key that changes daily. T1568.002,Dynamic Resolution, Domain Generation Algorithms, MiniDuke can use DGA to generate new Twitter URLs for C2. T1568.002,Dynamic Resolution, Domain Generation Algorithms, Ngrok can provide DGA for C2 servers through the use of random URL strings that change every 12 hours. T1568.002,Dynamic Resolution, Domain Generation Algorithms, POSHSPY uses a DGA to derive command and control URLs from a word list. T1568.002,Dynamic Resolution, Domain Generation Algorithms, ShadowPad uses a DGA that is based on the day of the month for C2 servers. T1568.002,Dynamic Resolution, Domain Generation Algorithms, TA551 has used a DGA to generate URLs from executed macros. T1568.002,Dynamic Resolution, Domain Generation Algorithms, Ursnif has used a DGA to generate domain names for C2. T1546.015,Event Triggered Execution, Component Object Model Hijacking,Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object. T1546.015,Event Triggered Execution, Component Object Model Hijacking, APT28 has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload. T1546.015,Event Triggered Execution, Component Object Model Hijacking, BBSRAT has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture. T1546.015,Event Triggered Execution, Component Object Model Hijacking, ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\Software\Classes\CLSID{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32. T1546.015,Event Triggered Execution, Component Object Model Hijacking, JHUHUGIT has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}). T1546.015,Event Triggered Execution, Component Object Model Hijacking, KONNI has modified ComSysApp service to load the malicious DLL payload. T1546.015,Event Triggered Execution, Component Object Model Hijacking, Mosquito uses COM hijacking as a method of persistence. T1547.013,Boot or Logon Autostart Execution, Xdg Autostart Entries,Fysbis has installed itself as an autostart entry under ~/.config/autostart/dbus-inotifier.desktop to establish persistence. T1547.013,Boot or Logon Autostart Execution, Xdg Autostart Entries, NETWIRE can use XDG Autostart Entries to establish persistence. T1547.013,Boot or Logon Autostart Execution, Xdg Autostart Entries,Linux environments that rely upon XDG are vulnerable to malicious code execution upon startup. T1547.013,Boot or Logon Autostart Execution, Xdg Autostart Entries," REvil often maintain persistence through code executed upon boot, via exploitation of XDG. " T1547.013,Boot or Logon Autostart Execution, Xdg Autostart Entries, XDG autostart can allow for privilege escalation if malicious binaries exploit it's autorun on boot capabilities. T1558.001,Steal or Forge Kerberos Tickets, Golden Ticket,Empire can leverage its implementation of Mimikatz to obtain and use golden tickets. T1558.001,Steal or Forge Kerberos Tickets, Golden Ticket, Ke3chang has used Mimikatz to generate Kerberos golden tickets. T1558.001,Steal or Forge Kerberos Tickets, Golden Ticket, Mimikatz's kerberos module can create golden tickets. T1558.001,Steal or Forge Kerberos Tickets, Golden Ticket,Ransomware such as DarkSide often steal KRBTGT account passwords with the intent to forge golden Kerberos keys. T1558.001,Steal or Forge Kerberos Tickets, Golden Ticket," APT groups can authenticate all of their activity via granting them Kerberos tickets from a stolen, golden one. " T1601.001,Modify System Image, Patch System Image,SYNful Knock is malware that is inserted into a network device by patching the operating system image. T1601.001,Modify System Image, Patch System Image,ESPecter can patch various windows functions to attribute to it malicious functionality. T1601.001,Modify System Image, Patch System Image, KEYHOLE PANDA can modify the OS to grant persistence. T1601.001,Modify System Image, Patch System Image," Through damaging the OS via scripts, APT groups can bypass security mechanisms and achieve persistence. " T1601.001,Modify System Image, Patch System Image, Magecart can modify the image of it's host system to obfuscate their malicious activity. T1601.002,Modify System Image, Downgrade System Image,"Conti ransomware can downgrade vulnerable drivers to older versions, exploiting previously patched vulnerabilities. " T1601.002,Modify System Image, Downgrade System Image, Network devices can be downgraded to previous versions through techniques implemented by APT20. T1601.002,Modify System Image, Downgrade System Image, DarkSide ransomware can bypass detection through installing an older version of a network device and exploiting it's now vulnerable state. T1601.002,Modify System Image, Downgrade System Image," ESPecter can install OS drivers of an older version, rendering them vulnerable to exploitation. " T1601.002,Modify System Image, Downgrade System Image," Care should be taken to maintain devices as if they are unprotected, malware can install older versions to exploit. " T1059.008,Command and Scripting Interpreter, Network Device Cli,"APT17 can abuse the CLI on network devices to execute arbitrary, malicious code. " T1059.008,Command and Scripting Interpreter, Network Device Cli, MAZE ransomware can achieve persistence through scripts executed via a network device CLI. T1059.008,Command and Scripting Interpreter, Network Device Cli, APT14 can acquire permissions of an administrator on many network devices and abuse the privileges that come with that permission when executing their own scripts. T1059.008,Command and Scripting Interpreter, Network Device Cli, Network devices should be secured as their CLI can access data that can be exploited by APT groups. T1059.008,Command and Scripting Interpreter, Network Device Cli, Malware can escalate privileges through abusing network device CLI administrator credentials. T1542.005,Pre,,Malware can abuse netbooting to achieve persistence. T1542.005,Pre,, Pre OS boot operations may be hijacked by ransomware such as BazarLoader to obfuscate persistence mechanisms. T1542.005,Pre,, Some variant CobaltStrike modules can abuse netbooting operations to execute malicious code. T1542.005,Pre,," Ransomware, once installed, can abuse pre OS boot operations to mask their presence on a system. " T1542.005,Pre,, APT groups will abuse insecure netbooting functionality to grant their malware persistence. T1020.001,Automated Exfiltration, Traffic Duplication,Maze can mirror traffic to obfuscate data exfiltration. T1020.001,Automated Exfiltration, Traffic Duplication, Threat actor PROMETHIUM can hide their data exfiltration through abusing functionality of some network analysis tools to duplicate network traffic. T1020.001,Automated Exfiltration, Traffic Duplication, CyberGate RAT masks it's C2 communication within mirrored traffic. T1020.001,Automated Exfiltration, Traffic Duplication, RedLine Stealer will exfiltrate data hidden within legitimate traffic. T1020.001,Automated Exfiltration, Traffic Duplication, The TEMP.Isotope campaign featured many instances of malware mirroring legitimate traffic to obfuscate malicious activity. T1542.004,Pre,,DarkSide ransomware will obfuscate it's activity via code injected into ROMMON. T1542.004,Pre,, Malware can load firmware with malicious code into ROMMON to obfuscate activity. T1542.004,Pre,, Specific CobaltStrike modules can achieve persistence via code injection into ROMMON. T1542.004,Pre,, Malware with ROMMONkits can maintain persistence or obfuscate malicious activity. T1542.004,Pre,, APT24 abuses ROM monitoring functionality to obfuscate their activity. T1602.001,Data from Configuration Repository, Snmp (Mib Dump),SNMP can dump configuration data that malware can abuse if it proves to be vulnerable. T1602.001,Data from Configuration Repository, Snmp (Mib Dump), Conti ransomware can determine vulnerabilities within configured security mechanisms by dumping the contents of a MIB database. T1602.001,Data from Configuration Repository, Snmp (Mib Dump), CobaltStrike modules can utilize SNMP to determine vulnerable configurations for later exploitation. T1602.001,Data from Configuration Repository, Snmp (Mib Dump), APT22 employs the technique of dumping the MIB database to learn about the vulnerabilities and strengths of a target during the Reconnaissance phase of an attack. T1602.001,Data from Configuration Repository, Snmp (Mib Dump), Caution should be taken to secure configuration management systems as they can become a single point of failure for attackers to learn about a target system. T1602.002,Data from Configuration Repository, Network Device Configuration Dump,User credentials should be stored securely on network devices so that adversaries cannot claim plaintext passwords and usernames if they are compromised. T1602.002,Data from Configuration Repository, Network Device Configuration Dump, APT13 can access offline storage of network devices to enumerate user credentials. T1602.002,Data from Configuration Repository, Network Device Configuration Dump," BazarLoader can dump configuration details from active memory of a network device, and can then examine them for vulnerabilities. " T1602.002,Data from Configuration Repository, Network Device Configuration Dump," Host enumeration can occur if networks don't secure their memory, as neighbour details are stored in active memory. " T1602.002,Data from Configuration Repository, Network Device Configuration Dump, Malware can dump the contents of non volatile memory to identify misconfigurations to exploit. T1600.002,Weaken Encryption, Disable Crypto Hardware,"CozyBear can disable network device encryption, therefore exploiting weaker software encryption. " T1600.002,Weaken Encryption, Disable Crypto Hardware," Malware often has capabilities to bypass device encryption, as software encryption is often weaker, and easier to exploit. " T1600.002,Weaken Encryption, Disable Crypto Hardware," Adversaries such as Magecart will often skim data that is only encrypted by software, after having disabled the device encryption. " T1600.002,Weaken Encryption, Disable Crypto Hardware," Data exfiltration can be made easier if hardware device encryption is disabled, as it is often more difficult to bypass than software encryption. " T1600.002,Weaken Encryption, Disable Crypto Hardware, CronRAT can exfiltrate data that was encrypted by a hardware device after disabling said encryption. T1600.001,Weaken Encryption, Reduce Key Space,APT27 employs the technique of weakening encryption strength to ease data extraction. T1600.001,Weaken Encryption, Reduce Key Space," Ransomware such as MAZE can reduce the number of cipher keys utilised in encryption, aiding in data access and exfiltration. " T1600.001,Weaken Encryption, Reduce Key Space," Threat actors can gain access to communications through weakening the cipher strength, often through the reduction of key space. " T1600.001,Weaken Encryption, Reduce Key Space, Interception of data over communication can occur if ciphers are broken or weakened. T1600.001,Weaken Encryption, Reduce Key Space, Malware can reduce key space to ease the breaking of ciphers which could grant access to data or aid in exfiltration. T1218.002,Signed Binary Proxy Execution, Control Panel,InvisiMole can register itself for execution and persistence via the Control Panel. T1218.002,Signed Binary Proxy Execution, Control Panel, Reaver drops and executes a malicious CPL file as its payload. T1218.002,Signed Binary Proxy Execution, Control Panel,Adversaries may abuse control.exe to proxy execution of malicious payloads. T1218.002,Signed Binary Proxy Execution, Control Panel, Some actors will use items in the control panel on Windows operating systems to execute malware. T1218.002,Signed Binary Proxy Execution, Control Panel, CPL files can be used to execute malicious code to bypass defenses. T1090.003,Proxy, Multi,APT28 has routed traffic over Tor and VPN servers to obfuscate their activities. T1090.003,Proxy, Multi, A backdoor used by APT29 created a Tor hidden service to forward traffic from the Tor client to local ports 3389 (RDP) 139 (Netbios) and 445 (SMB) enabling full remote access from outside the network. T1090.003,Proxy, Multi, Attor has used Tor for C2 communication. T1090.003,Proxy, Multi, Dok downloads and installs Tor via homebrew. T1090.003,Proxy, Multi, FIN4 has used Tor to log in to victims' email accounts. T1090.003,Proxy, Multi, GreyEnergy has used Tor relays for Command and Control servers. T1090.003,Proxy, Multi, Inception used chains of compromised routers to proxy C2 communications between them and cloud service providers. T1090.003,Proxy, Multi, Keydnap uses a copy of tor2web proxy for HTTPS communications. T1090.003,Proxy, Multi, MacSpy uses Tor for command and control. T1090.003,Proxy, Multi, Operation Wocao has executed commands through the installed web shell via Tor exit nodes. T1090.003,Proxy, Multi, StrongPity can use multiple layers of proxy servers to hide terminal nodes in its infrastructure. T1090.003,Proxy, Multi, Traffic traversing the Tor network will be forwarded to multiple nodes before exiting the Tor network and continuing on to its intended destination. T1090.003,Proxy, Multi, Ursnif has used Tor for C2. T1090.003,Proxy, Multi, WannaCry uses Tor for command and control traffic. T1071.003,Application Layer Protocol, Mail Protocols,Agent Tesla has used SMTP for C2 communications. T1071.003,Application Layer Protocol, Mail Protocols, APT28 used SMTP as a communication channel in various implants initially using self-registered Google Mail accounts and later compromised email servers of its victims. T1071.003,Application Layer Protocol, Mail Protocols, APT32 has used email for C2 via an Office macro. T1071.003,Application Layer Protocol, Mail Protocols, BadPatch uses SMTP for C2. T1071.003,Application Layer Protocol, Mail Protocols, Cannon uses SMTP/S and POP3/S for C2 communications by sending and receiving emails. T1071.003,Application Layer Protocol, Mail Protocols, Various implementations of CHOPSTICK communicate with C2 over SMTP and POP3. T1071.003,Application Layer Protocol, Mail Protocols, ComRAT can use email attachments for command and control. T1071.003,Application Layer Protocol, Mail Protocols, CORESHELL can communicate over SMTP and POP3 for C2. T1071.003,Application Layer Protocol, Mail Protocols, Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2. T1071.003,Application Layer Protocol, Mail Protocols, JPIN can send email over SMTP. T1071.003,Application Layer Protocol, Mail Protocols, Kimsuky has used e-mail to send exfiltrated data to C2 servers. T1071.003,Application Layer Protocol, Mail Protocols, LightNeuron uses SMTP for C2. T1071.003,Application Layer Protocol, Mail Protocols, NavRAT uses the email platform Naver for C2 communications leveraging SMTP. T1071.003,Application Layer Protocol, Mail Protocols, OLDBAIT can use SMTP for C2. T1071.003,Application Layer Protocol, Mail Protocols, RDAT can use email attachments for C2 communications. T1071.003,Application Layer Protocol, Mail Protocols, Remsec is capable of using SMTP for C2. T1071.003,Application Layer Protocol, Mail Protocols, SilverTerrier uses SMTP for C2 communications. T1071.003,Application Layer Protocol, Mail Protocols, Turla has used multiple backdoors which communicate with a C2 server via email attachments. T1071.003,Application Layer Protocol, Mail Protocols, Zebrocy uses SMTP and POP3 for C2. T1071.004,Application Layer Protocol, Dns,Variants of Anchor can use DNS tunneling to communicate with C2. T1071.004,Application Layer Protocol, Dns, APT18 uses DNS for C2 communications. T1071.004,Application Layer Protocol, Dns, APT39 has used remote access tools that leverage DNS in communications with C2. T1071.004,Application Layer Protocol, Dns, APT41 used DNS for C2 communications. T1071.004,Application Layer Protocol, Dns, BONDUPDATER can use DNS and TXT records within its DNS tunneling protocol for command and control. T1071.004,Application Layer Protocol, Dns, Chimera has used Cobalt Strike to encapsulate C2 in DNS traffic. T1071.004,Application Layer Protocol, Dns, Cobalt Group has used DNS tunneling for C2. T1071.004,Application Layer Protocol, Dns, Cobalt Strike can use a custom command and control protocol that can encapsulated in DNS. All protocols use their standard assigned ports. T1071.004,Application Layer Protocol, Dns, Cobian RAT uses DNS for C2. T1071.004,Application Layer Protocol, Dns, Denis has used DNS tunneling for C2 communications. T1071.004,Application Layer Protocol, Dns, Ebury has used DNS requests over UDP port 53 for C2. T1071.004,Application Layer Protocol, Dns, FIN7 has performed C2 using DNS via A OPT and TXT records. T1071.004,Application Layer Protocol, Dns, Goopy has the ability to communicate with its C2 over DNS. T1071.004,Application Layer Protocol, Dns, Helminth can use DNS for C2. T1071.004,Application Layer Protocol, Dns, HTTPBrowser has used DNS for command and control. T1071.004,Application Layer Protocol, Dns, InvisiMole has used a custom implementation of DNS tunneling to embed C2 communications in DNS requests and replies. T1071.004,Application Layer Protocol, Dns, Ke3chang malware RoyalDNS has used DNS for C2. T1071.004,Application Layer Protocol, Dns, Matryoshka uses DNS for C2. T1071.004,Application Layer Protocol, Dns, NanHaiShu uses DNS for the C2 communications. T1071.004,Application Layer Protocol, Dns, OilRig has used DNS for C2. T1071.004,Application Layer Protocol, Dns, Pisloader uses DNS as its C2 protocol. T1071.004,Application Layer Protocol, Dns, PlugX can be configured to use DNS for command and control. T1071.004,Application Layer Protocol, Dns, POWERSOURCE uses DNS TXT records for C2. T1071.004,Application Layer Protocol, Dns, POWRUNER can use DNS for C2 communications. T1071.004,Application Layer Protocol, Dns, QUADAGENT uses DNS for C2 communications. T1071.004,Application Layer Protocol, Dns, RDAT has used DNS to communicate with the C2. T1071.004,Application Layer Protocol, Dns, Remsec is capable of using DNS for C2. T1071.004,Application Layer Protocol, Dns, ShadowPad has used DNS tunneling for C2 communications. T1071.004,Application Layer Protocol, Dns, SOUNDBITE communicates via DNS for C2. T1071.004,Application Layer Protocol, Dns, SUNBURST used DNS for C2 traffic designed to mimic normal SolarWinds API communications. T1071.004,Application Layer Protocol, Dns, TEXTMATE uses DNS TXT records for C2. T1071.004,Application Layer Protocol, Dns, Tropic Trooper's backdoor has communicated to the C2 over the DNS protocol. T1071.004,Application Layer Protocol, Dns, WellMess has the ability to use DNS tunneling for C2 communications. T1599.001,Network Boundary Bridging, Network Address Translation Traversal,Adversaries may bridge network boundaries by modifying a network deviceNetwork Address Translation (NAT) configuration. T1599.001,Network Boundary Bridging, Network Address Translation Traversal, Malicious modifications to NAT may enable an adversary to bypass restrictions on traffic routing that otherwise separate trusted and untrusted networks. T1599.001,Network Boundary Bridging, Network Address Translation Traversal, Actors may modify a target network by adding a bridge to gain access to other infrastructure that is normally protected. T1599.001,Network Boundary Bridging, Network Address Translation Traversal, Malware may try to gain access to sensitive information on other systems by adding a network bridge. T1599.001,Network Boundary Bridging, Network Address Translation Traversal, Cybercriminals can manipulate NATs by adding network bridges to bypass network boundaries. T1056.001,Input Capture, Keylogging,ADVSTORESHELL can perform keylogging. T1056.001,Input Capture, Keylogging, Agent Tesla can log keystrokes on the victimmachine. T1056.001,Input Capture, Keylogging, Ajax Security Team has used CWoolger and MPK custom-developed malware which recorded all keystrokes on an infected system. T1056.001,Input Capture, Keylogging, APT28 has used tools to perform keylogging. T1056.001,Input Capture, Keylogging, APT3 has used a keylogging tool that records keystrokes in encrypted files. T1056.001,Input Capture, Keylogging, APT32 has abused the PasswordChangeNotify to monitor for and capture account password changes. T1056.001,Input Capture, Keylogging, APT38 used a Trojan called KEYLIME to capture keystrokes from the victimmachine. T1056.001,Input Capture, Keylogging, APT39 has used tools for capturing keystrokes. T1056.001,Input Capture, Keylogging, APT41 used a keylogger called GEARSHIFT on a target system. T1056.001,Input Capture, Keylogging, Astaroth logs keystrokes from the victim's machine. T1056.001,Input Capture, Keylogging, One of Attor's plugins can collect user credentials via capturing keystrokes and can capture keystrokes pressed within the window of the injected process. T1056.001,Input Capture, Keylogging, BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger. T1056.001,Input Capture, Keylogging, When it first starts BADNEWS spawns a new thread to log keystrokes. T1056.001,Input Capture, Keylogging, BadPatch has a keylogging capability. T1056.001,Input Capture, Keylogging, Bandook contains keylogging capabilities T1056.001,Input Capture, Keylogging, BISCUIT can capture keystrokes. T1056.001,Input Capture, Keylogging, BlackEnergy has run a keylogger plug-in on a victim. T1056.001,Input Capture, Keylogging, Cadelspy has the ability to log keystrokes on the compromised host. T1056.001,Input Capture, Keylogging, Carbanak logs key strokes for configured processes and sends them back to the C2 server. T1056.001,Input Capture, Keylogging, Cardinal RAT can log keystrokes. T1056.001,Input Capture, Keylogging, Catchamas collects keystrokes from the victimmachine. T1056.001,Input Capture, Keylogging, CHOPSTICK is capable of performing keylogging. T1056.001,Input Capture, Keylogging, Cobalt Strike can track key presses with a keylogger module. T1056.001,Input Capture, Keylogging, Cobian RAT has a feature to perform keylogging on the victimmachine. T1056.001,Input Capture, Keylogging, CosmicDuke uses a keylogger. T1056.001,Input Capture, Keylogging, DarkComet has a keylogging capability. T1056.001,Input Capture, Keylogging, Darkhotel has used a keylogger. T1056.001,Input Capture, Keylogging, Daserf can log keystrokes. T1056.001,Input Capture, Keylogging, Derusbi is capable of logging keystrokes. T1056.001,Input Capture, Keylogging, DOGCALL is capable of logging keystrokes. T1056.001,Input Capture, Keylogging, Dtrackdropper contains a keylogging executable. T1056.001,Input Capture, Keylogging, Duqu can track key presses with a keylogger module. T1056.001,Input Capture, Keylogging, DustySky contains a keylogger. T1056.001,Input Capture, Keylogging, ECCENTRICBANDWAGON can capture and store keystrokes. T1056.001,Input Capture, Keylogging, Empire includes keylogging capabilities for Windows Linux and macOS systems. T1056.001,Input Capture, Keylogging, EvilGrab has the capability to capture keystrokes. T1056.001,Input Capture, Keylogging, Explosive has leveraged its keylogging capabilities to gain access to administrator accounts on target servers. T1056.001,Input Capture, Keylogging, FakeM contains a keylogger module. T1056.001,Input Capture, Keylogging, FIN4 has captured credentials via fake Outlook Web App (OWA) login pages and has also used a .NET based keylogger. T1056.001,Input Capture, Keylogging, Fysbis can perform keylogging. T1056.001,Input Capture, Keylogging, gh0st RAT has a keylogger. T1056.001,Input Capture, Keylogging, Grandoreiro can log keystrokes on the victim's machine. T1056.001,Input Capture, Keylogging, GreyEnergy has a module to harvest pressed keystrokes. T1056.001,Input Capture, Keylogging, Malware used by Group5 is capable of capturing keystrokes. T1056.001,Input Capture, Keylogging, The executable version of Helminth has a module to log keystrokes. T1056.001,Input Capture, Keylogging, HTTPBrowser is capable of capturing keystrokes on victims. T1056.001,Input Capture, Keylogging, Imminent Monitor has a keylogging module. T1056.001,Input Capture, Keylogging, InvisiMole can capture keystrokes on a compromised host. T1056.001,Input Capture, Keylogging, JPIN contains a custom keylogger. T1056.001,Input Capture, Keylogging, jRAT has the capability to log keystrokes from the victimmachine both offline and online. T1056.001,Input Capture, Keylogging, Kasidet has the ability to initiate keylogging. T1056.001,Input Capture, Keylogging, Ke3chang has used keyloggers. T1056.001,Input Capture, Keylogging, KeyBoy installs a keylogger for intercepting credentials and keystrokes. T1056.001,Input Capture, Keylogging, KGH_SPY can perform keylogging by polling the GetAsyncKeyState() function. T1056.001,Input Capture, Keylogging, Kimsuky has used a PowerShell-based keylogger. T1056.001,Input Capture, Keylogging, Kivars has the ability to initiate keylogging on the infected host. T1056.001,Input Capture, Keylogging, KONNI has the capability to perform keylogging. T1056.001,Input Capture, Keylogging, Lazarus Group malware KiloAlfa contains keylogging functionality. T1056.001,Input Capture, Keylogging, Lokibot has the ability to capture input on the compromised host via keylogging. T1056.001,Input Capture, Keylogging, Machete logs keystrokes from the victimmachine. T1056.001,Input Capture, Keylogging, MacSpy captures keystrokes. T1056.001,Input Capture, Keylogging, Magic Hound malware is capable of keylogging. T1056.001,Input Capture, Keylogging, Matryoshka is capable of keylogging. T1056.001,Input Capture, Keylogging, menuPass has used key loggers to steal usernames and passwords. T1056.001,Input Capture, Keylogging, Metamorfo has a command to launch a keylogger on the victimmachine. T1056.001,Input Capture, Keylogging, Micropsia has keylogging capabilities. T1056.001,Input Capture, Keylogging, MoonWind has a keylogger. T1056.001,Input Capture, Keylogging, NanoCore can perform keylogging on the victimmachine. T1056.001,Input Capture, Keylogging, NavRAT logs the keystrokes on the targeted system. T1056.001,Input Capture, Keylogging, NetTraveler contains a keylogger. T1056.001,Input Capture, Keylogging, NETWIRE can perform keylogging. T1056.001,Input Capture, Keylogging, njRAT is capable of logging keystrokes. T1056.001,Input Capture, Keylogging, OilRig has used keylogging tools called KEYPUNCH and LONGWATCH. T1056.001,Input Capture, Keylogging, Okrum was seen using a keylogger tool to capture keystrokes. T1056.001,Input Capture, Keylogging, Operation Wocao has obtained the password for the victim's password manager via a custom keylogger. T1056.001,Input Capture, Keylogging, OwaAuth captures and DES-encrypts credentials before writing the username and password to a log file C:\log.txt. T1056.001,Input Capture, Keylogging, PLATINUM has used several different keyloggers. T1056.001,Input Capture, Keylogging, PlugX has a module for capturing keystrokes per process including window titles. T1056.001,Input Capture, Keylogging, PoetRAT has used a Python tool named klog.exe for keylogging. T1056.001,Input Capture, Keylogging, PoisonIvy contains a keylogger. T1056.001,Input Capture, Keylogging, PoshC2 has modules for keystroke logging and capturing credentials from spoofed Outlook authentication messages. T1056.001,Input Capture, Keylogging, PowerSploit's Get-Keystrokes Exfiltration module can log keystrokes. T1056.001,Input Capture, Keylogging, Prikormka contains a keylogger module that collects keystrokes and the titles of foreground windows. T1056.001,Input Capture, Keylogging, Proton uses a keylogger to capture keystrokes. T1056.001,Input Capture, Keylogging, Pupy uses a keylogger to capture keystrokes it then sends back to the server after it is stopped. T1056.001,Input Capture, Keylogging, QuasarRAT has a built-in keylogger. T1056.001,Input Capture, Keylogging, Regin contains a keylogger. T1056.001,Input Capture, Keylogging, Remcos has a command for keylogging. T1056.001,Input Capture, Keylogging, Remexi gathers and exfiltrates keystrokes from the machine. T1056.001,Input Capture, Keylogging, Remsec contains a keylogger component. T1056.001,Input Capture, Keylogging, Revenge RAT has a plugin for keylogging. T1056.001,Input Capture, Keylogging, ROKRAT uses a keylogger to capture keystrokes and location of where the user is typing. T1056.001,Input Capture, Keylogging, Rover has keylogging functionality. T1056.001,Input Capture, Keylogging, RTM can record keystrokes from both the keyboard and virtual keyboard. T1056.001,Input Capture, Keylogging, RunningRAT captures keystrokes and sends them back to the C2 server. T1056.001,Input Capture, Keylogging, Sandworm Team has used a keylogger to capture keystrokes by using the SetWindowsHookEx function. T1056.001,Input Capture, Keylogging, SLOTHFULMEDIA has a keylogging capability. T1056.001,Input Capture, Keylogging, Sowbug has used keylogging tools. T1056.001,Input Capture, Keylogging, SslMM creates a new thread implementing a keylogging facility using Windows Keyboard Accelerators. T1056.001,Input Capture, Keylogging, Stolen Pencil has a tool to log keystrokes to %userprofile%\appdata\roaming\apach.{txt log}. T1056.001,Input Capture, Keylogging, Sykipot contains keylogging functionality to steal passwords. T1056.001,Input Capture, Keylogging, TajMahal has the ability to capture keystrokes on an infected host. T1056.001,Input Capture, Keylogging, ThiefQuest uses the CGEventTap functions to perform keylogging. T1056.001,Input Capture, Keylogging, Threat Group-3390 actors installed a credential logger on Microsoft Exchange servers. Threat Group-3390 also leveraged the reconnaissance framework ScanBox to capture keystrokes. T1056.001,Input Capture, Keylogging, TinyZBot contains keylogger functionality. T1056.001,Input Capture, Keylogging, Trojan.Karagany can capture keystrokes on a compromised host. T1056.001,Input Capture, Keylogging, Unknown Logger is capable of recording keystrokes. T1056.001,Input Capture, Keylogging, VERMIN collects keystrokes from the victim machine. T1056.001,Input Capture, Keylogging, XAgentOSX contains keylogging functionality that will monitor for active application windows and write them to the log it can handle special characters and it will buffer by default 50 characters before sending them out over the C2 infrastructure. T1056.001,Input Capture, Keylogging, yty uses a keylogger plugin to gather keystrokes. T1056.001,Input Capture, Keylogging, Zeus Panda can perform keylogging on the victimmachine by hooking the functions TranslateMessage and WM_KEYDOWN. T1056.001,Input Capture, Keylogging, ZxShell has a feature to capture a remote computer's keystrokes using a keylogger. T1205.001,Traffic Signaling, Port Knocking,PROMETHIUM has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports. T1205.001,Traffic Signaling, Port Knocking,Threat actor TEMP.Veles abuses port knocking for C2 communication and data exfiltration. T1205.001,Traffic Signaling, Port Knocking," Port knocking can obfuscate malicious activity and assist in evasion from defence mechanisms, a common technique of APT28. " T1205.001,Traffic Signaling, Port Knocking, The Cryptcat backdoor utilises port knocking to hide it's C2 communications. T1205.001,Traffic Signaling, Port Knocking, Ryuk ransomware utilises a series of obscure connections to indicate when a C2 channel should be opened. T1558.004,Steal or Forge Kerberos Tickets, As,APT13 devotes malware to cracking kerberos accounts who have disabled authentication to bypass authentication. T1558.004,Steal or Forge Kerberos Tickets, As, Kerberos accounts should always maintain strong password protection as these accounts can be used by adversaries to bypass authentication if they are compromised. T1558.004,Steal or Forge Kerberos Tickets, As," Conti ransomware attacks weak kerberos accounts, spraying passwords until it obtains access. " T1558.004,Steal or Forge Kerberos Tickets, As," Some CobaltStrike beacons can attack weak passwords, allowing access to full kerberos authentication if the password is not secure. " T1558.004,Steal or Forge Kerberos Tickets, As, Pioneer Kitten often exploit kerberos for tickets after compromising a weak account and utilising it's privileges and access. T1558.003,Steal or Forge Kerberos Tickets, Kerberoasting,APT29 obtained Ticket Granting Service (TGS) tickets for Active Directory Service Principle Names to crack offline. T1558.003,Steal or Forge Kerberos Tickets, Kerberoasting, Empire uses PowerSploit's Invoke-Kerberoast to request service tickets and return crackable ticket hashes. T1558.003,Steal or Forge Kerberos Tickets, Kerberoasting, Impacket modules like GetUserSPNs can be used to get Service Principal Names (SPNs) for user accounts. The output is formatted to be compatible with cracking tools like John the Ripper and Hashcat. T1558.003,Steal or Forge Kerberos Tickets, Kerberoasting, Operation Wocao has used PowerSploit's Invoke-Kerberoast module to request encrypted service tickets and bruteforce the passwords of Windows service accounts offline. T1558.003,Steal or Forge Kerberos Tickets, Kerberoasting, PowerSploit's Invoke-Kerberoast module can request service tickets and return crackable ticket hashes. T1558.003,Steal or Forge Kerberos Tickets, Kerberoasting, UNC2452 obtained Ticket Granting Service (TGS) tickets for Active Directory Service Principle Names to crack offline. T1558.003,Steal or Forge Kerberos Tickets, Kerberoasting, Wizard Spider has used Rubeus MimiKatz Kerberos module and the Invoke-Kerberoast cmdlet to steal AES hashes. T1566.003,Phishing, Spearphishing Via Service,Ajax Security Team has used various social media channels to spearphish victims. T1566.003,Phishing, Spearphishing Via Service, Dark Caracal spearphished victims via Facebook and Whatsapp. T1566.003,Phishing, Spearphishing Via Service, FIN6 has used fake job advertisements sent via LinkedIn to spearphish targets. T1566.003,Phishing, Spearphishing Via Service, Lazarus Group has used fake job advertisements sent via LinkedIn to spearphish victims. T1566.003,Phishing, Spearphishing Via Service, Magic Hound used various social media channels to spearphish victims. T1566.003,Phishing, Spearphishing Via Service, OilRig has used LinkedIn to send spearphishing links. T1566.003,Phishing, Spearphishing Via Service, Windshift has used fake personas on social media to engage and target victims. T1070.003,Indicator Removal on Host, Clear Command History,APT41 attempted to remove evidence of some of its activity by deleting Bash histories. T1070.003,Indicator Removal on Host, Clear Command History, Hildegard has used history -c to clear script shell logs. T1070.003,Indicator Removal on Host, Clear Command History,WastedLocker ransomware possesses functionality to delete CLI command history with the aim to avoid detection for as long a time as possible. T1070.003,Indicator Removal on Host, Clear Command History, FIN11 will remove indicators of their intrusion on machines such as deleting the command line history. T1070.003,Indicator Removal on Host, Clear Command History, Lazarus group often delete their command history to prolong the duration of their unobserved activity. T1053.006,Scheduled Task/Job, Systemd Timers,"Threat actors such as Golden Chickens schedule malicious activity to reoccur on target machines, often through the use of systemd timers. " T1053.006,Scheduled Task/Job, Systemd Timers, Cryptocurrency miners will abuse the systemd timers to regularly schedule the activation of the clipper. T1053.006,Scheduled Task/Job, Systemd Timers, Middle Eastern threat actors embed malicious macros within Office 356 documents that can exploit systemd for repeated execution. T1053.006,Scheduled Task/Job, Systemd Timers, CobaltStrike possesses the ability to communicate via ssh with the systemctl to schedule repeated tasks. T1053.006,Scheduled Task/Job, Systemd Timers, FIN6 often abuses systemd to exfiltrate data at a specific time each day. T1547.012,Boot or Logon Autostart Execution, Print Processors,The PipeMon installer has modified the Registry key HKLM\SYSTEM\CurrentControlSet\Control\Print\Environments\Windows x64\Print Processors to install PipeMon as a Print Processor. T1547.012,Boot or Logon Autostart Execution, Print Processors,The Ghostwriter campaign featured malware that could modify the kernel to initiate malicious code execution on boot. T1547.012,Boot or Logon Autostart Execution, Print Processors, Warzone RAT often injects LKM that auto executes code upon startup. T1547.012,Boot or Logon Autostart Execution, Print Processors, Malware such as POWERHOSE can repeatedly execute arbitrary code upon boot via kernel modification. T1547.012,Boot or Logon Autostart Execution, Print Processors, CozyBear will often modify a machine's kernel to allow for automatic code execution upon startup. T1543.002,Create or Modify System Process, Systemd Service,Exaramel for Linux has a hardcoded location under systemd that it uses to achieve persistence if it is running as root. T1543.002,Create or Modify System Process, Systemd Service, Fysbis has established persistence using a systemd service. T1543.002,Create or Modify System Process, Systemd Service, Hildegard has started a monero service. T1543.002,Create or Modify System Process, Systemd Service, Pupy can be used to establish persistence using a systemd service. T1543.002,Create or Modify System Process, Systemd Service, Rocke has installed a systemd service script to maintain persistence. T1564.007,Hide Artifacts, Vba Stomping,WastedLocker ransomware can inject malicious VBA scripts into MS Office documents for obfuscation. T1564.007,Hide Artifacts, Vba Stomping, ChamelGang utilizes VBA stomping to hide malicious payloads. T1564.007,Hide Artifacts, Vba Stomping, CozyBear often employs the tactic of obscuring VBA payloads within benign data. T1564.007,Hide Artifacts, Vba Stomping, MS Office can be used to hide malicious VBA code by replacing source code with legitimate data. T1564.007,Hide Artifacts, Vba Stomping, UNC215 will obfuscate their malicious payloads within MS Office documents. T1542.003,Pre,,APT28 has deployed a bootkit along with Downdelph to ensure its persistence on the victim. The bootkit shares code with some variants of BlackEnergy. T1542.003,Pre,, APT41 deployed Master Boot Record bootkits on Windows systems to hide their malware and maintain persistence on victim systems. T1542.003,Pre,, BOOTRASH is a Volume Boot Record (VBR) bootkit that uses the VBR to maintain persistence. T1542.003,Pre,, Carberp has installed a bootkit on the system to maintain persistence. T1542.003,Pre,, Some FinFisher variants incorporate an MBR rootkit. T1542.003,Pre,, Lazarus Group malware WhiskeyAlfa-Three modifies sector 0 of the Master Boot Record (MBR) to ensure that the malware will persist even if a victim machine shuts down. T1542.003,Pre,, ROCKBOOT is a Master Boot Record (MBR) bootkit that uses the MBR to establish persistence. T1542.003,Pre,, TrickBot can implant malicious code into a compromised device's firmware. T1574.009,Hijack Execution Flow, Path Interception By Unquoted Path,Empire contains modules that can discover and exploit unquoted path vulnerabilities. T1574.009,Hijack Execution Flow, Path Interception By Unquoted Path, PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit unquoted path vulnerabilities. T1574.009,Hijack Execution Flow, Path Interception By Unquoted Path,UNC2215 abuse path calls that are unquoted to execute their malware at a higher level in the file path than the legitimate one. T1574.009,Hijack Execution Flow, Path Interception By Unquoted Path, REvil ransomware will execute it's payloads through placing them high up the file path of unprotected file calls from programs. T1574.009,Hijack Execution Flow, Path Interception By Unquoted Path, Care should be taken to always place quotation marks around file path calls to prevent malware from abusing it's lack of security to execute malicious code. T1574.008,Hijack Execution Flow, Path Interception By Search Order Hijacking,Empire contains modules that can discover and exploit search order hijacking vulnerabilities. T1574.008,Hijack Execution Flow, Path Interception By Search Order Hijacking, PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit search order hijacking vulnerabilities. T1574.008,Hijack Execution Flow, Path Interception By Search Order Hijacking,Pakdoor can replace legitimate file paths with it's own malicious file paths. T1574.008,Hijack Execution Flow, Path Interception By Search Order Hijacking, ChamelGang will often install malware and then execute it by hijacking other programs filepath searches. T1574.008,Hijack Execution Flow, Path Interception By Search Order Hijacking," Earth Centaur can escalate the privileges of their malware via the hijacking of the path calls of other, higher privileged programs. " T1027.001,Obfuscated Files or Information, Binary Padding,APT32 includes garbage code to mislead anti-malware software and researchers. T1027.001,Obfuscated Files or Information, Binary Padding," BRONZE BUTLER downloader code has included 0"" characters at the end of the file to inflate the file size in a likely attempt to evade anti-virus detection. " T1027.001,Obfuscated Files or Information, Binary Padding, Comnie appends a total of 64MB of garbage data to a file to deter any security products in place that may be scanning files on disk. T1027.001,Obfuscated Files or Information, Binary Padding, CORESHELL contains unused machine instructions in a likely attempt to hinder analysis. T1027.001,Obfuscated Files or Information, Binary Padding, A variant of Emissary appends junk data to the end of its DLL file to create a large file that may exceed the maximum size that anti-virus programs can scan. T1027.001,Obfuscated Files or Information, Binary Padding, FatDuke has been packed with junk code and strings. T1027.001,Obfuscated Files or Information, Binary Padding, FinFisher contains junk code in its functions in an effort to confuse disassembly programs. T1027.001,Obfuscated Files or Information, Binary Padding, Gamaredon Group has obfuscated .NET executables by inserting junk code. T1027.001,Obfuscated Files or Information, Binary Padding, Goopy has had null characters padded in its malicious DLL payload. T1027.001,Obfuscated Files or Information, Binary Padding, Grandoreiro has added BMP images to the resources section of its Portable Executable (PE) file increasing each binary to at least 300MB in size. T1027.001,Obfuscated Files or Information, Binary Padding, Higaisa performed padding with null bytes before calculating its hash. T1027.001,Obfuscated Files or Information, Binary Padding, Javali can use large obfuscated libraries to hinder detection and analysis. T1027.001,Obfuscated Files or Information, Binary Padding, Before writing to disk Kwampirs inserts a randomly generated string into the middle of the decrypted payload in an attempt to evade hash-based detections. T1027.001,Obfuscated Files or Information, Binary Padding, Leviathan has inserted garbage characters into code presumably to avoid anti-virus detection. T1027.001,Obfuscated Files or Information, Binary Padding, Maze has inserted large blocks of junk code including some components to decrypt strings and other important information for later in the encryption process. T1027.001,Obfuscated Files or Information, Binary Padding, Moafee has been known to employ binary padding. T1027.001,Obfuscated Files or Information, Binary Padding, Mustang Panda has used junk code within their DLL files to hinder analysis. T1027.001,Obfuscated Files or Information, Binary Padding, Patchwork apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes. T1027.001,Obfuscated Files or Information, Binary Padding, POWERSTATS has used useless code blocks to counter analysis. T1027.001,Obfuscated Files or Information, Binary Padding, Rifdoor has added four additional bytes of data upon launching then saved the changed version as C:\ProgramData\Initech\Initech.exe. T1027.001,Obfuscated Files or Information, Binary Padding, SamSam has used garbage code to pad some of its malware components. T1027.001,Obfuscated Files or Information, Binary Padding, TAINTEDSCRIBE can execute FileRecvWriteRand to append random bytes to the end of a file received from C2. T1027.001,Obfuscated Files or Information, Binary Padding, A version of XTunnel introduced in July 2015 inserted junk code into the binary in a likely attempt to obfuscate it and bypass security products. T1027.001,Obfuscated Files or Information, Binary Padding, yty contains junk code in its binary likely to confuse malware analysts. T1027.001,Obfuscated Files or Information, Binary Padding," ZeroT has obfuscated DLLs and functions using dummy API calls inserted between real instructions.""" T1078.002,Valid Accounts, Domain Accounts,APT29 has used valid accounts including administrator accounts to help facilitate lateral movement on compromised networks. T1078.002,Valid Accounts, Domain Accounts, APT3 leverages valid accounts after gaining credentials for use within the victim domain. T1078.002,Valid Accounts, Domain Accounts, Chimera has used compromised domain accounts to gain access to the target environment. T1078.002,Valid Accounts, Domain Accounts, Cobalt Strike can use known credentials to run commands and spawn processes as a domain user account. T1078.002,Valid Accounts, Domain Accounts, Indrik Spider has collected credentials from infected systems including domain accounts. T1078.002,Valid Accounts, Domain Accounts, Operation Wocao has used domain credentials including domain admin for lateral movement and privilege escalation. T1078.002,Valid Accounts, Domain Accounts, Ryuk can use stolen domain admin accounts to move laterally within a victim domain. T1078.002,Valid Accounts, Domain Accounts, Sandworm Team has used stolen credentials to access administrative accounts within the domain. T1078.002,Valid Accounts, Domain Accounts, If Shamoon cannot access shares using current privileges it attempts access using hard coded domain-specific credentials gathered earlier in the intrusion. T1078.002,Valid Accounts, Domain Accounts, TA505 has used stolen domain admin accounts to compromise additional hosts. T1078.002,Valid Accounts, Domain Accounts, Threat Group-1314 actors used compromised domain credentials for the victim's endpoint management platform Altiris to move laterally. T1078.002,Valid Accounts, Domain Accounts, Wizard Spider has used administrative accounts including Domain Admin to move laterally within a victim network. T1505.003,Server Software Component, Web Shell,APT32 has used Web shells to maintain access to victim websites. T1505.003,Server Software Component, Web Shell, APT39 has installed ANTAK and ASPXSPY web shells. T1505.003,Server Software Component, Web Shell, ASPXSpy is a Web shell. The ASPXTool version used by Threat Group-3390 has been deployed to accessible servers running Internet Information Services (IIS). T1505.003,Server Software Component, Web Shell, China Chopper's server component is a Web Shell payload. T1505.003,Server Software Component, Web Shell, Deep Panda uses Web shells on publicly accessible Web servers to access victim networks. T1505.003,Server Software Component, Web Shell, Dragonfly 2.0 commonly created Web shells on victims' publicly accessible email and web servers which they used to maintain access to a victim network and download additional malicious files. T1505.003,Server Software Component, Web Shell, Fox Kitten has installed web shells on compromised hosts to maintain access. T1505.003,Server Software Component, Web Shell, GALLIUM used Web shells to persist in victim environments and assist in execution and exfiltration. T1505.003,Server Software Component, Web Shell, HAFNIUM has deployed multiple web shells on compromised servers including SIMPLESEESHARP SPORTSBALL China Chopper and ASPXSpy. T1505.003,Server Software Component, Web Shell," Kimsuky has used modified versions of open source PHP web shells to maintain access often adding Dinosaur"" references within the code. " T1505.003,Server Software Component, Web Shell, Leviathan relies on web shells for an initial foothold as well as persistence into the victim's systems. T1505.003,Server Software Component, Web Shell, OilRig has used web shells often to maintain access to a victim network. T1505.003,Server Software Component, Web Shell, Operation Wocao has used their own web shells as well as those previously placed on target systems by other threat actors for reconnaissance and lateral movement. T1505.003,Server Software Component, Web Shell, OwaAuth is a Web shell that appears to be exclusively used by Threat Group-3390. It is installed as an ISAPI filter on Exchange servers and shares characteristics with the China Chopper Web shell. T1505.003,Server Software Component, Web Shell, P.A.S. Webshell can gain remote access and execution on target web servers. T1505.003,Server Software Component, Web Shell, Sandworm Team has used webshells including P.A.S. Webshell to maintain access to victim networks. T1505.003,Server Software Component, Web Shell, SEASHARPEE is a Web shell. T1505.003,Server Software Component, Web Shell, SUPERNOVA is a Web shell. T1505.003,Server Software Component, Web Shell, TEMP.Veles has planted Web shells on Outlook Exchange servers. T1505.003,Server Software Component, Web Shell, Threat Group-3390 has used a variety of Web shells. T1505.003,Server Software Component, Web Shell, Tropic Trooper has started a web service in the target host and wait for the adversary to connect acting as a web shell. T1505.003,Server Software Component, Web Shell," Volatile Cedar can inject web shell code into a server. """ T1090.004,Proxy, Domain Fronting,APT29 has used the meek domain fronting plugin for Tor to hide the destination of C2 traffic. T1090.004,Proxy, Domain Fronting, meek uses Domain Fronting to disguise the destination of network traffic as another server that is hosted in the same Content Delivery Network (CDN) as the intended destination. T1090.004,Proxy, Domain Fronting,The Prometei botnet will utilise domain fronting to hide it's C2 infrastructure and it's compromised bots. T1090.004,Proxy, Domain Fronting, ATP29 often inserts multiple domains from the same CDN inside the SNI field to obfuscate the real C2 domain. T1090.004,Proxy, Domain Fronting," Evilnum utilises scripts that facilitate a proxy connection, sometimes involving domain fronting. " T1027.003,Obfuscated Files or Information, Steganography,ABK can extract a malicious Portable Executable (PE) from a photo. T1027.003,Obfuscated Files or Information, Steganography, APT37 uses steganography to send images to users that are embedded with shellcode. T1027.003,Obfuscated Files or Information, Steganography, Avenger can extract backdoor malware from downloaded images. T1027.003,Obfuscated Files or Information, Steganography, BBK can extract a malicious Portable Executable (PE) from a photo. T1027.003,Obfuscated Files or Information, Steganography, BRONZE BUTLER has used steganography in multiple operations to conceal malicious payloads. T1027.003,Obfuscated Files or Information, Steganography, build_downer can extract malware from a downloaded JPEG. T1027.003,Obfuscated Files or Information, Steganography, IcedID has embedded binaries within RC4 encrypted .png files. T1027.003,Obfuscated Files or Information, Steganography, MuddyWater has stored obfuscated JavaScript code in an image file named temp.jpg. T1027.003,Obfuscated Files or Information, Steganography, Okrum's payload is encrypted and embedded within its loader or within a legitimate PNG file. T1027.003,Obfuscated Files or Information, Steganography, PolyglotDuke can use steganography to hide C2 information in images. T1027.003,Obfuscated Files or Information, Steganography, PowerDuke uses steganography to hide backdoors in PNG files which are also encrypted using the Tiny Encryption Algorithm (TEA). T1027.003,Obfuscated Files or Information, Steganography, Raindrop used steganography to locate the start of its encoded payload within legitimate 7-Zip code. T1027.003,Obfuscated Files or Information, Steganography, Ramsay has PE data embedded within JPEG files contained within Word documents. T1027.003,Obfuscated Files or Information, Steganography, RDAT can also embed data within a BMP image prior to exfiltration. T1027.003,Obfuscated Files or Information, Steganography, RegDuke can hide data in images including use of the Least Significant Bit (LSB). T1027.003,Obfuscated Files or Information, Steganography, TA551 has hidden encoded data for malware DLLs in a PNG. T1027.003,Obfuscated Files or Information, Steganography, Tropic Trooper has used JPG files with encrypted payloads to mask their backdoor routines and evade detection. T1574.010,Hijack Execution Flow, Services File Permissions Weakness,One variant of BlackEnergy locates existing driver services that have been disabled and drops its driver component into one of those service's paths replacing the legitimate executable. The malware then sets the hijacked service to start automatically to establish persistence. T1574.010,Hijack Execution Flow, Services File Permissions Weakness,Threat actors will often hijack execution for malicious code execution through exploiting weakly protected service binaries. T1574.010,Hijack Execution Flow, Services File Permissions Weakness, The Sidewalk backdoor can escalate it's privileges by hijacking the execution flow or services that possess privileges above it. T1574.010,Hijack Execution Flow, Services File Permissions Weakness, Hive ransomware can abuse improperly set permissions of some services to perform privilege execution. T1574.010,Hijack Execution Flow, Services File Permissions Weakness, UNC215 will exploit poorly protected service binaries to execute their installed malware. T1574.011,Hijack Execution Flow, Services Registry Permissions Weakness,APT31 executes their own malicious payloads through hijacking registry services that have misconfigured permissions. T1574.011,Hijack Execution Flow, Services Registry Permissions Weakness, REvil abuse powershell to modify HKLM\SYSTEM\CurrentControlSet\Services to allow for the execution of their own malicious payloads. T1574.011,Hijack Execution Flow, Services Registry Permissions Weakness, APT31 abuses registry keys related to services to point to and execute malicious scripts installed on a machine. T1574.011,Hijack Execution Flow, Services Registry Permissions Weakness, UNC215 abuses registry related services to redirect the service's desired executable to a malicious one. T1574.011,Hijack Execution Flow, Services Registry Permissions Weakness, Dridex will modify a windows registry to allow associated services to execute malware. T1574.007,Hijack Execution Flow, Path Interception By Path Environment Variable,Empire contains modules that can discover and exploit path interception opportunities in the PATH environment variable. T1574.007,Hijack Execution Flow, Path Interception By Path Environment Variable, PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit path interception opportunities in the PATH environment variable. T1574.007,Hijack Execution Flow, Path Interception By Path Environment Variable,Grief ransomware utilises malware that inserts malicious payloads to be executed with the environmental variable PATH's list of directories. T1574.007,Hijack Execution Flow, Path Interception By Path Environment Variable, Certain CobaltStrike payloads will abuse the PATH variable to allow for malicious execution of files. T1574.007,Hijack Execution Flow, Path Interception By Path Environment Variable, The APT Naikon will abuse the Windows PATH variable to sequentially execute inserted malware. T1499.001,Endpoint Denial of Service, Os Exhaustion Flood,The Lucifer cryptojacker can overwhelm the self imposed limits of resources of an OS when mining for cryptocurrency. T1499.001,Endpoint Denial of Service, Os Exhaustion Flood," Quantum Stresser could perform DDoS as a service through the targets of an OS' resources, forcing the machine to slow down and lock up. " T1499.001,Endpoint Denial of Service, Os Exhaustion Flood, BlackNurse would target OS of victim machines and overwhelm their capacity to handle the demands placed upon it. T1499.001,Endpoint Denial of Service, Os Exhaustion Flood," GoBotKR can initiate a variety of DDoS attacks, including ones that target the finite resources of a system. " T1499.001,Endpoint Denial of Service, Os Exhaustion Flood, Ransomware will often begin to damage the OS' ability to manage resources to coerce victims into paying the ransom. T1543.003,Create or Modify System Process, Windows Service,Anchor can establish persistence by creating a service. T1543.003,Create or Modify System Process, Windows Service, AppleJeus can install itself as a service. T1543.003,Create or Modify System Process, Windows Service, An APT19 Port 22 malware variant registers itself as a service. T1543.003,Create or Modify System Process, Windows Service, APT3 has a tool that creates a new service for persistence. T1543.003,Create or Modify System Process, Windows Service, APT32 modified Windows Services to ensure PowerShell scripts were loaded on the system. APT32 also creates a Windows service to establish persistence. T1543.003,Create or Modify System Process, Windows Service, APT41 modified legitimate Windows services to install malware backdoors. APT41 created the StorSyncSvc service to provide persistence for Cobalt Strike. T1543.003,Create or Modify System Process, Windows Service, Attor's dispatcher can establish persistence by registering a new service. T1543.003,Create or Modify System Process, Windows Service, AuditCred is installed as a new service on the system. T1543.003,Create or Modify System Process, Windows Service, Bankshot can terminate a specific process by its process id. T1543.003,Create or Modify System Process, Windows Service, BBSRAT can modify service configurations. T1543.003,Create or Modify System Process, Windows Service, BitPaymer has attempted to install itself as a service to maintain persistence. T1543.003,Create or Modify System Process, Windows Service, One variant of BlackEnergy creates a new service using either a hard-coded or randomly generated name. T1543.003,Create or Modify System Process, Windows Service, Blue Mockingbird has made their XMRIG payloads persistent as a Windows Service. T1543.003,Create or Modify System Process, Windows Service, Briba installs a service pointing to a malicious DLL dropped to disk. T1543.003,Create or Modify System Process, Windows Service, Carbanak malware installs itself as a service to provide persistence and SYSTEM privileges. T1543.003,Create or Modify System Process, Windows Service, Carbon establishes persistence by creating a service and naming it based off the operating system version running on the current machine. T1543.003,Create or Modify System Process, Windows Service, Catchamas adds a new service named NetAdapter to establish persistence. T1543.003,Create or Modify System Process, Windows Service, Cobalt Group has created new services to establish persistence. T1543.003,Create or Modify System Process, Windows Service, Cobalt Strike can install a new service. T1543.003,Create or Modify System Process, Windows Service," CosmicDuke uses Windows services typically named javamtsup"" for persistence. " T1543.003,Create or Modify System Process, Windows Service, One persistence mechanism used by CozyCar is to register itself as a Windows service. T1543.003,Create or Modify System Process, Windows Service, DarkVishnya created new services for shellcode loaders distribution. T1543.003,Create or Modify System Process, Windows Service, Dtrack can add a service called WBService to establish persistence. T1543.003,Create or Modify System Process, Windows Service, Duqu creates a new service that loads a malicious driver when the system starts. When Duqu is active the operating system believes that the driver is legitimate as it has been signed with a valid private key. T1543.003,Create or Modify System Process, Windows Service, Dyre registers itself as a service by adding several Registry keys. T1543.003,Create or Modify System Process, Windows Service, Elise configures itself as a service. T1543.003,Create or Modify System Process, Windows Service, Emissary is capable of configuring itself as a service. T1543.003,Create or Modify System Process, Windows Service, Emotet has been observed creating new services to maintain persistence. T1543.003,Create or Modify System Process, Windows Service, Empire can utilize built-in modules to modify service binaries and restore them to their original state. T1543.003,Create or Modify System Process, Windows Service, The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the descriptionWindows Check AV. T1543.003,Create or Modify System Process, Windows Service, FALLCHILL has been installed as a Windows service. T1543.003,Create or Modify System Process, Windows Service, FIN7 created new Windows services and added them to the startup directories for persistence. T1543.003,Create or Modify System Process, Windows Service, FinFisher creates a new Windows service with the malicious executable for persistence. T1543.003,Create or Modify System Process, Windows Service, gh0st RAT can create a new service to establish persistence. T1543.003,Create or Modify System Process, Windows Service, GoldenSpy has established persistence by running in the background as an autostart service. T1543.003,Create or Modify System Process, Windows Service, GreyEnergy chooses a service drops a DLL file and writes it to that serviceDLL Registry key. T1543.003,Create or Modify System Process, Windows Service, hcdLoader installs itself as a service for persistence. T1543.003,Create or Modify System Process, Windows Service, Honeybee has batch files that modify the system service COMSysApp to load a malicious DLL. T1543.003,Create or Modify System Process, Windows Service, Hydraq creates new services to establish persistence. T1543.003,Create or Modify System Process, Windows Service, Some InnaputRAT variants create a new Windows service to establish persistence. T1543.003,Create or Modify System Process, Windows Service, InvisiMole can register a Windows service named CsPower as part of its execution chain and a Windows service named clr_optimization_v2.0.51527_X86 to achieve persistence. T1543.003,Create or Modify System Process, Windows Service, JHUHUGIT has registered itself as a service to establish persistence. T1543.003,Create or Modify System Process, Windows Service, Kazuar can install itself as a new service. T1543.003,Create or Modify System Process, Windows Service, Ke3chang backdoor RoyalDNS established persistence through adding a service called Nwsapagent. T1543.003,Create or Modify System Process, Windows Service, KeyBoy installs a service pointing to a malicious DLL dropped to disk. T1543.003,Create or Modify System Process, Windows Service, Kimsuky has created new services for persistence. T1543.003,Create or Modify System Process, Windows Service, Kwampirs creates a new service named WmiApSrvEx to establish persistence. T1543.003,Create or Modify System Process, Windows Service, Several Lazarus Group malware families install themselves as new services on victims. T1543.003,Create or Modify System Process, Windows Service, LoudMiner can automatically launch a Linux virtual machine as a service at startup if the AutoStart option is enabled in the VBoxVmService configuration file. T1543.003,Create or Modify System Process, Windows Service, MoonWind installs itself as a new service with automatic startup to establish persistence. The service checks every 60 seconds to determine if the malware is running; if not it will spawn a new instance. T1543.003,Create or Modify System Process, Windows Service, Naid creates a new service to establish. T1543.003,Create or Modify System Process, Windows Service, Nerex creates a Registry subkey that registers a new service. T1543.003,Create or Modify System Process, Windows Service, Nidiran can create a new service named msamger (Microsoft Security Accounts Manager). T1543.003,Create or Modify System Process, Windows Service, To establish persistence Okrum can install itself as a new service named NtmSsvc. T1543.003,Create or Modify System Process, Windows Service, PipeMon can establish persistence by registering a malicious DLL as an alternative Print Processor which is loaded when the print spooler service starts. T1543.003,Create or Modify System Process, Windows Service, PlugX can be added as a service to establish persistence. PlugX also has a module to change service configurations as well as start control and delete services. T1543.003,Create or Modify System Process, Windows Service, PoisonIvy creates a Registry subkey that registers a new service. PoisonIvy also creates a Registry entry modifying the Logical Disk Manager service to point to a malicious DLL dropped to disk. T1543.003,Create or Modify System Process, Windows Service, PowerSploit contains a collection of Privesc-PowerUp modules that can discover and replace/modify service binaries paths and configs. T1543.003,Create or Modify System Process, Windows Service, PROMETHIUM has created new services and modified existing services for persistence. T1543.003,Create or Modify System Process, Windows Service, Ragnar Locker has used sc.exe to create a new service for the VirtualBox driver. T1543.003,Create or Modify System Process, Windows Service, RawPOS installs itself as a service to maintain persistence. T1543.003,Create or Modify System Process, Windows Service, RDAT has created a service when it is installed on the victim machine. T1543.003,Create or Modify System Process, Windows Service, Reaver installs itself as a new service. T1543.003,Create or Modify System Process, Windows Service, Some Sakula samples install themselves as services for persistence by calling WinExec with the net start argument. T1543.003,Create or Modify System Process, Windows Service, Seasalt is capable of installing itself as a service. T1543.003,Create or Modify System Process, Windows Service," Shamoon creates a new service namedntssrv to execute the payload. Newer versions create the ""MaintenaceSrv"" and ""hdv_725x"" services. " T1543.003,Create or Modify System Process, Windows Service, ShimRat has installed a Windows service to maintain persistence on victim machines. T1543.003,Create or Modify System Process, Windows Service," SLOTHFULMEDIA has created a service on victim machines named ""TaskFrame"" to establish persistence. " T1543.003,Create or Modify System Process, Windows Service, StreamEx establishes persistence by installing a new service pointing to its DLL and setting the service to auto-start. T1543.003,Create or Modify System Process, Windows Service, StrongPity has created new services and modified existing services for persistence. T1543.003,Create or Modify System Process, Windows Service, If running as administrator TDTESS installs itself as a new service named bmwappushservice to establish persistence. T1543.003,Create or Modify System Process, Windows Service, TEARDROP ran as a Windows service from the c:\windows\syswow64 folder. T1543.003,Create or Modify System Process, Windows Service, A Threat Group-3390 tool can create a new service naming it after the config information to gain persistence. T1543.003,Create or Modify System Process, Windows Service, TinyZBot can install as a Windows service for persistence. T1543.003,Create or Modify System Process, Windows Service, TrickBot establishes persistence by creating an autostart service that allows it to run whenever the machine boots. T1543.003,Create or Modify System Process, Windows Service, Tropic Trooper has installed a service pointing to a malicious DLL dropped to disk. T1543.003,Create or Modify System Process, Windows Service, TYPEFRAME variants can add malicious DLL modules as new services.TYPEFRAME can also delete services from the victimmachine. T1543.003,Create or Modify System Process, Windows Service, Ursnif has registered itself as a system service in the Registry for automatic execution at system startup. T1543.003,Create or Modify System Process, Windows Service, Volgmer installs a copy of itself in a randomly selected service then overwrites the ServiceDLL entry in the service's Registry entry. Some Volgmer variants also install .dll files as services with names generated by a list of hard-coded strings. T1543.003,Create or Modify System Process, Windows Service," WannaCry creates the service ""mssecsvc2.0"" with the display name ""Microsoft Security Center (2.0) Service."" " T1543.003,Create or Modify System Process, Windows Service, Wiarp creates a backdoor through which remote attackers can create a service. T1543.003,Create or Modify System Process, Windows Service," Wingbird uses services.exe to register a new autostart service named ""Audit Service"" using a copy of the local lsass.exe file. " T1543.003,Create or Modify System Process, Windows Service, Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence. T1543.003,Create or Modify System Process, Windows Service, Wizard Spider has installed TrickBot as a service named ControlServiceA in order to establish persistence. T1543.003,Create or Modify System Process, Windows Service, ZeroT can add a new service to ensure PlugX persists on the system when delivered as another payload onto the system. T1543.003,Create or Modify System Process, Windows Service, ZLib creates Registry keys to allow itself to run as various services. T1543.003,Create or Modify System Process, Windows Service, zwShell has established persistence by adding itself as a new service. T1543.003,Create or Modify System Process, Windows Service," ZxShell can create a new service using the service parser function ProcessScCommand. """ T1543.004,Create or Modify System Process, Launch Daemon,AppleJeus has placed a plist file within the LaunchDaemons folder and launched it manually. T1543.004,Create or Modify System Process, Launch Daemon, Bundlore can persist via a LaunchDaemon. T1543.004,Create or Modify System Process, Launch Daemon, Dacls can establish persistence via a Launch Daemon. T1543.004,Create or Modify System Process, Launch Daemon, LoudMiner added plist files in /Library/LaunchDaemons with RunAtLoad set to true. T1543.004,Create or Modify System Process, Launch Daemon, OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchDaemons. T1543.004,Create or Modify System Process, Launch Daemon, When running with root privileges after a Launch Agent is installed ThiefQuest installs a plist file to the /Library/LaunchDaemons/ folder with the RunAtLoad key set to true establishing persistence as a Launch Daemon. T1110.002,Brute Force, Password Cracking,APT3 has been known to brute force password hashes to be able to leverage plain text credentials. T1110.002,Brute Force, Password Cracking, APT41 performed password brute-force attacks on the local admin account. T1110.002,Brute Force, Password Cracking, Dragonfly 2.0 dropped and executed tools used for password cracking including Hydra and CrackMapExec. T1110.002,Brute Force, Password Cracking, FIN6 has extracted password hashes from ntds.dit to crack offline. T1110.002,Brute Force, Password Cracking, Net Crawler uses a list of known credentials gathered through credential dumping to guess passwords to accounts as it spreads throughout a network. T1222.001,File and Directory Permissions Modification, Windows File And Directory Permissions Modification,BitPaymer can use icacls /reset and takeown /F to reset a targeted executable's permissions and then take ownership. T1222.001,File and Directory Permissions Modification, Windows File And Directory Permissions Modification, Grandoreiro can modify the binary ACL to prevent security tools from running. T1222.001,File and Directory Permissions Modification, Windows File And Directory Permissions Modification, JPIN can use the command-line utility cacls.exe to change file permissions. T1222.001,File and Directory Permissions Modification, Windows File And Directory Permissions Modification, Ryuk can launch icacls /grant Everyone:F /T /C /Q to delete every access-based restrictions on files and directories. T1222.001,File and Directory Permissions Modification, Windows File And Directory Permissions Modification, WannaCry uses attrib +h and icacls . /grant Everyone:F /T /C /Q to make some of its files hidden and grant all users full access controls. T1222.001,File and Directory Permissions Modification, Windows File And Directory Permissions Modification, Wizard Spider has used the icacls command to modify access control to backup servers providing them with full control of all the system folders. T1071.002,Application Layer Protocol, File Transfer Protocols,APT41 used exploit payloads that initiate download via FTP. T1071.002,Application Layer Protocol, File Transfer Protocols, Attor has used FTP protocol for C2 communication. T1071.002,Application Layer Protocol, File Transfer Protocols, CARROTBALL has the ability to use FTP in C2 communications. T1071.002,Application Layer Protocol, File Transfer Protocols, Honeybee uses FTP for command and control. T1071.002,Application Layer Protocol, File Transfer Protocols, JPIN can communicate over FTP. T1071.002,Application Layer Protocol, File Transfer Protocols, Kazuar uses FTP and FTPS to communicate with the C2 server. T1071.002,Application Layer Protocol, File Transfer Protocols, Kimsuky has used FTP to download additional malware to the target machine. T1071.002,Application Layer Protocol, File Transfer Protocols, Machete uses FTP for Command & Control. T1071.002,Application Layer Protocol, File Transfer Protocols, NOKKI has used FTP for C2 communications. T1071.002,Application Layer Protocol, File Transfer Protocols, PoetRAT has used FTP for C2 communications. T1071.002,Application Layer Protocol, File Transfer Protocols, ShadowPad has used FTP for C2 communications. T1071.002,Application Layer Protocol, File Transfer Protocols, SilverTerrier uses FTP for C2 communications. T1071.002,Application Layer Protocol, File Transfer Protocols, SYSCON has the ability to use FTP in C2 communications. T1071.002,Application Layer Protocol, File Transfer Protocols, XAgentOSX contains the ftpUpload function to use the FTPManager:uploadFile method to upload files from the target system. T1071.002,Application Layer Protocol, File Transfer Protocols, ZxShell has used FTP for C2 connections. T1218.012,Signed Binary Proxy Execution, Verclsid,Hancitor has used verclsid.exe to download and execute a malicious script. T1218.012,Signed Binary Proxy Execution, Verclsid,Adversaries may abuse verclsid.exe to execute malicious COM payloads T1218.012,Signed Binary Proxy Execution, Verclsid," Using verclsid.exe, attacker bypassed application control policies to execute malicious payload. " T1218.012,Signed Binary Proxy Execution, Verclsid, Malware loads malicious COM payload inside Internet Explorer using verclsid.exe T1218.012,Signed Binary Proxy Execution, Verclsid, Using verclsid.exe to register malicious extension inside cmd.exe T1059.005,Command and Scripting Interpreter, Visual Basic,APT-C-36 has embedded a VBScript within a malicious Word document which is executed upon the document opening. T1059.005,Command and Scripting Interpreter, Visual Basic, APT32 has used macros COM scriptlets and VBS scripts. T1059.005,Command and Scripting Interpreter, Visual Basic, APT33 has used VBScript to initiate the delivery of payloads. T1059.005,Command and Scripting Interpreter, Visual Basic, APT37 executes shellcode and a VBA script to decode Base64 strings. T1059.005,Command and Scripting Interpreter, Visual Basic, APT39 has utilized malicious VBS scripts in malware. T1059.005,Command and Scripting Interpreter, Visual Basic, Astaroth has used malicious VBS e-mail attachments for execution. T1059.005,Command and Scripting Interpreter, Visual Basic, BackConfig has used VBS to install its downloader component and malicious documents with VBA macro code. T1059.005,Command and Scripting Interpreter, Visual Basic, Bisonal's dropper creates VBS scripts on the victimmachine. T1059.005,Command and Scripting Interpreter, Visual Basic, BRONZE BUTLER has used VBS and VBE scripts for execution. T1059.005,Command and Scripting Interpreter, Visual Basic, Cobalt Group has sent Word OLE compound documents with malicious obfuscated VBA macros that will run upon user execution. T1059.005,Command and Scripting Interpreter, Visual Basic, Cobalt Strike can use VBA to perform execution. T1059.005,Command and Scripting Interpreter, Visual Basic, Comnie executes VBS scripts. T1059.005,Command and Scripting Interpreter, Visual Basic, Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads. T1059.005,Command and Scripting Interpreter, Visual Basic, Exaramel for Windows has a command to execute VBS scripts on the victimmachine. T1059.005,Command and Scripting Interpreter, Visual Basic, FIN4 has used VBA macros to display a dialog box and collect victim credentials. T1059.005,Command and Scripting Interpreter, Visual Basic, FIN7 used VBS scripts to help perform tasks on the victim's machine. T1059.005,Command and Scripting Interpreter, Visual Basic, Frankenstein has used Word documents that prompts the victim to enable macros and run a Visual Basic script. T1059.005,Command and Scripting Interpreter, Visual Basic, Gamaredon Group has embedded malicious macros in document templates which executed VBScript. Gamaredon Group has also delivered Microsoft Outlook VBA projects with embedded macros. T1059.005,Command and Scripting Interpreter, Visual Basic, Goopy has the ability to use a Microsoft Outlook backdoor macro to communicate with its C2. T1059.005,Command and Scripting Interpreter, Visual Basic, Gorgon Group has used macros in Spearphishing Attachments as well as executed VBScripts on victim machines. T1059.005,Command and Scripting Interpreter, Visual Basic, Grandoreiro can use VBScript to execute malicious code. T1059.005,Command and Scripting Interpreter, Visual Basic, One version of Helminth consists of VBScript scripts. T1059.005,Command and Scripting Interpreter, Visual Basic, Higaisa has used VBScript code on the victim's machine. T1059.005,Command and Scripting Interpreter, Visual Basic, Honeybee embeds a Visual Basic script within a malicious Word document as part of initial access; the script is executed when the Word document is opened. T1059.005,Command and Scripting Interpreter, Visual Basic, IcedID has used obfuscated VBA string expressions. T1059.005,Command and Scripting Interpreter, Visual Basic, Inception has used VBScript to execute malicious commands and payloads. T1059.005,Command and Scripting Interpreter, Visual Basic, Javali has used embedded VBScript to download malicious payloads from C2. T1059.005,Command and Scripting Interpreter, Visual Basic, JCry has used VBS scripts. T1059.005,Command and Scripting Interpreter, Visual Basic, jRAT has been distributed as HTA files with VBScript. T1059.005,Command and Scripting Interpreter, Visual Basic, KeyBoy uses VBS scripts for installing files and performing execution. T1059.005,Command and Scripting Interpreter, Visual Basic, Kimsuky has used Visual Basic to download malicious payloads. T1059.005,Command and Scripting Interpreter, Visual Basic, Koadic performs most of its operations using Windows Script Host (VBScript) and runs arbitrary shellcode . T1059.005,Command and Scripting Interpreter, Visual Basic, Lazarus Group has used VBScript to gather information about a victim machine. T1059.005,Command and Scripting Interpreter, Visual Basic, Leviathan has used VBScript. T1059.005,Command and Scripting Interpreter, Visual Basic, LookBack has used VBA macros in Microsoft Word attachments to drop additional files to the host. T1059.005,Command and Scripting Interpreter, Visual Basic, Machete has embedded malicious macros within spearphishing attachments to download additional files. T1059.005,Command and Scripting Interpreter, Visual Basic, Magic Hound malware has used VBS scripts for execution. T1059.005,Command and Scripting Interpreter, Visual Basic, Melcoz can use VBS scripts to execute malicious DLLs. T1059.005,Command and Scripting Interpreter, Visual Basic, Metamorfo has used VBS code on victims systems. T1059.005,Command and Scripting Interpreter, Visual Basic, Molerats used various implants including those built with VBScript on target machines. T1059.005,Command and Scripting Interpreter, Visual Basic, MuddyWater has used VBScript files to execute its POWERSTATS payload as well as macros. T1059.005,Command and Scripting Interpreter, Visual Basic, Mustang Panda has embedded VBScript components in LNK files to download additional files and automate collection. T1059.005,Command and Scripting Interpreter, Visual Basic, NanHaiShu executes additional VBScript code on the victim's machine. T1059.005,Command and Scripting Interpreter, Visual Basic, NanoCore uses VBS files. T1059.005,Command and Scripting Interpreter, Visual Basic, NETWIRE has been executed through use of VBScripts. T1059.005,Command and Scripting Interpreter, Visual Basic, OopsIE creates and uses a VBScript as part of its persistent execution. T1059.005,Command and Scripting Interpreter, Visual Basic, Operation Wocao has used a VBScript to conduct reconnaissance on targeted systems. T1059.005,Command and Scripting Interpreter, Visual Basic, OSX_OCEANLOTUS.D uses Word macros for execution. T1059.005,Command and Scripting Interpreter, Visual Basic, Patchwork used Visual Basic Scripts (VBS) on victim machines. T1059.005,Command and Scripting Interpreter, Visual Basic, PoetRAT has used Word documents with VBScripts to execute malicious activities. T1059.005,Command and Scripting Interpreter, Visual Basic, PowerShower has the ability to save and execute VBScript. T1059.005,Command and Scripting Interpreter, Visual Basic, POWERSTATS can use VBScript (VBE) code for execution. T1059.005,Command and Scripting Interpreter, Visual Basic, QUADAGENT uses VBScripts. T1059.005,Command and Scripting Interpreter, Visual Basic, Ramsay has included embedded Visual Basic scripts in malicious documents. T1059.005,Command and Scripting Interpreter, Visual Basic, Rancor has used VBS scripts as well as embedded macros for execution. T1059.005,Command and Scripting Interpreter, Visual Basic, Remexi uses AutoIt and VBS scripts throughout its execution process. T1059.005,Command and Scripting Interpreter, Visual Basic, REvil has used obfuscated VBA macros for execution. T1059.005,Command and Scripting Interpreter, Visual Basic, Sandworm Team has created VBScripts to run an SSH server. T1059.005,Command and Scripting Interpreter, Visual Basic, Sharpshooter's first-stage downloader was a VBA macro. T1059.005,Command and Scripting Interpreter, Visual Basic, Sibot executes commands using VBScript. T1059.005,Command and Scripting Interpreter, Visual Basic, Sidewinder has used VBScript to drop and execute malware loaders. T1059.005,Command and Scripting Interpreter, Visual Basic, Silence has used VBS scripts. T1059.005,Command and Scripting Interpreter, Visual Basic, Smoke Loader adds a Visual Basic script in the Startup folder to deploy the payload. T1059.005,Command and Scripting Interpreter, Visual Basic, StoneDrill has several VBS scripts used throughout the malware's lifecycle. T1059.005,Command and Scripting Interpreter, Visual Basic, SUNBURST used VBScripts to initiate the execution of payloads. T1059.005,Command and Scripting Interpreter, Visual Basic, TA459 has a VBScript for execution. T1059.005,Command and Scripting Interpreter, Visual Basic, TA505 has used VBS for code execution. T1059.005,Command and Scripting Interpreter, Visual Basic, Turla has used VBS scripts throughout its operations. T1059.005,Command and Scripting Interpreter, Visual Basic, TYPEFRAME has used a malicious Word document for delivery with VBA macros for execution. T1059.005,Command and Scripting Interpreter, Visual Basic, Ursnif droppers have used VBA macros to download and execute the malware's full executable payload. T1059.005,Command and Scripting Interpreter, Visual Basic, VBShower has the ability to execute VBScript files. T1059.005,Command and Scripting Interpreter, Visual Basic, Windshift has used Visual Basic 6 (VB6) payloads. T1059.005,Command and Scripting Interpreter, Visual Basic, WIRTE has used VBS scripts throughout its operation. T1059.005,Command and Scripting Interpreter, Visual Basic, Xbash can execute malicious VBScript payloads on the victimmachine. T1059.005,Command and Scripting Interpreter, Visual Basic,archive contains malicious BornSlippy VBScript (VBS) files that attempt to write a DLL file to disk and execute it using rundll32.exe T1059.005,Command and Scripting Interpreter, Visual Basic, WMIEXEC is a lightweight backdoor written in VBScript that uses WMI to execute shell commands or create a reverse shell on a remote system T1059.005,Command and Scripting Interpreter, Visual Basic," RATDispenser malware decodes itself and launches a stand-alone VBScript, which then installs a remote access Trojan on the infected device " T1059.002,Command and Scripting Interpreter, Applescript,Bundlore can use AppleScript to inject malicious JavaScript into a browser. T1059.002,Command and Scripting Interpreter, Applescript, Dok uses AppleScript to create a login item for persistence. T1059.002,Command and Scripting Interpreter, Applescript, ThiefQuest uses AppleScript's osascript -e command to launch ThiefQuest's persistence via Launch Agent and Launch Daemon. T1059.002,Command and Scripting Interpreter, Applescript,Malware used AppleScript to run unauthorised commands into an open SSH connection T1059.002,Command and Scripting Interpreter, Applescript, AppleScript is used by APT-1 to open fake login prompt to trick user into entering password. T1059.002,Command and Scripting Interpreter, Applescript, Attackers run malicious AppleScript via Automator workflows to gather system information T1564.002,Hide Artifacts, Hidden Users,Adversaries may use hidden users to mask the presence of user accounts they create T1564.002,Hide Artifacts, Hidden Users, The software contains a hidden user account T1564.002,Hide Artifacts, Hidden Users, Adding a hidden user to the victim computer T1564.002,Hide Artifacts, Hidden Users, Attacker conceal user accounts to not let them appear on log screen T1564.002,Hide Artifacts, Hidden Users, Backdoor creates hidden user account to enable remote access without getting immidiately noticed by user T1564.002,Hide Artifacts, Hidden Users, T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control,AppleJeus has presented the user with a UAC prompt to elevate privileges while installing. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, APT29 has bypassed UAC. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, APT37 has a function in the initial dropper to bypass Windows UAC in order to execute the next payload with higher privileges. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, AutoIt backdoor attempts to escalate privileges by bypassing User Access Control. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, BitPaymer can suppress UAC prompts by setting the HKCU\Software\Classes\ms-settings\shell\open\command registry key on Windows 10 or HKCU\Software\Classes\mscfile\shell\open\command on Windows 7 and launching the eventvwr.msc process which launches BitPaymer with elevated privileges. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, BlackEnergy attempts to bypass default User Access Control (UAC) settings by exploiting a backward-compatibility setting found in Windows 7 and later. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, BRONZE BUTLER has used a Windows 10 specific tool and xxmm to bypass UAC for privilege escalation. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Cobalt Group has bypassed UAC. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Cobalt Strike can use a number of known techniques to bypass Windows UAC. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, CSPY Downloader can bypass UAC using the SilentCleanup task to execute the binary with elevated privileges. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Downdelph bypasses UAC to escalate privileges by using a customRedirectEXE shim database. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Empire includes various modules to attempt to bypass UAC for escalation of privileges. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Evilnum has used PowerShell to bypass UAC. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, FinFisher performs UAC bypass. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Grandoreiro can bypass UAC by registering as the default handler for .MSC files. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, H1N1 bypasses user access control by using a DLL hijacking vulnerability in the Windows Update Standalone Installer (wusa.exe). T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Honeybee uses a combination of NTWDBLIB.dll and cliconfg.exe to bypass UAC protections using DLL hijacking. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, InvisiMole can use fileless UAC bypass and create an elevated COM object to escalate privileges. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Koadic has 2 methods for elevating integrity. It can bypass UAC through eventvwr.exe and sdclt.exe. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, KONNI bypassed UAC with theAlwaysNotify settings. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, MuddyWater uses various techniques to bypass UAC. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Patchwork bypassed User Access Control (UAC). T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, PipeMon installer can use UAC bypass techniques to install the payload. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, An older variant of PLAINTEE performs UAC bypass. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, PoshC2 can utilize multiple methods to bypass UAC. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Pupy can bypass Windows UAC through either DLL hijacking eventvwr or appPaths. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Ramsay can use UACMe for privilege escalation. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Remcos has a command for UAC bypassing. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, RTM can attempt to run the program as admin then show a fake error message and a legitimate UAC bypass prompt to the user in an attempt to socially engineer the user into escalating privileges. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Sakula contains UAC bypass code for both 32- and 64-bit systems. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Shamoon attempts to disable UAC remote restrictions by modifying the Registry. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, ShimRat has hijacked the cryptbase.dll within migwiz.exe to escalate privileges. This prevented the User Access Control window from appearing. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, A Threat Group-3390 tool can use a public UAC bypass method to elevate privileges. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, UACMe contains many methods for bypassing Windows User Account Control on multiple versions of the operating system. T1548.002,Abuse Elevation Control Mechanism, Bypass User Account Control, Many ZeroT samples can perform UAC bypass by using eventvwr.exe to execute a malicious file. T1564.006,Hide Artifacts, Run Virtual Instance,LoudMiner has used QEMU and VirtualBox to run a Tiny Core Linux virtual machine which runs XMRig and makes connections to the C2 server for updates. T1564.006,Hide Artifacts, Run Virtual Instance, Maze operators have used VirtualBox and a Windows 7 virtual machine to run the ransomware; the virtual machine's configuration file mapped the shared network drives of the target company presumably so Maze can encrypt files on the shared drives as well as the local machine. T1564.006,Hide Artifacts, Run Virtual Instance, Ragnar Locker has used VirtualBox and a stripped Windows XP virtual machine to run itself. The use of a shared folder specified in the configuration enables Ragnar Locker to encrypt files on the host operating system including files on any mapped drives. T1564.006,Hide Artifacts, Run Virtual Instance,Malware connects to C2 server via VirtulBox machine to avoid detection by IPS T1564.006,Hide Artifacts, Run Virtual Instance, Data is exfilterated through a shared folder on QEMU linux machine to evade DLP solution T1497.002,Virtualization/Sandbox Evasion, User Activity Based Checks,Darkhotel has used malware that repeatedly checks the mouse cursor position to determine if a real user is on the system. T1497.002,Virtualization/Sandbox Evasion, User Activity Based Checks, FIN7 used images embedded into document lures that only activate the payload when a user double clicks to avoid sandboxes. T1497.002,Virtualization/Sandbox Evasion, User Activity Based Checks, Okrum loader only executes the payload after the left mouse button has been pressed at least three times in order to avoid being executed within virtualized or emulated environments. T1497.002,Virtualization/Sandbox Evasion, User Activity Based Checks, Spark has used a splash screen to check whether an user actively clicks on the screen before running malicious code. T1497.002,Virtualization/Sandbox Evasion, User Activity Based Checks,Wanacry looks for minimum system drive size to check if it is getting run inside sandbox T1497.002,Virtualization/Sandbox Evasion, User Activity Based Checks," If malware finds a very limited and old browser history, then it exits immidiately" T1497.002,Virtualization/Sandbox Evasion, User Activity Based Checks, Malware checks number of files in downloads folder to determine if it is a real user system T1564.005,Hide Artifacts, Hidden File System,BOOTRASH has used unallocated disk space between partitions for a hidden file system that stores components of the Nemesis bootkit. T1564.005,Hide Artifacts, Hidden File System, ComRAT has used a portable FAT16 partition image placed in %TEMP% as a hidden file system. T1564.005,Hide Artifacts, Hidden File System, Equation has used an encrypted virtual file system stored in the Windows Registry. T1564.005,Hide Artifacts, Hidden File System, Regin has used a hidden file system to store some of its components. T1564.005,Hide Artifacts, Hidden File System, Strider has used a hidden file system that is stored as a file on disk. T1574.012,Hijack Execution Flow, Cor_Profiler,Blue Mockingbird has used wmic.exe and Windows Registry modifications to set the COR_PROFILER environment variable to execute a malicious DLL whenever a process loads the .NET CLR. T1574.012,Hijack Execution Flow, Cor_Profiler,Actors exploring all things .NET including COR_PROFILER unmanaged code loading for defense evasion/UAC bypass and the Ghost Loader AppDomainManager injection technique T1574.012,Hijack Execution Flow, Cor_Profiler, The most novel technique was the use of a COR_PROFILER COM hijack to execute a malicious DLL and restore items removed by defenders T1574.012,Hijack Execution Flow, Cor_Profiler," To use COR_PROFILER, malware used wmic.exe and Windows Registry modifications to set environment variables and specify a DLL payload " T1574.012,Hijack Execution Flow, Cor_Profiler, COR_PROFILER environment variable is set to execute malicious DLL when .NET application is run T1137.001,Office Application Startup, Office Template Macros,BackConfig has the ability to use hidden columns in Excel spreadsheets to store executable files or commands for VBA macros. T1137.001,Office Application Startup, Office Template Macros, Cobalt Strike has the ability to use an Excel Workbook to execute additional code by enabling Office to trust macros and execute code without user permission. T1137.001,Office Application Startup, Office Template Macros, MuddyWater has used a Word Template Normal.dotm for persistence. T1137.001,Office Application Startup, Office Template Macros,Malware leveraged search order hijacking to load malicious Normal.dotm template T1137.001,Office Application Startup, Office Template Macros, Adversaries register a the template as trusted document to execute malicious macros without explicit user permissioin T1098.004,Account Manipulation, Ssh Authorized Keys,Bundlore creates a new key pair with ssh-keygen and drops the newly created user key in authorized_keys to enable remote login. T1098.004,Account Manipulation, Ssh Authorized Keys, Skidmap has the ability to add the public key of its handlers to the authorized_keys file to maintain persistence on an infected host. T1098.004,Account Manipulation, Ssh Authorized Keys,TeamTNTpublic key is appended to /root/.ssh/authorized_keys so that the threat actors can now login using the generated public-private key pair T1098.004,Account Manipulation, Ssh Authorized Keys, the server can manipulate subdirectories as well (for example overwrite .ssh/authorized_keys) T1098.004,Account Manipulation, Ssh Authorized Keys," By creating a privileged container that mounts the host filesystem and overwrites rootSSH authorized_keys, the attacker can then connect through SSH from the container to the host and execute anything they want " T1059.001,Command and Scripting Interpreter, Powershell,APT19 used PowerShell commands to execute payloads. T1059.001,Command and Scripting Interpreter, Powershell, APT28 downloads and executes PowerShell scripts and performs PowerShell commands. T1059.001,Command and Scripting Interpreter, Powershell, APT29 has used encoded PowerShell scripts uploaded to CozyCar installations to download and install SeaDuke. APT29 also used PowerShell to create new tasks on remote machines identify configuration settings evade defenses exfiltrate data and to execute other commands.. T1059.001,Command and Scripting Interpreter, Powershell, APT3 has used PowerShell on victim systems to download and run payloads after exploitation. T1059.001,Command and Scripting Interpreter, Powershell, APT32 has used PowerShell-based tools PowerShell one-liners and shellcode loaders for execution. T1059.001,Command and Scripting Interpreter, Powershell, APT33 has utilized PowerShell to download files from the C2 server and run various scripts. T1059.001,Command and Scripting Interpreter, Powershell, APT39 has used PowerShell to execute malicious code. T1059.001,Command and Scripting Interpreter, Powershell, APT41 leveraged PowerShell to deploy malware families in victims environments. T1059.001,Command and Scripting Interpreter, Powershell, AutoIt backdoor downloads a PowerShell script that decodes to a typical shellcode loader. T1059.001,Command and Scripting Interpreter, Powershell, Bazar can execute a PowerShell script received from C2. T1059.001,Command and Scripting Interpreter, Powershell, BloodHound can use PowerShell to pull Active Directory information from the target environment. T1059.001,Command and Scripting Interpreter, Powershell, Blue Mockingbird has used PowerShell reverse TCP shells to issue interactive commands over a network connection. T1059.001,Command and Scripting Interpreter, Powershell, BONDUPDATER is written in PowerShell. T1059.001,Command and Scripting Interpreter, Powershell, BRONZE BUTLER has used PowerShell for execution. T1059.001,Command and Scripting Interpreter, Powershell, Chimera has used PowerShell scripts to execute malicious payloads and the DSInternals PowerShell module to make use of Active Directory features. T1059.001,Command and Scripting Interpreter, Powershell, Cobalt Group has used powershell.exe to download and execute scripts. T1059.001,Command and Scripting Interpreter, Powershell, Cobalt Strike can execute a payload on a remote host with PowerShell. This technique does not write any data to disk. Cobalt Strike can also use PowerSploit and other scripting frameworks to perform execution. T1059.001,Command and Scripting Interpreter, Powershell, ComRAT has used PowerShell to load itself every time a user logs in to the system. ComRAT can execute PowerShell scripts loaded into memory or from the file system. T1059.001,Command and Scripting Interpreter, Powershell, ConnectWise can be used to execute PowerShell commands on target machines. T1059.001,Command and Scripting Interpreter, Powershell, CopyKittens has used PowerShell Empire. T1059.001,Command and Scripting Interpreter, Powershell, CrackMapExec can execute PowerShell commands via WMI. T1059.001,Command and Scripting Interpreter, Powershell, DarkHydrus leveraged PowerShell to download and execute additional scripts for execution. T1059.001,Command and Scripting Interpreter, Powershell, DarkVishnya used PowerShell to create shellcode loaders. T1059.001,Command and Scripting Interpreter, Powershell, Deep Panda has used PowerShell scripts to download and execute programs in memory without writing to disk. T1059.001,Command and Scripting Interpreter, Powershell, Denis has a version written in PowerShell. T1059.001,Command and Scripting Interpreter, Powershell, DownPaper uses PowerShell for execution. T1059.001,Command and Scripting Interpreter, Powershell, Dragonfly 2.0 used PowerShell scripts for execution. T1059.001,Command and Scripting Interpreter, Powershell, Egregor has used an encoded PowerShell command by a service created by Cobalt Strike for lateral movement. T1059.001,Command and Scripting Interpreter, Powershell, Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz. T1059.001,Command and Scripting Interpreter, Powershell, Empire leverages PowerShell for the majority of its client-side agent tasks. Empire also contains the ability to conduct PowerShell remoting with the Invoke-PSRemoting module. T1059.001,Command and Scripting Interpreter, Powershell, FatDuke has the ability to execute PowerShell scripts. T1059.001,Command and Scripting Interpreter, Powershell, FIN10 uses PowerShell for execution as well as PowerShell Empire to establish persistence. T1059.001,Command and Scripting Interpreter, Powershell, FIN6 has used PowerShell to gain access to merchant's networks and a Metasploit PowerShell module to download and execute shellcode and to set up a local listener. T1059.001,Command and Scripting Interpreter, Powershell, FIN7 used a PowerShell script to launch shellcode that retrieved an additional payload. T1059.001,Command and Scripting Interpreter, Powershell, FIN8's malicious spearphishing payloads are executed as PowerShell. FIN8 has also used PowerShell during Lateral Movement and Credential Access. T1059.001,Command and Scripting Interpreter, Powershell, Fox Kitten has used PowerShell scripts to access credential data. T1059.001,Command and Scripting Interpreter, Powershell, Frankenstein has used PowerShell to run a series of base64-encoded commands that acted as a stager and enumerated hosts. T1059.001,Command and Scripting Interpreter, Powershell, GALLIUM used PowerShell for execution to assist in lateral movement as well as for dumping credentials stored on compromised machines. T1059.001,Command and Scripting Interpreter, Powershell, Gallmaker used PowerShell to download additional payloads and for execution. T1059.001,Command and Scripting Interpreter, Powershell, GOLD SOUTHFIELD has staged and executed PowerShell scripts on compromised hosts. T1059.001,Command and Scripting Interpreter, Powershell, Gorgon Group malware can use PowerShell commands to download and execute a payload and open a decoy document on the victimmachine. T1059.001,Command and Scripting Interpreter, Powershell, GRIFFON has used PowerShell to execute the Meterpreter downloader TinyMet. T1059.001,Command and Scripting Interpreter, Powershell, HAFNIUM has used the Exchange Power Shell module Set-OabVirtualDirectoryPowerShell to export mailbox data. T1059.001,Command and Scripting Interpreter, Powershell, HALFBAKED can execute PowerShell scripts. T1059.001,Command and Scripting Interpreter, Powershell, HAMMERTOSS is known to use PowerShell. T1059.001,Command and Scripting Interpreter, Powershell, Hancitor has used PowerShell to execute commands. T1059.001,Command and Scripting Interpreter, Powershell, One version of Helminth uses a PowerShell script. T1059.001,Command and Scripting Interpreter, Powershell, Inception has used PowerShell to execute malicious commands and payloads. T1059.001,Command and Scripting Interpreter, Powershell, Indrik Spider has used PowerShell Empire for execution of malware. T1059.001,Command and Scripting Interpreter, Powershell, JCry has used PowerShell to execute payloads. T1059.001,Command and Scripting Interpreter, Powershell, KeyBoy uses PowerShell commands to download and execute payloads. T1059.001,Command and Scripting Interpreter, Powershell, KGH_SPY can execute PowerShell commands on the victim's machine. T1059.001,Command and Scripting Interpreter, Powershell, Kimsuky has executed a variety of PowerShell scripts. T1059.001,Command and Scripting Interpreter, Powershell, KONNI used PowerShell to download and execute a specific 64-bit version of the malware. T1059.001,Command and Scripting Interpreter, Powershell, Lazarus Group has used Powershell to download malicious payloads. T1059.001,Command and Scripting Interpreter, Powershell, Leviathan has used PowerShell for execution. T1059.001,Command and Scripting Interpreter, Powershell, Magic Hound has used PowerShell for execution and privilege escalation. T1059.001,Command and Scripting Interpreter, Powershell, menuPass uses PowerSploit to inject shellcode into PowerShell. T1059.001,Command and Scripting Interpreter, Powershell, MoleNet can use PowerShell to set persistence. T1059.001,Command and Scripting Interpreter, Powershell, Molerats used PowerShell implants on target machines. T1059.001,Command and Scripting Interpreter, Powershell, Mosquito can launch PowerShell Scripts. T1059.001,Command and Scripting Interpreter, Powershell, MuddyWater has used PowerShell for execution. T1059.001,Command and Scripting Interpreter, Powershell, Mustang Panda has used malicious PowerShell scripts to enable execution. T1059.001,Command and Scripting Interpreter, Powershell, Netwalker has been written in PowerShell and executed directly in memory avoiding detection. T1059.001,Command and Scripting Interpreter, Powershell, The NETWIRE binary has been executed via PowerShell script. T1059.001,Command and Scripting Interpreter, Powershell, njRAT has executed PowerShell commands via auto-run registry key persistence. T1059.001,Command and Scripting Interpreter, Powershell, OilRig has used PowerShell scripts for execution including use of a macro to run a PowerShell command to decode file contents. T1059.001,Command and Scripting Interpreter, Powershell, Operation Wocao has used PowerShell on compromised systems. T1059.001,Command and Scripting Interpreter, Powershell, OSX_OCEANLOTUS.D uses PowerShell scripts. T1059.001,Command and Scripting Interpreter, Powershell, Patchwork used PowerSploit to download payloads run a reverse shell and execute malware on the victim's machine. T1059.001,Command and Scripting Interpreter, Powershell, Pillowmint has used a PowerShell script to install a shim database. T1059.001,Command and Scripting Interpreter, Powershell, The Poseidon Group's Information Gathering Tool (IGT) includes PowerShell components. T1059.001,Command and Scripting Interpreter, Powershell, POSHSPY uses PowerShell to execute various commands one to execute its payload. T1059.001,Command and Scripting Interpreter, Powershell, PowerShower is a backdoor written in PowerShell. T1059.001,Command and Scripting Interpreter, Powershell, POWERSOURCE is a PowerShell backdoor. T1059.001,Command and Scripting Interpreter, Powershell, PowerSploit modules are written in and executed via PowerShell. T1059.001,Command and Scripting Interpreter, Powershell, PowerStallion uses PowerShell loops to iteratively check for available commands in its OneDrive C2 server. T1059.001,Command and Scripting Interpreter, Powershell, POWERSTATS uses PowerShell for obfuscation and execution. T1059.001,Command and Scripting Interpreter, Powershell, POWERTON is written in PowerShell. T1059.001,Command and Scripting Interpreter, Powershell, POWRUNER is written in PowerShell. T1059.001,Command and Scripting Interpreter, Powershell, PUNCHBUGGY has used PowerShell scripts. T1059.001,Command and Scripting Interpreter, Powershell, Pupy has a module for loading and executing PowerShell scripts. T1059.001,Command and Scripting Interpreter, Powershell, Pysa has used Powershell scripts to deploy its ransomware. T1059.001,Command and Scripting Interpreter, Powershell, QUADAGENT uses PowerShell scripts for execution. T1059.001,Command and Scripting Interpreter, Powershell, There is a variant of RATANKBA that uses a PowerShell script instead of the traditional PE form. T1059.001,Command and Scripting Interpreter, Powershell, RegDuke can extract and execute PowerShell scripts from C2 communications. T1059.001,Command and Scripting Interpreter, Powershell, Revenge RAT uses the PowerShell command Reflection.Assembly to load itself into memory to aid in execution. T1059.001,Command and Scripting Interpreter, Powershell, REvil has used PowerShell to delete volume shadow copies and download files. T1059.001,Command and Scripting Interpreter, Powershell, RogueRobin uses a command prompt to run a PowerShell script from Excel. To assist in establishing persistence RogueRobin creates %APPDATA%\OneDrive.bat and saves the following string to it:powershell.exe -WindowStyle Hidden -exec bypass -File%APPDATA%\OneDrive.ps1. T1059.001,Command and Scripting Interpreter, Powershell, Sandworm Team has used PowerShell scripts to run a credential harvesting tool in memory to evade defenses. T1059.001,Command and Scripting Interpreter, Powershell, SeaDuke uses a module to execute Mimikatz with PowerShell to perform Pass the Ticket. T1059.001,Command and Scripting Interpreter, Powershell, ServHelper has the ability to execute a PowerShell script to get information from the infected host. T1059.001,Command and Scripting Interpreter, Powershell, SharpStage can execute arbitrary commands with PowerShell. T1059.001,Command and Scripting Interpreter, Powershell, SHARPSTATS has the ability to employ a custom PowerShell script. T1059.001,Command and Scripting Interpreter, Powershell, Sidewinder has used PowerShell to drop and execute malware loaders. T1059.001,Command and Scripting Interpreter, Powershell, Silence has used PowerShell to download and execute payloads. T1059.001,Command and Scripting Interpreter, Powershell, Socksbot can write and execute PowerShell scripts. T1059.001,Command and Scripting Interpreter, Powershell, SQLRat has used PowerShell to create a Meterpreter session. T1059.001,Command and Scripting Interpreter, Powershell, Stealth Falcon malware uses PowerShell commands to perform various functions including gathering system information via WMI and executing commands from its C2 server. T1059.001,Command and Scripting Interpreter, Powershell, StrongPity can use PowerShell to add files to the Windows Defender exclusions list. T1059.001,Command and Scripting Interpreter, Powershell, TA459 has used PowerShell for execution of a payload. T1059.001,Command and Scripting Interpreter, Powershell, TA505 has used PowerShell to download and execute malware and reconnaissance scripts. T1059.001,Command and Scripting Interpreter, Powershell, TEMP.Veles has used a publicly-available PowerShell-based tool WMImplant. The group has also used PowerShell to perform Timestomping. T1059.001,Command and Scripting Interpreter, Powershell, Threat Group-3390 has used PowerShell for execution. T1059.001,Command and Scripting Interpreter, Powershell, Thrip leveraged PowerShell to run commands to download payloads traverse the compromised networks and carry out reconnaissance. T1059.001,Command and Scripting Interpreter, Powershell, Turla has used PowerShell to execute commands/scripts in some cases via a custom executable or code from Empire's PSInject. Turla has also used PowerShell scripts to load and execute malware in memory. T1059.001,Command and Scripting Interpreter, Powershell, UNC2452 used PowerShell to create new tasks on remote machines identify configuration settings exfiltrate data and to execute other commands. T1059.001,Command and Scripting Interpreter, Powershell, Ursnif droppers have used PowerShell in download cradles to download and execute the malware's full executable payload. T1059.001,Command and Scripting Interpreter, Powershell, Valak has used PowerShell to download additional modules. T1059.001,Command and Scripting Interpreter, Powershell, WellMess can execute PowerShell scripts received from C2. T1059.001,Command and Scripting Interpreter, Powershell, WIRTE has used PowerShell for script execution. T1059.001,Command and Scripting Interpreter, Powershell, Wizard Spider has used macros to execute PowerShell scripts to download malware on victim's machines. It has also used PowerShell to execute commands and move laterally through a victim network. T1059.001,Command and Scripting Interpreter, Powershell, Xbash can use scripts to invoke PowerShell to download a malicious PE executable or PE DLL for execution. T1059.006,Command and Scripting Interpreter, Python,APT29 has developed malware variants written in Python. T1059.006,Command and Scripting Interpreter, Python, APT39 has used a command line utility and a network scanner written in python. T1059.006,Command and Scripting Interpreter, Python, BRONZE BUTLER has made use of Python-based remote access tools. T1059.006,Command and Scripting Interpreter, Python, Bundlore has used Python scripts to execute payloads. T1059.006,Command and Scripting Interpreter, Python, Cobalt Strike can use Python to perform execution. T1059.006,Command and Scripting Interpreter, Python, CoinTicker executes a Python script to download its second stage. T1059.006,Command and Scripting Interpreter, Python, CookieMiner has used python scripts on the usersystem as well as the Python variant of the Empire agent EmPyre. T1059.006,Command and Scripting Interpreter, Python, Dragonfly 2.0 used various types of scripting to perform operations including Python scripts. The group was observed installing Python 2.7 on a victim. T1059.006,Command and Scripting Interpreter, Python, DropBook is a Python-based backdoor compiled with PyInstaller. T1059.006,Command and Scripting Interpreter, Python, Ebury has used Python to implement its DGA. T1059.006,Command and Scripting Interpreter, Python, IronNetInjector can use IronPython scripts to load payloads with the help of a .NET injector. T1059.006,Command and Scripting Interpreter, Python, KeyBoy uses Python scripts for installing files and performing execution. T1059.006,Command and Scripting Interpreter, Python, Keydnap uses Python for scripting to execute additional commands. T1059.006,Command and Scripting Interpreter, Python, Kimsuky has used a Mac OS Python implant to gather data. T1059.006,Command and Scripting Interpreter, Python, Machete used multiple compiled Python scripts on the victimsystem. Machete's main backdoor Machete is also written in Python. T1059.006,Command and Scripting Interpreter, Python, Machete is written in Python and is used in conjunction with additional Python scripts. T1059.006,Command and Scripting Interpreter, Python, MechaFlounder uses a python-based payload. T1059.006,Command and Scripting Interpreter, Python, MuddyWater has used developed tools in Python including Out1. T1059.006,Command and Scripting Interpreter, Python, Operation Wocao's backdoors have been written in Python and compiled with py2exe. T1059.006,Command and Scripting Interpreter, Python, PoetRAT was executed with a Python script and worked in conjunction with additional Python-based post-exploitation tools. T1059.006,Command and Scripting Interpreter, Python, PUNCHBUGGY has used python scripts. T1059.006,Command and Scripting Interpreter, Python, Pupy can use an add on feature when creating payloads that allows you to create custom Python scripts (scriptlets) to perform tasks offline (without requiring a session) such as sandbox detection adding persistence etc. T1059.006,Command and Scripting Interpreter, Python, Pysa has used Python scripts to deploy ransomware. T1059.006,Command and Scripting Interpreter, Python, Remcos uses Python scripts. T1059.006,Command and Scripting Interpreter, Python, Rocke has used Python-based malware to install and spread their coinminer. T1059.006,Command and Scripting Interpreter, Python, SpeakUp uses Python scripts. T1059.006,Command and Scripting Interpreter, Python, Turla has used IronPython scripts as part of the IronNetInjector toolchain to drop payloads. T1059.006,Command and Scripting Interpreter, Python, ZIRCONIUM has used Python-based implants to interact with compromised hosts. T1553.001,Subvert Trust Controls, Gatekeeper Bypass,CoinTicker downloads the EggShell mach-o binary using curl which does not set the quarantine flag. T1553.001,Subvert Trust Controls, Gatekeeper Bypass, OSX_OCEANLOTUS.D can delete the file quarantine attribute. T1553.001,Subvert Trust Controls, Gatekeeper Bypass,MacOS exploit allows execution of untrusted binaries using Gatekeeper Bypass T1553.001,Subvert Trust Controls, Gatekeeper Bypass, Command xattr when run as root can disable quarantine flag flag to enable execution of downloaded binary without user prompt. T1553.001,Subvert Trust Controls, Gatekeeper Bypass, Administrator should flag removal of com.apple.quarantine flag by user as suspicious activity T1218.008,Signed Binary Proxy Execution, Odbcconf,Cobalt Group has used odbcconf to proxy the execution of malicious DLL files. T1218.008,Signed Binary Proxy Execution, Odbcconf,Actors can use REGSVR flag from odbcconf.exe to execute malicious DLLs T1218.008,Signed Binary Proxy Execution, Odbcconf, A Microsoft Signed database utility odbcconf can be misused to run malicious payload bypassing application control solutions T1218.008,Signed Binary Proxy Execution, Odbcconf," Similar to Regsvr32, odbcconf.exe can also be used to proxy execution of malicious code " T1218.008,Signed Binary Proxy Execution, Odbcconf, APT-21 actors attempt to bypass application control policies via proxy execution through odbcconf T1218.010,Signed Binary Proxy Execution, Regsvr32,APT19 used Regsvr32 to bypass application control techniques. T1218.010,Signed Binary Proxy Execution, Regsvr32, APT32 created a Scheduled Task/Job that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory. The group has also used regsvr32 to run their backdoor. T1218.010,Signed Binary Proxy Execution, Regsvr32, Astaroth can be loaded through regsvr32.exe. T1218.010,Signed Binary Proxy Execution, Regsvr32, Blue Mockingbird has executed custom-compiled XMRIG miner DLLs using regsvr32.exe. T1218.010,Signed Binary Proxy Execution, Regsvr32, Cobalt Group has used regsvr32.exe to execute scripts. T1218.010,Signed Binary Proxy Execution, Regsvr32, Deep Panda has used regsvr32.exe to execute a server variant of Derusbi in victim networks. T1218.010,Signed Binary Proxy Execution, Regsvr32, Derusbi variants have been seen that use Registry persistence to proxy execution through regsvr32.exe. T1218.010,Signed Binary Proxy Execution, Regsvr32, Egregor has used regsvr32.exe to execute malicious DLLs. T1218.010,Signed Binary Proxy Execution, Regsvr32, EVILNUM can run a remote scriptlet that drops a file and executes it via regsvr32.exe. T1218.010,Signed Binary Proxy Execution, Regsvr32, Hi-Zor executes using regsvr32.exe called from the Registry Run Keys / Startup Folder persistence mechanism. T1218.010,Signed Binary Proxy Execution, Regsvr32, Inception has ensured persistence at system boot by setting the value regsvr32 %path%\ctfmonrn.dll /s. T1218.010,Signed Binary Proxy Execution, Regsvr32, Koadic can use Regsvr32 to execute additional payloads. T1218.010,Signed Binary Proxy Execution, Regsvr32, Leviathan has used regsvr32 for execution. T1218.010,Signed Binary Proxy Execution, Regsvr32, More_eggs has used regsvr32.exe to execute the malicious DLL. T1218.010,Signed Binary Proxy Execution, Regsvr32, Some Orz versions have an embedded DLL known as MockDll that uses Process Hollowing and regsvr32 to execute another payload. T1218.010,Signed Binary Proxy Execution, Regsvr32, Ragnar Locker has used regsvr32.exe to execute components of VirtualBox. T1218.010,Signed Binary Proxy Execution, Regsvr32, RogueRobin uses regsvr32.exe to run a .sct file for execution. T1218.010,Signed Binary Proxy Execution, Regsvr32, TA551 has used regsvr32.exe to load malicious DLLs. T1218.010,Signed Binary Proxy Execution, Regsvr32, Valak has used regsvr32.exe to launch malicious DLLs. T1218.010,Signed Binary Proxy Execution, Regsvr32, WIRTE has used Regsvr32.exe to trigger the execution of a malicious script. T1218.010,Signed Binary Proxy Execution, Regsvr32, Xbash can use regsvr32 for executing scripts. T1218.009,Signed Binary Proxy Execution, Regsvcs/Regasm,Agent Tesla has dropped RegAsm.exe onto systems for performing malicious activity. T1218.009,Signed Binary Proxy Execution, Regsvcs/Regasm,Malware then drops Regscvs.exe to perform malicious activity T1218.009,Signed Binary Proxy Execution, Regsvcs/Regasm, A windows command-line utility Regasm.exe to run malicious code before COM object registration T1218.009,Signed Binary Proxy Execution, Regsvcs/Regasm, Actors download Regscvs on the system to perform proxy execution of malicious code T1218.009,Signed Binary Proxy Execution, Regsvcs/Regasm, Microsoft signed binaries regscvs.exe and regasm.exe are used to execute malicious code onto infected system T1218.004,Signed Binary Proxy Execution, Installutil,menuPass has used InstallUtil.exe to execute malicious software. T1218.004,Signed Binary Proxy Execution, Installutil, Mustang Panda has used InstallUtil.exe to execute a malicious Beacon stager. T1218.004,Signed Binary Proxy Execution, Installutil,InstallUtil.exe is used to execute malicious installer components in .Net binaries T1218.004,Signed Binary Proxy Execution, Installutil, Actors use microsoft signed InstallUtil.exe for performing proxy execution of malicious .Net code T1218.004,Signed Binary Proxy Execution, Installutil, Malware performs proxy execution via InstallUtil to evade application control solutions T1218.003,Signed Binary Proxy Execution, Cmstp,Cobalt Group has used the command cmstp.exe /s /ns C:\Users\ADMINI~W\AppData\Local\Temp\XKNqbpzl.txt to bypass AppLocker and launch a malicious script. T1218.003,Signed Binary Proxy Execution, Cmstp, MuddyWater has used CMSTP.exe and a malicious INF to execute its POWERSTATS payload. T1218.003,Signed Binary Proxy Execution, Cmstp,obfuscated service profile file is written to %APPDATA%\Microsoft\%RANDOM%%RANDOM%.txt that is executed using cmstp.exe to download and execute a first-stage scriptlet T1218.003,Signed Binary Proxy Execution, Cmstp," That batch file writes a malicious INF file and supplies it as a parameter to the Microsoft utility cmstp.exe, which executes a remote scriptlet specified in the INF file. " T1218.003,Signed Binary Proxy Execution, Cmstp, The LNK file runs cmd.exe to create %APPDATA%\Microsoft\.txt. This txt file will be further run by the cmstp.exe utility T1218.001,Signed Binary Proxy Execution, Compiled Html File,APT41 used compiled HTML (.chm) files for targeting. T1218.001,Signed Binary Proxy Execution, Compiled Html File, Astaroth uses ActiveX objects for file execution and manipulation. T1218.001,Signed Binary Proxy Execution, Compiled Html File, Dark Caracal leveraged a compiled HTML file that contained a command to download and run an executable. T1218.001,Signed Binary Proxy Execution, Compiled Html File, Lazarus Group has used CHM files to move concealed payloads. T1218.001,Signed Binary Proxy Execution, Compiled Html File, OilRig has used a CHM payload to load and execute another malicious file once delivered to a victim. T1218.001,Signed Binary Proxy Execution, Compiled Html File, Silence has weaponized CHM files in their phishing campaigns. T1055.014,Process Injection, Vdso Hijacking,"By writing shellcode in vDSO and hijacking the invocation process of a normal function, an attacker that successfully exploits this vulnerability could obtain reverse shell on a host to escape the container. " T1055.014,Process Injection, Vdso Hijacking, Malware performs VDSO hijacking by redirecting calls to dynamically linked shared libraries to run malicious code T1055.014,Process Injection, Vdso Hijacking, adversary may hijack the syscall interface code stubs mapped into a process from the vdso shared object to execute syscalls to open and map a malicious shared object T1055.014,Process Injection, Vdso Hijacking, Execution via VDSO hijacking may also evade detection from security products since the execution is masked under a legitimate process T1055.014,Process Injection, Vdso Hijacking, Rootkits inject malicious code into processes via VDSO hijacking in order to evade process-based defenses as well as possibly elevate privileges T1055.009,Process Injection, Proc Memory,Attacker uses Proc memory injection to execute malicious code in the address space of a legitimate process T1055.009,Process Injection, Proc Memory, Malware overwrites the target processes stack using memory mappings provided by the /proc filesystem T1055.009,Process Injection, Proc Memory, Malware enumerates the memory of a process via the /proc filesystem (/proc/[pid]) then crafting ROP payload to run malicious instructions. T1055.009,Process Injection, Proc Memory, Attackers use /proc filesystem to overwrite memory of legitimate process to perform malicious activity T1055.009,Process Injection, Proc Memory, Malicious code is run without detection using /proc filesystem together with ROP payloads T1055.008,Process Injection, Ptrace System Calls,Malware inject malicious code into processes via ptrace system calls to elevate privilages and evade process-based defenses T1055.008,Process Injection, Ptrace System Calls," Using proces injection via ptrace, attackers get access to the process's memory, system/network resources, and possibly elevated privileges " T1055.008,Process Injection, Ptrace System Calls, Campaign uses Ptrace system call injection for executing malicious code in the address space of a trusted process. T1055.008,Process Injection, Ptrace System Calls, Malware then used ptrace to elevate privilage to modify hosts file. T1055.008,Process Injection, Ptrace System Calls, Infostealer used ptrace to dump authentication token from process memory. T1552.006,Unsecured Credentials, Group Policy Preferences,APT33 has used a variety of publicly available tools like Gpppassword to gather credentials. T1552.006,Unsecured Credentials, Group Policy Preferences, PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Group Policy Preferences. T1552.006,Unsecured Credentials, Group Policy Preferences,Attackers try to find unsecured credentials in Group Policy Preferences (GPP) using Metasploit module T1552.006,Unsecured Credentials, Group Policy Preferences, APT campaign uses Gpppassword tool to extract credentials from GPP T1552.006,Unsecured Credentials, Group Policy Preferences, Attackers use opensource tools to gather and decrypt the password file from Group Policy Preference XML files T1059.004,Command and Scripting Interpreter, Unix Shell,Anchor can execute payloads via shell scripting. T1059.004,Command and Scripting Interpreter, Unix Shell, AppleJeus has used shell scripts to execute commands after installation and set persistence mechanisms. T1059.004,Command and Scripting Interpreter, Unix Shell, APT41 executed file /bin/pwd in activity exploiting CVE-2019-19781 against Citrix devices. T1059.004,Command and Scripting Interpreter, Unix Shell, Bundlore has leveraged /bin/sh and /bin/bash to execute commands on the victim machine. T1059.004,Command and Scripting Interpreter, Unix Shell, CallMe has the capability to create a reverse shell on victims. T1059.004,Command and Scripting Interpreter, Unix Shell, Chaos provides a reverse shell connection on 8338/TCP encrypted via AES. T1059.004,Command and Scripting Interpreter, Unix Shell, CoinTicker executes a bash script to establish a reverse shell. T1059.004,Command and Scripting Interpreter, Unix Shell, CookieMiner has used a Unix shell script to run a series of commands targeting macOS. T1059.004,Command and Scripting Interpreter, Unix Shell, Derusbi is capable of creating a remote Bash shell and executing commands. T1059.004,Command and Scripting Interpreter, Unix Shell, Doki has executed shell scripts with /bin/sh. T1059.004,Command and Scripting Interpreter, Unix Shell, Drovorub can execute arbitrary commands as root on a compromised system. T1059.004,Command and Scripting Interpreter, Unix Shell, Exaramel for Linux has a command to execute a shell command on the system. T1059.004,Command and Scripting Interpreter, Unix Shell, Fysbis has the ability to create and execute commands in a remote shell for CLI. T1059.004,Command and Scripting Interpreter, Unix Shell, Hildegard has used shell scripts for execution. T1059.004,Command and Scripting Interpreter, Unix Shell, Kazuar uses /bin/bash to execute commands on the victimmachine. T1059.004,Command and Scripting Interpreter, Unix Shell, Kinsing has used Unix shell scripts to execute commands in the victim environment. T1059.004,Command and Scripting Interpreter, Unix Shell, LoudMiner used shell scripts to launch various services and to start/stop the QEMU virtualization. T1059.004,Command and Scripting Interpreter, Unix Shell, NETWIRE has the ability to use /bin/bash and /bin/sh to execute commands. T1059.004,Command and Scripting Interpreter, Unix Shell, OSX/Shlayer can use bash scripts to check the macOS version and download payloads. T1059.004,Command and Scripting Interpreter, Unix Shell, OSX_OCEANLOTUS.D can use shell script to execute malicious code. T1059.004,Command and Scripting Interpreter, Unix Shell, Penquin can execute remote commands using bash scripts. T1059.004,Command and Scripting Interpreter, Unix Shell, Proton uses macOS' .command file type to script actions. T1059.004,Command and Scripting Interpreter, Unix Shell, Rocke used shell scripts to run commands which would obtain persistence and execute the cryptocurrency mining malware. T1059.004,Command and Scripting Interpreter, Unix Shell, Skidmap has used pm.sh to download and install its main payload. T1059.004,Command and Scripting Interpreter, Unix Shell, WindTail can use the open command to execute an application. T1003.001,OS Credential Dumping, Lsass Memory,APT1 has been known to use credential dumping using Mimikatz. T1003.001,OS Credential Dumping, Lsass Memory, APT28 regularly deploys both publicly available (ex: Mimikatz) and custom password retrieval tools on victims. T1003.001,OS Credential Dumping, Lsass Memory," APT3 has used a tool to dump credentials by injecting itself into lsass.exe and triggering with the argument dig."" " T1003.001,OS Credential Dumping, Lsass Memory, APT32 used Mimikatz and customized versions of Windows Credential Dumper to harvest credentials. T1003.001,OS Credential Dumping, Lsass Memory, APT33 has used a variety of publicly available tools like LaZagne Mimikatz and ProcDump to dump credentials. T1003.001,OS Credential Dumping, Lsass Memory, APT39 has used Mimikatz Windows Credential Editor and ProcDump to dump credentials. T1003.001,OS Credential Dumping, Lsass Memory, APT41 used the Windows Credential Editor to dump password hashes from memory and authenticate to other user accounts. T1003.001,OS Credential Dumping, Lsass Memory, Blue Mockingbird has used Mimikatz to retrieve credentials from LSASS memory. T1003.001,OS Credential Dumping, Lsass Memory, BRONZE BUTLER has used various tools (such as Mimikatz and WCE) to perform credential dumping. T1003.001,OS Credential Dumping, Lsass Memory, Cleaver has been known to dump credentials using Mimikatz and Windows Credential Editor. T1003.001,OS Credential Dumping, Lsass Memory, CozyCar has executed Mimikatz to harvest stored credentials from the victim and further victim penetration. T1003.001,OS Credential Dumping, Lsass Memory, Daserf leverages Mimikatz and Windows Credential Editor to steal credentials. T1003.001,OS Credential Dumping, Lsass Memory, Emotet has been observed dropping password grabber modules including Mimikatz. T1003.001,OS Credential Dumping, Lsass Memory, Empire contains an implementation of Mimikatz to gather credentials from memory. T1003.001,OS Credential Dumping, Lsass Memory, FIN6 has used Windows Credential Editor for credential dumping. T1003.001,OS Credential Dumping, Lsass Memory, FIN8 harvests credentials using Invoke-Mimikatz or Windows Credentials Editor (WCE). T1003.001,OS Credential Dumping, Lsass Memory, Fox Kitten has used prodump to dump credentials from LSASS. T1003.001,OS Credential Dumping, Lsass Memory, GALLIUM used a modified version of Mimikatz along with a PowerShell-based Mimikatz to dump credentials on the victim machines. T1003.001,OS Credential Dumping, Lsass Memory, GreyEnergy has a module for Mimikatz to collect Windows credentials from the victimmachine. T1003.001,OS Credential Dumping, Lsass Memory, HAFNIUM has used procdump to dump the LSASS process memory. T1003.001,OS Credential Dumping, Lsass Memory, SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information. T1003.001,OS Credential Dumping, Lsass Memory, Ke3chang has dumped credentials including by using Mimikatz. T1003.001,OS Credential Dumping, Lsass Memory, Kimsuky has used ProcDump to dump credentials. T1003.001,OS Credential Dumping, Lsass Memory, LaZagne can perform credential dumping from memory to obtain account and password information. T1003.001,OS Credential Dumping, Lsass Memory, Lazarus Group leveraged Mimikatz to extract Windows Credentials of currently logged-in users and steals passwords stored in browsers. Lazarus Group has also used a custom version Mimikatz to capture credentials. T1003.001,OS Credential Dumping, Lsass Memory, Leafminer used several tools for retrieving login and password information including LaZagne and Mimikatz. T1003.001,OS Credential Dumping, Lsass Memory, Leviathan has used publicly available tools to dump password hashes including ProcDump and WCE. T1003.001,OS Credential Dumping, Lsass Memory, Lslsass can dump active logon session password hashes from the lsass process. T1003.001,OS Credential Dumping, Lsass Memory, Magic Hound stole domain credentials from Microsoft Active Directory Domain Controller and leveraged Mimikatz. T1003.001,OS Credential Dumping, Lsass Memory, Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from the LSASS Memory. T1003.001,OS Credential Dumping, Lsass Memory, MuddyWater has performed credential dumping with Mimikatz and procdump64.exe. T1003.001,OS Credential Dumping, Lsass Memory, Net Crawler uses credential dumpers such as Mimikatz and Windows Credential Editor to extract cached credentials from Windows systems. T1003.001,OS Credential Dumping, Lsass Memory, NotPetya contains a modified version of Mimikatz to help gather credentials that are later used for lateral movement. T1003.001,OS Credential Dumping, Lsass Memory, OilRig has used credential dumping tools such as Mimikatz to steal credentials to accounts logged into the compromised system and to Outlook Web Access. T1003.001,OS Credential Dumping, Lsass Memory, Okrum was seen using MimikatzLite to perform credential dumping. T1003.001,OS Credential Dumping, Lsass Memory, Olympic Destroyer contains a module that tries to obtain credentials from LSASS similar to Mimikatz. These credentials are used with PsExec and Windows Management Instrumentation to help the malware propagate itself across a network. T1003.001,OS Credential Dumping, Lsass Memory, Operation Wocao has used ProcDump to dump credentials from memory. T1003.001,OS Credential Dumping, Lsass Memory, PLATINUM has used keyloggers that are also capable of dumping credentials. T1003.001,OS Credential Dumping, Lsass Memory, PoetRAT used voStro.exe a compiled pypykatz (Python version of Mimikatz) to steal credentials. T1003.001,OS Credential Dumping, Lsass Memory, PoshC2 contains an implementation of Mimikatz to gather credentials from memory. T1003.001,OS Credential Dumping, Lsass Memory, PowerSploit contains a collection of Exfiltration modules that can harvest credentials using Mimikatz. T1003.001,OS Credential Dumping, Lsass Memory, Pupy can execute Lazagne as well as Mimikatz using PowerShell. T1003.001,OS Credential Dumping, Lsass Memory, Pysa can perform OS credential dumping using Mimikatz. T1003.001,OS Credential Dumping, Lsass Memory, Sandworm Team's plainpwd tool is a modified version of Mimikatz and dumps Windows credentials from system memory. T1003.001,OS Credential Dumping, Lsass Memory, Silence has used the Farse6.1 utility (based on Mimikatz) to extract credentials from lsass.exe. T1003.001,OS Credential Dumping, Lsass Memory, Stolen Pencil gathers credentials using Mimikatz and Procdump. T1003.001,OS Credential Dumping, Lsass Memory, TEMP.Veles has used Mimikatz and a custom tool SecHack to harvest credentials. T1003.001,OS Credential Dumping, Lsass Memory, Threat Group-3390 actors have used a modified version of Mimikatz called Wrapikatz to dump credentials. They have also dumped credentials from domain controllers. T1003.001,OS Credential Dumping, Lsass Memory, Whitefly has used Mimikatz to obtain credentials. T1003.001,OS Credential Dumping, Lsass Memory," Windows Credential Editor can dump credentials.""" T1216.001,Signed Script Proxy Execution, Pubprn,APT32 has used PubPrn.vbs within execution scripts to execute malware possibly bypassing defenses. T1216.001,Signed Script Proxy Execution, Pubprn,PubPrn.vbs can be used to proxy execution from a remote site T1216.001,Signed Script Proxy Execution, Pubprn, attacker uses a signed Microsoft WSH script (PubPrn.vbs) to run malicious code and bypass application whitelisting restrictions T1216.001,Signed Script Proxy Execution, Pubprn, Adversaries use the trusted PubPrn script to proxy execution of malicious files T1216.001,Signed Script Proxy Execution, Pubprn," To bypass application control restrictions, malware uses PubPrn script to execute malicious files from remote site " T1569.001,System Services, Launchctl,AppleJeus has loaded a plist file using the launchctl command. T1569.001,System Services, Launchctl, Calisto uses launchctl to enable screen sharing on the victimmachine. T1569.001,System Services, Launchctl, LoudMiner launched the QEMU services in the /Library/LaunchDaemons/ folder using launchctl. T1569.001,System Services, Launchctl,Adversaries abuse launchctl to execute malicious commands on victim system T1569.001,System Services, Launchctl, Using launchctl adversaries can install persistence or execute changes they made T1074.001,Data Staged, Local Data Staging,ADVSTORESHELL stores output from command execution in a .dat file in the %TEMP% directory. T1074.001,Data Staged, Local Data Staging, APT28 has stored captured credential information in a file named pi.log. T1074.001,Data Staged, Local Data Staging, APT3 has been known to stage files for exfiltration in a single location. T1074.001,Data Staged, Local Data Staging, APT39 has utilized tools to aggregate data prior to exfiltration. T1074.001,Data Staged, Local Data Staging, Astaroth collects data in a plaintext file named r1.log before exfiltration. T1074.001,Data Staged, Local Data Staging, Attor has staged collected data in a central upload directory prior to exfiltration. T1074.001,Data Staged, Local Data Staging, BADNEWS copies documents under 15MB found on the victim system to is the user's %temp%\SMB\ folder. It also copies files from USB devices to a predefined directory. T1074.001,Data Staged, Local Data Staging, BadPatch stores collected data in log files before exfiltration. T1074.001,Data Staged, Local Data Staging, Calisto uses a hidden directory named .calisto to store data from the victimmachine before exfiltration. T1074.001,Data Staged, Local Data Staging, Carbon creates a base directory that contains the files and folders that are collected. T1074.001,Data Staged, Local Data Staging, Catchamas stores the gathered data from the machine in .db files and .bmp files under four separate locations. T1074.001,Data Staged, Local Data Staging, Chimera has staged stolen data locally on compromised hosts. T1074.001,Data Staged, Local Data Staging, Crutch has staged stolen files in the C:\AMD\Temp directory. T1074.001,Data Staged, Local Data Staging," Dragonfly 2.0 created a directory named out"" in the user's %AppData% folder and copied files to it. " T1074.001,Data Staged, Local Data Staging, Dtrack can save collected data to disk different file formats and network shares. T1074.001,Data Staged, Local Data Staging, Modules can be pushed to and executed by Duqu that copy data to a staging area compress it and XOR encrypt it. T1074.001,Data Staged, Local Data Staging, DustySky created folders in temp directories to host collected files before exfiltration. T1074.001,Data Staged, Local Data Staging, Dyre has the ability to create files in a TEMP folder to act as a database to store information. T1074.001,Data Staged, Local Data Staging, ECCENTRICBANDWAGON has stored keystrokes and screenshots within the %temp%\GoogleChrome %temp%\Downloads and %temp%\TrendMicroUpdate directories. T1074.001,Data Staged, Local Data Staging, Elise creates a file in AppData\Local\Microsoft\Windows\Explorer and stores all harvested data in that file. T1074.001,Data Staged, Local Data Staging, Exaramel for Windows specifies a path to store files scheduled for exfiltration. T1074.001,Data Staged, Local Data Staging, FIN5 scripts save memory dump data into a specific directory on hosts in the victim environment. T1074.001,Data Staged, Local Data Staging," FLASHFLOOD stages data it copies from the local system or removable drives in the ""%WINDIR%\$NtUninstallKB885884$\"" directory. " T1074.001,Data Staged, Local Data Staging, FrameworkPOS can identifiy payment card track data on the victim and copy it to a local file in a subdirectory of C:\Windows. T1074.001,Data Staged, Local Data Staging, GALLIUM compressed and staged files in multi-part archives in the Recycle Bin prior to exfiltration. T1074.001,Data Staged, Local Data Staging, Gold Dragon stores information gathered from the endpoint in a file named 1.hwp. T1074.001,Data Staged, Local Data Staging, Helminth creates folders to store output from batch scripts prior to sending the information to its C2 server. T1074.001,Data Staged, Local Data Staging, Honeybee adds collected files to a temp.zip file saved in the %temp% folder then base64 encodes it and uploads it to control server. T1074.001,Data Staged, Local Data Staging, InvisiMole determines a working directory where it stores all the gathered data about the compromised machine. T1074.001,Data Staged, Local Data Staging, Kazuar stages command output and collected data in files before exfiltration. T1074.001,Data Staged, Local Data Staging," KGH_SPY can save collected system information to a file named ""info"" before exfiltration. " T1074.001,Data Staged, Local Data Staging, Kimsuky has staged collected data files under C:\Program Files\Common Files\System\Ole DB\. T1074.001,Data Staged, Local Data Staging, Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is saved in the %TEMP% directory then compressed encrypted and uploaded to a C2 server. T1074.001,Data Staged, Local Data Staging, Leviathan has used C:\Windows\Debug and C:\Perflogs as staging directories. T1074.001,Data Staged, Local Data Staging, LightNeuron can store email data in files and directories specified in its configuration such as C:\Windows\ServiceProfiles\NetworkService\appdata\Local\Temp\. T1074.001,Data Staged, Local Data Staging, Machete stores files and logs in a folder on the local drive. T1074.001,Data Staged, Local Data Staging, menuPass stages data prior to exfiltration in multi-part archives often saved in the Recycle Bin. T1074.001,Data Staged, Local Data Staging, MESSAGETAP stored targeted SMS messages that matched its target list in CSV files on the compromised system. T1074.001,Data Staged, Local Data Staging, MoonWind saves information from its keylogging routine as a .zip file in the present working directory. T1074.001,Data Staged, Local Data Staging, Mustang Panda has stored collected credential files in c:\windows\temp prior to exfiltration. Mustang Panda has also stored documents for exfiltration in a hidden folder on USB drives. T1074.001,Data Staged, Local Data Staging, NavRAT writes multiple outputs to a TMP file using the >> method. T1074.001,Data Staged, Local Data Staging, NETWIRE has the ability to write collected data to a file created in the ./LOGS directory. T1074.001,Data Staged, Local Data Staging, NOKKI can collect data from the victim and stage it in LOCALAPPDATA%\MicroSoft Updatea\uplog.tmp. T1074.001,Data Staged, Local Data Staging, OopsIE stages the output from command execution and collected files in specific folders before exfiltration. T1074.001,Data Staged, Local Data Staging, Operation Wocao has staged archived files in a temporary directory prior to exfiltration. T1074.001,Data Staged, Local Data Staging, Patchwork copied all targeted files to a directory called index that was eventually uploaded to the C&C server. T1074.001,Data Staged, Local Data Staging, PoisonIvy stages collected data in a text file. T1074.001,Data Staged, Local Data Staging, Prikormka creates a directory %USERPROFILE%\AppData\Local\SKC\ which is used to store collected log files. T1074.001,Data Staged, Local Data Staging, Pteranodon creates various subdirectories under %Temp%\reports\% and copies files to those subdirectories. It also creates a folder at C:\Users\\AppData\Roaming\Microsoft\store to store screenshot JPEG files. T1074.001,Data Staged, Local Data Staging, PUNCHBUGGY has saved information to a random temp file before exfil. T1074.001,Data Staged, Local Data Staging, PUNCHTRACK aggregates collected data in a tmp file. T1074.001,Data Staged, Local Data Staging, Ramsay can stage data prior to exfiltration in %APPDATA%\Microsoft\UserSetting and %APPDATA%\Microsoft\UserSetting\MediaCache. T1074.001,Data Staged, Local Data Staging," Data captured by RawPOS is placed in a temporary file under a directory named ""memdump"". " T1074.001,Data Staged, Local Data Staging, Rover copies files from removable drives to C:\system. T1074.001,Data Staged, Local Data Staging, Sidewinder has collected stolen files in a temporary folder in preparation for exfiltration. T1074.001,Data Staged, Local Data Staging, SPACESHIP identifies files with certain extensions and copies them to a directory in the user's profile. T1074.001,Data Staged, Local Data Staging, TEMP.Veles has created staging folders in directories that were infrequently used by legitimate users or processes. T1074.001,Data Staged, Local Data Staging, Threat Group-3390 has locally staged encrypted archives for later exfiltration efforts. T1074.001,Data Staged, Local Data Staging, Trojan.Karagany can create directories to store plugin output and stage data for exfiltration. T1074.001,Data Staged, Local Data Staging, Ursnif has used tmp files to stage gathered information. T1074.001,Data Staged, Local Data Staging, USBStealer collects files matching certain criteria from the victim and stores them in a local directory for later exfiltration. T1074.001,Data Staged, Local Data Staging," Zebrocy stores all collected information in a single file before exfiltration.""" T1542.001,Pre,,Hacking Team UEFI Rootkit is a UEFI BIOS rootkit developed by the company Hacking Team to persist remote access software on some targeted systems. T1542.001,Pre,, LoJax is a UEFI BIOS rootkit deployed to persist remote access software on some targeted systems. T1542.001,Pre,, Trojan.Mebromi performs BIOS modification and can download and execute a file as well as protect itself from removal. T1542.001,Pre,,Sophisticated adversaries overwrite firmware to install malicious firmware updates as a means of persistence on a system that may be difficult to detect T1542.001,Pre,, Rootkit malwares presist and evade detection by installing malicioufirmware updates on infected system T1546.008,Event Triggered Execution, Accessibility Features,APT29 used sticky-keys to obtain unauthenticated privileged console access. T1546.008,Event Triggered Execution, Accessibility Features, APT3 replaces the Sticky Keys binary C:\Windows\System32\sethc.exe for persistence. T1546.008,Event Triggered Execution, Accessibility Features, APT41 leveraged sticky keys to establish persistence. T1546.008,Event Triggered Execution, Accessibility Features, Axiom actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence. T1546.008,Event Triggered Execution, Accessibility Features, Deep Panda has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions. T1546.008,Event Triggered Execution, Accessibility Features, Empire can leverage WMI debugging to remotely replace binaries like sethc.exe Utilman.exe and Magnify.exe with cmd.exe. T1546.008,Event Triggered Execution, Accessibility Features, Fox Kitten has used sticky keys to launch a command prompt. T1098.002,Account Manipulation, Exchange Email Delegate Permissions,APT29 added their own devices as allowed IDs for active sync using Set-CASMailbox allowing it to obtain copies of victim mailboxes. It also added additional permissions (such as Mail.Read and Mail.ReadWrite) to compromised Application or Service Principals. T1098.002,Account Manipulation, Exchange Email Delegate Permissions, Magic Hound granted compromised email accounts read access to the email boxes of additional targeted accounts. The group then was able to authenticate to the intended victim's OWA (Outlook Web Access) portal and read hundreds of email communications for information on Middle East organizations. T1098.002,Account Manipulation, Exchange Email Delegate Permissions, UNC2452 added their own devices as allowed IDs for active sync using Set-CASMailbox allowing it to obtain copies of victim mailboxes. It also added additional permissions (such as Mail.Read and Mail.ReadWrite) to compromised Application or Service Principals. T1098.002,Account Manipulation, Exchange Email Delegate Permissions,Attacker added their own devices as allowed IDs for active sync for a number of mailboxes using Set-CASMailbox T1098.002,Account Manipulation, Exchange Email Delegate Permissions,Set-CASMailbox is used by adversary to assign more access rights to the accounts they wish to compromise and use these accounts T1547.004,Boot or Logon Autostart Execution, Winlogon Helper Dll,Bazar can use Winlogon Helper DLL to establish persistence. T1547.004,Boot or Logon Autostart Execution, Winlogon Helper Dll, Cannon adds the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon to establish persistence. T1547.004,Boot or Logon Autostart Execution, Winlogon Helper Dll, A Dipsind variant registers as a Winlogon Event Notify DLL to establish persistence. T1547.004,Boot or Logon Autostart Execution, Winlogon Helper Dll, Gazer can establish persistence by setting the valueShell withexplorer.exe %malware_pathfile% under the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon. T1547.004,Boot or Logon Autostart Execution, Winlogon Helper Dll, KeyBoy issues the command reg addHKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon to achieve persistence. T1547.004,Boot or Logon Autostart Execution, Winlogon Helper Dll, Remexi achieves persistence using Userinit by adding the Registry key HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit. T1547.004,Boot or Logon Autostart Execution, Winlogon Helper Dll, Tropic Trooper has created the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell and sets the value to establish persistence. T1547.004,Boot or Logon Autostart Execution, Winlogon Helper Dll, Turla established persistence by adding a Shell value under the Registry key HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon. T1547.004,Boot or Logon Autostart Execution, Winlogon Helper Dll, Wizard Spider has established persistence using Userinit by adding the Registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon. T1557.001,Man,,Empire can use Inveigh to conduct name service poisoning for credential theft and associated relay attacks. T1557.001,Man,, Impacket modules like ntlmrelayx and smbrelayx can be used in conjunction with Network Sniffing and LLMNR/NBT-NS Poisoning and SMB Relay to gather NetNTLM credentials for Brute Force or relay attacks that can gain code execution. T1557.001,Man,, PoshC2 can use Inveigh to conduct name service poisoning for credential theft and associated relay attacks. T1557.001,Man,, Pupy can sniff plaintext network credentials and use NBNS Spoofing to poison name services. T1557.001,Man,, Responder is used to poison name services to gather hashes and credentials from systems within a local network. T1557.001,Man,, Wizard Spider has used the Invoke-Inveigh PowerShell cmdlets likely for name service poisoning. T1222.002,File and Directory Permissions Modification, Linux And Mac File And Directory Permissions Modification,APT32's macOS backdoor changes the permission of the file it wants to execute to 755. T1222.002,File and Directory Permissions Modification, Linux And Mac File And Directory Permissions Modification, Kinsing has used chmod to modify permissions on key files for use. T1222.002,File and Directory Permissions Modification, Linux And Mac File And Directory Permissions Modification, OSX/Shlayer can use the chmod utility to set a .app file as executable and the spctl application to disable Gatekeeper protection for a downloaded file.. T1222.002,File and Directory Permissions Modification, Linux And Mac File And Directory Permissions Modification, P.A.S. Webshell has the ability to modify file permissions. T1222.002,File and Directory Permissions Modification, Linux And Mac File And Directory Permissions Modification, Penquin can add the executable flag to a downloaded file. T1222.002,File and Directory Permissions Modification, Linux And Mac File And Directory Permissions Modification, Rocke has changed file permissions of files so they could not be modified. T1491.001,Defacement, Internal Defacement,Lazarus Group replaced the background wallpaper of systems with a threatening image after rendering the system unbootable with a Disk Structure Wipe T1491.001,Defacement, Internal Defacement,Ransomware defaced internal website to show threatening message about exposing sensitive data T1491.001,Defacement, Internal Defacement, Adversary may deface systems internal to an organization in an attempt to intimidate or mislead users T1491.001,Defacement, Internal Defacement, Actor group replaced system wallpaper with company trade secret information to intimidate company paying the ransom T1491.001,Defacement, Internal Defacement, Ransomware replaces background wallpaper with ransom message after encrypting the data T1564.003,Hide Artifacts, Hidden Window,Agent Tesla has used ProcessWindowStyle.Hidden to hide windows. T1564.003,Hide Artifacts, Hidden Window, APT19 used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden. T1564.003,Hide Artifacts, Hidden Window, APT28 has used the WindowStyle parameter to conceal PowerShell windows. T1564.003,Hide Artifacts, Hidden Window, APT3 has been known to use -WindowStyle Hidden to conceal PowerShell windows. T1564.003,Hide Artifacts, Hidden Window, APT32 has used the WindowStyle parameter to conceal PowerShell windows. T1564.003,Hide Artifacts, Hidden Window, Astaroth loads its module with the XSL script parameter vShow set to zero which opens the application with a hidden window. T1564.003,Hide Artifacts, Hidden Window, BONDUPDATER uses -windowstyle hidden to conceal a PowerShell window that downloads a payload. T1564.003,Hide Artifacts, Hidden Window, CopyKittens has used -w hidden and -windowstyle hidden to conceal PowerShell windows. T1564.003,Hide Artifacts, Hidden Window, DarkHydrus has used -WindowStyle Hidden to conceal PowerShell windows. T1564.003,Hide Artifacts, Hidden Window, Deep Panda has used -w hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden. T1564.003,Hide Artifacts, Hidden Window, Gorgon Group has used -W Hidden to conceal PowerShell windows by setting the WindowStyle parameter to hidden. T1564.003,Hide Artifacts, Hidden Window, HAMMERTOSS has used -WindowStyle hidden to conceal PowerShell windows. T1564.003,Hide Artifacts, Hidden Window, Higaisa used a payload that creates a hidden window. T1564.003,Hide Artifacts, Hidden Window, HotCroissant has the ability to hide the window for operations performed on a given file. T1564.003,Hide Artifacts, Hidden Window, InvisiMole has executed legitimate tools in hidden windows. T1564.003,Hide Artifacts, Hidden Window, KeyBoy uses -w Hidden to conceal a PowerShell window that downloads a payload. T1564.003,Hide Artifacts, Hidden Window, Kivars has the ability to conceal its activity through hiding active windows. T1564.003,Hide Artifacts, Hidden Window, Magic Hound malware has a function to determine whether the C2 server wishes to execute the newly dropped file in a hidden window. T1564.003,Hide Artifacts, Hidden Window, MCMD can modify processes to prevent them from being visible on the desktop. T1564.003,Hide Artifacts, Hidden Window, Metamorfo has hidden its GUI using the ShowWindow() WINAPI call. T1564.003,Hide Artifacts, Hidden Window, PowerShower has added a registry key so future powershell.exe instances are spawned with coordinates for a window position off-screen by default. T1564.003,Hide Artifacts, Hidden Window, StrongPity has the ability to hide the console window for its document search module from the user. T1564.003,Hide Artifacts, Hidden Window, Ursnif droppers have used COM properties to execute malware in hidden windows. T1564.003,Hide Artifacts, Hidden Window, WindTail can instruct the OS to execute an application without a dock icon or menu. T1564.004,Hide Artifacts, Ntfs File Attributes,Anchor has used NTFS to hide files. T1564.004,Hide Artifacts, Ntfs File Attributes, APT32 used NTFS alternate data streams to hide their payloads. T1564.004,Hide Artifacts, Ntfs File Attributes, Astaroth can abuse alternate data streams (ADS) to store content for malicious payloads. T1564.004,Hide Artifacts, Ntfs File Attributes, BitPaymer has copied itself to the :bin alternate data stream of a newly created file. T1564.004,Hide Artifacts, Ntfs File Attributes, esentutl can be used to read and write alternate data streams. T1564.004,Hide Artifacts, Ntfs File Attributes, Expand can be used to download or copy a file into an alternate data stream. T1564.004,Hide Artifacts, Ntfs File Attributes, Gazer stores configuration items in alternate data streams (ADSs) if the Registry is not accessible. T1564.004,Hide Artifacts, Ntfs File Attributes, LoJax has loaded an embedded NTFS DXE driver to be able to access and write to NTFS partitions. T1564.004,Hide Artifacts, Ntfs File Attributes, PowerDuke hides many of its backdoor payloads in an alternate data stream (ADS). T1564.004,Hide Artifacts, Ntfs File Attributes, If the victim is using PowerShell 3.0 or later POWERSOURCE writes its decoded payload to an alternate data stream (ADS) named kernel32.dll that is saved in %PROGRAMDATA%\Windows\. T1564.004,Hide Artifacts, Ntfs File Attributes, The Regin malware platform uses Extended Attributes to store encrypted executables. T1564.004,Hide Artifacts, Ntfs File Attributes, Valak has the ability save and execute files as alternate data streams (ADS). T1564.004,Hide Artifacts, Ntfs File Attributes, Some variants of the Zeroaccess Trojan have been known to store data in Extended Attributes. T1564.001,Hide Artifacts, Hidden Files And Directories,Agent Tesla has created hidden folders. T1564.001,Hide Artifacts, Hidden Files And Directories, AppleJeus has added a leading . to plist filenames unlisting them from the Finder app and default Terminal directory listings. T1564.001,Hide Artifacts, Hidden Files And Directories, APT28 has saved files with hidden file attributes. T1564.001,Hide Artifacts, Hidden Files And Directories, APT32's macOS backdoor hides the clientID file via a chflags function. T1564.001,Hide Artifacts, Hidden Files And Directories, Attor can set attributes of log files and directories to HIDDEN SYSTEM ARCHIVE or a combination of those. T1564.001,Hide Artifacts, Hidden Files And Directories, BackConfig has the ability to set folders or files to be hidden from the Windows Explorer default view. T1564.001,Hide Artifacts, Hidden Files And Directories, Calisto uses a hidden directory named .calisto to store data from the victimmachine before exfiltration. T1564.001,Hide Artifacts, Hidden Files And Directories, Carberp has created a hidden file in the Startup folder of the current user. T1564.001,Hide Artifacts, Hidden Files And Directories, CoinTicker downloads the following hidden files to evade detection and maintain persistence: /private/tmp/.info.enc /private/tmp/.info.py /private/tmp/.server.sh ~/Library/LaunchAgents/.espl.plist ~/Library/Containers/.[random string]/[random string]. T1564.001,Hide Artifacts, Hidden Files And Directories, Dacls has had its payload named with a dot prefix to make it hidden from view in the Finder application. T1564.001,Hide Artifacts, Hidden Files And Directories, Explosive has commonly set file and path attributes to hidden. T1564.001,Hide Artifacts, Hidden Files And Directories," FruitFly saves itself with a leading ."" to make it a hidden file. " T1564.001,Hide Artifacts, Hidden Files And Directories," iKitten saves itself with a leading ""."" so that it's hidden from users by default. " T1564.001,Hide Artifacts, Hidden Files And Directories, Imminent Monitor has a dynamic debugging feature to set the file attribute to hidden. T1564.001,Hide Artifacts, Hidden Files And Directories, InvisiMole can create hidden system directories. T1564.001,Hide Artifacts, Hidden Files And Directories, Ixeshe sets its own executable file's attributes to hidden. T1564.001,Hide Artifacts, Hidden Files And Directories, The Komplex payload is stored in a hidden directory at /Users/Shared/.local/kextd. T1564.001,Hide Artifacts, Hidden Files And Directories, Lazarus Group has used a VBA Macro to set its file attributes to System and Hidden and has named files with a dot prefix to hide them from the Finder application. T1564.001,Hide Artifacts, Hidden Files And Directories, Lokibot has the ability to copy itself to a hidden file and directory. T1564.001,Hide Artifacts, Hidden Files And Directories," LoudMiner has set the attributes of the VirtualBox directory and VBoxVmService parent directory to ""hidden"". " T1564.001,Hide Artifacts, Hidden Files And Directories, Machete has the capability to exfiltrate stolen data to a hidden folder on a removable drive. T1564.001,Hide Artifacts, Hidden Files And Directories, MacSpy stores itself in ~/Library/.DS_Stores/ T1564.001,Hide Artifacts, Hidden Files And Directories, Micropsia creates a new hidden directory to store all components' outputs in a dedicated sub-folder for each. T1564.001,Hide Artifacts, Hidden Files And Directories, Mustang Panda's PlugX variant has created a hidden folder on USB drives named RECYCLE.BIN to store malicious executables and collected data. T1564.001,Hide Artifacts, Hidden Files And Directories, NETWIRE can copy itself to and launch itself from hidden folders. T1564.001,Hide Artifacts, Hidden Files And Directories, Before exfiltration Okrum's backdoor has used hidden files to store logs and outputs from backdoor commands. T1564.001,Hide Artifacts, Hidden Files And Directories, OSX/Shlayer executes a .command script from a hidden directory in a mounted DMG. T1564.001,Hide Artifacts, Hidden Files And Directories, OSX_OCEANLOTUS.D sets the main loader fileattributes to hidden. T1564.001,Hide Artifacts, Hidden Files And Directories, PoetRAT has the ability to hide and unhide files. T1564.001,Hide Artifacts, Hidden Files And Directories, Rising Sun can modify file attributes to hide files. T1564.001,Hide Artifacts, Hidden Files And Directories," Rocke downloaded a file ""libprocesshider"" which could hide files on the target system. " T1564.001,Hide Artifacts, Hidden Files And Directories, SLOTHFULMEDIA has been created with a hidden attribute to insure it's not visible to the victim. T1564.001,Hide Artifacts, Hidden Files And Directories, ThiefQuest hides a copy of itself in the user's ~/Library directory by using a . at the beginning of the file name followed by 9 random characters. T1564.001,Hide Artifacts, Hidden Files And Directories, Tropic Trooper has created a hidden directory under C:\ProgramData\Apple\Updates\ and C:\Users\Public\Documents\Flash\. T1564.001,Hide Artifacts, Hidden Files And Directories," WannaCry uses attrib +h to make some of its files hidden.""" T1562.004,Impair Defenses, Disable Or Modify System Firewall,APT29 used netsh to configure firewall rules that limited certain UDP outbound packets. T1562.004,Impair Defenses, Disable Or Modify System Firewall," The ZR"" variant of BACKSPACE will check to see if known host-based firewalls are installed on the infected systems. BACKSPACE will attempt to establish a C2 channel then will examine open windows to identify a pop-up from the firewall software and will simulate a mouse-click to allow the connection to proceed. " T1562.004,Impair Defenses, Disable Or Modify System Firewall, BADCALL disables the Windows firewall before binding to a port. T1562.004,Impair Defenses, Disable Or Modify System Firewall, Carbanak may use netsh to add local firewall rule exceptions. T1562.004,Impair Defenses, Disable Or Modify System Firewall," CookieMiner has checked for the presence of ""Little Snitch"" macOS network monitoring and application firewall software stopping and exiting if it is found. " T1562.004,Impair Defenses, Disable Or Modify System Firewall, DarkComet can disable Security Center functions like the Windows Firewall. T1562.004,Impair Defenses, Disable Or Modify System Firewall, Dragonfly 2.0 has disabled host-based firewalls. The group has also globally opened port 3389. T1562.004,Impair Defenses, Disable Or Modify System Firewall, Grandoreiro can block the Deibold Warsaw GAS Tecnologia security tool at the firewall level. T1562.004,Impair Defenses, Disable Or Modify System Firewall, H1N1 kills and disables services for Windows Firewall. T1562.004,Impair Defenses, Disable Or Modify System Firewall, HARDRAIN opens the Windows Firewall to modify incoming connections. T1562.004,Impair Defenses, Disable Or Modify System Firewall, HOPLIGHT has modified the firewall using netsh. T1562.004,Impair Defenses, Disable Or Modify System Firewall, InvisiMole has a command to disable routing and the Firewall on the victimmachine. T1562.004,Impair Defenses, Disable Or Modify System Firewall, Kasidet has the ability to change firewall settings to allow a plug-in to be downloaded. T1562.004,Impair Defenses, Disable Or Modify System Firewall, Kimsuky has been observed disabling the system firewall. T1562.004,Impair Defenses, Disable Or Modify System Firewall, Various Lazarus Group malware modifies the Windows firewall to allow incoming connections or disable it entirely using netsh. T1562.004,Impair Defenses, Disable Or Modify System Firewall, NanoCore can modify the victim's firewall. T1562.004,Impair Defenses, Disable Or Modify System Firewall, netsh can be used to disable local firewall settings. T1562.004,Impair Defenses, Disable Or Modify System Firewall, njRAT has modified the Windows firewall to allow itself to communicate through the firewall. T1562.004,Impair Defenses, Disable Or Modify System Firewall, Operation Wocao has used PowerShell to add and delete rules in the Windows firewall. T1562.004,Impair Defenses, Disable Or Modify System Firewall, Remsec can add or remove applications or ports on the Windows firewall or disable it entirely. T1562.004,Impair Defenses, Disable Or Modify System Firewall, Rocke used scripts which killed processes and added firewall rules to block traffic related to other cryptominers. T1562.004,Impair Defenses, Disable Or Modify System Firewall, TYPEFRAME can open the Windows Firewall on the victimmachine to allow incoming connections. T1562.004,Impair Defenses, Disable Or Modify System Firewall, UNC2452 used netsh to configure firewall rules that limited certain UDP outbound packets. T1562.004,Impair Defenses, Disable Or Modify System Firewall," ZxShell can disable the firewall by modifying the registry key HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile. """ T1562.002,Impair Defenses, Disable Windows Event Logging,APT29 used AUDITPOL to prevent the collection of audit logs. T1562.002,Impair Defenses, Disable Windows Event Logging, Threat Group-3390 has used appcmd.exe to disable logging on a victim server. T1562.002,Impair Defenses, Disable Windows Event Logging, UNC2452 used AUDITPOL to prevent the collection of audit logs. T1562.002,Impair Defenses, Disable Windows Event Logging,Malware disable Windows event logging to limit data that can be leveraged for detections and audits T1562.002,Impair Defenses, Disable Windows Event Logging, Adversary disabled windows event logging for database application to supress evidance of exfilteration T1070.006,Indicator Removal on Host, Timestomp,3PARA RAT has a command to set certain attributes such as creation/modification timestamps on files. T1070.006,Indicator Removal on Host, Timestomp, APT28 has performed timestomping on victim files. T1070.006,Indicator Removal on Host, Timestomp, APT29 modified timestamps of backdoors to match legitimate Windows files. T1070.006,Indicator Removal on Host, Timestomp, APT32 has used scheduled task raw XML with a backdated timestamp of June 2 2016. The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll. Additionally APT32 has used a random value to modify the timestamp of the file storing the clientID. T1070.006,Indicator Removal on Host, Timestomp, Attor has manipulated the time of last access to files and registry keys after they have been created or modified. T1070.006,Indicator Removal on Host, Timestomp, Bankshot modifies the time of a file as specified by the control server. T1070.006,Indicator Removal on Host, Timestomp, BitPaymer can modify the timestamp of an executable so that it can be identified and restored by the decryption tool. T1070.006,Indicator Removal on Host, Timestomp, BLINDINGCAN has modified file and directory timestamps. T1070.006,Indicator Removal on Host, Timestomp, Chimera has used a Windows version of the Linux touch command to modify the date and time stamp on DLLs. T1070.006,Indicator Removal on Host, Timestomp, China Chopper's server component can change the timestamp of files. T1070.006,Indicator Removal on Host, Timestomp, Cobalt Strike can timestomp any files or payloads placed on a target machine to help them blend in. T1070.006,Indicator Removal on Host, Timestomp, The Derusbi malware supports timestomping. T1070.006,Indicator Removal on Host, Timestomp, Elise performs timestomping of a CAB file it creates. T1070.006,Indicator Removal on Host, Timestomp, Empire can timestomp any files or payloads placed on a target machine to help them blend in. T1070.006,Indicator Removal on Host, Timestomp, EVILNUM has changed the creation date of files. T1070.006,Indicator Removal on Host, Timestomp, FALLCHILL can modify file or directory timestamps. T1070.006,Indicator Removal on Host, Timestomp, For early Gazer versions the compilation timestamp was faked. T1070.006,Indicator Removal on Host, Timestomp, InvisiMole samples were timestomped by the authors by setting the PE timestamps to all zero values. InvisiMole also has a built-in command to modify file times. T1070.006,Indicator Removal on Host, Timestomp, KeyBoy time-stomped its DLL in order to evade detection. T1070.006,Indicator Removal on Host, Timestomp, Kimsuky has manipulated timestamps for creation or compilation dates to defeat anti-forensics. T1070.006,Indicator Removal on Host, Timestomp, Several Lazarus Group malware families use timestomping including modifying the last write timestamp of a specified Registry key to a random date as well as copying the timestamp for legitimate .exe files (such as calc.exe or mspaint.exe) to its dropped files. T1070.006,Indicator Removal on Host, Timestomp, Many Misdat samples were programmed using Borland Delphi which will mangle the default PE compile timestamp of a file. T1070.006,Indicator Removal on Host, Timestomp, OSX_OCEANLOTUS.D can use the touch command to change timestamps. T1070.006,Indicator Removal on Host, Timestomp, OwaAuth has a command to timestop a file or directory. T1070.006,Indicator Removal on Host, Timestomp, POSHSPY modifies timestamps of all downloaded executables to match a randomly selected file created prior to 2013. T1070.006,Indicator Removal on Host, Timestomp, PowerStallion modifies the MAC times of its local log files to match that of the victim's desktop.ini file. T1070.006,Indicator Removal on Host, Timestomp, Psylo has a command to conduct timestomping by setting a specified filetimestamps to match those of a system file in the System32 directory. T1070.006,Indicator Removal on Host, Timestomp, Rocke has changed the time stamp of certain files. T1070.006,Indicator Removal on Host, Timestomp, SEASHARPEE can timestomp files on victims using a Web shell. T1070.006,Indicator Removal on Host, Timestomp, Shamoon can change the modified time for files to evade forensic detection. T1070.006,Indicator Removal on Host, Timestomp, TAINTEDSCRIBE can change the timestamp of specified filenames. T1070.006,Indicator Removal on Host, Timestomp, After creating a new service for persistence TDTESS sets the file creation time for the service to the creation time of the victim's legitimate svchost.exe file. T1070.006,Indicator Removal on Host, Timestomp, TEMP.Veles used timestomping to modify the $STANDARD_INFORMATION attribute on tools. T1070.006,Indicator Removal on Host, Timestomp, UNC2452 modified timestamps of backdoors to match legitimate Windows files. T1070.006,Indicator Removal on Host, Timestomp, USBStealer sets the timestamps of its dropper files to the last-access and last-write timestamps of a standard Windows library chosen on the system. T1552.004,Unsecured Credentials, Private Keys,APT29 obtained the private encryption key from an Active Directory Federation Services (AD FS) container to decrypt corresponding SAML signing certificates. T1552.004,Unsecured Credentials, Private Keys, Ebury has intercepted unencrypted private keys as well as private key pass-phrases. T1552.004,Unsecured Credentials, Private Keys, Empire can use modules like Invoke-SessionGopher to extract private key and session information. T1552.004,Unsecured Credentials, Private Keys, Hildegard has searched for private keys in .ssh. T1552.004,Unsecured Credentials, Private Keys, jRAT can steal keys for VPNs and cryptocurrency wallets. T1552.004,Unsecured Credentials, Private Keys, Kinsing has searched for private keys. T1552.004,Unsecured Credentials, Private Keys, Machete has scanned and looked for cryptographic keys and certificate file extensions. T1552.004,Unsecured Credentials, Private Keys, Mimikatz's CRYPTO::Extract module can extract keys by interacting with Windows cryptographic application programming interface (API) functions. T1552.004,Unsecured Credentials, Private Keys, Operation Wocao has used Mimikatz to dump certificates and private keys from the Windows certificate store. T1552.004,Unsecured Credentials, Private Keys, Rocke has used SSH private keys on the infected machine to spread its coinminer throughout a network. T1552.004,Unsecured Credentials, Private Keys, UNC2452 obtained the private encryption key from an Active Directory Federation Services (AD FS) container to decrypt corresponding SAML signing certificates. T1070.004,Indicator Removal on Host, File Deletion,ADVSTORESHELL can delete files and directories. T1070.004,Indicator Removal on Host, File Deletion, Anchor can self delete its dropper after the malware is successfully deployed. T1070.004,Indicator Removal on Host, File Deletion, AppleJeus has deleted the MSI file after installation. T1070.004,Indicator Removal on Host, File Deletion, APT18 actors deleted tools and batch files from victim systems. T1070.004,Indicator Removal on Host, File Deletion, APT28 has intentionally deleted computer files to cover their tracks including with use of the program CCleaner. T1070.004,Indicator Removal on Host, File Deletion, APT29 routinely removed their tools including custom backdoors once remote access was achieved. APT29 has also used SDelete to remove artifacts from victims. T1070.004,Indicator Removal on Host, File Deletion, APT3 has a tool that can delete files. T1070.004,Indicator Removal on Host, File Deletion, APT32's macOS backdoor can receive adelete command. T1070.004,Indicator Removal on Host, File Deletion, APT38 has used a utility called CLOSESHAVE that can securely delete a file from the system. T1070.004,Indicator Removal on Host, File Deletion, APT39 has used malware to delete files after they are deployed on a compromised host. T1070.004,Indicator Removal on Host, File Deletion, APT41 deleted files from the system. T1070.004,Indicator Removal on Host, File Deletion, Aria-body has the ability to delete files and directories on compromised hosts. T1070.004,Indicator Removal on Host, File Deletion, Attorplugin deletes the collected files and log files after exfiltration. T1070.004,Indicator Removal on Host, File Deletion, AuditCred can delete files from the system. T1070.004,Indicator Removal on Host, File Deletion, Azorult can delete files from victim machines. T1070.004,Indicator Removal on Host, File Deletion, BabyShark has cleaned up all files associated with the secondary payload execution. T1070.004,Indicator Removal on Host, File Deletion, BackConfig has the ability to remove files and folders related to previous infections. T1070.004,Indicator Removal on Host, File Deletion, Backdoor.Oldrea contains a cleanup module that removes traces of itself from the victim. T1070.004,Indicator Removal on Host, File Deletion, Bankshot marks files to be deleted upon the next system reboot and uninstalls and removes itself from the system. T1070.004,Indicator Removal on Host, File Deletion, Bazar can delete its loader using a batch file in the Windows temporary folder. T1070.004,Indicator Removal on Host, File Deletion, BBSRAT can delete files and directories. T1070.004,Indicator Removal on Host, File Deletion, Bisonal deletes its dropper and VBS scripts from the victimmachine. T1070.004,Indicator Removal on Host, File Deletion, BLACKCOFFEE has the capability to delete files. T1070.004,Indicator Removal on Host, File Deletion, BLINDINGCAN has deleted itself and associated artifacts from victim machines. T1070.004,Indicator Removal on Host, File Deletion, The BRONZE BUTLER uploader or malware the uploader uses command to delete the RAR archives after they have been exfiltrated. T1070.004,Indicator Removal on Host, File Deletion, Calisto has the capability to use rm -rf to remove folders and files from the victim's machine. T1070.004,Indicator Removal on Host, File Deletion, Carbanak has a command to delete files. T1070.004,Indicator Removal on Host, File Deletion, Cardinal RAT can uninstall itself including deleting its executable. T1070.004,Indicator Removal on Host, File Deletion, CARROTBAT has the ability to delete downloaded files from a compromised host. T1070.004,Indicator Removal on Host, File Deletion, Recent versions of Cherry Picker delete files and registry keys created by the malware. T1070.004,Indicator Removal on Host, File Deletion, Chimera has performed file deletion to evade detection. T1070.004,Indicator Removal on Host, File Deletion, cmd can be used to delete files from the file system. T1070.004,Indicator Removal on Host, File Deletion, Cobalt Group deleted the DLL dropper from the victimmachine to cover their tracks. T1070.004,Indicator Removal on Host, File Deletion, Cryptoistic has the ability delete files from a compromised host. T1070.004,Indicator Removal on Host, File Deletion, CSPY Downloader has the ability to self delete. T1070.004,Indicator Removal on Host, File Deletion, Denis has a command to delete files from the victimmachine. T1070.004,Indicator Removal on Host, File Deletion, Derusbi is capable of deleting files. It has been observed loading a Linux Kernel Module (LKM) and then deleting it from the hard disk as well as overwriting the data with null bytes. T1070.004,Indicator Removal on Host, File Deletion, Dragonfly 2.0 deleted many of its files used during operations as part of cleanup including removing applications and deleting screenshots. T1070.004,Indicator Removal on Host, File Deletion, Drovorub can delete specific files from a compromised host. T1070.004,Indicator Removal on Host, File Deletion, Dtrack can remove its persistence and delete itself. T1070.004,Indicator Removal on Host, File Deletion, DustySky can delete files it creates from the infected system. T1070.004,Indicator Removal on Host, File Deletion, ECCENTRICBANDWAGON can delete log files generated from the malware stored at C:\windows\temp\tmp0207. T1070.004,Indicator Removal on Host, File Deletion, Elise is capable of launching a remote shell on the host to delete itself. T1070.004,Indicator Removal on Host, File Deletion, Epic has a command to delete a file from the machine. T1070.004,Indicator Removal on Host, File Deletion, EvilBunny has deleted the initial dropper after running through the environment checks. T1070.004,Indicator Removal on Host, File Deletion, Evilnum has deleted files used during infection. T1070.004,Indicator Removal on Host, File Deletion, Exaramel for Linux can uninstall its persistence mechanism and delete its configuration file. T1070.004,Indicator Removal on Host, File Deletion, FALLCHILL can delete malware and associated artifacts from the victim. T1070.004,Indicator Removal on Host, File Deletion, FatDuke can secure delete its DLL. T1070.004,Indicator Removal on Host, File Deletion, FELIXROOT deletes the .LNK file from the startup directory as well as the dropper components. T1070.004,Indicator Removal on Host, File Deletion, FIN10 has used batch scripts and scheduled tasks to delete critical system files. T1070.004,Indicator Removal on Host, File Deletion, FIN5 uses SDelete to clean up the environment and attempt to prevent detection. T1070.004,Indicator Removal on Host, File Deletion, FIN6 has removed files from victim machines. T1070.004,Indicator Removal on Host, File Deletion, FIN8 has deleted tmp and prefetch files during post compromise cleanup activities. T1070.004,Indicator Removal on Host, File Deletion, FruitFly will delete files on the system. T1070.004,Indicator Removal on Host, File Deletion, Fysbis has the ability to delete files. T1070.004,Indicator Removal on Host, File Deletion, Gamaredon Group tools can delete files used during an infection. T1070.004,Indicator Removal on Host, File Deletion, Gazer has commands to delete files and persistence mechanisms from the victim. T1070.004,Indicator Removal on Host, File Deletion, gh0st RAT has the capability to to delete files. T1070.004,Indicator Removal on Host, File Deletion, Gold Dragon deletes one of its files 2.hwp from the endpoint after establishing persistence. T1070.004,Indicator Removal on Host, File Deletion, GoldenSpy's uninstaller can delete registry entries files and folders and finally itself once these tasks have been completed. T1070.004,Indicator Removal on Host, File Deletion, Grandoreiro can delete .LNK files created in the Startup folder. T1070.004,Indicator Removal on Host, File Deletion, GreyEnergy can securely delete a file by hooking into the DeleteFileA and DeleteFileW functions in the Windows API. T1070.004,Indicator Removal on Host, File Deletion, Malware used by Group5 is capable of remotely deleting files from victims. T1070.004,Indicator Removal on Host, File Deletion, GuLoader can delete its executable from the AppData\Local\Temp directory on the compromised host. T1070.004,Indicator Removal on Host, File Deletion, HALFBAKED can delete a specified file. T1070.004,Indicator Removal on Host, File Deletion, Hancitor has deleted files using the VBA kill function. T1070.004,Indicator Removal on Host, File Deletion, HAWKBALL has the ability to delete files. T1070.004,Indicator Removal on Host, File Deletion, Hi-Zor deletes its RAT installer file as it executes its DLL payload file. T1070.004,Indicator Removal on Host, File Deletion, Hildegard has deleted scripts after execution. T1070.004,Indicator Removal on Host, File Deletion, Honeybee removes batch files to reduce fingerprint on the system as well as deletes the CAB file that gets encoded upon infection. T1070.004,Indicator Removal on Host, File Deletion, HotCroissant has the ability to clean up installed files delete files and delete itself from the victimmachine. T1070.004,Indicator Removal on Host, File Deletion, HTTPBrowser deletes its original installer file once installation is complete. T1070.004,Indicator Removal on Host, File Deletion, Hydraq creates a backdoor through which remote attackers can delete files. T1070.004,Indicator Removal on Host, File Deletion, HyperBro has the ability to delete a specified file. T1070.004,Indicator Removal on Host, File Deletion, Imminent Monitor has deleted files related to its dynamic debugger feature. T1070.004,Indicator Removal on Host, File Deletion, InnaputRAT has a command to delete files. T1070.004,Indicator Removal on Host, File Deletion, InvisiMole has deleted files and directories including XML and files successfully uploaded to C2 servers. T1070.004,Indicator Removal on Host, File Deletion, Ixeshe has a command to delete a file from the machine. T1070.004,Indicator Removal on Host, File Deletion, The JHUHUGIT dropper can delete itself from the victim. Another JHUHUGIT variant has the capability to delete specified files. T1070.004,Indicator Removal on Host, File Deletion, JPIN's installer/uninstaller component deletes itself if it encounters a version of Windows earlier than Windows XP or identifies security-related processes running. T1070.004,Indicator Removal on Host, File Deletion, jRAT has a function to delete files from the victimmachine. T1070.004,Indicator Removal on Host, File Deletion, Kazuar can delete files. T1070.004,Indicator Removal on Host, File Deletion, KEYMARBLE has the capability to delete files off the victimmachine. T1070.004,Indicator Removal on Host, File Deletion, Kimsuky has deleted the exfiltrated data on disk after transmission. T1070.004,Indicator Removal on Host, File Deletion, Kivars has the ability to uninstall malware from the infected host. T1070.004,Indicator Removal on Host, File Deletion, The Komplex trojan supports file deletion. T1070.004,Indicator Removal on Host, File Deletion, KONNI can delete files. T1070.004,Indicator Removal on Host, File Deletion," Lazarus Group malware deletes files in various ways including suicide scripts"" to delete malware binaries from the victim. Lazarus Group also uses secure file deletion to delete files from the victim. " T1070.004,Indicator Removal on Host, File Deletion, LightNeuron has a function to delete files. T1070.004,Indicator Removal on Host, File Deletion, Linfo creates a backdoor through which remote attackers can delete files. T1070.004,Indicator Removal on Host, File Deletion, LockerGoga has been observed deleting its original launcher after execution. T1070.004,Indicator Removal on Host, File Deletion, LookBack removes itself after execution and can delete files on the system. T1070.004,Indicator Removal on Host, File Deletion, LoudMiner deleted installation files after completion. T1070.004,Indicator Removal on Host, File Deletion, Once a file is uploaded Machete will delete it from the machine. T1070.004,Indicator Removal on Host, File Deletion, MacSpy deletes any temporary files it creates T1070.004,Indicator Removal on Host, File Deletion, Magic Hound has deleted and overwrote files to cover tracks. T1070.004,Indicator Removal on Host, File Deletion, A menuPass macro deletes files after it has decoded and decompressed them. T1070.004,Indicator Removal on Host, File Deletion, Once loaded into memory MESSAGETAP deletes the keyword_parm.txt and parm.txt configuration files from disk. T1070.004,Indicator Removal on Host, File Deletion, Metamorfo has deleted itself from the system after execution. T1070.004,Indicator Removal on Host, File Deletion, Misdat is capable of deleting the backdoor file. T1070.004,Indicator Removal on Host, File Deletion, MoonWind can delete itself or specified files. T1070.004,Indicator Removal on Host, File Deletion, More_eggs can remove itself from a system. T1070.004,Indicator Removal on Host, File Deletion, Mosquito deletes files using DeleteFileW API call. T1070.004,Indicator Removal on Host, File Deletion, MURKYTOP has the capability to delete local files. T1070.004,Indicator Removal on Host, File Deletion, Mustang Panda will delete their tools and files and kill processes after their objectives are reached. T1070.004,Indicator Removal on Host, File Deletion, NanHaiShu launches a script to delete their original decoy file to cover tracks. T1070.004,Indicator Removal on Host, File Deletion, NOKKI can delete files to cover tracks. T1070.004,Indicator Removal on Host, File Deletion, OceanSalt can delete files from the system. T1070.004,Indicator Removal on Host, File Deletion, OilRig has deleted files associated with their payload after execution. T1070.004,Indicator Removal on Host, File Deletion, Okrum's backdoor deletes files after they have been successfully uploaded to C2 servers. T1070.004,Indicator Removal on Host, File Deletion, OopsIE has the capability to delete files and scripts from the victim's machine. T1070.004,Indicator Removal on Host, File Deletion, Operation Wocao has deleted logs and executable files used during an intrusion. T1070.002,Indicator Removal on Host, Clear Linux Or Mac System Logs,Proton removes logs from /var/logs and /Library/logs. T1070.002,Indicator Removal on Host, Clear Linux Or Mac System Logs, Rocke has cleared log files within the /var/log/ folder. T1070.002,Indicator Removal on Host, Clear Linux Or Mac System Logs,Adversaries deleted /var/log/auth.log after braking into system by password bruteforce attack T1070.002,Indicator Removal on Host, Clear Linux Or Mac System Logs, Actor clear system logs to hide evidence of an intrusion T1070.002,Indicator Removal on Host, Clear Linux Or Mac System Logs, Malware deletes /var/log/cron.log to hide evidence of tampering with cron jobs to enable persistence T1070.001,Indicator Removal on Host, Clear Windows Event Logs,APT28 has cleared event logs including by using the commands wevtutil cl System and wevtutil cl Security. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, APT32 has cleared select event log entries. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, APT38 clears Window Event logs and Sysmon logs from the system. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, APT41 attempted to remove evidence of some of its activity by clearing Windows security and system events. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, The BlackEnergy component KillDisk is capable of deleting Windows Event Logs. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, Chimera has cleared event logs on compromised hosts. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, Dragonfly 2.0 cleared Windows event logs and other logs produced by tools they used including system security terminal services remote services and audit logs. The actors also deleted specific Registry keys. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, FIN5 has cleared event logs from victims. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, FIN8 has cleared logs during post compromise cleanup activities. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, FinFisher clears the system event logs using OpenEventLog/ClearEventLog APIs . T1070.001,Indicator Removal on Host, Clear Windows Event Logs, gh0st RAT is able to wipe event logs. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, Hydraq creates a backdoor through which remote attackers can clear all system event logs. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, Lucifer can clear and remove event logs. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, NotPetya uses wevtutil to clear the Windows event logs. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, Olympic Destroyer will attempt to clear the System and Security event logs using wevtutil. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, Operation Wocao has deleted Windows Event Logs to hinder forensic investigation. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, Pupy has a module to clear event logs with PowerShell. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, RunningRAT contains code to clear event logs. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, SynAck clears event logs. T1070.001,Indicator Removal on Host, Clear Windows Event Logs, ZxShell has a command to clear system event logs. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools,APT3 has been known to remove indicators of compromise from tools. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools," Cobalt Strike includes a capability to modify the beacon"" payload to eliminate known signatures or unpacking methods. " T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, Analysis of Daserf has shown that it regularly undergoes technical improvements to evade anti-virus detection. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, Deep Panda has updated and modified its malware resulting in different hash values that evade detection. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, GALLIUM ensured each payload had a unique hash including by using different types of packers. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, The author of GravityRAT submitted samples to VirusTotal for testing showing that the author modified the code to try to hide the DDE object in a different part of the document. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, InvisiMole has undergone regular technical improvements in an attempt to evade detection. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, OilRig has tested malware samples to determine AV detection and subsequently modified the samples to ensure AV evasion. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, Operation Wocao has edited variable names within the Impacket suite to avoid automated detection. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, Patchwork apparently altered NDiskMonitor samples by adding four bytes of random letters in a likely attempt to change the file hashes. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, Penquin can remove strings from binaries. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, PowerSploit's Find-AVSignature AntivirusBypass module can be used to locate single byte anti-virus signatures. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, SUNBURST source code used generic variable names and pre-obfuscated strings and was likely sanitized of developer comments before being added to SUNSPOT. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, TEMP.Veles has modified files based on the open-source project cryptcat in an apparent attempt to decrease AV detection rates. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools, Based on comparison of Gazer versions Turla made an effort to obfuscate strings in the malware that could be used as IoCs including the mutex name and named pipe. T1027.005,Obfuscated Files or Information, Indicator Removal From Tools," Waterbear can scramble functions not to be executed again with random values.""" T1027.004,Obfuscated Files or Information, Compile After Delivery,Cardinal RAT and its watchdog component are compiled and executed after being delivered to victims as embedded uncompiled source code. T1027.004,Obfuscated Files or Information, Compile After Delivery, Gamaredon Group has compiled the source code for a downloader directly on the infected system using the built-in Microsoft.CSharp.CSharpCodeProvider class. T1027.004,Obfuscated Files or Information, Compile After Delivery, MuddyWater has used the .NET csc.exe tool to compile executables from downloaded C# code. T1027.004,Obfuscated Files or Information, Compile After Delivery, njRAT has used AutoIt to compile the payload and main script into a single executable after delivery. T1027.004,Obfuscated Files or Information, Compile After Delivery, Rocke has compiled malware delivered to victims as .c files with the GNU Compiler Collection (GCC). T1036.006,Masquerading, Space After Filename,Keydnap puts a space after a false .jpg extension so that execution actually goes through the Terminal.app program. T1036.006,Masquerading, Space After Filename,Adversary put extra space after .doc extension inside a filename to trick users into double clicking assuming its benign document and instead executing malicious binary through Terminal App T1036.006,Masquerading, Space After Filename, Malware put extra space after a false .png extension so user inadvertantly clicks it assuming its a harmless photo T1036.006,Masquerading, Space After Filename, Campaign puts blank space after filename to evade monitoring rules for blocking executable files T1036.006,Masquerading, Space After Filename, then drops a malware with extension having an extra space at the end ' so that it will actually run via terminal app instead of opening via photo app T1036.002,Masquerading, Right,BlackTech has used right-to-left-override to obfuscate the filenames of malicious e-mail attachments. T1036.002,Masquerading, Right, BRONZE BUTLER has used Right-to-Left Override to deceive victims into executing several strains of malware. T1036.002,Masquerading, Right, Ke3chang has used the right-to-left override character in spearphishing attachment names to trick targets into executing .scr and .exe files. T1036.002,Masquerading, Right, Scarlet Mimic has used the left-to-right override character in self-extracting RAR archive spearphishing attachment file names. T1036.002,Masquerading, Right,Adversary use the right-to-left override (RTLO) as a means of tricking a user into executing what they think is a benign file type but is actually executable code T1560.002,Archive Collected Data, Archive Via Library,BBSRAT can compress data with ZLIB prior to sending it back to the C2 server. T1560.002,Archive Collected Data, Archive Via Library, Cardinal RAT applies compression to C2 traffic using the ZLIB library. T1560.002,Archive Collected Data, Archive Via Library, Denis compressed collected data using zlib. T1560.002,Archive Collected Data, Archive Via Library, Epic compresses the collected data with bzip2 before sending it to the C2 server. T1560.002,Archive Collected Data, Archive Via Library, InvisiMole can use zlib to compress and decompress data. T1560.002,Archive Collected Data, Archive Via Library, Lazarus Group malware IndiaIndia saves information gathered about the victim to a file that is compressed with Zlib encrypted and uploaded to a C2 server. T1560.002,Archive Collected Data, Archive Via Library, SeaDuke compressed data with zlib prior to sending it over C2. T1560.002,Archive Collected Data, Archive Via Library, TajMahal has the ability to use the open source libraries XZip/Xunzip and zlib to compress files. T1560.002,Archive Collected Data, Archive Via Library, Threat Group-3390 has used RAR to compress encrypt and password-protect files prior to exfiltration. T1560.002,Archive Collected Data, Archive Via Library, The ZLib backdoor compresses communications using the standard Zlib compression library. T1565.003,Data Manipulation, Runtime Data Manipulation,APT38 has used DYEPACK.FOX to manipulate PDF data as it is accessed to remove traces of fraudulent SWIFT transactions from the data displayed to the end user. T1565.003,Data Manipulation, Runtime Data Manipulation,DYEPACK malware modifies documents before they are accessed and executes the legitimate Foxit reader program to display the modified documents T1565.003,Data Manipulation, Runtime Data Manipulation, Malware removes failed authentication entries from log before they are accessed to evade detection by administrator T1565.003,Data Manipulation, Runtime Data Manipulation, Malware changes bank account numbers from payable receipts before displaying to user to cause fund transfer to adversary account T1565.003,Data Manipulation, Runtime Data Manipulation, Malware changes bitcoin address from clipboard before they are pasted by user to cause funds getting transfered to adversary account. T1565.003,Data Manipulation, Runtime Data Manipulation," " T1561.002,Disk Wipe, Disk Structure Wipe,APT37 has access to destructive malware that is capable of overwriting a machine's Master Boot Record (MBR). T1561.002,Disk Wipe, Disk Structure Wipe, APT38 has used a custom MBR wiper named BOOTWRECK to render systems inoperable. T1561.002,Disk Wipe, Disk Structure Wipe, Lazarus Group malware SHARPKNOT overwrites and deletes the Master Boot Record (MBR) on the victim's machine and has possessed MBR wiper malware since at least 2009. T1561.002,Disk Wipe, Disk Structure Wipe, RawDisk was used in Shamoon to help overwrite components of disk structure like the MBR and disk partitions. T1561.002,Disk Wipe, Disk Structure Wipe, Sandworm Team has used the BlackEnergy KillDisk component to corrupt the infected system's master boot record. T1561.002,Disk Wipe, Disk Structure Wipe, Shamoon has been seen overwriting features of disk structure such as the MBR. T1561.002,Disk Wipe, Disk Structure Wipe, StoneDrill can wipe the master boot record of an infected computer. T1561.001,Disk Wipe, Disk Content Wipe,Lazarus Group has used malware like WhiskeyAlfa to overwrite the first 64MB of every drive with a mix of static and random buffers. A similar process is then used to wipe content in logical drives and finally attempt to wipe every byte of every sector on every drive. WhiskeyBravo can be used to overwrite the first 4.9MB of physical drives. WhiskeyDelta can overwrite the first 132MB or 1.5MB of each drive with random data from heap memory. T1561.001,Disk Wipe, Disk Content Wipe, MegaCortex can wipe deleted data from all drives using cipher.exe. T1561.001,Disk Wipe, Disk Content Wipe, RawDisk has been used to directly access the hard disk to help overwrite arbitrarily sized portions of disk content. T1561.001,Disk Wipe, Disk Content Wipe, StoneDrill can wipe the accessible physical or logical drives of the infected machine. T1561.001,Disk Wipe, Disk Content Wipe,The group carried out the attack using a custom modular ransomware executable and master boot record (MBR) wiper dubbedApostle. T1561.001,Disk Wipe, Disk Content Wipe," NotPetya infects the master boot record (MBR) and prevents any system from booting. Even if the ransom is paid, however, the damage from NotPetya is irreversible, so it is likely that the actoraim was to sabotage the infected system rather than gaining money out of it. " T1559.002,Inter,,APT28 has delivered JHUHUGIT and Koadic by executing PowerShell commands through DDE in Word documents. T1559.002,Inter,, APT37 has used Windows DDE for execution of commands and a malicious VBS. T1559.002,Inter,, Cobalt Group has sent malicious Word OLE compound documents to victims. T1559.002,Inter,, FIN7 spear phishing campaigns have included malicious Word documents with DDE execution. T1559.002,Inter,, Gallmaker attempted to exploit MicrosoftDDE protocol in order to gain access to victim machines and for execution. T1559.002,Inter,, GravityRAT has been delivered via Word documents using DDE for execution. T1559.002,Inter,, HAWKBALL has used an OLE object that uses Equation Editor to drop the embedded shellcode. T1559.002,Inter,, KeyBoy uses the Dynamic Data Exchange (DDE) protocol to download remote payloads. T1559.002,Inter,, MuddyWater has used malware that can execute PowerShell scripts via DDE. T1559.002,Inter,, Patchwork leveraged the DDE protocol to deliver their malware. T1559.002,Inter,, PoetRAT was delivered with documents using DDE to execute malicious code. T1559.002,Inter,, POWERSTATS can use DDE to execute additional payloads on compromised hosts. T1559.002,Inter,, Ramsay has been delivered using OLE objects in malicious documents. T1559.002,Inter,, RTM can search for specific strings within browser tabs using a Dynamic Data Exchange mechanism. T1559.002,Inter,, Sharpshooter has sent malicious Word OLE documents to victims. T1559.002,Inter,, Sidewinder has used the ActiveXObject utility to create OLE objects to obtain execution through Internet Explorer. T1559.002,Inter,, TA505 has leveraged malicious Word documents that abused DDE. T1559.002,Inter,, Valak can execute tasks via OLE. T1559.001,Inter,,Gamaredon Group malware can insert malicious macros into documents using a Microsoft.Office.Interop object. T1559.001,Inter,, InvisiMole can use the ITaskService ITaskDefinition and ITaskSettings COM interfaces to schedule a task. T1559.001,Inter,, MuddyWater has used malware that has the capability to execute malicious code via COM DCOM and Outlook. T1559.001,Inter,, POWERSTATS can use DCOM (targeting the 127.0.0.1 loopback address) to execute additional payloads on compromised hosts. T1559.001,Inter,, Ramsay can use the Windows COM API to schedule tasks and maintain persistence. T1559.001,Inter,, TrickBot used COM to setup scheduled task for persistence. T1559.001,Inter,, Ursnif droppers have used COM objects to execute the malware's full executable payload. T1569.002,System Services, Service Execution,Anchor can create and execute services to load its payload. T1569.002,System Services, Service Execution, APT32's backdoor has used Windows services as a way to execute its malicious payload. T1569.002,System Services, Service Execution, APT39 has used post-exploitation tools including RemCom and the Non-sucking Service Manager (NSSM) to execute processes. T1569.002,System Services, Service Execution, APT41 used Net to execute a system service installed to launch a Cobalt Strike BEACON loader. T1569.002,System Services, Service Execution, Attor's dispatcher can be executed as a service. T1569.002,System Services, Service Execution, BBSRAT can start stop or delete services. T1569.002,System Services, Service Execution," Blue Mockingbird has executed custom-compiled XMRIG miner DLLs by configuring them to execute via the wercplsupport"" service. " T1569.002,System Services, Service Execution, Chimera has used PsExec to deploy beacons on compromised systems. T1569.002,System Services, Service Execution, Cobalt Strike can use PsExec to execute a payload on a remote host. It can also use Service Control Manager to start new services. T1569.002,System Services, Service Execution, Empire can use PsExec to execute a payload on a remote host. T1569.002,System Services, Service Execution, FIN6 has created Windows services to execute encoded PowerShell commands. T1569.002,System Services, Service Execution, gh0st RAT can execute its service if the Service key exists. If the key does not exist gh0st RAT will create and run the service. T1569.002,System Services, Service Execution, Honeybee launches a DLL file that gets executed as a service using svchost.exe T1569.002,System Services, Service Execution, HOPLIGHT has used svchost.exe to execute a malicious DLL . T1569.002,System Services, Service Execution, Hydraq uses svchost.exe to execute a malicious DLL included in a new service group. T1569.002,System Services, Service Execution, HyperBro has the ability to start and stop a specified service. T1569.002,System Services, Service Execution, Impacket contains various modules emulating other service execution tools such as PsExec. T1569.002,System Services, Service Execution, InvisiMole has used Windows services as a way to execute its malicious payload. T1569.002,System Services, Service Execution, Ke3chang has used a tool known as RemoteExec (similar to PsExec) to remotely execute batch scripts and binaries. T1569.002,System Services, Service Execution, Koadic can run a command on another machine using PsExec. T1569.002,System Services, Service Execution, LoudMiner started the cryptomining virtual machine as a service on the infected machine. T1569.002,System Services, Service Execution, The net start and net stop commands can be used in Net to execute or stop Windows services. T1569.002,System Services, Service Execution, Net Crawler uses PsExec to perform remote service manipulation to execute a copy of itself as part of lateral movement. T1569.002,System Services, Service Execution, Operators deploying Netwalker have used psexec and certutil to retrieve the Netwalker payload. T1569.002,System Services, Service Execution, NotPetya can use PsExec to help propagate itself across a network. T1569.002,System Services, Service Execution, Okrum's loader can create a new service named NtmsSvc to execute the payload. T1569.002,System Services, Service Execution, Olympic Destroyer utilizes PsExec to help propagate itself across a network. T1569.002,System Services, Service Execution, Operation Wocao has created services on remote systems for execution purposes. T1569.002,System Services, Service Execution, PoshC2 contains an implementation of PsExec for remote execution. T1569.002,System Services, Service Execution, Proxysvc registers itself as a service on the victimmachine to run as a standalone process. T1569.002,System Services, Service Execution, Microsoft Sysinternals PsExec is a popular administration tool that can be used to execute binaries on remote systems using a temporary Windows service. T1569.002,System Services, Service Execution, Pupy uses PsExec to execute a payload or commands on a remote host. T1569.002,System Services, Service Execution, Pysa has used PsExec to copy and execute the ransomware. T1569.002,System Services, Service Execution, Ragnar Locker has used sc.exe to execute a service that it creates. T1569.002,System Services, Service Execution, RemoteCMD can execute commands remotely by creating a new service on the remote system. T1569.002,System Services, Service Execution, Shamoon creates a new service namedntssrv to execute the payload. Shamoon can also spread via PsExec. T1569.002,System Services, Service Execution, Silence has used Winexe to install a service on the remote system. T1569.002,System Services, Service Execution, SLOTHFULMEDIA has the capability to start services. T1569.002,System Services, Service Execution, StrongPity can install a service to execute itself as a service. T1569.002,System Services, Service Execution, Winexe installs a service on the remote system executes the command then uninstalls the service. T1569.002,System Services, Service Execution," Wingbird uses services.exe to register a new autostart service named ""Audit Service"" using a copy of the local lsass.exe file. " T1569.002,System Services, Service Execution, Wizard Spider has used services.exe to execute scripts and executables during lateral movement within a victim network. T1569.002,System Services, Service Execution," xCmd can be used to execute binaries on remote systems by creating and starting a service.""" T1567.002,Exfiltration Over Web Service, Exfiltration To Cloud Storage,Chimera has exfiltrated stolen data to OneDrive accounts. T1567.002,Exfiltration Over Web Service, Exfiltration To Cloud Storage, Crutch has exfiltrated stolen data to Dropbox. T1567.002,Exfiltration Over Web Service, Exfiltration To Cloud Storage, Empire can use Dropbox for data exfiltration. T1567.002,Exfiltration Over Web Service, Exfiltration To Cloud Storage, HAFNIUM has exfiltrated data to file sharing sites including MEGA. T1567.002,Exfiltration Over Web Service, Exfiltration To Cloud Storage, HAMMERTOSS exfiltrates data by uploading it to accounts created by the actors on Web cloud storage providers for the adversaries to retrieve later. T1567.002,Exfiltration Over Web Service, Exfiltration To Cloud Storage, Leviathan has used an uploader known as LUNCHMONEY that can exfiltrate files to Dropbox. T1567.002,Exfiltration Over Web Service, Exfiltration To Cloud Storage, Turla has used WebDAV to upload stolen USB files to a cloud drive. Turla has also exfiltrated stolen files to OneDrive and 4shared. T1567.002,Exfiltration Over Web Service, Exfiltration To Cloud Storage, ZIRCONIUM has exfiltrated stolen data to Dropbox. T1567.001,Exfiltration Over Web Service, Exfiltration To Code Repository,Empire can use GitHub for data exfiltration. T1567.001,Exfiltration Over Web Service, Exfiltration To Code Repository,Actors appear to have leveraged the popular github service to host the breached data during exfiltration. Leveraging popular services such as github can assist them evading security controls. T1567.001,Exfiltration Over Web Service, Exfiltration To Code Repository, GitHub can be used as exfiltration destination for organizational data. T1567.001,Exfiltration Over Web Service, Exfiltration To Code Repository, Stolen data has been compressed as rar files and exfiltrated to github. T1567.001,Exfiltration Over Web Service, Exfiltration To Code Repository, Actor is believed to have been able to compromise organizations around the globe and exfiltrated large amounts of sensitive information to a code repository. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non,Agent Tesla has routines for exfiltration over SMTP FTP and HTTP. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, APT32's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, APT33 has used FTP to exfiltrate files (separately from the C2 channel). T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, BITSAdmin can be used to create BITS Jobs to upload files from a compromised host. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, Some Brave Prince variants have used South Korea's Daum email service to exfiltrate information and later variants have posted the data to a web server via an HTTP post command. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, Carbon uses HTTP to send data to the C2 server. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, Cherry Picker exfiltrates files over FTP. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, CookieMiner has used the curl --upload-file command to exfiltrate data over HTTP. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, CORALDECK has exfiltrated data in HTTP POST headers. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, CosmicDuke exfiltrates collected files over FTP or WebDAV. Exfiltration servers can be separately configured from C2 servers. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, FIN6 has sent stolen payment card data to remote servers via HTTP POSTs. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, FIN8 has used FTP to exfiltrate collected data. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, FTP may be used to exfiltrate data separate from the main command and control protocol. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, Kessel can exfiltrate credentials and other information via HTTP POST request TCP and DNS. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, KONNI has used FTP to exfiltrate reconnaissance data out. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, Lazarus Group malware SierraBravo-Two generates an email message via SMTP containing information about newly infected victims. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, OilRig has exfiltrated data over FTP separately from its primary C2 channel over DNS. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, PoetRAT has used FTP for exfiltration. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, Remsec can exfiltrate data via a DNS tunnel or email separately from its C2 channel. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, Thrip has used WinSCP to exfiltrate data from a targeted organization over FTP. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, WindTail has the ability to automatically exfiltrate files using the macOS built-in utility /usr/bin/curl. T1048.003,Exfiltration Over Alternative Protocol, Exfiltration Over Unencrypted/Obfuscated Non, Wizard Spider has exfiltrated victim information using FTP. T1048.002,Exfiltration Over Alternative Protocol, Exfiltration Over Asymmetric Encrypted Non,APT29 has exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers. T1048.002,Exfiltration Over Alternative Protocol, Exfiltration Over Asymmetric Encrypted Non, UNC2452 exfiltrated collected data over a simple HTTPS request to a password-protected archive staged on a victim's OWA servers. T1048.002,Exfiltration Over Alternative Protocol, Exfiltration Over Asymmetric Encrypted Non,The threat actors collected and exfiltrated the contents of network shares for use in a double extortion demand. The data exported was encrypted using public and private keys. T1048.002,Exfiltration Over Alternative Protocol, Exfiltration Over Asymmetric Encrypted Non, The actors downloaded archives of collected data that was asymmetrically encrypted. T1048.002,Exfiltration Over Alternative Protocol, Exfiltration Over Asymmetric Encrypted Non, The attack involved uploading password-protected archives of collected data that had been staged on the victim's servers. T1048.001,Exfiltration Over Alternative Protocol, Exfiltration Over Symmetric Encrypted Non,"Adversaries may opt to manually share keys and implement symmetric cryptographic algorithms (ex: RC4, AES) even while utilizing otherwise encrypted protocols, such as HTTPS. " T1048.001,Exfiltration Over Alternative Protocol, Exfiltration Over Symmetric Encrypted Non, Attackers used a pre-shared key to symmetrically encrypt the collected data for upload to separate infrastructure from the C2 channel. T1048.001,Exfiltration Over Alternative Protocol, Exfiltration Over Symmetric Encrypted Non, Actor was observed to have encrypted the breached information before exfiltrating it to their FTP server. T1048.001,Exfiltration Over Alternative Protocol, Exfiltration Over Symmetric Encrypted Non," The group has the ability to read file contents, encrypt the information, and exfiltrate them to attacker controlled infrastructure separate from their C2 channel. " T1048.001,Exfiltration Over Alternative Protocol, Exfiltration Over Symmetric Encrypted Non, The functionality that they all have in common is that each exfiltrates collected credentials and its bash command history as an encrypted bundle to servers they control. T1011.001,Exfiltration Over Other Network Medium, Exfiltration Over Bluetooth,Flame has a module named BeetleJuice that contains Bluetooth functionality that may be used in different ways including transmitting encoded information from the infected system over the Bluetooth protocol acting as a Bluetooth beacon and identifying other Bluetooth devices in the vicinity. T1011.001,Exfiltration Over Other Network Medium, Exfiltration Over Bluetooth,"Bluetooth is rarely used, and only if the other network options are inaccessible or are not properly set up to exfiltrate data without the risk of detection. " T1011.001,Exfiltration Over Other Network Medium, Exfiltration Over Bluetooth, Adversaries may attempt to exfiltrate data over Bluetooth rather than the command and control channel. T1011.001,Exfiltration Over Other Network Medium, Exfiltration Over Bluetooth, We believe the malicious APKs may be distributed through links sent to the victims via text messages. The APK has the capability to turn bluetooh on which would allow for data exfiltration via that channel. T1011.001,Exfiltration Over Other Network Medium, Exfiltration Over Bluetooth, StarCruft became known for creating new tools and techniques to identify Bluetooth devices. These are used for information gathering for export. T1052.001,Exfiltration Over Physical Medium, Exfiltration Over Usb,Agent.btz creates a file named thumb.dd on all USB flash drives connected to the victim. This file contains information about the infected system and activity logs. T1052.001,Exfiltration Over Physical Medium, Exfiltration Over Usb, Machete has a feature to copy files from every drive onto a removable drive in a hidden folder. T1052.001,Exfiltration Over Physical Medium, Exfiltration Over Usb, Mustang Panda has used a customized PlugX variant which could exfiltrate documents from air-gapped networks. T1052.001,Exfiltration Over Physical Medium, Exfiltration Over Usb, Remsec contains a module to move data from airgapped networks to Internet-connected systems by using a removable USB device. T1052.001,Exfiltration Over Physical Medium, Exfiltration Over Usb, SPACESHIP copies staged data to removable drives when they are inserted into the system. T1052.001,Exfiltration Over Physical Medium, Exfiltration Over Usb, Tropic Trooper has exfiltrated data using USB storage devices. T1052.001,Exfiltration Over Physical Medium, Exfiltration Over Usb, USBStealer exfiltrates collected files via removable media from air-gapped victims. T1568.003,Dynamic Resolution, Dns Calculation,APT12 has used multiple variants of DNS Calculation including multiplying the first two octets of an IP address and adding the third octet to that value in order to get a resulting command and control port. T1568.003,Dynamic Resolution, Dns Calculation,Adversaries may perform calculations on addresses returned in DNS results to determine which port and IP address to use for command and control. T1568.003,Dynamic Resolution, Dns Calculation, Necurs also uses a a method of DNS calculation to determine the proper IP address of the C2 host. T1568.003,Dynamic Resolution, Dns Calculation, Mekotio uses an algorithm to modify the resolved IP address to obtain the actual C&C address. T1568.003,Dynamic Resolution, Dns Calculation, This malware uses a caclulation on the returned DNS data to find the correct C2 server to use. T1090.002,Proxy, External Proxy,APT28 used other victims as proxies to relay command traffic for instance using a compromised Georgian military email server as a hop point to NATO victims. The group has also used a tool that acts as a proxy to allow C2 even if the victim is behind a router. APT28 has also used a machine to relay and obscure communications between CHOPSTICK and their server. T1090.002,Proxy, External Proxy, An APT3 downloader establishes SOCKS5 connections for its initial C2. T1090.002,Proxy, External Proxy, APT39 has used various tools to proxy C2 communications. T1090.002,Proxy, External Proxy, FIN5 maintains access to victim environments by using FLIPSIDE to create a proxy for a backup RDP tunnel. T1090.002,Proxy, External Proxy, GALLIUM used a modified version of HTRAN to redirect connections between networks. T1090.002,Proxy, External Proxy, InvisiMole InvisiMole can identify proxy servers used by the victim and use them for C2 communication. T1090.002,Proxy, External Proxy, Lazarus Group uses multiple proxies to obfuscate network traffic from victims. T1090.002,Proxy, External Proxy, menuPass has used a global service provider's IP as a proxy for C2 traffic from a victim. T1090.002,Proxy, External Proxy, MuddyWater has controlled POWERSTATS from behind a proxy network to obfuscate the C2 location. MuddyWater has used a series of compromised websites that victims connected to randomly to relay information to command and control (C2). T1090.002,Proxy, External Proxy, Okrum can identify proxy servers configured and used by the victim and use it to make HTTP requests to C2 its server. T1090.002,Proxy, External Proxy, POWERSTATS has connected to C2 servers through proxies. T1090.002,Proxy, External Proxy, Regin leveraged several compromised universities as proxies to obscure its origin. T1090.002,Proxy, External Proxy, ShimRat can use pre-configured HTTP proxies. T1090.002,Proxy, External Proxy, Silence has used ProxyBot which allows the attacker to redirect traffic from the current node to the backconnect server via Sock4\Socks5. T1037.002,Boot or Logon Initialization Scripts, Logon Script (Mac),Adversaries may use macOS logon scripts automatically executed at logon initialization to establish persistence. T1037.002,Boot or Logon Initialization Scripts, Logon Script (Mac)," A login hook tells Mac OS X to execute a certain script when a user logs in, but unlike Startup Items, a login hook executes as the elevated root user. " T1037.002,Boot or Logon Initialization Scripts, Logon Script (Mac), Monitor logon scripts for unusual access by abnormal users or at abnormal times. T1037.002,Boot or Logon Initialization Scripts, Logon Script (Mac)," LoginHooks and LogoutHooks have been around for years and are rarely used these days, but are still a perfectly viable way of running a persistence script on macOS Mojave. " T1037.002,Boot or Logon Initialization Scripts, Logon Script (Mac), Access to login hook scripts may allow an adversary to insert additional malicious code. T1568.001,Dynamic Resolution, Fast Flux Dns,gh0st RAT operators have used dynamic DNS to mask the true location of their C2 behind rapidly changing IP addresses. T1568.001,Dynamic Resolution, Fast Flux Dns, menuPass has used dynamic DNS service providers to host malicious domains. T1568.001,Dynamic Resolution, Fast Flux Dns, njRAT has used a fast flux DNS for C2 IP resolution. T1568.001,Dynamic Resolution, Fast Flux Dns, TA505 has used fast flux to mask botnets by distributing payloads across multiple IPs. T1568.001,Dynamic Resolution, Fast Flux Dns,Adversaries may use Fast Flux DNS to hide a command and control channel behind an array of rapidly changing IP addresses linked to a single domain resolution. T1568.001,Dynamic Resolution, Fast Flux Dns, A researcher has published a blog identifying nameservers servicing malware command and control (C2) domains and providing Fast Flux DNS to the malicious botnets. T1548.004,Abuse Elevation Control Mechanism, Elevated Execution With Prompt,OSX/Shlayer can escalate privileges to root by asking the user for credentials. T1548.004,Abuse Elevation Control Mechanism, Elevated Execution With Prompt,Adversaries may leverage the AuthorizationExecuteWithPrivileges API to escalate privileges by prompting the user for credentials. T1548.004,Abuse Elevation Control Mechanism, Elevated Execution With Prompt," The software downloaded has a multi-stage installer that, once given authentication from the user, gathers system information and ultimately installs multiple adware programs as root. " T1548.004,Abuse Elevation Control Mechanism, Elevated Execution With Prompt," All infection vectors required user interaction at some level in order to compromise the host, including installation of software packages and authentication. " T1548.004,Abuse Elevation Control Mechanism, Elevated Execution With Prompt, The downloaded installer is designed to look like a legitimate installation to trick the user into authenticating with their password to continue the second stage infection. T1548.003,Abuse Elevation Control Mechanism, Sudo And Sudo Caching,Proton modifies the tty_tickets line in the sudoers file. T1548.003,Abuse Elevation Control Mechanism, Sudo And Sudo Caching,Adversaries may perform sudo caching and/or use the suoders file to elevate privileges. T1548.003,Abuse Elevation Control Mechanism, Sudo And Sudo Caching," However, the sudoers file can also specify when to not prompt users for passwords. " T1548.003,Abuse Elevation Control Mechanism, Sudo And Sudo Caching," Within Linux and MacOS systems, sudo (sometimes referred to as ""superuser do"") allows users to perform commands from terminals with elevated privileges and to control who can perform these commands on the system. " T1548.003,Abuse Elevation Control Mechanism, Sudo And Sudo Caching," Adversaries can leverage initial access and elevate privileges using sudo caching, which leverages the time between when sudo can be used without authentication after a previous authenticated call. " T1548.001,Abuse Elevation Control Mechanism, Setuid And Setgid,Exaramel for Linux can execute commands with high privileges via a specific binary with setuid functionality. T1548.001,Abuse Elevation Control Mechanism, Setuid And Setgid, Keydnap adds the setuid flag to a binary so it can easily elevate in the future. T1548.001,Abuse Elevation Control Mechanism, Setuid And Setgid,An adversary may perform shell escapes or exploit vulnerabilities in an application with the setsuid or setgid bits to get code running in a different usercontext. T1548.001,Abuse Elevation Control Mechanism, Setuid And Setgid," Instead of creating an entry in the sudoers file, which must be done by root, any user can specify the setuid or setgid flag to be set for their own applications. " T1548.001,Abuse Elevation Control Mechanism, Setuid And Setgid, An additional binary was identified with SetUID functionalities on the path /bin/backup. It offers the execution of a list of commands with high privileges. The decompiled code is noted below. T1102.003,Web Service, One,EVILNUM has used a one-way communication method via GitLab and Digital Point to perform C2. T1102.003,Web Service, One," The tDiscoverer"" variant of HAMMERTOSS establishes a C2 channel by downloading resources from Web services like Twitter and GitHub. HAMMERTOSS binaries contain an algorithm that generates a different Twitter handle for the malware to check for instructions every day. " T1102.003,Web Service, One, Leviathan has received C2 instructions from user profiles created on legitimate websites such as Github and TechNet. T1102.003,Web Service, One, Metamorfo has downloaded a zip file for execution on the system. T1102.003,Web Service, One," OnionDuke uses Twitter as a backup C2.""" T1102.002,Web Service, Bidirectional Communication,APT12 has used blogs and WordPress for C2 infrastructure. T1102.002,Web Service, Bidirectional Communication, APT28 has used Google Drive for C2. T1102.002,Web Service, Bidirectional Communication, APT29 has used social media platforms to hide communications to C2 servers. T1102.002,Web Service, Bidirectional Communication, APT37 leverages social networking sites and cloud platforms (AOL Twitter Yandex Mediafire pCloud Dropbox and Box) for C2. T1102.002,Web Service, Bidirectional Communication, APT39 has communicated with C2 through files uploaded to and downloaded from DropBox. T1102.002,Web Service, Bidirectional Communication, BADNEWS can use multiple C2 channels including RSS feeds Github forums and blogs. T1102.002,Web Service, Bidirectional Communication, BLACKCOFFEE has also obfuscated its C2 traffic as normal traffic to sites such as Github. T1102.002,Web Service, Bidirectional Communication, The CALENDAR malware communicates through the use of events in Google Calendar. T1102.002,Web Service, Bidirectional Communication," Carbanak has used a VBScript named ggldr"" that uses Google Apps Script Sheets and Forms services for C2. " T1102.002,Web Service, Bidirectional Communication, One variant of CloudDuke uses a Microsoft OneDrive account to exchange commands and stolen data with its operators. T1102.002,Web Service, Bidirectional Communication, Comnie uses blogs and third-party sites (GitHub tumbler and BlogSpot) to avoid DNS-based blocking of their communication to the command and control server. T1102.002,Web Service, Bidirectional Communication, ComRAT has the ability to use the Gmail web UI to receive commands and exfiltrate information. T1102.002,Web Service, Bidirectional Communication, CozyCar uses Twitter as a backup C2 channel to Twitter accounts specified in its configuration file. T1102.002,Web Service, Bidirectional Communication, Crutch can use Dropbox to receive commands and upload stolen data. T1102.002,Web Service, Bidirectional Communication, DOGCALL is capable of leveraging cloud storage APIs such as Cloud Box Dropbox and Yandex for C2. T1102.002,Web Service, Bidirectional Communication, Empire can use Dropbox and GitHub for C2. T1102.002,Web Service, Bidirectional Communication, FIN7 used legitimate services like Google Docs Google Scripts and Pastebin for C2. T1102.002,Web Service, Bidirectional Communication, GLOOXMAIL communicates to servers operated by Google using the Jabber/XMPP protocol. T1102.002,Web Service, Bidirectional Communication, Grandoreiro can utilize web services including Google sites to send and receive C2 data. T1102.002,Web Service, Bidirectional Communication, KARAE can use public cloud-based storage providers for command and control. T1102.002,Web Service, Bidirectional Communication, Kazuar has used compromised WordPress blogs as C2 servers. T1102.002,Web Service, Bidirectional Communication, LOWBALL uses the Dropbox cloud storage service for command and control. T1102.002,Web Service, Bidirectional Communication, Magic Hound malware can use a SOAP Web service to communicate with its C2 server. T1102.002,Web Service, Bidirectional Communication, MuddyWater has used web services including OneHub to distribute remote access tools. T1102.002,Web Service, Bidirectional Communication, Orz has used Technet and Pastebin web pages for command and control. T1102.002,Web Service, Bidirectional Communication, POORAIM has used AOL Instant Messenger for C2. T1102.002,Web Service, Bidirectional Communication, PowerStallion uses Microsoft OneDrive as a C2 server via a network drive mapped with net use. T1102.002,Web Service, Bidirectional Communication, RegDuke can use Dropbox as its C2 server. T1102.002,Web Service, Bidirectional Communication, Revenge RAT used blogpost.com as its primary command and control server during a campaign. T1102.002,Web Service, Bidirectional Communication, RogueRobin has used Google Drive as a Command and Control channel. T1102.002,Web Service, Bidirectional Communication, ROKRAT leverages legitimate social networking sites and cloud platforms (Twitter Yandex and Mediafire) for C2 communications. T1102.002,Web Service, Bidirectional Communication, Sandworm Team has used the Telegram Bot API from Telegram Messenger to send and receive commands to its Python backdoor. Sandworm Team also used legitimate M.E.Doc software update check requests for sending and receiving commands and hosted malicious payloads on putdrive.com. T1102.002,Web Service, Bidirectional Communication, SLOWDRIFT uses cloud based services for C2. T1102.002,Web Service, Bidirectional Communication, A Turla JavaScript backdoor has used Google Apps Script as its C2 server. T1102.002,Web Service, Bidirectional Communication, UBoatRAT has used GitHub and a public blog service in Hong Kong for C2 communications. T1102.002,Web Service, Bidirectional Communication, yty communicates to the C2 server by retrieving a Google Doc. T1102.002,Web Service, Bidirectional Communication," ZIRCONIUM has used Dropbox for C2 allowing upload and download of files as well as execution of arbitrary commands.""" T1102.001,Web Service, Dead Drop Resolver,APT41 used legitimate websites for C2 through dead drop resolvers (DDR) including GitHub Pastebin and Microsoft TechNet. T1102.001,Web Service, Dead Drop Resolver, Astaroth can store C2 information on cloud hosting services such as AWS and CloudFlare and websites like YouTube and Facebook. T1102.001,Web Service, Dead Drop Resolver, BADNEWS collects C2 information via a dead drop resolver. T1102.001,Web Service, Dead Drop Resolver, BLACKCOFFEE uses MicrosoftTechNet Web portal to obtain a dead drop resolver containing an encoded tag with the IP address of a command and control server. T1102.001,Web Service, Dead Drop Resolver, BRONZE BUTLER's MSGET downloader uses a dead drop resolver to access malicious payloads. T1102.001,Web Service, Dead Drop Resolver, Grandoreiro can obtain C2 information from Google Docs. T1102.001,Web Service, Dead Drop Resolver, Javali can read C2 information from Google Documents and YouTube. T1102.001,Web Service, Dead Drop Resolver, Some MiniDuke components use Twitter to initially obtain the address of a C2 server or as a backup if no hard-coded C2 server responds. T1102.001,Web Service, Dead Drop Resolver, Patchwork hides base64-encoded and encrypted C2 server locations in comments on legitimate websites. T1102.001,Web Service, Dead Drop Resolver, PlugX uses Pastebin to store C2 addresses. T1102.001,Web Service, Dead Drop Resolver, PolyglotDuke can use Twitter Reddit Imgur and other websites to get a C2 URL. T1102.001,Web Service, Dead Drop Resolver, Rocke has used Pastebin to check the version of beaconing malware and redirect to another Pastebin hosting updated malware. T1102.001,Web Service, Dead Drop Resolver, RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names. T1102.001,Web Service, Dead Drop Resolver, RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names. RTM has also hidden Pony C2 server IP addresses within transactions on the Bitcoin and Namecoin blockchain. T1102.001,Web Service, Dead Drop Resolver, Xbash can obtain a webpage hosted on Pastebin to update its C2 domain list. T1134.001,Access Token Manipulation, Token Impersonation/Theft,APT28 has used CVE-2015-1701 to access the SYSTEM token and copy it into the current process as part of privilege escalation. T1134.001,Access Token Manipulation, Token Impersonation/Theft, Aria-body has the ability to duplicate a token from ntprint.exe. T1134.001,Access Token Manipulation, Token Impersonation/Theft, BitPaymer can use the tokens of users to create processes on infected systems. T1134.001,Access Token Manipulation, Token Impersonation/Theft, Cobalt Strike can steal access tokens from exiting processes. T1134.001,Access Token Manipulation, Token Impersonation/Theft, FinFisher uses token manipulation with NtFilterToken as part of UAC bypass. T1134.001,Access Token Manipulation, Token Impersonation/Theft, Okrum can impersonate a logged-on user's security context using a call to the ImpersonateLoggedOnUser API. T1134.001,Access Token Manipulation, Token Impersonation/Theft, Pupy can obtain a list of SIDs and provide the option for selecting process tokens to impersonate. T1134.001,Access Token Manipulation, Token Impersonation/Theft, REvil can obtain the token from the user that launched the explorer.exe process to avoid affecting the desktop of the SYSTEM user. T1134.001,Access Token Manipulation, Token Impersonation/Theft, Shamoon can impersonate tokens using LogonUser ImpersonateLoggedOnUser and ImpersonateNamedPipeClient. T1134.002,Access Token Manipulation, Create Process With Token,Aria-body has the ability to execute a process using runas. T1134.002,Access Token Manipulation, Create Process With Token, Azorult can call WTSQueryUserToken and CreateProcessAsUser to start a new process with local system privileges. T1134.002,Access Token Manipulation, Create Process With Token, Bankshot grabs a user token using WTSQueryUserToken and then creates a process by impersonating a logged-on user. T1134.002,Access Token Manipulation, Create Process With Token, Empire can use Invoke-RunAs to make tokens. T1134.002,Access Token Manipulation, Create Process With Token, KONNI has duplicated the token of a high integrity process to spawn an instance of cmd.exe under an impersonated user. T1134.002,Access Token Manipulation, Create Process With Token, Lazarus Group keylogger KiloAlfa obtains user tokens from interactive sessions to execute itself with API call CreateProcessAsUserA under that user's context. T1134.002,Access Token Manipulation, Create Process With Token, PipeMon can attempt to gain administrative privileges using token impersonation. T1134.002,Access Token Manipulation, Create Process With Token, PoshC2 can use Invoke-RunAs to make tokens. T1134.002,Access Token Manipulation, Create Process With Token, REvil can launch an instance of itself with administrative rights using runas. T1134.002,Access Token Manipulation, Create Process With Token, Turla RPC backdoors can impersonate or steal process tokens before executing commands. T1134.002,Access Token Manipulation, Create Process With Token, ZxShell has a command called RunAs which creates a new process as another user or process context. T1573.001,Encrypted Channel, Symmetric Cryptography,3PARA RAT command and control commands are encrypted within the HTTP C2 channel using the DES algorithm in CBC mode with a key derived from the MD5 hash of the string HYF54&%9&jkMCXuiS. 3PARA RAT will use an 8-byte XOR key derived from the string HYF54&%9&jkMCXuiS if the DES decoding fails T1573.001,Encrypted Channel, Symmetric Cryptography, 4H RAT obfuscates C2 communication using a 1-byte XOR with the key 0xBE. T1573.001,Encrypted Channel, Symmetric Cryptography, A variant of ADVSTORESHELL encrypts some C2 with 3DES. T1573.001,Encrypted Channel, Symmetric Cryptography, APT28 installed a Delphi backdoor that used a custom algorithm for C2 communications. T1573.001,Encrypted Channel, Symmetric Cryptography, APT33 has used AES for encryption of command and control traffic. T1573.001,Encrypted Channel, Symmetric Cryptography, Attor has encrypted data symmetrically using a randomly generated Blowfish (OFB) key which is encrypted with a public RSA key. T1573.001,Encrypted Channel, Symmetric Cryptography, Azorult can encrypt C2 traffic using XOR. T1573.001,Encrypted Channel, Symmetric Cryptography, BADCALL encrypts C2 traffic using an XOR/ADD cipher. T1573.001,Encrypted Channel, Symmetric Cryptography, BADNEWS encrypts C2 data with a ROR by 3 and an XOR by 0x23. T1573.001,Encrypted Channel, Symmetric Cryptography, Bazar can send C2 communications with XOR encryption. T1573.001,Encrypted Channel, Symmetric Cryptography, BBSRAT uses a custom encryption algorithm on data sent back to the C2 server over HTTP. T1573.001,Encrypted Channel, Symmetric Cryptography, BendyBear communicates to a C2 server over port 443 using modified RC4 and XOR-encrypted chunks. T1573.001,Encrypted Channel, Symmetric Cryptography, Bisonal variants reported on in 2014 and 2015 used a simple XOR cipher for C2. Some Bisonal samples encrypt C2 communications with RC4. T1573.001,Encrypted Channel, Symmetric Cryptography, BLINDINGCAN has encrypted its C2 traffic with RC4. T1573.001,Encrypted Channel, Symmetric Cryptography, Bonadan can XOR-encrypt C2 communications. T1573.001,Encrypted Channel, Symmetric Cryptography, BRONZE BUTLER has used RC4 encryption (for Datper malware) and AES (for xxmm malware) to obfuscate HTTP traffic. BRONZE BUTLER has also used a tool called RarStar that encodes data with a custom XOR algorithm when posting it to a C2 server. T1573.001,Encrypted Channel, Symmetric Cryptography, CallMe uses AES to encrypt C2 traffic. T1573.001,Encrypted Channel, Symmetric Cryptography, Carbanak encrypts the message body of HTTP traffic with RC2 (in CBC mode). Carbanak also uses XOR with random keys for its communications. T1573.001,Encrypted Channel, Symmetric Cryptography, Cardinal RAT uses a secret key with a series of XOR and addition operations to encrypt C2 traffic. T1573.001,Encrypted Channel, Symmetric Cryptography, Chaos provides a reverse shell connection on 8338/TCP encrypted via AES. T1573.001,Encrypted Channel, Symmetric Cryptography, ChChes can encrypt C2 traffic with AES or RC4. T1573.001,Encrypted Channel, Symmetric Cryptography, CHOPSTICK encrypts C2 communications with RC4. T1573.001,Encrypted Channel, Symmetric Cryptography, Cobalt Strike has the ability to use AES-256 symmetric encryption in CBC mode with HMAC-SHA-256 to encrypt task commands and XOR to encrypt shell code and configuration data. T1573.001,Encrypted Channel, Symmetric Cryptography, Comnie encrypts command and control communications with RC4. T1573.001,Encrypted Channel, Symmetric Cryptography, CORESHELL C2 messages are encrypted with custom stream ciphers using six-byte or eight-byte keys. T1573.001,Encrypted Channel, Symmetric Cryptography, CosmicDuke contains a custom version of the RC4 algorithm that includes a programming error. T1573.001,Encrypted Channel, Symmetric Cryptography, Darkhotel has used AES-256 and 3DES for C2 communications. T1573.001,Encrypted Channel, Symmetric Cryptography, Daserf uses RC4 encryption to obfuscate HTTP traffic. T1573.001,Encrypted Channel, Symmetric Cryptography, Derusbi obfuscates C2 traffic with variable 4-byte XOR keys. T1573.001,Encrypted Channel, Symmetric Cryptography, Dipsind encrypts C2 data with AES256 in ECB mode. T1573.001,Encrypted Channel, Symmetric Cryptography, down_new has the ability to AES encrypt C2 communications. T1573.001,Encrypted Channel, Symmetric Cryptography, Downdelph uses RC4 to encrypt C2 responses. T1573.001,Encrypted Channel, Symmetric Cryptography, Dridex has encrypted traffic with RC4. T1573.001,Encrypted Channel, Symmetric Cryptography, The Duqu command and control protocol's data stream can be encrypted with AES-CBC. T1573.001,Encrypted Channel, Symmetric Cryptography, Ebury has encrypted C2 traffic using the client IP address then encoded it as a hexadecimal string. T1573.001,Encrypted Channel, Symmetric Cryptography, Elise encrypts exfiltrated data with RC4. T1573.001,Encrypted Channel, Symmetric Cryptography, The C2 server response to a beacon sent by a variant of Emissary contains a 36-character GUID value that is used as an encryption key for subsequent network communications. Some variants of Emissary use various XOR operations to encrypt C2 data. T1573.001,Encrypted Channel, Symmetric Cryptography, Epic encrypts commands from the C2 server using a hardcoded key. T1573.001,Encrypted Channel, Symmetric Cryptography, Explosive has encrypted communications with the RC4 method. T1573.001,Encrypted Channel, Symmetric Cryptography, The original variant of FakeM encrypts C2 traffic using a custom encryption cipher that uses an XOR key ofYHCRA and bit rotation between each XOR operation. Some variants of FakeM use RC4 to encrypt C2 traffic. T1573.001,Encrypted Channel, Symmetric Cryptography, FALLCHILL encrypts C2 data with RC4 encryption. T1573.001,Encrypted Channel, Symmetric Cryptography, FatDuke can AES encrypt C2 communications. T1573.001,Encrypted Channel, Symmetric Cryptography, Some Felismus samples use a custom encryption method for C2 traffic that utilizes AES and multiple keys. T1573.001,Encrypted Channel, Symmetric Cryptography, FlawedAmmyy has used SEAL encryption during the initial C2 handshake. T1573.001,Encrypted Channel, Symmetric Cryptography, Frankenstein has communicated with a C2 via an encrypted RC4 byte stream and AES-CBC. T1573.001,Encrypted Channel, Symmetric Cryptography, Gazer uses custom encryption for C2 that uses 3DES. T1573.001,Encrypted Channel, Symmetric Cryptography, gh0st RAT uses RC4 and XOR to encrypt C2 traffic. T1573.001,Encrypted Channel, Symmetric Cryptography, GreyEnergy encrypts communications using AES256. T1573.001,Encrypted Channel, Symmetric Cryptography, H1N1 encrypts C2 traffic using an RC4 key. T1573.001,Encrypted Channel, Symmetric Cryptography, Before being appended to image files HAMMERTOSS commands are encrypted with a key composed of both a hard-coded value and a string contained on that day's tweet. To decrypt the commands an investigator would need access to the intended malware sample the day's tweet and the image file containing the command. T1573.001,Encrypted Channel, Symmetric Cryptography, Helminth encrypts data sent to its C2 server over HTTP with RC4. T1573.001,Encrypted Channel, Symmetric Cryptography, Hi-Zor encrypts C2 traffic with a double XOR using two distinct single-byte keys. T1573.001,Encrypted Channel, Symmetric Cryptography, HiddenWasp uses an RC4-like algorithm with an already computed PRGA generated key-stream for network communication. T1573.001,Encrypted Channel, Symmetric Cryptography, Higaisa used AES-128 to encrypt C2 traffic. T1573.001,Encrypted Channel, Symmetric Cryptography, Hikit performs XOR encryption. T1573.001,Encrypted Channel, Symmetric Cryptography, HotCroissant has compressed network communications and encrypted them with a custom stream cipher. T1573.001,Encrypted Channel, Symmetric Cryptography, httpclient encrypts C2 content with XOR using a single byte 0x12. T1573.001,Encrypted Channel, Symmetric Cryptography, Hydraq C2 traffic is encrypted using bitwise NOT and XOR operations. T1573.001,Encrypted Channel, Symmetric Cryptography, HyperStack has used RSA encryption for C2 communications. T1573.001,Encrypted Channel, Symmetric Cryptography, Inception has encrypted network communications with AES. T1573.001,Encrypted Channel, Symmetric Cryptography, InvisiMole uses variations of a simple XOR encryption routine for C&C communications. T1573.001,Encrypted Channel, Symmetric Cryptography, KEYMARBLE uses a customized XOR algorithm to encrypt C2 communications. T1573.001,Encrypted Channel, Symmetric Cryptography, The Komplex C2 channel uses an 11-byte XOR algorithm to hide data. T1573.001,Encrypted Channel, Symmetric Cryptography, Several Lazarus Group malware families encrypt C2 traffic using custom code that uses XOR with an ADD operation and XOR with a SUB operation. Another Lazarus Group malware sample XORs C2 traffic. Other Lazarus Group malware uses Caracachs encryption to encrypt C2 payloads. T1573.001,Encrypted Channel, Symmetric Cryptography, LightNeuron uses AES to encrypt C2 traffic. T1573.001,Encrypted Channel, Symmetric Cryptography, LookBack uses a modified version of RC4 for data transfer. T1573.001,Encrypted Channel, Symmetric Cryptography, Lucifer can perform a decremental-xor encryption on the initial C2 request before sending it over the wire. T1573.001,Encrypted Channel, Symmetric Cryptography, Lurid performs XOR encryption. T1573.001,Encrypted Channel, Symmetric Cryptography, Machete has used AES to exfiltrate documents. T1573.001,Encrypted Channel, Symmetric Cryptography, MoonWind encrypts C2 traffic using RC4 with a static key. T1573.001,Encrypted Channel, Symmetric Cryptography, More_eggs has used an RC4-based encryption method for its C2 communications. T1573.001,Encrypted Channel, Symmetric Cryptography, Mosquito uses a custom encryption algorithm which consists of XOR and a stream that is similar to the Blum Blum Shub algorithm. T1573.001,Encrypted Channel, Symmetric Cryptography, Mustang Panda has encrypted C2 communications with RC4. T1573.001,Encrypted Channel, Symmetric Cryptography, NanoCore uses DES to encrypt the C2 traffic. T1573.001,Encrypted Channel, Symmetric Cryptography, NDiskMonitor uses AES to encrypt certain information sent over its C2 channel. T1573.001,Encrypted Channel, Symmetric Cryptography," NETEAGLE will decrypt resources it downloads with HTTP requests by using RC4 with the key ScoutEagle."" " T1573.001,Encrypted Channel, Symmetric Cryptography, NETWIRE can use AES encryption for C2 data transferred. T1573.001,Encrypted Channel, Symmetric Cryptography, Okrum uses AES to encrypt network traffic. The key can be hardcoded or negotiated with the C2 server in the registration phase. T1573.001,Encrypted Channel, Symmetric Cryptography, PipeMon communications are RC4 encrypted. T1573.001,Encrypted Channel, Symmetric Cryptography, PLAINTEE encodes C2 beacons using XOR. T1573.001,Encrypted Channel, Symmetric Cryptography, PLEAD has used RC4 encryption to download modules. T1573.001,Encrypted Channel, Symmetric Cryptography, PoisonIvy uses the Camellia cipher to encrypt communications. T1573.001,Encrypted Channel, Symmetric Cryptography, POWERTON has used AES for encrypting C2 traffic. T1573.001,Encrypted Channel, Symmetric Cryptography, Prikormka encrypts some C2 traffic with the Blowfish cipher. T1573.001,Encrypted Channel, Symmetric Cryptography, QuasarRAT uses AES to encrypt network communication. T1573.001,Encrypted Channel, Symmetric Cryptography, RDAT has used AES ciphertext to encode C2 communications. T1573.001,Encrypted Channel, Symmetric Cryptography, RedLeaves has encrypted C2 traffic with RC4 previously using keys of 88888888 and babybear. T1573.001,Encrypted Channel, Symmetric Cryptography, Rifdoor has encrypted command and control (C2) communications with a stream cipher. T1573.001,Encrypted Channel, Symmetric Cryptography, APT12 has used the RIPTIDE RAT which communicates over HTTP with a payload encrypted with RC4. T1573.001,Encrypted Channel, Symmetric Cryptography, RTM encrypts C2 traffic with a custom RC4 variant. T1573.001,Encrypted Channel, Symmetric Cryptography, Sakula encodes C2 traffic with single-byte XOR keys. T1573.001,Encrypted Channel, Symmetric Cryptography, SeaDuke C2 traffic has been encrypted with RC4 and AES. T1573.001,Encrypted Channel, Symmetric Cryptography, SNUGRIDE encrypts C2 traffic using AES with a static key. T1573.001,Encrypted Channel, Symmetric Cryptography, Stealth Falcon malware encrypts C2 traffic using RC4 with a hard-coded key. T1573.001,Encrypted Channel, Symmetric Cryptography, SUNBURST encrypted C2 traffic using a single-byte-XOR cipher. T1573.001,Encrypted Channel, Symmetric Cryptography, Sys10 uses an XOR 0x1 loop to encrypt its C2 domain. T1573.001,Encrypted Channel, Symmetric Cryptography, Taidoor uses RC4 to encrypt the message body of HTTP content. T1573.001,Encrypted Channel, Symmetric Cryptography, TAINTEDSCRIBE uses a Linear Feedback Shift Register (LFSR) algorithm for network encryption. T1573.001,Encrypted Channel, Symmetric Cryptography, TrickBot uses a custom crypter leveraging Microsoft™s CryptoAPI to encrypt C2 traffic. T1573.001,Encrypted Channel, Symmetric Cryptography, TSCookie has encrypted network communications with RC4. T1573.001,Encrypted Channel, Symmetric Cryptography, Some versions of UPPERCUT have used the hard-coded stringthis is the encrypt key for Blowfish encryption when communicating with a C2. Later versions have hard-coded keys uniquely for each C2 address. T1573.001,Encrypted Channel, Symmetric Cryptography, Volgmer uses a simple XOR cipher to encrypt traffic and files. T1573.001,Encrypted Channel, Symmetric Cryptography, WellMess can encrypt HTTP POST data using RC6 and a dynamically generated AES key encrypted with a hard coded RSA public key. T1573.001,Encrypted Channel, Symmetric Cryptography, Winnti for Linux has used a custom TCP protocol with four-byte XOR for command and control (C2). T1573.001,Encrypted Channel, Symmetric Cryptography, ZeroT has used RC4 to encrypt C2 traffic. T1573.001,Encrypted Channel, Symmetric Cryptography," ZIRCONIUM has used AES encrypted communications in C2.""" T1071.001,Application Layer Protocol, Web Protocols,3PARA RAT uses HTTP for command and control. T1071.001,Application Layer Protocol, Web Protocols, 4H RAT uses HTTP for command and control. T1071.001,Application Layer Protocol, Web Protocols, ABK has the ability to use HTTP in communications with C2. T1071.001,Application Layer Protocol, Web Protocols, ADVSTORESHELL connects to port 80 of a C2 server using Wininet API. Data is exchanged via HTTP POSTs. T1071.001,Application Layer Protocol, Web Protocols, Agent Tesla has used HTTP for C2 communications. T1071.001,Application Layer Protocol, Web Protocols, Anchor has used HTTP and HTTPS in C2 communications. T1071.001,Application Layer Protocol, Web Protocols, AppleJeus has sent data to its C2 server via POST requests. T1071.001,Application Layer Protocol, Web Protocols, APT18 uses HTTP for C2 communications. T1071.001,Application Layer Protocol, Web Protocols, APT19 used HTTP for C2 communications. APT19 also used an HTTP malware variant to communicate over HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, Later implants used by APT28 such as CHOPSTICK use a blend of HTTP and other legitimate channels for C2 depending on module configuration. T1071.001,Application Layer Protocol, Web Protocols, APT29 has used HTTP for C2 and data exfiltration. T1071.001,Application Layer Protocol, Web Protocols, APT32 has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. The group has also used downloaded encrypted payloads over HTTP. T1071.001,Application Layer Protocol, Web Protocols, APT33 has used HTTP for command and control. T1071.001,Application Layer Protocol, Web Protocols, APT37 uses HTTPS to conceal C2 communications. T1071.001,Application Layer Protocol, Web Protocols, APT38 used a backdoor QUICKRIDE to communicate to the C2 server over HTTP and HTTPS. T1071.001,Application Layer Protocol, Web Protocols, APT39 has used HTTP in communications with C2. T1071.001,Application Layer Protocol, Web Protocols, APT41 used HTTP to download payloads for CVE-2019-19781 and CVE-2020-10189 exploits. T1071.001,Application Layer Protocol, Web Protocols, Aria-body has used HTTP in C2 communications. T1071.001,Application Layer Protocol, Web Protocols, Avenger has the ability to use HTTP in communication with C2. T1071.001,Application Layer Protocol, Web Protocols, BackConfig has the ability to use HTTPS for C2 communiations. T1071.001,Application Layer Protocol, Web Protocols, BACKSPACE uses HTTP as a transport to communicate with its command server. T1071.001,Application Layer Protocol, Web Protocols, BADNEWS establishes a backdoor over HTTP. T1071.001,Application Layer Protocol, Web Protocols, BadPatch uses HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, Bankshot uses HTTP for command and control communication. T1071.001,Application Layer Protocol, Web Protocols, Bazar can use HTTP and HTTPS over ports 80 and 443 in C2 communications. T1071.001,Application Layer Protocol, Web Protocols, BBK has the ability to use HTTP in communications with C2. T1071.001,Application Layer Protocol, Web Protocols, BBSRAT uses GET and POST requests over HTTP or HTTPS for command and control to obtain commands and send ZLIB compressed data back to the C2 server. T1071.001,Application Layer Protocol, Web Protocols, Bisonal uses HTTP for C2 communications. T1071.001,Application Layer Protocol, Web Protocols, BlackEnergy communicates with its C2 server over HTTP. T1071.001,Application Layer Protocol, Web Protocols, BlackMould can send commands to C2 in the body of HTTP POST requests. T1071.001,Application Layer Protocol, Web Protocols, BLINDINGCAN has used HTTPS over port 443 for command and control. T1071.001,Application Layer Protocol, Web Protocols, BRONZE BUTLER malware has used HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, BUBBLEWRAP can communicate using HTTP or HTTPS. T1071.001,Application Layer Protocol, Web Protocols, Bundlore uses HTTP requests for C2. T1071.001,Application Layer Protocol, Web Protocols, The Carbanak malware communicates to its command server using HTTP with an encrypted payload. T1071.001,Application Layer Protocol, Web Protocols, Carberp has connected to C2 servers via HTTP. T1071.001,Application Layer Protocol, Web Protocols, Carbon can use HTTP in C2 communications. T1071.001,Application Layer Protocol, Web Protocols, Cardinal RAT is downloaded using HTTP over port 443. T1071.001,Application Layer Protocol, Web Protocols, ChChes communicates to its C2 server over HTTP and embeds data within the Cookie HTTP header. T1071.001,Application Layer Protocol, Web Protocols, Chimera has used HTTPS for C2 communications. T1071.001,Application Layer Protocol, Web Protocols, China Chopper's server component executes code sent via HTTP POST commands. T1071.001,Application Layer Protocol, Web Protocols, Various implementations of CHOPSTICK communicate with C2 over HTTP. T1071.001,Application Layer Protocol, Web Protocols, One variant of CloudDuke uses HTTP and HTTPS for C2. T1071.001,Application Layer Protocol, Web Protocols, Cobalt Group has used HTTPS for C2. T1071.001,Application Layer Protocol, Web Protocols, Cobalt Strike can use a custom command and control protocol that can be encapsulated in HTTP or HTTPS. All protocols use their standard assigned ports. T1071.001,Application Layer Protocol, Web Protocols, Comnie uses HTTP for C2 communication. T1071.001,Application Layer Protocol, Web Protocols, ComRAT has used HTTP requests for command and control. T1071.001,Application Layer Protocol, Web Protocols, CORESHELL can communicate over HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, CosmicDuke can use HTTP or HTTPS for command and control to hard-coded C2 servers. T1071.001,Application Layer Protocol, Web Protocols, CozyCar's main method of communicating with its C2 servers is using HTTP or HTTPS. T1071.001,Application Layer Protocol, Web Protocols, Crutch has conducted C2 communications with a Dropbox account using the HTTP API. T1071.001,Application Layer Protocol, Web Protocols, CSPY Downloader can use GET requests to download additional payloads from C2. T1071.001,Application Layer Protocol, Web Protocols, Dacls can use HTTPS in C2 communications. T1071.001,Application Layer Protocol, Web Protocols, Dark Caracal's version of Bandook communicates with their server over a TCP port using HTTP payloads Base64 encoded and suffixed with the string&&&. T1071.001,Application Layer Protocol, Web Protocols, DarkComet can use HTTP for C2 communications. T1071.001,Application Layer Protocol, Web Protocols, Daserf uses HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, DealersChoice uses HTTP for communication with the C2 server. T1071.001,Application Layer Protocol, Web Protocols, Dipsind uses HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, Doki has communicated with C2 over HTTPS. T1071.001,Application Layer Protocol, Web Protocols, down_new has the ability to use HTTP in C2 communications. T1071.001,Application Layer Protocol, Web Protocols, DownPaper communicates to its C2 server over HTTP. T1071.001,Application Layer Protocol, Web Protocols, Dridex has used HTTPS for C2 communications. T1071.001,Application Layer Protocol, Web Protocols, Drovorub can use the WebSocket protocol and has initiated communication with C2 servers with an HTTP Upgrade request. T1071.001,Application Layer Protocol, Web Protocols, DustySky has used both HTTP and HTTPS for C2. T1071.001,Application Layer Protocol, Web Protocols, Dyre uses HTTPS for C2 communications. T1071.001,Application Layer Protocol, Web Protocols, Egregor has communicated with its C2 servers via HTTPS protocol. T1071.001,Application Layer Protocol, Web Protocols, Elise communicates over HTTP or HTTPS for C2. T1071.001,Application Layer Protocol, Web Protocols, ELMER uses HTTP for command and control. T1071.001,Application Layer Protocol, Web Protocols, Emissary uses HTTP or HTTPS for C2. T1071.001,Application Layer Protocol, Web Protocols, Empire can conduct command and control over protocols like HTTP and HTTPS. T1071.001,Application Layer Protocol, Web Protocols, Epic uses HTTP and HTTPS for C2 communications. T1071.001,Application Layer Protocol, Web Protocols, EvilBunny has executed C2 commands directly via HTTP. T1071.001,Application Layer Protocol, Web Protocols, Exaramel for Linux uses HTTPS for C2 communications. T1071.001,Application Layer Protocol, Web Protocols, Explosive has used HTTP for communication. T1071.001,Application Layer Protocol, Web Protocols, FatDuke can be controlled via a custom C2 protocol over HTTP. T1071.001,Application Layer Protocol, Web Protocols, Felismus uses HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, FELIXROOT uses HTTP and HTTPS to communicate with the C2 server. T1071.001,Application Layer Protocol, Web Protocols, FIN4 has used HTTP POST requests to transmit data. T1071.001,Application Layer Protocol, Web Protocols, Final1stspy uses HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, FlawedAmmyy has used HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, A Gamaredon Group file stealer can communicate over HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, Gazer communicates with its C2 servers over HTTP. T1071.001,Application Layer Protocol, Web Protocols, GeminiDuke uses HTTP and HTTPS for command and control. T1071.001,Application Layer Protocol, Web Protocols, Get2 has the ability to use HTTP to send information collected from an infected host to C2. T1071.001,Application Layer Protocol, Web Protocols, Gold Dragon uses HTTP for communication to the control servers. T1071.001,Application Layer Protocol, Web Protocols, GoldenSpy has used the Ryeol HTTP Client to facilitate HTTP internet communication. T1071.001,Application Layer Protocol, Web Protocols, GoldFinder has used HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, GoldMax has used HTTPS and HTTP GET requests with custom HTTP cookies for C2. T1071.001,Application Layer Protocol, Web Protocols, Goopy has the ability to communicate with its C2 over HTTP. T1071.001,Application Layer Protocol, Web Protocols, Grandoreiro has the ability to use HTTP in C2 communications. T1071.001,Application Layer Protocol, Web Protocols, GravityRAT uses HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, GreyEnergy uses HTTP and HTTPS for C2 communications. T1071.001,Application Layer Protocol, Web Protocols, GuLoader can use HTTP to retrieve additional binaries. T1071.001,Application Layer Protocol, Web Protocols, HAFNIUM has used open-source C2 frameworks including Covenant. T1071.001,Application Layer Protocol, Web Protocols," The Uploader"" variant of HAMMERTOSS visits a hard-coded server over HTTP/S to download the images HAMMERTOSS uses to receive commands. " T1071.001,Application Layer Protocol, Web Protocols, HAWKBALL has used HTTP to communicate with a single hard-coded C2 server. T1071.001,Application Layer Protocol, Web Protocols, Helminth can use HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, Hi-Zor communicates with its C2 server over HTTPS. T1071.001,Application Layer Protocol, Web Protocols, Higaisa used HTTP and HTTPS to send data back to its C2 server. T1071.001,Application Layer Protocol, Web Protocols, Hikit has used HTTP for C2. T1071.001,Application Layer Protocol, Web Protocols, HTTPBrowser has used HTTP and HTTPS for command and control. T1071.001,Application Layer Protocol, Web Protocols, httpclient uses HTTP for command and control. T1071.001,Application Layer Protocol, Web Protocols, HyperBro has used HTTPS for C2 communications. T1071.001,Application Layer Protocol, Web Protocols, IcedID has used HTTPS in communications with C2. T1071.001,Application Layer Protocol, Web Protocols, Inception has used HTTP HTTPS and WebDav in network communications. T1071.001,Application Layer Protocol, Web Protocols, InvisiMole uses HTTP for C2 communications. T1071.001,Application Layer Protocol, Web Protocols, Ixeshe uses HTTP for command and control. T1071.001,Application Layer Protocol, Web Protocols, JHUHUGIT variants have communicated with C2 servers over HTTP and HTTPS. T1071.001,Application Layer Protocol, Web Protocols, Kazuar uses HTTP and HTTPS to communicate with the C2 server. Kazuar can also act as a webserver and listen for inbound HTTP requests through an exposed API. T1071.001,Application Layer Protocol, Web Protocols, Ke3chang malware RoyalCli and BS2005 have communicated over HTTP with the C2 server through Internet Explorer (IE) by using the COM interface IWebBrowser2. T1071.001,Application Layer Protocol, Web Protocols, Keydnap uses HTTPS for command and control. T1071.001,Application Layer Protocol, Web Protocols, KGH_SPY can send data to C2 with HTTP POST requests. T1071.001,Application Layer Protocol, Web Protocols, Kinsing has communicated with C2 over HTTP. T1574.005,Hijack Execution Flow, Executable Installer File Permissions Weakness,Adversaries may execute their own malicious payloads by hijacking the binaries used by an installer. T1574.005,Hijack Execution Flow, Executable Installer File Permissions Weakness," When installers create subdirectories and files they often do not set appropriate permissions to restrict write access, which allows for execution of untrusted code placed in the subdirectories or overwriting of binaries used in the installation process. " T1574.005,Hijack Execution Flow, Executable Installer File Permissions Weakness, Attackers can leverage file permissions weaknessses in software installers to get their payload deployed without the user being aware. T1574.005,Hijack Execution Flow, Executable Installer File Permissions Weakness, An external tool or installer is required to enable the malware to maintain persistence through reboot. T1574.005,Hijack Execution Flow, Executable Installer File Permissions Weakness, PowerSpritz decrypts a legitimate Skype or Telegram installer using a custom Spritz implementation with the keyZnxkai@ if8qa9w9489. PowerSpritz then writes the legitimate installer to disk in the directory returned by GetTempPathA. T1069.001,Permission Groups Discovery, Local Groups,admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to list local groups: net localgroup administrator >> %temp%\download T1069.001,Permission Groups Discovery, Local Groups, BloodHound can collect information about local groups and members. T1069.001,Permission Groups Discovery, Local Groups, Caterpillar WebShell can obtain a list of local groups of users from a system. T1069.001,Permission Groups Discovery, Local Groups, Chimera has used net localgroup administrators to identify accounts with local administrative rights. T1069.001,Permission Groups Discovery, Local Groups, Emissary has the capability to execute the command net localgroup administrators. T1069.001,Permission Groups Discovery, Local Groups, Epic gathers information on local group names. T1069.001,Permission Groups Discovery, Local Groups, FlawedAmmyy enumerates the privilege level of the victim during the initial infection. T1069.001,Permission Groups Discovery, Local Groups, Helminth has checked the local administrators group. T1069.001,Permission Groups Discovery, Local Groups, JPIN can obtain the permissions of the victim user. T1069.001,Permission Groups Discovery, Local Groups, Kazuar gathers information about local groups and members. T1069.001,Permission Groups Discovery, Local Groups, Kwampirs collects a list of users belonging to the local users and administrators groups with the commands net localgroup administrators and net localgroup users. T1069.001,Permission Groups Discovery, Local Groups, Commands such as net group and net localgroup can be used in Net to gather information about and manipulate groups. T1069.001,Permission Groups Discovery, Local Groups, OilRig has used net localgroup administrators to find local administrators on compromised systems. T1069.001,Permission Groups Discovery, Local Groups, Operation Wocao has used the command net localgroup administrators to list all administrators part of a local group. T1069.001,Permission Groups Discovery, Local Groups, OSInfo has enumerated the local administrators group. T1069.001,Permission Groups Discovery, Local Groups, PoshC2 contains modules such as Get-LocAdm for enumerating permission groups. T1069.001,Permission Groups Discovery, Local Groups, POWRUNER may collect local group information by running net localgroup administrators or a series of other commands on a victim. T1069.001,Permission Groups Discovery, Local Groups, Sys10 collects the group name of the logged-in user and sends it to the C2. T1069.001,Permission Groups Discovery, Local Groups, Turla has used net localgroup and net localgroup Administrators to enumerate group information including members of the local administrators group. T1137.005,Office Application Startup, Outlook Rules,Ruler can be used to automate the abuse of Outlook Rules to establish persistence. T1137.005,Office Application Startup, Outlook Rules,Adversaries may abuse Microsoft Outlook rules to obtain persistence on a compromised system. T1137.005,Office Application Startup, Outlook Rules, Malicious Outlook rules can be created that can trigger code execution when an adversary sends a specifically crafted email to that user. T1137.005,Office Application Startup, Outlook Rules," In summary, inbox rules can be hidden by leveraging an API called Messaging Application Programming Interface (MAPI), which provides low level access to exchange data stores. " T1137.005,Office Application Startup, Outlook Rules," User interaction is required to exploit this vulnerability, wherein the victim must import a malformed Outlook Rules (.RWZ) file. " T1137.004,Office Application Startup, Outlook Home Page,OilRig has abused the Outlook Home Page feature for persistence. OilRig has also used CVE-2017-11774 to roll back the initial patch designed to protect against Home Page abuse. T1137.004,Office Application Startup, Outlook Home Page, Ruler can be used to automate the abuse of Outlook Home Pages to establish persistence. T1137.004,Office Application Startup, Outlook Home Page,Adversaries may abuse Microsoft Outlook's Home Page feature to obtain persistence on a compromised system. T1137.004,Office Application Startup, Outlook Home Page," Once malicious home pages have been added to the usermailbox, they will be loaded when Outlook is started. " T1137.004,Office Application Startup, Outlook Home Page," After APT33 initially gained access to Microsoft Exchange accounts through password spraying, the threat actors replaced the Outlook homepage for the victim accounts with a malicious Microsoft Outlook homepage URL crafted through Ruler. " T1137.003,Office Application Startup, Outlook Forms,Ruler can be used to automate the abuse of Outlook Forms to establish persistence. T1137.003,Office Application Startup, Outlook Forms,Custom Outlook forms can be created that will execute code when a specifically crafted email is sent by an adversary utilizing the same custom Outlook form. T1137.003,Office Application Startup, Outlook Forms, Adversaries may abuse Microsoft Outlook forms to obtain persistence on a compromised system. T1137.003,Office Application Startup, Outlook Forms," Once malicious forms have been added to the usermailbox, they will be loaded when Outlook is started. " T1137.003,Office Application Startup, Outlook Forms, The custom form is triggered when the mailbox receives a specific message from the attacker that requires the mailbox to load the custom form. T1137.006,Office Application Startup, Add,Naikon has used the RoyalRoad exploit builder to drop a second stage loader intel.wll into the Word Startup folder on the compromised host. T1137.006,Office Application Startup, Add,Add-ins can be used to obtain persistence because they can be set to execute code when an Office application starts. T1137.006,Office Application Startup, Add, Actors may abuse Microsoft Office add-ins to obtain persistence on a compromised system. T1137.006,Office Application Startup, Add," XLAM files are add-in files for Excel 2010 and Excel 2007 based on XML with support for macros. As victims interacted with these files, an attacker-controlled cloud storage was set up on the local system as a network drive and launched RedCurl.Dropper, which was hosted there. " T1137.006,Office Application Startup, Add, Further investigation of thisStartUp trusted location found that it could hostWord Add-Ins of a*.wll extension. T1087.002,Account Discovery, Domain Account,AdFind can enumerate domain users. T1087.002,Account Discovery, Domain Account, Bankshot gathers domain and account names/information through process monitoring. T1087.002,Account Discovery, Domain Account, Bazar has the ability to identify domain administrator accounts. T1087.002,Account Discovery, Domain Account, BloodHound can collect information about domain users including identification of domain admin accounts. T1087.002,Account Discovery, Domain Account, BRONZE BUTLER has used net user /domain to identify account information. T1087.002,Account Discovery, Domain Account, Chimera has has used net user /dom and net user Administrator to enumerate domain accounts including administrator accounts. T1087.002,Account Discovery, Domain Account, Cobalt Strike can determine if the user on an infected machine is in the admin or domain admin group. T1087.002,Account Discovery, Domain Account, CrackMapExec can enumerate the domain user accounts on a targeted system. T1087.002,Account Discovery, Domain Account, Dragonfly 2.0 used batch scripts to enumerate users on a victim domain controller. T1087.002,Account Discovery, Domain Account, dsquery can be used to gather information on user accounts within a domain. T1087.002,Account Discovery, Domain Account, Empire can acquire local and domain user account information. T1087.002,Account Discovery, Domain Account, FIN6 has used MetasploitPsExec NTDSGRAB module to obtain a copy of the victim's Active Directory database. T1087.002,Account Discovery, Domain Account, Fox Kitten has used the Softerra LDAP browser to browse documentation on service accounts. T1087.002,Account Discovery, Domain Account, IcedID can query LDAP to identify additional users on the network to infect. T1087.002,Account Discovery, Domain Account," Ke3chang performs account discovery using commands such as net localgroup administrators and net group REDACTED"" /domain on specific permissions groups. " T1087.002,Account Discovery, Domain Account, menuPass has used the Microsoft administration tool csvde.exe to export Active Directory data. T1087.002,Account Discovery, Domain Account, MuddyWater has used cmd.exe net user /domain to enumerate domain users. T1087.002,Account Discovery, Domain Account, Net commands used with the /domain flag can be used to gather information about and manipulate user accounts on the current domain. T1087.002,Account Discovery, Domain Account, OilRig has run net user net user /domain net groupdomain admins /domain and net groupExchange Trusted Subsystem /domain to get account listings on a victim. T1087.002,Account Discovery, Domain Account, Operation Wocao has used the net command to retrieve information about domain accounts. T1087.002,Account Discovery, Domain Account, OSInfo enumerates local and domain users T1087.002,Account Discovery, Domain Account, Poseidon Group searches for administrator accounts on both the local victim machine and the network. T1087.002,Account Discovery, Domain Account, PoshC2 can enumerate local and domain user account information. T1087.002,Account Discovery, Domain Account, POWRUNER may collect user account information by running net user /domain or a series of other commands on a victim. T1087.002,Account Discovery, Domain Account, Sandworm Team has used a tool to query Active Directory using LDAP discovering information about usernames listed in AD. T1087.002,Account Discovery, Domain Account, SoreFang can enumerate domain accounts via net.exe user /domain. T1087.002,Account Discovery, Domain Account," Sykipot may use net group ""domain admins"" /domain to display accounts in the ""domain admins"" permissions group and net localgroup ""administrators"" to list local system administrator group membership. " T1087.002,Account Discovery, Domain Account, Turla has used net user /domain to enumerate domain accounts. T1087.002,Account Discovery, Domain Account, Valak has the ability to enumerate domain admin accounts. T1087.002,Account Discovery, Domain Account," Wizard Spider has identified domain admins through the use ofnet group˜Domain admins commands.""" T1505.001,Server Software Component, Sql Stored Procedures,Threat actors may abuse SQL stored procedures to establish persistent access to systems. T1505.001,Server Software Component, Sql Stored Procedures, Adversaries may craft or modify CLR assemblies that are linked to stored procedures since these CLR assemblies can be made to execute arbitrary commands. T1505.001,Server Software Component, Sql Stored Procedures," As a result, the stored procedures will run the next time a patch is applied to SQL Server, or the server is restarted. " T1505.001,Server Software Component, Sql Stored Procedures, Create a stored procedure to use the xp_cmdshell stored procedure to download and execute a PowerShell payload from the internet using the query below. T1505.001,Server Software Component, Sql Stored Procedures, The SQL injection string attempted to launch PowerShell via the xp_cmdshell stored procedure. T1505.001,Server Software Component, Sql Stored Procedures," An unspecified vulnerability exists within the Stored Procedure component in Oracle MySQL Server 8.0.23 that, when exploited, allows an authenticated attacker to remotely manipulate data and cause a complete denial-of-service (DoS) condition. " T1505.002,Server Software Component, Transport Agent,LightNeuron has used a malicious Microsoft Exchange transport agent for persistence. T1505.002,Server Software Component, Transport Agent,Adversaries may abuse Microsoft transport agents to establish persistent access to systems. T1505.002,Server Software Component, Transport Agent," Though a malicious transport agent may be invoked for all emails passing through the Exchange transport pipeline, the agent can be configured to only carry out specific tasks in response to adversary defined criteria. " T1505.002,Server Software Component, Transport Agent, Leveraging a Microsoft Exchange Transport Agent for persistence is something unique and never before seen. T1505.002,Server Software Component, Transport Agent, The Turla tool leverages a Microsoft Exchange transport agent in parallel with XTRANS to receive and process email messages delivered to the Exchange server. T1560.003,Archive Collected Data, Archive Via Custom Method,ADVSTORESHELL compresses output data generated by command execution with a custom implementation of the Lempel“Ziv“Welch (LZW) algorithm. T1560.003,Archive Collected Data, Archive Via Custom Method, Agent.btz saves system information into an XML file that is then XOR-encoded. T1560.003,Archive Collected Data, Archive Via Custom Method, Attor encrypts collected data with a custom implementation of Blowfish and RSA ciphers. T1560.003,Archive Collected Data, Archive Via Custom Method, CopyKittens encrypts data with a substitute cipher prior to exfiltration. T1560.003,Archive Collected Data, Archive Via Custom Method, Modules can be pushed to and executed by Duqu that copy data to a staging area compress it and XOR encrypt it. T1560.003,Archive Collected Data, Archive Via Custom Method, FIN6 has encoded data gathered from the victim with a simple substitution cipher and single-byte XOR using the 0xAA key and Base64 with character permutation. T1560.003,Archive Collected Data, Archive Via Custom Method, FLASHFLOOD employs the same encoding scheme as SPACESHIP for data it stages. Data is compressed with zlib and bytes are rotated four times before being XOR'ed with 0x23. T1560.003,Archive Collected Data, Archive Via Custom Method, FrameworkPOS can XOR credit card information before exfiltration. T1560.003,Archive Collected Data, Archive Via Custom Method, HAWKBALL has encrypted data with XOR before sending it over the C2 channel. T1560.003,Archive Collected Data, Archive Via Custom Method, InvisiMole uses a variation of the XOR cipher to encrypt files before exfiltration. T1560.003,Archive Collected Data, Archive Via Custom Method, Kimsuky has used RC4 encryption before exfil. T1560.003,Archive Collected Data, Archive Via Custom Method, A Lazarus Group malware sample encrypts data using a simple byte based XOR operation prior to exfiltration. T1560.003,Archive Collected Data, Archive Via Custom Method, Machete's collected data is encrypted with AES before exfiltration. T1560.003,Archive Collected Data, Archive Via Custom Method, MESSAGETAP has XOR-encrypted and stored contents of SMS messages that matched its target list. T1560.003,Archive Collected Data, Archive Via Custom Method, Mustang Panda has encrypted documents with RC4 prior to exfiltration. T1560.003,Archive Collected Data, Archive Via Custom Method, NETWIRE has used a custom encryption algorithm to encrypt collected data. T1560.003,Archive Collected Data, Archive Via Custom Method, Okrum has used a custom implementation of AES encryption to encrypt collected data. T1560.003,Archive Collected Data, Archive Via Custom Method, OopsIE compresses collected files with a simple character replacement scheme before sending them to its C2 server. T1560.003,Archive Collected Data, Archive Via Custom Method, OwaAuth DES-encrypts captured credentials using the key 12345678 before writing the credentials to a log file. T1560.003,Archive Collected Data, Archive Via Custom Method, Ramsay can store collected documents in a custom container after encrypting and compressing them using RC4 and WinRAR. T1560.003,Archive Collected Data, Archive Via Custom Method, RawPOS encodes credit card data it collected from the victim with XOR. T1560.003,Archive Collected Data, Archive Via Custom Method, Reaver encrypts collected data with an incremental XOR key prior to exfiltration. T1560.003,Archive Collected Data, Archive Via Custom Method, RGDoor encrypts files with XOR before sending them back to the C2 server. T1560.003,Archive Collected Data, Archive Via Custom Method, Rising Sun can archive data using RC4 encryption and Base64 encoding prior to exfiltration. T1560.003,Archive Collected Data, Archive Via Custom Method, Data SPACESHIP copies to the staging area is compressed with zlib. Bytes are rotated by four positions and XOR'ed with 0x23. T1560.003,Archive Collected Data, Archive Via Custom Method, StrongPity can compress and encrypt archived files into multiple .sft files with a repeated xor encryption scheme. T1560.003,Archive Collected Data, Archive Via Custom Method, T9000 encrypts collected data using a single byte XOR key. T1543.001,Create or Modify System Process, Launch Agent,Bundlore can persist via a LaunchAgent. T1543.001,Create or Modify System Process, Launch Agent, Calisto adds a .plist file to the /Library/LaunchAgents folder to maintain persistence. T1543.001,Create or Modify System Process, Launch Agent, CoinTicker creates user launch agents named .espl.plist and com.apple.[random string].plist to establish persistence. T1543.001,Create or Modify System Process, Launch Agent, CookieMiner has installed multiple new Launch Agents in order to maintain persistence for cryptocurrency mining software. T1543.001,Create or Modify System Process, Launch Agent, CrossRAT creates a Launch Agent on macOS. T1543.001,Create or Modify System Process, Launch Agent, Dacls can establish persistence via a LaunchAgent. T1543.001,Create or Modify System Process, Launch Agent, Dok persists via a Launch Agent. T1543.001,Create or Modify System Process, Launch Agent, FruitFly persists via a Launch Agent. T1543.001,Create or Modify System Process, Launch Agent, Keydnap uses a Launch Agent to persist. T1543.001,Create or Modify System Process, Launch Agent, The Komplex trojan creates a persistent launch agent called with $HOME/Library/LaunchAgents/com.apple.updates.plist with launchctl load -w ~/Library/LaunchAgents/com.apple.updates.plist. T1543.001,Create or Modify System Process, Launch Agent, MacSpy persists via a Launch Agent. T1543.001,Create or Modify System Process, Launch Agent, NETWIRE can use launch agents for persistence. T1543.001,Create or Modify System Process, Launch Agent, OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchAgents. T1543.001,Create or Modify System Process, Launch Agent, Proton persists via Launch Agent. T1543.001,Create or Modify System Process, Launch Agent, ThiefQuest installs a launch item using an embedded encrypted launch agent property list template. The plist file is installed in the ~/Library/LaunchAgents/ folder and configured with the path to the persistent binary located in the ~/Library/ folder. T1560.001,Archive Collected Data, Archive Via Utility,APT1 has used RAR to compress files before moving them outside of the victim network. T1560.001,Archive Collected Data, Archive Via Utility, APT29 used 7-Zip to compress stolen emails into password-protected archives prior to exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, APT3 has used tools to compress data before exfilling it. T1560.001,Archive Collected Data, Archive Via Utility, APT33 has used WinRAR to compress data prior to exfil. T1560.001,Archive Collected Data, Archive Via Utility, APT39 has used WinRAR and 7-Zip to compress an archive stolen data. T1560.001,Archive Collected Data, Archive Via Utility, APT41 created a RAR archive of targeted files for exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, BRONZE BUTLER has compressed data into password-protected RAR archives prior to exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, Calisto uses the zip -r command to compress the data collected on the local system. T1560.001,Archive Collected Data, Archive Via Utility, Chimera has used gzip for Linux OS and a modified RAR software to archive data on Windows hosts. T1560.001,Archive Collected Data, Archive Via Utility, CopyKittens uses ZPP a .NET console program to compress files with ZIP. T1560.001,Archive Collected Data, Archive Via Utility, CORALDECK has created password-protected RAR WinImage and zip archives to be exfiltrated. T1560.001,Archive Collected Data, Archive Via Utility, Crutch has used the WinRAR utility to compress and encrypt stolen files. T1560.001,Archive Collected Data, Archive Via Utility, Daserf hides collected data in password-protected .rar archives. T1560.001,Archive Collected Data, Archive Via Utility, DustySky can compress files via RAR while staging data to be exfiltrated. T1560.001,Archive Collected Data, Archive Via Utility, FIN8 has used RAR to compress collected data before Exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, Fox Kitten has used 7-Zip to archive data. T1560.001,Archive Collected Data, Archive Via Utility, GALLIUM used WinRAR to compress and encrypt stolen data prior to exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, Gallmaker has used WinZip likely to archive data prior to exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, HAFNIUM has used 7-Zip and WinRAR to compress stolen files for exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, iKitten will zip up the /Library/Keychains directory before exfiltrating it. T1560.001,Archive Collected Data, Archive Via Utility, InvisiMole uses WinRAR to compress data that is intended to be exfiltrated. T1560.001,Archive Collected Data, Archive Via Utility, Ke3chang is known to use RAR with passwords to encrypt data prior to exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, Magic Hound has used RAR to stage and compress local folders. T1560.001,Archive Collected Data, Archive Via Utility, menuPass has compressed files before exfiltration using TAR and RAR. T1560.001,Archive Collected Data, Archive Via Utility, Micropsia creates a RAR archive based on collected files on the victim's machine. T1560.001,Archive Collected Data, Archive Via Utility, MuddyWater has used the native Windows cabinet creation tool makecab.exe likely to compress stolen data to be uploaded. T1560.001,Archive Collected Data, Archive Via Utility, Mustang Panda has used RAR to create password-protected archives of collected documents prior to exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, Okrum was seen using a RAR archiver tool to compress/decompress data. T1560.001,Archive Collected Data, Archive Via Utility, OopsIE compresses collected files with GZipStream before sending them to its C2 server. T1560.001,Archive Collected Data, Archive Via Utility, Operation Wocao has archived collected files with WinRAR prior to exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, PoetRAT has the ability to compress files with zip. T1560.001,Archive Collected Data, Archive Via Utility, PoshC2 contains a module for compressing data using ZIP. T1560.001,Archive Collected Data, Archive Via Utility, PowerShower has used 7Zip to compress .txt .pdf .xls or .doc files prior to exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, PUNCHBUGGY has Gzipped information and saved it to a random temp file before exfil. T1560.001,Archive Collected Data, Archive Via Utility, Pupy can compress data with Zip before sending it over C2. T1560.001,Archive Collected Data, Archive Via Utility, Ramsay can compress and archive collected files using WinRAR. T1560.001,Archive Collected Data, Archive Via Utility, Sowbug extracted documents and bundled them into a RAR archive. T1560.001,Archive Collected Data, Archive Via Utility, Turla has encrypted files stolen from connected USB drives into a RAR file before exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, UNC2452 used 7-Zip to compress stolen emails into password-protected archives prior to exfiltration. T1560.001,Archive Collected Data, Archive Via Utility, WindTail has the ability to use the macOS built-in zip utility to archive files. T1558.002,Steal or Forge Kerberos Tickets, Silver Ticket,Empire can leverage its implementation of Mimikatz to obtain and use silver tickets. T1558.002,Steal or Forge Kerberos Tickets, Silver Ticket, Mimikatz's kerberos module can create silver tickets. T1558.002,Steal or Forge Kerberos Tickets, Silver Ticket,"Silver Tickets are forged Kerberos Ticket Granting Service (TGS) tickets, also called service tickets. " T1558.002,Steal or Forge Kerberos Tickets, Silver Ticket," Adversaries who have the password hash of a target service account (e.g. SharePoint, MSSQL) may forge Kerberos ticket granting service (TGS) tickets, also known as silver tickets. " T1558.002,Steal or Forge Kerberos Tickets, Silver Ticket," Silver Tickets can be more dangerous than Golden Tickets“ while the scope is more limited than Golden Tickets, the required hash is easier to get and there is no communication with a DC when using them, so detection is more difficult than Golden Tickets. " T1558.002,Steal or Forge Kerberos Tickets, Silver Ticket," Once a threat actor has gained access to at least one service account and extracted the password, they can conduct a silver-ticket attack, creating forged service tickets that provide access to the service that was compromised with the extracting password attack. " T1547.008,Boot or Logon Autostart Execution, Lsass Driver,Pasam establishes by infecting the Security Accounts Manager (SAM) DLL to load a malicious DLL dropped to disk. T1547.008,Boot or Logon Autostart Execution, Lsass Driver, Wingbird drops a malicious file (sspisrv.dll) alongside a copy of lsass.exe which is used to register a service that loads sspisrv.dll as a driver. The payload of the malicious driver (located in its entry-point function) is executed when loaded by lsass.exe before the spoofed service becomes unstable and crashes. T1547.008,Boot or Logon Autostart Execution, Lsass Driver,"Adversaries may target LSASS drivers to obtain persistence. By either replacing or adding illegitimate drivers (e.g., Hijack Execution Flow), an adversary can use LSA operations to continuously execute malicious payloads. " T1547.008,Boot or Logon Autostart Execution, Lsass Driver, Adversaries may modify or add LSASS drivers to obtain persistence on compromised systems. T1547.008,Boot or Logon Autostart Execution, Lsass Driver, Hunting efforts identified an atypical living-off-the-land technique being employed to exploit the LSASS process via the use of comsvcs.dll. T1547.005,Boot or Logon Autostart Execution, Security Support Provider,Empire can enumerate Security Support Providers (SSPs) as well as utilize PowerSploit's Install-SSP and Invoke-Mimikatz to install malicious SSPs and log authentication events. T1547.005,Boot or Logon Autostart Execution, Security Support Provider, Lazarus Group has rebooted victim machines to establish persistence by installing a SSP DLL. T1547.005,Boot or Logon Autostart Execution, Security Support Provider, The Mimikatz credential dumper contains an implementation of an SSP. T1547.005,Boot or Logon Autostart Execution, Security Support Provider, PowerSploit's Install-SSP Persistence module can be used to establish by installing a SSP DLL. T1547.005,Boot or Logon Autostart Execution, Security Support Provider,Adversaries may abuse security support providers (SSPs) to execute DLLs when the system boots. T1547.003,Boot or Logon Autostart Execution, Time Providers,"Adversaries may abuse this architecture to establish persistence, specifically by registering and enabling a malicious DLL as a time provider. " T1547.003,Boot or Logon Autostart Execution, Time Providers, Actors may abuse time providers to execute DLLs when the system boots. T1547.003,Boot or Logon Autostart Execution, Time Providers, Reports indicate that any user may start the W32Time service. This may be used to aid in further attacks launched against the vulnerable computer. T1547.003,Boot or Logon Autostart Execution, Time Providers," Once initial access was obtained, the attacker was able to achieve persistence via a custom crafted DLL that presented as a time provider. " T1547.003,Boot or Logon Autostart Execution, Time Providers, During this incident Time Provider Registry keys were modified to enable the implanted DLL to be run as a time service. T1003.002,OS Credential Dumping, Security Account Manager,Cobalt Strike can recover hashed passwords. T1003.002,OS Credential Dumping, Security Account Manager, CosmicDuke collects Windows account hashes. T1003.002,OS Credential Dumping, Security Account Manager, Password stealer and NTLM stealer modules in CozyCar harvest stored credentials from the victim including credentials used as part of Windows NTLM user authentication. T1003.002,OS Credential Dumping, Security Account Manager, CrackMapExec can dump usernames and hashed passwords from the SAM. T1003.002,OS Credential Dumping, Security Account Manager, Dragonfly 2.0 dropped and executed SecretsDump to dump password hashes. T1003.002,OS Credential Dumping, Security Account Manager, Fgdump can dump Windows password hashes. T1003.002,OS Credential Dumping, Security Account Manager, GALLIUM used reg commands to dump specific hives from the Windows Registry such as the SAM hive and obtain password hashes. T1003.002,OS Credential Dumping, Security Account Manager, gsecdump can dump Windows password hashes from the SAM. T1003.002,OS Credential Dumping, Security Account Manager, HOPLIGHT has the capability to harvest credentials and passwords from the SAM database. T1003.002,OS Credential Dumping, Security Account Manager, SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information. T1003.002,OS Credential Dumping, Security Account Manager, Ke3chang has dumped credentials including by using gsecdump. T1003.002,OS Credential Dumping, Security Account Manager, Koadic can gather hashed passwords by dumping SAM/SECURITY hive. T1003.002,OS Credential Dumping, Security Account Manager, menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials. T1003.002,OS Credential Dumping, Security Account Manager, Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from the SAM table. T1003.002,OS Credential Dumping, Security Account Manager, Mivast has the capability to gather NTLM password information. T1003.002,OS Credential Dumping, Security Account Manager, Night Dragon has dumped account hashes with Carbanak and cracked them with Cain & Abel. T1003.002,OS Credential Dumping, Security Account Manager, POWERTON has the ability to dump password hashes. T1003.002,OS Credential Dumping, Security Account Manager, pwdump can be used to dump credentials from the SAM. T1003.002,OS Credential Dumping, Security Account Manager, Remsec can dump the SAM database. T1003.002,OS Credential Dumping, Security Account Manager, Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers. T1003.002,OS Credential Dumping, Security Account Manager, Wizard Spider has acquired credentials from the SAM/SECURITY registry hives. T1547.002,Boot or Logon Autostart Execution, Authentication Package,Flame can use Windows Authentication Packages for persistence. T1547.002,Boot or Logon Autostart Execution, Authentication Package,Adversaries may abuse authentication packages to execute DLLs when the system boots. T1547.002,Boot or Logon Autostart Execution, Authentication Package, Adversaries can use the autostart mechanism provided by LSA authentication packages for persistence by placing a reference to a binary in the Windows Registry. T1547.002,Boot or Logon Autostart Execution, Authentication Package," An authentication package (AP) can be used by a malicious actor to extend interactive logon authentication, i.e. to enable RSA token authentication. " T1547.002,Boot or Logon Autostart Execution, Authentication Package," At startup, mssecmgr.ocx is loaded as LSA Authentication Package. " T1021.006,Remote Services, Windows Remote Management,APT29 has used WinRM via PowerShell to execute command and payloads on remote hosts. T1021.006,Remote Services, Windows Remote Management, Chimera has used WinRM for lateral movement. T1021.006,Remote Services, Windows Remote Management, Cobalt Strike can use WinRM to execute a payload on a remote host. T1021.006,Remote Services, Windows Remote Management, Threat Group-3390 has used WinRM to enable remote execution. T1021.006,Remote Services, Windows Remote Management, UNC2452 has used WinRM via PowerShell to execute command and payloads on remote hosts. T1021.006,Remote Services, Windows Remote Management, Wizard Spider has used Window Remote Management to move laterally through a victim network. T1037.005,Boot or Logon Initialization Scripts, Startup Items,jRAT can list and manage startup entries. T1037.005,Boot or Logon Initialization Scripts, Startup Items,Adversaries may use startup items automatically executed at boot initialization to establish persistence. T1037.005,Boot or Logon Initialization Scripts, Startup Items, Attackers can create the appropriate folders/files in the StartupItems directory to register their own persistence mechanism. T1037.005,Boot or Logon Initialization Scripts, Startup Items, Renepo is an older OS X malware sample that persists as a startup item. T1037.005,Boot or Logon Initialization Scripts, Startup Items, The malware achieves persistence by placing its script (and a StartupParameters.plist) in a sub-directory in either the /System/Library/StartupItems or /Library/StartupItems directory. T1037.003,Boot or Logon Initialization Scripts, Network Logon Script,Adversaries may use network logon scripts automatically executed at logon initialization to establish persistence. T1037.003,Boot or Logon Initialization Scripts, Network Logon Script, APT31 has been known to leverage boot or logon initialization scripts to achieve persistence and lateral movement. T1037.003,Boot or Logon Initialization Scripts, Network Logon Script," Attackers may use boot or logon scripts to maintain persistence on a network. Depending on the access configuration of the logon scripts, either local credentials or an administrator account may be necessary. " T1037.003,Boot or Logon Initialization Scripts, Network Logon Script, One of FontOnLakerootkits can be executed with a startup script. T1037.003,Boot or Logon Initialization Scripts, Network Logon Script," At first machine reboot, the LNK file, placed into system' Startup folder, triggers the execution of devtmrn.exe executable. " T1037.001,Boot or Logon Initialization Scripts, Logon Script (Windows),An APT28 loader Trojan adds the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence. T1037.001,Boot or Logon Initialization Scripts, Logon Script (Windows)," Attor's dispatcher can establish persistence via adding a Registry key with a logon script HKEY_CURRENT_USER\Environment UserInitMprLogonScript"" . " T1037.001,Boot or Logon Initialization Scripts, Logon Script (Windows), Cobalt Group has added persistence by registering the file name for the next stage malware under HKCU\Environment\UserInitMprLogonScript. T1037.001,Boot or Logon Initialization Scripts, Logon Script (Windows), JHUHUGIT has registered a Windows shell script under the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence. T1037.001,Boot or Logon Initialization Scripts, Logon Script (Windows), KGH_SPY has the ability to set the HKCU\Environment\UserInitMprLogonScript Registry key to execute logon scripts. T1037.001,Boot or Logon Initialization Scripts, Logon Script (Windows)," Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\Environment\UserInitMprLogonScript.""" T1546.014,Event Triggered Execution, Emond,Adversaries may gain persistence and elevate privileges by executing malicious content triggered by the Event Monitor Daemon (emond). T1546.014,Event Triggered Execution, Emond," Attackers abuse the emond service by writing a rule to execute commands when a defined event occurs, such as system start up or user authentication. " T1546.014,Event Triggered Execution, Emond, Actors may also be able to escalate privileges from administrator to root as the emond service is executed with root privileges by the Launch Daemon service. T1546.014,Event Triggered Execution, Emond, The ransomware was triggered by a custom rule that caused the event monitor daemon to execute the malware during user logon. T1546.014,Event Triggered Execution, Emond, Malware was executed by forcing a reboot of the victim's computer after placing a custom rule that was executed by the emond process during startup. T1546.013,Event Triggered Execution, Powershell Profile,Turla has used PowerShell profiles to maintain persistence on an infected machine. T1546.013,Event Triggered Execution, Powershell Profile,Adversaries may gain persistence and elevate privileges by executing malicious content triggered by PowerShell profiles. A PowerShell profile (profile.ps1) is a script that runs when PowerShell starts and can be used as a logon script to customize user environments. T1546.013,Event Triggered Execution, Powershell Profile," An adversary may also be able to escalate privileges if a script in a PowerShell profile is loaded and executed by an account with higher privileges, such as a domain administrator. " T1546.013,Event Triggered Execution, Powershell Profile," The actor started using PowerShell scripts that provide direct, in-memory loading and execution of malware executables and libraries. " T1546.013,Event Triggered Execution, Powershell Profile, The activity used PowerShell likely to load the BELUGASTURGEON implant COMRAT on compromised clients. T1056.003,Input Capture, Web Portal Capture,"Adversaries may install code on externally facing portals, such as a VPN login page, to capture and transmit credentials of users who attempt to log into the service. " T1056.003,Input Capture, Web Portal Capture, Attackers have been able to successfully implant JavaScript code on the login pages that enables them to surreptitiously steal employee credentials as they login to access internal corporate resources. T1056.003,Input Capture, Web Portal Capture," A vulnerability in the Clientless SSL VPN portal customization framework could allow an unauthenticated, remote attacker to modify the content of the Clientless SSL VPN portal, which could lead to several attacks including the stealing of credentials, cross-site scripting (XSS), and other types of web attacks on the client using the affected system. " T1056.003,Input Capture, Web Portal Capture, Threat actors sold and deployed phishing pages mimicking financial sites to obtain credentials or financial information. T1056.003,Input Capture, Web Portal Capture, Threat actors sold and deployed phishing pages mimicking government e-portals to obtain credentials or financial information. T1056.002,Input Capture, Gui Input Capture,Bundlore prompts the user for their credentials. T1056.002,Input Capture, Gui Input Capture, Calisto presents an input prompt asking for the user's login and password. T1056.002,Input Capture, Gui Input Capture, Dok prompts the user for credentials. T1056.002,Input Capture, Gui Input Capture, FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials. T1056.002,Input Capture, Gui Input Capture, iKitten prompts the user for their credentials. T1056.002,Input Capture, Gui Input Capture, Keydnap prompts the users for credentials. T1056.002,Input Capture, Gui Input Capture, Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims. T1056.002,Input Capture, Gui Input Capture, Proton prompts users for their credentials. T1003.005,OS Credential Dumping, Cached Domain Credentials,APT33 has used a variety of publicly available tools like LaZagne to gather credentials. T1003.005,OS Credential Dumping, Cached Domain Credentials, Cachedump can extract cached password hashes from cache entry information. T1003.005,OS Credential Dumping, Cached Domain Credentials, LaZagne can perform credential dumping from MSCache to obtain account and password information. T1003.005,OS Credential Dumping, Cached Domain Credentials, Leafminer used several tools for retrieving login and password information including LaZagne. T1003.005,OS Credential Dumping, Cached Domain Credentials, MuddyWater has performed credential dumping with LaZagne. T1003.005,OS Credential Dumping, Cached Domain Credentials, OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. T1003.005,OS Credential Dumping, Cached Domain Credentials, Okrum was seen using modified Quarks PwDump to perform credential dumping. T1003.005,OS Credential Dumping, Cached Domain Credentials, Pupy can use Lazagne for harvesting credentials. T1546.007,Event Triggered Execution, Netsh Helper Dll,netsh can be used as a persistence proxy technique to execute a helper DLL when netsh.exe is executed. T1546.007,Event Triggered Execution, Netsh Helper Dll,Adversaries can use netsh.exe helper DLLs to trigger execution of arbitrary code in a persistent manner. T1546.007,Event Triggered Execution, Netsh Helper Dll, The attackers established persistence by executing malicious content triggered by Netsh Helper DLLs. T1546.007,Event Triggered Execution, Netsh Helper Dll, Threat group FIN13 has been observed to use netsh to install the downloader known as DRAWSTRING. T1546.007,Event Triggered Execution, Netsh Helper Dll, A previously unknown Chinese hacking group used netsh rules to attempt to bypass network restrictions on the victim machine. T1114.001,Email Collection, Local Email Collection,APT1 uses two utilities GETMAIL and MAPIGET to steal email. GETMAIL extracts emails from archived Outlook .pst files. T1114.001,Email Collection, Local Email Collection, Carbanak searches recursively for Outlook personal storage tables (PST) files within user directories and sends them back to the C2 server. T1114.001,Email Collection, Local Email Collection," Chimera has harvested data from victim's e-mail including through execution of wmic /node: process call create cmd /c copy c:\Users\\\backup.pst c:\windows\temp\backup.pst"" copy ""i:\\\My Documents\.pst""copy. " T1114.001,Email Collection, Local Email Collection, CosmicDuke searches for Microsoft Outlook data files with extensions .pst and .ost for collection and exfiltration. T1114.001,Email Collection, Local Email Collection, Crimson contains a command to collect and exfiltrate emails from Outlook. T1114.001,Email Collection, Local Email Collection, Emotet has been observed leveraging a module that scrapes email data from Outlook. T1114.001,Email Collection, Local Email Collection, Empire has the ability to collect emails on a target system. T1114.001,Email Collection, Local Email Collection, KGH_SPY can harvest data from mail clients. T1114.001,Email Collection, Local Email Collection, Magic Hound has collected .PST archives. T1114.001,Email Collection, Local Email Collection, Out1 can parse e-mails on a target machine. T1114.001,Email Collection, Local Email Collection, Pupy can interact with a victimOutlook session and look through folders and emails. T1114.001,Email Collection, Local Email Collection," Smoke Loader searches through Outlook files and directories (e.g. inbox sent templates drafts archives etc.).""" T1114.001,Email Collection, Local Email Collection,"The FBI and CISA have detected multiple zero-day exploits, with actors attempting to collect mailbox data in the form of .ost files from Microsoft Exchange servers. " T1114.001,Email Collection, Local Email Collection, Warzone features functionality precipitating the theft of browser and email clients. T1114.001,Email Collection, Local Email Collection," The cmdlet New-MailboxExportRequest within Powershell is used to steal email boxes, and has been observed to be used by Chinese state sponsored actors. " T1546.005,Event Triggered Execution, Trap,Cobaltstrike often achieves persistence through executing malicious code through a system event triggered by the trap command. T1546.005,Event Triggered Execution, Trap, WMI runs commands on remote systems via malicious commands triggered through a system event such as the trap command. T1546.005,Event Triggered Execution, Trap," Helper .dll files can be utilized for persistence, often executed through the trap command. " T1546.005,Event Triggered Execution, Trap," Remote access trojans (RATs), such as Neurevt maintain persistence on a machine with malicious payloads triggered via a system event such as the trap command. " T1546.005,Event Triggered Execution, Trap, The trap command can be utilised to achieve remote code execution when an interrupt signal is received. T1213.001,Data from Information Repositories, Confluence,APT41 often gather information from popular data sharing repositories such as Confluence. T1213.001,Data from Information Repositories, Confluence," ""Lebanese Cedar '', an APT group, often creates campaigns where a large amount of data is stolen from Confluence. " T1213.001,Data from Information Repositories, Confluence, Confluence and JIRA are popular targets for APT groups wishing to receive sensitive documents and share them publicly. T1213.001,Data from Information Repositories, Confluence," A popular reconnaissance technique that threat actors employ is to steal data from company data repositories, such as Confluence. " T1213.001,Data from Information Repositories, Confluence," Given that companies often store development documentation on Confluence, it is often a target for APT27 to harvest data from. " T1213.002,Data from Information Repositories, Sharepoint,APT28 has collected information from Microsoft SharePoint services within target networks. T1213.002,Data from Information Repositories, Sharepoint, Chimera has collected documents from the victim's SharePoint. T1213.002,Data from Information Repositories, Sharepoint, Ke3chang used a SharePoint enumeration and data dumping tool known as spwebmember. T1213.002,Data from Information Repositories, Sharepoint, spwebmember is used to enumerate and dump information from Microsoft SharePoint. T1213.002,Data from Information Repositories, Sharepoint,"After achieving persistence on a network, threat actors will often move to harvesting data from popular data repositories such as SharePoint. " T1053.002,Scheduled Task/Job, At (Windows),APT18 actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network. T1053.002,Scheduled Task/Job, At (Windows), at can be used to schedule a task on a system. T1053.002,Scheduled Task/Job, At (Windows), BRONZE BUTLER has used at to register a scheduled task to execute malware during lateral movement. T1053.002,Scheduled Task/Job, At (Windows), CrackMapExec can set a scheduled task on the target system to execute commands remotely using at. T1053.002,Scheduled Task/Job, At (Windows), MURKYTOP has the capability to schedule remote AT jobs. T1053.002,Scheduled Task/Job, At (Windows), Threat Group-3390 actors use at to schedule tasks to run self-extracting RAR archives which install HTTPBrowser or PlugX on other victims on a network. T1053.002,Scheduled Task/Job, At (Windows),"Lateral movement within infrastructure has been observed by CTU analysts, with attackers utilising at.exe for the movement. " T1053.002,Scheduled Task/Job, At (Windows), Scheduled tasks that run using at.exe could be an indicator of a depreciated program that needs to be updated or malicious activity. T1053.002,Scheduled Task/Job, At (Windows), The Bamital Trojan utilised at.exe for privilege escalation. T1098.003,Account Manipulation, Add Office 365 Global Administrator Role,"WastedLocker often achieves persistence through creating user accounts, or upgrading existing accounts to have Office 365 Administrator privileges. " T1098.003,Account Manipulation, Add Office 365 Global Administrator Role," Phishing campaigns targeting business, tech, and telecom industries often use phishing emails to compromise an account before upgrading it to an Office 365 Administrator for further malicious activity. " T1098.003,Account Manipulation, Add Office 365 Global Administrator Role," SODINOKIBI, a REvil ransomware as a service (RaaS), can compromise accounts and achieve persistence through malicious code executed via privileges achieved via an account being upgraded to an administrator of Office 365. " T1098.003,Account Manipulation, Add Office 365 Global Administrator Role," APT41 employs a variety of persistence methods, one of which involved increasing a compromised account's privileges through the Office 365 Administrator role. " T1098.003,Account Manipulation, Add Office 365 Global Administrator Role," In order to compromise more accounts, TEMP.Zagros employs malicious software which will increase the privileges of an already compromised account via increasing it's Office 365 account to an administrator one. " T1542.002,Pre,,Equation is known to have the capability to overwrite the firmware on hard drives from some manufacturers. T1542.002,Pre,,Trickbot will often achieve persistence through compromising the firmware of a system. T1542.002,Pre,, UEFI-related attacks increasingly involve the component firmware of critical systems being compromised. T1542.002,Pre,, Attackers are increasingly targeting the firmware of component systems to achieve persistence as they often cannot verify their integrity as well as the main system components. T1542.002,Pre,," APT34 can achieve persistence on machines via compromising component firmware, allowing them to execute low level commands before the BIOS loads. " T1021.004,Remote Services, Ssh,APT39 used secure shell (SSH) to move laterally among their targets. T1021.004,Remote Services, Ssh, Cobalt Strike can SSH to a remote service. T1021.004,Remote Services, Ssh, Empire contains modules for executing commands over SSH as well as in-memory VNC agent injection. T1021.004,Remote Services, Ssh, Fox Kitten has used the PuTTY and Plink tools for lateral movement. T1021.004,Remote Services, Ssh, GCMAN uses Putty for lateral movement. T1021.004,Remote Services, Ssh, Kinsing has used SSH for lateral movement. T1021.004,Remote Services, Ssh, Leviathan used ssh for internal reconnaissance. T1021.004,Remote Services, Ssh, menuPass has used Putty Secure Copy Client (PSCP) to transfer data. T1021.004,Remote Services, Ssh, OilRig has used Putty to access compromised systems. T1021.004,Remote Services, Ssh, Rocke has spread its coinminer via SSH. T1021.004,Remote Services, Ssh, TEMP.Veles has relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution. T1021.004,Remote Services, Ssh,"SSH fingerprint data shows that Sysrv-hello compromised 26 servers, utilising them as C2 servers. " T1021.004,Remote Services, Ssh," APT24 has utilised SSH, in addition to a credential stealer such as MIMIKATZ to operate on victim hosts. " T1021.004,Remote Services, Ssh, SSH client Bitvise was used to log into a VMWare ESXi with an open SSH connection. T1053.003,Scheduled Task/Job, Cron,Anchor can install itself as a cron job. T1053.003,Scheduled Task/Job, Cron, Exaramel for Linux uses crontab for persistence if it does not have root privileges. T1053.003,Scheduled Task/Job, Cron, Janicab used a cron job for persistence on Mac devices. T1053.003,Scheduled Task/Job, Cron, Kinsing has used crontab to download and run shell scripts every minute to ensure persistence. T1053.003,Scheduled Task/Job, Cron, NETWIRE can use crontabs to establish persistence. T1053.003,Scheduled Task/Job, Cron, Penquin can use Cron to create periodic and pre-scheduled background jobs. T1053.003,Scheduled Task/Job, Cron, Rocke installed a cron job that downloaded and executed files from the C2. T1053.003,Scheduled Task/Job, Cron, Skidmap has installed itself via crontab. T1053.003,Scheduled Task/Job, Cron, SpeakUp uses cron tasks to ensure persistence. T1053.003,Scheduled Task/Job, Cron, Xbash can create a cronjob for persistence if it determines it is on a Linux system. T1053.003,Scheduled Task/Job, Cron,"Muhstik, a threat actor group often abuses the cron utility, using crontab files within scripts such as IDM scripts to establish persistence. " T1053.003,Scheduled Task/Job, Cron," Chinese state sponsored actors often utilise CLI tools, such as crontab to schedule malicious tasks that enumerate victim devices. " T1053.003,Scheduled Task/Job, Cron," Moobot, a Mirai botnet variant, achieves persistence through crontab and connections to malicious domains for communication and malware downloads. " T1563.002,Remote Service Session Hijacking, Rdp Hijacking,WannaCry enumerates current remote desktop sessions and tries to execute the malware on each session. T1563.002,Remote Service Session Hijacking, Rdp Hijacking,REvil will hijack Remote Desktop Services (RDS) for lateral movement. T1563.002,Remote Service Session Hijacking, Rdp Hijacking," CIS based ransomware, such as Fonix will often try to infect as many machines that are accessed via lateral movement instagated from the hijacking of a Remote Desktop Protocol (RDP). " T1563.002,Remote Service Session Hijacking, Rdp Hijacking," Companies should ensure that Remote Desktop Services are secure, as they are commonly hijacked my ransomware such as CryptConsole for movements and victim enumeration. " T1563.002,Remote Service Session Hijacking, Rdp Hijacking," Blocking RDP access from the internet is a recommended security policy to prevent them from being abused by Phobos, a ransomware that can hijack RDP sessions. " T1563.001,Remote Service Session Hijacking, Ssh Hijacking,"From old ransomware such as Cryakl to new ones like XMRLocker, lateral movement via SSH hijacking is a popular TTP. " T1563.001,Remote Service Session Hijacking, Ssh Hijacking, Ransomware will utilise SSH vulnerabilities to move laterally within a system. T1563.001,Remote Service Session Hijacking, Ssh Hijacking, Password policies should be implemented and enforced for SSH usage to prevent hijacking of weak/standard passwords by malicious actors. T1563.001,Remote Service Session Hijacking, Ssh Hijacking, Linux/Mac OS administrators should be wary of unprotected SSH communications within the network as these remote connections are a favourite way of maintaining persistence by threat actors. T1563.001,Remote Service Session Hijacking, Ssh Hijacking, SSH certificates should always be validated as forged credentials will allow actors to move laterally within the network. T1053.004,Scheduled Task/Job, Launchd,Malware that installs .msi files often abuse the root privileges of launchd daemons to repeatedly execute malicious activity. T1053.004,Scheduled Task/Job, Launchd," Launchd can change the permissions of files, escalating the privileges of malware. " T1053.004,Scheduled Task/Job, Launchd, Copying malicious files from the installer location to /Library/LaunchDaemons/folder will escalate the copied privileges. T1053.004,Scheduled Task/Job, Launchd," BeagleBoyz, North Korean Actors, will often obfuscate their malware whilst simultaneously escalating it's privilege through running the malware under launchd's privileged context. " T1053.004,Scheduled Task/Job, Launchd, Reconnaissance and background checks can be routinely automated through scheduling a launchd task. T1053.001,Scheduled Task/Job, At (Linux),Cryptocurrency miners abuse the at command on Linux to schedule recurring mining on victim machines. T1053.001,Scheduled Task/Job, At (Linux), Communication with a CnC server can be automated via the at command on Linux OS. T1053.001,Scheduled Task/Job, At (Linux), Golden Chickens Malware-as-a-Service (MaaS) will utilize to schedule malicious tasks. T1053.001,Scheduled Task/Job, At (Linux), Malware will exfiltrate stolen data at regular intervals on Linux servers through abusing the at command functionality T1053.001,Scheduled Task/Job, At (Linux), Ransomware will often schedule the encryption of victim data via the at command. T1021.002,Remote Services, Smb/Windows Admin Shares,Anchor can support windows execution via SMB shares. T1021.002,Remote Services, Smb/Windows Admin Shares, APT3 will copy files over to Windows Admin Shares (like ADMIN$) as part of lateral movement. T1021.002,Remote Services, Smb/Windows Admin Shares, APT32 used Net to use Windows' hidden network shares to copy their tools to remote machines for execution. T1021.002,Remote Services, Smb/Windows Admin Shares, APT39 has used SMB for lateral movement. T1021.002,Remote Services, Smb/Windows Admin Shares, APT41 has transferred implant files using Windows Admin Shares. T1021.002,Remote Services, Smb/Windows Admin Shares, BlackEnergy has run a plug-in on a victim to spread through the local network by using PsExec and accessing admin shares. T1021.002,Remote Services, Smb/Windows Admin Shares, Blue Mockingbird has used Windows Explorer to manually copy malicious files to remote hosts over SMB. T1021.002,Remote Services, Smb/Windows Admin Shares, Chimera has used Windows admin shares to move laterally. T1021.002,Remote Services, Smb/Windows Admin Shares, Cobalt Strike can use Window admin shares (C$ and ADMIN$) for lateral movement. T1021.002,Remote Services, Smb/Windows Admin Shares, Conti can spread via SMB and encrypts files on different hosts potentially compromising an entire network. T1021.002,Remote Services, Smb/Windows Admin Shares, Deep Panda uses net.exe to connect to network shares using net use commands with compromised credentials. T1021.002,Remote Services, Smb/Windows Admin Shares, Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware. T1021.002,Remote Services, Smb/Windows Admin Shares, Emotet leverages the Admin$ share for lateral movement once the local admin password has been brute forced. T1021.002,Remote Services, Smb/Windows Admin Shares, FIN8 has attempted to map to C$ on enumerated hosts to test the scope of their current credentials/context. T1021.002,Remote Services, Smb/Windows Admin Shares, Fox Kitten has used valid accounts to access SMB shares. T1021.002,Remote Services, Smb/Windows Admin Shares, Ke3chang actors have been known to copy files to the network shares of other computers to move laterally. T1021.002,Remote Services, Smb/Windows Admin Shares, Kwampirs copies itself over network shares to move laterally on a victim network. T1021.002,Remote Services, Smb/Windows Admin Shares, Lazarus Group malware SierraAlfa accesses the ADMIN$ share via SMB to conduct lateral movement. T1021.002,Remote Services, Smb/Windows Admin Shares, Lucifer can infect victims by brute forcing SMB. T1021.002,Remote Services, Smb/Windows Admin Shares, Lateral movement can be done with Net through net use commands to connect to the on remote systems. T1021.002,Remote Services, Smb/Windows Admin Shares, Net Crawler uses Windows admin shares to establish authenticated sessions to remote systems over SMB as part of lateral movement. T1021.002,Remote Services, Smb/Windows Admin Shares, NotPetya can use PsExec which interacts with the ADMIN$ network share to execute commands on remote systems. T1021.002,Remote Services, Smb/Windows Admin Shares, Olympic Destroyer uses PsExec to interact with the ADMIN$ network share to execute commands on remote systems. T1021.002,Remote Services, Smb/Windows Admin Shares, Operation Wocao has used Impacket's smbexec.py as well as accessing the C$ and IPC$ shares to move laterally. T1021.002,Remote Services, Smb/Windows Admin Shares, Orangeworm has copied its backdoor across open network shares including ADMIN$ C$WINDOWS D$WINDOWS and E$WINDOWS. T1021.002,Remote Services, Smb/Windows Admin Shares, PsExec a tool that has been used by adversaries writes programs to the ADMIN$ network share to execute commands on remote systems. T1021.002,Remote Services, Smb/Windows Admin Shares, The Regin malware platform can use Windows admin shares to move laterally. T1021.002,Remote Services, Smb/Windows Admin Shares, Ryuk has used the C$ network share for lateral movement. T1021.002,Remote Services, Smb/Windows Admin Shares, Shamoon accesses network share(s) enables share access to the target device copies an executable payload to the target system and uses a Scheduled Task/Job to execute the malware. T1021.002,Remote Services, Smb/Windows Admin Shares, Threat Group-1314 actors mapped network drives using net use. T1021.002,Remote Services, Smb/Windows Admin Shares, Turla used net use commands to connect to lateral systems within a network. T1021.002,Remote Services, Smb/Windows Admin Shares, Wizard Spider has used SMB to drop Cobalt Strike Beacon on a domain controller for lateral movement. T1021.002,Remote Services, Smb/Windows Admin Shares, zwShell has been copied over network shares to move laterally. T1021.002,Remote Services, Smb/Windows Admin Shares,"BlackMatter ransomware, with stolen credentials, often uses SMB to access the active directory (AD) and perform host discovery. " T1021.002,Remote Services, Smb/Windows Admin Shares," Attackers often use CobaltStrike functionality, specifically named pipes, in combination with SMB for lateral movement within networks. " T1021.002,Remote Services, Smb/Windows Admin Shares," Net, a utility program in windows systems, is often used by APT groups synchronously with SMB to perform a variety of tasks on host machines such as discovery, lateral movement and system/network information gathering. " T1021.005,Remote Services, Vnc,Carberp can start a remote VNC session by downloading a new plugin. T1021.005,Remote Services, Vnc, Fox Kitten has installed TightVNC server and client on compromised servers and endpoints for lateral movement. T1021.005,Remote Services, Vnc, GCMAN uses VNC for lateral movement. T1021.005,Remote Services, Vnc, Proton uses VNC to connect into systems. T1021.005,Remote Services, Vnc, ZxShell supports functionality for VNC sessions. T1021.005,Remote Services, Vnc,"Ramnit banking trojan and botnet uses VNC to access victim machines, typically deploying the technique in later stages of the kill chain on command via the attacker C&C server. " T1021.005,Remote Services, Vnc," The SMOKEDHAM backdoor, after executing Powershell commands, installs the UltraVNC application, renamed winvnc.exe, to establish remote control of a target computer. " T1021.005,Remote Services, Vnc, Many ransomware variants that utilise CobaltStrike often combine it's functionality with dual-use tools such as TightVNC for remote access to a target machine. T1021.003,Remote Services, Distributed Component Object Model,"Cobalt Strike can deliver beacon"" payloads for lateral movement by leveraging remote COM execution. " T1021.003,Remote Services, Distributed Component Object Model," Empire can utilize Invoke-DCOM to leverage remote COM execution for lateral movement.""" T1021.003,Remote Services, Distributed Component Object Model,JuicyPotato exploits the windows DCOM and SeImpersonate token privilege to elevate an unprivileged account to the highest level of privilege. T1021.003,Remote Services, Distributed Component Object Model, The ExecuteShellCommand Method in Microsoft Management Console (MMC) 2.0 allows for lateral movement within a network when abusing DCOM with valid credentials. T1021.003,Remote Services, Distributed Component Object Model," IcedID malware often accesses victim machines utilizing DCOM in combination with wuauclt.exe, a CobaltStrike tool. " T1136.002,Create Account, Domain Account,Empire has a module for creating a new domain user if permissions allow. T1136.002,Create Account, Domain Account, GALLIUM created high-privileged domain user accounts to maintain access to victim networks. T1136.002,Create Account, Domain Account, HAFNIUM has created and granted privileges to domain accounts. T1136.002,Create Account, Domain Account, The net user username \password \domain commands in Net can be used to create a domain account. T1136.002,Create Account, Domain Account, Pupy can user PowerView to executenet user commands and create domain accounts. T1136.002,Create Account, Domain Account,"A reverse proxy that establishes a RDP connection can allow for lateral movement and control of a domain account after which, local administrator accounts can be created for persistence. " T1136.002,Create Account, Domain Account," Prior to infecting a victim with malware such as Black Kingdom ransomware, attackers will often create domain administrator accounts, achieved through various means such as VPN login with compromised credentials. " T1136.002,Create Account, Domain Account," CobaltStrike persistence functionality allows for the creation of a new administrator account once a domain account has been compromised, which is then added to the Administrator domain and granting the new account AD domain privileges. " T1136.001,Create Account, Local Account,APT3 has been known to create or enable accounts such as support_388945a0. T1136.001,Create Account, Local Account, APT39 has created accounts on multiple compromised hosts to perform actions within the network. T1136.001,Create Account, Local Account, APT41 created user accounts and adds them to the User and Admin groups. T1136.001,Create Account, Local Account, Calisto has the capability to add its own account to the victim's machine. T1136.001,Create Account, Local Account, Carbanak can create a Windows account. T1136.001,Create Account, Local Account, Dragonfly 2.0 created accounts on victims including administrator accounts some of which appeared to be tailored to each individual staging target. T1136.001,Create Account, Local Account, Empire has a module for creating a local user if permissions allow. T1136.001,Create Account, Local Account, Flame can create backdoor accounts with loginHelpAssistant on domain connected systems if appropriate rights are available. T1136.001,Create Account, Local Account, Fox Kitten has created a local user account with administrator privileges. T1136.001,Create Account, Local Account, GoldenSpy can create new users on an infected system. T1136.001,Create Account, Local Account, HiddenWasp creates a user account as a means to provide initial persistence to the compromised machine. T1136.001,Create Account, Local Account, Hildegard has created a user namedmonerodaemon. T1136.001,Create Account, Local Account, Leafminer used a tool called Imecab to set up a persistent remote access account on the victim machine. T1136.001,Create Account, Local Account, Mis-Type may create a temporary user on the system namedLost_{Unique Identifier}. T1136.001,Create Account, Local Account, The net user username \password commands in Net can be used to create a local account. T1136.001,Create Account, Local Account, Pupy can user PowerView to executenet user commands and create local system accounts. T1136.001,Create Account, Local Account, S-Type may create a temporary user on the system namedLost_{Unique Identifier} with the passwordpond~!@6{Unique Identifier}. T1136.001,Create Account, Local Account," ServHelper has created a new user and added it to the Remote Desktop Users"" and ""Administrators"" groups. " T1136.001,Create Account, Local Account," ZxShell has a feature to create local user accounts.""" T1136.001,Create Account, Local Account,A known TTP of APT34 is to create local user accounts with the net command for the purpose of lateral movement. T1136.001,Create Account, Local Account, BazarLoader is known to deploy CobaltStrike beacons which create local accounts in addition to domain accounts. T1136.001,Create Account, Local Account, Threat actors often create local accounts to maintain presence within a network before infecting machines with ransomware such as Phobos or RagnarLocker. T1195.003,Supply Chain Compromise, Compromise Hardware Supply Chain,"APT41 historically executed supply chain compromises, often via modification of hardware systems. " T1195.003,Supply Chain Compromise, Compromise Hardware Supply Chain," Through modifying the hardware functionality of certain systems, backdoors can be maintained and utilized. " T1195.003,Supply Chain Compromise, Compromise Hardware Supply Chain," APT groups will often attempt to manipulate hardware components of systems to their advantage, such as with Stuxnet. " T1195.003,Supply Chain Compromise, Compromise Hardware Supply Chain, Industrial Control Systems (ICS) are often a target of attack with threat actors aiming to abuse hardware functionality. T1195.003,Supply Chain Compromise, Compromise Hardware Supply Chain, Threat actors will often establish initial access with a system via the abuse of hardware components. T1546.002,Event Triggered Execution, Screensaver,Gazer can establish persistence through the system screensaver by configuring it to execute the malware. T1546.002,Event Triggered Execution, Screensaver,Persistence can be maintained via user inactivity through masking a malicious executable as a screensaver .scr file. T1546.002,Event Triggered Execution, Screensaver, FIN13 will modify screensaver files to execute persistence functionality. T1546.002,Event Triggered Execution, Screensaver," By hiding code as screensaver files, their privileges can be executed as these files are run within the privileged environment of the C:\Windows\System32\, and C:\Windows\sysWOW64\ folders. " T1546.002,Event Triggered Execution, Screensaver, CobaltStrike functionality allows for the creation of disposable processes that can establish persistence via the injection of malicious code into .scr files on Windows machines. T1003.008,OS Credential Dumping, /Etc/Passwd And /Etc/Shadow,LaZagne can obtain credential information from /etc/shadow using the shadow.py module. T1003.008,OS Credential Dumping, /Etc/Passwd And /Etc/Shadow,"MAZE ransomware will enumerate user credentials by dumping user passwords, usually hashed passwords from /passwd directory. " T1003.008,OS Credential Dumping, /Etc/Passwd And /Etc/Shadow, Dumping credentials from the /etc/shadow directory is one way that EKANS ransomware steals credentials. T1003.008,OS Credential Dumping, /Etc/Passwd And /Etc/Shadow," Netwalker deploys various methods for credential stealing, including utilising LaZagne to dump the shadow directory contents. " T1003.008,OS Credential Dumping, /Etc/Passwd And /Etc/Shadow, Ransomware such as SODINOKIBI will attempt to dump hashed files from the /etc/passwd directory for offline breaking as they are easier to acquire than the shadow directory. T1137.002,Office Application Startup, Office Test,APT28 has used the Office Test persistence mechanism within Microsoft Office by adding the Registry key HKCU\Software\Microsoft\Office test\Special\Perf to execute code. T1137.002,Office Application Startup, Office Test,"Cybersecurity professionals should monitor registry activity for Office, to ensure that on startup, it does not execute malicious binaries within the registry. " T1137.002,Office Application Startup, Office Test, DIRTPYLE malware will use Office startup to execute malicious binaries utilising the registry key HKCU\Software\Microsoft\Office test\Special\Perf. T1137.002,Office Application Startup, Office Test, Gamaredon group favour the tactic of maintaining persistence through abusing Office startup registry keys. T1137.002,Office Application Startup, Office Test," The ""Office Test '' Registry key does not come installed with Office by default so detecting it's presence within a system could be a sign of malicious activity. " T1553.004,Subvert Trust Controls, Install Root Certificate,certutil can be used to install browser root certificates as a precursor to performing man-in-the-middle between connections to banking websites. Example command: certutil -addstore -f -user ROOT ProgramData\cert512121.der. T1553.004,Subvert Trust Controls, Install Root Certificate, Dok installs a root certificate to aid in man-in-the-middle actions. T1553.004,Subvert Trust Controls, Install Root Certificate, Hikit uses certmgr.exe -add GlobalSign.cer -c -s -r localMachine Root and certmgr.exe -add GlobalSign.cer -c -s -r localMachineTrustedPublisher to install a self-generated certificate to the local trust store as a root CA and Trusted Publisher. T1553.004,Subvert Trust Controls, Install Root Certificate, RTM can add a certificate to the Windows store. T1553.004,Subvert Trust Controls, Install Root Certificate,"Babuk ransomware often installs a root certificate during its initial download stages to legitimise it's connections, often to C2 servers. " T1553.004,Subvert Trust Controls, Install Root Certificate," Netfilter.sys, a malicious driver for Windows Hardware Quality Labs (WHQL), installs a root certificate to authenticate the C2 server domains that are contained within a simultaneously downloaded code. " T1553.004,Subvert Trust Controls, Install Root Certificate," A common TTP of APT Group DarkSide is to bypass detection on victim machines through installing a root certificate, before installing ransomware of the machine. " T1003.007,OS Credential Dumping, Proc Filesystem,LaZagne can obtain credential information running Linux processes. T1003.007,OS Credential Dumping, Proc Filesystem, MimiPenguin can dump process memory and extract clear-text credentials. T1003.007,OS Credential Dumping, Proc Filesystem,APT31 can dump credentials from programs in memory by running proc as root using stolen credentials. T1003.007,OS Credential Dumping, Proc Filesystem," DarkSide, an APT group, will obtain access to an account using legitimate credentials, then gather information about the /proc directory to enumerate user credentials. " T1003.007,OS Credential Dumping, Proc Filesystem," Care should be taken around how much data proc gathers, as it can steal credentials in memory that cannot be obfuscated there. " T1090.001,Proxy, Internal Proxy,APT29 configured at least one instance of Cobalt Strike to use a network pipe over SMB during the 2020 SolarWinds intrusion. T1090.001,Proxy, Internal Proxy, APT39 used custom tools to create SOCK5 and custom protocol proxies between infected hosts. T1090.001,Proxy, Internal Proxy," The ZJ"" variant of BACKSPACE allows ""ZJ link"" infections with Internet access to relay traffic from ""ZJ listen"" to a command server. " T1090.001,Proxy, Internal Proxy, CHOPSTICK used a proxy server between victims and the C2 server. T1090.001,Proxy, Internal Proxy, Cobalt Strike can be configured to have commands relayed over a peer-to-peer network of infected hosts. This can be used to limit the number of egress points or provide access to a host without direct internet access. T1090.001,Proxy, Internal Proxy, Drovorub can use a port forwarding rule on its agent module to relay network traffic through the client module to a remote host on the same network. T1090.001,Proxy, Internal Proxy, Duqu can be configured to have commands relayed over a peer-to-peer network of infected hosts if some of the hosts do not have Internet access. T1090.001,Proxy, Internal Proxy, FatDuke can used pipes to connect machines with restricted internet access to remote machines via other infected hosts. T1090.001,Proxy, Internal Proxy, Higaisa discovered system proxy settings and used them if available. T1090.001,Proxy, Internal Proxy, Hikit supports peer connections. T1090.001,Proxy, Internal Proxy, InvisiMole can function as a proxy to create a server that relays communication between the client and C&C server or between two clients. T1090.001,Proxy, Internal Proxy, Kazuar has used internal nodes on the compromised network for C2 communications. T1090.001,Proxy, Internal Proxy, MiniDuke can can use a named pipe to forward communications from one compromised machine with internet access to other compromised machines. T1090.001,Proxy, Internal Proxy, Operation Wocao can proxy traffic through multiple infected systems. T1090.001,Proxy, Internal Proxy, Pay2Key has designated machines in the compromised network to serve as reverse proxy pivot points to channel communications with C2. T1090.001,Proxy, Internal Proxy, Strider has used local servers with both local network and Internet access to act as internal proxy nodes to exfiltrate data from other parts of the network without direct Internet access. T1090.001,Proxy, Internal Proxy," UNC2452 configured at least one instance of Cobalt Strike to use a network pipe over SMB during the 2020 SolarWinds intrusion.""" T1090.001,Proxy, Internal Proxy,"APT group SparklingGoblin often deploy SideWalk, a backdoor which utilises shellcode containing C2 domains which are communicated with through the use of an internal proxy. " T1090.001,Proxy, Internal Proxy," Pysa, a prolific ransomware group, utilises a Chisel tunneling tool named MagicSocks to obfuscate malicious, outbound traffic. " T1090.001,Proxy, Internal Proxy, SOCKS proxy tool Earthworm is a commonly distributed proxy tool that hosts a variety of functionality for communication with outside networks. T1001.003,Data Obfuscation, Protocol Impersonation,BADCALL uses a FakeTLS method during C2. T1001.003,Data Obfuscation, Protocol Impersonation, Bankshot generates a false TLS handshake using a public certificate to disguise C2 network communications. T1001.003,Data Obfuscation, Protocol Impersonation, FakeM C2 traffic attempts to evade detection by resembling data generated by legitimate messenger applications such as MSN and Yahoo! messengers. Additionally some variants of FakeM use modified SSL code for communications back to C2 servers making SSL decryption ineffective. T1001.003,Data Obfuscation, Protocol Impersonation, FALLCHILL uses fake Transport Layer Security (TLS) to communicate with its C2 server. T1001.003,Data Obfuscation, Protocol Impersonation, HARDRAIN uses FakeTLS to communicate with its C2 server. T1001.003,Data Obfuscation, Protocol Impersonation, Higaisa used a FakeTLS session for C2 communications. T1001.003,Data Obfuscation, Protocol Impersonation, InvisiMole can mimic HTTP protocol with custom HTTPverbs HIDE ZVVP and NOP. T1001.003,Data Obfuscation, Protocol Impersonation, KeyBoy uses custom SSL libraries to impersonate SSL in C2 traffic. T1001.003,Data Obfuscation, Protocol Impersonation, Lazarus Group malware also uses a unique form of communication encryption known as FakeTLS that mimics TLS but uses a different encryption method evading SSL man-in-the-middle decryption attacks. T1001.003,Data Obfuscation, Protocol Impersonation, Okrum mimics HTTP protocol for C2 communication while hiding the actual messages in the Cookie and Set-Cookie headers of the HTTP requests. T1001.003,Data Obfuscation, Protocol Impersonation, SUNBURST masqueraded its network traffic as the Orion Improvement Program (OIP) protocol. T1001.003,Data Obfuscation, Protocol Impersonation, TAINTEDSCRIBE has used FakeTLS for session authentication. T1001.003,Data Obfuscation, Protocol Impersonation,WellMass malware obfuscates it's C2 communications through abusing TLS via a hardcoded certificate. T1001.003,Data Obfuscation, Protocol Impersonation, APT40 includes API keys for Dropbox in every command when uploading stolen data in an attempt to mask the activity as legitimate. T1001.003,Data Obfuscation, Protocol Impersonation, Winnti (APT41) utilises the Crosswalk backdoor which abuses FakeTLS to obfuscate C2 traffic. T1001.002,Data Obfuscation, Steganography,APT29 has used steganography to hide C2 communications in images. T1001.002,Data Obfuscation, Steganography, Some malware that has been used by Axiom also uses steganography to hide communication in PNG image files. T1001.002,Data Obfuscation, Steganography, Daserf can use steganography to hide malicious code downloaded to the victim. T1001.002,Data Obfuscation, Steganography, When the Duqu command and control is operating over HTTP or HTTPS Duqu uploads data to its controller by appending it to a blank JPG file. T1001.002,Data Obfuscation, Steganography, HAMMERTOSS is controlled via commands that are appended to image files. T1001.002,Data Obfuscation, Steganography, LightNeuron is controlled via commands that are embedded into PDFs and JPGs using steganographic methods. T1001.002,Data Obfuscation, Steganography, RDAT can process steganographic images attached to email messages to send and receive C2 commands. RDAT can also embed additional messages within BMP images to communicate with the RDAT operator. T1001.002,Data Obfuscation, Steganography, SUNBURST C2 data attempted to appear as benign XML related to .NET assemblies or as a faux JSON blob. T1001.002,Data Obfuscation, Steganography, ZeroT has retrieved stage 2 payloads as Bitmap images that use Least Significant Bit (LSB) steganography. T1001.001,Data Obfuscation, Junk Data,"APT28 added junk data"" to each encoded string preventing trivial decoding without knowledge of the junk removal algorithm. Each implant was given a ""junk length"" value when created tracked by the controller software to allow seamless communication but prevent analysis of the command protocol on the wire. " T1001.001,Data Obfuscation, Junk Data, BendyBear has used byte randomization to obscure its behavior. T1001.001,Data Obfuscation, Junk Data, Downdelph inserts pseudo-random characters between each original character during encoding of C2 network requests making it difficult to write signatures on them. T1001.001,Data Obfuscation, Junk Data, GoldMax has used decoy traffic to surround its malicious network traffic to avoid detection. T1001.001,Data Obfuscation, Junk Data, P2P ZeuS added junk data to outgoing UDP packets to peer implants. T1001.001,Data Obfuscation, Junk Data, PLEAD samples were found to be highly obfuscated with junk code. T1001.001,Data Obfuscation, Junk Data, SUNBURST added junk bytes to its C2 over HTTP. T1001.001,Data Obfuscation, Junk Data," WellMess can use junk data in the Base64 string for additional obfuscation.""" T1001.001,Data Obfuscation, Junk Data,"Data obfuscation is acheived for the WellMass malware through adding junk to it's C2 communications, achieved by replacing characters with base64 encoded ones. " T1001.001,Data Obfuscation, Junk Data, CISA notes that junk data to obfuscate Command and Control activities is a favourite Technique of APT groups which target America. T1001.001,Data Obfuscation, Junk Data," With the aim to make analysis of their code more difficult and time consuming, the develepers of Cerberus jumble their code to hide it's functionality. " T1132.002,Data Encoding, Non,Newer variants of BACKSPACE will encode C2 communications with a custom system. T1132.002,Data Encoding, Non, Bankshot encodes commands from the control server using a range of characters and gzip. T1132.002,Data Encoding, Non, InvisiMole can use a modified base32 encoding to encode data within the subdomain of C2 requests. T1132.002,Data Encoding, Non, OceanSalt can encode data with a NOT operation before sending the data to the control server. T1132.002,Data Encoding, Non, RDAT can communicate with the C2 via subdomains that utilize base64 with character substitutions. T1132.002,Data Encoding, Non, ShadowPad has encoded data as readable Latin characters. T1132.001,Data Encoding, Standard Encoding,C2 traffic from ADVSTORESHELL is encrypted then encoded with Base64 encoding. T1132.001,Data Encoding, Standard Encoding, An APT19 HTTP malware variant used Base64 to encode communications to the C2 server. T1132.001,Data Encoding, Standard Encoding, APT33 has used base64 to encode command and control traffic. T1132.001,Data Encoding, Standard Encoding, Astaroth encodes data using Base64 before sending it to the C2 server. T1132.001,Data Encoding, Standard Encoding, AutoIt backdoor has sent a C2 response that was base64-encoded. T1132.001,Data Encoding, Standard Encoding, BabyShark has encoded data using certutil before exfiltration. T1132.001,Data Encoding, Standard Encoding, Some Backdoor.Oldrea samples use standard Base64 + bzip2 and some use standard Base64 + reverse XOR + RSA-2048 to decrypt data received from C2 servers. T1132.001,Data Encoding, Standard Encoding, BADNEWS encodes C2 traffic with base64. T1132.001,Data Encoding, Standard Encoding, BLINDINGCAN has encoded its C2 traffic with Base64. T1132.001,Data Encoding, Standard Encoding, Several BRONZE BUTLER tools encode data with base64 when posting it to a C2 server. T1132.001,Data Encoding, Standard Encoding, BS2005 uses Base64 encoding for communication in the message body of an HTTP request. T1132.001,Data Encoding, Standard Encoding, Carbanak encodes the message body of HTTP traffic with Base64. T1132.001,Data Encoding, Standard Encoding, ChChes can encode C2 data with a custom technique that utilizes Base64. T1132.001,Data Encoding, Standard Encoding, Cobian RAT obfuscates communications with the C2 server using Base64 encoding. T1132.001,Data Encoding, Standard Encoding, CORESHELL C2 messages are Base64-encoded. T1132.001,Data Encoding, Standard Encoding, Daserf uses custom base64 encoding to obfuscate HTTP traffic. T1132.001,Data Encoding, Standard Encoding, Denis encodes the data sent to the server in Base64. T1132.001,Data Encoding, Standard Encoding, Dipsind encodes C2 traffic with base64. T1132.001,Data Encoding, Standard Encoding, down_new has the ability to base64 encode C2 communications. T1132.001,Data Encoding, Standard Encoding, Ebury has encoded C2 traffic in hexadecimal format. T1132.001,Data Encoding, Standard Encoding, Elise exfiltrates data using cookie values that are Base64-encoded. T1132.001,Data Encoding, Standard Encoding, Some Felismus samples use a custom method for C2 traffic that utilizes Base64. T1132.001,Data Encoding, Standard Encoding, Fysbis can use Base64 to encode its C2 traffic. T1132.001,Data Encoding, Standard Encoding, gh0st RAT has used Zlib to compress C2 communications data before encrypting it. T1132.001,Data Encoding, Standard Encoding, HAFNIUM has used ASCII encoding for C2 traffic. T1132.001,Data Encoding, Standard Encoding," For C2 over HTTP Helminth encodes data with base64 and sends it via the Cookie"" field of HTTP requests. For C2 over DNS Helminth converts ASCII characters into their hexadecimal values and sends the data in cleartext. " T1132.001,Data Encoding, Standard Encoding, HOPLIGHT has utilized Zlib compression to obfuscate the communications payload. T1132.001,Data Encoding, Standard Encoding, Ixeshe uses custom Base64 encoding schemes to obfuscate command and control traffic in the message body of HTTP requests. T1132.001,Data Encoding, Standard Encoding, A JHUHUGIT variant encodes C2 POST data base64. T1132.001,Data Encoding, Standard Encoding, Kazuar encodes communications to the C2 server in Base64. T1132.001,Data Encoding, Standard Encoding, Kessel has exfiltrated data via hexadecimal-encoded subdomain fields of DNS queries. T1132.001,Data Encoding, Standard Encoding, KONNI has used a custom base64 key to encode stolen data before exfiltration. T1132.001,Data Encoding, Standard Encoding, A Lazarus Group malware sample encodes data with base64. T1132.001,Data Encoding, Standard Encoding, Machete has used base64 encoding. T1132.001,Data Encoding, Standard Encoding, MechaFlounder has the ability to use base16 encoded strings in C2. T1132.001,Data Encoding, Standard Encoding, Mis-Type uses Base64 encoding for C2 traffic. T1132.001,Data Encoding, Standard Encoding, Misdat network traffic is Base64-encoded plaintext. T1132.001,Data Encoding, Standard Encoding, More_eggs has used basE91 encoding along with encryption for C2 communication. T1132.001,Data Encoding, Standard Encoding, MuddyWater has used tools to encode C2 communications including Base64 encoding. T1132.001,Data Encoding, Standard Encoding, njRAT uses Base64 encoding for C2 traffic. T1132.001,Data Encoding, Standard Encoding, Octopus encodes C2 communications in Base64. T1132.001,Data Encoding, Standard Encoding, Okrum has used base64 to encode C2 communication. T1132.001,Data Encoding, Standard Encoding, OopsIE encodes data in hexadecimal format over the C2 channel. T1132.001,Data Encoding, Standard Encoding, Patchwork used Base64 to encode C2 traffic. T1132.001,Data Encoding, Standard Encoding, Responses from the Pisloader C2 server are base32-encoded. T1132.001,Data Encoding, Standard Encoding, PowerShower has the ability to encode C2 communications with base64 encoding. T1132.001,Data Encoding, Standard Encoding, POWERSTATS encoded C2 traffic with base64. T1132.001,Data Encoding, Standard Encoding, POWRUNER can use base64 encoded C2 communications. T1132.001,Data Encoding, Standard Encoding, Prikormka encodes C2 traffic with Base64. T1132.001,Data Encoding, Standard Encoding, QUADAGENT encodes C2 communications with base64. T1132.001,Data Encoding, Standard Encoding, Ramsay has used base64 to encode its C2 traffic. T1132.001,Data Encoding, Standard Encoding, RDAT can communicate with the C2 via base32-encoded subdomains. T1132.001,Data Encoding, Standard Encoding, Revenge RAT uses Base64 to encode information sent to the C2 server. T1132.001,Data Encoding, Standard Encoding, RogueRobin base64 encodes strings that are sent to the C2 over its DNS tunnel. T1132.001,Data Encoding, Standard Encoding, S-Type uses Base64 encoding for C2 traffic. T1132.001,Data Encoding, Standard Encoding, Sandworm Team's BCS-server tool uses base64 encoding and HTML tags for the communication traffic between the C2 server. T1132.001,Data Encoding, Standard Encoding, SeaDuke C2 traffic is base64-encoded. T1132.001,Data Encoding, Standard Encoding, Spark has encoded communications with the C2 server with base64. T1132.001,Data Encoding, Standard Encoding, SpeakUp encodes C&C communication using Base64. T1132.001,Data Encoding, Standard Encoding, SUNBURST used Base64 encoding in its C2 traffic. T1132.001,Data Encoding, Standard Encoding, TA551 has used encoded ASCII text for initial C2 communications. T1132.001,Data Encoding, Standard Encoding, TrickBot can Base64-encode C2 commands. T1132.001,Data Encoding, Standard Encoding, Tropic Trooper has used base64 encoding to hide command strings delivered from the C2. T1132.001,Data Encoding, Standard Encoding, Valak has returned C2 data as encoded ASCII. T1132.001,Data Encoding, Standard Encoding, WellMess has used Base64 encoding to uniquely identify communication to and from the C2. T1132.001,Data Encoding, Standard Encoding," Zebrocy has used URL/Percent Encoding on data exfiltrated via HTTP POST requests.""" T1069.002,Permission Groups Discovery, Domain Groups,AdFind can enumerate domain groups. T1069.002,Permission Groups Discovery, Domain Groups, BloodHound can collect information about domain groups and members. T1069.002,Permission Groups Discovery, Domain Groups, CrackMapExec can gather the user accounts within domain groups. T1069.002,Permission Groups Discovery, Domain Groups, Dragonfly 2.0 used batch scripts to enumerate administrators and users in the domain. T1069.002,Permission Groups Discovery, Domain Groups, dsquery can be used to gather information on permission groups within a domain. T1069.002,Permission Groups Discovery, Domain Groups, Egregor can conduct Active Directory reconnaissance using tools such as Sharphound or AdFind. T1069.002,Permission Groups Discovery, Domain Groups, GRIFFON has used a reconnaissance module that can be used to retrieve Windows domain membership information. T1069.002,Permission Groups Discovery, Domain Groups, Helminth has checked for the domain admin group and Exchange Trusted Subsystem groups using the commands net group Exchange Trusted Subsystem /domain and net group domain admins /domain. T1069.002,Permission Groups Discovery, Domain Groups, Inception has used specific malware modules to gather domain membership. T1069.002,Permission Groups Discovery, Domain Groups, Ke3chang performs discovery of permission groups net group /domain. T1069.002,Permission Groups Discovery, Domain Groups, Kwampirs collects a list of domain groups with the command net localgroup /domain. T1069.002,Permission Groups Discovery, Domain Groups, Commands such as net group /domain can be used in Net to gather information about and manipulate groups. T1069.002,Permission Groups Discovery, Domain Groups, OilRig has used net group /domain net groupdomain admins /domain and net groupExchange Trusted Subsystem /domain to find domain group permission settings. T1069.002,Permission Groups Discovery, Domain Groups, OSInfo specifically looks for Domain Admins and power users within the domain. T1069.002,Permission Groups Discovery, Domain Groups, POWRUNER may collect domain group information by running net group /domain or a series of other commands on a victim. T1069.002,Permission Groups Discovery, Domain Groups, REvil can identify the domain membership of a compromised host. T1069.002,Permission Groups Discovery, Domain Groups, SoreFang can enumerate domain groups by executing net.exe group /domain. T1069.002,Permission Groups Discovery, Domain Groups," Turla has used net group Domain Admins"" /domain to identify domain administrators. " T1069.002,Permission Groups Discovery, Domain Groups," WellMess can identify domain group membership for the current user.""" T1204.002,User Execution, Malicious File,admin@338 has attempted to get victims to launch malicious Microsoft Word attachments delivered via spearphishing emails. T1204.002,User Execution, Malicious File, Agent Tesla has been executed through malicious e-mail attachments T1204.002,User Execution, Malicious File, Ajax Security Team has lured victims into executing malicious files. T1204.002,User Execution, Malicious File, AppleJeus has required user execution of a malicious MSI installer. T1204.002,User Execution, Malicious File, APT-C-36 has prompted victims to accept macros in order to execute the subsequent payload. T1204.002,User Execution, Malicious File, APT12 has attempted to get victims to open malicious Microsoft Word and PDF attachment sent via spearphishing. T1204.002,User Execution, Malicious File, APT19 attempted to get users to launch malicious attachments delivered via spearphishing emails. T1204.002,User Execution, Malicious File, APT28 attempted to get users to click on Microsoft Office attachments containing malicious macro scripts. T1204.002,User Execution, Malicious File, APT29 has used various forms of spearphishing attempting to get a user to open attachments including but not limited to malicious Microsoft Word documents .pdf and .lnk files. T1204.002,User Execution, Malicious File, APT30 has relied on users to execute malicious file attachments delivered via spearphishing emails. T1204.002,User Execution, Malicious File, APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment. T1204.002,User Execution, Malicious File, APT33 has used malicious e-mail attachments to lure victims into executing malware. T1204.002,User Execution, Malicious File, APT37 has sent spearphishing attachments attempting to get a user to open them. T1204.002,User Execution, Malicious File, APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious attachment. T1204.002,User Execution, Malicious File, Astaroth has used malicious files including VBS LNK and HTML for execution. T1204.002,User Execution, Malicious File, BlackTech has used e-mails with malicious documents to lure victims into installing malware. T1204.002,User Execution, Malicious File, BLINDINGCAN has lured victims into executing malicious macros embedded within Microsoft Office documents. T1204.002,User Execution, Malicious File, BRONZE BUTLER has attempted to get users to launch malicious Microsoft Word attachments delivered via spearphishing emails. T1204.002,User Execution, Malicious File, Bundlore has attempted to get users to execute a malicious .app file that looks like a Flash Player update. T1204.002,User Execution, Malicious File, Cardinal RAT lures victims into executing malicious macros embedded within Microsoft Excel documents. T1204.002,User Execution, Malicious File, CARROTBALL has been executed through users being lured into opening malicious e-mail attachments. T1204.002,User Execution, Malicious File, Cobalt Group has sent emails containing malicious attachments that require users to execute a file or macro to infect the victim machine. T1204.002,User Execution, Malicious File, CSPY Downloader has been delivered via malicious documents with embedded macros. T1204.002,User Execution, Malicious File, Dark Caracal makes their malware look like Flash Player Office or PDF documents in order to entice a user to click on it. T1204.002,User Execution, Malicious File, Darkhotel has sent spearphishing emails in an attempt to lure users into clicking on a malicious attachments. T1204.002,User Execution, Malicious File, DarkHydrus has sent malware that required users to hit the enable button in Microsoft Excel to allow an .iqy file to be downloaded. T1204.002,User Execution, Malicious File, Dragonfly 2.0 has used various forms of spearphishing in attempts to get users to open attachments. T1204.002,User Execution, Malicious File, Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open attachments. T1204.002,User Execution, Malicious File, Emotet has relied upon users clicking on a malicious attachment delivered through spearphishing. T1204.002,User Execution, Malicious File, FIN4 has lured victims to launch malicious attachments delivered via spearphishing emails (often sent from compromised accounts). T1204.002,User Execution, Malicious File, FIN6 has used malicious documents to lure victims into allowing execution of PowerShell scripts. T1204.002,User Execution, Malicious File, FIN7 lured victims to double-click on images in the attachments they sent which would then execute the hidden LNK file. T1204.002,User Execution, Malicious File, FIN8 has leveraged Spearphishing Attachments attempting to gain User Execution. T1204.002,User Execution, Malicious File, Frankenstein has used trojanized Microsoft Word documents sent via email which prompted the victim to enable macros. T1204.002,User Execution, Malicious File, Gallmaker sent victims a lure document with a warning that asked victims toenable content for execution. T1204.002,User Execution, Malicious File, Gamaredon Group has attempted to get users to click on Office attachments with malicious macros embedded. T1204.002,User Execution, Malicious File, Gorgon Group attempted to get users to launch malicious Microsoft Office attachments delivered via spearphishing emails. T1204.002,User Execution, Malicious File, Grandoreiro has infected victims via malicious attachments. T1204.002,User Execution, Malicious File, The GuLoader executable has been retrieved via embedded macros in malicious Word documents. T1204.002,User Execution, Malicious File, Hancitor has used malicious Microsoft Word documents sent via email which prompted the victim to enable macros. T1204.002,User Execution, Malicious File, Higaisa used malicious e-mail attachments to lure victims into executing LNK files. T1204.002,User Execution, Malicious File, IcedID has been executed through Word documents with malicious embedded macros. T1204.002,User Execution, Malicious File, Inception lured victims into clicking malicious files for machine reconnaissance and to execute malware. T1204.002,User Execution, Malicious File, InvisiMole can deliver trojanized versions of software and documents relying on user execution. T1204.002,User Execution, Malicious File, Javali has achieved execution through victims opening malicious attachments including MSI files with embedded VBScript. T1204.002,User Execution, Malicious File, JCry has achieved execution by luring users to click on a file that appeared to be an Adobe Flash Player update installer. T1204.002,User Execution, Malicious File, Kerrdown has gained execution through victims opening malicious files. T1204.002,User Execution, Malicious File, KGH_SPY has been spread through Word documents containing malicious macros. T1204.002,User Execution, Malicious File, Kimsuky has used attempted to lure victims into opening malicious e-mail attachments. T1204.002,User Execution, Malicious File, Lazarus Group has attempted to get users to launch a malicious Microsoft Word attachment delivered via a spearphishing email. T1204.002,User Execution, Malicious File, Leviathan has sent spearphishing attachments attempting to get a user to click. T1204.002,User Execution, Malicious File, Lokibot has been executed through malicious documents contained in spearphishing e-mails. T1204.002,User Execution, Malicious File, Machete has has relied on users opening malicious attachments delivered through spearphishing to execute malware. T1204.002,User Execution, Malicious File, menuPass has attempted to get victims to open malicious files such as Windows Shortcuts (.lnk) and/or Microsoft Office documents sent via email as part of spearphishing campaigns. T1204.002,User Execution, Malicious File, Metamorfo requires the user to double-click the executable to run the malicious HTA file. T1204.002,User Execution, Malicious File, Mofang's malicious spearphishing attachments required a user to open the file after receiving. T1204.002,User Execution, Malicious File, Molerats has sent malicious files via email that tricked users into clicking Enable Content to run an embedded macro and to download malicious archives. T1204.002,User Execution, Malicious File, MuddyWater has attempted to get users to enable macros and launch malicious Microsoft Word documents delivered via spearphishing emails. T1204.002,User Execution, Malicious File, Mustang Panda has sent malicious files requiring direct victim interaction to execute. T1204.002,User Execution, Malicious File, Naikon has convinced victims to open malicious attachments to execute malware. T1204.002,User Execution, Malicious File, NETWIRE has been executed through luring victims into opening malicious documents. T1204.002,User Execution, Malicious File," OilRig has delivered macro-enabled documents that required targets to click the enable content"" button to execute the payload on the system. " T1204.002,User Execution, Malicious File, OSX/Shlayer relies on users mounting and executing a malicious DMG file. T1204.002,User Execution, Malicious File, Patchwork embedded a malicious macro in a Word document and lured the victim to click on an icon to execute the malware. T1204.002,User Execution, Malicious File, PLATINUM has attempted to get users to open malicious files by sending spearphishing emails with attachments to victims. T1204.002,User Execution, Malicious File, PLEAD has been executed via malicious e-mail attachments. T1204.002,User Execution, Malicious File, PoetRAT has used spearphishing attachments to infect victims. T1204.002,User Execution, Malicious File, Pony has attempted to lure targets into downloading an attached executable (ZIP RAR or CAB archives) or document (PDF or other MS Office format). T1204.002,User Execution, Malicious File, PROMETHIUM has attempted to get users to execute compromised installation files for legitimate software including compression applications security software browsers file recovery applications and other tools and utilities. T1204.002,User Execution, Malicious File, Ramsay has been executed through malicious e-mail attachments. T1204.002,User Execution, Malicious File, Rancor attempted to get users to click on an embedded macro within a Microsoft Office Excel document to launch their malware. T1204.002,User Execution, Malicious File, REvil has been executed via malicious MS Word e-mail attachments. T1204.002,User Execution, Malicious File, Rifdoor has been executed from malicious Excel or Word documents containing macros. T1204.002,User Execution, Malicious File, RTM has attempted to lure victims into opening e-mail attachments to execute malicious code. T1204.002,User Execution, Malicious File, RTM has relied on users opening malicious email attachments decompressing the attached archive and double-clicking the executable within. T1204.002,User Execution, Malicious File, Sandworm Team has tricked unwitting recipients into clicking on spearphishing attachments and enabling malicious macros embedded within files. T1204.002,User Execution, Malicious File, Sharpshooter has sent malicious DOC and PDF files to targets so that they can be opened by a user. T1204.002,User Execution, Malicious File, Sidewinder has lured targets to click on malicious files to gain execution in the target environment. T1204.002,User Execution, Malicious File, Silence attempts to get users to launch malicious attachments delivered via spearphishing emails. T1204.002,User Execution, Malicious File, SQLRat relies on users clicking on an embedded image to execute the scripts. T1204.002,User Execution, Malicious File, StrongPity has been executed via compromised installation files for legitimate software including compression applications security software browsers file recovery applications and other tools and utilities. T1204.002,User Execution, Malicious File, SYSCON has been executed by luring victims to open malicious e-mail attachments. T1204.002,User Execution, Malicious File, TA459 has attempted to get victims to open malicious Microsoft Word attachment sent via spearphishing. T1204.002,User Execution, Malicious File, TA505 has used lures to get users to enable content in malicious attachments and execute malicious files contained in archives. For example TA505 makes their malware look like legitimate Microsoft Word documents .pdf and/or .lnk files. T1204.002,User Execution, Malicious File, TA551 has prompted users to enable macros within spearphishing attachments to install malware. T1204.002,User Execution, Malicious File, The White Company has used phishing lure documents that trick users into opening them and infecting their computers. T1204.002,User Execution, Malicious File, TrickBot has attempted to get users to launch malicious documents to deliver its payload. T1204.002,User Execution, Malicious File, Tropic Trooper has lured victims into executing malware via malicious e-mail attachments. T1204.002,User Execution, Malicious File, A Word document delivering TYPEFRAME prompts the user to enable macro execution. T1204.002,User Execution, Malicious File, Valak has been executed via Microsoft Word documents containing malicious macros. T1204.002,User Execution, Malicious File, Whitefly has used malicious .exe or .dll files disguised as documents or images. T1204.002,User Execution, Malicious File, Windshift has used e-mail attachments to lure victims into executing malicious code. T1204.002,User Execution, Malicious File," Wizard Spider has lured victims to execute malware with spearphishing attachments containing macros to download either Emotet Bokbot or TrickBot.""" T1204.001,User Execution, Malicious Link,AppleJeus's spearphishing links required user interaction to navigate to the malicious website. T1204.001,User Execution, Malicious Link, APT28 has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders. T1204.001,User Execution, Malicious Link, APT29 has used various forms of spearphishing attempting to get a user to click on a malicous link. T1204.001,User Execution, Malicious Link, APT32 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails. T1204.001,User Execution, Malicious Link, APT33 has lured users to click links to malicious HTML applications delivered via spearphishing emails. T1204.001,User Execution, Malicious Link, APT39 has sent spearphishing emails in an attempt to lure users to click on a malicious link. T1204.001,User Execution, Malicious Link, BackConfig has compromised victims via links to URLs hosting malicious content. T1204.001,User Execution, Malicious Link, Bazar can gain execution via malicious links to decoy landing pages hosted on Google Docs. T1204.001,User Execution, Malicious Link, BlackTech has used e-mails with malicious links to lure victims into installing malware. T1204.001,User Execution, Malicious Link, Cobalt Group has sent emails containing malicious links that require users to execute a file or macro to infect the victim machine. T1204.001,User Execution, Malicious Link, Dragonfly 2.0 has used various forms of spearphishing in attempts to get users to open links. T1204.001,User Execution, Malicious Link, Elderwood has leveraged multiple types of spearphishing in order to attempt to get a user to open links. T1204.001,User Execution, Malicious Link, Emotet has relied upon users clicking on a malicious link delivered through spearphishing. T1204.001,User Execution, Malicious Link, Evilnum has sent spearphishing emails designed to trick the recipient into opening malicious shortcut links which downloads a .LNK file. T1204.001,User Execution, Malicious Link, FIN4 has lured victims to click malicious links delivered via spearphishing emails (often sent from compromised accounts). T1204.001,User Execution, Malicious Link, FIN8 has leveraged Spearphishing Links attempting to gain User Execution. T1204.001,User Execution, Malicious Link, Grandoreiro has used malicious links to gain execution on victim machines. T1204.001,User Execution, Malicious Link, GuLoader has relied upon users clicking on links to malicious documents. T1204.001,User Execution, Malicious Link, Hancitor has relied upon users clicking on a malicious link delivered through phishing. T1204.001,User Execution, Malicious Link, Javali has achieved execution through victims clicking links to malicious websites. T1204.001,User Execution, Malicious Link, Kerrdown has gained execution through victims opening malicious links. T1204.001,User Execution, Malicious Link, Leviathan has sent spearphishing email links attempting to get a user to click. T1204.001,User Execution, Malicious Link, Machete has has relied on users opening malicious links delivered through spearphishing to execute malware. T1204.001,User Execution, Malicious Link, Melcoz has gained execution through victims opening malicious links. T1204.001,User Execution, Malicious Link, Mofang's spearphishing emails required a user to click the link to connect to a compromised website. T1204.001,User Execution, Malicious Link, Molerats has sent malicious links via email trick users into opening a RAR archive and running an executable. T1204.001,User Execution, Malicious Link, MuddyWater has distributed URLs in phishing e-mails that link to lure documents. T1204.001,User Execution, Malicious Link, Mustang Panda has sent malicious links directing victims to a Google Drive folder. T1204.001,User Execution, Malicious Link, NETWIRE has been executed through convincing victims into clicking malicious links. T1204.001,User Execution, Malicious Link, Night Dragon enticed users to click on links in spearphishing emails to download malware. T1204.001,User Execution, Malicious Link, OilRig has delivered malicious links to achieve execution on the target system. T1204.001,User Execution, Malicious Link, Patchwork has used spearphishing with links to try to get users to click download and open malicious files. T1204.001,User Execution, Malicious Link, PLEAD has been executed via malicious links in e-mails. T1204.001,User Execution, Malicious Link, Pony has attempted to lure targets into clicking links in spoofed emails from legitimate banks. T1204.001,User Execution, Malicious Link, Sandworm Team has tricked unwitting recipients into clicking on malicious hyperlinks within emails crafted to resemble trustworthy senders. T1204.001,User Execution, Malicious Link, Sidewinder has lured targets to click on malicious links to gain execution in the target environment. T1204.001,User Execution, Malicious Link, TA505 has used lures to get users to click links in emails and attachments. For example TA505 makes their malware look like legitimate Microsoft Word documents .pdf and/or .lnk files. T1204.001,User Execution, Malicious Link, TSCookie has been executed via malicious links embedded in e-mails spoofing the Ministries of Education Culture Sports Science and Technology of Japan. T1204.001,User Execution, Malicious Link, Turla has used spearphishing via a link to get users to download and run their malware. T1204.001,User Execution, Malicious Link, Windshift has used links embedded in e-mails to lure victims into executing malicious code. T1204.001,User Execution, Malicious Link, Wizard Spider has lured victims into clicking a malicious link delivered through spearphishing. T1204.001,User Execution, Malicious Link, ZIRCONIUM has used malicious links in e-mails to lure victims into downloading malware. T1195.002,Supply Chain Compromise, Compromise Software Supply Chain,APT29 gained initial network access to some victims via a trojanized update of SolarWinds Orion software. T1195.002,Supply Chain Compromise, Compromise Software Supply Chain, APT41 gained access to production environments where they could inject malicious code into legitimate signed files and widely distribute them to end users. T1195.002,Supply Chain Compromise, Compromise Software Supply Chain, CCBkdr was added to a legitimate signed version 5.33 of the CCleaner software and distributed on CCleaner's distribution site. T1195.002,Supply Chain Compromise, Compromise Software Supply Chain, Cobalt Group has compromised legitimate web browser updates to deliver a backdoor. T1195.002,Supply Chain Compromise, Compromise Software Supply Chain, Dragonfly has placed trojanized installers on legitimate vendor app stores. T1195.002,Supply Chain Compromise, Compromise Software Supply Chain, GOLD SOUTHFIELD has distributed ransomware by backdooring software installers via a strategic web compromise of the site hosting Italian WinRAR. T1195.002,Supply Chain Compromise, Compromise Software Supply Chain, GoldenSpy has been packaged with a legitimate tax preparation software. T1195.002,Supply Chain Compromise, Compromise Software Supply Chain, Sandworm Team has distributed NotPetya by compromising the legitimate Ukrainian accounting software M.E.Doc and replacing a legitimate software update with a malicious one. T1195.002,Supply Chain Compromise, Compromise Software Supply Chain, SUNSPOT malware was designed and used to insert SUNBURST into software builds of the SolarWinds Orion IT management product. T1195.002,Supply Chain Compromise, Compromise Software Supply Chain, UNC2452 gained initial network access via a trojanized update of SolarWinds Orion software. T1195.001,Supply Chain Compromise, Compromise Software Dependencies And Development Tools,APT10 (HOGFISH) will commonly comprise the software dependency of a company with the aim of gaining access to said company's infrastructure and their customers. T1195.001,Supply Chain Compromise, Compromise Software Dependencies And Development Tools," Supply chain compromise was common with COVID-19 domains, as over 5000 domains were registered within a few months, with many aiming to deliver malware. " T1195.001,Supply Chain Compromise, Compromise Software Dependencies And Development Tools," Rowhammer attacks compromise RAM, leading to the potential compromise of systems that use RAM from manufacturers that are vulnerable to such attacks. " T1195.001,Supply Chain Compromise, Compromise Software Dependencies And Development Tools, A Javascript skimmer named Pipka can skim the credentials of customers of over 27 e-commerce sites. T1195.001,Supply Chain Compromise, Compromise Software Dependencies And Development Tools, APT41 will use supply chain compromise attacks for initial access. T1565.002,Data Manipulation, Transmitted Data Manipulation,APT38 has used DYEPACK to manipulate SWIFT messages en route to a printer. T1565.002,Data Manipulation, Transmitted Data Manipulation, LightNeuron is capable of modifying email content headers and attachments during transit. T1565.002,Data Manipulation, Transmitted Data Manipulation, Melcoz can monitor the clipboard for cryptocurrency addresses and change the intended address to one controlled by the adversary. T1565.002,Data Manipulation, Transmitted Data Manipulation, Metamorfo has a function that can watch the contents of the system clipboard for valid bitcoin addresses which it then overwrites with the attacker's address. T1565.002,Data Manipulation, Transmitted Data Manipulation,Ransomware such as Babuk will modify the data within transmissions between their C2 servers and the compromised host to hide their malicious activity. T1565.001,Data Manipulation, Stored Data Manipulation,APT38 has used DYEPACK to create delete and alter records in databases used for SWIFT transactions. T1565.001,Data Manipulation, Stored Data Manipulation," FIN4 has created rules in victims' Microsoft Outlook accounts to automatically delete emails containing words such ashacked ""phish "" andmalware"" in a likely attempt to prevent organizations from communicating about their activities. " T1565.001,Data Manipulation, Stored Data Manipulation," SUNSPOT created a copy of the SolarWinds Orion software source file with a .bk extension to backup the original content wrote SUNBURST using the same filename but with a .tmp extension and then moved SUNBURST using MoveFileEx to the original filename with a .cs extension so it could be compiled within Orion software.""" T1565.001,Data Manipulation, Stored Data Manipulation,XMRLocker will delete log files to obfuscate malicious activity. T1565.001,Data Manipulation, Stored Data Manipulation, REvil will compromise end users and modify data stored on machines to hide their presence before delivery of an encryption payload. T1021.001,Remote Services, Remote Desktop Protocol,The APT1 group is known to have used RDP during operations. T1021.001,Remote Services, Remote Desktop Protocol, APT3 enables the Remote Desktop Protocol for persistence. APT3 has also interacted with compromised systems to browse and copy files through RDP sessions. T1021.001,Remote Services, Remote Desktop Protocol, APT39 has been seen using RDP for lateral movement and persistence in some cases employing the rdpwinst tool for mangement of multiple sessions. T1021.001,Remote Services, Remote Desktop Protocol, APT41 used RDP for lateral movement. T1021.001,Remote Services, Remote Desktop Protocol, The Axiom group is known to have used RDP during operations. T1021.001,Remote Services, Remote Desktop Protocol, Blue Mockingbird has used Remote Desktop to log on to servers interactively and manually copy files to remote hosts. T1021.001,Remote Services, Remote Desktop Protocol, Carbanak enables concurrent Remote Desktop Protocol (RDP) sessions. T1021.001,Remote Services, Remote Desktop Protocol, Chimera has used RDP to access targeted systems. T1021.001,Remote Services, Remote Desktop Protocol, Cobalt Group has used Remote Desktop Protocol to conduct lateral movement. T1021.001,Remote Services, Remote Desktop Protocol, Cobalt Strike can start a VNC-based remote desktop server and tunnel the connection through the already established C2 channel. T1021.001,Remote Services, Remote Desktop Protocol, DarkComet can open an active screen of the victimmachine and take control of the mouse and keyboard. T1021.001,Remote Services, Remote Desktop Protocol, Dragonfly 2.0 moved laterally via RDP. T1021.001,Remote Services, Remote Desktop Protocol, FIN10 has used RDP to move laterally to systems in the victim environment. T1021.001,Remote Services, Remote Desktop Protocol, FIN6 used RDP to move laterally in victim networks. T1021.001,Remote Services, Remote Desktop Protocol, FIN8 has used RDP for Lateral Movement. T1021.001,Remote Services, Remote Desktop Protocol, Fox Kitten has used RDP to log in and move laterally in the target environment. T1021.001,Remote Services, Remote Desktop Protocol, Imminent Monitor has a module for performing remote desktop access. T1021.001,Remote Services, Remote Desktop Protocol, jRAT can support RDP control. T1021.001,Remote Services, Remote Desktop Protocol, Koadic can enable remote desktop on the victim's machine. T1021.001,Remote Services, Remote Desktop Protocol, Lazarus Group malware SierraCharlie uses RDP for propagation. T1021.001,Remote Services, Remote Desktop Protocol, Leviathan has targeted RDP credentials and used it to move through the victim environment. T1021.001,Remote Services, Remote Desktop Protocol, menuPass has used RDP connections to move across the victim network. T1021.001,Remote Services, Remote Desktop Protocol, njRAT has a module for performing remote desktop access. T1021.001,Remote Services, Remote Desktop Protocol, OilRig has used Remote Desktop Protocol for lateral movement. The group has also used tunneling tools to tunnel RDP into the environment. T1021.001,Remote Services, Remote Desktop Protocol, Patchwork attempted to use RDP to move laterally. T1021.001,Remote Services, Remote Desktop Protocol, Pupy can enable/disable RDP connection and can start a remote desktop session using a browser web socket client. T1021.001,Remote Services, Remote Desktop Protocol, Pysa has laterally moved using RDP connections. T1021.001,Remote Services, Remote Desktop Protocol, QuasarRAT has a module for performing remote desktop access. T1021.001,Remote Services, Remote Desktop Protocol, Revenge RAT has a plugin to perform RDP access. T1021.001,Remote Services, Remote Desktop Protocol, SDBbot has the ability to use RDP to connect to victim's machines. T1021.001,Remote Services, Remote Desktop Protocol, ServHelper has commands for adding a remote desktop user and sending RDP traffic to the attacker through a reverse SSH tunnel. T1021.001,Remote Services, Remote Desktop Protocol, Silence has used RDP for lateral movement. T1021.001,Remote Services, Remote Desktop Protocol, Stolen Pencil utilized RDP for direct remote point-and-click access. T1021.001,Remote Services, Remote Desktop Protocol, TEMP.Veles utilized RDP throughout an operation. T1021.001,Remote Services, Remote Desktop Protocol, Wizard Spider has used RDP for lateral movement. T1021.001,Remote Services, Remote Desktop Protocol, zwShell has used RDP for lateral movement. T1021.001,Remote Services, Remote Desktop Protocol, ZxShell has remote desktop functionality. T1134.003,Access Token Manipulation, Make And Impersonate Token,Cobalt Strike can make tokens from known credentials. T1134.003,Access Token Manipulation, Make And Impersonate Token,RC2CL backdoor can modify access tokens to escalate privilege to the privileges of a process to the ones associated with the new token. T1134.003,Access Token Manipulation, Make And Impersonate Token," Through creating a new login session and setting the token to another thread, LazyCat can escalate privileges. " T1134.003,Access Token Manipulation, Make And Impersonate Token," The SetThreadToken command ifsoften used by malware to impersonate legitimate threads or processes, " T1134.003,Access Token Manipulation, Make And Impersonate Token, The creation of duplicate tokens allows for adversaries to escalate their privileges. T1555.002,Credentials from Password Stores, Securityd Memory,Keydnap uses the keychaindump project to read securityd memory. T1555.002,Credentials from Password Stores, Securityd Memory,Malware such as Mimikatz can elevate themselves to root privileges and then read Securityd's memory to harvest plaintext passwords. T1555.002,Credentials from Password Stores, Securityd Memory," APT15, a chinese based threat actor, acquire password through reading Securityd's memory. " T1555.002,Credentials from Password Stores, Securityd Memory," REvil utilizes many methods of credential harvesting, including reading plaintext passwords from a root account. " T1555.002,Credentials from Password Stores, Securityd Memory, Qakbot can read passwords from Securityd's memory. T1555.001,Credentials from Password Stores, Keychain,Calisto collects Keychain storage data and copies those passwords/tokens to a file. T1555.001,Credentials from Password Stores, Keychain, iKitten collects the keychains on the system. T1555.001,Credentials from Password Stores, Keychain, LaZagne can obtain credentials from macOS Keychains. T1555.001,Credentials from Password Stores, Keychain, Proton gathers credentials in files for keychains. T1555.001,Credentials from Password Stores, Keychain,Matiex keylogger can harvest passwords from keychains. T1036.001,Masquerading, Invalid Code Signature,APT37 has signed its malware with an invalid digital certificates listed asTencent Technology (Shenzhen) Company Limited. T1036.001,Masquerading, Invalid Code Signature, BADNEWS is sometimes signed with an invalid Authenticode certificate in an apparent effort to make it look more legitimate. T1036.001,Masquerading, Invalid Code Signature, The NETWIRE client has been signed by fake and invalid digital certificates. T1036.001,Masquerading, Invalid Code Signature, Regin stage 1 modules for 64-bit systems have been found to be signed with fake certificates masquerading as originating from Microsoft Corporation and Broadcom Corporation. T1036.001,Masquerading, Invalid Code Signature, Windshift has used revoked certificates to sign malware. T1036.001,Masquerading, Invalid Code Signature, WindTail has been incompletely signed with revoked certificates. T1553.002,Subvert Trust Controls, Code Signing,Anchor has been signed with valid certificates to evade detection by security tools. T1553.002,Subvert Trust Controls, Code Signing, AppleJeus has used a valid digital signature from Sectigo to appear legitimate. T1553.002,Subvert Trust Controls, Code Signing, APT29 was able to get SUNBURST signed by SolarWinds code signing certificates by injecting the malware into the SolarWinds Orion software lifecycle. T1553.002,Subvert Trust Controls, Code Signing, APT41 leveraged code-signing certificates to sign malware when targeting both gaming and non-gaming organizations. T1553.002,Subvert Trust Controls, Code Signing, BackConfig has been signed with self signed digital certificates mimicking a legitimate software company. T1553.002,Subvert Trust Controls, Code Signing, Bazar has been signed with fake certificates including those appearing to be from VB CORPORATE PTY. LTD. T1553.002,Subvert Trust Controls, Code Signing, BLINDINGCAN has been signed with code-signing certificates such as CodeRipper. T1553.002,Subvert Trust Controls, Code Signing, BOOSTWRITE has been signed by a valid CA. T1553.002,Subvert Trust Controls, Code Signing, ChChes samples were digitally signed with a certificate originally used by Hacking Team that was later leaked and subsequently revoked. T1553.002,Subvert Trust Controls, Code Signing, Cobalt Strike can use self signed Java applets to execute signed applet attacks. T1553.002,Subvert Trust Controls, Code Signing, CopyKittens digitally signed an executable with a stolen certificate from legitimate company AI Squared. T1553.002,Subvert Trust Controls, Code Signing, CSPY Downloader has come signed with revoked certificates. T1553.002,Subvert Trust Controls, Code Signing, Darkhotel has used code-signing certificates on its malware that are either forged due to weak keys or stolen. Darkhotel has also stolen certificates and signed backdoors and downloaders with them. T1553.002,Subvert Trust Controls, Code Signing, Some Daserf samples were signed with a stolen digital certificate. T1553.002,Subvert Trust Controls, Code Signing, Ebury has installed a self-signed RPM package mimicking the original system package on RPM based systems. T1553.002,Subvert Trust Controls, Code Signing, Turla has used valid digital certificates from Sysprint AG to sign its Epic dropper. T1553.002,Subvert Trust Controls, Code Signing, FIN6 has used Comodo code-signing certificates. T1553.002,Subvert Trust Controls, Code Signing, FIN7 has signed Carbanak payloads with legally purchased code signing certificates. FIN7 has also digitally signed their phishing documents backdoors and other staging tools to bypass security controls. T1553.002,Subvert Trust Controls, Code Signing, GALLIUM has used stolen certificates to sign its tools including those from Whizzimo LLC. T1553.002,Subvert Trust Controls, Code Signing," Gazer versions are signed with various valid certificates; one was likely faked and issued by Comodo for Solid Loop Ltd "" and another was issued for ""Ultimate Computer Support Ltd."" " T1553.002,Subvert Trust Controls, Code Signing, GreyEnergy digitally signs the malware with a code-signing certificate. T1553.002,Subvert Trust Controls, Code Signing, Helminth samples have been signed with legitimate compromised code signing certificates owned by software company AI Squared. T1553.002,Subvert Trust Controls, Code Signing, Honeybee uses a dropper called MaoCheng that harvests a stolen digital signature from Adobe Systems. T1553.002,Subvert Trust Controls, Code Signing, Janicab used a valid AppleDeveloperID to sign the code to get past security restrictions. T1553.002,Subvert Trust Controls, Code Signing, Kimsuky has signed files with the name EGIS CO . Ltd.. T1553.002,Subvert Trust Controls, Code Signing, Leviathan has used stolen code signing certificates to sign malware. T1553.002,Subvert Trust Controls, Code Signing, LockerGoga has been signed with stolen certificates in order to make it look more legitimate. T1553.002,Subvert Trust Controls, Code Signing, Metamorfo has digitally signed executables using AVAST Software certificates. T1553.002,Subvert Trust Controls, Code Signing, Molerats has used forged Microsoft code-signing certificates on malware. T1553.002,Subvert Trust Controls, Code Signing, More_eggs has used a signed binary shellcode loader and a signed Dynamic Link Library (DLL) to create a reverse shell. T1553.002,Subvert Trust Controls, Code Signing, Nerex drops a signed Microsoft DLL to disk. T1553.002,Subvert Trust Controls, Code Signing, Patchwork has signed malware with self-signed certificates from fictitious and spoofed legitimate software companies. T1553.002,Subvert Trust Controls, Code Signing, PipeMon its installer and tools are signed with stolen code-signing certificates. T1553.002,Subvert Trust Controls, Code Signing, PROMETHIUM has signed code with self-signed certificates. T1553.002,Subvert Trust Controls, Code Signing, A QuasarRAT .dll file is digitally signed by a certificate from AirVPN. T1553.002,Subvert Trust Controls, Code Signing, RTM samples have been signed with a code-signing certificates. T1553.002,Subvert Trust Controls, Code Signing, Silence has used a valid certificate to sign their primary loader Silence.Downloader (aka TrueBot). T1553.002,Subvert Trust Controls, Code Signing, StrongPity has been signed with self-signed certificates. T1553.002,Subvert Trust Controls, Code Signing, Suckfly has used stolen certificates to sign its malware. T1553.002,Subvert Trust Controls, Code Signing, SUNBURST was digitally signed by SolarWinds from March - May 2020. T1553.002,Subvert Trust Controls, Code Signing, TA505 has signed payloads with code signing certificates from Thawte and Sectigo. T1553.002,Subvert Trust Controls, Code Signing, TrickBot has come with a signed downloader component. T1553.002,Subvert Trust Controls, Code Signing, UNC2452 was able to get SUNBURST signed by SolarWinds code signing certificates by injecting the malware into the SolarWinds Orion software lifecycle. T1553.002,Subvert Trust Controls, Code Signing, Winnti Group used stolen certificates to sign its malware. T1553.002,Subvert Trust Controls, Code Signing," Wizard Spider has used Digicert code-signing certificates for some of its malware.""" T1552.002,Unsecured Credentials, Credentials In Registry,Agent Tesla has the ability to extract credentials from the Registry. T1552.002,Unsecured Credentials, Credentials In Registry, APT32 used Outlook Credential Dumper to harvest credentials stored in Windows registry. T1552.002,Unsecured Credentials, Credentials In Registry, PowerSploit has several modules that search the Windows Registry for stored credentials: Get-UnattendedInstallFile Get-Webconfig Get-ApplicationHost Get-SiteListPassword Get-CachedGPPPassword and Get-RegistryAutoLogon. T1552.002,Unsecured Credentials, Credentials In Registry, Reg may be used to find credentials in the Windows Registry. T1552.002,Unsecured Credentials, Credentials In Registry, TrickBot has retrieved PuTTY credentials by querying the Software\SimonTatham\Putty\Sessions registry key T1552.002,Unsecured Credentials, Credentials In Registry, Valak can use the clientgrabber module to steal e-mail credentials from the Registry. T1552.003,Unsecured Credentials, Bash History,Kinsing has searched bash_history for credentials. T1552.003,Unsecured Credentials, Bash History,Tropic Trooper favors the tactic of harvesting credentials from a bash_history file. T1552.003,Unsecured Credentials, Bash History, The ransomware Diavol contains functionality that allows it to search user's historical bash commands for usernames and passwords that were used as parameters. T1552.003,Unsecured Credentials, Bash History, FIN13 can enumerate their user credentials via searching the bash_history file of users for insecurely stored passwords. T1552.003,Unsecured Credentials, Bash History, The ~/.bash_history directory can contain credentials for APT groups to harvest if they are stored insecurely. T1027.002,Obfuscated Files or Information, Software Packing,Anchor has come with a packed payload. T1027.002,Obfuscated Files or Information, Software Packing, APT29 used UPX to pack files. T1027.002,Obfuscated Files or Information, Software Packing, APT3 has been known to pack their tools. T1027.002,Obfuscated Files or Information, Software Packing, APT38 has used several code packing methods such as Themida Enigma VMProtect and Obsidium to pack their implants. T1027.002,Obfuscated Files or Information, Software Packing, APT39 has packed tools with UPX and has repacked a modified version of Mimikatz to thwart anti-virus detection. T1027.002,Obfuscated Files or Information, Software Packing, Astaroth uses a software packer called Pe123\RPolyCryptor. T1027.002,Obfuscated Files or Information, Software Packing, Bazar has a variant with a packed payload. T1027.002,Obfuscated Files or Information, Software Packing, BLINDINGCAN has been packed with the UPX packer. T1027.002,Obfuscated Files or Information, Software Packing, China Chopper's client component is packed with UPX. T1027.002,Obfuscated Files or Information, Software Packing, CSPY Downloader has been packed with UPX. T1027.002,Obfuscated Files or Information, Software Packing, Dark Caracal has used UPX to pack Bandook. T1027.002,Obfuscated Files or Information, Software Packing, DarkComet has the option to compress its payload using UPX or MPRESS. T1027.002,Obfuscated Files or Information, Software Packing, A version of Daserf uses the MPRESS packer. T1027.002,Obfuscated Files or Information, Software Packing, Dyre has been delivered with encrypted resources and must be unpacked for execution. T1027.002,Obfuscated Files or Information, Software Packing, Egregor's payloads are custom-packed archived and encrypted to prevent analysis. T1027.002,Obfuscated Files or Information, Software Packing, Elderwood has packed malware payloads before delivery to victims. T1027.002,Obfuscated Files or Information, Software Packing, Emotet has used custom packers to protect its payloads. T1027.002,Obfuscated Files or Information, Software Packing, FatDuke has been regularly repacked by its operators to create large binaries and evade detection. T1027.002,Obfuscated Files or Information, Software Packing, A FinFisher variant uses a custom packer. T1027.002,Obfuscated Files or Information, Software Packing, GALLIUM packed some payloads using different types of packers both known and custom. T1027.002,Obfuscated Files or Information, Software Packing, GoldMax has been packed for obfuscation. T1027.002,Obfuscated Files or Information, Software Packing, GreyEnergy is packed for obfuscation. T1027.002,Obfuscated Files or Information, Software Packing, H1N1 uses a custom packing algorithm. T1027.002,Obfuscated Files or Information, Software Packing, Hildegard has packed ELF files into other binaries. T1027.002,Obfuscated Files or Information, Software Packing, HotCroissant has used the open source UPX executable packer. T1027.002,Obfuscated Files or Information, Software Packing, IcedID has packed and encrypted its loader module. T1027.002,Obfuscated Files or Information, Software Packing, jRAT payloads have been packed. T1027.002,Obfuscated Files or Information, Software Packing, Lazarus Group has used Themida to pack at least two separate backdoor implants. T1027.002,Obfuscated Files or Information, Software Packing, Lokibot has used several packing methods for obfuscation. T1027.002,Obfuscated Files or Information, Software Packing, Lucifer has used UPX packed binaries. T1027.002,Obfuscated Files or Information, Software Packing, Machete has been packed with NSIS. T1027.002,Obfuscated Files or Information, Software Packing, Melcoz has been packed with VMProtect and Themida. T1027.002,Obfuscated Files or Information, Software Packing, Metamorfo has used VMProtect to pack and protect files. T1027.002,Obfuscated Files or Information, Software Packing, NETWIRE has used .NET packer tools to evade detection. T1027.002,Obfuscated Files or Information, Software Packing, Night Dragon is known to use software packing in its tools. T1027.002,Obfuscated Files or Information, Software Packing, OopsIE uses the SmartAssembly obfuscator to pack an embedded .Net Framework assembly used for C2. T1027.002,Obfuscated Files or Information, Software Packing, OSX_OCEANLOTUS.D has a variant that is packed with UPX. T1027.002,Obfuscated Files or Information, Software Packing, A Patchwork payload was packed with UPX. T1027.002,Obfuscated Files or Information, Software Packing, Raindrop used a custom packer for its Cobalt Strike payload which was compressed using the LZMA algorithm. T1027.002,Obfuscated Files or Information, Software Packing, Rocke's miner has created UPX-packed files in the Windows Start Menu Folder. T1027.002,Obfuscated Files or Information, Software Packing, SDBbot has used a packed installer file. T1027.002,Obfuscated Files or Information, Software Packing, SeaDuke has been packed with the UPX packer. T1027.002,Obfuscated Files or Information, Software Packing, ShimRat's loader has been packed with the compressed ShimRat core DLL and the legitimate DLL for it to hijack. T1027.002,Obfuscated Files or Information, Software Packing, Spark has been packed with Enigma Protector to obfuscate its contents. T1027.002,Obfuscated Files or Information, Software Packing, TA505 has used UPX to obscure malicious code. T1027.002,Obfuscated Files or Information, Software Packing, The White Company has obfuscated their payloads through packing. T1027.002,Obfuscated Files or Information, Software Packing, TrickBot leverages a custom packer to obfuscate its functionality. T1027.002,Obfuscated Files or Information, Software Packing, Trojan.Karagany samples sometimes use common binary packers such as UPX and Aspack on top of a custom Delphi binary packer. T1027.002,Obfuscated Files or Information, Software Packing, Uroburos uses a custom packer. T1027.002,Obfuscated Files or Information, Software Packing, Valak has used packed DLL payloads. T1027.002,Obfuscated Files or Information, Software Packing, VERMIN is initially packed. T1027.002,Obfuscated Files or Information, Software Packing, yty packs a plugin with UPX. T1027.002,Obfuscated Files or Information, Software Packing, Zebrocy's Delphi variant was packed with UPX. T1027.002,Obfuscated Files or Information, Software Packing, Some ZeroT DLL files have been packed with UPX. T1027.002,Obfuscated Files or Information, Software Packing, ZIRCONIUM has used multi-stage packers for exploit code. T1547.007,Boot or Logon Autostart Execution, Re,The hostwriter campaign utilised malware that edited plist files so that data could be exfiltrated on startup. T1547.007,Boot or Logon Autostart Execution, Re," APT29 CozyBear modify startup files so that upon booting a machine, malicious activity is executed. " T1547.007,Boot or Logon Autostart Execution, Re, Ryuk ransomeware has the ability to launch it's encryption program upon booting up the infected machine. T1547.007,Boot or Logon Autostart Execution, Re," REvil ransomware performs a variety of malicious activity after startup, having modified the infected machine to do so. " T1547.007,Boot or Logon Autostart Execution, Re, The threat actor FIN13 often modifies plist files with the aim to run malicious code upon startup. T1547.010,Boot or Logon Autostart Execution, Port Monitors,"REvil can escalate it's privileges by loading a dll file before startup, allowing it to run with SYSTEM level privileges. " T1547.010,Boot or Logon Autostart Execution, Port Monitors, Ransomeware can achieve persistence by abusing port monitors for code execution upon startup. T1547.010,Boot or Logon Autostart Execution, Port Monitors, QakBot malware can send a .dll file to be executed during system boot. T1547.010,Boot or Logon Autostart Execution, Port Monitors," Malware such as Emotet can achieve persistence through executing code during startup, often via dll injection via port monitors during startup. " T1547.010,Boot or Logon Autostart Execution, Port Monitors," Russian threat actors deploy a variety of techniques to achieve persistence, sometimes involving the abuse of port monitors to execute arbitrary code during the boot process. " T1546.001,Event Triggered Execution, Change Default File Association,Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents. T1546.001,Event Triggered Execution, Change Default File Association,Cring Ransomware can escalate privileges via changes to the default handlers. T1546.001,Event Triggered Execution, Change Default File Association," Through manipulation of the registry, FIN13 can achieve persistence by changing the file association to allow for malicious code execution. " T1546.001,Event Triggered Execution, Change Default File Association, CobaltStrike contains modules that can modify default file associations. T1546.001,Event Triggered Execution, Change Default File Association," Neurevt trojan persists itself via executing arbitrary code, often achieved by modifying default file associations. "