Subtechnique ID
stringlengths
9
9
technique
stringlengths
3
43
subtech
stringlengths
3
58
Value
stringlengths
2
483
T1036.004
Masquerading
Masquerade Task Or Service
OSX_OCEANLOTUS.D has disguised its app bundle by adding special characters to the filename and using the icon for legitimate Word documents.
T1036.004
Masquerading
Masquerade Task Or Service
In one instance menuPass added PlugX as a service with a display name of "Corel Writing Tools Utility."
T1036.004
Masquerading
Masquerade Task Or Service
POWERSTATS has created a scheduled task named "MicrosoftEdge" to establish persistence.
T1036.004
Masquerading
Masquerade Task Or Service
PROMETHIUM has named services to appear legitimate.
T1036.004
Masquerading
Masquerade Task Or Service
New services created by RawPOS are made to appear like legitimate Windows services with names such as "Windows Management Help Service" "Microsoft Support" and "Windows Advanced Task Manager".
T1036.004
Masquerading
Masquerade Task Or Service
RDAT has used Windows Video Service as a name for malicious services.
T1036.004
Masquerading
Masquerade Task Or Service
RTM has named the scheduled task it creates "Windows Update".
T1036.004
Masquerading
Masquerade Task Or Service
Seasalt has masqueraded as a service called "SaSaut" with a display name of "System Authorization Service" in an apparent attempt to masquerade as a legitimate service.
T1036.004
Masquerading
Masquerade Task Or Service
Shamoon creates a new service namedntssrv that attempts to appear legitimate; the service's display name isMicrosoft Network Realtime Inspection Service and its description isHelps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols. Newer versions creat...
T1036.004
Masquerading
Masquerade Task Or Service
ShimRat can impersonate Windows services and antivirus products to avoid detection on compromised systems.
T1036.004
Masquerading
Masquerade Task Or Service
SLOTHFULMEDIA has named a service it establishes on victim machines as "TaskFrame" to hide its malicious purpose.
T1036.004
Masquerading
Masquerade Task Or Service
StrongPity has named services to appear legitimate.
T1036.004
Masquerading
Masquerade Task Or Service
To establish persistence Truvasys adds a Registry Run key with a value "TaskMgr" in an attempt to masquerade as the legitimate Windows Task Manager.
T1036.004
Masquerading
Masquerade Task Or Service
UNC2452 named tasks \Microsoft\Windows\SoftwareProtectionPlatform\EventCacheManager in order to appear legitimate.
T1036.004
Masquerading
Masquerade Task Or Service
Some Volgmer variants add new services with display names generated by a list of hard-coded strings such as Application Background Security and Windows presumably as a way to masquerade as a legitimate service.
T1036.004
Masquerading
Masquerade Task Or Service
Wizard Spider has used scheduled tasks to install TrickBot using task names to appear legitimate such as WinDotNet GoogleTask or Sysnetsf. It has also used common document file names for other malware binaries.
T1036.004
Masquerading
Masquerade Task Or Service
ZIRCONIUM has created a run key named Dropbox Update Setup to mask a persistence mechanism for a malicious binary."
T1003.006
OS Credential Dumping
Dcsync
APT29 leveraged privileged accounts to replicate directory service data with domain controllers.
T1003.006
OS Credential Dumping
Dcsync
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from DCSync/NetSync.
T1003.006
OS Credential Dumping
Dcsync
Operation Wocao has used Mimikatz's DCSync to dump credentials from the memory of the targeted system.
T1003.006
OS Credential Dumping
Dcsync
UNC2452 leveraged privileged accounts to replicate directory service data with domain controllers.
T1003.006
OS Credential Dumping
Dcsync
The attacker discovered domain controllers (DCs) and submitted a replication request. This prompted the primary DC to replicate the credentials of other DCs back to the compromised domain administrator, using the Directory Replication Service (DRS) remote protocol.
T1003.004
OS Credential Dumping
Lsa Secrets
APT33 has used a variety of publicly available tools like LaZagne to gather credentials.
T1003.004
OS Credential Dumping
Lsa Secrets
CosmicDuke collects LSA secrets.
T1003.004
OS Credential Dumping
Lsa Secrets
CrackMapExec can dump hashed passwords from LSA secrets for the targeted system.
T1003.004
OS Credential Dumping
Lsa Secrets
Dragonfly 2.0 dropped and executed SecretsDump to dump password hashes.
T1003.004
OS Credential Dumping
Lsa Secrets
gsecdump can dump LSA secrets.
T1003.004
OS Credential Dumping
Lsa Secrets
SecretsDump and Mimikatz modules within Impacket can perform credential dumping to obtain account and password information.
T1003.004
OS Credential Dumping
Lsa Secrets
Ke3chang has dumped credentials including by using gsecdump.
T1003.004
OS Credential Dumping
Lsa Secrets
LaZagne can perform credential dumping from LSA secrets to obtain account and password information.
T1003.004
OS Credential Dumping
Lsa Secrets
Leafminer used several tools for retrieving login and password information including LaZagne.
T1003.004
OS Credential Dumping
Lsa Secrets
menuPass has used a modified version of pentesting tools wmiexec.vbs and secretsdump.py to dump credentials.
T1003.004
OS Credential Dumping
Lsa Secrets
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways including from the LSA.
T1003.004
OS Credential Dumping
Lsa Secrets
MuddyWater has performed credential dumping with LaZagne.
T1003.004
OS Credential Dumping
Lsa Secrets
OilRig has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access.
T1003.004
OS Credential Dumping
Lsa Secrets
Pupy can use Lazagne for harvesting credentials.
T1003.004
OS Credential Dumping
Lsa Secrets
Threat Group-3390 actors have used gsecdump to dump credentials. They have also dumped credentials from domain controllers.
T1110.001
Brute Force
Password Guessing
APT28 has used a brute-force/password-spray tooling that operated in two modes: in brute-force mode it typically sent over 300 authentication attempts per hour per targeted account over the course of several hours or days.
T1110.001
Brute Force
Password Guessing
China Chopper's server component can perform brute force password guessing against authentication portals.
T1110.001
Brute Force
Password Guessing
CrackMapExec can brute force passwords for a specified user on a single target system or across an entire network.
T1110.001
Brute Force
Password Guessing
Emotet has been observed using a hard coded list of passwords to brute force user accounts.
T1110.001
Brute Force
Password Guessing
Lucifer has attempted to brute force TCP ports 135 (RPC) and 1433 (MSSQL) with the default username or list of usernames and passwords.
T1110.001
Brute Force
Password Guessing
P.A.S. Webshell can use predefined users and passwords to execute brute force attacks against SSH FTP POP3 MySQL MSSQL and PostgreSQL services.
T1110.001
Brute Force
Password Guessing
Pony has used a small dictionary of common passwords against a collected list of local accounts.
T1110.001
Brute Force
Password Guessing
SpeakUp can perform brute forcing using a pre-defined list of usernames and passwords in an attempt to log in to administrative panels.
T1110.001
Brute Force
Password Guessing
Xbash can obtain a list of weak passwords from the C2 server to use for brute forcing as well as attempt to brute force services with open ports.
T1557.002
Man
man
Cleaver has used custom tools to facilitate ARP cache poisoning.
T1557.002
Man
man
Irancyber hacking skills have evolved to include customized private tools with ARP poisoning function.
T1557.002
Man
man
AlirezaC++ tools include the following techniques: ARP poisoning
T1557.002
Man
man
Jasus is an ARP cache poisoner developed by the Operation Cleaver team.
T1557.002
Man
man
Cain & Abel is a publicly available toolkit with the ability to conduct attacks like ARP cache poisoning in order to capture credentials being transmitted on the network.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Astaroth can check for Windows product ID's used by sandboxes and usernames and disk serial numbers associated with analyst environments.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts such as communication with I/O ports and using VM-specific instructions.
T1497.001
Virtualization/Sandbox Evasion
System Checks
BadPatch attempts to detect if it is being run in a Virtual Machine (VM) using a WMI query for disk drive name BIOS and motherboard information.
T1497.001
Virtualization/Sandbox Evasion
System Checks
CSPY Downloader can search loaded modules PEB structure file paths Registry keys and memory to determine if it is being debugged or running in a virtual environment.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Darkhotel malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names if a filename ends with .Md5.exe and if the program is executed from the root of the C:\ drive as well as checks for sandbox-related libraries.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Denis ran multiple system checks looking for processor and register characteristics to evade emulation and analysis.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Dyre can detect sandbox analysis environments by inspecting the process list and Registry.
T1497.001
Virtualization/Sandbox Evasion
System Checks
EvilBunny's dropper has checked the number of processes and the length and strings of its own file name to identify if the malware is in a sandbox environment.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Evilnum has used a component called TerraLoader to check certain hardware and file information to detect sandboxed environments.
T1497.001
Virtualization/Sandbox Evasion
System Checks
FinFisher obtains the hardware device list and checks if the MD5 of the vendor ID is equal to a predefined list in order to check for sandbox/virtualized environments.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Frankenstein has used WMI queries to check if various security applications were running including VMWare and Virtualbox.
T1497.001
Virtualization/Sandbox Evasion
System Checks
GoldMax will check if it is being run in a virtualized environment by comparing the collected MAC address to c8:27:cc:c2:37:5a.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Grandoreiro can detect VMWare via its I/O port and Virtual PC via the vpcext instruction.
T1497.001
Virtualization/Sandbox Evasion
System Checks
GravityRAT uses WMI to check the BIOS and manufacturer information for strings like VMWare" "Virtual" and "XEN" and another WMI request to get the current temperature of the hardware to determine if it's a virtual machine environment.
T1497.001
Virtualization/Sandbox Evasion
System Checks
InvisiMole can check for artifacts of VirtualBox Virtual PC and VMware environment and terminate itself if they are detected.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Lucifer can check for specific usernames computer names device drivers DLL's and virtual devices associated with sandboxed environments and can enter an infinite loop and stop itself if any are detected.
T1497.001
Virtualization/Sandbox Evasion
System Checks
MegaCortex has checked the number of CPUs in the system to avoid being run in a sandbox or emulator.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Okrum's loader can check the amount of physical memory and terminates itself if the host has less than 1.5 Gigabytes of physical memory in total.
T1497.001
Virtualization/Sandbox Evasion
System Checks
OopsIE performs several anti-VM and sandbox checks on the victim's machine. One technique the group has used was to perform a WMI query SELECT * FROM MSAcpi_ThermalZoneTemperature to check the temperature to see if itrunning in a virtual environment.
T1497.001
Virtualization/Sandbox Evasion
System Checks
OSX_OCEANLOTUS.D has a variant that checks a number of system parameters to see if it is being run on real hardware or in a virtual machine environment.
T1497.001
Virtualization/Sandbox Evasion
System Checks
PlugX checks if VMware tools is running in the background by searching for any process named "vmtoolsd".
T1497.001
Virtualization/Sandbox Evasion
System Checks
PoetRAT checked the size of the hard drive to determine if it was being run in a sandbox environment. In the event of sandbox detection it would delete itself by overwriting the malware scripts with the contents of "License.txt" and exiting.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Pupy has a module that checks a number of indicators on the system to determine if its running on a virtual machine.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Remcos searches for Sandboxie and VMware on the system.
T1497.001
Virtualization/Sandbox Evasion
System Checks
RogueRobin uses WMI to check BIOS version for VBOX bochs qemu virtualbox and vm to check for evidence that the script might be executing within an analysis environment.
T1497.001
Virtualization/Sandbox Evasion
System Checks
ROKRAT checks for sandboxing libraries.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Smoke Loader scans processes to perform anti-VM checks.
T1497.001
Virtualization/Sandbox Evasion
System Checks
SUNBURST checked the domain name of the compromised host to verify it was running in a real environment.
T1497.001
Virtualization/Sandbox Evasion
System Checks
SynAck checks its directory location in an attempt to avoid launching in a sandbox.
T1497.001
Virtualization/Sandbox Evasion
System Checks
ThiefQuest uses a function named is_debugging to perform anti-debugging logic. The function invokes sysctl checking the returned value of P_TRACED. ThiefQuest also calls ptrace with the PTRACE_DENY_ATTACH flag to prevent debugging.
T1497.001
Virtualization/Sandbox Evasion
System Checks
Trojan.Karagany can detect commonly used and generic virtualization platforms based primarily on drivers and file paths.
T1497.001
Virtualization/Sandbox Evasion
System Checks
UBoatRAT checks for virtualization software such as VMWare VirtualBox or QEmu on the compromised machine.
T1497.001
Virtualization/Sandbox Evasion
System Checks
yty has some basic anti-sandbox detection that tries to detect Virtual PC Sandboxie and VMware. "
T1556.003
Modify Authentication Process
Pluggable Authentication Modules
Ebury can deactivate PAM modules to tamper with the sshd configuration.
T1556.003
Modify Authentication Process
Pluggable Authentication Modules
Skidmap has the ability to replace the pam_unix.so file on an infected machine with its own malicious version that accepts a specific backdoor password for all users.
T1556.003
Modify Authentication Process
Pluggable Authentication Modules
This malware downgrades security features by deactivating pluggable authentication modules (PAM) modules.
T1556.003
Modify Authentication Process
Pluggable Authentication Modules
The malware replaces the systempam_unix.so file (the module responsible for standard Unix authentication) with its own malicious version (detected as Backdoor.Linux.PAMDOR.A). As shown in Figure 2, this malicious pam_unix.so file accepts a specific password for any users, thus allowing the attackers to log in as any us...
T1556.003
Modify Authentication Process
Pluggable Authentication Modules
Our roadmap is pretty simple: add a custom PAM module that logs the credential in plaintext and send it to our C&C though a DNS resolution.
T1556.002
Modify Authentication Process
Password Filter Dll
Remsec harvests plain-text credentials as a password filter registered on domain controllers.
T1556.002
Modify Authentication Process
Password Filter Dll
Strider has registered its persistence module on domain controllers as a Windows LSA (Local System Authority) password filter to acquire credentials any time a domain local user or administrator logs in or changes a password.
T1556.002
Modify Authentication Process
Password Filter Dll
The library was masquerading as a Windows password filter, which is something administrators typically use to ensure passwords match specific requirements for length and complexity. The module started every time a network or local user logged in or changed a password, and it was able to view passcodes in plaintext.
T1556.002
Modify Authentication Process
Password Filter Dll
ProjectSauron usually registers its persistence module on domain controllers as a Windows LSA (Local. System Authority) password filter.
T1556.002
Modify Authentication Process
Password Filter Dll
The library was registered as a Windows password filter and had access to sensitive data such as administrative passwords in cleartext.
T1556.004
Modify Authentication Process
Network Device Authentication
SYNful Knock has the capability to add its own custom backdoor password when it modifies the operating system of the affected network device.
T1556.004
Modify Authentication Process
Network Device Authentication
The SYNful Knock implant consists of a modified Cisco IOS image that allows the attacker to load different functional modules provides unrestricted access using a secret backdoor password while preventing the size of the image from changing.
T1556.004
Modify Authentication Process
Network Device Authentication
Adversaries used Patch System Image to hard code a password in the operating system, thus bypassing of native authentication mechanisms for local accounts on network devices.
T1556.004
Modify Authentication Process
Network Device Authentication
Attacker modified the system image to provide attacker-controlled network devices access using a specific password.
T1556.004
Modify Authentication Process
Network Device Authentication
After the initial access to the router, hackers modified its operation system in a way to install a backdoor access for network device authentication.
T1556.001
Modify Authentication Process
Domain Controller Authentication
Chimera's malware has altered the NTLM authentication program on domain controllers to allow Chimera to login without a valid credential.