"d & up = % d & direction = % s counter = % d & type = % d & guid = % s & os = % d & arch = % d & username = % s & group = % lu & ver = % d. % d & up = % d & direction = % s abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz0123456789 + / https : / / workspacin. cloud / live / h…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
100%
"##nc / backconnect component used by icedid, and prior cases involving icedid infection. a few minutes later, latrodectus spawned dllhost. exe to likely inject the backconnect payload with process _ all _ access ( 0x1fffff ) access rights. the granted access rights provide full c…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1555.003Credentials from Web Browsers
99%
"module to accommodate recent browser security enhancements. the stealer had the hardcoded time of when the stealer module was built – 00 : 39 : 18 mar 29 2024. similar to the latrodectus loader component, the stealer module dynamically resolved windows apis by iterating through t…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053.005Scheduled Task
99%
"code decompresses the decrypted data before loading it. the backdoor implemented a persistent command and control system that establishes covert communication between an infected machine and a remote threat actor controlled server while creating a scheduled task for persistence. …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071.001Web Protocols
99%
"gw [. ] aws - use1 [. ] cloud - ara [. ] tyk [. ] io uncertain - kitten - gw [. ] aws - euc1 [. ] cloud - ara [. ] tyk [. ] io erbolsan [. ] com samderat200 [. ] com dauled [. ] com kasymdev [. ] com kasym500 [. ] com brute ratel ip addresses 95. 164. 68. 73 138. 124. 183. 215 91…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1048.003Exfiltration Over Unencrypted Non-C2 Protocol
98%
"between them, hinting that there may have been a mistake in the first config file dropped by the threat actor. the first execution had a syntax error with specifying the drive to exfiltrate files from ( threat actor added an extra colon to the drive ), and the second execution sh…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1053.005Scheduled Task
97%
"strike communication patterns. the following day the sys. dll cobalt strike beacon was executed on two additional servers after connections to those hosts were made via rdp. persistence registry run key persistence was first established after initial access on day one via a regis…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.012Process Hollowing
96%
"are the decrypted brute ratel c4 ( brc4 ) c2s and rc4 key to decrypt the gathered information on the infected system that is sent to the c2. the subsequent yara rule triggered during a scan of the process memory for brute ratel : on day five, the threat actor deployed a new brute…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
96%
"0x1010 permissions and another instance of the same process requesting 0x1fffff seconds later. this cycle repeated three times in total during the intrusion, each time facilitated via a cobalt strike beacon process. veeam - get - creds on day 26 of the intrusion, the threat actor…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003.001LSASS Memory
95%
"the campaign ( day three ) to list directories on the beachhead. after listing files in directories, the threat actor focused their attention on the file unattend. xml, an answer file. answer files are used to control the configuration of windows while setting it up from an image…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1548.002Bypass User Account Control
95%
"runas command – a built - in windows feature that allows running programs under different user credentials. by calling this service, they were able to authenticate as the domain admin account found in the unattend. xml file and escalate their privileges from a regular user to ful…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
95%
"n / nzoqjd9mme hxxp [ : / / ] 94 [. ] 232 [. ] 249 [. ] 186 / vodeo / vid _ wg01ck01 hxxp [ : / / ] 94 [. ] 232 [. ] 249 [. ] 186 / vodeo / wg01ck01 later the cron801. dl _ file was renamed system. dl _ and deployed to several hosts, this is covered further in the lateral movemen…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
93%
"##c : outbound network connection initiated by script interpreter ed74fe75 - 7594 - 4b4b - ae38 - e38e3fd2eb23 : outbound rdp connections over non - standard tools 85b0b087 - eddf - 4a2b - b033 - d771fa2b9775 : powershell download and execution cradles 3dfd06d2 - eaf4 - 4532 - 95…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1005Data from Local System
93%
"discovery commands and attempted to organize their adfind output : net view redacted wmic / node : redacted logicaldisk list brief % windir % \ system32 \ cmd. exe / c ping - n 1 redacted move % userprofile % \ ad _ users. txt % userprofile % \ pictures \ attrib % userprofile % \…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1210Exploitation of Remote Services
92%
"##moting although the threat actor ran discovery commands just under an hour from the initial access, the first lateral movement attempt came three days into the intrusion when the threat actor attempted to execute the system. dl _ cobalt strike beacon on a domain controller via …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1219Remote Access Tools
91%
"##remotethread api. latrodectus, a downloader first identified by proofpoint researchers in november 2023, is attributed to the same threat actors responsible for developing icedid. approximately six hours later, the process running latrodectus established a connection to 193. 16…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
91%
"##r - i40 _ 53b043910 - 86g91352u7972 - 6495q3. js, first reported on x by @ cryptolaemus1 in the following post : the malware was first uploaded to virustotal on may 9, 2024, prior to operation endgame. this operation occurred between may 27 and 29, 2024, during which law enforc…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1218.007Msiexec
90%
"( compatible ; msie 7. 0 ; windows nt 5. 1 ; tob 1. 1 ) mozilla / 4. 0 ( compatible ; msie 7. 0 ; windows nt 5. 1 ; tob 1. 1 ) content - type : application / x - www - form - urlencoded post get clearurl urls command error xkxp7pkhnkqxuokr2dl00qsra6hx0xvq31jtd7ewuqj4rxwthwelbzfbo…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1057Process Discovery
90%
"- t1003. 001 malicious file - t1204. 002 masquerading - t1036 network service discovery - t1046 network share discovery - t1135 non - standard port - t1571 powershell - t1059. 001 process injection - t1055 registry run keys / startup folder - t1547. 001 remote desktop protocol - …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003.004LSA Secrets
89%
"the campaign ( day three ) to list directories on the beachhead. after listing files in directories, the threat actor focused their attention on the file unattend. xml, an answer file. answer files are used to control the configuration of windows while setting it up from an image…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1047Windows Management Instrumentation
88%
"##32 \ cmd. exe / c wmic. exe / node : localhost / namespace : \ \ root \ securitycenter2 path antivirusproduct get displayname | findstr / v / b / c : displayname | | echo no antivirus installed c : \ windows \ system32 \ cmd. exe / c whoami / groups c : \ windows \ system32 \ c…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1087.002Domain Account
88%
"four, the injected cobalt strike beacon used systeminfo to query for system information. the threat actor then executed disk command via backconnect to query disk information. the cobalt strike injected processes then executed reconnaissance commands and leveraged adfind for acti…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1087.002Domain Account
88%
"following the metasploit shell deployment attempt on the second domain controller, the threat actor initiated an additional round of adfind reconnaissance from the beachhead host : adfind. exe - b dc = domain, dc = local - f ( objectcategory = person ) > adflogs \ domain. local _…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
87%
"restrictions requiring different execution approaches : " cmd. exe " / c powershell - nop - w hidden - c " iex ( new - object net. webclient ). downloadstring ( ' hxxp : / / 127. 0. 0 [. ] 1 : 11664 / ' ) " powershell - nop - w hidden - c " iex ( new - object net. webclient ). do…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1134Access Token Manipulation
85%
"runas command – a built - in windows feature that allows running programs under different user credentials. by calling this service, they were able to authenticate as the domain admin account found in the unattend. xml file and escalate their privileges from a regular user to ful…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
85%
"originally published as a threat brief to customers in feb 2025 the dfir report services - private threat briefs : 20 + private dfir reports annually. - threat feed : focuses on tracking command and control frameworks like cobalt strike, metasploit, sliver, etc. - all intel : inc…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.003Windows Command Shell
84%
"##cf367be6bd5e80021e3bd3232ac309a 203eda879dbdb128259cd658b22c9c21c66cbcfa1e2f39879c73b4dafb84c592 run. bat c8ea31665553cbca19b22863eea6ca2c ba99cd73b74c64d6b1257b7db99814d1dc7d76b1 411dfb067a984a244ff0c41887d4a09fbbcd8d562550f5d32d58a6a6256bd7b2 start. vbs 4b3e9c9e018659d1cf04da…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
83%
"restrictions requiring different execution approaches : " cmd. exe " / c powershell - nop - w hidden - c " iex ( new - object net. webclient ). downloadstring ( ' hxxp : / / 127. 0. 0 [. ] 1 : 11664 / ' ) " powershell - nop - w hidden - c " iex ( new - object net. webclient ). do…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1046Network Service Discovery
82%
"##category = group ) > adflogs \ domain. local _ ad _ group. txt although the threat actor attempted to compress the collected data, forensic analysis did not identify any created zip archives on the system. " 7z. exe " a - mx1 - r0 adflogs. zip adflogs the threat actor returned …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1134Access Token Manipulation
80%
"access token manipulation - t1134 archive via utility - t1560. 001 bypass user account control - t1548. 002 credentials from web browsers - t1555. 003 credentials in files - t1552. 001 domain accounts - t1078. 002 domain account - t1087. 002 domain groups - t1069. 002 domain trus…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071.001Web Protocols
80%
"of the intrusion. the first was observed on day four, where the cron801. dl _ file was dropped on the beachhead host under c : \ programdata from the injected explorer. exe process containing latrodectus and was then executed twice by leveraging backconnect. rundll32 cron801. dl …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
79%
"in the exfiltration section, on the twentieth day, the threat actor successfully performed data exfiltration. despite that, no further final actions on objectives were performed until they were evicted from the network. timeline diamond model indicators atomic rdp client name vps…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.001Spearphishing Attachment
79%
"from a single click : how lunar spider enabled a near two - month intrusion from a single click : how lunar spider enabled a near two - month intrusion key takeaways - the intrusion began with a lunar spider linked javascript file disguised as a tax form that downloaded and execu…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1555.003Credentials from Web Browsers
79%
"server addresses, port numbers, usernames, and encrypted passwords. additionally, it targeted the registry path hkcu \ software \ microsoft \ windows nt \ currentversion \ windows messaging subsystem \ profiles to extract legacy email configurations from older windows mail, outlo…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1482Domain Trust Discovery
79%
"% s ", " subproc " : [ ] } / c ipconfig / all c : \ windows \ system32 \ cmd. exe / c systeminfo c : \ windows \ system32 \ cmd. exe / c nltest / domain _ trusts c : \ windows \ system32 \ cmd. exe / c nltest / domain _ trusts / all _ trusts c : \ windows \ system32 \ cmd. exe / …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1048Exfiltration Over Alternative Protocol
76%
"actor dropped a data exfiltration toolkit in the programdata directory. this included a vbscript launcher ( start. vbs ), batch automation script ( run. bat ), renamed rclone ( sihosts. exe ), and rclone configuration file ( rclone. conf ). this toolkit automated the theft of sen…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1210Exploitation of Remote Services
76%
"##e - 2020 - 1472 ) exploit with capabilities for credential harvesting and remote code execution. during the intrusion the threat actor used zero. exe to move laterally between devices in the network. the executable was executed on the beachhead host and targeted a second domain…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003OS Credential Dumping
76%
"threat actor actions. on the 26th day of the intrusion the threat actor returned to the backup server and used a powershell script to dump credentials from the backup server software. two days later on the backup server they appeared again and dropped a network scanning tool, rus…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
76%
"##e - 2020 - 1472 ) exploit with capabilities for credential harvesting and remote code execution. during the intrusion the threat actor used zero. exe to move laterally between devices in the network. the executable was executed on the beachhead host and targeted a second domain…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
74%
"0x1010 permissions and another instance of the same process requesting 0x1fffff seconds later. this cycle repeated three times in total during the intrusion, each time facilitated via a cobalt strike beacon process. veeam - get - creds on day 26 of the intrusion, the threat actor…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.012Process Hollowing
72%
"threat actor expanded their tooling and heavily utilized both brute ratel and cobalt strike for process injection. using the sysmon eventid 8, createremotethread, multiple instances of process injection were identified for both long - term and short - term sacrificial processes. …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071Application Layer Protocol
72%
"the beachhead host the threat actor leaked their source hostname during the authentication process. vps2day - 32220le the threat actor ’ s hostname implies that the infrastructure used by them was provided via a german hosting company vps2day, which seems to be operating under th…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071.001Web Protocols
70%
"##3aymyketaaqxsjd8ipotiexvlllpswxyh9xz / kc1widaqab ( rsa ) httpposturi : / vodeo / vid _ wg01ck01 user agent : mozilla / 5. 0 ( windows nt 6. 2 ; wow64 ) applewebkit / 537. 36 ( khtml, like gecko ) chrome / 51. 0. 2704. 106 safari / 537. 36 malleablec2instructions : remove 4338 …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071.001Web Protocols
69%
"communication using the backconnect protocol. more specifically, connections from explorer. exe and dllhost. exe were performed toward two different ip addresses. additionally, these ip ’ s have been categorized with moderate confidence related to icedid backconnect, which common…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1069.002Domain Groups
69%
"adfind. exe - subnets - f ( objectcategory = subnet ) > ad _ subnets. txt adfind. exe - gcb - sc trustdmp > ad _ trustdmp. txt adfind. exe - f " & ( objectcategory = computer ) ( operatingsystem = * server * ) " - csv > ad _ servers. csv continued discovery and network testing : …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1552.002Credentials in Registry
67%
"server addresses, port numbers, usernames, and encrypted passwords. additionally, it targeted the registry path hkcu \ software \ microsoft \ windows nt \ currentversion \ windows messaging subsystem \ profiles to extract legacy email configurations from older windows mail, outlo…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1087.002Domain Account
67%
"##name > \ pictures \ ad _ users. txt / setowner " < local user > " / t / c icacls c : \ users \ < username > \ pictures \ ad _ users. txt / setowner " < domain > \ < local user > " / t / c icacls " c : \ users \ < username > \ pictures \ ad _ users. txt " / reset / t after runni…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1018Remote System Discovery
65%
"in the exfiltration section, on the twentieth day, the threat actor successfully performed data exfiltration. despite that, no further final actions on objectives were performed until they were evicted from the network. timeline diamond model indicators atomic rdp client name vps…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
65%
"php ) was obfuscated and embedded within the resource file name lsassa $ from the decrypted resource file lsassa & &. after successfully transmitting the victim data, the backdoor waits for a server response containing executable commands. when commands are received from the remo…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1134.001Token Impersonation/Theft
63%
"/ f / d " cmd. exe / c powershell - nop - w hidden - c " iex ( new - object net. webclient ). downloadstring ( ' hxxp : / / 127. 0. 0 [. ] 1 : 11664 / ' ) " reg add " hkcu \ software \ classes \ ms - settings \ shell \ open \ command " / v delegateexecute / f / d " cmd. exe / c p…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1482Domain Trust Discovery
62%
"ps1 script is publicly available on github. upon executing the script, the threat actor would have obtained any plaintext usernames and passwords stored in the veeam credential manager. these credentials are typically used to authenticate to remote systems for backup operations. …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
62%
"ps1 script is publicly available on github. upon executing the script, the threat actor would have obtained any plaintext usernames and passwords stored in the veeam credential manager. these credentials are typically used to authenticate to remote systems for backup operations. …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1555Credentials from Password Stores
61%
"server addresses, port numbers, usernames, and encrypted passwords. additionally, it targeted the registry path hkcu \ software \ microsoft \ windows nt \ currentversion \ windows messaging subsystem \ profiles to extract legacy email configurations from older windows mail, outlo…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
61%
"from a single click : how lunar spider enabled a near two - month intrusion from a single click : how lunar spider enabled a near two - month intrusion key takeaways - the intrusion began with a lunar spider linked javascript file disguised as a tax form that downloaded and execu…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.003Thread Execution Hijacking
60%
"209 : 443 ( avtechupdate [. ] com ) before injecting itself into the sihost. exe process. after the attempted uac bypass, the cobalt strike stager was executed in memory with the c2 pointing to resources. avtechupdate [. ] com / samlss / vm. ico. shortly after, the sihost. exe pr…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055Process Injection
59%
"threat actor expanded their tooling and heavily utilized both brute ratel and cobalt strike for process injection. using the sysmon eventid 8, createremotethread, multiple instances of process injection were identified for both long - term and short - term sacrificial processes. …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1134.001Token Impersonation/Theft
58%
"209 : 443 ( avtechupdate [. ] com ) before injecting itself into the sihost. exe process. after the attempted uac bypass, the cobalt strike stager was executed in memory with the c2 pointing to resources. avtechupdate [. ] com / samlss / vm. ico. shortly after, the sihost. exe pr…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1547.001Registry Run Keys / Startup Folder
58%
"strike communication patterns. the following day the sys. dll cobalt strike beacon was executed on two additional servers after connections to those hosts were made via rdp. persistence registry run key persistence was first established after initial access on day one via a regis…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.007JavaScript
57%
"2024, shows a malicious ad as the initial access used to lure a victim to download the malicious javascript file. given the similarity of that report and our initial malware behavior we assess that this we likely the same method used for our case as well. the heavily obfuscated j…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
57%
"php ) was obfuscated and embedded within the resource file name lsassa $ from the decrypted resource file lsassa & &. after successfully transmitting the victim data, the backdoor waits for a server response containing executable commands. when commands are received from the remo…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
57%
"209 : 443 ( avtechupdate [. ] com ) before injecting itself into the sihost. exe process. after the attempted uac bypass, the cobalt strike stager was executed in memory with the c2 pointing to resources. avtechupdate [. ] com / samlss / vm. ico. shortly after, the sihost. exe pr…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.002SMB/Windows Admin Shares
56%
"##category = group ) > adflogs \ domain. local _ ad _ group. txt although the threat actor attempted to compress the collected data, forensic analysis did not identify any created zip archives on the system. " 7z. exe " a - mx1 - r0 adflogs. zip adflogs the threat actor returned …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1222.001Windows Permissions
55%
"users. txt minutes later, the compromised explorer. exe process spawned dllhost. exe, indicating resumption of the backconnect vnc activity observed previously. the dllhost. exe process subsequently executed a windows shell command to open the “ this pc ” interface on the beachhe…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
54%
"of the intrusion. the first was observed on day four, where the cron801. dl _ file was dropped on the beachhead host under c : \ programdata from the injected explorer. exe process containing latrodectus and was then executed twice by leveraging backconnect. rundll32 cron801. dl …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
54%
"2024, shows a malicious ad as the initial access used to lure a victim to download the malicious javascript file. given the similarity of that report and our initial malware behavior we assess that this we likely the same method used for our case as well. the heavily obfuscated j…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1555.003Credentials from Web Browsers
52%
"threat actor expanded their tooling and heavily utilized both brute ratel and cobalt strike for process injection. using the sysmon eventid 8, createremotethread, multiple instances of process injection were identified for both long - term and short - term sacrificial processes. …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078.002Domain Accounts
51%
"on day three, the threat actor discovered and accessed an unattend. xml windows answer file containing plaintext domain administrator credentials left over from an automated deployment process. this provided the threat actor with immediate high - privilege access to the domain en…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1485Data Destruction
49%
"in the exfiltration section, on the twentieth day, the threat actor successfully performed data exfiltration. despite that, no further final actions on objectives were performed until they were evicted from the network. timeline diamond model indicators atomic rdp client name vps…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1041Exfiltration Over C2 Channel
46%
". exe was a. net malware that was deployed on the fourth day. it attempted to communicate with its c2 server every 250 seconds. additionally, each post request contained the hostname of the infected workstation and the username of the compromised user, which were sent to the serv…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1548Abuse Elevation Control Mechanism
46%
"runas command – a built - in windows feature that allows running programs under different user credentials. by calling this service, they were able to authenticate as the domain admin account found in the unattend. xml file and escalate their privileges from a regular user to ful…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1564.003Hidden Window
45%
"restrictions requiring different execution approaches : " cmd. exe " / c powershell - nop - w hidden - c " iex ( new - object net. webclient ). downloadstring ( ' hxxp : / / 127. 0. 0 [. ] 1 : 11664 / ' ) " powershell - nop - w hidden - c " iex ( new - object net. webclient ). do…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003OS Credential Dumping
42%
"from a single click : how lunar spider enabled a near two - month intrusion from a single click : how lunar spider enabled a near two - month intrusion key takeaways - the intrusion began with a lunar spider linked javascript file disguised as a tax form that downloaded and execu…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1134.001Token Impersonation/Theft
41%
"access token manipulation - t1134 archive via utility - t1560. 001 bypass user account control - t1548. 002 credentials from web browsers - t1555. 003 credentials in files - t1552. 001 domain accounts - t1078. 002 domain account - t1087. 002 domain groups - t1069. 002 domain trus…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
40%
"in the exfiltration section, on the twentieth day, the threat actor successfully performed data exfiltration. despite that, no further final actions on objectives were performed until they were evicted from the network. timeline diamond model indicators atomic rdp client name vps…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.012Process Hollowing
36%
"##e, specifically invoking the exported function stow to initiate malicious execution. brute ratel on day one, the loader upfilles. dll began execution on the beachhead host by resolving three apis ( virtualalloc, loadlibrarya, getprocessaddress ) via the following hashing algori…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1134.002Create Process with Token
36%
"209 : 443 ( avtechupdate [. ] com ) before injecting itself into the sihost. exe process. after the attempted uac bypass, the cobalt strike stager was executed in memory with the c2 pointing to resources. avtechupdate [. ] com / samlss / vm. ico. shortly after, the sihost. exe pr…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1071Application Layer Protocol
36%
"of the intrusion. the first was observed on day four, where the cron801. dl _ file was dropped on the beachhead host under c : \ programdata from the injected explorer. exe process containing latrodectus and was then executed twice by leveraging backconnect. rundll32 cron801. dl …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
36%
"threat actor expanded their tooling and heavily utilized both brute ratel and cobalt strike for process injection. using the sysmon eventid 8, createremotethread, multiple instances of process injection were identified for both long - term and short - term sacrificial processes. …"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1069.002Domain Groups
35%
"following the metasploit shell deployment attempt on the second domain controller, the threat actor initiated an additional round of adfind reconnaissance from the beachhead host : adfind. exe - b dc = domain, dc = local - f ( objectcategory = person ) > adflogs \ domain. local _…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1048Exfiltration Over Alternative Protocol
34%
"1472 ) vulnerability to attempt additional lateral movement to a second domain controller. after that they then tried to execute metasploit laterally to that domain contoller via a remote service. however they were unable to establish a command and control channel from this actio…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1134.002Create Process with Token
34%
"runas command – a built - in windows feature that allows running programs under different user credentials. by calling this service, they were able to authenticate as the domain admin account found in the unattend. xml file and escalate their privileges from a regular user to ful…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1048Exfiltration Over Alternative Protocol
34%
"in the exfiltration section, on the twentieth day, the threat actor successfully performed data exfiltration. despite that, no further final actions on objectives were performed until they were evicted from the network. timeline diamond model indicators atomic rdp client name vps…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003OS Credential Dumping
33%
"0x1010 permissions and another instance of the same process requesting 0x1fffff seconds later. this cycle repeated three times in total during the intrusion, each time facilitated via a cobalt strike beacon process. veeam - get - creds on day 26 of the intrusion, the threat actor…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
33%
"##e, specifically invoking the exported function stow to initiate malicious execution. brute ratel on day one, the loader upfilles. dll began execution on the beachhead host by resolving three apis ( virtualalloc, loadlibrarya, getprocessaddress ) via the following hashing algori…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1218.011Rundll32
33%
"2024, shows a malicious ad as the initial access used to lure a victim to download the malicious javascript file. given the similarity of that report and our initial malware behavior we assess that this we likely the same method used for our case as well. the heavily obfuscated j…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Key Takeaways Private Threat Briefs: 20+ private DFIR reports annually. Contact us today for pricing or a demo! Table of Contents: Case Summary Analysts Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Command and Control Exfiltration Impact Timeline Diamond Model Indicators Detections MITRE ATT&CK Case Summary The intrusion […]