| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1546 | .003 | 事件触发执行: Windows Management Instrumentation Event Subscription |
Rancor has complied VBScript-generated MOF files into WMI event subscriptions for persistence.[2] |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell | |
| .005 | 命令与脚本解释器: Visual Basic |
Rancor has used VBS scripts as well as embedded macros for execution.[1] |
||
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
Rancor attempted to get users to click on an embedded macro within a Microsoft Office Excel document to launch their malware.[1] |
| Enterprise | T1218 | .007 | 系统二进制代理执行: Msiexec |
Rancor has used |
| Enterprise | T1105 | 输入工具传输 |
Rancor has downloaded additional malware, including by using certutil.[1] |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
Rancor has attached a malicious document to an email to gain initial access.[1] |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Rancor launched a scheduled task to gain persistence using the |