| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an "Office Start," "Yahoo Talk," "MSN Gaming Z0ne," or "MSN Talk" shortcut.[1] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an "Office Start," "Yahoo Talk," "MSN Gaming Z0ne," or "MSN Talk" shortcut.[1] |
| .009 | 启动或登录自动启动执行: Shortcut Modification |
To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an "Office Start," "Yahoo Talk," "MSN Gaming Z0ne," or "MSN Talk" shortcut.[1] |
||
| Enterprise | T1008 | 回退信道 | ||
| Enterprise | T1562 | .001 | 妨碍防御: Disable or Modify Tools | |
| Enterprise | T1082 | 系统信息发现 |
SslMM sends information to its hard-coded C2, including OS version, service pack information, processor speed, system name, and OS install date.[1] |
|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1134 | 访问令牌操控 |
SslMM contains a feature to manipulate process privileges and tokens.[1] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
SslMM creates a new thread implementing a keylogging facility using Windows Keyboard Accelerators.[1] |