TURNEDUP is a non-public backdoor. It has been dropped by APT33's StoneDrill malware. [1] [2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
TURNEDUP is capable of writing to a Registry Run key to establish.[3] |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell | |
| Enterprise | T1113 | 屏幕捕获 | ||
| Enterprise | T1082 | 系统信息发现 | ||
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1055 | .004 | 进程注入: Asynchronous Procedure Call |
TURNEDUP is capable of injecting code into the APC queue of a created Rundll32 process as part of an "Early Bird injection."[3] |