| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1112 | 修改注册表 |
PLAINTEE uses |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography | |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
PLAINTEE gains persistence by adding the Registry key |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
PLAINTEE uses cmd.exe to execute commands on the victim’s machine.[1] |
| Enterprise | T1548 | .002 | 滥用权限提升控制机制: Bypass User Account Control | |
| Enterprise | T1082 | 系统信息发现 |
PLAINTEE collects general system enumeration data about the infected machine and checks the OS version.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
PLAINTEE uses the |
|
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1057 | 进程发现 |
PLAINTEE performs the |
|