| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1546 | .015 | 事件触发执行: Component Object Model Hijacking |
Ferocious can use COM hijacking to establish persistence.[1] |
| Enterprise | T1112 | 修改注册表 |
Ferocious has the ability to add a Class ID in the current user Registry hive to enable persistence mechanisms.[1] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell | |
| .005 | 命令与脚本解释器: Visual Basic |
Ferocious has the ability to use Visual Basic scripts for execution.[1] |
||
| Enterprise | T1120 | 外围设备发现 |
Ferocious can run |
|
| Enterprise | T1070 | .004 | 移除指标: File Deletion | |
| Enterprise | T1082 | 系统信息发现 |
Ferocious can use |
|
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks |
Ferocious can run anti-sandbox checks using the Microsoft Excel 4.0 function |
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
Ferocious has checked for AV software as part of its persistence process.[1] |