| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1005 | 从本地系统获取数据 | ||
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
ZxxZ has been disguised as a Windows security update service.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 | ||
| Enterprise | T1106 | 本机API |
ZxxZ has used API functions such as |
|
| Enterprise | T1012 | 查询注册表 | ||
| Enterprise | T1027 | .013 | 混淆文件或信息: Encrypted/Encoded File |
ZxxZ has been encoded to avoid detection from static analysis tools.[1] |
| Enterprise | T1204 | .002 | 用户执行: Malicious File |
ZxxZ has relied on victims to open a malicious attachment delivered via email.[1] |
| Enterprise | T1082 | 系统信息发现 |
ZxxZ has collected the host name and operating system product name from a compromised machine.[1] |
|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
ZxxZ can search a compromised host to determine if it is running Windows Defender or Kasperky antivirus.[1] |
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1057 | 进程发现 |
ZxxZ has created a snapshot of running processes using |
|
| Enterprise | T1566 | .001 | 钓鱼: Spearphishing Attachment |
ZxxZ has been distributed via spearphishing emails, usually containing a malicious RTF or Excel attachment.[1] |
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
ZxxZ has used scheduled tasks for persistence and execution.[1] |