id
stringlengths
5
9
technique
stringlengths
3
43
subtechniqueid
stringlengths
3
60
sentences
stringlengths
1
871
t1484
domain policy modification
null
monitor for modifications to domain trust settings such as when a user or application modifies the federation settings on the domain or updates domain authentication from managed to federated via action types set federation settings on domain and set domain authentication
t1485
data destruction
null
adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems services and network resources
t1485
data destruction
null
data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives
t1485
data destruction
null
in cloud environments the occurrence of anomalous high volume deletion events such as the deleted cluster and delete global cluster events in aws or a high quantity of data deletion events such as delete bucket within a short period of time may indicate suspicious activity
t1485
data destruction
null
in particular look for large quantities of file modifications in user directories and under c windows system32
t1485
data destruction
null
monitor for the creation of suspicious files as well as high unusual file modification activity
t1485
data destruction
null
process process creation command command execution file file modification file file deletion image image deletion instance instance deletion snapshot snapshot deletion cloud storage cloud storage deletion volume volume deletion
t1485
data destruction
null
use process monitoring to monitor the execution and command line parameters of binaries that could be involved in data destruction activity such as sdeletes0195
t1486
data encrypted for impact
null
adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources
t1486
data encrypted for impact
null
cloud storage cloud storage metadata cloud storage cloud storage modification process process creation command command execution file file modification file file creation
t1486
data encrypted for impact
null
in cloud environments monitor for events that indicate storage objects have been anomalously replaced by copies
t1486
data encrypted for impact
null
in particular look for large quantities of file modifications in user directories
t1486
data encrypted for impact
null
in some cases monitoring for unusual kernel driver installation activity can aid in detection
t1486
data encrypted for impact
null
monitor for the creation of suspicious files as well as unusual file modification activity
t1486
data encrypted for impact
null
they can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key
t1486
data encrypted for impact
null
use process monitoring to monitor the execution and command line parameters of binaries involved in data destruction activity such as vssadmin wbadmin and bcdedit
t1489
service stop
null
adversaries may stop or disable services on a system to render those services unavailable to legitimate users
t1489
service stop
null
alterations to the service binary path or the service startup type changed to disabled may be suspicious
t1489
service stop
null
citation talos olympic destroyer 2018
t1489
service stop
null
configsystemduser directories as well as associated symbolic links
t1489
service stop
null
for example changeserviceconfig may be used by an adversary to prevent services from starting
t1489
service stop
null
look for changes to services that do not correlate with known software patch cycles etc
t1489
service stop
null
monitor for edits for modifications to services and startup programs that correspond to services of high importance
t1489
service stop
null
monitor processes and command line arguments to see if critical processes are terminated or stop running
t1489
service stop
null
process process creation command command execution process os api execution service service metadata windows registry windows registry key modification file file modification process process termination
t1489
service stop
null
remote access tools with built in features may interact directly with the windows api to perform these functions outside of typical system utilities
t1489
service stop
null
stopping critical services or processes can inhibit or stop response to an incident or aid in the adversarys overall objectives to cause damage to the environment
t1489
service stop
null
systemd service unit files are stored within the etcsystemdsystem usrlibsystemdsystem and home
t1489
service stop
null
windows service information is stored in the registry at hklm system currentcontrolse services
t1490
inhibit system recovery
null
adversaries may delete or remove built in operating system data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery
t1490
inhibit system recovery
null
citation talos olympic destroyer 2018citation fireeye wannacry 2017 operating systems may contain features that can help fix corrupted systems such as a backup catalog volume shadow copies and automatic repair features
t1490
inhibit system recovery
null
event id 524 indicating a system catalog was deleted may contain entries associated with suspicious activity
t1490
inhibit system recovery
null
monitor the registry for changes associated with system recovery features ex the creation of hkey_current_user software policies microsoft previous versions disablelocal page
t1490
inhibit system recovery
null
monitor the status of services involved in system recovery
t1490
inhibit system recovery
null
process process creation command command execution service service metadata windows registry windows registry key modification file file deletion
t1490
inhibit system recovery
null
the windows event logs ex
t1490
inhibit system recovery
null
use process monitoring to monitor the execution and command line parameters of binaries involved in inhibiting system recovery such as vssadmin wbadmin and bcdedit
t1491
defacement
null
adversaries may modify visual content available internally or externally to an enterprise network
t1491
defacement
null
file file modification file file creation application log application log content network traffic network traffic content
t1491
defacement
null
monitor application logs for abnormal behavior that may indicate attempted or successful exploitation
t1491
defacement
null
monitor internal and external websites for unplanned content changes
t1491
defacement
null
reasons for defacementt1491 include delivering messaging intimidation or claiming possibly false credit for an intrusion
t1491
defacement
null
use deep packet inspection to look for artifacts of common exploit traffic such as sql injection
t1491
defacement
null
web application firewalls may detect improper inputs attempting exploitation
t1495
firmware corruption
null
adversaries may overwrite or corrupt the flash memory contents of system bios or other firmware in devices attached to a system in order to render them inoperable or unable to boot
t1495
firmware corruption
null
citation mitre trustworthy firmware measurement log attempts to readwrite to bios and compare against known patching behavior
t1495
firmware corruption
null
citation symantec chernobyl w95
t1495
firmware corruption
null
firmware firmware modification
t1495
firmware corruption
null
system firmware manipulation may be detected
t1496
resource hijacking
null
adversaries may leverage the resources of co opted systems in order to solve resource intensive problems which may impact system andor hosted service availability
t1496
resource hijacking
null
consider monitoring process resource usage to determine anomalous activity associated with malicious hijacking of computer resources such as cpu memory and graphics processing resources
t1496
resource hijacking
null
monitor for common crypto mining software process names and files on local systems that may indicate compromise and resource usage
t1496
resource hijacking
null
monitor for suspicious use of network resources associated with cryptocurrency mining software
t1496
resource hijacking
null
one common purpose for resource hijacking is to validate transactions of cryptocurrency networks and earn virtual currency
t1496
resource hijacking
null
process process creation command command execution file file creation network traffic network connection creation network traffic network traffic flow sensor health host status
t1497
virtualizationsandbox evasion
null
adversaries may employ various means to detect and avoid virtualization and analysis environments
t1497
virtualizationsandbox evasion
null
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as lateral movement based on the information obtained
t1497
virtualizationsandbox evasion
null
detecting actions related to virtualization and sandbox identification may be difficult depending on the adversarys implementation and monitoring required
t1497
virtualizationsandbox evasion
null
monitoring for suspicious processes being spawned that gather a variety of system information or perform other forms of discovery especially in a short period of time may aid in detection
t1497
virtualizationsandbox evasion
null
process process creation command command execution process os api execution
t1497
virtualizationsandbox evasion
null
this may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment vme or sandbox
t1497
virtualizationsandbox evasion
null
virtualization sandbox user activity and related discovery techniques will likely occur in the first steps of an operation but may also occur throughout as an adversary learns the environment
t1497.001
virtualization sandbox evasion
system Technique checks
astaroth can check for windows product id's used by sandboxes and usernames and disk serial numbers associated with analyst environments.
t1497.001
virtualization sandbox evasion
system Technique checks
attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts such as communication with io ports and using vm-specific instructions.
t1497.001
virtualization sandbox evasion
system Technique checks
badpatch attempts to detect if it is being run in a virtual machine vm using a wmi query for disk drive name bios and motherboard information.
t1497.001
virtualization sandbox evasion
system Technique checks
cspy downloader can search loaded modules peb structure file paths registry keys and memory to determine if it is being debugged or running in a virtual environment.
t1497.001
virtualization sandbox evasion
system Technique checks
darkhotel malware has used a series of checks to determine if it's being analyzed checks include the length of executable names if a filename ends with .md5.exe and if the program is executed from the root of the c: drive as well as checks for sandbox-related libraries.
t1497.001
virtualization sandbox evasion
system Technique checks
denis ran multiple system checks looking for processor and register characteristics to evade emulation and analysis.
t1497.001
virtualization sandbox evasion
system Technique checks
dyre can detect sandbox analysis environments by inspecting the process list and registry.
t1497.001
virtualization sandbox evasion
system Technique checks
evilbunny's dropper has checked the number of processes and the length and strings of its own file name to identify if the malware is in a sandbox environment.
t1497.001
virtualization sandbox evasion
system Technique checks
evilnum has used a component called terraloader to check certain hardware and file information to detect sandboxed environments.
t1497.001
virtualization sandbox evasion
system Technique checks
finfisher obtains the hardware device list and checks if the md5 of the vendor id is equal to a predefined list in order to check for sandboxvirtualized environments.
t1497.001
virtualization sandbox evasion
system Technique checks
frankenstein has used wmi queries to check if various security applications were running including vmware and virtualbox.
t1497.001
virtualization sandbox evasion
system Technique checks
goldmax will check if it is being run in a virtualized environment by comparing the collected mac address to c8:27:cc:c2:37:5a.
t1497.001
virtualization sandbox evasion
system Technique checks
grandoreiro can detect vmware via its io port and virtual pc via the vpcext instruction.
t1497.001
virtualization sandbox evasion
system Technique checks
gravityrat uses wmi to check the bios and manufacturer information for strings like vmware virtual and xen and another wmi request to get the current temperature of the hardware to determine if it's a virtual machine environment.
t1497.001
virtualization sandbox evasion
system Technique checks
invisimole can check for artifacts of virtualbox virtual pc and vmware environment and terminate itself if they are detected.
t1497.001
virtualization sandbox evasion
system Technique checks
lucifer can check for specific usernames computer names device drivers dll's and virtual devices associated with sandboxed environments and can enter an infinite loop and stop itself if any are detected.
t1497.001
virtualization sandbox evasion
system Technique checks
megacortex has checked the number of cpus in the system to avoid being run in a sandbox or emulator.
t1497.001
virtualization sandbox evasion
system Technique checks
okrum's loader can check the amount of physical memory and terminates itself if the host has less than 1.5 gigabytes of physical memory in total.
t1497.001
virtualization sandbox evasion
system Technique checks
oopsie performs several anti-vm and sandbox checks on the victim's machine. one technique the group has used was to perform a wmi query select * from msacpi_thermalzonetemperature to check the temperature to see if its running in a virtual environment.
t1497.001
virtualization sandbox evasion
system Technique checks
osx_oceanlotus.d has a variant that checks a number of system parameters to see if it is being run on real hardware or in a virtual machine environment.
t1497.001
virtualization sandbox evasion
system Technique checks
plugx checks if vmware tools is running in the background by searching for any process named vmtoolsd.
t1497.001
virtualization sandbox evasion
system Technique checks
poetrat checked the size of the hard drive to determine if it was being run in a sandbox environment. in the event of sandbox detection it would delete itself by overwriting the malware scripts with the contents of license.txt and exiting.
t1497.001
virtualization sandbox evasion
system Technique checks
puppy has a module that checks a number of indicators on the system to determine if its running on a virtual machine.
t1497.001
virtualization sandbox evasion
system Technique checks
remcos searches for sandboxie and vmware on the system.
t1497.001
virtualization sandbox evasion
system Technique checks
roguerobin uses wmi to check bios version for vbox bochs qemu virtualbox and vm to check for evidence that the script might be executing within an analysis environment.
t1497.001
virtualization sandbox evasion
system Technique checks
rokrat checks for sandboxing libraries.
t1497.001
virtualization sandbox evasion
system Technique checks
smoke loader scans processes to perform anti-vm checks.
t1497.001
virtualization sandbox evasion
system Technique checks
sunburst checked the domain name of the compromised host to verify it was running in a real environment.
t1497.001
virtualization sandbox evasion
system Technique checks
synack checks its directory location in an attempt to avoid launching in a sandbox.
t1497.001
virtualization sandbox evasion
system Technique checks
thiefquest uses a function named is_debugging to perform anti-debugging logic. the function invokes sysctl checking the returned value of p_traced. thiefquest also calls ptrace with the ptrace_deny_attach flag to prevent debugging.
t1497.001
virtualization sandbox evasion
system Technique checks
trojan.karagany can detect commonly used and generic virtualization platforms based primarily on drivers and file paths.
t1497.001
virtualization sandbox evasion
system Technique checks
uboatrat checks for virtualization software such as vmware virtualbox or qemu on the compromised machine.
t1497.001
virtualization sandbox evasion
system Technique checks
yty has some basic anti-sandbox detection that tries to detect virtual pc sandboxie and vmware.
t1498
network denial of service
null
adversaries may perform network denial of service dos attacks to degrade or block the availability of targeted resources to users
t1498
network denial of service
null
detection of network dos can sometimes be achieved before the traffic volume is sufficient to cause impact to the availability of the service but such response time typically requires very aggressive monitoring and responsiveness or services provided by an upstream network service provider
t1498
network denial of service
null
network dos can be performed by exhausting the network bandwidth services rely on
t1498
network denial of service
null
often the lead time may be small and the indicator of an event availability of the network or service drops
t1498
network denial of service
null
real time automated and qualitative study of the network traffic can identify a sudden surge in one type of protocol can be used to detect an network dos event as it starts