id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1484
|
domain policy modification
| null |
monitor for modifications to domain trust settings such as when a user or application modifies the federation settings on the domain or updates domain authentication from managed to federated via action types set federation settings on domain and set domain authentication
|
t1485
|
data destruction
| null |
adversaries may destroy data and files on specific systems or in large numbers on a network to interrupt availability to systems services and network resources
|
t1485
|
data destruction
| null |
data destruction is likely to render stored data irrecoverable by forensic techniques through overwriting files or data on local and remote drives
|
t1485
|
data destruction
| null |
in cloud environments the occurrence of anomalous high volume deletion events such as the deleted cluster and delete global cluster events in aws or a high quantity of data deletion events such as delete bucket within a short period of time may indicate suspicious activity
|
t1485
|
data destruction
| null |
in particular look for large quantities of file modifications in user directories and under c windows system32
|
t1485
|
data destruction
| null |
monitor for the creation of suspicious files as well as high unusual file modification activity
|
t1485
|
data destruction
| null |
process process creation command command execution file file modification file file deletion image image deletion instance instance deletion snapshot snapshot deletion cloud storage cloud storage deletion volume volume deletion
|
t1485
|
data destruction
| null |
use process monitoring to monitor the execution and command line parameters of binaries that could be involved in data destruction activity such as sdeletes0195
|
t1486
|
data encrypted for impact
| null |
adversaries may encrypt data on target systems or on large numbers of systems in a network to interrupt availability to system and network resources
|
t1486
|
data encrypted for impact
| null |
cloud storage cloud storage metadata cloud storage cloud storage modification process process creation command command execution file file modification file file creation
|
t1486
|
data encrypted for impact
| null |
in cloud environments monitor for events that indicate storage objects have been anomalously replaced by copies
|
t1486
|
data encrypted for impact
| null |
in particular look for large quantities of file modifications in user directories
|
t1486
|
data encrypted for impact
| null |
in some cases monitoring for unusual kernel driver installation activity can aid in detection
|
t1486
|
data encrypted for impact
| null |
monitor for the creation of suspicious files as well as unusual file modification activity
|
t1486
|
data encrypted for impact
| null |
they can attempt to render stored data inaccessible by encrypting files or data on local and remote drives and withholding access to a decryption key
|
t1486
|
data encrypted for impact
| null |
use process monitoring to monitor the execution and command line parameters of binaries involved in data destruction activity such as vssadmin wbadmin and bcdedit
|
t1489
|
service stop
| null |
adversaries may stop or disable services on a system to render those services unavailable to legitimate users
|
t1489
|
service stop
| null |
alterations to the service binary path or the service startup type changed to disabled may be suspicious
|
t1489
|
service stop
| null |
citation talos olympic destroyer 2018
|
t1489
|
service stop
| null |
configsystemduser directories as well as associated symbolic links
|
t1489
|
service stop
| null |
for example changeserviceconfig may be used by an adversary to prevent services from starting
|
t1489
|
service stop
| null |
look for changes to services that do not correlate with known software patch cycles etc
|
t1489
|
service stop
| null |
monitor for edits for modifications to services and startup programs that correspond to services of high importance
|
t1489
|
service stop
| null |
monitor processes and command line arguments to see if critical processes are terminated or stop running
|
t1489
|
service stop
| null |
process process creation command command execution process os api execution service service metadata windows registry windows registry key modification file file modification process process termination
|
t1489
|
service stop
| null |
remote access tools with built in features may interact directly with the windows api to perform these functions outside of typical system utilities
|
t1489
|
service stop
| null |
stopping critical services or processes can inhibit or stop response to an incident or aid in the adversarys overall objectives to cause damage to the environment
|
t1489
|
service stop
| null |
systemd service unit files are stored within the etcsystemdsystem usrlibsystemdsystem and home
|
t1489
|
service stop
| null |
windows service information is stored in the registry at hklm system currentcontrolse services
|
t1490
|
inhibit system recovery
| null |
adversaries may delete or remove built in operating system data and turn off services designed to aid in the recovery of a corrupted system to prevent recovery
|
t1490
|
inhibit system recovery
| null |
citation talos olympic destroyer 2018citation fireeye wannacry 2017 operating systems may contain features that can help fix corrupted systems such as a backup catalog volume shadow copies and automatic repair features
|
t1490
|
inhibit system recovery
| null |
event id 524 indicating a system catalog was deleted may contain entries associated with suspicious activity
|
t1490
|
inhibit system recovery
| null |
monitor the registry for changes associated with system recovery features ex the creation of hkey_current_user software policies microsoft previous versions disablelocal page
|
t1490
|
inhibit system recovery
| null |
monitor the status of services involved in system recovery
|
t1490
|
inhibit system recovery
| null |
process process creation command command execution service service metadata windows registry windows registry key modification file file deletion
|
t1490
|
inhibit system recovery
| null |
the windows event logs ex
|
t1490
|
inhibit system recovery
| null |
use process monitoring to monitor the execution and command line parameters of binaries involved in inhibiting system recovery such as vssadmin wbadmin and bcdedit
|
t1491
|
defacement
| null |
adversaries may modify visual content available internally or externally to an enterprise network
|
t1491
|
defacement
| null |
file file modification file file creation application log application log content network traffic network traffic content
|
t1491
|
defacement
| null |
monitor application logs for abnormal behavior that may indicate attempted or successful exploitation
|
t1491
|
defacement
| null |
monitor internal and external websites for unplanned content changes
|
t1491
|
defacement
| null |
reasons for defacementt1491 include delivering messaging intimidation or claiming possibly false credit for an intrusion
|
t1491
|
defacement
| null |
use deep packet inspection to look for artifacts of common exploit traffic such as sql injection
|
t1491
|
defacement
| null |
web application firewalls may detect improper inputs attempting exploitation
|
t1495
|
firmware corruption
| null |
adversaries may overwrite or corrupt the flash memory contents of system bios or other firmware in devices attached to a system in order to render them inoperable or unable to boot
|
t1495
|
firmware corruption
| null |
citation mitre trustworthy firmware measurement log attempts to readwrite to bios and compare against known patching behavior
|
t1495
|
firmware corruption
| null |
citation symantec chernobyl w95
|
t1495
|
firmware corruption
| null |
firmware firmware modification
|
t1495
|
firmware corruption
| null |
system firmware manipulation may be detected
|
t1496
|
resource hijacking
| null |
adversaries may leverage the resources of co opted systems in order to solve resource intensive problems which may impact system andor hosted service availability
|
t1496
|
resource hijacking
| null |
consider monitoring process resource usage to determine anomalous activity associated with malicious hijacking of computer resources such as cpu memory and graphics processing resources
|
t1496
|
resource hijacking
| null |
monitor for common crypto mining software process names and files on local systems that may indicate compromise and resource usage
|
t1496
|
resource hijacking
| null |
monitor for suspicious use of network resources associated with cryptocurrency mining software
|
t1496
|
resource hijacking
| null |
one common purpose for resource hijacking is to validate transactions of cryptocurrency networks and earn virtual currency
|
t1496
|
resource hijacking
| null |
process process creation command command execution file file creation network traffic network connection creation network traffic network traffic flow sensor health host status
|
t1497
|
virtualizationsandbox evasion
| null |
adversaries may employ various means to detect and avoid virtualization and analysis environments
|
t1497
|
virtualizationsandbox evasion
| null |
data and events should not be viewed in isolation but as part of a chain of behavior that could lead to other activities such as lateral movement based on the information obtained
|
t1497
|
virtualizationsandbox evasion
| null |
detecting actions related to virtualization and sandbox identification may be difficult depending on the adversarys implementation and monitoring required
|
t1497
|
virtualizationsandbox evasion
| null |
monitoring for suspicious processes being spawned that gather a variety of system information or perform other forms of discovery especially in a short period of time may aid in detection
|
t1497
|
virtualizationsandbox evasion
| null |
process process creation command command execution process os api execution
|
t1497
|
virtualizationsandbox evasion
| null |
this may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment vme or sandbox
|
t1497
|
virtualizationsandbox evasion
| null |
virtualization sandbox user activity and related discovery techniques will likely occur in the first steps of an operation but may also occur throughout as an adversary learns the environment
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
astaroth can check for windows product id's used by sandboxes and usernames and disk serial numbers associated with analyst environments.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts such as communication with io ports and using vm-specific instructions.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
badpatch attempts to detect if it is being run in a virtual machine vm using a wmi query for disk drive name bios and motherboard information.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
cspy downloader can search loaded modules peb structure file paths registry keys and memory to determine if it is being debugged or running in a virtual environment.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
darkhotel malware has used a series of checks to determine if it's being analyzed checks include the length of executable names if a filename ends with .md5.exe and if the program is executed from the root of the c: drive as well as checks for sandbox-related libraries.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
denis ran multiple system checks looking for processor and register characteristics to evade emulation and analysis.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
dyre can detect sandbox analysis environments by inspecting the process list and registry.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
evilbunny's dropper has checked the number of processes and the length and strings of its own file name to identify if the malware is in a sandbox environment.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
evilnum has used a component called terraloader to check certain hardware and file information to detect sandboxed environments.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
finfisher obtains the hardware device list and checks if the md5 of the vendor id is equal to a predefined list in order to check for sandboxvirtualized environments.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
frankenstein has used wmi queries to check if various security applications were running including vmware and virtualbox.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
goldmax will check if it is being run in a virtualized environment by comparing the collected mac address to c8:27:cc:c2:37:5a.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
grandoreiro can detect vmware via its io port and virtual pc via the vpcext instruction.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
gravityrat uses wmi to check the bios and manufacturer information for strings like vmware virtual and xen and another wmi request to get the current temperature of the hardware to determine if it's a virtual machine environment.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
invisimole can check for artifacts of virtualbox virtual pc and vmware environment and terminate itself if they are detected.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
lucifer can check for specific usernames computer names device drivers dll's and virtual devices associated with sandboxed environments and can enter an infinite loop and stop itself if any are detected.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
megacortex has checked the number of cpus in the system to avoid being run in a sandbox or emulator.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
okrum's loader can check the amount of physical memory and terminates itself if the host has less than 1.5 gigabytes of physical memory in total.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
oopsie performs several anti-vm and sandbox checks on the victim's machine. one technique the group has used was to perform a wmi query select * from msacpi_thermalzonetemperature to check the temperature to see if its running in a virtual environment.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
osx_oceanlotus.d has a variant that checks a number of system parameters to see if it is being run on real hardware or in a virtual machine environment.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
plugx checks if vmware tools is running in the background by searching for any process named vmtoolsd.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
poetrat checked the size of the hard drive to determine if it was being run in a sandbox environment. in the event of sandbox detection it would delete itself by overwriting the malware scripts with the contents of license.txt and exiting.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
puppy has a module that checks a number of indicators on the system to determine if its running on a virtual machine.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
remcos searches for sandboxie and vmware on the system.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
roguerobin uses wmi to check bios version for vbox bochs qemu virtualbox and vm to check for evidence that the script might be executing within an analysis environment.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
rokrat checks for sandboxing libraries.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
smoke loader scans processes to perform anti-vm checks.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
sunburst checked the domain name of the compromised host to verify it was running in a real environment.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
synack checks its directory location in an attempt to avoid launching in a sandbox.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
thiefquest uses a function named is_debugging to perform anti-debugging logic. the function invokes sysctl checking the returned value of p_traced. thiefquest also calls ptrace with the ptrace_deny_attach flag to prevent debugging.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
trojan.karagany can detect commonly used and generic virtualization platforms based primarily on drivers and file paths.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
uboatrat checks for virtualization software such as vmware virtualbox or qemu on the compromised machine.
|
t1497.001
|
virtualization sandbox evasion
|
system Technique checks
|
yty has some basic anti-sandbox detection that tries to detect virtual pc sandboxie and vmware.
|
t1498
|
network denial of service
| null |
adversaries may perform network denial of service dos attacks to degrade or block the availability of targeted resources to users
|
t1498
|
network denial of service
| null |
detection of network dos can sometimes be achieved before the traffic volume is sufficient to cause impact to the availability of the service but such response time typically requires very aggressive monitoring and responsiveness or services provided by an upstream network service provider
|
t1498
|
network denial of service
| null |
network dos can be performed by exhausting the network bandwidth services rely on
|
t1498
|
network denial of service
| null |
often the lead time may be small and the indicator of an event availability of the network or service drops
|
t1498
|
network denial of service
| null |
real time automated and qualitative study of the network traffic can identify a sudden surge in one type of protocol can be used to detect an network dos event as it starts
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.