enterprise |
T1087 |
Account Discovery |
- |
enterprise |
T1087.002 |
Domain Account |
During Operation Wocao, threat actors used the net command to retrieve information about domain accounts. |
enterprise |
T1583 |
Acquire Infrastructure |
- |
enterprise |
T1583.004 |
Server |
For Operation Wocao, the threat actors purchased servers with Bitcoin to use during the operation. |
enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
During Operation Wocao, threat actors’ XServer tool communicated using HTTP and HTTPS. |
enterprise |
T1560 |
Archive Collected Data |
- |
enterprise |
T1560.001 |
Archive via Utility |
During Operation Wocao, threat actors archived collected files with WinRAR, prior to exfiltration. |
enterprise |
T1119 |
Automated Collection |
During Operation Wocao, threat actors used a script to collect information about the infected system. |
enterprise |
T1115 |
Clipboard Data |
During Operation Wocao, threat actors collected clipboard data in plaintext. |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.001 |
PowerShell |
During Operation Wocao, threat actors used PowerShell on compromised systems. |
enterprise |
T1059.003 |
Windows Command Shell |
During Operation Wocao, threat actors spawned a new cmd.exe process to execute commands. |
enterprise |
T1059.005 |
Visual Basic |
During Operation Wocao, threat actors used VBScript to conduct reconnaissance on targeted systems. |
enterprise |
T1059.006 |
Python |
During Operation Wocao, threat actors’ backdoors were written in Python and compiled with py2exe. |
enterprise |
T1555 |
Credentials from Password Stores |
- |
enterprise |
T1555.005 |
Password Managers |
During Operation Wocao, threat actors accessed and collected credentials from password managers. |
enterprise |
T1005 |
Data from Local System |
During Operation Wocao, threat actors exfiltrated files and directories of interest from the targeted system. |
enterprise |
T1001 |
Data Obfuscation |
During Operation Wocao, threat actors encrypted IP addresses used for “Agent” proxy hops with RC4. |
enterprise |
T1074 |
Data Staged |
- |
enterprise |
T1074.001 |
Local Data Staging |
During Operation Wocao, threat actors staged archived files in a temporary directory prior to exfiltration. |
enterprise |
T1587 |
Develop Capabilities |
- |
enterprise |
T1587.001 |
Malware |
During Operation Wocao, threat actors developed their own custom webshells to upload to compromised servers. |
enterprise |
T1573 |
Encrypted Channel |
- |
enterprise |
T1573.002 |
Asymmetric Cryptography |
During Operation Wocao, threat actors’ proxy implementation “Agent” upgraded the socket in use to a TLS socket. |
enterprise |
T1585 |
Establish Accounts |
- |
enterprise |
T1585.002 |
Email Accounts |
For Operation Wocao, the threat actors registered email accounts to use during the campaign. |
enterprise |
T1041 |
Exfiltration Over C2 Channel |
During Operation Wocao, threat actors used the XServer backdoor to exfiltrate data. |
enterprise |
T1190 |
Exploit Public-Facing Application |
During Operation Wocao, threat actors gained initial access by exploiting vulnerabilities in JBoss webservers. |
enterprise |
T1133 |
External Remote Services |
During Operation Wocao, threat actors used stolen credentials to connect to the victim’s network via VPN. |
enterprise |
T1083 |
File and Directory Discovery |
During Operation Wocao, threat actors gathered a recursive directory listing to find files and directories of interest. |
enterprise |
T1589 |
Gather Victim Identity Information |
During Operation Wocao, threat actors targeted people based on their organizational roles and privileges. |
enterprise |
T1562 |
Impair Defenses |
- |
enterprise |
T1562.004 |
Disable or Modify System Firewall |
During Operation Wocao, threat actors used PowerShell to add and delete rules in the Windows firewall. |
enterprise |
T1070 |
Indicator Removal |
- |
enterprise |
T1070.001 |
Clear Windows Event Logs |
During Operation Wocao, the threat actors deleted all Windows system and security event logs using /Q /c wevtutil cl system and /Q /c wevtutil cl security . |
enterprise |
T1070.004 |
File Deletion |
During Operation Wocao, the threat actors consistently removed traces of their activity by first overwriting a file using /c cd /d c:\windows\temp\ & copy \\<IP ADDRESS>\c$\windows\system32\devmgr.dll \\<IP ADDRESS>\c$\windows\temp\LMAKSW.ps1 /y and then deleting the overwritten file using /c cd /d c:\windows\temp\ & del \\<IP ADDRESS>\c$\windows\temp\LMAKSW.ps1 . |
enterprise |
T1105 |
Ingress Tool Transfer |
During Operation Wocao, threat actors downloaded additional files to the infected system. |
enterprise |
T1056 |
Input Capture |
- |
enterprise |
T1056.001 |
Keylogging |
During Operation Wocao, threat actors obtained the password for the victim’s password manager via a custom keylogger. |
enterprise |
T1570 |
Lateral Tool Transfer |
During Operation Wocao, threat actors used SMB to copy files to and from target systems. |
enterprise |
T1036 |
Masquerading |
- |
enterprise |
T1036.005 |
Match Legitimate Name or Location |
During Operation Wocao, the threat actors renamed some tools and executables to appear as legitimate programs. |
enterprise |
T1112 |
Modify Registry |
During Operation Wocao, the threat actors enabled Wdigest by changing the HKLM\SYSTEM\\ControlSet001\\Control\\SecurityProviders\\WDigest registry value from 0 (disabled) to 1 (enabled). |
enterprise |
T1111 |
Multi-Factor Authentication Interception |
During Operation Wocao, threat actors used a custom collection method to intercept two-factor authentication soft tokens. |
enterprise |
T1106 |
Native API |
During Operation Wocao, threat actors used the CreateProcessA and ShellExecute API functions to launch commands after being injected into a selected process. |
enterprise |
T1046 |
Network Service Discovery |
During Operation Wocao, threat actors scanned for open ports and used nbtscan to find NETBIOS nameservers. |
enterprise |
T1135 |
Network Share Discovery |
During Operation Wocao, threat actors discovered network disks mounted to the system using netstat. |
enterprise |
T1095 |
Non-Application Layer Protocol |
During Operation Wocao, threat actors used a custom protocol for command and control. |
enterprise |
T1571 |
Non-Standard Port |
During Operation Wocao, the threat actors used uncommon high ports for its backdoor C2, including ports 25667 and 47000. |
enterprise |
T1027 |
Obfuscated Files or Information |
- |
enterprise |
T1027.005 |
Indicator Removal from Tools |
During Operation Wocao, threat actors edited variable names within the Impacket suite to avoid automated detection. |
enterprise |
T1027.010 |
Command Obfuscation |
During Operation Wocao, threat actors executed PowerShell commands which were encoded or compressed using Base64, zlib, and XOR. |
enterprise |
T1588 |
Obtain Capabilities |
- |
enterprise |
T1588.002 |
Tool |
For Operation Wocao, the threat actors obtained a variety of open source tools, including JexBoss, KeeThief, and BloodHound. |
enterprise |
T1003 |
OS Credential Dumping |
- |
enterprise |
T1003.001 |
LSASS Memory |
During Operation Wocao, threat actors used ProcDump to dump credentials from memory. |
enterprise |
T1003.006 |
DCSync |
During Operation Wocao, threat actors used Mimikatz‘s DCSync to dump credentials from the memory of the targeted system. |
enterprise |
T1120 |
Peripheral Device Discovery |
During Operation Wocao, threat actors discovered removable disks attached to a system. |
enterprise |
T1069 |
Permission Groups Discovery |
- |
enterprise |
T1069.001 |
Local Groups |
During Operation Wocao, threat actors used the command net localgroup administrators to list all administrators part of a local group. |
enterprise |
T1057 |
Process Discovery |
During Operation Wocao, the threat actors used tasklist to collect a list of running processes on an infected system. |
enterprise |
T1055 |
Process Injection |
During Operation Wocao, threat actors injected code into a selected process, which in turn launches a command as a child process of the original. |
enterprise |
T1090 |
Proxy |
During Operation Wocao, threat actors used a custom proxy tool called “Agent” which has support for multiple hops. |
enterprise |
T1090.001 |
Internal Proxy |
During Operation Wocao, threat actors proxied traffic through multiple infected systems. |
enterprise |
T1090.003 |
Multi-hop Proxy |
During Operation Wocao, threat actors executed commands through the installed web shell via Tor exit nodes. |
enterprise |
T1012 |
Query Registry |
During Operation Wocao, the threat actors executed /c cd /d c:\windows\temp\ & reg query HKEY_CURRENT_USER\Software\<username>\PuTTY\Sessions\ to detect recent PuTTY sessions, likely to further lateral movement. |
enterprise |
T1021 |
Remote Services |
- |
enterprise |
T1021.002 |
SMB/Windows Admin Shares |
During Operation Wocao, threat actors used Impacket‘s smbexec.py as well as accessing the C$ and IPC$ shares to move laterally. |
enterprise |
T1018 |
Remote System Discovery |
During Operation Wocao, threat actors used nbtscan and ping to discover remote systems, as well as dsquery subnet on a domain controller to retrieve all subnets in the Active Directory. |
enterprise |
T1053 |
Scheduled Task/Job |
- |
enterprise |
T1053.005 |
Scheduled Task |
During Operation Wocao, threat actors used scheduled tasks to execute malicious PowerShell code on remote systems. |
enterprise |
T1505 |
Server Software Component |
- |
enterprise |
T1505.003 |
Web Shell |
During Operation Wocao, threat actors used their own web shells, as well as those previously placed on target systems by other threat actors, for reconnaissance and lateral movement. |
enterprise |
T1518 |
Software Discovery |
During Operation Wocao, threat actors collected a list of installed software on the infected system. |
enterprise |
T1518.001 |
Security Software Discovery |
During Operation Wocao, threat actors used scripts to detect security software. |
enterprise |
T1558 |
Steal or Forge Kerberos Tickets |
- |
enterprise |
T1558.003 |
Kerberoasting |
During Operation Wocao, threat actors used PowerSploit‘s Invoke-Kerberoast module to request encrypted service tickets and bruteforce the passwords of Windows service accounts offline. |
enterprise |
T1082 |
System Information Discovery |
During Operation Wocao, threat actors discovered the local disks attached to the system and their hardware information including manufacturer and model, as well as the OS versions of systems connected to a targeted network. |
enterprise |
T1016 |
System Network Configuration Discovery |
During Operation Wocao, threat actors discovered the local network configuration with ipconfig . |
enterprise |
T1016.001 |
Internet Connection Discovery |
During Operation Wocao, threat actors used a Visual Basic script that checked for internet connectivity. |
enterprise |
T1049 |
System Network Connections Discovery |
During Operation Wocao, threat actors collected a list of open connections on the infected system using netstat and checks whether it has an internet connection. |
enterprise |
T1033 |
System Owner/User Discovery |
During Operation Wocao, threat actors enumerated sessions and users on a remote host, and identified privileged users logged into a targeted system. |
enterprise |
T1007 |
System Service Discovery |
During Operation Wocao, threat actors used the tasklist command to search for one of its backdoors. |
enterprise |
T1569 |
System Services |
- |
enterprise |
T1569.002 |
Service Execution |
During Operation Wocao, threat actors created services on remote systems for execution purposes. |
enterprise |
T1124 |
System Time Discovery |
During Operation Wocao, threat actors used the time command to retrieve the current time of a compromised system. |
enterprise |
T1552 |
Unsecured Credentials |
- |
enterprise |
T1552.004 |
Private Keys |
During Operation Wocao, threat actors used Mimikatz to dump certificates and private keys from the Windows certificate store. |
enterprise |
T1078 |
Valid Accounts |
During Operation Wocao, threat actors used valid VPN credentials to gain initial access. |
enterprise |
T1078.002 |
Domain Accounts |
During Operation Wocao, threat actors used domain credentials, including domain admin, for lateral movement and privilege escalation. |
enterprise |
T1078.003 |
Local Accounts |
During Operation Wocao, threat actors used local account credentials found during the intrusion for lateral movement and privilege escalation. |
enterprise |
T1047 |
Windows Management Instrumentation |
During Operation Wocao, threat actors has used WMI to execute commands. |