| enterprise |
T1087 |
Account Discovery |
- |
| enterprise |
T1087.002 |
Domain Account |
During Operation Wocao, threat actors used the net command to retrieve information about domain accounts. |
| enterprise |
T1583 |
Acquire Infrastructure |
- |
| enterprise |
T1583.004 |
Server |
For Operation Wocao, the threat actors purchased servers with Bitcoin to use during the operation. |
| enterprise |
T1071 |
Application Layer Protocol |
- |
| enterprise |
T1071.001 |
Web Protocols |
During Operation Wocao, threat actors’ XServer tool communicated using HTTP and HTTPS. |
| enterprise |
T1560 |
Archive Collected Data |
- |
| enterprise |
T1560.001 |
Archive via Utility |
During Operation Wocao, threat actors archived collected files with WinRAR, prior to exfiltration. |
| enterprise |
T1119 |
Automated Collection |
During Operation Wocao, threat actors used a script to collect information about the infected system. |
| enterprise |
T1115 |
Clipboard Data |
During Operation Wocao, threat actors collected clipboard data in plaintext. |
| enterprise |
T1059 |
Command and Scripting Interpreter |
- |
| enterprise |
T1059.001 |
PowerShell |
During Operation Wocao, threat actors used PowerShell on compromised systems. |
| enterprise |
T1059.003 |
Windows Command Shell |
During Operation Wocao, threat actors spawned a new cmd.exe process to execute commands. |
| enterprise |
T1059.005 |
Visual Basic |
During Operation Wocao, threat actors used VBScript to conduct reconnaissance on targeted systems. |
| enterprise |
T1059.006 |
Python |
During Operation Wocao, threat actors’ backdoors were written in Python and compiled with py2exe. |
| enterprise |
T1555 |
Credentials from Password Stores |
- |
| enterprise |
T1555.005 |
Password Managers |
During Operation Wocao, threat actors accessed and collected credentials from password managers. |
| enterprise |
T1005 |
Data from Local System |
During Operation Wocao, threat actors exfiltrated files and directories of interest from the targeted system. |
| enterprise |
T1001 |
Data Obfuscation |
During Operation Wocao, threat actors encrypted IP addresses used for “Agent” proxy hops with RC4. |
| enterprise |
T1074 |
Data Staged |
- |
| enterprise |
T1074.001 |
Local Data Staging |
During Operation Wocao, threat actors staged archived files in a temporary directory prior to exfiltration. |
| enterprise |
T1587 |
Develop Capabilities |
- |
| enterprise |
T1587.001 |
Malware |
During Operation Wocao, threat actors developed their own custom webshells to upload to compromised servers. |
| enterprise |
T1573 |
Encrypted Channel |
- |
| enterprise |
T1573.002 |
Asymmetric Cryptography |
During Operation Wocao, threat actors’ proxy implementation “Agent” upgraded the socket in use to a TLS socket. |
| enterprise |
T1585 |
Establish Accounts |
- |
| enterprise |
T1585.002 |
Email Accounts |
For Operation Wocao, the threat actors registered email accounts to use during the campaign. |
| enterprise |
T1041 |
Exfiltration Over C2 Channel |
During Operation Wocao, threat actors used the XServer backdoor to exfiltrate data. |
| enterprise |
T1190 |
Exploit Public-Facing Application |
During Operation Wocao, threat actors gained initial access by exploiting vulnerabilities in JBoss webservers. |
| enterprise |
T1133 |
External Remote Services |
During Operation Wocao, threat actors used stolen credentials to connect to the victim’s network via VPN. |
| enterprise |
T1083 |
File and Directory Discovery |
During Operation Wocao, threat actors gathered a recursive directory listing to find files and directories of interest. |
| enterprise |
T1589 |
Gather Victim Identity Information |
During Operation Wocao, threat actors targeted people based on their organizational roles and privileges. |
| enterprise |
T1562 |
Impair Defenses |
- |
| enterprise |
T1562.004 |
Disable or Modify System Firewall |
During Operation Wocao, threat actors used PowerShell to add and delete rules in the Windows firewall. |
| enterprise |
T1070 |
Indicator Removal |
- |
| enterprise |
T1070.001 |
Clear Windows Event Logs |
During Operation Wocao, the threat actors deleted all Windows system and security event logs using /Q /c wevtutil cl system and /Q /c wevtutil cl security. |
| enterprise |
T1070.004 |
File Deletion |
During Operation Wocao, the threat actors consistently removed traces of their activity by first overwriting a file using /c cd /d c:\windows\temp\ & copy \\<IP ADDRESS>\c$\windows\system32\devmgr.dll \\<IP ADDRESS>\c$\windows\temp\LMAKSW.ps1 /y and then deleting the overwritten file using /c cd /d c:\windows\temp\ & del \\<IP ADDRESS>\c$\windows\temp\LMAKSW.ps1. |
| enterprise |
T1105 |
Ingress Tool Transfer |
During Operation Wocao, threat actors downloaded additional files to the infected system. |
| enterprise |
T1056 |
Input Capture |
- |
| enterprise |
T1056.001 |
Keylogging |
During Operation Wocao, threat actors obtained the password for the victim’s password manager via a custom keylogger. |
| enterprise |
T1570 |
Lateral Tool Transfer |
During Operation Wocao, threat actors used SMB to copy files to and from target systems. |
| enterprise |
T1680 |
Local Storage Discovery |
During Operation Wocao, threat actors discovered the local disks attached to the system and their hardware information including manufacturer and model. |
| enterprise |
T1036 |
Masquerading |
- |
| enterprise |
T1036.005 |
Match Legitimate Resource Name or Location |
During Operation Wocao, the threat actors renamed some tools and executables to appear as legitimate programs. |
| enterprise |
T1112 |
Modify Registry |
During Operation Wocao, the threat actors enabled Wdigest by changing the HKLM\SYSTEM\\ControlSet001\\Control\\SecurityProviders\\WDigest registry value from 0 (disabled) to 1 (enabled). |
| enterprise |
T1111 |
Multi-Factor Authentication Interception |
During Operation Wocao, threat actors used a custom collection method to intercept two-factor authentication soft tokens. |
| enterprise |
T1106 |
Native API |
During Operation Wocao, threat actors used the CreateProcessA and ShellExecute API functions to launch commands after being injected into a selected process. |
| enterprise |
T1046 |
Network Service Discovery |
During Operation Wocao, threat actors scanned for open ports and used nbtscan to find NETBIOS nameservers. |
| enterprise |
T1135 |
Network Share Discovery |
During Operation Wocao, threat actors discovered network disks mounted to the system using netstat. |
| enterprise |
T1095 |
Non-Application Layer Protocol |
During Operation Wocao, threat actors used a custom protocol for command and control. |
| enterprise |
T1571 |
Non-Standard Port |
During Operation Wocao, the threat actors used uncommon high ports for its backdoor C2, including ports 25667 and 47000. |
| enterprise |
T1027 |
Obfuscated Files or Information |
- |
| enterprise |
T1027.005 |
Indicator Removal from Tools |
During Operation Wocao, threat actors edited variable names within the Impacket suite to avoid automated detection. |
| enterprise |
T1027.010 |
Command Obfuscation |
During Operation Wocao, threat actors executed PowerShell commands which were encoded or compressed using Base64, zlib, and XOR. |
| enterprise |
T1588 |
Obtain Capabilities |
- |
| enterprise |
T1588.002 |
Tool |
For Operation Wocao, the threat actors obtained a variety of open source tools, including JexBoss, KeeThief, and BloodHound. |
| enterprise |
T1003 |
OS Credential Dumping |
- |
| enterprise |
T1003.001 |
LSASS Memory |
During Operation Wocao, threat actors used ProcDump to dump credentials from memory. |
| enterprise |
T1003.006 |
DCSync |
During Operation Wocao, threat actors used Mimikatz’s DCSync to dump credentials from the memory of the targeted system. |
| enterprise |
T1120 |
Peripheral Device Discovery |
During Operation Wocao, threat actors discovered removable disks attached to a system. |
| enterprise |
T1069 |
Permission Groups Discovery |
- |
| enterprise |
T1069.001 |
Local Groups |
During Operation Wocao, threat actors used the command net localgroup administrators to list all administrators part of a local group. |
| enterprise |
T1057 |
Process Discovery |
During Operation Wocao, the threat actors used tasklist to collect a list of running processes on an infected system. |
| enterprise |
T1055 |
Process Injection |
During Operation Wocao, threat actors injected code into a selected process, which in turn launches a command as a child process of the original. |
| enterprise |
T1090 |
Proxy |
During Operation Wocao, threat actors used a custom proxy tool called “Agent” which has support for multiple hops. |
| enterprise |
T1090.001 |
Internal Proxy |
During Operation Wocao, threat actors proxied traffic through multiple infected systems. |
| enterprise |
T1090.003 |
Multi-hop Proxy |
During Operation Wocao, threat actors executed commands through the installed web shell via Tor exit nodes. |
| enterprise |
T1012 |
Query Registry |
During Operation Wocao, the threat actors executed /c cd /d c:\windows\temp\ & reg query HKEY_CURRENT_USER\Software\<username>\PuTTY\Sessions\ to detect recent PuTTY sessions, likely to further lateral movement. |
| enterprise |
T1021 |
Remote Services |
- |
| enterprise |
T1021.002 |
SMB/Windows Admin Shares |
During Operation Wocao, threat actors used Impacket’s smbexec.py as well as accessing the C$ and IPC$ shares to move laterally. |
| enterprise |
T1018 |
Remote System Discovery |
During Operation Wocao, threat actors used nbtscan and ping to discover remote systems, as well as dsquery subnet on a domain controller to retrieve all subnets in the Active Directory. |
| enterprise |
T1053 |
Scheduled Task/Job |
- |
| enterprise |
T1053.005 |
Scheduled Task |
During Operation Wocao, threat actors used scheduled tasks to execute malicious PowerShell code on remote systems. |
| enterprise |
T1505 |
Server Software Component |
- |
| enterprise |
T1505.003 |
Web Shell |
During Operation Wocao, threat actors used their own web shells, as well as those previously placed on target systems by other threat actors, for reconnaissance and lateral movement. |
| enterprise |
T1518 |
Software Discovery |
During Operation Wocao, threat actors collected a list of installed software on the infected system. |
| enterprise |
T1518.001 |
Security Software Discovery |
During Operation Wocao, threat actors used scripts to detect security software. |
| enterprise |
T1558 |
Steal or Forge Kerberos Tickets |
- |
| enterprise |
T1558.003 |
Kerberoasting |
During Operation Wocao, threat actors used PowerSploit’s Invoke-Kerberoast module to request encrypted service tickets and bruteforce the passwords of Windows service accounts offline. |
| enterprise |
T1082 |
System Information Discovery |
During Operation Wocao, threat actors discovered the OS versions of systems connected to a targeted network. |
| enterprise |
T1016 |
System Network Configuration Discovery |
During Operation Wocao, threat actors discovered the local network configuration with ipconfig. |
| enterprise |
T1016.001 |
Internet Connection Discovery |
During Operation Wocao, threat actors used a Visual Basic script that checked for internet connectivity. |
| enterprise |
T1049 |
System Network Connections Discovery |
During Operation Wocao, threat actors collected a list of open connections on the infected system using netstat and checks whether it has an internet connection. |
| enterprise |
T1033 |
System Owner/User Discovery |
During Operation Wocao, threat actors enumerated sessions and users on a remote host, and identified privileged users logged into a targeted system. |
| enterprise |
T1007 |
System Service Discovery |
During Operation Wocao, threat actors used the tasklist command to search for one of its backdoors. |
| enterprise |
T1569 |
System Services |
- |
| enterprise |
T1569.002 |
Service Execution |
During Operation Wocao, threat actors created services on remote systems for execution purposes. |
| enterprise |
T1124 |
System Time Discovery |
During Operation Wocao, threat actors used the time command to retrieve the current time of a compromised system. |
| enterprise |
T1552 |
Unsecured Credentials |
- |
| enterprise |
T1552.004 |
Private Keys |
During Operation Wocao, threat actors used Mimikatz to dump certificates and private keys from the Windows certificate store. |
| enterprise |
T1078 |
Valid Accounts |
During Operation Wocao, threat actors used valid VPN credentials to gain initial access. |
| enterprise |
T1078.002 |
Domain Accounts |
During Operation Wocao, threat actors used domain credentials, including domain admin, for lateral movement and privilege escalation. |
| enterprise |
T1078.003 |
Local Accounts |
During Operation Wocao, threat actors used local account credentials found during the intrusion for lateral movement and privilege escalation. |
| enterprise |
T1047 |
Windows Management Instrumentation |
During Operation Wocao, threat actors has used WMI to execute commands. |