| enterprise |
T1583 |
Acquire Infrastructure |
- |
| enterprise |
T1583.003 |
Virtual Private Server |
During the C0032 campaign, TEMP.Veles used Virtual Private Server (VPS) infrastructure. |
| enterprise |
T1059 |
Command and Scripting Interpreter |
- |
| enterprise |
T1059.001 |
PowerShell |
During the C0032 campaign, TEMP.Veles used PowerShell to perform timestomping. |
| enterprise |
T1074 |
Data Staged |
- |
| enterprise |
T1074.001 |
Local Data Staging |
During the C0032 campaign, TEMP.Veles used staging folders that are infrequently used by legitimate users or processes to store data for exfiltration and tool deployment. |
| enterprise |
T1546 |
Event Triggered Execution |
- |
| enterprise |
T1546.012 |
Image File Execution Options Injection |
During the C0032 campaign, TEMP.Veles modified and added entries within HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options to maintain persistence. |
| enterprise |
T1133 |
External Remote Services |
During the C0032 campaign, TEMP.Veles used VPN access to persist in the victim environment. |
| enterprise |
T1070 |
Indicator Removal |
- |
| enterprise |
T1070.004 |
File Deletion |
During the C0032 campaign, TEMP.Veles routinely deleted tools, logs, and other files after they were finished with them. |
| enterprise |
T1070.006 |
Timestomp |
During the C0032 campaign, TEMP.Veles used timestomping to modify the $STANDARD_INFORMATION attribute on tools. |
| enterprise |
T1036 |
Masquerading |
- |
| enterprise |
T1036.005 |
Match Legitimate Resource Name or Location |
During the C0032 campaign, TEMP.Veles renamed files to look like legitimate files, such as Windows update files or Schneider Electric application files. |
| enterprise |
T1571 |
Non-Standard Port |
During the C0032 campaign, TEMP.Veles used port-protocol mismatches on ports such as 443, 4444, 8531, and 50501 during C2. |
| enterprise |
T1588 |
Obtain Capabilities |
- |
| enterprise |
T1588.002 |
Tool |
During the C0032 campaign, TEMP.Veles obtained and used tools such as Mimikatz and PsExec. |
| enterprise |
T1003 |
OS Credential Dumping |
- |
| enterprise |
T1003.001 |
LSASS Memory |
During the C0032 campaign, TEMP.Veles used Mimikatz and a custom tool, SecHack, to harvest credentials. |
| enterprise |
T1572 |
Protocol Tunneling |
During the C0032 campaign, TEMP.Veles used encrypted SSH-based PLINK tunnels to transfer tools and enable RDP connections throughout the environment. |
| enterprise |
T1021 |
Remote Services |
- |
| enterprise |
T1021.001 |
Remote Desktop Protocol |
During the C0032 campaign, TEMP.Veles utilized RDP throughout an operation. |
| enterprise |
T1021.004 |
SSH |
During the C0032 campaign, TEMP.Veles relied on encrypted SSH-based tunnels to transfer tools and for remote command/program execution. |
| enterprise |
T1053 |
Scheduled Task/Job |
- |
| enterprise |
T1053.005 |
Scheduled Task |
During the C0032 campaign, TEMP.Veles used scheduled task XML triggers. |
| enterprise |
T1505 |
Server Software Component |
- |
| enterprise |
T1505.003 |
Web Shell |
During the C0032 campaign, TEMP.Veles planted Web shells on Outlook Exchange servers. |
| enterprise |
T1078 |
Valid Accounts |
During the C0032 campaign, TEMP.Veles used compromised VPN accounts. |