enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
WIRTE has used HTTP for network communication. |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.001 |
PowerShell |
WIRTE has used PowerShell for script execution. |
enterprise |
T1059.005 |
Visual Basic |
WIRTE has used VBScript in its operations. |
enterprise |
T1140 |
Deobfuscate/Decode Files or Information |
WIRTE has used Base64 to decode malicious VBS script. |
enterprise |
T1105 |
Ingress Tool Transfer |
WIRTE has downloaded PowerShell code from the C2 server to be executed. |
enterprise |
T1036 |
Masquerading |
- |
enterprise |
T1036.005 |
Match Legitimate Name or Location |
WIRTE has named a first stage dropper Kaspersky Update Agent in order to appear legitimate. |
enterprise |
T1571 |
Non-Standard Port |
WIRTE has used HTTPS over ports 2083 and 2087 for C2. |
enterprise |
T1588 |
Obtain Capabilities |
- |
enterprise |
T1588.002 |
Tool |
WIRTE has obtained and used Empire for post-exploitation activities. |
enterprise |
T1566 |
Phishing |
- |
enterprise |
T1566.001 |
Spearphishing Attachment |
WIRTE has sent emails to intended victims with malicious MS Word and Excel attachments. |
enterprise |
T1218 |
System Binary Proxy Execution |
- |
enterprise |
T1218.010 |
Regsvr32 |
WIRTE has used regsvr32.exe to trigger the execution of a malicious script. |
enterprise |
T1204 |
User Execution |
- |
enterprise |
T1204.002 |
Malicious File |
WIRTE has attempted to lure users into opening malicious MS Word and Excel files to execute malicious payloads. |