enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.005 |
Visual Basic |
SideCopy has sent Microsoft Office Publisher documents to victims that have embedded malicious macros that execute an hta file via calling mshta.exe . |
enterprise |
T1584 |
Compromise Infrastructure |
- |
enterprise |
T1584.001 |
Domains |
SideCopy has compromised domains for some of their infrastructure, including for C2 and staging malware. |
enterprise |
T1574 |
Hijack Execution Flow |
- |
enterprise |
T1574.002 |
DLL Side-Loading |
SideCopy has used a malicious loader DLL file to execute the credwiz.exe process and side-load the malicious payload Duser.dll . |
enterprise |
T1105 |
Ingress Tool Transfer |
SideCopy has delivered trojanized executables via spearphishing emails that contacts actor-controlled servers to download malicious payloads. |
enterprise |
T1036 |
Masquerading |
- |
enterprise |
T1036.005 |
Match Legitimate Name or Location |
SideCopy has used a legitimate DLL file name, Duser.dll to disguise a malicious remote access tool. |
enterprise |
T1106 |
Native API |
SideCopy has executed malware by calling the API function CreateProcessW . |
enterprise |
T1566 |
Phishing |
- |
enterprise |
T1566.001 |
Spearphishing Attachment |
SideCopy has sent spearphishing emails with malicious hta file attachments. |
enterprise |
T1598 |
Phishing for Information |
- |
enterprise |
T1598.002 |
Spearphishing Attachment |
SideCopy has crafted generic lures for spam campaigns to collect emails and credentials for targeting efforts. |
enterprise |
T1518 |
Software Discovery |
SideCopy has collected browser information from a compromised host. |
enterprise |
T1518.001 |
Security Software Discovery |
SideCopy uses a loader DLL file to collect AV product names from an infected host. |
enterprise |
T1608 |
Stage Capabilities |
- |
enterprise |
T1608.001 |
Upload Malware |
SideCopy has used compromised domains to host its malicious payloads. |
enterprise |
T1218 |
System Binary Proxy Execution |
- |
enterprise |
T1218.005 |
Mshta |
SideCopy has utilized mshta.exe to execute a malicious hta file. |
enterprise |
T1082 |
System Information Discovery |
SideCopy has identified the OS version of a compromised host. |
enterprise |
T1614 |
System Location Discovery |
SideCopy has identified the country location of a compromised host. |
enterprise |
T1016 |
System Network Configuration Discovery |
SideCopy has identified the IP address of a compromised host. |
enterprise |
T1204 |
User Execution |
- |
enterprise |
T1204.002 |
Malicious File |
SideCopy has attempted to lure victims into clicking on malicious embedded archive files sent via spearphishing campaigns. |