| enterprise |
T1560 |
Archive Collected Data |
- |
| enterprise |
T1560.001 |
Archive via Utility |
|
| Play has used WinRAR to compress files prior to exfiltration. |
|
|
|
| enterprise |
T1059 |
Command and Scripting Interpreter |
- |
| enterprise |
T1059.001 |
PowerShell |
Play has used Base64-encoded PowerShell scripts to disable Microsoft Defender. |
| enterprise |
T1059.003 |
Windows Command Shell |
|
| Play has used a batch script to remove indicators of its presence on compromised hosts. |
|
|
|
| enterprise |
T1030 |
Data Transfer Size Limits |
Play has split victims’ files into chunks for exfiltration. |
| enterprise |
T1587 |
Develop Capabilities |
- |
| enterprise |
T1587.001 |
Malware |
Play developed and employ Playcrypt ransomware. |
| enterprise |
T1048 |
Exfiltration Over Alternative Protocol |
Play has used WinSCP to exfiltrate data to actor-controlled accounts. |
| enterprise |
T1190 |
Exploit Public-Facing Application |
Play has exploited known vulnerabilities for initial access including CVE-2018-13379 and CVE-2020-12812 in FortiOS and CVE-2022-41082 and CVE-2022-41040 (“ProxyNotShell”) in Microsoft Exchange. |
| enterprise |
T1133 |
External Remote Services |
|
| Play has used Remote Desktop Protocol (RDP) and Virtual Private Networks (VPN) for initial access. |
|
|
|
| enterprise |
T1083 |
File and Directory Discovery |
Play has used the Grixba information stealer to list security files and processes. |
| enterprise |
T1657 |
Financial Theft |
Play demands ransom payments from victims to unencrypt filesystems and to not publish sensitive data exfiltrated from victim networks. |
| enterprise |
T1562 |
Impair Defenses |
- |
| enterprise |
T1562.001 |
Disable or Modify Tools |
|
| Play has used tools including GMER, IOBit, and PowerTool to disable antivirus software. |
|
|
|
|
|
|
|
| enterprise |
T1070 |
Indicator Removal |
- |
| enterprise |
T1070.001 |
Clear Windows Event Logs |
Play has used tools to remove log files on targeted systems. |
| enterprise |
T1070.004 |
File Deletion |
Play has used tools including Wevtutil to remove malicious files from compromised hosts. |
| enterprise |
T1105 |
Ingress Tool Transfer |
Play has used Cobalt Strike to download files to compromised machines. |
| enterprise |
T1027 |
Obfuscated Files or Information |
- |
| enterprise |
T1027.010 |
Command Obfuscation |
Play has used Base64-encoded PowerShell scripts for post exploit activities on compromised hosts. |
| enterprise |
T1588 |
Obtain Capabilities |
- |
| enterprise |
T1588.002 |
Tool |
Play has used multiple tools for discovery and defense evasion purposes on compromised hosts. |
| enterprise |
T1003 |
OS Credential Dumping |
- |
| enterprise |
T1003.001 |
LSASS Memory |
Play has used Mimikatz and the Windows Task Manager to dump LSASS process memory. |
| enterprise |
T1057 |
Process Discovery |
|
| Play has used the information stealer Grixba to check for a list of security processes. |
|
|
|
| enterprise |
T1021 |
Remote Services |
- |
| enterprise |
T1021.002 |
SMB/Windows Admin Shares |
Play has used Cobalt Strike to move laterally via SMB. |
| enterprise |
T1018 |
Remote System Discovery |
Play has used tools such as AdFind, Nltest, and BloodHound to enumerate shares and hostnames on compromised networks. |
| enterprise |
T1518 |
Software Discovery |
- |
| enterprise |
T1518.001 |
Security Software Discovery |
|
| Play has used the information-stealing tool Grixba to scan for anti-virus software. |
|
|
|
|
|
|
|
| enterprise |
T1082 |
System Information Discovery |
|
| Play has leveraged tools to enumerate system information. |
|
|
|
| enterprise |
T1016 |
System Network Configuration Discovery |
|
| Play has used the information-stealing tool Grixba to enumerate network information. |
|
|
|
|
|
|
|
| enterprise |
T1078 |
Valid Accounts |
Play has used valid VPN accounts to achieve initial access. |
| enterprise |
T1078.002 |
Domain Accounts |
Play has used valid domain accounts for access. |
| enterprise |
T1078.003 |
Local Accounts |
Play has used valid local accounts to gain initial access. |