enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
CozyCar‘s main method of communicating with its C2 servers is using HTTP or HTTPS. |
enterprise |
T1547 |
Boot or Logon Autostart Execution |
- |
enterprise |
T1547.001 |
Registry Run Keys / Startup Folder |
One persistence mechanism used by CozyCar is to set itself to be executed at system startup by adding a Registry value under one of the following Registry keys:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.003 |
Windows Command Shell |
A module in CozyCar allows arbitrary commands to be executed by invoking C:\Windows\System32\cmd.exe . |
enterprise |
T1543 |
Create or Modify System Process |
- |
enterprise |
T1543.003 |
Windows Service |
One persistence mechanism used by CozyCar is to register itself as a Windows service. |
enterprise |
T1036 |
Masquerading |
- |
enterprise |
T1036.003 |
Rename System Utilities |
The CozyCar dropper has masqueraded a copy of the infected system’s rundll32.exe executable that was moved to the malware’s install directory and renamed according to a predefined configuration file. |
enterprise |
T1027 |
Obfuscated Files or Information |
The payload of CozyCar is encrypted with simple XOR with a rotating key. The CozyCar configuration file has been encrypted with RC4 keys. |
enterprise |
T1003 |
OS Credential Dumping |
- |
enterprise |
T1003.001 |
LSASS Memory |
CozyCar has executed Mimikatz to harvest stored credentials from the victim and further victim penetration. |
enterprise |
T1003.002 |
Security Account Manager |
Password stealer and NTLM stealer modules in CozyCar harvest stored credentials from the victim, including credentials used as part of Windows NTLM user authentication. |
enterprise |
T1053 |
Scheduled Task/Job |
- |
enterprise |
T1053.005 |
Scheduled Task |
One persistence mechanism used by CozyCar is to register itself as a scheduled task. |
enterprise |
T1518 |
Software Discovery |
- |
enterprise |
T1518.001 |
Security Software Discovery |
The main CozyCar dropper checks whether the victim has an anti-virus product installed. If the installed product is on a predetermined list, the dropper will exit. |
enterprise |
T1218 |
System Binary Proxy Execution |
- |
enterprise |
T1218.011 |
Rundll32 |
The CozyCar dropper copies the system file rundll32.exe to the install location for the malware, then uses the copy of rundll32.exe to load and execute the main CozyCar component. |
enterprise |
T1082 |
System Information Discovery |
A system info module in CozyCar gathers information on the victim host’s configuration. |
enterprise |
T1497 |
Virtualization/Sandbox Evasion |
Some versions of CozyCar will check to ensure it is not being executed inside a virtual machine or a known malware analysis sandbox environment. If it detects that it is, it will exit. |
enterprise |
T1102 |
Web Service |
- |
enterprise |
T1102.002 |
Bidirectional Communication |
CozyCar uses Twitter as a backup C2 channel to Twitter accounts specified in its configuration file. |