S0350 zwShell
zwShell is a remote access tool (RAT) written in Delphi that has been seen in the wild since the spring of 2010 and used by threat actors during Night Dragon.1
| Item | Value | 
|---|---|
| ID | S0350 | 
| Associated Names | |
| Type | MALWARE | 
| Version | 2.0 | 
| Created | 30 January 2019 | 
| Last Modified | 22 September 2022 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| enterprise | T1059 | Command and Scripting Interpreter | - | 
| enterprise | T1059.003 | Windows Command Shell | zwShell can launch command-line shells.1 | 
| enterprise | T1543 | Create or Modify System Process | - | 
| enterprise | T1543.003 | Windows Service | zwShell has established persistence by adding itself as a new service.1 | 
| enterprise | T1083 | File and Directory Discovery | zwShell can browse the file system.1 | 
| enterprise | T1070 | Indicator Removal | - | 
| enterprise | T1070.004 | File Deletion | zwShell has deleted itself after creating a service as well as deleted a temporary file when the system reboots.1 | 
| enterprise | T1112 | Modify Registry | zwShell can modify the Registry.1 | 
| enterprise | T1021 | Remote Services | - | 
| enterprise | T1021.001 | Remote Desktop Protocol | zwShell has used RDP for lateral movement.1 | 
| enterprise | T1021.002 | SMB/Windows Admin Shares | zwShell has been copied over network shares to move laterally.1 | 
| enterprise | T1053 | Scheduled Task/Job | - | 
| enterprise | T1053.005 | Scheduled Task | zwShell has used SchTasks for execution.1 | 
| enterprise | T1082 | System Information Discovery | zwShell can obtain the victim PC name and OS version.1 | 
| enterprise | T1016 | System Network Configuration Discovery | zwShell can obtain the victim IP address.1 | 
| enterprise | T1033 | System Owner/User Discovery | zwShell can obtain the name of the logged-in user on the victim.1 |