enterprise |
T1010 |
Application Window Discovery |
HotCroissant has the ability to list the names of all open windows on the infected host. |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.003 |
Windows Command Shell |
HotCroissant can remotely open applications on the infected host with the ShellExecuteA command. |
enterprise |
T1573 |
Encrypted Channel |
- |
enterprise |
T1573.001 |
Symmetric Cryptography |
HotCroissant has compressed network communications and encrypted them with a custom stream cipher. |
enterprise |
T1041 |
Exfiltration Over C2 Channel |
HotCroissant has the ability to download files from the infected host to the command and control (C2) server. |
enterprise |
T1083 |
File and Directory Discovery |
HotCroissant has the ability to retrieve a list of files in a given directory as well as drives and drive types. |
enterprise |
T1564 |
Hide Artifacts |
- |
enterprise |
T1564.003 |
Hidden Window |
HotCroissant has the ability to hide the window for operations performed on a given file. |
enterprise |
T1070 |
Indicator Removal |
- |
enterprise |
T1070.004 |
File Deletion |
HotCroissant has the ability to clean up installed files, delete files, and delete itself from the victim’s machine. |
enterprise |
T1105 |
Ingress Tool Transfer |
HotCroissant has the ability to upload a file from the command and control (C2) server to the victim machine. |
enterprise |
T1106 |
Native API |
HotCroissant can perform dynamic DLL importing and API lookups using LoadLibrary and GetProcAddress on obfuscated strings. |
enterprise |
T1027 |
Obfuscated Files or Information |
HotCroissant has encrypted strings with single-byte XOR and base64 encoded RC4. |
enterprise |
T1027.002 |
Software Packing |
HotCroissant has used the open source UPX executable packer. |
enterprise |
T1057 |
Process Discovery |
HotCroissant has the ability to list running processes on the infected host. |
enterprise |
T1053 |
Scheduled Task/Job |
- |
enterprise |
T1053.005 |
Scheduled Task |
HotCroissant has attempted to install a scheduled task named “Java Maintenance64” on startup to establish persistence. |
enterprise |
T1113 |
Screen Capture |
HotCroissant has the ability to do real time screen viewing on an infected host. |
enterprise |
T1489 |
Service Stop |
HotCroissant has the ability to stop services on the infected host. |
enterprise |
T1518 |
Software Discovery |
HotCroissant can retrieve a list of applications from the SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths registry key. |
enterprise |
T1082 |
System Information Discovery |
HotCroissant has the ability to determine if the current user is an administrator, Windows product name, processor name, screen resolution, and physical RAM of the infected host. |
enterprise |
T1016 |
System Network Configuration Discovery |
HotCroissant has the ability to identify the IP address of the compromised machine. |
enterprise |
T1033 |
System Owner/User Discovery |
HotCroissant has the ability to collect the username on the infected host. |
enterprise |
T1007 |
System Service Discovery |
HotCroissant has the ability to retrieve a list of services on the infected host. |