enterprise |
T1087 |
Account Discovery |
- |
enterprise |
T1087.001 |
Local Account |
SMOKEDHAM has used net.exe user and net.exe users to enumerate local accounts on a compromised host. |
enterprise |
T1098 |
Account Manipulation |
SMOKEDHAM has added user accounts to local Admin groups. |
enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
SMOKEDHAM has communicated with its C2 servers via HTTPS and HTTP POST requests. |
enterprise |
T1547 |
Boot or Logon Autostart Execution |
- |
enterprise |
T1547.001 |
Registry Run Keys / Startup Folder |
SMOKEDHAM has used reg.exe to create a Registry Run key. |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.001 |
PowerShell |
SMOKEDHAM can execute Powershell commands sent from its C2 server. |
enterprise |
T1136 |
Create Account |
- |
enterprise |
T1136.001 |
Local Account |
SMOKEDHAM has created user accounts. |
enterprise |
T1132 |
Data Encoding |
- |
enterprise |
T1132.001 |
Standard Encoding |
SMOKEDHAM has encoded its C2 traffic with Base64. |
enterprise |
T1573 |
Encrypted Channel |
- |
enterprise |
T1573.001 |
Symmetric Cryptography |
SMOKEDHAM has encrypted its C2 traffic with RC4. |
enterprise |
T1041 |
Exfiltration Over C2 Channel |
SMOKEDHAM has exfiltrated data to its C2 server. |
enterprise |
T1564 |
Hide Artifacts |
- |
enterprise |
T1564.002 |
Hidden Users |
SMOKEDHAM has modified the Registry to hide created user accounts from the Windows logon screen. |
enterprise |
T1105 |
Ingress Tool Transfer |
SMOKEDHAM has used Powershell to download UltraVNC and Ngrok from third-party file sharing sites. |
enterprise |
T1056 |
Input Capture |
- |
enterprise |
T1056.001 |
Keylogging |
SMOKEDHAM can continuously capture keystrokes. |
enterprise |
T1112 |
Modify Registry |
SMOKEDHAM has modified registry keys for persistence, to enable credential caching for credential access, and to facilitate lateral movement via RDP. |
enterprise |
T1027 |
Obfuscated Files or Information |
- |
enterprise |
T1027.009 |
Embedded Payloads |
The SMOKEDHAM source code is embedded in the dropper as an encrypted string. |
enterprise |
T1598 |
Phishing for Information |
- |
enterprise |
T1598.003 |
Spearphishing Link |
SMOKEDHAM has been delivered via malicious links in phishing emails. |
enterprise |
T1090 |
Proxy |
- |
enterprise |
T1090.004 |
Domain Fronting |
SMOKEDHAM has used a fronted domain to obfuscate its hard-coded C2 server domain. |
enterprise |
T1113 |
Screen Capture |
SMOKEDHAM can capture screenshots of the victim’s desktop. |
enterprise |
T1082 |
System Information Discovery |
SMOKEDHAM has used the systeminfo command on a compromised host. |
enterprise |
T1033 |
System Owner/User Discovery |
SMOKEDHAM has used whoami commands to identify system owners. |
enterprise |
T1204 |
User Execution |
- |
enterprise |
T1204.001 |
Malicious Link |
SMOKEDHAM has relied upon users clicking on a malicious link delivered through phishing. |
enterprise |
T1102 |
Web Service |
SMOKEDHAM has used Google Drive and Dropbox to host files downloaded by victims via malicious links. |