enterprise |
T1071 |
Application Layer Protocol |
- |
enterprise |
T1071.001 |
Web Protocols |
PcShare has used HTTP for C2 communication. |
enterprise |
T1059 |
Command and Scripting Interpreter |
- |
enterprise |
T1059.003 |
Windows Command Shell |
PcShare can execute cmd commands on a compromised host. |
enterprise |
T1005 |
Data from Local System |
PcShare can collect files and information from a compromised host. |
enterprise |
T1140 |
Deobfuscate/Decode Files or Information |
PcShare has decrypted its strings by applying a XOR operation and a decompression using a custom implemented LZM algorithm. |
enterprise |
T1546 |
Event Triggered Execution |
- |
enterprise |
T1546.015 |
Component Object Model Hijacking |
PcShare has created the HKCU\\Software\\Classes\\CLSID\\{42aedc87-2188-41fd-b9a3-0c966feabec1}\\InprocServer32 Registry key for persistence. |
enterprise |
T1041 |
Exfiltration Over C2 Channel |
PcShare can upload files and information from a compromised host to its C2 servers. |
enterprise |
T1070 |
Indicator Removal |
- |
enterprise |
T1070.004 |
File Deletion |
PcShare has deleted its files and components from a compromised host. |
enterprise |
T1056 |
Input Capture |
- |
enterprise |
T1056.001 |
Keylogging |
PcShare has the ability to capture keystrokes. |
enterprise |
T1036 |
Masquerading |
- |
enterprise |
T1036.001 |
Invalid Code Signature |
PcShare has used an invalid certificate in attempt to appear legitimate. |
enterprise |
T1036.005 |
Match Legitimate Name or Location |
PcShare has been named wuauclt.exe to appear as the legitimate Windows Update AutoUpdate Client. |
enterprise |
T1112 |
Modify Registry |
PcShare can delete its persistence mechanisms from the registry. |
enterprise |
T1106 |
Native API |
PcShare has used a variety of Windows API functions. |
enterprise |
T1027 |
Obfuscated Files or Information |
PcShare has been encrypted with XOR using different 32-long Base16 strings and compressed with LZW algorithm. |
enterprise |
T1057 |
Process Discovery |
PcShare can obtain a list of running processes on a compromised host. |
enterprise |
T1055 |
Process Injection |
The PcShare payload has been injected into the logagent.exe and rdpclip.exe processes. |
enterprise |
T1012 |
Query Registry |
PcShare can search the registry files of a compromised host. |
enterprise |
T1113 |
Screen Capture |
PcShare can take screen shots of a compromised machine. |
enterprise |
T1218 |
System Binary Proxy Execution |
- |
enterprise |
T1218.011 |
Rundll32 |
PcShare has used rundll32.exe for execution. |
enterprise |
T1016 |
System Network Configuration Discovery |
PcShare can obtain the proxy settings of a compromised machine using InternetQueryOptionA and its IP address by running nslookup myip.opendns.comresolver1.opendns.com\r\n . |
enterprise |
T1125 |
Video Capture |
PcShare can capture camera video as part of its collection process. |