Trusted Design

Malware leverages Windows Management Instrumentation (WMI)

概要

Malware leverages Windows Management Instrumentation (WMI) team described a novel persistence mechanism that leverages the Windows Management Instrumentation (WMI) toolset. In that incident, a Windows 2003 server contained unidentified malware, possibly a variant of the StartPage trojan. After developing countermeasures for the persistence mechanism, CTU researchers discovered additional infections on client environments using the Advanced Endpoint Threat Detection - Red Cloak(TM) platform. The discovery of more widespread use highlights the advantages of leveraging knowledge gained during a response engagement to quickly deploy protections across all client networks.

Created: 2026-02-23

Indicators

Indicatorsは見つかっていない。

類似Pulses

このPulseに関連する脅威アクター (事実ベース)

APT3

Score: 26.14
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1069 - Permission Groups Discovery
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1546.008 - Accessibility Features
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1027.005 - Indicator Removal from Tools
  • T1203 - Exploitation for Client Execution
  • T1564.003 - Hidden Window
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Cobalt Group

Score: 26.70
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1559.002 - Dynamic Data Exchange
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1219 - Remote Access Tools
  • T1218.003 - CMSTP
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1195.002 - Compromise Software Supply Chain
  • T1203 - Exploitation for Client Execution
  • T1518.001 - Security Software Discovery
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Silence

Score: 16.57
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1112 - Modify Registry
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1218.001 - Compiled HTML File
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

Chimera

Score: 25.33
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1574.001 - DLL
  • T1007 - System Service Discovery
  • T1021.006 - Windows Remote Management
  • T1057 - Process Discovery
  • T1588.002 - Tool
  • T1039 - Data from Network Shared Drive
  • T1012 - Query Registry
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

Patchwork

Score: 24.71
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1559.002 - Dynamic Data Exchange
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1112 - Modify Registry
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1027.005 - Indicator Removal from Tools
  • T1203 - Exploitation for Client Execution
  • T1518.001 - Security Software Discovery
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
  • T1102.001 - Dead Drop Resolver
MITREへのリンク →

Daggerfly

Score: 13.39
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1195.002 - Compromise Software Supply Chain
  • T1036.003 - Rename Legitimate Utilities
  • T1012 - Query Registry
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

FIN7

Score: 55.69
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1559.002 - Dynamic Data Exchange
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1082 - System Information Discovery
  • T1091 - Replication Through Removable Media
  • T1140 - Deobfuscate/Decode Files or Information
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1546.011 - Application Shimming
  • T1674 - Input Injection
  • T1218.005 - Mshta
  • T1583.006 - Web Services
  • T1057 - Process Discovery
  • T1497.002 - User Activity Based Checks
  • T1210 - Exploitation of Remote Services
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1195.002 - Compromise Software Supply Chain
  • T1564.003 - Hidden Window
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

TA2541

Score: 24.49
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1082 - System Information Discovery
  • T1608.001 - Upload Malware
  • T1588.001 - Malware
  • T1568 - Dynamic Resolution
  • T1218.005 - Mshta
  • T1583.006 - Web Services
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1518.001 - Security Software Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

GALLIUM

Score: 15.58
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1574.001 - DLL
  • T1190 - Exploit Public-Facing Application
  • T1588.002 - Tool
  • T1027.005 - Indicator Removal from Tools
  • T1036.003 - Rename Legitimate Utilities
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Sandworm Team

Score: 44.86
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1204.002 - Malicious File
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1608.001 - Upload Malware
  • T1195 - Supply Chain Compromise
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1036 - Masquerading
  • T1595.002 - Vulnerability Scanning
  • T1588.002 - Tool
  • T1592.002 - Software
  • T1195.002 - Compromise Software Supply Chain
  • T1203 - Exploitation for Client Execution
  • T1499 - Endpoint Denial of Service
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
  • T1490 - Inhibit System Recovery
MITREへのリンク →

BlackByte

Score: 39.61
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1543.003 - Windows Service
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1562 - Impair Defenses
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1112 - Modify Registry
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1562.001 - Disable or Modify Tools
  • T1614.001 - System Language Discovery
  • T1012 - Query Registry
  • T1518.001 - Security Software Discovery
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
  • T1490 - Inhibit System Recovery
MITREへのリンク →

HEXANE

Score: 19.30
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1082 - System Information Discovery
  • T1608.001 - Upload Malware
  • T1010 - Application Window Discovery
  • T1057 - Process Discovery
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1588.002 - Tool
  • T1018 - Remote System Discovery
  • T1518 - Software Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Mustang Panda

Score: 66.18
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1091 - Replication Through Removable Media
  • T1140 - Deobfuscate/Decode Files or Information
  • T1608.001 - Upload Malware
  • T1176.002 - IDE Extensions
  • T1070 - Indicator Removal
  • T1102 - Web Service
  • T1218.005 - Mshta
  • T1654 - Log Enumeration
  • T1027.012 - LNK Icon Smuggling
  • T1583.006 - Web Services
  • T1057 - Process Discovery
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1678 - Delay Execution
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1518 - Software Discovery
  • T1622 - Debugger Evasion
  • T1105 - Ingress Tool Transfer
  • T1027.007 - Dynamic API Resolution
MITREへのリンク →

Magic Hound

Score: 36.87
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1082 - System Information Discovery
  • T1562 - Impair Defenses
  • T1190 - Exploit Public-Facing Application
  • T1595.002 - Vulnerability Scanning
  • T1112 - Modify Registry
  • T1583.006 - Web Services
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1573 - Encrypted Channel
  • T1592.002 - Software
  • T1564.003 - Hidden Window
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

FIN13

Score: 28.26
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1069 - Permission Groups Discovery
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1021.006 - Windows Remote Management
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
  • T1556 - Modify Authentication Process
MITREへのリンク →

ToddyCat

Score: 12.73
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1190 - Exploit Public-Facing Application
  • T1057 - Process Discovery
  • T1518.001 - Security Software Discovery
  • T1564.003 - Hidden Window
  • T1018 - Remote System Discovery
MITREへのリンク →

Blue Mockingbird

Score: 23.71
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1543.003 - Windows Service
  • T1082 - System Information Discovery
  • T1190 - Exploit Public-Facing Application
  • T1112 - Modify Registry
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1569.002 - Service Execution
  • T1574.012 - COR_PROFILER
MITREへのリンク →

Molerats

Score: 10.37
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1218.007 - Msiexec
  • T1140 - Deobfuscate/Decode Files or Information
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Storm-0501

Score: 24.54
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1082 - System Information Discovery
  • T1190 - Exploit Public-Facing Application
  • T1021.006 - Windows Remote Management
  • T1057 - Process Discovery
  • T1218.010 - Regsvr32
  • T1614.001 - System Language Discovery
  • T1518.001 - Security Software Discovery
  • T1556.009 - Conditional Access Policies
  • T1490 - Inhibit System Recovery
MITREへのリンク →

APT29

Score: 48.59
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1110.001 - Password Guessing
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1003.004 - LSA Secrets
  • T1587.001 - Malware
  • T1204.002 - Malicious File
  • T1190 - Exploit Public-Facing Application
  • T1595.002 - Vulnerability Scanning
  • T1546.008 - Accessibility Features
  • T1550.003 - Pass the Ticket
  • T1568 - Dynamic Resolution
  • T1553.005 - Mark-of-the-Web Bypass
  • T1218.005 - Mshta
  • T1583.006 - Web Services
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1573 - Encrypted Channel
  • T1203 - Exploitation for Client Execution
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT39

Score: 25.65
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1059.010 - AutoHotKey & AutoIT
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1012 - Query Registry
  • T1546.010 - AppInit DLLs
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

FIN8

Score: 22.93
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1204.002 - Malicious File
  • T1082 - System Information Discovery
  • T1112 - Modify Registry
  • T1055.004 - Asynchronous Procedure Call
  • T1102 - Web Service
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1588.002 - Tool
  • T1518.001 - Security Software Discovery
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Wizard Spider

Score: 33.69
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1082 - System Information Discovery
  • T1112 - Modify Registry
  • T1021.006 - Windows Remote Management
  • T1547.004 - Winlogon Helper DLL
  • T1210 - Exploitation of Remote Services
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1518.001 - Security Software Discovery
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
  • T1490 - Inhibit System Recovery
MITREへのリンク →

Higaisa

Score: 13.13
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1203 - Exploitation for Client Execution
  • T1564.003 - Hidden Window
MITREへのリンク →

APT41

Score: 50.19
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1014 - Rootkit
  • T1069 - Permission Groups Discovery
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1190 - Exploit Public-Facing Application
  • T1595.002 - Vulnerability Scanning
  • T1112 - Modify Registry
  • T1546.008 - Accessibility Features
  • T1562.006 - Indicator Blocking
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1218.001 - Compiled HTML File
  • T1195.002 - Compromise Software Supply Chain
  • T1203 - Exploitation for Client Execution
  • T1012 - Query Registry
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
  • T1102.001 - Dead Drop Resolver
MITREへのリンク →

Rancor

Score: 8.91
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1218.007 - Msiexec
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Earth Lusca

Score: 36.82
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1007 - System Service Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1595.002 - Vulnerability Scanning
  • T1112 - Modify Registry
  • T1588.001 - Malware
  • T1218.005 - Mshta
  • T1583.006 - Web Services
  • T1057 - Process Discovery
  • T1210 - Exploitation of Remote Services
  • T1588.002 - Tool
  • T1027.003 - Steganography
  • T1018 - Remote System Discovery
MITREへのリンク →

Ember Bear

Score: 33.52
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1003.004 - LSA Secrets
  • T1195 - Supply Chain Compromise
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1595.002 - Vulnerability Scanning
  • T1112 - Modify Registry
  • T1588.001 - Malware
  • T1654 - Log Enumeration
  • T1210 - Exploitation of Remote Services
  • T1562.001 - Disable or Modify Tools
  • T1203 - Exploitation for Client Execution
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
MITREへのリンク →

Machete

Score: 6.43
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1218.007 - Msiexec
MITREへのリンク →

APT42

Score: 22.34
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1547 - Boot or Logon Autostart Execution
  • T1082 - System Information Discovery
  • T1608.001 - Upload Malware
  • T1112 - Modify Registry
  • T1070 - Indicator Removal
  • T1102 - Web Service
  • T1588.002 - Tool
  • T1518.001 - Security Software Discovery
MITREへのリンク →

FIN10

Score: 4.66
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1070.004 - File Deletion
MITREへのリンク →

Naikon

Score: 11.07
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1518.001 - Security Software Discovery
  • T1018 - Remote System Discovery
MITREへのリンク →

RedCurl

Score: 22.86
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1204.002 - Malicious File
  • T1552.002 - Credentials in Registry
  • T1082 - System Information Discovery
  • T1102 - Web Service
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1056.002 - GUI Input Capture
  • T1039 - Data from Network Shared Drive
  • T1070.004 - File Deletion
MITREへのリンク →

Moonstone Sleet

Score: 16.16
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1587.001 - Malware
  • T1204.002 - Malicious File
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1608.001 - Upload Malware
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1195.002 - Compromise Software Supply Chain
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

APT32

Score: 50.72
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1552.002 - Credentials in Registry
  • T1082 - System Information Discovery
  • T1608.001 - Upload Malware
  • T1036 - Masquerading
  • T1112 - Modify Registry
  • T1550.003 - Pass the Ticket
  • T1102 - Web Service
  • T1218.005 - Mshta
  • T1583.006 - Web Services
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1036.003 - Rename Legitimate Utilities
  • T1203 - Exploitation for Client Execution
  • T1012 - Query Registry
  • T1564.003 - Hidden Window
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

Fox Kitten

Score: 19.97
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1190 - Exploit Public-Facing Application
  • T1546.008 - Accessibility Features
  • T1102 - Web Service
  • T1210 - Exploitation of Remote Services
  • T1039 - Data from Network Shared Drive
  • T1012 - Query Registry
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT33

Score: 12.00
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1003.004 - LSA Secrets
  • T1204.002 - Malicious File
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

OilRig

Score: 52.10
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1003.004 - LSA Secrets
  • T1587.001 - Malware
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1497.001 - System Checks
  • T1007 - System Service Discovery
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1608.001 - Upload Malware
  • T1195 - Supply Chain Compromise
  • T1219 - Remote Access Tools
  • T1036 - Masquerading
  • T1112 - Modify Registry
  • T1057 - Process Discovery
  • T1588.002 - Tool
  • T1218.001 - Compiled HTML File
  • T1027.005 - Indicator Removal from Tools
  • T1203 - Exploitation for Client Execution
  • T1137.004 - Outlook Home Page
  • T1012 - Query Registry
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT38

Score: 39.90
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1082 - System Information Discovery
  • T1218.007 - Msiexec
  • T1140 - Deobfuscate/Decode Files or Information
  • T1480.002 - Mutual Exclusion
  • T1112 - Modify Registry
  • T1553.005 - Mark-of-the-Web Bypass
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1588.002 - Tool
  • T1218.001 - Compiled HTML File
  • T1562.001 - Disable or Modify Tools
  • T1036.003 - Rename Legitimate Utilities
  • T1518.001 - Security Software Discovery
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

menuPass

Score: 28.10
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1003.004 - LSA Secrets
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1210 - Exploitation of Remote Services
  • T1588.002 - Tool
  • T1039 - Data from Network Shared Drive
  • T1036.003 - Rename Legitimate Utilities
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT-C-36

Score: 3.64
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

FIN6

Score: 15.25
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1204.002 - Malicious File
  • T1102 - Web Service
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1569.002 - Service Execution
MITREへのリンク →

LuminousMoth

Score: 18.32
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1574.001 - DLL
  • T1091 - Replication Through Removable Media
  • T1608.001 - Upload Malware
  • T1112 - Modify Registry
  • T1588.001 - Malware
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Lazarus Group

Score: 47.86
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1218 - System Binary Proxy Execution
  • T1010 - Application Window Discovery
  • T1070 - Indicator Removal
  • T1218.005 - Mshta
  • T1583.006 - Web Services
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1036.003 - Rename Legitimate Utilities
  • T1203 - Exploitation for Client Execution
  • T1012 - Query Registry
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
  • T1027.007 - Dynamic API Resolution
MITREへのリンク →

BRONZE BUTLER

Score: 36.15
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1007 - System Service Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1036 - Masquerading
  • T1550.003 - Pass the Ticket
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1039 - Data from Network Shared Drive
  • T1203 - Exploitation for Client Execution
  • T1027.003 - Steganography
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1518 - Software Discovery
  • T1105 - Ingress Tool Transfer
  • T1102.001 - Dead Drop Resolver
MITREへのリンク →

Winter Vivern

Score: 11.02
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1595.002 - Vulnerability Scanning
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Dragonfly

Score: 25.90
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1003.004 - LSA Secrets
  • T1204.002 - Malicious File
  • T1190 - Exploit Public-Facing Application
  • T1595.002 - Vulnerability Scanning
  • T1112 - Modify Registry
  • T1210 - Exploitation of Remote Services
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1195.002 - Compromise Software Supply Chain
  • T1203 - Exploitation for Client Execution
  • T1012 - Query Registry
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

MuddyWater

Score: 52.86
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1003.004 - LSA Secrets
  • T1559.002 - Dynamic Data Exchange
  • T1204.002 - Malicious File
  • T1559.001 - Component Object Model
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1218.003 - CMSTP
  • T1218.005 - Mshta
  • T1583.006 - Web Services
  • T1057 - Process Discovery
  • T1210 - Exploitation of Remote Services
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1203 - Exploitation for Client Execution
  • T1027.003 - Steganography
  • T1027.004 - Compile After Delivery
  • T1518.001 - Security Software Discovery
  • T1518 - Software Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Gamaredon Group

Score: 60.84
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1497.001 - System Checks
  • T1559.001 - Component Object Model
  • T1082 - System Information Discovery
  • T1091 - Replication Through Removable Media
  • T1140 - Deobfuscate/Decode Files or Information
  • T1608.001 - Upload Malware
  • T1112 - Modify Registry
  • T1568 - Dynamic Resolution
  • T1102 - Web Service
  • T1218.005 - Mshta
  • T1027.012 - LNK Icon Smuggling
  • T1583.006 - Web Services
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1001 - Data Obfuscation
  • T1039 - Data from Network Shared Drive
  • T1012 - Query Registry
  • T1027.004 - Compile After Delivery
  • T1518.001 - Security Software Discovery
  • T1564.003 - Hidden Window
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Kimsuky

Score: 50.58
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1007 - System Service Discovery
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1112 - Modify Registry
  • T1218.005 - Mshta
  • T1027.012 - LNK Icon Smuggling
  • T1583.006 - Web Services
  • T1057 - Process Discovery
  • T1546.001 - Change Default File Association
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1218.010 - Regsvr32
  • T1012 - Query Registry
  • T1518.001 - Security Software Discovery
  • T1564.003 - Hidden Window
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
  • T1102.001 - Dead Drop Resolver
MITREへのリンク →

Stealth Falcon

Score: 7.72
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1082 - System Information Discovery
  • T1057 - Process Discovery
  • T1012 - Query Registry
MITREへのリンク →

BITTER

Score: 16.76
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1559.002 - Dynamic Data Exchange
  • T1204.002 - Malicious File
  • T1608.001 - Upload Malware
  • T1568 - Dynamic Resolution
  • T1588.002 - Tool
  • T1573 - Encrypted Channel
  • T1203 - Exploitation for Client Execution
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Confucius

Score: 9.84
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1218.005 - Mshta
  • T1583.006 - Web Services
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1203 - Exploitation for Client Execution
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT37

Score: 13.99
Matched TTPs:
  • T1053.005 - Scheduled Task
  • T1559.002 - Dynamic Data Exchange
  • T1204.002 - Malicious File
  • T1082 - System Information Discovery
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1203 - Exploitation for Client Execution
  • T1027.003 - Steganography
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Cinnamon Tempest

Score: 9.88
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Medusa Group

Score: 47.48
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1543.003 - Windows Service
  • T1559.001 - Component Object Model
  • T1082 - System Information Discovery
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1608.002 - Upload Tool
  • T1112 - Modify Registry
  • T1583.006 - Web Services
  • T1057 - Process Discovery
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1518.001 - Security Software Discovery
  • T1564.003 - Hidden Window
  • T1650 - Acquire Access
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
  • T1490 - Inhibit System Recovery
  • T1218.014 - MMC
MITREへのリンク →

INC Ransom

Score: 13.94
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

Leviathan

Score: 22.80
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1559.002 - Dynamic Data Exchange
  • T1204.002 - Malicious File
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1595.002 - Vulnerability Scanning
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1218.010 - Regsvr32
  • T1203 - Exploitation for Client Execution
  • T1027.003 - Steganography
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Velvet Ant

Score: 12.74
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1574.001 - DLL
  • T1562.001 - Disable or Modify Tools
  • T1569.002 - Service Execution
  • T1211 - Exploitation for Defense Evasion
MITREへのリンク →

Volt Typhoon

Score: 43.39
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1069 - Permission Groups Discovery
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1497.001 - System Checks
  • T1007 - System Service Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1218 - System Binary Proxy Execution
  • T1010 - Application Window Discovery
  • T1112 - Modify Registry
  • T1654 - Log Enumeration
  • T1057 - Process Discovery
  • T1588.002 - Tool
  • T1012 - Query Registry
  • T1614 - System Location Discovery
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1518 - Software Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Lotus Blossom

Score: 9.93
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1543.003 - Windows Service
  • T1112 - Modify Registry
  • T1588.002 - Tool
  • T1012 - Query Registry
  • T1018 - Remote System Discovery
MITREへのリンク →

Indrik Spider

Score: 16.27
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1204.002 - Malicious File
  • T1007 - System Service Discovery
  • T1112 - Modify Registry
  • T1562.001 - Disable or Modify Tools
  • T1012 - Query Registry
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Aquatic Panda

Score: 27.10
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1007 - System Service Discovery
  • T1082 - System Information Discovery
  • T1595.002 - Vulnerability Scanning
  • T1112 - Modify Registry
  • T1588.001 - Malware
  • T1654 - Log Enumeration
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1518.001 - Security Software Discovery
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Windshift

Score: 13.87
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1204.002 - Malicious File
  • T1082 - System Information Discovery
  • T1036 - Masquerading
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1518.001 - Security Software Discovery
  • T1518 - Software Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Deep Panda

Score: 16.18
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1546.008 - Accessibility Features
  • T1057 - Process Discovery
  • T1027.005 - Indicator Removal from Tools
  • T1218.010 - Regsvr32
  • T1564.003 - Hidden Window
  • T1018 - Remote System Discovery
MITREへのリンク →

Threat Group-3390

Score: 38.40
Matched TTPs:
  • T1047 - Windows Management Instrumentation
  • T1003.004 - LSA Secrets
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1140 - Deobfuscate/Decode Files or Information
  • T1608.001 - Upload Malware
  • T1190 - Exploit Public-Facing Application
  • T1608.002 - Upload Tool
  • T1112 - Modify Registry
  • T1021.006 - Windows Remote Management
  • T1210 - Exploitation of Remote Services
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1195.002 - Compromise Software Supply Chain
  • T1203 - Exploitation for Client Execution
  • T1012 - Query Registry
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Turla

Score: 48.08
Matched TTPs:
  • T1564.012 - File/Path Exclusions
  • T1546.013 - PowerShell Profile
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1007 - System Service Discovery
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1112 - Modify Registry
  • T1547.004 - Winlogon Helper DLL
  • T1588.001 - Malware
  • T1102 - Web Service
  • T1583.006 - Web Services
  • T1057 - Process Discovery
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1027.005 - Indicator Removal from Tools
  • T1012 - Query Registry
  • T1518.001 - Security Software Discovery
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT28

Score: 53.56
Matched TTPs:
  • T1110.001 - Password Guessing
  • T1014 - Rootkit
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1559.002 - Dynamic Data Exchange
  • T1204.002 - Malicious File
  • T1091 - Replication Through Removable Media
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1595.002 - Vulnerability Scanning
  • T1583.006 - Web Services
  • T1057 - Process Discovery
  • T1210 - Exploitation of Remote Services
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1039 - Data from Network Shared Drive
  • T1546.015 - Component Object Model Hijacking
  • T1203 - Exploitation for Client Execution
  • T1564.003 - Hidden Window
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
  • T1669 - Wi-Fi Networks
  • T1211 - Exploitation for Defense Evasion
MITREへのリンク →

Winnti Group

Score: 5.58
Matched TTPs:
  • T1014 - Rootkit
  • T1057 - Process Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Rocke

Score: 28.21
Matched TTPs:
  • T1014 - Rootkit
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1102 - Web Service
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1562.001 - Disable or Modify Tools
  • T1027.004 - Compile After Delivery
  • T1518.001 - Security Software Discovery
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
  • T1102.001 - Dead Drop Resolver
MITREへのリンク →

TeamTNT

Score: 38.73
Matched TTPs:
  • T1014 - Rootkit
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1543.003 - Windows Service
  • T1007 - System Service Discovery
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1608.001 - Upload Malware
  • T1219 - Remote Access Tools
  • T1036 - Masquerading
  • T1595.002 - Vulnerability Scanning
  • T1610 - Deploy Container
  • T1102 - Web Service
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1562.001 - Disable or Modify Tools
  • T1518.001 - Security Software Discovery
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

UNC3886

Score: 31.86
Matched TTPs:
  • T1014 - Rootkit
  • T1587.001 - Malware
  • T1675 - ESXi Administration Command
  • T1190 - Exploit Public-Facing Application
  • T1681 - Search Threat Vendor Data
  • T1673 - Virtual Machine Discovery
  • T1588.001 - Malware
  • T1057 - Process Discovery
  • T1562.001 - Disable or Modify Tools
  • T1027.005 - Indicator Removal from Tools
  • T1203 - Exploitation for Client Execution
  • T1070.004 - File Deletion
MITREへのリンク →

Scattered Spider

Score: 23.87
Matched TTPs:
  • T1069 - Permission Groups Discovery
  • T1082 - System Information Discovery
  • T1588.001 - Malware
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1556.009 - Conditional Access Policies
  • T1018 - Remote System Discovery
  • T1538 - Cloud Service Dashboard
  • T1105 - Ingress Tool Transfer
  • T1490 - Inhibit System Recovery
MITREへのリンク →

TA505

Score: 25.20
Matched TTPs:
  • T1069 - Permission Groups Discovery
  • T1559.002 - Dynamic Data Exchange
  • T1204.002 - Malicious File
  • T1218.007 - Msiexec
  • T1140 - Deobfuscate/Decode Files or Information
  • T1608.001 - Upload Malware
  • T1112 - Modify Registry
  • T1588.001 - Malware
  • T1553.005 - Mark-of-the-Web Bypass
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Storm-1811

Score: 10.25
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1140 - Deobfuscate/Decode Files or Information
  • T1036 - Masquerading
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Mustard Tempest

Score: 9.63
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1082 - System Information Discovery
  • T1608.001 - Upload Malware
  • T1608.006 - SEO Poisoning
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

WIRTE

Score: 7.86
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1140 - Deobfuscate/Decode Files or Information
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Transparent Tribe

Score: 6.70
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1568 - Dynamic Resolution
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

admin@338

Score: 7.15
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1007 - System Service Discovery
  • T1082 - System Information Discovery
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

BackdoorDiplomacy

Score: 8.43
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1574.001 - DLL
  • T1190 - Exploit Public-Facing Application
  • T1588.001 - Malware
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Akira

Score: 11.20
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1219 - Remote Access Tools
  • T1562.001 - Disable or Modify Tools
  • T1531 - Account Access Removal
  • T1018 - Remote System Discovery
MITREへのリンク →

Ke3chang

Score: 26.68
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1003.004 - LSA Secrets
  • T1587.001 - Malware
  • T1543.003 - Windows Service
  • T1007 - System Service Discovery
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1614.001 - System Language Discovery
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
  • T1569.002 - Service Execution
MITREへのリンク →

Tropic Trooper

Score: 32.92
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1091 - Replication Through Removable Media
  • T1140 - Deobfuscate/Decode Files or Information
  • T1547.004 - Winlogon Helper DLL
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1573 - Encrypted Channel
  • T1203 - Exploitation for Client Execution
  • T1027.003 - Steganography
  • T1518.001 - Security Software Discovery
  • T1070.004 - File Deletion
  • T1518 - Software Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

PROMETHIUM

Score: 5.07
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1547.001 - Registry Run Keys / Startup Folder
MITREへのリンク →

Whitefly

Score: 5.29
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Carbanak

Score: 6.51
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1543.003 - Windows Service
  • T1219 - Remote Access Tools
  • T1588.002 - Tool
MITREへのリンク →

Darkhotel

Score: 26.04
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1497.001 - System Checks
  • T1082 - System Information Discovery
  • T1091 - Replication Through Removable Media
  • T1140 - Deobfuscate/Decode Files or Information
  • T1497 - Virtualization/Sandbox Evasion
  • T1057 - Process Discovery
  • T1497.002 - User Activity Based Checks
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1203 - Exploitation for Client Execution
  • T1518.001 - Security Software Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT1

Score: 8.48
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1007 - System Service Discovery
  • T1588.001 - Malware
  • T1057 - Process Discovery
  • T1588.002 - Tool
MITREへのリンク →

Sidewinder

Score: 19.59
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1559.002 - Dynamic Data Exchange
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1203 - Exploitation for Client Execution
  • T1518.001 - Security Software Discovery
  • T1518 - Software Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Sowbug

Score: 5.38
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1082 - System Information Discovery
  • T1039 - Data from Network Shared Drive
MITREへのリンク →

APT5

Score: 16.70
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1190 - Exploit Public-Facing Application
  • T1562.006 - Indicator Blocking
  • T1070 - Indicator Removal
  • T1654 - Log Enumeration
  • T1057 - Process Discovery
  • T1070.004 - File Deletion
MITREへのリンク →

Poseidon Group

Score: 5.18
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1007 - System Service Discovery
  • T1057 - Process Discovery
MITREへのリンク →

SideCopy

Score: 18.73
Matched TTPs:
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1608.001 - Upload Malware
  • T1218.005 - Mshta
  • T1614 - System Location Discovery
  • T1518.001 - Security Software Discovery
  • T1518 - Software Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Leafminer

Score: 5.22
Matched TTPs:
  • T1003.004 - LSA Secrets
  • T1588.002 - Tool
  • T1018 - Remote System Discovery
MITREへのリンク →

Contagious Interview

Score: 32.55
Matched TTPs:
  • T1587.001 - Malware
  • T1204.002 - Malicious File
  • T1082 - System Information Discovery
  • T1608.001 - Upload Malware
  • T1036 - Masquerading
  • T1681 - Search Threat Vendor Data
  • T1497 - Virtualization/Sandbox Evasion
  • T1583.006 - Web Services
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1543.001 - Launch Agent
  • T1070.004 - File Deletion
  • T1204.004 - Malicious Copy and Paste
MITREへのリンク →

Salt Typhoon

Score: 4.41
Matched TTPs:
  • T1587.001 - Malware
  • T1190 - Exploit Public-Facing Application
  • T1588.002 - Tool
MITREへのリンク →

Play

Score: 14.53
Matched TTPs:
  • T1587.001 - Malware
  • T1082 - System Information Discovery
  • T1190 - Exploit Public-Facing Application
  • T1057 - Process Discovery
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1518.001 - Security Software Discovery
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Aoqin Dragon

Score: 10.45
Matched TTPs:
  • T1587.001 - Malware
  • T1204.002 - Malicious File
  • T1091 - Replication Through Removable Media
  • T1036 - Masquerading
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

Moses Staff

Score: 6.40
Matched TTPs:
  • T1587.001 - Malware
  • T1082 - System Information Discovery
  • T1190 - Exploit Public-Facing Application
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Gallmaker

Score: 3.53
Matched TTPs:
  • T1559.002 - Dynamic Data Exchange
  • T1204.002 - Malicious File
MITREへのリンク →

Malteiro

Score: 9.08
Matched TTPs:
  • T1204.002 - Malicious File
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1614.001 - System Language Discovery
  • T1518.001 - Security Software Discovery
MITREへのリンク →

Elderwood

Score: 3.06
Matched TTPs:
  • T1204.002 - Malicious File
  • T1203 - Exploitation for Client Execution
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

RTM

Score: 7.01
Matched TTPs:
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1102.001 - Dead Drop Resolver
MITREへのリンク →

Dark Caracal

Score: 5.43
Matched TTPs:
  • T1204.002 - Malicious File
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1218.001 - Compiled HTML File
MITREへのリンク →

DarkHydrus

Score: 4.04
Matched TTPs:
  • T1204.002 - Malicious File
  • T1588.002 - Tool
  • T1564.003 - Hidden Window
MITREへのリンク →

PLATINUM

Score: 8.29
Matched TTPs:
  • T1204.002 - Malicious File
  • T1036 - Masquerading
  • T1105 - Ingress Tool Transfer
  • T1056.004 - Credential API Hooking
MITREへのリンク →

TA551

Score: 11.87
Matched TTPs:
  • T1204.002 - Malicious File
  • T1036 - Masquerading
  • T1218.005 - Mshta
  • T1218.010 - Regsvr32
  • T1027.003 - Steganography
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

LazyScripter

Score: 16.27
Matched TTPs:
  • T1204.002 - Malicious File
  • T1608.001 - Upload Malware
  • T1036 - Masquerading
  • T1588.001 - Malware
  • T1102 - Web Service
  • T1218.005 - Mshta
  • T1583.006 - Web Services
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Star Blizzard

Score: 3.61
Matched TTPs:
  • T1204.002 - Malicious File
  • T1608.001 - Upload Malware
  • T1588.002 - Tool
MITREへのリンク →

FIN4

Score: 4.92
Matched TTPs:
  • T1204.002 - Malicious File
  • T1056.002 - GUI Input Capture
MITREへのリンク →

Inception

Score: 17.42
Matched TTPs:
  • T1204.002 - Malicious File
  • T1082 - System Information Discovery
  • T1102 - Web Service
  • T1218.005 - Mshta
  • T1057 - Process Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1203 - Exploitation for Client Execution
  • T1518 - Software Discovery
MITREへのリンク →

EXOTIC LILY

Score: 6.78
Matched TTPs:
  • T1204.002 - Malicious File
  • T1608.001 - Upload Malware
  • T1102 - Web Service
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

Saint Bear

Score: 13.74
Matched TTPs:
  • T1204.002 - Malicious File
  • T1608.001 - Upload Malware
  • T1112 - Modify Registry
  • T1497 - Virtualization/Sandbox Evasion
  • T1583.006 - Web Services
  • T1562.001 - Disable or Modify Tools
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

Nomadic Octopus

Score: 6.15
Matched TTPs:
  • T1204.002 - Malicious File
  • T1036 - Masquerading
  • T1564.003 - Hidden Window
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Gorgon Group

Score: 11.21
Matched TTPs:
  • T1204.002 - Malicious File
  • T1140 - Deobfuscate/Decode Files or Information
  • T1112 - Modify Registry
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1562.001 - Disable or Modify Tools
  • T1564.003 - Hidden Window
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT19

Score: 16.26
Matched TTPs:
  • T1204.002 - Malicious File
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1082 - System Information Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1112 - Modify Registry
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1588.002 - Tool
  • T1218.010 - Regsvr32
  • T1564.003 - Hidden Window
MITREへのリンク →

Tonto Team

Score: 7.54
Matched TTPs:
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1210 - Exploitation of Remote Services
  • T1203 - Exploitation for Client Execution
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Andariel

Score: 13.91
Matched TTPs:
  • T1204.002 - Malicious File
  • T1588.001 - Malware
  • T1057 - Process Discovery
  • T1592.002 - Software
  • T1203 - Exploitation for Client Execution
  • T1027.003 - Steganography
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

The White Company

Score: 5.56
Matched TTPs:
  • T1204.002 - Malicious File
  • T1203 - Exploitation for Client Execution
  • T1518.001 - Security Software Discovery
  • T1070.004 - File Deletion
MITREへのリンク →

IndigoZebra

Score: 4.43
Matched TTPs:
  • T1204.002 - Malicious File
  • T1583.006 - Web Services
  • T1588.002 - Tool
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

BlackTech

Score: 6.34
Matched TTPs:
  • T1204.002 - Malicious File
  • T1574.001 - DLL
  • T1190 - Exploit Public-Facing Application
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
MITREへのリンク →

DarkVishnya

Score: 5.38
Matched TTPs:
  • T1543.003 - Windows Service
  • T1219 - Remote Access Tools
  • T1588.002 - Tool
MITREへのリンク →

Agrius

Score: 10.50
Matched TTPs:
  • T1543.003 - Windows Service
  • T1140 - Deobfuscate/Decode Files or Information
  • T1190 - Exploit Public-Facing Application
  • T1036 - Masquerading
  • T1562.001 - Disable or Modify Tools
  • T1018 - Remote System Discovery
MITREへのリンク →

Evilnum

Score: 7.33
Matched TTPs:
  • T1497.001 - System Checks
  • T1574.001 - DLL
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Windigo

Score: 3.95
Matched TTPs:
  • T1082 - System Information Discovery
  • T1518 - Software Discovery
MITREへのリンク →

ZIRCONIUM

Score: 14.48
Matched TTPs:
  • T1082 - System Information Discovery
  • T1218.007 - Msiexec
  • T1140 - Deobfuscate/Decode Files or Information
  • T1036 - Masquerading
  • T1583.006 - Web Services
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1012 - Query Registry
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

APT18

Score: 4.57
Matched TTPs:
  • T1082 - System Information Discovery
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

GOLD SOUTHFIELD

Score: 6.99
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1219 - Remote Access Tools
  • T1195.002 - Compromise Software Supply Chain
MITREへのリンク →

Sea Turtle

Score: 7.43
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1588.002 - Tool
  • T1203 - Exploitation for Client Execution
  • T1027.004 - Compile After Delivery
MITREへのリンク →

Volatile Cedar

Score: 4.84
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1595.002 - Vulnerability Scanning
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Axiom

Score: 10.79
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1546.008 - Accessibility Features
  • T1203 - Exploitation for Client Execution
  • T1563.002 - RDP Hijacking
MITREへのリンク →

HAFNIUM

Score: 7.32
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1583.006 - Web Services
  • T1057 - Process Discovery
  • T1018 - Remote System Discovery
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

LAPSUS$

Score: 7.44
Matched TTPs:
  • T1588.001 - Malware
  • T1588.002 - Tool
  • T1531 - Account Access Removal
MITREへのリンク →

Metador

Score: 8.30
Matched TTPs:
  • T1588.001 - Malware
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1588.002 - Tool
  • T1070.004 - File Deletion
  • T1105 - Ingress Tool Transfer
MITREへのリンク →

Equation

Score: 4.54
Matched TTPs:
  • T1542.002 - Component Firmware
MITREへのリンク →

RedEcho

Score: 3.29
Matched TTPs:
  • T1568 - Dynamic Resolution
MITREへのリンク →

Putter Panda

Score: 3.00
Matched TTPs:
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1562.001 - Disable or Modify Tools
MITREへのリンク →

FIN5

Score: 3.77
Matched TTPs:
  • T1588.002 - Tool
  • T1070.004 - File Deletion
  • T1018 - Remote System Discovery
MITREへのリンク →

CopyKittens

Score: 3.25
Matched TTPs:
  • T1588.002 - Tool
  • T1564.003 - Hidden Window
MITREへのリンク →

このPulseに関連する脅威アクター (推論ベース)

Mustang Panda

Score: 0.79
Matched TTPs:
  • T1654 - Log Enumeration
  • T1583.006 - Web Services
  • T1588.002 - Tool
  • T1608.001 - Upload Malware
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1027.012 - LNK Icon Smuggling
  • T1140 - Deobfuscate/Decode Files or Information
  • T1176.002 - IDE Extensions
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1678 - Delay Execution
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1047 - Windows Management Instrumentation
  • T1622 - Debugger Evasion
  • T1082 - System Information Discovery
  • T1070.004 - File Deletion
  • T1203 - Exploitation for Client Execution
  • T1027.007 - Dynamic API Resolution
  • T1218.005 - Mshta
  • T1102 - Web Service
  • T1091 - Replication Through Removable Media
  • T1518 - Software Discovery
  • T1105 - Ingress Tool Transfer
  • T1574.001 - DLL
  • T1057 - Process Discovery
  • T1018 - Remote System Discovery
  • T1070 - Indicator Removal
MITREへのリンク →

FIN7

Score: 0.73
Matched TTPs:
  • T1674 - Input Injection
  • T1583.006 - Web Services
  • T1588.002 - Tool
  • T1219 - Remote Access Tools
  • T1608.001 - Upload Malware
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1195.002 - Compromise Software Supply Chain
  • T1546.011 - Application Shimming
  • T1140 - Deobfuscate/Decode Files or Information
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1047 - Windows Management Instrumentation
  • T1190 - Exploit Public-Facing Application
  • T1082 - System Information Discovery
  • T1218.005 - Mshta
  • T1091 - Replication Through Removable Media
  • T1564.003 - Hidden Window
  • T1210 - Exploitation of Remote Services
  • T1105 - Ingress Tool Transfer
  • T1543.003 - Windows Service
  • T1559.002 - Dynamic Data Exchange
  • T1569.002 - Service Execution
  • T1057 - Process Discovery
  • T1497.002 - User Activity Based Checks
MITREへのリンク →

Gamaredon Group

Score: 0.73
Matched TTPs:
  • T1583.006 - Web Services
  • T1588.002 - Tool
  • T1608.001 - Upload Malware
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1001 - Data Obfuscation
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1027.012 - LNK Icon Smuggling
  • T1518.001 - Security Software Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1053.005 - Scheduled Task
  • T1562.001 - Disable or Modify Tools
  • T1204.002 - Malicious File
  • T1047 - Windows Management Instrumentation
  • T1039 - Data from Network Shared Drive
  • T1112 - Modify Registry
  • T1082 - System Information Discovery
  • T1070.004 - File Deletion
  • T1012 - Query Registry
  • T1497.001 - System Checks
  • T1559.001 - Component Object Model
  • T1218.005 - Mshta
  • T1102 - Web Service
  • T1091 - Replication Through Removable Media
  • T1564.003 - Hidden Window
  • T1105 - Ingress Tool Transfer
  • T1568 - Dynamic Resolution
  • T1057 - Process Discovery
  • T1027.004 - Compile After Delivery
MITREへのリンク →

APT28

Score: 0.68
Matched TTPs:
  • T1583.006 - Web Services
  • T1588.002 - Tool
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1546.015 - Component Object Model Hijacking
  • T1036 - Masquerading
  • T1014 - Rootkit
  • T1140 - Deobfuscate/Decode Files or Information
  • T1110.001 - Password Guessing
  • T1204.002 - Malicious File
  • T1039 - Data from Network Shared Drive
  • T1190 - Exploit Public-Facing Application
  • T1070.004 - File Deletion
  • T1211 - Exploitation for Defense Evasion
  • T1203 - Exploitation for Client Execution
  • T1091 - Replication Through Removable Media
  • T1564.003 - Hidden Window
  • T1210 - Exploitation of Remote Services
  • T1595.002 - Vulnerability Scanning
  • T1105 - Ingress Tool Transfer
  • T1559.002 - Dynamic Data Exchange
  • T1057 - Process Discovery
  • T1669 - Wi-Fi Networks
MITREへのリンク →

APT32

Score: 0.65
Matched TTPs:
  • T1583.006 - Web Services
  • T1588.002 - Tool
  • T1608.001 - Upload Malware
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1036 - Masquerading
  • T1552.002 - Credentials in Registry
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1047 - Windows Management Instrumentation
  • T1112 - Modify Registry
  • T1082 - System Information Discovery
  • T1070.004 - File Deletion
  • T1012 - Query Registry
  • T1203 - Exploitation for Client Execution
  • T1218.005 - Mshta
  • T1218.010 - Regsvr32
  • T1102 - Web Service
  • T1564.003 - Hidden Window
  • T1105 - Ingress Tool Transfer
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1569.002 - Service Execution
  • T1018 - Remote System Discovery
  • T1550.003 - Pass the Ticket
  • T1036.003 - Rename Legitimate Utilities
MITREへのリンク →

APT41

Score: 0.65
Matched TTPs:
  • T1588.002 - Tool
  • T1102.001 - Dead Drop Resolver
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1546.008 - Accessibility Features
  • T1195.002 - Compromise Software Supply Chain
  • T1014 - Rootkit
  • T1053.005 - Scheduled Task
  • T1047 - Windows Management Instrumentation
  • T1218.001 - Compiled HTML File
  • T1112 - Modify Registry
  • T1190 - Exploit Public-Facing Application
  • T1082 - System Information Discovery
  • T1070.004 - File Deletion
  • T1012 - Query Registry
  • T1203 - Exploitation for Client Execution
  • T1069 - Permission Groups Discovery
  • T1595.002 - Vulnerability Scanning
  • T1105 - Ingress Tool Transfer
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1569.002 - Service Execution
  • T1562.006 - Indicator Blocking
  • T1018 - Remote System Discovery
MITREへのリンク →

Turla

Score: 0.64
Matched TTPs:
  • T1583.006 - Web Services
  • T1588.002 - Tool
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1518.001 - Security Software Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1027.005 - Indicator Removal from Tools
  • T1588.001 - Malware
  • T1562.001 - Disable or Modify Tools
  • T1007 - System Service Discovery
  • T1112 - Modify Registry
  • T1082 - System Information Discovery
  • T1012 - Query Registry
  • T1547.004 - Winlogon Helper DLL
  • T1102 - Web Service
  • T1105 - Ingress Tool Transfer
  • T1564.012 - File/Path Exclusions
  • T1057 - Process Discovery
  • T1018 - Remote System Discovery
  • T1546.013 - PowerShell Profile
MITREへのリンク →

Medusa Group

Score: 0.64
Matched TTPs:
  • T1583.006 - Web Services
  • T1588.002 - Tool
  • T1219 - Remote Access Tools
  • T1608.002 - Upload Tool
  • T1518.001 - Security Software Discovery
  • T1562.001 - Disable or Modify Tools
  • T1047 - Windows Management Instrumentation
  • T1650 - Acquire Access
  • T1112 - Modify Registry
  • T1190 - Exploit Public-Facing Application
  • T1082 - System Information Discovery
  • T1070.004 - File Deletion
  • T1559.001 - Component Object Model
  • T1564.003 - Hidden Window
  • T1105 - Ingress Tool Transfer
  • T1543.003 - Windows Service
  • T1218.014 - MMC
  • T1569.002 - Service Execution
  • T1057 - Process Discovery
  • T1490 - Inhibit System Recovery
  • T1018 - Remote System Discovery
MITREへのリンク →

MuddyWater

Score: 0.64
Matched TTPs:
  • T1027.003 - Steganography
  • T1583.006 - Web Services
  • T1588.002 - Tool
  • T1219 - Remote Access Tools
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1518.001 - Security Software Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1053.005 - Scheduled Task
  • T1562.001 - Disable or Modify Tools
  • T1204.002 - Malicious File
  • T1047 - Windows Management Instrumentation
  • T1190 - Exploit Public-Facing Application
  • T1003.004 - LSA Secrets
  • T1082 - System Information Discovery
  • T1218.003 - CMSTP
  • T1559.001 - Component Object Model
  • T1203 - Exploitation for Client Execution
  • T1218.005 - Mshta
  • T1518 - Software Discovery
  • T1210 - Exploitation of Remote Services
  • T1105 - Ingress Tool Transfer
  • T1559.002 - Dynamic Data Exchange
  • T1574.001 - DLL
  • T1057 - Process Discovery
  • T1027.004 - Compile After Delivery
MITREへのリンク →

OilRig

Score: 0.61
Matched TTPs:
  • T1588.002 - Tool
  • T1219 - Remote Access Tools
  • T1608.001 - Upload Malware
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1036 - Masquerading
  • T1140 - Deobfuscate/Decode Files or Information
  • T1027.005 - Indicator Removal from Tools
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1195 - Supply Chain Compromise
  • T1047 - Windows Management Instrumentation
  • T1218.001 - Compiled HTML File
  • T1007 - System Service Discovery
  • T1112 - Modify Registry
  • T1003.004 - LSA Secrets
  • T1082 - System Information Discovery
  • T1070.004 - File Deletion
  • T1012 - Query Registry
  • T1497.001 - System Checks
  • T1203 - Exploitation for Client Execution
  • T1105 - Ingress Tool Transfer
  • T1543.003 - Windows Service
  • T1057 - Process Discovery
  • T1137.004 - Outlook Home Page
MITREへのリンク →

Kimsuky

Score: 0.61
Matched TTPs:
  • T1583.006 - Web Services
  • T1588.002 - Tool
  • T1608.001 - Upload Malware
  • T1102.001 - Dead Drop Resolver
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1027.012 - LNK Icon Smuggling
  • T1518.001 - Security Software Discovery
  • T1140 - Deobfuscate/Decode Files or Information
  • T1053.005 - Scheduled Task
  • T1562.001 - Disable or Modify Tools
  • T1204.002 - Malicious File
  • T1007 - System Service Discovery
  • T1112 - Modify Registry
  • T1190 - Exploit Public-Facing Application
  • T1082 - System Information Discovery
  • T1070.004 - File Deletion
  • T1012 - Query Registry
  • T1218.005 - Mshta
  • T1218.010 - Regsvr32
  • T1564.003 - Hidden Window
  • T1105 - Ingress Tool Transfer
  • T1543.003 - Windows Service
  • T1057 - Process Discovery
  • T1546.001 - Change Default File Association
MITREへのリンク →

Lazarus Group

Score: 0.60
Matched TTPs:
  • T1583.006 - Web Services
  • T1588.002 - Tool
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1140 - Deobfuscate/Decode Files or Information
  • T1053.005 - Scheduled Task
  • T1562.001 - Disable or Modify Tools
  • T1204.002 - Malicious File
  • T1047 - Windows Management Instrumentation
  • T1010 - Application Window Discovery
  • T1082 - System Information Discovery
  • T1070.004 - File Deletion
  • T1218 - System Binary Proxy Execution
  • T1012 - Query Registry
  • T1203 - Exploitation for Client Execution
  • T1027.007 - Dynamic API Resolution
  • T1218.005 - Mshta
  • T1105 - Ingress Tool Transfer
  • T1543.003 - Windows Service
  • T1574.001 - DLL
  • T1057 - Process Discovery
  • T1070 - Indicator Removal
  • T1036.003 - Rename Legitimate Utilities
MITREへのリンク →

APT29

Score: 0.60
Matched TTPs:
  • T1583.006 - Web Services
  • T1588.002 - Tool
  • T1553.005 - Mark-of-the-Web Bypass
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1547.001 - Registry Run Keys / Startup Folder
  • T1546.008 - Accessibility Features
  • T1546.003 - Windows Management Instrumentation Event Subscription
  • T1110.001 - Password Guessing
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1047 - Windows Management Instrumentation
  • T1190 - Exploit Public-Facing Application
  • T1003.004 - LSA Secrets
  • T1070.004 - File Deletion
  • T1203 - Exploitation for Client Execution
  • T1218.005 - Mshta
  • T1573 - Encrypted Channel
  • T1595.002 - Vulnerability Scanning
  • T1105 - Ingress Tool Transfer
  • T1568 - Dynamic Resolution
  • T1550.003 - Pass the Ticket
MITREへのリンク →

Sandworm Team

Score: 0.58
Matched TTPs:
  • T1588.002 - Tool
  • T1219 - Remote Access Tools
  • T1608.001 - Upload Malware
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1587.001 - Malware
  • T1036 - Masquerading
  • T1195.002 - Compromise Software Supply Chain
  • T1140 - Deobfuscate/Decode Files or Information
  • T1053.005 - Scheduled Task
  • T1204.002 - Malicious File
  • T1195 - Supply Chain Compromise
  • T1047 - Windows Management Instrumentation
  • T1190 - Exploit Public-Facing Application
  • T1499 - Endpoint Denial of Service
  • T1082 - System Information Discovery
  • T1592.002 - Software
  • T1070.004 - File Deletion
  • T1203 - Exploitation for Client Execution
  • T1595.002 - Vulnerability Scanning
  • T1105 - Ingress Tool Transfer
  • T1490 - Inhibit System Recovery
  • T1018 - Remote System Discovery
MITREへのリンク →

Volt Typhoon

Score: 0.56
Matched TTPs:
  • T1654 - Log Enumeration
  • T1588.002 - Tool
  • T1036.005 - Match Legitimate Resource Name or Location
  • T1140 - Deobfuscate/Decode Files or Information
  • T1047 - Windows Management Instrumentation
  • T1007 - System Service Discovery
  • T1614 - System Location Discovery
  • T1010 - Application Window Discovery
  • T1112 - Modify Registry
  • T1190 - Exploit Public-Facing Application
  • T1070.004 - File Deletion
  • T1218 - System Binary Proxy Execution
  • T1012 - Query Registry
  • T1497.001 - System Checks
  • T1069 - Permission Groups Discovery
  • T1518 - Software Discovery
  • T1105 - Ingress Tool Transfer
  • T1057 - Process Discovery
  • T1018 - Remote System Discovery
MITREへのリンク →

Related CVEs

このPulseに見つかったCVEはありません。

Pulse – 脅威アクター グラフ


← Pulse一覧に戻る