ABCDEFGHIJKLMNOPQRSTUVWXYZAAABACADAE
1
X = macosy=crossover
2
3
Techniques Used
4
DomainTacticIDHunterMacOSCrossOverTechnique PageSubNameUse
5
EnterpriseT1087plugx0.001Account Discovery: Local Account
APT32 enumerated administrative users using the commands net localgroup administrators.[5]
6
EnterpriseC2T1071ahhhx
https://docs.google.com/document/d/1vV88RCStP1I2d5A96y3JjUfDGkH9iASL6XG8woO0MXc/edit#heading=h.9f3a0bh8fut6
0.001Application Layer Protocol: Web Protocols
APT32 has used JavaScript that communicates over HTTP or HTTPS to attacker controlled domains to download additional frameworks. The group has also used downloaded encrypted payloads over HTTP.[2][5]
7
C2T1071ahhhx
https://docs.google.com/document/d/1vV88RCStP1I2d5A96y3JjUfDGkH9iASL6XG8woO0MXc/edit#heading=h.9f3a0bh8fut6
0.003Application Layer Protocol: Mail ProtocolsAPT32 has used email for C2 via an Office macro.[4][5]
8
EnterpriseT1560Archive Collected Data
APT32's backdoor has used LZMA compression and RC4 encryption before exfiltration.[6]
9
EnterpriseT15470.001
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
APT32 established persistence using Registry Run keys, both to execute PowerShell and VBS scripts as well as to execute their backdoor directly.[4][5][6]
10
EnterpriseT1059
https://docs.google.com/document/d/1jCCG4NFQ_uNnwqI4uQp8uQ7A1acK5F0ku8LX4a6whx8/edit#heading=h.6n0037mkfgsj
Command and Scripting Interpreter
APT32 has used COM scriptlets to download Cobalt Strike beacons.[5]
11
T1059PowerShell
APT32 has used PowerShell-based tools, PowerShell one-liners, and shellcode loaders for execution.[1][4][5]
12
T1059Windows Command ShellAPT32 has used cmd.exe for execution.[5]
13
T1059Visual Basic
APT32 has used macros, COM scriptlets, and VBS scripts.[4][5]
14
T1059JavaScript/JScript
APT32 has used JavaScript for drive-by downloads and C2 communications.[5]
15
EnterpriseT15430.003Create or Modify System Process: Windows Service
APT32 modified Windows Services to ensure PowerShell scripts were loaded on the system. APT32 also creates a Windows service to establish persistence.[3][5][6]
16
EnterpriseT1189ahhh
https://docs.google.com/document/d/1jsme-JI9W6PfS3BgQ5yzFcbN9LLAj9Rk0eqNaBH9Rtc/edit
Drive-by Compromise
APT32 has infected victims by tricking them into visiting compromised watering hole websites.[3]
17
EnterpriseT10480.003
Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol
APT32's backdoor can exfiltrate data by encoding it in the subdomain field of DNS packets.[6]
18
EnterpriseT1041Exfiltration Over C2 Channel
APT32's backdoor has exfiltrated data using the already opened channel with its C&C server.[6]
19
EnterpriseExecutionT1203ahhhX
https://docs.google.com/document/d/10v4CS7UL2wnVX8LdnYhFrwRmMoPf_dfBq8WlOUS2xjM/edit?usp=sharing
Exploitation for Client Execution
APT32 has used RTF document that includes an exploit to execute malicious code. (CVE-2017-11882)[6]
20
EnterpriseT1203Exploitation for Client Execution
APT32 has used RTF document that includes an exploit to execute malicious code. (CVE-2017-11882)[6]
21
EnterpriseT1068Exploitation for Privilege Escalation
APT32 has used CVE-2016-7255 to escalate privileges.[1]
22
EnterpriseT1083File and Directory Discovery
APT32's backdoor possesses the capability to list files and directories on a machine. [6]
23
EnterpriseT1222
https://docs.google.com/document/d/12BGcnY0H1bhGaGkEfOAIKajgyOs0Dhtmt58Ou03ywNA/edit#
0.002
File and Directory Permissions Modification: Linux and Mac File and Directory Permissions Modification
APT32's macOS backdoor changes the permission of the file it wants to execute to 755.[7]
24
EnterpriseT15640.004Hide Artifacts: NTFS File Attributes
APT32 used NTFS alternate data streams to hide their payloads.[5]
25
Defensive EvasionT1564ahhhx
https://docs.google.com/document/d/1jCZY_gNJopwNpJjqNWT3yUSNErM8ZZ-TONu-21pzu_o/edit?usp=sharing
0.001Hide Artifacts: Hidden Files and Directories
APT32's macOS backdoor hides the clientID file via a chflags function.[7]
26
T15640.003Hide Artifacts: Hidden Window
APT32 has used the WindowStyle parameter to conceal PowerShell windows. [1] [5]
27
EnterpriseT15740.002Hijack Execution Flow: DLL Side-Loading
APT32 ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder).[4][5][6]
28
EnterpriseT10700.006Indicator Removal on Host: Timestomp
APT32 has used scheduled task raw XML with a backdated timestamp of June 2, 2016. The group has also set the creation time of the files dropped by the second stage of the exploit to match the creation time of kernel32.dll. Additionally, APT32 has used a random value to modify the timestamp of the file storing the clientID.[1][6][7]
29
T10700.001Indicator Removal on Host: Clear Windows Event LogsAPT32 has cleared select event log entries.[1]
30
T10700.004Indicator Removal on Host: File Deletion
APT32's macOS backdoor can receive a "delete" command.[7]
31
EnterpriseC2T1105Ingress Tool Transfer
APT32 has added JavaScript to victim websites to download additional frameworks that profile and compromise website visitors.[2]
32
EnterpriseT10560.001Input Capture: Keylogging
APT32 has abused the PasswordChangeNotify to monitor for and capture account password changes.[5]
33
EnterpriseT1056BenJAMINXLateral Tool Transfer
APT32 has deployed tools after moving laterally using administrative accounts.[5]
34
EnterpriseT1036ahhhx
https://docs.google.com/document/d/1wl6Ak4cvpsGXOkj2rJ_KulQe46JpNzHJt8UzgpnGytQ/edit#heading=h.9f3a0bh8fut6
Masquerading
APT32 has disguised a Cobalt Strike beacon as a Flash Installer.[5]
35
T1036Match Legitimate Name or Location
APT32 has renamed a NetCat binary to kb-10233.exe to masquerade as a Windows update. APT32 has also renamed a Cobalt Strike beacon payload to install_flashplayers.exe. [5]
36
T1036Masquerade Task or Service
APT32 has used hidden or non-printing characters to help masquerade service names, such as appending a Unicode no-break space character to a legitimate service name. APT32 has also impersonated the legitimate Flash installer file name "install_flashplayer.exe".[1]
37
T1036Rename System Utilities
APT32 has moved and renamed pubprn.vbs to a .txt file to avoid detection.[8]
38
EnterpriseT1112Modify Registry
APT32's backdoor has modified the Windows Registry to store the backdoor's configuration. [6]
39
EnterpriseT1046Network Service Scanning
APT32 performed network scanning on the network to search for open ports, services, OS finger-printing, and other vulnerabilities.[5]
40
EnterpriseT1135Network Share Discovery
APT32 used the net view command to show all shares available, including the administrative shares such as C$ and ADMIN$.[5]
41
EnterpriseC2T1571Non-Standard Port
An APT32 backdoor can use HTTP over a non-standard TCP port (e.g 14146) which is specified in the backdoor configuration.[6]
42
EnterpriseDefense EvasionT1027wildphishX
https://docs.google.com/document/d/1KGdlnzzEcmtyqz1_iHO9hIyGOTpE0ptpdV2P4lBlxLI/edit#heading=h.9f3a0bh8fut6
Obfuscated Files or Information
APT32 uses the Invoke-Obfuscation framework to obfuscate their PowerShell and also performs other code obfuscation. APT32 has also encoded payloads using Base64 and a framework called "Dont-Kill-My-Cat (DKMC). APT32 also encrypts the library used for network exfiltration with AES-256 in CBC mode in their macOS backdoor.[1][9][3][4][5][6][7]
43
T1027Binary Padding
APT32 includes garbage code to mislead anti-malware software and researchers.[3][6]
44
EnterpriseT1137Office Application Startup
APT32 have replaced Microsoft Outlook's VbaProject.OTM file to install a backdoor macro for persistence.[4][5]
45
EnterpriseT1003OS Credential Dumping
APT32 used GetPassword_x64 to harvest credentials.[4][5]
46
T1003LSASS Memory
APT32 used Mimikatz and customized versions of Windows Credential Dumper to harvest credentials.[4][5]
47
EnterpriseT15660.002Phishing: Spearphishing Link
APT32 has sent spearphishing emails containing malicious links.[3][4][10]
48
Initial ExecutionT1566ahhhX
https://docs.google.com/document/d/1TCVn-5Cu83BZZUSUM9VYPm0AkaXs5akUQZMcPBIqfRE/edit
0.001Phishing: Spearphishing Attachment
APT32 has sent spearphishing emails with a malicious executable disguised as a document or spreadsheet.[3][4][5][6][10]
49
EnterpriseT1055Process Injection
APT32 malware has injected a Cobalt Strike beacon into Rundll32.exe.[5]
50
EnterpriseT1012Query Registry
APT32's backdoor can query the Windows Registry to gather system information. [6]
51
EnterpriseT10210.002Remote Services: SMB/Windows Admin Shares
APT32 used Net to use Windows' hidden network shares to copy their tools to remote machines for execution.[5]
52
EnterpriseT1018Remote System Discovery
APT32 has enumerated DC servers using the command net group "Domain Controllers" /domain. The group has also used the ping command.[5]
53
EnterpriseT10530.005Scheduled Task/Job: Scheduled Task
APT32 has used scheduled tasks to persist on victim systems.[1][4][5][6]
54
EnterpriseT15050.003Server Software Component: Web Shell
APT32 has used Web shells to maintain access to victim websites.[2]
55
EnterpriseT12180.01Signed Binary Proxy Execution: Regsvr32
APT32 created a Scheduled Task/Job that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory. The group has also used regsvr32 to run their backdoor.[6][1][5]
56
T12180.005Signed Binary Proxy Execution: MshtaAPT32 has used mshta.exe for code execution.[4][5]
57
T12180.011Signed Binary Proxy Execution: Rundll32
APT32 malware has used rundll32.exe to execute an initial infection process.[5]
58
EnterpriseT12160.001Signed Script Proxy Execution: PubPrn
APT32 has used PubPrn.vbs within execution scripts to execute malware, possibly bypassing defenses.[11]
59
EnterpriseT1072Software Deployment Tools
APT32 compromised McAfee ePO to move laterally by distributing malware as a software deployment task.[1]
60
EnterpriseT1082
https://docs.google.com/document/d/1hL-l-nXVadnKoQ394i7NBofHbyn1OEbhjK3nSM_Ige8/edit#
System Information Discovery
APT32 has collected the OS version and computer name from victims. One of the group's backdoors can also query the Windows Registry to gather system information, and another macOS backdoor performs a fingerprint of the machine on its first connection to the C&C server. APT32 executed shellcode to identify the name of the infected host.[3][6][7][10]
61
EnterpriseT1016System Network Configuration Discovery
APT32 used the ipconfig /all command to gather the IP address from the system.[5]
62
EnterpriseT1049System Network Connections Discovery
APT32 used the netstat -anpo tcp command to display TCP connections on the victim's machine.[5]
63
EnterpriseT1033System Owner/User Discovery
APT32 collected the victim's username and executed the whoami command on the victim's machine. APT32 executed shellcode to collect the username on the victim's machine. [10][3][5]
64
EnterpriseT15690.002System Services: Service Execution
APT32's backdoor has used Windows services as a way to execute its malicious payload. [6]
65
EnterpriseT15520.002Unsecured Credentials: Credentials in Registry
APT32 used Outlook Credential Dumper to harvest credentials stored in Windows registry.[4][5]
66
EnterpriseT15500.002Use Alternate Authentication Material: Pass the HashAPT32 has used pass the hash for lateral movement.[5]
67
0.003Use Alternate Authentication Material: Pass the Ticket
APT32 successfully gained remote access by using pass the ticket.[5]
68
EnterpriseT12040.002User Execution: Malicious File
APT32 has attempted to lure users to execute a malicious dropper delivered via a spearphishing attachment.[3][4][6][10]
69
0.001User Execution: Malicious Link
APT32 has lured targets to download a Cobalt Strike beacon by including a malicious link within spearphishing emails.[5]
70
EnterpriseT10780.003Valid Accounts: Local Accounts
APT32 has used legitimate local admin account credentials.[1]
71
EnterpriseT1047Windows Management Instrumentation
APT32 used WMI to deploy their tools on remote machines and to gather information about the Outlook process.[5]
72
EnterpriseDefense EvasionT1554ahhhx
https://docs.google.com/document/d/17lUFUbU3SYQV4Um46rj2L0LWDxY-SiHR91SMevFULqc/edit#
0.001Subvert Trust Controls: Gatekeeper Bypass
Adversaries may modify file attributes that signify programs are from untrusted sources to subvert Gatekeeper controls. In macOS and OS X, when applications or programs are downloaded from the internet, there is a special attribute set on the file called com.apple.quarantine. This attribute is read by Apple's Gatekeeper defense program at execution time and provides a prompt to the user to allow or deny execution.
73
74
75
New Items
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100