Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
PowerView
|
AnyDesk
|
|
|
Impacket
|
|
NTDS Utility (ntdsutil)
PsExec
Windows Event Utility (wevtutil)
WMIC
|
WinSCP
|
No vulnerabilities exploited available.
| Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Discovery | Collection | Command and Control | Exfiltration | Impact |
|---|---|---|---|---|---|---|---|---|---|---|---|
| Active Scanning | Acquire Infrastructure | Phishing | Command and Scripting Interpreter | Registry Run Keys / Startup Folder | Process Injection | Obfuscated Files or Information | Application Window Discovery | Data from Local System | Application Layer Protocol | Exfiltration Over C2 Channel | Data Encrypted for Impact |
| Phishing for Information | Develop Capabilities | Abusing Elevation Control Mechanism: Bypass User Account Control | Shared Modules | Thread Execution Hijacking | Masquerading | Process Discovery | Automated Collection | Web Protocols | |||
| Registry Run Keys | Process Injection | System Information Discovery | |||||||||
| Thread Execution Hijacking | File and Directory Discovery | ||||||||||
| Virtualization/Sandbox Evasion | Virtualization/Sandbox Evasion | ||||||||||
| Hidden Artifacts | Security Software Discovery | ||||||||||
| NTFS File Attributes | |||||||||||
| Reflective DLL Injection |
No negotiation chats available.