Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Persistence | Privilege Escalation | Defense Evasion | Discovery | Collection | Impact |
|---|---|---|---|---|---|
| Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Create or Modify System Process | Indicator Removal: Timestomp | Query Registry | Input Capture | Service Stop |
| Abuse Elevation Control Mechanism: Bypass User Account Control | Deobfuscate/Decode Files or Information | Process Discovery | Data Staged | Inhibit System Recovery | |
| Impair Defenses: Disable or Modify Tools | File and Directory Discovery | ||||
| Account Discovery | |||||
| Virtualization/Sandbox Evasion |