| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1014 | Rootkit |
PoisonIvy starts a rootkit from a malicious file dropped to disk.[3] |
|
| Enterprise | T1005 | 从本地系统获取数据 |
PoisonIvy creates a backdoor through which remote attackers can steal system information.[3] |
|
| Enterprise | T1112 | 修改注册表 |
PoisonIvy creates a Registry subkey that registers a new system device.[3] |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
PoisonIvy creates a Registry subkey that registers a new service. PoisonIvy also creates a Registry entry modifying the Logical Disk Manager service to point to a malicious DLL dropped to disk.[3] |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
PoisonIvy uses the Camellia cipher to encrypt communications.[1] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
PoisonIvy creates run key Registry entries pointing to a malicious executable dropped to disk.[3] |
| .014 | 启动或登录自动启动执行: Active Setup |
PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.[6][7][8] |
||
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
PoisonIvy creates a backdoor through which remote attackers can open a command-line interface.[3] |
| Enterprise | T1010 | 应用窗口发现 | ||
| Enterprise | T1480 | .002 | 执行保护: Mutual Exclusion |
PoisonIvy creates a mutex using either a custom or default value.[1] |
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging | |
| Enterprise | T1027 | 混淆文件或信息 |
PoisonIvy hides any strings related to its own indicators of compromise.[3] |
|
| Enterprise | T1105 | 输入工具传输 |
PoisonIvy creates a backdoor through which remote attackers can upload files.[3] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging | |
| Enterprise | T1055 | .001 | 进程注入: Dynamic-link Library Injection | |
| ID | Name | Description |
|---|---|---|
| C0016 | Operation Dust Storm |