| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
Dyre registers itself as a service by adding several Registry keys.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
Dyre decrypts resources needed for targeting the victim.[1][2] |
|
| Enterprise | T1071 | .001 | 应用层协议: Web Protocols | |
| Enterprise | T1074 | .001 | 数据分段: Local Data Staging |
Dyre has the ability to create files in a TEMP folder to act as a database to store information.[2] |
| Enterprise | T1027 | .002 | 混淆文件或信息: Software Packing |
Dyre has been delivered with encrypted resources and must be unpacked for execution.[2] |
| Enterprise | T1082 | 系统信息发现 |
Dyre has the ability to identify the computer name, OS version, and hardware configuration on a compromised host.[2] |
|
| Enterprise | T1033 | 系统所有者/用户发现 |
Dyre has the ability to identify the users on a compromised host.[2] |
|
| Enterprise | T1007 | 系统服务发现 |
Dyre has the ability to identify running services on a compromised host.[2] |
|
| Enterprise | T1016 | 系统网络配置发现 |
Dyre has the ability to identify network settings on a compromised host.[2] |
|
| Enterprise | T1497 | .001 | 虚拟化/沙盒规避: System Checks |
Dyre can detect sandbox analysis environments by inspecting the process list and Registry.[1][2] |
| Enterprise | T1518 | 软件发现 |
Dyre has the ability to identify installed programs on a compromised host.[2] |
|
| Enterprise | T1105 | 输入工具传输 |
Dyre has a command to download and executes additional files.[1] |
|
| Enterprise | T1055 | 进程注入 |
Dyre has the ability to directly inject its code into the web browser process.[2] |
|
| .001 | Dynamic-link Library Injection | |||
| Enterprise | T1041 | 通过C2信道渗出 |
Dyre has the ability to send information staged on a compromised host externally to C2.[2] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Dyre has the ability to achieve persistence by adding a new task in the task scheduler to run every minute.[2] |
| ID | Name | References |
|---|---|---|
| G0102 | Wizard Spider |