| Name | Description |
|---|---|
| LATEOP |
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
BabyShark has the ability to decode downloaded files prior to execution.[3] |
|
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
BabyShark has added a Registry key to ensure all future macros are enabled for Microsoft Word and Excel as well as for additional persistence.[1][3] |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell | |
| Enterprise | T1132 | .001 | 数据编码: Standard Encoding |
BabyShark has encoded data using certutil before exfiltration.[1] |
| Enterprise | T1083 | 文件和目录发现 |
BabyShark has used |
|
| Enterprise | T1012 | 查询注册表 |
BabyShark has executed the |
|
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
BabyShark has cleaned up all files associated with the secondary payload execution.[4] |
| Enterprise | T1218 | .005 | 系统二进制代理执行: Mshta |
BabyShark has used mshta.exe to download and execute applications from a remote server.[3] |
| Enterprise | T1082 | 系统信息发现 | ||
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1016 | 系统网络配置发现 | ||
| Enterprise | T1105 | 输入工具传输 |
BabyShark has downloaded additional files from the C2.[4][3] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging |
BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger.[4] |
| Enterprise | T1057 | 进程发现 | ||
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
BabyShark has used scheduled tasks to maintain persistence.[5] |