PipeMon is a multi-stage modular backdoor used by Winnti Group.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .005 | 伪装: Match Legitimate Name or Location |
PipeMon modules are stored on disk with seemingly benign names including use of a file extension associated with a popular word processor.[1] |
| Enterprise | T1112 | 修改注册表 |
PipeMon has modified the Registry to store its encrypted payload.[1] |
|
| Enterprise | T1129 | 共享模块 |
PipeMon has used call to |
|
| Enterprise | T1543 | .003 | 创建或修改系统进程: Windows Service |
PipeMon can establish persistence by registering a malicious DLL as an alternative Print Processor which is loaded when the print spooler service starts.[1] |
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography | |
| Enterprise | T1140 | 反混淆/解码文件或信息 | ||
| Enterprise | T1547 | .012 | 启动或登录自动启动执行: Print Processors |
The PipeMon installer has modified the Registry key |
| Enterprise | T1008 | 回退信道 |
PipeMon can switch to an alternate C2 domain when a particular date has been reached.[1] |
|
| Enterprise | T1106 | 本机API |
PipeMon's first stage has been executed by a call to |
|
| Enterprise | T1027 | .011 | 混淆文件或信息: Fileless Storage |
PipeMon has stored its encrypted payload in the Registry under |
| .013 | 混淆文件或信息: Encrypted/Encoded File | |||
| Enterprise | T1548 | .002 | 滥用权限提升控制机制: Bypass User Account Control |
PipeMon installer can use UAC bypass techniques to install the payload.[1] |
| Enterprise | T1082 | 系统信息发现 |
PipeMon can collect and send OS version and computer name as a part of its C2 beacon.[1] |
|
| Enterprise | T1124 | 系统时间发现 |
PipeMon can send time zone information from a compromised host to C2.[1] |
|
| Enterprise | T1016 | 系统网络配置发现 |
PipeMon can collect and send the local IP address, RDP information, and the network adapter physical address as a part of its C2 beacon.[1] |
|
| Enterprise | T1134 | .002 | 访问令牌操控: Create Process with Token |
PipeMon can attempt to gain administrative privileges using token impersonation.[1] |
| .004 | 访问令牌操控: Parent PID Spoofing |
PipeMon can use parent PID spoofing to elevate privileges.[1] |
||
| Enterprise | T1518 | .001 | 软件发现: Security Software Discovery |
PipeMon can check for the presence of ESET and Kaspersky security software.[1] |
| Enterprise | T1105 | 输入工具传输 | ||
| Enterprise | T1057 | 进程发现 |
PipeMon can iterate over the running processes to find a suitable injection target.[1] |
|
| Enterprise | T1055 | .001 | 进程注入: Dynamic-link Library Injection |
PipeMon can inject its modules into various processes using reflective DLL loading.[1] |
| Enterprise | T1095 | 非应用层协议 |
The PipeMon communication module can use a custom protocol based on TLS over TCP.[1] |
|
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
PipeMon, its installer, and tools are signed with stolen code-signing certificates.[1] |
| ID | Name | References |
|---|---|---|
| G0044 | Winnti Group |