| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1546 | .003 | 事件触发执行: Windows Management Instrumentation Event Subscription |
RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started.[1] |
| Enterprise | T1112 | 修改注册表 |
RegDuke can create seemingly legitimate Registry key to store its encryption key.[1] |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
RegDuke can decrypt strings with a key either stored in the Registry or hardcoded in the code.[1] |
|
| Enterprise | T1059 | .001 | 命令与脚本解释器: PowerShell |
RegDuke can extract and execute PowerShell scripts from C2 communications.[1] |
| Enterprise | T1027 | 混淆文件或信息 |
RegDuke can use control-flow flattening or the commercially available .NET Reactor for obfuscation.[1] |
|
| .003 | Steganography |
RegDuke can hide data in images, including use of the Least Significant Bit (LSB).[1] |
||
| .011 | Fileless Storage | |||
| Enterprise | T1102 | .002 | 网络服务: Bidirectional Communication | |
| Enterprise | T1105 | 输入工具传输 | ||
| ID | Name | Description |
|---|---|---|
| C0023 | Operation Ghost |
For Operation Ghost, APT29 used RegDuke as a first-stage implant.[1] |