| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1197 | BITS任务 |
ProLock can use BITS jobs to download its malicious payload.[1] |
|
| Enterprise | T1047 | Windows管理规范 |
ProLock can use WMIC to execute scripts on targeted hosts.[1] |
|
| Enterprise | T1486 | 数据加密以实现影响 |
ProLock can encrypt files on a compromised host with RC6, and encrypts the key with RSA-1024.[1] |
|
| Enterprise | T1068 | 权限提升漏洞利用 |
ProLock can use CVE-2019-0859 to escalate privileges on a compromised host.[1] |
|
| Enterprise | T1027 | .003 | 混淆文件或信息: Steganography |
ProLock can use .jpg and .bmp files to store its payload.[1] |
| Enterprise | T1070 | .004 | 移除指标: File Deletion |
ProLock can remove files containing its payload after they are executed.[1] |
| Enterprise | T1490 | 系统恢复抑制 |
ProLock can use vssadmin.exe to remove volume shadow copies.[1] |
|