| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1036 | .004 | 伪装: Masquerade Task or Service |
Tarrask creates a scheduled task called "WinUpdate" to re-establish any dropped C2 connections.[1] |
| .005 | 伪装: Match Legitimate Name or Location |
Tarrask has masqueraded as executable files such as |
||
| Enterprise | T1112 | 修改注册表 |
Tarrask is able to delete the Security Descriptor ( |
|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
Tarrask may abuse the Windows schtasks command-line tool to create "hidden" scheduled tasks.[1] |
| Enterprise | T1134 | .001 | 访问令牌操控: Token Impersonation/Theft |
Tarrask leverages token theft to obtain |
| Enterprise | T1564 | 隐藏伪装 |
Tarrask is able to create "hidden" scheduled tasks by deleting the Security Descriptor ( |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
Tarrask is able to create "hidden" scheduled tasks for persistence.[1] |