| T1003.001 |
LSASS Memory |
TA0006
|
-
OS Credential Dumping: LSASS Memory - Kimsuky has gathered credentials using Mimikatz and ProcDump. · ref
|
| T1021.001 |
Remote Desktop Protocol |
TA0008
|
-
Remote Services: Remote Desktop Protocol - Kimsuky has used RDP for direct remote point-and-click access. · ref
|
| T1027.002 |
Software Packing |
TA0005
|
-
Software Packing - Kimsuky has packed malware with UPX. · ref
|
| T1036.004 |
Masquerade Task or Service |
TA0005
|
-
Masquerading: Masquerade Task or Service - Kimsuky has disguised services to appear as benign software or related to operating system functions. · ref
|
| T1036.005 |
Match Legitimate Resource Name or Location |
TA0005
|
-
Masquerading: Match Legitimate Resource Name or Location - Kimsuky has renamed malware to legitimate names such as ESTCommon.dll or patch.dll. · ref
|
| T1053.005 |
Scheduled Task |
TA0002
TA0003
TA0004
|
-
Scheduled Task/Job: Scheduled Task - Kimsuky has downloaded additional malware with scheduled tasks. · ref
|
| T1055.012 |
Process Hollowing |
TA0004
TA0005
|
-
Process Hollowing - Kimsuky has used a file injector DLL to spawn a benign process on the victim's system and inject the malicious payload into it via process hollowing. · ref
|
| T1056.001 |
Keylogging |
TA0006
TA0009
|
-
Input Capture: Keylogging - Kimsuky has used a PowerShell-based keylogger as well as a tool called MECHANICAL to log keystrokes. · ref
|
| T1059.001 |
PowerShell |
TA0002
|
-
Command and Scripting Interpreter: PowerShell - Kimsuky has executed a variety of PowerShell scripts including Invoke-Mimikatz. · ref
|
| T1059.003 |
Windows Command Shell |
TA0002
|
-
Command and Scripting Interpreter: Windows Command Shell - Kimsuky has executed Windows commands by using cmd and running batch scripts. · ref
|
| T1059.005 |
Visual Basic |
TA0002
|
-
Command and Scripting Interpreter: Visual Basic - Kimsuky has used Visual Basic to download malicious payloads. Kimsuky has also used malicious VBA macros within maldocs disguised as forms that trigger when a victim types any content into the lure. · ref
|
| T1059.006 |
Python |
TA0002
|
-
Command and Scripting Interpreter: Python - Kimsuky has used a macOS Python implant to gather data as well as MailFetcher.py code to automatically collect email data. · ref
|
| T1059.007 |
JavaScript |
TA0002
|
-
Command and Scripting Interpreter: JavaScript - Kimsuky has used JScript for logging and downloading additional tools. Kimsuky has used TRANSLATEXT, which contained four Javascript files for bypassing defenses, collecting sensitive information and screenshots, and exfiltrating data. · ref
|
| T1070.004 |
File Deletion |
TA0005
|
-
Indicator Removal: File Deletion - Kimsuky has deleted the exfiltrated data on disk after transmission. Kimsuky has also used an instrumentor script to terminate browser processes running on an infected system and then delete the cookie files on disk. · ref
|
| T1070.006 |
Timestomp |
TA0005
|
-
Indicator Removal: Timestomp - Kimsuky has manipulated timestamps for creation or compilation dates to defeat anti-forensics. · ref
|
| T1071.001 |
Web Protocols |
TA0011
|
-
Application Layer Protocol: Web Protocols - Kimsuky has used HTTP GET and POST requests for C2. · ref
|
| T1071.002 |
File Transfer Protocols |
TA0011
|
-
Application Layer Protocol: File Transfer Protocols - Kimsuky has used FTP to download additional malware to the target machine. · ref
|
| T1071.003 |
Mail Protocols |
TA0011
|
-
Application Layer Protocol: Mail Protocols - Kimsuky has used e-mail to send exfiltrated data to C2 servers. · ref
|
| T1074.001 |
Local Data Staging |
TA0009
|
-
Data Staged: Local Data Staging - Kimsuky has staged collected data files under C:\Program Files\Common Files\System\Ole DB\. · ref
|
| T1078.003 |
Local Accounts |
TA0001
TA0003
TA0004
TA0005
|
-
Valid Accounts: Local Accounts - Kimsuky has used a tool called GREASE to add a Windows admin account in order to allow them continued access via RDP. · ref
|
| T1098.007 |
Additional Local or Domain Groups |
TA0003
TA0004
|
-
Account Manipulation: Additional Local or Domain Groups - Kimsuky has added accounts to specific groups with net localgroup. · ref
|
| T1102.001 |
Dead Drop Resolver |
TA0011
|
-
Web Service: Dead Drop Resolver - Kimsuky has used TRANSLATEXT and a dead drop resolver to retrieve configurations and commands from a public blog site. · ref
|
| T1102.002 |
Bidirectional Communication |
TA0011
|
-
Web Service: Bidirectional Communication - Kimsuky has used Blogspot pages and a Github repository for C2. · ref
|
| T1114.002 |
Remote Email Collection |
TA0009
|
-
Email Collection: Remote Email Collection - Kimsuky has used tools such as the MailFetch mail crawler to collect victim emails (excluding spam) from online services via IMAP. · ref
|
| T1114.003 |
Email Forwarding Rule |
TA0009
|
-
Email Collection: Email Forwarding Rule - Kimsuky has set auto-forward rules on victim's e-mail accounts. · ref
|
| T1136.001 |
Local Account |
TA0003
|
-
Create Account: Local Account - Kimsuky has created accounts with net user. · ref
|
| T1176.001 |
Browser Extensions |
TA0003
|
-
Software Extensions: Browser Extensions - Kimsuky has used Google Chrome browser extensions to infect victims and to steal passwords and cookies. · ref
|
| T1204.001 |
Malicious Link |
TA0002
|
-
User Execution: Malicious Link - Kimsuky has lured victims into clicking malicious links. · ref
|
| T1204.002 |
Malicious File |
TA0002
|
-
User Execution: Malicious File - Kimsuky has used attempted to lure victims into opening malicious e-mail attachments. · ref
|
| T1218.005 |
Mshta |
TA0005
|
-
System Binary Proxy Execution: Mshta - Kimsuky has used mshta.exe to run malicious scripts on the system. · ref
|
| T1218.010 |
Regsvr32 |
TA0005
|
-
System Binary Proxy Execution: Regsvr32 - Kimsuky has executed malware with regsvr32s. · ref
|
| T1218.011 |
Rundll32 |
TA0005
|
-
System Binary Proxy Execution: Rundll32 - Kimsuky has used rundll32.exe to execute malicious scripts and malware on a victim's network. · ref
|
| T1219.002 |
Remote Desktop Software |
TA0011
|
-
Remote Access Tools: Remote Desktop Software - Kimsuky has used a modified TeamViewer client as a command and control channel. · ref
|
| T1505.003 |
Web Shell |
TA0003
|
-
Server Software Component: Web Shell - Kimsuky has used modified versions of open source PHP web shells to maintain access, often adding "Dinosaur" references within the code. · ref
|
| T1518.001 |
Security Software Discovery |
TA0007
|
-
Software Discovery: Security Software Discovery - Kimsuky has checked for the presence of antivirus software with powershell Get-CimInstance -Namespace root/securityCenter2 – classname antivirusproduct. · ref
|
| T1543.003 |
Windows Service |
TA0003
TA0004
|
-
Create or Modify System Process: Windows Service - Kimsuky has created new services for persistence. · ref
|
| T1546.001 |
Change Default File Association |
TA0003
TA0004
|
-
Event Triggered Execution: Change Default File Association - Kimsuky has a HWP document stealer module which changes the default program association in the registry to open HWP documents. · ref
|
| T1547.001 |
Registry Run Keys / Startup Folder |
TA0003
TA0004
|
-
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder - Kimsuky has placed scripts in the startup folder for persistence and modified the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce Registry key. · ref
|
| T1550.002 |
Pass the Hash |
TA0005
TA0008
|
-
Use Alternate Authentication Material: Pass the Hash - Kimsuky has used pass the hash for authentication to remote access software used in C2. · ref
|
| T1552.001 |
Credentials In Files |
TA0006
|
-
Unsecured Credentials: Credentials In Files - Kimsuky has used tools that are capable of obtaining credentials from saved mail. · ref
|
| T1553.002 |
Code Signing |
TA0005
|
-
Subvert Trust Controls: Code Signing - Kimsuky has signed files with the name EGIS CO,. Ltd. and has stolen a valid certificate that is used to sign the malware and the dropper. · ref
|
| T1555.003 |
Credentials from Web Browsers |
TA0006
|
-
Credentials from Password Stores: Credentials from Web Browsers - Kimsuky has used browser extensions including Google Chrome to steal passwords and cookies from browsers. Kimsuky has also used Nirsoft's WebBrowserPassView tool to dump the passwords obtained from victims. · ref
|
| T1560.001 |
Archive via Utility |
TA0009
|
-
Archive Collected Data: Archive via Utility - Kimsuky has used QuickZip to archive stolen files before exfiltration. · ref
|
| T1560.003 |
Archive via Custom Method |
TA0009
|
-
Archive Collected Data: Archive via Custom Method - Kimsuky has used RC4 encryption before exfil. · ref
|
| T1562.001 |
Disable or Modify Tools |
TA0005
|
-
Impair Defenses: Disable or Modify Tools - Kimsuky has been observed turning off Windows Security Center and can hide the AV software window from the view of the infected user. · ref
|
| T1562.004 |
Disable or Modify System Firewall |
TA0005
|
-
Impair Defenses: Disable or Modify System Firewall - Kimsuky has been observed disabling the system firewall. · ref
|
| T1564.002 |
Hidden Users |
TA0005
|
-
Hide Artifacts: Hidden Users - Kimsuky has run reg add ‘HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList’ /v to hide a newly created user. · ref
|
| T1564.003 |
Hidden Window |
TA0005
|
-
Hide Artifacts: Hidden Window - Kimsuky has used an information gathering module that will hide an AV software window from the victim. · ref
|
| T1566.001 |
Spearphishing Attachment |
TA0001
|
-
Spearphishing Attachment - Kimsuky has used emails containing Word, Excel and/or HWP (Hangul Word Processor) documents in their spearphishing campaigns. · ref
|
| T1566.002 |
Spearphishing Link |
TA0001
|
-
Spearphishing Link - Kimsuky has sent spearphishing emails containing a link to a document that contained malicious macros or took the victim to an actor-controlled domain. · ref
|
| T1567.002 |
Exfiltration to Cloud Storage |
TA0010
|
-
Exfiltration Over Web Service: Exfiltration to Cloud Storage - Kimsuky has exfiltrated stolen files and data to actor-controlled Blogspot accounts. · ref
|
| T1583.001 |
Domains |
TA0042
|
-
Domains - Kimsuky has registered domains to spoof targeted organizations and trusted third parties including search engines, web platforms, and cryptocurrency exchanges. · ref
|
| T1583.004 |
Server |
TA0042
|
-
Server - Kimsuky has purchased hosting servers with virtual currency and prepaid cards. · ref
|
| T1583.006 |
Web Services |
TA0042
|
-
Web Services - Kimsuky has hosted content used for targeting efforts via web services such as Blogspot. · ref
|
| T1584.001 |
Domains |
TA0042
|
-
Compromise Infrastructure: Domains - Kimsuky has compromised legitimate sites and used them to distribute malware. · ref
|
| T1585.001 |
Social Media Accounts |
TA0042
|
-
Social Media Accounts - Kimsuky has created social media accounts to monitor news and security trends as well as potential targets. · ref
|
| T1585.002 |
Email Accounts |
TA0042
|
-
Email Accounts - Kimsuky has created email accounts for phishing operations. · ref
|
| T1586.002 |
Email Accounts |
TA0042
|
-
Compromise Accounts: Email Accounts - Kimsuky has compromised email accounts to send spearphishing e-mails. · ref
|
| T1587.001 |
Malware |
TA0042
|
-
Malware - Kimsuky has developed its own unique malware such as MailFetch.py for use in operations. · ref
|
| T1588.002 |
Tool |
TA0042
|
-
Obtain Capabilities: Tool - Kimsuky has obtained and used tools such as Nirsoft WebBrowserPassVIew, Mimikatz, and PsExec. · ref
|
| T1588.003 |
Code Signing Certificates |
TA0042
|
-
Obtain Capabilities: Code Signing Certificates - Kimsuky has stolen a valid certificate that is used to sign the malware and the dropper. · ref
|
| T1588.005 |
Exploits |
TA0042
|
-
Obtain Capabilities: Exploits - Kimsuky has obtained exploit code for various CVEs. · ref
|
| T1589.002 |
Email Addresses |
TA0043
|
-
Gather Victim Identity Information: Email Addresses - Kimsuky has collected valid email addresses including personal accounts that were subsequently used for spearphishing and other forms of social engineering. · ref
|
| T1589.003 |
Employee Names |
TA0043
|
-
Gather Victim Identity Information: Employee Names - Kimsuky has collected victim employee name information. · ref
|
| T1593.001 |
Social Media |
TA0043
|
-
Social Media - Kimsuky has used Twitter to monitor potential victims and to prepare targeted phishing e-mails. · ref
|
| T1593.002 |
Search Engines |
TA0043
|
-
Search Engines - Kimsuky has searched for vulnerabilities, tools, and geopolitical trends on Google to target victims. · ref
|
| T1598.003 |
Spearphishing Link |
TA0043
|
-
Spearphishing Link - Kimsuky has used links in e-mail to steal account information including web beacons for target profiling. · ref
|
| T1608.001 |
Upload Malware |
TA0042
|
-
Stage Capabilities: Upload Malware - Kimsuky has used compromised and acquired infrastructure to host and deliver malware including Blogspot to host beacons, file exfiltrators, and implants. · ref
|