Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1560 | .003 | Archive Collected Data: Archive via Custom Method |
T9000 encrypts collected data using a single byte XOR key.[2] |
Enterprise | T1123 | Audio Capture |
T9000 uses the Skype API to record audio and video calls. It writes encrypted data to |
|
Enterprise | T1119 | Automated Collection |
T9000 searches removable storage devices for files with a pre-defined list of file extensions (e.g. * .doc, .ppt, .xls, .docx, .pptx, *.xlsx). Any matching files are encrypted and written to a local user directory.[2] |
|
Enterprise | T1546 | .010 | Event Triggered Execution: AppInit DLLs |
If a victim meets certain criteria, T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL, ResN32.dll. It does this by creating the following Registry keys: |
Enterprise | T1574 | .002 | Hijack Execution Flow: DLL Side-Loading |
During the T9000 installation process, it drops a copy of the legitimate Microsoft binary igfxtray.exe. The executable contains a side-loading weakness which is used to load a portion of the malware.[2] |
Enterprise | T1120 | Peripheral Device Discovery |
T9000 searches through connected drives for removable storage devices.[2] |
|
Enterprise | T1113 | Screen Capture |
T9000 can take screenshots of the desktop and target application windows, saving them to user directories as one byte XOR encrypted .dat files.[2] |
|
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
T9000 performs checks for various antivirus and security products during installation.[2] |
Enterprise | T1082 | System Information Discovery |
T9000 gathers and beacons the operating system build number and CPU Architecture (32-bit/64-bit) during installation.[2] |
|
Enterprise | T1016 | System Network Configuration Discovery |
T9000 gathers and beacons the MAC and IP addresses during installation.[2] |
|
Enterprise | T1033 | System Owner/User Discovery |
T9000 gathers and beacons the username of the logged in account during installation. It will also gather the username of running processes to determine if it is running as SYSTEM.[2] |
|
Enterprise | T1124 | System Time Discovery |
T9000 gathers and beacons the system time during installation.[2] |
|
Enterprise | T1125 | Video Capture |
T9000 uses the Skype API to record audio and video calls. It writes encrypted data to |