| Name | Description | 
|---|---|
| Geodo | 
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1134 | .001 | Access Token Manipulation: Token Impersonation/Theft | 
                                         Emotet has the ability to duplicate the user’s token.[3] For example, Emotet may use a variant of Google’s ProtoBuf to send messages that specify how code will be executed.[4]  | 
                        
| Enterprise | T1087 | .003 | Account Discovery: Email Account | 
                                         Emotet has been observed leveraging a module that can scrape email addresses from Outlook.[5][6][3]  | 
                        
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | 
                                         Emotet has been observed adding the downloaded payload to the   | 
                        
| Enterprise | T1110 | .001 | Brute Force: Password Guessing | 
                                         Emotet has been observed using a hard coded list of passwords to brute force user accounts. [10][7][8][11][5][3]  | 
                        
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell | 
                                         Emotet has used Powershell to retrieve the malicious payload and download additional resources like Mimikatz. [7][2][9][12][13]  | 
                        
| .003 | Command and Scripting Interpreter: Windows Command Shell | |||
| .005 | Command and Scripting Interpreter: Visual Basic | 
                                         Emotet has sent Microsoft Word documents with embedded macros that will invoke scripts to download additional payloads. [7][14][2][9][13]  | 
                        ||
| Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service | 
                                         Emotet has been observed creating new services to maintain persistence.[8][11][3]  | 
                        
| Enterprise | T1555 | .003 | Credentials from Password Stores: Credentials from Web Browsers | 
                                         Emotet has been observed dropping browser password grabber modules. [2][6]  | 
                        
| Enterprise | T1132 | .001 | Data Encoding: Standard Encoding | 
                                         Emotet has used Google’s Protobufs to serialize data sent to and from the C2 server.[3] Additionally, Emotet has used Base64 to encode data before sending to the C2 server.[15]  | 
                        
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | 
                                 Emotet has used a self-extracting RAR file to deliver modules to victims. Emotet has also extracted embedded executables from files using hard-coded buffer offsets.[3]  | 
                |
| Enterprise | T1114 | Email Collection | 
                                 Emotet has been observed leveraging a module that can scrape email addresses from Outlook.[5][6][3]  | 
                |
| .001 | Local Email Collection | 
                                     Emotet has been observed leveraging a module that scrapes email data from Outlook.[5]  | 
                    ||
| Enterprise | T1573 | Encrypted Channel | 
                                 Emotet has encrypted data before sending to the C2 server.[15]  | 
                |
| .001 | Symmetric Cryptography | 
                                     Emotet is known to use RSA keys for encrypting C2 traffic. [2]  | 
                    ||
| Enterprise | T1041 | Exfiltration Over C2 Channel | ||
| Enterprise | T1210 | Exploitation of Remote Services | 
                                 Emotet has been seen exploiting SMB via a vulnerability exploit like EternalBlue (MS17-010) to achieve lateral movement and propagation.[7][8][11][12]  | 
                |
| Enterprise | T1105 | Ingress Tool Transfer | 
                                 Emotet can download follow-on payloads and items via malicious   | 
                |
| Enterprise | T1570 | Lateral Tool Transfer | 
                                 Emotet has copied itself to remote systems using the   | 
                |
| Enterprise | T1036 | .004 | Masquerading: Masquerade Task or Service | 
                                         Emotet has installed itself as a new service with the service name   | 
                        
| Enterprise | T1106 | Native API | 
                                 Emotet has used   | 
                |
| Enterprise | T1135 | Network Share Discovery | 
                                 Emotet has enumerated non-hidden network shares using   | 
                |
| Enterprise | T1040 | Network Sniffing | 
                                 Emotet has been observed to hook network APIs to monitor network traffic. [1]  | 
                |
| Enterprise | T1571 | Non-Standard Port | 
                                 Emotet has used HTTP over ports such as 20, 22, 443, 7080, and 50000, in addition to using ports commonly associated with HTTP/S.[14][3]  | 
                |
| Enterprise | T1027 | .001 | Obfuscated Files or Information: Binary Padding | 
                                         Emotet inflates malicious files and malware as an evasion technique.[17]  | 
                        
| .002 | Obfuscated Files or Information: Software Packing | |||
| .009 | Obfuscated Files or Information: Embedded Payloads | 
                                         Emotet has dropped an embedded executable at   | 
                        ||
| .010 | Obfuscated Files or Information: Command Obfuscation | 
                                         Emotet has obfuscated macros within malicious documents to hide the URLs hosting the malware, CMD.exe arguments, and PowerShell scripts. [14][2][9][18]  | 
                        ||
| .013 | Obfuscated Files or Information: Encrypted/Encoded File | |||
| Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory | 
                                         Emotet has been observed dropping and executing password grabber modules including Mimikatz.[2][4]  | 
                        
| Enterprise | T1566 | .001 | Phishing: Spearphishing Attachment | 
                                         Emotet has been delivered by phishing emails containing attachments. [19][10][7][8][14][2][9][13][6]  | 
                        
| .002 | Phishing: Spearphishing Link | 
                                         Emotet has been delivered by phishing emails containing links. [1][20][19][10][7][8][14][14][9]  | 
                        ||
| Enterprise | T1057 | Process Discovery | ||
| Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection | 
                                         Emotet has been observed injecting in to Explorer.exe and other processes. [9][1][8]  | 
                        
| .012 | Process Injection: Process Hollowing | 
                                         Emotet uses a copy of   | 
                        ||
| Enterprise | T1620 | Reflective Code Loading | ||
| Enterprise | T1021 | .002 | Remote Services: SMB/Windows Admin Shares | 
                                         Emotet has leveraged the Admin$, C$, and IPC$ shares for lateral movement. [10][3]  | 
                        
| Enterprise | T1053 | .005 | Scheduled Task/Job: Scheduled Task | 
                                         Emotet has maintained persistence through a scheduled task, e.g. though a .dll file in the Registry.[8][4]  | 
                        
| Enterprise | T1218 | .010 | System Binary Proxy Execution: Regsvr32 | |
| Enterprise | T1016 | .002 | System Network Configuration Discovery: Wi-Fi Discovery | 
                                         Emotet can extract names of all locally reachable Wi-Fi networks and then perform a brute-force attack to spread to new networks.[3]  | 
                        
| Enterprise | T1033 | System Owner/User Discovery | 
                                 Emotet has enumerated all users connected to network shares.  | 
                |
| Enterprise | T1552 | .001 | Unsecured Credentials: Credentials In Files | 
                                         Emotet has been observed leveraging a module that retrieves passwords stored on a system for the current logged-on user. [8][5]  | 
                        
| Enterprise | T1204 | .001 | User Execution: Malicious Link | 
                                         Emotet has relied upon users clicking on a malicious link delivered through spearphishing.[1][13]  | 
                        
| .002 | User Execution: Malicious File | 
                                         Emotet has relied upon users clicking on a malicious attachment delivered through spearphishing.[1][13][6]  | 
                        ||
| Enterprise | T1078 | .003 | Valid Accounts: Local Accounts | 
                                         Emotet can brute force a local admin password, then use it to facilitate lateral movement.[10]  | 
                        
| Enterprise | T1047 | Windows Management Instrumentation | ||
| ID | Name | References | 
|---|---|---|
| G0102 | Wizard Spider |