| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
JCry has created payloads in the Startup directory to maintain persistence. [1] |
| Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell | |
| .003 | Command and Scripting Interpreter: Windows Command Shell | |||
| .005 | Command and Scripting Interpreter: Visual Basic | |||
| Enterprise | T1486 | Data Encrypted for Impact |
JCry has encrypted files and demanded Bitcoin to decrypt those files. [1] |
|
| Enterprise | T1490 | Inhibit System Recovery |
JCry has been observed deleting shadow copies to ensure that data cannot be restored easily.[1] |
|
| Enterprise | T1204 | .002 | User Execution: Malicious File |
JCry has achieved execution by luring users to click on a file that appeared to be an Adobe Flash Player update installer. [1] |