Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1134 | .001 | Access Token Manipulation: Token Impersonation/Theft |
Aria-body has the ability to duplicate a token from ntprint.exe.[1] |
.002 | Access Token Manipulation: Create Process with Token |
Aria-body has the ability to execute a process using |
||
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
Enterprise | T1010 | Application Window Discovery |
Aria-body has the ability to identify the titles of running windows on a compromised host.[1] |
|
Enterprise | T1560 | Archive Collected Data |
Aria-body has used ZIP to compress data gathered on a compromised host.[1] |
|
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Aria-body has established persistence via the Startup folder or Run Registry key.[1] |
Enterprise | T1025 | Data from Removable Media |
Aria-body has the ability to collect data from USB devices.[1] |
|
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
Aria-body has the ability to decrypt the loader configuration and payload DLL.[1] |
|
Enterprise | T1568 | .002 | Dynamic Resolution: Domain Generation Algorithms |
Aria-body has the ability to use a DGA for C2 communications.[1] |
Enterprise | T1083 | File and Directory Discovery |
Aria-body has the ability to gather metadata from a file and to search for file and directory names.[1] |
|
Enterprise | T1070 | .004 | Indicator Removal on Host: File Deletion |
Aria-body has the ability to delete files and directories on compromised hosts.[1] |
Enterprise | T1105 | Ingress Tool Transfer |
Aria-body has the ability to download additional payloads from C2.[1] |
|
Enterprise | T1106 | Native API |
Aria-body has the ability to launch files using |
|
Enterprise | T1095 | Non-Application Layer Protocol | ||
Enterprise | T1027 | Obfuscated Files or Information |
Aria-body has used an encrypted configuration file for its loader.[1] |
|
Enterprise | T1057 | Process Discovery |
Aria-body has the ability to enumerate loaded modules for a process.[1]. |
|
Enterprise | T1055 | .001 | Process Injection: Dynamic-link Library Injection |
Aria-body has the ability to inject itself into another process such as rundll32.exe and dllhost.exe.[1] |
Enterprise | T1090 | Proxy |
Aria-body has the ability to use a reverse SOCKS proxy module.[1] |
|
Enterprise | T1113 | Screen Capture |
Aria-body has the ability to capture screenshots on compromised hosts.[1] |
|
Enterprise | T1082 | System Information Discovery |
Aria-body has the ability to identify the hostname, computer name, Windows version, processor speed, machine GUID, and disk information on a compromised host.[1] |
|
Enterprise | T1016 | System Network Configuration Discovery |
Aria-body has the ability to identify the location, public IP address, and domain name on a compromised host.[1] |
|
Enterprise | T1049 | System Network Connections Discovery |
Aria-body has the ability to gather TCP and UDP table status listings.[1] |
|
Enterprise | T1033 | System Owner/User Discovery |
Aria-body has the ability to identify the username on a compromised host.[1] |
ID | Name | References |
---|---|---|
G0019 | Naikon |