| [13/04/21] April 13, 2021 Rafael Tenorio & Sergio Delgado - One eSecurity |
The analysis of different reports, listed in the References section below, provides the following MITRE ATT&CK Techniques associated to the Campaign & Threat Actor:
| ID | TTP | Name | Solarwinds Flavor | Reference |
|---|---|---|---|---|
| 1 | T1059 | Command and Scripting Interpreter, | UNC2452/Dark Halo/SolarStorm | https://attack.mitre.org/techniques/T1059/ |
| 2 | T1059.001 | Command and Scripting Interpreter: PowerShell | UNC2452 | https://attack.mitre.org/techniques/T1059/001 |
| 3 | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | UNC2452 | https://attack.mitre.org/techniques/T1059/003 |
| 4 | T1059.005 | Command and Scripting Interpreter: Visual Basic | Sunburst / UNC2452 | https://attack.mitre.org/techniques/T1059/005 |
| 5 | T1105 | Ingress Tool Transfer | UNC2452/Dark Halo/SolarStorm | https://attack.mitre.org/techniques/T1105/ |
| 6 | T1218.011 | Signed Binary Proxy Execution: Rundll32 | UNC2452/Dark Halo/SolarStorm | https://attack.mitre.org/techniques/T1218/011 |
| 7 | T1195.002 | Supply Chain Compromise | UNC2452/Dark Halo/SolarStorm | https://attack.mitre.org/techniques/T1195/002 |
| 8 | T1070 | Indicator Removal on Host | UNC2452 | https://attack.mitre.org/techniques/T1070/ |
| 9 | T1070.006 | Timestomp | UNC2452 | https://attack.mitre.org/techniques/T1070/006 |
| 10 | T1098.002 | Account Manipulation: Exchange Email Delegate Permissions | UNC2452 | https://attack.mitre.org/techniques/T1098/002/ |
| 11 | T1098.001 | Account Manipulation: Additional Cloud Credentials | Solorigate | https://attack.mitre.org/techniques/T1098/001/ |
| 12 | T1606.001 | Forge Web Credentials: Web Cookies | UNC2452 | https://attack.mitre.org/techniques/T1606/001/ |
| 13 | T1606.002 | Forge Web Credentials: SAML Tokens | UNC2452 | https://attack.mitre.org/techniques/T1606/002/ |
| 14 | T1552.004 | Unsecured Credentials: Private Keys | UNC2452 | https://attack.mitre.org/techniques/T1552/004/ |
| 15 | T1484.002 | Domain Policy Modification: Domain Trust Modification | Solorigate | https://attack.mitre.org/techniques/T1484/002/ |
| 16 | T1071.001 | Application Layer Protocol: Web Protocols | Sunburst | https://attack.mitre.org/techniques/T1071/001 |
| 17 | T1071.004 | Application Layer Protocol: DNS | Sunburst | https://attack.mitre.org/techniques/T1071/004 |
| 18 | T1482 | Domain Trust Discovery | UNC2452 | https://attack.mitre.org/techniques/T1482 |
| 19 | T1132.001 | Data Encoding: Standard Encoding | Sunburst | https://attack.mitre.org/techniques/T1132 |
| 20 | T1005 | Data from Local System | Sunburst | https://attack.mitre.org/techniques/T1005 |
| 21 | T1001.001 | Data Obfuscation: Junk Data | Sunburst | https://attack.mitre.org/techniques/T1001/001 |
| 22 | T1001.002 | Data Obfuscation: Steganography | Sunburst | https://attack.mitre.org/techniques/T1001/002 |
| 23 | T1001.003 | Data Obfuscation: Protocol Impersonation | Sunburst | https://attack.mitre.org/techniques/T1001/003 |
| 24 | T1568 | Dynamic Resolution | Sunburst | https://attack.mitre.org/techniques/T1568 |
| 25 | T1573.001 | Encrypted Channel: Symmetric Cryptography | Sunburst | https://attack.mitre.org/techniques/T1573/001 |
| 26 | T1546.003 | Event Triggered Execution: Windows Management Instrumentation Event Subscription | UNC2452 | https://attack.mitre.org/techniques/T1546/003 |
| 27 | T1546.012 | Event Triggered Execution: Image File Execution Options Injection | Sunburst | https://attack.mitre.org/techniques/T1546/012 |
| 28 | T1083 | File and Directory Discovery | Sunburst / Sunspot | https://attack.mitre.org/techniques/T1083 |
| 29 | T1562.001 | Impair Defenses: Disable or Modify Tools | Sunburst | https://attack.mitre.org/techniques/T1562/001 |
| 30 | T1562.002 | mpair Defenses: Disable Windows Event Logging | UNC2452 | https://attack.mitre.org/techniques/T1562/002 |
| 31 | T1562.004 | Impair Defenses: Disable or Modify System Firewall | UNC2452 | https://attack.mitre.org/techniques/T1562/004 |
| 32 | T1070.004 | File Deletion | Sunburst / Sunspot | https://attack.mitre.org/techniques/T1070/004 |
| 33 | T1036 | Masquerading | Raindrop | https://attack.mitre.org/techniques/T1036 |
| 34 | T1036.004 | Masquerade Task or Service | UNC2452 | https://attack.mitre.org/techniques/T1036/004 |
| 35 | T1036.005 | Masquerading: Match Legitimate Name or Location | Sunburst / Teardrop / Sunspot / Raindrop | https://attack.mitre.org/techniques/T1036/005 |
| 36 | T1112 | Modify Registry | Sunburst / Teardrop | https://attack.mitre.org/techniques/T1112 |
| 37 | T1027 | Obfuscated Files or Information | Sunburst / Teardrop / Sunspot | https://attack.mitre.org/techniques/T1027 |
| 38 | T1027.002 | Software Packing | Raindrop | https://attack.mitre.org/techniques/T1027/002 |
| 39 | T1027.003 | Steganography | Raindrop | https://attack.mitre.org/techniques/T1027/003 |
| 40 | T1027.005 | Indicator Removal from Tools | Sunburst | https://attack.mitre.org/techniques/T1027/005 |
| 41 | T1057 | Process Discovery | Sunburst / Teardrop / Sunspot | https://attack.mitre.org/techniques/T1057 |
| 42 | T1012 | Query Registry | Sunburst / Teardrop | https://attack.mitre.org/techniques/T1012 |
| 43 | T1518.001 | Software Discovery: Security Software Discovery | Sunburst | https://attack.mitre.org/techniques/T1518/001 |
| 44 | T1553.002 | Subvert Trust Controls: Code Signing | Sunburst | https://attack.mitre.org/techniques/T1553/002 |
| 45 | T1082 | System Information Discovery | Sunburst | https://attack.mitre.org/techniques/T1082 |
| 46 | T1016 | System Network Configuration Discovery | Sunburst | https://attack.mitre.org/techniques/T1016 |
| 47 | T1033 | System Owner/User Discovery | Sunburst | https://attack.mitre.org/techniques/T1033 |
| 48 | T1007 | System Service Discovery | Sunburst | https://attack.mitre.org/techniques/T1007 |
| 49 | T1497.003 | Virtualization/Sandbox Evasion: Time Based Evasion | Sunburst / Raindrop | https://attack.mitre.org/techniques/T1497/003 |
| 50 | T1497.001 | Virtualization/Sandbox Evasion: System Checks | Sunburst | https://attack.mitre.org/techniques/T1497/001 |
| 51 | T1047 | Windows Management Instrumentation | Sunburst | https://attack.mitre.org/techniques/T1047 |
| 52 | T1543.003 | Create or Modify System Process: Windows Service | Teardrop | https://attack.mitre.org/techniques/T1543/003 |
| 53 | T1140 | Deobfuscate/Decode Files or Information | Teardrop / Sunspot / Raindrop | https://attack.mitre.org/techniques/T1140 |
| 54 | T1134 | Access Token Manipulation | Sunspot | https://attack.mitre.org/techniques/T1134 |
| 55 | T1565.001 | Data Manipulation: Stored Data Manipulation | Sunspot | https://attack.mitre.org/techniques/T1565/001 |
| 56 | T1480 | Execution Guardrails | Sunspot | https://attack.mitre.org/techniques/T1480 |
| 57 | T1106 | Native API | Sunspot | https://attack.mitre.org/techniques/T1106 |
| 58 | T1087 | Account Discovery | UNC2452 | https://attack.mitre.org/techniques/T1087 |
| 59 | T1560 | Archive Collected Data: Archive via Utility | UNC2452 | https://attack.mitre.org/techniques/T1560/001 |
| 60 | T1555 | Credentials from Password Stores | UNC2452 | https://attack.mitre.org/techniques/T1555 |
| 61 | T1074.002 | Data Staged: Remote Data Staging | UNC2452 | https://attack.mitre.org/techniques/T1074/002 |
| 62 | T1587.001 | Develop Capabilities: Malware | UNC2452 | https://attack.mitre.org/techniques/T1587/001 |
| 63 | T1114.002 | Email Collection: Remote Email Collection | UNC2452 | https://attack.mitre.org/techniques/T1114/002 |
| 64 | T1048.002 | Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | UNC2452 | https://attack.mitre.org/techniques/T1048/002 |
| 65 | T1190 | Exploit Public-Facing Application | UNC2452 | https://attack.mitre.org/techniques/T1190 |
| 66 | T1003.006 | OS Credential Dumping: DCSync | UNC2452 | https://attack.mitre.org/techniques/T1003/006 |
| 67 | T1069 | Permission Groups Discovery | UNC2452 | https://attack.mitre.org/techniques/T1069 |
| 68 | T1090.001 | Proxy: Internal Proxy | UNC2452 | https://attack.mitre.org/techniques/T1090/001 |
| 69 | T1021.006 | Remote Services: Windows Remote Management | UNC2452 | https://attack.mitre.org/techniques/T1021/006 |
| 70 | T1018 | Remote System Discovery | UNC2452 | https://attack.mitre.org/techniques/T1018 |
| 71 | T1053.005 | Scheduled Task/Job: Scheduled Task | UNC2452 | https://attack.mitre.org/techniques/T1053/005 |
| 72 | T1550 | Use Alternate Authentication Material | UNC2452 | https://attack.mitre.org/techniques/T1550/ |
| 73 | T1550.004 | Web Session Cookie | UNC2452 | https://attack.mitre.org/techniques/T1550/004 |
| 74 | T1078 | Valid Accounts | UNC2452 | https://attack.mitre.org/techniques/T1078 |