Play
Associated Group Descriptions |
|
Name | Description |
---|---|
Techniques Used |
||||
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1560 | .001 | Archive Collected Data: Archive via Utility |
Play has used WinRAR to compress files prior to exfiltration.(Citation: CISA Play Ransomware Advisory December 2023)(Citation: Trend Micro Ransomware Spotlight Play July 2023) |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
Play has used Base64-encoded PowerShell scripts to disable Microsoft Defender.(Citation: Trend Micro Ransomware Spotlight Play July 2023) |
.003 | Command and Scripting Interpreter: Windows Command Shell |
Play has used a batch script to remove indicators of its presence on compromised hosts.(Citation: Trend Micro Ransomware Spotlight Play July 2023) |
||
Enterprise | T1587 | .001 | Develop Capabilities: Malware |
Play developed and employ Playcrypt ransomware.(Citation: Trend Micro Ransomware Spotlight Play July 2023)(Citation: CISA Play Ransomware Advisory December 2023) |
Enterprise | T1562 | .001 | Impair Defenses: Disable or Modify Tools |
Play has used tools including GMER, IOBit, and PowerTool to disable antivirus software.(Citation: CISA Play Ransomware Advisory December 2023)(Citation: Trend Micro Ransomware Spotlight Play July 2023) |
Enterprise | T1070 | .001 | Indicator Removal: Clear Windows Event Logs |
Play has used tools to remove log files on targeted systems.(Citation: CISA Play Ransomware Advisory December 2023)(Citation: Trend Micro Ransomware Spotlight Play July 2023) |
.004 | Indicator Removal: File Deletion |
Play has used tools including Wevtutil to remove malicious files from compromised hosts.(Citation: Trend Micro Ransomware Spotlight Play July 2023) |
||
Enterprise | T1003 | .001 | OS Credential Dumping: LSASS Memory |
Play has used Mimikatz and the Windows Task Manager to dump LSASS process memory.(Citation: Trend Micro Ransomware Spotlight Play July 2023) |
Enterprise | T1027 | .010 | Obfuscated Files or Information: Command Obfuscation |
Play has used Base64-encoded PowerShell scripts for post exploit activities on compromised hosts.(Citation: Trend Micro Ransomware Spotlight Play July 2023) |
Enterprise | T1588 | .002 | Obtain Capabilities: Tool |
Play has used multiple tools for discovery and defense evasion purposes on compromised hosts.(Citation: CISA Play Ransomware Advisory December 2023) |
Enterprise | T1021 | .002 | Remote Services: SMB/Windows Admin Shares |
Play has used Cobalt Strike to move laterally via SMB.(Citation: Trend Micro Ransomware Spotlight Play July 2023) |
Enterprise | T1518 | .001 | Software Discovery: Security Software Discovery |
Play has used the information-stealing tool Grixba to scan for anti-virus software.(Citation: CISA Play Ransomware Advisory December 2023) |
Enterprise | T1078 | .002 | Valid Accounts: Domain Accounts |
Play has used valid domain accounts for access.(Citation: Trend Micro Ransomware Spotlight Play July 2023) |
.003 | Valid Accounts: Local Accounts |
Play has used valid local accounts to gain initial access.(Citation: Trend Micro Ransomware Spotlight Play July 2023) |
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.