Overview
overview
10Static
static
81667e16357...43.exe
windows7_x64
31667e16357...43.exe
windows10_x64
317139a10fd...61.exe
windows7_x64
1017139a10fd...61.exe
windows10_x64
101cc7c198a8...cb.exe
windows7_x64
101cc7c198a8...cb.exe
windows10_x64
10243dff06fc...60.exe
windows7_x64
10243dff06fc...60.exe
windows10_x64
1027214dcb04...8f.exe
windows7_x64
1027214dcb04...8f.exe
windows10_x64
103dabd40d56...a6.exe
windows7_x64
33dabd40d56...a6.exe
windows10_x64
343e61519be...aa.exe
windows7_x64
1043e61519be...aa.exe
windows10_x64
1048a848bc9e...3a.exe
windows7_x64
1048a848bc9e...3a.exe
windows10_x64
10508dd6f7ed...dd.exe
windows7_x64
10508dd6f7ed...dd.exe
windows10_x64
10516664139b...4b.exe
windows7_x64
10516664139b...4b.exe
windows10_x64
10533672da9d...8d.exe
windows7_x64
10533672da9d...8d.exe
windows10_x64
106228f75f52...ff.exe
windows7_x64
106228f75f52...ff.exe
windows10_x64
106836ec8588...d8.exe
windows7_x64
36836ec8588...d8.exe
windows10_x64
368872cc22f...e7.exe
windows7_x64
1068872cc22f...e7.exe
windows10_x64
10691515a485...a5.exe
windows7_x64
10691515a485...a5.exe
windows10_x64
1078782fd324...34.exe
windows7_x64
1078782fd324...34.exe
windows10_x64
10General
-
Target
Darkside.5687806091100160.zip
-
Size
15MB
-
Sample
210512-7y9jvkwby6
-
MD5
86602f27296d6eeb87afaa6e910373d9
-
SHA1
468c063ae10297277cf02bd84e7f93a14e8cab75
-
SHA256
89eeac2abad61ef22fd914f9c4efaba04ca830d93ab1611c985531ac6d5e8460
-
SHA512
cd629265c6b10e86371d36748cf30dc6e118d1a02829da4a0d97d27ccf2b69a97af35b2458e54f8e474b93285fdaeba922619af24a020938a8e75a391020a744
Static task
static1
Behavioral task
behavioral1
Sample
1667e1635736f2b2ba9727457f995a67201ddcd818496c9296713ffa18e17a43.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
1667e1635736f2b2ba9727457f995a67201ddcd818496c9296713ffa18e17a43.exe
Resource
win10v20210410
Behavioral task
behavioral3
Sample
17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe
Resource
win7v20210410
Behavioral task
behavioral4
Sample
17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61.exe
Resource
win10v20210410
Behavioral task
behavioral5
Sample
1cc7c198a8a2c935fd6f07970479e544f5b35a8eb3173de0305ebdf76a0988cb.exe
Resource
win7v20210410
Behavioral task
behavioral6
Sample
1cc7c198a8a2c935fd6f07970479e544f5b35a8eb3173de0305ebdf76a0988cb.exe
Resource
win10v20210410
Behavioral task
behavioral7
Sample
243dff06fc80a049f4fb37292f8b8def0fce29768f345c88ee10699e22b0ae60.exe
Resource
win7v20210410
Behavioral task
behavioral8
Sample
243dff06fc80a049f4fb37292f8b8def0fce29768f345c88ee10699e22b0ae60.exe
Resource
win10v20210410
Behavioral task
behavioral9
Sample
27214dcb04310040c38f8d6a65fe03c14b18d4171390da271855fdd02e06768f.exe
Resource
win7v20210410
Behavioral task
behavioral10
Sample
27214dcb04310040c38f8d6a65fe03c14b18d4171390da271855fdd02e06768f.exe
Resource
win10v20210410
Behavioral task
behavioral11
Sample
3dabd40d564cf8a8163432abc38768b0a7d45f0fc1970d802dc33b9109feb6a6.exe
Resource
win7v20210410
Behavioral task
behavioral12
Sample
3dabd40d564cf8a8163432abc38768b0a7d45f0fc1970d802dc33b9109feb6a6.exe
Resource
win10v20210410
Behavioral task
behavioral13
Sample
43e61519be440115eeaa3738a0e4aa4bb3c8ac5f9bdfce1a896db17a374eb8aa.exe
Resource
win7v20210410
Behavioral task
behavioral14
Sample
43e61519be440115eeaa3738a0e4aa4bb3c8ac5f9bdfce1a896db17a374eb8aa.exe
Resource
win10v20210410
Behavioral task
behavioral15
Sample
48a848bc9e0f126b41e5ca196707412c7c40087404c0c8ed70e5cee4a418203a.exe
Resource
win7v20210410
Behavioral task
behavioral16
Sample
48a848bc9e0f126b41e5ca196707412c7c40087404c0c8ed70e5cee4a418203a.exe
Resource
win10v20210410
Behavioral task
behavioral17
Sample
508dd6f7ed6c143cf5e1ed6a4051dd8ee7b5bf4b7f55e0704d21ba785f2d5add.exe
Resource
win7v20210410
Behavioral task
behavioral18
Sample
508dd6f7ed6c143cf5e1ed6a4051dd8ee7b5bf4b7f55e0704d21ba785f2d5add.exe
Resource
win10v20210410
Behavioral task
behavioral19
Sample
516664139b0ddd044397a56482d7308d87c213c320a3151ccb9738e8f932654b.exe
Resource
win7v20210410
Behavioral task
behavioral20
Sample
516664139b0ddd044397a56482d7308d87c213c320a3151ccb9738e8f932654b.exe
Resource
win10v20210410
Behavioral task
behavioral21
Sample
533672da9d276012ebab3ce9f4cd09a7f537f65c6e4b63d43f0c1697e2f5e48d.exe
Resource
win7v20210410
Behavioral task
behavioral22
Sample
533672da9d276012ebab3ce9f4cd09a7f537f65c6e4b63d43f0c1697e2f5e48d.exe
Resource
win10v20210410
Behavioral task
behavioral23
Sample
6228f75f52fd69488419c0e0eb3617b5b894a566a93e52b99a9addced7364cff.exe
Resource
win7v20210410
Behavioral task
behavioral24
Sample
6228f75f52fd69488419c0e0eb3617b5b894a566a93e52b99a9addced7364cff.exe
Resource
win10v20210410
Behavioral task
behavioral25
Sample
6836ec8588b8049bcd57cd920b7a75f1e206e5e8bb316927784afadb634ea4d8.exe
Resource
win7v20210410
Behavioral task
behavioral26
Sample
6836ec8588b8049bcd57cd920b7a75f1e206e5e8bb316927784afadb634ea4d8.exe
Resource
win10v20210410
Behavioral task
behavioral27
Sample
68872cc22fbdf0c2f69c32ac878ba9a7b7cf61fe5dd0e3da200131b8b23438e7.exe
Resource
win7v20210410
Behavioral task
behavioral28
Sample
68872cc22fbdf0c2f69c32ac878ba9a7b7cf61fe5dd0e3da200131b8b23438e7.exe
Resource
win10v20210410
Behavioral task
behavioral29
Sample
691515a485b0b3989fb71c6807e640eeec1a0e30d90500db6414035d942f70a5.exe
Resource
win7v20210410
Behavioral task
behavioral30
Sample
691515a485b0b3989fb71c6807e640eeec1a0e30d90500db6414035d942f70a5.exe
Resource
win10v20210410
Behavioral task
behavioral31
Sample
78782fd324bc98a57274bd3fff8f756217c011484ebf6b614060115a699ee134.exe
Resource
win7v20210410
Behavioral task
behavioral32
Sample
78782fd324bc98a57274bd3fff8f756217c011484ebf6b614060115a699ee134.exe
Resource
win10v20210410
Malware Config
Extracted
C:\\README.341d6443.TXT
darkside
http://darksidedxcftmqa.onion/polifilm/AWeu5Sv7zTTCTjZD8YkgoPRznfE5r7G-vbsXok9EvfiaNL_eDwRlgRMruMHisnEF
http://darksidfqzcuhtk2.onion/2AHUVJ3VGS97NUG5J5EYMQM5PJO77V9V0GDT3UYIJGFZUTOQRLUX593CQ2EZ2ZEH
Extracted
C:\\README.341d6443.TXT
darkside
http://darksidfqzcuhtk2.onion/CZEX8E0GR0AO4ASUCJE1K824OKJA1G24B8B3G0P84LJTTE7W8EC86JBE7NBXLMRT
Extracted
C:\\README.341d6443.TXT
http://darksidfqzcuhtk2.onion/LYID3U99RAJSTEYEFWS6SLYDGMUXKNAT3OPKN9D56PIGX1QHBU5DHGUN4HGMX2IW
Extracted
C:\\README.341d6443.TXT
darkside
http://darksidedxcftmqa.onion/blog/article/id/62/HaER8VXDfRbMaspeLi3Za1LoRutpsd_nKm-yHc5RAJk1xxMFe2jnOQlD70US6XCT
http://darksidfqzcuhtk2.onion/SN8W532EY9MVOD09H4HBVZ1RI9RS4AATPO11NCDX0JKZ7GAPU6K6CV3CVLSS2NMH
Extracted
C:\\README.341d6443.TXT
darkside
http://darksidfqzcuhtk2.onion/DZYNTXY9RP5P8DQ96EFKV2YTOVAMA3VVHL5V0RASUBLBWZGLG51U4LOOBSHV9R0Y
Extracted
C:\\README.98239029.TXT
darkside
http://darksidedxcftmqa.onion/blog/article/id/6/dQDclB_6Kg-c-6fJesONyHoaKh9BtI8j9Wkw2inG8O72jWaOcKbrxMWbPfKrUbHC
http://darksidfqzcuhtk2.onion/K71D6P88YTX04R3ISCJZHMD5IYV55V9247QHJY0HJYUXX68H2P05XPRIR5SP2U68
Extracted
C:\\README.341d6443.TXT
darkside
http://darksidfqzcuhtk2.onion/OBB5DDMR8RB9DI2RYYF376YGBJAV2J4F2NXFEWPBSXY709MAA0MY7PMBBQJ0HVG3
Extracted
C:\\README.949640ab.TXT
darkside
http://dark24vx6fsmdrtbzdzjv6ckz4yqyued4uz455oqpctko7m6vbrzibad.onion/XES2TUV3A9QL89IS7QX91V7TYSF13ASPGB2TASQ68R9Z6QYH69OVY833QSRSFU4I
Extracted
C:\\README.341d6443.TXT
darkside
http://darksidfqzcuhtk2.onion/VGBU8VAXXW7EYB5U4KQJXUGU5NT5FP8208W6UXVSKQDAE3CNBR4JTZQCXEZFZWF2
Extracted
C:\\README.341d6443.TXT
darkside
http://darksidfqzcuhtk2.onion/45NAQ3FNBX002JPHBAIKB97JVVABJQHTM2HO7XOZRXTEH98CRPXYX09X7VUH0F0W
Targets
-
-
Target
1667e1635736f2b2ba9727457f995a67201ddcd818496c9296713ffa18e17a43
-
Size
40KB
-
MD5
1a700f845849e573ab3148daef1a3b0b
-
SHA1
c91ff86a88038b00d9190ebb01e6f8c94b0c83e0
-
SHA256
1667e1635736f2b2ba9727457f995a67201ddcd818496c9296713ffa18e17a43
-
SHA512
d7fcf0ef26bbe1d6104c098711ccdfd33655e62045f6975dd3c48ab34888c83b771dfd07682004943bab86b2dbcb7905364becead09c37de3da0b28e8265dc81
Score3/10 -
-
-
Target
17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61
-
Size
59KB
-
MD5
cfcfb68901ffe513e9f0d76b17d02f96
-
SHA1
766b30e5a37d1bc8d8fe5c7cacc314504a44ac1f
-
SHA256
17139a10fd226d01738fe9323918614aa913b2a50e1a516e95cced93fa151c61
-
SHA512
0d26fa9478f4626107e38c570d1bae1049b744181cf0395d95fb07675575ca393d88d4783bf31bdf11bef1da5648a5a53a6d95b21492f96b4de35c0ec323ae0c
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
1cc7c198a8a2c935fd6f07970479e544f5b35a8eb3173de0305ebdf76a0988cb
-
Size
59KB
-
MD5
6a7fdab1c7f6c5a5482749be5c4bf1a4
-
SHA1
4e6d303d96621769b491777209c237b4061e3285
-
SHA256
1cc7c198a8a2c935fd6f07970479e544f5b35a8eb3173de0305ebdf76a0988cb
-
SHA512
39446ebfae1dd0e007e81087f42021b95ee5a0a04e22ca7f4f5addbea4e71c7fe09ffd3bf953400955ce6d31b535c81a37b018aba73c30e61575b2c49414d6cd
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Sets desktop wallpaper using registry
-
-
-
Target
243dff06fc80a049f4fb37292f8b8def0fce29768f345c88ee10699e22b0ae60
-
Size
59KB
-
MD5
0ed51a595631e9b4d60896ab5573332f
-
SHA1
7ae73b5e1622049380c9b615ce3b7f636665584b
-
SHA256
243dff06fc80a049f4fb37292f8b8def0fce29768f345c88ee10699e22b0ae60
-
SHA512
9bfd6318b120c05d9a42a456511efc59f2be5ad451baa6d19d5de776e2ff74dbee444c85478ee7cfdbf705517cc147cd64c6814965f76c740fe1924594a37cb5
Score10/10-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets desktop wallpaper using registry
-
-
-
Target
27214dcb04310040c38f8d6a65fe03c14b18d4171390da271855fdd02e06768f
-
Size
59KB
-
MD5
3fd9b0117a0e79191859630148dcdc6d
-
SHA1
cf04fa736baf22a2ca4e67f1c7723f1776267e28
-
SHA256
27214dcb04310040c38f8d6a65fe03c14b18d4171390da271855fdd02e06768f
-
SHA512
c5175720f432c157eb34da92b29a15f1d7cee77240be12289d5cdb52419dd448b2081a579f783fd48d6226d49057eb3e79f38d85d335761089386a621d1419de
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets desktop wallpaper using registry
-
-
-
Target
3dabd40d564cf8a8163432abc38768b0a7d45f0fc1970d802dc33b9109feb6a6
-
Size
59KB
-
MD5
c4f1a1b73e4af0fbb63af8ee89a5a7fe
-
SHA1
5604a48ce74124fb478049976db48197896b6743
-
SHA256
3dabd40d564cf8a8163432abc38768b0a7d45f0fc1970d802dc33b9109feb6a6
-
SHA512
67e6b184b926b1de2fa1d4c429db33b4b4146a0c5eb6929422d6ec161654fc634dce7810a1deb0befdf7d932df1edfc02251d8193272c1d1c713a1df8da32ceb
Score3/10 -
-
-
Target
43e61519be440115eeaa3738a0e4aa4bb3c8ac5f9bdfce1a896db17a374eb8aa
-
Size
59KB
-
MD5
f9fc1a1a95d5723c140c2a8effc93722
-
SHA1
ce2480dec2ee0a47549fad355c3cf154f9aab836
-
SHA256
43e61519be440115eeaa3738a0e4aa4bb3c8ac5f9bdfce1a896db17a374eb8aa
-
SHA512
3816029ac654cfc546e78c5f331ad61ef21ebab0e92bacdba5a5d2cd9149002930cf46c9a1dab357697540849229d2fc0a490433aa95713d36685334ce8e8b11
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Deletes itself
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
48a848bc9e0f126b41e5ca196707412c7c40087404c0c8ed70e5cee4a418203a
-
Size
226KB
-
MD5
c81dae5c67fb72a2c2f24b178aea50b7
-
SHA1
4bd6437cd1dc77097a7951466531674f80c866c6
-
SHA256
48a848bc9e0f126b41e5ca196707412c7c40087404c0c8ed70e5cee4a418203a
-
SHA512
30d63e080f37f34fb29fd46f8fb1572d79f645154a002c8da5914ae3d51e224bc60601f91f5d58ac2ce9f81d56a8ad467d7fde55d429ed269df3c196e6687b2c
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
508dd6f7ed6c143cf5e1ed6a4051dd8ee7b5bf4b7f55e0704d21ba785f2d5add
-
Size
59KB
-
MD5
69ec3d1368adbe75f3766fc88bc64afc
-
SHA1
11936a92144ef1b53eef16566a57b9052d173291
-
SHA256
508dd6f7ed6c143cf5e1ed6a4051dd8ee7b5bf4b7f55e0704d21ba785f2d5add
-
SHA512
58f0f04cb05221e9a50eab89924c45bccc15045e9552e10f39ebbb651eddc5d4fafd95a1ba80f4a6ab8d23c4d3dfff7669e2499650b328420c766cae82e439e8
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets desktop wallpaper using registry
-
-
-
Target
516664139b0ddd044397a56482d7308d87c213c320a3151ccb9738e8f932654b
-
Size
56KB
-
MD5
84c1567969b86089cc33dccf41562bcd
-
SHA1
53f2133cb25186e9fa6d4ea3b0e41eee5aba5ef2
-
SHA256
516664139b0ddd044397a56482d7308d87c213c320a3151ccb9738e8f932654b
-
SHA512
72a411cacd503b6fadb15dc90f1f9beb79ff79c620df76da381e5c780c53e11258aae72db2848c241ec55af403d67d62340e429e86c23bbf8a71287738de7eaa
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
-
-
Target
533672da9d276012ebab3ce9f4cd09a7f537f65c6e4b63d43f0c1697e2f5e48d
-
Size
59KB
-
MD5
0e178c4808213ce50c2540468ce409d3
-
SHA1
38b5aa765026dffbb603e323333294b5f5efa5ee
-
SHA256
533672da9d276012ebab3ce9f4cd09a7f537f65c6e4b63d43f0c1697e2f5e48d
-
SHA512
262a8f4808f6c3499c9eb465b480508ed6b082ddd36cf2e618a9455b5abbc2eb6a8d7b7c2f398faaa62ffb22599a8b2eec0d3137fdec648de37ac4a73e6f44f4
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets desktop wallpaper using registry
-
-
-
Target
6228f75f52fd69488419c0e0eb3617b5b894a566a93e52b99a9addced7364cff
-
Size
59KB
-
MD5
5ff75d33080bb97a8e6b54875c221777
-
SHA1
810d6c70a96584486867cedde111a1087ed1ebe7
-
SHA256
6228f75f52fd69488419c0e0eb3617b5b894a566a93e52b99a9addced7364cff
-
SHA512
a6b87ddcaa797a4d8abc06a786a7186fe43eef5e3291402f81b95a180b7fb746f88cd0f408a089deb5321ecf0d2ac3cca479fdc1f782771749df0ac5a082ac00
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
6836ec8588b8049bcd57cd920b7a75f1e206e5e8bb316927784afadb634ea4d8
-
Size
40KB
-
MD5
1c33dc87c6fdb80725d732a5323341f9
-
SHA1
0aea126a9d01fc5faf06314529b4ff06fdc6f8cd
-
SHA256
6836ec8588b8049bcd57cd920b7a75f1e206e5e8bb316927784afadb634ea4d8
-
SHA512
50f915e355e66c264d1eaad3bda01034c99ddc8fdc78b03c653ef0ccb4a250e3d892c3b6131fd153c5b73b0ab7c6649c8465ff8dc02f42efb050f8f76906197b
Score3/10 -
-
-
Target
68872cc22fbdf0c2f69c32ac878ba9a7b7cf61fe5dd0e3da200131b8b23438e7
-
Size
59KB
-
MD5
9e779da82d86bcd4cc43ab29f929f73f
-
SHA1
e6b47869caa776840ab79856b04096152103c71d
-
SHA256
68872cc22fbdf0c2f69c32ac878ba9a7b7cf61fe5dd0e3da200131b8b23438e7
-
SHA512
e0a172b862054b63c26e8852019cbd46b68c6102e4bae802ba851ae950798d336295795c0cc5d68002a0467c62e5800f1ecfdae05de2709d57bcc31375276bb7
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets desktop wallpaper using registry
-
-
-
Target
691515a485b0b3989fb71c6807e640eeec1a0e30d90500db6414035d942f70a5
-
Size
59KB
-
MD5
e44450150e8683a0addd5c686cd4d202
-
SHA1
8c482a0eed33c8a4542c3cb2715a242f2259343d
-
SHA256
691515a485b0b3989fb71c6807e640eeec1a0e30d90500db6414035d942f70a5
-
SHA512
7d65d22ad630fd77c50e277a44fdcc46fa86235c93524f9751ac9ddf0ce19261707fab631108fc908a71029900dbf6ada119d607edfadc3ce309f86a9c3765fe
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
78782fd324bc98a57274bd3fff8f756217c011484ebf6b614060115a699ee134
-
Size
59KB
-
MD5
47a4420ad26f60bb6bba5645326fa963
-
SHA1
7a29a8f5e14da1ce40365849eb59487dbb389d08
-
SHA256
78782fd324bc98a57274bd3fff8f756217c011484ebf6b614060115a699ee134
-
SHA512
08c82585fbab8e090e67e4571f7428bffaf68f9a8c2e34b72f9688205ee880a6435aa813b8845a0b0281c80b78774b969032cc27fc98d3f0e67116dabcf77127
Score10/10-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Matrix
Collection
Data from Local System
12Command and Control
Credential Access
Credentials in Files
12Defense Evasion
Modify Registry
12Discovery
Query Registry
1System Information Discovery
4Peripheral Device Discovery
1Execution
Exfiltration
Impact
Defacement
12Initial Access
Lateral Movement
Persistence
Privilege Escalation