{"description": "Enterprise techniques used by Gelsemium, ATT&CK software S0666 (v1.2)", "name": "Gelsemium (S0666)", "domain": "enterprise-attack", "versions": {"layer": "4.5", "attack": "17", "navigator": "5.1.0"}, "techniques": [{"techniqueID": "T1548", "showSubtechniques": true}, {"techniqueID": "T1548.002", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can bypass UAC to elevate process privileges on a compromised host.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1134", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can use token manipulation to bypass UAC on Windows7 systems.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1071", "showSubtechniques": true}, {"techniqueID": "T1071.001", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can use HTTP/S in C2 communications.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1071.004", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) has the ability to use DNS in communication with C2.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1547", "showSubtechniques": true}, {"techniqueID": "T1547.001", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can set persistence with a Registry run key.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1547.012", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can drop itself in C:\\Windows\\System32\\spool\\prtprocs\\x64\\winprint.dll to be loaded automatically by the spoolsv Windows service.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1059", "showSubtechniques": true}, {"techniqueID": "T1059.003", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can use a batch script to delete itself.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1543", "showSubtechniques": true}, {"techniqueID": "T1543.003", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can drop itself in `C:\\Windows\\System32\\spool\\prtprocs\\x64\\winprint.dll` as an alternative Print Processor to be loaded automatically when the spoolsv Windows service starts.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1005", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can collect data from a compromised host.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1140", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can decompress and decrypt DLLs and shellcode.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1568", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can use dynamic DNS domain names in C2.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1008", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can use multiple domains and protocols in C2.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1083", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can retrieve data from specific Windows directories, as well as open random files as part of [Virtualization/Sandbox Evasion](https://attack.mitre.org/techniques/T1497).(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1070", "showSubtechniques": true}, {"techniqueID": "T1070.004", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can delete its dropper component from the targeted system.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1070.006", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) has the ability to perform timestomping of files on targeted systems.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1105", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can download additional plug-ins to a compromised host.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1559", "showSubtechniques": true}, {"techniqueID": "T1559.001", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can use the `IARPUinstallerStringLauncher` COM interface are part of its UAC bypass process.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1036", "showSubtechniques": true}, {"techniqueID": "T1036.001", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) has used unverified signatures on malicious DLLs.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1036.005", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) has named malicious binaries `serv.exe`, `winprint.dll`, and `chrome_elf.dll` and has set its persistence in the Registry with the key value Chrome Update to appear legitimate.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1112", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can modify the Registry to store its components.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1106", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) has the ability to use various Windows API functions to perform tasks.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1095", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) has the ability to use TCP and UDP in C2 communications.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1027", "showSubtechniques": true}, {"techniqueID": "T1027.011", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can store its components in the Registry.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1027.015", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) has the ability to compress its components.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1027.016", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can use junk code to hide functions and evade detection.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1057", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can enumerate running processes.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1055", "showSubtechniques": true}, {"techniqueID": "T1055.001", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) has the ability to inject DLLs into specific processes.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1012", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can open random files and Registry keys to obscure malware behavior from sandbox analysis.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1620", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can use custom shellcode to map embedded DLLs into memory.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1518", "showSubtechniques": true}, {"techniqueID": "T1518.001", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can check for the presence of specific security products.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1082", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can determine the operating system and whether a targeted machine has a 32 or 64 bit architecture.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1033", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) has the ability to distinguish between a standard user and an administrator on a compromised host.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1497", "comment": "[Gelsemium](https://attack.mitre.org/software/S0666) can use junk code to generate random activity to obscure malware behavior.(Citation: ESET Gelsemium June 2021)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}], "gradient": {"colors": ["#ffffff", "#66b1ff"], "minValue": 0, "maxValue": 1}, "legendItems": [{"label": "used by Gelsemium", "color": "#66b1ff"}]}