| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | |
| Enterprise | T1574 | .001 | Hijack Execution Flow: DLL Search Order Hijacking |
Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to |
| Enterprise | T1105 | Ingress Tool Transfer | ||
| ID | Name | References |
|---|---|---|
| G0006 | APT1 |