{"description": "Enterprise techniques used by PAKLOG, ATT&CK software S1233 (v1.0)", "name": "PAKLOG (S1233)", "domain": "enterprise-attack", "versions": {"layer": "4.5", "attack": "19", "navigator": "5.3.2"}, "techniques": [{"techniqueID": "T1010", "comment": "[PAKLOG](https://attack.mitre.org/software/S1233) has used `GetForegroundWindow` to access the foreground window. (Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)  [PAKLOG](https://attack.mitre.org/software/S1233) has also captured text from the foreground windows.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1115", "comment": "[PAKLOG](https://attack.mitre.org/software/S1233) has monitored and extracted clipboard contents.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1074", "showSubtechniques": true}, {"techniqueID": "T1074.001", "comment": "[PAKLOG](https://attack.mitre.org/software/S1233) has stored the captured data in a file located `C:\\\\Users\\\\Public\\\\Libraries\\\\record.txt`.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1574", "showSubtechniques": true}, {"techniqueID": "T1574.001", "comment": "[PAKLOG](https://attack.mitre.org/software/S1233) has leveraged legitimate binaries to conduct DLL side-loading.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1056", "showSubtechniques": true}, {"techniqueID": "T1056.001", "comment": "[PAKLOG](https://attack.mitre.org/software/S1233) has captured keystrokes using Windows API.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1106", "comment": "[PAKLOG](https://attack.mitre.org/software/S1233) has used Windows API `SetWindowsHookExW` with `idHook` set to `WH_KEYBOARD_LL` and a custom hook procedure to support its keylogging functions.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1027", "showSubtechniques": true}, {"techniqueID": "T1027.013", "comment": "[PAKLOG](https://attack.mitre.org/software/S1233) has utilized a simple encoding mechanism to encode characters in the buffer.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)  ", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1057", "comment": "[PAKLOG](https://attack.mitre.org/software/S1233) has detected and logged the full path of processes active in the foreground using Windows API calls.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}, {"techniqueID": "T1553", "showSubtechniques": true}, {"techniqueID": "T1553.002", "comment": "[PAKLOG](https://attack.mitre.org/software/S1233) has used legitimate signed binaries such as PACLOUD.exe for follow-on execution of malicious DLLs through DLL Side-Loading.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": true}, {"techniqueID": "T1124", "comment": "[PAKLOG](https://attack.mitre.org/software/S1233) has collected a timestamp to log the precise time a key was pressed, formatted as %Y-%m-%d %H:%M:%S.(Citation: Zscaler PAKLOG CorkLog SplatCloak Splatdropper April 2025)", "score": 1, "color": "#66b1ff", "showSubtechniques": false}], "gradient": {"colors": ["#ffffff", "#66b1ff"], "minValue": 0, "maxValue": 1}, "legendItems": [{"label": "used by PAKLOG", "color": "#66b1ff"}]}