| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | |
| Enterprise | T1059 | .003 | Command and Scripting Interpreter: Windows Command Shell | |
| Enterprise | T1005 | Data from Local System | PcShare can collect files and information from a compromised host.[1] | |
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | PcShare has decrypted its strings by applying a XOR operation and a decompression using a custom implemented LZM algorithm.[1] | |
| Enterprise | T1546 | .015 | Event Triggered Execution: Component Object Model Hijacking | PcShare has created the  | 
| Enterprise | T1041 | Exfiltration Over C2 Channel | PcShare can upload files and information from a compromised host to its C2 servers.[1] | |
| Enterprise | T1070 | .004 | Indicator Removal: File Deletion | PcShare has deleted its files and components from a compromised host.[1] | 
| Enterprise | T1056 | .001 | Input Capture: Keylogging | |
| Enterprise | T1036 | .001 | Masquerading: Invalid Code Signature | PcShare has used an invalid certificate in attempt to appear legitimate.[1] | 
| .005 | Masquerading: Match Legitimate Name or Location | PcShare has been named  | ||
| Enterprise | T1112 | Modify Registry | PcShare can delete its persistence mechanisms from the registry.[1] | |
| Enterprise | T1106 | Native API | ||
| Enterprise | T1027 | .013 | Obfuscated Files or Information: Encrypted/Encoded File | PcShare has been encrypted with XOR using different 32-long Base16 strings and compressed with LZW algorithm.[1] | 
| Enterprise | T1057 | Process Discovery | PcShare can obtain a list of running processes on a compromised host.[1] | |
| Enterprise | T1055 | Process Injection | The PcShare payload has been injected into the  | |
| Enterprise | T1012 | Query Registry | PcShare can search the registry files of a compromised host.[1] | |
| Enterprise | T1113 | Screen Capture | ||
| Enterprise | T1218 | .011 | System Binary Proxy Execution: Rundll32 | |
| Enterprise | T1016 | System Network Configuration Discovery | PcShare can obtain the proxy settings of a compromised machine using  | |
| Enterprise | T1125 | Video Capture | PcShare can capture camera video as part of its collection process.[1] | |
| ID | Name | Description | 
|---|---|---|
| C0007 | FunnyDream | During FunnyDream the threat actors used a customized version of PcShare.[1] |