prompt
stringclasses
508 values
procedure
stringlengths
20
478
System Time Discovery
BADHATCH can obtain the DATETIME from a compromised machine.
System Time Discovery
Bazar can collect the time on the compromised host.
System Time Discovery
BendyBear has the ability to determine local time on a compromised host.
System Time Discovery
Bisonal can check the system time set on the infected host.
System Time Discovery
BLUELIGHT can collect the local time on a compromised host.
System Time Discovery
It has used net time to check the local time on a target system.
System Time Discovery
build_downer has the ability to determine the local time to ensure malware installation only happens during the hours that the infected system is active.
System Time Discovery
During C0015, the threat actors used the command net view /all time to gather the local time of a compromised network.
System Time Discovery
Cannon can collect the current time zone information from the victim’s machine.
System Time Discovery
Carbon uses the command net time \127.0.0.1 to get information the system’s time.
System Time Discovery
ccf32 can determine the local time on targeted machines.
System Time Discovery
It has used time /t and net time \ip/hostname for system time discovery.
System Time Discovery
Clambling can determine the current time.
System Time Discovery
ComRAT has checked the victim system's date and time to perform tasks during business hours (9 to 5, Monday to Friday).
System Time Discovery
Conficker uses the current UTC victim system date for domain generation and connects to time servers to determine the current date.
System Time Discovery
Crimson has the ability to determine the date and time on a compromised host.
System Time Discovery
It malware can obtain system time from a compromised host.
System Time Discovery
DarkWatchman can collect the time zone information from the system.
System Time Discovery
DCSrv can compare the current time on an infected host with a configuration value to determine when to start the encryption process.
System Time Discovery
DRATzarus can use the GetTickCount and GetSystemTimeAsFileTime API calls to inspect system time.
System Time Discovery
Egregor contains functionality to query the local/system time.
System Time Discovery
Epic uses the net time command to get the system time from the machine and collect the current date and time zone information.
System Time Discovery
EvilBunny has used the API calls NtQuerySystemTime, GetSystemTimeAsFileTime, and GetTickCount to gather time metrics as part of its checks to see if the malware is running in a sandbox.
System Time Discovery
FELIXROOT gathers the time zone information from the victim’s machine.
System Time Discovery
FunnyDream can check system time to help determine when changes were made to specified files.
System Time Discovery
GoldMax can check the current date-time value of the compromised system, comparing it to the hardcoded execution trigger and can send the current timestamp to the C2 server.
System Time Discovery
Grandoreiro can determine the time on the victim machine via IPinfo.
System Time Discovery
GravityRAT can obtain the date and time of a system.
System Time Discovery
Green Lambert can collect the date and time from a compromised host.
System Time Discovery
GRIFFON has used a reconnaissance module that can be used to retrieve the date and time of the system.
System Time Discovery
It used a function to gather the current time.
System Time Discovery
HOPLIGHT has been observed collecting system time from victim machines.
System Time Discovery
InvisiMole gathers the local system time from the victim’s machine.
System Time Discovery
KEYPLUG can obtain the current tick count of an infected computer.
System Time Discovery
A Destover-like implant used by It can obtain the current system time and send it to the C2 server.
System Time Discovery
Metamorfo uses JavaScript to get the system time.
System Time Discovery
MoonWind obtains the victim's current time.
System Time Discovery
The net time command can be used in Net to determine the local or remote system time.
System Time Discovery
NOKKI can collect the current timestamp of the victim's machine.
System Time Discovery
Okrum can obtain the date and time of the compromised system.
System Time Discovery
OopsIE checks to see if the system is configured with "Daylight" time and checks for a specific region to be set for the timezone.
System Time Discovery
During Operation CuckooBees, the threat actors used the net time command as part of their advanced reconnaissance.
System Time Discovery
During Operation Wocao, threat actors used the time command to retrieve the current time of a compromised system.
System Time Discovery
PipeMon can send time zone information from a compromised host to C2.
System Time Discovery
PowerDuke has commands to get the time the machine was built, the time, and the time zone.
System Time Discovery
As part of the data reconnaissance phase, Proxysvc grabs the system time to send back to the control server.
System Time Discovery
QakBot can identify the system time on a targeted host.
System Time Discovery
It can obtain the victim time zone.
System Time Discovery
ShadowPad has collected the current date and time of the victim system.
System Time Discovery
Shamoon obtains the system time and will only activate if it is greater than a preset date.
System Time Discovery
SHARPSTATS has the ability to identify the current date and time on the compromised host.
System Time Discovery
It has used tools to obtain the current system time.
System Time Discovery
SILENTTRINITY can collect start time information from a compromised host.
System Time Discovery
SombRAT can execute getinfo to discover the current time on a compromised host.
System Time Discovery
StoneDrill can obtain the current date and time of the victim machine.
System Time Discovery
StrifeWater can collect the time zone from the victim's machine.
System Time Discovery
Stuxnet collects the time and date of a system when it is infected.
System Time Discovery
SVCReady can collect time zone information.
System Time Discovery
T9000 gathers and beacons the system time during installation.
System Time Discovery
Taidoor can use GetLocalTime and GetSystemTime to collect system time.
System Time Discovery
TAINTEDSCRIBE can execute GetLocalTime for time discovery.
System Time Discovery
TajMahal has the ability to determine local time on a compromised host.
System Time Discovery
It has checked the current date on the victim system.
System Time Discovery
Torisma can collect the current time on a victim machine.
System Time Discovery
It surveys a system upon check-in to discover the system time by using the net time command.
System Time Discovery
UPPERCUT has the capability to obtain the time zone information and current timestamp of the victim’s machine.
System Time Discovery
WindTail has the ability to generate the current date and time.
System Time Discovery
Zebrocy gathers the current time zone and date information from the system.
System Time Discovery
Zeus Panda collects the current system time (UTC) and sends it back to the C2 server.
System Time Discovery
ItM has used a tool to capture the time on a compromised host in order to register it with C2.
Virtualization
Agent Tesla has the ability to perform anti-sandboxing and anti-virtualization checks.
Virtualization
Bazar can attempt to overload sandbox analysis by sending 1550 calls to printf.
Virtualization
Bisonal can check to determine if the compromised system is running on VMware.
Virtualization
Black Basta can make a random number of calls to the kernel32.beep function to hinder log analysis.
Virtualization
Bumblebee has the ability to perform anti-virtualization checks.
Virtualization
Carberp has removed various hooks before installing the trojan or bootkit to evade sandbox analysis or other analysis software.
Virtualization
CHOPSTICK includes runtime checks to identify an analysis environment and prevent execution on it.
Virtualization
Some versions of CozyCar will check to ensure it is not being executed inside a virtual machine or a known malware analysis sandbox environment. If it detects that it is, it will exit.
Virtualization
It malware has employed just-in-time decryption of strings to evade sandbox detection.
Virtualization
Egregor has used multiple anti-analysis and anti-sandbox techniques to prevent automated analysis by sandboxes.
Virtualization
Gelsemium can use junk code to generate random activity to obscure malware behavior.
Virtualization
Hancitor has used a macro to check that an ActiveDocument shape object in the lure message is present. If this object is not found, the macro will exit without downloading additional payloads.
Virtualization
Kevin can sleep for a time interval between C2 communication attempts.
Virtualization
Metamorfo has embedded a "vmdetect.exe" executable to identify virtual machines at the beginning of execution.
Virtualization
During Operation Spalax, the threat actors used droppers that would run anti-analysis checks before executing malware on a compromised host.
Virtualization
Pteranodon has the ability to use anti-detection functions to identify sandbox environments.
Virtualization
It can detect if it is running within a sandbox or other virtualized analysis environment.
Virtualization
Squirrelwaffle has contained a hardcoded list of IP addresses to block that belong to sandboxes and analysis platforms.
Virtualization
StoneDrill has used several anti-emulation techniques to prevent automated analysis by emulators or sandboxes.
Virtualization
Astaroth can check for Windows product ID's used by sandboxes and usernames and disk serial numbers associated with analyst environments.
Virtualization
AsyncRAT can identify strings such as Virtual, vmware, or VirtualBox to detect virtualized environments.
Virtualization
Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts, such as communication with I/O ports and using VM-specific instructions.
Virtualization
BadPatch attempts to detect if it is being run in a Virtual Machine (VM) using a WMI query for disk drive name, BIOS, and motherboard information.
Virtualization
Black Basta can check system flags and libraries, process timing, and API's to detect code emulation or sandboxing.
Virtualization
BLUELIGHT can check to see if the infected machine has VM tools running.
Virtualization
Bumblebee has the ability to search for designated file paths and Registry keys that indicate a virtualized environment from multiple products.
Virtualization
CSPY Downloader can search loaded modules, PEB structure, file paths, Registry keys, and memory to determine if it is being debugged or running in a virtual environment.
Virtualization
It malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names, if a filename ends with .Md5.exe, and if the program is executed from the root of the C:\ drive, as well as checks for sandbox-related libraries.
Virtualization
DarkTortilla can search a compromised system's running processes and services to detect Hyper-V, QEMU, Virtual PC, Virtual Box, and VMware, as well as Sandboxie.
Virtualization
Denis ran multiple system checks, looking for processor and register characteristics, to evade emulation and analysis.