prompt
stringclasses
508 values
procedure
stringlengths
20
478
Command and Scripting Interpreter:JavaScript
It has used JavaScript files to execute its POWERSTATS payload.
Command and Scripting Interpreter:JavaScript
NanHaiShu executes additional Jscript code on the victim's machine.
Command and Scripting Interpreter:JavaScript
During Operation Dust Storm, the threat actors used JavaScript code.
Command and Scripting Interpreter:JavaScript
POWERSTATS can use JavaScript code for execution.
Command and Scripting Interpreter:JavaScript
The QakBot web inject module can inject Java Script into web banking pages visited by the victim.
Command and Scripting Interpreter:JavaScript
It has used JavaScript to drop and execute malware loaders.
Command and Scripting Interpreter:JavaScript
It has used JS scripts.
Command and Scripting Interpreter:JavaScript
SpicyOmelette has the ability to execute arbitrary JavaScript code on a compromised host.
Command and Scripting Interpreter:JavaScript
It has used JavaScript for code execution.
Command and Scripting Interpreter:JavaScript
It has used various JavaScript-based backdoors.
Command and Scripting Interpreter:JavaScript
Valak can execute JavaScript containing configuration data for establishing persistence.
Command and Scripting Interpreter:JavaScript
Xbash can execute malicious JavaScript payloads on the victim’s machine.
Command and Scripting Interpreter:Cloud API
It has leveraged the Microsoft Graph API to perform various actions across Azure and M365 environments. They have also utilized AADInternals PowerShell Modules to access the API
Command and Scripting Interpreter:Cloud API
Pacu leverages the AWS CLI for its operations.
Command and Scripting Interpreter:Cloud API
It has leveraged AWS CLI to enumerate cloud environments with compromised credentials.
Container Administration Command
Hildegard was executed through the kubelet API run command and by executing commands on running containers.
Container Administration Command
Kinsing was executed with an Ubuntu container entry point that runs shell scripts.
Container Administration Command
Peirates can use kubectl or the Kubernetes API to run commands.
Container Administration Command
Siloscape can send kubectl commands to victim clusters through an IRC channel and can run kubectl locally to spread once within a victim cluster.
Container Administration Command
It executed Hildegard through the kubelet API run command and by executing commands on running containers.
Deploy Container
Doki was run through a deployed container.
Deploy Container
Kinsing was run through a deployed Ubuntu container.
Deploy Container
Peirates can deploy a pod that mounts its node’s root file system, then execute a command to create a reverse shell on the node.
Deploy Container
It has deployed different types of containers into victim environments to facilitate execution. It has also transferred cryptocurrency mining software to Kubernetes clusters discovered within local IP address ranges.
Exploitation for Client Execution
It has exploited client software vulnerabilities for execution, such as Microsoft Word CVE-2012-0158.
Exploitation for Client Execution
Agent Tesla has exploited Office vulnerabilities such as CVE-2017-11882 and CVE-2017-8570 for execution during delivery.
Exploitation for Client Execution
It has exploited numerous ActiveX vulnerabilities, including zero-days.
Exploitation for Client Execution
It has exploited CVE-2012-0158 and CVE-2010-3333 for execution against targeted systems.
Exploitation for Client Execution
It has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities (CVE-2009-3129, CVE-2012-0158) and vulnerabilities in Adobe Reader and Flash (CVE-2009-4324, CVE-2009-0927, CVE-2011-0609, CVE-2011-0611).
Exploitation for Client Execution
It has exploited Microsoft Office vulnerability CVE-2017-0262 for execution.
Exploitation for Client Execution
It has used multiple software exploits for common client software, like Microsoft Word, Exchange, and Adobe Reader, to gain code execution.
Exploitation for Client Execution
It has exploited the Adobe Flash Player vulnerability CVE-2015-3113 and Internet Explorer vulnerability CVE-2014-1776.
Exploitation for Client Execution
It has used RTF document that includes an exploit to execute malicious code. (CVE-2017-11882)
Exploitation for Client Execution
It has attempted to exploit a known vulnerability in WinRAR (CVE-2018-20250), and attempted to gain remote code execution via a security bypass vulnerability (CVE-2017-11774).
Exploitation for Client Execution
It has used exploits for Flash Player (CVE-2016-4117, CVE-2018-4878), Word (CVE-2017-0199), Internet Explorer (CVE-2020-1380 and CVE-2020-26411), and Microsoft Edge (CVE-2021-26411) for execution.
Exploitation for Client Execution
It leveraged the follow exploits in their operations: CVE-2012-0158, CVE-2015-1641, CVE-2017-0199, CVE-2017-11882, and CVE-2019-3396.
Exploitation for Client Execution
It has used exploits for multiple vulnerabilities including CVE-2014-0322, CVE-2012-4792, CVE-2012-1889, and CVE-2013-3893.
Exploitation for Client Execution
Bankshot leverages a known zero-day vulnerability in Adobe Flash to execute the implant into the victims’ machines.
Exploitation for Client Execution
It has exploited Microsoft Office vulnerabilities CVE-2012-0158, CVE-2017-11882, CVE-2018-0798, and CVE-2018-0802.
Exploitation for Client Execution
It has exploited multiple vulnerabilities for execution, including Microsoft Office vulnerabilities CVE-2012-0158, CVE-2014-6352, CVE-2017-0199, and Adobe Flash CVE-2015-5119.
Exploitation for Client Execution
It has exploited Microsoft Office vulnerabilities CVE-2014-4114, CVE-2018-0802, and CVE-2018-0798 for execution.
Exploitation for Client Execution
It had exploited multiple vulnerabilities for execution, including Microsoft’s It Editor (CVE-2017-11882), an Internet Explorer vulnerability (CVE-2018-8174), CVE-2017-8570, CVE-2017-0199, and CVE-2017-8759.
Exploitation for Client Execution
Cobalt Strike can exploit Oracle Java vulnerabilities for execution, including CVE-2011-3544, CVE-2013-2465, CVE-2012-4681, and CVE-2013-2460.
Exploitation for Client Execution
It has exploited Microsoft Office vulnerabilities, including CVE-2015-1641, CVE-2017-11882, and CVE-2018-0802.
Exploitation for Client Execution
It has exploited Adobe Flash vulnerability CVE-2015-8651 for execution.
Exploitation for Client Execution
DealersChoice leverages vulnerable versions of Flash to perform execution.
Exploitation for Client Execution
It has exploited CVE-2011-0611 in Adobe Flash Player to gain execution on a targeted system.
Exploitation for Client Execution
It has used exploitation of endpoint software, including Microsoft Internet Explorer Adobe Flash vulnerabilities, to gain execution. They have also used zero-day exploits.
Exploitation for Client Execution
It has exploited Microsoft Office vulnerability CVE-2017-11882.
Exploitation for Client Execution
EvilBunny has exploited CVE-2011-4369, a vulnerability in the PRC component in Adobe Reader.
Exploitation for Client Execution
It has used malicious documents containing exploits for CVE-2021-40444 affecting Microsoft MSHTML.
Exploitation for Client Execution
During Frankenstein, the threat actors exploited CVE-2017-11882 to execute code on the victim's machine.
Exploitation for Client Execution
HAWKBALL has exploited Microsoft Office vulnerabilities CVE-2017-11882 and CVE-2018-0802 to deliver the payload.
Exploitation for Client Execution
It has exploited CVE-2018-0798 for execution.
Exploitation for Client Execution
It has exploited CVE-2012-0158, CVE-2014-1761, CVE-2017-11882 and CVE-2018-0802 for execution.
Exploitation for Client Execution
InvisiMole has installed legitimate but vulnerable Total Video Player software and wdigest.dll library drivers on compromised hosts to exploit stack overflow and input validation vulnerabilities for code execution.
Exploitation for Client Execution
It has exploited Adobe Flash vulnerability CVE-2018-4878 for execution.
Exploitation for Client Execution
It has exploited multiple Microsoft Office and .NET vulnerabilities for execution, including CVE-2017-0199, CVE-2017-8759, and CVE-2017-11882.
Exploitation for Client Execution
It has exploited the Office vulnerability CVE-2017-0199 for execution.
Exploitation for Client Execution
It has exploited CVE-2017-0199 in Microsoft Word to execute code.
Exploitation for Client Execution
During Operation Dust Storm, the threat actors exploited Adobe Flash vulnerability CVE-2011-0611, Microsoft Windows Help vulnerability CVE-2010-1885, and several Internet Explorer vulnerabilities, including CVE-2011-1255, CVE-2012-1889, and CVE-2014-0322.
Exploitation for Client Execution
It uses malicious documents to deliver remote execution exploits as part of. The group has previously exploited CVE-2017-8570, CVE-2012-1856, CVE-2014-4114, CVE-2017-0199, CVE-2017-11882, and CVE-2015-1641.
Exploitation for Client Execution
Ramsay has been embedded in documents exploiting CVE-2017-0199, CVE-2017-11882, and CVE-2017-8570.
Exploitation for Client Execution
It has exploited vulnerabilities in Microsoft PowerPoint via OLE objects (CVE-2014-4114) and Microsoft Word via crafted TIFF images (CVE-2013-3906).
Exploitation for Client Execution
It has exploited vulnerabilities to gain execution including CVE-2017-11882 and CVE-2020-0674.
Exploitation for Client Execution
SpeakUp attempts to exploit the following vulnerabilities in order to execute its malicious script: CVE-2012-0874, CVE-2010-1871, CVE-2017-10271, CVE-2018-2894, CVE-2016-3088, JBoss AS 3/4/5/6, and the Hadoop YARN ResourceManager.
Exploitation for Client Execution
SUPERNOVA was installed via exploitation of a SolarWinds Orion API authentication bypass vulnerability (CVE-2020-10148).
Exploitation for Client Execution
It has exploited Microsoft Word vulnerability CVE-2017-0199 for execution.
Exploitation for Client Execution
It has taken advantage of a known vulnerability in Microsoft Word (CVE 2012-0158) to execute code.
Exploitation for Client Execution
It has exploited CVE-2018-0798 in It Editor.
Exploitation for Client Execution
It has exploited Microsoft vulnerabilities, including CVE-2018-0798, CVE-2018-8174, CVE-2018-0802, CVE-2017-11882, CVE-2019-9489 CVE-2020-8468, and CVE-2018-0798 to enable execution of their delivered malicious payloads.
Exploitation for Client Execution
It has crafted malicious files to exploit CVE-2012-0158 and CVE-2010-3333 for execution.
Exploitation for Client Execution
It has executed commands through Microsoft security vulnerabilities, including CVE-2017-11882, CVE-2018-0802, and CVE-2012-0158.
Exploitation for Client Execution
Woody RAT has relied on CVE-2022-30190 (Follina) for execution during delivery.
Exploitation for Client Execution
Xbash can attempt to exploit known vulnerabilities in Hadoop, Redis, or ActiveMQ when it finds those services running in order to conduct further execution.
Inter-Process Communication
Cyclops Blink has the ability to create a pipe to enable inter-process communication.
Inter-Process Communication
HyperStack can connect to the IPC$ share on remote machines.
Inter-Process Communication
When executing with non-root permissions, RotaJakiro uses the the shmget API to create shared memory between other known RotaJakiro processes. This allows processes to communicate with each other and share their PID.
Inter-Process Communication
Uroburos has the ability to move data between its kernel and user mode components, generally using named pipes.
Inter-Process Communication:Component Object Model
Bumblebee can use a COM object to execute queries to gather system information.
Inter-Process Communication:Component Object Model
DarkTortilla has used the WshShortcut COM object to create a .lnk shortcut file in the Windows startup folder.
Inter-Process Communication:Component Object Model
FunnyDream can use com objects identified with CLSID_ShellLink(IShellLink and IPersistFile) and WScript.Shell(RegWrite method) to enable persistence mechanisms.
Inter-Process Communication:Component Object Model
It malware can insert malicious macros into documents using a Microsoft.Office.Interop object.
Inter-Process Communication:Component Object Model
Gelsemium can use the IARPUinstallerStringLauncher COM interface are part of its UAC bypass process.
Inter-Process Communication:Component Object Model
HermeticWizard can execute files on remote machines using DCOM.
Inter-Process Communication:Component Object Model
InvisiMole can use the ITaskService, ITaskDefinition and ITaskSettings COM interfaces to schedule a task.
Inter-Process Communication:Component Object Model
Milan can use a COM component to generate scheduled tasks.
Inter-Process Communication:Component Object Model
It has used malware that has the capability to execute malicious code via COM, DCOM, and Outlook.
Inter-Process Communication:Component Object Model
Neoichor can use the Internet Explorer (IE) COM interface to connect and receive commands from C2.
Inter-Process Communication:Component Object Model
POWERSTATS can use DCOM (targeting the 127.0.0.1 loopback address) to execute additional payloads on compromised hosts.
Inter-Process Communication:Component Object Model
Ramsay can use the Windows COM API to schedule tasks and maintain persistence.
Inter-Process Communication:Component Object Model
TrickBot used COM to setup scheduled task for persistence.
Inter-Process Communication:Component Object Model
Ursnif droppers have used COM objects to execute the malware's full executable payload.
Inter-Process Communication:Dynamic Data Exchange
It has delivered JHUHUGIT and Koadic by executing PowerShell commands through DDE in Word documents.
Inter-Process Communication:Dynamic Data Exchange
It has used Windows DDE for execution of commands and a malicious VBS.
Inter-Process Communication:Dynamic Data Exchange
It has executed OLE objects using Microsoft It Editor to download and run malicious payloads.
Inter-Process Communication:Dynamic Data Exchange
It has sent malicious Word OLE compound documents to victims.
Inter-Process Communication:Dynamic Data Exchange
It spear phishing campaigns have included malicious Word documents with DDE execution.
Inter-Process Communication:Dynamic Data Exchange
It attempted to exploit Microsoft’s DDE protocol in order to gain access to victim machines and for execution.
Inter-Process Communication:Dynamic Data Exchange
GravityRAT has been delivered via Word documents using DDE for execution.