prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Scheduled Task | It has created a scheduled task to execute additional malicious software, as well as maintain persistence. |
Scheduled Task | It has used schtasks.exe for lateral movement in compromised networks. |
Scheduled Task | NETWIRE can create a scheduled task to establish persistence. |
Scheduled Task | NotPetya creates a task to reboot the system one hour after infection. |
Scheduled Task | It has created scheduled tasks that run a VBScript to execute a payload on victim machines. |
Scheduled Task | Okrum's installer can attempt to achieve persistence by creating a scheduled task. |
Scheduled Task | OopsIE creates a scheduled task to run itself every three minutes. |
Scheduled Task | During Operation CuckooBees, the threat actors used scheduled tasks to execute batch scripts for lateral movement with the following command: SCHTASKS /Create /S <IP Address> /U <Username> /p <Password> /SC ONCE /TN test /TR <Path to a Batch File> /ST <Time> /RU SYSTEM. |
Scheduled Task | During Operation Dream Job, It created scheduled tasks to set a periodic execution of a remote XSL script. |
Scheduled Task | During Operation Wocao, threat actors used scheduled tasks to execute malicious PowerShell code on remote systems. |
Scheduled Task | A It file stealer can run a TaskScheduler DLL to add persistence. |
Scheduled Task | PowerSploit's New-UserPersistenceOption Persistence argument can be used to establish via a Scheduled Task/Job. |
Scheduled Task | POWERSTATS has established persistence through a scheduled task using the command "C:\Windows\system32\schtasks.exe" /Create /F /SC DAILY /ST 12:00 /TN MicrosoftEdge /TR "c:\Windows\system32\wscript.exe C:\Windows\temp\Windows.vbe". |
Scheduled Task | POWRUNER persists through a scheduled task that executes it every minute. |
Scheduled Task | Prestige has been executed on a target system through a scheduled task created by It using Impacket. |
Scheduled Task | Pteranodon schedules tasks to invoke its components in order to establish persistence. |
Scheduled Task | QakBot has the ability to create scheduled tasks for persistence. |
Scheduled Task | QUADAGENT creates a scheduled task to maintain persistence on the victim’s machine. |
Scheduled Task | QuasarRAT contains a .NET wrapper DLL for creating and managing scheduled tasks for maintaining persistence upon reboot. |
Scheduled Task | RainyDay can use scheduled tasks to achieve persistence. |
Scheduled Task | Ramsay can schedule tasks via the Windows COM API to maintain persistence. |
Scheduled Task | It launched a scheduled task to gain persistence using the schtasks /create /sc command. |
Scheduled Task | Remexi utilizes scheduled tasks as a persistence mechanism. |
Scheduled Task | RemoteCMD can execute commands remotely by creating a new schedule task on the remote system |
Scheduled Task | Revenge RAT schedules tasks to run malicious scripts at different intervals. |
Scheduled Task | It tries to add a scheduled task to establish persistence. |
Scheduled Task | Ryuk can remotely create a scheduled task to execute itself on a system. |
Scheduled Task | Saint Bot has created a scheduled task named "Maintenance" to establish persistence. |
Scheduled Task | schtasks is used to schedule tasks on a Windows system to run at a specific date and time. |
Scheduled Task | ServHelper contains modules that will use schtasks to carry out malicious operations. |
Scheduled Task | Shamoon copies an executable payload to the target system by using SMB/Windows Admin Shares and then scheduling an unnamed task to execute the malware. |
Scheduled Task | SharpDisco can create scheduled tasks to execute reverse shells that read and write data to and from specified SMB shares. |
Scheduled Task | SharpStage has a persistence component to write a scheduled task for the payload. |
Scheduled Task | Sibot has been executed via a scheduled task. |
Scheduled Task | It has used scheduled tasks to stage its operation. |
Scheduled Task | Smoke Loader launches a scheduled task. |
Scheduled Task | During the SolarWinds Compromise, It used scheduler and schtasks to create new tasks on remote host as part of their lateral movement. They manipulated scheduled tasks by updating an existing legitimate task to execute their tools and then returned the scheduled task to its original configuration. It also created a scheduled task to maintain SUNSPOT persistence when the host booted. |
Scheduled Task | SoreFang can gain persistence through use of scheduled tasks. |
Scheduled Task | SQLRat has created scheduled tasks in %appdata%\Roaming\Microsoft\Templates\. |
Scheduled Task | It malware creates a scheduled task entitled "IE Web Cache" to execute a malicious file hourly. |
Scheduled Task | Stuxnet schedules a network job to execute two minutes after host infection. |
Scheduled Task | SUGARDUMP has created scheduled tasks called MicrosoftInternetExplorerCrashRepoeterTaskMachineUA and MicrosoftEdgeCrashRepoeterTaskMachineUA, which were configured to execute CrashReporter.exe during user logon. |
Scheduled Task | SVCReady can create a scheduled task named RecoveryExTask to gain persistence. |
Scheduled Task | It has used scheduled tasks to establish persistence for installed tools. |
Scheduled Task | Tarrask is able to create "hidden" scheduled tasks for persistence. |
Scheduled Task | It has used scheduled task XML triggers. |
Scheduled Task | Tomiris has used SCHTASKS /CREATE /SC DAILY /TN StartDVL /TR "[path to self]" /ST 10:00 to establish persistence. |
Scheduled Task | TrickBot creates a scheduled task on the system that provides persistence. |
Scheduled Task | Valak has used scheduled tasks to execute additional payloads and to gain persistence on a compromised host. |
Scheduled Task | It has used scheduled tasks to establish persistence for TrickBot and other malware. |
Scheduled Task | yty establishes persistence by creating a scheduled task with the command SchTasks /Create /SC DAILY /TN BigData /TR " + path_file + "/ST 09:30". |
Scheduled Task | Zebrocy has a command to create a scheduled task for persistence. |
Scheduled Task | zwShell has used SchTasks for execution. |
Scheduled Task | ZxxZ has used scheduled tasks for persistence and execution. |
Serverless Execution | Pacu can create malicious Lambda functions. |
Shared Modules | Astaroth uses the LoadLibraryExW() function to load additional modules. |
Shared Modules | Attor's dispatcher can execute additional plugins by loading the respective DLLs. |
Shared Modules | BLINDINGCAN has loaded and executed DLLs in memory during runtime on a victim machine. |
Shared Modules | BOOSTWRITE has used the DWriteCreateFactory() function to load additional modules. |
Shared Modules | Bumblebee can use LoadLibrary to attempt to execute GdiPlus.dll. |
Shared Modules | DarkWatchman can load DLLs. |
Shared Modules | Dtrack contains a function that calls LoadLibrary and GetProcAddress. |
Shared Modules | FoggyWeb's loader can call the load() function to load the FoggyWeb dll into an Application Domain on a compromised AD FS server. |
Shared Modules | gh0st RAT can load DLLs into memory. |
Shared Modules | Hydraq creates a backdoor through which remote attackers can load and call DLL functions. |
Shared Modules | KillDisk loads and executes functions from a DLL. |
Shared Modules | Metamorfo had used AutoIt to load and execute the DLL payload. |
Shared Modules | For network communications, OSX_OCEANLOTUS.D loads a dynamic library (.dylib file) using dlopen() and obtains a function pointer to execute within that shared library using dlsym(). |
Shared Modules | PipeMon has used call to LoadLibrary to load its installer. PipeMon loads its modules using reflective loading or custom shellcode. |
Shared Modules | PUNCHBUGGY can load a DLL using the LoadLibrary API. |
Shared Modules | RotaJakiro uses dynamically linked shared libraries (.so files) to execute additional functionality using dlopen() and dlsym(). |
Shared Modules | Stuxnet calls LoadLibrary then executes exports from a DLL. |
Shared Modules | TajMahal has the ability to inject the LoadLibrary call template DLL into running processes. |
Software Deployment Tools | It compromised McAfee ePO to move laterally by distributing malware as a software deployment task. |
Software Deployment Tools | During C0018, the threat actors used PDQ Deploy to move AvosLocker and tools across the network. |
Software Deployment Tools | It has used the commercially available tool RemoteExec for agentless remote code execution. |
Software Deployment Tools | It has used RAdmin, a remote software tool used to remotely control workstations and ATMs. |
Software Deployment Tools | It actors used a victim's endpoint management platform, Altiris, for lateral movement. |
Software Deployment Tools | It is believed that a patch management system for an anti-virus product commonly installed among targeted companies was used to distribute the Wiper malware. |
System Services | It has created system services to execute cryptocurrency mining software. |
System Services:Launchctl | AppleJeus has loaded a plist file using the launchctl command. |
System Services:Launchctl | Calisto uses launchctl to enable screen sharing on the victim’s machine. |
System Services:Launchctl | LoudMiner launched the QEMU services in the /Library/LaunchDaemons/ folder using launchctl. It also uses launchctl to unload all Launch Daemons when updating to a newer version of LoudMiner. |
System Services:Launchctl | macOS.OSAMiner has used launchctl to restart the Launch Agent. |
System Services:Launchctl | XCSSET loads a system level launchdaemon using the launchctl load -w command from /System/Librarby/LaunchDaemons/ssh.plist. |
System Services:Service Execution | Anchor can create and execute services to load its payload. |
System Services:Service Execution | It's backdoor has used Windows services as a way to execute its malicious payload. |
System Services:Service Execution | It has created new services or modified existing ones to run executables, commands, or scripts. |
System Services:Service Execution | It has used post-exploitation tools including RemCom and the Non-sucking Service Manager (NSSM) to execute processes. |
System Services:Service Execution | It used svchost.exe and Net to execute a system service installed to launch a Cobalt Strike BEACON loader. |
System Services:Service Execution | Attor's dispatcher can be executed as a service. |
System Services:Service Execution | Bad Rabbit drops a file named infpub.datinto the Windows directory and is executed through SCManager and rundll.exe. |
System Services:Service Execution | BBSRAT can start, stop, or delete services. |
System Services:Service Execution | It has executed custom-compiled XMRIG miner DLLs by configuring them to execute via the "wercplsupport" service. |
System Services:Service Execution | Brute Ratel C4 can create Windows system services for execution. |
System Services:Service Execution | It has used PsExec to deploy beacons on compromised systems. |
System Services:Service Execution | Clambling can create and start services on a compromised host. |
System Services:Service Execution | Cobalt Strike can use PsExec to execute a payload on a remote host. It can also use Service Control Manager to start new services. |
System Services:Service Execution | Empire can use PsExec to execute a payload on a remote host. |
System Services:Service Execution | It has created Windows services to execute encoded PowerShell commands. |
Subsets and Splits