prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Account Manipulation:Additional Cloud Credentials | Pacu can generate SSH and API keys for AWS infrastructure and additional API keys for other IAM users. |
Account Manipulation:Additional Cloud Credentials | During the SolarWinds Compromise, It added credentials to OAuth Applications and Service Principals. |
Account Manipulation:Additional Email Delegate Permissions | It has used a Powershell cmdlet to grant the ApplicationImpersonation role to a compromised account. |
Account Manipulation:Additional Email Delegate Permissions | It has used a compromised global administrator account in Azure AD to backdoor a service principal with ApplicationImpersonation rights to start collecting emails from targeted mailboxes; It has also used compromised accounts holding ApplicationImpersonation rights in Exchange to collect emails. |
Account Manipulation:Additional Email Delegate Permissions | It granted compromised email accounts read access to the email boxes of additional targeted accounts. The group then was able to authenticate to the intended victim's OWA (Outlook Web Access) portal and read hundreds of email communications for information on Middle East organizations. |
Account Manipulation:Additional Email Delegate Permissions | During the SolarWinds Compromise, It added their own devices as allowed IDs for active sync using Set-CASMailbox, allowing it to obtain copies of victim mailboxes. It also added additional permissions (such as Mail.Read and Mail.ReadWrite) to compromised Application or Service Principals. |
Account Manipulation:Additional Cloud Roles | During C0027, It used IAM manipulation to gain persistence and to assume or elevate privileges. |
Account Manipulation:Additional Cloud Roles | It has added the global admin role to accounts they have created in the targeted organization's cloud instances. |
Account Manipulation:Additional Cloud Roles | During the SolarWinds Compromise, It granted company administrator privileges to a newly created service principle. |
Account Manipulation:SSH Authorized Keys | Bundlore creates a new key pair with ssh-keygen and drops the newly created user key in authorized_keys to enable remote login. |
Account Manipulation:SSH Authorized Keys | It has dropped an SSH-authorized key in the /root/.ssh folder in order to access a compromised server with SSH. |
Account Manipulation:SSH Authorized Keys | Skidmap has the ability to add the public key of its handlers to the authorized_keys file to maintain persistence on an infected host. |
Account Manipulation:SSH Authorized Keys | It has added RSA keys in authorized_keys. |
Account Manipulation:SSH Authorized Keys | XCSSET will create an ssh key if necessary with the ssh-keygen -t rsa -f $HOME/.ssh/id_rsa -P command. XCSSET will upload a private key file to the server to remotely access the host without a password. |
Account Manipulation:Device Registration | AADInternals can register a device to Azure AD. |
Account Manipulation:Device Registration | It has enrolled a device in MFA to an Azure AD environment following a successful password guessing attack against a dormant account. |
Account Manipulation:Device Registration | During C0027, It registered devices for MFA to maintain persistence through victims' VPN. |
Account Manipulation:Device Registration | During the SolarWinds Compromise, It registered devices in order to enable mailbox syncing via the Set-CASMailbox command. |
BITS Jobs | It has used the BITS protocol to exfiltrate stolen data from a compromised host. |
BITS Jobs | It used BITSAdmin to download and install payloads. |
BITS Jobs | Bazar has been downloaded via Windows BITS functionality. |
BITS Jobs | BITSAdmin can be used to create BITS Jobs to launch a malicious process. |
BITS Jobs | Cobalt Strike can download a hosted "beacon" payload using BITSAdmin. |
BITS Jobs | Egregor has used BITSadmin to download and execute malicious DLLs. |
BITS Jobs | A JPIN variant downloads the backdoor payload via the BITS service. |
BITS Jobs | It has used BITSAdmin to download additional tools. |
BITS Jobs | MarkiRAT can use BITS Utility to connect with the C2 server. |
BITS Jobs | It has used BITS jobs to download malicious payloads. |
BITS Jobs | ProLock can use BITS jobs to download its malicious payload. |
BITS Jobs | UBoatRAT takes advantage of the /SetNotifyCmdLine option in BITSAdmin to ensure it stays running on a system to maintain persistence. |
BITS Jobs | It has used batch scripts that utilizes WMIC to execute a BITSAdmin transfer of a ransomware payload to each compromised machine. |
Boot or Logon Autostart Execution | BoxCaon established persistence by setting the HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\load registry key to point to its executable. |
Boot or Logon Autostart Execution | Dtrack’s RAT makes a persistent target file with auto execution on the host start. |
Boot or Logon Autostart Execution | Mis-Type has created registry keys for persistence, including HKCU\Software\bkfouerioyou, HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{6afa8072-b2b1-31a8-b5c1-{Unique Identifier}, and HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{3BF41072-B2B1-31A8-B5C1-{Unique Identifier}. |
Boot or Logon Autostart Execution | Misdat has created registry keys for persistence, including HKCU\Software\dnimtsoleht\StubPath, HKCU\Software\snimtsOleht\StubPath, HKCU\Software\Backtsaleht\StubPath, HKLM\SOFTWARE\Microsoft\Active Setup\Installed. Components\{3bf41072-b2b1-21c8-b5c1-bd56d32fbda7}, and HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{3ef41072-a2f1-21c8-c5c1-70c2c3bc7905}. |
Boot or Logon Autostart Execution | xCaon has added persistence via the Registry key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\load which causes the malware to run each time any user logs in. |
Boot or Logon Autostart Execution:Registry Run Keys | ADVSTORESHELL achieves persistence by adding itself to the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key. |
Boot or Logon Autostart Execution:Registry Run Keys | Agent Tesla can add itself to the Registry as a startup program to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Amadey has changed the Startup folder to the one containing its executable by overwriting the registry keys. |
Boot or Logon Autostart Execution:Registry Run Keys | ANDROMEDA can establish persistence by dropping a sample of itself to C:\ProgramData\Local Settings\Temp\mskmde.com and adding a Registry run key to execute every time a user logs on. |
Boot or Logon Autostart Execution:Registry Run Keys | AppleSeed has the ability to create the Registry key name EstsoftAutoUpdate at HKCU\Software\Microsoft/Windows\CurrentVersion\RunOnce to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It establishes persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key. |
Boot or Logon Autostart Execution:Registry Run Keys | An It HTTP malware variant establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\. |
Boot or Logon Autostart Execution:Registry Run Keys | It has deployed malware that has copied itself to the startup directory for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It added Registry Run keys to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It places scripts in the startup folder for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It established persistence using Registry Run keys, both to execute PowerShell and VBS scripts as well as to execute their backdoor directly. |
Boot or Logon Autostart Execution:Registry Run Keys | It has deployed a tool known as DarkComet to the Startup folder of a victim, and used Registry run keys to gain persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It's has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\. |
Boot or Logon Autostart Execution:Registry Run Keys | It has maintained persistence using the startup folder. |
Boot or Logon Autostart Execution:Registry Run Keys | It created and modified startup files for persistence. It added a registry key in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost to establish persistence for Cobalt Strike. |
Boot or Logon Autostart Execution:Registry Run Keys | Aria-body has established persistence via the Startup folder or Run Registry key. |
Boot or Logon Autostart Execution:Registry Run Keys | Astaroth creates a startup item for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | AuTo Stealer can place malicious executables in a victim's AutoRun registry key or StartUp directory, depending on the AV product installed, to maintain persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Avaddon uses registry run keys for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | AvosLocker has been executed via the RunOnce Registry key to run itself on safe mode. |
Boot or Logon Autostart Execution:Registry Run Keys | BabyShark has added a Registry key to ensure all future macros are enabled for Microsoft Word and Excel as well as for additional persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Backdoor.Oldrea adds Registry Run keys to achieve persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory. |
Boot or Logon Autostart Execution:Registry Run Keys | BADNEWS installs a registry Run key to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | BadPatch establishes a foothold by adding a link to the malware executable in the startup folder. |
Boot or Logon Autostart Execution:Registry Run Keys | Bazar can create or add files to Registry Run Keys to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | BBSRAT has been loaded through DLL side-loading of a legitimate Citrix executable that is set to persist through the Registry Run key location HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssonsvr.exe. |
Boot or Logon Autostart Execution:Registry Run Keys | Bisonal has added itself to the Registry key HKEY_CURRENT_USER\Software\Microsoft\CurrentVersion\Run\ for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | BitPaymer has set the run key HKCU\Software\Microsoft\Windows\CurrentVersion\Run for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder. |
Boot or Logon Autostart Execution:Registry Run Keys | BoomBox can establish persistence by writing the Registry value MicroNativeCacheSvc to HKCU\Software\Microsoft\Windows\CurrentVersion\Run. |
Boot or Logon Autostart Execution:Registry Run Keys | Briba creates run key Registry entries pointing to malicious DLLs dropped to disk. |
Boot or Logon Autostart Execution:Registry Run Keys | It has used a batch script that adds a Registry Run key to establish malware persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | build_downer has the ability to add itself to the Registry Run key for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It stores a configuration files in the startup directory to automatically execute commands in order to persist across reboots. |
Boot or Logon Autostart Execution:Registry Run Keys | Carberp has maintained persistence by placing itself inside the current user's startup folder. |
Boot or Logon Autostart Execution:Registry Run Keys | Cardinal RAT establishes Persistence by setting the HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load Registry key to point to its executable. |
Boot or Logon Autostart Execution:Registry Run Keys | Chaes has added persistence via the Registry key software\microsoft\windows\currentversion\run\microsoft windows html help. |
Boot or Logon Autostart Execution:Registry Run Keys | ChChes establishes persistence by adding a Registry Run key. |
Boot or Logon Autostart Execution:Registry Run Keys | Chinoxy has established persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run registry key and by loading a dropper to (%COMMON_ STARTUP%\\eoffice.exe). |
Boot or Logon Autostart Execution:Registry Run Keys | Clambling can establish persistence by adding a Registry run key. |
Boot or Logon Autostart Execution:Registry Run Keys | It has used Registry Run keys for persistence. The group has also set a Startup path to launch the PowerShell shell command and download Cobalt Strike. |
Boot or Logon Autostart Execution:Registry Run Keys | Cobian RAT creates an autostart Registry key to ensure persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Comnie achieves persistence by adding a shortcut of itself to the startup path in the Registry. |
Boot or Logon Autostart Execution:Registry Run Keys | Conficker adds Registry Run keys to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It has dropped malicious files into the startup folder %AppData%\Microsoft\Windows\Start Menu\Programs\Startup on a compromised host in order to maintain persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | CORESHELL has established persistence by creating autostart extensibility point (ASEP) Registry entries in the Run key and other Registry keys, as well as by creating shortcuts in the Internet Explorer Quick Start folder. |
Boot or Logon Autostart Execution:Registry Run Keys | One persistence mechanism used by CozyCar is to set itself to be executed at system startup by adding a Registry value under one of the following Registry keys: HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run |
Boot or Logon Autostart Execution:Registry Run Keys | Crimson can add Registry run keys for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | CrossRAT uses run keys for persistence on Windows. |
Boot or Logon Autostart Execution:Registry Run Keys | It's version of Bandook adds a registry key to HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | DarkComet adds several Registry entries to enable automatic execution at every system startup. |
Boot or Logon Autostart Execution:Registry Run Keys | It has been known to establish persistence by adding programs to the Run Registry key. |
Boot or Logon Autostart Execution:Registry Run Keys | DarkTortilla has established persistence via the Software\Microsoft\Windows NT\CurrentVersion\Run registry key and by creating a .lnk shortcut file in the Windows startup folder. |
Boot or Logon Autostart Execution:Registry Run Keys | DnsSystem can write itself to the Startup folder to gain persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | DownPaper uses PowerShell to add a Registry Run key in order to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | It has added the registry value ntdll to the Registry Run key to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | DustySky achieves persistence by creating a Registry entry in HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. |
Boot or Logon Autostart Execution:Registry Run Keys | If establishing persistence by installation as a new service fails, one variant of Elise establishes persistence for the created .exe file by setting the following Registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\svchost : %APPDATA%\Microsoft\Network\svchost.exe. Other variants have set the following Registry keys for persistence: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\imejp : [self] and HKCU\Software\Microsoft\Windows\CurrentVersion\Run\IAStorD. |
Boot or Logon Autostart Execution:Registry Run Keys | Variants of Emissary have added Run Registry keys to establish persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Emotet has been observed adding the downloaded payload to the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run key to maintain persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | Empire can modify the registry run keys HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run and HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run for persistence. |
Boot or Logon Autostart Execution:Registry Run Keys | EvilBunny has created Registry keys for persistence in [HKLM|HKCU]\…\CurrentVersion\Run. |
Boot or Logon Autostart Execution:Registry Run Keys | EvilGrab adds a Registry Run key for ctfmon.exe to establish persistence. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.