prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Create or Modify System Process:Windows Service | RDAT has created a service when it is installed on the victim machine. |
Create or Modify System Process:Windows Service | Reaver installs itself as a new service. |
Create or Modify System Process:Windows Service | Some Sakula samples install themselves as services for persistence by calling WinExec with the net start argument. |
Create or Modify System Process:Windows Service | Seasalt is capable of installing itself as a service. |
Create or Modify System Process:Windows Service | Shamoon creates a new service named "ntssrv" to execute the payload. Newer versions create the "MaintenaceSrv" and "hdv_725x" services. |
Create or Modify System Process:Windows Service | ShimRat has installed a Windows service to maintain persistence on victim machines. |
Create or Modify System Process:Windows Service | SILENTTRINITY can establish persistence by creating a new service. |
Create or Modify System Process:Windows Service | SLOTHFULMEDIA has created a service on victim machines named "TaskFrame" to establish persistence. |
Create or Modify System Process:Windows Service | STARWHALE has the ability to create the following Windows service to establish persistence on an infected host: sc create Windowscarpstss binpath= "cmd.exe /c cscript.exe c:\\windows\\system32\\w7_1.wsf humpback_whale" start= "auto" obj= "LocalSystem". |
Create or Modify System Process:Windows Service | StreamEx establishes persistence by installing a new service pointing to its DLL and setting the service to auto-start. |
Create or Modify System Process:Windows Service | StrongPity has created new services and modified existing services for persistence. |
Create or Modify System Process:Windows Service | Stuxnet uses a driver registered as a boot start service as the main load-point. |
Create or Modify System Process:Windows Service | SUGARUSH has created a service named Service1 for persistence. |
Create or Modify System Process:Windows Service | SysUpdate can create a service to establish persistence. |
Create or Modify System Process:Windows Service | If running as administrator, TDTESS installs itself as a new service named bmwappushservice to establish persistence. |
Create or Modify System Process:Windows Service | It has used malware that adds cryptocurrency miners as a service. |
Create or Modify System Process:Windows Service | TEARDROP ran as a Windows service from the c:\windows\syswow64 folder. |
Create or Modify System Process:Windows Service | It's malware can create a new service, sometimes naming it after the config information, to gain persistence. |
Create or Modify System Process:Windows Service | ThreatNeedle can run in memory and register its payload as a Windows service. |
Create or Modify System Process:Windows Service | TinyZBot can install as a Windows service for persistence. |
Create or Modify System Process:Windows Service | TrickBot establishes persistence by creating an autostart service that allows it to run whenever the machine boots. |
Create or Modify System Process:Windows Service | It has installed a service pointing to a malicious DLL dropped to disk. |
Create or Modify System Process:Windows Service | TYPEFRAME variants can add malicious DLL modules as new services.TYPEFRAME can also delete services from the victim’s machine. |
Create or Modify System Process:Windows Service | Uroburos has registered a service, typically named WerFaultSvc, to decrypt and find a kernel driver and kernel driver loader to maintain persistence. |
Create or Modify System Process:Windows Service | Ursnif has registered itself as a system service in the Registry for automatic execution at system startup. |
Create or Modify System Process:Windows Service | Volgmer installs a copy of itself in a randomly selected service, then overwrites the ServiceDLL entry in the service's Registry entry. Some Volgmer variants also install .dll files as services with names generated by a list of hard-coded strings. |
Create or Modify System Process:Windows Service | WannaCry creates the service "mssecsvc2.0" with the display name "Microsoft Security Center (2.0) Service." |
Create or Modify System Process:Windows Service | WastedLocker created and established a service that runs until the encryption process is complete. |
Create or Modify System Process:Windows Service | Wiarp creates a backdoor through which remote attackers can create a service. |
Create or Modify System Process:Windows Service | Wingbird uses services.exe to register a new autostart service named "Audit Service" using a copy of the local lsass.exe file. |
Create or Modify System Process:Windows Service | Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence. |
Create or Modify System Process:Windows Service | It has installed TrickBot as a service named ControlServiceA in order to establish persistence. |
Create or Modify System Process:Windows Service | ZeroT can add a new service to ensure PlugX persists on the system when delivered as another payload onto the system. |
Create or Modify System Process:Windows Service | ZLib creates Registry keys to allow itself to run as various services. |
Create or Modify System Process:Windows Service | zwShell has established persistence by adding itself as a new service. |
Create or Modify System Process:Windows Service | ZxShell can create a new service using the service parser function ProcessScCommand. |
Create or Modify System Process:Launch Daemon | AppleJeus has placed a plist file within the LaunchDaemons folder and launched it manually. |
Create or Modify System Process:Launch Daemon | Bundlore can persist via a LaunchDaemon. |
Create or Modify System Process:Launch Daemon | Dacls can establish persistence via a Launch Daemon. |
Create or Modify System Process:Launch Daemon | Green Lambert can add a plist file in the Library/LaunchDaemons to establish persistence. |
Create or Modify System Process:Launch Daemon | LoudMiner adds plist files with the naming format com.[random_name].plist in the /Library/LaunchDaemons folder with the RunAtLoad and KeepAlive keys set to true. |
Create or Modify System Process:Launch Daemon | If running with root permissions, OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchDaemons. |
Create or Modify System Process:Launch Daemon | When running with root privileges after a Launch Agent is installed, ThiefQuest installs a plist file to the /Library/LaunchDaemons/ folder with the RunAtLoad key set to true establishing persistence as a Launch Daemon. |
Create or Modify System Process:Launch Daemon | XCSSET uses the ssh launchdaemon to elevate privileges, bypass system controls, and enable remote access to the victim. |
Event Triggered Execution | Pacu can set up S3 bucket notifications to trigger a malicious Lambda function when a CloudFormation template is uploaded to the bucket. It can also create Lambda functions that trigger upon the creation of users, roles, and groups. |
Event Triggered Execution:Change Default File Association | It has a HWP document stealer module which changes the default program association in the registry to open HWP documents. |
Event Triggered Execution:Change Default File Association | SILENTTRINITY can conduct an image hijack of an .msc file extension as part of its UAC bypass process. |
Event Triggered Execution:Screensaver | Gazer can establish persistence through the system screensaver by configuring it to execute the malware. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | adbupd can use a WMI script to achieve persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has used WMI event subscriptions for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has attempted to use WMI event subscriptions to establish persistence on compromised hosts. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | BADHATCH can use WMI event subscriptions for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has used WMI event subscriptions for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has used WMI for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has established persistence through the use of a WMI event subscription combined with unusual living-off-the-land binaries such as cdb.exe. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | metaMain registered a WMI event subscription consumer called "hard_disk_stat" to establish persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It's custom ORat tool uses a WMI event consumer to maintain persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | During Operation Ghost, It used WMI event subscriptions to establish persistence for malware. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | PoshC2 has the ability to persist on a system using WMI events. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | POSHSPY uses a WMI event subscription to establish persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | POWERTON can use WMI for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | Sardonic can use a WMI event filter to invoke a command-line event consumer to gain persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | SILENTTRINITY can create a WMI Event to execute a payload for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | During the SolarWinds Compromise, It used a WMI event filter to invoke a command-line event consumer at system boot time to launch a backdoor with rundll32.exe. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | TrailBlazer has the ability to use WMI for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has used WMI event filters and consumers to establish persistence. |
Event Triggered Execution:Unix Shell Configuration Modification | Green Lambert can establish persistence on a compromised host through modifying the profile, login, and run command (rc) files associated with the bash, csh, and tcsh shells. |
Event Triggered Execution:Unix Shell Configuration Modification | Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files. |
Event Triggered Execution:Unix Shell Configuration Modification | When executing with non-root level permissions, RotaJakiro can install persistence by adding a command to the .bashrc file that executes a binary in the ${HOME}/.gvfsd/.profile/ folder. |
Event Triggered Execution:Netsh Helper DLL | netsh can be used as a persistence proxy technique to execute a helper DLL when netsh.exe is executed. |
Event Triggered Execution:Accessibility Features | It used sticky-keys to obtain unauthenticated, privileged console access. |
Event Triggered Execution:Accessibility Features | It replaces the Sticky Keys binary C:\Windows\System32\sethc.exe for persistence. |
Event Triggered Execution:Accessibility Features | It leveraged sticky keys to establish persistence. |
Event Triggered Execution:Accessibility Features | It actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence. |
Event Triggered Execution:Accessibility Features | It has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions. |
Event Triggered Execution:Accessibility Features | Empire can leverage WMI debugging to remotely replace binaries like sethc.exe, Utilman.exe, and Magnify.exe with cmd.exe. |
Event Triggered Execution:Accessibility Features | It has used sticky keys to launch a command prompt. |
Event Triggered Execution:AppCert DLLs | PUNCHBUGGY can establish using a AppCertDLLs Registry key. |
Event Triggered Execution:AppInit DLLs | It has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence. |
Event Triggered Execution:AppInit DLLs | Some variants of Cherry Picker use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows "AppInit_DLLs"="pserver32.dll" |
Event Triggered Execution:AppInit DLLs | Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key. |
Event Triggered Execution:AppInit DLLs | If a victim meets certain criteria, T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL, ResN32.dll. It does this by creating the following Registry keys: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs – %APPDATA%\Intel\ResN32.dll and HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs – 0x1. |
Event Triggered Execution:Application Shimming | It has used application shim databases for persistence. |
Event Triggered Execution:Application Shimming | Pillowmint has used a malicious shim database to maintain persistence. |
Event Triggered Execution:Application Shimming | SDBbot has the ability to use application shimming for persistence if it detects it is running as admin on Windows XP or 7, by creating a shim database to patch services.exe. |
Event Triggered Execution:Application Shimming | ShimRat has installed shim databases in the AppPatch folder. |
Event Triggered Execution:Image File Execution Options Injection | SDBbot has the ability to use image file execution options for persistence if it detects it is running with admin privileges on a Windows version newer than Windows 7. |
Event Triggered Execution:Image File Execution Options Injection | SUNBURST created an Image File Execution Options (IFEO) Debugger registry value for the process dllhost.exe to trigger the installation of Cobalt Strike. |
Event Triggered Execution:Image File Execution Options Injection | It has modified and added entries within HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options to maintain persistence. |
Event Triggered Execution:PowerShell Profile | It has used PowerShell profiles to maintain persistence on an infected machine. |
Event Triggered Execution:Component Object Model Hijacking | Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object. |
Event Triggered Execution:Component Object Model Hijacking | It has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload. |
Event Triggered Execution:Component Object Model Hijacking | BBSRAT has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture. |
Event Triggered Execution:Component Object Model Hijacking | ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\Software\Classes\CLSID{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32. |
Event Triggered Execution:Component Object Model Hijacking | Ferocious can use COM hijacking to establish persistence. |
Event Triggered Execution:Component Object Model Hijacking | JHUHUGIT has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}). |
Event Triggered Execution:Component Object Model Hijacking | KONNI has modified ComSysApp service to load the malicious DLL payload. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.