prompt
stringclasses
508 values
procedure
stringlengths
20
478
Access Token Manipulation:Create Process with Token
REvil can launch an instance of itself with administrative rights using runas.
Access Token Manipulation:Create Process with Token
It RPC backdoors can impersonate or steal process tokens before executing commands.
Access Token Manipulation:Create Process with Token
The WhisperGate third stage can use the AdvancedRun.exe tool to execute commands in the context of the Windows TrustedInstaller group via %TEMP%\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run.
Access Token Manipulation:Create Process with Token
ZxShell has a command called RunAs, which creates a new process as another user or process context.
Access Token Manipulation:Make and Impersonate Token
Cobalt Strike can make tokens from known credentials.
Access Token Manipulation:Make and Impersonate Token
It has utilized tools such as Incognito V2 for token manipulation and impersonation.
Access Token Manipulation:Make and Impersonate Token
Mafalda can create a token for a different user.
Access Token Manipulation:Parent PID Spoofing
Cobalt Strike can spawn processes with alternate PPIDs.
Access Token Manipulation:Parent PID Spoofing
KONNI has used parent PID spoofing to spawn a new cmd process using CreateProcessW and a handle to Taskmgr.exe.
Access Token Manipulation:Parent PID Spoofing
PipeMon can use parent PID spoofing to elevate privileges.
Access Token Manipulation:SID-History Injection
Empire can add a SID-History to a user if on a domain controller.
Access Token Manipulation:SID-History Injection
Mimikatz's MISC::AddSid module can appended any SID or user/group account to a user's SID-History. Mimikatz also utilizes SID-History Injection to expand the scope of other components such as generated Kerberos Golden Tickets and DCSync beyond a single domain.
Account Manipulation
During the 2016 Ukraine Electric Power Attack, It used the sp_addlinkedsrvlogin command in MS-SQL to create a link between a created account and other servers in the network.
Account Manipulation
It has been known to add created accounts to local admin groups to maintain elevated access.
Account Manipulation
It has added user accounts to the User and Admin groups.
Account Manipulation
Calisto adds permissions and remote logins to all users.
Account Manipulation
It has added newly created accounts to the administrators group to maintain elevated access.
Account Manipulation
It has assigned newly created accounts the sysadmin role to maintain persistence.
Account Manipulation
It has granted privileges to domain accounts.
Account Manipulation
It has added accounts to specific groups with net localgroup.
Account Manipulation
It malware WhiskeyDelta-Two contains a function that attempts to rename the administrator’s account.
Account Manipulation
It has added a user named DefaultAccount to the Administrators and Remote Desktop Users groups.
Account Manipulation
The Mimikatz credential dumper has been extended to include Skeleton Key domain controller authentication bypass functionality. The LSADUMP::ChangeNTLM and LSADUMP::SetNTLM modules can also manipulate the password hash of an account without knowing the clear text value.
Account Manipulation
ServHelper has added a user named "supportaccount" to the Remote Desktop Users and Administrators groups.
Account Manipulation
SMOKEDHAM has added user accounts to local Admin groups.
Account Manipulation:Additional Cloud Credentials
During C0027, It used aws_consoler to create temporary federated credentials for fake users in order to obfuscate which AWS credential is compromised and enable pivoting from the AWS CLI to console sessions without MFA.
Account Manipulation:Additional Cloud Credentials
Pacu can generate SSH and API keys for AWS infrastructure and additional API keys for other IAM users.
Account Manipulation:Additional Cloud Credentials
During the SolarWinds Compromise, It added credentials to OAuth Applications and Service Principals.
Account Manipulation:Additional Email Delegate Permissions
It has used a Powershell cmdlet to grant the ApplicationImpersonation role to a compromised account.
Account Manipulation:Additional Email Delegate Permissions
It has used a compromised global administrator account in Azure AD to backdoor a service principal with ApplicationImpersonation rights to start collecting emails from targeted mailboxes; It has also used compromised accounts holding ApplicationImpersonation rights in Exchange to collect emails.
Account Manipulation:Additional Email Delegate Permissions
It granted compromised email accounts read access to the email boxes of additional targeted accounts. The group then was able to authenticate to the intended victim's OWA (Outlook Web Access) portal and read hundreds of email communications for information on Middle East organizations.
Account Manipulation:Additional Email Delegate Permissions
During the SolarWinds Compromise, It added their own devices as allowed IDs for active sync using Set-CASMailbox, allowing it to obtain copies of victim mailboxes. It also added additional permissions (such as Mail.Read and Mail.ReadWrite) to compromised Application or Service Principals.
Account Manipulation:Additional Cloud Roles
During C0027, It used IAM manipulation to gain persistence and to assume or elevate privileges.
Account Manipulation:Additional Cloud Roles
It has added the global admin role to accounts they have created in the targeted organization's cloud instances.
Account Manipulation:Additional Cloud Roles
During the SolarWinds Compromise, It granted company administrator privileges to a newly created service principle.
Account Manipulation:SSH Authorized Keys
Bundlore creates a new key pair with ssh-keygen and drops the newly created user key in authorized_keys to enable remote login.
Account Manipulation:SSH Authorized Keys
It has dropped an SSH-authorized key in the /root/.ssh folder in order to access a compromised server with SSH.
Account Manipulation:SSH Authorized Keys
Skidmap has the ability to add the public key of its handlers to the authorized_keys file to maintain persistence on an infected host.
Account Manipulation:SSH Authorized Keys
It has added RSA keys in authorized_keys.
Account Manipulation:SSH Authorized Keys
XCSSET will create an ssh key if necessary with the ssh-keygen -t rsa -f $HOME/.ssh/id_rsa -P command. XCSSET will upload a private key file to the server to remotely access the host without a password.
Account Manipulation:Device Registration
AADInternals can register a device to Azure AD.
Account Manipulation:Device Registration
It has enrolled a device in MFA to an Azure AD environment following a successful password guessing attack against a dormant account.
Account Manipulation:Device Registration
During C0027, It registered devices for MFA to maintain persistence through victims' VPN.
Account Manipulation:Device Registration
During the SolarWinds Compromise, It registered devices in order to enable mailbox syncing via the Set-CASMailbox command.
Boot or Logon Autostart Execution
BoxCaon established persistence by setting the HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\load registry key to point to its executable.
Boot or Logon Autostart Execution
Dtrack’s RAT makes a persistent target file with auto execution on the host start.
Boot or Logon Autostart Execution
Mis-Type has created registry keys for persistence, including HKCU\Software\bkfouerioyou, HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{6afa8072-b2b1-31a8-b5c1-{Unique Identifier}, and HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{3BF41072-B2B1-31A8-B5C1-{Unique Identifier}.
Boot or Logon Autostart Execution
Misdat has created registry keys for persistence, including HKCU\Software\dnimtsoleht\StubPath, HKCU\Software\snimtsOleht\StubPath, HKCU\Software\Backtsaleht\StubPath, HKLM\SOFTWARE\Microsoft\Active Setup\Installed. Components\{3bf41072-b2b1-21c8-b5c1-bd56d32fbda7}, and HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{3ef41072-a2f1-21c8-c5c1-70c2c3bc7905}.
Boot or Logon Autostart Execution
xCaon has added persistence via the Registry key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\load which causes the malware to run each time any user logs in.
Boot or Logon Autostart Execution:Registry Run Keys
ADVSTORESHELL achieves persistence by adding itself to the HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Registry key.
Boot or Logon Autostart Execution:Registry Run Keys
Agent Tesla can add itself to the Registry as a startup program to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Amadey has changed the Startup folder to the one containing its executable by overwriting the registry keys.
Boot or Logon Autostart Execution:Registry Run Keys
ANDROMEDA can establish persistence by dropping a sample of itself to C:\ProgramData\Local Settings\Temp\mskmde.com and adding a Registry run key to execute every time a user logs on.
Boot or Logon Autostart Execution:Registry Run Keys
AppleSeed has the ability to create the Registry key name EstsoftAutoUpdate at HKCU\Software\Microsoft/Windows\CurrentVersion\RunOnce to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It establishes persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run key.
Boot or Logon Autostart Execution:Registry Run Keys
An It HTTP malware variant establishes persistence by setting the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Debug Tools-%LOCALAPPDATA%\.
Boot or Logon Autostart Execution:Registry Run Keys
It has deployed malware that has copied itself to the startup directory for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It added Registry Run keys to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It places scripts in the startup folder for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It established persistence using Registry Run keys, both to execute PowerShell and VBS scripts as well as to execute their backdoor directly.
Boot or Logon Autostart Execution:Registry Run Keys
It has deployed a tool known as DarkComet to the Startup folder of a victim, and used Registry run keys to gain persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It's has added persistence via the Registry key HKCU\Software\Microsoft\CurrentVersion\Run\.
Boot or Logon Autostart Execution:Registry Run Keys
It has maintained persistence using the startup folder.
Boot or Logon Autostart Execution:Registry Run Keys
It created and modified startup files for persistence. It added a registry key in HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost to establish persistence for Cobalt Strike.
Boot or Logon Autostart Execution:Registry Run Keys
Aria-body has established persistence via the Startup folder or Run Registry key.
Boot or Logon Autostart Execution:Registry Run Keys
Astaroth creates a startup item for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
AuTo Stealer can place malicious executables in a victim's AutoRun registry key or StartUp directory, depending on the AV product installed, to maintain persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Avaddon uses registry run keys for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
AvosLocker has been executed via the RunOnce Registry key to run itself on safe mode.
Boot or Logon Autostart Execution:Registry Run Keys
BabyShark has added a Registry key to ensure all future macros are enabled for Microsoft Word and Excel as well as for additional persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Backdoor.Oldrea adds Registry Run keys to achieve persistence.
Boot or Logon Autostart Execution:Registry Run Keys
BACKSPACE achieves persistence by creating a shortcut to itself in the CSIDL_STARTUP directory.
Boot or Logon Autostart Execution:Registry Run Keys
BADNEWS installs a registry Run key to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
BadPatch establishes a foothold by adding a link to the malware executable in the startup folder.
Boot or Logon Autostart Execution:Registry Run Keys
Bazar can create or add files to Registry Run Keys to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
BBSRAT has been loaded through DLL side-loading of a legitimate Citrix executable that is set to persist through the Registry Run key location HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ssonsvr.exe.
Boot or Logon Autostart Execution:Registry Run Keys
Bisonal has added itself to the Registry key HKEY_CURRENT_USER\Software\Microsoft\CurrentVersion\Run\ for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
BitPaymer has set the run key HKCU\Software\Microsoft\Windows\CurrentVersion\Run for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder.
Boot or Logon Autostart Execution:Registry Run Keys
BoomBox can establish persistence by writing the Registry value MicroNativeCacheSvc to HKCU\Software\Microsoft\Windows\CurrentVersion\Run.
Boot or Logon Autostart Execution:Registry Run Keys
Briba creates run key Registry entries pointing to malicious DLLs dropped to disk.
Boot or Logon Autostart Execution:Registry Run Keys
It has used a batch script that adds a Registry Run key to establish malware persistence.
Boot or Logon Autostart Execution:Registry Run Keys
build_downer has the ability to add itself to the Registry Run key for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It stores a configuration files in the startup directory to automatically execute commands in order to persist across reboots.
Boot or Logon Autostart Execution:Registry Run Keys
Carberp has maintained persistence by placing itself inside the current user's startup folder.
Boot or Logon Autostart Execution:Registry Run Keys
Cardinal RAT establishes Persistence by setting the HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load Registry key to point to its executable.
Boot or Logon Autostart Execution:Registry Run Keys
Chaes has added persistence via the Registry key software\microsoft\windows\currentversion\run\microsoft windows html help.
Boot or Logon Autostart Execution:Registry Run Keys
ChChes establishes persistence by adding a Registry Run key.
Boot or Logon Autostart Execution:Registry Run Keys
Chinoxy has established persistence via the HKCU\Software\Microsoft\Windows\CurrentVersion\Run registry key and by loading a dropper to (%COMMON_ STARTUP%\\eoffice.exe).
Boot or Logon Autostart Execution:Registry Run Keys
Clambling can establish persistence by adding a Registry run key.
Boot or Logon Autostart Execution:Registry Run Keys
It has used Registry Run keys for persistence. The group has also set a Startup path to launch the PowerShell shell command and download Cobalt Strike.
Boot or Logon Autostart Execution:Registry Run Keys
Cobian RAT creates an autostart Registry key to ensure persistence.
Boot or Logon Autostart Execution:Registry Run Keys
Comnie achieves persistence by adding a shortcut of itself to the startup path in the Registry.
Boot or Logon Autostart Execution:Registry Run Keys
Conficker adds Registry Run keys to establish persistence.
Boot or Logon Autostart Execution:Registry Run Keys
It has dropped malicious files into the startup folder %AppData%\Microsoft\Windows\Start Menu\Programs\Startup on a compromised host in order to maintain persistence.
Boot or Logon Autostart Execution:Registry Run Keys
CORESHELL has established persistence by creating autostart extensibility point (ASEP) Registry entries in the Run key and other Registry keys, as well as by creating shortcuts in the Internet Explorer Quick Start folder.
Boot or Logon Autostart Execution:Registry Run Keys
One persistence mechanism used by CozyCar is to set itself to be executed at system startup by adding a Registry value under one of the following Registry keys: HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Boot or Logon Autostart Execution:Registry Run Keys
Crimson can add Registry run keys for persistence.
Boot or Logon Autostart Execution:Registry Run Keys
CrossRAT uses run keys for persistence on Windows.
Boot or Logon Autostart Execution:Registry Run Keys
It's version of Bandook adds a registry key to HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run for persistence.