prompt
stringclasses
508 values
procedure
stringlengths
20
478
Boot or Logon Autostart Execution:Shortcut Modification
The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder.
Boot or Logon Autostart Execution:Shortcut Modification
Comnie establishes persistence via a .lnk file in the victim’s startup path.
Boot or Logon Autostart Execution:Shortcut Modification
Empire can persist by modifying a .LNK file to include a backdoor.
Boot or Logon Autostart Execution:Shortcut Modification
FELIXROOT creates a .LNK file for persistence.
Boot or Logon Autostart Execution:Shortcut Modification
Gazer can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe.
Boot or Logon Autostart Execution:Shortcut Modification
It malware can create a .lnk file and add a Registry Run key to establish persistence.
Boot or Logon Autostart Execution:Shortcut Modification
Grandoreiro can write or modify browser shortcuts to enable launching of malicious browser extensions.
Boot or Logon Autostart Execution:Shortcut Modification
Helminth establishes persistence by creating a shortcut.
Boot or Logon Autostart Execution:Shortcut Modification
InvisiMole can use a .lnk shortcut for the Control Panel to establish persistence.
Boot or Logon Autostart Execution:Shortcut Modification
Kazuar adds a .lnk file to the Windows startup folder.
Boot or Logon Autostart Execution:Shortcut Modification
A version of KONNI drops a Windows shortcut on the victim’s machine to establish persistence.
Boot or Logon Autostart Execution:Shortcut Modification
It malware has maintained persistence on a system by creating a LNK shortcut in the user’s Startup folder.
Boot or Logon Autostart Execution:Shortcut Modification
It has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.
Boot or Logon Autostart Execution:Shortcut Modification
MarkiRAT can modify the shortcut that launches Telegram by replacing its path with the malicious payload to launch with the legitimate executable.
Boot or Logon Autostart Execution:Shortcut Modification
Micropsia creates a shortcut to maintain persistence.
Boot or Logon Autostart Execution:Shortcut Modification
Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder.
Boot or Logon Autostart Execution:Shortcut Modification
Reaver creates a shortcut file and saves it in a Startup folder to establish persistence.
Boot or Logon Autostart Execution:Shortcut Modification
RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence.
Boot or Logon Autostart Execution:Shortcut Modification
RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in.
Boot or Logon Autostart Execution:Shortcut Modification
S-Type may create the file %HOMEPATH%\Start Menu\Programs\Startup\Realtek {Unique Identifier}.lnk, which points to the malicious msdtc.exe file already created in the %CommonFiles% directory.
Boot or Logon Autostart Execution:Shortcut Modification
SeaDuke is capable of persisting via a .lnk file stored in the Startup directory.
Boot or Logon Autostart Execution:Shortcut Modification
SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder.
Boot or Logon Autostart Execution:Shortcut Modification
SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder.
Boot or Logon Autostart Execution:Shortcut Modification
To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an "Office Start," "Yahoo Talk," "MSN Gaming Z0ne," or "MSN Talk" shortcut.
Boot or Logon Autostart Execution:Shortcut Modification
TinyZBot can create a shortcut in the Windows startup folder for persistence.
Boot or Logon Autostart Execution:Print Processors
It has added the Registry key HKLM\SYSTEM\ControlSet001\Control\Print\Environments\Windows x64\Print Processors\UDPrint" /v Driver /d "spool.dll /f to load malware as a Print Processor.
Boot or Logon Autostart Execution:Print Processors
Gelsemium can drop itself in C:\Windows\System32\spool\prtprocs\x64\winprint.dll to be loaded automatically by the spoolsv Windows service.
Boot or Logon Autostart Execution:Print Processors
The PipeMon installer has modified the Registry key HKLM\SYSTEM\CurrentControlSet\Control\Print\Environments\Windows x64\Print Processors to install PipeMon as a Print Processor.
Boot or Logon Autostart Execution:XDG Autostart Entries
CrossRAT can use an XDG Autostart to establish persistence.
Boot or Logon Autostart Execution:XDG Autostart Entries
If executing without root privileges, Fysbis adds a .desktop configuration file to the user's ~/.config/autostart directory.
Boot or Logon Autostart Execution:XDG Autostart Entries
NETWIRE can use XDG Autostart Entries to establish persistence on Linux systems.
Boot or Logon Autostart Execution:XDG Autostart Entries
Pupy can use an XDG Autostart to establish persistence.
Boot or Logon Autostart Execution:XDG Autostart Entries
When executing with user-level permissions, RotaJakiro can install persistence using a .desktop file under the $HOME/.config/autostart/ folder.
Boot or Logon Autostart Execution:Active Setup
PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.
Boot or Logon Autostart Execution:Login Items
Dok uses AppleScript to install a login Item by sending Apple events to the System Events process.
Boot or Logon Autostart Execution:Login Items
Green Lambert can add Login Items to establish persistence.
Boot or Logon Autostart Execution:Login Items
NETWIRE can persist via startup options for Login items.
Boot or Logon Initialization Scripts
It has hijacked legitimate application-specific startup scripts to enable malware to execute on system startup.
Boot or Logon Initialization Scripts
It has installed an "init.d" startup script to maintain persistence.
Boot or Logon Initialization Scripts
Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a .conf file in the /etc/init/ folder.
Boot or Logon Initialization Scripts:Logon Script (Windows)
An It loader Trojan adds the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.
Boot or Logon Initialization Scripts:Logon Script (Windows)
Attor's dispatcher can establish persistence via adding a Registry key with a logon script HKEY_CURRENT_USER\Environment "UserInitMprLogonScript" .
Boot or Logon Initialization Scripts:Logon Script (Windows)
It has added persistence by registering the file name for the next stage malware under HKCU\Environment\UserInitMprLogonScript.
Boot or Logon Initialization Scripts:Logon Script (Windows)
JHUHUGIT has registered a Windows shell script under the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.
Boot or Logon Initialization Scripts:Logon Script (Windows)
KGH_SPY has the ability to set the HKCU\Environment\UserInitMprLogonScript Registry key to execute logon scripts.
Boot or Logon Initialization Scripts:Logon Script (Windows)
Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\Environment\UserInitMprLogonScript.
Boot or Logon Initialization Scripts:RC Scripts
It has installed a run command on a compromised system to enable malware execution on system startup.
Boot or Logon Initialization Scripts:RC Scripts
Cyclops Blink has the ability to execute on device startup, using a modified RC script named S51armled.
Boot or Logon Initialization Scripts:RC Scripts
Green Lambert can add init.d and rc.d files in the /etc folder to establish persistence.
Boot or Logon Initialization Scripts:RC Scripts
HiddenWasp installs reboot persistence by adding itself to /etc/rc.local.
Boot or Logon Initialization Scripts:RC Scripts
iKitten adds an entry to the rc.common file for persistence.
Boot or Logon Initialization Scripts:Startup Items
jRAT can list and manage startup entries.
Create or Modify System Process
Exaramel for Linux has a hardcoded location that it uses to achieve persistence if the startup system is Upstart or System V and it is running as root.
Create or Modify System Process:Launch Agent
Bundlore can persist via a LaunchAgent.
Create or Modify System Process:Launch Agent
Calisto adds a .plist file to the /Library/LaunchAgents folder to maintain persistence.
Create or Modify System Process:Launch Agent
CoinTicker creates user launch agents named .espl.plist and com.apple.[random string].plist to establish persistence.
Create or Modify System Process:Launch Agent
CookieMiner has installed multiple new Launch Agents in order to maintain persistence for cryptocurrency mining software.
Create or Modify System Process:Launch Agent
CrossRAT creates a Launch Agent on macOS.
Create or Modify System Process:Launch Agent
Dacls can establish persistence via a LaunchAgent.
Create or Modify System Process:Launch Agent
Dok installs two LaunchAgents to redirect all network traffic with a randomly generated name for each plist file maintaining the format com.random.name.plist.
Create or Modify System Process:Launch Agent
FruitFly persists via a Launch Agent.
Create or Modify System Process:Launch Agent
Green Lambert can create a Launch Agent with the RunAtLoad key-value pair set to true, ensuring the com.apple.GrowlHelper.plist file runs every time a user logs in.
Create or Modify System Process:Launch Agent
Keydnap uses a Launch Agent to persist.
Create or Modify System Process:Launch Agent
The Komplex trojan creates a persistent launch agent called with $HOME/Library/LaunchAgents/com.apple.updates.plist with launchctl load -w ~/Library/LaunchAgents/com.apple.updates.plist.
Create or Modify System Process:Launch Agent
MacMa installs a com.apple.softwareupdate.plist file in the /LaunchAgents folder with the RunAtLoad value set to true. Upon user login, MacMa is executed from /var/root/.local/softwareupdate with root privileges. Some variations also include the LimitLoadToSessionType key with the value Aqua, ensuring the MacMa only runs when there is a logged in GUI user.
Create or Modify System Process:Launch Agent
macOS.OSAMiner has placed a Stripped Payloads with a plist extension in the Launch Agent's folder.
Create or Modify System Process:Launch Agent
MacSpy persists via a Launch Agent.
Create or Modify System Process:Launch Agent
NETWIRE can use launch agents for persistence.
Create or Modify System Process:Launch Agent
OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchAgents.
Create or Modify System Process:Launch Agent
Proton persists via Launch Agent.
Create or Modify System Process:Launch Agent
ThiefQuest installs a launch item using an embedded encrypted launch agent property list template. The plist file is installed in the ~/Library/LaunchAgents/ folder and configured with the path to the persistent binary located in the ~/Library/ folder.
Create or Modify System Process:Systemd Service
Exaramel for Linux has a hardcoded location under systemd that it uses to achieve persistence if it is running as root.
Create or Modify System Process:Systemd Service
Fysbis has established persistence using a systemd service.
Create or Modify System Process:Systemd Service
Hildegard has started a monero service.
Create or Modify System Process:Systemd Service
Pupy can be used to establish persistence using a systemd service.
Create or Modify System Process:Systemd Service
It has installed a systemd service script to maintain persistence.
Create or Modify System Process:Systemd Service
Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a .service file under the /lib/systemd/system/ folder.
Create or Modify System Process:Systemd Service
SysUpdate can copy a script to the user owned /usr/lib/systemd/system/ directory with a symlink mapped to a root owned directory, /etc/ystem/system, in the unit configuration file's ExecStart directive to establish persistence and elevate privileges.
Create or Modify System Process:Systemd Service
It has established persistence through the creation of a cryptocurrency mining system service using systemctl.
Create or Modify System Process:Windows Service
During the 2016 Ukraine Electric Power Attack, It used an arbitrary system service to load at system boot for persistence for Industroyer. They also replaced the ImagePath registry value of a Windows service with a new backdoor binary.
Create or Modify System Process:Windows Service
Anchor can establish persistence by creating a service.
Create or Modify System Process:Windows Service
AppleJeus can install itself as a service.
Create or Modify System Process:Windows Service
An It Port 22 malware variant registers itself as a service.
Create or Modify System Process:Windows Service
It has a tool that creates a new service for persistence.
Create or Modify System Process:Windows Service
It modified Windows Services to ensure PowerShell scripts were loaded on the system. It also creates a Windows service to establish persistence.
Create or Modify System Process:Windows Service
It has installed a new Windows service to establish persistence.
Create or Modify System Process:Windows Service
It modified legitimate Windows services to install malware backdoors. It created the StorSyncSvc service to provide persistence for Cobalt Strike.
Create or Modify System Process:Windows Service
Attor's dispatcher can establish persistence by registering a new service.
Create or Modify System Process:Windows Service
AuditCred is installed as a new service on the system.
Create or Modify System Process:Windows Service
Bankshot can terminate a specific process by its process id.
Create or Modify System Process:Windows Service
BBSRAT can modify service configurations.
Create or Modify System Process:Windows Service
Bisonal has been modified to be used as a Windows service.
Create or Modify System Process:Windows Service
BitPaymer has attempted to install itself as a service to maintain persistence.
Create or Modify System Process:Windows Service
Black Basta can create a new service to establish persistence.
Create or Modify System Process:Windows Service
One variant of BlackEnergy creates a new service using either a hard-coded or randomly generated name.
Create or Modify System Process:Windows Service
It has made their XMRIG payloads persistent as a Windows Service.
Create or Modify System Process:Windows Service
Briba installs a service pointing to a malicious DLL dropped to disk.
Create or Modify System Process:Windows Service
It malware installs itself as a service to provide persistence and SYSTEM privileges.
Create or Modify System Process:Windows Service
Carbon establishes persistence by creating a service and naming it based off the operating system version running on the current machine.
Create or Modify System Process:Windows Service
Catchamas adds a new service named NetAdapter to establish persistence.