prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Create or Modify System Process:Launch Daemon | Dacls can establish persistence via a Launch Daemon. |
Create or Modify System Process:Launch Daemon | Green Lambert can add a plist file in the Library/LaunchDaemons to establish persistence. |
Create or Modify System Process:Launch Daemon | LoudMiner adds plist files with the naming format com.[random_name].plist in the /Library/LaunchDaemons folder with the RunAtLoad and KeepAlive keys set to true. |
Create or Modify System Process:Launch Daemon | If running with root permissions, OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchDaemons. |
Create or Modify System Process:Launch Daemon | When running with root privileges after a Launch Agent is installed, ThiefQuest installs a plist file to the /Library/LaunchDaemons/ folder with the RunAtLoad key set to true establishing persistence as a Launch Daemon. |
Create or Modify System Process:Launch Daemon | XCSSET uses the ssh launchdaemon to elevate privileges, bypass system controls, and enable remote access to the victim. |
Domain Policy Modification:Group Policy Modification | Egregor can modify the GPO to evade detection. |
Domain Policy Modification:Group Policy Modification | Empire can use New-GPOImmediateTask to modify a GPO that will install and execute a malicious Scheduled Task/Job. |
Domain Policy Modification:Group Policy Modification | HermeticWiper has the ability to deploy through an infected system's default domain policy. |
Domain Policy Modification:Group Policy Modification | It has used Group Policy Objects to deploy batch scripts. |
Domain Policy Modification:Group Policy Modification | Meteor can use group policy to push a scheduled task from the AD to all network machines. |
Domain Policy Modification:Group Policy Modification | Prestige has been deployed using the Default Domain Group Policy Object from an Active Directory Domain Controller. |
Domain Policy Modification:Domain Trust Modification | AADInternals can create a backdoor by converting a domain to a federated domain which will be able to authenticate any user across the tenant. AADInternals can also modify DesktopSSO information. |
Domain Policy Modification:Domain Trust Modification | During the SolarWinds Compromise, It changed domain federation trust settings using Azure AD administrative permissions to configure the domain to accept authorization tokens signed by their own SAML signing certificate. |
Escape to Host | Doki’s container was configured to bind the host root directory. |
Escape to Host | Hildegard has used the BOtB tool that can break out of containers. |
Escape to Host | Peirates can gain a reverse shell on a host node by mounting the Kubernetes hostPath. |
Escape to Host | Siloscape maps the host’s C drive to the container by creating a global symbolic link to the host through the calling of NtSetInformationSymbolicLink. |
Escape to Host | It has deployed privileged containers that mount the filesystem of victim machine. |
Event Triggered Execution | Pacu can set up S3 bucket notifications to trigger a malicious Lambda function when a CloudFormation template is uploaded to the bucket. It can also create Lambda functions that trigger upon the creation of users, roles, and groups. |
Event Triggered Execution:Change Default File Association | It has a HWP document stealer module which changes the default program association in the registry to open HWP documents. |
Event Triggered Execution:Change Default File Association | SILENTTRINITY can conduct an image hijack of an .msc file extension as part of its UAC bypass process. |
Event Triggered Execution:Screensaver | Gazer can establish persistence through the system screensaver by configuring it to execute the malware. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | adbupd can use a WMI script to achieve persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has used WMI event subscriptions for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has attempted to use WMI event subscriptions to establish persistence on compromised hosts. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | BADHATCH can use WMI event subscriptions for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has used WMI event subscriptions for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has used WMI for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has established persistence through the use of a WMI event subscription combined with unusual living-off-the-land binaries such as cdb.exe. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | metaMain registered a WMI event subscription consumer called "hard_disk_stat" to establish persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It's custom ORat tool uses a WMI event consumer to maintain persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | During Operation Ghost, It used WMI event subscriptions to establish persistence for malware. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | PoshC2 has the ability to persist on a system using WMI events. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | POSHSPY uses a WMI event subscription to establish persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | POWERTON can use WMI for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | Sardonic can use a WMI event filter to invoke a command-line event consumer to gain persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | SILENTTRINITY can create a WMI Event to execute a payload for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | During the SolarWinds Compromise, It used a WMI event filter to invoke a command-line event consumer at system boot time to launch a backdoor with rundll32.exe. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | TrailBlazer has the ability to use WMI for persistence. |
Event Triggered Execution:Windows Management Instrumentation Event Subscription | It has used WMI event filters and consumers to establish persistence. |
Event Triggered Execution:Unix Shell Configuration Modification | Green Lambert can establish persistence on a compromised host through modifying the profile, login, and run command (rc) files associated with the bash, csh, and tcsh shells. |
Event Triggered Execution:Unix Shell Configuration Modification | Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files. |
Event Triggered Execution:Unix Shell Configuration Modification | When executing with non-root level permissions, RotaJakiro can install persistence by adding a command to the .bashrc file that executes a binary in the ${HOME}/.gvfsd/.profile/ folder. |
Event Triggered Execution:Netsh Helper DLL | netsh can be used as a persistence proxy technique to execute a helper DLL when netsh.exe is executed. |
Event Triggered Execution:Accessibility Features | It used sticky-keys to obtain unauthenticated, privileged console access. |
Event Triggered Execution:Accessibility Features | It replaces the Sticky Keys binary C:\Windows\System32\sethc.exe for persistence. |
Event Triggered Execution:Accessibility Features | It leveraged sticky keys to establish persistence. |
Event Triggered Execution:Accessibility Features | It actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence. |
Event Triggered Execution:Accessibility Features | It has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions. |
Event Triggered Execution:Accessibility Features | Empire can leverage WMI debugging to remotely replace binaries like sethc.exe, Utilman.exe, and Magnify.exe with cmd.exe. |
Event Triggered Execution:Accessibility Features | It has used sticky keys to launch a command prompt. |
Event Triggered Execution:AppCert DLLs | PUNCHBUGGY can establish using a AppCertDLLs Registry key. |
Event Triggered Execution:AppInit DLLs | It has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence. |
Event Triggered Execution:AppInit DLLs | Some variants of Cherry Picker use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows "AppInit_DLLs"="pserver32.dll" |
Event Triggered Execution:AppInit DLLs | Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key. |
Event Triggered Execution:AppInit DLLs | If a victim meets certain criteria, T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL, ResN32.dll. It does this by creating the following Registry keys: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs – %APPDATA%\Intel\ResN32.dll and HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs – 0x1. |
Event Triggered Execution:Application Shimming | It has used application shim databases for persistence. |
Event Triggered Execution:Application Shimming | Pillowmint has used a malicious shim database to maintain persistence. |
Event Triggered Execution:Application Shimming | SDBbot has the ability to use application shimming for persistence if it detects it is running as admin on Windows XP or 7, by creating a shim database to patch services.exe. |
Event Triggered Execution:Application Shimming | ShimRat has installed shim databases in the AppPatch folder. |
Event Triggered Execution:Image File Execution Options Injection | SDBbot has the ability to use image file execution options for persistence if it detects it is running with admin privileges on a Windows version newer than Windows 7. |
Event Triggered Execution:Image File Execution Options Injection | SUNBURST created an Image File Execution Options (IFEO) Debugger registry value for the process dllhost.exe to trigger the installation of Cobalt Strike. |
Event Triggered Execution:Image File Execution Options Injection | It has modified and added entries within HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options to maintain persistence. |
Event Triggered Execution:PowerShell Profile | It has used PowerShell profiles to maintain persistence on an infected machine. |
Event Triggered Execution:Component Object Model Hijacking | Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object. |
Event Triggered Execution:Component Object Model Hijacking | It has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload. |
Event Triggered Execution:Component Object Model Hijacking | BBSRAT has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture. |
Event Triggered Execution:Component Object Model Hijacking | ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\Software\Classes\CLSID{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32. |
Event Triggered Execution:Component Object Model Hijacking | Ferocious can use COM hijacking to establish persistence. |
Event Triggered Execution:Component Object Model Hijacking | JHUHUGIT has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}). |
Event Triggered Execution:Component Object Model Hijacking | KONNI has modified ComSysApp service to load the malicious DLL payload. |
Event Triggered Execution:Component Object Model Hijacking | Mosquito uses COM hijacking as a method of persistence. |
Event Triggered Execution:Component Object Model Hijacking | PcShare has created the HKCU\\Software\\Classes\\CLSID\\{42aedc87-2188-41fd-b9a3-0c966feabec1}\\InprocServer32 Registry key for persistence. |
Event Triggered Execution:Component Object Model Hijacking | SILENTTRINITY can add a CLSID key for payload execution through Registry.CurrentUser.CreateSubKey("Software\\Classes\\CLSID\\{" + clsid + "}\\InProcServer32"). |
Event Triggered Execution:Component Object Model Hijacking | SVCReady has created the HKEY_CURRENT_USER\Software\Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19} Registry key for persistence. |
Event Triggered Execution:Component Object Model Hijacking | WarzoneRAT can perform COM hijacking by setting the path to itself to the HKCU\Software\Classes\Folder\shell\open\command key with a DelegateExecute parameter. |
Event Triggered Execution:Installer Packages | During AppleJeus's installation process, it uses postinstall scripts to extract a hidden plist from the application's /Resources folder and execute the plist file as a Launch Daemon with elevated permissions. |
Exploitation for Privilege Escalation | It has exploited CVE-2014-4076, CVE-2015-2387, CVE-2015-1701, CVE-2017-0263 to escalate privileges. |
Exploitation for Privilege Escalation | It has exploited CVE-2021-36934 to escalate privileges on a compromised host. |
Exploitation for Privilege Escalation | It has used CVE-2016-7255 to escalate privileges. |
Exploitation for Privilege Escalation | It has used a publicly available exploit for CVE-2017-0213 to escalate privileges on a local system. |
Exploitation for Privilege Escalation | It has exploited CVE-2021-1732 for privilege escalation. |
Exploitation for Privilege Escalation | During C0017, It abused named pipe impersonation for privilege escalation. |
Exploitation for Privilege Escalation | Carberp has exploited multiple Windows vulnerabilities (CVE-2010-2743, CVE-2010-3338, CVE-2010-4398, CVE-2008-1084) and a .NET Runtime Optimization vulnerability for privilege escalation. |
Exploitation for Privilege Escalation | It has used exploits to increase their levels of rights and privileges. |
Exploitation for Privilege Escalation | Cobalt Strike can exploit vulnerabilities such as MS14-058. |
Exploitation for Privilege Escalation | CosmicDuke attempts to exploit privilege escalation vulnerabilities CVE-2010-0232 or CVE-2010-4398. |
Exploitation for Privilege Escalation | Empire can exploit vulnerabilities such as MS16-032 and MS16-135. |
Exploitation for Privilege Escalation | It has used tools to exploit Windows vulnerabilities in order to escalate privileges. The tools targeted CVE-2013-3660, CVE-2011-2005, and CVE-2010-4398, all of which could allow local users to access kernel-level privileges. |
Exploitation for Privilege Escalation | It has exploited the CVE-2016-0167 local vulnerability. |
Exploitation for Privilege Escalation | Hildegard has used the BOtB tool which exploits CVE-2019-5736. |
Exploitation for Privilege Escalation | InvisiMole has exploited CVE-2007-5633 vulnerability in the speedfan.sys driver to obtain kernel mode privileges. |
Exploitation for Privilege Escalation | JHUHUGIT has exploited CVE-2015-1701 and CVE-2015-2387 to escalate privileges. |
Exploitation for Privilege Escalation | It has exploited unpatched vulnerabilities on internally accessible servers including JIRA, GitLab, and Confluence for privilege escalation. |
Exploitation for Privilege Escalation | It has exploited CVE-2021-1732 to execute malware components with elevated rights. |
Exploitation for Privilege Escalation | Pandora can use CVE-2017-15303 to bypass Windows Driver Signature Enforcement (DSE) protection and load its driver. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.