prompt
stringclasses
508 values
procedure
stringlengths
20
478
Create or Modify System Process:Launch Daemon
Dacls can establish persistence via a Launch Daemon.
Create or Modify System Process:Launch Daemon
Green Lambert can add a plist file in the Library/LaunchDaemons to establish persistence.
Create or Modify System Process:Launch Daemon
LoudMiner adds plist files with the naming format com.[random_name].plist in the /Library/LaunchDaemons folder with the RunAtLoad and KeepAlive keys set to true.
Create or Modify System Process:Launch Daemon
If running with root permissions, OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchDaemons.
Create or Modify System Process:Launch Daemon
When running with root privileges after a Launch Agent is installed, ThiefQuest installs a plist file to the /Library/LaunchDaemons/ folder with the RunAtLoad key set to true establishing persistence as a Launch Daemon.
Create or Modify System Process:Launch Daemon
XCSSET uses the ssh launchdaemon to elevate privileges, bypass system controls, and enable remote access to the victim.
Domain Policy Modification:Group Policy Modification
Egregor can modify the GPO to evade detection.
Domain Policy Modification:Group Policy Modification
Empire can use New-GPOImmediateTask to modify a GPO that will install and execute a malicious Scheduled Task/Job.
Domain Policy Modification:Group Policy Modification
HermeticWiper has the ability to deploy through an infected system's default domain policy.
Domain Policy Modification:Group Policy Modification
It has used Group Policy Objects to deploy batch scripts.
Domain Policy Modification:Group Policy Modification
Meteor can use group policy to push a scheduled task from the AD to all network machines.
Domain Policy Modification:Group Policy Modification
Prestige has been deployed using the Default Domain Group Policy Object from an Active Directory Domain Controller.
Domain Policy Modification:Domain Trust Modification
AADInternals can create a backdoor by converting a domain to a federated domain which will be able to authenticate any user across the tenant. AADInternals can also modify DesktopSSO information.
Domain Policy Modification:Domain Trust Modification
During the SolarWinds Compromise, It changed domain federation trust settings using Azure AD administrative permissions to configure the domain to accept authorization tokens signed by their own SAML signing certificate.
Escape to Host
Doki’s container was configured to bind the host root directory.
Escape to Host
Hildegard has used the BOtB tool that can break out of containers.
Escape to Host
Peirates can gain a reverse shell on a host node by mounting the Kubernetes hostPath.
Escape to Host
Siloscape maps the host’s C drive to the container by creating a global symbolic link to the host through the calling of NtSetInformationSymbolicLink.
Escape to Host
It has deployed privileged containers that mount the filesystem of victim machine.
Event Triggered Execution
Pacu can set up S3 bucket notifications to trigger a malicious Lambda function when a CloudFormation template is uploaded to the bucket. It can also create Lambda functions that trigger upon the creation of users, roles, and groups.
Event Triggered Execution:Change Default File Association
It has a HWP document stealer module which changes the default program association in the registry to open HWP documents.
Event Triggered Execution:Change Default File Association
SILENTTRINITY can conduct an image hijack of an .msc file extension as part of its UAC bypass process.
Event Triggered Execution:Screensaver
Gazer can establish persistence through the system screensaver by configuring it to execute the malware.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
adbupd can use a WMI script to achieve persistence.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
It has used WMI event subscriptions for persistence.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
It has attempted to use WMI event subscriptions to establish persistence on compromised hosts.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
BADHATCH can use WMI event subscriptions for persistence.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
It has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
It has used WMI event subscriptions for persistence.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
It has used WMI for persistence.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
It has established persistence through the use of a WMI event subscription combined with unusual living-off-the-land binaries such as cdb.exe.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
metaMain registered a WMI event subscription consumer called "hard_disk_stat" to establish persistence.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
It's custom ORat tool uses a WMI event consumer to maintain persistence.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
During Operation Ghost, It used WMI event subscriptions to establish persistence for malware.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
PoshC2 has the ability to persist on a system using WMI events.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
POSHSPY uses a WMI event subscription to establish persistence.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
POWERTON can use WMI for persistence.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
Sardonic can use a WMI event filter to invoke a command-line event consumer to gain persistence.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
SILENTTRINITY can create a WMI Event to execute a payload for persistence.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
During the SolarWinds Compromise, It used a WMI event filter to invoke a command-line event consumer at system boot time to launch a backdoor with rundll32.exe.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
TrailBlazer has the ability to use WMI for persistence.
Event Triggered Execution:Windows Management Instrumentation Event Subscription
It has used WMI event filters and consumers to establish persistence.
Event Triggered Execution:Unix Shell Configuration Modification
Green Lambert can establish persistence on a compromised host through modifying the profile, login, and run command (rc) files associated with the bash, csh, and tcsh shells.
Event Triggered Execution:Unix Shell Configuration Modification
Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files.
Event Triggered Execution:Unix Shell Configuration Modification
When executing with non-root level permissions, RotaJakiro can install persistence by adding a command to the .bashrc file that executes a binary in the ${HOME}/.gvfsd/.profile/ folder.
Event Triggered Execution:Netsh Helper DLL
netsh can be used as a persistence proxy technique to execute a helper DLL when netsh.exe is executed.
Event Triggered Execution:Accessibility Features
It used sticky-keys to obtain unauthenticated, privileged console access.
Event Triggered Execution:Accessibility Features
It replaces the Sticky Keys binary C:\Windows\System32\sethc.exe for persistence.
Event Triggered Execution:Accessibility Features
It leveraged sticky keys to establish persistence.
Event Triggered Execution:Accessibility Features
It actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence.
Event Triggered Execution:Accessibility Features
It has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions.
Event Triggered Execution:Accessibility Features
Empire can leverage WMI debugging to remotely replace binaries like sethc.exe, Utilman.exe, and Magnify.exe with cmd.exe.
Event Triggered Execution:Accessibility Features
It has used sticky keys to launch a command prompt.
Event Triggered Execution:AppCert DLLs
PUNCHBUGGY can establish using a AppCertDLLs Registry key.
Event Triggered Execution:AppInit DLLs
It has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence.
Event Triggered Execution:AppInit DLLs
Some variants of Cherry Picker use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows "AppInit_DLLs"="pserver32.dll"
Event Triggered Execution:AppInit DLLs
Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key.
Event Triggered Execution:AppInit DLLs
If a victim meets certain criteria, T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL, ResN32.dll. It does this by creating the following Registry keys: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs – %APPDATA%\Intel\ResN32.dll and HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs – 0x1.
Event Triggered Execution:Application Shimming
It has used application shim databases for persistence.
Event Triggered Execution:Application Shimming
Pillowmint has used a malicious shim database to maintain persistence.
Event Triggered Execution:Application Shimming
SDBbot has the ability to use application shimming for persistence if it detects it is running as admin on Windows XP or 7, by creating a shim database to patch services.exe.
Event Triggered Execution:Application Shimming
ShimRat has installed shim databases in the AppPatch folder.
Event Triggered Execution:Image File Execution Options Injection
SDBbot has the ability to use image file execution options for persistence if it detects it is running with admin privileges on a Windows version newer than Windows 7.
Event Triggered Execution:Image File Execution Options Injection
SUNBURST created an Image File Execution Options (IFEO) Debugger registry value for the process dllhost.exe to trigger the installation of Cobalt Strike.
Event Triggered Execution:Image File Execution Options Injection
It has modified and added entries within HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options to maintain persistence.
Event Triggered Execution:PowerShell Profile
It has used PowerShell profiles to maintain persistence on an infected machine.
Event Triggered Execution:Component Object Model Hijacking
Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object.
Event Triggered Execution:Component Object Model Hijacking
It has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload.
Event Triggered Execution:Component Object Model Hijacking
BBSRAT has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture.
Event Triggered Execution:Component Object Model Hijacking
ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\Software\Classes\CLSID{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32.
Event Triggered Execution:Component Object Model Hijacking
Ferocious can use COM hijacking to establish persistence.
Event Triggered Execution:Component Object Model Hijacking
JHUHUGIT has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}).
Event Triggered Execution:Component Object Model Hijacking
KONNI has modified ComSysApp service to load the malicious DLL payload.
Event Triggered Execution:Component Object Model Hijacking
Mosquito uses COM hijacking as a method of persistence.
Event Triggered Execution:Component Object Model Hijacking
PcShare has created the HKCU\\Software\\Classes\\CLSID\\{42aedc87-2188-41fd-b9a3-0c966feabec1}\\InprocServer32 Registry key for persistence.
Event Triggered Execution:Component Object Model Hijacking
SILENTTRINITY can add a CLSID key for payload execution through Registry.CurrentUser.CreateSubKey("Software\\Classes\\CLSID\\{" + clsid + "}\\InProcServer32").
Event Triggered Execution:Component Object Model Hijacking
SVCReady has created the HKEY_CURRENT_USER\Software\Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19} Registry key for persistence.
Event Triggered Execution:Component Object Model Hijacking
WarzoneRAT can perform COM hijacking by setting the path to itself to the HKCU\Software\Classes\Folder\shell\open\command key with a DelegateExecute parameter.
Event Triggered Execution:Installer Packages
During AppleJeus's installation process, it uses postinstall scripts to extract a hidden plist from the application's /Resources folder and execute the plist file as a Launch Daemon with elevated permissions.
Exploitation for Privilege Escalation
It has exploited CVE-2014-4076, CVE-2015-2387, CVE-2015-1701, CVE-2017-0263 to escalate privileges.
Exploitation for Privilege Escalation
It has exploited CVE-2021-36934 to escalate privileges on a compromised host.
Exploitation for Privilege Escalation
It has used CVE-2016-7255 to escalate privileges.
Exploitation for Privilege Escalation
It has used a publicly available exploit for CVE-2017-0213 to escalate privileges on a local system.
Exploitation for Privilege Escalation
It has exploited CVE-2021-1732 for privilege escalation.
Exploitation for Privilege Escalation
During C0017, It abused named pipe impersonation for privilege escalation.
Exploitation for Privilege Escalation
Carberp has exploited multiple Windows vulnerabilities (CVE-2010-2743, CVE-2010-3338, CVE-2010-4398, CVE-2008-1084) and a .NET Runtime Optimization vulnerability for privilege escalation.
Exploitation for Privilege Escalation
It has used exploits to increase their levels of rights and privileges.
Exploitation for Privilege Escalation
Cobalt Strike can exploit vulnerabilities such as MS14-058.
Exploitation for Privilege Escalation
CosmicDuke attempts to exploit privilege escalation vulnerabilities CVE-2010-0232 or CVE-2010-4398.
Exploitation for Privilege Escalation
Empire can exploit vulnerabilities such as MS16-032 and MS16-135.
Exploitation for Privilege Escalation
It has used tools to exploit Windows vulnerabilities in order to escalate privileges. The tools targeted CVE-2013-3660, CVE-2011-2005, and CVE-2010-4398, all of which could allow local users to access kernel-level privileges.
Exploitation for Privilege Escalation
It has exploited the CVE-2016-0167 local vulnerability.
Exploitation for Privilege Escalation
Hildegard has used the BOtB tool which exploits CVE-2019-5736.
Exploitation for Privilege Escalation
InvisiMole has exploited CVE-2007-5633 vulnerability in the speedfan.sys driver to obtain kernel mode privileges.
Exploitation for Privilege Escalation
JHUHUGIT has exploited CVE-2015-1701 and CVE-2015-2387 to escalate privileges.
Exploitation for Privilege Escalation
It has exploited unpatched vulnerabilities on internally accessible servers including JIRA, GitLab, and Confluence for privilege escalation.
Exploitation for Privilege Escalation
It has exploited CVE-2021-1732 to execute malware components with elevated rights.
Exploitation for Privilege Escalation
Pandora can use CVE-2017-15303 to bypass Windows Driver Signature Enforcement (DSE) protection and load its driver.