prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Exploitation for Privilege Escalation | It has leveraged a zero-day vulnerability to escalate privileges. |
Exploitation for Privilege Escalation | PoshC2 contains modules for local privilege escalation exploits such as CVE-2016-9192 and CVE-2016-0099. |
Exploitation for Privilege Escalation | ProLock can use CVE-2019-0859 to escalate privileges on a compromised host. |
Exploitation for Privilege Escalation | Remsec has a plugin to drop and execute vulnerable Outpost Sandbox or avast! Virtualization drivers in order to gain kernel mode privileges. |
Exploitation for Privilege Escalation | It has deployed a malicious kernel driver through exploitation of CVE-2015-2291 in the Intel Ethernet diagnostics driver for Windows (iqvw64.sys). |
Exploitation for Privilege Escalation | Siloscape has leveraged a vulnerability in Windows containers to perform an Escape to Host. |
Exploitation for Privilege Escalation | Stuxnet used MS10-073 and an undisclosed Task Scheduler vulnerability to escalate privileges on local Windows machines. |
Exploitation for Privilege Escalation | It has used CVE-2014-6324 and CVE-2017-0213 to escalate privileges. |
Exploitation for Privilege Escalation | It has exploited CVE-2019-0803 and MS16-032 to escalate privileges. |
Exploitation for Privilege Escalation | It has exploited vulnerabilities in the VBoxDrv.sys driver to obtain kernel mode privileges. |
Exploitation for Privilege Escalation | It has used an open-source tool to exploit a known Windows privilege escalation vulnerability (CVE-2016-0051) on unpatched computers. |
Exploitation for Privilege Escalation | Wingbird exploits CVE-2016-4117 to allow an executable to gain escalated privileges. |
Exploitation for Privilege Escalation | XCSSET has used a zero-day exploit in the ssh launchdaemon to elevate privileges and bypass SIP. |
Exploitation for Privilege Escalation | ItM has exploited CVE-2017-0005 for local privilege escalation. |
Exploitation for Privilege Escalation | Zox has the ability to leverage local and remote exploits to escalate privileges. |
Hijack Execution Flow | During C0017, It established persistence by loading malicious libraries via modifications to the Import Address Table (IAT) within legitimate Microsoft binaries. |
Hijack Execution Flow | Denis replaces the nonexistent Windows DLL "msfte.dll" with its own malicious version, which is loaded by the SearchIndexer.exe and SearchProtocolHost.exe. |
Hijack Execution Flow | One of Dtrack can replace the normal flow of a program execution with malicious code. |
Hijack Execution Flow | ShimRat can hijack the cryptbase.dll within migwiz.exe to escalate privileges and bypass UAC controls. |
Hijack Execution Flow:DLL Search Order Hijacking | It has used search order hijacking to execute malicious payloads, such as Winnti RAT. |
Hijack Execution Flow:DLL Search Order Hijacking | It has used DLL search-order hijacking to load exe, dll, and dat files into memory. |
Hijack Execution Flow:DLL Search Order Hijacking | Astaroth can launch itself via DLL Search Order Hijacking. |
Hijack Execution Flow:DLL Search Order Hijacking | It has executed DLL search order hijacking. |
Hijack Execution Flow:DLL Search Order Hijacking | BOOSTWRITE has exploited the loading of the legitimate Dwrite.dll file by actually loading the gdi library, which then loads the gdiplus library and ultimately loads the local Dwrite dll. |
Hijack Execution Flow:DLL Search Order Hijacking | Brute Ratel C4 has used search order hijacking to load a malicious payload DLL as a dependency to a benign application packaged in the same ISO. |
Hijack Execution Flow:DLL Search Order Hijacking | Chaes has used search order hijacking to load a malicious DLL. |
Hijack Execution Flow:DLL Search Order Hijacking | Crutch can persist via DLL search order hijacking on Google Chrome, Mozilla Firefox, or Microsoft OneDrive. |
Hijack Execution Flow:DLL Search Order Hijacking | Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges. |
Hijack Execution Flow:DLL Search Order Hijacking | Empire contains modules that can discover and exploit various DLL hijacking opportunities. |
Hijack Execution Flow:DLL Search Order Hijacking | It has used the malware variant, TerraTV, to load a malicious DLL placed in the TeamViewer directory, instead of the original Windows DLL located in a system folder. |
Hijack Execution Flow:DLL Search Order Hijacking | A FinFisher variant uses DLL search order hijacking. |
Hijack Execution Flow:DLL Search Order Hijacking | FoggyWeb's loader has used DLL Search Order Hijacking to load malicious code instead of the legitimate version.dll during the Microsoft.IdentityServer.ServiceHost.exe execution process. |
Hijack Execution Flow:DLL Search Order Hijacking | Hikit has used DLL Search Order Hijacking to load oci.dll as a persistence mechanism. |
Hijack Execution Flow:DLL Search Order Hijacking | HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary, VPDN_LU.exe, to load a malicious DLL that mimics a legitimate Symantec DLL, navlu.dll. |
Hijack Execution Flow:DLL Search Order Hijacking | InvisiMole can be launched by using DLL search order hijacking in which the wrapper DLL is placed in the same folder as explorer.exe and loaded during startup into the Windows Explorer process instead of the legitimate library. |
Hijack Execution Flow:DLL Search Order Hijacking | Melcoz can use DLL hijacking to bypass security controls. |
Hijack Execution Flow:DLL Search Order Hijacking | It has used DLL search order hijacking. |
Hijack Execution Flow:DLL Search Order Hijacking | MirageFox is likely loaded via DLL hijacking into a legitimate McAfee binary. |
Hijack Execution Flow:DLL Search Order Hijacking | PlugX has the ability to use DLL search order hijacking for installation on targeted systems. |
Hijack Execution Flow:DLL Search Order Hijacking | PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes. |
Hijack Execution Flow:DLL Search Order Hijacking | Prikormka uses DLL search order hijacking for persistence by saving itself as ntshrui.dll to the Windows directory so it will load before the legitimate ntshrui.dll saved in the System32 subdirectory. |
Hijack Execution Flow:DLL Search Order Hijacking | Ramsay can hijack outdated Windows application dependencies with malicious versions of its own DLL payload. |
Hijack Execution Flow:DLL Search Order Hijacking | RedLeaves is launched through use of DLL search order hijacking to load a malicious dll. |
Hijack Execution Flow:DLL Search Order Hijacking | It has used search order hijacking to force TeamViewer to load a malicious DLL. |
Hijack Execution Flow:DLL Search Order Hijacking | It has performed DLL search order hijacking to execute their payload. |
Hijack Execution Flow:DLL Search Order Hijacking | It abuses a legitimate and signed Microsoft executable to launch a malicious DLL. |
Hijack Execution Flow:DLL Search Order Hijacking | WastedLocker has performed DLL hijacking before execution. |
Hijack Execution Flow:DLL Search Order Hijacking | Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll). |
Hijack Execution Flow:DLL Search Order Hijacking | It has used search order hijacking to run the loader Vcrodat. |
Hijack Execution Flow:DLL Side-Loading | It launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL. |
Hijack Execution Flow:DLL Side-Loading | It has been known to side load DLLs with a valid version of Chrome with one of their tools. |
Hijack Execution Flow:DLL Side-Loading | It ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder). |
Hijack Execution Flow:DLL Side-Loading | It used legitimate executables to perform DLL side-loading of their malware. |
Hijack Execution Flow:DLL Side-Loading | BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable. |
Hijack Execution Flow:DLL Side-Loading | DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable, ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper. |
Hijack Execution Flow:DLL Side-Loading | It has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories. |
Hijack Execution Flow:DLL Side-Loading | It has used legitimate applications to side-load malicious DLLs. |
Hijack Execution Flow:DLL Side-Loading | Brute Ratel C4 has loaded a malicious DLL by spoofing the name of the legitimate Version.DLL and placing it in the same folder as the digitally-signed Microsoft binary OneDriveUpdater.exe. |
Hijack Execution Flow:DLL Side-Loading | It has used side loading to place malicious DLLs in memory. |
Hijack Execution Flow:DLL Side-Loading | Chinoxy can use a digitally signed binary ("Logitech Bluetooth Wizard Host Process") to load its dll into memory. |
Hijack Execution Flow:DLL Side-Loading | Clambling can store a file named mpsvc.dll, which opens a malicious mpsvc.mui file, in the same folder as the legitimate Microsoft executable MsMpEng.exe to gain execution. |
Hijack Execution Flow:DLL Side-Loading | Denis exploits a security vulnerability to load a fake DLL and execute its code. |
Hijack Execution Flow:DLL Side-Loading | Dridex can abuse legitimate Windows executables to side-load malicious DLL files. |
Hijack Execution Flow:DLL Side-Loading | It has placed a malicious payload in %WINDIR%\SYSTEM32\oci.dll so it would be sideloaded by the MSDTC service. |
Hijack Execution Flow:DLL Side-Loading | Ecipekac can abuse the legitimate application policytool.exe to load a malicious DLL. |
Hijack Execution Flow:DLL Side-Loading | Egregor has used DLL side-loading to execute its payload. |
Hijack Execution Flow:DLL Side-Loading | It has used IISCrack.dll as a side-loading technique to load a malicious version of httpodbc.dll on old IIS Servers (CVE-2001-0507). |
Hijack Execution Flow:DLL Side-Loading | FinFisher uses DLL side-loading to load malicious programs. |
Hijack Execution Flow:DLL Side-Loading | It used DLL side-loading to covertly load PoisonIvy into memory on the victim machine. |
Hijack Execution Flow:DLL Side-Loading | A gh0st RAT variant has used DLL side-loading. |
Hijack Execution Flow:DLL Side-Loading | Goopy has the ability to side-load malicious DLLs with legitimate applications from Kaspersky, Microsoft, and Google. |
Hijack Execution Flow:DLL Side-Loading | It’s JavaScript file used a legitimate Microsoft Office 2007 package to side-load the OINFO12.OCX dynamic link library. |
Hijack Execution Flow:DLL Side-Loading | HTTPBrowser has used DLL side-loading. |
Hijack Execution Flow:DLL Side-Loading | HyperBro has used a legitimate application to sideload a DLL to decrypt, decompress, and run a payload. |
Hijack Execution Flow:DLL Side-Loading | Javali can use DLL side-loading to load malicious DLLs into legitimate executables. |
Hijack Execution Flow:DLL Side-Loading | Kerrdown can use DLL side-loading to load malicious DLLs. |
Hijack Execution Flow:DLL Side-Loading | It has replaced win_fw.dll, an internal component that is executed during IDA Pro installation, with a malicious DLL to download and execute a payload. |
Hijack Execution Flow:DLL Side-Loading | LookBack side loads its communications module as a DLL into the libcurl.dll loader. |
Hijack Execution Flow:DLL Side-Loading | It has used legitimate executables such as winword.exe and igfxem.exe to side-load their malware. |
Hijack Execution Flow:DLL Side-Loading | It has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as UPPERCUT. |
Hijack Execution Flow:DLL Side-Loading | metaMain can support an HKCMD sideloading start method. |
Hijack Execution Flow:DLL Side-Loading | Metamorfo has side-loaded its malicious DLL file. |
Hijack Execution Flow:DLL Side-Loading | It maintains persistence on victim networks through side-loading dlls to trick legitimate programs into running malware. |
Hijack Execution Flow:DLL Side-Loading | It has used a legitimately signed executable to execute a malicious payload within a DLL file. |
Hijack Execution Flow:DLL Side-Loading | It has used DLL side-loading to load malicious DLL's into legitimate executables. |
Hijack Execution Flow:DLL Side-Loading | Nebulae can use DLL side-loading to gain execution. |
Hijack Execution Flow:DLL Side-Loading | During Operation CuckooBees, the threat actors used the legitimate Windows services IKEEXT and PrintNotify to side-load malicious DLLs. |
Hijack Execution Flow:DLL Side-Loading | Pandora can use DLL side-loading to execute malicious payloads. |
Hijack Execution Flow:DLL Side-Loading | A It .dll that contains BADNEWS is loaded and executed using DLL side-loading. |
Hijack Execution Flow:DLL Side-Loading | PlugX has used DLL side-loading to evade anti-virus. |
Hijack Execution Flow:DLL Side-Loading | PowGoop can side-load Goopdate.dll into GoogleUpdate.exe. |
Hijack Execution Flow:DLL Side-Loading | QakBot has the ability to use DLL side-loading for execution. |
Hijack Execution Flow:DLL Side-Loading | RainyDay can use side-loading to run malicious executables. |
Hijack Execution Flow:DLL Side-Loading | RCSession can be installed via DLL side-loading. |
Hijack Execution Flow:DLL Side-Loading | Sakula uses DLL side-loading, typically using a digitally signed sample of Kaspersky Anti-Virus (AV) 6.0 for Windows Workstations or McAfee's Outlook Scan About Box to load malicious DLL files. |
Hijack Execution Flow:DLL Side-Loading | It has used a malicious loader DLL file to execute the credwiz.exe process and side-load the malicious payload Duser.dll. |
Hijack Execution Flow:DLL Side-Loading | It has used DLL side-loading to drop and execute malicious payloads including the hijacking of the legitimate Windows application file rekeywiz.exe. |
Hijack Execution Flow:DLL Side-Loading | SysUpdate can load DLLs through vulnerable legitimate executables. |
Hijack Execution Flow:DLL Side-Loading | During the T9000 installation process, it drops a copy of the legitimate Microsoft binary igfxtray.exe. The executable contains a side-loading weakness which is used to load a portion of the malware. |
Hijack Execution Flow:DLL Side-Loading | It has used DLL side-loading, including by using legitimate Kaspersky antivirus variants as well as rc.exe, a legitimate Microsoft Resource Compiler. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.