prompt
stringclasses
508 values
procedure
stringlengths
20
478
Exploitation for Privilege Escalation
It has leveraged a zero-day vulnerability to escalate privileges.
Exploitation for Privilege Escalation
PoshC2 contains modules for local privilege escalation exploits such as CVE-2016-9192 and CVE-2016-0099.
Exploitation for Privilege Escalation
ProLock can use CVE-2019-0859 to escalate privileges on a compromised host.
Exploitation for Privilege Escalation
Remsec has a plugin to drop and execute vulnerable Outpost Sandbox or avast! Virtualization drivers in order to gain kernel mode privileges.
Exploitation for Privilege Escalation
It has deployed a malicious kernel driver through exploitation of CVE-2015-2291 in the Intel Ethernet diagnostics driver for Windows (iqvw64.sys).
Exploitation for Privilege Escalation
Siloscape has leveraged a vulnerability in Windows containers to perform an Escape to Host.
Exploitation for Privilege Escalation
Stuxnet used MS10-073 and an undisclosed Task Scheduler vulnerability to escalate privileges on local Windows machines.
Exploitation for Privilege Escalation
It has used CVE-2014-6324 and CVE-2017-0213 to escalate privileges.
Exploitation for Privilege Escalation
It has exploited CVE-2019-0803 and MS16-032 to escalate privileges.
Exploitation for Privilege Escalation
It has exploited vulnerabilities in the VBoxDrv.sys driver to obtain kernel mode privileges.
Exploitation for Privilege Escalation
It has used an open-source tool to exploit a known Windows privilege escalation vulnerability (CVE-2016-0051) on unpatched computers.
Exploitation for Privilege Escalation
Wingbird exploits CVE-2016-4117 to allow an executable to gain escalated privileges.
Exploitation for Privilege Escalation
XCSSET has used a zero-day exploit in the ssh launchdaemon to elevate privileges and bypass SIP.
Exploitation for Privilege Escalation
ItM has exploited CVE-2017-0005 for local privilege escalation.
Exploitation for Privilege Escalation
Zox has the ability to leverage local and remote exploits to escalate privileges.
Hijack Execution Flow
During C0017, It established persistence by loading malicious libraries via modifications to the Import Address Table (IAT) within legitimate Microsoft binaries.
Hijack Execution Flow
Denis replaces the nonexistent Windows DLL "msfte.dll" with its own malicious version, which is loaded by the SearchIndexer.exe and SearchProtocolHost.exe.
Hijack Execution Flow
One of Dtrack can replace the normal flow of a program execution with malicious code.
Hijack Execution Flow
ShimRat can hijack the cryptbase.dll within migwiz.exe to escalate privileges and bypass UAC controls.
Hijack Execution Flow:DLL Search Order Hijacking
It has used search order hijacking to execute malicious payloads, such as Winnti RAT.
Hijack Execution Flow:DLL Search Order Hijacking
It has used DLL search-order hijacking to load exe, dll, and dat files into memory.
Hijack Execution Flow:DLL Search Order Hijacking
Astaroth can launch itself via DLL Search Order Hijacking.
Hijack Execution Flow:DLL Search Order Hijacking
It has executed DLL search order hijacking.
Hijack Execution Flow:DLL Search Order Hijacking
BOOSTWRITE has exploited the loading of the legitimate Dwrite.dll file by actually loading the gdi library, which then loads the gdiplus library and ultimately loads the local Dwrite dll.
Hijack Execution Flow:DLL Search Order Hijacking
Brute Ratel C4 has used search order hijacking to load a malicious payload DLL as a dependency to a benign application packaged in the same ISO.
Hijack Execution Flow:DLL Search Order Hijacking
Chaes has used search order hijacking to load a malicious DLL.
Hijack Execution Flow:DLL Search Order Hijacking
Crutch can persist via DLL search order hijacking on Google Chrome, Mozilla Firefox, or Microsoft OneDrive.
Hijack Execution Flow:DLL Search Order Hijacking
Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges.
Hijack Execution Flow:DLL Search Order Hijacking
Empire contains modules that can discover and exploit various DLL hijacking opportunities.
Hijack Execution Flow:DLL Search Order Hijacking
It has used the malware variant, TerraTV, to load a malicious DLL placed in the TeamViewer directory, instead of the original Windows DLL located in a system folder.
Hijack Execution Flow:DLL Search Order Hijacking
A FinFisher variant uses DLL search order hijacking.
Hijack Execution Flow:DLL Search Order Hijacking
FoggyWeb's loader has used DLL Search Order Hijacking to load malicious code instead of the legitimate version.dll during the Microsoft.IdentityServer.ServiceHost.exe execution process.
Hijack Execution Flow:DLL Search Order Hijacking
Hikit has used DLL Search Order Hijacking to load oci.dll as a persistence mechanism.
Hijack Execution Flow:DLL Search Order Hijacking
HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary, VPDN_LU.exe, to load a malicious DLL that mimics a legitimate Symantec DLL, navlu.dll.
Hijack Execution Flow:DLL Search Order Hijacking
InvisiMole can be launched by using DLL search order hijacking in which the wrapper DLL is placed in the same folder as explorer.exe and loaded during startup into the Windows Explorer process instead of the legitimate library.
Hijack Execution Flow:DLL Search Order Hijacking
Melcoz can use DLL hijacking to bypass security controls.
Hijack Execution Flow:DLL Search Order Hijacking
It has used DLL search order hijacking.
Hijack Execution Flow:DLL Search Order Hijacking
MirageFox is likely loaded via DLL hijacking into a legitimate McAfee binary.
Hijack Execution Flow:DLL Search Order Hijacking
PlugX has the ability to use DLL search order hijacking for installation on targeted systems.
Hijack Execution Flow:DLL Search Order Hijacking
PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes.
Hijack Execution Flow:DLL Search Order Hijacking
Prikormka uses DLL search order hijacking for persistence by saving itself as ntshrui.dll to the Windows directory so it will load before the legitimate ntshrui.dll saved in the System32 subdirectory.
Hijack Execution Flow:DLL Search Order Hijacking
Ramsay can hijack outdated Windows application dependencies with malicious versions of its own DLL payload.
Hijack Execution Flow:DLL Search Order Hijacking
RedLeaves is launched through use of DLL search order hijacking to load a malicious dll.
Hijack Execution Flow:DLL Search Order Hijacking
It has used search order hijacking to force TeamViewer to load a malicious DLL.
Hijack Execution Flow:DLL Search Order Hijacking
It has performed DLL search order hijacking to execute their payload.
Hijack Execution Flow:DLL Search Order Hijacking
It abuses a legitimate and signed Microsoft executable to launch a malicious DLL.
Hijack Execution Flow:DLL Search Order Hijacking
WastedLocker has performed DLL hijacking before execution.
Hijack Execution Flow:DLL Search Order Hijacking
Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll).
Hijack Execution Flow:DLL Search Order Hijacking
It has used search order hijacking to run the loader Vcrodat.
Hijack Execution Flow:DLL Side-Loading
It launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL.
Hijack Execution Flow:DLL Side-Loading
It has been known to side load DLLs with a valid version of Chrome with one of their tools.
Hijack Execution Flow:DLL Side-Loading
It ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder).
Hijack Execution Flow:DLL Side-Loading
It used legitimate executables to perform DLL side-loading of their malware.
Hijack Execution Flow:DLL Side-Loading
BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable.
Hijack Execution Flow:DLL Side-Loading
DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable, ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper.
Hijack Execution Flow:DLL Side-Loading
It has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories.
Hijack Execution Flow:DLL Side-Loading
It has used legitimate applications to side-load malicious DLLs.
Hijack Execution Flow:DLL Side-Loading
Brute Ratel C4 has loaded a malicious DLL by spoofing the name of the legitimate Version.DLL and placing it in the same folder as the digitally-signed Microsoft binary OneDriveUpdater.exe.
Hijack Execution Flow:DLL Side-Loading
It has used side loading to place malicious DLLs in memory.
Hijack Execution Flow:DLL Side-Loading
Chinoxy can use a digitally signed binary ("Logitech Bluetooth Wizard Host Process") to load its dll into memory.
Hijack Execution Flow:DLL Side-Loading
Clambling can store a file named mpsvc.dll, which opens a malicious mpsvc.mui file, in the same folder as the legitimate Microsoft executable MsMpEng.exe to gain execution.
Hijack Execution Flow:DLL Side-Loading
Denis exploits a security vulnerability to load a fake DLL and execute its code.
Hijack Execution Flow:DLL Side-Loading
Dridex can abuse legitimate Windows executables to side-load malicious DLL files.
Hijack Execution Flow:DLL Side-Loading
It has placed a malicious payload in %WINDIR%\SYSTEM32\oci.dll so it would be sideloaded by the MSDTC service.
Hijack Execution Flow:DLL Side-Loading
Ecipekac can abuse the legitimate application policytool.exe to load a malicious DLL.
Hijack Execution Flow:DLL Side-Loading
Egregor has used DLL side-loading to execute its payload.
Hijack Execution Flow:DLL Side-Loading
It has used IISCrack.dll as a side-loading technique to load a malicious version of httpodbc.dll on old IIS Servers (CVE-2001-0507).
Hijack Execution Flow:DLL Side-Loading
FinFisher uses DLL side-loading to load malicious programs.
Hijack Execution Flow:DLL Side-Loading
It used DLL side-loading to covertly load PoisonIvy into memory on the victim machine.
Hijack Execution Flow:DLL Side-Loading
A gh0st RAT variant has used DLL side-loading.
Hijack Execution Flow:DLL Side-Loading
Goopy has the ability to side-load malicious DLLs with legitimate applications from Kaspersky, Microsoft, and Google.
Hijack Execution Flow:DLL Side-Loading
It’s JavaScript file used a legitimate Microsoft Office 2007 package to side-load the OINFO12.OCX dynamic link library.
Hijack Execution Flow:DLL Side-Loading
HTTPBrowser has used DLL side-loading.
Hijack Execution Flow:DLL Side-Loading
HyperBro has used a legitimate application to sideload a DLL to decrypt, decompress, and run a payload.
Hijack Execution Flow:DLL Side-Loading
Javali can use DLL side-loading to load malicious DLLs into legitimate executables.
Hijack Execution Flow:DLL Side-Loading
Kerrdown can use DLL side-loading to load malicious DLLs.
Hijack Execution Flow:DLL Side-Loading
It has replaced win_fw.dll, an internal component that is executed during IDA Pro installation, with a malicious DLL to download and execute a payload.
Hijack Execution Flow:DLL Side-Loading
LookBack side loads its communications module as a DLL into the libcurl.dll loader.
Hijack Execution Flow:DLL Side-Loading
It has used legitimate executables such as winword.exe and igfxem.exe to side-load their malware.
Hijack Execution Flow:DLL Side-Loading
It has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as UPPERCUT.
Hijack Execution Flow:DLL Side-Loading
metaMain can support an HKCMD sideloading start method.
Hijack Execution Flow:DLL Side-Loading
Metamorfo has side-loaded its malicious DLL file.
Hijack Execution Flow:DLL Side-Loading
It maintains persistence on victim networks through side-loading dlls to trick legitimate programs into running malware.
Hijack Execution Flow:DLL Side-Loading
It has used a legitimately signed executable to execute a malicious payload within a DLL file.
Hijack Execution Flow:DLL Side-Loading
It has used DLL side-loading to load malicious DLL's into legitimate executables.
Hijack Execution Flow:DLL Side-Loading
Nebulae can use DLL side-loading to gain execution.
Hijack Execution Flow:DLL Side-Loading
During Operation CuckooBees, the threat actors used the legitimate Windows services IKEEXT and PrintNotify to side-load malicious DLLs.
Hijack Execution Flow:DLL Side-Loading
Pandora can use DLL side-loading to execute malicious payloads.
Hijack Execution Flow:DLL Side-Loading
A It .dll that contains BADNEWS is loaded and executed using DLL side-loading.
Hijack Execution Flow:DLL Side-Loading
PlugX has used DLL side-loading to evade anti-virus.
Hijack Execution Flow:DLL Side-Loading
PowGoop can side-load Goopdate.dll into GoogleUpdate.exe.
Hijack Execution Flow:DLL Side-Loading
QakBot has the ability to use DLL side-loading for execution.
Hijack Execution Flow:DLL Side-Loading
RainyDay can use side-loading to run malicious executables.
Hijack Execution Flow:DLL Side-Loading
RCSession can be installed via DLL side-loading.
Hijack Execution Flow:DLL Side-Loading
Sakula uses DLL side-loading, typically using a digitally signed sample of Kaspersky Anti-Virus (AV) 6.0 for Windows Workstations or McAfee's Outlook Scan About Box to load malicious DLL files.
Hijack Execution Flow:DLL Side-Loading
It has used a malicious loader DLL file to execute the credwiz.exe process and side-load the malicious payload Duser.dll.
Hijack Execution Flow:DLL Side-Loading
It has used DLL side-loading to drop and execute malicious payloads including the hijacking of the legitimate Windows application file rekeywiz.exe.
Hijack Execution Flow:DLL Side-Loading
SysUpdate can load DLLs through vulnerable legitimate executables.
Hijack Execution Flow:DLL Side-Loading
During the T9000 installation process, it drops a copy of the legitimate Microsoft binary igfxtray.exe. The executable contains a side-loading weakness which is used to load a portion of the malware.
Hijack Execution Flow:DLL Side-Loading
It has used DLL side-loading, including by using legitimate Kaspersky antivirus variants as well as rc.exe, a legitimate Microsoft Resource Compiler.