prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Process Injection:Process Hollowing | Snip3 can use RunPE to execute malicious payloads within a hollowed Windows process. |
Process Injection:Process Hollowing | It has used process hollowing to execute CyberGate malware. |
Process Injection:Process Hollowing | A It tool can spawn svchost.exe and inject the payload into that process. |
Process Injection:Process Hollowing | TrickBot injects into the svchost.exe process. |
Process Injection:Process Hollowing | Ursnif has used process hollowing to inject into child processes. |
Process Injection:Process Hollowing | WhisperGate has the ability to inject its fourth stage into a suspended process created by the legitimate Windows utility InstallUtil.exe. |
Process Injection:Process Hollowing | Woody RAT can create a suspended notepad process and write shellcode to delete a file into the suspended process using NtWriteVirtualMemory. |
Process Injection:Process Doppelgänging | Bazar can inject into a target process using process doppelgänging. |
Process Injection:Process Doppelgänging | It has used Process Doppelgänging to evade security software while deploying tools on compromised systems. |
Process Injection:Process Doppelgänging | SynAck abuses NTFS transactions to launch and conceal malicious processes. |
Process Injection:ListPlanting | InvisiMole has used ListPlanting to inject code into a trusted process. |
Scheduled Task | DEADEYE has used the scheduled tasks \Microsoft\Windows\PLA\Server Manager Performance Monitor, \Microsoft\Windows\Ras\ManagerMobility, \Microsoft\Windows\WDI\SrvSetupResults, and \Microsoft\Windows\WDI\USOShared to establish persistence. |
Scheduled Task | It used the command schtasks /Create /SC ONLOgon /TN WindowsUpdateCheck /TR "[file path]" /ru system for persistence. |
Scheduled Task | Lokibot's second stage DLL has set a timer using "timeSetEvent" to schedule its next execution. |
Scheduled Task | Remsec schedules the execution one of its modules by creating a new scheduler task. |
Scheduled Task | StrifeWater has create a scheduled task named Mozilla\Firefox Default Browser Agent 409046Z0FF4A39CB for persistence. |
Scheduled Task | It actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network. |
Scheduled Task | at can be used to schedule a task on a system to be executed at a specific date or time. |
Scheduled Task | It has used at to register a scheduled task to execute malware during lateral movement. |
Scheduled Task | CrackMapExec can set a scheduled task on the target system to execute commands remotely using at. |
Scheduled Task | MURKYTOP has the capability to schedule remote AT jobs. |
Scheduled Task | It actors use at to schedule tasks to run self-extracting RAR archives, which install HTTPBrowser or PlugX on other victims on a network. |
Scheduled Task | Anchor can install itself as a cron job. |
Scheduled Task | It has used cron to create pre-scheduled and periodic background jobs on a Linux system. |
Scheduled Task | Exaramel for Linux uses crontab for persistence if it does not have root privileges. |
Scheduled Task | The GoldMax Linux variant has used a crontab entry with a @reboot line to gain persistence. |
Scheduled Task | Janicab used a cron job for persistence on Mac devices. |
Scheduled Task | Kinsing has used crontab to download and run shell scripts every minute to ensure persistence. |
Scheduled Task | NETWIRE can use crontabs to establish persistence. |
Scheduled Task | Penquin can use Cron to create periodic and pre-scheduled background jobs. |
Scheduled Task | It installed a cron job that downloaded and executed files from the C2. |
Scheduled Task | Skidmap has installed itself via crontab. |
Scheduled Task | SpeakUp uses cron tasks to ensure persistence. |
Scheduled Task | Xbash can create a cronjob for persistence if it determines it is on a Linux system. |
Scheduled Task | Agent Tesla has achieved persistence via scheduled tasks. |
Scheduled Task | Anchor can create a scheduled task for persistence. |
Scheduled Task | AppleJeus has created a scheduled SYSTEM task that runs when a user logs in. |
Scheduled Task | It has used a macro function to set scheduled tasks, disguised as those used by Google. |
Scheduled Task | It has used named and hijacked scheduled tasks to establish persistence. |
Scheduled Task | An It downloader creates persistence by creating the following scheduled task: schtasks /create /tn "mysc" /tr C:\Users\Public\test.exe /sc ONLOGON /ru "System". |
Scheduled Task | It has used scheduled tasks to persist on victim systems. |
Scheduled Task | It has created a scheduled task to execute a .vbe file multiple times a day. |
Scheduled Task | It has created scheduled tasks to run malicious scripts on a compromised host. |
Scheduled Task | It has used Task Scheduler to run programs at system startup or on a scheduled basis for persistence. |
Scheduled Task | It has created scheduled tasks for persistence. |
Scheduled Task | It used a compromised account to create a scheduled task on a system. |
Scheduled Task | AsyncRAT can create a scheduled task to maintain persistence on system start-up. |
Scheduled Task | Attor's installer plugin can schedule a new task that loads the dispatcher on boot/logon. |
Scheduled Task | BabyShark has used scheduled tasks to maintain persistence. |
Scheduled Task | BackConfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host. |
Scheduled Task | Bad Rabbit’s infpub.dat file creates a scheduled task to launch a malicious executable. |
Scheduled Task | BADHATCH can use schtasks.exe to gain persistence. |
Scheduled Task | BADNEWS creates a scheduled task to establish by executing a malicious payload every subsequent minute. |
Scheduled Task | Bazar can create a scheduled task for persistence. |
Scheduled Task | It has used scheduled tasks for persistence and execution. |
Scheduled Task | It has used Windows Scheduled Tasks to establish persistence on local and remote hosts. |
Scheduled Task | BONDUPDATER persists using a scheduled task that executes every minute. |
Scheduled Task | It has used schtasks to register a scheduled task to execute malware during lateral movement. |
Scheduled Task | Bumblebee can achieve persistence by copying its DLL to a subdirectory of %APPDATA% and creating a Visual Basic Script that will load the DLL via a scheduled task. |
Scheduled Task | During C0017, It used the following Windows scheduled tasks for DEADEYE dropper persistence on US state government networks: \Microsoft\Windows\PLA\Server Manager Performance Monitor, \Microsoft\Windows\Ras\ManagerMobility, \Microsoft\Windows\WDI\SrvSetupResults, and \Microsoft\Windows\WDI\USOShared. |
Scheduled Task | Carbon creates several tasks for later execution to continue persistence on the victim’s machine. |
Scheduled Task | ccf32 can run on a daily basis using a scheduled task. |
Scheduled Task | It has used scheduled tasks to invoke Cobalt Strike including through batch script schtasks /create /ru "SYSTEM" /tn "update" /tr "cmd /c c:\windows\temp\update.bat" /sc once /f /st and to maintain persistence. |
Scheduled Task | It has created Windows tasks to establish persistence. |
Scheduled Task | ComRAT has used a scheduled task to launch its PowerShell loader. |
Scheduled Task | It has created scheduled tasks to maintain persistence on a compromised host. |
Scheduled Task | CosmicDuke uses scheduled tasks typically named "Watchmon Service" for persistence. |
Scheduled Task | During CostaRicto, the threat actors used scheduled tasks to download backdoor tools. |
Scheduled Task | One persistence mechanism used by CozyCar is to register itself as a scheduled task. |
Scheduled Task | Crutch has the ability to persist using scheduled tasks. |
Scheduled Task | CSPY Downloader can use the schtasks utility to bypass UAC. |
Scheduled Task | DanBot can use a scheduled task for installation. |
Scheduled Task | DarkWatchman has created a scheduled task for persistence. |
Scheduled Task | Disco can create a scheduled task to run every minute for persistence. |
Scheduled Task | It has used scheduled tasks to automatically log out of created accounts every 8 hours as well as to execute malicious files. |
Scheduled Task | Dridex can maintain persistence via the creation of scheduled tasks within system directories such as windows\system32\, windows\syswow64, winnt\system32, and winnt\syswow64. |
Scheduled Task | Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware. |
Scheduled Task | Dyre has the ability to achieve persistence by adding a new task in the task scheduler to run every minute. |
Scheduled Task | Emotet has maintained persistence through a scheduled task. |
Scheduled Task | Empire has modules to interact with the Windows task scheduler. |
Scheduled Task | EvilBunny has executed commands via scheduled tasks. |
Scheduled Task | It has established persistence by using S4U tasks as well as the Scheduled Task option in PowerShell Empire. |
Scheduled Task | It has created scheduled tasks in the C:\Windows directory of the compromised network. |
Scheduled Task | It has used scheduled tasks to establish persistence for various malware it uses, including downloaders known as HARDTACK and SHIPBREAD and FrameworkPOS. |
Scheduled Task | It malware has created scheduled tasks to establish persistence. |
Scheduled Task | It has used scheduled tasks to maintain RDP backdoors. |
Scheduled Task | It has used Scheduled Tasks for persistence and to load and execute a reverse proxy binary. |
Scheduled Task | During Frankenstein, the threat actors established persistence through a scheduled task using the command: /Create /F /SC DAILY /ST 09:00 /TN WinUpdate /TR, named "WinUpdate" |
Scheduled Task | It established persistence for PoisonIvy by created a scheduled task. |
Scheduled Task | It has created scheduled tasks to launch executables after a designated number of minutes have passed. |
Scheduled Task | Gazer can establish persistence by creating a scheduled task. |
Scheduled Task | GoldMax has used scheduled tasks to maintain persistence. |
Scheduled Task | Goopy has the ability to maintain persistence by creating scheduled tasks set to run every hour. |
Scheduled Task | GravityRAT creates a scheduled task to ensure it is re-executed everyday. |
Scheduled Task | GRIFFON has used sctasks for persistence. |
Scheduled Task | GrimAgent has the ability to set persistence using the Task Scheduler. |
Scheduled Task | Helminth has used a scheduled task for persistence. |
Scheduled Task | HermeticWiper has the ability to use scheduled tasks for execution. |
Scheduled Task | It has used a scheduled task to establish persistence for a keylogger. |
Scheduled Task | It dropped and added officeupdate.exe to scheduled tasks. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.