prompt
stringclasses
508 values
procedure
stringlengths
20
478
Process Injection:Process Hollowing
Snip3 can use RunPE to execute malicious payloads within a hollowed Windows process.
Process Injection:Process Hollowing
It has used process hollowing to execute CyberGate malware.
Process Injection:Process Hollowing
A It tool can spawn svchost.exe and inject the payload into that process.
Process Injection:Process Hollowing
TrickBot injects into the svchost.exe process.
Process Injection:Process Hollowing
Ursnif has used process hollowing to inject into child processes.
Process Injection:Process Hollowing
WhisperGate has the ability to inject its fourth stage into a suspended process created by the legitimate Windows utility InstallUtil.exe.
Process Injection:Process Hollowing
Woody RAT can create a suspended notepad process and write shellcode to delete a file into the suspended process using NtWriteVirtualMemory.
Process Injection:Process Doppelgänging
Bazar can inject into a target process using process doppelgänging.
Process Injection:Process Doppelgänging
It has used Process Doppelgänging to evade security software while deploying tools on compromised systems.
Process Injection:Process Doppelgänging
SynAck abuses NTFS transactions to launch and conceal malicious processes.
Process Injection:ListPlanting
InvisiMole has used ListPlanting to inject code into a trusted process.
Scheduled Task
DEADEYE has used the scheduled tasks \Microsoft\Windows\PLA\Server Manager Performance Monitor, \Microsoft\Windows\Ras\ManagerMobility, \Microsoft\Windows\WDI\SrvSetupResults, and \Microsoft\Windows\WDI\USOShared to establish persistence.
Scheduled Task
It used the command schtasks /Create /SC ONLOgon /TN WindowsUpdateCheck /TR "[file path]" /ru system for persistence.
Scheduled Task
Lokibot's second stage DLL has set a timer using "timeSetEvent" to schedule its next execution.
Scheduled Task
Remsec schedules the execution one of its modules by creating a new scheduler task.
Scheduled Task
StrifeWater has create a scheduled task named Mozilla\Firefox Default Browser Agent 409046Z0FF4A39CB for persistence.
Scheduled Task
It actors used the native at Windows task scheduler tool to use scheduled tasks for execution on a victim network.
Scheduled Task
at can be used to schedule a task on a system to be executed at a specific date or time.
Scheduled Task
It has used at to register a scheduled task to execute malware during lateral movement.
Scheduled Task
CrackMapExec can set a scheduled task on the target system to execute commands remotely using at.
Scheduled Task
MURKYTOP has the capability to schedule remote AT jobs.
Scheduled Task
It actors use at to schedule tasks to run self-extracting RAR archives, which install HTTPBrowser or PlugX on other victims on a network.
Scheduled Task
Anchor can install itself as a cron job.
Scheduled Task
It has used cron to create pre-scheduled and periodic background jobs on a Linux system.
Scheduled Task
Exaramel for Linux uses crontab for persistence if it does not have root privileges.
Scheduled Task
The GoldMax Linux variant has used a crontab entry with a @reboot line to gain persistence.
Scheduled Task
Janicab used a cron job for persistence on Mac devices.
Scheduled Task
Kinsing has used crontab to download and run shell scripts every minute to ensure persistence.
Scheduled Task
NETWIRE can use crontabs to establish persistence.
Scheduled Task
Penquin can use Cron to create periodic and pre-scheduled background jobs.
Scheduled Task
It installed a cron job that downloaded and executed files from the C2.
Scheduled Task
Skidmap has installed itself via crontab.
Scheduled Task
SpeakUp uses cron tasks to ensure persistence.
Scheduled Task
Xbash can create a cronjob for persistence if it determines it is on a Linux system.
Scheduled Task
Agent Tesla has achieved persistence via scheduled tasks.
Scheduled Task
Anchor can create a scheduled task for persistence.
Scheduled Task
AppleJeus has created a scheduled SYSTEM task that runs when a user logs in.
Scheduled Task
It has used a macro function to set scheduled tasks, disguised as those used by Google.
Scheduled Task
It has used named and hijacked scheduled tasks to establish persistence.
Scheduled Task
An It downloader creates persistence by creating the following scheduled task: schtasks /create /tn "mysc" /tr C:\Users\Public\test.exe /sc ONLOGON /ru "System".
Scheduled Task
It has used scheduled tasks to persist on victim systems.
Scheduled Task
It has created a scheduled task to execute a .vbe file multiple times a day.
Scheduled Task
It has created scheduled tasks to run malicious scripts on a compromised host.
Scheduled Task
It has used Task Scheduler to run programs at system startup or on a scheduled basis for persistence.
Scheduled Task
It has created scheduled tasks for persistence.
Scheduled Task
It used a compromised account to create a scheduled task on a system.
Scheduled Task
AsyncRAT can create a scheduled task to maintain persistence on system start-up.
Scheduled Task
Attor's installer plugin can schedule a new task that loads the dispatcher on boot/logon.
Scheduled Task
BabyShark has used scheduled tasks to maintain persistence.
Scheduled Task
BackConfig has the ability to use scheduled tasks to repeatedly execute malicious payloads on a compromised host.
Scheduled Task
Bad Rabbit’s infpub.dat file creates a scheduled task to launch a malicious executable.
Scheduled Task
BADHATCH can use schtasks.exe to gain persistence.
Scheduled Task
BADNEWS creates a scheduled task to establish by executing a malicious payload every subsequent minute.
Scheduled Task
Bazar can create a scheduled task for persistence.
Scheduled Task
It has used scheduled tasks for persistence and execution.
Scheduled Task
It has used Windows Scheduled Tasks to establish persistence on local and remote hosts.
Scheduled Task
BONDUPDATER persists using a scheduled task that executes every minute.
Scheduled Task
It has used schtasks to register a scheduled task to execute malware during lateral movement.
Scheduled Task
Bumblebee can achieve persistence by copying its DLL to a subdirectory of %APPDATA% and creating a Visual Basic Script that will load the DLL via a scheduled task.
Scheduled Task
During C0017, It used the following Windows scheduled tasks for DEADEYE dropper persistence on US state government networks: \Microsoft\Windows\PLA\Server Manager Performance Monitor, \Microsoft\Windows\Ras\ManagerMobility, \Microsoft\Windows\WDI\SrvSetupResults, and \Microsoft\Windows\WDI\USOShared.
Scheduled Task
Carbon creates several tasks for later execution to continue persistence on the victim’s machine.
Scheduled Task
ccf32 can run on a daily basis using a scheduled task.
Scheduled Task
It has used scheduled tasks to invoke Cobalt Strike including through batch script schtasks /create /ru "SYSTEM" /tn "update" /tr "cmd /c c:\windows\temp\update.bat" /sc once /f /st and to maintain persistence.
Scheduled Task
It has created Windows tasks to establish persistence.
Scheduled Task
ComRAT has used a scheduled task to launch its PowerShell loader.
Scheduled Task
It has created scheduled tasks to maintain persistence on a compromised host.
Scheduled Task
CosmicDuke uses scheduled tasks typically named "Watchmon Service" for persistence.
Scheduled Task
During CostaRicto, the threat actors used scheduled tasks to download backdoor tools.
Scheduled Task
One persistence mechanism used by CozyCar is to register itself as a scheduled task.
Scheduled Task
Crutch has the ability to persist using scheduled tasks.
Scheduled Task
CSPY Downloader can use the schtasks utility to bypass UAC.
Scheduled Task
DanBot can use a scheduled task for installation.
Scheduled Task
DarkWatchman has created a scheduled task for persistence.
Scheduled Task
Disco can create a scheduled task to run every minute for persistence.
Scheduled Task
It has used scheduled tasks to automatically log out of created accounts every 8 hours as well as to execute malicious files.
Scheduled Task
Dridex can maintain persistence via the creation of scheduled tasks within system directories such as windows\system32\, windows\syswow64, winnt\system32, and winnt\syswow64.
Scheduled Task
Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware.
Scheduled Task
Dyre has the ability to achieve persistence by adding a new task in the task scheduler to run every minute.
Scheduled Task
Emotet has maintained persistence through a scheduled task.
Scheduled Task
Empire has modules to interact with the Windows task scheduler.
Scheduled Task
EvilBunny has executed commands via scheduled tasks.
Scheduled Task
It has established persistence by using S4U tasks as well as the Scheduled Task option in PowerShell Empire.
Scheduled Task
It has created scheduled tasks in the C:\Windows directory of the compromised network.
Scheduled Task
It has used scheduled tasks to establish persistence for various malware it uses, including downloaders known as HARDTACK and SHIPBREAD and FrameworkPOS.
Scheduled Task
It malware has created scheduled tasks to establish persistence.
Scheduled Task
It has used scheduled tasks to maintain RDP backdoors.
Scheduled Task
It has used Scheduled Tasks for persistence and to load and execute a reverse proxy binary.
Scheduled Task
During Frankenstein, the threat actors established persistence through a scheduled task using the command: /Create /F /SC DAILY /ST 09:00 /TN WinUpdate /TR, named "WinUpdate"
Scheduled Task
It established persistence for PoisonIvy by created a scheduled task.
Scheduled Task
It has created scheduled tasks to launch executables after a designated number of minutes have passed.
Scheduled Task
Gazer can establish persistence by creating a scheduled task.
Scheduled Task
GoldMax has used scheduled tasks to maintain persistence.
Scheduled Task
Goopy has the ability to maintain persistence by creating scheduled tasks set to run every hour.
Scheduled Task
GravityRAT creates a scheduled task to ensure it is re-executed everyday.
Scheduled Task
GRIFFON has used sctasks for persistence.
Scheduled Task
GrimAgent has the ability to set persistence using the Task Scheduler.
Scheduled Task
Helminth has used a scheduled task for persistence.
Scheduled Task
HermeticWiper has the ability to use scheduled tasks for execution.
Scheduled Task
It has used a scheduled task to establish persistence for a keylogger.
Scheduled Task
It dropped and added officeupdate.exe to scheduled tasks.