prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Scheduled Task | HotCroissant has attempted to install a scheduled task named "Java Maintenance64" on startup to establish persistence. |
Scheduled Task | IcedID has created a scheduled task that executes every hour to establish persistence. |
Scheduled Task | InvisiMole has used scheduled tasks named MSST and \Microsoft\Windows\Autochk\Scheduled to establish persistence. |
Scheduled Task | IronNetInjector has used a task XML file named mssch.xml to run an IronPython script when a user logs in or when specific system events are created. |
Scheduled Task | ISMInjector creates scheduled tasks to establish persistence. |
Scheduled Task | JHUHUGIT has registered itself as a scheduled task to run each time the current user logs in. |
Scheduled Task | JSS Loader has the ability to launch scheduled tasks to establish persistence. |
Scheduled Task | It has downloaded additional malware with scheduled tasks. |
Scheduled Task | Koadic has used scheduled tasks to add persistence. |
Scheduled Task | It has used schtasks for persistence including through the periodic execution of a remote XSL script or a dropped VBS payload. |
Scheduled Task | LitePower can create a scheduled task to enable persistence mechanisms. |
Scheduled Task | Lokibot embedded the commands schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I inside a batch script. |
Scheduled Task | Lucifer has established persistence by creating the following scheduled task schtasks /create /sc minute /mo 1 /tn QQMusic ^ /tr C:Users\%USERPROFILE%\Downloads\spread.exe /F. |
Scheduled Task | It has created scheduled tasks to establish persistence for their tools. |
Scheduled Task | The different components of It are executed by Windows Task Scheduler. |
Scheduled Task | It has created scheduled tasks to maintain It's persistence. |
Scheduled Task | It has used scheduled tasks to establish persistence and execution. |
Scheduled Task | Matryoshka can establish persistence by adding a Scheduled Task named "Microsoft Boost Kernel Optimization". |
Scheduled Task | Maze has created scheduled tasks using name variants such as "Windows Update Security", "Windows Update Security Patches", and "Google Chrome Security Update", to launch Maze at a specific time. |
Scheduled Task | MCMD can use scheduled tasks for persistence. |
Scheduled Task | It has used a script (atexec.py) to execute a command on a target machine via Task Scheduler. |
Scheduled Task | Meteor execution begins from a scheduled task named Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeAll and it creates a separate scheduled task called mstask to run the wiper only once at 23:55:00. |
Scheduled Task | Milan can establish persistence on a targeted host with scheduled tasks. |
Scheduled Task | It has created scheduled tasks to persistently run VBScripts. |
Scheduled Task | It has used scheduled tasks to establish persistence. |
Scheduled Task | It has created a scheduled task to execute additional malicious software, as well as maintain persistence. |
Scheduled Task | It has used schtasks.exe for lateral movement in compromised networks. |
Scheduled Task | NETWIRE can create a scheduled task to establish persistence. |
Scheduled Task | NotPetya creates a task to reboot the system one hour after infection. |
Scheduled Task | It has created scheduled tasks that run a VBScript to execute a payload on victim machines. |
Scheduled Task | Okrum's installer can attempt to achieve persistence by creating a scheduled task. |
Scheduled Task | OopsIE creates a scheduled task to run itself every three minutes. |
Scheduled Task | During Operation CuckooBees, the threat actors used scheduled tasks to execute batch scripts for lateral movement with the following command: SCHTASKS /Create /S <IP Address> /U <Username> /p <Password> /SC ONCE /TN test /TR <Path to a Batch File> /ST <Time> /RU SYSTEM. |
Scheduled Task | During Operation Dream Job, It created scheduled tasks to set a periodic execution of a remote XSL script. |
Scheduled Task | During Operation Wocao, threat actors used scheduled tasks to execute malicious PowerShell code on remote systems. |
Scheduled Task | A It file stealer can run a TaskScheduler DLL to add persistence. |
Scheduled Task | PowerSploit's New-UserPersistenceOption Persistence argument can be used to establish via a Scheduled Task/Job. |
Scheduled Task | POWERSTATS has established persistence through a scheduled task using the command "C:\Windows\system32\schtasks.exe" /Create /F /SC DAILY /ST 12:00 /TN MicrosoftEdge /TR "c:\Windows\system32\wscript.exe C:\Windows\temp\Windows.vbe". |
Scheduled Task | POWRUNER persists through a scheduled task that executes it every minute. |
Scheduled Task | Prestige has been executed on a target system through a scheduled task created by It using Impacket. |
Scheduled Task | Pteranodon schedules tasks to invoke its components in order to establish persistence. |
Scheduled Task | QakBot has the ability to create scheduled tasks for persistence. |
Scheduled Task | QUADAGENT creates a scheduled task to maintain persistence on the victim’s machine. |
Scheduled Task | QuasarRAT contains a .NET wrapper DLL for creating and managing scheduled tasks for maintaining persistence upon reboot. |
Scheduled Task | RainyDay can use scheduled tasks to achieve persistence. |
Scheduled Task | Ramsay can schedule tasks via the Windows COM API to maintain persistence. |
Scheduled Task | It launched a scheduled task to gain persistence using the schtasks /create /sc command. |
Scheduled Task | Remexi utilizes scheduled tasks as a persistence mechanism. |
Scheduled Task | RemoteCMD can execute commands remotely by creating a new schedule task on the remote system |
Scheduled Task | Revenge RAT schedules tasks to run malicious scripts at different intervals. |
Scheduled Task | It tries to add a scheduled task to establish persistence. |
Scheduled Task | Ryuk can remotely create a scheduled task to execute itself on a system. |
Scheduled Task | Saint Bot has created a scheduled task named "Maintenance" to establish persistence. |
Scheduled Task | schtasks is used to schedule tasks on a Windows system to run at a specific date and time. |
Scheduled Task | ServHelper contains modules that will use schtasks to carry out malicious operations. |
Scheduled Task | Shamoon copies an executable payload to the target system by using SMB/Windows Admin Shares and then scheduling an unnamed task to execute the malware. |
Scheduled Task | SharpDisco can create scheduled tasks to execute reverse shells that read and write data to and from specified SMB shares. |
Scheduled Task | SharpStage has a persistence component to write a scheduled task for the payload. |
Scheduled Task | Sibot has been executed via a scheduled task. |
Scheduled Task | It has used scheduled tasks to stage its operation. |
Scheduled Task | Smoke Loader launches a scheduled task. |
Scheduled Task | During the SolarWinds Compromise, It used scheduler and schtasks to create new tasks on remote host as part of their lateral movement. They manipulated scheduled tasks by updating an existing legitimate task to execute their tools and then returned the scheduled task to its original configuration. It also created a scheduled task to maintain SUNSPOT persistence when the host booted. |
Scheduled Task | SoreFang can gain persistence through use of scheduled tasks. |
Scheduled Task | SQLRat has created scheduled tasks in %appdata%\Roaming\Microsoft\Templates\. |
Scheduled Task | It malware creates a scheduled task entitled "IE Web Cache" to execute a malicious file hourly. |
Scheduled Task | Stuxnet schedules a network job to execute two minutes after host infection. |
Scheduled Task | SUGARDUMP has created scheduled tasks called MicrosoftInternetExplorerCrashRepoeterTaskMachineUA and MicrosoftEdgeCrashRepoeterTaskMachineUA, which were configured to execute CrashReporter.exe during user logon. |
Scheduled Task | SVCReady can create a scheduled task named RecoveryExTask to gain persistence. |
Scheduled Task | It has used scheduled tasks to establish persistence for installed tools. |
Scheduled Task | Tarrask is able to create "hidden" scheduled tasks for persistence. |
Scheduled Task | It has used scheduled task XML triggers. |
Scheduled Task | Tomiris has used SCHTASKS /CREATE /SC DAILY /TN StartDVL /TR "[path to self]" /ST 10:00 to establish persistence. |
Scheduled Task | TrickBot creates a scheduled task on the system that provides persistence. |
Scheduled Task | Valak has used scheduled tasks to execute additional payloads and to gain persistence on a compromised host. |
Scheduled Task | It has used scheduled tasks to establish persistence for TrickBot and other malware. |
Scheduled Task | yty establishes persistence by creating a scheduled task with the command SchTasks /Create /SC DAILY /TN BigData /TR " + path_file + "/ST 09:30". |
Scheduled Task | Zebrocy has a command to create a scheduled task for persistence. |
Scheduled Task | zwShell has used SchTasks for execution. |
Scheduled Task | ZxxZ has used scheduled tasks for persistence and execution. |
Valid Accounts | During the 2015 Ukraine Electric Power Attack, It used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network. |
Valid Accounts | It actors leverage legitimate credentials to log into external remote services. |
Valid Accounts | It has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder. |
Valid Accounts | It has used a compromised account to access an organization's VPN infrastructure. |
Valid Accounts | It has used valid accounts for initial access and privilege escalation. |
Valid Accounts | It has used stolen credentials to compromise Outlook Web Access (OWA). |
Valid Accounts | It used compromised credentials to log on to other systems. |
Valid Accounts | It has used previously compromised administrative accounts to escalate privileges. |
Valid Accounts | It actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars. |
Valid Accounts | It has used a valid account to maintain persistence via scheduled task. |
Valid Accounts | It has compromised user credentials and used valid accounts for operations. |
Valid Accounts | Dtrack used hard-coded credentials to gain access to a network share. |
Valid Accounts | Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware. |
Valid Accounts | It has used stolen credentials to connect remotely to victim networks using VPNs protected with only a single factor. |
Valid Accounts | It has used legitimate credentials to hijack email communications. |
Valid Accounts | It has used legitimate VPN, RDP, Citrix, or VNC credentials to maintain access to a victim environment. |
Valid Accounts | To move laterally on a victim network, It has used credentials stolen from various systems on which it gathered usernames and password hashes. |
Valid Accounts | It has harvested valid administrative credentials for lateral movement. |
Valid Accounts | It has used valid accounts for persistence and lateral movement. |
Valid Accounts | It has used valid credentials with various services during lateral movement. |
Valid Accounts | It leveraged valid accounts to maintain access to a victim network. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.