prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Hide Artifacts:NTFS File Attributes | Expand can be used to download or copy a file into an alternate data stream. |
Hide Artifacts:NTFS File Attributes | Gazer stores configuration items in alternate data streams (ADSs) if the Registry is not accessible. |
Hide Artifacts:NTFS File Attributes | LoJax has loaded an embedded NTFS DXE driver to be able to access and write to NTFS partitions. |
Hide Artifacts:NTFS File Attributes | PowerDuke hides many of its backdoor payloads in an alternate data stream (ADS). |
Hide Artifacts:NTFS File Attributes | If the victim is using PowerShell 3.0 or later, POWERSOURCE writes its decoded payload to an alternate data stream (ADS) named kernel32.dll that is saved in %PROGRAMDATA%\Windows\. |
Hide Artifacts:NTFS File Attributes | The Regin malware platform uses Extended Attributes to store encrypted executables. |
Hide Artifacts:NTFS File Attributes | Valak has the ability save and execute files as alternate data streams (ADS). |
Hide Artifacts:NTFS File Attributes | WastedLocker has the ability to save and execute files as an alternate data stream (ADS). |
Hide Artifacts:NTFS File Attributes | Some variants of the Zeroaccess Trojan have been known to store data in Extended Attributes. |
Hide Artifacts:Hidden File System | BOOTRASH has used unallocated disk space between partitions for a hidden file system that stores components of the Nemesis bootkit. |
Hide Artifacts:Hidden File System | ComRAT has used a portable FAT16 partition image placed in %TEMP% as a hidden file system. |
Hide Artifacts:Hidden File System | It has used an encrypted virtual file system stored in the Windows Registry. |
Hide Artifacts:Hidden File System | Regin has used a hidden file system to store some of its components. |
Hide Artifacts:Hidden File System | It has used a hidden file system that is stored as a file on disk. |
Hide Artifacts:Hidden File System | Uroburos can use concealed storage mechanisms including an NTFS or FAT-16 filesystem encrypted with CAST-128 in CBC mode. |
Hide Artifacts:Run Virtual Instance | LoudMiner has used QEMU and VirtualBox to run a Tiny Core Linux virtual machine, which runs XMRig and makes connections to the C2 server for updates. |
Hide Artifacts:Run Virtual Instance | Maze operators have used VirtualBox and a Windows 7 virtual machine to run the ransomware; the virtual machine's configuration file mapped the shared network drives of the target company, presumably so Maze can encrypt files on the shared drives as well as the local machine. |
Hide Artifacts:Run Virtual Instance | Ragnar Locker has used VirtualBox and a stripped Windows XP virtual machine to run itself. The use of a shared folder specified in the configuration enables Ragnar Locker to encrypt files on the host operating system, including files on any mapped drives. |
Hide Artifacts:Email Hiding Rules | It has created rules in victims' Microsoft Outlook accounts to automatically delete emails containing words such as "hacked," "phish," and "malware" in a likely attempt to prevent organizations from communicating about their activities. |
Hide Artifacts:Resource Forking | Keydnap uses a resource fork to present a macOS JPEG or text file icon rather than the executable's icon assigned by the operating system. |
Hide Artifacts:Resource Forking | OSX/Shlayer has used a resource fork to hide a compressed binary file of itself from the terminal, Finder, and potentially evade traditional scanners. |
Hide Artifacts:Process Argument Spoofing | Cobalt Strike can use spoof arguments in spawned processes that execute beacon commands. |
Hide Artifacts:Process Argument Spoofing | SombRAT has the ability to modify its process memory to hide process command-line arguments. |
Hide Artifacts:Ignore Process Interrupts | The GoldMax Linux variant has been executed with the nohup command to ignore hangup signals and continue to run if the terminal session was terminated. |
Hide Artifacts:Ignore Process Interrupts | OSX/Shlayer has used the nohup command to instruct executed payloads to ignore hangup signals. |
Hijack Execution Flow | During C0017, It established persistence by loading malicious libraries via modifications to the Import Address Table (IAT) within legitimate Microsoft binaries. |
Hijack Execution Flow | Denis replaces the nonexistent Windows DLL "msfte.dll" with its own malicious version, which is loaded by the SearchIndexer.exe and SearchProtocolHost.exe. |
Hijack Execution Flow | One of Dtrack can replace the normal flow of a program execution with malicious code. |
Hijack Execution Flow | ShimRat can hijack the cryptbase.dll within migwiz.exe to escalate privileges and bypass UAC controls. |
Hijack Execution Flow:DLL Search Order Hijacking | It has used search order hijacking to execute malicious payloads, such as Winnti RAT. |
Hijack Execution Flow:DLL Search Order Hijacking | It has used DLL search-order hijacking to load exe, dll, and dat files into memory. |
Hijack Execution Flow:DLL Search Order Hijacking | Astaroth can launch itself via DLL Search Order Hijacking. |
Hijack Execution Flow:DLL Search Order Hijacking | It has executed DLL search order hijacking. |
Hijack Execution Flow:DLL Search Order Hijacking | BOOSTWRITE has exploited the loading of the legitimate Dwrite.dll file by actually loading the gdi library, which then loads the gdiplus library and ultimately loads the local Dwrite dll. |
Hijack Execution Flow:DLL Search Order Hijacking | Brute Ratel C4 has used search order hijacking to load a malicious payload DLL as a dependency to a benign application packaged in the same ISO. |
Hijack Execution Flow:DLL Search Order Hijacking | Chaes has used search order hijacking to load a malicious DLL. |
Hijack Execution Flow:DLL Search Order Hijacking | Crutch can persist via DLL search order hijacking on Google Chrome, Mozilla Firefox, or Microsoft OneDrive. |
Hijack Execution Flow:DLL Search Order Hijacking | Downdelph uses search order hijacking of the Windows executable sysprep.exe to escalate privileges. |
Hijack Execution Flow:DLL Search Order Hijacking | Empire contains modules that can discover and exploit various DLL hijacking opportunities. |
Hijack Execution Flow:DLL Search Order Hijacking | It has used the malware variant, TerraTV, to load a malicious DLL placed in the TeamViewer directory, instead of the original Windows DLL located in a system folder. |
Hijack Execution Flow:DLL Search Order Hijacking | A FinFisher variant uses DLL search order hijacking. |
Hijack Execution Flow:DLL Search Order Hijacking | FoggyWeb's loader has used DLL Search Order Hijacking to load malicious code instead of the legitimate version.dll during the Microsoft.IdentityServer.ServiceHost.exe execution process. |
Hijack Execution Flow:DLL Search Order Hijacking | Hikit has used DLL Search Order Hijacking to load oci.dll as a persistence mechanism. |
Hijack Execution Flow:DLL Search Order Hijacking | HTTPBrowser abuses the Windows DLL load order by using a legitimate Symantec anti-virus binary, VPDN_LU.exe, to load a malicious DLL that mimics a legitimate Symantec DLL, navlu.dll. |
Hijack Execution Flow:DLL Search Order Hijacking | InvisiMole can be launched by using DLL search order hijacking in which the wrapper DLL is placed in the same folder as explorer.exe and loaded during startup into the Windows Explorer process instead of the legitimate library. |
Hijack Execution Flow:DLL Search Order Hijacking | Melcoz can use DLL hijacking to bypass security controls. |
Hijack Execution Flow:DLL Search Order Hijacking | It has used DLL search order hijacking. |
Hijack Execution Flow:DLL Search Order Hijacking | MirageFox is likely loaded via DLL hijacking into a legitimate McAfee binary. |
Hijack Execution Flow:DLL Search Order Hijacking | PlugX has the ability to use DLL search order hijacking for installation on targeted systems. |
Hijack Execution Flow:DLL Search Order Hijacking | PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit DLL hijacking opportunities in services and processes. |
Hijack Execution Flow:DLL Search Order Hijacking | Prikormka uses DLL search order hijacking for persistence by saving itself as ntshrui.dll to the Windows directory so it will load before the legitimate ntshrui.dll saved in the System32 subdirectory. |
Hijack Execution Flow:DLL Search Order Hijacking | Ramsay can hijack outdated Windows application dependencies with malicious versions of its own DLL payload. |
Hijack Execution Flow:DLL Search Order Hijacking | RedLeaves is launched through use of DLL search order hijacking to load a malicious dll. |
Hijack Execution Flow:DLL Search Order Hijacking | It has used search order hijacking to force TeamViewer to load a malicious DLL. |
Hijack Execution Flow:DLL Search Order Hijacking | It has performed DLL search order hijacking to execute their payload. |
Hijack Execution Flow:DLL Search Order Hijacking | It abuses a legitimate and signed Microsoft executable to launch a malicious DLL. |
Hijack Execution Flow:DLL Search Order Hijacking | WastedLocker has performed DLL hijacking before execution. |
Hijack Execution Flow:DLL Search Order Hijacking | Variants of WEBC2 achieve persistence by using DLL search order hijacking, usually by copying the DLL file to %SYSTEMROOT% (C:\WINDOWS\ntshrui.dll). |
Hijack Execution Flow:DLL Search Order Hijacking | It has used search order hijacking to run the loader Vcrodat. |
Hijack Execution Flow:DLL Side-Loading | It launched an HTTP malware variant and a Port 22 malware variant using a legitimate executable that loaded the malicious DLL. |
Hijack Execution Flow:DLL Side-Loading | It has been known to side load DLLs with a valid version of Chrome with one of their tools. |
Hijack Execution Flow:DLL Side-Loading | It ran legitimately-signed executables from Symantec and McAfee which load a malicious DLL. The group also side-loads its backdoor by dropping a library and a legitimate, signed executable (AcroTranscoder). |
Hijack Execution Flow:DLL Side-Loading | It used legitimate executables to perform DLL side-loading of their malware. |
Hijack Execution Flow:DLL Side-Loading | BADNEWS typically loads its DLL file into a legitimate signed Java or VMware executable. |
Hijack Execution Flow:DLL Side-Loading | DLL side-loading has been used to execute BBSRAT through a legitimate Citrix executable, ssonsvr.exe. The Citrix executable was dropped along with BBSRAT by the dropper. |
Hijack Execution Flow:DLL Side-Loading | It has used DLL side loading by giving DLLs hardcoded names and placing them in searched directories. |
Hijack Execution Flow:DLL Side-Loading | It has used legitimate applications to side-load malicious DLLs. |
Hijack Execution Flow:DLL Side-Loading | Brute Ratel C4 has loaded a malicious DLL by spoofing the name of the legitimate Version.DLL and placing it in the same folder as the digitally-signed Microsoft binary OneDriveUpdater.exe. |
Hijack Execution Flow:DLL Side-Loading | It has used side loading to place malicious DLLs in memory. |
Hijack Execution Flow:DLL Side-Loading | Chinoxy can use a digitally signed binary ("Logitech Bluetooth Wizard Host Process") to load its dll into memory. |
Hijack Execution Flow:DLL Side-Loading | Clambling can store a file named mpsvc.dll, which opens a malicious mpsvc.mui file, in the same folder as the legitimate Microsoft executable MsMpEng.exe to gain execution. |
Hijack Execution Flow:DLL Side-Loading | Denis exploits a security vulnerability to load a fake DLL and execute its code. |
Hijack Execution Flow:DLL Side-Loading | Dridex can abuse legitimate Windows executables to side-load malicious DLL files. |
Hijack Execution Flow:DLL Side-Loading | It has placed a malicious payload in %WINDIR%\SYSTEM32\oci.dll so it would be sideloaded by the MSDTC service. |
Hijack Execution Flow:DLL Side-Loading | Ecipekac can abuse the legitimate application policytool.exe to load a malicious DLL. |
Hijack Execution Flow:DLL Side-Loading | Egregor has used DLL side-loading to execute its payload. |
Hijack Execution Flow:DLL Side-Loading | It has used IISCrack.dll as a side-loading technique to load a malicious version of httpodbc.dll on old IIS Servers (CVE-2001-0507). |
Hijack Execution Flow:DLL Side-Loading | FinFisher uses DLL side-loading to load malicious programs. |
Hijack Execution Flow:DLL Side-Loading | It used DLL side-loading to covertly load PoisonIvy into memory on the victim machine. |
Hijack Execution Flow:DLL Side-Loading | A gh0st RAT variant has used DLL side-loading. |
Hijack Execution Flow:DLL Side-Loading | Goopy has the ability to side-load malicious DLLs with legitimate applications from Kaspersky, Microsoft, and Google. |
Hijack Execution Flow:DLL Side-Loading | It’s JavaScript file used a legitimate Microsoft Office 2007 package to side-load the OINFO12.OCX dynamic link library. |
Hijack Execution Flow:DLL Side-Loading | HTTPBrowser has used DLL side-loading. |
Hijack Execution Flow:DLL Side-Loading | HyperBro has used a legitimate application to sideload a DLL to decrypt, decompress, and run a payload. |
Hijack Execution Flow:DLL Side-Loading | Javali can use DLL side-loading to load malicious DLLs into legitimate executables. |
Hijack Execution Flow:DLL Side-Loading | Kerrdown can use DLL side-loading to load malicious DLLs. |
Hijack Execution Flow:DLL Side-Loading | It has replaced win_fw.dll, an internal component that is executed during IDA Pro installation, with a malicious DLL to download and execute a payload. |
Hijack Execution Flow:DLL Side-Loading | LookBack side loads its communications module as a DLL into the libcurl.dll loader. |
Hijack Execution Flow:DLL Side-Loading | It has used legitimate executables such as winword.exe and igfxem.exe to side-load their malware. |
Hijack Execution Flow:DLL Side-Loading | It has used DLL side-loading to launch versions of Mimikatz and PwDump6 as well as UPPERCUT. |
Hijack Execution Flow:DLL Side-Loading | metaMain can support an HKCMD sideloading start method. |
Hijack Execution Flow:DLL Side-Loading | Metamorfo has side-loaded its malicious DLL file. |
Hijack Execution Flow:DLL Side-Loading | It maintains persistence on victim networks through side-loading dlls to trick legitimate programs into running malware. |
Hijack Execution Flow:DLL Side-Loading | It has used a legitimately signed executable to execute a malicious payload within a DLL file. |
Hijack Execution Flow:DLL Side-Loading | It has used DLL side-loading to load malicious DLL's into legitimate executables. |
Hijack Execution Flow:DLL Side-Loading | Nebulae can use DLL side-loading to gain execution. |
Hijack Execution Flow:DLL Side-Loading | During Operation CuckooBees, the threat actors used the legitimate Windows services IKEEXT and PrintNotify to side-load malicious DLLs. |
Hijack Execution Flow:DLL Side-Loading | Pandora can use DLL side-loading to execute malicious payloads. |
Hijack Execution Flow:DLL Side-Loading | A It .dll that contains BADNEWS is loaded and executed using DLL side-loading. |
Hijack Execution Flow:DLL Side-Loading | PlugX has used DLL side-loading to evade anti-virus. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.