prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Hijack Execution Flow:DLL Side-Loading | PowGoop can side-load Goopdate.dll into GoogleUpdate.exe. |
Hijack Execution Flow:DLL Side-Loading | QakBot has the ability to use DLL side-loading for execution. |
Hijack Execution Flow:DLL Side-Loading | RainyDay can use side-loading to run malicious executables. |
Hijack Execution Flow:DLL Side-Loading | RCSession can be installed via DLL side-loading. |
Hijack Execution Flow:DLL Side-Loading | Sakula uses DLL side-loading, typically using a digitally signed sample of Kaspersky Anti-Virus (AV) 6.0 for Windows Workstations or McAfee's Outlook Scan About Box to load malicious DLL files. |
Hijack Execution Flow:DLL Side-Loading | It has used a malicious loader DLL file to execute the credwiz.exe process and side-load the malicious payload Duser.dll. |
Hijack Execution Flow:DLL Side-Loading | It has used DLL side-loading to drop and execute malicious payloads including the hijacking of the legitimate Windows application file rekeywiz.exe. |
Hijack Execution Flow:DLL Side-Loading | SysUpdate can load DLLs through vulnerable legitimate executables. |
Hijack Execution Flow:DLL Side-Loading | During the T9000 installation process, it drops a copy of the legitimate Microsoft binary igfxtray.exe. The executable contains a side-loading weakness which is used to load a portion of the malware. |
Hijack Execution Flow:DLL Side-Loading | It has used DLL side-loading, including by using legitimate Kaspersky antivirus variants as well as rc.exe, a legitimate Microsoft Resource Compiler. |
Hijack Execution Flow:DLL Side-Loading | It has been known to side-load DLLs using a valid version of a Windows Address Book and Windows Defender executable with one of their tools. |
Hijack Execution Flow:DLL Side-Loading | Waterbear has used DLL side loading to import and load a malicious DLL loader. |
Hijack Execution Flow:DLL Side-Loading | Wingbird side loads a malicious file, sspisrv.dll, in part of a spoofed lssas.exe service. |
Hijack Execution Flow:DLL Side-Loading | ZeroT has used DLL side-loading to load malicious payloads. |
Hijack Execution Flow:Dylib Hijacking | Empire has a dylib hijacker module that generates a malicious dylib given the path to a legitimate dylib of a vulnerable application. |
Hijack Execution Flow:Dynamic Linker Hijacking | It has configured payloads to load via LD_PRELOAD. |
Hijack Execution Flow:Dynamic Linker Hijacking | Ebury has injected its dynamic library into descendent processes of sshd via LD_PRELOAD. |
Hijack Execution Flow:Dynamic Linker Hijacking | HiddenWasp adds itself as a shared object to the LD_PRELOAD environment variable. |
Hijack Execution Flow:Dynamic Linker Hijacking | Hildegard has modified /etc/ld.so.preload to intercept shared library import functions. |
Hijack Execution Flow:Dynamic Linker Hijacking | It has modified /etc/ld.so.preload to hook libc functions in order to hide the installed dropper and mining software in process lists. |
Hijack Execution Flow:Dynamic Linker Hijacking | XCSSET adds malicious file paths to the DYLD_FRAMEWORK_PATH and DYLD_LIBRARY_PATH environment variables to execute malicious code. |
Hijack Execution Flow:Path Interception by PATH Environment Variable | Empire contains modules that can discover and exploit path interception opportunities in the PATH environment variable. |
Hijack Execution Flow:Path Interception by PATH Environment Variable | PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit path interception opportunities in the PATH environment variable. |
Hijack Execution Flow:Path Interception by Search Order Hijacking | Empire contains modules that can discover and exploit search order hijacking vulnerabilities. |
Hijack Execution Flow:Path Interception by Search Order Hijacking | PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit search order hijacking vulnerabilities. |
Hijack Execution Flow:Path Interception by Unquoted Path | Empire contains modules that can discover and exploit unquoted path vulnerabilities. |
Hijack Execution Flow:Path Interception by Unquoted Path | PowerSploit contains a collection of Privesc-PowerUp modules that can discover and exploit unquoted path vulnerabilities. |
Hijack Execution Flow:Services File Permissions Weakness | One variant of BlackEnergy locates existing driver services that have been disabled and drops its driver component into one of those service's paths, replacing the legitimate executable. The malware then sets the hijacked service to start automatically to establish persistence. |
Hijack Execution Flow:Services Registry Permissions Weakness | During Operation Honeybee, the threat actors used a batch file that modified the COMSysApp service to load a malicious ipnet.dll payload and to load a DLL into the svchost.exe process. |
Hijack Execution Flow:COR_PROFILER | It has used wmic.exe and Windows Registry modifications to set the COR_PROFILER environment variable to execute a malicious DLL whenever a process loads the .NET CLR. |
Hijack Execution Flow:COR_PROFILER | DarkTortilla can detect profilers by verifying the COR_ENABLE_PROFILING environment variable is present and active. |
Hijack Execution Flow:KernelCallbackTable | FinFisher has used the KernelCallbackTable to hijack the execution flow of a process by replacing the __fnDWORD function with the address of a created Asynchronous Procedure Call stub routine. |
Hijack Execution Flow:KernelCallbackTable | It has abused the KernelCallbackTable to hijack process control flow and execute shellcode. |
Impair Defenses | It has disabled LSA protection on compromised hosts using "reg" add HKLM\SYSTEM\CurrentControlSet\Control\LSA /v RunAsPPL /t REG_DWORD /d 0 /f. |
Impair Defenses | Stuxnet reduces the integrity level of objects to allow write actions. |
Impair Defenses:Disable or Modify Tools | During the 2015 Ukraine Electric Power Attack, It modified in-registry internet settings to lower internet security. |
Impair Defenses:Disable or Modify Tools | Agent Tesla has the capability to kill any running analysis processes and AV software. |
Impair Defenses:Disable or Modify Tools | It has disabled Purview Audit on targeted accounts prior to stealing emails from Microsoft 365 tenants. |
Impair Defenses:Disable or Modify Tools | It has attempted to stop endpoint detection and response (EDR) tools on compromised systems. |
Impair Defenses:Disable or Modify Tools | Avaddon looks for and attempts to stop anti-malware solutions. |
Impair Defenses:Disable or Modify Tools | Babuk can stop anti-virus services on a compromised host. |
Impair Defenses:Disable or Modify Tools | Bazar has manually loaded ntdll from disk in order to identity and remove API hooks set by security products. |
Impair Defenses:Disable or Modify Tools | Brave Prince terminates antimalware processes. |
Impair Defenses:Disable or Modify Tools | It has incorporated code into several tools that attempts to terminate anti-virus processes. |
Impair Defenses:Disable or Modify Tools | Bundlore can change browser security settings to enable extensions to be installed. Bundlore uses the pkill cfprefsd command to prevent users from inspecting processes. |
Impair Defenses:Disable or Modify Tools | Carberp has attempted to disable security software by creating a suspended process for the security software and injecting code to delete antivirus core files when the process is resumed. |
Impair Defenses:Disable or Modify Tools | ChChes can alter the victim's proxy configuration. |
Impair Defenses:Disable or Modify Tools | Clop can uninstall or disable security products. |
Impair Defenses:Disable or Modify Tools | Cobalt Strike has the ability to use Smart Applet attacks to disable the Java SecurityManager sandbox. |
Impair Defenses:Disable or Modify Tools | Conficker terminates various services related to system security and Windows. |
Impair Defenses:Disable or Modify Tools | DarkComet can disable Security Center functions like anti-virus. |
Impair Defenses:Disable or Modify Tools | Diavol can attempt to stop security software. |
Impair Defenses:Disable or Modify Tools | Donut can patch Antimalware Scan Interface (AMSI), Windows Lockdown Policy (WLDP), as well as exit-related Native API functions to avoid process termination. |
Impair Defenses:Disable or Modify Tools | Ebury can disable SELinux Role-Based Access Control and deactivate PAM modules. |
Impair Defenses:Disable or Modify Tools | Egregor has disabled Windows Defender to evade protections. |
Impair Defenses:Disable or Modify Tools | EKANS stops processes related to security and management software. |
Impair Defenses:Disable or Modify Tools | It has executed a batch script designed to disable Windows Defender on a compromised host. |
Impair Defenses:Disable or Modify Tools | It has deployed a utility script named kill.bat to disable anti-virus. |
Impair Defenses:Disable or Modify Tools | It has delivered macros which can tamper with Microsoft Office security settings. |
Impair Defenses:Disable or Modify Tools | Gold Dragon terminates anti-malware processes if they’re found running on the system. |
Impair Defenses:Disable or Modify Tools | Goopy has the ability to disable Microsoft Outlook's security policies to disable macro warnings. |
Impair Defenses:Disable or Modify Tools | It malware can attempt to disable security features in Microsoft Office and Windows Defender using the taskkill command. |
Impair Defenses:Disable or Modify Tools | Grandoreiro can hook APIs, kill processes, break file system paths, and change ACLs to prevent security tools from running. |
Impair Defenses:Disable or Modify Tools | H1N1 kills and disables services for Windows Security Center, and Windows Defender. |
Impair Defenses:Disable or Modify Tools | HDoor kills anti-virus found on the victim. |
Impair Defenses:Disable or Modify Tools | Hildegard has modified DNS resolvers to evade DNS monitoring tools. |
Impair Defenses:Disable or Modify Tools | Imminent Monitor has a feature to disable Windows Task Manager. |
Impair Defenses:Disable or Modify Tools | It used PsExec to leverage Windows Defender to disable scanning of all downloaded files and to restrict real-time monitoring. |
Impair Defenses:Disable or Modify Tools | JPIN can lower security settings by changing Registry keys. |
Impair Defenses:Disable or Modify Tools | It has been observed turning off Windows Security Center and can hide the AV software window from the view of the infected user. |
Impair Defenses:Disable or Modify Tools | KOCTOPUS will attempt to delete or disable all Registry keys and scheduled tasks related to Microsoft Security Defender and Security Essentials. |
Impair Defenses:Disable or Modify Tools | It malware TangoDelta attempts to terminate various processes associated with McAfee. Additionally, It malware SHARPKNOT disables the Microsoft Windows System Event Notification and Alerter services.. |
Impair Defenses:Disable or Modify Tools | LockerGoga installation has been immediately preceded by a "task kill" command in order to disable anti-virus. |
Impair Defenses:Disable or Modify Tools | macOS.OSAMiner has searched for the Activity Monitor process in the System Events process list and kills the process if running. macOS.OSAMiner also searches the operating system's install.log for apps matching its hardcoded list, killing all matching process names. |
Impair Defenses:Disable or Modify Tools | It has disabled antivirus services on targeted systems in order to upload malicious payloads. |
Impair Defenses:Disable or Modify Tools | Maze has disabled dynamic analysis and other security tools including IDA debugger, x32dbg, and OllyDbg. It has also disabled Windows Defender's Real-Time Monitoring feature and attempted to disable endpoint protection services. |
Impair Defenses:Disable or Modify Tools | MegaCortex was used to kill endpoint security processes. |
Impair Defenses:Disable or Modify Tools | Metamorfo has a function to kill processes associated with defenses and can prevent certain processes from launching. |
Impair Defenses:Disable or Modify Tools | Meteor can attempt to uninstall Kaspersky Antivirus or remove the Kaspersky license; it can also add all files and folders related to the attack to the Windows Defender exclusion list. |
Impair Defenses:Disable or Modify Tools | It can disable the system's local proxy settings. |
Impair Defenses:Disable or Modify Tools | NanHaiShu can change Internet Explorer settings to reduce warnings about malware activity. |
Impair Defenses:Disable or Modify Tools | NanoCore can modify the victim's anti-virus. |
Impair Defenses:Disable or Modify Tools | Netwalker can detect and terminate active security software-related processes on infected systems. |
Impair Defenses:Disable or Modify Tools | During Night Dragon, threat actors disabled anti-virus and anti-spyware tools in some instances on the victim’s machines. The actors also disabled proxy settings to allow direct communication from victims to the Internet. |
Impair Defenses:Disable or Modify Tools | POWERSTATS can disable Microsoft Office Protected View by changing Registry keys. |
Impair Defenses:Disable or Modify Tools | Proton kills security tools like Wireshark that are running. |
Impair Defenses:Disable or Modify Tools | Malware used by It attempts to terminate processes corresponding to two components of Sophos Anti-Virus (SAVAdminService.exe and SavService.exe). |
Impair Defenses:Disable or Modify Tools | Pysa has the capability to stop antivirus services and disable Windows Defender. |
Impair Defenses:Disable or Modify Tools | QakBot has the ability to modify the Registry to add its binaries to the Windows Defender exclusion list. |
Impair Defenses:Disable or Modify Tools | Ragnar Locker has attempted to terminate/stop processes and services associated with endpoint security products. |
Impair Defenses:Disable or Modify Tools | REvil can connect to and disable the Symantec server on the victim's network. |
Impair Defenses:Disable or Modify Tools | RobbinHood will search for Windows services that are associated with antivirus software on the system and kill the process. |
Impair Defenses:Disable or Modify Tools | It used scripts which detected and uninstalled antivirus software. |
Impair Defenses:Disable or Modify Tools | RunningRAT kills antimalware running process. |
Impair Defenses:Disable or Modify Tools | Ryuk has stopped services related to anti-virus. |
Impair Defenses:Disable or Modify Tools | SILENTTRINITY's amsiPatch.py module can disable Antimalware Scan Interface (AMSI) functions. |
Impair Defenses:Disable or Modify Tools | Skidmap has the ability to set SELinux to permissive mode. |
Impair Defenses:Disable or Modify Tools | During the SolarWinds Compromise, It used the service control manager on a remote system to disable services associated with security monitoring products. |
Impair Defenses:Disable or Modify Tools | SslMM identifies and kills anti-malware processes. |
Impair Defenses:Disable or Modify Tools | StrongPity can add directories used by the malware to the Windows Defender exclusions list to prevent detection. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.