prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
System Binary Proxy Execution:Rundll32 | PowerDuke uses rundll32.exe to load. |
System Binary Proxy Execution:Rundll32 | Prikormka uses rundll32.exe to load its DLL. |
System Binary Proxy Execution:Rundll32 | Pteranodon executes functions using rundll32.exe. |
System Binary Proxy Execution:Rundll32 | PUNCHBUGGY can load a DLL using Rundll32. |
System Binary Proxy Execution:Rundll32 | QakBot has used Rundll32.exe to drop malicious DLLs including Brute Ratel C4 and to enable C2 communication. |
System Binary Proxy Execution:Rundll32 | Ragnar Locker has used rundll32.exe to execute components of VirtualBox. |
System Binary Proxy Execution:Rundll32 | It runs its core DLL file using rundll32.exe. |
System Binary Proxy Execution:Rundll32 | Sakula calls cmd.exe to run various DLL files via rundll32. |
System Binary Proxy Execution:Rundll32 | It used a backdoor which could execute a supplied DLL using rundll32.exe. |
System Binary Proxy Execution:Rundll32 | SDBbot has used rundll32.exe to execute DLLs. |
System Binary Proxy Execution:Rundll32 | ServHelper contains a module for downloading and executing DLLs that leverages rundll32.exe. |
System Binary Proxy Execution:Rundll32 | Sibot has executed downloaded DLLs with rundll32.exe. |
System Binary Proxy Execution:Rundll32 | During the SolarWinds Compromise, It used Rundll32.exe to execute payloads. |
System Binary Proxy Execution:Rundll32 | Squirrelwaffle has been executed using rundll32.exe. |
System Binary Proxy Execution:Rundll32 | StreamEx uses rundll32 to call an exported function. |
System Binary Proxy Execution:Rundll32 | SUNBURST used Rundll32 to execute payloads. |
System Binary Proxy Execution:Rundll32 | SVCReady has used rundll32.exe for execution. |
System Binary Proxy Execution:Rundll32 | It has leveraged rundll32.exe to execute malicious DLLs. |
System Binary Proxy Execution:Rundll32 | It has used rundll32.exe to load malicious DLLs. |
System Binary Proxy Execution:Rundll32 | USBferry can execute rundll32.exe in memory to avoid detection. |
System Binary Proxy Execution:Rundll32 | The Winnti for Windows installer loads a DLL using rundll32. |
System Binary Proxy Execution:Rundll32 | It has utilized rundll32.exe to deploy ransomware commands with the use of WebDAV. |
System Binary Proxy Execution:Rundll32 | ZxShell has used rundll32.exe to execute other DLLs and named pipes. |
System Binary Proxy Execution:Verclsid | Hancitor has used verclsid.exe to download and execute a malicious script. |
System Script Proxy Execution:PubPrn | It has used PubPrn.vbs within execution scripts to execute malware, possibly bypassing defenses. |
Template Injection | It used weaponized Microsoft Word documents abusing the remote template function to retrieve a malicious macro. |
Template Injection | Chaes changed the template target of the settings.xml file embedded in the Word document and populated that field with the downloaded URL of the next payload. |
Template Injection | It has used a weaponized Microsoft Word document with an embedded RTF exploit. |
Template Injection | It used an open-source tool, Phishery, to inject malicious remote template URLs into Microsoft Word documents and then sent them to victims to enable Forced Authentication. |
Template Injection | It has injected SMB URLs into malicious Word spearphishing attachments to initiate Forced Authentication. |
Template Injection | During Frankenstein, the threat actors used trojanized documents that retrieved remote templates from an adversary-controlled website. |
Template Injection | It has used DOCX files to download malicious DOT document templates and has used RTF template injection to download malicious payloads. It can also inject malicious macros or remote templates into documents already present on compromised systems. |
Template Injection | It has used decoy documents to load malicious remote payloads via HTTP. |
Template Injection | During Operation Dream Job, It used DOCX files to retrieve a malicious document template/DOTM file. |
Template Injection | It delivered malicious documents with the XLSX extension, typically used by OpenXML documents, but the file itself was actually an OLE (XLS) document. |
Template Injection | WarzoneRAT has been install via template injection through a malicious DLL embedded within a template RTF in a Word document. |
Traffic Signaling | Chaos provides a reverse shell is triggered upon receipt of a packet with a special string, sent to any port. |
Traffic Signaling | Kobalos is triggered by an incoming TCP connection to a legitimate service from a specific source port. |
Traffic Signaling | Pandora can identify if incoming HTTP traffic contains a token and if so it will intercept the traffic and process the received command. |
Traffic Signaling | Penquin will connect to C2 only after sniffing a "magic packet" value in TCP or UDP packets matching specific conditions. |
Traffic Signaling | Ryuk has used Wake-on-Lan to power on turned off systems for lateral movement. |
Traffic Signaling | SYNful Knock can be sent instructions via special packets to change its functionality. Code for new functionality can be included in these messages. |
Traffic Signaling | Umbreon provides additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet. |
Traffic Signaling | Uroburos can intercept the first client to server packet in the 3-way TCP handshake to determine if the packet contains the correct unique value for a specific Uroburos implant. If the value does not match, the packet and the rest of the TCP session are passed to the legitimate listening application. |
Traffic Signaling | Winnti for Linux has used a passive listener, capable of identifying a specific magic value before executing tasking, as a secondary command and control (C2) mechanism. |
Traffic Signaling:Port Knocking | Mafalda can use port-knocking to authenticate itself to another implant called Cryshell to establish an indirect connection to the C2 server. |
Traffic Signaling:Port Knocking | metaMain has authenticated itself to a different implant, Cryshell, through a port knocking and handshake procedure. |
Traffic Signaling:Port Knocking | It has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports. |
Traffic Signaling:Socket Filters | Penquin installs a TCP and UDP filter on the eth0 interface. |
Trusted Developer Utilities Proxy Execution:MSBuild | Empire can use built-in modules to abuse trusted utilities like MSBuild.exe. |
Trusted Developer Utilities Proxy Execution:MSBuild | During Frankenstein, the threat actors used MSbuild to execute an actor-created file. |
Trusted Developer Utilities Proxy Execution:MSBuild | A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe, presumably to bypass application control techniques. |
Use Alternate Authentication Material | FoggyWeb can allow abuse of a compromised AD FS server's SAML token. |
Use Alternate Authentication Material | During the SolarWinds Compromise, It used forged SAML tokens that allowed the actors to impersonate users and bypass MFA, enabling It to access enterprise cloud applications and services. |
Use Alternate Authentication Material:Application Access Token | It has used several malicious applications that abused OAuth access tokens to gain access to target email accounts, including Gmail and Yahoo Mail. |
Use Alternate Authentication Material:Application Access Token | CreepyDrive can use legitimate OAuth refresh tokens to authenticate with OneDrive. |
Use Alternate Authentication Material:Application Access Token | Peirates can use stolen service account tokens to perform its operations. It also enables adversaries to switch between valid service accounts. |
Use Alternate Authentication Material:Application Access Token | During the SolarWinds Compromise, It used compromised service principals to make changes to the Office 365 environment. |
Use Alternate Authentication Material:Pass the Hash | The It group is known to have used pass the hash. |
Use Alternate Authentication Material:Pass the Hash | It has used pass the hash for lateral movement. |
Use Alternate Authentication Material:Pass the Hash | It has used pass the hash for lateral movement. |
Use Alternate Authentication Material:Pass the Hash | BADHATCH can perform pass the hash on compromised machines with x64 versions. |
Use Alternate Authentication Material:Pass the Hash | It has dumped password hashes for use in pass the hash authentication attacks. |
Use Alternate Authentication Material:Pass the Hash | Cobalt Strike can perform pass the hash. |
Use Alternate Authentication Material:Pass the Hash | CrackMapExec can pass the hash to authenticate via SMB. |
Use Alternate Authentication Material:Pass the Hash | Empire can perform pass the hash attacks. |
Use Alternate Authentication Material:Pass the Hash | It has used the PowerShell utility Invoke-SMBExec to execute the pass the hash method for lateral movement within an compromised environment. |
Use Alternate Authentication Material:Pass the Hash | It used dumped hashes to authenticate to other machines via pass the hash. |
Use Alternate Authentication Material:Pass the Hash | HOPLIGHT has been observed loading several APIs associated with Pass the Hash. |
Use Alternate Authentication Material:Pass the Hash | It has used pass the hash for authentication to remote access software used in C2. |
Use Alternate Authentication Material:Pass the Hash | Mimikatz's SEKURLSA::Pth module can impersonate a user, with only a password hash, to execute arbitrary commands. |
Use Alternate Authentication Material:Pass the Hash | During Night Dragon, threat actors used pass-the-hash tools to obtain authenticated access to sensitive internal desktops and servers. |
Use Alternate Authentication Material:Pass the Hash | Pass-The-Hash Toolkit can perform pass the hash. |
Use Alternate Authentication Material:Pass the Hash | PoshC2 has a number of modules that leverage pass the hash for lateral movement. |
Use Alternate Authentication Material:Pass the Hash | It has used the Invoke-SMBExec PowerShell cmdlet to execute the pass-the-hash technique and utilized stolen password hashes to move laterally. |
Use Alternate Authentication Material:Pass the Ticket | It used Kerberos ticket attacks for lateral movement. |
Use Alternate Authentication Material:Pass the Ticket | It successfully gained remote access by using pass the ticket. |
Use Alternate Authentication Material:Pass the Ticket | It has created forged Kerberos Ticket Granting Ticket (TGT) and Ticket Granting Service (TGS) tickets to maintain administrative access. |
Use Alternate Authentication Material:Pass the Ticket | Mimikatz’s LSADUMP::DCSync and KERBEROS::PTT modules implement the three steps required to extract the krbtgt account hash and create/use Kerberos tickets. |
Use Alternate Authentication Material:Pass the Ticket | Pupy can also perform pass-the-ticket. |
Use Alternate Authentication Material:Pass the Ticket | Some SeaDuke samples have a module to use pass the ticket with Kerberos for authentication. |
Use Alternate Authentication Material:Web Session Cookie | During the SolarWinds Compromise, It used stolen cookies to access cloud resources and a forged duo-sid cookie to bypass MFA set on an email account. |
Valid Accounts | During the 2015 Ukraine Electric Power Attack, It used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network. |
Valid Accounts | It actors leverage legitimate credentials to log into external remote services. |
Valid Accounts | It has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder. |
Valid Accounts | It has used a compromised account to access an organization's VPN infrastructure. |
Valid Accounts | It has used valid accounts for initial access and privilege escalation. |
Valid Accounts | It has used stolen credentials to compromise Outlook Web Access (OWA). |
Valid Accounts | It used compromised credentials to log on to other systems. |
Valid Accounts | It has used previously compromised administrative accounts to escalate privileges. |
Valid Accounts | It actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars. |
Valid Accounts | It has used a valid account to maintain persistence via scheduled task. |
Valid Accounts | It has compromised user credentials and used valid accounts for operations. |
Valid Accounts | Dtrack used hard-coded credentials to gain access to a network share. |
Valid Accounts | Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware. |
Valid Accounts | It has used stolen credentials to connect remotely to victim networks using VPNs protected with only a single factor. |
Valid Accounts | It has used legitimate credentials to hijack email communications. |
Valid Accounts | It has used legitimate VPN, RDP, Citrix, or VNC credentials to maintain access to a victim environment. |
Valid Accounts | To move laterally on a victim network, It has used credentials stolen from various systems on which it gathered usernames and password hashes. |
Valid Accounts | It has harvested valid administrative credentials for lateral movement. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.