prompt
stringclasses
508 values
procedure
stringlengths
20
478
System Binary Proxy Execution:Rundll32
PowerDuke uses rundll32.exe to load.
System Binary Proxy Execution:Rundll32
Prikormka uses rundll32.exe to load its DLL.
System Binary Proxy Execution:Rundll32
Pteranodon executes functions using rundll32.exe.
System Binary Proxy Execution:Rundll32
PUNCHBUGGY can load a DLL using Rundll32.
System Binary Proxy Execution:Rundll32
QakBot has used Rundll32.exe to drop malicious DLLs including Brute Ratel C4 and to enable C2 communication.
System Binary Proxy Execution:Rundll32
Ragnar Locker has used rundll32.exe to execute components of VirtualBox.
System Binary Proxy Execution:Rundll32
It runs its core DLL file using rundll32.exe.
System Binary Proxy Execution:Rundll32
Sakula calls cmd.exe to run various DLL files via rundll32.
System Binary Proxy Execution:Rundll32
It used a backdoor which could execute a supplied DLL using rundll32.exe.
System Binary Proxy Execution:Rundll32
SDBbot has used rundll32.exe to execute DLLs.
System Binary Proxy Execution:Rundll32
ServHelper contains a module for downloading and executing DLLs that leverages rundll32.exe.
System Binary Proxy Execution:Rundll32
Sibot has executed downloaded DLLs with rundll32.exe.
System Binary Proxy Execution:Rundll32
During the SolarWinds Compromise, It used Rundll32.exe to execute payloads.
System Binary Proxy Execution:Rundll32
Squirrelwaffle has been executed using rundll32.exe.
System Binary Proxy Execution:Rundll32
StreamEx uses rundll32 to call an exported function.
System Binary Proxy Execution:Rundll32
SUNBURST used Rundll32 to execute payloads.
System Binary Proxy Execution:Rundll32
SVCReady has used rundll32.exe for execution.
System Binary Proxy Execution:Rundll32
It has leveraged rundll32.exe to execute malicious DLLs.
System Binary Proxy Execution:Rundll32
It has used rundll32.exe to load malicious DLLs.
System Binary Proxy Execution:Rundll32
USBferry can execute rundll32.exe in memory to avoid detection.
System Binary Proxy Execution:Rundll32
The Winnti for Windows installer loads a DLL using rundll32.
System Binary Proxy Execution:Rundll32
It has utilized rundll32.exe to deploy ransomware commands with the use of WebDAV.
System Binary Proxy Execution:Rundll32
ZxShell has used rundll32.exe to execute other DLLs and named pipes.
System Binary Proxy Execution:Verclsid
Hancitor has used verclsid.exe to download and execute a malicious script.
System Script Proxy Execution:PubPrn
It has used PubPrn.vbs within execution scripts to execute malware, possibly bypassing defenses.
Template Injection
It used weaponized Microsoft Word documents abusing the remote template function to retrieve a malicious macro.
Template Injection
Chaes changed the template target of the settings.xml file embedded in the Word document and populated that field with the downloaded URL of the next payload.
Template Injection
It has used a weaponized Microsoft Word document with an embedded RTF exploit.
Template Injection
It used an open-source tool, Phishery, to inject malicious remote template URLs into Microsoft Word documents and then sent them to victims to enable Forced Authentication.
Template Injection
It has injected SMB URLs into malicious Word spearphishing attachments to initiate Forced Authentication.
Template Injection
During Frankenstein, the threat actors used trojanized documents that retrieved remote templates from an adversary-controlled website.
Template Injection
It has used DOCX files to download malicious DOT document templates and has used RTF template injection to download malicious payloads. It can also inject malicious macros or remote templates into documents already present on compromised systems.
Template Injection
It has used decoy documents to load malicious remote payloads via HTTP.
Template Injection
During Operation Dream Job, It used DOCX files to retrieve a malicious document template/DOTM file.
Template Injection
It delivered malicious documents with the XLSX extension, typically used by OpenXML documents, but the file itself was actually an OLE (XLS) document.
Template Injection
WarzoneRAT has been install via template injection through a malicious DLL embedded within a template RTF in a Word document.
Traffic Signaling
Chaos provides a reverse shell is triggered upon receipt of a packet with a special string, sent to any port.
Traffic Signaling
Kobalos is triggered by an incoming TCP connection to a legitimate service from a specific source port.
Traffic Signaling
Pandora can identify if incoming HTTP traffic contains a token and if so it will intercept the traffic and process the received command.
Traffic Signaling
Penquin will connect to C2 only after sniffing a "magic packet" value in TCP or UDP packets matching specific conditions.
Traffic Signaling
Ryuk has used Wake-on-Lan to power on turned off systems for lateral movement.
Traffic Signaling
SYNful Knock can be sent instructions via special packets to change its functionality. Code for new functionality can be included in these messages.
Traffic Signaling
Umbreon provides additional access using its backdoor Espeon, providing a reverse shell upon receipt of a special packet.
Traffic Signaling
Uroburos can intercept the first client to server packet in the 3-way TCP handshake to determine if the packet contains the correct unique value for a specific Uroburos implant. If the value does not match, the packet and the rest of the TCP session are passed to the legitimate listening application.
Traffic Signaling
Winnti for Linux has used a passive listener, capable of identifying a specific magic value before executing tasking, as a secondary command and control (C2) mechanism.
Traffic Signaling:Port Knocking
Mafalda can use port-knocking to authenticate itself to another implant called Cryshell to establish an indirect connection to the C2 server.
Traffic Signaling:Port Knocking
metaMain has authenticated itself to a different implant, Cryshell, through a port knocking and handshake procedure.
Traffic Signaling:Port Knocking
It has used a script that configures the knockd service and firewall to only accept C2 connections from systems that use a specified sequence of knock ports.
Traffic Signaling:Socket Filters
Penquin installs a TCP and UDP filter on the eth0 interface.
Trusted Developer Utilities Proxy Execution:MSBuild
Empire can use built-in modules to abuse trusted utilities like MSBuild.exe.
Trusted Developer Utilities Proxy Execution:MSBuild
During Frankenstein, the threat actors used MSbuild to execute an actor-created file.
Trusted Developer Utilities Proxy Execution:MSBuild
A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe, presumably to bypass application control techniques.
Use Alternate Authentication Material
FoggyWeb can allow abuse of a compromised AD FS server's SAML token.
Use Alternate Authentication Material
During the SolarWinds Compromise, It used forged SAML tokens that allowed the actors to impersonate users and bypass MFA, enabling It to access enterprise cloud applications and services.
Use Alternate Authentication Material:Application Access Token
It has used several malicious applications that abused OAuth access tokens to gain access to target email accounts, including Gmail and Yahoo Mail.
Use Alternate Authentication Material:Application Access Token
CreepyDrive can use legitimate OAuth refresh tokens to authenticate with OneDrive.
Use Alternate Authentication Material:Application Access Token
Peirates can use stolen service account tokens to perform its operations. It also enables adversaries to switch between valid service accounts.
Use Alternate Authentication Material:Application Access Token
During the SolarWinds Compromise, It used compromised service principals to make changes to the Office 365 environment.
Use Alternate Authentication Material:Pass the Hash
The It group is known to have used pass the hash.
Use Alternate Authentication Material:Pass the Hash
It has used pass the hash for lateral movement.
Use Alternate Authentication Material:Pass the Hash
It has used pass the hash for lateral movement.
Use Alternate Authentication Material:Pass the Hash
BADHATCH can perform pass the hash on compromised machines with x64 versions.
Use Alternate Authentication Material:Pass the Hash
It has dumped password hashes for use in pass the hash authentication attacks.
Use Alternate Authentication Material:Pass the Hash
Cobalt Strike can perform pass the hash.
Use Alternate Authentication Material:Pass the Hash
CrackMapExec can pass the hash to authenticate via SMB.
Use Alternate Authentication Material:Pass the Hash
Empire can perform pass the hash attacks.
Use Alternate Authentication Material:Pass the Hash
It has used the PowerShell utility Invoke-SMBExec to execute the pass the hash method for lateral movement within an compromised environment.
Use Alternate Authentication Material:Pass the Hash
It used dumped hashes to authenticate to other machines via pass the hash.
Use Alternate Authentication Material:Pass the Hash
HOPLIGHT has been observed loading several APIs associated with Pass the Hash.
Use Alternate Authentication Material:Pass the Hash
It has used pass the hash for authentication to remote access software used in C2.
Use Alternate Authentication Material:Pass the Hash
Mimikatz's SEKURLSA::Pth module can impersonate a user, with only a password hash, to execute arbitrary commands.
Use Alternate Authentication Material:Pass the Hash
During Night Dragon, threat actors used pass-the-hash tools to obtain authenticated access to sensitive internal desktops and servers.
Use Alternate Authentication Material:Pass the Hash
Pass-The-Hash Toolkit can perform pass the hash.
Use Alternate Authentication Material:Pass the Hash
PoshC2 has a number of modules that leverage pass the hash for lateral movement.
Use Alternate Authentication Material:Pass the Hash
It has used the Invoke-SMBExec PowerShell cmdlet to execute the pass-the-hash technique and utilized stolen password hashes to move laterally.
Use Alternate Authentication Material:Pass the Ticket
It used Kerberos ticket attacks for lateral movement.
Use Alternate Authentication Material:Pass the Ticket
It successfully gained remote access by using pass the ticket.
Use Alternate Authentication Material:Pass the Ticket
It has created forged Kerberos Ticket Granting Ticket (TGT) and Ticket Granting Service (TGS) tickets to maintain administrative access.
Use Alternate Authentication Material:Pass the Ticket
Mimikatz’s LSADUMP::DCSync and KERBEROS::PTT modules implement the three steps required to extract the krbtgt account hash and create/use Kerberos tickets.
Use Alternate Authentication Material:Pass the Ticket
Pupy can also perform pass-the-ticket.
Use Alternate Authentication Material:Pass the Ticket
Some SeaDuke samples have a module to use pass the ticket with Kerberos for authentication.
Use Alternate Authentication Material:Web Session Cookie
During the SolarWinds Compromise, It used stolen cookies to access cloud resources and a forged duo-sid cookie to bypass MFA set on an email account.
Valid Accounts
During the 2015 Ukraine Electric Power Attack, It used valid accounts on the corporate network to escalate privileges, move laterally, and establish persistence within the corporate network.
Valid Accounts
It actors leverage legitimate credentials to log into external remote services.
Valid Accounts
It has used legitimate credentials to gain initial access, maintain access, and exfiltrate data from a victim network. The group has specifically used credentials stolen through a spearphishing email to login to the DCCC network. The group has also leveraged default manufacturer's passwords to gain initial access to corporate networks via IoT devices such as a VOIP phone, printer, and video decoder.
Valid Accounts
It has used a compromised account to access an organization's VPN infrastructure.
Valid Accounts
It has used valid accounts for initial access and privilege escalation.
Valid Accounts
It has used stolen credentials to compromise Outlook Web Access (OWA).
Valid Accounts
It used compromised credentials to log on to other systems.
Valid Accounts
It has used previously compromised administrative accounts to escalate privileges.
Valid Accounts
It actors used legitimate credentials of banking employees to perform operations that sent them millions of dollars.
Valid Accounts
It has used a valid account to maintain persistence via scheduled task.
Valid Accounts
It has compromised user credentials and used valid accounts for operations.
Valid Accounts
Dtrack used hard-coded credentials to gain access to a network share.
Valid Accounts
Adversaries can instruct Duqu to spread laterally by copying itself to shares it has enumerated and for which it has obtained legitimate credentials (via keylogging or other means). The remote host is then infected by using the compromised credentials to schedule a task on remote machines that executes the malware.
Valid Accounts
It has used stolen credentials to connect remotely to victim networks using VPNs protected with only a single factor.
Valid Accounts
It has used legitimate credentials to hijack email communications.
Valid Accounts
It has used legitimate VPN, RDP, Citrix, or VNC credentials to maintain access to a victim environment.
Valid Accounts
To move laterally on a victim network, It has used credentials stolen from various systems on which it gathered usernames and password hashes.
Valid Accounts
It has harvested valid administrative credentials for lateral movement.