prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Process Discovery | Heyoka Backdoor can gather process information. |
Process Discovery | It’s shellcode attempted to find the process ID of the current process. |
Process Discovery | HotCroissant has the ability to list running processes on the infected host. |
Process Discovery | Hydraq creates a backdoor through which remote attackers can monitor processes. |
Process Discovery | iKitten lists the current processes running. |
Process Discovery | Imminent Monitor has a "Process Watcher" feature to monitor processes in case the client ever crashes or gets closed. |
Process Discovery | It has used a reconnaissance module to identify active processes and other associated loaded modules. |
Process Discovery | Industroyer2 has the ability to cyclically enumerate running processes such as PServiceControl.exe, PService_PDD.exe, and other targets supplied through a hardcoded configuration. |
Process Discovery | InvisiMole can obtain a list of running processes. |
Process Discovery | IronNetInjector can identify processes via C# methods such as GetProcessesByName and running Tasklist with the Python os.popen function. |
Process Discovery | Ixeshe can list running processes. |
Process Discovery | Javali can monitor processes for open browsers and custom banking applications. |
Process Discovery | JHUHUGIT obtains a list of running processes on the victim. |
Process Discovery | JPIN can list running processes. |
Process Discovery | jRAT can query and kill system processes. |
Process Discovery | Kasidet has the ability to search for a given process name in processes currently running in the system. |
Process Discovery | Kazuar obtains a list of running processes through WMI querying and the ps command. |
Process Discovery | It performs process discovery using tasklist commands. |
Process Discovery | KEYMARBLE can obtain a list of running processes on the system. |
Process Discovery | KillDisk has called GetCurrentProcess. |
Process Discovery | It can gather a list of all processes running on a victim's machine. |
Process Discovery | Kinsing has used ps to list processes. |
Process Discovery | The OsInfo function in Komplex collects a running process list. |
Process Discovery | KONNI has used the command cmd /c tasklist to get a snapshot of the current processes on the target machine. |
Process Discovery | KOPILUWAK can enumerate current running processes on the targeted machine. |
Process Discovery | Kwampirs collects a list of running services with the command tasklist /v. |
Process Discovery | Several It malware families gather a list of running processes on a victim system and send it to their C2 server. A Destover-like variant used by It also gathers process times. |
Process Discovery | Linfo creates a backdoor through which remote attackers can retrieve a list of running processes. |
Process Discovery | Lizar has a plugin designed to obtain a list of processes. |
Process Discovery | LookBack can list running processes. |
Process Discovery | LoudMiner used the ps command to monitor the running processes on the system. |
Process Discovery | Lucifer can identify the process that owns remote connections. |
Process Discovery | It has a component to check for running processes to look for web browsers. |
Process Discovery | MacMa can enumerate running processes. |
Process Discovery | macOS.OSAMiner has used ps ax | grep <name> | grep -v grep | ... and ps ax | grep -E... to conduct process discovery. |
Process Discovery | Mafalda can enumerate running processes on a machine. |
Process Discovery | It malware can list running processes. |
Process Discovery | MarkiRAT can search for different processes on a system. |
Process Discovery | Maze has gathered all of the running system processes. |
Process Discovery | metaMain can enumerate the processes that run on the platform. |
Process Discovery | Metamorfo has performed process name checks and has monitored applications. |
Process Discovery | Meteor can check if a specific process is running, such as Kaspersky's avp.exe. |
Process Discovery | MobileOrder has a command to upload information about all running processes to its C2 server. |
Process Discovery | It actors obtained a list of active processes on the victim and sent them to C2 servers. |
Process Discovery | MoonWind has a command to return a list of running processes. |
Process Discovery | Mosquito runs tasklist to obtain running processes. |
Process Discovery | It has used malware to obtain a list of running processes on the system. |
Process Discovery | It has used tasklist /v to determine active process information. |
Process Discovery | NavRAT uses tasklist /v to check running processes. |
Process Discovery | Nebulae can enumerate processes on a target system. |
Process Discovery | NETEAGLE can send process listings over the C2 channel. |
Process Discovery | NETWIRE can discover processes on compromised hosts. |
Process Discovery | NightClub has the ability to use GetWindowThreadProcessId to identify the process behind a specified window. |
Process Discovery | njRAT can search a list of running processes for Tr.exe. |
Process Discovery | ObliqueRAT can check for blocklisted process names on a compromised host. |
Process Discovery | OceanSalt can collect the name and ID for every process running on the system. |
Process Discovery | It has run tasklist on a victim's machine. |
Process Discovery | During Operation CuckooBees, the threat actors used the tasklist command as part of their advanced reconnaissance. |
Process Discovery | During Operation Honeybee, the threat actors obtained a list of running processes on a victim machine using cmd /c tasklist > %temp%\temp.ini. |
Process Discovery | During Operation Wocao, the threat actors used tasklist to collect a list of running processes on an infected system. |
Process Discovery | Orz can gather a process list from the victim. |
Process Discovery | OutSteel can identify running processes on a compromised host. |
Process Discovery | P8RAT can check for specific processes associated with virtual environments. |
Process Discovery | Pandora can monitor processes on a compromised host. |
Process Discovery | Pasam creates a backdoor through which remote attackers can retrieve lists of running processes. |
Process Discovery | PcShare can obtain a list of running processes on a compromised host. |
Process Discovery | Pillowmint can iterate through running processes every six seconds collecting a list of processes to capture from later. |
Process Discovery | PipeMon can iterate over the running processes to find a suitable injection target. |
Process Discovery | PLAINTEE performs the tasklist command to list running processes. |
Process Discovery | PLEAD has the ability to list processes on the compromised host. |
Process Discovery | PlugX has a module to list the processes running on a machine. |
Process Discovery | PoetRAT has the ability to list all running processes. |
Process Discovery | POORAIM can enumerate processes. |
Process Discovery | After compromising a victim, It lists all running processes. |
Process Discovery | PowerDuke has a command to list the victim's processes. |
Process Discovery | PowerShower has the ability to deploy a reconnaissance module to retrieve a list of the active processes. |
Process Discovery | PowerSploit's Get-ProcessTokenPrivilege Privesc-PowerUp module can enumerate privileges for a given process. |
Process Discovery | PowerStallion has been used to monitor process lists. |
Process Discovery | POWERSTATS has used get_tasklist to discover processes on the compromised host. |
Process Discovery | POWRUNER may collect process information by running tasklist on a victim. |
Process Discovery | Proxysvc lists processes running on the system. |
Process Discovery | Pupy can list the running processes and get the process ID and parent process’s ID. |
Process Discovery | QakBot has the ability to check running processes. |
Process Discovery | RainyDay can enumerate processes on a target system. |
Process Discovery | Ramsay can gather a list of running processes by using Tasklist. |
Process Discovery | RATANKBA lists the system’s processes. |
Process Discovery | RCSession can identify processes based on PID. |
Process Discovery | Remsec can obtain a process list from the victim. |
Process Discovery | Rising Sun can enumerate all running processes and process information on an infected machine. |
Process Discovery | It can detect a running process's PID on the infected machine. |
Process Discovery | RogueRobin checks the running processes for evidence it may be running in a sandbox environment. It specifically enumerates processes for Wireshark and Sysinternals. |
Process Discovery | ROKRAT can list the current running processes on the system. |
Process Discovery | RotaJakiro can monitor the /proc/[PID] directory of known RotaJakiro processes as a part of its persistence when executing with non-root permissions. If the process is found dead, it resurrects the process. RotaJakiro processes can be matched to an associated Advisory Lock, in the /proc/locks folder, to ensure it doesn't spawn more than one process. |
Process Discovery | Royal can use GetCurrentProcess to enumerate processes. |
Process Discovery | It can obtain information about process integrity levels. |
Process Discovery | Ryuk has called CreateToolhelp32Snapshot to enumerate all running processes. |
Process Discovery | Saint Bot has enumerated running processes on a compromised host to determine if it is running under the process name dfrgui.exe. |
Process Discovery | Sardonic has the ability to execute the tasklist command. |
Process Discovery | SDBbot can enumerate a list of running processes on a compromised machine. |
Process Discovery | Seasalt has a command to perform a process listing. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.