prompt
stringclasses
508 values
procedure
stringlengths
20
478
Process Discovery
Heyoka Backdoor can gather process information.
Process Discovery
It’s shellcode attempted to find the process ID of the current process.
Process Discovery
HotCroissant has the ability to list running processes on the infected host.
Process Discovery
Hydraq creates a backdoor through which remote attackers can monitor processes.
Process Discovery
iKitten lists the current processes running.
Process Discovery
Imminent Monitor has a "Process Watcher" feature to monitor processes in case the client ever crashes or gets closed.
Process Discovery
It has used a reconnaissance module to identify active processes and other associated loaded modules.
Process Discovery
Industroyer2 has the ability to cyclically enumerate running processes such as PServiceControl.exe, PService_PDD.exe, and other targets supplied through a hardcoded configuration.
Process Discovery
InvisiMole can obtain a list of running processes.
Process Discovery
IronNetInjector can identify processes via C# methods such as GetProcessesByName and running Tasklist with the Python os.popen function.
Process Discovery
Ixeshe can list running processes.
Process Discovery
Javali can monitor processes for open browsers and custom banking applications.
Process Discovery
JHUHUGIT obtains a list of running processes on the victim.
Process Discovery
JPIN can list running processes.
Process Discovery
jRAT can query and kill system processes.
Process Discovery
Kasidet has the ability to search for a given process name in processes currently running in the system.
Process Discovery
Kazuar obtains a list of running processes through WMI querying and the ps command.
Process Discovery
It performs process discovery using tasklist commands.
Process Discovery
KEYMARBLE can obtain a list of running processes on the system.
Process Discovery
KillDisk has called GetCurrentProcess.
Process Discovery
It can gather a list of all processes running on a victim's machine.
Process Discovery
Kinsing has used ps to list processes.
Process Discovery
The OsInfo function in Komplex collects a running process list.
Process Discovery
KONNI has used the command cmd /c tasklist to get a snapshot of the current processes on the target machine.
Process Discovery
KOPILUWAK can enumerate current running processes on the targeted machine.
Process Discovery
Kwampirs collects a list of running services with the command tasklist /v.
Process Discovery
Several It malware families gather a list of running processes on a victim system and send it to their C2 server. A Destover-like variant used by It also gathers process times.
Process Discovery
Linfo creates a backdoor through which remote attackers can retrieve a list of running processes.
Process Discovery
Lizar has a plugin designed to obtain a list of processes.
Process Discovery
LookBack can list running processes.
Process Discovery
LoudMiner used the ps command to monitor the running processes on the system.
Process Discovery
Lucifer can identify the process that owns remote connections.
Process Discovery
It has a component to check for running processes to look for web browsers.
Process Discovery
MacMa can enumerate running processes.
Process Discovery
macOS.OSAMiner has used ps ax | grep <name> | grep -v grep | ... and ps ax | grep -E... to conduct process discovery.
Process Discovery
Mafalda can enumerate running processes on a machine.
Process Discovery
It malware can list running processes.
Process Discovery
MarkiRAT can search for different processes on a system.
Process Discovery
Maze has gathered all of the running system processes.
Process Discovery
metaMain can enumerate the processes that run on the platform.
Process Discovery
Metamorfo has performed process name checks and has monitored applications.
Process Discovery
Meteor can check if a specific process is running, such as Kaspersky's avp.exe.
Process Discovery
MobileOrder has a command to upload information about all running processes to its C2 server.
Process Discovery
It actors obtained a list of active processes on the victim and sent them to C2 servers.
Process Discovery
MoonWind has a command to return a list of running processes.
Process Discovery
Mosquito runs tasklist to obtain running processes.
Process Discovery
It has used malware to obtain a list of running processes on the system.
Process Discovery
It has used tasklist /v to determine active process information.
Process Discovery
NavRAT uses tasklist /v to check running processes.
Process Discovery
Nebulae can enumerate processes on a target system.
Process Discovery
NETEAGLE can send process listings over the C2 channel.
Process Discovery
NETWIRE can discover processes on compromised hosts.
Process Discovery
NightClub has the ability to use GetWindowThreadProcessId to identify the process behind a specified window.
Process Discovery
njRAT can search a list of running processes for Tr.exe.
Process Discovery
ObliqueRAT can check for blocklisted process names on a compromised host.
Process Discovery
OceanSalt can collect the name and ID for every process running on the system.
Process Discovery
It has run tasklist on a victim's machine.
Process Discovery
During Operation CuckooBees, the threat actors used the tasklist command as part of their advanced reconnaissance.
Process Discovery
During Operation Honeybee, the threat actors obtained a list of running processes on a victim machine using cmd /c tasklist > %temp%\temp.ini.
Process Discovery
During Operation Wocao, the threat actors used tasklist to collect a list of running processes on an infected system.
Process Discovery
Orz can gather a process list from the victim.
Process Discovery
OutSteel can identify running processes on a compromised host.
Process Discovery
P8RAT can check for specific processes associated with virtual environments.
Process Discovery
Pandora can monitor processes on a compromised host.
Process Discovery
Pasam creates a backdoor through which remote attackers can retrieve lists of running processes.
Process Discovery
PcShare can obtain a list of running processes on a compromised host.
Process Discovery
Pillowmint can iterate through running processes every six seconds collecting a list of processes to capture from later.
Process Discovery
PipeMon can iterate over the running processes to find a suitable injection target.
Process Discovery
PLAINTEE performs the tasklist command to list running processes.
Process Discovery
PLEAD has the ability to list processes on the compromised host.
Process Discovery
PlugX has a module to list the processes running on a machine.
Process Discovery
PoetRAT has the ability to list all running processes.
Process Discovery
POORAIM can enumerate processes.
Process Discovery
After compromising a victim, It lists all running processes.
Process Discovery
PowerDuke has a command to list the victim's processes.
Process Discovery
PowerShower has the ability to deploy a reconnaissance module to retrieve a list of the active processes.
Process Discovery
PowerSploit's Get-ProcessTokenPrivilege Privesc-PowerUp module can enumerate privileges for a given process.
Process Discovery
PowerStallion has been used to monitor process lists.
Process Discovery
POWERSTATS has used get_tasklist to discover processes on the compromised host.
Process Discovery
POWRUNER may collect process information by running tasklist on a victim.
Process Discovery
Proxysvc lists processes running on the system.
Process Discovery
Pupy can list the running processes and get the process ID and parent process’s ID.
Process Discovery
QakBot has the ability to check running processes.
Process Discovery
RainyDay can enumerate processes on a target system.
Process Discovery
Ramsay can gather a list of running processes by using Tasklist.
Process Discovery
RATANKBA lists the system’s processes.
Process Discovery
RCSession can identify processes based on PID.
Process Discovery
Remsec can obtain a process list from the victim.
Process Discovery
Rising Sun can enumerate all running processes and process information on an infected machine.
Process Discovery
It can detect a running process's PID on the infected machine.
Process Discovery
RogueRobin checks the running processes for evidence it may be running in a sandbox environment. It specifically enumerates processes for Wireshark and Sysinternals.
Process Discovery
ROKRAT can list the current running processes on the system.
Process Discovery
RotaJakiro can monitor the /proc/[PID] directory of known RotaJakiro processes as a part of its persistence when executing with non-root permissions. If the process is found dead, it resurrects the process. RotaJakiro processes can be matched to an associated Advisory Lock, in the /proc/locks folder, to ensure it doesn't spawn more than one process.
Process Discovery
Royal can use GetCurrentProcess to enumerate processes.
Process Discovery
It can obtain information about process integrity levels.
Process Discovery
Ryuk has called CreateToolhelp32Snapshot to enumerate all running processes.
Process Discovery
Saint Bot has enumerated running processes on a compromised host to determine if it is running under the process name dfrgui.exe.
Process Discovery
Sardonic has the ability to execute the tasklist command.
Process Discovery
SDBbot can enumerate a list of running processes on a compromised machine.
Process Discovery
Seasalt has a command to perform a process listing.