prompt
stringclasses
508 values
procedure
stringlengths
20
478
Process Discovery
ShadowPad has collected the PID of a malicious process.
Process Discovery
ShimRatReporter listed all running processes on the machine.
Process Discovery
SHOTPUT has a command to obtain a process listing.
Process Discovery
It has used tools to identify running processes on the victim's machine.
Process Discovery
SILENTTRINITY can enumerate processes, including properties to determine if they have the Common Language Runtime (CLR) loaded.
Process Discovery
Skidmap has monitored critical processes to ensure resiliency.
Process Discovery
SLOTHFULMEDIA has enumerated processes by ID, name, or privileges.
Process Discovery
Socksbot can list all running processes.
Process Discovery
SodaMaster can search a list of running processes.
Process Discovery
During the SolarWinds Compromise, It used multiple command-line utilities to enumerate running processes.
Process Discovery
SombRAT can use the getprocesslist command to enumerate processes on a compromised host.
Process Discovery
SoreFang can enumerate processes on a victim machine through use of Tasklist.
Process Discovery
It malware gathers a list of running processes.
Process Discovery
StreamEx has the ability to enumerate processes.
Process Discovery
StrongPity can determine if a user is logged in by checking to see if explorer.exe is running.
Process Discovery
SUNBURST collected a list of process names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.
Process Discovery
SUNSPOT monitored running processes for instances of MsBuild.exe by hashing the name of each running process and comparing it to the corresponding value 0x53D525. It also extracted command-line arguments and individual arguments from the running MsBuild.exe process to identify the directory path of the Orion software Visual Studio solution.
Process Discovery
SVCReady can collect a list of running processes from an infected host.
Process Discovery
Sykipot may gather a list of running processes by running tasklist /v.
Process Discovery
SynAck enumerates all running processes.
Process Discovery
SYSCON has the ability to use Tasklist to list running processes.
Process Discovery
SysUpdate can collect information about running processes.
Process Discovery
Taidoor can use GetCurrentProcessId for process discovery.
Process Discovery
TAINTEDSCRIBE can execute ProcessList for process discovery.
Process Discovery
TajMahal has the ability to identify running processes and associated plugins on an infected host.
Process Discovery
Tasklist can be used to discover processes running on a system.
Process Discovery
It has searched for rival malware and removes it if found. It has also searched for running processes containing the strings aliyun or liyun to identify machines running Alibaba Cloud Security tools.
Process Discovery
ThiefQuest obtains a list of running processes using the function kill_unwanted.
Process Discovery
TrickBot uses module networkDll for process list discovery.
Process Discovery
Trojan.Karagany can use Tasklist to collect a list of running tasks.
Process Discovery
It is capable of enumerating the running processes on the system using pslist.
Process Discovery
TSCookie has the ability to list processes on the infected host.
Process Discovery
It surveys a system upon check-in to discover running processes using the tasklist /v command. It RPC backdoors have also enumerated processes associated with specific open ports or named pipes.
Process Discovery
UBoatRAT can list running processes on the system.
Process Discovery
Uroburos can use its Process List command to enumerate processes on compromised hosts.
Process Discovery
Ursnif has gathered information about running processes.
Process Discovery
USBferry can use tasklist to gather information about the process running on the infected system.
Process Discovery
Valak has the ability to enumerate running processes on a compromised host.
Process Discovery
VERMIN can get a list of the processes and running tasks on the system.
Process Discovery
Volgmer can gather a list of processes.
Process Discovery
It has enumerated running processes on targeted systems.
Process Discovery
WarzoneRAT can obtain a list of processes on a compromised host.
Process Discovery
Waterbear can identify the process for a specific security product.
Process Discovery
It has used malware to enumerate active processes.
Process Discovery
WINERACK can enumerate processes.
Process Discovery
WinMM sets a WH_CBT Windows hook to collect information on process creation.
Process Discovery
Winnti for Windows can check if the explorer.exe process is responsible for calling its install function.
Process Discovery
It looked for a specific process running on infected servers.
Process Discovery
Woody RAT can call NtQuerySystemProcessInformation with SystemProcessInformation to enumerate all running processes, including associated information such as PID, parent PID, image name, and owner.
Process Discovery
XAgentOSX contains the getProcessList function to run ps aux to get running processes.
Process Discovery
yty gets an output of running processes using the tasklist command.
Process Discovery
Zebrocy uses the tasklist and wmic process get Capture, ExecutablePath commands to gather the processes running on the system.
Process Discovery
Zeus Panda checks for running processes on the victim’s machine.
Process Discovery
Zox has the ability to list processes.
Process Discovery
ZxShell has a command, ps, to obtain a listing of processes on the system.
Process Discovery
ZxxZ has created a snapshot of running processes using CreateToolhelp32Snapshot.
Query Registry
ADVSTORESHELL can enumerate registry keys.
Query Registry
It's backdoor can query the Windows Registry to gather system information.
Query Registry
It has used various strains of malware to query the Registry.
Query Registry
Attor has opened the registry and performed query searches.
Query Registry
Azorult can check for installed software on the system under the Registry key Software\Microsoft\Windows\CurrentVersion\Uninstall.
Query Registry
BabyShark has executed the reg query command for HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default.
Query Registry
BACKSPACE is capable of enumerating and making modifications to an infected system's Registry.
Query Registry
Bankshot searches for certain Registry keys to be configured before executing the payload.
Query Registry
Bazar can query Windows\CurrentVersion\Uninstall for installed applications.
Query Registry
BendyBear can query the host's Registry key at HKEY_CURRENT_USER\Console\QuickEdit to retrieve data.
Query Registry
Bisonal has used the RegQueryValueExA function to retrieve proxy information in the Registry.
Query Registry
BitPaymer can use the RegEnumKeyW to iterate through Registry keys.
Query Registry
Brave Prince gathers information about the Registry.
Query Registry
Bumblebee can check the Registry for specific keys.
Query Registry
It checks the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings for proxy configurations information.
Query Registry
Carberp has searched the Image File Execution Options registry key for "Debugger" within every subkey.
Query Registry
Carbon enumerates values in the Registry.
Query Registry
Cardinal RAT contains watchdog functionality that periodically ensures HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load is set to point to its executable.
Query Registry
CharmPower has the ability to enumerate Uninstall registry values.
Query Registry
It has queried Registry keys using reg query \\HKU\\SOFTWARE\Microsoft\Terminal Server Client\Servers and reg query \\HKU\\Software\Microsoft\Windows\CurrentVersion\Internet Settings.
Query Registry
CHOPSTICK provides access to the Windows Registry, which can be used to gather information.
Query Registry
Clambling has the ability to enumerate Registry keys, including KEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt\strDataDir to search for a bitcoin wallet.
Query Registry
Cobalt Strike can query HKEY_CURRENT_USER\Software\Microsoft\Office\\Excel\Security\AccessVBOM\ to determine if the security setting for restricting default programmatic access is enabled.
Query Registry
ComRAT can check the default browser by querying HKCR\http\shell\open\command.
Query Registry
Crimson can check the Registry for the presence of HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\last_edate to determine how long it has been installed on a host.
Query Registry
DarkWatchman can query the Registry to determine if it has already been installed on the system.
Query Registry
Denis queries the Registry for keys and values.
Query Registry
Derusbi is capable of enumerating Registry keys and values.
Query Registry
DownPaper searches and reads the value of the Windows Update Registry Run key.
Query Registry
It has queried the Registry to identify victim information.
Query Registry
Dtrack can collect the RegisteredOwner, RegisteredOrganization, and InstallDate registry values.
Query Registry
Epic uses the rem reg query command to obtain values from Registry keys.
Query Registry
FatDuke can get user agent strings for the default browser from HKCU\Software\Classes\http\shell\open\command.
Query Registry
FELIXROOT queries the Registry for specific keys for potential privilege escalation and proxy information. FELIXROOT has also used WMI to query the Windows Registry.
Query Registry
FinFisher queries Registry values as part of its anti-sandbox checks.
Query Registry
It has accessed Registry hives ntuser.dat and UserClass.dat.
Query Registry
FunnyDream can check Software\Microsoft\Windows\CurrentVersion\Internet Settings to extract the ProxyServer string.
Query Registry
Gelsemium can open random files and Registry keys to obscure malware behavior from sandbox analysis.
Query Registry
gh0st RAT has checked for the existence of a Service key to determine if it has already been installed on the system.
Query Registry
Gold Dragon enumerates registry keys with the command regkeyenum and obtains information for the Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.
Query Registry
A variant of HOPLIGHT hooks lsass.exe, and lsass.exe then checks the Registry for the data value 'rdpproto' under the key SYSTEM\CurrentControlSet\Control\Lsa Name.
Query Registry
Hydraq creates a backdoor through which remote attackers can retrieve system information, such as CPU speed, from Registry keys.
Query Registry
Industroyer has a data wiper component that enumerates keys in the Registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services.
Query Registry
InvisiMole can enumerate Registry values, keys, and data.