prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Process Discovery | ShadowPad has collected the PID of a malicious process. |
Process Discovery | ShimRatReporter listed all running processes on the machine. |
Process Discovery | SHOTPUT has a command to obtain a process listing. |
Process Discovery | It has used tools to identify running processes on the victim's machine. |
Process Discovery | SILENTTRINITY can enumerate processes, including properties to determine if they have the Common Language Runtime (CLR) loaded. |
Process Discovery | Skidmap has monitored critical processes to ensure resiliency. |
Process Discovery | SLOTHFULMEDIA has enumerated processes by ID, name, or privileges. |
Process Discovery | Socksbot can list all running processes. |
Process Discovery | SodaMaster can search a list of running processes. |
Process Discovery | During the SolarWinds Compromise, It used multiple command-line utilities to enumerate running processes. |
Process Discovery | SombRAT can use the getprocesslist command to enumerate processes on a compromised host. |
Process Discovery | SoreFang can enumerate processes on a victim machine through use of Tasklist. |
Process Discovery | It malware gathers a list of running processes. |
Process Discovery | StreamEx has the ability to enumerate processes. |
Process Discovery | StrongPity can determine if a user is logged in by checking to see if explorer.exe is running. |
Process Discovery | SUNBURST collected a list of process names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists. |
Process Discovery | SUNSPOT monitored running processes for instances of MsBuild.exe by hashing the name of each running process and comparing it to the corresponding value 0x53D525. It also extracted command-line arguments and individual arguments from the running MsBuild.exe process to identify the directory path of the Orion software Visual Studio solution. |
Process Discovery | SVCReady can collect a list of running processes from an infected host. |
Process Discovery | Sykipot may gather a list of running processes by running tasklist /v. |
Process Discovery | SynAck enumerates all running processes. |
Process Discovery | SYSCON has the ability to use Tasklist to list running processes. |
Process Discovery | SysUpdate can collect information about running processes. |
Process Discovery | Taidoor can use GetCurrentProcessId for process discovery. |
Process Discovery | TAINTEDSCRIBE can execute ProcessList for process discovery. |
Process Discovery | TajMahal has the ability to identify running processes and associated plugins on an infected host. |
Process Discovery | Tasklist can be used to discover processes running on a system. |
Process Discovery | It has searched for rival malware and removes it if found. It has also searched for running processes containing the strings aliyun or liyun to identify machines running Alibaba Cloud Security tools. |
Process Discovery | ThiefQuest obtains a list of running processes using the function kill_unwanted. |
Process Discovery | TrickBot uses module networkDll for process list discovery. |
Process Discovery | Trojan.Karagany can use Tasklist to collect a list of running tasks. |
Process Discovery | It is capable of enumerating the running processes on the system using pslist. |
Process Discovery | TSCookie has the ability to list processes on the infected host. |
Process Discovery | It surveys a system upon check-in to discover running processes using the tasklist /v command. It RPC backdoors have also enumerated processes associated with specific open ports or named pipes. |
Process Discovery | UBoatRAT can list running processes on the system. |
Process Discovery | Uroburos can use its Process List command to enumerate processes on compromised hosts. |
Process Discovery | Ursnif has gathered information about running processes. |
Process Discovery | USBferry can use tasklist to gather information about the process running on the infected system. |
Process Discovery | Valak has the ability to enumerate running processes on a compromised host. |
Process Discovery | VERMIN can get a list of the processes and running tasks on the system. |
Process Discovery | Volgmer can gather a list of processes. |
Process Discovery | It has enumerated running processes on targeted systems. |
Process Discovery | WarzoneRAT can obtain a list of processes on a compromised host. |
Process Discovery | Waterbear can identify the process for a specific security product. |
Process Discovery | It has used malware to enumerate active processes. |
Process Discovery | WINERACK can enumerate processes. |
Process Discovery | WinMM sets a WH_CBT Windows hook to collect information on process creation. |
Process Discovery | Winnti for Windows can check if the explorer.exe process is responsible for calling its install function. |
Process Discovery | It looked for a specific process running on infected servers. |
Process Discovery | Woody RAT can call NtQuerySystemProcessInformation with SystemProcessInformation to enumerate all running processes, including associated information such as PID, parent PID, image name, and owner. |
Process Discovery | XAgentOSX contains the getProcessList function to run ps aux to get running processes. |
Process Discovery | yty gets an output of running processes using the tasklist command. |
Process Discovery | Zebrocy uses the tasklist and wmic process get Capture, ExecutablePath commands to gather the processes running on the system. |
Process Discovery | Zeus Panda checks for running processes on the victim’s machine. |
Process Discovery | Zox has the ability to list processes. |
Process Discovery | ZxShell has a command, ps, to obtain a listing of processes on the system. |
Process Discovery | ZxxZ has created a snapshot of running processes using CreateToolhelp32Snapshot. |
Query Registry | ADVSTORESHELL can enumerate registry keys. |
Query Registry | It's backdoor can query the Windows Registry to gather system information. |
Query Registry | It has used various strains of malware to query the Registry. |
Query Registry | Attor has opened the registry and performed query searches. |
Query Registry | Azorult can check for installed software on the system under the Registry key Software\Microsoft\Windows\CurrentVersion\Uninstall. |
Query Registry | BabyShark has executed the reg query command for HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default. |
Query Registry | BACKSPACE is capable of enumerating and making modifications to an infected system's Registry. |
Query Registry | Bankshot searches for certain Registry keys to be configured before executing the payload. |
Query Registry | Bazar can query Windows\CurrentVersion\Uninstall for installed applications. |
Query Registry | BendyBear can query the host's Registry key at HKEY_CURRENT_USER\Console\QuickEdit to retrieve data. |
Query Registry | Bisonal has used the RegQueryValueExA function to retrieve proxy information in the Registry. |
Query Registry | BitPaymer can use the RegEnumKeyW to iterate through Registry keys. |
Query Registry | Brave Prince gathers information about the Registry. |
Query Registry | Bumblebee can check the Registry for specific keys. |
Query Registry | It checks the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings for proxy configurations information. |
Query Registry | Carberp has searched the Image File Execution Options registry key for "Debugger" within every subkey. |
Query Registry | Carbon enumerates values in the Registry. |
Query Registry | Cardinal RAT contains watchdog functionality that periodically ensures HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load is set to point to its executable. |
Query Registry | CharmPower has the ability to enumerate Uninstall registry values. |
Query Registry | It has queried Registry keys using reg query \\HKU\\SOFTWARE\Microsoft\Terminal Server Client\Servers and reg query \\HKU\\Software\Microsoft\Windows\CurrentVersion\Internet Settings. |
Query Registry | CHOPSTICK provides access to the Windows Registry, which can be used to gather information. |
Query Registry | Clambling has the ability to enumerate Registry keys, including KEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt\strDataDir to search for a bitcoin wallet. |
Query Registry | Cobalt Strike can query HKEY_CURRENT_USER\Software\Microsoft\Office\\Excel\Security\AccessVBOM\ to determine if the security setting for restricting default programmatic access is enabled. |
Query Registry | ComRAT can check the default browser by querying HKCR\http\shell\open\command. |
Query Registry | Crimson can check the Registry for the presence of HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\last_edate to determine how long it has been installed on a host. |
Query Registry | DarkWatchman can query the Registry to determine if it has already been installed on the system. |
Query Registry | Denis queries the Registry for keys and values. |
Query Registry | Derusbi is capable of enumerating Registry keys and values. |
Query Registry | DownPaper searches and reads the value of the Windows Update Registry Run key. |
Query Registry | It has queried the Registry to identify victim information. |
Query Registry | Dtrack can collect the RegisteredOwner, RegisteredOrganization, and InstallDate registry values. |
Query Registry | Epic uses the rem reg query command to obtain values from Registry keys. |
Query Registry | FatDuke can get user agent strings for the default browser from HKCU\Software\Classes\http\shell\open\command. |
Query Registry | FELIXROOT queries the Registry for specific keys for potential privilege escalation and proxy information. FELIXROOT has also used WMI to query the Windows Registry. |
Query Registry | FinFisher queries Registry values as part of its anti-sandbox checks. |
Query Registry | It has accessed Registry hives ntuser.dat and UserClass.dat. |
Query Registry | FunnyDream can check Software\Microsoft\Windows\CurrentVersion\Internet Settings to extract the ProxyServer string. |
Query Registry | Gelsemium can open random files and Registry keys to obscure malware behavior from sandbox analysis. |
Query Registry | gh0st RAT has checked for the existence of a Service key to determine if it has already been installed on the system. |
Query Registry | Gold Dragon enumerates registry keys with the command regkeyenum and obtains information for the Registry key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. |
Query Registry | A variant of HOPLIGHT hooks lsass.exe, and lsass.exe then checks the Registry for the data value 'rdpproto' under the key SYSTEM\CurrentControlSet\Control\Lsa Name. |
Query Registry | Hydraq creates a backdoor through which remote attackers can retrieve system information, such as CPU speed, from Registry keys. |
Query Registry | Industroyer has a data wiper component that enumerates keys in the Registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services. |
Query Registry | InvisiMole can enumerate Registry values, keys, and data. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.