prompt
stringclasses
508 values
procedure
stringlengths
20
478
Query Registry
JPIN can enumerate Registry keys.
Query Registry
It has obtained specific Registry keys and values on a compromised host.
Query Registry
It malware IndiaIndia checks Registry keys within HKCU and HKLM to determine if certain applications are present, including SecureCRT, Terminal Services, RealVNC, TightVNC, UltraVNC, Radmin, mRemote, TeamViewer, FileZilla, pcAnyware, and Remote Desktop. Another It malware sample checks for the presence of the following Registry key:HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt.
Query Registry
LiteDuke can query the Registry to check for the presence of HKCU\Software\KasperskyLab.
Query Registry
LitePower can query the Registry for keys added to execute COM hijacking.
Query Registry
Lucifer can check for existing stratum cryptomining information in HKLM\Software\Microsoft\Windows\CurrentVersion\spreadCpuXmr – %stratum info%.
Query Registry
Mafalda can enumerate Registry keys with all subkeys and values.
Query Registry
Milan can query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid to retrieve the machine GUID.
Query Registry
Mori can read data from the Registry including from HKLM\Software\NFC\IPA andHKLM\Software\NFC\.
Query Registry
njRAT can read specific registry values.
Query Registry
It has used reg query "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" on a victim to query the Registry.
Query Registry
During Operation Wocao, the threat actors executed /c cd /d c:\windows\temp\ & reg query HKEY_CURRENT_USER\Software\<username>\PuTTY\Sessions\ to detect recent PuTTY sessions, likely to further lateral movement.
Query Registry
OSInfo queries the registry to look for information about Terminal Services.
Query Registry
PcShare can search the registry files of a compromised host.
Query Registry
Pillowmint has used shellcode which reads code stored in the registry keys \REGISTRY\SOFTWARE\Microsoft\DRM using the native Windows API as well as read HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces as part of its C2.
Query Registry
PlugX can enumerate and query for information contained within the Windows Registry.
Query Registry
POWERSOURCE queries Registry keys in preparation for setting Run keys to achieve persistence.
Query Registry
PowerSploit contains a collection of Privesc-PowerUp modules that can query Registry keys for potential opportunities.
Query Registry
POWRUNER may query the Registry by running reg query on a victim.
Query Registry
Proxysvc gathers product names from the Registry key: HKLM\Software\Microsoft\Windows NT\CurrentVersion ProductName and the processor description from the Registry key HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessorNameString.
Query Registry
QUADAGENT checks if a value exists within a Registry key in the HKCU hive whose name is the same as the scheduled task it has created.
Query Registry
QUIETCANARY has the ability to retrieve information from the Registry.
Query Registry
RATANKBA uses the command reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\InternetSettings".
Query Registry
Reaver queries the Registry to determine the correct Startup path to use for persistence.
Query Registry
Reg may be used to gather details from the Windows Registry of a local or remote system at the command-line interface.
Query Registry
REvil can query the Registry to get random file extensions to append to encrypted files.
Query Registry
Rising Sun has identified the OS product name from a compromised host by searching the registry for SOFTWARE\MICROSOFT\Windows NT\ CurrentVersion | ProductName.
Query Registry
ROKRAT can access the HKLM\System\CurrentControlSet\Services\mssmbios\Data\SMBiosData Registry key to obtain the System manufacturer value to identify the machine type.
Query Registry
Saint Bot has used check_registry_keys as part of its environmental checks.
Query Registry
Shamoon queries several Registry keys to identify hard disk partitions to overwrite.
Query Registry
Shark can query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid to retrieve the machine GUID.
Query Registry
Sibot has queried the registry for proxy server information.
Query Registry
SILENTTRINITY can use the GetRegValue function to check Registry keys within HKCU\Software\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated and HKLM\Software\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated. It also contains additional modules that can check software AutoRun values and use the Win32 namespace to get values from HKCU, HKLM, HKCR, and HKCC hives.
Query Registry
SodaMaster has the ability to query the Registry to detect a key specific to VMware.
Query Registry
It malware attempts to determine the installed version of .NET by querying the Registry.
Query Registry
StoneDrill has looked in the registry to find the default browser path.
Query Registry
Stuxnet searches the Registry for indicators of security programs.
Query Registry
SUNBURST collected the registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid from compromised hosts.
Query Registry
SVCReady can search for the HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System Registry key to gather system information.
Query Registry
SynAck enumerates Registry keys associated with event logs.
Query Registry
Taidoor can query the Registry on compromised hosts using RegQueryValueExA.
Query Registry
TEARDROP checked that HKU\SOFTWARE\Microsoft\CTF existed before decoding its embedded payload.
Query Registry
A It tool can read and decrypt stored Registry values.
Query Registry
TinyIt can query the Registry for its configuration information.
Query Registry
It surveys a system upon check-in to discover information in the Windows Registry with the reg query command. It has also retrieved PowerShell payloads hidden in Registry keys as well as checking keys associated with null session named pipes .
Query Registry
Uroburos can query the Registry, typically HKLM:\SOFTWARE\Classes\.wav\OpenWithProgIds, to find the key and path to decrypt and load its kernel driver and kernel driver loader.
Query Registry
Ursnif has used Reg to query the Registry for installed programs.
Query Registry
Valak can use the Registry for code updates and to collect credentials.
Query Registry
Volgmer checks the system for certain Registry keys.
Query Registry
It has queried the Registry on compromised systems, reg query hklm\software\, for information on installed software.
Query Registry
WastedLocker checks for specific registry keys related to the UCOMIEnumConnections and IActiveScriptParseProcedure32 interfaces.
Query Registry
Waterbear can query the Registry key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\MTxOCI" to see if the value OracleOcilib exists.
Query Registry
WINDSHIELD can gather Registry values.
Query Registry
Woody RAT can search registry keys to identify antivirus programs on an compromised host.
Query Registry
Zebrocy executes the reg query command to obtain information in the Registry.
Query Registry
Zeus Panda checks for the existence of a Registry key and if it contains certain values.
Query Registry
ItM has used a tool to query the Registry for proxy settings.
Query Registry
ZxShell can query the netsvc group value data located in the svchost group Registry key.
Query Registry
ZxxZ can search the registry of a compromised host.
Remote System Discovery
During the 2015 Ukraine Electric Power Attack, It remotely discovered systems over LAN connections. OT systems were visible from the IT network as well, giving adversaries the ability to discover operational assets.
Remote System Discovery
During the 2016 Ukraine Electric Power Attack, It checked for connectivity to resources within the network and used LDAP to query Active Directory, discovering information about computers listed in AD.
Remote System Discovery
AdFind has the ability to query Active Directory for computers.
Remote System Discovery
It has a tool that can detect the existence of remote systems.
Remote System Discovery
It has enumerated DC servers using the command net group "Domain Controllers" /domain. The group has also used the ping command.
Remote System Discovery
It has used NBTscan and custom tools to discover remote systems.
Remote System Discovery
Arp can be used to display a host's ARP cache, which may include address resolutions for remote systems.
Remote System Discovery
Backdoor.Oldrea can enumerate and map ICS-specific systems in victim environments.
Remote System Discovery
BADHATCH can use a PowerShell object such as, System.Net.NetworkInformation.Ping to ping a computer.
Remote System Discovery
Bazar can enumerate remote systems using Net View.
Remote System Discovery
BitPaymer can use net view to discover remote systems.
Remote System Discovery
Black Basta can use LDAP queries to connect to AD and iterate over connected workstations.
Remote System Discovery
BlackCat can broadcasts NetBIOS Name Service (NBNC) messages to search for servers connected to compromised networks.
Remote System Discovery
BloodHound can enumerate and collect the properties of domain computers, including domain controllers.
Remote System Discovery
It typically use ping and Net to enumerate systems.
Remote System Discovery
During C0015, the threat actors used the commands net view /all /domain and ping to discover remote systems. They also used PowerView's PowerShell Invoke-ShareFinder script for file share enumeration.
Remote System Discovery
Carbon uses the net view command.
Remote System Discovery
It has utilized various scans and queries to find domain controllers and remote services in the target environment.
Remote System Discovery
Cobalt Strike uses the native Windows Network Enumeration APIs to interrogate and discover targets in a Windows Active Directory network.
Remote System Discovery
Comnie runs the net view command
Remote System Discovery
Conti has the ability to discover hosts on a target network.
Remote System Discovery
CrackMapExec can discover active IP addresses, along with the machine name, within a targeted network.
Remote System Discovery
It has used ping to identify other machines of interest.
Remote System Discovery
Diavol can use the ARP table to find remote hosts to scan.
Remote System Discovery
It has likely obtained a list of hosts in the victim environment.
Remote System Discovery
DRATzarus can search for other machines connected to compromised host and attempt to map the network.
Remote System Discovery
It used the command powershell "Get-EventLog -LogName security -Newest 500 | where {$_.EventID -eq 4624} | format-list -property * | findstr "Address"" to find the network information of successfully logged-in accounts to discovery addresses of other machines. It has also used multiple scanning tools to discover other machines within the same compromised network.
Remote System Discovery
Epic uses the net view command on the victim’s machine.
Remote System Discovery
It has used the open source tool Essential NetTools to map the network and build a list of targets.
Remote System Discovery
It used publicly available tools (including Microsoft's built-in SQL querying tool, osql.exe) to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language (SQL) servers, and NetBIOS.
Remote System Discovery
It has used dsquery and other Active Directory utilities to enumerate hosts; they have also used nltest.exe /dclist to retrieve a list of domain controllers.
Remote System Discovery
Flagpro has been used to execute net view on a targeted system.
Remote System Discovery
It has used Angry IP Scanner to detect remote systems.
Remote System Discovery
FunnyDream can collect information about hosts on the victim network.
Remote System Discovery
During FunnyDream, the threat actors used several tools and batch files to map victims' internal networks.
Remote System Discovery
It used a modified version of NBTscan to identify available NetBIOS name servers over the network as well as ping to identify remote systems.
Remote System Discovery
It has enumerated domain controllers using net group "Domain computers" and nltest /dclist.
Remote System Discovery
HermeticWizard can find machines on the local network by gathering known local IP addresses through DNSGetCacheDataTable, GetIpNetTable,WNetOpenEnumW(RESOURCE_GLOBALNET, RESOURCETYPE_ANY),NetServerEnum,GetTcpTable, and GetAdaptersAddresses.
Remote System Discovery
It has used net view to enumerate domain machines.
Remote System Discovery
It has used PowerView to enumerate all Windows Server, Windows Server 2003, and Windows 7 instances in the Active Directory database.
Remote System Discovery
Industroyer can enumerate remote computers in the compromised network.