prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Query Registry | JPIN can enumerate Registry keys. |
Query Registry | It has obtained specific Registry keys and values on a compromised host. |
Query Registry | It malware IndiaIndia checks Registry keys within HKCU and HKLM to determine if certain applications are present, including SecureCRT, Terminal Services, RealVNC, TightVNC, UltraVNC, Radmin, mRemote, TeamViewer, FileZilla, pcAnyware, and Remote Desktop. Another It malware sample checks for the presence of the following Registry key:HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-Qt. |
Query Registry | LiteDuke can query the Registry to check for the presence of HKCU\Software\KasperskyLab. |
Query Registry | LitePower can query the Registry for keys added to execute COM hijacking. |
Query Registry | Lucifer can check for existing stratum cryptomining information in HKLM\Software\Microsoft\Windows\CurrentVersion\spreadCpuXmr – %stratum info%. |
Query Registry | Mafalda can enumerate Registry keys with all subkeys and values. |
Query Registry | Milan can query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid to retrieve the machine GUID. |
Query Registry | Mori can read data from the Registry including from HKLM\Software\NFC\IPA andHKLM\Software\NFC\. |
Query Registry | njRAT can read specific registry values. |
Query Registry | It has used reg query "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" on a victim to query the Registry. |
Query Registry | During Operation Wocao, the threat actors executed /c cd /d c:\windows\temp\ & reg query HKEY_CURRENT_USER\Software\<username>\PuTTY\Sessions\ to detect recent PuTTY sessions, likely to further lateral movement. |
Query Registry | OSInfo queries the registry to look for information about Terminal Services. |
Query Registry | PcShare can search the registry files of a compromised host. |
Query Registry | Pillowmint has used shellcode which reads code stored in the registry keys \REGISTRY\SOFTWARE\Microsoft\DRM using the native Windows API as well as read HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces as part of its C2. |
Query Registry | PlugX can enumerate and query for information contained within the Windows Registry. |
Query Registry | POWERSOURCE queries Registry keys in preparation for setting Run keys to achieve persistence. |
Query Registry | PowerSploit contains a collection of Privesc-PowerUp modules that can query Registry keys for potential opportunities. |
Query Registry | POWRUNER may query the Registry by running reg query on a victim. |
Query Registry | Proxysvc gathers product names from the Registry key: HKLM\Software\Microsoft\Windows NT\CurrentVersion ProductName and the processor description from the Registry key HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ProcessorNameString. |
Query Registry | QUADAGENT checks if a value exists within a Registry key in the HKCU hive whose name is the same as the scheduled task it has created. |
Query Registry | QUIETCANARY has the ability to retrieve information from the Registry. |
Query Registry | RATANKBA uses the command reg query "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\InternetSettings". |
Query Registry | Reaver queries the Registry to determine the correct Startup path to use for persistence. |
Query Registry | Reg may be used to gather details from the Windows Registry of a local or remote system at the command-line interface. |
Query Registry | REvil can query the Registry to get random file extensions to append to encrypted files. |
Query Registry | Rising Sun has identified the OS product name from a compromised host by searching the registry for SOFTWARE\MICROSOFT\Windows NT\ CurrentVersion | ProductName. |
Query Registry | ROKRAT can access the HKLM\System\CurrentControlSet\Services\mssmbios\Data\SMBiosData Registry key to obtain the System manufacturer value to identify the machine type. |
Query Registry | Saint Bot has used check_registry_keys as part of its environmental checks. |
Query Registry | Shamoon queries several Registry keys to identify hard disk partitions to overwrite. |
Query Registry | Shark can query HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid to retrieve the machine GUID. |
Query Registry | Sibot has queried the registry for proxy server information. |
Query Registry | SILENTTRINITY can use the GetRegValue function to check Registry keys within HKCU\Software\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated and HKLM\Software\Policies\Microsoft\Windows\Installer\AlwaysInstallElevated. It also contains additional modules that can check software AutoRun values and use the Win32 namespace to get values from HKCU, HKLM, HKCR, and HKCC hives. |
Query Registry | SodaMaster has the ability to query the Registry to detect a key specific to VMware. |
Query Registry | It malware attempts to determine the installed version of .NET by querying the Registry. |
Query Registry | StoneDrill has looked in the registry to find the default browser path. |
Query Registry | Stuxnet searches the Registry for indicators of security programs. |
Query Registry | SUNBURST collected the registry value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MachineGuid from compromised hosts. |
Query Registry | SVCReady can search for the HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System Registry key to gather system information. |
Query Registry | SynAck enumerates Registry keys associated with event logs. |
Query Registry | Taidoor can query the Registry on compromised hosts using RegQueryValueExA. |
Query Registry | TEARDROP checked that HKU\SOFTWARE\Microsoft\CTF existed before decoding its embedded payload. |
Query Registry | A It tool can read and decrypt stored Registry values. |
Query Registry | TinyIt can query the Registry for its configuration information. |
Query Registry | It surveys a system upon check-in to discover information in the Windows Registry with the reg query command. It has also retrieved PowerShell payloads hidden in Registry keys as well as checking keys associated with null session named pipes . |
Query Registry | Uroburos can query the Registry, typically HKLM:\SOFTWARE\Classes\.wav\OpenWithProgIds, to find the key and path to decrypt and load its kernel driver and kernel driver loader. |
Query Registry | Ursnif has used Reg to query the Registry for installed programs. |
Query Registry | Valak can use the Registry for code updates and to collect credentials. |
Query Registry | Volgmer checks the system for certain Registry keys. |
Query Registry | It has queried the Registry on compromised systems, reg query hklm\software\, for information on installed software. |
Query Registry | WastedLocker checks for specific registry keys related to the UCOMIEnumConnections and IActiveScriptParseProcedure32 interfaces. |
Query Registry | Waterbear can query the Registry key "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSDTC\MTxOCI" to see if the value OracleOcilib exists. |
Query Registry | WINDSHIELD can gather Registry values. |
Query Registry | Woody RAT can search registry keys to identify antivirus programs on an compromised host. |
Query Registry | Zebrocy executes the reg query command to obtain information in the Registry. |
Query Registry | Zeus Panda checks for the existence of a Registry key and if it contains certain values. |
Query Registry | ItM has used a tool to query the Registry for proxy settings. |
Query Registry | ZxShell can query the netsvc group value data located in the svchost group Registry key. |
Query Registry | ZxxZ can search the registry of a compromised host. |
Remote System Discovery | During the 2015 Ukraine Electric Power Attack, It remotely discovered systems over LAN connections. OT systems were visible from the IT network as well, giving adversaries the ability to discover operational assets. |
Remote System Discovery | During the 2016 Ukraine Electric Power Attack, It checked for connectivity to resources within the network and used LDAP to query Active Directory, discovering information about computers listed in AD. |
Remote System Discovery | AdFind has the ability to query Active Directory for computers. |
Remote System Discovery | It has a tool that can detect the existence of remote systems. |
Remote System Discovery | It has enumerated DC servers using the command net group "Domain Controllers" /domain. The group has also used the ping command. |
Remote System Discovery | It has used NBTscan and custom tools to discover remote systems. |
Remote System Discovery | Arp can be used to display a host's ARP cache, which may include address resolutions for remote systems. |
Remote System Discovery | Backdoor.Oldrea can enumerate and map ICS-specific systems in victim environments. |
Remote System Discovery | BADHATCH can use a PowerShell object such as, System.Net.NetworkInformation.Ping to ping a computer. |
Remote System Discovery | Bazar can enumerate remote systems using Net View. |
Remote System Discovery | BitPaymer can use net view to discover remote systems. |
Remote System Discovery | Black Basta can use LDAP queries to connect to AD and iterate over connected workstations. |
Remote System Discovery | BlackCat can broadcasts NetBIOS Name Service (NBNC) messages to search for servers connected to compromised networks. |
Remote System Discovery | BloodHound can enumerate and collect the properties of domain computers, including domain controllers. |
Remote System Discovery | It typically use ping and Net to enumerate systems. |
Remote System Discovery | During C0015, the threat actors used the commands net view /all /domain and ping to discover remote systems. They also used PowerView's PowerShell Invoke-ShareFinder script for file share enumeration. |
Remote System Discovery | Carbon uses the net view command. |
Remote System Discovery | It has utilized various scans and queries to find domain controllers and remote services in the target environment. |
Remote System Discovery | Cobalt Strike uses the native Windows Network Enumeration APIs to interrogate and discover targets in a Windows Active Directory network. |
Remote System Discovery | Comnie runs the net view command |
Remote System Discovery | Conti has the ability to discover hosts on a target network. |
Remote System Discovery | CrackMapExec can discover active IP addresses, along with the machine name, within a targeted network. |
Remote System Discovery | It has used ping to identify other machines of interest. |
Remote System Discovery | Diavol can use the ARP table to find remote hosts to scan. |
Remote System Discovery | It has likely obtained a list of hosts in the victim environment. |
Remote System Discovery | DRATzarus can search for other machines connected to compromised host and attempt to map the network. |
Remote System Discovery | It used the command powershell "Get-EventLog -LogName security -Newest 500 | where {$_.EventID -eq 4624} | format-list -property * | findstr "Address"" to find the network information of successfully logged-in accounts to discovery addresses of other machines. It has also used multiple scanning tools to discover other machines within the same compromised network. |
Remote System Discovery | Epic uses the net view command on the victim’s machine. |
Remote System Discovery | It has used the open source tool Essential NetTools to map the network and build a list of targets. |
Remote System Discovery | It used publicly available tools (including Microsoft's built-in SQL querying tool, osql.exe) to map the internal network and conduct reconnaissance against Active Directory, Structured Query Language (SQL) servers, and NetBIOS. |
Remote System Discovery | It has used dsquery and other Active Directory utilities to enumerate hosts; they have also used nltest.exe /dclist to retrieve a list of domain controllers. |
Remote System Discovery | Flagpro has been used to execute net view on a targeted system. |
Remote System Discovery | It has used Angry IP Scanner to detect remote systems. |
Remote System Discovery | FunnyDream can collect information about hosts on the victim network. |
Remote System Discovery | During FunnyDream, the threat actors used several tools and batch files to map victims' internal networks. |
Remote System Discovery | It used a modified version of NBTscan to identify available NetBIOS name servers over the network as well as ping to identify remote systems. |
Remote System Discovery | It has enumerated domain controllers using net group "Domain computers" and nltest /dclist. |
Remote System Discovery | HermeticWizard can find machines on the local network by gathering known local IP addresses through DNSGetCacheDataTable, GetIpNetTable,WNetOpenEnumW(RESOURCE_GLOBALNET, RESOURCETYPE_ANY),NetServerEnum,GetTcpTable, and GetAdaptersAddresses. |
Remote System Discovery | It has used net view to enumerate domain machines. |
Remote System Discovery | It has used PowerView to enumerate all Windows Server, Windows Server 2003, and Windows 7 instances in the Active Directory database. |
Remote System Discovery | Industroyer can enumerate remote computers in the compromised network. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.