id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
|---|---|---|---|
t1036.005
|
masquerading
|
legitimateTechnique location
|
pony has used the adobe reader icon for the downloaded file to look more trustworthy.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
poseidon group tools attempt to spoof anti-virus processes as a means of self-defense.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
promethium has disguised malicious installer files by bundling them with legitimate software installers.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
punchbuggy mimics filenames from systemsystem32 to hide dlls in windir andor temp.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
pysa has executed a malicious executable by naming it svchost.exe.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
quadagent used the powershell filenames office365dcomcheck.ps1 and systemdiskclean.ps1.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
raindrop was installed under names that resembled legitimate windows file and directory names.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
ramsay has masqueraded as a 7zip installer.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
rdat has masqueraded as vmware.exe.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
the remsec loader implements itself with the name security support provider a legitimate windows function. various remsec .exe files mimic legitimate file names used by microsoft symantec kaspersky hewlett-packard and vmware. remsec also disguised malicious modules using similar filenames as custom network encryption software on victims.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
revil can mimic the names of known executables.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
rocke has used shell scripts which download mining executables and saves them with the filename java.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
ryuk has constructed legitimate appearing installation folder paths by calling getwindowsdirectoryw and then inserting a null byte at the fourth character of the path. for windows vista or higher the path would appear as c:userspublic.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
s-type may save itself as a file named msdtc.exe which is also the name of the legitimate microsoft distributed transaction coordinator service binary.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
sandworm team has avoided detection by naming a malicious binary explorer.exe.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
shimratreporter spoofed itself as alphazawgyl_font.exe a specialized unicode font.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
sibot has downloaded a dll to the c:windowssystem32drivers folder and renamed it with a .sys extension.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
sidewinder has named malicious files rekeywiz.exe to match the name of a legitimate windows executable.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
silence has named its backdoor winword.exe.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
skidmap has created a fake rm binary to replace the legitimate linux binary.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
slothful media has mimicked the names of known executables such as mediaplayer.exe.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
sowbug named its tools to masquerade as windows or adobe reader software such as by using the file name adobecms.exe and the directory csidl_appdatamicrosoftsecurity.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
to establish persistence sslmm identifies the start menu startup directory and drops a link to its own executable disguised as an œoffice start œyahoo talk œmsn gaming z0ne or œmsn talk shortcut.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
starloader has masqueraded as legitimate software update packages such as adobe acrobat reader and intel.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
strongpity has been bundled with legitimate software installation files for disguise.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
sunburst created vbscripts that were named after existing services or folders to blend into legitimate activities.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
sunspot was identified on disk with a filename of taskhostsvc.exe and it created an encrypted log file at c:windowstempvmware-vmdmp.log.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
supernova has masqueraded as a legitimate solarwinds dll.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
the taintedscribe main executable has disguised itself as microsofts narrator.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
teardrop files had names that resembled legitimate window file and directory names.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
temp.veles has renamed files to look like legitimate files such as windows update files or schneider electric application files.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
thiefquest prepends a copy of itself to the beginning of an executable file while maintaining the name of the executable.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
tropic trooper has hidden payloads in flash directories and fake installer files.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
unc 2452 renamed a version of adfind to sqlceip.exe or csrss.exe in an attempt to appear as the sql server telemetry client or client service runtime process respectively.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
ursnif has used strings from legitimate system files and existing folders for its file folder and registry entry names.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
usbstealer mimics a legitimate russian program called usb disk security.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
whitefly has named the malicious dll the same name as dlls belonging to legitimate software from various security vendors.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
a winnti for windows implant file was named aspnet_filter.dll mimicking the legitimate asp.net isapi filter dll with the same name.
|
t1036.005
|
masquerading
|
legitimateTechnique location
|
zlib mimics the resource version information of legitimate realtek semiconductor nvidia or synaptics modules.
|
t1037
|
boot or logon initialization scripts
| null |
adversaries may use scripts automatically executed at boot or logon initialization to establish persistence
|
t1037
|
boot or logon initialization scripts
| null |
initialization scripts can be used to perform administrative functions which may often execute other programs or send information to an internal logging server
|
t1037
|
boot or logon initialization scripts
| null |
look for files added or modified by unusual accounts outside of normal administration duties
|
t1037
|
boot or logon initialization scripts
| null |
monitor logon scripts for unusual access by abnormal users or at abnormal times
|
t1037
|
boot or logon initialization scripts
| null |
monitor running process for actions that could be indicative of abnormal programs or executables running upon logon
|
t1037
|
boot or logon initialization scripts
| null |
windows registry windows registry key creation process process creation command command execution active directory active directory object modification file file creation file file modification
|
t1037.004
|
boot or logon initialization scripts
|
rcTechniquescripts
|
hidden wasp installs reboot persistence by adding itself to etc rc.local.
|
t1037.004
|
boot or logon initialization scripts
|
rcTechniquescripts
|
ikitten adds an entry to the rc.common file for persistence.
|
t1037.004
|
boot or logon initialization scripts
|
rcTechniquescripts
|
install persistence through rc.d services: rc.d etc rc.d'init.dlinux_kill.
|
t1037.004
|
boot or logon initialization scripts
|
rcTechniquescripts
|
backwards compatibility on ubuntu allowed attackers to achieve persistence via rc scripts.
|
t1037.004
|
boot or logon initialization scripts
|
rcTechniquescripts
|
as the malware tries to achieve persistence, hatching triage analysis reports suspicious behavior: œmodifies rc script.
|
t1039
|
data from network shared drive
| null |
adversaries may search network shares on computers they have compromised to find files of interest
|
t1039
|
data from network shared drive
| null |
data may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059
|
t1039
|
data from network shared drive
| null |
file file access network share network share access command command execution
|
t1039
|
data from network shared drive
| null |
monitor processes and command line arguments for actions that could be taken to collect files from a network share
|
t1039
|
data from network shared drive
| null |
remote access tools with built in features may interact directly with the windows api to gather data
|
t1039
|
data from network shared drive
| null |
sensitive data can be collected from remote systems via shared network drives host shared directory network file server etc
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
4h rat has the capability to create a remote shell.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
abk has the ability to use cmd to run a portable executable pe on the compromised host.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
adbupd can run a copy of cmd.exe.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
following exploitation with lowball malware admin@338 actors created a file containing a list of commands to be executed on the compromised computer.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
advstoreshell can create a remote shell and run a given command.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
anchor has used cmd.exe to run its self deletion routine.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
apt1 has used the windows command shell to execute commands and batch scripting to automate execution.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
apt18 uses cmd.exe to execute commands on the victims machine.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
an apt28 loader trojan uses a cmd.exe and batch script to run its payload. the group has also used macros to execute payloads.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
apt29 used cmd.exe to execute commands on remote machines.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
an apt3 downloader uses the windows command cmd.exe c whoami. the group also uses a tool to execute commands on remote computers.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
apt32 has used cmd.exe for execution.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
apt37 has used the command-line interface.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
apt38 has used a command-line tunneler nachocheese to give them shell access to a victims machine.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
apt41 used cmd.exe c to execute commands on remote machines.apt41 used a batch file to install persistence for the cobalt strike beacon loader.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
astaroth spawns a cmd process to execute commands.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
auditcred can open a reverse shell on the system to execute commands.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
babyshark has used cmd.exe to execute commands.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
backconfig can download and run batch files to execute commands on a compromised host.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
adversaries can direct backspace to execute from the command line on infected hosts or have backspace create a reverse shell.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
badnews is capable of executing commands via cmd.exe.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
bandook is capable of spawning a windows command shell.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
bankshot uses the command-line interface to execute arbitrary commands.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
bazar can launch cmd.exe to perform reconnaissance commands.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
bbk has the ability to use cmd to run a portable executable pe on the compromised host.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
biscuit has a command to launch a command shell on the system.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
bisonal can launch cmd.exe to execute commands on the system.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
blackcoffee has the capability to create a reverse shell.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
blackmould can run cmd.exe with parameters.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
blindingcan has executed commands via cmd.exe.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
blue mockingbird has used batch script files to automate execution and deployment of payloads.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
bondupdater can read batch commands in a file sent from its c2 server and execute them with cmd.exe.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
bronze butler has used batch scripts and the command-line interface for execution.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
calendar has a command to run cmd.exe to execute commands.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
carbanak has a command to create a reverse shell.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
cardinal rat can execute commands.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
carrotbat has the ability to execute command line arguments on a compromised host.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
caterpillar webshell can run commands on the compromised asset with cmd functions.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
chimera has used the windows command shell and batch scripts for execution on compromised hosts.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
china chopper's server component is capable of opening a command terminal.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
cmd is used to execute programs and other actions at the command-line interface.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
cobalt group has used a javascript backdoor that is capable of launching cmd.exe to execute shell commands. the group has used an exploit toolkit known as threadkit that launches .bat files.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
cobalt strike uses a command-line interface to interact with systems.
|
t1059.003
|
command and scripting interpreter
|
windows Technique command Technique shell
|
cobian rat can launch a remote command shell interface for executing commands.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.