value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
BADNEWS has a command to download an .exe and use process hollowing to inject it into a new process.
1
accept
T1055.012
Process Injection: Process Hollowing
Bandook has been launched by starting iexplore.exe and replacing it with Bandook's payload.
1
accept
T1055.012
Process Injection: Process Hollowing
Bazar can inject into a target process including Svchost Explorer and cmd using process hollowing.
1
accept
T1055.012
Process Injection: Process Hollowing
BBSRAT has been seen loaded into msiexec.exe through process hollowing to hide its execution.
1
accept
T1055.012
Process Injection: Process Hollowing
Cobalt Strike can use process hollowing for execution. ;; Denis performed process hollowing through the API calls CreateRemoteThread ResumeThread and Wow64SetThreadContext. ;; Dtrack has used process hollowing shellcode to target a predefined list of processes from %SYSTEM32%. ;; Duqu is capable of loading executable ...
1
accept
T1055.012
Process Injection: Process Hollowing
Epic has overwritten the function pointer in the extra window memory of Explorer's Shell_TrayWnd in order to execute malicious code in the context of the explorer.exe process.
1
accept
T1055.011
Process Injection: Extra Window Memory Injection
Power Loader overwrites Explorer’s Shell_TrayWnd extra window memory to redirect execution to a NTDLL function that is abused to assemble and execute a return-oriented programming (ROP) chain and create a malicious thread within Explorer.exe.
1
accept
T1055.011
Process Injection: Extra Window Memory Injection
North Korean actors often inject arbitrary code into legitimate processes, possibly through abusing the additional memory provided by EWM.
1
accept
T1055.011
Process Injection: Extra Window Memory Injection
The threat actor TEMP.Splinter employs the tactic of code injection via the Extra Window Memory to evade detection by security software.
1
accept
T1055.011
Process Injection: Extra Window Memory Injection
Chinese-nexus apt group APT27 often abuse EWM to inject code into a different process, escalating the privileges of their malicious code to the privileges of the hijacked process.
1
accept
T1055.011
Process Injection: Extra Window Memory Injection
Ursnif has injected code into target processes via thread local storage callbacks.
1
accept
T1055.005
Process Injection: Thread Local Storage
The MAZE ransomware can evade detection through the injection of code into different processes, achieved via injecting the code into thread local storage callbacks.
1
accept
T1055.005
Process Injection: Thread Local Storage
Diavol Ransomware can escalate it's privileges through injecting code into a process through thread local storage.
1
accept
T1055.005
Process Injection: Thread Local Storage
FIN13 often evades detection through granting their malware the ability to inject code into processes via thread local storage callbacks.
1
accept
T1055.005
Process Injection: Thread Local Storage
Bazar Ransomware escalates it's privileges via code injection through thread local storage.
1
accept
T1055.005
Process Injection: Thread Local Storage
Attor performs the injection by attaching its code into the APC queue using NtQueueApcThread API.
1
accept
T1055.004
Process Injection: Asynchronous Procedure Call
Carberp has queued an APC routine to explorer.exe by calling ZwQueueApcThread.
1
accept
T1055.004
Process Injection: Asynchronous Procedure Call
IcedID has used ZwQueueApcThread to inject itself into remote processes.
1
accept
T1055.004
Process Injection: Asynchronous Procedure Call
InvisiMole can inject its code into a trusted process via the APC queue.
1
accept
T1055.004
Process Injection: Asynchronous Procedure Call
Pillowmint has used the NtQueueApcThread syscall to inject code into svchost.exe.
1
accept
T1055.004
Process Injection: Asynchronous Procedure Call
TURNEDUP is capable of injecting code into the APC queue of a created Rundll32 process as part of an Early Bird injection."
1
accept
T1055.004
Process Injection: Asynchronous Procedure Call
Gazer performs thread execution hijacking to inject its orchestrator into a running thread from a remote process.
1
accept
T1055.003
Process Injection: Thread Execution Hijacking
Trojan.Karagany can inject a suspended thread of its own process into a new process and initiate via the ResumeThread API.
1
accept
T1055.003
Process Injection: Thread Execution Hijacking
Waterbear can use thread injection to inject shellcode into the process of security software.
1
accept
T1055.003
Process Injection: Thread Execution Hijacking
APT13 often employs the technique of thread injection hijacking to execute malicious code.
1
accept
T1055.003
Process Injection: Thread Execution Hijacking
Through injecting its own process into another process thread, malware is often able to bypass security controls.
1
accept
T1055.003
Process Injection: Thread Execution Hijacking
Carbanak downloads an executable and injects it directly into a new process.
1
accept
T1055.002
Process Injection: Portable Executable Injection
Gorgon Group malware can download a remote access tool ShiftyBug and inject into another process.
1
accept
T1055.002
Process Injection: Portable Executable Injection
GreyEnergy has a module to inject a PE binary into a remote process.
1
accept
T1055.002
Process Injection: Portable Executable Injection
InvisiMole can inject its backdoor as a portable executable into a target process.
1
accept
T1055.002
Process Injection: Portable Executable Injection
PowerSploit reflectively loads a Windows PE file into a process.
1
accept
T1055.002
Process Injection: Portable Executable Injection
Rocke's miner TermsHost.exe" evaded defenses by injecting itself into Windows processes including Notepad.exe.
1
accept
T1055.002
Process Injection: Portable Executable Injection
Zeus Panda checks processes on the system and if they meet the necessary requirements it injects into that process."
1
accept
T1055.002
Process Injection: Portable Executable Injection
Aria-body has the ability to inject itself into another process such as rundll32.exe and dllhost.exe.
1
accept
T1055.001
Process Injection: Dynamic
BlackEnergy injects its DLL component into svchost.exe.
1
accept
T1055.001
Process Injection: Dynamic
Carberp's bootkit can inject a malicious DLL into the address space of running processes.
1
accept
T1055.001
Process Injection: Dynamic
Carbon has a command to inject code into a process.
1
accept
T1055.001
Process Injection: Dynamic
Cobalt Strike has the ability to load DLLs via reflective injection.
1
accept
T1055.001
Process Injection: Dynamic
ComRAT has injected its orchestrator DLL into explorer.exe. ComRAT has also injected its communications module into the victim's default browser to make C2 connections appear less suspicious as all network connections will be initiated by the browser process.
1
accept
T1055.001
Process Injection: Dynamic
Conti has loaded an encrypted DLL into memory and then executes it.
1
accept
T1055.001
Process Injection: Dynamic
Derusbi injects itself into the secure shell (SSH) process. ;; Duqu will inject itself into different processes to evade detection. The selection of the target process is influenced by the security software that is installed on the system (Duqu will inject into different processes depending on which security suite is ...
1
accept
T1055.001
Process Injection: Dynamic
APT41 has used DGAs to change their C2 servers monthly.
1
accept
T1568.002
Dynamic Resolution: Domain Generation Algorithms
Aria-body has the ability to use a DGA for C2 communications.
1
accept
T1568.002
Dynamic Resolution: Domain Generation Algorithms
Astaroth has used a DGA in C2 communications.
1
accept
T1568.002
Dynamic Resolution: Domain Generation Algorithms
Bazar can implement DGA using the current date as a seed variable.
1
accept
T1568.002
Dynamic Resolution: Domain Generation Algorithms
BONDUPDATER uses a DGA to communicate with command and control servers.
1
accept
T1568.002
Dynamic Resolution: Domain Generation Algorithms
CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost.
1
accept
T1568.002
Dynamic Resolution: Domain Generation Algorithms
CHOPSTICK can use a DGA for Fallback Channels domains are generated by concatenating words from lists.
1
accept
T1568.002
Dynamic Resolution: Domain Generation Algorithms
Doki has used the DynDNS service and a DGA based on the Dogecoin blockchain to generate C2 domains. ;; Ebury has used a DGA to generate a domain name for C2. ;; Grandoreiro can use a DGA for hiding C2 addresses including use of an algorithm with a user-specific key that changes daily. ;; MiniDuke can use DGA to genera...
1
accept
T1568.002
Dynamic Resolution: Domain Generation Algorithms
Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object.
1
accept
T1546.015
Event Triggered Execution: Component Object Model Hijacking
APT28 has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload.
1
accept
T1546.015
Event Triggered Execution: Component Object Model Hijacking
BBSRAT has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture.
1
accept
T1546.015
Event Triggered Execution: Component Object Model Hijacking
ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\Software\Classes\CLSID{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32.
1
accept
T1546.015
Event Triggered Execution: Component Object Model Hijacking
JHUHUGIT has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}).
1
accept
T1546.015
Event Triggered Execution: Component Object Model Hijacking
KONNI has modified ComSysApp service to load the malicious DLL payload.
1
accept
T1546.015
Event Triggered Execution: Component Object Model Hijacking
Mosquito uses COM hijacking as a method of persistence.
1
accept
T1546.015
Event Triggered Execution: Component Object Model Hijacking
Fysbis has installed itself as an autostart entry under ~/.config/autostart/dbus-inotifier.desktop to establish persistence.
1
accept
T1547.013
Boot or Logon Autostart Execution: Xdg Autostart Entries
NETWIRE can use XDG Autostart Entries to establish persistence.
1
accept
T1547.013
Boot or Logon Autostart Execution: Xdg Autostart Entries
Linux environments that rely upon XDG are vulnerable to malicious code execution upon startup.
1
accept
T1547.013
Boot or Logon Autostart Execution: Xdg Autostart Entries
REvil often maintain persistence through code executed upon boot, via exploitation of XDG.
1
accept
T1547.013
Boot or Logon Autostart Execution: Xdg Autostart Entries
XDG autostart can allow for privilege escalation if malicious binaries exploit it's autorun on boot capabilities.
1
accept
T1547.013
Boot or Logon Autostart Execution: Xdg Autostart Entries
Empire can leverage its implementation of Mimikatz to obtain and use golden tickets.
1
accept
T1558.001
Steal or Forge Kerberos Tickets: Golden Ticket
Ke3chang has used Mimikatz to generate Kerberos golden tickets.
1
accept
T1558.001
Steal or Forge Kerberos Tickets: Golden Ticket
Mimikatz's kerberos module can create golden tickets.
1
accept
T1558.001
Steal or Forge Kerberos Tickets: Golden Ticket
Ransomware such as DarkSide often steal KRBTGT account passwords with the intent to forge golden Kerberos keys.
1
accept
T1558.001
Steal or Forge Kerberos Tickets: Golden Ticket
APT groups can authenticate all of their activity via granting them Kerberos tickets from a stolen, golden one.
1
accept
T1558.001
Steal or Forge Kerberos Tickets: Golden Ticket
SYNful Knock is malware that is inserted into a network device by patching the operating system image.
1
accept
T1601.001
Modify System Image: Patch System Image
ESPecter can patch various windows functions to attribute to it malicious functionality.
1
accept
T1601.001
Modify System Image: Patch System Image
KEYHOLE PANDA can modify the OS to grant persistence.
1
accept
T1601.001
Modify System Image: Patch System Image
Through damaging the OS via scripts, APT groups can bypass security mechanisms and achieve persistence.
1
accept
T1601.001
Modify System Image: Patch System Image
Magecart can modify the image of it's host system to obfuscate their malicious activity.
1
accept
T1601.001
Modify System Image: Patch System Image
null
1
accept
T1601.002
Modify System Image: Downgrade System Image
Conti ransomware can downgrade vulnerable drivers to older versions, exploiting previously patched vulnerabilities.
1
accept
T1601.002
Modify System Image: Downgrade System Image
Network devices can be downgraded to previous versions through techniques implemented by APT20.
1
accept
T1601.002
Modify System Image: Downgrade System Image
DarkSide ransomware can bypass detection through installing an older version of a network device and exploiting it's now vulnerable state.
1
accept
T1601.002
Modify System Image: Downgrade System Image
ESPecter can install OS drivers of an older version, rendering them vulnerable to exploitation.
1
accept
T1601.002
Modify System Image: Downgrade System Image
Care should be taken to maintain devices as if they are unprotected, malware can install older versions to exploit.
1
accept
T1601.002
Modify System Image: Downgrade System Image
null
1
accept
T1059.008
Command and Scripting Interpreter: Network Device Cli
APT17 can abuse the CLI on network devices to execute arbitrary, malicious code.
1
accept
T1059.008
Command and Scripting Interpreter: Network Device Cli
MAZE ransomware can achieve persistence through scripts executed via a network device CLI.
1
accept
T1059.008
Command and Scripting Interpreter: Network Device Cli
APT14 can acquire permissions of an administrator on many network devices and abuse the privileges that come with that permission when executing their own scripts.
1
accept
T1059.008
Command and Scripting Interpreter: Network Device Cli
Network devices should be secured as their CLI can access data that can be exploited by APT groups.
1
accept
T1059.008
Command and Scripting Interpreter: Network Device Cli
Malware can escalate privileges through abusing network device CLI administrator credentials.
1
accept
T1059.008
Command and Scripting Interpreter: Network Device Cli
null
1
accept
T1542.005
Pre
Malware can abuse netbooting to achieve persistence.
1
accept
T1542.005
Pre
Pre OS boot operations may be hijacked by ransomware such as BazarLoader to obfuscate persistence mechanisms.
1
accept
T1542.005
Pre
Some variant CobaltStrike modules can abuse netbooting operations to execute malicious code.
1
accept
T1542.005
Pre
Ransomware, once installed, can abuse pre OS boot operations to mask their presence on a system.
1
accept
T1542.005
Pre
APT groups will abuse insecure netbooting functionality to grant their malware persistence.
1
accept
T1542.005
Pre
null
1
accept
T1020.001
Automated Exfiltration: Traffic Duplication
Maze can mirror traffic to obfuscate data exfiltration.
1
accept
T1020.001
Automated Exfiltration: Traffic Duplication
Threat actor PROMETHIUM can hide their data exfiltration through abusing functionality of some network analysis tools to duplicate network traffic.
1
accept
T1020.001
Automated Exfiltration: Traffic Duplication
CyberGate RAT masks it's C2 communication within mirrored traffic.
1
accept
T1020.001
Automated Exfiltration: Traffic Duplication
RedLine Stealer will exfiltrate data hidden within legitimate traffic.
1
accept
T1020.001
Automated Exfiltration: Traffic Duplication
The TEMP.Isotope campaign featured many instances of malware mirroring legitimate traffic to obfuscate malicious activity.
1
accept
T1020.001
Automated Exfiltration: Traffic Duplication
DarkSide ransomware will obfuscate it's activity via code injected into ROMMON.
1
accept
T1542.004
Pre
Malware can load firmware with malicious code into ROMMON to obfuscate activity.
1
accept
T1542.004
Pre
Specific CobaltStrike modules can achieve persistence via code injection into ROMMON.
1
accept
T1542.004
Pre
Malware with ROMMONkits can maintain persistence or obfuscate malicious activity.
1
accept
T1542.004
Pre
APT24 abuses ROM monitoring functionality to obfuscate their activity.
1
accept
T1542.004
Pre