value stringlengths 25 18k ⌀ | subtecnique int64 0 1 | answer stringclasses 2
values | id stringlengths 5 9 | name stringlengths 3 102 |
|---|---|---|---|---|
BADNEWS has a command to download an .exe and use process hollowing to inject it into a new process. | 1 | accept | T1055.012 | Process Injection: Process Hollowing |
Bandook has been launched by starting iexplore.exe and replacing it with Bandook's payload. | 1 | accept | T1055.012 | Process Injection: Process Hollowing |
Bazar can inject into a target process including Svchost Explorer and cmd using process hollowing. | 1 | accept | T1055.012 | Process Injection: Process Hollowing |
BBSRAT has been seen loaded into msiexec.exe through process hollowing to hide its execution. | 1 | accept | T1055.012 | Process Injection: Process Hollowing |
Cobalt Strike can use process hollowing for execution. ;; Denis performed process hollowing through the API calls CreateRemoteThread ResumeThread and Wow64SetThreadContext. ;; Dtrack has used process hollowing shellcode to target a predefined list of processes from %SYSTEM32%. ;; Duqu is capable of loading executable ... | 1 | accept | T1055.012 | Process Injection: Process Hollowing |
Epic has overwritten the function pointer in the extra window memory of Explorer's Shell_TrayWnd in order to execute malicious code in the context of the explorer.exe process. | 1 | accept | T1055.011 | Process Injection: Extra Window Memory Injection |
Power Loader overwrites Explorer’s Shell_TrayWnd extra window memory to redirect execution to a NTDLL function that is abused to assemble and execute a return-oriented programming (ROP) chain and create a malicious thread within Explorer.exe. | 1 | accept | T1055.011 | Process Injection: Extra Window Memory Injection |
North Korean actors often inject arbitrary code into legitimate processes, possibly through abusing the additional memory provided by EWM. | 1 | accept | T1055.011 | Process Injection: Extra Window Memory Injection |
The threat actor TEMP.Splinter employs the tactic of code injection via the Extra Window Memory to evade detection by security software. | 1 | accept | T1055.011 | Process Injection: Extra Window Memory Injection |
Chinese-nexus apt group APT27 often abuse EWM to inject code into a different process, escalating the privileges of their malicious code to the privileges of the hijacked process. | 1 | accept | T1055.011 | Process Injection: Extra Window Memory Injection |
Ursnif has injected code into target processes via thread local storage callbacks. | 1 | accept | T1055.005 | Process Injection: Thread Local Storage |
The MAZE ransomware can evade detection through the injection of code into different processes, achieved via injecting the code into thread local storage callbacks. | 1 | accept | T1055.005 | Process Injection: Thread Local Storage |
Diavol Ransomware can escalate it's privileges through injecting code into a process through thread local storage. | 1 | accept | T1055.005 | Process Injection: Thread Local Storage |
FIN13 often evades detection through granting their malware the ability to inject code into processes via thread local storage callbacks. | 1 | accept | T1055.005 | Process Injection: Thread Local Storage |
Bazar Ransomware escalates it's privileges via code injection through thread local storage. | 1 | accept | T1055.005 | Process Injection: Thread Local Storage |
Attor performs the injection by attaching its code into the APC queue using NtQueueApcThread API. | 1 | accept | T1055.004 | Process Injection: Asynchronous Procedure Call |
Carberp has queued an APC routine to explorer.exe by calling ZwQueueApcThread. | 1 | accept | T1055.004 | Process Injection: Asynchronous Procedure Call |
IcedID has used ZwQueueApcThread to inject itself into remote processes. | 1 | accept | T1055.004 | Process Injection: Asynchronous Procedure Call |
InvisiMole can inject its code into a trusted process via the APC queue. | 1 | accept | T1055.004 | Process Injection: Asynchronous Procedure Call |
Pillowmint has used the NtQueueApcThread syscall to inject code into svchost.exe. | 1 | accept | T1055.004 | Process Injection: Asynchronous Procedure Call |
TURNEDUP is capable of injecting code into the APC queue of a created Rundll32 process as part of an Early Bird injection." | 1 | accept | T1055.004 | Process Injection: Asynchronous Procedure Call |
Gazer performs thread execution hijacking to inject its orchestrator into a running thread from a remote process. | 1 | accept | T1055.003 | Process Injection: Thread Execution Hijacking |
Trojan.Karagany can inject a suspended thread of its own process into a new process and initiate via the ResumeThread API. | 1 | accept | T1055.003 | Process Injection: Thread Execution Hijacking |
Waterbear can use thread injection to inject shellcode into the process of security software. | 1 | accept | T1055.003 | Process Injection: Thread Execution Hijacking |
APT13 often employs the technique of thread injection hijacking to execute malicious code. | 1 | accept | T1055.003 | Process Injection: Thread Execution Hijacking |
Through injecting its own process into another process thread, malware is often able to bypass security controls. | 1 | accept | T1055.003 | Process Injection: Thread Execution Hijacking |
Carbanak downloads an executable and injects it directly into a new process. | 1 | accept | T1055.002 | Process Injection: Portable Executable Injection |
Gorgon Group malware can download a remote access tool ShiftyBug and inject into another process. | 1 | accept | T1055.002 | Process Injection: Portable Executable Injection |
GreyEnergy has a module to inject a PE binary into a remote process. | 1 | accept | T1055.002 | Process Injection: Portable Executable Injection |
InvisiMole can inject its backdoor as a portable executable into a target process. | 1 | accept | T1055.002 | Process Injection: Portable Executable Injection |
PowerSploit reflectively loads a Windows PE file into a process. | 1 | accept | T1055.002 | Process Injection: Portable Executable Injection |
Rocke's miner TermsHost.exe" evaded defenses by injecting itself into Windows processes including Notepad.exe. | 1 | accept | T1055.002 | Process Injection: Portable Executable Injection |
Zeus Panda checks processes on the system and if they meet the necessary requirements it injects into that process." | 1 | accept | T1055.002 | Process Injection: Portable Executable Injection |
Aria-body has the ability to inject itself into another process such as rundll32.exe and dllhost.exe. | 1 | accept | T1055.001 | Process Injection: Dynamic |
BlackEnergy injects its DLL component into svchost.exe. | 1 | accept | T1055.001 | Process Injection: Dynamic |
Carberp's bootkit can inject a malicious DLL into the address space of running processes. | 1 | accept | T1055.001 | Process Injection: Dynamic |
Carbon has a command to inject code into a process. | 1 | accept | T1055.001 | Process Injection: Dynamic |
Cobalt Strike has the ability to load DLLs via reflective injection. | 1 | accept | T1055.001 | Process Injection: Dynamic |
ComRAT has injected its orchestrator DLL into explorer.exe. ComRAT has also injected its communications module into the victim's default browser to make C2 connections appear less suspicious as all network connections will be initiated by the browser process. | 1 | accept | T1055.001 | Process Injection: Dynamic |
Conti has loaded an encrypted DLL into memory and then executes it. | 1 | accept | T1055.001 | Process Injection: Dynamic |
Derusbi injects itself into the secure shell (SSH) process. ;; Duqu will inject itself into different processes to evade detection. The selection of the target process is influenced by the security software that is installed on the system (Duqu will inject into different processes depending on which security suite is ... | 1 | accept | T1055.001 | Process Injection: Dynamic |
APT41 has used DGAs to change their C2 servers monthly. | 1 | accept | T1568.002 | Dynamic Resolution: Domain Generation Algorithms |
Aria-body has the ability to use a DGA for C2 communications. | 1 | accept | T1568.002 | Dynamic Resolution: Domain Generation Algorithms |
Astaroth has used a DGA in C2 communications. | 1 | accept | T1568.002 | Dynamic Resolution: Domain Generation Algorithms |
Bazar can implement DGA using the current date as a seed variable. | 1 | accept | T1568.002 | Dynamic Resolution: Domain Generation Algorithms |
BONDUPDATER uses a DGA to communicate with command and control servers. | 1 | accept | T1568.002 | Dynamic Resolution: Domain Generation Algorithms |
CCBkdr can use a DGA for Fallback Channels if communications with the primary command and control server are lost. | 1 | accept | T1568.002 | Dynamic Resolution: Domain Generation Algorithms |
CHOPSTICK can use a DGA for Fallback Channels domains are generated by concatenating words from lists. | 1 | accept | T1568.002 | Dynamic Resolution: Domain Generation Algorithms |
Doki has used the DynDNS service and a DGA based on the Dogecoin blockchain to generate C2 domains. ;; Ebury has used a DGA to generate a domain name for C2. ;; Grandoreiro can use a DGA for hiding C2 addresses including use of an algorithm with a user-specific key that changes daily. ;; MiniDuke can use DGA to genera... | 1 | accept | T1568.002 | Dynamic Resolution: Domain Generation Algorithms |
Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object. | 1 | accept | T1546.015 | Event Triggered Execution: Component Object Model Hijacking |
APT28 has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload. | 1 | accept | T1546.015 | Event Triggered Execution: Component Object Model Hijacking |
BBSRAT has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture. | 1 | accept | T1546.015 | Event Triggered Execution: Component Object Model Hijacking |
ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\Software\Classes\CLSID{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32. | 1 | accept | T1546.015 | Event Triggered Execution: Component Object Model Hijacking |
JHUHUGIT has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}). | 1 | accept | T1546.015 | Event Triggered Execution: Component Object Model Hijacking |
KONNI has modified ComSysApp service to load the malicious DLL payload. | 1 | accept | T1546.015 | Event Triggered Execution: Component Object Model Hijacking |
Mosquito uses COM hijacking as a method of persistence. | 1 | accept | T1546.015 | Event Triggered Execution: Component Object Model Hijacking |
Fysbis has installed itself as an autostart entry under ~/.config/autostart/dbus-inotifier.desktop to establish persistence. | 1 | accept | T1547.013 | Boot or Logon Autostart Execution: Xdg Autostart Entries |
NETWIRE can use XDG Autostart Entries to establish persistence. | 1 | accept | T1547.013 | Boot or Logon Autostart Execution: Xdg Autostart Entries |
Linux environments that rely upon XDG are vulnerable to malicious code execution upon startup. | 1 | accept | T1547.013 | Boot or Logon Autostart Execution: Xdg Autostart Entries |
REvil often maintain persistence through code executed upon boot, via exploitation of XDG. | 1 | accept | T1547.013 | Boot or Logon Autostart Execution: Xdg Autostart Entries |
XDG autostart can allow for privilege escalation if malicious binaries exploit it's autorun on boot capabilities. | 1 | accept | T1547.013 | Boot or Logon Autostart Execution: Xdg Autostart Entries |
Empire can leverage its implementation of Mimikatz to obtain and use golden tickets. | 1 | accept | T1558.001 | Steal or Forge Kerberos Tickets: Golden Ticket |
Ke3chang has used Mimikatz to generate Kerberos golden tickets. | 1 | accept | T1558.001 | Steal or Forge Kerberos Tickets: Golden Ticket |
Mimikatz's kerberos module can create golden tickets. | 1 | accept | T1558.001 | Steal or Forge Kerberos Tickets: Golden Ticket |
Ransomware such as DarkSide often steal KRBTGT account passwords with the intent to forge golden Kerberos keys. | 1 | accept | T1558.001 | Steal or Forge Kerberos Tickets: Golden Ticket |
APT groups can authenticate all of their activity via granting them Kerberos tickets from a stolen, golden one. | 1 | accept | T1558.001 | Steal or Forge Kerberos Tickets: Golden Ticket |
SYNful Knock is malware that is inserted into a network device by patching the operating system image. | 1 | accept | T1601.001 | Modify System Image: Patch System Image |
ESPecter can patch various windows functions to attribute to it malicious functionality. | 1 | accept | T1601.001 | Modify System Image: Patch System Image |
KEYHOLE PANDA can modify the OS to grant persistence. | 1 | accept | T1601.001 | Modify System Image: Patch System Image |
Through damaging the OS via scripts, APT groups can bypass security mechanisms and achieve persistence. | 1 | accept | T1601.001 | Modify System Image: Patch System Image |
Magecart can modify the image of it's host system to obfuscate their malicious activity. | 1 | accept | T1601.001 | Modify System Image: Patch System Image |
null | 1 | accept | T1601.002 | Modify System Image: Downgrade System Image |
Conti ransomware can downgrade vulnerable drivers to older versions, exploiting previously patched vulnerabilities. | 1 | accept | T1601.002 | Modify System Image: Downgrade System Image |
Network devices can be downgraded to previous versions through techniques implemented by APT20. | 1 | accept | T1601.002 | Modify System Image: Downgrade System Image |
DarkSide ransomware can bypass detection through installing an older version of a network device and exploiting it's now vulnerable state. | 1 | accept | T1601.002 | Modify System Image: Downgrade System Image |
ESPecter can install OS drivers of an older version, rendering them vulnerable to exploitation. | 1 | accept | T1601.002 | Modify System Image: Downgrade System Image |
Care should be taken to maintain devices as if they are unprotected, malware can install older versions to exploit. | 1 | accept | T1601.002 | Modify System Image: Downgrade System Image |
null | 1 | accept | T1059.008 | Command and Scripting Interpreter: Network Device Cli |
APT17 can abuse the CLI on network devices to execute arbitrary, malicious code. | 1 | accept | T1059.008 | Command and Scripting Interpreter: Network Device Cli |
MAZE ransomware can achieve persistence through scripts executed via a network device CLI. | 1 | accept | T1059.008 | Command and Scripting Interpreter: Network Device Cli |
APT14 can acquire permissions of an administrator on many network devices and abuse the privileges that come with that permission when executing their own scripts. | 1 | accept | T1059.008 | Command and Scripting Interpreter: Network Device Cli |
Network devices should be secured as their CLI can access data that can be exploited by APT groups. | 1 | accept | T1059.008 | Command and Scripting Interpreter: Network Device Cli |
Malware can escalate privileges through abusing network device CLI administrator credentials. | 1 | accept | T1059.008 | Command and Scripting Interpreter: Network Device Cli |
null | 1 | accept | T1542.005 | Pre |
Malware can abuse netbooting to achieve persistence. | 1 | accept | T1542.005 | Pre |
Pre OS boot operations may be hijacked by ransomware such as BazarLoader to obfuscate persistence mechanisms. | 1 | accept | T1542.005 | Pre |
Some variant CobaltStrike modules can abuse netbooting operations to execute malicious code. | 1 | accept | T1542.005 | Pre |
Ransomware, once installed, can abuse pre OS boot operations to mask their presence on a system. | 1 | accept | T1542.005 | Pre |
APT groups will abuse insecure netbooting functionality to grant their malware persistence. | 1 | accept | T1542.005 | Pre |
null | 1 | accept | T1020.001 | Automated Exfiltration: Traffic Duplication |
Maze can mirror traffic to obfuscate data exfiltration. | 1 | accept | T1020.001 | Automated Exfiltration: Traffic Duplication |
Threat actor PROMETHIUM can hide their data exfiltration through abusing functionality of some network analysis tools to duplicate network traffic. | 1 | accept | T1020.001 | Automated Exfiltration: Traffic Duplication |
CyberGate RAT masks it's C2 communication within mirrored traffic. | 1 | accept | T1020.001 | Automated Exfiltration: Traffic Duplication |
RedLine Stealer will exfiltrate data hidden within legitimate traffic. | 1 | accept | T1020.001 | Automated Exfiltration: Traffic Duplication |
The TEMP.Isotope campaign featured many instances of malware mirroring legitimate traffic to obfuscate malicious activity. | 1 | accept | T1020.001 | Automated Exfiltration: Traffic Duplication |
DarkSide ransomware will obfuscate it's activity via code injected into ROMMON. | 1 | accept | T1542.004 | Pre |
Malware can load firmware with malicious code into ROMMON to obfuscate activity. | 1 | accept | T1542.004 | Pre |
Specific CobaltStrike modules can achieve persistence via code injection into ROMMON. | 1 | accept | T1542.004 | Pre |
Malware with ROMMONkits can maintain persistence or obfuscate malicious activity. | 1 | accept | T1542.004 | Pre |
APT24 abuses ROM monitoring functionality to obfuscate their activity. | 1 | accept | T1542.004 | Pre |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.