value
stringlengths
25
18k
subtecnique
int64
0
1
answer
stringclasses
2 values
id
stringlengths
5
9
name
stringlengths
3
102
GALLIUM used dumped hashes to authenticate to other machines via pass the hash. ;; HOPLIGHT has been observed loading several APIs associated with Pass the Hash. ;; Kimsuky has used pass the hash for authentication to remote access software used in C2. ;; Mimikatz's SEKURLSA::Pth module can impersonate a user with only a password hash to execute arbitrary commands. ;; Night Dragon used pass-the-hash tools to gain usernames and passwords. ;; Pass-The-Hash Toolkit can perform pass the hash. ;; PoshC2 has a number of modules that leverage pass the hash for lateral movement.
1
accept
T1550.002
Use Alternate Authentication Material: Pass The Hash
Threat actors may try to collect cloud log data and subsequently disable the logs to hide their activity.
1
accept
T1562.008
Impair Defenses: Disable Cloud Logs
Malware or actors may disable cloud logs in Amazon Web Services (AWS) with commands like ‘StopLogging’ and ‘DeleteTrail’.
1
accept
T1562.008
Impair Defenses: Disable Cloud Logs
Disabling logs in cloud environments can allow actors or malware to conceal their malicious activity.
1
accept
T1562.008
Impair Defenses: Disable Cloud Logs
In efforts to conceal their actions, adversaries may disable cloud logs in GCP while deploying other apps or containers.
1
accept
T1562.008
Impair Defenses: Disable Cloud Logs
Adversaries may disable event logging in Kubernetes to hide their deployment applications or containers on a target environment.
1
accept
T1562.008
Impair Defenses: Disable Cloud Logs
Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files.
1
accept
T1546.004
Event Triggered Execution: Unix Shell Configuration Modification
Some malware will maintain persistence via rc.local and .bashrc files.
1
accept
T1546.004
Event Triggered Execution: Unix Shell Configuration Modification
On Linux and Unix systems, malware may try to maintain persistence by using bash scripts.
1
accept
T1546.004
Event Triggered Execution: Unix Shell Configuration Modification
Login environments, such as .bash or ZSH, can be used by malware to create events that are launched on every boot or login.
1
accept
T1546.004
Event Triggered Execution: Unix Shell Configuration Modification
Using shell commands contained in files, actors can instruct infected hosts to launch specific events at pre-determined times.
1
accept
T1546.004
Event Triggered Execution: Unix Shell Configuration Modification
Many actors and malware will use login environments to force an infected machine to execute scripts at any specified time.
1
accept
T1546.004
Event Triggered Execution: Unix Shell Configuration Modification
Adversaries may attempt to modify cloud firewall settings to allow connections for further downloads or uploads.
1
accept
T1562.007
Impair Defenses: Disable Or Modify Cloud Firewall
Some actors and malware will disable cloud firewall settings for short periods of time to allow connections, and then restore restrictions to avoid detection.
1
accept
T1562.007
Impair Defenses: Disable Or Modify Cloud Firewall
Malware that manipulates cloud firewall settings can allow threat actors to steal data and resources.
1
accept
T1562.007
Impair Defenses: Disable Or Modify Cloud Firewall
If actors get control of a cloud firewall, they will be able to change settings to allow further malicious activity.
1
accept
T1562.007
Impair Defenses: Disable Or Modify Cloud Firewall
Modifying or disabling a cloud firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed.
1
accept
T1562.007
Impair Defenses: Disable Or Modify Cloud Firewall
Reverting cloud infrastructure instances allows malware and actors to conduct malicious activities, and then revert to a clean state to hide their actions.
1
accept
T1578.004
Modify Cloud Compute Infrastructure: Revert Cloud Instance
Actors can hide their malicious activity while in cloud instances by restoring the virtual machine to a previous state.
1
accept
T1578.004
Modify Cloud Compute Infrastructure: Revert Cloud Instance
Restoring a virtual machine to its original state after malicious activity has been completed is a good technique to conceal malicious activity.
1
accept
T1578.004
Modify Cloud Compute Infrastructure: Revert Cloud Instance
Adversaries may restore cloud environments to previous snapshots once cybercriminal activity has been completed.
1
accept
T1578.004
Modify Cloud Compute Infrastructure: Revert Cloud Instance
Actors and malware can take advantage of ephemeral storage types because they often restart/reset once the VM is stopped or rebooted.
1
accept
T1578.004
Modify Cloud Compute Infrastructure: Revert Cloud Instance
Threat actors may delete a cloud instance or virtual machine to hide their malicious activity.
1
accept
T1578.003
Modify Cloud Compute Infrastructure: Delete Cloud Instance
CloudTrail logs, in Amazon Web Services (AWS), can capture cloud instance deletion in the ‘TerminateInstaces’ event.
1
accept
T1578.003
Modify Cloud Compute Infrastructure: Delete Cloud Instance
Within Google’s Admin Activity audit logs, the Cloud Audit logs can detect when instances or virtual machines (VMs) are deleted via the gcloud ‘compute instances delete’ command.
1
accept
T1578.003
Modify Cloud Compute Infrastructure: Delete Cloud Instance
In Kubernetes, malware or threat actors may attempt to remove finalizers (finalizer key) prior to deleting a cloud instance.
1
accept
T1578.003
Modify Cloud Compute Infrastructure: Delete Cloud Instance
Deleting evidence of malicious operations, such as manipulating or removing cloud instances or VMs, may be done by actors or malware to conceal their operations.
1
accept
T1578.003
Modify Cloud Compute Infrastructure: Delete Cloud Instance
Malware may attempt to modify existing cloud infrastructure by creating new snapshots to steal resources or data.
1
accept
T1578.001
Modify Cloud Compute Infrastructure: Create Snapshot
Cybercriminals may create snapshots on cloud systems and grant only themselves access to it establish or maintain persistence.
1
accept
T1578.001
Modify Cloud Compute Infrastructure: Create Snapshot
Creating a snapshot with firewall-restricted access in a cloud instance can give adversaries concealed access and persistence on a target system.
1
accept
T1578.001
Modify Cloud Compute Infrastructure: Create Snapshot
Actors may create a snapshot on a virtual hard drive or volume from which to maintain access onto a target’s system.
1
accept
T1578.001
Modify Cloud Compute Infrastructure: Create Snapshot
Actors can create snapshots on cloud systems to launch attacks from.
1
accept
T1578.001
Modify Cloud Compute Infrastructure: Create Snapshot
On Google Admin Activity audit logs, actors can use the command ‘gcloud compute instances create’ to create a new cloud instance.
1
accept
T1578.002
Modify Cloud Compute Infrastructure: Create Cloud Instance
Adversaries may a new virtual machine to launch attacks from and evade defenses.
1
accept
T1578.002
Modify Cloud Compute Infrastructure: Create Cloud Instance
Threat actors can create a new cloud instance to bypass firewall rules and permissions that may exist in an account.
1
accept
T1578.002
Modify Cloud Compute Infrastructure: Create Cloud Instance
Cybercriminals can utilize cloud systems by creating new instances that are hidden from view and do not affect the targets operations.
1
accept
T1578.002
Modify Cloud Compute Infrastructure: Create Cloud Instance
Actors may setup their own infrastructure in a target network by creating cloud instances with custom security settings to avoid detection.
1
accept
T1578.002
Modify Cloud Compute Infrastructure: Create Cloud Instance
APT29 staged data and files in password-protected archives on a victim's OWA server.
1
accept
T1074.002
Data Staged: Remote Data Staging
Chimera has staged stolen data on designated servers in the target environment.
1
accept
T1074.002
Data Staged: Remote Data Staging
FIN6 actors have compressed data from remote systems and moved it to another staging system before exfiltration.
1
accept
T1074.002
Data Staged: Remote Data Staging
FIN8 aggregates staged data from a network into a single location.
1
accept
T1074.002
Data Staged: Remote Data Staging
menuPass has staged data on remote MSP systems or other victim networks prior to exfiltration.
1
accept
T1074.002
Data Staged: Remote Data Staging
Night Dragon has copied files to company web servers and subsequently downloaded them.
1
accept
T1074.002
Data Staged: Remote Data Staging
Threat Group-3390 has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration.
1
accept
T1074.002
Data Staged: Remote Data Staging
UNC2452 staged data and files in password-protected archives on a victim's OWA server.
1
accept
T1074.002
Data Staged: Remote Data Staging
Sandworm Team defaced approximately 15 000 websites belonging to Georgian government non-government and private sector organizations in 2019.
1
accept
T1491.002
Defacement: External Defacement
Threat actors who want to make a socioeconomical point or deliver a message may deface well-known websites to ensure their point is seen.
1
accept
T1491.002
Defacement: External Defacement
Some websites are defaced by hacktivists or malware in attempts to gather support from other adversaries to accomplish an objective.
1
accept
T1491.002
Defacement: External Defacement
Cybercriminals of lower sophisticated are typically the ones that deface websites, however, advanced groups such as Sandworm Team have defaced thousands of websites.
1
accept
T1491.002
Defacement: External Defacement
Some state-sponsored groups may use website defacement as a diversionary tactic to distract from their true objectives.
1
accept
T1491.002
Defacement: External Defacement
Website defacements may be used to setup future attacks as an initial access point.
1
accept
T1491.002
Defacement: External Defacement
APT29 has added credentials to OAuth Applications and Service Principals.
1
accept
T1098.001
Account Manipulation: Additional Cloud Credentials
UNC2452 added credentials to OAuth Applications and Service Principals.
1
accept
T1098.001
Account Manipulation: Additional Cloud Credentials
Threat actors may add their own credentials into a created or compromised cloud service account to setup legitimate services on a system under their control.
1
accept
T1098.001
Account Manipulation: Additional Cloud Credentials
Some malware and actors will gain illicit access to an account that inside a cloud environment, such as AWS, GCP, or Kubernetes, and credentials for own accounts.
1
accept
T1098.001
Account Manipulation: Additional Cloud Credentials
If an actor can breach cloud accounts with the correct privileges, there are numerous ways the adversary could add their own credentials into a target system.
1
accept
T1098.001
Account Manipulation: Additional Cloud Credentials
PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.
1
accept
T1547.014
Boot or Logon Autostart Execution: Active Setup
Cybercriminals may manipulate Active Setup by adding a registry key so that the malicious key will be executed when a user logs in.
1
accept
T1547.014
Boot or Logon Autostart Execution: Active Setup
Threat actors can maintain persistence on a machine by adding a registry to the Active Setup on Windows operating systems.
1
accept
T1547.014
Boot or Logon Autostart Execution: Active Setup
An actor can add registry keys to Windows Active Setup to execute programs from a user’s account every time he/she/them logs in.
1
accept
T1547.014
Boot or Logon Autostart Execution: Active Setup
Malware may attempt to use Active Setup components on Windows systems to execute specific actions upon every login.
1
accept
T1547.014
Boot or Logon Autostart Execution: Active Setup
Active Setup components can be utilized by adversaries to force breached or compromised accounts to conduct malicious activity while disguised as a legitimate user.
1
accept
T1547.014
Boot or Logon Autostart Execution: Active Setup
Empire can use built-in modules to abuse trusted utilities like MSBuild.exe.
1
accept
T1127.001
Trusted Developer Utilities Proxy Execution: Msbuild
Frankenstein has used MSbuild to execute an actor-created file.
1
accept
T1127.001
Trusted Developer Utilities Proxy Execution: Msbuild
A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe presumably to bypass application control techniques.
1
accept
T1127.001
Trusted Developer Utilities Proxy Execution: Msbuild
Adversaries may use MSBuild to proxy execution of code through a trusted Windows utility.
1
accept
T1127.001
Trusted Developer Utilities Proxy Execution: Msbuild
Legitimate software, such as Windows’ Microsoft Build Engine (MSBuild.exe), can be abused by threat actors to execute malware under the guise of a trusted utility.
1
accept
T1127.001
Trusted Developer Utilities Proxy Execution: Msbuild
Malware or actors can bypass security features by using MSBuild to execute files that will be allowed by security controls because it is a trusted program.
1
accept
T1127.001
Trusted Developer Utilities Proxy Execution: Msbuild
Adversaries may tamper with SIP and trust provider components to mislead the operating system and application control tools when conducting signature validation checks.
1
accept
T1553.003
Subvert Trust Controls: Sip And Trust Provider Hijacking
Subject Interface Packages (SIPs) can be manipulated by threat actors to trick operating systems into executing code that could otherwise blocked by security features.
1
accept
T1553.003
Subvert Trust Controls: Sip And Trust Provider Hijacking
Cybercriminals or malware may try to change trust controls that only allow code execution from software with valid digital certificates to conduct malicious activity.
1
accept
T1553.003
Subvert Trust Controls: Sip And Trust Provider Hijacking
Actors may try to subvert operating system (OS) trust controls to hide from security solutions when executing malware.
1
accept
T1553.003
Subvert Trust Controls: Sip And Trust Provider Hijacking
Threat actors or groups are known to try to hijack OS trust provider architecture to allow execution of code that does not have a valid digital certificate.
1
accept
T1553.003
Subvert Trust Controls: Sip And Trust Provider Hijacking
Egregor can modify the GPO to evade detection.
1
accept
T1484.001
Domain Policy Modification: Group Policy Modification
Empire can use New-GPOImmediateTask to modify a GPO that will install and execute a malicious Scheduled Task/Job.
1
accept
T1484.001
Domain Policy Modification: Group Policy Modification
Indrik Spider has used Group Policy Objects to deploy batch scripts.
1
accept
T1484.001
Domain Policy Modification: Group Policy Modification
Adversaries may modify group policy objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on the domain.
1
accept
T1484.001
Domain Policy Modification: Group Policy Modification
Threat actors can use GPOs (virtual collection of policy settings) to force infect machines to connect to command and control (C2) IPs, domains, or servers for further malicious activity.
1
accept
T1484.001
Domain Policy Modification: Group Policy Modification
Policy settings for groups on Windows operating systems (OSs) can be used to created scheduled tasks for persistence, download payloads, modify settings, and steal data.
1
accept
T1484.001
Domain Policy Modification: Group Policy Modification
Group policy objects can be modified by cybercriminals to disable tools, elevate privileges, establish persistence, and execute code, among numerous other malicious activities.
1
accept
T1484.001
Domain Policy Modification: Group Policy Modification
Malicious GPO modifications can be used to implement many other malicious behaviors such as Scheduled Task/Job, Disable or Modify Tools, Ingress Tool Transfer, Create Account, Service Execution, and more.
1
accept
T1484.001
Domain Policy Modification: Group Policy Modification
Empire can add a SID-History to a user if on a domain controller.
1
accept
T1134.005
Access Token Manipulation: Sid
Mimikatz's MISC::AddSid module can appended any SID or user/group account to a user's SID-History. Mimikatz also utilizes SID-History Injection to expand the scope of other components such as generated Kerberos Golden Tickets and DCSync beyond a single domain.
1
accept
T1134.005
Access Token Manipulation: Sid
Adversaries may use SID-History Injection to escalate privileges and bypass access controls.
1
accept
T1134.005
Access Token Manipulation: Sid
Cybercriminals can manipulate the Windows security identifier (SID) to gather user account history and identifiers to impersonate other users or groups to conduct malicious activity.
1
accept
T1134.005
Access Token Manipulation: Sid
User account and group information stored in Sid-history can be stolen by threat actors to masquerade as legitimate users while launching attacks.
1
accept
T1134.005
Access Token Manipulation: Sid
Bazar can inject into a target process using process doppelgänging.
1
accept
T1055.013
Process Injection: Process Doppelgänging
Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems.
1
accept
T1055.013
Process Injection: Process Doppelgänging
SynAck abuses NTFS transactions to launch and conceal malicious processes.
1
accept
T1055.013
Process Injection: Process Doppelgänging
Adversaries may inject malicious code into process via process doppelgänging to evade process-based defenses as well as possibly elevate privileges.
1
accept
T1055.013
Process Injection: Process Doppelgänging
Process doppelgänging is a method of executing arbitrary code in the address space of a separate live process.
1
accept
T1055.013
Process Injection: Process Doppelgänging
Cobalt Strike can spawn processes with alternate PPIDs.
1
accept
T1134.004
Access Token Manipulation: Parent Pid Spoofing
PipeMon can use parent PID spoofing to elevate privileges.
1
accept
T1134.004
Access Token Manipulation: Parent Pid Spoofing
Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to elevate privileges.
1
accept
T1134.004
Access Token Manipulation: Parent Pid Spoofing
Cybercriminals can create fake PPIDs for their malicious activity to elevate privileges or evade security defenses.
1
accept
T1134.004
Access Token Manipulation: Parent Pid Spoofing
Parent process identifiers can be spoofed by actors or malware to allow and conceal execution of malicious processes.
1
accept
T1134.004
Access Token Manipulation: Parent Pid Spoofing
InvisiMole can disconnect previously connected remote drives.
1
accept
T1070.005
Indicator Removal on Host: Network Share Connection Removal
The net use \system\share /delete command can be used in Net to remove an established connection to a network share.
1
accept
T1070.005
Indicator Removal on Host: Network Share Connection Removal
RobbinHood disconnects all network shares from the computer with the command net use * /DELETE /Y.
1
accept
T1070.005
Indicator Removal on Host: Network Share Connection Removal
Threat Group-3390 has detached network shares after exfiltrating files likely to evade detection.
1
accept
T1070.005
Indicator Removal on Host: Network Share Connection Removal