value
stringlengths 25
18k
⌀ | subtecnique
int64 0
1
| answer
stringclasses 2
values | id
stringlengths 5
9
| name
stringlengths 3
102
|
|---|---|---|---|---|
GALLIUM used dumped hashes to authenticate to other machines via pass the hash. ;; HOPLIGHT has been observed loading several APIs associated with Pass the Hash. ;; Kimsuky has used pass the hash for authentication to remote access software used in C2. ;; Mimikatz's SEKURLSA::Pth module can impersonate a user with only a password hash to execute arbitrary commands. ;; Night Dragon used pass-the-hash tools to gain usernames and passwords. ;; Pass-The-Hash Toolkit can perform pass the hash. ;; PoshC2 has a number of modules that leverage pass the hash for lateral movement.
| 1
|
accept
|
T1550.002
|
Use Alternate Authentication Material: Pass The Hash
|
Threat actors may try to collect cloud log data and subsequently disable the logs to hide their activity.
| 1
|
accept
|
T1562.008
|
Impair Defenses: Disable Cloud Logs
|
Malware or actors may disable cloud logs in Amazon Web Services (AWS) with commands like ‘StopLogging’ and ‘DeleteTrail’.
| 1
|
accept
|
T1562.008
|
Impair Defenses: Disable Cloud Logs
|
Disabling logs in cloud environments can allow actors or malware to conceal their malicious activity.
| 1
|
accept
|
T1562.008
|
Impair Defenses: Disable Cloud Logs
|
In efforts to conceal their actions, adversaries may disable cloud logs in GCP while deploying other apps or containers.
| 1
|
accept
|
T1562.008
|
Impair Defenses: Disable Cloud Logs
|
Adversaries may disable event logging in Kubernetes to hide their deployment applications or containers on a target environment.
| 1
|
accept
|
T1562.008
|
Impair Defenses: Disable Cloud Logs
|
Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files.
| 1
|
accept
|
T1546.004
|
Event Triggered Execution: Unix Shell Configuration Modification
|
Some malware will maintain persistence via rc.local and .bashrc files.
| 1
|
accept
|
T1546.004
|
Event Triggered Execution: Unix Shell Configuration Modification
|
On Linux and Unix systems, malware may try to maintain persistence by using bash scripts.
| 1
|
accept
|
T1546.004
|
Event Triggered Execution: Unix Shell Configuration Modification
|
Login environments, such as .bash or ZSH, can be used by malware to create events that are launched on every boot or login.
| 1
|
accept
|
T1546.004
|
Event Triggered Execution: Unix Shell Configuration Modification
|
Using shell commands contained in files, actors can instruct infected hosts to launch specific events at pre-determined times.
| 1
|
accept
|
T1546.004
|
Event Triggered Execution: Unix Shell Configuration Modification
|
Many actors and malware will use login environments to force an infected machine to execute scripts at any specified time.
| 1
|
accept
|
T1546.004
|
Event Triggered Execution: Unix Shell Configuration Modification
|
Adversaries may attempt to modify cloud firewall settings to allow connections for further downloads or uploads.
| 1
|
accept
|
T1562.007
|
Impair Defenses: Disable Or Modify Cloud Firewall
|
Some actors and malware will disable cloud firewall settings for short periods of time to allow connections, and then restore restrictions to avoid detection.
| 1
|
accept
|
T1562.007
|
Impair Defenses: Disable Or Modify Cloud Firewall
|
Malware that manipulates cloud firewall settings can allow threat actors to steal data and resources.
| 1
|
accept
|
T1562.007
|
Impair Defenses: Disable Or Modify Cloud Firewall
|
If actors get control of a cloud firewall, they will be able to change settings to allow further malicious activity.
| 1
|
accept
|
T1562.007
|
Impair Defenses: Disable Or Modify Cloud Firewall
|
Modifying or disabling a cloud firewall may enable adversary C2 communications, lateral movement, and/or data exfiltration that would otherwise not be allowed.
| 1
|
accept
|
T1562.007
|
Impair Defenses: Disable Or Modify Cloud Firewall
|
Reverting cloud infrastructure instances allows malware and actors to conduct malicious activities, and then revert to a clean state to hide their actions.
| 1
|
accept
|
T1578.004
|
Modify Cloud Compute Infrastructure: Revert Cloud Instance
|
Actors can hide their malicious activity while in cloud instances by restoring the virtual machine to a previous state.
| 1
|
accept
|
T1578.004
|
Modify Cloud Compute Infrastructure: Revert Cloud Instance
|
Restoring a virtual machine to its original state after malicious activity has been completed is a good technique to conceal malicious activity.
| 1
|
accept
|
T1578.004
|
Modify Cloud Compute Infrastructure: Revert Cloud Instance
|
Adversaries may restore cloud environments to previous snapshots once cybercriminal activity has been completed.
| 1
|
accept
|
T1578.004
|
Modify Cloud Compute Infrastructure: Revert Cloud Instance
|
Actors and malware can take advantage of ephemeral storage types because they often restart/reset once the VM is stopped or rebooted.
| 1
|
accept
|
T1578.004
|
Modify Cloud Compute Infrastructure: Revert Cloud Instance
|
Threat actors may delete a cloud instance or virtual machine to hide their malicious activity.
| 1
|
accept
|
T1578.003
|
Modify Cloud Compute Infrastructure: Delete Cloud Instance
|
CloudTrail logs, in Amazon Web Services (AWS), can capture cloud instance deletion in the ‘TerminateInstaces’ event.
| 1
|
accept
|
T1578.003
|
Modify Cloud Compute Infrastructure: Delete Cloud Instance
|
Within Google’s Admin Activity audit logs, the Cloud Audit logs can detect when instances or virtual machines (VMs) are deleted via the gcloud ‘compute instances delete’ command.
| 1
|
accept
|
T1578.003
|
Modify Cloud Compute Infrastructure: Delete Cloud Instance
|
In Kubernetes, malware or threat actors may attempt to remove finalizers (finalizer key) prior to deleting a cloud instance.
| 1
|
accept
|
T1578.003
|
Modify Cloud Compute Infrastructure: Delete Cloud Instance
|
Deleting evidence of malicious operations, such as manipulating or removing cloud instances or VMs, may be done by actors or malware to conceal their operations.
| 1
|
accept
|
T1578.003
|
Modify Cloud Compute Infrastructure: Delete Cloud Instance
|
Malware may attempt to modify existing cloud infrastructure by creating new snapshots to steal resources or data.
| 1
|
accept
|
T1578.001
|
Modify Cloud Compute Infrastructure: Create Snapshot
|
Cybercriminals may create snapshots on cloud systems and grant only themselves access to it establish or maintain persistence.
| 1
|
accept
|
T1578.001
|
Modify Cloud Compute Infrastructure: Create Snapshot
|
Creating a snapshot with firewall-restricted access in a cloud instance can give adversaries concealed access and persistence on a target system.
| 1
|
accept
|
T1578.001
|
Modify Cloud Compute Infrastructure: Create Snapshot
|
Actors may create a snapshot on a virtual hard drive or volume from which to maintain access onto a target’s system.
| 1
|
accept
|
T1578.001
|
Modify Cloud Compute Infrastructure: Create Snapshot
|
Actors can create snapshots on cloud systems to launch attacks from.
| 1
|
accept
|
T1578.001
|
Modify Cloud Compute Infrastructure: Create Snapshot
|
On Google Admin Activity audit logs, actors can use the command ‘gcloud compute instances create’ to create a new cloud instance.
| 1
|
accept
|
T1578.002
|
Modify Cloud Compute Infrastructure: Create Cloud Instance
|
Adversaries may a new virtual machine to launch attacks from and evade defenses.
| 1
|
accept
|
T1578.002
|
Modify Cloud Compute Infrastructure: Create Cloud Instance
|
Threat actors can create a new cloud instance to bypass firewall rules and permissions that may exist in an account.
| 1
|
accept
|
T1578.002
|
Modify Cloud Compute Infrastructure: Create Cloud Instance
|
Cybercriminals can utilize cloud systems by creating new instances that are hidden from view and do not affect the targets operations.
| 1
|
accept
|
T1578.002
|
Modify Cloud Compute Infrastructure: Create Cloud Instance
|
Actors may setup their own infrastructure in a target network by creating cloud instances with custom security settings to avoid detection.
| 1
|
accept
|
T1578.002
|
Modify Cloud Compute Infrastructure: Create Cloud Instance
|
APT29 staged data and files in password-protected archives on a victim's OWA server.
| 1
|
accept
|
T1074.002
|
Data Staged: Remote Data Staging
|
Chimera has staged stolen data on designated servers in the target environment.
| 1
|
accept
|
T1074.002
|
Data Staged: Remote Data Staging
|
FIN6 actors have compressed data from remote systems and moved it to another staging system before exfiltration.
| 1
|
accept
|
T1074.002
|
Data Staged: Remote Data Staging
|
FIN8 aggregates staged data from a network into a single location.
| 1
|
accept
|
T1074.002
|
Data Staged: Remote Data Staging
|
menuPass has staged data on remote MSP systems or other victim networks prior to exfiltration.
| 1
|
accept
|
T1074.002
|
Data Staged: Remote Data Staging
|
Night Dragon has copied files to company web servers and subsequently downloaded them.
| 1
|
accept
|
T1074.002
|
Data Staged: Remote Data Staging
|
Threat Group-3390 has moved staged encrypted archives to Internet-facing servers that had previously been compromised with China Chopper prior to exfiltration.
| 1
|
accept
|
T1074.002
|
Data Staged: Remote Data Staging
|
UNC2452 staged data and files in password-protected archives on a victim's OWA server.
| 1
|
accept
|
T1074.002
|
Data Staged: Remote Data Staging
|
Sandworm Team defaced approximately 15 000 websites belonging to Georgian government non-government and private sector organizations in 2019.
| 1
|
accept
|
T1491.002
|
Defacement: External Defacement
|
Threat actors who want to make a socioeconomical point or deliver a message may deface well-known websites to ensure their point is seen.
| 1
|
accept
|
T1491.002
|
Defacement: External Defacement
|
Some websites are defaced by hacktivists or malware in attempts to gather support from other adversaries to accomplish an objective.
| 1
|
accept
|
T1491.002
|
Defacement: External Defacement
|
Cybercriminals of lower sophisticated are typically the ones that deface websites, however, advanced groups such as Sandworm Team have defaced thousands of websites.
| 1
|
accept
|
T1491.002
|
Defacement: External Defacement
|
Some state-sponsored groups may use website defacement as a diversionary tactic to distract from their true objectives.
| 1
|
accept
|
T1491.002
|
Defacement: External Defacement
|
Website defacements may be used to setup future attacks as an initial access point.
| 1
|
accept
|
T1491.002
|
Defacement: External Defacement
|
APT29 has added credentials to OAuth Applications and Service Principals.
| 1
|
accept
|
T1098.001
|
Account Manipulation: Additional Cloud Credentials
|
UNC2452 added credentials to OAuth Applications and Service Principals.
| 1
|
accept
|
T1098.001
|
Account Manipulation: Additional Cloud Credentials
|
Threat actors may add their own credentials into a created or compromised cloud service account to setup legitimate services on a system under their control.
| 1
|
accept
|
T1098.001
|
Account Manipulation: Additional Cloud Credentials
|
Some malware and actors will gain illicit access to an account that inside a cloud environment, such as AWS, GCP, or Kubernetes, and credentials for own accounts.
| 1
|
accept
|
T1098.001
|
Account Manipulation: Additional Cloud Credentials
|
If an actor can breach cloud accounts with the correct privileges, there are numerous ways the adversary could add their own credentials into a target system.
| 1
|
accept
|
T1098.001
|
Account Manipulation: Additional Cloud Credentials
|
PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.
| 1
|
accept
|
T1547.014
|
Boot or Logon Autostart Execution: Active Setup
|
Cybercriminals may manipulate Active Setup by adding a registry key so that the malicious key will be executed when a user logs in.
| 1
|
accept
|
T1547.014
|
Boot or Logon Autostart Execution: Active Setup
|
Threat actors can maintain persistence on a machine by adding a registry to the Active Setup on Windows operating systems.
| 1
|
accept
|
T1547.014
|
Boot or Logon Autostart Execution: Active Setup
|
An actor can add registry keys to Windows Active Setup to execute programs from a user’s account every time he/she/them logs in.
| 1
|
accept
|
T1547.014
|
Boot or Logon Autostart Execution: Active Setup
|
Malware may attempt to use Active Setup components on Windows systems to execute specific actions upon every login.
| 1
|
accept
|
T1547.014
|
Boot or Logon Autostart Execution: Active Setup
|
Active Setup components can be utilized by adversaries to force breached or compromised accounts to conduct malicious activity while disguised as a legitimate user.
| 1
|
accept
|
T1547.014
|
Boot or Logon Autostart Execution: Active Setup
|
Empire can use built-in modules to abuse trusted utilities like MSBuild.exe.
| 1
|
accept
|
T1127.001
|
Trusted Developer Utilities Proxy Execution: Msbuild
|
Frankenstein has used MSbuild to execute an actor-created file.
| 1
|
accept
|
T1127.001
|
Trusted Developer Utilities Proxy Execution: Msbuild
|
A version of PlugX loads as shellcode within a .NET Framework project using msbuild.exe presumably to bypass application control techniques.
| 1
|
accept
|
T1127.001
|
Trusted Developer Utilities Proxy Execution: Msbuild
|
Adversaries may use MSBuild to proxy execution of code through a trusted Windows utility.
| 1
|
accept
|
T1127.001
|
Trusted Developer Utilities Proxy Execution: Msbuild
|
Legitimate software, such as Windows’ Microsoft Build Engine (MSBuild.exe), can be abused by threat actors to execute malware under the guise of a trusted utility.
| 1
|
accept
|
T1127.001
|
Trusted Developer Utilities Proxy Execution: Msbuild
|
Malware or actors can bypass security features by using MSBuild to execute files that will be allowed by security controls because it is a trusted program.
| 1
|
accept
|
T1127.001
|
Trusted Developer Utilities Proxy Execution: Msbuild
|
Adversaries may tamper with SIP and trust provider components to mislead the operating system and application control tools when conducting signature validation checks.
| 1
|
accept
|
T1553.003
|
Subvert Trust Controls: Sip And Trust Provider Hijacking
|
Subject Interface Packages (SIPs) can be manipulated by threat actors to trick operating systems into executing code that could otherwise blocked by security features.
| 1
|
accept
|
T1553.003
|
Subvert Trust Controls: Sip And Trust Provider Hijacking
|
Cybercriminals or malware may try to change trust controls that only allow code execution from software with valid digital certificates to conduct malicious activity.
| 1
|
accept
|
T1553.003
|
Subvert Trust Controls: Sip And Trust Provider Hijacking
|
Actors may try to subvert operating system (OS) trust controls to hide from security solutions when executing malware.
| 1
|
accept
|
T1553.003
|
Subvert Trust Controls: Sip And Trust Provider Hijacking
|
Threat actors or groups are known to try to hijack OS trust provider architecture to allow execution of code that does not have a valid digital certificate.
| 1
|
accept
|
T1553.003
|
Subvert Trust Controls: Sip And Trust Provider Hijacking
|
Egregor can modify the GPO to evade detection.
| 1
|
accept
|
T1484.001
|
Domain Policy Modification: Group Policy Modification
|
Empire can use New-GPOImmediateTask to modify a GPO that will install and execute a malicious Scheduled Task/Job.
| 1
|
accept
|
T1484.001
|
Domain Policy Modification: Group Policy Modification
|
Indrik Spider has used Group Policy Objects to deploy batch scripts.
| 1
|
accept
|
T1484.001
|
Domain Policy Modification: Group Policy Modification
|
Adversaries may modify group policy objects (GPOs) to subvert the intended discretionary access controls for a domain, usually with the intention of escalating privileges on the domain.
| 1
|
accept
|
T1484.001
|
Domain Policy Modification: Group Policy Modification
|
Threat actors can use GPOs (virtual collection of policy settings) to force infect machines to connect to command and control (C2) IPs, domains, or servers for further malicious activity.
| 1
|
accept
|
T1484.001
|
Domain Policy Modification: Group Policy Modification
|
Policy settings for groups on Windows operating systems (OSs) can be used to created scheduled tasks for persistence, download payloads, modify settings, and steal data.
| 1
|
accept
|
T1484.001
|
Domain Policy Modification: Group Policy Modification
|
Group policy objects can be modified by cybercriminals to disable tools, elevate privileges, establish persistence, and execute code, among numerous other malicious activities.
| 1
|
accept
|
T1484.001
|
Domain Policy Modification: Group Policy Modification
|
Malicious GPO modifications can be used to implement many other malicious behaviors such as Scheduled Task/Job, Disable or Modify Tools, Ingress Tool Transfer, Create Account, Service Execution, and more.
| 1
|
accept
|
T1484.001
|
Domain Policy Modification: Group Policy Modification
|
Empire can add a SID-History to a user if on a domain controller.
| 1
|
accept
|
T1134.005
|
Access Token Manipulation: Sid
|
Mimikatz's MISC::AddSid module can appended any SID or user/group account to a user's SID-History. Mimikatz also utilizes SID-History Injection to expand the scope of other components such as generated Kerberos Golden Tickets and DCSync beyond a single domain.
| 1
|
accept
|
T1134.005
|
Access Token Manipulation: Sid
|
Adversaries may use SID-History Injection to escalate privileges and bypass access controls.
| 1
|
accept
|
T1134.005
|
Access Token Manipulation: Sid
|
Cybercriminals can manipulate the Windows security identifier (SID) to gather user account history and identifiers to impersonate other users or groups to conduct malicious activity.
| 1
|
accept
|
T1134.005
|
Access Token Manipulation: Sid
|
User account and group information stored in Sid-history can be stolen by threat actors to masquerade as legitimate users while launching attacks.
| 1
|
accept
|
T1134.005
|
Access Token Manipulation: Sid
|
Bazar can inject into a target process using process doppelgänging.
| 1
|
accept
|
T1055.013
|
Process Injection: Process Doppelgänging
|
Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems.
| 1
|
accept
|
T1055.013
|
Process Injection: Process Doppelgänging
|
SynAck abuses NTFS transactions to launch and conceal malicious processes.
| 1
|
accept
|
T1055.013
|
Process Injection: Process Doppelgänging
|
Adversaries may inject malicious code into process via process doppelgänging to evade process-based defenses as well as possibly elevate privileges.
| 1
|
accept
|
T1055.013
|
Process Injection: Process Doppelgänging
|
Process doppelgänging is a method of executing arbitrary code in the address space of a separate live process.
| 1
|
accept
|
T1055.013
|
Process Injection: Process Doppelgänging
|
Cobalt Strike can spawn processes with alternate PPIDs.
| 1
|
accept
|
T1134.004
|
Access Token Manipulation: Parent Pid Spoofing
|
PipeMon can use parent PID spoofing to elevate privileges.
| 1
|
accept
|
T1134.004
|
Access Token Manipulation: Parent Pid Spoofing
|
Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to elevate privileges.
| 1
|
accept
|
T1134.004
|
Access Token Manipulation: Parent Pid Spoofing
|
Cybercriminals can create fake PPIDs for their malicious activity to elevate privileges or evade security defenses.
| 1
|
accept
|
T1134.004
|
Access Token Manipulation: Parent Pid Spoofing
|
Parent process identifiers can be spoofed by actors or malware to allow and conceal execution of malicious processes.
| 1
|
accept
|
T1134.004
|
Access Token Manipulation: Parent Pid Spoofing
|
InvisiMole can disconnect previously connected remote drives.
| 1
|
accept
|
T1070.005
|
Indicator Removal on Host: Network Share Connection Removal
|
The net use \system\share /delete command can be used in Net to remove an established connection to a network share.
| 1
|
accept
|
T1070.005
|
Indicator Removal on Host: Network Share Connection Removal
|
RobbinHood disconnects all network shares from the computer with the command net use * /DELETE /Y.
| 1
|
accept
|
T1070.005
|
Indicator Removal on Host: Network Share Connection Removal
|
Threat Group-3390 has detached network shares after exfiltrating files likely to evade detection.
| 1
|
accept
|
T1070.005
|
Indicator Removal on Host: Network Share Connection Removal
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.