prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
System Owner
|
It malware gathers the registered user and primary owner name via WMI.
|
System Owner
|
StrifeWater can collect the user name from the victim's machine.
|
System Owner
|
SUNBURST collected the username from a compromised host.
|
System Owner
|
SVCReady can collect the username from an infected host.
|
System Owner
|
SynAck gathers user names from infected hosts.
|
System Owner
|
Sys10 collects the account name of the logged-in user and sends it to the C2.
|
System Owner
|
SysUpdate can collect the username from a compromised host.
|
System Owner
|
T9000 gathers and beacons the username of the logged in account during installation. It will also gather the username of running processes to determine if it is running as SYSTEM.
|
System Owner
|
It has used whoami to collect system user information.
|
System Owner
|
TrickBot can identify the user and groups the user belongs to on a compromised host.
|
System Owner
|
Trojan.Karagany can gather information about the user on a compromised host.
|
System Owner
|
It used letmein to scan for saved usernames on the target system.
|
System Owner
|
Turian can retrieve usernames.
|
System Owner
|
Unknown Logger can obtain information about the victim usernames.
|
System Owner
|
UPPERCUT has the capability to collect the current logged on user’s username from a machine.
|
System Owner
|
Valak can gather information regarding the user.
|
System Owner
|
VERMIN gathers the username from the victim’s machine.
|
System Owner
|
It has executed the PowerShell command Get-EventLog security -instanceid 4624 to identify associated user and computer account names.
|
System Owner
|
WellMail can identify the current username on the victim system.
|
System Owner
|
WellMess can collect the username on the victim machine to send to C2.
|
System Owner
|
WINDSHIELD can gather the victim user name.
|
System Owner
|
It has used malware to identify the username on a compromised host.
|
System Owner
|
WINERACK can gather information on the victim username.
|
System Owner
|
WinMM uses NetUser-GetInfo to identify that it is running under an "Admin" account on the local system.
|
System Owner
|
It has used "whoami" to identify the local user and their privileges.
|
System Owner
|
Woody RAT can retrieve a list of user accounts and usernames from an infected machine.
|
System Owner
|
XAgentOSX contains the getInfoOSX function to return the OS X version as well as the current user.
|
System Owner
|
yty collects the victim’s username.
|
System Owner
|
Zebrocy gets the username from the system.
|
System Owner
|
ItM has used a tool to capture the username on a compromised host in order to register it with C2.
|
System Owner
|
zwShell can obtain the name of the logged-in user on the victim.
|
System Owner
|
ZxShell can collect the owner and organization information from the target workstation.
|
System Owner
|
ZxxZ can collect the username from a compromised host.
|
System Service Discovery
|
It actors used the following command following exploitation of a machine with LOWBALL malware to obtain information about services: net start >> %temp%\download
|
System Service Discovery
|
It used the commands net start and tasklist to get a listing of the services on the system.
|
System Service Discovery
|
It has attempted to discover services for third party EDR products.
|
System Service Discovery
|
Babuk can enumerate all services running on a compromised host.
|
System Service Discovery
|
BBSRAT can query service configuration information.
|
System Service Discovery
|
BitPaymer can enumerate existing Windows services on the host that are configured to run as LocalSystem.
|
System Service Discovery
|
Black Basta can check whether the service name FAX is present.
|
System Service Discovery
|
It has used TROJ_GETVERSION to discover system services.
|
System Service Discovery
|
Caterpillar WebShell can obtain a list of the services from a system.
|
System Service Discovery
|
It has used net start and net use for system service discovery.
|
System Service Discovery
|
Cobalt Strike can enumerate services on compromised hosts.
|
System Service Discovery
|
Comnie runs the command: net start >> %TEMP%\info.dat on a victim.
|
System Service Discovery
|
Cuba can query service status using QueryServiceStatusEx function.
|
System Service Discovery
|
DarkTortilla can retrieve information about a compromised system's running services.
|
System Service Discovery
|
Dyre has the ability to identify running services on a compromised host.
|
System Service Discovery
|
It has used Tasklist to obtain information from a compromised host.
|
System Service Discovery
|
Elise executes net start after initial communication is made to the remote server.
|
System Service Discovery
|
Emissary has the capability to execute the command net start to interact with services.
|
System Service Discovery
|
Epic uses the tasklist /svc command to list the services on the system.
|
System Service Discovery
|
GeminiDuke collects information on programs and services on the victim that are configured to automatically run at startup.
|
System Service Discovery
|
GravityRAT has a feature to list the available services on the system.
|
System Service Discovery
|
GreyEnergy enumerates all Windows services.
|
System Service Discovery
|
Heyoka Backdoor can check if it is running as a service on a compromised host.
|
System Service Discovery
|
HotCroissant has the ability to retrieve a list of services on the infected host.
|
System Service Discovery
|
Hydraq creates a backdoor through which remote attackers can monitor services.
|
System Service Discovery
|
HyperBro can list all services and their configurations.
|
System Service Discovery
|
It has used the win32_service WMI class to retrieve a list of services from the system.
|
System Service Discovery
|
InvisiMole can obtain running services on the victim.
|
System Service Discovery
|
Ixeshe can list running services.
|
System Service Discovery
|
JPIN can list running services.
|
System Service Discovery
|
jRAT can list local services.
|
System Service Discovery
|
It performs service discovery using net start commands.
|
System Service Discovery
|
It has used an instrumentor script to gather the names of all services running on a victim's system.
|
System Service Discovery
|
Kwampirs collects a list of running services with the command tasklist /svc.
|
System Service Discovery
|
LookBack can enumerate services on the victim machine.
|
System Service Discovery
|
The net start command can be used in Net to find information about Windows services.
|
System Service Discovery
|
It has used sc query on a victim to gather information about services.
|
System Service Discovery
|
During Operation CuckooBees, the threat actors used the net start command as part of their initial reconnaissance.
|
System Service Discovery
|
During Operation Wocao, threat actors used the tasklist command to search for one of its backdoors.
|
System Service Discovery
|
After compromising a victim, It discovers all running services.
|
System Service Discovery
|
PoshC2 can enumerate service and service permission information.
|
System Service Discovery
|
RainyDay can create and register a service for execution.
|
System Service Discovery
|
RATANKBA uses tasklist /svc to display running tasks.
|
System Service Discovery
|
REvil can enumerate active services.
|
System Service Discovery
|
S-Type runs the command net start on a victim.
|
System Service Discovery
|
Sardonic has the ability to execute the net start command.
|
System Service Discovery
|
SILENTTRINITY can search for modifiable services that could be used for privilege escalation.
|
System Service Discovery
|
SLOTHFULMEDIA has the capability to enumerate services.
|
System Service Discovery
|
SombRAT can enumerate services on a victim machine.
|
System Service Discovery
|
SUNBURST collected a list of service names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.
|
System Service Discovery
|
Sykipot may use net start to display running services.
|
System Service Discovery
|
SynAck enumerates all running services.
|
System Service Discovery
|
SysUpdate can collect a list of services on a victim machine.
|
System Service Discovery
|
Tasklist can be used to discover services running on a system.
|
System Service Discovery
|
It has searched for services such as Alibaba Cloud Security's aliyun service and BMC Helix Cloud Security's bmc-agent service in order to disable them.
|
System Service Discovery
|
TrickBot collects a list of install programs and services on the system’s machine.
|
System Service Discovery
|
It surveys a system upon check-in to discover running services and associated processes using the tasklist /svc command.
|
System Service Discovery
|
Ursnif has gathered information about running services.
|
System Service Discovery
|
Volgmer queries the system to identify existing services.
|
System Service Discovery
|
WINERACK can enumerate services.
|
System Service Discovery
|
ZLib has the ability to discover and manipulate Windows services.
|
System Service Discovery
|
ZxShell can check the services on the system.
|
System Time Discovery
|
Agent Tesla can collect the timestamp from the victim’s machine.
|
System Time Discovery
|
AppleSeed can pull a timestamp from the victim's machine.
|
System Time Discovery
|
Astaroth collects the timestamp from the infected machine.
|
System Time Discovery
|
AvosLocker has checked the system time before and after encryption.
|
System Time Discovery
|
Azorult can collect the time zone information from the system.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.