prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
System Time Discovery
|
BADHATCH can obtain the DATETIME from a compromised machine.
|
System Time Discovery
|
Bazar can collect the time on the compromised host.
|
System Time Discovery
|
BendyBear has the ability to determine local time on a compromised host.
|
System Time Discovery
|
Bisonal can check the system time set on the infected host.
|
System Time Discovery
|
BLUELIGHT can collect the local time on a compromised host.
|
System Time Discovery
|
It has used net time to check the local time on a target system.
|
System Time Discovery
|
build_downer has the ability to determine the local time to ensure malware installation only happens during the hours that the infected system is active.
|
System Time Discovery
|
During C0015, the threat actors used the command net view /all time to gather the local time of a compromised network.
|
System Time Discovery
|
Cannon can collect the current time zone information from the victim’s machine.
|
System Time Discovery
|
Carbon uses the command net time \127.0.0.1 to get information the system’s time.
|
System Time Discovery
|
ccf32 can determine the local time on targeted machines.
|
System Time Discovery
|
It has used time /t and net time \ip/hostname for system time discovery.
|
System Time Discovery
|
Clambling can determine the current time.
|
System Time Discovery
|
ComRAT has checked the victim system's date and time to perform tasks during business hours (9 to 5, Monday to Friday).
|
System Time Discovery
|
Conficker uses the current UTC victim system date for domain generation and connects to time servers to determine the current date.
|
System Time Discovery
|
Crimson has the ability to determine the date and time on a compromised host.
|
System Time Discovery
|
It malware can obtain system time from a compromised host.
|
System Time Discovery
|
DarkWatchman can collect the time zone information from the system.
|
System Time Discovery
|
DCSrv can compare the current time on an infected host with a configuration value to determine when to start the encryption process.
|
System Time Discovery
|
DRATzarus can use the GetTickCount and GetSystemTimeAsFileTime API calls to inspect system time.
|
System Time Discovery
|
Egregor contains functionality to query the local/system time.
|
System Time Discovery
|
Epic uses the net time command to get the system time from the machine and collect the current date and time zone information.
|
System Time Discovery
|
EvilBunny has used the API calls NtQuerySystemTime, GetSystemTimeAsFileTime, and GetTickCount to gather time metrics as part of its checks to see if the malware is running in a sandbox.
|
System Time Discovery
|
FELIXROOT gathers the time zone information from the victim’s machine.
|
System Time Discovery
|
FunnyDream can check system time to help determine when changes were made to specified files.
|
System Time Discovery
|
GoldMax can check the current date-time value of the compromised system, comparing it to the hardcoded execution trigger and can send the current timestamp to the C2 server.
|
System Time Discovery
|
Grandoreiro can determine the time on the victim machine via IPinfo.
|
System Time Discovery
|
GravityRAT can obtain the date and time of a system.
|
System Time Discovery
|
Green Lambert can collect the date and time from a compromised host.
|
System Time Discovery
|
GRIFFON has used a reconnaissance module that can be used to retrieve the date and time of the system.
|
System Time Discovery
|
It used a function to gather the current time.
|
System Time Discovery
|
HOPLIGHT has been observed collecting system time from victim machines.
|
System Time Discovery
|
InvisiMole gathers the local system time from the victim’s machine.
|
System Time Discovery
|
KEYPLUG can obtain the current tick count of an infected computer.
|
System Time Discovery
|
A Destover-like implant used by It can obtain the current system time and send it to the C2 server.
|
System Time Discovery
|
Metamorfo uses JavaScript to get the system time.
|
System Time Discovery
|
MoonWind obtains the victim's current time.
|
System Time Discovery
|
The net time command can be used in Net to determine the local or remote system time.
|
System Time Discovery
|
NOKKI can collect the current timestamp of the victim's machine.
|
System Time Discovery
|
Okrum can obtain the date and time of the compromised system.
|
System Time Discovery
|
OopsIE checks to see if the system is configured with "Daylight" time and checks for a specific region to be set for the timezone.
|
System Time Discovery
|
During Operation CuckooBees, the threat actors used the net time command as part of their advanced reconnaissance.
|
System Time Discovery
|
During Operation Wocao, threat actors used the time command to retrieve the current time of a compromised system.
|
System Time Discovery
|
PipeMon can send time zone information from a compromised host to C2.
|
System Time Discovery
|
PowerDuke has commands to get the time the machine was built, the time, and the time zone.
|
System Time Discovery
|
As part of the data reconnaissance phase, Proxysvc grabs the system time to send back to the control server.
|
System Time Discovery
|
QakBot can identify the system time on a targeted host.
|
System Time Discovery
|
It can obtain the victim time zone.
|
System Time Discovery
|
ShadowPad has collected the current date and time of the victim system.
|
System Time Discovery
|
Shamoon obtains the system time and will only activate if it is greater than a preset date.
|
System Time Discovery
|
SHARPSTATS has the ability to identify the current date and time on the compromised host.
|
System Time Discovery
|
It has used tools to obtain the current system time.
|
System Time Discovery
|
SILENTTRINITY can collect start time information from a compromised host.
|
System Time Discovery
|
SombRAT can execute getinfo to discover the current time on a compromised host.
|
System Time Discovery
|
StoneDrill can obtain the current date and time of the victim machine.
|
System Time Discovery
|
StrifeWater can collect the time zone from the victim's machine.
|
System Time Discovery
|
Stuxnet collects the time and date of a system when it is infected.
|
System Time Discovery
|
SVCReady can collect time zone information.
|
System Time Discovery
|
T9000 gathers and beacons the system time during installation.
|
System Time Discovery
|
Taidoor can use GetLocalTime and GetSystemTime to collect system time.
|
System Time Discovery
|
TAINTEDSCRIBE can execute GetLocalTime for time discovery.
|
System Time Discovery
|
TajMahal has the ability to determine local time on a compromised host.
|
System Time Discovery
|
It has checked the current date on the victim system.
|
System Time Discovery
|
Torisma can collect the current time on a victim machine.
|
System Time Discovery
|
It surveys a system upon check-in to discover the system time by using the net time command.
|
System Time Discovery
|
UPPERCUT has the capability to obtain the time zone information and current timestamp of the victim’s machine.
|
System Time Discovery
|
WindTail has the ability to generate the current date and time.
|
System Time Discovery
|
Zebrocy gathers the current time zone and date information from the system.
|
System Time Discovery
|
Zeus Panda collects the current system time (UTC) and sends it back to the C2 server.
|
System Time Discovery
|
ItM has used a tool to capture the time on a compromised host in order to register it with C2.
|
Virtualization
|
Agent Tesla has the ability to perform anti-sandboxing and anti-virtualization checks.
|
Virtualization
|
Bazar can attempt to overload sandbox analysis by sending 1550 calls to printf.
|
Virtualization
|
Bisonal can check to determine if the compromised system is running on VMware.
|
Virtualization
|
Black Basta can make a random number of calls to the kernel32.beep function to hinder log analysis.
|
Virtualization
|
Bumblebee has the ability to perform anti-virtualization checks.
|
Virtualization
|
Carberp has removed various hooks before installing the trojan or bootkit to evade sandbox analysis or other analysis software.
|
Virtualization
|
CHOPSTICK includes runtime checks to identify an analysis environment and prevent execution on it.
|
Virtualization
|
Some versions of CozyCar will check to ensure it is not being executed inside a virtual machine or a known malware analysis sandbox environment. If it detects that it is, it will exit.
|
Virtualization
|
It malware has employed just-in-time decryption of strings to evade sandbox detection.
|
Virtualization
|
Egregor has used multiple anti-analysis and anti-sandbox techniques to prevent automated analysis by sandboxes.
|
Virtualization
|
Gelsemium can use junk code to generate random activity to obscure malware behavior.
|
Virtualization
|
Hancitor has used a macro to check that an ActiveDocument shape object in the lure message is present. If this object is not found, the macro will exit without downloading additional payloads.
|
Virtualization
|
Kevin can sleep for a time interval between C2 communication attempts.
|
Virtualization
|
Metamorfo has embedded a "vmdetect.exe" executable to identify virtual machines at the beginning of execution.
|
Virtualization
|
During Operation Spalax, the threat actors used droppers that would run anti-analysis checks before executing malware on a compromised host.
|
Virtualization
|
Pteranodon has the ability to use anti-detection functions to identify sandbox environments.
|
Virtualization
|
It can detect if it is running within a sandbox or other virtualized analysis environment.
|
Virtualization
|
Squirrelwaffle has contained a hardcoded list of IP addresses to block that belong to sandboxes and analysis platforms.
|
Virtualization
|
StoneDrill has used several anti-emulation techniques to prevent automated analysis by emulators or sandboxes.
|
Virtualization
|
Astaroth can check for Windows product ID's used by sandboxes and usernames and disk serial numbers associated with analyst environments.
|
Virtualization
|
AsyncRAT can identify strings such as Virtual, vmware, or VirtualBox to detect virtualized environments.
|
Virtualization
|
Attor can detect whether it is executed in some virtualized or emulated environment by searching for specific artifacts, such as communication with I/O ports and using VM-specific instructions.
|
Virtualization
|
BadPatch attempts to detect if it is being run in a Virtual Machine (VM) using a WMI query for disk drive name, BIOS, and motherboard information.
|
Virtualization
|
Black Basta can check system flags and libraries, process timing, and API's to detect code emulation or sandboxing.
|
Virtualization
|
BLUELIGHT can check to see if the infected machine has VM tools running.
|
Virtualization
|
Bumblebee has the ability to search for designated file paths and Registry keys that indicate a virtualized environment from multiple products.
|
Virtualization
|
CSPY Downloader can search loaded modules, PEB structure, file paths, Registry keys, and memory to determine if it is being debugged or running in a virtual environment.
|
Virtualization
|
It malware has used a series of checks to determine if it's being analyzed; checks include the length of executable names, if a filename ends with .Md5.exe, and if the program is executed from the root of the C:\ drive, as well as checks for sandbox-related libraries.
|
Virtualization
|
DarkTortilla can search a compromised system's running processes and services to detect Hyper-V, QEMU, Virtual PC, Virtual Box, and VMware, as well as Sandboxie.
|
Virtualization
|
Denis ran multiple system checks, looking for processor and register characteristics, to evade emulation and analysis.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.