prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
Boot or Logon Autostart Execution:Shortcut Modification
|
The BlackEnergy 3 variant drops its main DLL component and then creates a .lnk shortcut to that file in the startup folder.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
Comnie establishes persistence via a .lnk file in the victim’s startup path.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
Empire can persist by modifying a .LNK file to include a backdoor.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
FELIXROOT creates a .LNK file for persistence.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
Gazer can establish persistence by creating a .lnk file in the Start menu or by modifying existing .lnk files to execute the malware through cmd.exe.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
It malware can create a .lnk file and add a Registry Run key to establish persistence.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
Grandoreiro can write or modify browser shortcuts to enable launching of malicious browser extensions.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
Helminth establishes persistence by creating a shortcut.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
InvisiMole can use a .lnk shortcut for the Control Panel to establish persistence.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
Kazuar adds a .lnk file to the Windows startup folder.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
A version of KONNI drops a Windows shortcut on the victim’s machine to establish persistence.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
It malware has maintained persistence on a system by creating a LNK shortcut in the user’s Startup folder.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
It has used JavaScript to create a shortcut file in the Startup folder that points to its main backdoor.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
MarkiRAT can modify the shortcut that launches Telegram by replacing its path with the malicious payload to launch with the legitimate executable.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
Micropsia creates a shortcut to maintain persistence.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
Okrum can establish persistence by creating a .lnk shortcut to itself in the Startup folder.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
Reaver creates a shortcut file and saves it in a Startup folder to establish persistence.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
RedLeaves attempts to add a shortcut file in the Startup folder to achieve persistence.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
RogueRobin establishes persistence by creating a shortcut (.LNK file) in the Windows startup folder to run a script each time the user logs in.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
S-Type may create the file %HOMEPATH%\Start Menu\Programs\Startup\Realtek {Unique Identifier}.lnk, which points to the malicious msdtc.exe file already created in the %CommonFiles% directory.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
SeaDuke is capable of persisting via a .lnk file stored in the Startup directory.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
SHIPSHAPE achieves persistence by creating a shortcut in the Startup folder.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
SPACESHIP achieves persistence by creating a shortcut in the current user's Startup folder.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
To establish persistence, SslMM identifies the Start Menu Startup directory and drops a link to its own executable disguised as an "Office Start," "Yahoo Talk," "MSN Gaming Z0ne," or "MSN Talk" shortcut.
|
Boot or Logon Autostart Execution:Shortcut Modification
|
TinyZBot can create a shortcut in the Windows startup folder for persistence.
|
Boot or Logon Autostart Execution:Print Processors
|
It has added the Registry key HKLM\SYSTEM\ControlSet001\Control\Print\Environments\Windows x64\Print Processors\UDPrint" /v Driver /d "spool.dll /f to load malware as a Print Processor.
|
Boot or Logon Autostart Execution:Print Processors
|
Gelsemium can drop itself in C:\Windows\System32\spool\prtprocs\x64\winprint.dll to be loaded automatically by the spoolsv Windows service.
|
Boot or Logon Autostart Execution:Print Processors
|
The PipeMon installer has modified the Registry key HKLM\SYSTEM\CurrentControlSet\Control\Print\Environments\Windows x64\Print Processors to install PipeMon as a Print Processor.
|
Boot or Logon Autostart Execution:XDG Autostart Entries
|
CrossRAT can use an XDG Autostart to establish persistence.
|
Boot or Logon Autostart Execution:XDG Autostart Entries
|
If executing without root privileges, Fysbis adds a .desktop configuration file to the user's ~/.config/autostart directory.
|
Boot or Logon Autostart Execution:XDG Autostart Entries
|
NETWIRE can use XDG Autostart Entries to establish persistence on Linux systems.
|
Boot or Logon Autostart Execution:XDG Autostart Entries
|
Pupy can use an XDG Autostart to establish persistence.
|
Boot or Logon Autostart Execution:XDG Autostart Entries
|
When executing with user-level permissions, RotaJakiro can install persistence using a .desktop file under the $HOME/.config/autostart/ folder.
|
Boot or Logon Autostart Execution:Active Setup
|
PoisonIvy creates a Registry key in the Active Setup pointing to a malicious executable.
|
Boot or Logon Autostart Execution:Login Items
|
Dok uses AppleScript to install a login Item by sending Apple events to the System Events process.
|
Boot or Logon Autostart Execution:Login Items
|
Green Lambert can add Login Items to establish persistence.
|
Boot or Logon Autostart Execution:Login Items
|
NETWIRE can persist via startup options for Login items.
|
Boot or Logon Initialization Scripts
|
It has hijacked legitimate application-specific startup scripts to enable malware to execute on system startup.
|
Boot or Logon Initialization Scripts
|
It has installed an "init.d" startup script to maintain persistence.
|
Boot or Logon Initialization Scripts
|
Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a .conf file in the /etc/init/ folder.
|
Boot or Logon Initialization Scripts:Logon Script (Windows)
|
An It loader Trojan adds the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.
|
Boot or Logon Initialization Scripts:Logon Script (Windows)
|
Attor's dispatcher can establish persistence via adding a Registry key with a logon script HKEY_CURRENT_USER\Environment "UserInitMprLogonScript" .
|
Boot or Logon Initialization Scripts:Logon Script (Windows)
|
It has added persistence by registering the file name for the next stage malware under HKCU\Environment\UserInitMprLogonScript.
|
Boot or Logon Initialization Scripts:Logon Script (Windows)
|
JHUHUGIT has registered a Windows shell script under the Registry key HKCU\Environment\UserInitMprLogonScript to establish persistence.
|
Boot or Logon Initialization Scripts:Logon Script (Windows)
|
KGH_SPY has the ability to set the HKCU\Environment\UserInitMprLogonScript Registry key to execute logon scripts.
|
Boot or Logon Initialization Scripts:Logon Script (Windows)
|
Zebrocy performs persistence with a logon script via adding to the Registry key HKCU\Environment\UserInitMprLogonScript.
|
Boot or Logon Initialization Scripts:RC Scripts
|
It has installed a run command on a compromised system to enable malware execution on system startup.
|
Boot or Logon Initialization Scripts:RC Scripts
|
Cyclops Blink has the ability to execute on device startup, using a modified RC script named S51armled.
|
Boot or Logon Initialization Scripts:RC Scripts
|
Green Lambert can add init.d and rc.d files in the /etc folder to establish persistence.
|
Boot or Logon Initialization Scripts:RC Scripts
|
HiddenWasp installs reboot persistence by adding itself to /etc/rc.local.
|
Boot or Logon Initialization Scripts:RC Scripts
|
iKitten adds an entry to the rc.common file for persistence.
|
Boot or Logon Initialization Scripts:Startup Items
|
jRAT can list and manage startup entries.
|
Create or Modify System Process
|
Exaramel for Linux has a hardcoded location that it uses to achieve persistence if the startup system is Upstart or System V and it is running as root.
|
Create or Modify System Process:Launch Agent
|
Bundlore can persist via a LaunchAgent.
|
Create or Modify System Process:Launch Agent
|
Calisto adds a .plist file to the /Library/LaunchAgents folder to maintain persistence.
|
Create or Modify System Process:Launch Agent
|
CoinTicker creates user launch agents named .espl.plist and com.apple.[random string].plist to establish persistence.
|
Create or Modify System Process:Launch Agent
|
CookieMiner has installed multiple new Launch Agents in order to maintain persistence for cryptocurrency mining software.
|
Create or Modify System Process:Launch Agent
|
CrossRAT creates a Launch Agent on macOS.
|
Create or Modify System Process:Launch Agent
|
Dacls can establish persistence via a LaunchAgent.
|
Create or Modify System Process:Launch Agent
|
Dok installs two LaunchAgents to redirect all network traffic with a randomly generated name for each plist file maintaining the format com.random.name.plist.
|
Create or Modify System Process:Launch Agent
|
FruitFly persists via a Launch Agent.
|
Create or Modify System Process:Launch Agent
|
Green Lambert can create a Launch Agent with the RunAtLoad key-value pair set to true, ensuring the com.apple.GrowlHelper.plist file runs every time a user logs in.
|
Create or Modify System Process:Launch Agent
|
Keydnap uses a Launch Agent to persist.
|
Create or Modify System Process:Launch Agent
|
The Komplex trojan creates a persistent launch agent called with $HOME/Library/LaunchAgents/com.apple.updates.plist with launchctl load -w ~/Library/LaunchAgents/com.apple.updates.plist.
|
Create or Modify System Process:Launch Agent
|
MacMa installs a com.apple.softwareupdate.plist file in the /LaunchAgents folder with the RunAtLoad value set to true. Upon user login, MacMa is executed from /var/root/.local/softwareupdate with root privileges. Some variations also include the LimitLoadToSessionType key with the value Aqua, ensuring the MacMa only runs when there is a logged in GUI user.
|
Create or Modify System Process:Launch Agent
|
macOS.OSAMiner has placed a Stripped Payloads with a plist extension in the Launch Agent's folder.
|
Create or Modify System Process:Launch Agent
|
MacSpy persists via a Launch Agent.
|
Create or Modify System Process:Launch Agent
|
NETWIRE can use launch agents for persistence.
|
Create or Modify System Process:Launch Agent
|
OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchAgents.
|
Create or Modify System Process:Launch Agent
|
Proton persists via Launch Agent.
|
Create or Modify System Process:Launch Agent
|
ThiefQuest installs a launch item using an embedded encrypted launch agent property list template. The plist file is installed in the ~/Library/LaunchAgents/ folder and configured with the path to the persistent binary located in the ~/Library/ folder.
|
Create or Modify System Process:Systemd Service
|
Exaramel for Linux has a hardcoded location under systemd that it uses to achieve persistence if it is running as root.
|
Create or Modify System Process:Systemd Service
|
Fysbis has established persistence using a systemd service.
|
Create or Modify System Process:Systemd Service
|
Hildegard has started a monero service.
|
Create or Modify System Process:Systemd Service
|
Pupy can be used to establish persistence using a systemd service.
|
Create or Modify System Process:Systemd Service
|
It has installed a systemd service script to maintain persistence.
|
Create or Modify System Process:Systemd Service
|
Depending on the Linux distribution and when executing with root permissions, RotaJakiro may install persistence using a .service file under the /lib/systemd/system/ folder.
|
Create or Modify System Process:Systemd Service
|
SysUpdate can copy a script to the user owned /usr/lib/systemd/system/ directory with a symlink mapped to a root owned directory, /etc/ystem/system, in the unit configuration file's ExecStart directive to establish persistence and elevate privileges.
|
Create or Modify System Process:Systemd Service
|
It has established persistence through the creation of a cryptocurrency mining system service using systemctl.
|
Create or Modify System Process:Windows Service
|
During the 2016 Ukraine Electric Power Attack, It used an arbitrary system service to load at system boot for persistence for Industroyer. They also replaced the ImagePath registry value of a Windows service with a new backdoor binary.
|
Create or Modify System Process:Windows Service
|
Anchor can establish persistence by creating a service.
|
Create or Modify System Process:Windows Service
|
AppleJeus can install itself as a service.
|
Create or Modify System Process:Windows Service
|
An It Port 22 malware variant registers itself as a service.
|
Create or Modify System Process:Windows Service
|
It has a tool that creates a new service for persistence.
|
Create or Modify System Process:Windows Service
|
It modified Windows Services to ensure PowerShell scripts were loaded on the system. It also creates a Windows service to establish persistence.
|
Create or Modify System Process:Windows Service
|
It has installed a new Windows service to establish persistence.
|
Create or Modify System Process:Windows Service
|
It modified legitimate Windows services to install malware backdoors. It created the StorSyncSvc service to provide persistence for Cobalt Strike.
|
Create or Modify System Process:Windows Service
|
Attor's dispatcher can establish persistence by registering a new service.
|
Create or Modify System Process:Windows Service
|
AuditCred is installed as a new service on the system.
|
Create or Modify System Process:Windows Service
|
Bankshot can terminate a specific process by its process id.
|
Create or Modify System Process:Windows Service
|
BBSRAT can modify service configurations.
|
Create or Modify System Process:Windows Service
|
Bisonal has been modified to be used as a Windows service.
|
Create or Modify System Process:Windows Service
|
BitPaymer has attempted to install itself as a service to maintain persistence.
|
Create or Modify System Process:Windows Service
|
Black Basta can create a new service to establish persistence.
|
Create or Modify System Process:Windows Service
|
One variant of BlackEnergy creates a new service using either a hard-coded or randomly generated name.
|
Create or Modify System Process:Windows Service
|
It has made their XMRIG payloads persistent as a Windows Service.
|
Create or Modify System Process:Windows Service
|
Briba installs a service pointing to a malicious DLL dropped to disk.
|
Create or Modify System Process:Windows Service
|
It malware installs itself as a service to provide persistence and SYSTEM privileges.
|
Create or Modify System Process:Windows Service
|
Carbon establishes persistence by creating a service and naming it based off the operating system version running on the current machine.
|
Create or Modify System Process:Windows Service
|
Catchamas adds a new service named NetAdapter to establish persistence.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.