prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
Create or Modify System Process:Launch Daemon
|
Dacls can establish persistence via a Launch Daemon.
|
Create or Modify System Process:Launch Daemon
|
Green Lambert can add a plist file in the Library/LaunchDaemons to establish persistence.
|
Create or Modify System Process:Launch Daemon
|
LoudMiner adds plist files with the naming format com.[random_name].plist in the /Library/LaunchDaemons folder with the RunAtLoad and KeepAlive keys set to true.
|
Create or Modify System Process:Launch Daemon
|
If running with root permissions, OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchDaemons.
|
Create or Modify System Process:Launch Daemon
|
When running with root privileges after a Launch Agent is installed, ThiefQuest installs a plist file to the /Library/LaunchDaemons/ folder with the RunAtLoad key set to true establishing persistence as a Launch Daemon.
|
Create or Modify System Process:Launch Daemon
|
XCSSET uses the ssh launchdaemon to elevate privileges, bypass system controls, and enable remote access to the victim.
|
Domain Policy Modification:Group Policy Modification
|
Egregor can modify the GPO to evade detection.
|
Domain Policy Modification:Group Policy Modification
|
Empire can use New-GPOImmediateTask to modify a GPO that will install and execute a malicious Scheduled Task/Job.
|
Domain Policy Modification:Group Policy Modification
|
HermeticWiper has the ability to deploy through an infected system's default domain policy.
|
Domain Policy Modification:Group Policy Modification
|
It has used Group Policy Objects to deploy batch scripts.
|
Domain Policy Modification:Group Policy Modification
|
Meteor can use group policy to push a scheduled task from the AD to all network machines.
|
Domain Policy Modification:Group Policy Modification
|
Prestige has been deployed using the Default Domain Group Policy Object from an Active Directory Domain Controller.
|
Domain Policy Modification:Domain Trust Modification
|
AADInternals can create a backdoor by converting a domain to a federated domain which will be able to authenticate any user across the tenant. AADInternals can also modify DesktopSSO information.
|
Domain Policy Modification:Domain Trust Modification
|
During the SolarWinds Compromise, It changed domain federation trust settings using Azure AD administrative permissions to configure the domain to accept authorization tokens signed by their own SAML signing certificate.
|
Escape to Host
|
Doki’s container was configured to bind the host root directory.
|
Escape to Host
|
Hildegard has used the BOtB tool that can break out of containers.
|
Escape to Host
|
Peirates can gain a reverse shell on a host node by mounting the Kubernetes hostPath.
|
Escape to Host
|
Siloscape maps the host’s C drive to the container by creating a global symbolic link to the host through the calling of NtSetInformationSymbolicLink.
|
Escape to Host
|
It has deployed privileged containers that mount the filesystem of victim machine.
|
Event Triggered Execution
|
Pacu can set up S3 bucket notifications to trigger a malicious Lambda function when a CloudFormation template is uploaded to the bucket. It can also create Lambda functions that trigger upon the creation of users, roles, and groups.
|
Event Triggered Execution:Change Default File Association
|
It has a HWP document stealer module which changes the default program association in the registry to open HWP documents.
|
Event Triggered Execution:Change Default File Association
|
SILENTTRINITY can conduct an image hijack of an .msc file extension as part of its UAC bypass process.
|
Event Triggered Execution:Screensaver
|
Gazer can establish persistence through the system screensaver by configuring it to execute the malware.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
adbupd can use a WMI script to achieve persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has used WMI event subscriptions for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has attempted to use WMI event subscriptions to establish persistence on compromised hosts.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
BADHATCH can use WMI event subscriptions for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has used WMI event subscriptions for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has used WMI for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has established persistence through the use of a WMI event subscription combined with unusual living-off-the-land binaries such as cdb.exe.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
metaMain registered a WMI event subscription consumer called "hard_disk_stat" to establish persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It's custom ORat tool uses a WMI event consumer to maintain persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
During Operation Ghost, It used WMI event subscriptions to establish persistence for malware.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
PoshC2 has the ability to persist on a system using WMI events.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
POSHSPY uses a WMI event subscription to establish persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
POWERTON can use WMI for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
Sardonic can use a WMI event filter to invoke a command-line event consumer to gain persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
SILENTTRINITY can create a WMI Event to execute a payload for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
During the SolarWinds Compromise, It used a WMI event filter to invoke a command-line event consumer at system boot time to launch a backdoor with rundll32.exe.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
TrailBlazer has the ability to use WMI for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has used WMI event filters and consumers to establish persistence.
|
Event Triggered Execution:Unix Shell Configuration Modification
|
Green Lambert can establish persistence on a compromised host through modifying the profile, login, and run command (rc) files associated with the bash, csh, and tcsh shells.
|
Event Triggered Execution:Unix Shell Configuration Modification
|
Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files.
|
Event Triggered Execution:Unix Shell Configuration Modification
|
When executing with non-root level permissions, RotaJakiro can install persistence by adding a command to the .bashrc file that executes a binary in the ${HOME}/.gvfsd/.profile/ folder.
|
Event Triggered Execution:Netsh Helper DLL
|
netsh can be used as a persistence proxy technique to execute a helper DLL when netsh.exe is executed.
|
Event Triggered Execution:Accessibility Features
|
It used sticky-keys to obtain unauthenticated, privileged console access.
|
Event Triggered Execution:Accessibility Features
|
It replaces the Sticky Keys binary C:\Windows\System32\sethc.exe for persistence.
|
Event Triggered Execution:Accessibility Features
|
It leveraged sticky keys to establish persistence.
|
Event Triggered Execution:Accessibility Features
|
It actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence.
|
Event Triggered Execution:Accessibility Features
|
It has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions.
|
Event Triggered Execution:Accessibility Features
|
Empire can leverage WMI debugging to remotely replace binaries like sethc.exe, Utilman.exe, and Magnify.exe with cmd.exe.
|
Event Triggered Execution:Accessibility Features
|
It has used sticky keys to launch a command prompt.
|
Event Triggered Execution:AppCert DLLs
|
PUNCHBUGGY can establish using a AppCertDLLs Registry key.
|
Event Triggered Execution:AppInit DLLs
|
It has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence.
|
Event Triggered Execution:AppInit DLLs
|
Some variants of Cherry Picker use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows "AppInit_DLLs"="pserver32.dll"
|
Event Triggered Execution:AppInit DLLs
|
Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key.
|
Event Triggered Execution:AppInit DLLs
|
If a victim meets certain criteria, T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL, ResN32.dll. It does this by creating the following Registry keys: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs – %APPDATA%\Intel\ResN32.dll and HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs – 0x1.
|
Event Triggered Execution:Application Shimming
|
It has used application shim databases for persistence.
|
Event Triggered Execution:Application Shimming
|
Pillowmint has used a malicious shim database to maintain persistence.
|
Event Triggered Execution:Application Shimming
|
SDBbot has the ability to use application shimming for persistence if it detects it is running as admin on Windows XP or 7, by creating a shim database to patch services.exe.
|
Event Triggered Execution:Application Shimming
|
ShimRat has installed shim databases in the AppPatch folder.
|
Event Triggered Execution:Image File Execution Options Injection
|
SDBbot has the ability to use image file execution options for persistence if it detects it is running with admin privileges on a Windows version newer than Windows 7.
|
Event Triggered Execution:Image File Execution Options Injection
|
SUNBURST created an Image File Execution Options (IFEO) Debugger registry value for the process dllhost.exe to trigger the installation of Cobalt Strike.
|
Event Triggered Execution:Image File Execution Options Injection
|
It has modified and added entries within HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options to maintain persistence.
|
Event Triggered Execution:PowerShell Profile
|
It has used PowerShell profiles to maintain persistence on an infected machine.
|
Event Triggered Execution:Component Object Model Hijacking
|
Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object.
|
Event Triggered Execution:Component Object Model Hijacking
|
It has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload.
|
Event Triggered Execution:Component Object Model Hijacking
|
BBSRAT has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture.
|
Event Triggered Execution:Component Object Model Hijacking
|
ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\Software\Classes\CLSID{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32.
|
Event Triggered Execution:Component Object Model Hijacking
|
Ferocious can use COM hijacking to establish persistence.
|
Event Triggered Execution:Component Object Model Hijacking
|
JHUHUGIT has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}).
|
Event Triggered Execution:Component Object Model Hijacking
|
KONNI has modified ComSysApp service to load the malicious DLL payload.
|
Event Triggered Execution:Component Object Model Hijacking
|
Mosquito uses COM hijacking as a method of persistence.
|
Event Triggered Execution:Component Object Model Hijacking
|
PcShare has created the HKCU\\Software\\Classes\\CLSID\\{42aedc87-2188-41fd-b9a3-0c966feabec1}\\InprocServer32 Registry key for persistence.
|
Event Triggered Execution:Component Object Model Hijacking
|
SILENTTRINITY can add a CLSID key for payload execution through Registry.CurrentUser.CreateSubKey("Software\\Classes\\CLSID\\{" + clsid + "}\\InProcServer32").
|
Event Triggered Execution:Component Object Model Hijacking
|
SVCReady has created the HKEY_CURRENT_USER\Software\Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19} Registry key for persistence.
|
Event Triggered Execution:Component Object Model Hijacking
|
WarzoneRAT can perform COM hijacking by setting the path to itself to the HKCU\Software\Classes\Folder\shell\open\command key with a DelegateExecute parameter.
|
Event Triggered Execution:Installer Packages
|
During AppleJeus's installation process, it uses postinstall scripts to extract a hidden plist from the application's /Resources folder and execute the plist file as a Launch Daemon with elevated permissions.
|
Exploitation for Privilege Escalation
|
It has exploited CVE-2014-4076, CVE-2015-2387, CVE-2015-1701, CVE-2017-0263 to escalate privileges.
|
Exploitation for Privilege Escalation
|
It has exploited CVE-2021-36934 to escalate privileges on a compromised host.
|
Exploitation for Privilege Escalation
|
It has used CVE-2016-7255 to escalate privileges.
|
Exploitation for Privilege Escalation
|
It has used a publicly available exploit for CVE-2017-0213 to escalate privileges on a local system.
|
Exploitation for Privilege Escalation
|
It has exploited CVE-2021-1732 for privilege escalation.
|
Exploitation for Privilege Escalation
|
During C0017, It abused named pipe impersonation for privilege escalation.
|
Exploitation for Privilege Escalation
|
Carberp has exploited multiple Windows vulnerabilities (CVE-2010-2743, CVE-2010-3338, CVE-2010-4398, CVE-2008-1084) and a .NET Runtime Optimization vulnerability for privilege escalation.
|
Exploitation for Privilege Escalation
|
It has used exploits to increase their levels of rights and privileges.
|
Exploitation for Privilege Escalation
|
Cobalt Strike can exploit vulnerabilities such as MS14-058.
|
Exploitation for Privilege Escalation
|
CosmicDuke attempts to exploit privilege escalation vulnerabilities CVE-2010-0232 or CVE-2010-4398.
|
Exploitation for Privilege Escalation
|
Empire can exploit vulnerabilities such as MS16-032 and MS16-135.
|
Exploitation for Privilege Escalation
|
It has used tools to exploit Windows vulnerabilities in order to escalate privileges. The tools targeted CVE-2013-3660, CVE-2011-2005, and CVE-2010-4398, all of which could allow local users to access kernel-level privileges.
|
Exploitation for Privilege Escalation
|
It has exploited the CVE-2016-0167 local vulnerability.
|
Exploitation for Privilege Escalation
|
Hildegard has used the BOtB tool which exploits CVE-2019-5736.
|
Exploitation for Privilege Escalation
|
InvisiMole has exploited CVE-2007-5633 vulnerability in the speedfan.sys driver to obtain kernel mode privileges.
|
Exploitation for Privilege Escalation
|
JHUHUGIT has exploited CVE-2015-1701 and CVE-2015-2387 to escalate privileges.
|
Exploitation for Privilege Escalation
|
It has exploited unpatched vulnerabilities on internally accessible servers including JIRA, GitLab, and Confluence for privilege escalation.
|
Exploitation for Privilege Escalation
|
It has exploited CVE-2021-1732 to execute malware components with elevated rights.
|
Exploitation for Privilege Escalation
|
Pandora can use CVE-2017-15303 to bypass Windows Driver Signature Enforcement (DSE) protection and load its driver.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.