prompt
stringclasses
508 values
procedure
stringlengths
20
478
System Binary Proxy Execution:Odbcconf
Bumblebee can use odbcconf.exe to run DLLs on targeted hosts.
System Binary Proxy Execution:Odbcconf
It has used odbcconf to proxy the execution of malicious DLL files.
System Binary Proxy Execution:Regsvcs
Agent Tesla has dropped RegAsm.exe onto systems for performing malicious activity.
System Binary Proxy Execution:Regsvr32
AppleSeed can call regsvr32.exe for execution.
System Binary Proxy Execution:Regsvr32
It used Regsvr32 to bypass application control techniques.
System Binary Proxy Execution:Regsvr32
It created a Scheduled Task/Job that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory. The group has also used regsvr32 to run their backdoor.
System Binary Proxy Execution:Regsvr32
Astaroth can be loaded through regsvr32.exe.
System Binary Proxy Execution:Regsvr32
It has executed custom-compiled XMRIG miner DLLs using regsvr32.exe.
System Binary Proxy Execution:Regsvr32
During C0015, the threat actors employed code that used regsvr32 for execution.
System Binary Proxy Execution:Regsvr32
It has used regsvr32.exe to execute scripts.
System Binary Proxy Execution:Regsvr32
It has used regsvr32.exe to execute a server variant of Derusbi in victim networks.
System Binary Proxy Execution:Regsvr32
Derusbi variants have been seen that use Registry persistence to proxy execution through regsvr32.exe.
System Binary Proxy Execution:Regsvr32
Dridex can use regsvr32.exe to initiate malicious code.
System Binary Proxy Execution:Regsvr32
Egregor has used regsvr32.exe to execute malicious DLLs.
System Binary Proxy Execution:Regsvr32
EVILNUM can run a remote scriptlet that drops a file and executes it via regsvr32.exe.
System Binary Proxy Execution:Regsvr32
HermeticWizard has used regsvr32.exe /s /i to execute malicious payloads.
System Binary Proxy Execution:Regsvr32
Hi-Zor executes using regsvr32.exe called from the Registry Run Keys / Startup Folder persistence mechanism.
System Binary Proxy Execution:Regsvr32
It has ensured persistence at system boot by setting the value regsvr32 %path%\ctfmonrn.dll /s.
System Binary Proxy Execution:Regsvr32
It has executed malware with regsvr32s.
System Binary Proxy Execution:Regsvr32
Koadic can use Regsvr32 to execute additional payloads.
System Binary Proxy Execution:Regsvr32
It has used regsvr32 for execution.
System Binary Proxy Execution:Regsvr32
More_eggs has used regsvr32.exe to execute the malicious DLL.
System Binary Proxy Execution:Regsvr32
Mori can use regsvr32.exe for DLL execution.
System Binary Proxy Execution:Regsvr32
During Operation Dream Job, It used regsvr32 to execute malware.
System Binary Proxy Execution:Regsvr32
Some Orz versions have an embedded DLL known as MockDll that uses Process Hollowing and regsvr32 to execute another payload.
System Binary Proxy Execution:Regsvr32
QakBot can use Regsvr32 to execute malicious DLLs.
System Binary Proxy Execution:Regsvr32
Ragnar Locker has used regsvr32.exe to execute components of VirtualBox.
System Binary Proxy Execution:Regsvr32
RogueRobin uses regsvr32.exe to run a .sct file for execution.
System Binary Proxy Execution:Regsvr32
Saint Bot has used regsvr32 to execute scripts.
System Binary Proxy Execution:Regsvr32
Squirrelwaffle has been executed using regsvr32.exe.
System Binary Proxy Execution:Regsvr32
It has used regsvr32.exe to load malicious DLLs.
System Binary Proxy Execution:Regsvr32
Valak has used regsvr32.exe to launch malicious DLLs.
System Binary Proxy Execution:Regsvr32
It has used regsvr32.exe to trigger the execution of a malicious script.
System Binary Proxy Execution:Regsvr32
Xbash can use regsvr32 for executing scripts.
System Binary Proxy Execution:Rundll32
During the 2015 Ukraine Electric Power Attack, It used a backdoor which could execute a supplied DLL using rundll32.exe.
System Binary Proxy Execution:Rundll32
ADVSTORESHELL has used rundll32.exe in a Registry value to establish persistence.
System Binary Proxy Execution:Rundll32
It configured its payload to inject into the rundll32.exe.
System Binary Proxy Execution:Rundll32
It executed CHOPSTICK by using rundll32 commands such as rundll32.exe "C:\Windows\twain_64.dll". It also executed a .dll for a first stage dropper using rundll32.exe. An It loader Trojan saved a batch script that uses rundll32 to execute a DLL payload.
System Binary Proxy Execution:Rundll32
It has a tool that can run DLLs.
System Binary Proxy Execution:Rundll32
It malware has used rundll32.exe to execute an initial infection process.
System Binary Proxy Execution:Rundll32
It has used rundll32.exe to execute binaries, scripts, and Control Panel Item files and to execute code via proxy to avoid triggering security tools.
System Binary Proxy Execution:Rundll32
It has used rundll32.exe to execute a loader.
System Binary Proxy Execution:Rundll32
Attor's installer plugin can schedule rundll32.exe to load the dispatcher.
System Binary Proxy Execution:Rundll32
Backdoor.Oldrea can use rundll32 for execution on compromised hosts.
System Binary Proxy Execution:Rundll32
Bad Rabbit has used rundll32 to launch a malicious DLL as C:Windowsinfpub.dat.
System Binary Proxy Execution:Rundll32
Bisonal has used rundll32.exe to execute as part of the Registry Run key it adds: HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Run\"vert" = "rundll32.exe c:\windows\temp\pvcu.dll , Qszdez".
System Binary Proxy Execution:Rundll32
BLINDINGCAN has used Rundll32 to load a malicious DLL.
System Binary Proxy Execution:Rundll32
It has executed custom-compiled XMRIG miner DLLs using rundll32.exe.
System Binary Proxy Execution:Rundll32
BoomBox can use RunDLL32 for execution.
System Binary Proxy Execution:Rundll32
Briba uses rundll32 within Registry Run Keys / Startup Folder entries to execute malicious DLLs.
System Binary Proxy Execution:Rundll32
Bumblebee has used rundll32 for execution of the loader component.
System Binary Proxy Execution:Rundll32
During C0015, the threat actors loaded DLLs via rundll32 using the svchost process.
System Binary Proxy Execution:Rundll32
During C0018, the threat actors used rundll32 to run Mimikatz.
System Binary Proxy Execution:Rundll32
During C0021, the threat actors used rundll32.exe to execute the Cobalt Strike Beacon loader DLL.
System Binary Proxy Execution:Rundll32
It installs VNC server software that executes through rundll32.
System Binary Proxy Execution:Rundll32
Cobalt Strike can use rundll32.exe to load DLL from the command line.
System Binary Proxy Execution:Rundll32
Comnie uses Rundll32 to load a malicious DLL.
System Binary Proxy Execution:Rundll32
It uses rundll32 to load various tools on victims, including a lateral movement tool named Vminst, Cobalt Strike, and shellcode.
System Binary Proxy Execution:Rundll32
CORESHELL is installed via execution of rundll32 with an export named "init" or "InitW."
System Binary Proxy Execution:Rundll32
The CozyCar dropper copies the system file rundll32.exe to the install location for the malware, then uses the copy of rundll32.exe to load and execute the main CozyCar component.
System Binary Proxy Execution:Rundll32
DDKONG uses Rundll32 to ensure only a single instance of itself is running at once.
System Binary Proxy Execution:Rundll32
DEADEYE can use rundll32.exe for execution of living off the land binaries (lolbin) such as SHELL32.DLL.
System Binary Proxy Execution:Rundll32
Egregor has used rundll32 during execution.
System Binary Proxy Execution:Rundll32
After copying itself to a DLL file, a variant of Elise calls the DLL file using rundll32.exe.
System Binary Proxy Execution:Rundll32
Variants of Emissary have used rundll32.exe in Registry values added to establish persistence.
System Binary Proxy Execution:Rundll32
EnvyScout has the ability to proxy execution of malicious files with Rundll32.
System Binary Proxy Execution:Rundll32
EVILNUM can execute commands and scripts through rundll32.
System Binary Proxy Execution:Rundll32
FatDuke can execute via rundll32.
System Binary Proxy Execution:Rundll32
FELIXROOT uses Rundll32 for executing the dropper program.
System Binary Proxy Execution:Rundll32
It has used rundll32.exe to execute malware on a compromised network.
System Binary Proxy Execution:Rundll32
Rundll32.exe is used as a way of executing Flame at the command-line.
System Binary Proxy Execution:Rundll32
FlawedAmmyy has used rundll32 for execution.
System Binary Proxy Execution:Rundll32
FunnyDream can use rundll32 for execution of its components.
System Binary Proxy Execution:Rundll32
It malware has used rundll32 to launch additional malicious components.
System Binary Proxy Execution:Rundll32
A gh0st RAT variant has used rundll32 for execution.
System Binary Proxy Execution:Rundll32
GreyEnergy uses PsExec locally in order to execute rundll32.exe at the highest privileges (NTAUTHORITY\SYSTEM).
System Binary Proxy Execution:Rundll32
It has used rundll32 to load malicious DLLs.
System Binary Proxy Execution:Rundll32
HermeticWizard has the ability to create a new process using rundll32.
System Binary Proxy Execution:Rundll32
Heyoka Backdoor can use rundll32.exe to gain execution.
System Binary Proxy Execution:Rundll32
InvisiMole has used rundll32.exe for execution.
System Binary Proxy Execution:Rundll32
JHUHUGIT is executed using rundll32.exe.
System Binary Proxy Execution:Rundll32
It has used rundll32.exe to execute malicious scripts and malware on a victim's network.
System Binary Proxy Execution:Rundll32
Koadic can use Rundll32 to execute additional payloads.
System Binary Proxy Execution:Rundll32
KONNI has used Rundll32 to execute its loader for privilege escalation purposes.
System Binary Proxy Execution:Rundll32
Kwampirs uses rundll32.exe in a Registry value added to establish persistence.
System Binary Proxy Execution:Rundll32
It has used rundll32 to execute malicious payloads on a compromised host.
System Binary Proxy Execution:Rundll32
It has used rundll32.exe to execute Koadic stagers.
System Binary Proxy Execution:Rundll32
It has used rundll32.exe to execute MiniDump from comsvcs.dll when dumping LSASS memory.
System Binary Proxy Execution:Rundll32
Matryoshka uses rundll32.exe in a Registry Run key value for execution as part of its persistence mechanism.
System Binary Proxy Execution:Rundll32
MegaCortex has used rundll32.exe to load a DLL for file encryption.
System Binary Proxy Execution:Rundll32
Mongall can use rundll32.exe for execution.
System Binary Proxy Execution:Rundll32
Mosquito's launcher uses rundll32.exe in a Registry Key value to start the main backdoor capability.
System Binary Proxy Execution:Rundll32
It has used malware that leveraged rundll32.exe in a Registry Run key to execute a .dll.
System Binary Proxy Execution:Rundll32
NativeZone has used rundll32 to execute a malicious DLL.
System Binary Proxy Execution:Rundll32
NOKKI has used rundll32 for execution.
System Binary Proxy Execution:Rundll32
NotPetya uses rundll32.exe to install itself on remote systems when accessed via PsExec or wmic.
System Binary Proxy Execution:Rundll32
During Operation Dream Job, It executed malware with C:\\windows\system32\rundll32.exe "C:\ProgramData\ThumbNail\thumbnail.db", CtrlPanel S-6-81-3811-75432205-060098-6872 0 0 905.
System Binary Proxy Execution:Rundll32
During Operation Spalax, the threat actors used rundll32.exe to execute malicious installers.
System Binary Proxy Execution:Rundll32
PcShare has used rundll32.exe for execution.
System Binary Proxy Execution:Rundll32
PolyglotDuke can be executed using rundll32.exe.