prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
System Binary Proxy Execution:Odbcconf
|
Bumblebee can use odbcconf.exe to run DLLs on targeted hosts.
|
System Binary Proxy Execution:Odbcconf
|
It has used odbcconf to proxy the execution of malicious DLL files.
|
System Binary Proxy Execution:Regsvcs
|
Agent Tesla has dropped RegAsm.exe onto systems for performing malicious activity.
|
System Binary Proxy Execution:Regsvr32
|
AppleSeed can call regsvr32.exe for execution.
|
System Binary Proxy Execution:Regsvr32
|
It used Regsvr32 to bypass application control techniques.
|
System Binary Proxy Execution:Regsvr32
|
It created a Scheduled Task/Job that used regsvr32.exe to execute a COM scriptlet that dynamically downloaded a backdoor and injected it into memory. The group has also used regsvr32 to run their backdoor.
|
System Binary Proxy Execution:Regsvr32
|
Astaroth can be loaded through regsvr32.exe.
|
System Binary Proxy Execution:Regsvr32
|
It has executed custom-compiled XMRIG miner DLLs using regsvr32.exe.
|
System Binary Proxy Execution:Regsvr32
|
During C0015, the threat actors employed code that used regsvr32 for execution.
|
System Binary Proxy Execution:Regsvr32
|
It has used regsvr32.exe to execute scripts.
|
System Binary Proxy Execution:Regsvr32
|
It has used regsvr32.exe to execute a server variant of Derusbi in victim networks.
|
System Binary Proxy Execution:Regsvr32
|
Derusbi variants have been seen that use Registry persistence to proxy execution through regsvr32.exe.
|
System Binary Proxy Execution:Regsvr32
|
Dridex can use regsvr32.exe to initiate malicious code.
|
System Binary Proxy Execution:Regsvr32
|
Egregor has used regsvr32.exe to execute malicious DLLs.
|
System Binary Proxy Execution:Regsvr32
|
EVILNUM can run a remote scriptlet that drops a file and executes it via regsvr32.exe.
|
System Binary Proxy Execution:Regsvr32
|
HermeticWizard has used regsvr32.exe /s /i to execute malicious payloads.
|
System Binary Proxy Execution:Regsvr32
|
Hi-Zor executes using regsvr32.exe called from the Registry Run Keys / Startup Folder persistence mechanism.
|
System Binary Proxy Execution:Regsvr32
|
It has ensured persistence at system boot by setting the value regsvr32 %path%\ctfmonrn.dll /s.
|
System Binary Proxy Execution:Regsvr32
|
It has executed malware with regsvr32s.
|
System Binary Proxy Execution:Regsvr32
|
Koadic can use Regsvr32 to execute additional payloads.
|
System Binary Proxy Execution:Regsvr32
|
It has used regsvr32 for execution.
|
System Binary Proxy Execution:Regsvr32
|
More_eggs has used regsvr32.exe to execute the malicious DLL.
|
System Binary Proxy Execution:Regsvr32
|
Mori can use regsvr32.exe for DLL execution.
|
System Binary Proxy Execution:Regsvr32
|
During Operation Dream Job, It used regsvr32 to execute malware.
|
System Binary Proxy Execution:Regsvr32
|
Some Orz versions have an embedded DLL known as MockDll that uses Process Hollowing and regsvr32 to execute another payload.
|
System Binary Proxy Execution:Regsvr32
|
QakBot can use Regsvr32 to execute malicious DLLs.
|
System Binary Proxy Execution:Regsvr32
|
Ragnar Locker has used regsvr32.exe to execute components of VirtualBox.
|
System Binary Proxy Execution:Regsvr32
|
RogueRobin uses regsvr32.exe to run a .sct file for execution.
|
System Binary Proxy Execution:Regsvr32
|
Saint Bot has used regsvr32 to execute scripts.
|
System Binary Proxy Execution:Regsvr32
|
Squirrelwaffle has been executed using regsvr32.exe.
|
System Binary Proxy Execution:Regsvr32
|
It has used regsvr32.exe to load malicious DLLs.
|
System Binary Proxy Execution:Regsvr32
|
Valak has used regsvr32.exe to launch malicious DLLs.
|
System Binary Proxy Execution:Regsvr32
|
It has used regsvr32.exe to trigger the execution of a malicious script.
|
System Binary Proxy Execution:Regsvr32
|
Xbash can use regsvr32 for executing scripts.
|
System Binary Proxy Execution:Rundll32
|
During the 2015 Ukraine Electric Power Attack, It used a backdoor which could execute a supplied DLL using rundll32.exe.
|
System Binary Proxy Execution:Rundll32
|
ADVSTORESHELL has used rundll32.exe in a Registry value to establish persistence.
|
System Binary Proxy Execution:Rundll32
|
It configured its payload to inject into the rundll32.exe.
|
System Binary Proxy Execution:Rundll32
|
It executed CHOPSTICK by using rundll32 commands such as rundll32.exe "C:\Windows\twain_64.dll". It also executed a .dll for a first stage dropper using rundll32.exe. An It loader Trojan saved a batch script that uses rundll32 to execute a DLL payload.
|
System Binary Proxy Execution:Rundll32
|
It has a tool that can run DLLs.
|
System Binary Proxy Execution:Rundll32
|
It malware has used rundll32.exe to execute an initial infection process.
|
System Binary Proxy Execution:Rundll32
|
It has used rundll32.exe to execute binaries, scripts, and Control Panel Item files and to execute code via proxy to avoid triggering security tools.
|
System Binary Proxy Execution:Rundll32
|
It has used rundll32.exe to execute a loader.
|
System Binary Proxy Execution:Rundll32
|
Attor's installer plugin can schedule rundll32.exe to load the dispatcher.
|
System Binary Proxy Execution:Rundll32
|
Backdoor.Oldrea can use rundll32 for execution on compromised hosts.
|
System Binary Proxy Execution:Rundll32
|
Bad Rabbit has used rundll32 to launch a malicious DLL as C:Windowsinfpub.dat.
|
System Binary Proxy Execution:Rundll32
|
Bisonal has used rundll32.exe to execute as part of the Registry Run key it adds: HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Run\"vert" = "rundll32.exe c:\windows\temp\pvcu.dll , Qszdez".
|
System Binary Proxy Execution:Rundll32
|
BLINDINGCAN has used Rundll32 to load a malicious DLL.
|
System Binary Proxy Execution:Rundll32
|
It has executed custom-compiled XMRIG miner DLLs using rundll32.exe.
|
System Binary Proxy Execution:Rundll32
|
BoomBox can use RunDLL32 for execution.
|
System Binary Proxy Execution:Rundll32
|
Briba uses rundll32 within Registry Run Keys / Startup Folder entries to execute malicious DLLs.
|
System Binary Proxy Execution:Rundll32
|
Bumblebee has used rundll32 for execution of the loader component.
|
System Binary Proxy Execution:Rundll32
|
During C0015, the threat actors loaded DLLs via rundll32 using the svchost process.
|
System Binary Proxy Execution:Rundll32
|
During C0018, the threat actors used rundll32 to run Mimikatz.
|
System Binary Proxy Execution:Rundll32
|
During C0021, the threat actors used rundll32.exe to execute the Cobalt Strike Beacon loader DLL.
|
System Binary Proxy Execution:Rundll32
|
It installs VNC server software that executes through rundll32.
|
System Binary Proxy Execution:Rundll32
|
Cobalt Strike can use rundll32.exe to load DLL from the command line.
|
System Binary Proxy Execution:Rundll32
|
Comnie uses Rundll32 to load a malicious DLL.
|
System Binary Proxy Execution:Rundll32
|
It uses rundll32 to load various tools on victims, including a lateral movement tool named Vminst, Cobalt Strike, and shellcode.
|
System Binary Proxy Execution:Rundll32
|
CORESHELL is installed via execution of rundll32 with an export named "init" or "InitW."
|
System Binary Proxy Execution:Rundll32
|
The CozyCar dropper copies the system file rundll32.exe to the install location for the malware, then uses the copy of rundll32.exe to load and execute the main CozyCar component.
|
System Binary Proxy Execution:Rundll32
|
DDKONG uses Rundll32 to ensure only a single instance of itself is running at once.
|
System Binary Proxy Execution:Rundll32
|
DEADEYE can use rundll32.exe for execution of living off the land binaries (lolbin) such as SHELL32.DLL.
|
System Binary Proxy Execution:Rundll32
|
Egregor has used rundll32 during execution.
|
System Binary Proxy Execution:Rundll32
|
After copying itself to a DLL file, a variant of Elise calls the DLL file using rundll32.exe.
|
System Binary Proxy Execution:Rundll32
|
Variants of Emissary have used rundll32.exe in Registry values added to establish persistence.
|
System Binary Proxy Execution:Rundll32
|
EnvyScout has the ability to proxy execution of malicious files with Rundll32.
|
System Binary Proxy Execution:Rundll32
|
EVILNUM can execute commands and scripts through rundll32.
|
System Binary Proxy Execution:Rundll32
|
FatDuke can execute via rundll32.
|
System Binary Proxy Execution:Rundll32
|
FELIXROOT uses Rundll32 for executing the dropper program.
|
System Binary Proxy Execution:Rundll32
|
It has used rundll32.exe to execute malware on a compromised network.
|
System Binary Proxy Execution:Rundll32
|
Rundll32.exe is used as a way of executing Flame at the command-line.
|
System Binary Proxy Execution:Rundll32
|
FlawedAmmyy has used rundll32 for execution.
|
System Binary Proxy Execution:Rundll32
|
FunnyDream can use rundll32 for execution of its components.
|
System Binary Proxy Execution:Rundll32
|
It malware has used rundll32 to launch additional malicious components.
|
System Binary Proxy Execution:Rundll32
|
A gh0st RAT variant has used rundll32 for execution.
|
System Binary Proxy Execution:Rundll32
|
GreyEnergy uses PsExec locally in order to execute rundll32.exe at the highest privileges (NTAUTHORITY\SYSTEM).
|
System Binary Proxy Execution:Rundll32
|
It has used rundll32 to load malicious DLLs.
|
System Binary Proxy Execution:Rundll32
|
HermeticWizard has the ability to create a new process using rundll32.
|
System Binary Proxy Execution:Rundll32
|
Heyoka Backdoor can use rundll32.exe to gain execution.
|
System Binary Proxy Execution:Rundll32
|
InvisiMole has used rundll32.exe for execution.
|
System Binary Proxy Execution:Rundll32
|
JHUHUGIT is executed using rundll32.exe.
|
System Binary Proxy Execution:Rundll32
|
It has used rundll32.exe to execute malicious scripts and malware on a victim's network.
|
System Binary Proxy Execution:Rundll32
|
Koadic can use Rundll32 to execute additional payloads.
|
System Binary Proxy Execution:Rundll32
|
KONNI has used Rundll32 to execute its loader for privilege escalation purposes.
|
System Binary Proxy Execution:Rundll32
|
Kwampirs uses rundll32.exe in a Registry value added to establish persistence.
|
System Binary Proxy Execution:Rundll32
|
It has used rundll32 to execute malicious payloads on a compromised host.
|
System Binary Proxy Execution:Rundll32
|
It has used rundll32.exe to execute Koadic stagers.
|
System Binary Proxy Execution:Rundll32
|
It has used rundll32.exe to execute MiniDump from comsvcs.dll when dumping LSASS memory.
|
System Binary Proxy Execution:Rundll32
|
Matryoshka uses rundll32.exe in a Registry Run key value for execution as part of its persistence mechanism.
|
System Binary Proxy Execution:Rundll32
|
MegaCortex has used rundll32.exe to load a DLL for file encryption.
|
System Binary Proxy Execution:Rundll32
|
Mongall can use rundll32.exe for execution.
|
System Binary Proxy Execution:Rundll32
|
Mosquito's launcher uses rundll32.exe in a Registry Key value to start the main backdoor capability.
|
System Binary Proxy Execution:Rundll32
|
It has used malware that leveraged rundll32.exe in a Registry Run key to execute a .dll.
|
System Binary Proxy Execution:Rundll32
|
NativeZone has used rundll32 to execute a malicious DLL.
|
System Binary Proxy Execution:Rundll32
|
NOKKI has used rundll32 for execution.
|
System Binary Proxy Execution:Rundll32
|
NotPetya uses rundll32.exe to install itself on remote systems when accessed via PsExec or wmic.
|
System Binary Proxy Execution:Rundll32
|
During Operation Dream Job, It executed malware with C:\\windows\system32\rundll32.exe "C:\ProgramData\ThumbNail\thumbnail.db", CtrlPanel S-6-81-3811-75432205-060098-6872 0 0 905.
|
System Binary Proxy Execution:Rundll32
|
During Operation Spalax, the threat actors used rundll32.exe to execute malicious installers.
|
System Binary Proxy Execution:Rundll32
|
PcShare has used rundll32.exe for execution.
|
System Binary Proxy Execution:Rundll32
|
PolyglotDuke can be executed using rundll32.exe.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.