prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
|---|---|
Process Discovery
|
Heyoka Backdoor can gather process information.
|
Process Discovery
|
It’s shellcode attempted to find the process ID of the current process.
|
Process Discovery
|
HotCroissant has the ability to list running processes on the infected host.
|
Process Discovery
|
Hydraq creates a backdoor through which remote attackers can monitor processes.
|
Process Discovery
|
iKitten lists the current processes running.
|
Process Discovery
|
Imminent Monitor has a "Process Watcher" feature to monitor processes in case the client ever crashes or gets closed.
|
Process Discovery
|
It has used a reconnaissance module to identify active processes and other associated loaded modules.
|
Process Discovery
|
Industroyer2 has the ability to cyclically enumerate running processes such as PServiceControl.exe, PService_PDD.exe, and other targets supplied through a hardcoded configuration.
|
Process Discovery
|
InvisiMole can obtain a list of running processes.
|
Process Discovery
|
IronNetInjector can identify processes via C# methods such as GetProcessesByName and running Tasklist with the Python os.popen function.
|
Process Discovery
|
Ixeshe can list running processes.
|
Process Discovery
|
Javali can monitor processes for open browsers and custom banking applications.
|
Process Discovery
|
JHUHUGIT obtains a list of running processes on the victim.
|
Process Discovery
|
JPIN can list running processes.
|
Process Discovery
|
jRAT can query and kill system processes.
|
Process Discovery
|
Kasidet has the ability to search for a given process name in processes currently running in the system.
|
Process Discovery
|
Kazuar obtains a list of running processes through WMI querying and the ps command.
|
Process Discovery
|
It performs process discovery using tasklist commands.
|
Process Discovery
|
KEYMARBLE can obtain a list of running processes on the system.
|
Process Discovery
|
KillDisk has called GetCurrentProcess.
|
Process Discovery
|
It can gather a list of all processes running on a victim's machine.
|
Process Discovery
|
Kinsing has used ps to list processes.
|
Process Discovery
|
The OsInfo function in Komplex collects a running process list.
|
Process Discovery
|
KONNI has used the command cmd /c tasklist to get a snapshot of the current processes on the target machine.
|
Process Discovery
|
KOPILUWAK can enumerate current running processes on the targeted machine.
|
Process Discovery
|
Kwampirs collects a list of running services with the command tasklist /v.
|
Process Discovery
|
Several It malware families gather a list of running processes on a victim system and send it to their C2 server. A Destover-like variant used by It also gathers process times.
|
Process Discovery
|
Linfo creates a backdoor through which remote attackers can retrieve a list of running processes.
|
Process Discovery
|
Lizar has a plugin designed to obtain a list of processes.
|
Process Discovery
|
LookBack can list running processes.
|
Process Discovery
|
LoudMiner used the ps command to monitor the running processes on the system.
|
Process Discovery
|
Lucifer can identify the process that owns remote connections.
|
Process Discovery
|
It has a component to check for running processes to look for web browsers.
|
Process Discovery
|
MacMa can enumerate running processes.
|
Process Discovery
|
macOS.OSAMiner has used ps ax | grep <name> | grep -v grep | ... and ps ax | grep -E... to conduct process discovery.
|
Process Discovery
|
Mafalda can enumerate running processes on a machine.
|
Process Discovery
|
It malware can list running processes.
|
Process Discovery
|
MarkiRAT can search for different processes on a system.
|
Process Discovery
|
Maze has gathered all of the running system processes.
|
Process Discovery
|
metaMain can enumerate the processes that run on the platform.
|
Process Discovery
|
Metamorfo has performed process name checks and has monitored applications.
|
Process Discovery
|
Meteor can check if a specific process is running, such as Kaspersky's avp.exe.
|
Process Discovery
|
MobileOrder has a command to upload information about all running processes to its C2 server.
|
Process Discovery
|
It actors obtained a list of active processes on the victim and sent them to C2 servers.
|
Process Discovery
|
MoonWind has a command to return a list of running processes.
|
Process Discovery
|
Mosquito runs tasklist to obtain running processes.
|
Process Discovery
|
It has used malware to obtain a list of running processes on the system.
|
Process Discovery
|
It has used tasklist /v to determine active process information.
|
Process Discovery
|
NavRAT uses tasklist /v to check running processes.
|
Process Discovery
|
Nebulae can enumerate processes on a target system.
|
Process Discovery
|
NETEAGLE can send process listings over the C2 channel.
|
Process Discovery
|
NETWIRE can discover processes on compromised hosts.
|
Process Discovery
|
NightClub has the ability to use GetWindowThreadProcessId to identify the process behind a specified window.
|
Process Discovery
|
njRAT can search a list of running processes for Tr.exe.
|
Process Discovery
|
ObliqueRAT can check for blocklisted process names on a compromised host.
|
Process Discovery
|
OceanSalt can collect the name and ID for every process running on the system.
|
Process Discovery
|
It has run tasklist on a victim's machine.
|
Process Discovery
|
During Operation CuckooBees, the threat actors used the tasklist command as part of their advanced reconnaissance.
|
Process Discovery
|
During Operation Honeybee, the threat actors obtained a list of running processes on a victim machine using cmd /c tasklist > %temp%\temp.ini.
|
Process Discovery
|
During Operation Wocao, the threat actors used tasklist to collect a list of running processes on an infected system.
|
Process Discovery
|
Orz can gather a process list from the victim.
|
Process Discovery
|
OutSteel can identify running processes on a compromised host.
|
Process Discovery
|
P8RAT can check for specific processes associated with virtual environments.
|
Process Discovery
|
Pandora can monitor processes on a compromised host.
|
Process Discovery
|
Pasam creates a backdoor through which remote attackers can retrieve lists of running processes.
|
Process Discovery
|
PcShare can obtain a list of running processes on a compromised host.
|
Process Discovery
|
Pillowmint can iterate through running processes every six seconds collecting a list of processes to capture from later.
|
Process Discovery
|
PipeMon can iterate over the running processes to find a suitable injection target.
|
Process Discovery
|
PLAINTEE performs the tasklist command to list running processes.
|
Process Discovery
|
PLEAD has the ability to list processes on the compromised host.
|
Process Discovery
|
PlugX has a module to list the processes running on a machine.
|
Process Discovery
|
PoetRAT has the ability to list all running processes.
|
Process Discovery
|
POORAIM can enumerate processes.
|
Process Discovery
|
After compromising a victim, It lists all running processes.
|
Process Discovery
|
PowerDuke has a command to list the victim's processes.
|
Process Discovery
|
PowerShower has the ability to deploy a reconnaissance module to retrieve a list of the active processes.
|
Process Discovery
|
PowerSploit's Get-ProcessTokenPrivilege Privesc-PowerUp module can enumerate privileges for a given process.
|
Process Discovery
|
PowerStallion has been used to monitor process lists.
|
Process Discovery
|
POWERSTATS has used get_tasklist to discover processes on the compromised host.
|
Process Discovery
|
POWRUNER may collect process information by running tasklist on a victim.
|
Process Discovery
|
Proxysvc lists processes running on the system.
|
Process Discovery
|
Pupy can list the running processes and get the process ID and parent process’s ID.
|
Process Discovery
|
QakBot has the ability to check running processes.
|
Process Discovery
|
RainyDay can enumerate processes on a target system.
|
Process Discovery
|
Ramsay can gather a list of running processes by using Tasklist.
|
Process Discovery
|
RATANKBA lists the system’s processes.
|
Process Discovery
|
RCSession can identify processes based on PID.
|
Process Discovery
|
Remsec can obtain a process list from the victim.
|
Process Discovery
|
Rising Sun can enumerate all running processes and process information on an infected machine.
|
Process Discovery
|
It can detect a running process's PID on the infected machine.
|
Process Discovery
|
RogueRobin checks the running processes for evidence it may be running in a sandbox environment. It specifically enumerates processes for Wireshark and Sysinternals.
|
Process Discovery
|
ROKRAT can list the current running processes on the system.
|
Process Discovery
|
RotaJakiro can monitor the /proc/[PID] directory of known RotaJakiro processes as a part of its persistence when executing with non-root permissions. If the process is found dead, it resurrects the process. RotaJakiro processes can be matched to an associated Advisory Lock, in the /proc/locks folder, to ensure it doesn't spawn more than one process.
|
Process Discovery
|
Royal can use GetCurrentProcess to enumerate processes.
|
Process Discovery
|
It can obtain information about process integrity levels.
|
Process Discovery
|
Ryuk has called CreateToolhelp32Snapshot to enumerate all running processes.
|
Process Discovery
|
Saint Bot has enumerated running processes on a compromised host to determine if it is running under the process name dfrgui.exe.
|
Process Discovery
|
Sardonic has the ability to execute the tasklist command.
|
Process Discovery
|
SDBbot can enumerate a list of running processes on a compromised machine.
|
Process Discovery
|
Seasalt has a command to perform a process listing.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.