text1
stringlengths
7
2.5k
labels
stringlengths
9
100
HotCroissant has attempted to install a scheduled task named “Java Maintenance64” on startup to establish persistence.
['T1053.005']
ISMInjector creates scheduled tasks to establish persistence.
['T1053.005']
IronNetInjector has used a task XML file named "mssch.xml" to run an IronPython script when a user logs in or when specific system events are created.
['T1053.005']
JHUHUGIT has registered itself as a scheduled task to run each time the current user logs in.
['T1053.005']
JSS Loader has the ability to launch scheduled tasks to establish persistence.
['T1053.005']
Koadic has used scheduled tasks to add persistence.
['T1053.005']
LitePower can create a scheduled task to enable persistence mechanisms.
['T1053.005']
Lokibot embedded the commands "schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I" inside a batch script.
['T1053.005']
Lucifer has established persistence by creating the following scheduled task "schtasks /create /sc minute /mo 1 /tn QQMusic ^ /tr C:Users\%USERPROFILE%\Downloads\spread.exe /F".
['T1053.005']
MCMD can use scheduled tasks for persistence.
['T1053.005']
Machete has created scheduled tasks to maintain Machete's persistence.
['T1053.005']
Machete used scheduled tasks for persistence.
['T1053.005']
Maze has created scheduled tasks using name variants such as "Windows Update Security", "Windows Update Security Patches", and "Google Chrome Security Update", to launch Maze at a specific time.
['T1053.005']
Meteor execution begins from a scheduled task named `Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeAll` and it creates a separate scheduled task called `mstask` to run the wiper only once at 23:55:00.
['T1053.005']
Milan can establish persistence on a targeted host with scheduled tasks.
['T1053.005']
MuddyWater has used scheduled tasks to establish persistence.
['T1053.005']
Mustang Panda has created a scheduled task to execute additional malicious software, as well as maintain persistence.
['T1053.005']
NETWIRE can create a scheduled task to establish persistence.
['T1053.005']
Okrum's installer can attempt to achieve persistence by creating a scheduled task.
['T1053.005']
One persistence mechanism used by CozyCar is to register itself as a scheduled task.
['T1053.005']
OopsIE creates a scheduled task to run itself every three minutes.
['T1053.005']
Operation Wocao has used scheduled tasks to execute malicious PowerShell code on remote systems.
['T1053.005']
PowerSploit's "New-UserPersistenceOption" Persistence argument can be used to establish via a Scheduled Task/Job.
['T1053.005']
Pteranodon schedules tasks to invoke its components in order to establish persistence.
['T1053.005']
QUADAGENT creates a scheduled task to maintain persistence on the victim’s machine.
['T1053.005']
RTM tries to add a scheduled task to establish persistence.
['T1053.005']
RainyDay can use scheduled tasks to achieve persistence.
['T1053.005']
Ramsay can schedule tasks via the Windows COM API to maintain persistence.
['T1053.005']
Rancor launched a scheduled task to gain persistence using the "schtasks /create /sc" command.
['T1053.005']
Remexi utilizes scheduled tasks as a persistence mechanism.
['T1053.005']
RemoteCMD can execute commands remotely by creating a new schedule task on the remote system
['T1053.005']
Ryuk can remotely create a scheduled task to execute itself on a system.
['T1053.005']
SQLRat has created scheduled tasks in "%appdata%\Roaming\Microsoft\Templates\".
['T1053.005']
Saint Bot has created a scheduled task named "Maintenance" to establish persistence.
['T1053.005']
ServHelper contains modules that will use schtasks to carry out malicious operations.
['T1053.005']
SharpStage has a persistence component to write a scheduled task for the payload.
['T1053.005']
Stealth Falcon malware creates a scheduled task entitled “IE Web Cache” to execute a malicious file hourly.
['T1053.005']
Stuxnet schedules a network job to execute two minutes after host infection.
['T1053.005']
TEMP.Veles has used scheduled task XML triggers.
['T1053.005']
Tarrask is able to create “hidden” scheduled tasks for persistence.
['T1053.005']
Tomiris has used `SCHTASKS /CREATE /SC DAILY /TN StartDVL /TR "[path to self]" /ST 10:00` to establish persistence.
['T1053.005']
TrickBot creates a scheduled task on the system that provides persistence.
['T1053.005']
Zebrocy has a command to create a scheduled task for persistence.
['T1053.005']
ccf32 can run on a daily basis using a scheduled task.
['T1053.005']
menuPass has used a script (atexec.py) to execute a command on a target machine via Task Scheduler.
['T1053.005']
schtasks is used to schedule tasks on a Windows system to run at a specific date and time.
['T1053.005']
yty establishes persistence by creating a scheduled task with the command "SchTasks /Create /SC DAILY /TN BigData /TR “ + path_file + “/ST 09:30“".
['T1053.005']
zwShell has used SchTasks for execution.
['T1053.005']
ABK has the ability to inject shellcode into svchost.exe.
['T1055']
APT32 malware has injected a Cobalt Strike beacon into Rundll32.exe.
['T1055']
APT37 injects its malware variant, ROKRAT, into the cmd.exe process.
['T1055']
APT41 malware TIDYELF loaded the main WINTERLOVE component by injecting it into the iexplore.exe process.
['T1055']
Agent Tesla can inject into known, vulnerable binaries on targeted hosts.
['T1055']
Attor's dispatcher can inject itself into running processes to gain higher privileges and to evade detection.
['T1055']
AuditCred can inject code from files to other running processes.
['T1055']
Avenger has the ability to inject shellcode into svchost.exe.
['T1055']
BBK has the ability to inject shellcode into svchost.exe.
['T1055']
Bumblebee can inject code into multiple processes on infected endpoints.
['T1055']
Cardinal RAT injects into a newly spawned process created from a native Windows executable.
['T1055']
Clambling can inject into the `svchost.exe` process for execution.
['T1055']
Cobalt Group has injected code into trusted processes.
['T1055']
Donut includes a subproject "DonutTest" to inject shellcode into a target process.
['T1055']
During Operation Sharpshooter, threat actors leveraged embedded shellcode to inject a downloader into the memory of Word.
['T1055']
During Operation Wocao, threat actors injected code into a selected process, which in turn launches a command as a child process of the original.
['T1055']
Gazer injects its communication module into an Internet accessible process through which it performs C2.
['T1055']
GuLoader has the ability to inject shellcode into a donor processes that is started in a suspended state. GuLoader has previously used RegAsm as a donor process.
['T1055']
HOPLIGHT has injected into running processes.
['T1055']
HiddenWasp adds itself to the LD_PRELOAD path and sets a series of environment variables.
['T1055']
Honeybee uses a batch file to load a DLL into the svchost.exe process.
['T1055']
InvisiMole can inject itself into another process to avoid detection including use of a technique called ListPlanting that customizes the sorting algorithm in a ListView structure.
['T1055']
IronNetInjector can use an IronPython scripts to load a .NET injector to inject a payload into its own or a remote process.
['T1055']
JHUHUGIT performs code injection injecting its own functions to browser processes.
['T1055']
JPIN can inject content into lsass.exe to load a module.
['T1055']
Kimsuky has used Win7Elevate to inject malicious code into explorer.exe.
['T1055']
Lizar can migrate the loader into another process.
['T1055']
Mis-Type has been injected directly into a running process, including `explorer.exe`.
['T1055']
NETWIRE can inject code into system processes including notepad.exe, svchost.exe, and vbc.exe.
['T1055']
NavRAT copies itself into a running Internet Explorer process to evade detection.
['T1055']
PLATINUM has used various methods of process injection including hot patching.
['T1055']
Pandora can start and inject code into a new `svchost` process.
['T1055']
PoshC2 contains multiple modules for injecting into processes, such as "Invoke-PSInject".
['T1055']
QakBot can inject itself into processes including explore.exe, Iexplore.exe, and Mobsync.exe.
['T1055']
REvil can inject itself into running processes on a compromised host.
['T1055']
ROKRAT can use `VirtualAlloc`, `WriteProcessMemory`, and then `CreateRemoteThread` to execute shellcode within the address space of `Notepad.exe`.
['T1055']
SILENTTRINITY can inject shellcode directly into Excel.exe or a specific process.
['T1055']
SLOTHFULMEDIA can inject into running processes on a compromised host.
['T1055']
ShadowPad has injected an install module into a newly created process.
['T1055']
Silence has injected a DLL library containing a Trojan into the fwmain32.exe process.
['T1055']
Smoke Loader injects into the Internet Explorer process.
['T1055']
StoneDrill has relied on injecting its payload directly into the process memory of the victim's preferred browser.
['T1055']
The PcShare payload has been injected into the `logagent.exe` and `rdpclip.exe` processes.
['T1055']
TrickBot has used "Nt*" Native API functions to inject code into legitimate processes such as "wermgr.exe".
['T1055']
Turla has also used PowerSploit's "Invoke-ReflectivePEInjection.ps1" to reflectively load a PowerShell payload into a random process on the victim system.
['T1055']
WarzoneRAT has the ability to inject malicious DLLs into a specific process for privilege escalation.
['T1055']
Waterbear can inject decrypted shellcode into the LanmanServer service.
['T1055']
Wiarp creates a backdoor through which remote attackers can inject files into running processes.
['T1055']
Wingbird performs multiple process injections to hijack system processes and execute malicious code.
['T1055']
gh0st RAT can inject malicious code into process created by the “Command_Create&Inject” function.
['T1055']
injects a malicious DLL into the IExplorer.exe process.
['T1055']
A Lazarus Group malware sample performs reflective DLL injection.
['T1055.001']