text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
HotCroissant has attempted to install a scheduled task named “Java Maintenance64” on startup to establish persistence. | ['T1053.005'] |
ISMInjector creates scheduled tasks to establish persistence. | ['T1053.005'] |
IronNetInjector has used a task XML file named "mssch.xml" to run an IronPython script when a user logs in or when specific system events are created. | ['T1053.005'] |
JHUHUGIT has registered itself as a scheduled task to run each time the current user logs in. | ['T1053.005'] |
JSS Loader has the ability to launch scheduled tasks to establish persistence. | ['T1053.005'] |
Koadic has used scheduled tasks to add persistence. | ['T1053.005'] |
LitePower can create a scheduled task to enable persistence mechanisms. | ['T1053.005'] |
Lokibot embedded the commands "schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I" inside a batch script. | ['T1053.005'] |
Lucifer has established persistence by creating the following scheduled task "schtasks /create /sc minute /mo 1 /tn QQMusic ^ /tr C:Users\%USERPROFILE%\Downloads\spread.exe /F". | ['T1053.005'] |
MCMD can use scheduled tasks for persistence. | ['T1053.005'] |
Machete has created scheduled tasks to maintain Machete's persistence. | ['T1053.005'] |
Machete used scheduled tasks for persistence. | ['T1053.005'] |
Maze has created scheduled tasks using name variants such as "Windows Update Security", "Windows Update Security Patches", and "Google Chrome Security Update", to launch Maze at a specific time. | ['T1053.005'] |
Meteor execution begins from a scheduled task named `Microsoft\Windows\Power Efficiency Diagnostics\AnalyzeAll` and it creates a separate scheduled task called `mstask` to run the wiper only once at 23:55:00. | ['T1053.005'] |
Milan can establish persistence on a targeted host with scheduled tasks. | ['T1053.005'] |
MuddyWater has used scheduled tasks to establish persistence. | ['T1053.005'] |
Mustang Panda has created a scheduled task to execute additional malicious software, as well as maintain persistence. | ['T1053.005'] |
NETWIRE can create a scheduled task to establish persistence. | ['T1053.005'] |
Okrum's installer can attempt to achieve persistence by creating a scheduled task. | ['T1053.005'] |
One persistence mechanism used by CozyCar is to register itself as a scheduled task. | ['T1053.005'] |
OopsIE creates a scheduled task to run itself every three minutes. | ['T1053.005'] |
Operation Wocao has used scheduled tasks to execute malicious PowerShell code on remote systems. | ['T1053.005'] |
PowerSploit's "New-UserPersistenceOption" Persistence argument can be used to establish via a Scheduled Task/Job. | ['T1053.005'] |
Pteranodon schedules tasks to invoke its components in order to establish persistence. | ['T1053.005'] |
QUADAGENT creates a scheduled task to maintain persistence on the victim’s machine. | ['T1053.005'] |
RTM tries to add a scheduled task to establish persistence. | ['T1053.005'] |
RainyDay can use scheduled tasks to achieve persistence. | ['T1053.005'] |
Ramsay can schedule tasks via the Windows COM API to maintain persistence. | ['T1053.005'] |
Rancor launched a scheduled task to gain persistence using the "schtasks /create /sc" command. | ['T1053.005'] |
Remexi utilizes scheduled tasks as a persistence mechanism. | ['T1053.005'] |
RemoteCMD can execute commands remotely by creating a new schedule task on the remote system | ['T1053.005'] |
Ryuk can remotely create a scheduled task to execute itself on a system. | ['T1053.005'] |
SQLRat has created scheduled tasks in "%appdata%\Roaming\Microsoft\Templates\". | ['T1053.005'] |
Saint Bot has created a scheduled task named "Maintenance" to establish persistence. | ['T1053.005'] |
ServHelper contains modules that will use schtasks to carry out malicious operations. | ['T1053.005'] |
SharpStage has a persistence component to write a scheduled task for the payload. | ['T1053.005'] |
Stealth Falcon malware creates a scheduled task entitled “IE Web Cache” to execute a malicious file hourly. | ['T1053.005'] |
Stuxnet schedules a network job to execute two minutes after host infection. | ['T1053.005'] |
TEMP.Veles has used scheduled task XML triggers. | ['T1053.005'] |
Tarrask is able to create “hidden” scheduled tasks for persistence. | ['T1053.005'] |
Tomiris has used `SCHTASKS /CREATE /SC DAILY /TN StartDVL /TR "[path to self]" /ST 10:00` to establish persistence. | ['T1053.005'] |
TrickBot creates a scheduled task on the system that provides persistence. | ['T1053.005'] |
Zebrocy has a command to create a scheduled task for persistence. | ['T1053.005'] |
ccf32 can run on a daily basis using a scheduled task. | ['T1053.005'] |
menuPass has used a script (atexec.py) to execute a command on a target machine via Task Scheduler. | ['T1053.005'] |
schtasks is used to schedule tasks on a Windows system to run at a specific date and time. | ['T1053.005'] |
yty establishes persistence by creating a scheduled task with the command "SchTasks /Create /SC DAILY /TN BigData /TR “ + path_file + “/ST 09:30“". | ['T1053.005'] |
zwShell has used SchTasks for execution. | ['T1053.005'] |
ABK has the ability to inject shellcode into svchost.exe. | ['T1055'] |
APT32 malware has injected a Cobalt Strike beacon into Rundll32.exe. | ['T1055'] |
APT37 injects its malware variant, ROKRAT, into the cmd.exe process. | ['T1055'] |
APT41 malware TIDYELF loaded the main WINTERLOVE component by injecting it into the iexplore.exe process. | ['T1055'] |
Agent Tesla can inject into known, vulnerable binaries on targeted hosts. | ['T1055'] |
Attor's dispatcher can inject itself into running processes to gain higher privileges and to evade detection. | ['T1055'] |
AuditCred can inject code from files to other running processes. | ['T1055'] |
Avenger has the ability to inject shellcode into svchost.exe. | ['T1055'] |
BBK has the ability to inject shellcode into svchost.exe. | ['T1055'] |
Bumblebee can inject code into multiple processes on infected endpoints. | ['T1055'] |
Cardinal RAT injects into a newly spawned process created from a native Windows executable. | ['T1055'] |
Clambling can inject into the `svchost.exe` process for execution. | ['T1055'] |
Cobalt Group has injected code into trusted processes. | ['T1055'] |
Donut includes a subproject "DonutTest" to inject shellcode into a target process. | ['T1055'] |
During Operation Sharpshooter, threat actors leveraged embedded shellcode to inject a downloader into the memory of Word. | ['T1055'] |
During Operation Wocao, threat actors injected code into a selected process, which in turn launches a command as a child process of the original. | ['T1055'] |
Gazer injects its communication module into an Internet accessible process through which it performs C2. | ['T1055'] |
GuLoader has the ability to inject shellcode into a donor processes that is started in a suspended state. GuLoader has previously used RegAsm as a donor process. | ['T1055'] |
HOPLIGHT has injected into running processes. | ['T1055'] |
HiddenWasp adds itself to the LD_PRELOAD path and sets a series of environment variables. | ['T1055'] |
Honeybee uses a batch file to load a DLL into the svchost.exe process. | ['T1055'] |
InvisiMole can inject itself into another process to avoid detection including use of a technique called ListPlanting that customizes the sorting algorithm in a ListView structure. | ['T1055'] |
IronNetInjector can use an IronPython scripts to load a .NET injector to inject a payload into its own or a remote process. | ['T1055'] |
JHUHUGIT performs code injection injecting its own functions to browser processes. | ['T1055'] |
JPIN can inject content into lsass.exe to load a module. | ['T1055'] |
Kimsuky has used Win7Elevate to inject malicious code into explorer.exe. | ['T1055'] |
Lizar can migrate the loader into another process. | ['T1055'] |
Mis-Type has been injected directly into a running process, including `explorer.exe`. | ['T1055'] |
NETWIRE can inject code into system processes including notepad.exe, svchost.exe, and vbc.exe. | ['T1055'] |
NavRAT copies itself into a running Internet Explorer process to evade detection. | ['T1055'] |
PLATINUM has used various methods of process injection including hot patching. | ['T1055'] |
Pandora can start and inject code into a new `svchost` process. | ['T1055'] |
PoshC2 contains multiple modules for injecting into processes, such as "Invoke-PSInject". | ['T1055'] |
QakBot can inject itself into processes including explore.exe, Iexplore.exe, and Mobsync.exe. | ['T1055'] |
REvil can inject itself into running processes on a compromised host. | ['T1055'] |
ROKRAT can use `VirtualAlloc`, `WriteProcessMemory`, and then `CreateRemoteThread` to execute shellcode within the address space of `Notepad.exe`. | ['T1055'] |
SILENTTRINITY can inject shellcode directly into Excel.exe or a specific process. | ['T1055'] |
SLOTHFULMEDIA can inject into running processes on a compromised host. | ['T1055'] |
ShadowPad has injected an install module into a newly created process. | ['T1055'] |
Silence has injected a DLL library containing a Trojan into the fwmain32.exe process. | ['T1055'] |
Smoke Loader injects into the Internet Explorer process. | ['T1055'] |
StoneDrill has relied on injecting its payload directly into the process memory of the victim's preferred browser. | ['T1055'] |
The PcShare payload has been injected into the `logagent.exe` and `rdpclip.exe` processes. | ['T1055'] |
TrickBot has used "Nt*" Native API functions to inject code into legitimate processes such as "wermgr.exe". | ['T1055'] |
Turla has also used PowerSploit's "Invoke-ReflectivePEInjection.ps1" to reflectively load a PowerShell payload into a random process on the victim system. | ['T1055'] |
WarzoneRAT has the ability to inject malicious DLLs into a specific process for privilege escalation. | ['T1055'] |
Waterbear can inject decrypted shellcode into the LanmanServer service. | ['T1055'] |
Wiarp creates a backdoor through which remote attackers can inject files into running processes. | ['T1055'] |
Wingbird performs multiple process injections to hijack system processes and execute malicious code. | ['T1055'] |
gh0st RAT can inject malicious code into process created by the “Command_Create&Inject” function. | ['T1055'] |
injects a malicious DLL into the IExplorer.exe process. | ['T1055'] |
A Lazarus Group malware sample performs reflective DLL injection. | ['T1055.001'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.