text1
stringlengths
7
2.5k
labels
stringlengths
9
100
After decrypting itself in memory, RARSTONE downloads a DLL file from its C2 server and loads it in the memory space of a hidden Internet Explorer process. This “downloaded” file is actually not dropped onto the system.
['T1055.001']
Aria-body has the ability to inject itself into another process such as rundll32.exe and dllhost.exe.
['T1055.001']
Carberp's bootkit can inject a malicious DLL into the address space of running processes.
['T1055.001']
Carbon has a command to inject code into a process.
['T1055.001']
Duqu will inject itself into different processes to evade detection. The selection of the target process is influenced by the security software that is installed on the system (Duqu will inject into different processes depending on which security suite is installed on the infected host).
['T1055.001']
During C0015, the threat actors used a DLL named `D8B3.dll` that was injected into the Winlogon process.
['T1055.001']
Dyre injects into other processes to load modules.
['T1055.001']
Elise injects DLL files into iexplore.exe.
['T1055.001']
Emissary injects its DLL file into a newly spawned Internet Explorer process.
['T1055.001']
Emotet has been observed injecting in to Explorer.exe and other processes.
['T1055.001']
Gelsemium has the ability to inject DLLs into specific processes.
['T1055.001']
Get2 has the ability to inject DLLs into processes.
['T1055.001']
HIDEDRV injects a DLL for Downdelph into the explorer.exe process.
['T1055.001']
If running in a Windows environment, Kazuar saves a DLL to disk that is injected into the explorer.exe process to execute the payload. Kazuar can also be configured to inject and execute within specific processes.
['T1055.001']
Koadic can perform process injection by using a reflective DLL.
['T1055.001']
Leviathan has utilized techniques like reflective DLL loading to write a DLL into memory and load a shell that provides backdoor access to the victim.
['T1055.001']
Matryoshka uses reflective DLL injection to inject the malicious library and execute the RAT.
['T1055.001']
Maze has injected the malware DLL into a target process.
['T1055.001']
MegaCortex loads "injecthelper.dll" into a newly created "rundll32.exe" process.
['T1055.001']
Metamorfo has injected a malicious DLL into the Windows Media Player process (wmplayer.exe).
['T1055.001']
Mongall can inject a DLL into `rundll32.exe` for execution.
['T1055.001']
PS1 can inject its payload DLL Into memory.
['T1055.001']
PipeMon can inject its modules into various processes using reflective DLL loading.
['T1055.001']
PoisonIvy can inject a malicious DLL into a process.
['T1055.001']
Pupy can migrate into another process using reflective DLL injection.
['T1055.001']
RATANKBA performs a reflective DLL injection using a given pid.
['T1055.001']
Remsec can perform DLL injection.
['T1055.001']
SDBbot has the ability to inject a downloaded DLL into a newly created rundll32.exe process.
['T1055.001']
Saint Bot has injected its DLL component into `EhStorAurhn.exe`.
['T1055.001']
Socksbot creates a suspended svchost process and injects its DLL into it.
['T1055.001']
SombRAT can execute "loadfromfile", "loadfromstorage", and "loadfrommem" to inject a DLL from disk, storage, or memory respectively.
['T1055.001']
Stuxnet injects an entire DLL into an existing, newly created, or preselected trusted process.
['T1055.001']
Sykipot injects itself into running instances of outlook.exe, iexplore.exe, or firefox.exe.
['T1055.001']
Taidoor can perform DLL loading.
['T1055.001']
The Bumblebee loader can support the `Dij` command which gives it the ability to inject DLLs into the memory of other processes.
['T1055.001']
The FunnyDream FilepakMonitor component can inject into the Bka.exe process using the `VirtualAllocEx`, `WriteProcessMemory` and `CreateRemoteThread` APIs to load the DLL component.
['T1055.001']
The Netwalker DLL has been injected reflectively into the memory of a legitimate running process.
['T1055.001']
Tropic Trooper has injected a DLL backdoor into dllhost.exe and svchost.exe.
['T1055.001']
Turla has used Metasploit to perform reflective DLL injection in order to escalate privileges.
['T1055.001']
Wizard Spider has injected malicious DLLs into memory with read, write, and execute permissions.
['T1055.001']
ZxShell is injected into a shared SVCHOST process.
['T1055.001']
Carbanak downloads an executable and injects it directly into a new process.
['T1055.002']
GreyEnergy has a module to inject a PE binary into a remote process.
['T1055.002']
Lizar can execute PE files in the address space of the specified process.
['T1055.002']
Rocke's miner, "TermsHost.exe", evaded defenses by injecting itself into Windows processes, including Notepad.exe.
['T1055.002']
Zeus Panda checks processes on the system and if they meet the necessary requirements, it injects into that process.
['T1055.002']
Gazer performs thread execution hijacking to inject its orchestrator into a running thread from a remote process.
['T1055.003']
Trojan.Karagany can inject a suspended thread of its own process into a new process and initiate via the "ResumeThread" API.
['T1055.003']
Waterbear can use thread injection to inject shellcode into the process of security software.
['T1055.003']
Attor performs the injection by attaching its code into the APC queue using NtQueueApcThread API.
['T1055.004']
Bumblebee can use asynchronous procedure call (APC) injection to execute commands received from C2.
['T1055.004']
Carberp has queued an APC routine to explorer.exe by calling ZwQueueApcThread.
['T1055.004']
FIN8 has injected malicious code into a new svchost.exe process.
['T1055.004']
IcedID has used "ZwQueueApcThread" to inject itself into remote processes.
['T1055.004']
InvisiMole can inject its code into a trusted process via the APC queue.
['T1055.004']
Pillowmint has used the NtQueueApcThread syscall to inject code into svchost.exe.
['T1055.004']
Saint Bot has written its payload into a newly-created `EhStorAuthn.exe` process using `ZwWriteVirtualMemory` and executed it using `NtQueueApcThread` and `ZwAlertResumeThread`.
['T1055.004']
TURNEDUP is capable of injecting code into the APC queue of a created Rundll32 process as part of an "Early Bird injection."
['T1055.004']
Epic has overwritten the function pointer in the extra window memory of Explorer's Shell_TrayWnd in order to execute malicious code in the context of the explorer.exe process.
['T1055.011']
Power Loader overwrites Explorer’s Shell_TrayWnd extra window memory to redirect execution to a NTDLL function that is abused to assemble and execute a return-oriented programming (ROP) chain and create a malicious thread within Explorer.exe.
['T1055.011']
A Threat Group-3390 tool can spawn svchost.exe and inject the payload into that process.
['T1055.012']
Astaroth can create a new process in a suspended state from a targeted legitimate process in order to unmap its memory and replace it with malicious code.
['T1055.012']
Azorult can decrypt the payload into memory, create a new suspended process of itself, then inject a decrypted payload to the new process and resume new process execution.
['T1055.012']
BBSRAT has been seen loaded into msiexec.exe through process hollowing to hide its execution.
['T1055.012']
Bandook has been launched by starting iexplore.exe and replacing it with Bandook's payload.
['T1055.012']
Bazar can inject into a target process including Svchost, Explorer, and cmd using process hollowing.
['T1055.012']
Clambling can execute binaries through process hollowing.
['T1055.012']
Cobalt Strike can use process hollowing for execution.
['T1055.012']
Denis performed process hollowing through the API calls CreateRemoteThread, ResumeThread, and Wow64SetThreadContext.
['T1055.012']
Duqu is capable of loading executable code via process hollowing.
['T1055.012']
Gorgon Group malware can use process hollowing to inject one of its trojans into another process.
['T1055.012']
ISMInjector hollows out a newly created process RegASM.exe and injects its payload into the hollowed process.
['T1055.012']
Kimsuky has used a file injector DLL to spawn a benign process on the victim's system and inject the malicious payload into it via process hollowing.
['T1055.012']
Lokibot has used process hollowing to inject itself into legitimate Windows process.
['T1055.012']
RCSession can launch itself from a hollowed svchost.exe process.
['T1055.012']
Smoke Loader spawns a new copy of c:\windows\syswow64\explorer.exe and then replaces the executable code in memory with malware.
['T1055.012']
Some Orz versions have an embedded DLL known as MockDll that uses process hollowing and Regsvr32 to execute another payload.
['T1055.012']
The NETWIRE payload has been injected into benign Microsoft executables via process hollowing.
['T1055.012']
The Saint Bot loader has used API calls to spawn `MSBuild.exe` in a suspended state before injecting the decrypted Saint Bot binary into it.
['T1055.012']
TrickBot injects into the svchost.exe process.
['T1055.012']
Ursnif has used process hollowing to inject into child processes.
['T1055.012']
WhisperGate has the ability to inject its fourth stage into a suspended process created by the legitimate Windows utility `InstallUtil.exe`.
['T1055.012']
Bazar can inject into a target process using process doppelgänging.
['T1055.013']
Leafminer has used Process Doppelgänging to evade security software while deploying tools on compromised systems.
['T1055.013']
SynAck abuses NTFS transactions to launch and conceal malicious processes.
['T1055.013']
InvisiMole has used ListPlanting to inject code into a trusted process.
['T1055.015']
APT39 has utilized tools to capture mouse movements.
['T1056']
ADVSTORESHELL can perform keylogging.
['T1056.001']
APT28 has used tools to perform keylogging.
['T1056.001']
APT3 has used a keylogging tool that records keystrokes in encrypted files.
['T1056.001']
APT32 has abused the PasswordChangeNotify to monitor for and capture account password changes.
['T1056.001']
APT38 used a Trojan called KEYLIME to capture keystrokes from the victim’s machine.
['T1056.001']
APT39 has used tools for capturing keystrokes.
['T1056.001']
APT41 used a keylogger called GEARSHIFT on a target system.
['T1056.001']
Agent Tesla can log keystrokes on the victim’s machine.
['T1056.001']
Ajax Security Team has used CWoolger and MPK, custom-developed malware, which recorded all keystrokes on an infected system.
['T1056.001']
AppleSeed can use "GetKeyState" and "GetKeyboardState" to capture keystrokes on the victim’s machine.
['T1056.001']
Astaroth logs keystrokes from the victim's machine.
['T1056.001']
BISCUIT can capture keystrokes.
['T1056.001']
BadPatch has a keylogging capability.
['T1056.001']