text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
TrickBot has the ability to capture RDP credentials by capturing the "CredEnumerateA" API | ['T1056.004'] |
Ursnif has hooked APIs to perform a wide variety of information theft, such as monitoring traffic from browsers. | ['T1056.004'] |
Zebrocy installs an application-defined Windows hook to get notified when a network drive has been attached, so it can then use the hook to call its RecordToFile file stealing method. | ['T1056.004'] |
ZxShell hooks several API functions to spawn system threads. | ['T1056.004'] |
4H RAT has the capability to obtain a listing of running processes (including loaded modules). | ['T1057'] |
APT1 gathered a list of running processes on the system using "tasklist /v". | ['T1057'] |
APT29 has used multiple command-line utilities to enumerate running processes. | ['T1057'] |
APT37's Freenki malware lists running processes using the Microsoft Windows API. | ['T1057'] |
APT38 leveraged Sysmon to understand the processes, services in the organization. | ['T1057'] |
After compromising a victim, Poseidon Group lists all running processes. | ['T1057'] |
An APT28 loader Trojan will enumerate the victim's processes searching for explorer.exe if its current process does not have necessary permissions. | ['T1057'] |
Andariel has used "tasklist" to enumerate processes and find a specific string. | ['T1057'] |
Aria-body has the ability to enumerate loaded modules for a process.. | ['T1057'] |
Astaroth searches for different processes on the system. | ['T1057'] |
Avaddon has collected information about running processes. | ['T1057'] |
Avenger has the ability to use Tasklist to identify running processes. | ['T1057'] |
Azorult can collect a list of running processes by calling CreateToolhelp32Snapshot. | ['T1057'] |
BACKSPACE may collect information about running processes. | ['T1057'] |
BBSRAT can list running processes. | ['T1057'] |
BISCUIT has a command to enumerate running processes and identify their owners. | ['T1057'] |
BLACKCOFFEE has the capability to discover processes. | ['T1057'] |
BLUELIGHT can collect process filenames and SID authority level. | ['T1057'] |
Babuk has the ability to check running processes on a targeted system. | ['T1057'] |
BabyShark has executed the "tasklist" command. | ['T1057'] |
Backdoor.Oldrea collects information about running processes. | ['T1057'] |
Bad Rabbit can enumerate all running processes to compare hashes. | ['T1057'] |
Bankshot identifies processes and collects the process ids. | ['T1057'] |
Bazar can identity the current process on a compromised host. | ['T1057'] |
Bisonal can obtain a list of running processes on the victim’s machine. | ['T1057'] |
BlackEnergy has gathered a process list by using Tasklist.exe. | ['T1057'] |
Brave Prince lists the running processes. | ['T1057'] |
Bundlore has used the "ps" command to list processes. | ['T1057'] |
Cannon can obtain a list of processes running on the system. | ['T1057'] |
Carbanak lists running processes. | ['T1057'] |
Carberp has collected a list of running processes. | ['T1057'] |
Cardinal RAT contains watchdog functionality that ensures its process is always running, else spawns a new instance. | ['T1057'] |
Caterpillar WebShell can gather a list of processes running on the machine. | ['T1057'] |
ChChes collects its process identifier (PID) on the victim. | ['T1057'] |
Chimera has used "tasklist" to enumerate processes. | ['T1057'] |
Clambling can enumerate processes on a targeted system. | ['T1057'] |
Clop can enumerate all processes on the victim's machine. | ['T1057'] |
Cobalt Strike's "beacon" payload can collect information on process details. | ['T1057'] |
Conti can enumerate through all open processes to search for any that have the string “sql” in their process name. | ['T1057'] |
Crimson contains a command to list processes. | ['T1057'] |
Cuba can enumerate processes running on a victim's machine. | ['T1057'] |
DRATzarus can enumerate and examine running processes to determine if a debugger is present. | ['T1057'] |
Dacls can collect data on running and parent processes. | ['T1057'] |
Darkhotel malware can collect a list of running processes on a system. | ['T1057'] |
Derusbi collects current and parent process IDs. | ['T1057'] |
Doki has searched for the current process’s PID. | ['T1057'] |
Donut includes subprojects that enumerate and identify information about Process Injection candidates. | ['T1057'] |
Dtrack’s dropper can list all running processes. | ['T1057'] |
During C0015, the threat actors used the `tasklist /s` command as well as `taskmanager` to obtain a list of running processes. | ['T1057'] |
During Operation Honeybee, the threat actors obtained a list of running processes on a victim machine using `cmd /c tasklist > %temp%\temp.ini`. | ['T1057'] |
During Operation Wocao, the threat actors used `tasklist` to collect a list of running processes on an infected system. | ['T1057'] |
DustySky collects information about running processes from victims. | ['T1057'] |
Elise enumerates processes via the "tasklist" command. | ['T1057'] |
Epic uses the "tasklist /v" command to obtain a list of processes. | ['T1057'] |
EvilBunny has used EnumProcesses() to identify how many process are running in the environment. | ['T1057'] |
FELIXROOT collects a list of running processes. | ['T1057'] |
Flagpro has been used to run the "tasklist" command on a compromised system. | ['T1057'] |
FrameworkPOS can enumerate and exclude selected processes on a compromised host to speed execution of memory scraping. | ['T1057'] |
Frankenstein has enumerated hosts, looking to obtain a list of all currently running processes. | ['T1057'] |
FruitFly has the ability to list processes on the system. | ['T1057'] |
FunnyDream has the ability to discover processes, including `Bka.exe` and `BkavUtil.exe`. | ['T1057'] |
Fysbis can collect information about running processes. | ['T1057'] |
Gamaredon Group has used tools to enumerate processes on target hosts including Process Explorer. | ['T1057'] |
Gelsemium can enumerate running processes. | ['T1057'] |
GeminiDuke collects information on running processes and environment variables from the victim. | ['T1057'] |
Gold Dragon checks the running processes on the victim’s machine. | ['T1057'] |
Goopy has checked for the Google Updater process to ensure Goopy was loaded properly. | ['T1057'] |
Grandoreiro can identify installed security tools based on process names. | ['T1057'] |
HALFBAKED can obtain information about running processes on the victim. | ['T1057'] |
HELLOKITTY can search for specific processes to terminate. | ['T1057'] |
HEXANE has enumerated processes on targeted systems. | ['T1057'] |
Helminth has used Tasklist to get information on processes. | ['T1057'] |
Heyoka Backdoor can gather process information. | ['T1057'] |
Higaisa’s shellcode attempted to find the process ID of the current process. | ['T1057'] |
Honeybee gathers a list of processes using the "tasklist" command and then is sent back to the control server. | ['T1057'] |
Hydraq creates a backdoor through which remote attackers can monitor processes. | ['T1057'] |
Inception has used a reconnaissance module to identify active processes and other associated loaded modules. | ['T1057'] |
InvisiMole can obtain a list of running processes. | ['T1057'] |
IronNetInjector can identify processes via C# methods such as "GetProcessesByName" and running Tasklist with the Python "os.popen" function. | ['T1057'] |
Ixeshe can list running processes. | ['T1057'] |
JHUHUGIT obtains a list of running processes on the victim. | ['T1057'] |
Javali can monitor processes for open browsers and custom banking applications. | ['T1057'] |
KEYMARBLE can obtain a list of running processes on the system. | ['T1057'] |
KONNI has used the command "cmd /c tasklist" to get a snapshot of the current processes on the target machine. | ['T1057'] |
Kasidet has the ability to search for a given process name in processes currently running in the system. | ['T1057'] |
Ke3chang performs process discovery using "tasklist" commands. | ['T1057'] |
Kimsuky can gather a list of all processes running on a victim's machine. | ['T1057'] |
Kinsing has used ps to list processes. | ['T1057'] |
Kwampirs collects a list of running services with the command "tasklist /v". | ['T1057'] |
LookBack can list running processes. | ['T1057'] |
LoudMiner used the "ps" command to monitor the running processes on the system. | ['T1057'] |
Lucifer can identify the process that owns remote connections. | ['T1057'] |
MacMa can enumerate running processes. | ['T1057'] |
Machete has a component to check for running processes to look for web browsers. | ['T1057'] |
Magic Hound malware can list running processes. | ['T1057'] |
MarkiRAT can search for different processes on a system. | ['T1057'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.