text1
stringlengths
7
2.5k
labels
stringlengths
9
100
TrickBot has the ability to capture RDP credentials by capturing the "CredEnumerateA" API
['T1056.004']
Ursnif has hooked APIs to perform a wide variety of information theft, such as monitoring traffic from browsers.
['T1056.004']
Zebrocy installs an application-defined Windows hook to get notified when a network drive has been attached, so it can then use the hook to call its RecordToFile file stealing method.
['T1056.004']
ZxShell hooks several API functions to spawn system threads.
['T1056.004']
4H RAT has the capability to obtain a listing of running processes (including loaded modules).
['T1057']
APT1 gathered a list of running processes on the system using "tasklist /v".
['T1057']
APT29 has used multiple command-line utilities to enumerate running processes.
['T1057']
APT37's Freenki malware lists running processes using the Microsoft Windows API.
['T1057']
APT38 leveraged Sysmon to understand the processes, services in the organization.
['T1057']
After compromising a victim, Poseidon Group lists all running processes.
['T1057']
An APT28 loader Trojan will enumerate the victim's processes searching for explorer.exe if its current process does not have necessary permissions.
['T1057']
Andariel has used "tasklist" to enumerate processes and find a specific string.
['T1057']
Aria-body has the ability to enumerate loaded modules for a process..
['T1057']
Astaroth searches for different processes on the system.
['T1057']
Avaddon has collected information about running processes.
['T1057']
Avenger has the ability to use Tasklist to identify running processes.
['T1057']
Azorult can collect a list of running processes by calling CreateToolhelp32Snapshot.
['T1057']
BACKSPACE may collect information about running processes.
['T1057']
BBSRAT can list running processes.
['T1057']
BISCUIT has a command to enumerate running processes and identify their owners.
['T1057']
BLACKCOFFEE has the capability to discover processes.
['T1057']
BLUELIGHT can collect process filenames and SID authority level.
['T1057']
Babuk has the ability to check running processes on a targeted system.
['T1057']
BabyShark has executed the "tasklist" command.
['T1057']
Backdoor.Oldrea collects information about running processes.
['T1057']
Bad Rabbit can enumerate all running processes to compare hashes.
['T1057']
Bankshot identifies processes and collects the process ids.
['T1057']
Bazar can identity the current process on a compromised host.
['T1057']
Bisonal can obtain a list of running processes on the victim’s machine.
['T1057']
BlackEnergy has gathered a process list by using Tasklist.exe.
['T1057']
Brave Prince lists the running processes.
['T1057']
Bundlore has used the "ps" command to list processes.
['T1057']
Cannon can obtain a list of processes running on the system.
['T1057']
Carbanak lists running processes.
['T1057']
Carberp has collected a list of running processes.
['T1057']
Cardinal RAT contains watchdog functionality that ensures its process is always running, else spawns a new instance.
['T1057']
Caterpillar WebShell can gather a list of processes running on the machine.
['T1057']
ChChes collects its process identifier (PID) on the victim.
['T1057']
Chimera has used "tasklist" to enumerate processes.
['T1057']
Clambling can enumerate processes on a targeted system.
['T1057']
Clop can enumerate all processes on the victim's machine.
['T1057']
Cobalt Strike's "beacon" payload can collect information on process details.
['T1057']
Conti can enumerate through all open processes to search for any that have the string “sql” in their process name.
['T1057']
Crimson contains a command to list processes.
['T1057']
Cuba can enumerate processes running on a victim's machine.
['T1057']
DRATzarus can enumerate and examine running processes to determine if a debugger is present.
['T1057']
Dacls can collect data on running and parent processes.
['T1057']
Darkhotel malware can collect a list of running processes on a system.
['T1057']
Derusbi collects current and parent process IDs.
['T1057']
Doki has searched for the current process’s PID.
['T1057']
Donut includes subprojects that enumerate and identify information about Process Injection candidates.
['T1057']
Dtrack’s dropper can list all running processes.
['T1057']
During C0015, the threat actors used the `tasklist /s` command as well as `taskmanager` to obtain a list of running processes.
['T1057']
During Operation Honeybee, the threat actors obtained a list of running processes on a victim machine using `cmd /c tasklist > %temp%\temp.ini`.
['T1057']
During Operation Wocao, the threat actors used `tasklist` to collect a list of running processes on an infected system.
['T1057']
DustySky collects information about running processes from victims.
['T1057']
Elise enumerates processes via the "tasklist" command.
['T1057']
Epic uses the "tasklist /v" command to obtain a list of processes.
['T1057']
EvilBunny has used EnumProcesses() to identify how many process are running in the environment.
['T1057']
FELIXROOT collects a list of running processes.
['T1057']
Flagpro has been used to run the "tasklist" command on a compromised system.
['T1057']
FrameworkPOS can enumerate and exclude selected processes on a compromised host to speed execution of memory scraping.
['T1057']
Frankenstein has enumerated hosts, looking to obtain a list of all currently running processes.
['T1057']
FruitFly has the ability to list processes on the system.
['T1057']
FunnyDream has the ability to discover processes, including `Bka.exe` and `BkavUtil.exe`.
['T1057']
Fysbis can collect information about running processes.
['T1057']
Gamaredon Group has used tools to enumerate processes on target hosts including Process Explorer.
['T1057']
Gelsemium can enumerate running processes.
['T1057']
GeminiDuke collects information on running processes and environment variables from the victim.
['T1057']
Gold Dragon checks the running processes on the victim’s machine.
['T1057']
Goopy has checked for the Google Updater process to ensure Goopy was loaded properly.
['T1057']
Grandoreiro can identify installed security tools based on process names.
['T1057']
HALFBAKED can obtain information about running processes on the victim.
['T1057']
HELLOKITTY can search for specific processes to terminate.
['T1057']
HEXANE has enumerated processes on targeted systems.
['T1057']
Helminth has used Tasklist to get information on processes.
['T1057']
Heyoka Backdoor can gather process information.
['T1057']
Higaisa’s shellcode attempted to find the process ID of the current process.
['T1057']
Honeybee gathers a list of processes using the "tasklist" command and then is sent back to the control server.
['T1057']
Hydraq creates a backdoor through which remote attackers can monitor processes.
['T1057']
Inception has used a reconnaissance module to identify active processes and other associated loaded modules.
['T1057']
InvisiMole can obtain a list of running processes.
['T1057']
IronNetInjector can identify processes via C# methods such as "GetProcessesByName" and running Tasklist with the Python "os.popen" function.
['T1057']
Ixeshe can list running processes.
['T1057']
JHUHUGIT obtains a list of running processes on the victim.
['T1057']
Javali can monitor processes for open browsers and custom banking applications.
['T1057']
KEYMARBLE can obtain a list of running processes on the system.
['T1057']
KONNI has used the command "cmd /c tasklist" to get a snapshot of the current processes on the target machine.
['T1057']
Kasidet has the ability to search for a given process name in processes currently running in the system.
['T1057']
Ke3chang performs process discovery using "tasklist" commands.
['T1057']
Kimsuky can gather a list of all processes running on a victim's machine.
['T1057']
Kinsing has used ps to list processes.
['T1057']
Kwampirs collects a list of running services with the command "tasklist /v".
['T1057']
LookBack can list running processes.
['T1057']
LoudMiner used the "ps" command to monitor the running processes on the system.
['T1057']
Lucifer can identify the process that owns remote connections.
['T1057']
MacMa can enumerate running processes.
['T1057']
Machete has a component to check for running processes to look for web browsers.
['T1057']
Magic Hound malware can list running processes.
['T1057']
MarkiRAT can search for different processes on a system.
['T1057']