text1
stringlengths
7
2.5k
labels
stringlengths
9
100
Maze has gathered all of the running system processes.
['T1057']
Meteor can check if a specific process is running, such as Kaspersky's `avp.exe`.
['T1057']
MobileOrder has a command to upload information about all running processes to its C2 server.
['T1057']
Mosquito runs "tasklist" to obtain running processes.
['T1057']
MuddyWater has used malware to obtain a list of running processes on the system.
['T1057']
NavRAT uses "tasklist /v" to check running processes.
['T1057']
Nebulae can enumerate processes on a target system.
['T1057']
ObliqueRAT can check for blocklisted process names on a compromised host.
['T1057']
OceanSalt can collect the name and ID for every process running on the system.
['T1057']
OilRig has run "tasklist" on a victim's machine.
['T1057']
Orz can gather a process list from the victim.
['T1057']
OutSteel can identify running processes on a compromised host.
['T1057']
P8RAT can check for specific processes associated with virtual environments.
['T1057']
PLAINTEE performs the "tasklist" command to list running processes.
['T1057']
PLEAD has the ability to list processes on the compromised host.
['T1057']
POORAIM can enumerate processes.
['T1057']
POWERSTATS has used "get_tasklist" to discover processes on the compromised host.
['T1057']
POWRUNER may collect process information by running "tasklist" on a victim.
['T1057']
Pandora can monitor processes on a compromised host.
['T1057']
Pasam creates a backdoor through which remote attackers can retrieve lists of running processes.
['T1057']
PcShare can obtain a list of running processes on a compromised host.
['T1057']
Pillowmint can iterate through running processes every six seconds collecting a list of processes to capture from later.
['T1057']
PipeMon can iterate over the running processes to find a suitable injection target.
['T1057']
PlugX has a module to list the processes running on a machine.
['T1057']
PoetRAT has the ability to list all running processes.
['T1057']
PowerDuke has a command to list the victim's processes.
['T1057']
PowerSploit's "Get-ProcessTokenPrivilege" Privesc-PowerUp module can enumerate privileges for a given process.
['T1057']
Proxysvc lists processes running on the system.
['T1057']
Pupy can list the running processes and get the process ID and parent process’s ID.
['T1057']
QakBot has the ability to check running processes.
['T1057']
RATANKBA lists the system’s processes.
['T1057']
ROKRAT can list the current running processes on the system.
['T1057']
RTM can obtain information about process integrity levels.
['T1057']
RainyDay can enumerate processes on a target system.
['T1057']
Ramsay can gather a list of running processes by using Tasklist.
['T1057']
Rising Sun can enumerate all running processes and process information on an infected machine.
['T1057']
Rocke can detect a running process's PID on the infected machine.
['T1057']
RogueRobin checks the running processes for evidence it may be running in a sandbox environment. It specifically enumerates processes for Wireshark and Sysinternals.
['T1057']
Ryuk has called "CreateToolhelp32Snapshot" to enumerate all running processes.
['T1057']
SDBbot can enumerate a list of running processes on a compromised machine.
['T1057']
SHOTPUT has a command to obtain a process listing.
['T1057']
SILENTTRINITY can enumerate processes, including properties to determine if they have the Common Language Runtime (CLR) loaded.
['T1057']
SLOTHFULMEDIA has enumerated processes by ID, name, or privileges.
['T1057']
SUNBURST collected a list of process names that were hashed using a FNV-1a + XOR algorithm to check against similarly-hashed hardcoded blocklists.
['T1057']
SUNSPOT monitored running processes for instances of "MsBuild.exe" by hashing the name of each running process and comparing it to the corresponding value "0x53D525". It also extracted command-line arguments and individual arguments from the running "MsBuild.exe" process to identify the directory path of the Orion software Visual Studio solution.
['T1057']
SYSCON has the ability to use Tasklist to list running processes.
['T1057']
Saint Bot has enumerated running processes on a compromised host to determine if it is running under the process name `dfrgui.exe`.
['T1057']
Seasalt has a command to perform a process listing.
['T1057']
ShadowPad has collected the PID of a malicious process.
['T1057']
ShimRatReporter listed all running processes on the machine.
['T1057']
Sidewinder has used tools to identify running processes on the victim's machine.
['T1057']
Skidmap has monitored critical processes to ensure resiliency.
['T1057']
Socksbot can list all running processes.
['T1057']
SodaMaster can search a list of running processes.
['T1057']
SoreFang can enumerate processes on a victim machine through use of Tasklist.
['T1057']
StrongPity can determine if a user is logged in by checking to see if explorer.exe is running.
['T1057']
Sykipot may gather a list of running processes by running "tasklist /v".
['T1057']
TAINTEDSCRIBE can execute "ProcessList" for process discovery.
['T1057']
TSCookie has the ability to list processes on the infected host.
['T1057']
TajMahal has the ability to identify running processes and associated plugins on an infected host.
['T1057']
Tasklist can be used to discover processes running on a system.
['T1057']
TeamTNT has searched for rival malware and removes it if found. TeamTNT has also searched for running processes containing the strings aliyun or liyun to identify machines running Alibaba Cloud Security tools.
['T1057']
The OsInfo function in Komplex collects a running process list.
['T1057']
The discovery modules used with Duqu can collect information on process details.
['T1057']
ThiefQuest obtains a list of running processes using the function "kill_unwanted".
['T1057']
TrickBot uses module networkDll for process list discovery.
['T1057']
Trojan.Karagany can use Tasklist to collect a list of running tasks.
['T1057']
Tropic Trooper is capable of enumerating the running processes on the system using "pslist".
['T1057']
UBoatRAT can list running processes on the system.
['T1057']
UNC2452 used multiple command-line utilities to enumerate running processes.
['T1057']
USBferry can use "tasklist" to gather information about the process running on the infected system.
['T1057']
Ursnif has gathered information about running processes.
['T1057']
VERMIN can get a list of the processes and running tasks on the system.
['T1057']
WINERACK can enumerate processes.
['T1057']
WarzoneRAT can obtain a list of processes on a compromised host.
['T1057']
Windshift has used malware to enumerate active processes.
['T1057']
Winnti Group looked for a specific process running on infected servers.
['T1057']
Winnti for Windows can check if the explorer.exe process is responsible for calling its install function.
['T1057']
Zebrocy uses the "tasklist" and "wmic process get Capture, ExecutablePath" commands to gather the processes running on the system.
['T1057']
Zeus Panda checks for running processes on the victim’s machine.
['T1057']
Zox has the ability to list processes.
['T1057']
ZxShell has a command, ps, to obtain a listing of processes on the system.
['T1057']
ZxxZ has created a snapshot of running processes using `CreateToolhelp32Snapshot`.
['T1057']
down_new has the ability to list running processes on a compromised host.
['T1057']
gh0st RAT has the capability to list processes.
['T1057']
macOS.OSAMiner has used `ps ax | grep <name> | grep -v grep | ...` and `ps ax | grep -E...` to conduct process discovery.
['T1057']
njRAT can search a list of running processes for Tr.exe.
['T1057']
yty gets an output of running processes using the "tasklist" command.
['T1057']
APT19 downloaded and launched code within a SCT file.
['T1059']
APT28 uses cmd.exe to execute commands and custom backdoors.
['T1059']
APT32 has used COM scriptlets to download Cobalt Strike beacons.
['T1059']
APT34 has used the command-line interface for execution.
['T1059']
APT37 has used Ruby scripts to execute payloads.
['T1059']
APT39 has utilized AutoIt and custom scripts to perform internal reconnaissance.
['T1059']
Astaroth spawns a CMD process to execute commands.
['T1059', 'T1059.003']
BRONZE BUTLER uses the command-line interface.
['T1059']
Bonadan can create bind and reverse shells on the infected system.
['T1059']
CHOPSTICK is capable of performing remote command execution.
['T1059']
Cobalt Group has used a JavaScript backdoor that is capable of launching cmd.exe to execute shell commands.
['T1059']
Denis can launch a remote shell to execute arbitrary commands on the victim’s machine.
['T1059', 'T1059.003']