prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Create or Modify System Process:Windows Service
|
RDAT has created a service when it is installed on the victim machine.
|
Create or Modify System Process:Windows Service
|
Reaver installs itself as a new service.
|
Create or Modify System Process:Windows Service
|
Some Sakula samples install themselves as services for persistence by calling WinExec with the net start argument.
|
Create or Modify System Process:Windows Service
|
Seasalt is capable of installing itself as a service.
|
Create or Modify System Process:Windows Service
|
Shamoon creates a new service named "ntssrv" to execute the payload. Newer versions create the "MaintenaceSrv" and "hdv_725x" services.
|
Create or Modify System Process:Windows Service
|
ShimRat has installed a Windows service to maintain persistence on victim machines.
|
Create or Modify System Process:Windows Service
|
SILENTTRINITY can establish persistence by creating a new service.
|
Create or Modify System Process:Windows Service
|
SLOTHFULMEDIA has created a service on victim machines named "TaskFrame" to establish persistence.
|
Create or Modify System Process:Windows Service
|
STARWHALE has the ability to create the following Windows service to establish persistence on an infected host: sc create Windowscarpstss binpath= "cmd.exe /c cscript.exe c:\\windows\\system32\\w7_1.wsf humpback_whale" start= "auto" obj= "LocalSystem".
|
Create or Modify System Process:Windows Service
|
StreamEx establishes persistence by installing a new service pointing to its DLL and setting the service to auto-start.
|
Create or Modify System Process:Windows Service
|
StrongPity has created new services and modified existing services for persistence.
|
Create or Modify System Process:Windows Service
|
Stuxnet uses a driver registered as a boot start service as the main load-point.
|
Create or Modify System Process:Windows Service
|
SUGARUSH has created a service named Service1 for persistence.
|
Create or Modify System Process:Windows Service
|
SysUpdate can create a service to establish persistence.
|
Create or Modify System Process:Windows Service
|
If running as administrator, TDTESS installs itself as a new service named bmwappushservice to establish persistence.
|
Create or Modify System Process:Windows Service
|
It has used malware that adds cryptocurrency miners as a service.
|
Create or Modify System Process:Windows Service
|
TEARDROP ran as a Windows service from the c:\windows\syswow64 folder.
|
Create or Modify System Process:Windows Service
|
It's malware can create a new service, sometimes naming it after the config information, to gain persistence.
|
Create or Modify System Process:Windows Service
|
ThreatNeedle can run in memory and register its payload as a Windows service.
|
Create or Modify System Process:Windows Service
|
TinyZBot can install as a Windows service for persistence.
|
Create or Modify System Process:Windows Service
|
TrickBot establishes persistence by creating an autostart service that allows it to run whenever the machine boots.
|
Create or Modify System Process:Windows Service
|
It has installed a service pointing to a malicious DLL dropped to disk.
|
Create or Modify System Process:Windows Service
|
TYPEFRAME variants can add malicious DLL modules as new services.TYPEFRAME can also delete services from the victim’s machine.
|
Create or Modify System Process:Windows Service
|
Uroburos has registered a service, typically named WerFaultSvc, to decrypt and find a kernel driver and kernel driver loader to maintain persistence.
|
Create or Modify System Process:Windows Service
|
Ursnif has registered itself as a system service in the Registry for automatic execution at system startup.
|
Create or Modify System Process:Windows Service
|
Volgmer installs a copy of itself in a randomly selected service, then overwrites the ServiceDLL entry in the service's Registry entry. Some Volgmer variants also install .dll files as services with names generated by a list of hard-coded strings.
|
Create or Modify System Process:Windows Service
|
WannaCry creates the service "mssecsvc2.0" with the display name "Microsoft Security Center (2.0) Service."
|
Create or Modify System Process:Windows Service
|
WastedLocker created and established a service that runs until the encryption process is complete.
|
Create or Modify System Process:Windows Service
|
Wiarp creates a backdoor through which remote attackers can create a service.
|
Create or Modify System Process:Windows Service
|
Wingbird uses services.exe to register a new autostart service named "Audit Service" using a copy of the local lsass.exe file.
|
Create or Modify System Process:Windows Service
|
Winnti for Windows sets its DLL file as a new service in the Registry to establish persistence.
|
Create or Modify System Process:Windows Service
|
It has installed TrickBot as a service named ControlServiceA in order to establish persistence.
|
Create or Modify System Process:Windows Service
|
ZeroT can add a new service to ensure PlugX persists on the system when delivered as another payload onto the system.
|
Create or Modify System Process:Windows Service
|
ZLib creates Registry keys to allow itself to run as various services.
|
Create or Modify System Process:Windows Service
|
zwShell has established persistence by adding itself as a new service.
|
Create or Modify System Process:Windows Service
|
ZxShell can create a new service using the service parser function ProcessScCommand.
|
Create or Modify System Process:Launch Daemon
|
AppleJeus has placed a plist file within the LaunchDaemons folder and launched it manually.
|
Create or Modify System Process:Launch Daemon
|
Bundlore can persist via a LaunchDaemon.
|
Create or Modify System Process:Launch Daemon
|
Dacls can establish persistence via a Launch Daemon.
|
Create or Modify System Process:Launch Daemon
|
Green Lambert can add a plist file in the Library/LaunchDaemons to establish persistence.
|
Create or Modify System Process:Launch Daemon
|
LoudMiner adds plist files with the naming format com.[random_name].plist in the /Library/LaunchDaemons folder with the RunAtLoad and KeepAlive keys set to true.
|
Create or Modify System Process:Launch Daemon
|
If running with root permissions, OSX_OCEANLOTUS.D can create a persistence file in the folder /Library/LaunchDaemons.
|
Create or Modify System Process:Launch Daemon
|
When running with root privileges after a Launch Agent is installed, ThiefQuest installs a plist file to the /Library/LaunchDaemons/ folder with the RunAtLoad key set to true establishing persistence as a Launch Daemon.
|
Create or Modify System Process:Launch Daemon
|
XCSSET uses the ssh launchdaemon to elevate privileges, bypass system controls, and enable remote access to the victim.
|
Event Triggered Execution
|
Pacu can set up S3 bucket notifications to trigger a malicious Lambda function when a CloudFormation template is uploaded to the bucket. It can also create Lambda functions that trigger upon the creation of users, roles, and groups.
|
Event Triggered Execution:Change Default File Association
|
It has a HWP document stealer module which changes the default program association in the registry to open HWP documents.
|
Event Triggered Execution:Change Default File Association
|
SILENTTRINITY can conduct an image hijack of an .msc file extension as part of its UAC bypass process.
|
Event Triggered Execution:Screensaver
|
Gazer can establish persistence through the system screensaver by configuring it to execute the malware.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
adbupd can use a WMI script to achieve persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has used WMI event subscriptions for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has attempted to use WMI event subscriptions to establish persistence on compromised hosts.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
BADHATCH can use WMI event subscriptions for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has used mofcomp.exe to establish WMI Event Subscription persistence mechanisms configured from a *.mof file.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has used WMI event subscriptions for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has used WMI for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has established persistence through the use of a WMI event subscription combined with unusual living-off-the-land binaries such as cdb.exe.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
metaMain registered a WMI event subscription consumer called "hard_disk_stat" to establish persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It's custom ORat tool uses a WMI event consumer to maintain persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
During Operation Ghost, It used WMI event subscriptions to establish persistence for malware.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
PoshC2 has the ability to persist on a system using WMI events.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
POSHSPY uses a WMI event subscription to establish persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
POWERTON can use WMI for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
RegDuke can persist using a WMI consumer that is launched every time a process named WINWORD.EXE is started.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
Sardonic can use a WMI event filter to invoke a command-line event consumer to gain persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
SeaDuke uses an event filter in WMI code to execute a previously dropped executable shortly after system startup.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
SILENTTRINITY can create a WMI Event to execute a payload for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
During the SolarWinds Compromise, It used a WMI event filter to invoke a command-line event consumer at system boot time to launch a backdoor with rundll32.exe.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
TrailBlazer has the ability to use WMI for persistence.
|
Event Triggered Execution:Windows Management Instrumentation Event Subscription
|
It has used WMI event filters and consumers to establish persistence.
|
Event Triggered Execution:Unix Shell Configuration Modification
|
Green Lambert can establish persistence on a compromised host through modifying the profile, login, and run command (rc) files associated with the bash, csh, and tcsh shells.
|
Event Triggered Execution:Unix Shell Configuration Modification
|
Linux Rabbit maintains persistence on an infected machine through rc.local and .bashrc files.
|
Event Triggered Execution:Unix Shell Configuration Modification
|
When executing with non-root level permissions, RotaJakiro can install persistence by adding a command to the .bashrc file that executes a binary in the ${HOME}/.gvfsd/.profile/ folder.
|
Event Triggered Execution:Netsh Helper DLL
|
netsh can be used as a persistence proxy technique to execute a helper DLL when netsh.exe is executed.
|
Event Triggered Execution:Accessibility Features
|
It used sticky-keys to obtain unauthenticated, privileged console access.
|
Event Triggered Execution:Accessibility Features
|
It replaces the Sticky Keys binary C:\Windows\System32\sethc.exe for persistence.
|
Event Triggered Execution:Accessibility Features
|
It leveraged sticky keys to establish persistence.
|
Event Triggered Execution:Accessibility Features
|
It actors have been known to use the Sticky Keys replacement within RDP sessions to obtain persistence.
|
Event Triggered Execution:Accessibility Features
|
It has used the sticky-keys technique to bypass the RDP login screen on remote systems during intrusions.
|
Event Triggered Execution:Accessibility Features
|
Empire can leverage WMI debugging to remotely replace binaries like sethc.exe, Utilman.exe, and Magnify.exe with cmd.exe.
|
Event Triggered Execution:Accessibility Features
|
It has used sticky keys to launch a command prompt.
|
Event Triggered Execution:AppCert DLLs
|
PUNCHBUGGY can establish using a AppCertDLLs Registry key.
|
Event Triggered Execution:AppInit DLLs
|
It has used malware to set LoadAppInit_DLLs in the Registry key SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows in order to establish persistence.
|
Event Triggered Execution:AppInit DLLs
|
Some variants of Cherry Picker use AppInit_DLLs to achieve persistence by creating the following Registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows "AppInit_DLLs"="pserver32.dll"
|
Event Triggered Execution:AppInit DLLs
|
Ramsay can insert itself into the address space of other applications using the AppInit DLL Registry key.
|
Event Triggered Execution:AppInit DLLs
|
If a victim meets certain criteria, T9000 uses the AppInit_DLL functionality to achieve persistence by ensuring that every user mode process that is spawned will load its malicious DLL, ResN32.dll. It does this by creating the following Registry keys: HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs – %APPDATA%\Intel\ResN32.dll and HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs – 0x1.
|
Event Triggered Execution:Application Shimming
|
It has used application shim databases for persistence.
|
Event Triggered Execution:Application Shimming
|
Pillowmint has used a malicious shim database to maintain persistence.
|
Event Triggered Execution:Application Shimming
|
SDBbot has the ability to use application shimming for persistence if it detects it is running as admin on Windows XP or 7, by creating a shim database to patch services.exe.
|
Event Triggered Execution:Application Shimming
|
ShimRat has installed shim databases in the AppPatch folder.
|
Event Triggered Execution:Image File Execution Options Injection
|
SDBbot has the ability to use image file execution options for persistence if it detects it is running with admin privileges on a Windows version newer than Windows 7.
|
Event Triggered Execution:Image File Execution Options Injection
|
SUNBURST created an Image File Execution Options (IFEO) Debugger registry value for the process dllhost.exe to trigger the installation of Cobalt Strike.
|
Event Triggered Execution:Image File Execution Options Injection
|
It has modified and added entries within HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options to maintain persistence.
|
Event Triggered Execution:PowerShell Profile
|
It has used PowerShell profiles to maintain persistence on an infected machine.
|
Event Triggered Execution:Component Object Model Hijacking
|
Some variants of ADVSTORESHELL achieve persistence by registering the payload as a Shell Icon Overlay handler COM object.
|
Event Triggered Execution:Component Object Model Hijacking
|
It has used COM hijacking for persistence by replacing the legitimate MMDeviceEnumerator object with a payload.
|
Event Triggered Execution:Component Object Model Hijacking
|
BBSRAT has been seen persisting via COM hijacking through replacement of the COM object for MruPidlList {42aedc87-2188-41fd-b9a3-0c966feabec1} or Microsoft WBEM New Event Subsystem {F3130CDB-AA52-4C3A-AB32-85FFC23AF9C1} depending on the system's CPU architecture.
|
Event Triggered Execution:Component Object Model Hijacking
|
ComRAT samples have been seen which hijack COM objects for persistence by replacing the path to shell32.dll in registry location HKCU\Software\Classes\CLSID{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32.
|
Event Triggered Execution:Component Object Model Hijacking
|
Ferocious can use COM hijacking to establish persistence.
|
Event Triggered Execution:Component Object Model Hijacking
|
JHUHUGIT has used COM hijacking to establish persistence by hijacking a class named MMDeviceEnumerator and also by registering the payload as a Shell Icon Overlay handler COM object ({3543619C-D563-43f7-95EA-4DA7E1CC396A}).
|
Event Triggered Execution:Component Object Model Hijacking
|
KONNI has modified ComSysApp service to load the malicious DLL payload.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.