id
stringlengths 5
9
| technique
stringlengths 3
43
| subtechniqueid
stringlengths 3
60
⌀ | sentences
stringlengths 1
871
|
---|---|---|---|
t1036.005 | masquerading | legitimateTechnique location | pony has used the adobe reader icon for the downloaded file to look more trustworthy. |
t1036.005 | masquerading | legitimateTechnique location | poseidon group tools attempt to spoof anti-virus processes as a means of self-defense. |
t1036.005 | masquerading | legitimateTechnique location | promethium has disguised malicious installer files by bundling them with legitimate software installers. |
t1036.005 | masquerading | legitimateTechnique location | punchbuggy mimics filenames from systemsystem32 to hide dlls in windir andor temp. |
t1036.005 | masquerading | legitimateTechnique location | pysa has executed a malicious executable by naming it svchost.exe. |
t1036.005 | masquerading | legitimateTechnique location | quadagent used the powershell filenames office365dcomcheck.ps1 and systemdiskclean.ps1. |
t1036.005 | masquerading | legitimateTechnique location | raindrop was installed under names that resembled legitimate windows file and directory names. |
t1036.005 | masquerading | legitimateTechnique location | ramsay has masqueraded as a 7zip installer. |
t1036.005 | masquerading | legitimateTechnique location | rdat has masqueraded as vmware.exe. |
t1036.005 | masquerading | legitimateTechnique location | the remsec loader implements itself with the name security support provider a legitimate windows function. various remsec .exe files mimic legitimate file names used by microsoft symantec kaspersky hewlett-packard and vmware. remsec also disguised malicious modules using similar filenames as custom network encryption software on victims. |
t1036.005 | masquerading | legitimateTechnique location | revil can mimic the names of known executables. |
t1036.005 | masquerading | legitimateTechnique location | rocke has used shell scripts which download mining executables and saves them with the filename java. |
t1036.005 | masquerading | legitimateTechnique location | ryuk has constructed legitimate appearing installation folder paths by calling getwindowsdirectoryw and then inserting a null byte at the fourth character of the path. for windows vista or higher the path would appear as c:userspublic. |
t1036.005 | masquerading | legitimateTechnique location | s-type may save itself as a file named msdtc.exe which is also the name of the legitimate microsoft distributed transaction coordinator service binary. |
t1036.005 | masquerading | legitimateTechnique location | sandworm team has avoided detection by naming a malicious binary explorer.exe. |
t1036.005 | masquerading | legitimateTechnique location | shimratreporter spoofed itself as alphazawgyl_font.exe a specialized unicode font. |
t1036.005 | masquerading | legitimateTechnique location | sibot has downloaded a dll to the c:windowssystem32drivers folder and renamed it with a .sys extension. |
t1036.005 | masquerading | legitimateTechnique location | sidewinder has named malicious files rekeywiz.exe to match the name of a legitimate windows executable. |
t1036.005 | masquerading | legitimateTechnique location | silence has named its backdoor winword.exe. |
t1036.005 | masquerading | legitimateTechnique location | skidmap has created a fake rm binary to replace the legitimate linux binary. |
t1036.005 | masquerading | legitimateTechnique location | slothful media has mimicked the names of known executables such as mediaplayer.exe. |
t1036.005 | masquerading | legitimateTechnique location | sowbug named its tools to masquerade as windows or adobe reader software such as by using the file name adobecms.exe and the directory csidl_appdatamicrosoftsecurity. |
t1036.005 | masquerading | legitimateTechnique location | to establish persistence sslmm identifies the start menu startup directory and drops a link to its own executable disguised as an œoffice start œyahoo talk œmsn gaming z0ne or œmsn talk shortcut. |
t1036.005 | masquerading | legitimateTechnique location | starloader has masqueraded as legitimate software update packages such as adobe acrobat reader and intel. |
t1036.005 | masquerading | legitimateTechnique location | strongpity has been bundled with legitimate software installation files for disguise. |
t1036.005 | masquerading | legitimateTechnique location | sunburst created vbscripts that were named after existing services or folders to blend into legitimate activities. |
t1036.005 | masquerading | legitimateTechnique location | sunspot was identified on disk with a filename of taskhostsvc.exe and it created an encrypted log file at c:windowstempvmware-vmdmp.log. |
t1036.005 | masquerading | legitimateTechnique location | supernova has masqueraded as a legitimate solarwinds dll. |
t1036.005 | masquerading | legitimateTechnique location | the taintedscribe main executable has disguised itself as microsofts narrator. |
t1036.005 | masquerading | legitimateTechnique location | teardrop files had names that resembled legitimate window file and directory names. |
t1036.005 | masquerading | legitimateTechnique location | temp.veles has renamed files to look like legitimate files such as windows update files or schneider electric application files. |
t1036.005 | masquerading | legitimateTechnique location | thiefquest prepends a copy of itself to the beginning of an executable file while maintaining the name of the executable. |
t1036.005 | masquerading | legitimateTechnique location | tropic trooper has hidden payloads in flash directories and fake installer files. |
t1036.005 | masquerading | legitimateTechnique location | unc 2452 renamed a version of adfind to sqlceip.exe or csrss.exe in an attempt to appear as the sql server telemetry client or client service runtime process respectively. |
t1036.005 | masquerading | legitimateTechnique location | ursnif has used strings from legitimate system files and existing folders for its file folder and registry entry names. |
t1036.005 | masquerading | legitimateTechnique location | usbstealer mimics a legitimate russian program called usb disk security. |
t1036.005 | masquerading | legitimateTechnique location | whitefly has named the malicious dll the same name as dlls belonging to legitimate software from various security vendors. |
t1036.005 | masquerading | legitimateTechnique location | a winnti for windows implant file was named aspnet_filter.dll mimicking the legitimate asp.net isapi filter dll with the same name. |
t1036.005 | masquerading | legitimateTechnique location | zlib mimics the resource version information of legitimate realtek semiconductor nvidia or synaptics modules. |
t1037 | boot or logon initialization scripts | null | adversaries may use scripts automatically executed at boot or logon initialization to establish persistence |
t1037 | boot or logon initialization scripts | null | initialization scripts can be used to perform administrative functions which may often execute other programs or send information to an internal logging server |
t1037 | boot or logon initialization scripts | null | look for files added or modified by unusual accounts outside of normal administration duties |
t1037 | boot or logon initialization scripts | null | monitor logon scripts for unusual access by abnormal users or at abnormal times |
t1037 | boot or logon initialization scripts | null | monitor running process for actions that could be indicative of abnormal programs or executables running upon logon |
t1037 | boot or logon initialization scripts | null | windows registry windows registry key creation process process creation command command execution active directory active directory object modification file file creation file file modification |
t1037.004 | boot or logon initialization scripts | rcTechniquescripts | hidden wasp installs reboot persistence by adding itself to etc rc.local. |
t1037.004 | boot or logon initialization scripts | rcTechniquescripts | ikitten adds an entry to the rc.common file for persistence. |
t1037.004 | boot or logon initialization scripts | rcTechniquescripts | install persistence through rc.d services: rc.d etc rc.d'init.dlinux_kill. |
t1037.004 | boot or logon initialization scripts | rcTechniquescripts | backwards compatibility on ubuntu allowed attackers to achieve persistence via rc scripts. |
t1037.004 | boot or logon initialization scripts | rcTechniquescripts | as the malware tries to achieve persistence, hatching triage analysis reports suspicious behavior: œmodifies rc script. |
t1039 | data from network shared drive | null | adversaries may search network shares on computers they have compromised to find files of interest |
t1039 | data from network shared drive | null | data may also be acquired through windows system management tools such as windows management instrumentationt1047 and powershellt1059 |
t1039 | data from network shared drive | null | file file access network share network share access command command execution |
t1039 | data from network shared drive | null | monitor processes and command line arguments for actions that could be taken to collect files from a network share |
t1039 | data from network shared drive | null | remote access tools with built in features may interact directly with the windows api to gather data |
t1039 | data from network shared drive | null | sensitive data can be collected from remote systems via shared network drives host shared directory network file server etc |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | 4h rat has the capability to create a remote shell. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | abk has the ability to use cmd to run a portable executable pe on the compromised host. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | adbupd can run a copy of cmd.exe. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | following exploitation with lowball malware admin@338 actors created a file containing a list of commands to be executed on the compromised computer. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | advstoreshell can create a remote shell and run a given command. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | anchor has used cmd.exe to run its self deletion routine. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | apt1 has used the windows command shell to execute commands and batch scripting to automate execution. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | apt18 uses cmd.exe to execute commands on the victims machine. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | an apt28 loader trojan uses a cmd.exe and batch script to run its payload. the group has also used macros to execute payloads. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | apt29 used cmd.exe to execute commands on remote machines. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | an apt3 downloader uses the windows command cmd.exe c whoami. the group also uses a tool to execute commands on remote computers. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | apt32 has used cmd.exe for execution. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | apt37 has used the command-line interface. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | apt38 has used a command-line tunneler nachocheese to give them shell access to a victims machine. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | apt41 used cmd.exe c to execute commands on remote machines.apt41 used a batch file to install persistence for the cobalt strike beacon loader. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | astaroth spawns a cmd process to execute commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | auditcred can open a reverse shell on the system to execute commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | babyshark has used cmd.exe to execute commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | backconfig can download and run batch files to execute commands on a compromised host. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | adversaries can direct backspace to execute from the command line on infected hosts or have backspace create a reverse shell. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | badnews is capable of executing commands via cmd.exe. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | bandook is capable of spawning a windows command shell. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | bankshot uses the command-line interface to execute arbitrary commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | bazar can launch cmd.exe to perform reconnaissance commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | bbk has the ability to use cmd to run a portable executable pe on the compromised host. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | biscuit has a command to launch a command shell on the system. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | bisonal can launch cmd.exe to execute commands on the system. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | blackcoffee has the capability to create a reverse shell. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | blackmould can run cmd.exe with parameters. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | blindingcan has executed commands via cmd.exe. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | blue mockingbird has used batch script files to automate execution and deployment of payloads. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | bondupdater can read batch commands in a file sent from its c2 server and execute them with cmd.exe. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | bronze butler has used batch scripts and the command-line interface for execution. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | calendar has a command to run cmd.exe to execute commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | carbanak has a command to create a reverse shell. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | cardinal rat can execute commands. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | carrotbat has the ability to execute command line arguments on a compromised host. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | caterpillar webshell can run commands on the compromised asset with cmd functions. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | chimera has used the windows command shell and batch scripts for execution on compromised hosts. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | china chopper's server component is capable of opening a command terminal. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | cmd is used to execute programs and other actions at the command-line interface. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | cobalt group has used a javascript backdoor that is capable of launching cmd.exe to execute shell commands. the group has used an exploit toolkit known as threadkit that launches .bat files. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | cobalt strike uses a command-line interface to interact with systems. |
t1059.003 | command and scripting interpreter | windows Technique command Technique shell | cobian rat can launch a remote command shell interface for executing commands. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.