Trusted Design

TA0005 - Stealth

戦術「Stealth」に関連する攻撃手法(Technique)の一覧です。

Technique ID Name Description
T1006 Direct Volume Access Adversaries may directly access a volume to bypass file access controls and file system monitoring. Windows allows progr…
T1009 Binary Padding Adversaries can use binary padding to add junk data and change the on-disk representation of malware without affecting t…
T1014 Rootkit Adversaries may use rootkits to hide the presence of programs, files, network connections, services, drivers, and other …
T1027 Obfuscated Files or Information Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or other…
T1027.001 Binary Padding Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This can be done w…
T1027.002 Software Packing Adversaries may perform software packing or virtual machine software protection to conceal their code. Software packing …
T1027.003 Steganography Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic tec…
T1027.004 Compile After Delivery Adversaries may attempt to make payloads difficult to discover and analyze by delivering files to victims as uncompiled …
T1027.005 Indicator Removal from Tools Adversaries may remove indicators from tools if they believe their malicious tool was detected, quarantined, or otherwis…
T1027.006 HTML Smuggling Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign HTML…
T1027.007 Dynamic API Resolution Adversaries may obfuscate then dynamically resolve API functions called by their malware in order to conceal malicious f…
T1027.008 Stripped Payloads Adversaries may attempt to make a payload difficult to analyze by removing symbols, strings, and other human readable in…
T1027.009 Embedded Payloads Adversaries may embed payloads within other files to conceal malicious content from defenses. Otherwise seemingly benign…
T1027.010 Command Obfuscation Adversaries may obfuscate content during command execution to impede detection. Command-line obfuscation is a method of …
T1027.011 Fileless Storage Adversaries may store data in "fileless" formats to conceal malicious activity from defenses. Fileless storage can be br…
T1027.012 LNK Icon Smuggling Adversaries may smuggle commands to download malicious payloads past content filters by hiding them within otherwise see…
T1027.013 Encrypted/Encoded File Adversaries may encrypt or encode files to obfuscate strings, bytes, and other specific patterns to impede detection. En…
T1027.014 Polymorphic Code Adversaries may utilize polymorphic code (also known as metamorphic or mutating code) to evade detection. Polymorphic co…
T1027.015 Compression Adversaries may use compression to obfuscate their payloads or files. Compressed file formats such as ZIP, gzip, 7z, and…
T1027.016 Junk Code Insertion Adversaries may use junk code / dead code to obfuscate a malware’s functionality. Junk code is code that either does not…
T1027.017 SVG Smuggling Adversaries may smuggle data and files past content filters by hiding malicious payloads inside of seemingly benign SVG …
T1027.018 Invisible Unicode Adversaries may abuse invisible or non-printing Unicode characters to conceal malicious content within files, scripts, o…
T1036 Masquerading Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/…
T1036.001 Invalid Code Signature Adversaries may attempt to mimic features of valid code signatures to increase the chance of deceiving a user, analyst, …
T1036.002 Right-to-Left Override Adversaries may abuse the right-to-left override (RTLO or RLO) character (U+202E) to disguise a string and/or file name …
T1036.003 Rename Legitimate Utilities Adversaries may rename legitimate / system utilities to try to evade security mechanisms concerning the usage of those u…
T1036.004 Masquerade Task or Service Adversaries may attempt to manipulate the name of a task or service to make it appear legitimate or benign. Tasks/servic…
T1036.005 Match Legitimate Resource Name or Location Adversaries may match or approximate the name or location of legitimate files, Registry keys, or other resources when na…
T1036.006 Space after Filename Adversaries can hide a program's true filetype by changing the extension of a file. With certain file types (specificall…
T1036.007 Double File Extension Adversaries may abuse a double extension in the filename as a means of masquerading the true file type. A file name may …
T1036.008 Masquerade File Type Adversaries may masquerade malicious payloads as legitimate files through changes to the payload's formatting, including…
T1036.009 Break Process Trees An adversary may attempt to evade process tree-based analysis by modifying executed malware's parent process ID (PPID). …
T1036.010 Masquerade Account Name Adversaries may match or approximate the names of legitimate accounts to make newly created ones appear benign. This wil…
T1036.011 Overwrite Process Arguments Adversaries may modify a process's in-memory arguments to change its name in order to appear as a legitimate or benign p…
T1036.012 Browser Fingerprint Adversaries may attempt to blend in with legitimate traffic by spoofing browser and system attributes like operating sys…
T1045 Software Packing Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signatur…
T1054 Indicator Blocking An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. T…
T1055 Process Injection Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileg…
T1055.001 Dynamic-link Library Injection Adversaries may inject dynamic-link libraries (DLLs) into processes in order to evade process-based defenses as well as …
T1055.002 Portable Executable Injection Adversaries may inject portable executables (PE) into processes in order to evade process-based defenses as well as poss…
T1055.003 Thread Execution Hijacking Adversaries may inject malicious code into hijacked processes in order to evade process-based defenses as well as possib…
T1055.004 Asynchronous Procedure Call Adversaries may inject malicious code into processes via the asynchronous procedure call (APC) queue in order to evade p…
T1055.005 Thread Local Storage Adversaries may inject malicious code into processes via thread local storage (TLS) callbacks in order to evade process-…
T1055.008 Ptrace System Calls Adversaries may inject malicious code into processes via ptrace (process trace) system calls in order to evade process-b…
T1055.009 Proc Memory Adversaries may inject malicious code into processes via the /proc filesystem in order to evade process-based defenses a…
T1055.011 Extra Window Memory Injection Adversaries may inject malicious code into process via Extra Window Memory (EWM) in order to evade process-based defense…
T1055.012 Process Hollowing Adversaries may inject malicious code into suspended and hollowed processes in order to evade process-based defenses. Pr…
T1055.013 Process Doppelgänging Adversaries may inject malicious code into process via process doppelgänging in order to evade process-based defenses as…
T1055.014 VDSO Hijacking Adversaries may inject malicious code into processes via VDSO hijacking in order to evade process-based defenses as well…
T1055.015 ListPlanting Adversaries may abuse list-view controls to inject malicious code into hijacked processes in order to evade process-base…
T1064 Scripting **This technique has been deprecated. Please use [Command and Scripting Interpreter](https://attack.mitre.org/techniques…
T1066 Indicator Removal from Tools If a malicious tool is detected and quarantined or otherwise curtailed, an adversary may be able to determine why the ma…
T1070 Indicator Removal Adversaries may selectively delete or modify artifacts generated to reduce indications of their presence and blend in wi…
T1070.001 Clear Windows Event Logs Adversaries may clear Windows Event Logs to hide the activity of an intrusion. Windows Event Logs are a record of a comp…
T1070.002 Clear Linux or Mac System Logs Adversaries may clear system logs to hide evidence of an intrusion. macOS and Linux both keep track of system or user-in…
T1070.003 Clear Command History In addition to clearing system logs, an adversary may clear the command history of a compromised account to conceal the …
T1070.004 File Deletion Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native…
T1070.005 Network Share Connection Removal Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation. Windo…
T1070.006 Timestomp Adversaries may modify file time attributes to hide new files or changes to existing files. Timestomping is a technique …
T1070.007 Clear Network Connection History and Configurations Adversaries may clear or remove evidence of malicious network connections in order to clean up traces of their operation…
T1070.008 Clear Mailbox Data Adversaries may modify mail and mail application data to remove evidence of their activity. Email applications allow use…
T1070.009 Clear Persistence Adversaries may clear artifacts associated with previously established persistence on a host system to remove evidence o…
T1070.010 Relocate Malware Once a payload is delivered, adversaries may reproduce copies of the same malware on the victim system to remove evidenc…
T1073 DLL Side-Loading Programs may specify DLLs that are loaded at runtime. Programs that improperly or vaguely specify a required DLL may be …
T1078 Valid Accounts Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Pri…
T1078.001 Default Accounts Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Pri…
T1078.002 Domain Accounts Adversaries may obtain and abuse credentials of a domain account as a means of gaining Initial Access, Persistence, Priv…
T1078.003 Local Accounts Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privi…
T1078.004 Cloud Accounts Valid accounts in cloud environments may allow adversaries to perform actions to achieve Initial Access, Persistence, Pr…
T1085 Rundll32 The rundll32.exe program can be called to execute an arbitrary binary. Adversaries may take advantage of this functional…
T1088 Bypass User Account Control Windows User Account Control (UAC) allows a program to elevate its privileges to perform a task under administrator-leve…
T1089 Disabling Security Tools Adversaries may disable security tools to avoid possible detection of their tools and activities. This can take the form…
T1093 Process Hollowing Process hollowing occurs when a process is created in a suspended state then its memory is unmapped and replaced with ma…
T1096 NTFS File Attributes Every New Technology File System (NTFS) formatted partition contains a Master File Table (MFT) that maintains a record f…
T1099 Timestomp Adversaries may take actions to hide the deployment of new, or modification of existing files to obfuscate their activit…
T1107 File Deletion Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native…
T1108 Redundant Access **This technique has been deprecated. Please use [Create Account](https://attack.mitre.org/techniques/T1136), [Web Shell…
T1109 Component Firmware Some adversaries may employ sophisticated means to compromise computer components and install malicious firmware that wi…
T1116 Code Signing Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not bee…
T1117 Regsvr32 Regsvr32.exe is a command-line program used to register and unregister object linking and embedding controls, including …
T1118 InstallUtil InstallUtil is a command-line utility that allows for installation and uninstallation of resources by executing specific…
T1121 Regsvcs/Regasm Regsvcs and Regasm are Windows command-line utilities that are used to register .NET Component Object Model (COM) assemb…
T1122 Component Object Model Hijacking The Component Object Model (COM) is a system within Windows to enable interaction between software components through th…
T1126 Network Share Connection Removal Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation. Windo…
T1127 Trusted Developer Utilities Proxy Execution Adversaries may take advantage of trusted developer utilities to proxy execution of malicious payloads. There are many u…
T1127.001 MSBuild Adversaries may use MSBuild to proxy execution of code through a trusted Windows utility. MSBuild.exe (Microsoft Build E…
T1127.002 ClickOnce Adversaries may use ClickOnce applications (.appref-ms and .application files) to proxy execution of code through a trus…
T1127.003 JamPlus Adversaries may use `JamPlus` to proxy the execution of a malicious script. `JamPlus` is a build utility tool for code a…
T1130 Install Root Certificate Root certificates are used in public key cryptography to identify a root certificate authority (CA). When a root certifi…
T1134 Access Token Manipulation Adversaries may modify access tokens to operate under a different user or system security context to perform actions and…
T1134.001 Token Impersonation/Theft Adversaries may duplicate then impersonate another user's existing token to escalate privileges and bypass access contro…
T1134.002 Create Process with Token Adversaries may create a new process with an existing token to escalate privileges and bypass access controls. Processes…
T1134.003 Make and Impersonate Token Adversaries may make new tokens and impersonate users to escalate privileges and bypass access controls. For example, if…
T1134.004 Parent PID Spoofing Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to e…
T1134.005 SID-History Injection Adversaries may use SID-History Injection to escalate privileges and bypass access controls. The Windows security identi…
T1140 Deobfuscate/Decode Files or Information Adversaries may use [Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027) to hide artifacts of an…
T1143 Hidden Window Adversaries may implement hidden windows to conceal malicious activity from the plain sight of users. In some cases, win…
T1144 Gatekeeper Bypass In macOS and OS X, when applications or programs are downloaded from the internet, there is a special attribute set on t…
T1146 Clear Command History In addition to clearing system logs, an adversary may clear the command history of a compromised account to conceal the …
T1147 Hidden Users Every user account in macOS has a userID associated with it. When creating a user, you can specify the userID for that a…
T1148 HISTCONTROL The <code>HISTCONTROL</code> environment variable keeps track of what should be saved by the <code>history</code> comman…
T1149 LC_MAIN Hijacking **This technique has been deprecated and should no longer be used.** As of OS X 10.8, mach-O binaries introduced a new …
T1150 Plist Modification Property list (plist) files contain all of the information that macOS and OS X uses to configure applications and servic…
T1151 Space after Filename Adversaries can hide a program's true filetype by changing the extension of a file. With certain file types (specificall…
T1152 Launchctl Launchctl controls the macOS launchd process which handles things like launch agents and launch daemons, but can execute…
T1158 Hidden Files and Directories To prevent normal users from accidentally changing special files on a system, most operating systems have the concept of…
T1170 Mshta Mshta.exe is a utility that executes Microsoft HTML Applications (HTA). HTA files have the file extension <code>.hta</co…
T1181 Extra Window Memory Injection Before creating a window, graphical Windows-based processes must prescribe to or register a windows class, which stipula…
T1186 Process Doppelgänging Windows Transactional NTFS (TxF) was introduced in Vista as a method to perform safe file operations. (Citation: Microso…
T1191 CMSTP The Microsoft Connection Manager Profile Installer (CMSTP.exe) is a command-line program used to install Connection Mana…
T1196 Control Panel Items Windows Control Panel items are utilities that allow users to view and adjust computer settings. Control Panel items are…
T1197 BITS Jobs Adversaries may abuse BITS jobs to persistently execute code and perform various background tasks. Windows Background In…
T1198 SIP and Trust Provider Hijacking In user mode, Windows Authenticode (Citation: Microsoft Authenticode) digital signatures are used to verify a file's ori…
T1202 Indirect Command Execution Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of c…
T1205 Traffic Signaling Adversaries may use traffic signaling to hide open ports or other malicious functionality used for persistence or comman…
T1205.001 Port Knocking Adversaries may use port knocking to hide open ports used for persistence or command and control. To enable a port, an a…
T1205.002 Socket Filters Adversaries may attach filters to a network socket to monitor then activate backdoors used for persistence or command an…
T1211 Exploitation for Stealth Adversaries may exploit vulnerabilities to evade detection by hiding activity, suppressing logging, or operating within …
T1216 System Script Proxy Execution Adversaries may use trusted scripts, often signed with certificates, to proxy the execution of malicious files. Several …
T1216.001 PubPrn Adversaries may use PubPrn to proxy execution of malicious remote files. PubPrn.vbs is a [Visual Basic](https://attack.m…
T1216.002 SyncAppvPublishingServer Adversaries may abuse SyncAppvPublishingServer.vbs to proxy execution of malicious [PowerShell](https://attack.mitre.org…
T1218 System Binary Proxy Execution Adversaries may bypass process and/or signature-based defenses by proxying execution of malicious content with signed, o…
T1218.001 Compiled HTML File Adversaries may abuse Compiled HTML files (.chm) to conceal malicious code. CHM files are commonly distributed as part o…
T1218.002 Control Panel Adversaries may abuse control.exe to proxy execution of malicious payloads. The Windows Control Panel process binary (co…
T1218.003 CMSTP Adversaries may abuse CMSTP to proxy execution of malicious code. The Microsoft Connection Manager Profile Installer (CM…
T1218.004 InstallUtil Adversaries may use InstallUtil to proxy execution of code through a trusted Windows utility. InstallUtil is a command-l…
T1218.005 Mshta Adversaries may abuse mshta.exe to proxy execution of malicious .hta files and Javascript or VBScript through a trusted …
T1218.007 Msiexec Adversaries may abuse msiexec.exe to proxy execution of malicious payloads. Msiexec.exe is the command-line utility for …
T1218.008 Odbcconf Adversaries may abuse odbcconf.exe to proxy execution of malicious payloads. Odbcconf.exe is a Windows utility that allo…
T1218.009 Regsvcs/Regasm Adversaries may abuse Regsvcs and Regasm to proxy execution of code through a trusted Windows utility. Regsvcs and Regas…
T1218.010 Regsvr32 Adversaries may abuse Regsvr32.exe to proxy execution of malicious code. Regsvr32.exe is a command-line program used to …
T1218.011 Rundll32 Adversaries may abuse rundll32.exe to proxy execution of malicious code. Using rundll32.exe, vice executing directly (i.…
T1218.012 Verclsid Adversaries may abuse verclsid.exe to proxy execution of malicious code. Verclsid.exe is known as the Extension CLSID Ve…
T1218.013 Mavinject Adversaries may abuse mavinject.exe to proxy execution of malicious code. Mavinject.exe is the Microsoft Application Vir…
T1218.014 MMC Adversaries may abuse mmc.exe to proxy execution of malicious .msc files. Microsoft Management Console (MMC) is a binary…
T1218.015 Electron Applications Adversaries may abuse components of the Electron framework to execute malicious code. The Electron framework hosts many …
T1220 XSL Script Processing Adversaries may bypass application control and obscure execution of code by embedding scripts inside XSL files. Extensib…
T1221 Template Injection Adversaries may create or modify references in user document templates to conceal malicious code or force authentication…
T1223 Compiled HTML File Compiled HTML files (.chm) are commonly distributed as part of the Microsoft HTML Help system. CHM files are compressed …
T1480 Execution Guardrails Adversaries may use execution guardrails to constrain execution or actions based on adversary supplied and environment s…
T1480.001 Environmental Keying Adversaries may environmentally key payloads or other features of malware to evade defenses and constraint execution to …
T1480.002 Mutual Exclusion Adversaries may constrain execution or actions based on the presence of a mutex associated with malware. A mutex is a lo…
T1497 Virtualization/Sandbox Evasion Adversaries may employ various means to detect and avoid virtualization and analysis environments. This may include chan…
T1497.001 System Checks Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may incl…
T1497.002 User Activity Based Checks Adversaries may employ various user activity checks to detect and avoid virtualization and analysis environments. This m…
T1497.003 Time Based Checks Adversaries may employ various time-based methods to detect virtualization and analysis environments, particularly those…
T1500 Compile After Delivery Adversaries may attempt to make payloads difficult to discover and analyze by delivering files to victims as uncompiled …
T1502 Parent PID Spoofing Adversaries may spoof the parent process identifier (PPID) of a new process to evade process-monitoring defenses or to e…
T1506 Web Session Cookie Adversaries can use stolen session cookies to authenticate to web applications and services. This technique bypasses som…
T1527 Application Access Token Adversaries may use application access tokens to bypass the typical authentication process and access restricted account…
T1535 Unused/Unsupported Cloud Regions Adversaries may create cloud instances in unused geographic service regions in order to evade detection. Access is usual…
T1536 Revert Cloud Instance An adversary may revert changes made to a cloud instance after they have performed malicious activities in attempt to ev…
T1542 Pre-OS Boot Adversaries may abuse Pre-OS Boot mechanisms as a way to establish persistence on a system. During the booting process o…
T1542.001 System Firmware Adversaries may modify system firmware to persist on systems.The BIOS (Basic Input/Output System) and The Unified Extens…
T1542.002 Component Firmware Adversaries may modify component firmware to persist on systems. Some adversaries may employ sophisticated means to comp…
T1542.003 Bootkit Adversaries may use bootkits to persist on systems. A bootkit is a malware variant that modifies the boot sectors of a h…
T1542.004 ROMMONkit Adversaries may abuse the ROM Monitor (ROMMON) by loading an unauthorized firmware with adversary code to provide persis…
T1542.005 TFTP Boot Adversaries may abuse netbooting to load an unauthorized network device operating system from a Trivial File Transfer Pr…
T1562 Impair Defenses Adversaries may maliciously modify components of a victim environment in order to hinder or disable defensive mechanisms…
T1562.001 Disable or Modify Tools Adversaries may modify and/or disable security tools to avoid possible detection of their malware/tools and activities. …
T1562.002 Disable Windows Event Logging Adversaries may disable Windows event logging to limit data that can be leveraged for detections and audits. Windows eve…
T1562.003 Impair Command History Logging Adversaries may impair command history logging to hide commands they run on a compromised system. Various command interp…
T1562.004 Disable or Modify System Firewall Adversaries may disable or modify system firewalls in order to bypass controls limiting network usage. Changes could be …
T1562.006 Indicator Blocking An adversary may attempt to block indicators or events typically captured by sensors from being gathered and analyzed. T…
T1562.007 Disable or Modify Cloud Firewall Adversaries may disable or modify a firewall within a cloud environment to bypass controls that limit access to cloud re…
T1562.008 Disable or Modify Cloud Logs An adversary may disable or modify cloud logging capabilities and integrations to limit what data is collected on their …
T1562.009 Safe Mode Boot Adversaries may abuse Windows safe mode to disable endpoint defenses. Safe mode starts up the Windows operating system w…
T1562.010 Downgrade Attack Adversaries may downgrade or use a version of system features that may be outdated, vulnerable, and/or does not support …
T1562.011 Spoof Security Alerting Adversaries may spoof security alerting from tools, presenting false evidence to impair defenders’ awareness of maliciou…
T1562.012 Disable or Modify Linux Audit System Adversaries may disable or modify the Linux audit system to hide malicious activity and avoid detection. Linux admins us…
T1562.013 Disable or Modify Network Device Firewall Adversaries may disable network device-based firewall mechanisms entirely or add, delete, or modify particular rules in …
T1564 Hide Artifacts Adversaries may attempt to hide artifacts associated with their behaviors to evade detection. Operating systems may have…
T1564.001 Hidden Files and Directories Adversaries may set files and directories to be hidden to evade detection mechanisms. To prevent normal users from accid…
T1564.002 Hidden Users Adversaries may use hidden users to hide the presence of user accounts they create or modify. Administrators may want to…
T1564.003 Hidden Window Adversaries may use hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows t…
T1564.004 NTFS File Attributes Adversaries may use NTFS file attributes to hide their malicious data in order to evade detection. Every New Technology …
T1564.005 Hidden File System Adversaries may use a hidden file system to conceal malicious activity from users and security tools. File systems provi…
T1564.006 Run Virtual Instance Adversaries may carry out malicious operations using a virtual instance to avoid detection. A wide variety of virtualiza…
T1564.007 VBA Stomping Adversaries may hide malicious Visual Basic for Applications (VBA) payloads embedded within MS Office documents by repla…
T1564.008 Email Hiding Rules Adversaries may use email rules to hide inbound emails in a compromised user's mailbox. Many email clients allow users t…
T1564.009 Resource Forking Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applic…
T1564.010 Process Argument Spoofing Adversaries may attempt to hide process command-line arguments by overwriting process memory. Process command-line argum…
T1564.011 Ignore Process Interrupts Adversaries may evade defensive mechanisms by executing commands that hide from process interrupt signals. Many operatin…
T1564.012 File/Path Exclusions Adversaries may attempt to hide their file-based artifacts by writing them to specific folders or file names excluded fr…
T1564.013 Bind Mounts Adversaries may abuse bind mounts on file structures to hide their activity and artifacts from native utilities. A bind …
T1564.014 Extended Attributes Adversaries may abuse extended attributes (xattrs) on macOS and Linux to hide their malicious data in order to evade det…
T1574 Hijack Execution Flow Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs. Hijacking exec…
T1574.001 DLL Adversaries may abuse dynamic-link library files (DLLs) in order to achieve persistence, escalate privileges, and evade …
T1574.002 DLL Side-Loading Adversaries may execute their own malicious payloads by side-loading DLLs. Similar to [DLL](https://attack.mitre.org/tec…
T1574.004 Dylib Hijacking Adversaries may execute their own payloads by placing a malicious dynamic library (dylib) with an expected name in a pat…
T1574.005 Executable Installer File Permissions Weakness Adversaries may execute their own malicious payloads by hijacking the binaries used by an installer. These processes may…
T1574.006 Dynamic Linker Hijacking Adversaries may execute their own malicious payloads by hijacking environment variables the dynamic linker uses to load …
T1574.007 Path Interception by PATH Environment Variable Adversaries may execute their own malicious payloads by hijacking environment variables used to load libraries. The PATH…
T1574.008 Path Interception by Search Order Hijacking Adversaries may execute their own malicious payloads by hijacking the search order used to load other programs. Because …
T1574.009 Path Interception by Unquoted Path Adversaries may execute their own malicious payloads by hijacking vulnerable file path references. Adversaries can take …
T1574.010 Services File Permissions Weakness Adversaries may execute their own malicious payloads by hijacking the binaries used by services. Adversaries may use fla…
T1574.011 Services Registry Permissions Weakness Adversaries may execute their own malicious payloads by hijacking the Registry entries used by services. Flaws in the pe…
T1574.012 COR_PROFILER Adversaries may leverage the COR_PROFILER environment variable to hijack the execution flow of programs that load the .N…
T1574.013 KernelCallbackTable Adversaries may abuse the <code>KernelCallbackTable</code> of a process to hijack its execution flow in order to run the…
T1574.014 AppDomainManager Adversaries may execute their own malicious payloads by hijacking how the .NET `AppDomainManager` loads assemblies. The …
T1612 Build Image on Host Adversaries may build a container image directly on a host to bypass defenses that monitor for the retrieval of maliciou…
T1620 Reflective Code Loading Adversaries may reflectively load code into a process in order to conceal the execution of malicious payloads. Reflectiv…
T1622 Debugger Evasion Adversaries may employ various means to detect and avoid debuggers. Debuggers are typically used by defenders to trace a…
T1656 Impersonation Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing som…
T1672 Email Spoofing Adversaries may fake, or spoof, a sender’s identity by modifying the value of relevant email headers in order to establi…
T1678 Delay Execution Adversaries may employ various time-based methods to evade detection and analysis. These techniques often exploit system…
T1679 Selective Exclusion Adversaries may intentionally exclude certain files, folders, directories, file types, or system components from encrypt…
T1684 Social Engineering Adversaries may use social engineering techniques to influence users to take actions that result in unauthorized access,…
T1684.001 Impersonation Adversaries may impersonate a trusted person or organization in order to persuade and trick a target into performing som…
T1684.002 Email Spoofing Adversaries may fake, or spoof, a sender’s identity by modifying the value of relevant email headers in order to establi…